咨询与建议

限定检索结果

文献类型

  • 89 篇 期刊文献
  • 76 篇 会议

馆藏范围

  • 165 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 122 篇 工学
    • 93 篇 计算机科学与技术...
    • 81 篇 软件工程
    • 29 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 18 篇 电气工程
    • 15 篇 电子科学与技术(可...
    • 13 篇 生物工程
    • 7 篇 机械工程
    • 7 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 化学工程与技术
    • 6 篇 力学(可授工学、理...
    • 6 篇 光学工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 建筑学
  • 78 篇 理学
    • 52 篇 数学
    • 13 篇 物理学
    • 13 篇 生物学
    • 12 篇 系统科学
    • 7 篇 化学
    • 4 篇 统计学(可授理学、...
  • 33 篇 管理学
    • 19 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 7 篇 医学
    • 6 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 法学
    • 3 篇 社会学
  • 4 篇 农学
    • 3 篇 作物学
  • 2 篇 军事学
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学

主题

  • 7 篇 semantics
  • 6 篇 image segmentati...
  • 5 篇 deep learning
  • 4 篇 internet of thin...
  • 4 篇 deep neural netw...
  • 3 篇 reinforcement le...
  • 3 篇 distillation
  • 3 篇 latent semantic ...
  • 3 篇 neural networks
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 feature selectio...
  • 3 篇 cryptography
  • 2 篇 ultrasonic imagi...
  • 2 篇 semantic segment...
  • 2 篇 generative adver...
  • 2 篇 acoustics
  • 2 篇 data mining
  • 2 篇 local and parall...
  • 2 篇 contrastive lear...

机构

  • 45 篇 hunan provincial...
  • 30 篇 hunan provincial...
  • 22 篇 college of compu...
  • 9 篇 college of infor...
  • 6 篇 hunan normal uni...
  • 6 篇 college of liber...
  • 5 篇 xiangjiang labor...
  • 5 篇 school of inform...
  • 5 篇 hunan normal uni...
  • 5 篇 hunan key labora...
  • 4 篇 changsha social ...
  • 4 篇 hengyang normal ...
  • 4 篇 school of comput...
  • 4 篇 school of electr...
  • 4 篇 school of comput...
  • 4 篇 hunan provincial...
  • 4 篇 key laboratory o...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 changchun instit...

作者

  • 14 篇 jiang feibo
  • 14 篇 dong li
  • 12 篇 li lang
  • 11 篇 wang kezhi
  • 11 篇 dai jianhua
  • 10 篇 yang kun
  • 10 篇 pan cunhua
  • 8 篇 gao xieping
  • 5 篇 zou yi
  • 5 篇 peng yubo
  • 5 篇 xieping gao
  • 5 篇 li qiuping
  • 5 篇 jiao ge
  • 5 篇 yunqing huang
  • 4 篇 zou juan
  • 4 篇 yang shengxiang
  • 4 篇 liu yunlong
  • 4 篇 zhao huihuang
  • 4 篇 zhao junxia
  • 4 篇 huang jingui

语言

  • 152 篇 英文
  • 10 篇 其他
  • 3 篇 中文
检索条件"机构=Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing"
165 条 记 录,以下是71-80 订阅
排序:
Double time slot RFID anti-collision algorithm based on gray code  5
Double time slot RFID anti-collision algorithm based on gray...
收藏 引用
5th International Conference on information Science and Cloud computing, ISCC 2017
作者: Deng, Hongwei Li, Lang Wang, Hui School of Computer Science and Technology Hengyang Normal University School of Information Science and Engineering Central South University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hunan 421002 China
To solve the radio frequency identification problem, an anti-collision algorithm based on the Gray code (BSGC) was developed. The proposed algorithm reduces the effort required to search for tag prefixes in accordance... 详细信息
来源: 评论
Open-vocabulary 3D Semantic Understanding via Affinity Neural Radiance Fields  6
Open-vocabulary 3D Semantic Understanding via Affinity Neura...
收藏 引用
6th International Conference on Next Generation Data-Driven Networks, NGDN 2024
作者: Fan, Yujie Luo, Huan Computer and Data Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China
Three-dimensional semantic understanding using only several multi-view images can largely reduce the communication burden on the network. In addition, while point clouds are extensively studied for 3D scene understand... 详细信息
来源: 评论
A Novel Multi-Agent Deep Reinforcement Learning Approach
A Novel Multi-Agent Deep Reinforcement Learning Approach
收藏 引用
2020 International Conference on Computer Big Data and Artificial Intelligence, ICCBDAI 2020
作者: Yin, Dong Zhao, Zhe Dai, Yinglong Long, Han College of Intelligence Science and Technology National University of Defense Technology Changsha410073 China College of Liberal Arts and Sciences National University of Defense Technology Changsha410073 China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha410081 China
Borrowing the power of deep neural networks, deep reinforcement learning achieved big success in games, and it becomes a popular method to solve the sequential decision-making problems. However, the success is still r... 详细信息
来源: 评论
Exploiting Multi-Decision and Deep Refinement for Ultrasound Image Segmentation
Exploiting Multi-Decision and Deep Refinement for Ultrasound...
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Wenjing Liu Xuanya Li Kai Hu Xieping Gao Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan China Baidu Inc Beijing China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha China
In this paper, we propose a novel convolutional neural network (MDR-Net) for ultrasound image segmentation by exploiting multi-decision and deep refinement of the target. Our MDR-Net consists of two main parts, i.e., ... 详细信息
来源: 评论
Modeling human travel and social contact with multi-layer networks for epidemic prediction  9
Modeling human travel and social contact with multi-layer ne...
收藏 引用
9th IEEE International Conference on Bioinformatics and Computational Biology, ICBCB 2021
作者: Duan, Wei Wang, Tao Wang, Peng Ju, Rusheng Wang, Xiao Yang, Tian College of Systems Engineering National University of Defense Technology Changsha City China State Key Laboratry of Complex Systems Management and Control Institute of Automation Chinese Academy of Sciences Beijing City China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha City China
It is a key issue to reasonably represent human travel and social contact in epidemic models. Various measures were applied to develop the models of human mobility and contact in a long range or a short range, such as... 详细信息
来源: 评论
The Optimal Implementation of Khudra Lightweight Block Cipher  9th
The Optimal Implementation of Khudra Lightweight Block Ciphe...
收藏 引用
9th International Conference on Computer Engineering and Networks, CENet2019
作者: Huang, Xiantong Li, Lang Guo, Ying College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
In this paper, we discuss the area and speed balance optimization of Khudra lightweight block cipher. There are three major ingredients. Firstly, because of the whole structure of the Khudra block cipher and its F-fun... 详细信息
来源: 评论
Analysis and Design of Image Encryption Algorithms Based on Interlaced Chaos  10th
Analysis and Design of Image Encryption Algorithms Based on ...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Li, Kangman Li, Qiuping College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
For chaotic encryption algorithm, the algorithm of generating chaotic sequence is complex, and the data is float, which directly affects the speed of encryption. In this paper, an interlaced chaotic encryption algorit... 详细信息
来源: 评论
A Novel AES Random Mask Scheme Against Correlation Power Analysis  9th
A Novel AES Random Mask Scheme Against Correlation Power Ana...
收藏 引用
9th International Conference on Computer Engineering and Networks, CENet2019
作者: Jiao, Ge Li, Lang Zou, Yi College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
With the wide application of smart card, people’s demand for the security of smart card is increasing. The Advanced Encryption Standard (AES) algorithm in smart card itself is safe enough, but the encryption algorith... 详细信息
来源: 评论
Design and Implementation of Handwritten Digit Recognition Based on K-Nearest Neighbor Algorithm  10th
Design and Implementation of Handwritten Digit Recognition B...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Wang, Ying Liu, Qingyun Sun, Yaqi Zhang, Feng Zhu, Yining College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
In this paper, a handwritten digit recognition system based on K-nearest neighbor algorithm is designed and implemented. By analyzing the application principle and steps of k-nearest neighbor algorithm in machine lear... 详细信息
来源: 评论
Gender Identification for Coloring Black and White Portrait with cGan  10th
Gender Identification for Coloring Black and White Portrait ...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Liu, Qingyun Lin, Mugang Sun, Yaqi Zhang, Feng College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
This paper proposes a method to color black & white portrait images with gender recognition model and condition generation network (cGan). As a cGan model essentially, a method named pix2pix interprets image style... 详细信息
来源: 评论