咨询与建议

限定检索结果

文献类型

  • 287 篇 期刊文献
  • 208 篇 会议

馆藏范围

  • 495 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 329 篇 工学
    • 208 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 64 篇 信息与通信工程
    • 43 篇 电子科学与技术(可...
    • 39 篇 控制科学与工程
    • 38 篇 生物工程
    • 35 篇 电气工程
    • 24 篇 化学工程与技术
    • 21 篇 动力工程及工程热...
    • 20 篇 生物医学工程(可授...
    • 19 篇 材料科学与工程(可...
    • 18 篇 网络空间安全
    • 16 篇 机械工程
    • 15 篇 光学工程
    • 14 篇 土木工程
    • 12 篇 安全科学与工程
    • 11 篇 力学(可授工学、理...
    • 11 篇 建筑学
    • 8 篇 仪器科学与技术
  • 272 篇 理学
    • 186 篇 数学
    • 61 篇 物理学
    • 44 篇 生物学
    • 35 篇 系统科学
    • 32 篇 统计学(可授理学、...
    • 26 篇 化学
  • 70 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 17 篇 医学
    • 16 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 10 篇 法学
  • 7 篇 教育学
  • 6 篇 农学
  • 5 篇 军事学
  • 4 篇 经济学
  • 3 篇 艺术学

主题

  • 18 篇 feature extracti...
  • 12 篇 deep learning
  • 10 篇 image segmentati...
  • 9 篇 semantics
  • 8 篇 internet of thin...
  • 6 篇 free energy
  • 6 篇 object detection
  • 6 篇 convolution
  • 6 篇 data mining
  • 6 篇 machine learning
  • 6 篇 lightweight bloc...
  • 6 篇 training
  • 5 篇 deep neural netw...
  • 5 篇 generative adver...
  • 5 篇 finite element m...
  • 5 篇 accuracy
  • 5 篇 harmonic analysi...
  • 4 篇 reinforcement le...
  • 4 篇 distillation
  • 4 篇 side-channel ana...

机构

  • 57 篇 hunan provincial...
  • 50 篇 college of compu...
  • 46 篇 hunan provincial...
  • 44 篇 college of mathe...
  • 28 篇 hunan provincial...
  • 19 篇 fujian provincia...
  • 18 篇 college of compu...
  • 17 篇 hunan key labora...
  • 15 篇 fujian provincia...
  • 14 篇 fujian provincia...
  • 14 篇 college of infor...
  • 14 篇 school of mathem...
  • 13 篇 fujian provincia...
  • 12 篇 hunan provincial...
  • 11 篇 school of mathem...
  • 10 篇 hunan key labora...
  • 8 篇 school of mathem...
  • 8 篇 hunan normal uni...
  • 8 篇 college of mathe...
  • 8 篇 key laboratory o...

作者

  • 28 篇 jiang kai
  • 21 篇 li zuoyong
  • 18 篇 li lang
  • 18 篇 lang li
  • 18 篇 zhang juan
  • 13 篇 jiang feibo
  • 13 篇 dong li
  • 12 篇 jiao ge
  • 11 篇 shu shi
  • 10 篇 zuoyong li
  • 10 篇 wang kezhi
  • 10 篇 gao xieping
  • 9 篇 hu rong
  • 9 篇 dai jianhua
  • 9 篇 yu yue
  • 9 篇 yang kun
  • 9 篇 pan cunhua
  • 8 篇 zhao huihuang
  • 8 篇 yang yin
  • 8 篇 huang yunqing

语言

  • 447 篇 英文
  • 43 篇 其他
  • 6 篇 中文
检索条件"机构=Hunan Provincial Key Laboratory of Intelligent Information Processing and Applied Mathematics"
495 条 记 录,以下是351-360 订阅
排序:
Social Emergency Event Judgement based on BiLSTM-CRF  19
Social Emergency Event Judgement based on BiLSTM-CRF
收藏 引用
19th Chinese National Conference on Computational Linguistic, CCL 2020
作者: Hu, Huijun Wang, Cong Dai, Jianhua Liu, Maofu School of Computer Science and Technology Wuhan University of Science and Technology Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan430065 China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha410081 China
In recent years, classification and rating of social emergency event have attracted more and more attentions in emergency management. However, most of the current studies adopt the rule-based methods to identify the e... 详细信息
来源: 评论
Three-dimensional spin Hall effect of light in tight focusing
收藏 引用
Physical Review A 2020年 第2期101卷 023819-023819页
作者: Weixing Shu Chuyang Lin Jun Wu Shizhen Chen Xiaohui Ling Xinxing Zhou Hailu Luo Shuangchun Wen Key Laboratory for Micro/Nano Optoelectronic Devices of Ministry of Education & Hunan Provincial Key Laboratory of Low-Dimensional Structural Physics and Devices School of Physics and Electronics Hunan University Changsha 410082 China Key Laboratory of Low Dimensional Quantum Structures and Quantum Control of Ministry of Education Hunan Normal University Changsha 410081 China College of Computer Science and Electronic Engineering Hunan University Changsha 410082 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application College of Physics and Electronic Engineering Hengyang Normal University Hengyang 421002 China
We theoretically propose the realization of a three-dimensional (3D) spin Hall effect (SHE) of light by tightly focusing a linearly polarized light. Owing to the spin-orbital interaction in focusing, the left and righ... 详细信息
来源: 评论
Modified image dehazing method based on dark channel prior  2nd
Modified image dehazing method based on dark channel prior
收藏 引用
2nd International Conference on Smart Vehicular Technology, Transportation, Communication and Applications, VTCA 2018
作者: Hu, Junpeng Cao, Xinrong Chen, Xinwei Li, Zuoyong Zhang, Fuquan College of Mathematics and Computer Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China
Image dehazing is an important research topic in the field of image processing and computer vision. Image dehazing aims to remove haze in images and make image scenes clearer. Image dehazing based on dark channel prio... 详细信息
来源: 评论
Hybrid chaotic encryption algorithm for securing DICOM systems
收藏 引用
International Journal of Performability Engineering 2019年 第5期15卷 1436-1444页
作者: Jiao, Ge Zhou, Sheng Li, Lang Zou, Yi College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China School of Environment Protection and Safety Engineering University of South China Hengyang421002 China
The DICOM system contains patients' personal privacy and may present a risk of information leakage in telemedicine diagnostics. In order to solve the security problem of the DICOM system, we propose a medical imag... 详细信息
来源: 评论
Global stability of the periodic solution of the three level food chain model with extinction of top predator
arXiv
收藏 引用
arXiv 2021年
作者: Cheng, Kaijen You, Hongming Yang, Ting-Hui School of Mathematics and Statistics Zhaoqing University Guangdong Zhaoqing526061 China College of Mathematics and Computer Science Quanzhou Normal University Quanzhou362000 China Department of Mathematics Tamkang University No. 151 Yingzhuan Road Tamsui Dist. New Taipei City25137 Taiwan Fujian Provincial Key Laboratory of Data-Intensive Computing Key Laboratory of Intelligent Computing and Information Processing School of Mathematics and Computer Science Quanzhou Normal University Quanzhou China
In this work, we revisit the classical Holling type II three species food chain model from a different viewpoint. Two critical parameters λ1 and λ2 dependent on all parameters are defined. The existence and local st... 详细信息
来源: 评论
Dynamic analysis of high-dimensional fractional-order gene regulation networks with time delay
Dynamic analysis of high-dimensional fractional-order gene r...
收藏 引用
第三十九届中国控制会议
作者: Zhe Zhang Can Ding Jing Zhang Feng Liu Yingjie Zhang FanyongCheng College of Electrical and Information Engineering Hunan University School of Automation China University of Geosciences College of Computer Science and Electronic Engineering Hunan University Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University
This paper mainly analyzes the stability of high-dimensional fractional-order gene regulatory network systems with time *** on the judgment of eigenvalues,this paper proposes sufficient information about the stability... 详细信息
来源: 评论
A data clustering strategy for enhancing mutual privacy in healthcare system of IoT
A data clustering strategy for enhancing mutual privacy in h...
收藏 引用
2019 IEEE International Conferences on Ubiquitous Computing and Communications and Data Science and Computational Intelligence and Smart Computing, Networking and Services, IUCC/DSCI/SmartCNS 2019
作者: Guo, Xuancheng Lin, Hui Xu, Chuanfeng Lin, Wenzhong School of Mathematics and Computer Science Fujian Normal University Fuzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China
Recent advances in the healthcare system of Internet of Things (IoT) has led to a generation of a large amount of physic sensor data. Data analyst collects and analyzes these sensor data through wireless sensor networ... 详细信息
来源: 评论
Attack intent analysis method based on attack path graph  9
Attack intent analysis method based on attack path graph
收藏 引用
9th International Conference on Communication and Network Security, ICCNS 2019
作者: Chen, Biqiong Liu, Yanhua Li, Shijin Gao, Xiaoling College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the rapid development of network technology, network security problems are gradually increasing, and the network attack situation is very severe. In a complex attack scenario, timely detection of potential attack... 详细信息
来源: 评论
A comprehensive assessment method of asset importance for key asset protection  9
A comprehensive assessment method of asset importance for ke...
收藏 引用
9th International Conference on Communication and Network Security, ICCNS 2019
作者: Gao, Xiaoling Liu, Yanhua Qiu, Yanbin Liu, Huajun College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
In a given system network, an important prerequisite for security risk control is how to accurately calculate the impact of different host assets in the topology on the spread of attack risk. In this regard, we propos... 详细信息
来源: 评论
A Comprehensive Assessment Method of Asset Importance for key Asset Protection  2019
A Comprehensive Assessment Method of Asset Importance for Ke...
收藏 引用
Proceedings of the 2019 the 9th International Conference on Communication and Network Security
作者: Xiaoling Gao Yanhua Liu Yanbin Qiu Huajun Liu College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
In a given system network, an important prerequisite for security risk control is how to accurately calculate the impact of different host assets in the topology on the spread of attack risk. In this regard, we propos... 详细信息
来源: 评论