咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 128 篇 会议

馆藏范围

  • 285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 207 篇 工学
    • 142 篇 计算机科学与技术...
    • 112 篇 软件工程
    • 40 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 28 篇 电子科学与技术(可...
    • 25 篇 生物工程
    • 24 篇 电气工程
    • 18 篇 网络空间安全
    • 13 篇 光学工程
    • 12 篇 机械工程
    • 11 篇 化学工程与技术
    • 10 篇 安全科学与工程
    • 8 篇 仪器科学与技术
    • 8 篇 动力工程及工程热...
    • 8 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 7 篇 材料科学与工程(可...
    • 7 篇 土木工程
    • 6 篇 力学(可授工学、理...
  • 127 篇 理学
    • 70 篇 数学
    • 29 篇 物理学
    • 26 篇 生物学
    • 18 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 10 篇 化学
  • 41 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 11 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 6 篇 军事学
  • 5 篇 法学
  • 5 篇 农学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 1 篇 经济学

主题

  • 11 篇 deep learning
  • 7 篇 internet of thin...
  • 7 篇 lightweight bloc...
  • 6 篇 feature extracti...
  • 5 篇 image segmentati...
  • 5 篇 semantics
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 5 篇 harmonic analysi...
  • 4 篇 deep neural netw...
  • 4 篇 generative adver...
  • 4 篇 side-channel ana...
  • 4 篇 harmonic functio...
  • 3 篇 reinforcement le...
  • 3 篇 distillation
  • 3 篇 latent semantic ...
  • 3 篇 side channel att...
  • 3 篇 education
  • 3 篇 information tech...
  • 3 篇 learning algorit...

机构

  • 57 篇 hunan provincial...
  • 51 篇 college of compu...
  • 46 篇 hunan provincial...
  • 28 篇 hunan provincial...
  • 19 篇 college of compu...
  • 14 篇 college of infor...
  • 12 篇 hunan provincial...
  • 11 篇 school of mathem...
  • 8 篇 hunan normal uni...
  • 8 篇 college of mathe...
  • 7 篇 hengyang normal ...
  • 6 篇 college of liber...
  • 6 篇 school of mathem...
  • 6 篇 provincial key l...
  • 6 篇 hunan provincial...
  • 6 篇 hunan provincial...
  • 6 篇 hunan normal uni...
  • 6 篇 college of compu...
  • 6 篇 faculty of scien...
  • 6 篇 the institute of...

作者

  • 19 篇 li lang
  • 19 篇 lang li
  • 13 篇 jiao ge
  • 12 篇 jiang feibo
  • 12 篇 dong li
  • 10 篇 wang kezhi
  • 10 篇 gao xieping
  • 9 篇 dai jianhua
  • 8 篇 zhao huihuang
  • 8 篇 zou yi
  • 8 篇 yang kun
  • 8 篇 pan cunhua
  • 7 篇 ge jiao
  • 7 篇 chen shaolin
  • 6 篇 ponnusamy samina...
  • 6 篇 qiuping li
  • 6 篇 liang xiaoman
  • 6 篇 xieping gao
  • 6 篇 hamada hidetaka
  • 6 篇 zhang helen w.j.

语言

  • 262 篇 英文
  • 18 篇 其他
  • 7 篇 中文
检索条件"机构=Hunan Provincial Key Laboratory of Intelligent Information Processing and Application"
285 条 记 录,以下是181-190 订阅
排序:
WeChat Public Platform for Customers Reserving Bank Branches Based IoT
WeChat Public Platform for Customers Reserving Bank Branches...
收藏 引用
作者: Jie Chen Xiaoman Liang Jian Zhang College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
With the developing of the social economy,the amount of currency circulation has increased and become more frequent,but the customer gathering is often occurred in the many bank's *** this paper,with some framewor... 详细信息
来源: 评论
A Image Adaptive Steganography Algorithm Combining Chaotic Encryption and Minimum Distortion Function
A Image Adaptive Steganography Algorithm Combining Chaotic E...
收藏 引用
作者: Ge Jiao Jiahao Liu Sheng Zhou Ning Luo College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
Digital image has the characteristics of high redundancy and convenient processing, which is the ideal carrier of information hiding ***, digital image steganography has become a hot research direction in the field of... 详细信息
来源: 评论
Research on Task Scheduling in Distributed Vulnerability Scanning System
Research on Task Scheduling in Distributed Vulnerability Sca...
收藏 引用
作者: Jie Jiang Sixin Tang College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
Network threats caused by system vulnerabilities is increasing gradually, the distributed vulnerability scanning system can scan large-scale and complex networks and report the vulnerability information. Task scheduli... 详细信息
来源: 评论
Constant-Weight Group Coded Bloom Filter for Multiple-Set Membership Queries
Constant-Weight Group Coded Bloom Filter for Multiple-Set Me...
收藏 引用
作者: Xiaomei Tian Huihuang Zhao College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
Multiple-set membership query problem plays a very important role in many network systems, including packet forwarding architectures in big data centers, routing switching devices and internet firewall systems. Many s... 详细信息
来源: 评论
Design and Implementation of Handwritten Digit Recognition Based on K-Nearest Neighbor Algorithm
Design and Implementation of Handwritten Digit Recognition B...
收藏 引用
作者: Ying Wang Qingyun Liu Yaqi Sun Feng Zhang Yining Zhu College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
In this paper, a handwritten digit recognition system based on Knearest neighbor algorithm is designed and implemented. By analyzing the application principle and steps of k-nearest neighbor algorithm in machine learn... 详细信息
来源: 评论
Design of a Real-Time and Reliable Multi-machine System
Design of a Real-Time and Reliable Multi-machine System
收藏 引用
作者: Jian Zhang Lang Li Qiuping Li Junxia Zhao Xiaoman Liang College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
An IoT(Internet of Things) system is a multi-machine system composed of a master controller and multiple slave controllers. In some automatic control systems such as petroleum and electric power, the main control uses... 详细信息
来源: 评论
Analysis and Design of Image Encryption Algorithms Based on Interlaced Chaos
Analysis and Design of Image Encryption Algorithms Based on ...
收藏 引用
作者: Kangman Li Qiuping Li College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
For chaotic encryption algorithm, the algorithm of generating chaotic sequence is complex, and the data is float, which directly affects the speed of encryption. In this paper, an interlaced chaotic encryption algorit... 详细信息
来源: 评论
Gender Identification for Coloring Black and White Portrait with cGan
Gender Identification for Coloring Black and White Portrait ...
收藏 引用
作者: Qingyun Liu Mugang Lin Yaqi Sun Feng Zhang College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
This paper proposes a method to color black & white portrait images with gender recognition model and condition generation network(cGan). As a c Gan model essentially, a method named pix2 pix interprets image styl... 详细信息
来源: 评论
Power Analysis Attack on a Lightweight Block Cipher GIFT
Power Analysis Attack on a Lightweight Block Cipher GIFT
收藏 引用
作者: Jian Zhang Lang Li Qiuping Li Junxia Zhao Xiaoman Liang College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
GIFT is a new lightweight block cipher with smaller area and higher efficiency,which is very suitable for the Internet of Things(IoT) devices with constrained *** power analysis attack is an efficient method to extrac... 详细信息
来源: 评论
A Novel AES Random Mask Scheme Against Correlation Power Analysis
A Novel AES Random Mask Scheme Against Correlation Power Ana...
收藏 引用
作者: Ge Jiao Lang Li Yi Zou College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
With the wide application of smart card,people's demand for the security of smart card is *** AES(Advanced Encryption Standard)algorithm in smart card itself is safe enough,but the encryption algorithm is still th... 详细信息
来源: 评论