咨询与建议

限定检索结果

文献类型

  • 55 篇 期刊文献
  • 37 篇 会议

馆藏范围

  • 92 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 69 篇 工学
    • 57 篇 计算机科学与技术...
    • 53 篇 软件工程
    • 20 篇 信息与通信工程
    • 16 篇 电气工程
    • 12 篇 生物工程
    • 8 篇 电子科学与技术(可...
    • 8 篇 控制科学与工程
    • 7 篇 化学工程与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 生物医学工程(可授...
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 建筑学
    • 2 篇 力学(可授工学、理...
    • 2 篇 土木工程
    • 2 篇 地质资源与地质工...
    • 2 篇 安全科学与工程
    • 2 篇 网络空间安全
  • 43 篇 理学
    • 23 篇 数学
    • 12 篇 生物学
    • 10 篇 物理学
    • 7 篇 化学
    • 4 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 21 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 6 篇 医学
    • 6 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 2 篇 农学
  • 1 篇 经济学
  • 1 篇 法学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 5 篇 deep learning
  • 5 篇 image segmentati...
  • 4 篇 deep neural netw...
  • 4 篇 semantics
  • 3 篇 distillation
  • 3 篇 latent semantic ...
  • 2 篇 ultrasonic imagi...
  • 2 篇 reinforcement le...
  • 2 篇 generative adver...
  • 2 篇 neural networks
  • 2 篇 evolutionary alg...
  • 2 篇 particle swarm o...
  • 2 篇 granular computi...
  • 2 篇 synthetic apertu...
  • 2 篇 machine learning
  • 2 篇 federated learni...
  • 2 篇 feature selectio...
  • 2 篇 convolutional ne...
  • 1 篇 multi-objective ...
  • 1 篇 greedy strategy

机构

  • 45 篇 hunan provincial...
  • 8 篇 college of infor...
  • 6 篇 hunan normal uni...
  • 6 篇 college of liber...
  • 5 篇 xiangjiang labor...
  • 5 篇 school of inform...
  • 5 篇 hunan normal uni...
  • 4 篇 changsha social ...
  • 4 篇 school of electr...
  • 4 篇 school of comput...
  • 4 篇 hunan provincial...
  • 4 篇 key laboratory o...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 changchun instit...
  • 4 篇 hunan provincial...
  • 3 篇 school of comput...
  • 3 篇 xiangtan univers...
  • 3 篇 school of comput...
  • 3 篇 school of mathem...

作者

  • 14 篇 jiang feibo
  • 14 篇 dong li
  • 11 篇 wang kezhi
  • 11 篇 dai jianhua
  • 10 篇 yang kun
  • 10 篇 pan cunhua
  • 8 篇 gao xieping
  • 5 篇 peng yubo
  • 5 篇 xieping gao
  • 4 篇 liu yunlong
  • 4 篇 huang jingui
  • 4 篇 yang tian
  • 4 篇 hu kai
  • 4 篇 kai hu
  • 3 篇 zou juan
  • 3 篇 yang shengxiang
  • 3 篇 hua ma
  • 3 篇 yinglong dai
  • 3 篇 wensheng tang
  • 3 篇 fu weina

语言

  • 82 篇 英文
  • 8 篇 其他
  • 2 篇 中文
检索条件"机构=Hunan Provincial Laboratory of Intelligent Computing and Language Information Processing"
92 条 记 录,以下是51-60 订阅
排序:
Pseudo Multi-Source Domain Extension and Selective Pseudo-Labeling for Unsupervised Domain Adaptive Medical Image Segmentation
Pseudo Multi-Source Domain Extension and Selective Pseudo-La...
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Xiaokang Liu Zhiqiang Wang Kai Hu Xieping Gao Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan China College of Medical Imaging Laboratory and Rehabilitation Xiangnan University Chenzhou China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha China
Unsupervised domain adaptation (UDA) attracts extra attention in medical image processing because no additional labels are required when adapting to different distributions. In this work, we propose a novel unsupervis... 详细信息
来源: 评论
Temperature dependence of commensurate magnetic resonance in cuprate superconductors  5th
Temperature dependence of commensurate magnetic resonance in...
收藏 引用
5th Conference on New Advances in Condensed Matter Physics, NACMP 2018
作者: Lan, Yu Kuang, Lülin Hunan Provincial Key Laboratory of Intelligent Information Processing and Application College of Physics and Electronic Engineering Hengyang Normal University Hengyang421002 China National Research Center for High-Performance Computing Engineering Technology Sugon Beijing100193 China
Within the kinetic energy driven superconducting mechanism, we have studied the temperature dependence of commensurate magnetic resonance in cuprate superconductors. It is shown that the commensurate magnetic resonanc... 详细信息
来源: 评论
UWB SAR image segmentation algorithm based on polynomial analysis of statistical distribution  6
UWB SAR image segmentation algorithm based on polynomial ana...
收藏 引用
6th Asia-Pacific Conference on Synthetic Aperture Radar, APSAR 2019
作者: Yuming, Wang Tian, Jin Chaopeng, Luo College of Information Science and Engineering Hunan Provincial Key Laboratory of Intelligent Computhing and Language Information Processing Science and Technology on Near-Surface Detection Laboratory Hunan Normal University Changsha China College of Electronic Science and Technology Science and Technology on Near-Surface Detection Laboratory National University of Defense Technology Changsha China Science and Technology on Near-Surface Detection Laboratory Wuxi214035 China
Aimed at the segmentation problem of ultrawideband synthetic aperture radar (UWB SAR) image, a novel algorithm based on polynomial analysis of statistical distribution is proposed in this letter. Firstly, we estimate ... 详细信息
来源: 评论
Y-Mol: A Multiscale Biomedical Knowledge-Guided Large language Model for Drug Development
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Tengfei Lin, Xuan Li, Tianle Li, Chaoyi Chen, Long Zhou, Peng Cai, Xibao Yang, Xinyu Zeng, Daojian Cao, Dongsheng Zeng, Xiangxiang College of Computer Science and Electronic Engineering Hunan University China Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Xiangtan University China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University China Xiangya School of Pharmaceutical Sciences Central South University China
Large language Models (LLMs) have recently demonstrated remarkable performance in general tasks across various fields. However, their effectiveness within specific domains such as drug development remains challenges. ... 详细信息
来源: 评论
BGRA-Net: Boundary-Guided and Region-Aware Convolutional Neural Network for the Segmentation of Breast Ultrasound Images
BGRA-Net: Boundary-Guided and Region-Aware Convolutional Neu...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xiang Zhang Xuanya Li Kai Hu Xieping Gao Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan China Baidu Inc. Beijing China Key Laboratory of Medical Imaging and Artifical Intelligence of Hunan Province Xiangnan University Chenzhou China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha China
In this paper, we propose a novel convolutional neural network based on boundary-guided and region-aware (BGRA-Net) for breast tumor segmentation in ultrasound images. In particular, in the encoding stage, we propose ... 详细信息
来源: 评论
Semi-Supervised Feature Selection Based on Fuzzy Related Family
SSRN
收藏 引用
SSRN 2023年
作者: Yang, Tian Guo, Zhijun Li, Yuan-Jiang Deng, Yanfang Qian, Yuhua Hunan Provincial Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Hunan Changsha410081 China Institute of Big Data Science and Industry Shanxi University Shanxi Taiyuan030006 China
Existing machine learning algorithms face the problems of label-missing and high dimensionality. Feature selection is an effective dimensionality reduction method that can improve the efficiency and accuracy of subseq... 详细信息
来源: 评论
Reachable Distance Function for KNN Classification
arXiv
收藏 引用
arXiv 2021年
作者: Zhang, Shichao Li, Jiaye Li, Yangding School of Computer Science and Engineering Central South University Changsha410083 China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha410081 China
Distance function is a main metrics of measuring the affinity between two data points in machine learning. Extant distance functions often provide unreachable distance values in real applications. This can lead to inc... 详细信息
来源: 评论
Joint Optimization of Deployment and Trajectory in UAV and IRS-Assisted IoT Data Collection System
arXiv
收藏 引用
arXiv 2022年
作者: Dong, Li Liu, Zhibin Jiang, Feibo Wang, Kezhi Changsha Social Laboratory of Artificial Intelligence Hunan University of Technology and Business Changsha China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha China The Department of Computer and Information Sciences Northumbria University United Kingdom
Unmanned aerial vehicles (UAV) can be applied in many Internet of Things (IoT) systems, e.g., smart farms, as a data collection platform. However, the UAV-IoT wireless channels may be occasionally blocked by trees or ... 详细信息
来源: 评论
Deep progressive reinforcement learning-based flexible resource scheduling framework for IRS and UAV-assisted MEC system
arXiv
收藏 引用
arXiv 2024年
作者: Dong, Li Jiang, Feibo Wang, Minjie Peng, Yubo Li, Xiaolong School of Computer Science Hunan University of Technology and Business Changsha China Xiangjiang Laboratory Changsha China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha China College of Information Science and Engineering Hunan Normal University Changsha China
The intelligent reflection surface (IRS) and unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) system is widely used in temporary and emergency scenarios. Our goal is to minimize the energy consumptio... 详细信息
来源: 评论
Learning to Learn Transferable Generative Attack for Person Re-Identification
arXiv
收藏 引用
arXiv 2024年
作者: Bian, Yuan Liu, Min Wang, Xueping Ma, Yunfeng Wang, Yaonan The College of Electrical and Information Engineering Hunan University National Engineering Research Center of Robot Visual Perception and Control Technology Hunan Changsha China The College of Information Science and Engineering Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Changsha China
Deep learning-based person re-identification (re-id) models are widely employed in surveillance systems and inevitably inherit the vulnerability of deep networks to adversarial attacks. Existing attacks merely conside... 详细信息
来源: 评论