咨询与建议

限定检索结果

文献类型

  • 287 篇 期刊文献
  • 208 篇 会议

馆藏范围

  • 495 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 329 篇 工学
    • 208 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 64 篇 信息与通信工程
    • 43 篇 电子科学与技术(可...
    • 39 篇 控制科学与工程
    • 38 篇 生物工程
    • 35 篇 电气工程
    • 24 篇 化学工程与技术
    • 21 篇 动力工程及工程热...
    • 20 篇 生物医学工程(可授...
    • 19 篇 材料科学与工程(可...
    • 18 篇 网络空间安全
    • 16 篇 机械工程
    • 15 篇 光学工程
    • 14 篇 土木工程
    • 12 篇 安全科学与工程
    • 11 篇 力学(可授工学、理...
    • 11 篇 建筑学
    • 8 篇 仪器科学与技术
  • 272 篇 理学
    • 186 篇 数学
    • 61 篇 物理学
    • 44 篇 生物学
    • 35 篇 系统科学
    • 32 篇 统计学(可授理学、...
    • 26 篇 化学
  • 70 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 17 篇 医学
    • 16 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 10 篇 法学
  • 7 篇 教育学
  • 6 篇 农学
  • 5 篇 军事学
  • 4 篇 经济学
  • 3 篇 艺术学

主题

  • 18 篇 feature extracti...
  • 12 篇 deep learning
  • 10 篇 image segmentati...
  • 9 篇 semantics
  • 8 篇 internet of thin...
  • 6 篇 free energy
  • 6 篇 object detection
  • 6 篇 convolution
  • 6 篇 data mining
  • 6 篇 machine learning
  • 6 篇 lightweight bloc...
  • 6 篇 training
  • 5 篇 deep neural netw...
  • 5 篇 generative adver...
  • 5 篇 finite element m...
  • 5 篇 accuracy
  • 5 篇 harmonic analysi...
  • 4 篇 reinforcement le...
  • 4 篇 distillation
  • 4 篇 side-channel ana...

机构

  • 57 篇 hunan provincial...
  • 50 篇 college of compu...
  • 46 篇 hunan provincial...
  • 44 篇 college of mathe...
  • 28 篇 hunan provincial...
  • 19 篇 fujian provincia...
  • 18 篇 college of compu...
  • 17 篇 hunan key labora...
  • 15 篇 fujian provincia...
  • 14 篇 fujian provincia...
  • 14 篇 college of infor...
  • 14 篇 school of mathem...
  • 13 篇 fujian provincia...
  • 12 篇 hunan provincial...
  • 11 篇 school of mathem...
  • 10 篇 hunan key labora...
  • 8 篇 school of mathem...
  • 8 篇 hunan normal uni...
  • 8 篇 college of mathe...
  • 8 篇 key laboratory o...

作者

  • 28 篇 jiang kai
  • 21 篇 li zuoyong
  • 18 篇 li lang
  • 18 篇 lang li
  • 18 篇 zhang juan
  • 13 篇 jiang feibo
  • 13 篇 dong li
  • 12 篇 jiao ge
  • 11 篇 shu shi
  • 10 篇 zuoyong li
  • 10 篇 wang kezhi
  • 10 篇 gao xieping
  • 9 篇 hu rong
  • 9 篇 dai jianhua
  • 9 篇 yu yue
  • 9 篇 yang kun
  • 9 篇 pan cunhua
  • 8 篇 zhao huihuang
  • 8 篇 yang yin
  • 8 篇 huang yunqing

语言

  • 447 篇 英文
  • 43 篇 其他
  • 6 篇 中文
检索条件"机构=Hunan Provincial Key Laboratory of Intelligent Information Processing and Applied Mathematics"
495 条 记 录,以下是321-330 订阅
排序:
Adaptive Histogram Thresholding-Based Leukocyte Image Segmentation  15th
Adaptive Histogram Thresholding-Based Leukocyte Image Segmen...
收藏 引用
15th International Conference on intelligent information Hiding and Multimedia Signal processing, IIH-MSP 2019, held in conjunction with the 12th International Conference on Frontiers of information Technology, Applications and Tools, FITAT 2019
作者: Zhou, Xiaogen Wang, Chuansheng Li, Zuoyong Zhang, Fuquan College of Mathematics and Computer Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China School of Computer Science and Technology Harbin University of Science and Technology Harbin China
To improve the accuracy of leukocyte segmentation, this paper presents a novel method based on adaptive histogram thresholding (AHT). The proposed method first employs color component combination and AHT to extract th... 详细信息
来源: 评论
Closed-Loop Safe Correction for Reinforcement Learning Policy  4th
Closed-Loop Safe Correction for Reinforcement Learning Poli...
收藏 引用
4th International Conference on Ubiquitous Security, UbiSec 2024
作者: Yi, Zhi Lv, Qi Chen, Shuhong Liang, Ying Dai, Yinglong Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Normal University Changsha410081 China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou510006 China Blockchain Innovation Lab Swinburne University of Technology MelbourneVIC3122 Australia Molecular Nutrition Branch National Engineering Research Center of Rice and By-product Deep Processing College of Food Science and Engineering Central South University of Forestry and Technology Hunan Changsha410004 China
Trial and error learning is an approach with uncertain consequences. How to maintain policy security, stability, and efficiency under controlled circumstances, posing a significant academic challenge. Such as Reinforc... 详细信息
来源: 评论
Negative information filtering algorithm based on text content in multimedia networks
收藏 引用
International Journal of Performability Engineering 2019年 第11期15卷 3061-3071页
作者: Chen, Wenqing Fu, Weina College of Applied Technology China University of Labor Relations Beijing100000 China College of Computer and Information Engineering Inner Mongolia Agricultural University Hohhot010012 China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha410081 China
In the multimedia network environment, it is necessary to effectively filter negative information in the multimedia network and enhance the ability to mine and identify valid data. This paper presents a new algorithm ... 详细信息
来源: 评论
Controlled-source electromagnetic signal detection using a hybrid deep learning model: Convolutional and long short-term memory neural networks
收藏 引用
Computers & Geosciences 2025年 204卷
作者: Yecheng Liu Diquan Li Jin Li Yanfang Hu Zijie Liu Xian Zhang School of Geosciences and Info-Physics Central South University Changsha 410083 China Key Laboratory of Metallogenic Prediction of Non-Ferrous Metals and Geological Environment Monitor Ministry of Education Central South University Changsha 410083 China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Normal University Changsha 410081 China Hunan Provincial Key Laboratory of Finance & Economics Big Data Science and Technology School of Information Technology and Management Hunan University of Finance and Economics Changsha 410205 China
Controlled-source electromagnetic (CSEM) method using a periodic transmitted signal source suppresses random noise by superimposing and averaging the recorded signal over multiple periods. However, it still faces grea... 详细信息
来源: 评论
WeChat Public Platform for Customers Reserving Bank Branches Based IoT
WeChat Public Platform for Customers Reserving Bank Branches...
收藏 引用
作者: Jie Chen Xiaoman Liang Jian Zhang College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
With the developing of the social economy,the amount of currency circulation has increased and become more frequent,but the customer gathering is often occurred in the many bank's *** this paper,with some framewor... 详细信息
来源: 评论
The Optimal Implementation of Khudra Lightweight Block Cipher
The Optimal Implementation of Khudra Lightweight Block Ciphe...
收藏 引用
作者: Xiantong Huang Lang Li Ying Guo College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
In this paper,we discuss the area and speed balance optimization of Khudra lightweight block *** are three major ***,because the whole structure of the Khudra block cipher and its F-function are based on a Feistel str... 详细信息
来源: 评论
Constant-Weight Group Coded Bloom Filter for Multiple-Set Membership Queries
Constant-Weight Group Coded Bloom Filter for Multiple-Set Me...
收藏 引用
作者: Xiaomei Tian Huihuang Zhao College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
Multiple-set membership query problem plays a very important role in many network systems, including packet forwarding architectures in big data centers, routing switching devices and internet firewall systems. Many s... 详细信息
来源: 评论
Research on Task Scheduling in Distributed Vulnerability Scanning System
Research on Task Scheduling in Distributed Vulnerability Sca...
收藏 引用
作者: Jie Jiang Sixin Tang College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
Network threats caused by system vulnerabilities is increasing gradually, the distributed vulnerability scanning system can scan large-scale and complex networks and report the vulnerability information. Task scheduli... 详细信息
来源: 评论
An Optimized Scheme of information Hiding-Based Visual Secret Sharing
An Optimized Scheme of Information Hiding-Based Visual Secre...
收藏 引用
作者: Yi Zou Lang Li Ge Jiao College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
information hiding-based visual secret sharing(IH-VSS) uses the information hiding techniques to embed secret data into *** the IH-VSS scheme,hidden images are divided into n shadows under the guidance and constraints... 详细信息
来源: 评论
A Image Adaptive Steganography Algorithm Combining Chaotic Encryption and Minimum Distortion Function
A Image Adaptive Steganography Algorithm Combining Chaotic E...
收藏 引用
作者: Ge Jiao Jiahao Liu Sheng Zhou Ning Luo College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
Digital image has the characteristics of high redundancy and convenient processing, which is the ideal carrier of information hiding ***, digital image steganography has become a hot research direction in the field of... 详细信息
来源: 评论