咨询与建议

限定检索结果

文献类型

  • 3,388 篇 会议
  • 3,170 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 6,592 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,362 篇 工学
    • 2,570 篇 计算机科学与技术...
    • 2,073 篇 软件工程
    • 868 篇 信息与通信工程
    • 585 篇 控制科学与工程
    • 544 篇 电气工程
    • 457 篇 电子科学与技术(可...
    • 418 篇 化学工程与技术
    • 387 篇 生物工程
    • 385 篇 机械工程
    • 291 篇 动力工程及工程热...
    • 287 篇 生物医学工程(可授...
    • 277 篇 光学工程
    • 262 篇 材料科学与工程(可...
    • 203 篇 仪器科学与技术
    • 152 篇 土木工程
    • 131 篇 力学(可授工学、理...
    • 126 篇 建筑学
    • 126 篇 矿业工程
    • 124 篇 安全科学与工程
  • 2,668 篇 理学
    • 1,286 篇 数学
    • 943 篇 物理学
    • 467 篇 生物学
    • 367 篇 化学
    • 363 篇 统计学(可授理学、...
    • 258 篇 系统科学
  • 1,068 篇 管理学
    • 661 篇 管理科学与工程(可...
    • 456 篇 图书情报与档案管...
    • 264 篇 工商管理
  • 265 篇 医学
    • 221 篇 临床医学
    • 193 篇 基础医学(可授医学...
  • 120 篇 法学
  • 105 篇 经济学
  • 91 篇 教育学
  • 85 篇 农学
  • 18 篇 军事学
  • 17 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 136 篇 feature extracti...
  • 128 篇 computer science
  • 101 篇 accuracy
  • 101 篇 training
  • 94 篇 computational mo...
  • 92 篇 deep learning
  • 78 篇 educational inst...
  • 74 篇 data mining
  • 70 篇 optimization
  • 67 篇 neural networks
  • 63 篇 machine learning
  • 61 篇 image segmentati...
  • 59 篇 algorithm design...
  • 56 篇 face recognition
  • 56 篇 monitoring
  • 54 篇 hadrons
  • 54 篇 clustering algor...
  • 53 篇 robustness
  • 52 篇 semantics
  • 51 篇 wireless sensor ...

机构

  • 339 篇 department of ph...
  • 321 篇 school of comput...
  • 281 篇 cavendish labora...
  • 275 篇 iccub universita...
  • 249 篇 horia hulubei na...
  • 244 篇 h.h. wills physi...
  • 244 篇 university of ch...
  • 239 篇 infn sezione di ...
  • 234 篇 van swinderen in...
  • 232 篇 school of physic...
  • 218 篇 yandex school of...
  • 215 篇 massachusetts in...
  • 210 篇 department of ph...
  • 202 篇 infn sezione di ...
  • 198 篇 oliver lodge lab...
  • 196 篇 national researc...
  • 194 篇 national researc...
  • 194 篇 warsaw
  • 194 篇 university of ci...
  • 192 篇 physikalisches i...

作者

  • 200 篇 barter w.
  • 196 篇 brundu d.
  • 195 篇 bellee v.
  • 190 篇 beiter a.
  • 178 篇 blake t.
  • 174 篇 bowcock t.j.v.
  • 172 篇 borsato m.
  • 172 篇 betancourt c.
  • 169 篇 amato s.
  • 166 篇 boettcher t.
  • 162 篇 casse g.
  • 158 篇 baryshnikov f.
  • 157 篇 baker s.
  • 153 篇 byczynski w.
  • 150 篇 bediaga i.
  • 150 篇 bizzeti a.
  • 148 篇 bencivenni g.
  • 146 篇 braun s.
  • 144 篇 borisyak m.
  • 140 篇 bjørn m.

语言

  • 5,674 篇 英文
  • 745 篇 其他
  • 179 篇 中文
  • 3 篇 斯洛文尼亚文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 日文
检索条件"机构=School of Computer Science and Technology Henan Polytechnic University"
6592 条 记 录,以下是731-740 订阅
排序:
Enhancing Drug Synergy Combination: Integrating Graph Transformers and BiLSTM for Accurate Drug Synergy Prediction
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 PP卷 PP页
作者: Sun, Bin Du, Haoze Hou, Shumei Hu, Qingkai Pang, Xiaoxiao Wei, Dongqing Wang, Xianfang Henan Institute of Technology School of Computer Science and Technology Henan Xinxiang453003 China North Carolina State University Department of Computer Science Raleigh27695 United States Shanghai Jiao Tong University State Key Laboratory of Microbial Metabolism School of Life Sciences and Biotechnology Shanghai200240 China
Combination therapy of drugs showed significant potential in treating complex diseases by overcoming drug resistance and improving therapeutic efficacy. However, due to the rapid increase in the number of available dr... 详细信息
来源: 评论
Research on the pressure variation law and enhancing CBM extraction application effect of CO_(2) phase transition jet coal seam fracturing technology
收藏 引用
Frontiers of Earth science 2023年 第3期17卷 867-883页
作者: Xin BAI Zhuoli ZHOU Guicheng HE Dongming ZHANG Han YANG Zenrui FAN Dengke WANG School of Resources Environment and Safety Engineering University of South ChinaHengyang 421001China State Key Laboratory Cultivation Base for Gas Geology and Gas Control Henan Polytechnic UniversityJiaozuo 454000China Key Laboratory of Safety and High-efficiency Coal Mining(Ministry of Education) Anhui University of Science and TechnologyHuainan 232001China School of Resources and Safety Engineering Chongqing UniversityChongqing 400044China China Coal Technology Engineering Group Chongqing Research Institute Chongqing 400037China
Due to the limited permeability and high methane content of the majority of China’s coal seams,significant coal mining gas disasters frequently *** is an urgent need to artificially improve the permeability of coalbe... 详细信息
来源: 评论
Process parametric optimization of spark plasma sintered Ni–Cr–ZrO2 composites using response surface methodology (RSM)
收藏 引用
International Journal of Lightweight Materials and Manufacture 2024年 第1期7卷 14-24页
作者: Oketola, Adeola Jamiru, Tamba Ogunbiyi, Olugbenga Rominiyi, Azeez Lawan Smith, Salifu Adedayo, Ojo David Department of Mechanical and Mechatronics Engineering Tshwane University of Technology Pretoria South Africa Department of Mechanical and Industrial Engineering University of Johannesburg Doornfontein Campus Johannesburg2028 South Africa Centre for Nanomechanics and Tribocorrosion School of Mining Metallurgy and Chemical Engineering University of Johannesburg South Africa Department of Computer Science Osun State Polytechnic Osun State Iree Nigeria
Materials properties are highly dependent on the processing parameters and technique used during sintering. The effect of Spark Plasma sintering process parameters (pressure and temperature) on the hardness and relati... 详细信息
来源: 评论
A method for detecting floating objects on water based on edge computing
A method for detecting floating objects on water based on ed...
收藏 引用
2023 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, BMSB 2023
作者: Li, He Yang, Shuaipeng Liu, Jinjiang Fang, Honglin Fu, Zhumu Zhang, Rui Jia, Huimei Lv, Lianmeng Henan Costar Group Co. Ltd Henan Nanyang473003 China Henan University of Science and Technology College of Information Engineering Henan Luoyang471000 China Nanyang Normal University Henan Engineering Research Center of Intelligent Processing for Big Data of Digital Image School of Computer Science and Technology Nanyang473061 China Beijing University of Posts and Telecommunication State Key Laboratory of Networking and Switching Technology Beijing100876 China Xi'an Hengpin Electronic Technology Co. Ltd Xi'an710100 China
With the development and application of computer vision, many target detection networks are applied to the detection of floating objects in rivers. For the detection problems such as small targets easily missed and mi... 详细信息
来源: 评论
Two-factor ( biometric and password) authentication key exchange on lattice based on key consensus
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2020年 第6期27卷 42-53页
作者: Zhao Zongqu Ma Shaoti Wang Yongjun Tang Yongli Ye Qing College of Computer Science and Technology Henan Polytechnic UniversityJiaozuo 454000China
In the post-quantum era,the password-based authentication key exchange(PAKE)protocol on lattice has the characteristics of convenience and high efficiency,however these protocols cannot resist online dictionary attack... 详细信息
来源: 评论
A Performance Investigation of Genetic Algorithm with Different Evolutionary Operators  11
A Performance Investigation of Genetic Algorithm with Differ...
收藏 引用
11th International Conference on Machine Intelligence Theory and Applications, MiTA 2024
作者: Li, Jian-Yu Shao, Zhao-Kun Wang, Zi-Jia Zhang, Yuhui Zhu, Ruoyu Chen, Zong-Gan Li, Tao Nankai University College of Artificial Intelligence Tianjin300350 China Hanyang University College of Electrical and Electronic Engineering Ansan15588 Korea Republic of Guangzhou University College of Software Engineering Guanzhou510006 China Dongguan University of Technology College of Computer Science and Technology Dongguan523808 China South China Normal University School of Computer Science Guangzhou510631 China Henan Normal University College of Computer and Information Engineering Xinxiang453007 China
Genetic Algorithm (GA) as a bio-inspired optimization technique, has shown significant potential for applications in many fields. This paper aims to provide a comprehensive overview of the main types of evolutionary o... 详细信息
来源: 评论
TEDC: Temporal-aware Edge Data Caching with Specified Latency Preference
TEDC: Temporal-aware Edge Data Caching with Specified Latenc...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Guobing Zou Ya Liu Song Yang Shengxiang Hu Yanglan Gan Bofeng Zhang School of Computer Engineering and Science Shanghai University Shanghai China Department of Computer Science and Technology Tongji University Shanghai China School of Computer Science and Technology Donghua University Shanghai China School of Computer and Information Engineering Shanghai Polytechnic University Shanghai China
Recently, the edge data caching (EDC) problem has received much attention. It aims to appropriately cache data on edge servers. Existing EDC approaches suffer from a series of limitations. First, they often overlook t... 详细信息
来源: 评论
Development of the Illumination System of Recombination Sensor for Compound Concentration Measurements  14
Development of the Illumination System of Recombination Sens...
收藏 引用
14th International Conference on Measurement, MEASUREMENT 2023
作者: Kochan, O. Ning, X. Su, J. Sus, B. Kozynets, O. Lytvynenko, S. Ivanyshyn, A. Hubei University of Technology School of Computer Science Wuhan China Lviv Polytechnic National University Lviv Ukraine Taras Shevchenko National University of Kyiv Kyiv Institute of High Technologies Kyiv Ukraine
The technical implementation of the illumination device for the semiconductor sensor structures with the recombination principle of operation is suggested. The change in the state of charge is recorded from measuremen... 详细信息
来源: 评论
Prediction of network attack profit path based on NAPG model
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2020年 第5期27卷 91-102页
作者: Liu Kun Wang Hui Shen Zihao College of Computer Science and Technology Henan Polytechnic UniversityJiaozuo 454000China
The network attack profit graph(NAPG)model and the attack profit path predication algorithm are presented herein to cover the shortage of considerations in attacker’s subjective factors based on existing network atta... 详细信息
来源: 评论
AdvUSL: Targeted Adversarial Attack against U-shaped Split Learning
AdvUSL: Targeted Adversarial Attack against U-shaped Split L...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Yunxiao He Chunqiang Hu Yuwen Pu Jiahao Chen Xingwang Li School of Big Data & Software Engineering Chongqing University Chongqing China College of Computer Science and Technology Zhejiang University Zhejiang China College of Physics and Electronic Information Engineering Henan Polytechnic University Henan China
Split Learning is an emerging Distributed Machine Learning which allows clients and the server to collaborative train a model by splitting it successively. This approach not only addresses data scarcity, but also enha... 详细信息
来源: 评论