咨询与建议

限定检索结果

文献类型

  • 705 篇 期刊文献
  • 670 篇 会议
  • 14 册 图书

馆藏范围

  • 1,389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 777 篇 工学
    • 520 篇 计算机科学与技术...
    • 439 篇 软件工程
    • 109 篇 控制科学与工程
    • 93 篇 信息与通信工程
    • 88 篇 生物医学工程(可授...
    • 77 篇 生物工程
    • 55 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 45 篇 机械工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 35 篇 光学工程
    • 28 篇 土木工程
  • 533 篇 理学
    • 306 篇 数学
    • 110 篇 生物学
    • 109 篇 物理学
    • 81 篇 统计学(可授理学、...
    • 63 篇 系统科学
    • 45 篇 化学
  • 249 篇 管理学
    • 160 篇 管理科学与工程(可...
    • 97 篇 工商管理
    • 91 篇 图书情报与档案管...
  • 138 篇 教育学
    • 136 篇 教育学
    • 28 篇 心理学(可授教育学...
  • 124 篇 医学
    • 89 篇 临床医学
    • 79 篇 基础医学(可授医学...
    • 43 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 37 篇 法学
    • 34 篇 社会学
  • 33 篇 经济学
    • 32 篇 应用经济学
  • 23 篇 农学
  • 9 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 36 篇 students
  • 33 篇 computer science
  • 33 篇 machine learning
  • 23 篇 education
  • 20 篇 engineering educ...
  • 18 篇 artificial intel...
  • 17 篇 deep learning
  • 16 篇 training
  • 14 篇 computational mo...
  • 12 篇 semantics
  • 12 篇 decision making
  • 11 篇 covid-19
  • 11 篇 accuracy
  • 10 篇 software enginee...
  • 10 篇 neural networks
  • 10 篇 data mining
  • 10 篇 diffusion
  • 10 篇 mathematics
  • 10 篇 curricula
  • 10 篇 intelligent syst...

机构

  • 24 篇 gaoling school o...
  • 24 篇 beijing key labo...
  • 13 篇 department of la...
  • 12 篇 school of scienc...
  • 11 篇 department of co...
  • 11 篇 department of co...
  • 9 篇 department of sc...
  • 9 篇 department of ma...
  • 9 篇 department of au...
  • 8 篇 faculty of physi...
  • 8 篇 department of co...
  • 8 篇 department of so...
  • 8 篇 department of nu...
  • 8 篇 department of sc...
  • 7 篇 computer network...
  • 7 篇 tsinghua univers...
  • 7 篇 beijing key labo...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of ap...

作者

  • 12 篇 dulski k.
  • 12 篇 kubicz e.
  • 12 篇 kozik t.
  • 12 篇 korcyl g.
  • 12 篇 badriyya b.al-on...
  • 11 篇 wen ji-rong
  • 11 篇 skurzok m.
  • 11 篇 moskal p.
  • 11 篇 silarski m.
  • 11 篇 gorgol m.
  • 11 篇 gajos a.
  • 10 篇 shopa r.y.
  • 10 篇 kisielewska d.
  • 10 篇 kowalski p.
  • 10 篇 hiesmayr b.c.
  • 10 篇 sharma s.
  • 10 篇 curceanu c.
  • 9 篇 olteanu mircea
  • 9 篇 ştefan radu
  • 9 篇 krawczyk n.

语言

  • 1,307 篇 英文
  • 67 篇 其他
  • 12 篇 中文
  • 2 篇 德文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science and Methods of Teaching Computer Science"
1389 条 记 录,以下是1131-1140 订阅
排序:
A Multi-Stage Stochastic Electricity Portfolio Model with Forwards Contracts
A Multi-Stage Stochastic Electricity Portfolio Model with Fo...
收藏 引用
International Conference on Management and Service science, MASS
作者: Rosella Giacometti Maria Teresa Vespucci Marida Bertocchi Department of Mathematics Statistics Computer science and Applications University of Bergamo Bergamo Italy Department of Information Technology and Mathematical Methods University of Bergamo Bergamo Italy Universita degli Studi di Bergamo Bergamo Lombardia IT
A stochastic multi-stage portfolio model for a hydropower producer operating in a competitive electricity market is proposed. The portfolio includes its own production and a set of forward contracts for future deliver... 详细信息
来源: 评论
Anonymity leakage reduction in network latency
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous Engineering 2010年 第1期5卷 19-28页
作者: Anyanwu, Longy O. Keengwe, Jared Arome, Gladys Mathematics and Computer Science Fort Hays State University Hays KS United States Department of Teaching and Learning University of North Dakota ND United States Department of Media and Instructional Tech Florida Atlantic University FL United States
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity as to personal, source and destination ... 详细信息
来源: 评论
Adaptive Control of a Class of Novel Hyperchaotic Systems with Fully Unknown Parameters
Adaptive Control of a Class of Novel Hyperchaotic Systems wi...
收藏 引用
The 2nd IEEE International Conference on Advanced computer Control(第二届先进计算机控制国际会议 ICACC 2010)
作者: Yan Zhao Xichang Han Lihua Miao Qiuye Sun Department of Automatic Control Engineering Shenyang Institute of Engineering Shenyang China Fundamental Teaching Department of Computer Mathematics and Physics Shenyang Medical College Sheny College of Information Science and Engineering Northeastern University Shenyang China
In this paper, the stabilization problems of a class of new hyperchaotic systems with fully unknown parameters are concerned. Based on the adaptive control idea, two novel adaptive state feedback controllers are desig... 详细信息
来源: 评论
Adaptive Generalized Synchronization of Two Nonidentical Hyperchaotic Systems with Unknown Parameters
Adaptive Generalized Synchronization of Two Nonidentical Hyp...
收藏 引用
The 2nd IEEE International Conference on Advanced computer Control(第二届先进计算机控制国际会议 ICACC 2010)
作者: Yan Zhao Tieyan Zhang Lihua Miao Qiuye Sun Department of Automatic Control Engineering Shenyang Institute of Engineering Shenyang China Fundamental Teaching Department of Computer Mathematics and Physics Shenyang Medical College Sheny College of Information Science and Engineering Northeastern University Shenyang China
This paper considers the generalized synchronization problems of two different hyperchaotic systems with unknown parameters. By denoting the synchronization error signals as the difference between the state variables ... 详细信息
来源: 评论
Scalable Intrusion Detection with Recurrent Neural Networks
Scalable Intrusion Detection with Recurrent Neural Networks
收藏 引用
International Conference on Information Technology: New Generations (ITNG)
作者: Longy O. Anyanwu Jared Keengwe Gladys A. Arome Department of Math and Computer Science Fort Hays State University Kansa USA Department of Teaching and Learning University of North Dakota ND USA College of Education Ldrshp & Tech Valdosta State University GA USA
The ever-growing use of the Internet comes with a surging escalation of communication and data access. Most existing intrusion detection systems have assumed the one-size-fits-all solution model. Such IDS is not as ec... 详细信息
来源: 评论
Improved chromosome encoding for genetic-algorithm-based assembly sequence planning
Improved chromosome encoding for genetic-algorithm-based ass...
收藏 引用
International Conference on Intelligent Computing and Integrated Systems (ICISS)
作者: Yong-qiang Liang Xiao-shu Zhu Miao Xie Department of Mathematics and Computer Science Yulin Normal University Yulin China Office of Teaching affairs Yulin Normal University Yulin China College of Profession Technology Yulin Normal University Yulin China
In order to ensure every feasible assembly sequence is included in the searching space of genetic algorithm, this paper proposes an improved genetic encoding method. In this method, every chromosome is encoded by a pe... 详细信息
来源: 评论
Asymptotic suppression of a class of discrete-time hyperchaotic systems based on fuzzy control method
Asymptotic suppression of a class of discrete-time hyperchao...
收藏 引用
Chinese Control Conference (CCC)
作者: Zhidan Wu Ying Pan Wei Deng Fusheng Song Fundamental Teaching Department of Computer & Mathematics Shenyang Normal University Shenyang P. R. China School of Mathematics & Computer Science Harbin University Harbin P. R. China Department of Automatic Control Engineering Shenyang Institute of Engineering Shenyang P. R. China
The chaotic suppression problem for a class of typical discrete-time hyperchaotic systems is investigated in this paper. A T-S fuzzy model-based control method is employed to eliminate hyperchaos in the considered dis... 详细信息
来源: 评论
A survey of modelling uncertain data
A survey of modelling uncertain data
收藏 引用
International Conference on computer science and Information Technology (CSIT)
作者: Teng Lv Weimin He Ping Yan Teaching and Research Section of Computer Artillery Academy of PLA Hefei China Department of Computing and New Media Technologies University of Wisconsin Stevens Stevens Point WI USA School of Science Anhui Agricultural University Hefei China
Uncertainty in data is caused by various reasons such as data generated and transmitted in sensor networks, data mapping in uncertain data integrating environments, and data in some specific applications considering p... 详细信息
来源: 评论
Sensitivity Analysis in Stochastic Second Order Cone Programming for Mobile Ad Hoc Networks
收藏 引用
Procedia - Social and Behavioral sciences 2010年 第6期2卷 7704-7705页
作者: Francesca Maggioni Stein W. Wallace Marida Bertocchi Elisabetta Allevi Departement of .Mathematics Statistics Computer Science and Applications University of. Bergamo Via dei Caniana n. 2 24127 Bergamo Ialy Department of Management Science Lancaster University Management School Lancaster LA1 4YX United Kingdom Department of Quantitative Methods. University of Brescia. Contrada S. Chiara 50 25122 Brescia Italy
In this paper sensitivity analysis is adopted in order to understand the randomness of a stochastic second order cone program for mobile ad hoc networks [3]. The algorithm looks for a destination node and sets up a ro... 详细信息
来源: 评论
Link spam detection based on genetic programming
Link spam detection based on genetic programming
收藏 引用
International Conference on Natural Computation (ICNC)
作者: Xiaofei Niu Shengen Li Ning Yuan Xuedong Niu Cuiling Zhu School of Computer Science & Technology Shandong Jianzhu University Jinan Shandong China Teaching Affairs Department Shandong University of Technology Zibo Shandong China School of Information Science and Engineering University of Ji''nan Jinan Shandong China School of Information Management Shandong Economics University Jinan Shandong China
Link spam refers to unfairly gaining a high ranking on search engines for a web page by means of trickily manipulating the link graph to confuse the hyper-link structure analysis algorithms. It seriously affects the q... 详细信息
来源: 评论