咨询与建议

限定检索结果

文献类型

  • 1,468 篇 会议
  • 1,047 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 2,518 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,555 篇 工学
    • 1,110 篇 计算机科学与技术...
    • 936 篇 软件工程
    • 343 篇 信息与通信工程
    • 186 篇 控制科学与工程
    • 164 篇 电气工程
    • 143 篇 电子科学与技术(可...
    • 143 篇 生物工程
    • 124 篇 机械工程
    • 105 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 80 篇 化学工程与技术
    • 54 篇 仪器科学与技术
    • 54 篇 动力工程及工程热...
    • 43 篇 材料科学与工程(可...
    • 38 篇 建筑学
    • 36 篇 土木工程
    • 35 篇 网络空间安全
    • 30 篇 交通运输工程
  • 954 篇 理学
    • 610 篇 数学
    • 247 篇 物理学
    • 176 篇 生物学
    • 161 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 系统科学
  • 433 篇 管理学
    • 236 篇 图书情报与档案管...
    • 211 篇 管理科学与工程(可...
    • 73 篇 工商管理
  • 72 篇 医学
    • 58 篇 临床医学
    • 46 篇 基础医学(可授医学...
  • 49 篇 法学
    • 37 篇 社会学
  • 37 篇 农学
  • 23 篇 经济学
  • 20 篇 教育学
  • 9 篇 哲学
  • 6 篇 艺术学
  • 4 篇 文学
  • 4 篇 军事学

主题

  • 113 篇 feature extracti...
  • 96 篇 semantics
  • 74 篇 information proc...
  • 64 篇 laboratories
  • 63 篇 training
  • 56 篇 computers
  • 45 篇 computational mo...
  • 43 篇 face recognition
  • 43 篇 visualization
  • 42 篇 image segmentati...
  • 41 篇 data mining
  • 41 篇 machine learning
  • 39 篇 optimization
  • 38 篇 accuracy
  • 37 篇 humans
  • 34 篇 deep learning
  • 34 篇 robustness
  • 31 篇 support vector m...
  • 30 篇 predictive model...
  • 30 篇 decoding

机构

  • 431 篇 key laboratory o...
  • 214 篇 university of ch...
  • 83 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 65 篇 peng cheng labor...
  • 64 篇 college of compu...
  • 52 篇 college of mathe...
  • 48 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 46 篇 the key laborato...
  • 45 篇 hunan provincial...
  • 45 篇 graduate univers...
  • 44 篇 school of comput...
  • 43 篇 college of infor...
  • 41 篇 chinese academy ...
  • 40 篇 fujian provincia...
  • 35 篇 key laboratory o...
  • 34 篇 fujian key labor...
  • 33 篇 national enginee...
  • 32 篇 school of comput...

作者

  • 99 篇 zhongzhi shi
  • 93 篇 shi zhongzhi
  • 73 篇 xilin chen
  • 72 篇 shiguang shan
  • 62 篇 liu qun
  • 62 篇 huang qingming
  • 47 篇 li yingsong
  • 44 篇 xu qianqian
  • 40 篇 feng yang
  • 39 篇 huang zhixiang
  • 36 篇 he qing
  • 35 篇 yingsong li
  • 34 篇 wen gao
  • 31 篇 qing he
  • 29 篇 guo wenzhong
  • 28 篇 yang zhiyong
  • 28 篇 zhuang fuzhen
  • 27 篇 jiang kai
  • 27 篇 li hua
  • 27 篇 zhixiang huang

语言

  • 2,231 篇 英文
  • 246 篇 其他
  • 58 篇 中文
检索条件"机构=Cognitive Computing and Intelligent Information Processing Laboratory"
2518 条 记 录,以下是1671-1680 订阅
排序:
Complete separable reversible data hiding in encrypted image  1st
Complete separable reversible data hiding in encrypted image
收藏 引用
1st International Conference on Cloud computing and Security, ICCCS 2015
作者: Zhaoxia, Yin Huabin, Wang Haifeng, Zhao Bin, Luo Xinpeng, Zhang Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei230601 China School of Communication and Information Engineering Shanghai University Shanghai200072 China
Reversible data hiding in encrypted image (RDHEI) is an emerging technology since it has good potential for practical applications such as encrypted image authentication, content owner identification and privacy prote... 详细信息
来源: 评论
A nonlocal interferometric phase filtering strategy for practical InSAR system
A nonlocal interferometric phase filtering strategy for prac...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Xue Lin Dongsheng Fang Fangfang Li Ke Wang Shandong Provincial Key Laboratory of Network Based Intelligent Computing Jinan China School of Information Science and Engineering University of Jinan Jinan China Institute of Electronics Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Key Laboratory of Technology in Geo-spatial Information Processing and Application System Chinese Academy of Sciences Beijing China School of Information Science and Engineering Henan University of Technology Zhengzhou China
Nonlocal interferometric phase filtering methods achieve excellent performance in both noise reduction and texture preservation, even in the case of complicated topography and low coherence. The main limitation of the... 详细信息
来源: 评论
Enhancing Time Series Clustering by Incorporating Multiple Distance Measures with Semi-Supervised Learning
收藏 引用
Journal of Computer Science & Technology 2015年 第4期30卷 859-873页
作者: 周竞 朱山风 黄晓地 张彦春 School of Computer Science Fudan University Shanghai 200433 China Shanghai Key Laboratory of Intelligent Information Processing Fudan University Shanghai 200433 China School of Computing and Mathematics Charles Sturt University Albury NSW 2640 Australia School of Engineering and Science Victoria University Melbourne Victoria 8001 Australia Shanghai Key Laboratory of Data Science Fudan University Shanghai 201203 China
Time series clustering is widely applied in various areas. Existing researches focus mainly on distance measures between two time series, such as dynamic time warping (DTW) based methods, edit-distance based methods... 详细信息
来源: 评论
Application of a multi-factor model in the grain yield prediction
收藏 引用
Metallurgical and Mining Industry 2015年 第8期7卷 468-474页
作者: Chen, Lili Guo, Hongjun Laboratory of Intelligent Information Processing Suzhou University Suzhou Anhui China The Key Laboratory of Intelligent Computing and Signal Processing of MOE Anhui University Hefei Anhui China
A multi-factor model for the grain yield prediction based on the previous data and relevant impacting factors is reported. In this model, the weight coefficient of each individual factor that affected the grain yield ... 详细信息
来源: 评论
An integratable verifiable secret sharing mechanism
收藏 引用
International Journal of Network Security 2016年 第4期18卷 617-624页
作者: Liu, Yanjun Chang, Chin-Chen Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University No. 111 Jiulong Rd Hefei230601 China Department of Computer Science and Information Engineering Asia University No. 500 Lioufeng Rd Wufeng Taichung413 Taiwan Department of Information Engineering and Computer Science Feng Chia University No. 100 Wenhwa Rd Seatwen Taichung413 Taiwan
Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in the area of information se- curity, such as for group authentication, cloud storage schemes, secure parallel communication and wir... 详细信息
来源: 评论
Image authentication and self-recovery scheme based on the rehashing model
收藏 引用
Journal of information Hiding and Multimedia Signal processing 2016年 第3期7卷 460-474页
作者: Lyu, Wan-Li Chang, Chin-Chen Wang, Feng Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei230039 China Department of Information Engineering and Computer Science Feng Chia University 100 Wenhwa Rd. Seatwen Taichung40724 Taiwan Department of Computer Science and Information Engineering Asia University Taichung41354 Taiwan Department of Mathematics and Physics Fujian University of Technology FuzhouFujian350108 China
An effective image tamper localization and self-recovery scheme that uses the rehashing model is proposed in this paper. The aim of the proposed scheme was to reduce the failure rate in detecting image tamper areas an... 详细信息
来源: 评论
Phase Compensation, ZVS Operation of Wireless Power Transfer System Based on SOGI-PLL
Phase Compensation, ZVS Operation of Wireless Power Transfer...
收藏 引用
Annual IEEE Applied Power Electronics Conference and Exposition
作者: Pingan Tan Haibing He Xieping Gao College of Information Engineering Xiangtan University Xiangtan Hunan 411105 China MOE Key Laboratory of Intelligent Computing & Information Processing College of Information Engineering Xiangtan University Xiangtan Hunan 411105 China
Wireless power transfer (WPT) technology is now recognized as an efficient means of transferring power because having numerous advantages over conventional wired power transfer system. The phase delays, for example in... 详细信息
来源: 评论
MR-COF: A genetic MapReduce configuration optimization framework  15th
MR-COF: A genetic MapReduce configuration optimization frame...
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel processing, ICA3PP 2015
作者: Liu, Chao Zeng, Deze Yao, Hong Hu, Chengyu Yan, Xuesong Fan, Yuanyuan Hubei Key Laboratory of Intelligent Geo-Information Processing China University of Geosciences Wuhan430074 China China Services Computing Technology and System Lab and Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Hadoop/MapReduce has emerged as a de facto programming framework to explore cloud-computing resources. Hadoop has many configuration parameters, some of which are crucial to the performance of MapReduce jobs. In pract... 详细信息
来源: 评论
Suspicious face detection based on key frame recognition under surveillance video
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2016年 9712 LNCS卷 645-652页
作者: Zheng, Xiaohui Ning, Yi Chen, Xianjun Zhan, Yongsong Guangxi Colleges and Universities Key Laboratory of Intelligent Processing of Computer Image and Graphics Guilin University of Electronic Technology GuilinGuangxi541004 China Guangxi Experiment Center of Information Science Guilin University of Electronic Technology GuilinGuangxi541004 China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology GuilinGuangxi541004 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology GuilinGuangxi541004 China
Surveillance video is characterized by large amount of data and redundancy, which makes the suspicious face detection to be a problem. To solve the problem above we proposed suspicious face detection based on key fram... 详细信息
来源: 评论
No reference video quality assessment based on 3D convolutional neural network
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2016年 27卷 103-112页
作者: Wang, Chun-Feng Su, Li Zhang, Wei-Gang Huang, Qing-Ming Key Laboratory on Big Data Mining and Knowledge Management University of Chinese Academy of Sciences Beijing100049 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology The Chinese Academy of Sciences Beijing100190 China Weihai264209 China
No reference video quality assessment (NR-VQA) measures distorted videos quantitatively without the reference of original high quality videos. Conventional NR-VQA methods are generally designed for specific types of d... 详细信息
来源: 评论