咨询与建议

限定检索结果

文献类型

  • 14,484 篇 会议
  • 87 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 14,611 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,877 篇 工学
    • 5,285 篇 计算机科学与技术...
    • 3,499 篇 软件工程
    • 1,405 篇 控制科学与工程
    • 1,043 篇 机械工程
    • 1,013 篇 电气工程
    • 1,010 篇 信息与通信工程
    • 635 篇 电子科学与技术(可...
    • 545 篇 仪器科学与技术
    • 299 篇 动力工程及工程热...
    • 271 篇 建筑学
    • 250 篇 土木工程
    • 228 篇 生物医学工程(可授...
    • 227 篇 交通运输工程
    • 208 篇 化学工程与技术
    • 192 篇 安全科学与工程
    • 187 篇 材料科学与工程(可...
    • 184 篇 环境科学与工程(可...
    • 182 篇 光学工程
    • 182 篇 生物工程
  • 2,682 篇 管理学
    • 2,218 篇 管理科学与工程(可...
    • 583 篇 图书情报与档案管...
    • 530 篇 工商管理
  • 2,482 篇 理学
    • 1,306 篇 数学
    • 624 篇 系统科学
    • 472 篇 物理学
    • 308 篇 统计学(可授理学、...
    • 264 篇 生物学
    • 176 篇 化学
  • 227 篇 教育学
    • 215 篇 教育学
  • 204 篇 经济学
    • 202 篇 应用经济学
  • 177 篇 医学
  • 137 篇 文学
  • 129 篇 法学
  • 111 篇 农学
  • 69 篇 艺术学
  • 48 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 1,329 篇 computational mo...
  • 995 篇 biological syste...
  • 676 篇 application soft...
  • 546 篇 computer archite...
  • 431 篇 mathematical mod...
  • 309 篇 computer science
  • 289 篇 analytical model...
  • 253 篇 computer simulat...
  • 233 篇 monitoring
  • 213 篇 educational inst...
  • 200 篇 real time system...
  • 179 篇 power system mod...
  • 169 篇 data mining
  • 168 篇 object oriented ...
  • 166 篇 data models
  • 165 篇 adaptation model
  • 155 篇 modeling
  • 154 篇 hardware
  • 152 篇 databases
  • 151 篇 servers

机构

  • 32 篇 department of co...
  • 29 篇 school of contro...
  • 26 篇 college of compu...
  • 24 篇 school of comput...
  • 23 篇 school of contro...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 school of comput...
  • 18 篇 school of comput...
  • 16 篇 school of comput...
  • 16 篇 school of comput...
  • 16 篇 department of co...
  • 16 篇 school of comput...
  • 16 篇 school of comput...
  • 16 篇 college of compu...
  • 14 篇 college of compu...
  • 14 篇 college of compu...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 13 篇 college of compu...

作者

  • 15 篇 wei li
  • 14 篇 china
  • 13 篇 li li
  • 13 篇 wang wei
  • 12 篇 wang hui
  • 11 篇 wang li
  • 11 篇 xin li
  • 10 篇 zhang lei
  • 10 篇 li yang
  • 10 篇 hui wang
  • 10 篇 wei liu
  • 10 篇 li ying
  • 10 篇 li jing
  • 9 篇 lei wang
  • 9 篇 qing wang
  • 9 篇 li xin
  • 9 篇 wang jing
  • 9 篇 wang jian
  • 9 篇 jie li
  • 9 篇 gang liu

语言

  • 14,465 篇 英文
  • 127 篇 中文
  • 14 篇 其他
  • 2 篇 俄文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
  • 1 篇 乌克兰文
检索条件"任意字段=2010 International Conference on Computer Application and System Modeling, ICCASM 2010"
14611 条 记 录,以下是311-320 订阅
排序:
Extended tanhq function expansion solutions to a class of the nonlinear evolution equations
Extended tanhq function expansion solutions to a class of th...
收藏 引用
2010 international conference on computer application and system modeling, iccasm 2010
作者: Xue, Haili Xiao, Yafeng Department of Computer Science and Technology North University of China Taiyuan China Department of Mathematics North University of China Taiyuan China
Extended tanhq function expansion method is proposed, and applied to construct the explicit exact solutions of a class of the nonlinear evolution equation. Many new explicit soliton solutions are obtained by this meth... 详细信息
来源: 评论
A novel single-neuron smith-predictive AGC system
A novel single-neuron smith-predictive AGC system
收藏 引用
international conference on computer application and system modeling
作者: Wu, Wen-Bo Jia, Yu-Fu Gao, Chuang School of Electronic and Information Engineering University of Science and Technology Liaoning Anshan China
Thickness accuracy is the important quality index of the hot rolling strip. Therefore, the automatic gauge control (AGC) is always the important function that the control system of hot rolling trip completes firstly. ... 详细信息
来源: 评论
Value distributions of exponential sums from perfect nonlinear functions
Value distributions of exponential sums from perfect nonline...
收藏 引用
2010 international conference on computer application and system modeling, iccasm 2010
作者: Xin, Hai Li, Chao Department of Mathematics and System Science National University of Denfense Technology Changsha China
Based on theory of quadratic forms over finite fields, the value distributions of the exponential sums are determined for all the known perfect nonlinear functions Π(x) from Fq to itself. Based on the value distribut... 详细信息
来源: 评论
The application of virtual reality technology in design Of transform substations
The application of virtual reality technology in design Of t...
收藏 引用
international conference on computer application and system modeling
作者: Li, Shaohua Zhang, Chenglei Energy and Power Engineering College Northeast Dianli University Jilin City of Jilin Province 132012 China Computer Application Professional of Northeast Dianli University Jilin City of Jilin Province 132012 China
Substation design is a more complicated issue, in order to improve the design efficiency, you can use the virtual environment technology of virtual reality, and use solidworks and other chart software to build substat... 详细信息
来源: 评论
The study of prevention and cure technology of deadlock for command system based Petri net
The study of prevention and cure technology of deadlock for ...
收藏 引用
international conference on computer application and system modeling
作者: Mu, Xiao-Dong Chang, Rui-Hua Zhang, Li Xi'an Research Institute of Hi-Tech Xi'an China
The prevention and cure of deadlock of command information system for united combat of multi-troops is the fundamental problem to ensure the safety and the reliability of system, it is also one of difficult problems t... 详细信息
来源: 评论
The realization of shopping sites based on SOA architecture
The realization of shopping sites based on SOA architecture
收藏 引用
2010 international conference on computer application and system modeling, iccasm 2010
作者: Ruan, Dongru Zhang, Bingke Yu, Hua Institute of Information Science and Engineerning Hebei University of Science and Technology Shijiazhuang Hebei Province China
As the frequent change of online shopping business, the single application program of corporate shopping site can't meet users' expanding demands, even if new user requirements are appended to the existing fra... 详细信息
来源: 评论
application of spatial database technology of GIS to morphological research on architectural heritage
Application of spatial database technology of GIS to morphol...
收藏 引用
2010 international conference on computer application and system modeling, iccasm 2010
作者: Xiaoqian, Wang Weimin, Guo Jia, Liu School of Design Jiangnan University Wuxi China
GIS (Geographic Information system) technology has a great advantage in the management and the conservation of cultural heritage. Due to the problems in the original data acquisition, management and utilization during... 详细信息
来源: 评论
Ellipse detection based on principal component analysis
Ellipse detection based on principal component analysis
收藏 引用
international conference on computer application and system modeling
作者: Han, Jiandong School of Computer and Information Technology Shan Xi University Tai yuan China
A method of ellipse detection and location based on principal components analysis is proposed. According to the fact that major axis of an ellipse is the direction of principal components, the data points are projecte... 详细信息
来源: 评论
Engineering design norms is implemented based on AutoCAD
Engineering design norms is implemented based on AutoCAD
收藏 引用
2010 international conference on computer application and system modeling, iccasm 2010
作者: Dan, Li Ping, Zheng Bao Peng, Li Resource and Civil School University of Science and Technology Anshan Liaoning China
The secondary development under the environment of AutoCAD is that the norms of the highway project as the custom menu are added into help document library of various editions AutoCAD. Then project planner can quickly... 详细信息
来源: 评论
A double-genes identity authentication scheme based on ECC
A double-genes identity authentication scheme based on ECC
收藏 引用
2010 international conference on computer application and system modeling, iccasm 2010
作者: Song, Shu-Li Yang, Shi-Ping College of Computer Science and Information Guizhou University Guiyang China Mingde College Guizhou University Guiyang China
Identity authentication is the most important line in the network security. In order to improve authentication security and efficiency, this paper combined iris recognition technology and smart card and then analyzed ... 详细信息
来源: 评论