咨询与建议

限定检索结果

文献类型

  • 2,763 篇 会议
  • 37 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,808 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,011 篇 工学
    • 1,237 篇 计算机科学与技术...
    • 876 篇 软件工程
    • 357 篇 信息与通信工程
    • 213 篇 机械工程
    • 200 篇 控制科学与工程
    • 170 篇 电子科学与技术(可...
    • 167 篇 仪器科学与技术
    • 142 篇 电气工程
    • 122 篇 环境科学与工程(可...
    • 115 篇 材料科学与工程(可...
    • 110 篇 交通运输工程
    • 104 篇 土木工程
    • 102 篇 建筑学
    • 81 篇 动力工程及工程热...
    • 80 篇 化学工程与技术
    • 78 篇 生物医学工程(可授...
    • 71 篇 生物工程
    • 62 篇 安全科学与工程
  • 695 篇 管理学
    • 476 篇 管理科学与工程(可...
    • 246 篇 工商管理
    • 159 篇 图书情报与档案管...
  • 682 篇 理学
    • 367 篇 数学
    • 123 篇 物理学
    • 90 篇 统计学(可授理学、...
    • 88 篇 系统科学
    • 86 篇 生物学
    • 69 篇 化学
  • 214 篇 经济学
    • 205 篇 应用经济学
  • 91 篇 教育学
    • 80 篇 教育学
  • 82 篇 法学
    • 64 篇 社会学
  • 72 篇 医学
  • 63 篇 农学
  • 14 篇 文学
  • 14 篇 艺术学
  • 10 篇 军事学
  • 1 篇 历史学

主题

  • 29 篇 data mining
  • 29 篇 computational mo...
  • 27 篇 educational inst...
  • 25 篇 monitoring
  • 24 篇 software
  • 23 篇 sustainable deve...
  • 23 篇 visualization
  • 22 篇 wireless sensor ...
  • 22 篇 computers
  • 18 篇 web services
  • 18 篇 ontology
  • 17 篇 computer archite...
  • 17 篇 students
  • 16 篇 databases
  • 16 篇 analytical model...
  • 16 篇 feature extracti...
  • 16 篇 network security
  • 16 篇 mathematical mod...
  • 15 篇 semantics
  • 15 篇 genetic algorith...

机构

  • 10 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 university of co...
  • 7 篇 islamic azad uni...
  • 6 篇 school of comput...
  • 6 篇 institute for nu...
  • 6 篇 hunan university...
  • 6 篇 shenzhen graduat...
  • 5 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 school of civil ...
  • 5 篇 mahan center isl...
  • 5 篇 college of compu...
  • 5 篇 school of comput...
  • 4 篇 computer enginee...
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 school of mechan...

作者

  • 21 篇 china
  • 7 篇 mohammad reza no...
  • 6 篇 hu ruimin
  • 5 篇 hamid nakhaie
  • 5 篇 rong chunming
  • 5 篇 li jun
  • 5 篇 li wei
  • 5 篇 zhang david
  • 5 篇 david zhang
  • 5 篇 zhang wei
  • 4 篇 wang jing
  • 4 篇 bo huang
  • 4 篇 park namje
  • 4 篇 xhafa fatos
  • 4 篇 li hong
  • 4 篇 liu hao
  • 4 篇 zhang yan
  • 4 篇 huang bo
  • 4 篇 yan li
  • 4 篇 debahuti mishra

语言

  • 2,794 篇 英文
  • 10 篇 中文
  • 3 篇 其他
  • 1 篇 法文
检索条件"任意字段=2011 3rd International Conference on Computer Research and Development, ICCRD 2011"
2808 条 记 录,以下是541-550 订阅
排序:
A signature matching optimization policy for anti-virus programs
A signature matching optimization policy for anti-virus prog...
收藏 引用
2011 3rd international conference on computer research and development(iccrd 2011)
作者: Bo Li Eul Gyu Im Electronics and Computer Engineering Hanyang University Electronics and Computer Engineering Hanyang University Seoul Korea
signature library is key factor for performance of anti-virus programs considering accuracy and scanning *** ensure coverage of various emerging viruses,the scale of signature library grows larger and the consequence ... 详细信息
来源: 评论
Mining Contents in Web Page Using Cosine Similarity
Mining Contents in Web Page Using Cosine Similarity
收藏 引用
2011 3rd international conference on computer research and development(iccrd 2011)
作者: Swe Swe Nyein University of Computer Studies Mandalay MandalayMyanmar
Web pages typically contain a large amount of information that is not part of the main contents of the pages, e.g.;banner ads,navigation bars,copy right and privacy notices,advertisements which are not related to the ... 详细信息
来源: 评论
Study on the capability of grain sustainable development in Henan Province
Study on the capability of grain sustainable development in ...
收藏 引用
2011 3rd international conference on computer research and development, iccrd 2011
作者: He, Chun-Hua Li, Yan-Hua Li, Bing-Jun College of Information and Management Science Henan Agricultural University Zhengzhou China
This paper analyzed the sustainable tendency of the grain production of Henan Province since reform and opening up, and then used the main composition analysis of 8 or 9 main influencing factors correspondingly to val... 详细信息
来源: 评论
The application of blind signal separation in mobile communication
The application of blind signal separation in mobile communi...
收藏 引用
IEEE international conference on computer research and development
作者: Yang, Xiaomei Computer Science and Engineering College Xinjiang University of Finance and Economics Xinjiang China
Based on the analysis and introduction of blind source separation, it analyzes the signal sorting of the maximum kurtosis natural logarithm, compares the signal model forms of the narrowband blind beam forming and ins... 详细信息
来源: 评论
Myanmar to English Verb Translation Disambiguation Approach based on Na ve Bayesian Classifier
Myanmar to English Verb Translation Disambiguation Approach ...
收藏 引用
2011 3rd international conference on computer research and development(iccrd 2011)
作者: Phyo Phyo Wai University of Computer Studies Mandalay
Natural Language processing (NLP) is a field of computer science and linguistics concerned with the interactions between computers and human (natural) *** is one of these problems which have been a great challenge for... 详细信息
来源: 评论
research on the chaotic block cipher algorithm based on ciphertext feedback using external key
Research on the chaotic block cipher algorithm based on ciph...
收藏 引用
IEEE international conference on computer research and development
作者: Chen, Jun He, Chunxiao Zhang, Wei Dean's Office Chongqing Education College Chongqing 400067 China Teaching and Research Section of Computer Chongqing Education Management School Chongqing 400066 China President Office Chongqing Education College Chongqing 400067 China
The paper Puts forward a novel feedback chaotic block cipher algorithm based on external key control. The prominent advantage of the algorithm is that the cipherkey of the system is composed of 128-bit external keys. ... 详细信息
来源: 评论
ETAO: Symbol mapping transformation method for text compression
ETAO: Symbol mapping transformation method for text compress...
收藏 引用
2011 3rd international conference on computer research and development, iccrd 2011
作者: Baloul, Fadlelmoula Mohamed Abdullah, Mohsin Hassan Babikir, Elsadig Ahmed Department of Information Technology Colleges of Applied Sciences Sohar Oman Department of Mathematics Faculty of Mathematical Sciences U. of K. Khartoum Sudan Department of Computer Sciences Faculty of Computer Sciences U.of K. Khartoum Sudan
This paper is proposing a novel idea for text transformation based on mapping single letters form the standard alphabetical order into the same set of single letters reordered by their relative frequencies. This metho... 详细信息
来源: 评论
Optimization research on evaluation index system of agricultural enterprises risk
Optimization research on evaluation index system of agricult...
收藏 引用
IEEE international conference on computer research and development
作者: Zhang, Hongxia Yang, Yinsheng Guo, Hongpeng Ministry of Education Changchun Jilin China Jilin University of Finance and Economics Changchun Jilin China
In the process of achieving enterprise value maximization, agricultural enterprises will face external and internal risks of uncertainty. The premise of risk control is to conduct a risk assessment. The key of risk as... 详细信息
来源: 评论
A routing algorithm based on energy constraint
A routing algorithm based on energy constraint
收藏 引用
IEEE international conference on computer research and development
作者: Wu, Jianjian Wu, Ronghui College of Computer Science and Communication Hunan University Changsha China
Delay Tolerant Networks (DTNs) are wireless networks in which at any given time instance, the probability of having a complete path from a source to destination is low due to the intermittent connectivity between node... 详细信息
来源: 评论
Content-based image retrieval by DTCWT feature
Content-based image retrieval by DTCWT feature
收藏 引用
IEEE international conference on computer research and development
作者: Chen, Feng Yu, Song-Nian School of Computer Engineering and Science Shanghai University Shanghai China
This paper presents an multiscale image retrieval algorithm which uses a new class of image features as the image descriptors, from the DTCWT(Dual-Tree complex wavelet transform). It uses DTCWT to detect keypoints, ma... 详细信息
来源: 评论