咨询与建议

限定检索结果

文献类型

  • 1,144 篇 会议
  • 928 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 2,091 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,218 篇 工学
    • 852 篇 计算机科学与技术...
    • 698 篇 软件工程
    • 177 篇 信息与通信工程
    • 161 篇 控制科学与工程
    • 112 篇 生物医学工程(可授...
    • 109 篇 生物工程
    • 89 篇 电气工程
    • 76 篇 电子科学与技术(可...
    • 70 篇 机械工程
    • 54 篇 光学工程
    • 54 篇 化学工程与技术
    • 49 篇 材料科学与工程(可...
    • 40 篇 土木工程
  • 774 篇 理学
    • 464 篇 数学
    • 159 篇 物理学
    • 144 篇 生物学
    • 126 篇 统计学(可授理学、...
    • 88 篇 系统科学
    • 59 篇 化学
  • 390 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 160 篇 图书情报与档案管...
    • 121 篇 工商管理
  • 197 篇 教育学
    • 195 篇 教育学
    • 39 篇 心理学(可授教育学...
  • 144 篇 医学
    • 106 篇 临床医学
    • 90 篇 基础医学(可授医学...
    • 49 篇 公共卫生与预防医...
    • 49 篇 药学(可授医学、理...
  • 56 篇 法学
    • 51 篇 社会学
  • 45 篇 经济学
    • 44 篇 应用经济学
  • 29 篇 农学
  • 11 篇 文学
  • 9 篇 军事学
  • 3 篇 艺术学

主题

  • 60 篇 students
  • 58 篇 computer science
  • 47 篇 machine learning
  • 45 篇 education
  • 33 篇 training
  • 26 篇 deep learning
  • 26 篇 computational mo...
  • 25 篇 engineering educ...
  • 24 篇 data mining
  • 24 篇 artificial intel...
  • 22 篇 support vector m...
  • 22 篇 feature extracti...
  • 19 篇 semantics
  • 17 篇 visualization
  • 16 篇 xml
  • 16 篇 neural networks
  • 16 篇 databases
  • 16 篇 mathematics
  • 15 篇 predictive model...
  • 15 篇 decision making

机构

  • 45 篇 beijing key labo...
  • 44 篇 gaoling school o...
  • 44 篇 school of comput...
  • 40 篇 school of comput...
  • 35 篇 key laboratory o...
  • 24 篇 key laboratory o...
  • 13 篇 school of scienc...
  • 13 篇 department of la...
  • 11 篇 department of co...
  • 11 篇 department of co...
  • 11 篇 engineering labo...
  • 10 篇 tsinghua univers...
  • 10 篇 school of inform...
  • 9 篇 key laboratory o...
  • 9 篇 department of so...
  • 9 篇 department of ma...
  • 9 篇 department of au...
  • 8 篇 faculty of physi...
  • 8 篇 institute for fo...
  • 8 篇 pedagogical univ...

作者

  • 21 篇 wu xiaojun
  • 20 篇 wen ji-rong
  • 15 篇 li peng
  • 15 篇 yan ping
  • 14 篇 lv teng
  • 14 篇 xiaojun wu
  • 12 篇 dulski k.
  • 12 篇 kubicz e.
  • 12 篇 kozik t.
  • 12 篇 korcyl g.
  • 12 篇 badriyya b.al-on...
  • 12 篇 marek r. ogiela
  • 11 篇 skurzok m.
  • 11 篇 moskal p.
  • 11 篇 silarski m.
  • 10 篇 zhang yumei
  • 10 篇 tomasz hachaj
  • 10 篇 zhang lichen
  • 10 篇 teng lv
  • 10 篇 shopa r.y.

语言

  • 1,917 篇 英文
  • 145 篇 其他
  • 28 篇 中文
  • 3 篇 德文
  • 1 篇 俄文
检索条件"机构=Computer Science and Methods of Teaching Computer Science"
2091 条 记 录,以下是1691-1700 订阅
Adaptive Control of a Class of Novel Hyperchaotic Systems with Fully Unknown Parameters
Adaptive Control of a Class of Novel Hyperchaotic Systems wi...
收藏 引用
The 2nd IEEE International Conference on Advanced computer Control(第二届先进计算机控制国际会议 ICACC 2010)
作者: Yan Zhao Xichang Han Lihua Miao Qiuye Sun Department of Automatic Control Engineering Shenyang Institute of Engineering Shenyang China Fundamental Teaching Department of Computer Mathematics and Physics Shenyang Medical College Sheny College of Information Science and Engineering Northeastern University Shenyang China
In this paper, the stabilization problems of a class of new hyperchaotic systems with fully unknown parameters are concerned. Based on the adaptive control idea, two novel adaptive state feedback controllers are desig... 详细信息
来源: 评论
Adaptive Generalized Synchronization of Two Nonidentical Hyperchaotic Systems with Unknown Parameters
Adaptive Generalized Synchronization of Two Nonidentical Hyp...
收藏 引用
The 2nd IEEE International Conference on Advanced computer Control(第二届先进计算机控制国际会议 ICACC 2010)
作者: Yan Zhao Tieyan Zhang Lihua Miao Qiuye Sun Department of Automatic Control Engineering Shenyang Institute of Engineering Shenyang China Fundamental Teaching Department of Computer Mathematics and Physics Shenyang Medical College Sheny College of Information Science and Engineering Northeastern University Shenyang China
This paper considers the generalized synchronization problems of two different hyperchaotic systems with unknown parameters. By denoting the synchronization error signals as the difference between the state variables ... 详细信息
来源: 评论
Compose & conquer: modularity for end-users
Compose & conquer: modularity for end-users
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Macneil Shonle Timothy T. Yuen Computer Science College of Sciences University of Texas at San Antonio San Antonio TX USA Interdisciplinary Learning and Teaching College of Education and Human Development University of Texas at San Antonio San Antonio TX USA
Users have vast amounts of information at their disposal and access to many tools that can compute on that data. Often, no particular program can fulfill a user's needs; or, when such a program exists, it may be t... 详细信息
来源: 评论
Scalable Intrusion Detection with Recurrent Neural Networks
Scalable Intrusion Detection with Recurrent Neural Networks
收藏 引用
International Conference on Information Technology: New Generations (ITNG)
作者: Longy O. Anyanwu Jared Keengwe Gladys A. Arome Department of Math and Computer Science Fort Hays State University Kansa USA Department of Teaching and Learning University of North Dakota ND USA College of Education Ldrshp & Tech Valdosta State University GA USA
The ever-growing use of the Internet comes with a surging escalation of communication and data access. Most existing intrusion detection systems have assumed the one-size-fits-all solution model. Such IDS is not as ec... 详细信息
来源: 评论
Key Issues Concerning the Simultaneous Development of Technical and Linguistic Competences in a Single E-module
Key Issues Concerning the Simultaneous Development of Techni...
收藏 引用
International Conference on Developments in eSystems Engineering (DESE)
作者: Matka Zoric Venuti Tatjana Welzer Anthony E. Ward Centre of E-learning and Lifelong Learning University of Maribor Maribor Slovenia Faculty of Electrical Engineering and Computer Science University of Maribor Maribor Slovenia Centre of Excellence in Teaching and Learning in Enterprise University of York Heslington UK
Due to global communication systems, the borders are no longer important, and knowledge can be spread over continents, countries, cultures and languages. Sharing knowledge with people all over the world is one of the ... 详细信息
来源: 评论
Asymptotic suppression of a class of discrete-time hyperchaotic systems based on fuzzy control method
Asymptotic suppression of a class of discrete-time hyperchao...
收藏 引用
Chinese Control Conference (CCC)
作者: Zhidan Wu Ying Pan Wei Deng Fusheng Song Fundamental Teaching Department of Computer & Mathematics Shenyang Normal University Shenyang P. R. China School of Mathematics & Computer Science Harbin University Harbin P. R. China Department of Automatic Control Engineering Shenyang Institute of Engineering Shenyang P. R. China
The chaotic suppression problem for a class of typical discrete-time hyperchaotic systems is investigated in this paper. A T-S fuzzy model-based control method is employed to eliminate hyperchaos in the considered dis... 详细信息
来源: 评论
A survey of modelling uncertain data
A survey of modelling uncertain data
收藏 引用
International Conference on computer science and Information Technology (CSIT)
作者: Teng Lv Weimin He Ping Yan Teaching and Research Section of Computer Artillery Academy of PLA Hefei China Department of Computing and New Media Technologies University of Wisconsin Stevens Stevens Point WI USA School of Science Anhui Agricultural University Hefei China
Uncertainty in data is caused by various reasons such as data generated and transmitted in sensor networks, data mapping in uncertain data integrating environments, and data in some specific applications considering p... 详细信息
来源: 评论
Dynamically self-adapting and growing intrusion detection system
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous Engineering 2010年 第3期5卷 15-22页
作者: Anyanwu, Longy O. Keengwe, Jared Arome, Gladys A. Dept. of Math and Computer Science Fort Hays State University KS United States Dept. of Teaching and Learning University of North Dakota ND United States College of Educ. Ldrshp and Tech Valdosta State University GA United States
The ever-growing use of the Internet comes with a surging escalation of communication and data access. Most existing intrusion detection systems have assumed the one-size-fits-all solution model. Such IDS is not as ec... 详细信息
来源: 评论
Link spam detection based on genetic programming
Link spam detection based on genetic programming
收藏 引用
International Conference on Natural Computation (ICNC)
作者: Xiaofei Niu Shengen Li Ning Yuan Xuedong Niu Cuiling Zhu School of Computer Science & Technology Shandong Jianzhu University Jinan Shandong China Teaching Affairs Department Shandong University of Technology Zibo Shandong China School of Information Science and Engineering University of Ji''nan Jinan Shandong China School of Information Management Shandong Economics University Jinan Shandong China
Link spam refers to unfairly gaining a high ranking on search engines for a web page by means of trickily manipulating the link graph to confuse the hyper-link structure analysis algorithms. It seriously affects the q... 详细信息
来源: 评论
Sensitivity Analysis in Stochastic Second Order Cone Programming for Mobile Ad Hoc Networks
收藏 引用
Procedia - Social and Behavioral sciences 2010年 第6期2卷 7704-7705页
作者: Francesca Maggioni Stein W. Wallace Marida Bertocchi Elisabetta Allevi Departement of .Mathematics Statistics Computer Science and Applications University of. Bergamo Via dei Caniana n. 2 24127 Bergamo Ialy Department of Management Science Lancaster University Management School Lancaster LA1 4YX United Kingdom Department of Quantitative Methods. University of Brescia. Contrada S. Chiara 50 25122 Brescia Italy
In this paper sensitivity analysis is adopted in order to understand the randomness of a stochastic second order cone program for mobile ad hoc networks [3]. The algorithm looks for a destination node and sets up a ro... 详细信息
来源: 评论