咨询与建议

限定检索结果

文献类型

  • 151 篇 会议
  • 93 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 245 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 184 篇 工学
    • 137 篇 计算机科学与技术...
    • 116 篇 软件工程
    • 46 篇 信息与通信工程
    • 20 篇 控制科学与工程
    • 17 篇 生物工程
    • 14 篇 电气工程
    • 14 篇 电子科学与技术(可...
    • 13 篇 农业工程
    • 12 篇 光学工程
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 9 篇 机械工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
    • 4 篇 土木工程
  • 91 篇 理学
    • 59 篇 数学
    • 20 篇 生物学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 化学
    • 6 篇 系统科学
  • 59 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 16 篇 农学
    • 15 篇 作物学
  • 11 篇 医学
    • 10 篇 临床医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 5 篇 法学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 10 篇 semantics
  • 9 篇 information proc...
  • 7 篇 feature extracti...
  • 6 篇 support vector m...
  • 6 篇 convolution
  • 6 篇 data mining
  • 5 篇 computer science
  • 5 篇 image segmentati...
  • 5 篇 training
  • 4 篇 intrusion detect...
  • 4 篇 grid computing
  • 4 篇 educational inst...
  • 4 篇 computed tomogra...
  • 4 篇 algorithm design...
  • 4 篇 machine learning
  • 4 篇 image reconstruc...
  • 3 篇 trees (mathemati...
  • 3 篇 engineering in m...
  • 3 篇 face recognition
  • 3 篇 blood vessels

机构

  • 25 篇 school of comput...
  • 24 篇 provincial key l...
  • 12 篇 jiangsu provinci...
  • 10 篇 school of comput...
  • 9 篇 school of comput...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 6 篇 provincial key l...
  • 6 篇 college of infor...
  • 6 篇 zhejiang lab
  • 5 篇 laboratory of im...
  • 5 篇 department of co...
  • 5 篇 state key labora...
  • 5 篇 school of inform...
  • 5 篇 provincial key l...
  • 5 篇 college of compu...
  • 5 篇 jiangsu provinci...
  • 5 篇 laboratory of im...
  • 5 篇 jiangsu high tec...

作者

  • 18 篇 yu fei
  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 11 篇 yue guangxue
  • 10 篇 chen yang
  • 10 篇 yang chen
  • 6 篇 wu zhan
  • 6 篇 zhan wu
  • 6 篇 li peifeng
  • 6 篇 zhang zhizheng
  • 6 篇 huang chongwen
  • 6 篇 guodong zhou
  • 6 篇 yan xi
  • 5 篇 fei yu
  • 5 篇 yanqin zhu
  • 5 篇 yang yang
  • 5 篇 qian peide
  • 5 篇 tianling lyu
  • 5 篇 wentao zhu

语言

  • 229 篇 英文
  • 13 篇 中文
  • 3 篇 其他
检索条件"机构=JiangSu Provincial Key Lab. for Computer Information Processing Technology"
245 条 记 录,以下是151-160 订阅
排序:
NEAT-Net: An Unsupervised Cross-View Prior Inpainting Network for CBCT Metal Artifact Reduction  46
NEAT-Net: An Unsupervised Cross-View Prior Inpainting Networ...
收藏 引用
46th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2024
作者: Yang, Yang Tong, Zhan Zhong, Xinyun Shi, Yijie Xi, Yan Yu, Wenxue Wu, Zhan Chen, Yang First-Imaging Tech Shanghai China Southeast University Laboratory of Image Science and Technology The School of Computer Science and Engineering Nanjing China Southeast University Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing The Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Nanjing China
Intraoperative Cone-Beam Computed Tomography (CBCT) facilitates intraoperative navigation for Minimally Invasive Spine Surgery (MISS). However, high-attenuation metal implants used in MISS often cause metal artifacts ... 详细信息
来源: 评论
A new type of dehumidifier for enclosed high-voltage switchgear cabinet
收藏 引用
Telkomnika - Indonesian Journal of Electrical Engineering 2012年 第7期10卷 1637-1642页
作者: Zhang, Jinbo Shao, Tongguang Wang, Yu Wang, Jing College of Computer and Information Engineering Hohai University Changzhou 213022 China Jiangsu Provincial Key Lab. of Power Transmission Equipment Technology Changzhou 213022 China
In order to eliminate the internal condensation of enclosed switchgear cabinet, this paper introduced a subminiature and high-performance dehumidifier based on semiconductor refrigeration technology. This equipment ut... 详细信息
来源: 评论
Research on network malicious code dendritic cell immune algorithm based on fuzzy weighted support vector machine
Research on network malicious code dendritic cell immune alg...
收藏 引用
6th China Conference of Wireless Sensor Networks, CWSN 2012
作者: Li, Peng Wang, Ruchuan Zhou, Yanting Dai, Qiuyu College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China
According to the significant impact on the accuracy rate of detection of current immune algorithms brought by incorrect classification of signal, it proposes network malicious code dendritic cell immune algorithm base... 详细信息
来源: 评论
Data expression method in enterprise application using J2EE architecture
收藏 引用
WSEAS Transactions on Communications 2008年 第6期7卷 541-550页
作者: Zhang, Xiaoshuan Chen, Peijun Zhao, Ming College of Information and Electrical Engineering China Agricultural University Qinghua Donglu 17 Haidian Beijing 100083 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Shixinjie 1 Suzhou Jiangsu 215006 China
With use of the Internet, web browser-enabled software applications are developed rapidly. Nowadays enterprises are paying more attention than ever on developing their business on the Web. The demand for rapidly deliv... 详细信息
来源: 评论
A Packet Loss Discrimination Algorithm in Wireless IP Networks
A Packet Loss Discrimination Algorithm in Wireless IP Networ...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Hai-tao Zhao Yu-ning Dong Yang Li College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou China
In this paper, we propose an algorithm WMTA (wireless multimedia transmission algorithm) for multimedia transmission control over wireless-wired IP networks. The relationship between packet length and packet loss rate... 详细信息
来源: 评论
The application of flash into M-learning in 3G initial stage
The application of flash into M-learning in 3G initial stage
收藏 引用
International Symposium on Knowledge Acquisition and Modeling, KAM
作者: Yue-ming Tang Quan Liu Ling-ling Wang Department of Educational Technology Henan Normal University Xinxiang Henan China Institute of Computer Science and Technology Provincial Key Laboratory of Computer Information Processing Technology Soochow University Suzhou Jiangsu China
With the development of the 3G technology, M-learning enters a period of rapid development. But meanwhile 3G also restrains the development of M-learning due to several drawbacks in its early days. According to the ap... 详细信息
来源: 评论
Intra-Guided Dual-Energy Material Decomposition Method for Dual-Source CBCT Systems  46
Intra-Guided Dual-Energy Material Decomposition Method for D...
收藏 引用
46th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2024
作者: Zhong, Xinyun Lyu, Tianling Wu, Zhan Gao, Wei Xi, Yan Zhao, Wei Zhu, Wentao Chen, Yang Zhejiang Lab Hangzhou China First-Imaging Tech. Shanghai China Beihang University Beijing China Southeast University School of Computer Science and Engineering Laboratory of Image Science and Technology Nanjing China Southeast University Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Nanjing China
Dual-energy CBCT imaging plays a crucial role in advanced imaging applications due to its ability to quantify material components. Although there are multiple established systems for dual-energy imaging, they often co... 详细信息
来源: 评论
Learning convolutional neural network to maximize Pos@Top performance measure  25
Learning convolutional neural network to maximize Pos@Top pe...
收藏 引用
25th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, ESANN 2017
作者: Geng, Yanyan Liang, Ru-Ze Li, Weizhi Wang, Jingbin Liang, Gaoyuan Xu, Chenhao Wang, Jing-Yan Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou215006 China King Abdullah University of Science and Technology Thuwal23955 Saudi Arabia Suning Commerce RandD Center USA Inc. Palo AltoCA94304 United States Information Technology Service Center Intermediate People's Court of Linyi City Linyi China Jiangsu University of Technology Jiangsu213001 China New York University Abu Dhabi Abu Dhabi United Arab Emirates
In the machine learning problems, the performance measure is used to evaluate the machine learning models. Recently, the number positive data points ranked at the top positions (Pos@Top) has been a popular performance... 详细信息
来源: 评论
A Privacy Policy of P3P Based on Relational Database
A Privacy Policy of P3P Based on Relational Database
收藏 引用
International Multi-Symposiums on computer and Computational Sciences (IMSCCS)
作者: Bin Jiang Da-fung Zhang Chao Yang Guangxue Yue Fei Yu Software School Hunan University Changsha Hunan China College of Computer and Communication Hunan University Changsha Hunan China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Jiangsu Province China
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited. Traditional methods of database access control places great depe... 详细信息
来源: 评论
An Algorithm for 3D Image Segmentation
An Algorithm for 3D Image Segmentation
收藏 引用
International Conference on Image and Graphics (ICIG)
作者: Ding Zhi Dong Yu-ning College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Jiangsu Provincial Key Lab of Computer Information Processing Technology Suzhou University Suzhou China
We propose a new 3D image segmentation method based on prediction, block-matching and partial 3D constraint in this paper. The algorithm only needs to set a few key points in the first image. We use intensity informat... 详细信息
来源: 评论