咨询与建议

限定检索结果

文献类型

  • 3,359 篇 会议
  • 3,125 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 6,518 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,319 篇 工学
    • 2,552 篇 计算机科学与技术...
    • 2,062 篇 软件工程
    • 854 篇 信息与通信工程
    • 584 篇 控制科学与工程
    • 520 篇 电气工程
    • 438 篇 电子科学与技术(可...
    • 406 篇 化学工程与技术
    • 386 篇 生物工程
    • 381 篇 机械工程
    • 286 篇 动力工程及工程热...
    • 285 篇 生物医学工程(可授...
    • 280 篇 光学工程
    • 258 篇 材料科学与工程(可...
    • 198 篇 仪器科学与技术
    • 150 篇 土木工程
    • 130 篇 力学(可授工学、理...
    • 127 篇 建筑学
    • 125 篇 矿业工程
    • 121 篇 安全科学与工程
  • 2,643 篇 理学
    • 1,278 篇 数学
    • 925 篇 物理学
    • 469 篇 生物学
    • 366 篇 统计学(可授理学、...
    • 353 篇 化学
    • 257 篇 系统科学
  • 1,063 篇 管理学
    • 652 篇 管理科学与工程(可...
    • 455 篇 图书情报与档案管...
    • 262 篇 工商管理
  • 262 篇 医学
    • 218 篇 临床医学
    • 191 篇 基础医学(可授医学...
  • 119 篇 法学
  • 104 篇 经济学
  • 90 篇 教育学
  • 85 篇 农学
  • 18 篇 军事学
  • 17 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 133 篇 feature extracti...
  • 128 篇 computer science
  • 101 篇 training
  • 98 篇 accuracy
  • 92 篇 computational mo...
  • 86 篇 deep learning
  • 78 篇 educational inst...
  • 75 篇 data mining
  • 68 篇 optimization
  • 64 篇 neural networks
  • 61 篇 image segmentati...
  • 60 篇 machine learning
  • 59 篇 algorithm design...
  • 56 篇 face recognition
  • 55 篇 monitoring
  • 54 篇 hadrons
  • 53 篇 clustering algor...
  • 53 篇 robustness
  • 52 篇 semantics
  • 51 篇 wireless sensor ...

机构

  • 334 篇 department of ph...
  • 305 篇 school of comput...
  • 275 篇 cavendish labora...
  • 271 篇 iccub universita...
  • 246 篇 horia hulubei na...
  • 242 篇 h.h. wills physi...
  • 239 篇 university of ch...
  • 234 篇 infn sezione di ...
  • 231 篇 van swinderen in...
  • 229 篇 school of physic...
  • 219 篇 yandex school of...
  • 214 篇 massachusetts in...
  • 208 篇 department of ph...
  • 197 篇 national researc...
  • 197 篇 infn sezione di ...
  • 196 篇 national researc...
  • 194 篇 warsaw
  • 194 篇 university of ci...
  • 193 篇 oliver lodge lab...
  • 190 篇 university of ma...

作者

  • 197 篇 barter w.
  • 194 篇 brundu d.
  • 194 篇 bellee v.
  • 190 篇 beiter a.
  • 176 篇 blake t.
  • 174 篇 bowcock t.j.v.
  • 170 篇 borsato m.
  • 170 篇 betancourt c.
  • 166 篇 amato s.
  • 162 篇 casse g.
  • 162 篇 boettcher t.
  • 159 篇 baker s.
  • 158 篇 baryshnikov f.
  • 152 篇 byczynski w.
  • 151 篇 bediaga i.
  • 148 篇 bizzeti a.
  • 145 篇 braun s.
  • 144 篇 borisyak m.
  • 143 篇 bencivenni g.
  • 139 篇 bjørn m.

语言

  • 6,060 篇 英文
  • 302 篇 其他
  • 154 篇 中文
  • 1 篇 日文
检索条件"机构=School of Computer Science and Technology Henan Polytechnic University"
6518 条 记 录,以下是4831-4840 订阅
排序:
Cryptographic protocol logic for analyzing a variety of security properties and its formal semantics
收藏 引用
International Journal of Advancements in Computing technology 2012年 第11期4卷 283-293页
作者: Chen, Li Li, Xiangdong Henan University of Economics and Law China School of Computer Science Zhongyuan University of Technology China
There are several drawbacks in the existing typical analysis logics of cryptographic protocols, such as limitations of security properties analysis, limited ability in analyzing hybrid cryptography-based primitives an... 详细信息
来源: 评论
Effect of particlesize of blast furnace slag on properties of portland cement
收藏 引用
Procedia Engineering 2012年 27卷 231-236页
作者: Jianping Zhu Qifang Zhong Gaige Chen Dongxu Li School of materials science and engineering Henan Polytechnic University Jiaozuo China College of materials science and engineering Nanjing University of Technology Nanjing China
Fineness is one of the key factors in determining the hydration activity factor of slag. The present research investigates the effect of particle size distribution (PSD) of slag on water requirement, setting time, and... 详细信息
来源: 评论
Real-time Performance Study of Information Transmission in EPA Industrial Ethernet
收藏 引用
电子学报(英文版) 2012年 第1期21卷 125-130页
作者: LIU Ning ZHONG Chongquan BAI Yuqin School of Mechanical and Power Engineering Henan Polytechnic University Jiaozuo 454000 China School of Control Science and Engineering Dalian University of Technology Dalian 116024 China
In order to propose the method of eval- uating and improving the real-time performance of EPA (Ethernet for plant automation) industrial Ethernet, the real-time performance of EPA information transmission was studied ... 详细信息
来源: 评论
Virtual Network Marathon with immersion, scientificalness, competitiveness, adaptability and learning
Virtual Network Marathon with immersion, scientificalness, c...
收藏 引用
作者: Zhang, Mingmin Xu, Mingliang Han, Lizhen Liu, Yong Lv, Pei He, Gaoqi State Key Lab of CAD and CG Zhejiang University Hangzhou China School of Information Engineering Zhengzhou University No. 100 of Science Road Zhengzhou Henan 450001 China School of Computer S and T East China University of Science and Technology Shanghai China
In this paper, we present an exergame called VNM (Virtual Network Marathon). The VNM employs specially devised treadmills for running in an immersive virtual environment on a local area network or the Internet. The tr... 详细信息
来源: 评论
Clinical trial knowledge management system using ontology
Clinical trial knowledge management system using ontology
收藏 引用
Chinese Control and Decision Conference, CCDC
作者: Tao Wang Xiao Xue Biqing Huang Department of Automation Tsinghua University Beijing 100084 China School of Computer Science and Technology Henan Polytechnic University Jiaozuo 454000 China
Clinical trial is a kind of research to evaluate the effects of the interventions on health outcomes. Now, there're many clinical trial registries all over the world which provide the registration and search of th... 详细信息
来源: 评论
Research on elastic job scheduling model and algorithm of cloud computing based on hadoop
收藏 引用
International Journal of Advancements in Computing technology 2012年 第21期4卷 473-483页
作者: Shi, Hengliang Bai, Guangyi Tang, Zhenmin Computer School of Nanjing University of Science and Technology China Electronics and Information School Henan University of Science and Technology China Co. LTD China
A poor job scheduling strategy in cloud computing can result in lower scheduling efficiency, unbalance workload, frequent scheduling, even as thrashing machines, which cripple the cluster's computational power. Af... 详细信息
来源: 评论
New algorithms for secure outsourcing of modular exponentiations
New algorithms for secure outsourcing of modular exponentiat...
收藏 引用
17th European Symposium on Research in computer Security, ESORICS 2012
作者: Chen, Xiaofeng Li, Jin Ma, Jianfeng Tang, Qiang Lou, Wenjing Xidian University Xi'an 710071 China School of Computer Science and Educational Software Guangzhou University Guangzhou 510006 China School of Computer Science and Technology Xidian University Xi'an 710071 China APSIA Group SnT University of Luxembourg 6 rue Richard Coudenhove-Kalergi L-1359 Luxembourg Luxembourg Department of Computer Science Virginia Polytechnic Institute and State University United States
Modular exponentiations have been considered the most expensive operation in discrete-logarithm based cryptographic protocols. In this paper, we propose a new secure outsourcing algorithm for exponentiation modular a ... 详细信息
来源: 评论
Research on learning Bayesian network from observable variables
收藏 引用
Journal of Information and Computational science 2012年 第10期9卷 2923-2931页
作者: Liu, Hui Cao, Yonghui School of Computer and Information Technology Henan Normal University Xinxiang 453007 China School of Economics and Management Henan Institute of Science and Technology Xinxiang 453003 China
There are different structure of the network and the variables, and the process of learning Bayesian networks has a lot of different forms. The structure of the network can be fuzzy or clear, and the variables can be ... 详细信息
来源: 评论
An adaptive optimized strategy for particle filter
An adaptive optimized strategy for particle filter
收藏 引用
Chinese Control and Decision Conference, CCDC
作者: Jinxia Yu Yongli Tang Xu Jingmin Zhao Qian College of Computer Science and Technology Henan Polytechnic University Jiaozuo 454003 China Key Discipline Open Laboratory on Mine Informatization of Henan Institute of Higher Learning Henan Polytechnic University Jiaozuo China State Grid Electric Power of HeNan Jiyuan Power Supply Company Jiyuan China College of Computer Science and Technology Henan Polytechnic University Jiaozuo China
Particle filter has been widely applied into many fields in recent years. Combined with the deficiency analysis of particle filter, an adaptive optimized strategy for particle filter is proposed. This adaptive optimiz... 详细信息
来源: 评论
A weighted 3D localization algorithm based on partial HopSize in wireless sensor network
收藏 引用
International Journal of Advancements in Computing technology 2012年 第17期4卷 504-513页
作者: Wang, Rui-Jin Qin, Zhi-Guang Zhang, Yuhong Chen, Da-Jiang School of Computer Science and Engineering University of Electronic Science and Technology of China Sichuan Chengdu 610054 China College of Information Science and Engineering Henan University of Technology Henan Zhengzhou 450001 China
Accurate 3D localization is very important in the real condition of wireless sensor networks, which are usually deployed in complex 3D terrains. In this paper, we extend our previous work and present a new three-dimen... 详细信息
来源: 评论