咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 70 篇 期刊文献

馆藏范围

  • 146 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 112 篇 工学
    • 68 篇 计算机科学与技术...
    • 49 篇 软件工程
    • 19 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 16 篇 电子科学与技术(可...
    • 15 篇 网络空间安全
    • 10 篇 生物工程
    • 8 篇 机械工程
    • 8 篇 光学工程
    • 8 篇 电气工程
    • 6 篇 建筑学
    • 6 篇 土木工程
    • 5 篇 仪器科学与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 安全科学与工程
    • 4 篇 力学(可授工学、理...
    • 4 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 3 篇 动力工程及工程热...
  • 62 篇 理学
    • 36 篇 数学
    • 12 篇 系统科学
    • 11 篇 物理学
    • 10 篇 生物学
    • 6 篇 统计学(可授理学、...
    • 4 篇 化学
  • 16 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
  • 6 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 农学
  • 3 篇 艺术学
  • 2 篇 法学
  • 1 篇 经济学

主题

  • 7 篇 lightweight bloc...
  • 6 篇 internet of thin...
  • 5 篇 harmonic analysi...
  • 4 篇 deep learning
  • 4 篇 side-channel ana...
  • 4 篇 feature extracti...
  • 4 篇 harmonic functio...
  • 3 篇 side channel att...
  • 3 篇 convolutional ne...
  • 2 篇 image enhancemen...
  • 2 篇 object detection
  • 2 篇 image matching
  • 2 篇 information tech...
  • 2 篇 learning algorit...
  • 2 篇 convolution
  • 2 篇 correlation powe...
  • 2 篇 contrastive lear...
  • 2 篇 location awarene...
  • 2 篇 radio frequency ...
  • 2 篇 evolutionary alg...

机构

  • 57 篇 hunan provincial...
  • 51 篇 college of compu...
  • 28 篇 hunan provincial...
  • 19 篇 college of compu...
  • 12 篇 hunan provincial...
  • 8 篇 college of mathe...
  • 7 篇 hengyang normal ...
  • 6 篇 provincial key l...
  • 6 篇 faculty of scien...
  • 6 篇 the institute of...
  • 5 篇 department of ma...
  • 5 篇 college of mathe...
  • 4 篇 hengyang normal ...
  • 3 篇 the state key la...
  • 3 篇 school of comput...
  • 3 篇 college of infor...
  • 3 篇 hunan provincial...
  • 3 篇 school of inform...
  • 2 篇 key laboratory o...
  • 2 篇 fujian provincia...

作者

  • 19 篇 li lang
  • 19 篇 lang li
  • 13 篇 jiao ge
  • 8 篇 zhao huihuang
  • 8 篇 zou yi
  • 7 篇 ge jiao
  • 7 篇 chen shaolin
  • 6 篇 ponnusamy samina...
  • 6 篇 qiuping li
  • 6 篇 liang xiaoman
  • 6 篇 hamada hidetaka
  • 5 篇 chen zhong
  • 5 篇 deng hongwei
  • 5 篇 cui zhi-ming
  • 5 篇 huihuang zhao
  • 5 篇 yi zou
  • 5 篇 yu ou
  • 5 篇 li qiuping
  • 5 篇 xiaoman liang
  • 5 篇 wu jian

语言

  • 140 篇 英文
  • 5 篇 其他
  • 1 篇 中文
检索条件"机构=Human Provincial Key Laboratory of Intelligent Information Processing and Application"
146 条 记 录,以下是21-30 订阅
排序:
Image Repair Methods Based on Deep Residual Networks  11th
Image Repair Methods Based on Deep Residual Networks
收藏 引用
11th International Conference on Computer Engineering and Networks, CENet2021
作者: Deng, Hongwei Lin, Ziyu Li, Jinxia Yao, Ming Wang, Taozhi Luo, Hongkang Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
In recent years, deep learning has shown significant advantages in image restoration. Compared with the traditional repair method, the image repair method based on deep learning can better solve the problem of image m... 详细信息
来源: 评论
Prediction of GDP Carbon Emission Based on Grey Model and Neural Network  4th
Prediction of GDP Carbon Emission Based on Grey Model and Ne...
收藏 引用
4th EAI International Conference on Robotic Sensor Networks, 2020
作者: Zhang, Feng Zhao, Huihuang Ramasamy, Manimaran College of Computer Science and Technology Hengyang Normal University Hengyang China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang China
In order to improve the prediction accuracy of Gross Domestic Product (GDP) carbon emission, combining the advantages of grey prediction and neural network, a discrete grey neural network prediction model named DGMBP ... 详细信息
来源: 评论
Hyperchaotic Image Encryption Algorithm Based on BD-Zigzag Transformation and DNA Coding  12th
Hyperchaotic Image Encryption Algorithm Based on BD-Zigzag T...
收藏 引用
12th International Conference on Computer Engineering and Networks, CENet 2022
作者: Wang, Lujie Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
For the features of Zigzag transformation, a Bidirectional Deformed Zigzag (BD-Zigzag) transformation is proposed in this paper, which starts from both sides of the diagonal and crosses in both directions. This method... 详细信息
来源: 评论
A New Image Encryption Strategy Based on Arnold Transformation and Logistic Map  11th
A New Image Encryption Strategy Based on Arnold Transformati...
收藏 引用
11th International Conference on Computer Engineering and Networks, CENet2021
作者: Sun, Xiyu Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Aiming at the problem of digital image encryption, an image encryption algorithm is proposed. The algorithm is divided into preparation stage and permutation diffusion stage. In the preparation stage, Arnold algorithm... 详细信息
来源: 评论
A Stronger Leakage Model Based on Conditional Generative Adversarial Networks for Correlation Power Analysis
收藏 引用
International Journal of Circuit Theory and applications 2025年 第0期
作者: Tang, Cheng Li, Lang Ou, Yu College of Computer Science and Technology Hengyang Normal University Hengyang China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal University Hengyang China
Deep learning-based side-channel attacks (DL-SCA) have attracted widespread attention in recent years, and most of the researchers are devoted to finding the optimal DL-SCA method. At the same time, traditional SCA me... 详细信息
来源: 评论
A new S-box construction method meeting strict avalanche criterion
A new S-box construction method meeting strict avalanche cri...
收藏 引用
作者: Li, Lang Liu, Jinggen Guo, Ying Liu, Botao College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
S-box is the main security component in lightweight block ciphers. Finding new algorithms and technical applications to generate S-box is still a current research topic. We proposed an S-box construction method that s... 详细信息
来源: 评论
Koebe Type Theorems and Pre-Schwarzian of Harmonic K-quasiconformal Mappings,and Their applications
收藏 引用
Acta Mathematica Sinica,English Series 2022年 第11期38卷 1965-1980页
作者: Shao Lin CHEN Saminathan PONNUSAMY College of Mathematics and Statistics Hengyang Normal UniversityHengyang 421002P.R.China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang 421002P.R.China Department of Mathematics Indian Institute of Technology MadrasChennai-600036India
In this article,we first establish an asymptotically sharp Koebe type covering theorem for harmonic K-quasiconformal *** we use it to obtain an asymptotically Koebe type distortion theorem,a coefficients estimate,a Li... 详细信息
来源: 评论
A New Encryption Scheme Based on RSA Encryption Algorithm and Chen Chaotic System  12th
A New Encryption Scheme Based on RSA Encryption Algorithm an...
收藏 引用
12th International Conference on Computer Engineering and Networks, CENet 2022
作者: He, Chenchen Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Nowadays the security of images is obviously more important. Some scholars have applied Rivest-Shamir-Adleman (RSA) algorithm and Chen chaotic system to image encryption. However, the application of the two methods in... 详细信息
来源: 评论
Image Matching Algorithm Under Adverse Conditions Based on SIFT  14
Image Matching Algorithm Under Adverse Conditions Based on S...
收藏 引用
14th International Conference on information Technology in Medicine and Education, ITME 2024
作者: Chen, Hao Cao, Xinrong Li, Zuoyong Lin, Lihui Fuzhou University College of Computer and Big Data Fuzhou350108 China Minjiang University Fujian Provincial Key Laboratory of Information Processing and Intelligent Control School of Computer and Big Data Fuzhou350121 China Wuyi University Fujian Key Laboratory of Big Data Application and Intellectualization for Tea Industry School of Mathematics and Computer Science Fujian354300 China
Image matching technology is crucial in computer vision applications. However, the traditional SIFT (Scale-Invariant Feature Transform) algorithm often faces challenges under adverse conditions, such as a high number ... 详细信息
来源: 评论
Traffic Signal Light Recognition Based on Transformer  12th
Traffic Signal Light Recognition Based on Transformer
收藏 引用
12th International Conference on Computer Engineering and Networks, CENet 2022
作者: Ou, Yangze Sun, Yaqi Yu, Xiaozhong Yun, Liuqing College of Computer Science and Technology Hengyang Normal University Hunan Hengyang421008 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hunan Hengyang421008 China
With more and more developed technology, unmanned driving technology has gradually entered people’s vision. Many cars are now equipped with self-parking technology, which allows the vehicle to enter the garage throug... 详细信息
来源: 评论