咨询与建议

限定检索结果

文献类型

  • 5,209 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 5,217 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,327 篇 工学
    • 1,989 篇 计算机科学与技术...
    • 1,343 篇 软件工程
    • 553 篇 信息与通信工程
    • 528 篇 机械工程
    • 387 篇 仪器科学与技术
    • 331 篇 电子科学与技术(可...
    • 325 篇 控制科学与工程
    • 295 篇 电气工程
    • 130 篇 网络空间安全
    • 113 篇 生物医学工程(可授...
    • 91 篇 动力工程及工程热...
    • 90 篇 建筑学
    • 84 篇 生物工程
    • 77 篇 化学工程与技术
    • 74 篇 土木工程
    • 71 篇 光学工程
    • 58 篇 交通运输工程
  • 960 篇 理学
    • 629 篇 数学
    • 175 篇 统计学(可授理学、...
    • 165 篇 系统科学
    • 132 篇 物理学
    • 105 篇 生物学
  • 926 篇 管理学
    • 657 篇 管理科学与工程(可...
    • 255 篇 图书情报与档案管...
    • 212 篇 工商管理
  • 154 篇 经济学
    • 150 篇 应用经济学
  • 88 篇 医学
    • 71 篇 基础医学(可授医学...
    • 69 篇 临床医学
  • 81 篇 文学
    • 78 篇 新闻传播学
  • 76 篇 教育学
    • 71 篇 教育学
  • 54 篇 法学
  • 41 篇 农学
  • 35 篇 军事学
  • 32 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 63 篇 data mining
  • 60 篇 educational inst...
  • 55 篇 wireless sensor ...
  • 55 篇 computational mo...
  • 51 篇 artificial neura...
  • 50 篇 monitoring
  • 47 篇 computers
  • 47 篇 cryptography
  • 45 篇 computer science
  • 41 篇 xml
  • 40 篇 databases
  • 39 篇 image segmentati...
  • 36 篇 software
  • 35 篇 variable speed d...
  • 34 篇 component
  • 33 篇 information mana...
  • 32 篇 authentication
  • 32 篇 web services
  • 31 篇 visualization
  • 31 篇 semantics

机构

  • 20 篇 school of inform...
  • 18 篇 school of comput...
  • 14 篇 school of electr...
  • 13 篇 engineering mana...
  • 12 篇 school of inform...
  • 12 篇 school of inform...
  • 11 篇 state key labora...
  • 10 篇 college of compu...
  • 10 篇 department of co...
  • 10 篇 college of compu...
  • 9 篇 school of comput...
  • 9 篇 school of inform...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 school of comput...
  • 7 篇 college of infor...
  • 7 篇 school of inform...
  • 7 篇 college of infor...

作者

  • 101 篇 china
  • 12 篇 nadeem ehsan
  • 10 篇 li-minn ang
  • 9 篇 wang wei
  • 9 篇 p.r.china
  • 8 篇 yang yang
  • 8 篇 wu di
  • 7 篇 wang hui
  • 7 篇 yang xiao
  • 7 篇 wang yan
  • 7 篇 guangzhi qu
  • 7 篇 kiseon kim
  • 6 篇 jing zhang
  • 6 篇 chan tak-wai
  • 6 篇 suwimon kooptiwo...
  • 6 篇 vishnu kant soni
  • 6 篇 ebtisam mirza
  • 6 篇 zhang hongke
  • 6 篇 xiaoping li
  • 6 篇 manoj kumar mish...

语言

  • 5,203 篇 英文
  • 7 篇 其他
  • 6 篇 中文
  • 1 篇 法文
检索条件"任意字段=2010 3rd IEEE International Conference on Computer Science and Information Technology—ICCSIT 2010"
5217 条 记 录,以下是4991-5000 订阅
排序:
Research of Choice and Design for PMSM Driving System Data Transmission and Control Communication Bus
Research of Choice and Design for PMSM Driving System Data T...
收藏 引用
2010 3rd international conference on computer and Electrical Engineering(ICCEE 2010)
作者: Bai Gong-ding Gai Jiang-tao Science and Technology on Vehicle Transmission Laboratory CNGC China North Vehicle Research Institute
The permanent magnet synchronous motor (PMSM) has some advantages such as big power density and reliability, and been widely used in vehicle driving and other industrial area. The space vector pulse width modulation (... 详细信息
来源: 评论
Evidential risk analysis based on the fuzzy belief TOPSIS
Evidential risk analysis based on the fuzzy belief TOPSIS
收藏 引用
2010 The 3rd international conference on Computational Intelligence and Industrial Application (PACIIA2010)
作者: Jiang Jiang,Xuan Li,Yingwu Chen College of information System and Management National University of Defense technology Changsha,Hunan Province,China Debin Fang Economics and Management School Wuhan University Wuhan,Hubei Province,China
Risk analysis and assessment is essentially a synthesis and amalgamation of the empirical and normative,the quantitative and qualitative,and the objective and subjective *** order to deal with quantitative and qualita... 详细信息
来源: 评论
Two pairs of operators in degree induced covering rough set
Two pairs of operators in degree induced covering rough set
收藏 引用
2010 The 3rd international conference on Computational Intelligence and Industrial Application (PACIIA2010)
作者: Zhang Tao,Chen Dingjun,Zhang Li Key Laboratory of Numerical Simulation of Sichuan Province and College of Mathematics and information science Neijiang Normal University Neijiang,Sichuan 641112,China Xie Mao Luzhou Medical College of Sichuan Province Luzhou,Sichuan,China
Two pairs of operators are defined in degree induced covering rough set and their properties are *** them,two pairs of inequalities well known in the degree induced covering rough set theory can now be modified to bec... 详细信息
来源: 评论
A Multi-Agent Simulation Framework for Organization Behavior of Large Scale Engineering Project
A Multi-Agent Simulation Framework for Organization Behavior...
收藏 引用
2010 The 3rd international conference on Computational Intelligence and Industrial Application (PACIIA2010)
作者: Hua Meng School of Management Harbin Institute of technology N0.92 West Da-Zhi Street,Harbin,China Qiang Mai and Shi An School of Transportation science and Engineering Harbin Institute of technology 73 Huanghe Road,Harbin,China
This paper proposed a Multi-Agent simulation framework for such organizations in order to analyze how organization behavior impacts the project *** on information processing view of organizations,the paper grouped the... 详细信息
来源: 评论
Operation Safety Assessment of Highway Tunnel and Development, Design, and Study of Management System
Operation Safety Assessment of Highway Tunnel and Developmen...
收藏 引用
2010 The 3rd international conference on Computational Intelligence and Industrial Application (PACIIA2010)
作者: DAI Xue-zhen, XING Lei and ZHANG Bo Key Laboratory for Special Area Highway Engineering of Ministry of Education, Chang’an University Xi’an Shaanxi 710064, China
In-depth analysis and research are made on the aspects of overall objective of system construction, system framework design, database construction and acquisition, system function realization and establishment of fore... 详细信息
来源: 评论
Design and Implementation of Fast Entry System for Equipment Downtime information Based *** MVC Framework
Design and Implementation of Fast Entry System for Equipment...
收藏 引用
2014 3rd international conference on information,Business and Education technology(ICIBET 2014)
作者: Shicheng Hu Yize Zhang School of Economics and Management Harbin Institute of Technology
In recent years, efficiency plays more and more important role in the work, improve enterprises' information entry efficiency has become a problem in front of the enterprise. Aiming at the process of enterprise do... 详细信息
来源: 评论
Algorithm of Image Encryption based on Permutation information Entropy
Algorithm of Image Encryption based on Permutation Informati...
收藏 引用
2010 3rd international conference on computer and Electrical Engineering(ICCEE 2010)
作者: CAO Guang-hui Hu Kai Yang He E Xu Electronic & Information Engineering College Liaoning university of Technology School of Computer Science and Technology Beijing University of Aeronautics and Astronautics
Criterion for choosing chaos map to drive image bit permutation based on chaos permutation information entropy is proposed. An algorithm for image bit permutation is designed based on the fact that the output trajecto... 详细信息
来源: 评论
A Novel Immune-inspired Method for Malicious Code Extraction and Detection
A Novel Immune-inspired Method for Malicious Code Extraction...
收藏 引用
2010 The 3rd international conference on Computational Intelligence and Industrial Application (PACIIA2010)
作者: Yu Zhang College of information science and technology Hainan Normal University,Haikou 571158,China Liping Song and Yuliang He Zhejiang Key Laboratory of information Security Zhejiang Testing Institue of Electronic Products
Malicious code has been generally accepted as one of the top security threats to computer information systems around the world for several years. Malicious code is changing more rapidly;it has become modular in design... 详细信息
来源: 评论
Collaborative Filtering with RI-based Approximation of SVD
Collaborative Filtering with RI-based Approximation of SVD
收藏 引用
2010 The 3rd international conference on Computational Intelligence and Industrial Application (PACIIA2010)
作者: Michal Ciesielczyk Andrzej Szwabe Bartlomiej Prus-Zajaczkowski Institute of Control and Information Engineering Poznan University of Technology
We investigate a new method for customer-product matrix dimensionality reduction that is applicable to collaborative filtering systems. The method-referred to as Randomized Singular Value Decomposition (RSVD)-is a com... 详细信息
来源: 评论
An Escalating Multi-Objective DE Algorithm
An Escalating Multi-Objective DE Algorithm
收藏 引用
2010 2nd ieee international conference on Advanced Management scienceieee ICAMS 2010
作者: Bin Xu School of Accountancy, Central University of Finance & Economic P. R. China, Beijing, 100081, Jing Yu Research Center on Fictitious Economy & Data science,CAS, P. R. China,Beijing,100190 University of Graduate, China Academy of science, P. R. China, Beijing, 100190
In this paper, a multi-objective DE algorithm based on escalating strategy will be proposed. The main idea of this escalating strategy is to re-generate the whole evolutionary population with some technology, which re... 详细信息
来源: 评论