咨询与建议

限定检索结果

文献类型

  • 8,593 篇 期刊文献
  • 1,145 篇 会议

馆藏范围

  • 9,738 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,246 篇 工学
    • 2,542 篇 计算机科学与技术...
    • 1,605 篇 软件工程
    • 820 篇 机械工程
    • 790 篇 控制科学与工程
    • 517 篇 仪器科学与技术
    • 385 篇 材料科学与工程(可...
    • 379 篇 信息与通信工程
    • 370 篇 化学工程与技术
    • 348 篇 网络空间安全
    • 280 篇 电子科学与技术(可...
    • 150 篇 地质资源与地质工...
    • 121 篇 交通运输工程
    • 120 篇 生物工程
  • 2,468 篇 理学
    • 797 篇 数学
    • 436 篇 生物学
    • 320 篇 系统科学
    • 265 篇 化学
    • 209 篇 物理学
    • 155 篇 生态学
  • 1,655 篇 管理学
    • 1,444 篇 管理科学与工程(可...
  • 829 篇 农学
    • 264 篇 作物学
    • 198 篇 农业资源与环境
    • 146 篇 畜牧学
  • 663 篇 医学
    • 322 篇 临床医学
    • 123 篇 药学(可授医学、理...
    • 122 篇 中西医结合
  • 481 篇 教育学
    • 275 篇 教育学
    • 123 篇 体育学
  • 269 篇 经济学
    • 247 篇 应用经济学
  • 129 篇 艺术学
    • 122 篇 设计学(可授艺术学...
  • 104 篇 法学
  • 87 篇 军事学
  • 66 篇 文学
  • 43 篇 哲学
  • 25 篇 历史学

主题

  • 142 篇 计算机
  • 91 篇 计算机网络
  • 88 篇 数据挖掘
  • 65 篇 人工智能
  • 65 篇 internet
  • 61 篇 遗传算法
  • 50 篇 xml
  • 44 篇 中国
  • 41 篇 设计
  • 39 篇 体系结构
  • 38 篇 网络安全
  • 36 篇 面向对象
  • 35 篇 agent
  • 35 篇 数据库
  • 32 篇 simulation
  • 32 篇 关联规则
  • 30 篇 程序设计
  • 30 篇 系统设计
  • 30 篇 应用
  • 28 篇 计算机模拟

机构

  • 307 篇 清华大学
  • 243 篇 北京大学
  • 216 篇 北京航空航天大学
  • 208 篇 中国农业大学
  • 199 篇 首都师范大学
  • 188 篇 北京科技大学
  • 159 篇 北京理工大学
  • 156 篇 华中科技大学
  • 144 篇 四川大学
  • 134 篇 北京师范大学
  • 107 篇 北京工业大学
  • 104 篇 山东科技大学
  • 92 篇 重庆大学
  • 89 篇 电子科技大学
  • 88 篇 中南大学
  • 86 篇 武汉大学
  • 84 篇 北京化工大学
  • 78 篇 吉林大学
  • 70 篇 北京林业大学
  • 63 篇 浙江大学

作者

  • 32 篇 涂序彦
  • 20 篇 战守义
  • 19 篇 方精云
  • 18 篇 陈松乔
  • 15 篇 韩济生
  • 14 篇 王建新
  • 14 篇 杨学良
  • 14 篇 王勇
  • 14 篇 杨炳儒
  • 13 篇 周明天
  • 13 篇 傅桦
  • 13 篇 陈志刚
  • 12 篇 史美林
  • 12 篇 胡建平
  • 11 篇 唐世渭
  • 11 篇 吴重光
  • 11 篇 吴建平
  • 10 篇 熊光泽
  • 10 篇 顾毓清
  • 10 篇 陆玉昌

语言

  • 6,431 篇 中文
  • 3,307 篇 英文
检索条件"作者=Beijing 2 College of Computer Science"
9738 条 记 录,以下是1-10 订阅
排序:
Evolutionary Dynamics of Multi-agent Formation
Evolutionary Dynamics of Multi-agent Formation
收藏 引用
2009中国控制与决策会议
作者: Jin Qin~(1,2),Xiaojuan Ban~1,Xin Li~(1,3) 1.college of Information Engineering,University of science & Technology beijing,beijing,100083 2.college of computer science & Technology,Guizhou University,Guiyang,550025 3.college of Information science and Engineering,Henan University of Technology,Zhengzhou,450052
<正>To probe into the internal mechanism of multi-agent formation,game theory is used to model the interaction between agents and Win-Stay-Lose-Shift strategy to instruct agents’ *** are introduced to formulate how... 详细信息
来源: cnki会议 评论
Protein Secondary Structure Prediction Based on Improved SVM Method in Compound Pyramid Model
Protein Secondary Structure Prediction Based on Improved SVM...
收藏 引用
2010 Chinese Control and Decision Conference
作者: Bingru Yang~1,Wu Qu~1,Yun Zhai~(1,2),Haifeng Sui~1 1.School of Information Engineering,University of science and Technology beijing,beijing 100083 2.college of computer science,Liaocheng University Liaocheng,252059,China
<正>Methods for predicting protein secondary structure provide information that is useful both in ab initio structure prediction and as additional restraints for fold recognition *** structure predictions may also b... 详细信息
来源: cnki会议 评论
基于数据仓库的EIS数据管理体系结构
收藏 引用
计算机工程与应用 2003年 第19期39卷 17-20页
作者: 王锁柱 孙玉芳 中国科学院软件研究所 山西师范大学数学与计算机学院 临汾041004
该文采用数据仓库的思想构建了EIS的数据管理体系结构,以满足EIS的数据分布性、格式多样性和结构复杂性的要求,克服了现有EIS响应速度低、可用性差等方面的缺陷。在该体系结构中,分别设置了硬信息获取、软信息挖掘模块和硬软信息集成、... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Theory and techniques of data mining in CGF behavior modeling
收藏 引用
science China(Information sciences) 2011年 第4期54卷 717-731页
作者: YIN YunFei 1,2,GONG GuangHong 2 & HAN Liang 2 1 college of computer science,Chongqing University,Chongqing 400044,China 2 School of Automation science and Electrical Engineering,beijing University of Aeronautics and Astronautics,beijing 100083,China college of computer science Chongqing University Chongqing China School of Automation science and Electrical Engineering Beijing University of Aeronautics and Astronautics Beijing China
For the large quantity of data,rules and models generated in the course of computer generated forces (CGFs) behavior modeling,the common analytical methods are statistical methods based on the tactical rules,tactical ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
The structural analysis of fuzzy measures
收藏 引用
science China(Information sciences) 2011年 第1期54卷 38-50页
作者: ZHANG Ling1,ZHANG Bo2 & ZHANG YanPing1 1 computer science college,Anhui University,Hefei 230039,China 2State Key Lab of Intelligent Technology & Systems Tsinghua National Lab for Information science & Technology Information science & Technology college,computer science & Technology,Tsinghua University,beijing 100084,China computer science college Anhui University Hefei China State Key Lab of Intelligent Technology & Systems Tsinghua National Lab for Information science & Technology Information science & Technology college Computer Science & Technology Tsinghua University Beijing China
From quotient space based granular computing theory we explore the fuzzy measures of fuzzy sets. Based on the structural analysis of fuzzy sets,we present an"isotropism"*** this assumption we achieved the following in... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cu(Ⅱ) Potentiation of Alzheimer Aβ1-40 Cytotoxicity and Transition on its Secondary Structure
收藏 引用
Acta Biochimica et Biophysica Sinica 2006年 第11期38卷 765-772页
作者: Xue-Ling DAI~1 Ya-Xuan SUN~2 Zhao-Feng JIANG~2* 1 college of Life science,Capital Normal University,beijing 100037,China 2 college of Applied sciences and Humanities,beijing Union University,beijing 100083,China college of Life science Capital Normal UniversityBeijing 100037 China college of Applied sciences and Humanities Beijing Union UniversityBeijing 100083 China
Mounting evidence has shown that dyshomeostasis of the redox-active biometals such as Cuand Fe can lead to oxidative stress,which plays a key role in the neuropathology of Alzheimer's disease(AD).Here we demonstrate... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Theoretical analysis of alloy multiplying factor by the empirical electron theory of solids and molecules
收藏 引用
science China(Technological sciences) 2007年 第6期50卷 807-814页
作者: SONG YuePeng1,2, LIU GuoQuan2, LI ZhiLin3, FENG ChengMing1 1 Mechanical and Electronic Engineering college, Shandong Agricultural University, Tai’an 271018, China 2 college of Materials science and Engineering, University of science and Technology, beijing 100083, China 3 college of Material science and Engineering, beijing University of Chemical Technology, beijing 100029, China Mechanical and Electronic Engineering college Shandong Agricultural University Tai’an China college of Materials science and Engineering University of Science and Technology Beijing China college of Material science and Engineering Beijing University of Chemical Technology Beijing China
By introducing the distribution probability of structural units in austenite contain- ing alloying elements and considering its effects on phase transformation, this paper establishes a calculation model of distributi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold quantum secure direct communication without entanglement
收藏 引用
science China(Physics,Mechanics & Astronomy) 2008年 第2期51卷 176-183页
作者: YANG YuGuang1,3 & WEN QiaoYan2 1 college of computer science and Technology, beijing University of Technology, beijing 100022, China 2 School of science, beijing University of Posts and Telecommunications, beijing 100876, China 3 State Key Laboratory of Information Security (Graduate School of Chinese Academy of sciences), beijing 100049, China college of computer science and Technology Beijing University of Technology Beijing China State Key Laboratory of Information Security (Graduate School of Chinese Academy of sciences) Beijing China School of science Beijing University of Posts and Telecommunications Beijing China
For the first time, a threshold quantum secure direct communication (TQSDC) scheme is presented. Similar to the classical Shamir's secret sharing scheme, the sender makes n shares, S1, …, Sn of secret key K and each ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Analysis of a kind of quantum cryptographic schemes based on secret sharing
收藏 引用
science China(Physics,Mechanics & Astronomy) 2009年 第9期52卷 1313-1316页
作者: ZHANG XingLan1 & JI DongYao2 1 college of computer science and Technology, beijing University of Technology, beijing 100124, China 2 State Key Laboratory of Information Security, Graduate University of Chinese Academy of sciences, beijing 100049, China college of computer science and Technology Beijing University of Technology Beijing China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing China
Recently, Yang et al. proposed a kind of quantum cryptographic schemes based on secret sharing. The main idea is drawn from the case, where any n participants who share a secret K can co-operate as K does. This proces... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Protective Effects of Vitamin E against Oxidative Damage Induced by Aβ(1-40)Cu(Ⅱ)Complexes
收藏 引用
Acta Biochimica et Biophysica Sinica 2007年 第2期39卷 123-130页
作者: Xueling DAI~1 Yaxuan SUN~2 and Zhaofeng JIANG~2 ~1college of Life science,Capital Normal University,Bejing 100037,China ~2college of Applied sciences Humanities of beijing Union University,beijing 100083,China college of Life science Capital Normal UniversityBeijing 100037 China college of Applied sciences and Humanities of beijing Union Universitybeijing 100083 China
β-amyloid peptide (Aβ) is considered to be responsible for the formation of senile plaques,which is the hallmark of Alzheimer's disease (AD).Oxidative stress,manifested by protein oxidation andlipid peroxidation... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论