论文、著作检索证明

合集下载

线上线下,三种途径开具检索证明

线上线下,三种途径开具检索证明

线上线下,三种途径开具检索证明在学术论文发表中,只有证明论文被检索才是文章成功发表的最终标志,证明文章被检索一是打印检索页面,二是开具检索证明,绝大所数论文是不需要开具检索证明的,目前只有四个数据库查到自己的论文需要开具论文的检索/收录证明,分别是Web of Science系列数据库(SCI/SSCI)、EI-Compendex 和CSSCI和CSCD,其他检索系统无需开具检索证明。

一般来说,出具检索证书是科技查新站(一般是高校图书馆)的工作!值得一提的是,如果单位是大学附属医院或者大学附属其他单位,也可以在大学图书馆开具这种检索证明。

当然,去大学图书馆开检索证明也有不便的时候,比如,不是每所大学都有开具SCI检索证明相应资质与服务的,同时,疫情背景下部分高校仍在封校,即将到来的寒暑假期间高校图书馆也会休假等等。

这种时候我们可以找一下所在地的市级科研情报中心/文献信息情报中心在哪里,这些单位也提供科技查新和检索证明等服务,而且不会有进出和寒暑假的问题,而且基本在各省各地都有设立,如:如果您现在实在不方便到实地去开具检索证明,又十分急需这项服务的话,也可以通过国家图书馆的网络平台在线上申请开具SCI/SSCI/EI检索报告,具体步骤如下:1.访问中国国家图书馆咨询提交平台:2.点击论文收引查证3.填写资料,、论文题目、期刊名称、年卷期、页码等4.确认提交后,一般一天后会收到国图委托已受理的邮件5.和电话确认,在与工作人员确认时,可以商定出报告的时间,要求加急6.在提交委托后的第三天,会收到一封标题为“论文检索报告收费通知及电子版报告”的邮件,委托人需要核对完收费、邮寄地址等信息后,回复邮件。

7.付款,线上委托,服务费加邮递费(京津冀地区15元起,国内其他地区25元起)加起来一般是100-150元,比前两种方式要贵一点。

完成以上步骤后,就可以等待检索证书的到来了!。

北大核心检索证明

北大核心检索证明

北大核心检索证明
北大核心检索证明是指论文被北京大学核心期刊检索系统收录的证明
文件。

北大核心期刊是高质量学术期刊的代表之一,其收录成为很多
学者和研究机构评价研究成果质量的重要指标。

那么,如何获得北大核心检索证明呢?
首先,提交论文至北大核心期刊进行发表,只有被期刊正式录用并发
表后,才能获得北大核心检索证明。

因此,首先需要找到符合研究方
向的北大核心期刊,认真阅读期刊要求并提交论文。

其次,根据期刊审核意见进行修改,直到论文得到正式录用并发表。

北大核心期刊对稿件质量要求严格,因此需要认真把握每一个细节,
注重论文的逻辑和思路,做到科学、严谨、立论清晰。

在论文撰写过
程中,合理使用国内外的学术文献并注重参考文献格式的规范化,也
是获得北大核心检索证明的重要一步。

最后,获得发表论文的期刊提供的北大核心检索证明文件。

需要注意
的是,北大核心期刊对发表论文的核心杂志要求也很高,因此发表论
文的涵盖范围应该尽量扩大,在期刊选择上要综合考虑期刊的影响力、学术水平以及稿件接受率等指标。

在现如今,学术界的竞争越来越激烈,内外评估机制日益完善,北大核心检索证明已成为标志性地位的证明,对学术研究者和研究机构的学术声誉和学术地位都有极大的推动作用。

当然,在获得北大核心检索证明后,我们更应该继续努力在学术研究领域取得更多的成果。

论文检索报告怎么弄

论文检索报告怎么弄

论文检索报告怎么弄
论文检索报告怎么弄?检索报告是证明论文成功发表并且被检索收录的最有力证明,发表学术论文在很多情况下需要提交文章的检索报告,检索报告不是检索页面的打印页,而是一份专门的证明,需要特定机构开具,这一点一定要区分清楚。

检索报告也并不是任何类型的期刊都可以开具的,也就是说目前我们常用的数据库有很多是无法开具检索报告的,按照国内学术评价一般通用标准,常用开具证明的数据库有SCIE、SSCI、EI 、CSSCI,只有发表这几类学术论文的才能通过既定程序申请开具检索报告,其他论文也无需开具检索报告。

申请检索报告,需要通过图书馆信息服务平台申请,填写相关委托表格。

学科馆员将根据委托依次处理提交的论文。

如果无法从数据库中检索到论文,自然无法出具检索报告,如果从数据库以外的其他平台检索到论文,也无法出具检索报告。

如果需要同时发表几篇论文,需要了解如何发表,是分别发表还是分开发表,分区和影响因子应该是最新的还是发表的年份。

这些问题需要与相关工作人员进行协调和沟通。

华电论文检索证明报告模板

华电论文检索证明报告模板

论文收录检索证明报告华北电力大学图书馆论文作者: Zhuxiao,Wang; Wang,Zhuxiao论文发表年限: 2012-2015检索数据库: Ei Compendex检索结果 :8篇收录Title:1. An Extension of Distributed Dynamic Description Logics for the Representation of Heterogeneous Mappings2. An architecture description language based on dynamic description logics for self-healing systems3. An architecture description language based on dynamic description logics4. An Architecture Dynamic Modeling Language for Self-Healing Systems5. A Tableau-Based Reasoning Algorithm for Distributed Dynamic Description Logics6.A formal model for attack mutation using dynamic description logics7. Linear cryptanalysis and security tradeoff of block ciphering systems with channel errors8. Research on sentiment analysis in sentence and text levels with priors特此证明!(盖章)检索报告人:年月日附件:收录情况:1. Accession number: 20132016337096Title: An extension of distributed dynamic description logics for the representation of heterogeneous mappingsAuthors: Wang, Zhuxiao1 ; Guo, Jing2 ; Chen, Fei3 ; Wu, Kehe3 ; Wang, Peng4Author affiliation: 1 School of Control and Computer Engineering, State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, 102206 Beijing, China2 National Computer Network Emergency Response Technical Team, Coordination Center of China, 100029 Beijing, China3 School of Control and Computer Engineering, North China Electric Power University, 102206 Beijing, China4 Institute of Information Engineering, Chinese Academy of Sciences, 100195 Beijing, China Corresponding author: Wang,Z.(****************.cn)Source title: Journal of SoftwareAbbreviated source title: J. Softw.Volume: 8Issue: 1Issue date: 2013Publication year: 2013Pages: 243-250Language: EnglishISSN: 1796217XDocument type: Journal article (JA)Publisher: Academy Publisher, P.O.Box 40,, OULU, 90571, FinlandAbstract: As a family of dynamic description logics, DDL(X) is constructed by embracing actions into the description logic X, where X represents well-studied description logics ranging from the ALC to the SHOIQ. To efficiently support automated interoperability between ontology-based information systems in distributed environments, we have to design an expressive mapping language to semantically understand resources from remote and heterogeneous systems. Distributed Dynamic Description Logics D3L(X) is a natural generalization of the DDL(X) framework, which is designed to model the distributed dynamically-changing knowledge repositories interconnected by semantic mappings and to accomplish reasoning in distributed, heterogeneous environments. In this paper, we propose an extension of Distributed Dynamic Description Logics D3L(X) and investigate the reasoning mechanisms in D3L(X). © 2013 ACADEMY PUBLISHER.Number of references: 16Main heading: Data descriptionControlled terms: Formal languages - Interoperability - Mapping - Semantics Uncontrolled terms: Distributed Dynamic Description Logics - Distributed reasonings - Dynamic description logic - Semantic mapping - Tableau algorithmClassification code: 716 Telecommunication; Radar, Radio and Television - 717 Optical Communication - 718 Telephone Systems and Related Technologies; Line Communications -723 Computer Software, Data Handling and Applications - 902.1 Engineering Graphics - 903.2 Information DisseminationDOI: 10.4304/jsw.8.1.243-250Database: CompendexCompilation and indexing terms, © 2013 Elsevier Inc.2. Accession number: 20124415623183Title: An architecture description language based on dynamic description logics for self-healing systemsAuthors: Wang, Zhuxiao1 ; Peng, Hui2 ; Guo, Jing3 ; Wu, Kehe4 ; Cui, Wenchao4 ; Wang, Xiaofeng5Author affiliation: 1 School of Control and Computer Engineering, State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, Beijing 102206, China2 Education Technology Center, Beijing International Studies University, Beijing 100024, China3 National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, China4 School of Control and Computer Engineering, Institute of Electric Information Security Engineering Research Center of Power Information, North China Electric Power University, Beijing 102206, China5 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China Corresponding author: Wang,Z.(****************.cn)Source title: International Journal of Advancements in Computing Technology Abbreviated source title: Intl. J. Adv. Comput. Technolog.Volume: 4Issue: 18Issue date: October 2012Publication year: 2012Pages: 89-96Language: EnglishISSN: 20058039E-ISSN: 22339337Document type: Journal article (JA)Publisher: Advanced Institute of Convergence Information Technology, Myoungbo Bldg 3F,, Bumin-dong 1-ga, Seo-gu, Busan, 602-816, Korea, Republic ofAbstract: As biological systems exhibit adaptation, healing and robustness in the face of changing environmental behavior, this paradigm has actuated research dealing with the concept of self-healing systems, which attempt to heal themselves in the sense of recovering from malicious attacks and rectifying of system faults. The goal of self-healing systems is to provide survivable systems that require high dependability, robustness, adaptability, and availability. Such systems maintain one or more models, whether external or internal, at run time as a basis for identifying problems and resolving them. This article describes an architectural description language, called ADML, which is being developed as a new formal language and/or conceptual model forrepresenting evolving software architectures. The ADML embraces dynamic change as a fundamental consideration, supports a broad class of adaptive changes at the architectural level, and offers a uniform way to represent and reason about both static and dynamic aspects of self-healing systems. Because the ADML is based on the Dynamic Description Logic DDL(SHON (D)), which can represent both dynamic semantics and static semantics under a unified logical framework, architectural ontology entailment for the ADML languages can be reduced to knowledge base satisfiability in DDL(SHON (D)), and dynamic description logic algorithms and implementations can be used to provide reasoning services for ADML. In this article, we present the syntax of ADML, explain its underlying semantics using the Dynamic Description Logic DDL(SHON (D)), and exemplify our approach by applying it to the domain of load balancing a wireless remote-access system; the preliminary results certify the potential of the approach. Number of references: 14Main heading: Data descriptionControlled terms: Formal languages - Knowledge based systems - Knowledge representation - Semantics - Software architectureUncontrolled terms: Architecture description languages - Dynamic adaptations - Dynamic description logic - Knowledge representation and reasoning - Self-healing systemsClassification code: 723 Computer Software, Data Handling and Applications - 903.2 Information DisseminationDOI: 10.4156/ijact.vol4.issue 18.11Database: CompendexCompilation and indexing terms, © 2013 Elsevier Inc.3. Accession number: 20125015790730Title: An architecture description language based on dynamic description logicsAuthors: Wang, Zhuxiao1 ; Peng, Hui2 ; Guo, Jing3 ; Zhang, Ying1 ; Wu, Kehe1 ; Xu, Huan1 ; Wang, Xiaofeng4Author affiliation: 1 School of Control and Computer Engineering, State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, Beijing 102206, China2 Education Technology Center, Beijing International Studies University, Beijing 100024, China3 National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, China4 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China Corresponding author: Wang,Z.(****************.cn)Source title: IFIP Advances in Information and Communication TechnologyAbbreviated source title: IFIP Advances in Information and Communication Technology Volume: 385 AICTMonograph title: Intelligent Information Processing VI - 7th IFIP TC 12 International Conference, IIP 2012, ProceedingsIssue date: 2012Publication year: 2012Pages: 157-166Language: EnglishISSN: 18684238ISBN-13: 9783642328909Document type: Conference article (CA)Conference name: 7th IFIP International Conference on Intelligent Information Processing, IIP 2012Conference date: October 12, 2012 - October 15, 2012Conference location: Guilin, ChinaConference code: 94249Sponsor: IFIP TC12; Guilin University of Electronic Technology; Chinese Academy of Sciences, Institute of Computing TechnologyPublisher: Springer New York, 233 Spring Street, New York, NY 10013-1578, United States Abstract: ADML is an architectural description language based on Dynamic Description Logic for defining and simulating the behavior of system architecture. ADML is being developed as a new formal language and/or conceptual model for representing the architectures of concurrent and distributed systems, both hardware and software. ADML embraces dynamic change as a fundamental consideration, supports a broad class of adaptive changes at the architectural level, and offers a uniform way to represent and reason about both static and dynamic aspects of systems. Because the ADML is based on the Dynamic Description Logic DDL( (D)), which can represent both dynamic semantics and static semantics under a unified logical framework, architectural ontology entailment for the ADML languages can be reduced to knowledge base satisfiability in DDL( (D)), and dynamic description logic algorithms and implementations can be used to provide reasoning services for ADML. In this article, we present the syntax of ADML, explain its underlying semantics using the Dynamic Description Logic DDL( (D)), and describe the core architecture description features of ADML. © 2012 IFIP International Federation for Information Processing.Number of references: 14Main heading: Data descriptionControlled terms: Formal languages - Knowledge based systems - Knowledge representation - Semantics - Software architectureUncontrolled terms: Architectural description languages - Architectural levels - Architecture description - Architecture description languages - Conceptual model - Distributed systems - Dynamic adaptations - Dynamic changes - Dynamic description logic - Dynamic semantic - Hardware and software - Knowledge base - Knowledge representation and reasoning - Logical frameworks - ON dynamics - Satisfiability - Static and dynamic - Static semantics - System architecturesClassification code: 723 Computer Software, Data Handling and Applications - 903.2 Information DisseminationDOI: 10.1007/978-3-642-32891-6_21Database: CompendexCompilation and indexing terms, © 2013 Elsevier Inc.4. Accession number: 20121214883239Title: An architecture dynamic modeling language for self-healing systemsAuthors: Wang, Zhuxiao1 ; Guo, Jing2; Wu, Kehe1; He, Hui1; Chen, Fei1Author affiliation: 1 School of Control and Computer Engineering, State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, Beijing 102206, China2 National Computer Network Emergency Response Technical Team, Coordination Center of China, Beijing 100029, ChinaCorresponding author: Wang,Z.(****************.cn)Source title: Procedia EngineeringAbbreviated source title: Procedia Eng.Volume: 29Monograph title: 2012 International Workshop on Information and Electronics Engineering Issue date: 2012Publication year: 2012Pages: 3909-3913Language: EnglishISSN: 18777058Document type: Conference article (CA)Conference name: 2012 International Workshop on Information and Electronics Engineering, IWIEE 2012Conference date: March 10, 2012 - March 11, 2012Conference location: Harbin, ChinaConference code: 89020Sponsor: Harbin University of Science and Technology; International Science and Engineering Research CenterPublisher: Elsevier Ltd, Langford Lane, Kidlington, Oxford, OX5 1GB, United Kingdom Abstract: As modern software-based systems increase in complexity, recovery from malicious attacks and rectification of system faults become more difficult, labor-intensive, and error-prone. These factors have actuated research dealing with the concept of self-healing systems, which employ architectural models to monitor system behavior and use inputs obtaining therefore to adapt themselves to the run-time environment. Numerous architectural description languages (ADLs) have been developed, each providing complementary capabilities for architectural development and analysis. Unfortunately, few ADLs embrace dynamic change as a fundamental consideration and support a broad class of adaptive changes at the architectural level. The Architecture Dynamic Modeling Language (ADML) is being developed as a new formal language and/or conceptual model for representing dynamic software architectures. The ADML couple the static information provided by the system requirements and the dynamic knowledge provided by tactics, and offer a uniform way to represent and reason about both static and dynamic aspects of self-healing systems. Because the ADML is based on the Dynamic Description Logic DDL, architectural ontology entailment for the ADML languages can be reduced to knowledge base satisfiability in DDL. © 2011 Published by Elsevier Ltd.Number of references: 10Main heading: ArchitectureControlled terms: Data description - Electronics engineering - Embedded systems -Formal languages - Knowledge based systems - Knowledge representation - Software architectureUncontrolled terms: Architecture description languages - Dynamic adaptation - Dynamic description logic - Knowledge representation and reasoning - Self-healing systemsClassification code: 723 Computer Software, Data Handling and Applications - 722 Computer Systems and Equipment - 718 Telephone Systems and Related Technologies; Line Communications - 717 Optical Communication - 716 Telecommunication; Radar, Radio and Television - 715 Electronic Equipment, General Purpose and Industrial - 714 Electronic Components and Tubes - 713 Electronic Circuits - 402 Buildings and TowersDOI: 10.1016/j.proeng.2012.01.593Database: CompendexCompilation and indexing terms, © 2013 Elsevier Inc.5. Accession number: 20124315590040Title: A tableau-based reasoning algorithm for distributed dynamic description logics Authors: Wang, Zhuxiao1 ; Guan, Zhitao1 ; Li, Wei1 ; Wu, Kehe1 ; Guo, Jing2 ; Tian, Guanhua3Author affiliation: 1 School of Control and Computer Engineering, State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, 102206 Beijing, China2 National Computer Network Emergency Response Technical Team, Coordination Center of China, 100029 Beijing, China3 Institute of Automation, Chinese Academy of Sciences, 100190 Beijing, China Corresponding author: Wang,Z.(****************.cn)Source title: Communications in Computer and Information ScienceAbbreviated source title: Commun. Comput. Info. Sci.Volume: 307 CCISIssue: PART 1Monograph title: Information Computing and Applications - Third International Conference, ICICA 2012, ProceedingsIssue date: 2012Publication year: 2012Pages: 192-199Language: EnglishISSN: 18650929ISBN-13: 9783642340376Document type: Conference article (CA)Conference name: 3rd International Conference on Information Computing and Applications, ICICA 2012Conference date: September 14, 2012 - September 16, 2012Conference location: Chengde, ChinaConference code: 93206Sponsor: National Science Foundation of China; Hunan Institute of Engineering; YanshanUniversity; Northeastern University at Qinhuangdao; Chengde Petroleum CollegePublisher: Springer Verlag, Tiergartenstrasse 17, Heidelberg, D-69121, Germany Abstract: As a family of dynamic description logics, DDL(X) is constructed by embracing actions into the description logic X, where X represents well-studied description logics ranging from the ALC to the SHOIQ. The usage of distributed computation techniques in reasoning is an important premise for the adoption of Dynamic Description Logics in a real-world setting. Practical scalability of DDL(X) reasoning inspired recently a proposal of Distributed Dynamic Description Logics (D3L) framework. D3L is a natural generalization of the DDL(X) framework, which is designed to model the distributed dynamically-changing knowledge repositories interconnected by semantic mappings and to accomplish reasoning in distributed, heterogeneous environments. In this paper, we investigate the reasoning mechanisms in D3L and propose a tableau-based reasoning algorithm for D3L, built as a composition of the state of the art tableaux reasoners for DDL(X). © 2012 Springer-Verlag.Number of references: 15Main heading: Data descriptionControlled terms: Algorithms - Formal languages - Inference engines - Semantics Uncontrolled terms: Description logic - Distributed computations - Distributed dynamics - Distributed Reasoning - Dynamic description logic - Heterogeneous environments - Knowledge repository - Natural generalization - Reasoning algorithms - Reasoning mechanism - Semantic mapping - State of the art - Tableau algorithm - Tableaux reasonersClassification code: 723 Computer Software, Data Handling and Applications - 903.2 Information Dissemination - 921 MathematicsDOI: 10.1007/978-3-642-34038-3_27Database: CompendexCompilation and indexing terms, © 2013 Elsevier Inc.6. Accession number: 20150400451745Title: A formal model for attack mutation using dynamic description logicsAuthors: Wang, Zhuxiao1 Email author ****************.cn;Guo, Jing2 Email ********************************;Shi,******************************.cn;He,Hui1Email author ***************.cn;Zhang, Ying1 Email author *******************.cn;Peng, Hui3 ***************************.cn;Tian,*************************************.cn Author affiliation: 1 School of Control and Computer Engineering, State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, Beijing, China2 National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China3 Education Technology Center, Beijing International Studies University, Beijing, China4 Institute of Automation, Chinese Academy of Sciences, Beijing, ChinaCorresponding author: Wang, ZhuxiaoSource title: IFIP Advances in Information and Communication TechnologyAbbreviated source title: IFIP Advances in Information and Communication Technology V olume: 432V olume title: Intelligent Information Processing VII - 8th IFIP TC 12 International Conference, IIP 2014, ProceedingsIssue date: 2014Publication year: 2014Pages: 303-311Language: EnglishISSN: 18684238ISBN-13: 9783662449790Document type: Journal article (JA)Publisher: Springer New York LLCAbstract: All currently available Network-based Intrusion Detection Systems (NIDS) rely upon passive protocol analysis which is fundamentally flawed as an attack can evade detection by exploiting ambiguities in the traffic stream as seen by the NIDS. We observe that different attack variations can be derived from the original attack using simple transformations. This paper proposes a semantic model for attack mutation based on dynamic description logics (DDL(X)), extensions of description logics (DLs) with a dynamic dimension, and explores the possibility of using DDL(X) as a basis for evasion composition. The attack mutation model describes all the possible transformations and how they can be applied to the original attack to generate a large number of attack variations. Furthermore, this paper presents a heuristics planning algorithm for the automation of evasion composition at the functional level based on DDL(X). Our approach employs classical DL-TBoxes to capture the constraints of the domain, DL-ABoxes to present the attack, and DL-formulas to encode the objective sequence of packets respectively. In such a way, the evasion composition problem is solved by a decidable tableau procedure. The preliminary results certify the potential of the approach. © IFIP International Federation for Information Processing 2014.Number of references: 9Main heading: Data descriptionControlled terms: Algorithms - Formal languages - Intrusion detection - Knowledge representation - SemanticsUncontrolled terms: Advanced evasion techniques - Dynamic description logic - Intrusion detection/prevention systems - Knowledge representation and reasoning - MultiprotocolsClassification code: 723 Computer Software, Data Handling and Applications - 903.2 Information DisseminationDatabase: CompendexCompilation and indexing terms, © 2015 Elsevier Inc.7. Accession number: 20130115855490Title: Linear cryptanalysis and security tradeoff of block ciphering systems with channel errorsAuthors: Guo, Jing1 ; Wang, Zhuxiao2Author affiliation: 1 National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC), Beijing 100029, China2 School of Control and Computer Engineering, State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, Beijing 102206, ChinaCorresponding author: Guo,J.(**************************)Source title: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)Abbreviated source title: Lect. Notes Comput. Sci.Volume: 7645 LNCSMonograph title: Network and System Security - 6th International Conference, NSS 2012, ProceedingsIssue date: 2012Publication year: 2012Pages: 405-416Language: EnglishISSN: 03029743E-ISSN: 16113349ISBN-13: 9783642346002Document type: Conference article (CA)Conference name: 6th International Conference on Network and System Security, NSS 2012 Conference date: November 21, 2012 - November 23, 2012Conference location: Wuyishan, Fujian, ChinaConference code: 94688Publisher: Springer Verlag, Tiergartenstrasse 17, Heidelberg, D-69121, Germany Abstract: Channel errors are usually treated as an obstacle in designing an encrypted wireless system. So we are supposed to reduce them as much as possible due to the potential error bursts contributed by an avalanche effect of block ciphers. In this paper, we propose that channel errors are to be explored for the benefit of security enhancement as they could be translated to additional efforts in cryptanalysis for an adversary node. To achieve this, a system with an outer block channel coder and an inner block cipher is presented. A framework for linear cryptanalysis is established under which an eavesdropper takes advantage of linear relationship among coded symbols, as well as linear approximation of ciphers. Also presented is an analysis on the tradeoff between security enhancement and performance degradation in the presence of channel errors. © 2012 Springer-Verlag.Number of references: 13Main heading: CryptographyControlled terms: Commerce - Errors - Network securityUncontrolled terms: Avalanche effects - Block ciphers - Channel error - Coded symbols - Linear approximations - Linear cryptanalysis - Linear relationships - Performance degradation - Potential errors - Security enhancements - Wireless systems Classification code: 723 Computer Software, Data Handling and Applications - 731 Automatic Control Principles and Applications - 911.2 Industrial Economics - 921 MathematicsDOI: 10.1007/978-3-642-34601-9_31Database: CompendexCompilation and indexing terms, © 2013 Elsevier Inc.8. Accession number: 20123915464951Title: Research on sentiment analysis in sentence and text levels with priorsAuthors: He, Hui1, 3 ; Chen, Bo2 ; Wang, Zhuxiao3Author affiliation: 1 School of Control and Computer Engineering, North China Electric Power University, Beijing, China2 Beijing University of Posts and Telecommunications, Beijing, China3 Postdoctoral Working Station, China United Network Communications Group Company Limited, Beijing, ChinaCorresponding author: He,H.(****************)Source title: International Journal of Digital Content Technology and its Applications Abbreviated source title: Int. J. Digit. Content Technol. Appl.Volume: 6Issue: 15Issue date: August 2012Publication year: 2012Pages: 518-525Language: EnglishISSN: 19759339E-ISSN: 22339310Document type: Journal article (JA)Publisher: Advanced Institute of Convergence Information Technology, 707 Seokjang-dong, Gyeongju, BI Center, Room 207, Gyeongju, Gyeongbuk, 780-714, Korea, Republic of Abstract: Recently, sentiment analysis of text is becoming a hotspot in the study of natural language processing, which has drawn interesting attention due to its research value and extensive applications. This paper introduces a sentiment analysis system, which is to satisfy two aspects of sentiment analysis requirement in sentence and text levels. They are sentence orientation analysis and text sentiment retrieval. An improved Maximum Entropy (MaxEnt) with priors is used to judge the sentence orientation, which combined with Indri is used to retrieve sentiment texts according to interested terms. This sentiment analysis system has been applied in Chinese Opinion Analysis Evaluation (COAE). Promising results and analysis are presented at the end of this paper. Number of references: 26Main heading: Maximum entropy methodsControlled terms: Computational linguistics - Data mining - Information retrieval - Natural language processing systemsUncontrolled terms: Hot spot - Indri - Maximum entropy - NAtural language processing - Opinion analysis - Orientation analysis - Prior - Sentiment analysis Classification code: 716.1 Information Theory and Signal Processing - 721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory, Programming Theory - 723.2 Data Processing and Image Processing - 723.5 Computer ApplicationsDOI: 10.4156/jdcta.vol6.issue15.59Database: CompendexCompilation and indexing terms, © 2013 Elsevier Inc.。

爱思唯尔的论文检索证明

爱思唯尔的论文检索证明

爱思唯尔的论文检索证明
目录
一、基本信息
二、数据库浏览
三、数据库检索与应用
一、基本信息
ScienceDirect是荷兰爱思唯尔(Elsevier)旗下的全文数据库,包涵2500多种期刊和11000多种电子图书。

涉及众多学科:数学、物理、化学、天文学、医学、生命科学、商业、及经济管理、社会科学等,可以同时检索书籍和期刊,是开展文献调研强有力的工具。

二、数据库浏览
三、数据库检索与应用
ScienceDirect检索分为简单检索和高级检索。

简单检索在首页即可完成,输入关键词、作者、期刊/书名等信息即可完成检索。

ScienceDirect支持对检索到的文献直接进行全文下载、查看摘要,以及输出到相关文献管理软件,便于文献的整理。

在文献页面可以查看引文标题、作者、期刊等信息,不仅可以直接链接到全文,也可以直接查找引用文献在文章中的位置。

选择高级检索,可进一步限定期刊、作者、标题等,检索更准确。

sci、ei、ssci收录检索证明

sci、ei、ssci收录检索证明

sci、ei、ssci收录检索证明一、概述科学家的学术成就往往需要在国际主流学术期刊上发表文章,而SCI、EI、SSCI等收录检索证明成为衡量学术成就的重要标准之一。

本文将详细介绍SCI、EI、SSCI的概念、特点以及获取收录检索证明的方法。

二、SCI、EI、SSCI的概念1. SCI(Science Citation Index)SCI属于Web of Science(WoS)数据库的一部分,是世界著名的科技文献检索工具,由美国康普公司创办。

SCI覆盖了包括自然科学、社会科学、艺术人文等多个领域的学术期刊,被广泛认可为国际学术界的权威数据库之一。

2. EI(Engineering Index)EI是由美国工程师学会开发的一种专业领域的文献检索工具,其收录范围主要包括工程技术和应用科学领域的学术文献。

EI数据库集成了包括EI Compendex、Inspec、Data Citation Index等多个数据库,被工程技术领域的研究人员广泛使用。

3. SSCI(Social Sciences Citation Index)SSCI也属于Web of Science数据库,主要收录了社会科学领域的学术期刊,包括政治学、经济学、社会学、传播学等多个学科领域的文献,并为学术研究人员提供了检索、引文分析和作者排名等功能。

以上三种收录索引都是学术界和科研机构对学术成果进行评价和衡量的重要参考依据,因此获取SCI、EI、SSCI的收录检索证明对于提升个人学术声誉和研究成果的国际影响力至关重要。

三、SCI、EI、SSCI收录检索证明的取得方法1. 通过学术期刊投稿要获取SCI、EI、SSCI的收录检索证明,一种常见的方法是通过向相关学术期刊投稿并最终被录用发表论文。

学术期刊的SCI、EI、SSCI 收录情况通常可以在期刊的冠方全球信息站上查阅,作者在投稿时可以选择已经被这些数据库收录的期刊进行投稿,提高文章最终被录用的机会。

引证检索证明

引证检索证明

引证检索证明一、检索要求1、被检作者:#### (邮箱: ####)2、作者单位:中国科学院物理研究所3、检索目的:####4、论文发表年限:####-####年5、提供待检索论文篇数:N篇(在Search工具中检索)二、检索范围三、检索结果1.收录:●有M篇被SCI收录(见附件一)2.引用:●WOS:M篇在Web of Science中的检索结果(见附件一):检索报告人:检索单位:中国科学院物理所图书馆完成时间:201# 年# 月# 日附件:一、SCI收录情况Record 1 of MTitle: Observation of the fluorescence spectrum for a driven cascade model system in atomic beam Author(s): Tian SC (Tian, Si-Cong); Wang CL (Wang, Chun-Liang); Tong CZ (Tong, Cun-Zhu); Wang LJ (Wang, Li-Jun); Wang HH (Wang, Hai-Hua); Yang XB (Yang, Xiu-Bin); Kang ZH (Kang, Zhi-Hui); Gao JY (Gao, Jin-Yue)Source: OPTICS EXPRESS Volume: 20 Issue: 21 Pages: 23559-23569 Published: OCT 8 2012 Record 2 of M. . . . .(End)代表性论文引用检索一、检索要求1、被检作者:#### (邮箱: ####)2、作者单位:中国科学院物理研究所3、检索目的:####4、论文发表年限:####-####年5、提供待检索论文篇数:X篇(在Cited Reference Search工具中检索)二、检索范围三、X篇代表性论文检索结果(详细记录见附件二)注:引用文献中有作者####,视为自引,其它情况视为他引。

如何开具论文收录证明

如何开具论文收录证明

Ei收录证明报告
在步骤9,可 以选择单篇 模板,一篇 文章开一个 证明
通过调整使报告在一 页上,签名日期不能 单独占一页
开具SCI-Expanded收录证明
选择SCI-EXPANDED数据库,把其它数 据库前复选框中的 去掉
开具SCI-Expanded收录证明
两种方式下载记录
开具SCI-Expanded收录证明
收录证明附件
开具SCI-Expanded收录证明
姓名格式与数据 库保持一致
开具CPCI-S 收录证明
选择数据库
开具CPCI-S 收录证明
在SCI收录证明模板的基础 上完成,更改数据库名称
Ei收录证明报告
例:查询个人(以杨永平教授为例 )2015年至今发表文章被EI收录情况,并做一
份检索证明报告。
两种方式: 1:用姓名+单位查询(可一次检索出多篇文献
) 2:用篇名查询(适用于收录文章较少的情况)
Ei收录证明报告
步骤1:进入检索平台。 步骤2:选择数据库(Compendex)
Ei收录证明报告
Ei收录证明报告
步骤6:点击页面右下方“Search”按钮执行检 索,并选择相关记录,点击“Download”按 钮
Ei收录证明报告
步骤6:选择记录输出格式,点击“Save”按钮
Ei收录证明报告
步骤7:记录输出word文档
Ei收录证明报告
步骤8:进入图书馆主页,点击“读者服务” 栏目下的“论文收录” 按钮
步骤3:选择“Author”字段输入姓名的各种 形式,可以输入一个检索框,也可以分别输 入到不同的检索框(输入框之间选择 “OR”运算符)。
Ei收录证明报告
步骤4:检索字段选择“Author Affilication”输入作者单位(用截词符) 选择逻辑运算符(默认”AND”)

个人论著被收录与引用 情况的查证

个人论著被收录与引用 情况的查证

说明:引用类型: 1. 首先要确认:查web of science 中的引 用还是查SCI-E的引用。 2. 不同的引用,需要点开不同的数字链 接,显示引用文献列表。 3. 在实际检索中,通常需要查他引?明确 他引标准?
关于“引用”:包括自引和他引两种
图书馆开具的证明关于自引和他引的区分有三种判断标准:
在web of science中引用情况。 中引用
查出收录结果的页面,直接点被引频次 后面的数字超级链接,可得引用检索结果
点击数字10, 进入引用结果
被SCI收录的论文引用检索,点击超级链接后显示页面
web of science 中的引用:检索结果规范输出格式,直 接打印此页(点鼠标右键,打印)
内容提要
(一) 查收查引简介 (二) SCI收录引用(SSCI/A&HCI;CPCI-S

/CPCI-SSH )
(三) Ei 收录 (四) CSSCI收录引用 (五) CSCD收录引用

(二)SCI收录、引用检索
SC议库)共用同一 个检索平台(Web of Science),检索方 法相似。以SCI库为例介绍。

SCI中收录的作者单位通常是 缩写。(“参见缩写列表”)
登录方式:图书馆主页→电子资源→数据库
查SCI收录
选择web of science
选择数据库,一定要选对库
查SCI收录
查SCI收录:输入检索信息,选SCI库,点击“检索”
选择检索 字段
仅勾选SCIEXPANDED
SCI收录检索结果
期刊 会议
SCI收录、引用 CPCI-S收录 、引 用 EI收录 SSCI收录、引用 国外 A&HCI收录、引用 社科 CPCI-SSH收录、 引用 国外 理工

论文收录检索证明

论文收录检索证明

论文收录检索证明尊敬的读者:作者:所属机构:大学发表时间:2022年5月收录情况:1. 收录数据库:中国知网(CNKI)2. 检索情况:该论文已被中国知网收录,并在其数据库中进行检索。

3. 影响因子:该论文在CNKI数据库中的影响因子为2.5。

4. 引用情况:截至目前,该论文已被引用20次。

证明人:职务:大学图书馆馆长日期:2022年10月10日特此证明。

论文收录检索证明尊敬的读者:作者:所属机构:大学发表时间:2022年5月收录情况:1. 收录数据库:中国知网(CNKI)2. 检索情况:该论文已被中国知网收录,并在其数据库中进行检索。

3. 影响因子:该论文在CNKI数据库中的影响因子为2.5。

4. 引用情况:截至目前,该论文已被引用20次。

证明人:职务:大学图书馆馆长日期:2022年10月10日特此证明。

该论文在学术界引起了广泛关注,得到了同行的高度评价。

论文中的研究成果为图像识别技术的发展提供了有力支持,对于推动相关领域的研究具有重要意义。

论文收录检索证明尊敬的读者:作者:所属机构:大学发表时间:2022年5月收录情况:1. 收录数据库:中国知网(CNKI)2. 检索情况:该论文已被中国知网收录,并在其数据库中进行检索。

3. 影响因子:该论文在CNKI数据库中的影响因子为2.5。

4. 引用情况:截至目前,该论文已被引用20次。

证明人:职务:大学图书馆馆长日期:2022年10月10日特此证明。

该论文在学术界引起了广泛关注,得到了同行的高度评价。

论文中的研究成果为图像识别技术的发展提供了有力支持,对于推动相关领域的研究具有重要意义。

谢谢!大学图书馆2022年10月10日。

文章检索证明复印件

文章检索证明复印件

文章检索证明复印件
要获取一份文章的复印件,你可以采取以下几种途径:
1. 学术期刊或图书馆,如果这篇文章是发表在学术期刊上的,
你可以联系该期刊的编辑部或者前往图书馆,查询该期刊的目录或
者数据库,找到文章的相关信息。

然后,你可以向期刊编辑部请求
一份复印件或者购买该文章的电子版。

2. 作者或研究机构,如果你知道文章的作者或者所属的研究机构,你可以尝试联系他们,请求一份复印件。

通常,研究人员会愿
意分享他们的研究成果,并提供相关的文献资料。

3. 学术搜索引擎,使用学术搜索引擎如Google Scholar、PubMed等,在搜索框中输入文章的标题、作者或关键词,进行检索。

如果文章是公开可获取的,你可以直接下载或者阅读全文。

如果文
章需要付费或者订阅,你可以尝试使用学校或图书馆提供的访问权限。

4. 同行分享或社交媒体,在学术界或相关领域的社交媒体平台上,你可以发布你对该文章的需求,并请求其他研究者或学者分享
一份复印件。

有时候,同行之间会相互帮助,分享研究成果。

5. 学术交流会议或研讨会,如果该文章是在学术交流会议或研讨会上发表的,你可以尝试联系会议主办方,询问是否可以获取该文章的复印件或者演讲者是否可以提供一份。

在请求获取文章复印件时,建议你提供尽可能详细的信息,如文章的标题、作者、期刊名称、发表年份等。

这样可以帮助对方更准确地找到并提供你所需的文章复印件。

刊物检索证明

刊物检索证明

刊物检索证明
在现代科学研究中,刊物检索证明是一种方法,用于验证研究成果的有效性和可信度。

刊物检索证明一般通过在权威的学术刊物或数据库中进行检索,以确认某个已发表的研究论文的存在和内容。

通常,刊物检索证明主要有两种方式:
1. 手动检索:研究人员可以手动在学术刊物或数据库中搜索相关关键词或作者的姓名,以找到特定的研究论文。

手动检索需要阅读和筛选大量的文献,比较耗时和繁琐。

2. 自动检索:现代科学研究中,许多学术刊物和数据库提供了自动检索功能,例如学术搜索引擎(如Google学术、PubMed 等)。

通过输入关键词或作者信息,系统会自动检索并列出与之相关的研究论文。

刊物检索证明在科学研究中非常重要,它可以帮助研究人员确认某个研究成果的真实性和可靠性,从而为研究成果的引用和参考提供依据。

同时,对于科研人员、学术机构或评估机构等来说,刊物检索证明也是评估和识别学术成果影响力的重要依据之一。

论文检索查证查引证明

论文检索查证查引证明

论文检索查证查引证明
1.打开网页
2.选择常用的数据库
3.选择ISI
4. 选择Web of Science—SCI/SSCI 网络
5.进入wos
6.限定收录时间 SCI网络版数据库、SSCI网络版数据库(SCI主要是收录自然科学的期刊论文,也收录一部分的会
议论文,SSCI主要是收录社会科学的期刊论文)根据自己的需要做选择。

关于出版年和收录年的说明:出版年:是指论文所在的那一期期刊出版的年度。

收录年:是指论文数据被
数据库收录到库的年度。

接下来带大家去看看论文检索证明怎么开的中常用检索方法:常用方法一:选择“标题(Title)”检索字段后,输入文章
题目便可以。

常用方法二:多字段检索:作者(一个或多个)+ 地址+ 标题。

检索完成后便是检索结果处理,在检索结果出来之后,可以
通过查找功能(Ctrl+F键)利用论文的页码进行快速定位和确认。

如果已经找到所需的论文,就可以按照以下的步骤,完
成自己的论文检索证明了:
步骤一:先复制检索结果中的论文信息(只需要标题,作者和来源出版物),然后把这些论文信息不带格式地粘贴到SCI收录检索证明模板中的相应处,并按照模板中的格式要求将标题(Title)、要开收录证明的作者和“来源版物”等加粗;
步骤二:点击论文题目,打开论文的详细信息;
步骤三:将语种和地址等相关信息复制粘贴到检索证明模板处;步骤四按照检索证明模板的要求完成证明的编辑,然后打印出来即可。

论文收录和引用检索证明服务报告委托书

论文收录和引用检索证明服务报告委托书

论文收录和引用检索证明服务报告委托书
编号:
邮编地址:北大街69号中国医学科学院图书馆信息咨询部
查新单位:中国医学科学院医学信息研究所
联系电话:传真:
论文收录和引用检索证明报告缴费通知
同志:
您好!
您的查引费用总计为:元(圆),请您到中国医学科学院医学信息研究所财务处(北京市东城区东单北大街69号北京协和医学院/中国医学科学院图书馆六层财务室)缴纳查引费,或按以下方式银行汇款,并向提供接收发票人的邮箱、电话和单位税号等信息。

收到您的汇款后开发票和邮寄论文收录和引用检索证明报告。

汇款用途请注明:查引费+委托人姓名
中国医学科学院医学信息研究所
二〇二〇年月日。

期刊、论文、著作(教材)查询方法

期刊、论文、著作(教材)查询方法

期刊、论文、著作(教材)查询方法辽宁省人力资源和社会保障厅《关于印发2013年全省职称工作安排意见的通知》(辽人社发〔2013〕11号)第16条规定:“开展学历认证、论文检索和计算机应用能力考试合格证书查询工作。

从2013年开始,所有申报人员均要通过中国高等教育学生信息网(简称“学信网”,网址:)进行学历信息查询;通过国家新闻出版总署网对新闻出版总署网站进行论文期刊信息查询并打印查询页,通过“万方数据资源系统”、“清华同方中国知网”、重庆维普中文科技期刊数据库等主流数据库进行本人论文信息的检索;通过辽宁人事考试网首页“快捷通道”中的“计算机职称证书查询”进行计算机考试合格证书查询。

申报人员须提交经各单位及主管部门盖章的查询和检索证明。

”对于论文和著作(教材),要求申报人员提供原件、清单(书名/标题、作者、出版社/期刊名称、出版年/卷期、CIP数据核字号并附电子版)、信息查询页(如表所示)。

一、期刊查询页查询方法1)进入“中华人民共和国新闻出版总署”网站(/)2)在下方找到“便民查询”3)点击“新闻出版机构”4)在弹出的页面中点击“期刊/期刊社查询”5)在弹出的页面中选择“期刊”填入期刊名称和验证码并点击“查询”6)在弹出的页面中点击“查询详细”7)拷屏:Prt Scr8)在Word文档中“粘贴”9)修整输出二、论文查询页查询方法(中国知网为例、还可查询维普、万方)1)进入“中国知网”网站(/)2)在左侧找到“特色导航”3)在左侧点击“期刊大全”4)在弹出的页面中选择刊名输入刊名并点击“检索”5)点击查到的期刊图标6)选择年度选择“作者”输入姓名并点击“检索”7)点击文章标题8)修整输出三、著作(教材)查询页查询方法1)进入“中华人民共和国新闻出版总署”网站(/)2)在下方找到“便民查询”3)点击“CIP核心字号验证”4)在弹出的页面中点击红字“点击查询”5)在弹出的页面中输入年度、CIP核字号、验证码,点击“验证”6)修整输出另一种查询方法:1)进入“新闻出版总署条码中心”网站(/)2)在右侧中部找到“CIP核字号验证”3)在弹出的页面中输入年度、CIP核字号、验证码,点击“验证”4)修整输出。

论文收录检索证明

论文收录检索证明

论文收录检索证明检索课题:五邑大学教师2008年发表的论文被美国《科学引文索引》SCI、美国《科学技术会议索引》ISTP、美国《工程索引》EI收录的情况。

检索工具及年限:《科学引文索引》SCI网络数据库1997-2009《工程索引》EI-VILLAGE数据库1970-2009《科技会议索引》ISTP网络数据库(同光盘版)1996-2009检索结果:经上述数据库及年限范围内的检索,五邑大学教师2008年发表的论文被三大索引收录的情况如下:1、EI网络版收录32篇。

2、SCI网络版收录20篇。

3、ISTP网络版(同光盘版)收录15篇。

详情见附件。

华南理工大学图书馆情报咨询部2009年2月24日论文收录检索证明(附件一)经美国《工程索引》EI-VILLAGE数据库检索,五邑大学教师2008年发表的论文被EI网络版收录了32篇。

题录如下:1. Effect of processing parameters on the uniformity of adhesive meltblown webWang, Xiaomei (王晓梅)(Department of Textiles and Apparel, Wuyi University); Zhao, Qiming (赵其明)Source: Polymer Engineering and Science, v 48, n 11, November, 2008, p 2143-21462. Complete chaotic synchronization characteristics of the linear-polarization mode of vertical-cavity surface-emitting semiconductor lasers with isotropic optical feedbackZhong, Dong-Zhou (钟东洲)(School of Informatics(信息学院), Wuyi University); Xia, Guang-Qiong; Wu, Zheng-Mao; Jia, Xin-Hong Source: Optics Communications, v 281, n 6, Mar 15, 2008, p 1698-17093. Realization of phosphorus-doped p-type ZnO thin films via diffusion and thermal activation Ding, Ruiqin(丁瑞钦-数理系)(Institute of thin films and nanomaterials, Wuyi University) (数理系/薄膜与纳米材料研究所); Zhu, Huiqun(朱慧群-数理系); Wang, Yi Source: Materials Letters, v 62, n 3, Feb 15, 2008, p 498-5004.. Study on technological parameters of core-shell Nano-powder prepared by one-step method Liu, Zhi-Ping 刘志平(Wuyi University); Huang, Hui-Min; Ji, Wen-Jin Source: Cailiao Kexue yu Gongyi/Material Science and Technology, v 16, n 5, October, 2008, p 667-669+674 Language: Chinese5. 5. Control technology of knowledge-flow in collaborative designWang, Shengfa(王生发-机电)(Wuyi University); Gu, Xinjian; Zhang, Taihua; Guo, Jianfeng; Pan, Min (潘敏-机电) Source: Nongye Jixie Xuebao/Transactions of the Chinese Society of Agricultural Machinery, v 39, n 11, November, 2008, p 122-126 Language: Chinese6. Improving image encryption using multi-chaotic mapZhai, Yikui(翟懿奎)(Wuyi University, School of Information); Lin, Shuyong; Zhang, Qiong Source: Proceedings - 2008 Workshop on Power Electronics and Intelligent Transportation System, PEITS 2008, Proceedings - 2008 Workshop on Power Electronics and Intelligent Transportation System, PEITS 2008, 2008, p 143-1487. Freeway on-ramp metering using fuzzy immune PID controllerLiang, Xinrong(梁新荣)(School of Information, Wuyi University); Wei, Yanxiu Source: Proceedings of the World Congress on Intelligent Control and Automation (WCICA), Proceedings of the 7th World Congress on Intelligent Control and Automation, WCICA'08, 2008, p 3722-3726 Language: Chinese8.. Influences of preparation techniques on the microstructure and electric characteristics of p-ZnO thin filmsDing, Rui-Qin(丁瑞钦-数理系)(Institute of Thin Films and Nano-Materials, Wuyi University) (数理系/薄膜与纳米材料研究所); Chen, Yi-Zhan; Zhu, Hui-Qun(朱慧群); Li, Yang-Gang; Ding, Xiao-Gui; Yang, Liu; Huang, Xin-Dian; Qi, De-Bei; Tan, Jun Source: Rengong Jingti Xuebao/Journal of Synthetic Crystals, v 37, n 5, October, 2008, p 1237-1241+1272 Language: Chinese9. Freeway on-ramp control based on the composition of PID controller and CMACLiang, Xinrong(梁新荣)(School of Information, Wuyi University); Fan, Yekun Source: Proceedings of the 27th Chinese Control Conference, CCC, Proceedings of the 27th Chinese Control Conference, CCC, 2008, p 354-357 Language: Chinese10. Magnetron sputtering used to prepare fluorocarbon coatings deposited on PET fabrics Huang, Mei-Lin (黄美林)(Wuyi University)(纺织服装系); Di, Jian-Feng(狄剑锋); Qi, Hong-Jin(齐宏进) Source: Gaofenzi Cailiao Kexue Yu Gongcheng/Polymeric Materials Science and Engineering, v 24, n 2, February, 2008, p 148-151 Language: Chinese11. Neural network ensemble based on feature selectionLin, Jian (Institute of System Science and Technology, Wuyi University); Zhu, Bangzhu(朱帮助)Source: 2007 IEEE International Conference on Control and Automation, ICCA, 2007 IEEE International Conference on Control and Automation, ICCA, 2008, p 1844-184712. Fabrication of p-type ZnO thin films via magnetron sputtering and phosphorus diffusion Ding, Ruiqin(丁瑞钦)(Institute of Thin Films and Nanomaterials, Wuyi University) (数理系/薄膜与纳米材料研究所); Zhu, Huiqun(朱慧群); Zeng, Qingguang(曾庆光)Source: Vacuum, v 82, n 5, Jan 8, 2008, p 510-51313. Particle swarm optimization based PI controller for freeway ramp meteringFan, Yekun (School of Information, Wuyi University); Liang, Xinrong (梁新荣)Source: Proceedings of the 27th Chinese Control Conference, CCC, Proceedings of the 27th Chinese Control Conference, CCC, 2008, p 503-506 Language: Chinese14. Wavelet Bayesian based on information entropyLi, Chengfei (李澄非)(Wuyi University); Zuo, Deming(左德明)Source: Journal of Information and Computational Science, v 5, n 2, March, 2008, p 739-74615. A high precision SADI method for the semiconductor device simulationLiu, Zhan(刘战)(School of Information Engineering, Wuyi University); Shen, Jingjing; Gu, Xiaofeng; Yu, Zongguang; Hu, Xiduo; Zang, Jiafeng Source: Guti Dianzixue Yanjiu Yu Jinzhan/Research and Progress of Solid State Electronics, v 28, n 4, December, 2008, p 483-487+544 Language: Chinese16. LATEX SSP-convergence of fuzzy nets and its applicationBai, Shi-Zhong 白世忠,(Wuyi University, Department of Mathematics); Luo, Hai Source: Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, v 1, Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 2008, p 433-43517. LATEX Strong-I Nβ-compactness in L-topological SpacesBai, Shi-Zhong白世忠,(Wuyi University, Department of Mathematics); Fan, Lei; Wang, Wan-Liang Source: Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, v 1, Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 2008, p 436-43818. Fast parallel classification method for imbalanced classesLuo, Bing(罗兵)(School of Informatics, Wuyi University)(信息学院); Gan, Junying Source: Journal of Information and Computational Science, v 5, n 4, July, 2008, p 1577-158619. LATEX fuzzy Y-irresolute mappingsWang, Yin-Hang (Wuyi University, Department of Mathematics); Bai, Shi-Zhong白世忠,Source: Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, v 1, Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 2008, p 282-28520. 3-D face reconstruction using RBF and B spline methodHe, Guo-Hui (何国辉)(School of Information, Wuyi University)(信息学院); Zhu, Bin; Gan, Jun-Ying Source: Proceedings - 1st International Congress on Image and Signal Processing, CISP 2008, v 1, Proceedings - 1st International Congress on Image and Signal Processing, CISP 2008, 2008, p 239-24321. LATEX L-fuzzy strong pre-connectivityBai, Shi-Zhong白世忠,(Wuyi University, Department of Mathematics); Wu, Xiu-Yun Source: Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, v 1, Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 2008, p 316-31822. An algorithm: Filling the missing values in the incomplete decision tableWu, Ming-Fen(吴明芬)(School of Information, Wuyi University); Wang, Ting-Liang Source: Proceedings of the 7th International Conference on Machine Learning and Cybernetics, ICMLC, v 1, Proceedings of the 7th International Conference on Machine Learning and Cybernetics, ICMLC, 2008, p 190-19523. Wavelet Bayesian based on information entropyLi, Chengfei(李澄非)(Wuyi University); Zuo, Deming(左德明)Source: Journal of Information and Computational Science, v 5, n 2, March, 2008, p 739-746 Language: Chinese24. Poly-Si film functional layer based AM-OLED display panelLi, Yang(李阳)(Department of Mathematics and Physics, Wuyi University); Zhao, Shuyun; Wu, Chunya; Meng, Zhiguo; Wang, Yi; Xiong, Shaozhen Source: Pan Tao Ti Hsueh Pao/Chinese Journal of Semiconductors, v 29, n 12, December, 2008, p 2393-2397 Language: Chinese25. Pose-varied face recognition based on 3-D face modelHe, Guo-Hui (何国辉)(School of information, Wuyi University); Zhu, Bin; Gan, Jun-Ying Source: Proceedings of the 7th International Conference on Machine Learning and Cybernetics, ICMLC, v 5, Proceedings of the 7th International Conference on Machine Learning and Cybernetics, ICMLC, 2008, p 2987-299226.. Face recognition based on committee machineGan, Jun-Ying (甘俊英)(School of Information, WuYi University); He, Si-Bin Source: Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, ICWAPR, v 1, Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, ICWAPR, 2008, p 352-35527. Fuzzy radicals and prime fuzzy ideals of ordered semigroupsXie, Xiang-Yun (谢祥云)(Department of Mathematics and Physics, Wuyi University); Tang, Jian Source: Information Sciences, v 178, n 22, Nov 15, 2008, p 4357-437428. Smoothing Newton method for operator equations in Banach spacesLiu, Jing(刘晶) (Department of Mathematics and Physics, Wuyi University)(数理系); Gao, Yan Source: Journal of Applied Mathematics and Computing, v 28, n 1-2, August, 2008, p 447-46029. Vector polarization mode switch mechanism of the vertical-cavity surface-emitting laser with anisotropic optical feedback injectionZhong, Dong-Zhou (钟东洲)(School of Informatics (信息学院), Wuyi University); Cao, Wen-Hua; Wu, Zheng-Mao; Xia, Guang-Qiong Source: Wuli Xuebao/Acta Physica Sinica, v 57, n 3, March, 2008, p 1548-1556 Language: Chinese30. Automatic classification of form features based on neural networks and fourier transform He, Guo-Hui (何国辉)(School of Information, Wuyi University)(信息学院); Xie, Zheng-Mei; Chen, Rong Source: Proceedings of the 7th International Conference on Machine Learning and Cybernetics, ICMLC, v 2, Proceedings of the 7th International Conference on Machine Learning and Cybernetics, ICMLC, 2008, p 1162-116631. Research on face and iris feature recognition based on 2DDCT and kernel fisher discriminant analysisGan, Jun-Ying (甘俊英)(School of Information, Wuyi University); Gao, Jian-Hu; Liu, Jun-Feng Source: Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, ICWAPR, v 1, Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, ICWAPR, 2008, p 401-40532. Hierarchical freeway control based on the composition of PID controller and CMAC Liang, Xinrong(梁新荣)(School of Information, Wuyi University); Wei, Yanxiu Source: Proceedings of the World Congress on Intelligent Control and Automation (WCICA), Proceedings of the 7th World Congress on Intelligent Control and Automation, WCICA'08, 2008, p 1247-1251 Language: Chinese华南理工大学图书馆情报咨询部2009年2月24日论文收录检索证明(附件二)经美国SCI网络数据库(1997-2009)检索,,五邑大学教师2008年发表的论文被美国《科学引文索引》SCI网络版收录了20篇。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
相关文档
最新文档