咨询与建议

限定检索结果

文献类型

  • 1,005 篇 期刊文献
  • 233 篇 会议

馆藏范围

  • 1,238 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 570 篇 工学
    • 160 篇 计算机科学与技术...
    • 94 篇 软件工程
    • 74 篇 仪器科学与技术
    • 67 篇 机械工程
    • 64 篇 信息与通信工程
    • 63 篇 控制科学与工程
    • 48 篇 电子科学与技术(可...
    • 31 篇 网络空间安全
    • 22 篇 化学工程与技术
    • 21 篇 光学工程
    • 20 篇 电气工程
    • 20 篇 地质资源与地质工...
    • 19 篇 材料科学与工程(可...
    • 17 篇 测绘科学与技术
  • 366 篇 管理学
    • 189 篇 图书情报与档案管...
    • 123 篇 管理科学与工程(可...
    • 48 篇 工商管理
    • 27 篇 公共管理
  • 306 篇 理学
    • 79 篇 数学
    • 71 篇 大气科学
    • 43 篇 物理学
    • 43 篇 系统科学
    • 27 篇 生物学
  • 86 篇 教育学
    • 47 篇 教育学
    • 31 篇 心理学(可授教育学...
  • 67 篇 医学
    • 32 篇 临床医学
  • 53 篇 经济学
    • 48 篇 应用经济学
  • 52 篇 农学
    • 18 篇 农业资源与环境
  • 35 篇 法学
    • 17 篇 公安学
  • 26 篇 文学
  • 19 篇 军事学
    • 19 篇 军队指挥学
  • 18 篇 艺术学
  • 5 篇 历史学
  • 1 篇 哲学

主题

  • 43 篇 图书馆
  • 27 篇 青藏高原
  • 23 篇 信息服务
  • 22 篇 高校图书馆
  • 20 篇 中国
  • 13 篇 高校
  • 12 篇 网络环境
  • 11 篇 数字图书馆
  • 11 篇 数据库
  • 11 篇 知识管理
  • 10 篇 数据挖掘
  • 9 篇 地理信息系统
  • 9 篇 internet
  • 9 篇 高原低涡
  • 8 篇 gis
  • 8 篇 信息资源管理
  • 8 篇 图书馆学
  • 7 篇 读者服务
  • 7 篇 数值模拟
  • 7 篇 网络安全

机构

  • 186 篇 中山大学
  • 120 篇 华南师范大学
  • 106 篇 华南理工大学
  • 57 篇 广东工业大学
  • 48 篇 成都信息工程大学
  • 47 篇 广州大学
  • 45 篇 暨南大学
  • 34 篇 华南农业大学
  • 18 篇 广东外语外贸大学
  • 15 篇 广东商学院
  • 13 篇 南京信息工程大学
  • 11 篇 第一军医大学
  • 11 篇 南方医科大学
  • 10 篇 石油大学
  • 9 篇 中国科学院广州地...
  • 8 篇 武汉大学
  • 7 篇 华中科技大学
  • 6 篇 北京大学
  • 6 篇 中国科学院大学
  • 6 篇 中南大学

作者

  • 58 篇 china
  • 48 篇 范广洲
  • 18 篇 guangzhou
  • 15 篇 莫雷
  • 15 篇 赖欣
  • 13 篇 guangzhou fan
  • 12 篇 张永莉
  • 11 篇 韦岗
  • 8 篇 陈耀盛
  • 8 篇 south china univ...
  • 8 篇 李健康
  • 7 篇 丘水生
  • 7 篇 华维
  • 7 篇 谢胜利
  • 6 篇 罗曼
  • 6 篇 李师贤
  • 6 篇 guangzhou 510642
  • 5 篇 guangzhou 510640
  • 5 篇 肖勇
  • 5 篇 骆伟

语言

  • 836 篇 中文
  • 402 篇 英文
检索条件"作者=2.ollege of Mathematics and Information {2., Guangzhou University, Guangzhou 510006, china"
1238 条 记 录,以下是1-10 订阅
排序:
Impact of EnKF assimilating Himawari-8 all-sky infrared radiance on the forecasting of a warm-sector rainstorm event
收藏 引用
Science china Earth Sciences 2024年 第10期67卷 3110-3127页
作者: Shanshan LOU Lei ZHU Xuexing QIU guangzhou CHEN Song YUAN Shengnan ZHOU Anhui Meteorological Observatory Hefei 230031China Key Laboratory of Meteorological Disaster Ministry of Education(KLME)Collaborative Innovation Center on Forecast and Evaluation of Meteorological Disasters(CIC-FEMD)Joint International Research Laboratory of Climate and Environment Change(ILCEC)Nanjing University of Information Science&TechnologyNanjing 210044China Huaihe River Basin Meteorological Center Hefei 230031China Shouxian National Climatology Observatory Huaihe River Basin Typical Farm Eco-Meteorological Experiment Field of CMAShouxian National Comprehensive Meteorological Observation Special Experimental OutfieldShouxian 232200China Anhui Province Key Laboratory of Atmospheric Science and Satellite Remote Sensing Hefei 230031China
Warm-sector rainstorms are highly localized events, with weather systems and triggering mechanisms are not obvious,leading to limited forecasting capabilities in numerical models. Based on the ensemble Kalman filter(P... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Construction of Boolean functions with maximum algebraic immunity and count of their annihilators at lowest degree
收藏 引用
Science china(information Sciences) 2010年 第4期53卷 780-787页
作者: DU YuSong* & PEI DingYi School of mathematics and information Sciences,{2., guangzhou 510006, china 1. School of mathematics and information Sciences Guangzhou University Guangzhou 510006 China
Boolean functions used in stream ciphers against algebraic attacks are required to have a necessary cryptographic property-high algebraic immunity (AI). In this paper, Boolean functions of even variables with the maxi... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A novel key pre-distribution scheme for wireless distributed sensor networks
收藏 引用
Science china(information Sciences) 2010年 第2期53卷 288-298页
作者: PEI DingYi 1 , DONG JunWu 1 & RONG ChunMing 2.1 College of mathematics and {2. Science, guangzhou university, guangzhou 510006, china 2.university of Stavanger, N-4036, Stavanger, Norway 1. College of mathematics and {2. Science Guangzhou University Guangzhou 510006 China2. University of Stavanger N-4036 Stavanger Norway
A novel key pre-distribution scheme for sensor networks is proposed, which enables sensor nodes to communicate securely with each other using cryptographic techniques. The approach uses the rational normal curves in t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Identification and construction of Boolean functions with maximum algebraic immunity
收藏 引用
Science china(information Sciences) 2010年 第7期53卷 1379-1396页
作者: LIU MeiCheng, PEI DingYi & DU YuSong College of mathematics and {2. Sciences, guangzhou university, guangzhou 510006, china 1. College of mathematics and {2. Sciences Guangzhou University Guangzhou 510006 China
Boolean functions with maximum algebraic immunity have been considered as one class of cryptographically significant functions. It is known that Boolean functions on odd variables have maximum algebraic immunity if an... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Periodic solutions of a 2.th-order nonlinear difference equation
收藏 引用
Science china mathematics 2010年 第1期53卷 41-50页
作者: ZHOU Zhan 1, YU JianShe 1 & CHEN YuMing 2. School of mathematics and information Science,{2., guangzhou 510006, china 2.Department of mathematics, Wilfrid Laurier university, Waterloo N2. 3C5, Canada 1. School of mathematics and information Science Guangzhou University Guangzhou 510006 China2. Department of Mathematics Wilfrid Laurier University Waterloo N2L 3C5 Canada
In this paper, a 2.nth-order nonlinear difference equation is *** the critical point theory, we establish various sets of sufficient conditions of the nonexistence and existence of periodic *** obtained complement or ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Secure multi-party computation protocol for sequencing problem
收藏 引用
Science china(information Sciences) 2011年 第8期54卷 1654-1662页
作者: TANG ChunMing 1,2.SHI GuiHua 1 & YAO ZhengAn 3 1 School of mathematics and information Science,{2. university,{2. 510006, china 2.tate Key Laboratory of information Security, Institute of Software Science,Chinese Academy of Sciences,Beijing 100080,china 3 School of mathematics and Computational Science,Sun Yat-Sen university,{2. 5102.5,china 1. School of mathematics and information Science Guangzhou University Guangzhou 510006 China2. State Key Laboratory of Information Security Institute of Software Science Chinese Academy of Sciences Beijing 100080 China3. School of Mathematics and Computational Science Sun Yat-Sen University Guangzhou 510275 China
In the field of multi-party computation,an important problem is how to construct an efficient and secure multi-party computation protocol for certain specific *** the present study,we make use of a secret sharing sche... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Linearly time-varying channel estimation and training power allocation for OFDM/MIMO systems using superimposed training
收藏 引用
Science china(information Sciences) 2011年 第7期54卷 1456-1470页
作者: ZHANG Han 1,DAI XianHua 2.& Pan DaRu 1 1 School of Physics and Telecommunication Engineering,South china Normal university,{2. 510006,china 2.Department of information Science and Technology,SUN Yat-sen university,{2. 51002.,china 1. School of Physics and Telecommunication Engineering South China Normal University Guangzhou 510006 China2. Department of Information Science and Technology SUN Yat-sen University Guangzhou 510026 China
We address the problem of estimating the linearly time-varying (LTV) channel of orthogonal frequency division multiplexing (OFDM)/multiple-input multiple-output (MIMO) systems using superimposed training (ST).The LTV ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Research on the method for retrieving soil moisture using thermal inertia model
收藏 引用
Science china Earth Sciences 2006年 第5期49卷 539-545页
作者: LIU Zhenhua1 & ZHAO Yingshi2.1. information College, South{2. Agricultural university, guangzhou 510642.{2. 2. Graduate university of Chinese Academy of Sciences, Beijing 100049,{2. 1. information College South China Agricultural University Guangzhou 510642 China 2. Graduate university of Chinese Academy of Sciences Beijing 100049 China
In order to improve accuracy of soil moisture inversion using remote sensing, a new thermal inertia model is proposed in this paper. The improved model needs only surface maximum temperature as the temperature paramet... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Transitional function of DG to CA3 in the hippocampus
收藏 引用
Progress in Natural Science:Materials International 2007年 第12期17卷 1436-1444页
作者: Yan Chuankui1 and Liu Shenquan2.1. Department of mathematics, Hangzhou Normal university, Hangzhou 310036,{2. 2. Department of Applied mathematics, School of Mathematical Sciences, South{2. university of Technology, guangzhou 510640,{2.) Department of mathematics Hangzhou Normal University Hangzhou 310036 China Department of Applied mathematics School of Mathematical Sciences South China University of Technology Guangzhou 510640 China
Using single cell channel model, the transmission features of CA3-DG network in the hippocampus are investigated. The influence of the stimulation on discharge pattern of pyramidal neurons is analyzed, which shows tha... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Leakproof secret sharing protocols with applications to group identification scheme
收藏 引用
Science china(information Sciences) 2012年 第5期55卷 1172-1185页
作者: TANG ChunMing 1,2.& GAO ShuHong 3 1 School of mathematics and information Science,{2. university,{2. 510006,china 2.State Key Laboratory of information Security,Institute of Software Science,Chinese Academy of Sciences,Beijing 100049,china 3 Department of Mathematical Sciences,Clemson university,SC 2.634,USA 1. School of mathematics and information Science Guangzhou University Guangzhou 510006 China2. State Key Laboratory of Information Security Institute of Software Science Chinese Academy of Sciences Beijing 100049 China3. Department of Mathematical Sciences Clemson University Clemson SC 29634 USA
In a traditional (t,n)-threshold secret sharing scheme,t or more honest participants can reconstruct the secret *** the reconstruction process,the individual shares and the secret key K are revealed,hence K is shared ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论