咨询与建议

限定检索结果

文献类型

  • 3,359 篇 会议
  • 3,105 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 6,498 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,304 篇 工学
    • 2,537 篇 计算机科学与技术...
    • 2,062 篇 软件工程
    • 850 篇 信息与通信工程
    • 571 篇 控制科学与工程
    • 515 篇 电气工程
    • 432 篇 电子科学与技术(可...
    • 406 篇 化学工程与技术
    • 386 篇 生物工程
    • 381 篇 机械工程
    • 291 篇 生物医学工程(可授...
    • 285 篇 光学工程
    • 284 篇 动力工程及工程热...
    • 257 篇 材料科学与工程(可...
    • 199 篇 仪器科学与技术
    • 151 篇 土木工程
    • 131 篇 力学(可授工学、理...
    • 125 篇 矿业工程
    • 124 篇 建筑学
    • 120 篇 安全科学与工程
  • 2,640 篇 理学
    • 1,280 篇 数学
    • 924 篇 物理学
    • 469 篇 生物学
    • 366 篇 统计学(可授理学、...
    • 350 篇 化学
    • 257 篇 系统科学
  • 1,058 篇 管理学
    • 653 篇 管理科学与工程(可...
    • 451 篇 图书情报与档案管...
    • 263 篇 工商管理
  • 260 篇 医学
    • 221 篇 临床医学
    • 194 篇 基础医学(可授医学...
  • 118 篇 法学
  • 103 篇 经济学
  • 91 篇 教育学
  • 84 篇 农学
  • 18 篇 军事学
  • 17 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 133 篇 feature extracti...
  • 128 篇 computer science
  • 99 篇 training
  • 97 篇 accuracy
  • 92 篇 computational mo...
  • 82 篇 deep learning
  • 78 篇 educational inst...
  • 75 篇 data mining
  • 67 篇 optimization
  • 64 篇 neural networks
  • 63 篇 image segmentati...
  • 60 篇 machine learning
  • 59 篇 algorithm design...
  • 56 篇 face recognition
  • 55 篇 monitoring
  • 54 篇 hadrons
  • 53 篇 clustering algor...
  • 52 篇 semantics
  • 51 篇 wireless sensor ...
  • 51 篇 robustness

机构

  • 334 篇 department of ph...
  • 306 篇 school of comput...
  • 276 篇 cavendish labora...
  • 271 篇 iccub universita...
  • 246 篇 horia hulubei na...
  • 242 篇 h.h. wills physi...
  • 239 篇 university of ch...
  • 234 篇 infn sezione di ...
  • 231 篇 van swinderen in...
  • 229 篇 school of physic...
  • 219 篇 yandex school of...
  • 214 篇 massachusetts in...
  • 209 篇 department of ph...
  • 197 篇 national researc...
  • 197 篇 infn sezione di ...
  • 196 篇 national researc...
  • 195 篇 university of ci...
  • 194 篇 warsaw
  • 193 篇 oliver lodge lab...
  • 190 篇 university of ma...

作者

  • 197 篇 barter w.
  • 194 篇 brundu d.
  • 194 篇 bellee v.
  • 190 篇 beiter a.
  • 175 篇 blake t.
  • 174 篇 bowcock t.j.v.
  • 169 篇 borsato m.
  • 169 篇 betancourt c.
  • 166 篇 amato s.
  • 162 篇 casse g.
  • 162 篇 boettcher t.
  • 159 篇 baker s.
  • 158 篇 baryshnikov f.
  • 152 篇 byczynski w.
  • 151 篇 bediaga i.
  • 148 篇 bizzeti a.
  • 145 篇 braun s.
  • 144 篇 borisyak m.
  • 142 篇 bencivenni g.
  • 139 篇 bjørn m.

语言

  • 6,045 篇 英文
  • 295 篇 其他
  • 153 篇 中文
  • 1 篇 日文
检索条件"机构=School of Computer Science and Technology Henan Polytechnic University"
6498 条 记 录,以下是431-440 订阅
排序:
Enhanced redirection strategy for peer to peer services in high-speed and large-capacity ethernet passive optical networks
收藏 引用
Journal of Optical Communications 2023年 第s1期44卷 S887-S897页
作者: Yu, Jinxia Han, Shangya Ye, Qing Qin, Panke Tang, Yongli Wang, Xiaojun Li, Lixiang College of Computer Science and Technology Henan Polytechnic University Henan Jiaozuo China Henan Polytechnic University Henan Jiaozuo China Dublin City University Jiaozuo Dublin Ireland
An important problem of network traffic is how to efficiently carry massive amounts of data traffic generated by Peer-to-Peer (P2P) services in high-speed and large-capacity optical access networks. P2P file-sharing t... 详细信息
来源: 评论
A Network Security Risk Assessment Method Based on a B_NAG Model
收藏 引用
computer Systems science & Engineering 2021年 第7期38卷 103-117页
作者: Hui Wang Chuanhan Zhu Zihao Shen Dengwei Lin Kun Liu MengYao Zhao School of Computer Science&Technology Henan Polytechnic UniversityJiaozuo454000China Office of Educational Administration Jiaozuo UniversityJiaozuo454000China Department of Computer Science University College LondonLondonUnited Kingdom
computer networks face a variety of *** network attacks are contagious and destructive,and these types of attacks can be harmful to society and computer network *** evaluation is an effective method to solve network s... 详细信息
来源: 评论
Entity Embedding and Relational Path on Small Samples for Knowledge Graph Completion  3
Entity Embedding and Relational Path on Small Samples for Kn...
收藏 引用
3rd International Conference on Artificial Intelligence and computer Engineering, ICAICE 2022
作者: Yu, Kaige Zhang, Long Zheng, Qiusheng Li, Jiahao Henan Key Laboratory on Public Opinion Intelligent Analysis Zhengzhou China School of Computer Science Zhongyuan University of Technology Zhengzhou China
In the modeling work of knowledge graph completion(KGC), we propose a KGC model considering both entity embeddings and relational paths for small sample data. The relational path information between entities can ident... 详细信息
来源: 评论
A multi-scale sarcasm sentiment recognition algorithm incorporating sentence hierarchical representation  3
A multi-scale sarcasm sentiment recognition algorithm incorp...
收藏 引用
3rd International Conference on Artificial Intelligence and computer Engineering, ICAICE 2022
作者: Hao, Yu Zhang, Long Zheng, Qiusheng Niu, Liyue Henan Key Laboratory on Public Opinion Intelligent Analysis Zhengzhou China School of Computer Science Zhongyuan University of Technology Zhengzhou China
Sarcasm is a special kind of linguistic sentiment that is widely used in a wide range of social media to express strong emotions in users. Therefore, the task of sarcasm recognition is particularly important for socia... 详细信息
来源: 评论
Feature fusion-based weighted broad learning system for imbalanced data  8
Feature fusion-based weighted broad learning system for imba...
收藏 引用
8th IEEE Information technology and Mechatronics Engineering Conference, ITOEC 2025
作者: Li, Yanting Wang, Yusha Jin, Junwei Philip Chen, C.L. Zhengzhou University of Light Industry College of Computer Science and Technology Zhengzhou China Henan University of Technology College of Artificial Intelligence and Big Data Zhengzhou China South China University of Technology School of Computer Science and Engineering Guangzhou China
Broad Learning System (BLS), characterized by its flat architecture as an efficient neural network, has garnered significant interest for its benefits in terms of training velocity and network scalability. However, BL... 详细信息
来源: 评论
HTSA: A Hybrid Tree Seed Algorithm based on Differential Evolution with Dynamic Population Diversity Maintenance  4
HTSA: A Hybrid Tree Seed Algorithm based on Differential Evo...
收藏 引用
4th International Conference on Artificial Intelligence, Robotics, and Communication, ICAIRC 2024
作者: Han, Dongliang Chang, Hui Wang, Xuance Chen, Mengyao Ji, Yvzhu Hao, Xinran Zhang, Shengwei Cui, Hao Jilin University of Finance and Economics School of Management Science and Information Engineering Changchun China Zhengzhou University of Light Industry College of Electrical and Information Engineering Zhengzhou China Henan University of Science and Technology Modong Polytechnic Faculty Luoyang China
Based on the problem of Tree Seed Algorithm (TSA), this paper proposes a Hybrid Tree Seed Algorithm (Hybrid-Tree Seed Algorithm, HTSA) based on Differential Evolution and Dynamic Population Diversity Maintenance. HTSA... 详细信息
来源: 评论
A dynamic program analysis-based method for floating-point program precision loss detection
A dynamic program analysis-based method for floating-point p...
收藏 引用
2023 International Conference on computer Network Security and Software Engineering, CNSSE 2023
作者: Zhang, Yaguang Wang, Lei Wang, Yizhuo Xu, Fangjie Henan Key Laboratory on Public Opinion Intelligent Analysis Zhengzhou China School of Computer Science Zhongyuan University of Technology Zhengzhou China
The loss of precision in floating-point programs is necessary to detect the loss of precision in floating-point programs because of the computational errors in floating-point operations, which can lead to the loss of ... 详细信息
来源: 评论
Momentum Contrastive Learning for Sequential Recommendation  26
Momentum Contrastive Learning for Sequential Recommendation
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Shi, Bing Tan, Wenan Yu, Pengfei Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing211106 China Shanghai Polytechnic University School of Computer and Information Engineering Shanghai201209 China
Contrastive self-supervised learning (SSL) based Sequential Recommendations (SR) have recently achieved significant performance improvements in addressing the data sparsity problem, which hinders learning high-quality... 详细信息
来源: 评论
A Novel of Proactive Caching Policy for Privacy-Preserving Using Federated Learning and Lottery Hypothesis in Edge Computing  26
A Novel of Proactive Caching Policy for Privacy-Preserving U...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Wu, Xiaotong Tan, Wenan Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing211106 China Shanghai Polytechnic University School of Computer and Information Engineering Shanghai201209 China
Proactive caching is proving to be an increasingly efficient way to handle massive amounts of data as mobile edge computing becomes more widespread. Utilizing the edge nodes' closer proximity to end users, caching... 详细信息
来源: 评论
Complementary memtransistors for neuromorphic computing: How, what and why
收藏 引用
Journal of Semiconductors 2024年 第6期45卷 64-80页
作者: Qi Chen Yue Zhou Weiwei Xiong Zirui Chen Yasai Wang Xiangshui Miao Yuhui He School of Integrated Circuits Huazhong University of Science and TechnologyWuhan 430074China Department of Electrical and Computer Engineering University of CaliforniaSan DiegoUSA Dipartimento di Elettronica e Informazione and *** Politecnico di MilanoMilanoItaly Department of Applied Physics Hong Kong Polytechnic UniversityHong KongChina
Memtransistors in which the source-drain channel conductance can be nonvolatilely manipulated through the gate signals have emerged as promising components for implementing neuromorphic *** the other side,it is known ... 详细信息
来源: 评论