咨询与建议

限定检索结果

文献类型

  • 18,588 篇 期刊文献
  • 6,006 篇 会议
  • 2 册 图书

馆藏范围

  • 24,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17,258 篇 工学
    • 4,008 篇 计算机科学与技术...
    • 3,001 篇 软件工程
    • 2,805 篇 控制科学与工程
    • 2,542 篇 机械工程
    • 2,248 篇 仪器科学与技术
    • 2,197 篇 电子科学与技术(可...
    • 2,078 篇 信息与通信工程
    • 1,266 篇 材料科学与工程(可...
    • 846 篇 电气工程
    • 738 篇 化学工程与技术
    • 625 篇 网络空间安全
    • 616 篇 光学工程
    • 544 篇 地质资源与地质工...
    • 507 篇 航空宇航科学与技...
    • 491 篇 交通运输工程
    • 380 篇 测绘科学与技术
    • 326 篇 动力工程及工程热...
  • 5,599 篇 理学
    • 1,535 篇 数学
    • 1,326 篇 系统科学
    • 981 篇 物理学
    • 668 篇 化学
    • 431 篇 生物学
  • 4,460 篇 管理学
    • 3,126 篇 管理科学与工程(可...
    • 671 篇 工商管理
    • 558 篇 图书情报与档案管...
    • 338 篇 公共管理
  • 1,183 篇 医学
    • 621 篇 临床医学
  • 1,056 篇 经济学
    • 982 篇 应用经济学
  • 892 篇 教育学
    • 585 篇 教育学
  • 842 篇 农学
  • 383 篇 艺术学
    • 363 篇 设计学(可授艺术学...
  • 327 篇 军事学
  • 298 篇 文学
  • 266 篇 法学
  • 66 篇 历史学
  • 34 篇 哲学

主题

  • 142 篇 遗传算法
  • 129 篇 中国
  • 126 篇 地理信息系统
  • 74 篇 xml
  • 71 篇 设计
  • 67 篇 simulation
  • 61 篇 神经网络
  • 60 篇 数据库
  • 59 篇 仿真
  • 54 篇 特征提取
  • 53 篇 matlab
  • 50 篇 信息技术
  • 50 篇 电子商务
  • 47 篇 计算机网络
  • 45 篇 支持向量机
  • 41 篇 wavelet transfor...
  • 40 篇 analysis
  • 40 篇 gis
  • 39 篇 混沌
  • 38 篇 图像分割

机构

  • 566 篇 上海交通大学
  • 507 篇 武汉大学
  • 369 篇 天津大学
  • 298 篇 山东大学
  • 274 篇 上海大学
  • 270 篇 四川大学
  • 255 篇 电子科技大学
  • 235 篇 华中科技大学
  • 233 篇 西安交通大学
  • 218 篇 同济大学
  • 210 篇 武汉理工大学
  • 193 篇 清华大学
  • 192 篇 浙江大学
  • 183 篇 北京大学
  • 179 篇 沈阳工业大学
  • 166 篇 东北大学
  • 150 篇 北京航空航天大学
  • 141 篇 吉林大学
  • 141 篇 复旦大学
  • 140 篇 东南大学

作者

  • 983 篇 china
  • 67 篇 p.r.china
  • 47 篇 p. r. china
  • 41 篇 shanghai
  • 35 篇 beijing
  • 28 篇 赵海
  • 25 篇 tsinghua univers...
  • 25 篇 zhejiang univers...
  • 23 篇 nanjing
  • 23 篇 hangzhou
  • 22 篇 韩崇昭
  • 20 篇 sichuan
  • 20 篇 wuhan university
  • 20 篇 王伟
  • 19 篇 china.
  • 19 篇 beijing 100044
  • 19 篇 hubei
  • 18 篇 张敏
  • 18 篇 胡光锐
  • 18 篇 china)

语言

  • 15,040 篇 中文
  • 9,556 篇 英文
检索条件"作者=2.school of Information and Communication, Guilin University of Electronic Technology, Guilin 541004, {3."
24596 条 记 录,以下是51-60 订阅
排序:
Subsidence control and farmland conservation by solid backfilling mining technology
收藏 引用
中国有色金属学会会刊:英文版 2011年 第S3期21卷 665-669页
作者: GUO Guang-li1, 2, FENG Wen-kai3. ZHA Jian-feng1, 2, 3. LIU Yuan-xu1, 2, WANG Qiang1, 2 1. Key Laboratory for Land Environment and Disaster Monitoring of the State Bureau of Surveying and Mapping, China university of Mining and technology, Xuzhou 221116, China 2. Jiangsu Key Laboratory of Resources and Environmental information Engineering, China university of Mining and technology, Xuzhou 221116, China 3. State Key Laboratory of Geohazard Prevention and Geoenvironment Protection, Chengdu university of technology, Chengdu 610059, China [a] Key Laboratory for Land Environment and Disaster Monitoring of the State Bureau of Surveying and Mapping China University of Mining and Technology Xuzhou 221116 China [b] Jiangsu Key Laboratory of Resources and Environmental information Engineering China University of Mining and Technology Xuzhou 221116 China [c] State Key Laboratory of Geohazard Prevention and Geoenvironment Protection Chengdu University of Technology Chengdu 610059 China
Solid backfilling mining technology, which decreases the height of fissure zone and caving zone, and alleviates the subsidence, is a new technology for farmland conservation. Based on the situation analysis of farmlan... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Novel Multi-Mutation Binary Particle Swarm Optimization for 0/1 knapsack problem
A Novel Multi-Mutation Binary Particle Swarm Optimization fo...
收藏 引用
2009中国控制与决策会议
作者: Zhuangkuo Li,Ning Li school of management,guilin university of{3. technology,guilin 541004,China
<正>Particle swarm optimization(PSO) algorithm as a novel computational intelligence technique has been applied successfully in many continuous optimization *** the binary PSO(BPSO) is developed and Qi presented... 详细信息
来源: cnki会议 评论
The cut sets,decomposition theorems and representation theorems on intuitionistic fuzzy sets and interval valued fuzzy sets
收藏 引用
Science China(information Sciences) 2011年 第1期54卷 91-110页
作者: YUAN XueHai,LI HongXing & SUN KaiBiao school of electronic and information Engineering,Dalian{3. of technology,Dalian 116024,China 1. school of electronic and information Engineering Dalian University of Technology Dalian 116024 China
In this paper,the cut sets,decomposition theorems and representation theorems of intuitionistic fuzzy sets and interval valued fuzzy sets are researched ***,new definitions of four kinds of cut sets on intuitionistic ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Mining and Integrating Reliable Decision Rules for Imbalanced Cancer Gene Expression Data Sets
收藏 引用
Tsinghua Science and technology 2012年 第6期17卷 666-673页
作者: Hualong Yu 1 , Jun Ni 2 , Yuanyuan Dan 3., Sen Xu 4 1. school of Computer Science and Engineering, Jiangsu university of Science and technology, Zhenjiang 212003. China 2. Department of Radiology, Carver College of Medicine, The university of Iowa, Iowa City, IA 52242, USA 3. school of Biology and Chemical Engineering, Jiangsu university of Science and technology, Zhenjiang 212003. China 4. school of information Engineering, Yancheng Institute of technology, Yancheng 224051, China school of Computer Science and Engineering Jiangsu University of Science and Technology Zhenjiang 212003 China|c|
There have been many skewed cancer gene expression datasets in the post-genomic era. Extraction of differential expression genes or construction of decision rules using these skewed datasets by traditional algorithms ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
MMSE relay precoding schemes based on quantization error compensation for multi-relay system
收藏 引用
Science China(information Sciences) 2010年 第12期53卷 2548-2556页
作者: LI Ting 1,2 & YANG LuXi 2 1 College of communication and information Engineering,Nanjing university of Posts and Telecommunications,Nanjing 210003.China 2.school of information Science and Engineering,Southeast university,Nanjing 210096,China 1. College of communication and information Engineering Nanjing University of Posts and Telecommunications Nanjing 210003 China2. School of Information Science and Engineering Southeast University Nanjing 210096 China
In order to deal with the performance degradation resulting from the quantization error,this paper introduces the statistics of Grassmannian codebook's quantization error into relay precoding design for multirelay ***... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Predictive control and scheduling codesign in network control systems
收藏 引用
控制理论与应用(英文版) 2010年 第2期8卷 239-244页
作者: Qing SHEN 1 , 2 , Weihua GUI 2 , Ying XIONG 2 , Chunhua YANG 2 (1.school of Basic Education for Officers, National university of Defense technology, Changsha Hunan 410003. China {3. of information Science and Engineering, Central South university, Changsha Hunan 410083. China) school of Basic Education for Officers National University of Defense Technology Changsha Hunan China school of information Science and Engineering Central South University Changsha Hunan China
A codesign approach combining predictive control compensation and network scheduling is presented in this paper to overcome the adverse influences of stochastic time delays and packet losses encountered in network-bas... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Characteristics of fMRI BOLD signal and its neurophysiological mechanism
收藏 引用
Progress in Natural Science:Materials International 2007年 第6期17卷 630-638页
作者: Zhao Xiaohu1,2, Wu Yigen3.and Guo Shengli3.1. College of Life Sciences, Zhejiang university, Hangzhou 3.0058, China 2. Imaging Department of Tongji Hospital of Tongji university, Shanghai 200065, China 3. College of Mathematics and Physics, Nanjing university of{3. Science and technology, Nanjing 210044, China) College of Life Sciences Zhejiang University Hangzhou 310058 China Imaging Department Tongji Hospital Tongji University Shanghai 200065 China College of Mathematics and Physics Nanjing University of Information Science and Technology Nanjing 210044 China
The functional magnetic resonance imaging (fMRI) based on blood oxygen level dependent (BOLD) contrast has emerged as one of the most potent noninvasive tools for mapping brain function and has been widely used to exp... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Threshold quantum secure direct communication without entanglement
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2008年 第2期51卷 176-183页
作者: YANG YuGuang1,3.& WEN QiaoYan2 1 College of Computer Science and technology, Beijing university of technology, Beijing 100022, China {3. of Science, Beijing university of Posts and Telecommunications, Beijing 100876, China 3.State Key Laboratory of information Security (Graduate school of Chinese Academy of Sciences), Beijing 100049, China 1. College of Computer Science and technology Beijing University of Technology Beijing 100022 China 3. State Key Laboratory of information Security (Graduate school of Chinese Academy of Sciences) Beijing 100049 China 2. school of Science Beijing University of Posts and Telecommunications Beijing 100876 China
For the first time, a threshold quantum secure direct communication (TQSDC) scheme is presented. Similar to the classical Shamir's secret sharing scheme, the sender makes n shares, S1, …, Sn of secret key K and each ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Power allocation scheme for selfish cooperative communications based on game theory and particle swarm optimizer
收藏 引用
Science China(information Sciences) 2010年 第9期53卷 1908-1912页
作者: ZHANG GuoPeng1*,YANG Kun2 & DING EnJie3.1school of Computer Science and technology,China university of Mining and technology,Xuzhou 221116,China 2school of Computer Science and electronic Engineering,university of Essex Wivenhoe Park,Colchester CO_4 3.Q,UK 3.0} of information and Electrical Engineering,China university of Mining and technology,Xuzhou 221116,China 1. school of Computer Science and technology China University of Mining and Technology Xuzhou 221116 China2. School of Computer Science and Electronic Engineering University of Essex Wivenhoe Park Colchester CO4 3SQ UK3. School of Information and Electrical Engineering China University of Mining and Technology Xuzhou 221116 China
In commercial networks,autonomous user nodes operating on batteries are assumed to be selfish to consume their energy solely to maximize their own benefits,e.g.,data *** this letter a two-user cooperative game is prop... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Multiparty simultaneous quantum identity authentication with secret sharing
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2008年 第3期51卷 321-327页
作者: YANG YuGuang1,2,WEN QiaoYan3.& ZHANG Xing4,5 1 College of Computer Science and technology,Beijing university of technology,Beijing 100022,China 2 State Key Laboratory of{3. Security (Graduate university of the Chinese Academy of Sciences),Beijing 100049,China 3.school of Science,Beijing university of Posts and Telecommunications,Beijing 100876,China 4 Institute of electronic technology,information Engineering university,Zhengzhou 450004,China 5 Trusted Computing Laboratory,Beijing university of technology,Beijing 100022,China College of Computer Science technology Beijing University of Technology Beijing 100022 China State Key Laboratory of information Security [Graduate university of the Chinese Academy of Sciences] Beijing 100049 China school of Science Beijing University of Posts Telecommunications Beijing 100876 China Institute of electronic technology Information Engineering University Zhengzhou 450004 China Trusted Computing Laboratory Beijing University of Technology Beijing 100022 China
Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the users can be authenticated by a trusted third party (TTP) simultaneously. In the first proto... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论