咨询与建议

限定检索结果

文献类型

  • 151 篇 期刊文献
  • 126 篇 会议

馆藏范围

  • 277 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 137 篇 计算机科学与技术...
    • 110 篇 软件工程
    • 40 篇 信息与通信工程
    • 31 篇 控制科学与工程
    • 28 篇 电子科学与技术(可...
    • 25 篇 生物工程
    • 23 篇 电气工程
    • 18 篇 网络空间安全
    • 13 篇 光学工程
    • 12 篇 机械工程
    • 11 篇 化学工程与技术
    • 9 篇 安全科学与工程
    • 8 篇 仪器科学与技术
    • 8 篇 动力工程及工程热...
    • 8 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 7 篇 材料科学与工程(可...
    • 7 篇 土木工程
    • 6 篇 力学(可授工学、理...
  • 125 篇 理学
    • 69 篇 数学
    • 29 篇 物理学
    • 26 篇 生物学
    • 18 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 10 篇 化学
  • 40 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 10 篇 医学
    • 8 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 6 篇 军事学
  • 5 篇 法学
  • 5 篇 农学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 1 篇 经济学

主题

  • 9 篇 deep learning
  • 7 篇 internet of thin...
  • 7 篇 lightweight bloc...
  • 6 篇 feature extracti...
  • 5 篇 image segmentati...
  • 5 篇 semantics
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 5 篇 harmonic analysi...
  • 4 篇 deep neural netw...
  • 4 篇 generative adver...
  • 4 篇 side-channel ana...
  • 4 篇 harmonic functio...
  • 3 篇 distillation
  • 3 篇 latent semantic ...
  • 3 篇 side channel att...
  • 3 篇 education
  • 3 篇 information tech...
  • 3 篇 learning algorit...
  • 3 篇 stability analys...

机构

  • 57 篇 hunan provincial...
  • 51 篇 college of compu...
  • 46 篇 hunan provincial...
  • 28 篇 hunan provincial...
  • 19 篇 college of compu...
  • 14 篇 college of infor...
  • 12 篇 hunan provincial...
  • 10 篇 school of mathem...
  • 8 篇 college of mathe...
  • 7 篇 hengyang normal ...
  • 7 篇 hunan normal uni...
  • 6 篇 college of liber...
  • 6 篇 school of mathem...
  • 6 篇 provincial key l...
  • 6 篇 hunan provincial...
  • 6 篇 college of compu...
  • 6 篇 faculty of scien...
  • 6 篇 the institute of...
  • 5 篇 school of inform...
  • 5 篇 hunan provincial...

作者

  • 19 篇 li lang
  • 19 篇 lang li
  • 13 篇 jiao ge
  • 12 篇 jiang feibo
  • 12 篇 dong li
  • 10 篇 wang kezhi
  • 9 篇 gao xieping
  • 8 篇 zhao huihuang
  • 8 篇 zou yi
  • 8 篇 dai jianhua
  • 8 篇 yang kun
  • 8 篇 pan cunhua
  • 7 篇 ge jiao
  • 7 篇 chen shaolin
  • 6 篇 ponnusamy samina...
  • 6 篇 qiuping li
  • 6 篇 liang xiaoman
  • 6 篇 xieping gao
  • 6 篇 hamada hidetaka
  • 6 篇 zhang helen w.j.

语言

  • 259 篇 英文
  • 13 篇 其他
  • 5 篇 中文
检索条件"机构=Hunan Provincial Key Laboratory of Intelligent Information Processing and Application"
277 条 记 录,以下是81-90 订阅
排序:
Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning  2nd
Hierarchical Policies of Subgoals for Safe Deep Reinforcem...
收藏 引用
2nd International Conference on Ubiquitous Security, UbiSec 2022
作者: Yu, Fumin Gao, Feng Yuan, Yao Xing, Xiaofei Dai, Yinglong College of Information Science and Engineering Hunan Normal University Changsha410081 China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou510006 China College of Liberal Arts and Sciences National University of Defense Technology Changsha410073 China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Changsha410081 China
Reinforcement learning is a machine learning method that relies on the agent to learn by trial and error to solve decision optimization problems. It is well known that an agent based on deep reinforcement learning in ... 详细信息
来源: 评论
The Optimal Implementation of Khudra Lightweight Block Cipher  9th
The Optimal Implementation of Khudra Lightweight Block Ciphe...
收藏 引用
9th International Conference on Computer Engineering and Networks, CENet2019
作者: Huang, Xiantong Li, Lang Guo, Ying College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
In this paper, we discuss the area and speed balance optimization of Khudra lightweight block cipher. There are three major ingredients. Firstly, because of the whole structure of the Khudra block cipher and its F-fun... 详细信息
来源: 评论
Personalized Learning Path Recommendation Driven by Multi-Modal Knowledge Graphs and Large Models Collaboration
Personalized Learning Path Recommendation Driven by Multi-Mo...
收藏 引用
information Technology, Communication Ecosystem and Management (ITCEM), International Conference on
作者: Changhua Zhao Yimei Yang Yujun Yang Bo Tang Chunqiao Mi College of Computer and Artificial Intelligence(Software College) Huaihua University Huaihua China Hunan Provincial Key Laboratory of Ecological Agriculture Intelligent Control Technology Huaihua China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua Hunan China
This study examines ways to create personalized learning pathways that are influenced by large collaborative models and multi-modal knowledge graphs. By integrating multi-modal data to construct a comprehensive knowle... 详细信息
来源: 评论
Design and Implementation of Handwritten Digit Recognition Based on K-Nearest Neighbor Algorithm  10th
Design and Implementation of Handwritten Digit Recognition B...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Wang, Ying Liu, Qingyun Sun, Yaqi Zhang, Feng Zhu, Yining College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
In this paper, a handwritten digit recognition system based on K-nearest neighbor algorithm is designed and implemented. By analyzing the application principle and steps of k-nearest neighbor algorithm in machine lear... 详细信息
来源: 评论
A Novel AES Random Mask Scheme Against Correlation Power Analysis  9th
A Novel AES Random Mask Scheme Against Correlation Power Ana...
收藏 引用
9th International Conference on Computer Engineering and Networks, CENet2019
作者: Jiao, Ge Li, Lang Zou, Yi College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
With the wide application of smart card, people’s demand for the security of smart card is increasing. The Advanced Encryption Standard (AES) algorithm in smart card itself is safe enough, but the encryption algorith... 详细信息
来源: 评论
An Optimized Scheme of information Hiding-Based Visual Secret Sharing  9th
An Optimized Scheme of Information Hiding-Based Visual Secre...
收藏 引用
9th International Conference on Computer Engineering and Networks, CENet2019
作者: Zou, Yi Li, Lang Jiao, Ge College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
information hiding-based visual secret sharing (IH-VSS) uses the information hiding techniques to embed secret data into images. In the IH-VSS scheme, hidden images are divided into n shadows under the guidance and co... 详细信息
来源: 评论
Analysis and Design of Image Encryption Algorithms Based on Interlaced Chaos  10th
Analysis and Design of Image Encryption Algorithms Based on ...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Li, Kangman Li, Qiuping College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
For chaotic encryption algorithm, the algorithm of generating chaotic sequence is complex, and the data is float, which directly affects the speed of encryption. In this paper, an interlaced chaotic encryption algorit... 详细信息
来源: 评论
Design of a Real-Time and Reliable Multi-machine System  10th
Design of a Real-Time and Reliable Multi-machine System
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Zhang, Jian Li, Lang Li, Qiuping Zhao, Junxia Liang, Xiaoman College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
An IoT (Internet of Things) system is a multi-machine system composed of a master controller and multiple slave controllers. In some automatic control systems such as petroleum and electric power, the main control use... 详细信息
来源: 评论
WeChat Public Platform for Customers Reserving Bank Branches Based IoT  9th
WeChat Public Platform for Customers Reserving Bank Branches...
收藏 引用
9th International Conference on Computer Engineering and Networks, CENet2019
作者: Chen, Jie Liang, Xiaoman Zhang, Jian College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
With the development of the social economy, the amount of currency circulation has increased and become more frequent, but the customer gathering often occurs in many bank’s business. In this paper, with some framewo... 详细信息
来源: 评论
ALOHA Anti-collision Algorithm for Frame Idle Slot Removal and Collision Reduction
ALOHA Anti-collision Algorithm for Frame Idle Slot Removal a...
收藏 引用
作者: Deng, Hong-wei Zeng, Wei Yao, Ming Kong, Jia-li College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
In this study, we propose an ALOHA anti-collision algorithm for frame idle slot removal and collision reduction—called the Cancel Idle and Reduce Collision Framed Slotted Aloha (CIRC-FSA) algorithm—to address the co... 详细信息
来源: 评论