咨询与建议

限定检索结果

文献类型

  • 278 篇 期刊文献
  • 207 篇 会议

馆藏范围

  • 485 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 322 篇 工学
    • 201 篇 计算机科学与技术...
    • 155 篇 软件工程
    • 63 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 38 篇 控制科学与工程
    • 38 篇 生物工程
    • 33 篇 电气工程
    • 24 篇 化学工程与技术
    • 21 篇 动力工程及工程热...
    • 20 篇 生物医学工程(可授...
    • 19 篇 材料科学与工程(可...
    • 18 篇 网络空间安全
    • 16 篇 机械工程
    • 15 篇 光学工程
    • 14 篇 土木工程
    • 11 篇 力学(可授工学、理...
    • 11 篇 建筑学
    • 11 篇 安全科学与工程
    • 8 篇 仪器科学与技术
  • 266 篇 理学
    • 183 篇 数学
    • 56 篇 物理学
    • 44 篇 生物学
    • 35 篇 系统科学
    • 32 篇 统计学(可授理学、...
    • 26 篇 化学
  • 69 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 16 篇 医学
    • 15 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 10 篇 法学
  • 7 篇 教育学
  • 6 篇 农学
  • 5 篇 军事学
  • 4 篇 经济学
  • 3 篇 艺术学

主题

  • 17 篇 feature extracti...
  • 10 篇 deep learning
  • 10 篇 image segmentati...
  • 9 篇 semantics
  • 8 篇 internet of thin...
  • 6 篇 free energy
  • 6 篇 object detection
  • 6 篇 convolution
  • 6 篇 data mining
  • 6 篇 lightweight bloc...
  • 6 篇 training
  • 5 篇 deep neural netw...
  • 5 篇 generative adver...
  • 5 篇 machine learning
  • 5 篇 finite element m...
  • 5 篇 harmonic analysi...
  • 4 篇 distillation
  • 4 篇 side-channel ana...
  • 4 篇 optimization
  • 4 篇 fuses

机构

  • 57 篇 hunan provincial...
  • 50 篇 college of compu...
  • 46 篇 hunan provincial...
  • 44 篇 college of mathe...
  • 28 篇 hunan provincial...
  • 19 篇 fujian provincia...
  • 18 篇 college of compu...
  • 17 篇 hunan key labora...
  • 15 篇 fujian provincia...
  • 14 篇 fujian provincia...
  • 14 篇 college of infor...
  • 13 篇 fujian provincia...
  • 13 篇 school of mathem...
  • 12 篇 hunan provincial...
  • 10 篇 school of mathem...
  • 10 篇 hunan key labora...
  • 8 篇 college of mathe...
  • 8 篇 key laboratory o...
  • 7 篇 hengyang normal ...
  • 7 篇 hunan normal uni...

作者

  • 29 篇 jiang kai
  • 21 篇 li zuoyong
  • 18 篇 li lang
  • 18 篇 lang li
  • 18 篇 zhang juan
  • 13 篇 jiang feibo
  • 13 篇 dong li
  • 12 篇 jiao ge
  • 11 篇 shu shi
  • 10 篇 zuoyong li
  • 10 篇 wang kezhi
  • 9 篇 hu rong
  • 9 篇 gao xieping
  • 9 篇 yang kun
  • 9 篇 pan cunhua
  • 8 篇 zhao huihuang
  • 8 篇 dai jianhua
  • 8 篇 yang yin
  • 8 篇 huang yunqing
  • 7 篇 yu zhiyong

语言

  • 455 篇 英文
  • 25 篇 其他
  • 5 篇 中文
检索条件"机构=Hunan Provincial Key Laboratory of Intelligent Information Processing and Applied Mathematics"
485 条 记 录,以下是161-170 订阅
排序:
Design of a Real-Time and Reliable Multi-machine System  10th
Design of a Real-Time and Reliable Multi-machine System
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Zhang, Jian Li, Lang Li, Qiuping Zhao, Junxia Liang, Xiaoman College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
An IoT (Internet of Things) system is a multi-machine system composed of a master controller and multiple slave controllers. In some automatic control systems such as petroleum and electric power, the main control use... 详细信息
来源: 评论
Gender Identification for Coloring Black and White Portrait with cGan  10th
Gender Identification for Coloring Black and White Portrait ...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Liu, Qingyun Lin, Mugang Sun, Yaqi Zhang, Feng College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
This paper proposes a method to color black & white portrait images with gender recognition model and condition generation network (cGan). As a cGan model essentially, a method named pix2pix interprets image style... 详细信息
来源: 评论
An Optimized Scheme of information Hiding-Based Visual Secret Sharing  9th
An Optimized Scheme of Information Hiding-Based Visual Secre...
收藏 引用
9th International Conference on Computer Engineering and Networks, CENet2019
作者: Zou, Yi Li, Lang Jiao, Ge College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
information hiding-based visual secret sharing (IH-VSS) uses the information hiding techniques to embed secret data into images. In the IH-VSS scheme, hidden images are divided into n shadows under the guidance and co... 详细信息
来源: 评论
Power Analysis Attack on a Lightweight Block Cipher GIFT  9th
Power Analysis Attack on a Lightweight Block Cipher GIFT
收藏 引用
9th International Conference on Computer Engineering and Networks, CENet2019
作者: Zhang, Jian Li, Lang Li, Qiuping Zhao, Junxia Liang, Xiaoman College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
GIFT is a new lightweight block cipher with smaller area and higher efficiency, which is very suitable for the Internet of Things (IoT) devices with constrained resources. The power analysis attack is an efficient met... 详细信息
来源: 评论
ALOHA Anti-collision Algorithm for Frame Idle Slot Removal and Collision Reduction
ALOHA Anti-collision Algorithm for Frame Idle Slot Removal a...
收藏 引用
作者: Deng, Hong-wei Zeng, Wei Yao, Ming Kong, Jia-li College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
In this study, we propose an ALOHA anti-collision algorithm for frame idle slot removal and collision reduction—called the Cancel Idle and Reduce Collision Framed Slotted Aloha (CIRC-FSA) algorithm—to address the co... 详细信息
来源: 评论
WeChat Public Platform for Customers Reserving Bank Branches Based IoT  9th
WeChat Public Platform for Customers Reserving Bank Branches...
收藏 引用
9th International Conference on Computer Engineering and Networks, CENet2019
作者: Chen, Jie Liang, Xiaoman Zhang, Jian College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
With the development of the social economy, the amount of currency circulation has increased and become more frequent, but the customer gathering often occurs in many bank’s business. In this paper, with some framewo... 详细信息
来源: 评论
Spectrality of a class of infinite convolutions on R
arXiv
收藏 引用
arXiv 2022年
作者: Wu, Sha Xiao, Yingqing School of Mathematics Hunan University Changsha410082 China School of Mathematics Hunan Province Key Lab of Intelligent Information Processing and Applied Mathematics Hunan University Changsha410082 China
Given an integer m ≥ 1. Let Σ(m) = {1, 2, · · ·, m}N be a symbolic space, and let {(bk, Dk)}mk=1 := {(bk, {0, 1, · · ·, pk−1}tk)}mk=1 be a finite sequence pairs, where integers |bk|, pk... 详细信息
来源: 评论
Constant-Weight Group Coded Bloom Filter for Multiple-Set Membership Queries  10th
Constant-Weight Group Coded Bloom Filter for Multiple-Set Me...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Tian, Xiaomei Zhao, Huihuang College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Multiple-set membership query problem plays a very important role in many network systems, including packet forwarding architectures in big data centers, routing switching devices and internet firewall systems. Many s... 详细信息
来源: 评论
Research on Task Scheduling in Distributed Vulnerability Scanning System  10th
Research on Task Scheduling in Distributed Vulnerability Sca...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Jiang, Jie Tang, Sixin College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Network threats caused by system vulnerabilities is increasing gradually, the distributed vulnerability scanning system can scan large-scale and complex networks and report the vulnerability information. Task scheduli... 详细信息
来源: 评论
A Image Adaptive Steganography Algorithm Combining Chaotic Encryption and Minimum Distortion Function  10th
A Image Adaptive Steganography Algorithm Combining Chaotic E...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Jiao, Ge Liu, Jiahao Zhou, Sheng Luo, Ning College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Digital image has the characteristics of high redundancy and convenient processing, which is the ideal carrier of information hiding application. Therefore, digital image steganography has become a hot research direct... 详细信息
来源: 评论