咨询与建议

限定检索结果

文献类型

  • 1,238 篇 会议
  • 485 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,735 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,108 篇 工学
    • 801 篇 计算机科学与技术...
    • 666 篇 软件工程
    • 188 篇 信息与通信工程
    • 184 篇 控制科学与工程
    • 104 篇 生物工程
    • 94 篇 机械工程
    • 82 篇 电气工程
    • 75 篇 电子科学与技术(可...
    • 55 篇 光学工程
    • 54 篇 生物医学工程(可授...
    • 50 篇 化学工程与技术
    • 38 篇 仪器科学与技术
    • 37 篇 安全科学与工程
    • 33 篇 土木工程
    • 30 篇 动力工程及工程热...
    • 29 篇 建筑学
  • 521 篇 理学
    • 310 篇 数学
    • 111 篇 生物学
    • 99 篇 统计学(可授理学、...
    • 86 篇 物理学
    • 79 篇 系统科学
    • 44 篇 化学
  • 314 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 130 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 64 篇 教育学
    • 63 篇 教育学
  • 45 篇 法学
    • 29 篇 社会学
  • 43 篇 医学
    • 40 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 29 篇 经济学
    • 29 篇 应用经济学
  • 20 篇 农学
  • 7 篇 文学
  • 6 篇 艺术学
  • 4 篇 军事学

主题

  • 71 篇 software enginee...
  • 51 篇 training
  • 47 篇 feature extracti...
  • 37 篇 computer science
  • 37 篇 accuracy
  • 36 篇 computational mo...
  • 33 篇 software
  • 31 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 image segmentati...
  • 29 篇 protocols
  • 27 篇 neural networks
  • 25 篇 hardware
  • 23 篇 educational inst...
  • 23 篇 optimization
  • 22 篇 data mining
  • 22 篇 control systems
  • 22 篇 data models
  • 21 篇 predictive model...
  • 20 篇 application soft...

机构

  • 138 篇 school of comput...
  • 73 篇 department of co...
  • 67 篇 college of compu...
  • 52 篇 department of co...
  • 48 篇 school of electr...
  • 43 篇 beijing key labo...
  • 26 篇 school of softwa...
  • 25 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 school of comput...
  • 21 篇 school of comput...
  • 19 篇 school of comput...
  • 17 篇 the hong kong po...
  • 16 篇 seventh research...
  • 15 篇 school of mechan...
  • 13 篇 department of co...
  • 13 篇 school of softwa...
  • 12 篇 college of compu...
  • 12 篇 department of co...
  • 11 篇 school of inform...

作者

  • 40 篇 yingmin jia
  • 39 篇 junping du
  • 36 篇 hung chih-cheng
  • 31 篇 fashan yu
  • 27 篇 chih-cheng hung
  • 21 篇 qian kai
  • 20 篇 jigang wu
  • 17 篇 wu jigang
  • 17 篇 kai qian
  • 16 篇 cao jiannong
  • 16 篇 jiannong cao
  • 15 篇 tan kay chen
  • 13 篇 qin jing
  • 13 篇 du junping
  • 13 篇 jia yingmin
  • 12 篇 lin qiuzhen
  • 12 篇 cai yi
  • 12 篇 guozhi song
  • 12 篇 yu fashan
  • 11 篇 jin-liang wang

语言

  • 1,653 篇 英文
  • 71 篇 其他
  • 13 篇 中文
  • 1 篇 俄文
检索条件"机构=Polytechnic University for Software Engineering"
1735 条 记 录,以下是91-100 订阅
排序:
Elements of Synergetics for Modeling and Comprehensive Assessment of Environmental Condition and Sustainable System Development  3
Elements of Synergetics for Modeling and Comprehensive Asses...
收藏 引用
3rd IEEE KhPI Week on Advanced Technology, KhPI Week 2022
作者: Kozulia, Tatiana Kozulia, Mariia National Technical University 'Kharkiv Polytechnic Institute' Department of Software Engineering and Management Intelligent Technologies Kharkiv Ukraine
Determination of the state 'researched system - environment' in the presence of manmade provision is solved by the proposal of comprehensive methodological support - elements of synergetics for modeling of the... 详细信息
来源: 评论
Classification of Network Data with Machine Learning Methods for Intelligent Intrusion Detection Systems  4
Classification of Network Data with Machine Learning Methods...
收藏 引用
4th International Conference on Advanced Science and engineering, ICOASE 2022
作者: Baykara, Muhammet Abdulrahman, Awf Alahmed, Ali Shakir Firat University Department of Software Engineering Elazig Turkey Duhok Polytechnic University Department of Public Health Duhok Iraq Duhok Polytechnic University Department of Nursing Duhok Iraq
In information systems, it has become very important to store personal and institutional information and access it safely and quickly when necessary. To ensure the confidentiality of information against unauthorized a... 详细信息
来源: 评论
Application Research on Identification of Cervical Lesions Based on Random Forest  2
Application Research on Identification of Cervical Lesions B...
收藏 引用
2nd IEEE International Conference on Power, Electronics and Computer Applications, ICPECA 2022
作者: Yao, Bingying Li, Chao Guangzhou University South China Institute of Software Engineering Guangzhou China Guangdong Industry Polytechnic Guangzhou China
According to analysis of the shortcomings in the course of the joint inspection of HPV-DNA viral load testing and TCT liquid thin-layer cytology technical, application of computer aided diagnosis (CAD) technology to i... 详细信息
来源: 评论
Heterologous Image Matching Based on Salience Region Using Q-test and Kernel Density Estimation  4
Heterologous Image Matching Based on Salience Region Using Q...
收藏 引用
4th International Conference on Computer Vision and Pattern Analysis, ICCPA 2024
作者: Zhai, Jinlong Yan, Xiaohu Xu, Yang School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China Institute of Applied Artificial Intelligence of the Guangdong-Hong Kong-MacaoGreater Bay Area Shenzhen Polytechnic University Shenzhen518055 China
To address the matching problem caused by the salience differences in spatial features, spectrum and contrast between heterologous images, a heterologous image matching method based on salience region using Q-test and... 详细信息
来源: 评论
Enhancing Scene Text Recognition by Strengthening Attention Alignment  6
Enhancing Scene Text Recognition by Strengthening Attention ...
收藏 引用
6th International Conference on Artificial Intelligence and Big Data, ICAIBD 2023
作者: Qing, Shan Chen, Liangwei Lin, Lin Zhang, Jiake Chengdu Aeronautic Polytechnic School of Electronic and Computer Engineering Chengdu China Peking University School of Software & Microelectronics Beijing China Sichuan University School of Literature and Journalism Chengdu China
Scene text recognition (STR) refers to recognizing text instance images from natural scenes as text. STR has been a hot area of computer vision because it has various applications. The state-of-the-art methods are und... 详细信息
来源: 评论
A Real-Time Hand Sign Language Recognition System for Threatening Situations Using Deep Learning  12
A Real-Time Hand Sign Language Recognition System for Threat...
收藏 引用
12th International Symposium on Digital Forensics and Security, ISDFS 2024
作者: Shwany, Zardasht Abdulaziz Abdulkarim Ismail, Shayda Khudhur Khoshnaw, Karwan Hoshyar Khalid Mustafa, Twana Saeed Karabatak, Murat Othman, Nashwan Adnan Erbil Polytechnic University Physiotherapy Department Erbil Iraq Ministry of Higher Education and Scientific Research Network Department Erbil Iraq Erbil Polytechnic University Department of Information and Communication Technology Engineering Erbil Iraq Firat University Department of Software Elazig Turkey College of Science Knowledge University Department of Computer Science Erbil Iraq Knowledge University Department of Computer Engineering Erbil Iraq Al-Kitab University Department of Computer Engineering Altun Kupri Iraq
Hand sign language has been done as physical movements in natural languages that humans have used since ancient times, along with letters, words, and spoken language. This paper presents a real-time method to identify... 详细信息
来源: 评论
Overbooking-Enabled Task Scheduling and Resource Allocation in Mobile Edge Computing Environments
收藏 引用
Intelligent Automation & Soft Computing 2023年 第7期37卷 1-16页
作者: Jixun Gao Bingyi Hu Jialei Liu Huaichen Wang Quanzhen Huang Yuanyuan Zhao School of Computer Henan University of EngineeringZhengzhou451191China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China School of Computer Hubei University of Arts and ScienceXiangyang441053China School of Software Engineering Anyang Normal UniversityAnyang455000China School of Computer and Information Engineering Henan Normal UniversityXinxiang453003China The Publicity Department Zhengzhou University of TechnologyZhengzhou450044China
Mobile Edge Computing(MEC)is proposed to solve the needs of Inter-net of Things(IoT)users for high resource utilization,high reliability and low latency of service ***,the backup virtual machine is idle when its prima... 详细信息
来源: 评论
Application of Neural Networks for Network Traffic Monitoring and Analysis  8
Application of Neural Networks for Network Traffic Monitorin...
收藏 引用
8th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2024
作者: Kushnerov, Oleksandr Murr, Pierre Herasymov, Serhii Milevskyi, Stanislav Melnyk, Marharyta Golovashych, Sergii Sumy State University Department of Economic Cybernetics Sumy Ukraine International University of Science and Technology in Kuwait Computer Engineering Department Kuwait Kuwait 'Kharkiv polytechnic institute' Cybersecurity department National Technical University Kharkiv Ukraine Set University Department of Cyber Security and information protection Kyiv Ukraine National Technical University 'Kharkiv polytechnic institute' Department of Software Engineering and Management Intelligent Technologies Kharkiv Ukraine
Monitoring and analyzing network traffic are critically important tasks in the context of increasing cyber threats. Traditional data processing methods often struggle to handle the large volumes and complexity of mode... 详细信息
来源: 评论
Fast Distributed Polynomial Multiplication Algorithm for Lattice-based Cryptographic Decryption In Blockchain Systems  22
Fast Distributed Polynomial Multiplication Algorithm for Lat...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Zhao, Hongjian Tao, Yunting Kong, Fanyu Zhang, Guoyan Zhang, Hanlin Yu, Jia Shandong University School of Software Jinan China Binzhou Polytechnic College of Information Engineering Binzhou China Shandong University Shandong Sansec Information Technology Co. Ltd School of Software Jinan China Shandong University School of Cyber Science and Technology Qingdao China Qingdao University College of Computer Science and Technology Qingdao China
Lattice-based Post-Quantum Cryptography (PQC) can effectively resist the quantum threat to blockchain's underlying cryptographic algorithms. Blockchain node decryption is one of the most commonly used cryptographi... 详细信息
来源: 评论
3D Gaze Estimation via Binocular Disparity and Feature Refinement  10
3D Gaze Estimation via Binocular Disparity and Feature Refin...
收藏 引用
10th International Conference on Big Data Computing and Communications, BIGCOM 2024
作者: Wang, Chengxin Chen, Qiuxia Tian, Ying Yang, Jinfeng School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan China Institute of Applied Artificial Intelligence of the Guangdong-Hong Kong-Macao Greater Bay Area Shenzhen Polytechnic Shenzhen China
The eyes are the windows to the soul and are crucial for studying human behavior. Therefore, gaze estimation has attracted much attention in the field of computer vision. In recent years, convolutional neural networks... 详细信息
来源: 评论