咨询与建议

限定检索结果

文献类型

  • 3,688 篇 会议
  • 41 册 图书
  • 41 篇 期刊文献

馆藏范围

  • 3,770 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,916 篇 工学
    • 1,280 篇 计算机科学与技术...
    • 847 篇 软件工程
    • 215 篇 信息与通信工程
    • 204 篇 机械工程
    • 189 篇 电气工程
    • 178 篇 控制科学与工程
    • 138 篇 仪器科学与技术
    • 110 篇 电子科学与技术(可...
    • 66 篇 生物医学工程(可授...
    • 65 篇 生物工程
    • 57 篇 建筑学
    • 52 篇 网络空间安全
    • 45 篇 土木工程
    • 43 篇 动力工程及工程热...
    • 43 篇 化学工程与技术
    • 39 篇 环境科学与工程(可...
  • 453 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 147 篇 工商管理
    • 128 篇 图书情报与档案管...
  • 390 篇 理学
    • 178 篇 数学
    • 84 篇 物理学
    • 74 篇 生物学
    • 58 篇 系统科学
    • 39 篇 统计学(可授理学、...
  • 141 篇 教育学
    • 137 篇 教育学
  • 115 篇 文学
    • 113 篇 新闻传播学
  • 71 篇 经济学
    • 70 篇 应用经济学
  • 60 篇 医学
    • 50 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 56 篇 法学
    • 50 篇 社会学
  • 51 篇 农学
  • 22 篇 艺术学
  • 8 篇 军事学
  • 1 篇 历史学

主题

  • 370 篇 computer science
  • 315 篇 application soft...
  • 216 篇 information tech...
  • 188 篇 computer archite...
  • 178 篇 educational inst...
  • 149 篇 costs
  • 145 篇 computer network...
  • 129 篇 programming
  • 121 篇 technology manag...
  • 116 篇 educational tech...
  • 116 篇 humans
  • 111 篇 data mining
  • 109 篇 internet
  • 106 篇 computer industr...
  • 100 篇 standards develo...
  • 92 篇 software enginee...
  • 92 篇 computational mo...
  • 92 篇 computer science...
  • 91 篇 control systems
  • 88 篇 hardware

机构

  • 21 篇 department of co...
  • 10 篇 research center ...
  • 10 篇 college of compu...
  • 10 篇 faculty of compu...
  • 9 篇 research center ...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 school of optica...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 6 篇 college of compu...
  • 6 篇 college of compu...
  • 5 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 college of compu...
  • 5 篇 department of co...
  • 5 篇 college of infor...
  • 5 篇 school of comput...
  • 5 篇 department of co...

作者

  • 18 篇 china
  • 7 篇 mohammad syuhaim...
  • 6 篇 vahid rafe
  • 6 篇 reza rafeh
  • 6 篇 kasmiran jumari
  • 5 篇 dominik ertl
  • 5 篇 guangyuan zhao
  • 5 篇 zhang rubo
  • 5 篇 boonchuan ng
  • 5 篇 zhang hao
  • 5 篇 wei wang
  • 4 篇 aswir premadi
  • 4 篇 jun wang
  • 4 篇 jing zhang
  • 4 篇 li li
  • 4 篇 x.m. han
  • 4 篇 tang jie
  • 4 篇 yang xiao
  • 4 篇 tomomasa nagashi...
  • 4 篇 yang xu

语言

  • 3,751 篇 英文
  • 15 篇 中文
  • 2 篇 乌克兰文
  • 2 篇 其他
检索条件"任意字段=2009 International Conference on Computer Technology and Development, ICCTD 2009"
3770 条 记 录,以下是3211-3220 订阅
排序:
Application of DSP in Sensorless PMSM Control System
Application of DSP in Sensorless PMSM Control System
收藏 引用
international conference on Measuring technology and Mechatronics Automation, ICMTMA
作者: Qiu-xia Lu Xue-ren Dong School of Mechanical Engineering University of Jinan Jinan UJN China
At present, the AC servo system which uses the PMSM as the control object is widely used in such areas as the CNC machine tools, industrial robots and space. No sensor-based servo system is becoming the development tr... 详细信息
来源: 评论
Constructing Streamlines in Steady Flow on Unstructured Grids
Constructing Streamlines in Steady Flow on Unstructured Grid...
收藏 引用
2009 2nd IEEE international conference on computer Science and Information technology(ICCSIT 2009
作者: Ying Wang Department of Civil Engineering Luoyang Institute of Science and technology Luoyang,Henan,P.R.China,471023 Haisheng Li,Qiang Cai,Wenzheng Li College of computer and Information Engineering Beijing technology and Business University Beijing,P.R.China,100048
Streamline is one of the basic techniques for flow ***,constructing a streamline includes three main sub-procedures:point location,numerical integration and vector field interpolation,In this paper,by dividing the CFD... 详细信息
来源: 评论
Symmetry structured SPN block cipher algorithm
Symmetry structured SPN block cipher algorithm
收藏 引用
international conference on Advanced Communication technology (ICACT)
作者: Gil-Ho Kim Jong-Nam Kim Gyeong-Yeon Cho Department of Computer Engineering Pukyong National University South Korea
Feistel and SPN are the two main structures in designing a block cipher algorithm. Unlike Feistel, an SPN has an asymmetric structure in encryption and decryption. In this paper we propose an SPN algorithm which has a... 详细信息
来源: 评论
Design and Realization of Network Education Supporting System Based on Web 2.0
Design and Realization of Network Education Supporting Syste...
收藏 引用
2009 2nd IEEE international conference on computer Science and Information technology(ICCSIT 2009
作者: Dan Liu,Shi-xia Ma,Qing-yun Ru,Zu-hua Guo computer Science and technology Department Henan Mechanic and Electric Engineering College Xinxiang,Henan,China
Web 2.0 is the latest development of Internet technology,it is being used into more and more *** paper explains the concepts and features of web 2.0,combines web 2.0 with network education,proposes an overall design m... 详细信息
来源: 评论
Three-Dimensional Shape Recovery Based On Single Historical Image
Three-Dimensional Shape Recovery Based On Single Historical ...
收藏 引用
The Second international Joint conference on Computational Science and Optimization(CSO 2009)(2009 国际计算科学与优化会议)
作者: Limei Song Yuhua Wen College of Computer technic and automatization TianJin polytechnic university TianJin 300160 P.R. General Manager Office NKTY (Tianjin) High Technology Development Ltd.TianJin 300384 P.R.China
For unable to establish geometrical relationship of coordinates, conventional methods of 3D shape recovery can not be adopted to a great number of precious historical images to recover the 3D shape of the objects and ... 详细信息
来源: 评论
A study on migration scheme for a mobile trusted module
A study on migration scheme for a mobile trusted module
收藏 引用
international conference on Advanced Communication technology (ICACT)
作者: Dong-Wan Kang Sung-Ik Jun Im-Yeoung Lee Division of Computer Science and Engineering Soonchunhyang University South Korea Information Security Research Division Electronics and Telecommunications Research Institute South Korea
In modern information society, a high volume of important information is communicated in an on-line network. Specially, mobile environments that handle radio communication are more flexible than wired communication, a... 详细信息
来源: 评论
An Optimized Anonymous Attestation Protocol from Bilinear Pairing
An Optimized Anonymous Attestation Protocol from Bilinear Pa...
收藏 引用
international conference on Scalable Computing and Communications;international conference on Embedded Computing, SCALCOM-EMBEDDEDCOM
作者: Rongwei Yu Lina Wang Yanzhou Zhou Xianhui Niu School of Computer Wuhan University Wuhan P.R. China Key Laboratory of Aerospace Information Security and Trust Computing Ministry of Education Wuhan P.R. China
With the development of Internet-based computing, we can no longer trust them to sustain the applications we depend on because IT infrastructure technologies fail to keep pace with emerging threats. Direct Anonymous A... 详细信息
来源: 评论
Regarding the Research of the development and Application of"Colorfully Engraved Black Pottery’s"Rapid Prototype technology
Regarding the Research of the Development and Application of...
收藏 引用
E-Business·Creative Design·Manufacturing——2009 IEEE 10th international conference on computer-Aided Industrial Design & Conceptual Design(CAID&CD’2009
作者: Renping Xu1 Kunqian Wang1 Xiaoyuan Yang 1 Chao Zhang2 1 Kunming University of Science and technology Kunming P.R.China 2 Guizhou University College of the Arts Guiyang P.R.China
This paper researched the development and application regarding the black pottery’s rapid *** Tibetan nationality’s Nixi black pottery is the nationality’s traditional handcraft that possess
来源: 评论
Research on the Interaction Design Methods of Digital Cultural Heritage
Research on the Interaction Design Methods of Digital Cultur...
收藏 引用
E-Business·Creative Design·Manufacturing——2009 IEEE 10th international conference on computer-Aided Industrial Design & Conceptual Design(CAID&CD’2009
作者: 1 QIN Jingyan,2 GUAN Yan,3 LU Xiaobo 1 Industrial Design Department University of Science&technology Beijing Beijing 100083,China 2,3 Academy of Arts Design Tsinghua University Beijing 100084,China
This paper aims at responding to the questions in the traditional cultural heritage protection and exploring new visual representation forms and human-computer natural interaction design methods to carry forward the D... 详细信息
来源: 评论
A Case Retrieval Algorithm Based on Ant Colony Clustering
A Case Retrieval Algorithm Based on Ant Colony Clustering
收藏 引用
2009 2nd IEEE international conference on computer Science and Information technology(ICCSIT 2009
作者: Shi-xia Ma,Qing-yun Ru,Dan Liu,Zu-hua Guo computer Science and technology Department Henan Mechanic and Electric Engineering College Xinxiang,Henan,China
Case retrieval is an important part of case-based reasoning *** to the idea of Ant Colony Algorithm,the paper performs clustering to case base,and on this basis,in accordance with the idea of k-means algorithm,designs... 详细信息
来源: 评论