咨询与建议

限定检索结果

文献类型

  • 5,209 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 5,217 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,327 篇 工学
    • 1,989 篇 计算机科学与技术...
    • 1,343 篇 软件工程
    • 553 篇 信息与通信工程
    • 528 篇 机械工程
    • 387 篇 仪器科学与技术
    • 331 篇 电子科学与技术(可...
    • 325 篇 控制科学与工程
    • 295 篇 电气工程
    • 130 篇 网络空间安全
    • 113 篇 生物医学工程(可授...
    • 91 篇 动力工程及工程热...
    • 90 篇 建筑学
    • 84 篇 生物工程
    • 77 篇 化学工程与技术
    • 74 篇 土木工程
    • 71 篇 光学工程
    • 58 篇 交通运输工程
  • 960 篇 理学
    • 629 篇 数学
    • 175 篇 统计学(可授理学、...
    • 165 篇 系统科学
    • 132 篇 物理学
    • 105 篇 生物学
  • 926 篇 管理学
    • 657 篇 管理科学与工程(可...
    • 255 篇 图书情报与档案管...
    • 212 篇 工商管理
  • 154 篇 经济学
    • 150 篇 应用经济学
  • 88 篇 医学
    • 71 篇 基础医学(可授医学...
    • 69 篇 临床医学
  • 81 篇 文学
    • 78 篇 新闻传播学
  • 76 篇 教育学
    • 71 篇 教育学
  • 54 篇 法学
  • 41 篇 农学
  • 35 篇 军事学
  • 32 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 63 篇 data mining
  • 60 篇 educational inst...
  • 55 篇 wireless sensor ...
  • 55 篇 computational mo...
  • 51 篇 artificial neura...
  • 50 篇 monitoring
  • 47 篇 computers
  • 47 篇 cryptography
  • 45 篇 computer science
  • 41 篇 xml
  • 40 篇 databases
  • 39 篇 image segmentati...
  • 36 篇 software
  • 35 篇 variable speed d...
  • 34 篇 component
  • 33 篇 information mana...
  • 32 篇 authentication
  • 32 篇 web services
  • 31 篇 visualization
  • 31 篇 semantics

机构

  • 20 篇 school of inform...
  • 18 篇 school of comput...
  • 14 篇 school of electr...
  • 13 篇 engineering mana...
  • 12 篇 school of inform...
  • 12 篇 school of inform...
  • 11 篇 state key labora...
  • 10 篇 college of compu...
  • 10 篇 department of co...
  • 10 篇 college of compu...
  • 9 篇 school of comput...
  • 9 篇 school of inform...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 school of comput...
  • 7 篇 college of infor...
  • 7 篇 school of inform...
  • 7 篇 college of infor...

作者

  • 101 篇 china
  • 12 篇 nadeem ehsan
  • 10 篇 li-minn ang
  • 9 篇 wang wei
  • 9 篇 p.r.china
  • 8 篇 yang yang
  • 8 篇 wu di
  • 7 篇 wang hui
  • 7 篇 yang xiao
  • 7 篇 wang yan
  • 7 篇 guangzhi qu
  • 7 篇 kiseon kim
  • 6 篇 jing zhang
  • 6 篇 chan tak-wai
  • 6 篇 suwimon kooptiwo...
  • 6 篇 vishnu kant soni
  • 6 篇 ebtisam mirza
  • 6 篇 zhang hongke
  • 6 篇 xiaoping li
  • 6 篇 manoj kumar mish...

语言

  • 5,203 篇 英文
  • 7 篇 其他
  • 6 篇 中文
  • 1 篇 法文
检索条件"任意字段=2010 3rd IEEE International Conference on Computer Science and Information Technology—ICCSIT 2010"
5217 条 记 录,以下是31-40 订阅
排序:
Study on the technology of Fuzzy Selection in EMS
Study on the Technology of Fuzzy Selection in EMS
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Xiong, JunXing Tu, HaiNing Zhao, JinPing Nanchang Univ Sch Mech & Elect Engn Nanchang Jiangxi Peoples R China Nanchang Univ Coll Sci & Technol Nanchang Jiangxi Peoples R China
Fuzzy set theory, which is used to deal with imprecise probability by computer. In the article, the fuzzy set theory applied to EMS, and study on fuzzy database selection to make fuzzy problems of the system more prec... 详细信息
来源: 评论
An information Grid-based Model for Sharing Water Pollution Control and Prevention Technologies
An Information Grid-based Model for Sharing Water Pollution ...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Wang Minghu Gao Zhenji Xu Chunlian Huang Haiming Northwestern Polytech Univ Sch Automat Control Xian Shaanxi Peoples R China Chinese Res Inst Environm Sci Beijing Peoples R China
Though water pollution control and prevention technologies have made a great progress, most polluting enterprises even have never heard of them, not to mention use them. So we design an technologies sharing model base... 详细信息
来源: 评论
A Special 3D Effect Method of Infrared Decoy
A Special 3D Effect Method of Infrared Decoy
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Xiang, Hua Peng, Wang Xian Technol Univ Sch Elect Informat Engn Xian Peoples R China
Electron countermeasure plays an important role in modern military affairs. Especially infrared decoy is one of a popular passive jamming, that visual simulation becomes a hotpot. Having analyzed infrared decoy's ... 详细信息
来源: 评论
Providing a Solution for Negative Impact of Corrupted frames on Inter Frame Spaces in ieee 802.11 protocol on Ad Hoc Networks
Providing a Solution for Negative Impact of Corrupted frames...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Afrancheh, Hamid Reza Afrancheh, Saeed Reza Mahdavi, Mehregan Islamic Azad Univ Anzali Branch Anzali Iran Univ Guilan Dept Comp Engn Rasht Iran
the determination of ieee 802.11 protocol behavior against various scenarios is important, Therefore we offer two scenarios that how corrupted frames are effected on inter frame spaces and its adverse effect impact on... 详细信息
来源: 评论
3D Modeling Visualization Algorithm Research and Implementation
3D Modeling Visualization Algorithm Research and Implementat...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Chen Qiuhong Henan Univ Urban Construct Dept Comp Sci & Engn Pingdingshan Peoples R China
in this paper, based on the in-depth research of existing 3D modeling algorithms, a new graphical 3D modeling visualization algorithm is proposed. This algorithm can use relatively smaller images demand to generate 3D... 详细信息
来源: 评论
Research on the Application of Workflow technology in OA System
Research on the Application of Workflow Technology in OA Sys...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Shen Zihao Wang Hui Henan Polytech Univer Coll Comp Jiaozuo 454000 Peoples R China Jilin Univer Coll Comp & Technol Changchun 130012 Peoples R China
This paper describes the workflow management system and its implementation procedures, gives the formal definition of workflow model. It discusses the business process of the circulation of official document combined ... 详细信息
来源: 评论
An Enterprise information Integration Architecture based on Semantic and Grid
An Enterprise Information Integration Architecture based on ...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Zenglei, Wang Kaixing, Zhang Northwestern Polytech Univ Xian Peoples R China
An enterprise information integration architecture based on semantic and grid is proposed at the current work. Semantic web technology and grid computing technology are combined together and applied to enterprise info... 详细信息
来源: 评论
Research on the computer-Based College English Test System in China
Research on the Computer-Based College English Test System i...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Guo Guiran Zhao Shuli Hebei Univ Econ & Business Foreign Languages Teaching Dept Shijiazhuang Peoples R China
computer-based college Euglish test is oue of the important ingredients in the reform of college English teaching and learning in China, which is based on communicative testing theories and represents the future trend... 详细信息
来源: 评论
A Method Research of the Hiding Fingerprint Image Data based on Wavelet coefficients redundancy
A Method Research of the Hiding Fingerprint Image Data based...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Yan Jia-ming Northwestern Polytech Univ Sch Elect & Informat Xian Peoples R China
With coding stream layered structure and progressive Transmission characteristics in JPEG2000, the paper presents a method research of the hiding fingerprint information. By means of the ranked bit-stream according to... 详细信息
来源: 评论
The Application of RFID technology in the Logistics Supply Chain
The Application of RFID Technology in the Logistics Supply C...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Guo Zhanglin Zhang Xiaocui North China Inst Sci & Technol Dept Civil Engn Beijing Peoples R China Hebei Univ Engn Sch Econ & Management Handan Peoples R China
Based on the RFID (radio frequency identification) technology features, the paper make a deep analysis of the RFID technology effect on all aspects of the logistics supply chain management to make it achieve synergy a... 详细信息
来源: 评论