咨询与建议

限定检索结果

文献类型

  • 63 篇 会议
  • 57 篇 期刊文献

馆藏范围

  • 120 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 84 篇 工学
    • 63 篇 计算机科学与技术...
    • 46 篇 软件工程
    • 23 篇 信息与通信工程
    • 12 篇 生物工程
    • 9 篇 电气工程
    • 7 篇 机械工程
    • 7 篇 电子科学与技术(可...
    • 5 篇 控制科学与工程
    • 4 篇 化学工程与技术
    • 3 篇 光学工程
    • 3 篇 交通运输工程
    • 3 篇 网络空间安全
    • 2 篇 生物医学工程(可授...
    • 2 篇 安全科学与工程
  • 44 篇 理学
    • 30 篇 数学
    • 13 篇 生物学
    • 9 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 化学
    • 2 篇 地球物理学
    • 2 篇 地质学
  • 24 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 5 篇 教育学
    • 5 篇 教育学
  • 5 篇 医学
    • 2 篇 临床医学
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学

主题

  • 6 篇 deep learning
  • 4 篇 convolution
  • 4 篇 feature extracti...
  • 4 篇 edge computing
  • 3 篇 object detection
  • 3 篇 convolutional ne...
  • 2 篇 generative adver...
  • 2 篇 big data
  • 2 篇 crops
  • 2 篇 noise
  • 2 篇 predictive model...
  • 2 篇 semantics
  • 2 篇 small object det...
  • 2 篇 machine learning
  • 2 篇 steganography
  • 2 篇 transforms
  • 2 篇 students
  • 2 篇 dynamic programm...
  • 2 篇 accuracy
  • 2 篇 agriculture

机构

  • 35 篇 hunan provincial...
  • 30 篇 school of comput...
  • 21 篇 key laboratory o...
  • 20 篇 key laboratory o...
  • 15 篇 school of comput...
  • 5 篇 school of comput...
  • 4 篇 school of comput...
  • 4 篇 hunan provincial...
  • 4 篇 huaihua universi...
  • 4 篇 hunan provincial...
  • 4 篇 hunan provincial...
  • 3 篇 department of as...
  • 3 篇 changsha univers...
  • 3 篇 changsha univers...
  • 3 篇 school of comput...
  • 3 篇 college of infor...
  • 3 篇 college of compu...
  • 3 篇 institute of ast...
  • 3 篇 school of inform...
  • 3 篇 school of comput...

作者

  • 12 篇 liu yiwen
  • 10 篇 feng li
  • 8 篇 dengyong zhang
  • 7 篇 li wenjun
  • 7 篇 shi yuanquan
  • 7 篇 li ping
  • 7 篇 mi chunqiao
  • 6 篇 he shiming
  • 6 篇 peng xiaoning
  • 6 篇 changhua zhao
  • 6 篇 gao yanxia
  • 5 篇 fu jinrong
  • 5 篇 chunqiao mi
  • 5 篇 yang yongjie
  • 5 篇 shuo cai
  • 5 篇 wenjun li
  • 5 篇 li feng
  • 4 篇 fei yu
  • 4 篇 zhou shuren
  • 4 篇 qu taiguo

语言

  • 118 篇 英文
  • 2 篇 其他
检索条件"机构=Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation"
120 条 记 录,以下是11-20 订阅
排序:
Texture synthesis and design based on elements distribution creation  1
Texture synthesis and design based on elements distribution ...
收藏 引用
1st EAI International Conference on Computer Science and Engineering, COMPSE 2016
作者: Gui, Yan Liu, Yang Li, Feng Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology Changsha Hunan410114 China
The texture synthesis and design starts with an initial elements arrangement and expands it outward by using local and global growth, to obtain the new larger distribution of texture elements. There are two types of s... 详细信息
来源: 评论
Parameters Compressing in Deep Learning
收藏 引用
Computers, Materials & Continua 2020年 第1期62卷 321-336页
作者: Shiming He Zhuozhou Li Yangning Tang Zhuofan Liao Feng Li Se-Jung Lim School of Computer and Communication Engineering Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on TransportationChangsha University of Science and TechnologyChangsha410114China Liberal Arts&Convergence Studies Honam UniversityGwangju62399Korea
With the popularity of deep learning tools in image decomposition and natural language processing,how to support and store a large number of parameters required by deep learning algorithms has become an urgent problem... 详细信息
来源: 评论
Connected dominating set construction algorithm for wireless networks based on connected subset
收藏 引用
Journal of Communications 2016年 第1期11卷 50-57页
作者: Tang, Qiang Luo, Yuan-Sheng Xie, Ming-Zhong Li, Ping Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology Changsha410114 China School of Computer and Communication Engineering Changsha University of Science and Technology Changsha410114 China
In this paper, a Connected Dominating Set (CDS) construction algorithm CSCDS (Connected Subset based CDS) is proposed, which is based on the connected subset concept. The CSCDS contains two main stages, which are domi... 详细信息
来源: 评论
On the parameterized complexity of minimum/maximum degree vertex deletion on several special graphs
收藏 引用
Frontiers of Computer Science 2023年 第4期17卷 97-107页
作者: Jia LI Wenjun LI Yongjie YANG Xueying YANG School of Information Engineering Hunan Industry PolytechnicChangsha 410036China Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation School of Computer and Communication EngineeringChangsha University of Science and TechnologyChangsha 410015China Chair of Economic Theory Saarland UniversitySaarbrücken 66123Germany
In the minimum degree vertex deletion problem,we are given a graph,a distinguished vertex in the graph,and an integer κ,and the question is whether we can delete at most κ vertices from the graph so that the disting... 详细信息
来源: 评论
An improved branching algorithm for the proper interval edge deletion problem
收藏 引用
Frontiers of Computer Science 2022年 第2期16卷 178-180页
作者: Wenjun LI Xiaojing TANG Yongjie YANG School of Computer and Communication Engineering Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on TransportationChangsha University of Science and TechnologyChangsha 410015China School of Computer Science and Engineering Central South UniversityChangsha 410083China
1 Introduction For a graph class G,the G-EDGE DELETION problem is to determine whether a given graph can be transformed into a graph in G by deleting at most k *** G-EDGE DELETION problem for a large body of graph cla... 详细信息
来源: 评论
LogADCH: Hyperspheric-Based Log Message Anomaly Detection And Classification
LogADCH: Hyperspheric-Based Log Message Anomaly Detection An...
收藏 引用
2023 International Conference on Frontiers of Robotics and Software Engineering, FRSE 2023
作者: He, Shiming Xiao, Jinpan Chen, Bowen Lei, Ying Changsha University of Science & Technology School of Computer and Communication Engineering The Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha China
Web services have been integrated with all walks of life in society. Abnormalities in the network and services seriously affect user experience and company revenue. The system log records various information of the sy... 详细信息
来源: 评论
Fast Multivariate Time Series Anomaly Detection Based on Matrix Completion
Fast Multivariate Time Series Anomaly Detection Based on Mat...
收藏 引用
2023 International Conference on Frontiers of Robotics and Software Engineering, FRSE 2023
作者: He, Shiming Yi, Tongzhijian Yang, Bo Guo, Chenxi Changsha University of Science & Technology School of Computer and Communication Engineering The Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha China
Increasingly complex systems contain large numbers of devices that generate great number of multivariate time series that are monitored and recorded. For anomaly detection of these complex time series, deep learning t... 详细信息
来源: 评论
TF-DTA: A Deep Learning Approach Using Transformer Encoder to Predict Drug-Target Binding Affinity
TF-DTA: A Deep Learning Approach Using Transformer Encoder t...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Li, Wenjun Zhou, Yiqiang Tang, Xiwei Changsha University of Science and Technology Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Hunan Changsha China Hunan First Normal University School of Computer Science Hunan Changsha China
Bioinformatics is a rapidly growing field that involves the application of computational methods to analyze and interpret biological data. One important task in bioinformatics is predicting the drug-target affinity (D... 详细信息
来源: 评论
Traceable certificateless ring signature scheme for no full anonymous applications
收藏 引用
International Journal of Network Security 2018年 第4期20卷 762-773页
作者: Gu, Ke Wang, LinYu Wu, Na Liao, NianDong School of Computer and Communication Engineering Changsha University of Science and Technology Wangjiali Rd Tianxin district Changsha Hunan Province410114 China Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology China
With the rapid development of identity-based cryptography, several traceable (or linkable) identity-based ring signature (TIBRS) schemes have been proposed. Compared with ring signature based on public key cryptograph... 详细信息
来源: 评论
Hybrid Pruning Method Based on Convolutional Neural Network Sensitivity and Statistical Threshold  2
Hybrid Pruning Method Based on Convolutional Neural Network ...
收藏 引用
2nd International Conference on Computer, big data and Artificial Intelligence, ICCBDAI 2021
作者: Guo, Changyi Li, Ping School of Computer and Communication Engineering Changsha University of Science and Technology Hunan Changsha410114 China Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Hunan Changsha410114 China
The hybrid pruning algorithm can not only ensure the precision of the network, but also achieve a good balance between pruning ratio and computation. However, traditional pruning algorithms use coarse-grained or fine-... 详细信息
来源: 评论