咨询与建议

限定检索结果

文献类型

  • 2,763 篇 会议
  • 37 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,808 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,011 篇 工学
    • 1,237 篇 计算机科学与技术...
    • 876 篇 软件工程
    • 357 篇 信息与通信工程
    • 213 篇 机械工程
    • 200 篇 控制科学与工程
    • 170 篇 电子科学与技术(可...
    • 167 篇 仪器科学与技术
    • 142 篇 电气工程
    • 122 篇 环境科学与工程(可...
    • 115 篇 材料科学与工程(可...
    • 110 篇 交通运输工程
    • 104 篇 土木工程
    • 102 篇 建筑学
    • 81 篇 动力工程及工程热...
    • 80 篇 化学工程与技术
    • 78 篇 生物医学工程(可授...
    • 71 篇 生物工程
    • 62 篇 安全科学与工程
  • 695 篇 管理学
    • 476 篇 管理科学与工程(可...
    • 246 篇 工商管理
    • 159 篇 图书情报与档案管...
  • 682 篇 理学
    • 367 篇 数学
    • 123 篇 物理学
    • 90 篇 统计学(可授理学、...
    • 88 篇 系统科学
    • 86 篇 生物学
    • 69 篇 化学
  • 214 篇 经济学
    • 205 篇 应用经济学
  • 91 篇 教育学
    • 80 篇 教育学
  • 82 篇 法学
    • 64 篇 社会学
  • 72 篇 医学
  • 63 篇 农学
  • 14 篇 文学
  • 14 篇 艺术学
  • 10 篇 军事学
  • 1 篇 历史学

主题

  • 29 篇 data mining
  • 29 篇 computational mo...
  • 27 篇 educational inst...
  • 25 篇 monitoring
  • 24 篇 software
  • 23 篇 sustainable deve...
  • 23 篇 visualization
  • 22 篇 wireless sensor ...
  • 22 篇 computers
  • 18 篇 web services
  • 18 篇 ontology
  • 17 篇 computer archite...
  • 17 篇 students
  • 16 篇 databases
  • 16 篇 analytical model...
  • 16 篇 feature extracti...
  • 16 篇 network security
  • 16 篇 mathematical mod...
  • 15 篇 semantics
  • 15 篇 genetic algorith...

机构

  • 10 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 university of co...
  • 7 篇 islamic azad uni...
  • 6 篇 school of comput...
  • 6 篇 institute for nu...
  • 6 篇 hunan university...
  • 6 篇 shenzhen graduat...
  • 5 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 school of civil ...
  • 5 篇 mahan center isl...
  • 5 篇 college of compu...
  • 5 篇 school of comput...
  • 4 篇 computer enginee...
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 school of mechan...

作者

  • 21 篇 china
  • 7 篇 mohammad reza no...
  • 6 篇 hu ruimin
  • 5 篇 hamid nakhaie
  • 5 篇 rong chunming
  • 5 篇 li jun
  • 5 篇 li wei
  • 5 篇 zhang david
  • 5 篇 david zhang
  • 5 篇 zhang wei
  • 4 篇 wang jing
  • 4 篇 bo huang
  • 4 篇 park namje
  • 4 篇 xhafa fatos
  • 4 篇 li hong
  • 4 篇 liu hao
  • 4 篇 zhang yan
  • 4 篇 huang bo
  • 4 篇 yan li
  • 4 篇 debahuti mishra

语言

  • 2,794 篇 英文
  • 10 篇 中文
  • 3 篇 其他
  • 1 篇 法文
检索条件"任意字段=2011 3rd International Conference on Computer Research and Development, ICCRD 2011"
2808 条 记 录,以下是571-580 订阅
排序:
Digital Learning Environments to Support Teachers' Learning Community Based on the Application of Digital Learning Harbor
Digital Learning Environments to Support Teachers' Learning ...
收藏 引用
2011 3rd international conference on computer research and development(iccrd 2011)
作者: Changsheng Chen Jingyun Long National Engineering Research Center for E-learning HuaZhong Normal University School of Public Managment NorthWest University
The development of modern information technology has promoted the construction of digital learning environment which represented as digital learning harbor, in this situation, teachers' learning community became a... 详细信息
来源: 评论
Unsupervised foreground-background segmentation using growing self organizing map in noisy backgrounds
Unsupervised foreground-background segmentation using growin...
收藏 引用
2011 3rd international conference on computer research and development, iccrd 2011
作者: Ghasemi, Afsane Safabakhsh, Reza Department of Computer Engineering Amirkabir University of Technology Tehran Iran
Segmentation of moving objects in an image sequence is one of the most fundamental and crucial steps in visual surveillance applications. This paper proposes a novel and efficient method for detecting moving objects i... 详细信息
来源: 评论
Fast 3D point cloud ear identification by slice curve matching
Fast 3D point cloud ear identification by slice curve matchi...
收藏 引用
2011 3rd international conference on computer research and development, iccrd 2011
作者: Liu, Heng Zhang, David School of Information Engineering Southwest University of Science and Technology Mianyang China Biometrics Research Centre Hong Kong Polytechnic University Hong Kong Hong Kong
Current 3D ear identification methods require capturing ear range image data to work. In this work, based on slice curve matching, a new 3D point cloud ear identification approach is presented. Aiming to acquire 3D po... 详细信息
来源: 评论
An approach for cloud resource scheduling based on parallel genetic algorithm
An approach for cloud resource scheduling based on parallel ...
收藏 引用
IEEE international conference on computer research and development
作者: Zheng, Zhongni Wang, Rui Zhong, Hai Zhang, Xuejie Department of Computer Science and Engineering Yunnan University Kunming 650091 China
Resource scheduling is a key process for clouds such as Infrastructure as a Service cloud. To make the most efficient use of the resources, we propose an optimized scheduling algorithm to achieve the optimization or s... 详细信息
来源: 评论
research on information technology teaching material's inadaptability in primary and middle schools in Less-developed areas
Research on information technology teaching material's inada...
收藏 引用
IEEE international conference on computer research and development
作者: Hu, Jinyan Liu, Zhongxia Jiang, Jiping Zhang, Sujun College of Information Engineering Henan Institute of Science and Technology Xinxiang Henan 453003 China Department of Education Technology College of Pingdingshan Pingdingshan Henan 467000 China College of Mechanical and Electronical Engineering Henan Institute of Science and Technology Xinxiang Henan 453003 China
Information technology course features decide that its construction and implementation have strong dependence on facilities and equipments. In China, the development of material and technical conditions is uneven;this... 详细信息
来源: 评论
Implementation and Analysis of Three Steganographic Approaches
Implementation and Analysis of Three Steganographic Approach...
收藏 引用
2011 3rd international conference on computer research and development(iccrd 2011)
作者: Wai Wai Zin Than Naing Soe University of Computer Studies Mandalay MandalayMyanmar
Due to increasing the technologies security systems are very popular in many *** security of information can be achieved by using encryption and *** cryptography,encrypted data is transmitted after transforming the ot... 详细信息
来源: 评论
Sound energy control of semi-active piezoelectric composite level-based system
Sound energy control of semi-active piezoelectric composite ...
收藏 引用
IEEE international conference on computer research and development
作者: Wang, Yuming He, Yuanan National Laboratory of Underwater Acoustic Technique Harbin Engineering University Harbin China Systems Engineering Research Institute Beijing China
This paper mainly talks about the physical model of rubber/PVDF semi-active piezoelectric composite level-based system, and the calculation method of sound energy loss of the system is studied too. The principle of im... 详细信息
来源: 评论
4UMS cassava harvester type of simulation analysis and structural optimization
4UMS cassava harvester type of simulation analysis and struc...
收藏 引用
2011 3rd international conference on computer research and development, iccrd 2011
作者: Zhang, Yuan Cui, Zhende Huang, Hui Li, Ming Agri-Machinery Research Institute Chinese Academy of Tropical Agricultural Sciences Zhanjiang China
The first few batches of cassava harvester embedded depth is not deep enough or too deep, the rate of pick up is not efficient and not efficient cassava into the soil of time differences, and for different levels of t... 详细信息
来源: 评论
The research on the three-layer-mining of data packet
The research on the three-layer-mining of data packet
收藏 引用
2011 3rd international conference on computer research and development, iccrd 2011
作者: Yang, Guohai Tan, Shunhua Chen, Miao Wang, Yizhi National School of Defense Technology Southwest University of Science and Technology Mianyang China School of Information Engineering Southwest University of Science and Technology Mianyang China
With the growing and improving network services, diverse interests of users have been satisfied, and the same resources have been visited repeatedly becomes a common phenomenon. Thus, in the process of data transmissi... 详细信息
来源: 评论
Extracting windows registry information from physical memory
Extracting windows registry information from physical memory
收藏 引用
IEEE international conference on computer research and development
作者: Zhang, Shuhui Wang, Lianhai Zhang, Lei Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center 19 Keyuan Road Jinan Shandong 250014 China
Windows registry from physical memory contains lots of important information that are of potential evidential value in forensic analysis. In this paper, a method of extracting windows registry information from physica... 详细信息
来源: 评论