咨询与建议

限定检索结果

文献类型

  • 3,979 篇 期刊文献
  • 1,758 篇 会议

馆藏范围

  • 5,737 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,066 篇 工学
    • 1,160 篇 计算机科学与技术...
    • 930 篇 软件工程
    • 720 篇 控制科学与工程
    • 638 篇 机械工程
    • 529 篇 仪器科学与技术
    • 355 篇 信息与通信工程
    • 330 篇 电子科学与技术(可...
    • 203 篇 材料科学与工程(可...
    • 144 篇 电气工程
    • 144 篇 化学工程与技术
    • 133 篇 网络空间安全
    • 132 篇 地质资源与地质工...
    • 110 篇 光学工程
    • 96 篇 测绘科学与技术
    • 94 篇 水利工程
    • 89 篇 动力工程及工程热...
    • 86 篇 农业工程
    • 83 篇 交通运输工程
  • 1,290 篇 理学
    • 370 篇 系统科学
    • 366 篇 数学
    • 137 篇 物理学
    • 125 篇 生物学
    • 92 篇 化学
  • 1,066 篇 管理学
    • 821 篇 管理科学与工程(可...
    • 128 篇 工商管理
  • 354 篇 农学
    • 82 篇 农业资源与环境
  • 261 篇 教育学
    • 227 篇 教育学
  • 239 篇 经济学
    • 222 篇 应用经济学
  • 174 篇 医学
    • 83 篇 临床医学
  • 90 篇 艺术学
    • 85 篇 设计学(可授艺术学...
  • 86 篇 文学
  • 63 篇 法学
  • 52 篇 军事学
  • 14 篇 历史学
  • 2 篇 哲学

主题

  • 45 篇 数据挖掘
  • 44 篇 设计
  • 39 篇 遗传算法
  • 38 篇 gis
  • 36 篇 xml
  • 36 篇 internet
  • 33 篇 数据库
  • 30 篇 信息技术
  • 27 篇 genetic algorith...
  • 26 篇 地理信息系统
  • 26 篇 fault diagnosis
  • 23 篇 optimal control
  • 22 篇 adaptive control
  • 22 篇 应用
  • 22 篇 计算机
  • 21 篇 电子商务
  • 21 篇 fpga
  • 21 篇 networked contro...
  • 21 篇 高校
  • 21 篇 计算机网络

机构

  • 214 篇 山东科技大学
  • 178 篇 太原理工大学
  • 77 篇 青岛科技大学
  • 74 篇 中国海洋大学
  • 64 篇 华中科技大学
  • 57 篇 南京航空航天大学
  • 57 篇 中南大学
  • 53 篇 浙江工业大学
  • 47 篇 吉林大学
  • 47 篇 青岛大学
  • 44 篇 天津大学
  • 41 篇 国防科技大学
  • 41 篇 四川大学
  • 40 篇 华南理工大学
  • 40 篇 成都理工大学
  • 40 篇 中国矿业大学
  • 38 篇 浙江大学
  • 38 篇 中国石油大学
  • 37 篇 南京信息工程大学
  • 35 篇 南开大学

作者

  • 348 篇 china
  • 64 篇 p.r.china
  • 23 篇 谢克明
  • 21 篇 beijing
  • 19 篇 china)
  • 15 篇 余雪丽
  • 14 篇 wuhan
  • 14 篇 china agricultur...
  • 13 篇 吴哲辉
  • 12 篇 nanjing
  • 12 篇 hubei
  • 12 篇 张刚
  • 11 篇 吴重光
  • 11 篇 丁永生
  • 10 篇 hangzhou
  • 10 篇 qingdao zeng
  • 10 篇 ministry of educ...
  • 9 篇 李明
  • 9 篇 p. r. china
  • 9 篇 qingdao

语言

  • 3,334 篇 中文
  • 2,403 篇 英文
检索条件"作者=2.college of information {2. & Technology,qingdao university of {2. & Technology,qingdao,china"
5737 条 记 录,以下是101-110 订阅
排序:
Comparative study on in vitro transformation of paralytic shellfish poisoning (PSP) toxins in different shellfish tissues
收藏 引用
Acta Oceanologica Sinica 2010年 第1期29卷 120-126页
作者: TIAN Hua GAO Chunlei WANG Zongling SUN Ping FAN Shiliang ZHU Mingyuan college of Marine Life Sciences Ocean University of China Qingdao 266063 China First Institute of Oceanography State Oceanic Administration Qingdao 266061 China Key Laboratory of Marine Ecological Environment and Engineering of State OceanicAdministration Qingdao 266061 China
Dissected tissues of three shellfish species, the Chinese scallop, Chlamys farreri, Manila clam, Ruditapes philippinarurn, and Razor shell, Solen strictu were evaluated for in vitro transformation of paralytic shellfi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold proxy quantum signature scheme with threshold shared verification
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第8期51卷 1079-1088页
作者: YANG YuGuang1,3,4 & WEN QiaoYan2.1 college of Computer Science and technology,Beijing {2. of technology,Beijing 10012.,china 2.State Key Laboratory of Networking and Switching technology,Beijing {2. of Posts and Tele-communications,Beijing 100876,china 3 State Key Laboratory of Integrated Services Network,Xidian {2.,Xi’an 710071,china 4 State Key Laboratory of information Security(Graduate {2. of Chinese Academy of Sciences) ,Beijing 100049,china 1. college of Computer Science and technology Beijing University of Technology Beijing 100124 China 3. State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China 4. State Key Laboratory of information Security (Graduate university of Chinese Academy of Sciences) Beijing 100049 China 2. State Key Laboratory of Networking and Switching technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Vision navigation algorithm for mine agent based on quaternion
收藏 引用
中国有色金属学会会刊:英文版 2011年 第S3期21卷 610-615页
作者: LI Ke-zhao1, 4, LEI Wei-wei1, 2. GUO Zeng-zhang1, 2. WU Li-xin3, ZHANG Qin4 1. School of Survey and Land information Engineering, Henan Polytechnic university, Jiaozuo 454003, {2. 2. Key Laboratory of Mine Spatial information Technologies of State Bureau of Surveying and Mapping, Henan Polytechnic university, Jiaozuo 454003, {2. 3. college of Resources and Civil Engineering, Northeastern university, Shenyang 110819, {2. 4. college of Geology Engineering and Geomatics, Chang’an university, Xi’an 710054, {2. [a] School of Survey and Land information Engineering Henan Polytechnic University Jiaozuo 454003 China [b] Key Laboratory of Mine Spatial information Technologies of State Bureau of Surveying and Mapping Henan Polytechnic University Jiaozuo 454003 China [c] college of Resources and Civil Engineering Northeastern University Shenyang 110819 China [d] college of Geology Engineering and Geomatics Chang'an University Xi'an 710054 China
Autonomous relative navigation is the key technology in mining or rescuing. On the basis of mine requirement and the theories of machine vision, an autonomous relative navigation algorithm for mine agent based on quat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quantum threshold group signature
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第10期51卷 1505-1514页
作者: YANG YuGuang1,2.3 & WEN QiaoYan4 1 college of Computer Science and technology, Beijing {2. of technology, Beijing 10012., china 2.State Key Laboratory of Integrated Services Network, Xidian {2., Xi’an 710071, china 3 State Key Laboratory of information Security (Graduate {2. of Chinese Academy of Sciences), Beijing 100049, china 4 State Key Laboratory of Networking and Switching technology, Beijing {2. of Posts and Tele-communications, Beijing 100876, china college of Computer Science and technology Beijing University of Technology Beijing 100124 China State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China State Key Laboratory of information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China State Key Laboratory of Networking and Switching technology Beijing University of Posts and Telecommunications Beijing 100876 China
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Influence of Lactobacillus E1 on the Storage Stability in Emulsion Immobilization
收藏 引用
Journal of Wuhan university of technology(Materials Science) 2009年 第1期24卷 75-80页
作者: 孙欣 陈西广 college of Life Science Ocean University of China
A coacervation method with double emulsion strategy (w/o/w) was used to prepare immobilized Lactobacillus E1. Diatomite was chosen as the carrier for bacteria. Sodium alginate, dextrin and gelatin were used as prote... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Denitrification in Chongming east tidal flat sediment, Yangtze estuary, china
收藏 引用
Science china Earth Sciences 2006年 第10期49卷 1090-1097页
作者: WANG Dongqi1,2. CHEN Zhenlou1,3, XU Shiyuan1,2. HU Lingzhen1 & WANG Jun1,2.1. college of Resources & Environment, East china Normal {2., Shanghai 2.0062. china 2. State Key Laboratory of Estuarine and Coastal Sediment Dynamics and Morphodynamics, East china Normal {2., Shanghai 2.0062. china 3. Key Laboratory of Geographical information Science of Ministry of Education,East china Normal {2.,Shanghai 2.0062. china 1. college of Resources & Environment East China Normal University Shanghai 200062 China 2. State Key Laboratory of Estuarine and Coastal Sediment Dynamics and Morphodynamics East China Normal University Shanghai 200062 China 3. Key Laboratory of Geographical information Science of Ministry of Education East China Normal University Shanghai 200062 China
From July 2.03 to July 2.04, samples were collected on Chongming Island east tidal flat every two months. The research showed that the nitrous oxide (N2.) production rate was very low in the water, Chongming east tida... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
THz source based on optical Cherenkov radiation
收藏 引用
Science china(information Sciences) 2012年 第1期55卷 27-34页
作者: YAO JianQuan1,2.LIU PengXiang1,2.XU DeGang1,2.LV YingJin1,2.LV Da1,2.1Institute of Laser&Optoelectronics,college of Precision Instruments and Opto-Electronic Engineering,Tianjin university,Tianjin 300072.{2. 2.ey Laboratory of Opto-electronics information technology(Tianjin university),Ministry of Education,Tianjin 300072.{2. 1. Institute of Laser & Optoelectronics College of Precision Instruments and Opto-Electronic Engineering Tianjin University Tianjin 300072 China2. Ministry of Education Key Laboratory of Opto-electronics Information Technology (Tianjin University) Tianjin 300072 China
Terahertz(THz)technique has attracted considerable interest due to its broad application *** source is a crucial part of THz science and *** Cherenkov radiation in electro-optic crystals is a promising method of THz g... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Architecture design of low-power motion estimation based on DHS-NPDS for H.2.4/AVC
收藏 引用
Science china(information Sciences) 2012年 第10期55卷 2234-2242页
作者: CHEN YunBi 1,LI ZhengDong 2.GUO Li 1,XIE JinSheng 1 & ZHAO Long 1 1 Department of Electronic Science and technology,university of Science and technology of china,Hefei 2.002.,china 2.Staff room of Electronic and technology,Chongqing Communication college,Chongqing 400035,china 1. Department of Electronic Science and technology University of Science and Technology of China Hefei 230027 China 2. Staff room of Electronic and technology Chongqing Communication College Chongqing 400035 China
A novel architecture of motion estimation(ME) based on improved normalized partial distortion search is proposed to meet three primary requirements for real-time video encoding,which are low-power,lowbandwidth and hig... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YANG YuGuang1,2.3 & WEN QiaoYan4 1 college of Computer Science and technology,Beijing {2. of technology,Beijing 10012.,china 2.State Key Laboratory of Integrated Services Network,Xidian {2.,Xi’an 710071,china 3 State Key Laboratory of information Security (Graduate {2. of Chinese Academy of Sciences),Beijing 100049,china 4 State Key Laboratory of Networking and Switching technology,Beijing {2. of Posts and Tele-communications,Beijing 100876,china college of Computer Science and technology Beijing University of Technology Beijing 100124 China State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China State Key Laboratory of information Security (Graduate university of Chinese Academy of Sciences) Beijing 100049 China State Key Laboratory of Networking and Switching technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Another ID-Based Proxy Signature Scheme and Its Extension
收藏 引用
Wuhan university Journal of Natural Sciences 2007年 第1期12卷 33-36页
作者: ZHANG Jianhong1,2., ZOU Wei3 1. college of Science, North china {2. of technology, Beijing 100041,china 2. Institute of Software of Chinese Academy of Sciences /State Key Laboratory of information Security, Beijing 100080, china 3. Institute of Computer Science and technology, Peking {2., Beijing 100871, china college of Science North China University of Technology Beijing China State Key Laboratory of information Security Institute of Software of Chinese Academy of Sciences Beijing China Institute of Computer Science and technology Peking University Beijing China
So fur, the security of many proxy signatures has seldom been considered in a formal way and most of them cannot satisfy nonepudiation. In this work, a novel ID-based (Identity-based) proxy signature scheme is propo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论