咨询与建议

限定检索结果

文献类型

  • 287 篇 期刊文献
  • 208 篇 会议

馆藏范围

  • 495 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 329 篇 工学
    • 208 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 64 篇 信息与通信工程
    • 43 篇 电子科学与技术(可...
    • 39 篇 控制科学与工程
    • 38 篇 生物工程
    • 35 篇 电气工程
    • 24 篇 化学工程与技术
    • 21 篇 动力工程及工程热...
    • 20 篇 生物医学工程(可授...
    • 19 篇 材料科学与工程(可...
    • 18 篇 网络空间安全
    • 16 篇 机械工程
    • 15 篇 光学工程
    • 14 篇 土木工程
    • 12 篇 安全科学与工程
    • 11 篇 力学(可授工学、理...
    • 11 篇 建筑学
    • 8 篇 仪器科学与技术
  • 272 篇 理学
    • 186 篇 数学
    • 61 篇 物理学
    • 44 篇 生物学
    • 35 篇 系统科学
    • 32 篇 统计学(可授理学、...
    • 26 篇 化学
  • 70 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 17 篇 医学
    • 16 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 10 篇 法学
  • 7 篇 教育学
  • 6 篇 农学
  • 5 篇 军事学
  • 4 篇 经济学
  • 3 篇 艺术学

主题

  • 18 篇 feature extracti...
  • 12 篇 deep learning
  • 10 篇 image segmentati...
  • 9 篇 semantics
  • 8 篇 internet of thin...
  • 6 篇 free energy
  • 6 篇 object detection
  • 6 篇 convolution
  • 6 篇 data mining
  • 6 篇 machine learning
  • 6 篇 lightweight bloc...
  • 6 篇 training
  • 5 篇 deep neural netw...
  • 5 篇 generative adver...
  • 5 篇 finite element m...
  • 5 篇 accuracy
  • 5 篇 harmonic analysi...
  • 4 篇 reinforcement le...
  • 4 篇 distillation
  • 4 篇 side-channel ana...

机构

  • 57 篇 hunan provincial...
  • 50 篇 college of compu...
  • 46 篇 hunan provincial...
  • 44 篇 college of mathe...
  • 28 篇 hunan provincial...
  • 19 篇 fujian provincia...
  • 18 篇 college of compu...
  • 17 篇 hunan key labora...
  • 15 篇 fujian provincia...
  • 14 篇 fujian provincia...
  • 14 篇 college of infor...
  • 14 篇 school of mathem...
  • 13 篇 fujian provincia...
  • 12 篇 hunan provincial...
  • 11 篇 school of mathem...
  • 10 篇 hunan key labora...
  • 8 篇 school of mathem...
  • 8 篇 hunan normal uni...
  • 8 篇 college of mathe...
  • 8 篇 key laboratory o...

作者

  • 28 篇 jiang kai
  • 21 篇 li zuoyong
  • 18 篇 li lang
  • 18 篇 lang li
  • 18 篇 zhang juan
  • 13 篇 jiang feibo
  • 13 篇 dong li
  • 12 篇 jiao ge
  • 11 篇 shu shi
  • 10 篇 zuoyong li
  • 10 篇 wang kezhi
  • 10 篇 gao xieping
  • 9 篇 hu rong
  • 9 篇 dai jianhua
  • 9 篇 yu yue
  • 9 篇 yang kun
  • 9 篇 pan cunhua
  • 8 篇 zhao huihuang
  • 8 篇 yang yin
  • 8 篇 huang yunqing

语言

  • 447 篇 英文
  • 43 篇 其他
  • 6 篇 中文
检索条件"机构=Hunan Provincial Key Laboratory of Intelligent Information Processing and Applied Mathematics"
495 条 记 录,以下是311-320 订阅
排序:
Efficiently Retrieving Differences between Remote Sets using Counting Bloom Filter
收藏 引用
International Journal of Performability Engineering 2019年 第7期15卷 1947-1954页
作者: Tian, Xiaomei Zhao, Huihuang Sun, Yaqi Liang, Xiaoman College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Retrieving differences between remote sets is widely used in set reconciliation and data deduplication. Set reconciliation and data deduplication between two nodes are widely used in various network applications. The ... 详细信息
来源: 评论
Improving mutation pathogenicity prediction of metal-binding sites in proteins with a panoramic attention mechanism
收藏 引用
Pattern Recognition 2026年 169卷
作者: Yuan Zhang Jiafeng Wu Qiuye Zhao Mingyuan Dong Junsheng Deng Xieping Gao Kai Hu Dapeng Xiong Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan 411105 China Department of Computational Biology Cornell University Ithaca NY 14853 USA Weill Institute for Cell and Molecular Biology Cornell University Ithaca NY 14853 USA Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha 410081 China
Accurately identifying the pathogenicity of mutations at protein-metal binding sites is crucial for uncovering the structural and functional complexity of metalloproteins, and the molecular mechanisms behind numerous ...
来源: 评论
The Existence Theory of the Nonlinear Discrete System and the Convergence Theory of the Gummel Iteration for the PNP Equations
收藏 引用
Journal of Scientific Computing 2025年 第1期104卷
作者: Liu, Yang Shu, Shi Yang, Ying Hunan Key Laboratory for Computation and Simulation in Science and Engineering Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Hunan Xiangtan411105 China School of Mathematics Hunan Institute of Science and Technology Hunan Yueyang414006 China Guilin University of Electronic Technology Guangxi Guilin541004 China
The Poisson-Nernst-Planck equations play a crucial role in modeling ion mass conservation and electrostatic diffusion in various applications, such as biological ion channels, semiconductor devices, and nanopore syste... 详细信息
来源: 评论
Improved Security for Android System based on Multi-Chaotic Maps using a Novel Image Encryption Algorithm
收藏 引用
International Journal of Performability Engineering 2019年 第6期15卷 1692-1701页
作者: Jiao, Ge Li, Lang Zou, Yi College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Aimed at the unsatisfactory effect of security in mobile cloud computing, we propose a novel image encryption algorithm by using the Improved Fruit Fly Optimization Algorithm-Artificial Bee Colony (hereafter referred ... 详细信息
来源: 评论
A Time-Driven Cloudlet Placement Strategy for Workflow Applications in Wireless Metropolitan Area Networks
Research Square
收藏 引用
Research Square 2021年
作者: Zhang, Jianshan Li, Ming Zheng, Xianghan Hsu, Ching-Hsien College of Mathematics and Computer Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory Network Computing and Intelligent Information Processing Fuzhou China Department of Computer Science and Information Engineering Asia University Taichung Taiwan
With the rapid development of mobile technology, mobile applications have increasing requirements for computational resources, and mobile devices can no longer meet these requirements. Mobile edge computing (MEC) has ... 详细信息
来源: 评论
X-Architecture Steiner Minimal Tree Construction Based on Discrete Differential Evolution  15th
X-Architecture Steiner Minimal Tree Construction Based on Di...
收藏 引用
15th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2019, co-located with the 5th International Conference on Harmony Search, Soft Computing and Applications, ICHSA 2019
作者: Wu, Hailin Xu, Saijuan Zhuang, Zhen Liu, Genggeng College of Mathematics and Computer Sciences Fuzhou University Fuzhou350116 China Department of Information Engineering Fujian Business University Fuzhou350012 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China
As the best connection model for the multi-pin net of the non-Manhattan architecture global routing problem, the X-architecture Steiner Minimum Tree (XSMT) construction is a Non-deterministic Polynomial hard (NP-hard)... 详细信息
来源: 评论
Characterization for a generic construction of bent functions and its consequences
arXiv
收藏 引用
arXiv 2023年
作者: Li, Yanjun Gao, Jinjie Kan, Haibin Peng, Jie Zheng, Lijing Chen, Changhui Institute of Statistics and Applied Mathematics Anhui University of Finance and Economics Anhui Bengbu233030 China School of Computer Sciences Fudan University Shanghai200433 China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China Shanghai Engineering Research Center of Blockchain Shanghai200433 China Yiwu Research Institute of Fudan University Yiwu City322000 China Mathematics and Science College of Shanghai Normal University Guilin Road #100 Shanghai200234 China The School of Mathematics and Physics University of South China Hunan Hengyang421001 China
In this letter, we give a characterization for a generic construction of bent functions. This characterization enables us to obtain another efficient construction of bent functions and to give a positive answer on a p... 详细信息
来源: 评论
An ontology-supported inquiry learning technique
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2021年 第1期6卷 16-28页
作者: Xue, Xingsi Zhang, Jie Yang, Chaofan Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology No.33 Xuefu South Road University Town Minhou Fuzhou Fujian350118 China School of Computer Science and Engineering Yulin Normal University No.299 Education Middle Road Yulin City Guanxi Province537000 China School of Computer Science and Mathematics Intelligent Information Processing Research Center Fujian University of Technology No.33 Xueyuan Road University Town Minhou Fuzhou Fujian350118 China Guangxi Key Laboratory of Automatic Detecting Technology and Instruments Guilin University of Electronic Technology No.1 Jinji Road Guilin Guangxi541004 China
Although Inquiry-based Learning (IBL) offers compelling opportunities for the engineering education, one of the challenges to the implementation of it is that the learner always lacks of the background knowledge. To p... 详细信息
来源: 评论
Mobile Crowd-Sensing System Based on Participant Selection  15th
Mobile Crowd-Sensing System Based on Participant Selection
收藏 引用
15th International Conference on Green, Pervasive, and Cloud Computing, GPC 2020
作者: Tu, Chunyu Han, Lei Wang, Leye Yu, Zhiyong College of Mathematics and Computer Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Key Laboratory of Spatial Data Mining and Information Sharing Ministry of Education Fuzhou China Key Lab of High Confidence Software Technologies Peking University Beijing China
Mobile Crowdsensing (MCS) is often accompanied by various adverse objectives when performing data collection, which makes it difficult to collect accurate data of the entire target area with low cost. Therefore, how t... 详细信息
来源: 评论
FireMatch: A Semi-Supervised Video Fire Detection Network Based on Consistency and Distribution Alignment
arXiv
收藏 引用
arXiv 2023年
作者: Lin, Qinghua Li, Zuoyong Zeng, Kun Fan, Haoyi Li, Wei Zhou, Xiaoguang School of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou350121 China School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou450001 China School of Automation Beijing University of Post and Telecommunications Beijing100876 China School of Economics and Management Minjiang University Fuzhou350121 China
Deep learning techniques have greatly enhanced the performance of fire detection in videos. However, video-based fire detection models heavily rely on labeled data, and the process of data labeling is particularly cos... 详细信息
来源: 评论