咨询与建议

限定检索结果

文献类型

  • 5,209 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 5,216 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,326 篇 工学
    • 1,988 篇 计算机科学与技术...
    • 1,343 篇 软件工程
    • 553 篇 信息与通信工程
    • 528 篇 机械工程
    • 387 篇 仪器科学与技术
    • 331 篇 电子科学与技术(可...
    • 324 篇 控制科学与工程
    • 295 篇 电气工程
    • 130 篇 网络空间安全
    • 113 篇 生物医学工程(可授...
    • 91 篇 动力工程及工程热...
    • 90 篇 建筑学
    • 84 篇 生物工程
    • 77 篇 化学工程与技术
    • 74 篇 土木工程
    • 71 篇 光学工程
    • 58 篇 交通运输工程
  • 960 篇 理学
    • 629 篇 数学
    • 175 篇 统计学(可授理学、...
    • 165 篇 系统科学
    • 132 篇 物理学
    • 105 篇 生物学
  • 925 篇 管理学
    • 656 篇 管理科学与工程(可...
    • 255 篇 图书情报与档案管...
    • 212 篇 工商管理
  • 154 篇 经济学
    • 150 篇 应用经济学
  • 88 篇 医学
    • 71 篇 基础医学(可授医学...
    • 69 篇 临床医学
  • 81 篇 文学
    • 78 篇 新闻传播学
  • 76 篇 教育学
    • 71 篇 教育学
  • 54 篇 法学
  • 41 篇 农学
  • 35 篇 军事学
  • 32 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 63 篇 data mining
  • 60 篇 educational inst...
  • 55 篇 wireless sensor ...
  • 55 篇 computational mo...
  • 51 篇 artificial neura...
  • 50 篇 monitoring
  • 47 篇 computers
  • 47 篇 cryptography
  • 45 篇 computer science
  • 41 篇 xml
  • 40 篇 databases
  • 39 篇 image segmentati...
  • 36 篇 software
  • 35 篇 variable speed d...
  • 34 篇 component
  • 33 篇 information mana...
  • 32 篇 authentication
  • 32 篇 web services
  • 31 篇 visualization
  • 31 篇 semantics

机构

  • 20 篇 school of inform...
  • 18 篇 school of comput...
  • 14 篇 school of electr...
  • 13 篇 engineering mana...
  • 12 篇 school of inform...
  • 12 篇 school of inform...
  • 11 篇 state key labora...
  • 10 篇 college of compu...
  • 10 篇 department of co...
  • 10 篇 college of compu...
  • 9 篇 school of comput...
  • 9 篇 school of inform...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 school of comput...
  • 7 篇 college of infor...
  • 7 篇 school of inform...
  • 7 篇 college of infor...

作者

  • 101 篇 china
  • 12 篇 nadeem ehsan
  • 10 篇 li-minn ang
  • 9 篇 wang wei
  • 9 篇 p.r.china
  • 8 篇 yang yang
  • 8 篇 wu di
  • 7 篇 wang hui
  • 7 篇 yang xiao
  • 7 篇 wang yan
  • 7 篇 guangzhi qu
  • 7 篇 kiseon kim
  • 6 篇 jing zhang
  • 6 篇 chan tak-wai
  • 6 篇 suwimon kooptiwo...
  • 6 篇 vishnu kant soni
  • 6 篇 ebtisam mirza
  • 6 篇 zhang hongke
  • 6 篇 xiaoping li
  • 6 篇 manoj kumar mish...

语言

  • 5,202 篇 英文
  • 7 篇 其他
  • 6 篇 中文
  • 1 篇 法文
检索条件"任意字段=2010 3rd IEEE International Conference on Computer Science and Information Technology—ICCSIT 2010"
5216 条 记 录,以下是4881-4890 订阅
排序:
Steam soft-sensing for dyeing process via FCM-based multiple models
Steam soft-sensing for dyeing process via FCM-based multiple...
收藏 引用
international conference on information sciences and Interaction sciences (ICIS)
作者: Ping Hao College of Computer Science and Technology Zhejiang University of Technology Hangzhou China
Aimed to the measuring problem of steam consumption in Dyeing process, a multiple neural network soft sensing modeling of Dyeing steam consumption based on adaptive fuzzy C-means clustering (FCM) is presented. The met... 详细信息
来源: 评论
Enhance topology control protocol(ECEC) to conserve energy based clustering in wireless ad hoc networks
Enhance topology control protocol(ECEC) to conserve energy b...
收藏 引用
international conference on computer science and information technology (CSIT)
作者: Afsaneh Fathi Hasan Taheri Amirkabir University of Technology슠 Tehran Iran
The network in case of Mobile Adhoc networks is generally poorly defined or not defined at all. In Such a network the data can be relayed/routed by intermediate nodes whose position keeps on changing. Mobile adhoc net... 详细信息
来源: 评论
Data Consistence for Distributed Vision-based Traffic Surveillance Systems
Data Consistence for Distributed Vision-based Traffic Survei...
收藏 引用
2010 The 3rd international conference on Computational Intelligence and Industrial Application (PACIIA2010)
作者: Xiaoming Yao, Wencai Du, Taijun Li, Longjuan Wang, Honglei Li, Hanwei Wu, and Zequn Wang College of information science & technology Hainan University Haikou, Hainan Province, China
How to stipulate data consistence is very important when developing software packages for integrating or modifying the existing distributed vision-based traffic surveillance systems into a larger one. We extend our pr... 详细信息
来源: 评论
Center Point Detection of Fingerprint Based on Direction Mean Value Difference
Center Point Detection of Fingerprint Based on Direction Mea...
收藏 引用
2010 The 3rd international conference on Computational Intelligence and Industrial Application (PACIIA2010)
作者: Shui-ping Wang1,2, Xiao-fang Pei3,Ling-zhi Liao1 and Ying-nan Zhao1 1.College of computer science & technology , Nanjing University of information science & technology Nanjing, China 2. Department of computer science & technology, Nanjing University of science & technology, Nanjing, China 3.College of Electronic & information Engineering, Nanjing University of information science & technology Nanjing, China
Directional pattern is a representation of original fingerprint image. This paper proposes one algorithm based on direction mean value difference to detect fingerprint center point. To realize this algorithm mainly in... 详细信息
来源: 评论
The study for the RFID with bluetooth positioning system
The study for the RFID with bluetooth positioning system
收藏 引用
international conference on information sciences and Interaction sciences (ICIS)
作者: Chung-Hsin Liu Jian-Yun Lo Department of Computer Science Chinese Cultural University Taipei Taiwan
This paper is mainly to investigate the positioning technology. We use Bluetooth and RFID to increase positioning accuracy in house or interior space. RFID technologies have low-cost, low power consumption, small size... 详细信息
来源: 评论
Design of Secure Diffserv Ingress Edge Routers
Design of Secure Diffserv Ingress Edge Routers
收藏 引用
2010 The IET 3rd international conference on Wireless,Mobile & Multimedia Networks(第三届IET无线移动及多媒体网络国际会议 ICWMMN 2010)
作者: Yang Xiao Guangzhi Qu Kiseon Kim Institute of Information and Science Beijing Jiaotong University Beijng 100044 China 2Dept.of Engineering and Computer Science Oakland University Rochester MI 48309 USA 3Dept.of Information and Comm. Gwangju Institute of Science and Technology Gwangju 500-712 Korea
Classical Differentiated Service (DiffServ) routers have not considered the security problem in their designs, generally, they have no ability to countering Denial of Service (DoS ) attacks because of their simple sys... 详细信息
来源: 评论
A New information Retrieval System Based on Fuzzy Set Theory and T-Conorm
A New Information Retrieval System Based on Fuzzy Set Theory...
收藏 引用
2010 The 3rd international conference on Computational Intelligence and Industrial Application (PACIIA2010)
作者: Songxin Wang Department of computer science and technology,Shanghai University of Finance and Economics,Shanghai,China
The main activity of an information Retrieval System (IRS) is the gathering of pertinent archived documents that better satisfy the user *** to retrieval required information is the key problem in this kind of informa... 详细信息
来源: 评论
Algorithm for solving time table questions based on GA
Algorithm for solving time table questions based on GA
收藏 引用
international conference on information sciences and Interaction sciences (ICIS)
作者: Xiaoping Li Xiaoxing Lv Wenbo Mei Hu Xu Department of Computer Science and Technology Beijing Institute of Technology Beijing China
Time table problem is a multifactor optimized decision problem and is typical problem in constitution and planning. It has been proved as a kind of NP-complete problem. Genetic Algorithm (GA) is based on the biologica... 详细信息
来源: 评论
Improving computer basis teaching through mobile communication and cloud computing technology
Improving computer basis teaching through mobile communicati...
收藏 引用
international conference on Advanced computer Theory and Engineering, ICACTE
作者: Weiqing Zhao Yafei Sun Lijuan Dai College of Computer Science SiChuan University Chengdu Sichuan China
With the world coming into the information age, computer basis course has become the public basic course which must be set up in colleges and universities and the increasing popularization of computers makes the compu... 详细信息
来源: 评论
Performance Analysis of Explicit Control Protocol (XCP)
Performance Analysis of Explicit Control Protocol (XCP)
收藏 引用
2010 The IET 3rd international conference on Wireless,Mobile & Multimedia Networks(第三届IET无线移动及多媒体网络国际会议 ICWMMN 2010)
作者: Shaohai Hu Yang Xiao Lili Song Pengxuan Mao Guangzhi Qu Kiseon Kim Institute of Information Science Beijing Jiaotong University Beijing China Dept.of Engineering and Computer Science Oakland University Rochester MI48309 USA Dept.of Information and Communications Gwangju Institute of Science and Technology Gwangju 500-712
Mathematical analysis of current congestion control algorithms [1, 2] reveals that, as the delay-bandwidth product (BDP) increases, TCP becomes more oscillatory and prone to instability, regardless of the queuing sche... 详细信息
来源: 评论