咨询与建议

限定检索结果

文献类型

  • 5,209 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 5,217 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,327 篇 工学
    • 1,989 篇 计算机科学与技术...
    • 1,343 篇 软件工程
    • 553 篇 信息与通信工程
    • 528 篇 机械工程
    • 387 篇 仪器科学与技术
    • 331 篇 电子科学与技术(可...
    • 325 篇 控制科学与工程
    • 295 篇 电气工程
    • 130 篇 网络空间安全
    • 113 篇 生物医学工程(可授...
    • 91 篇 动力工程及工程热...
    • 90 篇 建筑学
    • 84 篇 生物工程
    • 77 篇 化学工程与技术
    • 74 篇 土木工程
    • 71 篇 光学工程
    • 58 篇 交通运输工程
  • 960 篇 理学
    • 629 篇 数学
    • 175 篇 统计学(可授理学、...
    • 165 篇 系统科学
    • 132 篇 物理学
    • 105 篇 生物学
  • 926 篇 管理学
    • 657 篇 管理科学与工程(可...
    • 255 篇 图书情报与档案管...
    • 212 篇 工商管理
  • 154 篇 经济学
    • 150 篇 应用经济学
  • 88 篇 医学
    • 71 篇 基础医学(可授医学...
    • 69 篇 临床医学
  • 81 篇 文学
    • 78 篇 新闻传播学
  • 76 篇 教育学
    • 71 篇 教育学
  • 54 篇 法学
  • 41 篇 农学
  • 35 篇 军事学
  • 32 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 63 篇 data mining
  • 60 篇 educational inst...
  • 55 篇 wireless sensor ...
  • 55 篇 computational mo...
  • 51 篇 artificial neura...
  • 50 篇 monitoring
  • 47 篇 computers
  • 47 篇 cryptography
  • 45 篇 computer science
  • 41 篇 xml
  • 40 篇 databases
  • 39 篇 image segmentati...
  • 36 篇 software
  • 35 篇 variable speed d...
  • 34 篇 component
  • 33 篇 information mana...
  • 32 篇 authentication
  • 32 篇 web services
  • 31 篇 visualization
  • 31 篇 semantics

机构

  • 20 篇 school of inform...
  • 18 篇 school of comput...
  • 14 篇 school of electr...
  • 13 篇 engineering mana...
  • 12 篇 school of inform...
  • 12 篇 school of inform...
  • 11 篇 state key labora...
  • 10 篇 college of compu...
  • 10 篇 department of co...
  • 10 篇 college of compu...
  • 9 篇 school of comput...
  • 9 篇 school of inform...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 school of comput...
  • 7 篇 college of infor...
  • 7 篇 school of inform...
  • 7 篇 college of infor...

作者

  • 101 篇 china
  • 12 篇 nadeem ehsan
  • 10 篇 li-minn ang
  • 9 篇 wang wei
  • 9 篇 p.r.china
  • 8 篇 yang yang
  • 8 篇 wu di
  • 7 篇 wang hui
  • 7 篇 yang xiao
  • 7 篇 wang yan
  • 7 篇 guangzhi qu
  • 7 篇 kiseon kim
  • 6 篇 jing zhang
  • 6 篇 chan tak-wai
  • 6 篇 suwimon kooptiwo...
  • 6 篇 vishnu kant soni
  • 6 篇 ebtisam mirza
  • 6 篇 zhang hongke
  • 6 篇 xiaoping li
  • 6 篇 manoj kumar mish...

语言

  • 5,203 篇 英文
  • 7 篇 其他
  • 6 篇 中文
  • 1 篇 法文
检索条件"任意字段=2010 3rd IEEE International Conference on Computer Science and Information Technology—ICCSIT 2010"
5217 条 记 录,以下是101-110 订阅
排序:
Research on The Key Techniques of Wireless Communication for Emergency information System
Research on The Key Techniques of Wireless Communication for...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Yang, Zhigang Chongqing Univ Arts & Sci Sch Comp Chongqing 402160 Peoples R China
As China's continuous improvement in the degree of information, the wireless communication network has covered all regions of the country, and information has also brought a great deal of information network secur... 详细信息
来源: 评论
information Flow Metrics and Complexity Measurement
Information Flow Metrics and Complexity Measurement
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Sarala, S. Jabbar, P. Abdul Bharathiar Univ Dept CSE Coimbatore Tamil Nadu India
Complexity metrics takes an important role to predict fault density and failure rate in the software deployment. information flow represents the flow of data in collective procedures in the processes of a concrete sys... 详细信息
来源: 评论
computer Architecture Education in Multicore Era: Is the time to change
Computer Architecture Education in Multicore Era: Is the tim...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: He, Liqiang Inner Mongolia Univ Coll Comp Sci Hohhot 010021 Inner Mongolia Peoples R China
Chip Multicore Processor (CMP) has become the mainstream microprocessor architecture in nowadays industry and academic literature. With the progress of CMP hardware developing and researching, software issues become m... 详细信息
来源: 评论
computer Simulation Study on Optimization of Linear Servo Motor Used in CNC Machines
Computer Simulation Study on Optimization of Linear Servo Mo...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Zhang Yuqiu Yu Minghu Ye Yunyue Liu Xiao Zhejiang Univ Coll Elect Engn Hangzhou Zhejiang Peoples R China
For computer numerical control (CNC) machine tools, the double side air-cored permanent magnet linear servo motor (DAPMLSM) is suitable for high-speed and high-recision servo feed systems. But it also has thrust rippl... 详细信息
来源: 评论
End-to-End User Identity Confidentiality for UMTS Networks
End-to-End User Identity Confidentiality for UMTS Networks
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Choudhury, Hiten Roychoudhury, Basav Saikia, Dilip K. St Edmunds Coll Shillong Shillong Meghalaya India Indian Inst Management Shillong Shillong Meghalaya India Tezpur Univ Tezpur Sonitpur Assam India
A standard security feature in any wireless network is user identity confidentiality. In Universal Mobile Telecommunication System (UMTS), there are circumstances where this important security feature is compromised d... 详细信息
来源: 评论
Creating Security in information by the Aid of FEAL Data Coding Algorithm through Simulation & Synthesis
Creating Security in Information by the Aid of FEAL Data Cod...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Masoudi, Mahdi Ahmadi, Somayeh Islamic Azad Univ Sahneh Branch Kermanshah Iran
Communications usually do not have enough security. One of the ways for making the data secure is using methods for coding the information in a special manner. In this article one of the algorithms of coding and decod... 详细信息
来源: 评论
Prospect of DTMF Keypad as computer's Keyboard
Prospect of DTMF Keypad as Computer's Keyboard
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Arefin, Kazi Shamsul Saha, Aloke Kumar Mamun, Quazi Ehsanul Kabir Univ Asia Pacific Dept CSE Dhaka Bangladesh Monash Univ Dept IT Melbourne Vic Australia
We have already some technologies to perform these types of application such as: Bluetooth, IR. However these are used in a limited area which we can easily come over in the proposed system. This system has two sectio... 详细信息
来源: 评论
Modeling and Simulation of Spatial 6-DOF Parallel Robots Using Simulink and SimMechanics
Modeling and Simulation of Spatial 6-DOF Parallel Robots Usi...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Yang, Chifu Ye, Zhengmao Peter, O. Ogbobe Han, Junwei Harbin Inst Technol Dept Mech & Elect Engn Harbin Peoples R China
This paper addressed the dynamics and control for completely spatial 6-DOF parallel robots (SPR) in computer. The complex dynamic equations are derived via using Kane methods, and a typical PID controller is developed... 详细信息
来源: 评论
Dynamic Task Decomposition and Allocation in CGF
Dynamic Task Decomposition and Allocation in CGF
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Feng, Lei Hu, Ji-Wen Zha, Ya-Bing Yin, Quan-Jun Natl Univ Def Technol Sch Mechatron & Automat Changsha Hunan Peoples R China
computer Generated Forces (CGF) is virtual entities of combat force, which can be generated and controlled by computers. Human Behavior Representation (HBR) in CGF is critical for combat simulation. Yet, despite the c... 详细信息
来源: 评论
Research on information Engineering Surveillance Risk Evaluation Based on Fault Tree Analysis
Research on Information Engineering Surveillance Risk Evalua...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Liu, Hongzhi Zhang, Congcong Beijing Technol & Business Univ Dept Comp Sci & Technol Beijing Peoples R China
information security risk analysis method is now a hot issue of information security management field. Fault tree analysis method has proposed since the 1960s, obtained the widespread application in many large-scale c... 详细信息
来源: 评论