咨询与建议

限定检索结果

文献类型

  • 705 篇 期刊文献
  • 670 篇 会议
  • 14 册 图书

馆藏范围

  • 1,389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 777 篇 工学
    • 520 篇 计算机科学与技术...
    • 439 篇 软件工程
    • 109 篇 控制科学与工程
    • 93 篇 信息与通信工程
    • 88 篇 生物医学工程(可授...
    • 77 篇 生物工程
    • 55 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 45 篇 机械工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 35 篇 光学工程
    • 28 篇 土木工程
  • 533 篇 理学
    • 306 篇 数学
    • 110 篇 生物学
    • 109 篇 物理学
    • 81 篇 统计学(可授理学、...
    • 63 篇 系统科学
    • 45 篇 化学
  • 249 篇 管理学
    • 160 篇 管理科学与工程(可...
    • 97 篇 工商管理
    • 91 篇 图书情报与档案管...
  • 138 篇 教育学
    • 136 篇 教育学
    • 28 篇 心理学(可授教育学...
  • 124 篇 医学
    • 89 篇 临床医学
    • 79 篇 基础医学(可授医学...
    • 43 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 37 篇 法学
    • 34 篇 社会学
  • 33 篇 经济学
    • 32 篇 应用经济学
  • 23 篇 农学
  • 9 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 36 篇 students
  • 33 篇 computer science
  • 33 篇 machine learning
  • 23 篇 education
  • 20 篇 engineering educ...
  • 18 篇 artificial intel...
  • 17 篇 deep learning
  • 16 篇 training
  • 14 篇 computational mo...
  • 12 篇 semantics
  • 12 篇 decision making
  • 11 篇 covid-19
  • 11 篇 accuracy
  • 10 篇 software enginee...
  • 10 篇 neural networks
  • 10 篇 data mining
  • 10 篇 diffusion
  • 10 篇 mathematics
  • 10 篇 curricula
  • 10 篇 intelligent syst...

机构

  • 24 篇 gaoling school o...
  • 24 篇 beijing key labo...
  • 13 篇 department of la...
  • 12 篇 school of scienc...
  • 11 篇 department of co...
  • 11 篇 department of co...
  • 9 篇 department of sc...
  • 9 篇 department of ma...
  • 9 篇 department of au...
  • 8 篇 faculty of physi...
  • 8 篇 department of co...
  • 8 篇 department of so...
  • 8 篇 department of nu...
  • 8 篇 department of sc...
  • 7 篇 computer network...
  • 7 篇 tsinghua univers...
  • 7 篇 beijing key labo...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of ap...

作者

  • 12 篇 dulski k.
  • 12 篇 kubicz e.
  • 12 篇 kozik t.
  • 12 篇 korcyl g.
  • 12 篇 badriyya b.al-on...
  • 11 篇 wen ji-rong
  • 11 篇 skurzok m.
  • 11 篇 moskal p.
  • 11 篇 silarski m.
  • 11 篇 gorgol m.
  • 11 篇 gajos a.
  • 10 篇 shopa r.y.
  • 10 篇 kisielewska d.
  • 10 篇 kowalski p.
  • 10 篇 hiesmayr b.c.
  • 10 篇 sharma s.
  • 10 篇 curceanu c.
  • 9 篇 olteanu mircea
  • 9 篇 ştefan radu
  • 9 篇 krawczyk n.

语言

  • 1,307 篇 英文
  • 67 篇 其他
  • 12 篇 中文
  • 2 篇 德文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science and Methods of Teaching Computer Science"
1389 条 记 录,以下是1101-1110 订阅
排序:
An Improved Approach to Delay-dependent Robust Stabilization for Uncertain Singular Time-delay Systems
收藏 引用
International Journal of Automation and computing 2010年 第2期7卷 205-212页
作者: Xin Sun Qing-Ling Zhang Chun-Yu Yang Zhan Su Yong-Yun Shao Institute of Systems Science Northeastern University Shenyang 110004 PRC Key Laboratory of Integrated Automation of Process Industry Ministry of Education Northeastern University Shenyang 110004 PRC Department of Computer and Mathematics Teaching Shenyang Normal University Shenyang 110034 PRC
In this paper, delay-dependent stability analysis and robust stabilization for uncertain singular time-delay systems are addressed. By using Jensen integral inequality, an improved delay-dependent criterion of admissi... 详细信息
来源: 评论
Research on computer immune system based on intrusion tolerance
Research on computer immune system based on intrusion tolera...
收藏 引用
2010 International Conference on Future Information Technology and Management Engineering, FITME 2010
作者: Liu, Jiaomin Li, Yongzheng Zhao, Yan Wang, Lili Yang, Zhengyan Wang, Yongguo College of Information Science and Engineering University of Yanshan Qinhuangdao Hebei Province China College of Computer Science and Engineering Hebei University of Technology Tianjin China Department of the Teaching Affairs College of Hebei Chemical and Pharmaceutical Shijiazhuang Hebei Province China
When the body is intruded, there is a congenital immune process to find and reduce the damage as quickly as possible. This is an important recovery character for the biology immune system. A model that simulates the b... 详细信息
来源: 评论
Asymptotic suppression of a class of discrete-time hyperchaotic systems based on fuzzy control method
Asymptotic suppression of a class of discrete-time hyperchao...
收藏 引用
作者: Wu, Zhidan Pan, Ying Deng, Wei Song, Fusheng Fundamental Teaching Department of Computer and Mathematics Shenyang Normal University Shenyang 110034 China School of Mathematics and Computer Science Harbin University Harbin 150086 China Department of Automatic Control Engineering Shenyang Institute of Engineering Shenyang 110136 China
The chaotic suppression problem for a class of typical discrete-time hyperchaotic systems is investigated in this paper. A T-S fuzzy model-based control method is employed to eliminate hyperchaos in the considered dis... 详细信息
来源: 评论
The research on improving university students' independent learning ability in computer Application Base
The research on improving university students' independent l...
收藏 引用
International Conference on Educational and Information Technology (ICEIT)
作者: Xiong Chao Zhuang Hong Computer technology and teaching department Zhejiang Science and Technology University Hangzhou China
In order to adapt jobs quickly in future, university students must possess stronger independent learning ability. This paper introduced the advantages of developing university students' independent learning abilit... 详细信息
来源: 评论
Analysis on the information security education for the public security active forces academy
Analysis on the information security education for the publi...
收藏 引用
International Forum on Information Technology and Applications
作者: Wu, Chunying Basic Course Teaching Department Chinese People's Armed Police Forces Academy Langfang 065000 China School of Computer Science and Software Engineering Tianjin Polytechnic University Tianjin 300160 China
With the rapid development of information technology, the society is rapidly moving toward an information-based. The public security active forces' information construction greatly improves the work efficiency of ... 详细信息
来源: 评论
Security enhancement of AODV against internal attacks
Security enhancement of AODV against internal attacks
收藏 引用
作者: Li, Pengwei Xu, Zhenqiang Teaching Department of Computer Anyang Normal University Huanghe Road Anyang Henan 455000 China College of Information Science and Engineering Henan University of Technology Lianhua Road Zhengzhou Henan 450001 China
Ad Hoc is one sort of multi-hop, self-organization wireless network without the fixed base-station. The most challenging work is to prevent attacks of this kind of networks. This paper labors the security mechanism of... 详细信息
来源: 评论
Study on seismic imaging block modeling method
Study on seismic imaging block modeling method
收藏 引用
2nd International Conference on Image Analysis and Signal Processing, IASP'2010
作者: Meng, Xiang-Bin Wei, Zhi-Qiang Sui, Zhi-Qiang Chu, Jian Gui, Lin Liu, Ying-Ying Department of Computer Science and Technology Ocean University of China Qingdao China Geophysical Methods Room of Geophysical Research Inst. Geophysical Research Inst. of Shengli Oil Field Branch Co Dongying China
Layer velocity modeling is not enough for high accuracy pre-stack imaging. But block velocity modeling may accurately describe complex subsurface geological structure. Through the research of seismic exploration block... 详细信息
来源: 评论
Improved chromosome encoding for genetic-algorithm-based assembly sequence planning
Improved chromosome encoding for genetic-algorithm-based ass...
收藏 引用
2010 IEEE International Conference on Intelligent Computing and Integrated Systems, ICISS2010
作者: Liang, Yong-Qiang Zhu, Xiao-Shu Xie, Miao Department of Mathematics and Computer Science Yulin Normal University Yulin China Office of Teaching Affairs Yulin Normal University Yulin China College of Profession Technology Yulin Normal University Yulin China
In order to ensure every feasible assembly sequence is included in the searching space of genetic algorithm, this paper proposes an improved genetic encoding method. In this method, every chromosome is encoded by a pe... 详细信息
来源: 评论
Chinese keyword search over relational databases
Chinese keyword search over relational databases
收藏 引用
World Congress on Software Engineering
作者: Zhu, Liang Zhu, Yong Ma, Qin Key Laboratory of Machine Learning and Computational Intelligence School of Mathematics and Computer Science Hebei University Baoding Hebei 071002 China Department of Foreign Language Teaching and Research Hebei University Baoding Hebei 071002 China
Based on a knowledge base, we propose a new method to realize free-style Chinese keyword search over relational databases. Firstly, an index (also called knowledge base) is built by extracting related information of C... 详细信息
来源: 评论
A Robust Image Watermarking Algorithm Based on Stationary Multiwavelet Transform
A Robust Image Watermarking Algorithm Based on Stationary Mu...
收藏 引用
The 2010 International Conference on computer Application and System Modeling(2010计算机应用与系统建模国际会议 ICCASM 2010)
作者: Huang Wei Wang Hua Dong Liao Li Department of Computer Science Zhoukou Normal University Zhoukou Henan Teaching and Research Department of Public Computer Zhoukou Normal University Zhoukou Henan
Due to the advantages of multi-wavelet transformation in image processing, this paper presents a image watermarking algorithm based on stationary multiwavelet. The simulation results show that relative to general wate... 详细信息
来源: 评论