咨询与建议

限定检索结果

文献类型

  • 810 篇 会议
  • 1 册 图书
  • 1 篇 期刊文献

馆藏范围

  • 812 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 715 篇 工学
    • 452 篇 计算机科学与技术...
    • 295 篇 软件工程
    • 146 篇 机械工程
    • 121 篇 控制科学与工程
    • 116 篇 电气工程
    • 100 篇 信息与通信工程
    • 84 篇 材料科学与工程(可...
    • 74 篇 仪器科学与技术
    • 50 篇 电子科学与技术(可...
    • 45 篇 土木工程
    • 31 篇 动力工程及工程热...
    • 30 篇 建筑学
    • 30 篇 安全科学与工程
    • 29 篇 环境科学与工程(可...
    • 26 篇 冶金工程
    • 24 篇 化学工程与技术
    • 21 篇 航空宇航科学与技...
    • 20 篇 力学(可授工学、理...
    • 20 篇 生物医学工程(可授...
    • 19 篇 生物工程
  • 219 篇 理学
    • 117 篇 数学
    • 48 篇 物理学
    • 43 篇 系统科学
    • 27 篇 统计学(可授理学、...
    • 19 篇 化学
  • 135 篇 管理学
    • 102 篇 管理科学与工程(可...
    • 43 篇 工商管理
    • 43 篇 图书情报与档案管...
  • 19 篇 农学
  • 14 篇 医学
  • 13 篇 经济学
  • 12 篇 教育学
  • 11 篇 法学
  • 7 篇 艺术学
  • 6 篇 军事学

主题

  • 17 篇 computational mo...
  • 13 篇 analytical model...
  • 12 篇 biological syste...
  • 11 篇 modeling
  • 10 篇 computer aided d...
  • 9 篇 educational inst...
  • 8 篇 monitoring
  • 8 篇 wireless sensor ...
  • 7 篇 simulation
  • 7 篇 cloud computing
  • 6 篇 data mining
  • 6 篇 data acquisition
  • 6 篇 application
  • 6 篇 web services
  • 6 篇 solid modeling
  • 5 篇 internet of thin...
  • 5 篇 information syst...
  • 5 篇 plc
  • 5 篇 xml
  • 5 篇 real time system...

机构

  • 10 篇 chongqing normal...
  • 8 篇 college of compu...
  • 6 篇 college of physi...
  • 5 篇 chongqing instit...
  • 5 篇 college of compu...
  • 4 篇 school of softwa...
  • 4 篇 chongqing water ...
  • 4 篇 school of mathem...
  • 4 篇 school of inform...
  • 4 篇 school of mathem...
  • 4 篇 school of comput...
  • 3 篇 school of comput...
  • 3 篇 school of inform...
  • 3 篇 college of elect...
  • 3 篇 college of naval...
  • 3 篇 chongqing instit...
  • 3 篇 department of co...
  • 3 篇 college of compu...
  • 3 篇 department of co...
  • 3 篇 school of mechan...

作者

  • 6 篇 song li
  • 5 篇 ming li
  • 5 篇 ma yan
  • 5 篇 he guotian
  • 4 篇 yan ma
  • 4 篇 li song
  • 4 篇 li ming
  • 4 篇 ran yingchun
  • 4 篇 guotian he
  • 4 篇 wang gang
  • 3 篇 wang lei
  • 3 篇 wang jian
  • 3 篇 yingchun ran
  • 3 篇 xiang li
  • 3 篇 zhang kun
  • 3 篇 liu fuyan
  • 3 篇 wang song
  • 3 篇 wang lu
  • 3 篇 liu gang
  • 3 篇 zhang weimin

语言

  • 788 篇 英文
  • 23 篇 中文
  • 1 篇 俄文
检索条件"任意字段=2012 2nd International Conference on Computer Application and System Modeling, ICCASM 2012"
812 条 记 录,以下是151-160 订阅
排序:
The research and implementation of anti-theft monitoring alarm system based on MTK
The research and implementation of anti-theft monitoring ala...
收藏 引用
2012 2nd international conference on computer application and system modeling, iccasm 2012
作者: Luo, Mingzhang Wang, Junmin Zhang, Mingyun Wang, Hongli Key Laboratory of Exploration Technologies for Oil and Gas Resources Ministry of Education Yangtze University Jingzhou China Yangtze University Jingzhou China SJS Ltd. Jingzhou China
As a cost-effective mobile development platform, MTK support the functions of recording video and sending multimedia message. In this paper, an anti-theft monitoring alarm system based on MTK is proposed and implement... 详细信息
来源: 评论
Locality preserving fisher discriminant analysis with clustering
Locality preserving fisher discriminant analysis with cluste...
收藏 引用
2012 2nd international conference on computer application and system modeling, iccasm 2012
作者: Zou, Lishan Wang, Yuechao Chen, Zhenzhou Wu, Xiaorong College of Information and Automobile Engineering Guangzhou City Polytechnic Guangzhou 510405 China Computer School South China Normal University Guangzhou 510631 China School of CISCO Informatics China Guangdong University of Foreign Studies Guangzhou 510420 China
Fisher discriminant analysis (FDA) is an important feature extraction method for many classifiers. However, it tends to give undesired results if samples in some classes form several separate clusters, i.e., multimoda... 详细信息
来源: 评论
Process analysis of buffer overflow based on dynamic binary platform
Process analysis of buffer overflow based on dynamic binary ...
收藏 引用
2012 2nd international conference on computer application and system modeling, iccasm 2012
作者: Fei, Kang Pengcheng, Dong Hui, Shu Jing, Sun China National Digital Switching System Engineering and Technological Research Center Zhengzhou 450002 China
Based on dynamic binary platform, an analysis method for buffer overflow is described in detail and a prototype system is implemented. Overflow detection based on exception capture, control flow analysis, and memory s... 详细信息
来源: 评论
A real-time detection method of Ldos based on shewhart control chart detection theory
A real-time detection method of Ldos based on shewhart contr...
收藏 引用
2012 2nd international conference on computer application and system modeling, iccasm 2012
作者: Chen, Kai Liu, Huiyu Chen, Xiaosu School of Computer Sci. and Tech. Huazhong Univ. of Sci. and Tech. Wuhan China
The low-rate denial of service (LDoS) attack is a new threat to Internet security. Due to its low rate and high concealment characteristics, LDoS attack is difficult to be detected through the analysis of attack flow ... 详细信息
来源: 评论
A novel channel sensing method for IEEE802.11n mimo system
A novel channel sensing method for IEEE802.11n mimo system
收藏 引用
2012 2nd international conference on computer application and system modeling, iccasm 2012
作者: Yao, Xiaocheng Fang, Zhi Jian, Haifang Shi, Yin Institute of Semiconductors Chinese Academy of Science Beijing China Department of Electronic Engineering Tsinghua University China
Coexistence and interoperability between 20MHz and 40MHz device and modes of operation are addressed in standard IEEE802.11n system. It is mandate to give the channel state in receiving processing, since for 40MHz dev... 详细信息
来源: 评论
Solutions sharing in multi-agent system
Solutions sharing in multi-agent system
收藏 引用
2012 2nd international conference on computer application and system modeling, iccasm 2012
作者: Deng, Hanbing Zhang, Xia Liu, Jiren Zhang, Qian College of Information Science and Engineering Northeastern University Shenyang China State Key Laboratory of Software Architecture Neusoft Incorporated Company Shenyang China
In this paper, we will do some researches on the relationship between action sequence and system efficiency in multi-agent system. Usually, when an agent gets a task, it will calculate all the feasible action sequence... 详细信息
来源: 评论
K-coverage algorithm based on target association in wireless sensor network
K-coverage algorithm based on target association in wireless...
收藏 引用
2012 2nd international conference on computer application and system modeling, iccasm 2012
作者: Sun, Zeyu Li, Chuanfeng Department of Computer and Information Engineering Luoyang Institute of Science and Technology Luoyang 471023 China
During the process of carrying out K coverage algorithm of WSN to the target area, there are some shortcomings, such as many redundancy nodes will emerge, the process consumes a lot of node energy in the network at th... 详细信息
来源: 评论
Software and hardware implementation of IIR based on matlab&acceldsp
Software and hardware implementation of IIR based on matlab&...
收藏 引用
2012 2nd international conference on computer application and system modeling, iccasm 2012
作者: Chen, Hongyan Wang, Lisheng Department of Computer Science and Technology Tongji University Shanghai China
Since the IIR design is very difficult and timeconsuming by using the hardware description language directly, this paper presents a simpler and more efficient method for IIR digital filter design. This design is based... 详细信息
来源: 评论
Digital 3D modeling of vestment based on project-camera system
Digital 3D modeling of vestment based on project-camera syst...
收藏 引用
2012 2nd international conference on computer application and system modeling, iccasm 2012
作者: Tao, Jun School of Mathematics and Computer Science Jianghan University Wuhan Hubei 430056 China
With the coming of information age and the development of computer science, digitalization of whole vestment is becoming more and more important. The surface of whole vestment is sequent and glossy so that it is lack ... 详细信息
来源: 评论
The application of HHT method used in the anchor bolt testing signal
The application of HHT method used in the anchor bolt testin...
收藏 引用
2012 2nd international conference on computer application and system modeling, iccasm 2012
作者: Wang, Linsong Wang, Junmin Luo, Mingzhang Chen, Chao Wang, Qiuge Wang, Kun Institute of Geophysics and Geomatics China University of Geosciences Wuhan 430074 China Yangtze University Jingzhou China Faculty of Engineering China University of Geosciences Wuhan China
When varying degrees defects existing in the anchorage system, energy decreasing and frequency mutation can be caused during the acoustic waves propagation. We can get the instantaneous frequency of the signal by proc... 详细信息
来源: 评论