咨询与建议

限定检索结果

文献类型

  • 14,445 篇 期刊文献
  • 2,875 篇 会议

馆藏范围

  • 17,320 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,768 篇 工学
    • 5,103 篇 计算机科学与技术...
    • 3,034 篇 软件工程
    • 1,855 篇 机械工程
    • 1,516 篇 控制科学与工程
    • 1,323 篇 信息与通信工程
    • 1,227 篇 材料科学与工程(可...
    • 1,125 篇 仪器科学与技术
    • 923 篇 电子科学与技术(可...
    • 692 篇 网络空间安全
    • 681 篇 电气工程
    • 618 篇 化学工程与技术
    • 282 篇 动力工程及工程热...
    • 278 篇 建筑学
    • 256 篇 力学(可授工学、理...
    • 253 篇 环境科学与工程(可...
    • 239 篇 水利工程
    • 234 篇 地质资源与地质工...
  • 4,458 篇 理学
    • 1,801 篇 数学
    • 882 篇 物理学
    • 592 篇 化学
    • 556 篇 生物学
    • 499 篇 系统科学
    • 293 篇 天文学
  • 3,060 篇 管理学
    • 2,579 篇 管理科学与工程(可...
    • 240 篇 工商管理
  • 1,314 篇 教育学
    • 858 篇 教育学
    • 360 篇 体育学
  • 1,145 篇 医学
    • 689 篇 临床医学
  • 705 篇 农学
  • 531 篇 经济学
    • 483 篇 应用经济学
  • 352 篇 艺术学
    • 335 篇 设计学(可授艺术学...
  • 244 篇 文学
  • 212 篇 法学
  • 129 篇 军事学
  • 112 篇 哲学
  • 79 篇 历史学

主题

  • 164 篇 internet
  • 140 篇 计算机网络
  • 121 篇 计算机
  • 113 篇 遗传算法
  • 108 篇 xml
  • 105 篇 面向对象
  • 91 篇 设计
  • 77 篇 中国
  • 66 篇 数据挖掘
  • 66 篇 数据库
  • 61 篇 地理信息系统
  • 59 篇 网络安全
  • 56 篇 simulation
  • 52 篇 java
  • 49 篇 多媒体
  • 47 篇 关联规则
  • 42 篇 支持向量机
  • 42 篇 数据处理
  • 39 篇 特征提取
  • 39 篇 软件开发

机构

  • 569 篇 华中科技大学
  • 333 篇 中国科学技术大学
  • 322 篇 陕西师范大学
  • 248 篇 清华大学
  • 225 篇 华东师范大学
  • 191 篇 南京师范大学
  • 185 篇 电子科技大学
  • 182 篇 南京大学
  • 174 篇 北京科技大学
  • 170 篇 武汉理工大学
  • 165 篇 山东师范大学
  • 160 篇 天津大学
  • 159 篇 湖南科技大学
  • 152 篇 华中师范大学
  • 152 篇 山东大学
  • 152 篇 南京理工大学
  • 151 篇 国防科技大学
  • 151 篇 西南师范大学
  • 149 篇 首都师范大学
  • 141 篇 湖南师范大学

作者

  • 609 篇 china
  • 71 篇 p.r.china
  • 31 篇 王汝传
  • 27 篇 谢立
  • 21 篇 李涛
  • 19 篇 hubei
  • 17 篇 杨炳儒
  • 16 篇 周明天
  • 16 篇 tsinghua univers...
  • 16 篇 顾君忠
  • 15 篇 p. r. china
  • 15 篇 哈木拉提·吾甫尔
  • 14 篇 shanghai
  • 14 篇 zhejiang univers...
  • 13 篇 huazhong univers...
  • 13 篇 hangzhou
  • 13 篇 王刚
  • 13 篇 徐永健
  • 12 篇 changsha
  • 12 篇 冯玉才

语言

  • 12,055 篇 中文
  • 5,265 篇 英文
检索条件"作者=2school of computer science and technology,nanjing Normal university,nanjing 210046,china"
17320 条 记 录,以下是51-60 订阅
排序:
Entropy number and non-linear approximations on multivariate Besov space by manifolds of finite pseudo-dimension
收藏 引用
Progress in Natural science:Materials International 2006年 第3期16卷 260-265页
作者: LONG Jingfan and FANG Gensun (school of Mathematical sciences, Beijing normal university, Beijing 100875, china Department of computer science, Information technology Institute, Beijing 100101, china) school of Mathematical sciences Beijing Normal University Beijing 100875 China Department of computer science Information Technology Institute Beijing 100101 China
We determine the asymptotic order of entropy number and optimal non -linear approximations of anisotropic periodic Besov class of Bpθr(Td') (1≤p≤∞,1≤0≤∞) by manifolds of finite pseudo-dimension in the metric Lq... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A quasi-human algorithm for solving the three-dimensional rectangular packing problem
收藏 引用
science china(Information sciences) 2010年 第12期53卷 2389-2398页
作者: HE Kun & HUANG WenQi school of computer science and technology, Huazhong university of science and technology, Wuhan 430074, china school of computer science and technology Huazhong University of Science and Technology Wuhan China
Based on the concept of maximal rectangular space that can be filled at current time and the siege warfare tactics, we make several critical improvements on the quasi-human caving-degree approach to get a stronger alg... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Secure coverage-preserving node scheduling scheme using energy prediction for wireless sensor networks
收藏 引用
The Journal of china Universities of Posts and Telecommunications 2010年 第5期17卷 100-108页
作者: LI Zhi-yuan,WANG Ru-chuan. College of computer,nanjing university of Posts and Telecommunications,nanjing 210003,china College of computer Nanjing University of Posts and Telecommunications Nanjing 210003 China
With the fast development of the micro-electro-mechanical systems (MEMS),wireless sensor networks (WSNs) have been extensively *** of the studies focus on saving energy consumption because of restricted energy sup... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Exact Virtual Network Embedding Algorithm Based on Integer Linear Programming for Virtual Network Request with Location Constraint
收藏 引用
china Communications 2016年 第8期13卷 177-183页
作者: Zeheng Yang Yongan Guo school of computer science and Engineering University of Electronic Science and Technology of China(UESTC) College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications
Network virtualization is known as a promising technology to tackle the ossification of current Internet and will play an important role in the future network area. Virtual network embedding(VNE) is a key issue in net... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Alkali-silica Reactivity of Different Aggregates from Mineral and Textural Characteristics
收藏 引用
Journal of Wuhan university of technology(Materials science) 2008年 第6期23卷 901-906页
作者: 莫祥银 Analysis and Testing Center & Jiangsu Key Laboratory of Biofunctional Materials Nanjing Normal University
To identify the aggregates causing the alkali-silica reaction, and the reactivity of rocks in different parts of china, the mineral and texture characteristics of some typical coarse ag gregates and the alkali reactiv... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The Report of Virtual Exhibition Software Development
收藏 引用
Wuhan university Journal of Natural sciences 2001年 第Z1期6卷 340-346页
作者: Yu Jian xin 1, Sun Yuan hao 1, Gong Zhen yu 2, Cao Jing 2 1. State Key Laboratory for Novel Software technology, nanjing university, nanjing 210093, china 2. Department of computer science and technology, nanjing university,nanjing 210093, china State Key Laboratory for Novel Software technology Nanjing University Nanjing China Department of computer science and technology Nanjing University Nanjing China
The main structure and key techniques of our Virtual Exhibition Software are summarized. It demonstrates the practice of Software Engineering during the development of our project and discusses the use of UML in it.
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Power allocation scheme for selfish cooperative communications based on game theory and particle swarm optimizer
收藏 引用
science china(Information sciences) 2010年 第9期53卷 1908-1912页
作者: ZHANG GuoPeng1*,YANG Kun2 & DING EnJie3 1school of computer science and technology,china university of Mining and technology,Xuzhou 221116,china 2school of computer science and Electronic Engineering,university of Essex Wivenhoe Park,Colchester CO_4 3SQ,UK 3school of Information and Electrical Engineering,china university of Mining and technology,Xuzhou 221116,china school of computer science and technology China University of Mining and Technology Xuzhou China school of computer science and Electronic Engineering University of Essex Wivenhoe Park Colchester UK school of Information and Electrical Engineering China University of Mining and Technology Xuzhou China
In commercial networks,autonomous user nodes operating on batteries are assumed to be selfish to consume their energy solely to maximize their own benefits,e.g.,data *** this letter a two-user cooperative game is prop... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Adaptive bidirectional diffusion for image restoration
收藏 引用
science china(Information sciences) 2010年 第12期53卷 2452-2460页
作者: FU ShuJun 1,2 & ZHANG CaiMing 1 1 school of computer science and technology, Shandong university, Jinan 250101, china 2 school of Mathematics, Shandong university, Jinan 250100, china school of computer science and technology Shandong University Jinan China school of Mathematics Shandong University Jinan China
A large number of applications in image processing and computer vision depend on image quality. In this paper, combining the forward diffusion with the backward diffusion by different weights, we present an adaptive b... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Key technologies of new malicious code developments and defensive measures in communication networks
收藏 引用
The Journal of china Universities of Posts and Telecommunications 2010年 第4期17卷 69-73页
作者: LI Peng,WANG Ru-chuan ,ZHANG Wei College of computer,nanjing university of Posts and Telecommunications,nanjing 210003,china College of computer Nanjing University of Posts and Telecommunications Nanjing 210003 China
This article is focused on analyzing the key technologies of new malicious code and corresponding defensive measures in the large-scale communication networks. Based on description of the concepts and development of t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Theorems for Testing Local Activity of CNN and Application to Cardiac Purkinje Equations
收藏 引用
International Journal of Minerals,Metallurgy and Materials 2000年 第2期14卷 139-146页
作者: Lequan Min(Applied science school, university of science and technology Beijing, Beijing 100083, china) Applied science school University of Science and Technology Beijing Beijing 100083 China
The theorems for testing the local in one-port cellular neural/inear network (CNN) cells with four local state variables are presented. Using the theorems computes the bifurcation diagrams of the cardiac Purkinje f... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论