咨询与建议

限定检索结果

文献类型

  • 10 篇 会议
  • 5 篇 期刊文献

馆藏范围

  • 15 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 10 篇 计算机科学与技术...
    • 5 篇 软件工程
    • 2 篇 电气工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 信息与通信工程
    • 1 篇 石油与天然气工程
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学

主题

  • 15 篇 java implementat...
  • 3 篇 signatures
  • 3 篇 modules
  • 3 篇 first-class gene...
  • 3 篇 components
  • 3 篇 custom class loa...
  • 2 篇 uml
  • 2 篇 multimedia
  • 2 篇 design
  • 2 篇 apriori algorith...
  • 2 篇 language
  • 2 篇 sdl
  • 2 篇 agile design pri...
  • 1 篇 probabilistic ar...
  • 1 篇 pda
  • 1 篇 semi-automatic t...
  • 1 篇 smart grid secur...
  • 1 篇 graphical user i...
  • 1 篇 computer archite...
  • 1 篇 ns

机构

  • 2 篇 rice univ housto...
  • 1 篇 univ craiova fac...
  • 1 篇 jimei univ sch c...
  • 1 篇 fac sci monastir...
  • 1 篇 rice univ housto...
  • 1 篇 nanjing city voc...
  • 1 篇 mytsystem seoul ...
  • 1 篇 xiamen univ dept...
  • 1 篇 beihang univ peo...
  • 1 篇 univ nancy 1 cnr...
  • 1 篇 xerox corp webst...
  • 1 篇 purdue univ sch ...
  • 1 篇 lockheed missile...
  • 1 篇 univ nancy 1 ctr...
  • 1 篇 fac sci monastir...
  • 1 篇 sungkyunkwan uni...
  • 1 篇 jiangxi univ fin...
  • 1 篇 puroom seoul 061...
  • 1 篇 xinjiang normal ...
  • 1 篇 catholic univ pu...

作者

  • 3 篇 cartwright rober...
  • 3 篇 sasitorn james
  • 2 篇 divoux t
  • 2 篇 soudani a
  • 2 篇 nasri s
  • 1 篇 hansen t
  • 1 篇 fan zhigang
  • 1 篇 eschbach reiner
  • 1 篇 helali a
  • 1 篇 li yong
  • 1 篇 allebach jan p.
  • 1 篇 kim seong-kyu
  • 1 篇 guo donghui
  • 1 篇 wu qi
  • 1 篇 chan m
  • 1 篇 bala raja
  • 1 篇 chen fangwei
  • 1 篇 gorunescu florin
  • 1 篇 peng jiezhao
  • 1 篇 bouman charles a...

语言

  • 14 篇 英文
  • 1 篇 其他
检索条件"主题词=Java implementation"
15 条 记 录,以下是1-10 订阅
排序:
java implementation of Teacher Information Ability Measurement and Analysis Intelligent System (AMAIS) Based on ICT-TPACK and Recurrent Neural Network  5
Java Implementation of Teacher Information Ability Measureme...
收藏 引用
5th International Conference on Inventive Computation Technologies (ICICT)
作者: Fu, Kuiliang Nanjing City Vocat Coll Nanjing 211200 Jiangsu Peoples R China
This study discusses about the implementation of java in the process of teacher information ability measurement and analysis based on ICT-TPACK and recurrent neural network. From the research study it is evident that ... 详细信息
来源: 评论
The java implementation of Apriori algorithm Based on Agile Design Principles
The Java Implementation of Apriori algorithm Based on Agile ...
收藏 引用
3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT)
作者: Li, Yong Xinjiang Normal Univ Coll Comp Sci & Technol Urumqi Peoples R China
Association rules model is widely used in data mining and the apriori is the most famous association rule mining algorithm. Based on the classic Apriori association rules algorithm, this paper gives the UML class desi... 详细信息
来源: 评论
A java implementation of the probabilistic argumentation system for data fusion in missile defense applications
A Java implementation of the probabilistic argumentation sys...
收藏 引用
Conference on Multisensor, Multisource Information Fusion
作者: Chan, M Hansen, T Monney, PA Baker, T Lockheed Missiles & Space Co Inc Sunnyvale CA 94089 USA
In missile defense target recognition applications, knowledge about the problem may be imperfect, imprecise, and incomplete. Consequently, complete probabilistic models are not available. In order to obtain robust inf... 详细信息
来源: 评论
The java implementation of Apriori algorithm Based on Agile Design Principles
The Java Implementation of Apriori algorithm Based on Agile ...
收藏 引用
2010 3rd IEEE International Conference on Computer Science and Information Technology—ICCSIT 2010
作者: Yong Li College of Computer Science and Technology Xinjiang Normal University, Urumqi, China
Association rules model is widely used in data mining and the apriori is the most famous association rule mining algorithm. Based on the classic Apriori association rules algorithm, this paper gives the UML class desi... 详细信息
来源: 评论
Research and implementation of RSA Algorithm in java
Research and Implementation of RSA Algorithm in Java
收藏 引用
2nd International Conference on Management of e-Commerce and e-Government
作者: Peng, Jiezhao Wu, Qi Jiangxi Univ Finance & Econ Nanchang 330013 Jiangxi Peoples R China
This paper briefly introduces the concept of RSA algorithm, and presents the flaws of other existing implementations of RSA Algorithm in java, thereby designs our improved implementation and analyzes the performance o... 详细信息
来源: 评论
QoS and network resources management for communication in distributed manufacturing processes
收藏 引用
COMPUTERS IN INDUSTRY 2002年 第3期48卷 253-267页
作者: Soudani, A Nasri, S Divoux, T Fac Sci Monastir Lab Elect & Microelect Monastir Tunisia Univ Nancy 1 Ctr Rech Automat Nancy CNRS UMR 7039 F-54013 Nancy France
In this paper, we present a multimedia communication model based on the virtual manufacturing device (VMD) concept that has been defined in the international manufacturing message specification (MMS). This model calle... 详细信息
来源: 评论
A hybrid neural network/genetic algorithm applied to breast cancer detection and recurrence
收藏 引用
EXPERT SYSTEMS 2013年 第3期30卷 243-254页
作者: Belciug, Smaranda Gorunescu, Florin Univ Craiova Fac Math & Comp Sci Dept Comp Sci Craiova 200585 Romania Univ Med & Pharm Craiova Dept Math Biostat & Comp Sci Craiova 200349 Romania
Genetic algorithms (GAs) and neural networks (NNs) are both inspired by computation in biological systems and many attempts have been made to combine the two methodologies to boost the NNs performance. This paper deal... 详细信息
来源: 评论
An approach for end-to-end QoS and network resources management
收藏 引用
COMPUTER STANDARDS & INTERFACES 2005年 第1期28卷 93-108页
作者: Helali, A Soudani, A Nasri, S Divoux, T Fac Sci Monastir EuE Lab Elect & Micorelect Monastir Tunisia Univ Nancy 1 CNRS UMR 7039 Ctr Rech Automat Nancy Nancy France
In this paper, we address the problem of the end-to-end QoS management for multimedia and real-time applications. We would focus on the presentation of a multi-profile communication environment and its reliability in ... 详细信息
来源: 评论
AES algorithm implemented for PDA secure communication with java
AES algorithm implemented for PDA secure communication with ...
收藏 引用
International Workshop on Anti-counterfeiting, Security, and Identification
作者: Liu Niansheng Guo Donghui Huang Jiaxiang Jimei Univ Sch Comp Engn Xiamen 361021 Peoples R China Xiamen Univ Dept Elect Engn Xiamen 361005 Peoples R China
Since Rijndael algorithm was selected as the AES (Advanced Encryption System) to substitute the DES (Data Encryption Standard), the foremost concern for people has been its security. The result of new attack methods s... 详细信息
来源: 评论
An improved mapping method for automated consistency check between software architecture and source code  20
An improved mapping method for automated consistency check b...
收藏 引用
20th IEEE International Conference on Software Quality, Reliability, and Security (QRS)
作者: Chen, Fangwei Zhang, Li Lian, Xiaoli Beihang Univ Beijing Peoples R China
In daily software development, inconsistencies between architecture and code inevitably occur with the continuous contribution, even under model-driven development which can trace between design and code. Many methods... 详细信息
来源: 评论