咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 94 篇 期刊文献

馆藏范围

  • 240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 150 篇 工学
    • 113 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 46 篇 信息与通信工程
    • 21 篇 电气工程
    • 20 篇 控制科学与工程
    • 20 篇 生物工程
    • 10 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 8 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
  • 76 篇 理学
    • 49 篇 数学
    • 28 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 14 篇 物理学
    • 9 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 50 篇 管理学
    • 29 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 6 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 13 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 7 篇 conferences
  • 7 篇 privacy
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 data mining
  • 6 篇 machine learning
  • 6 篇 forecasting
  • 6 篇 training
  • 5 篇 sensors
  • 4 篇 power demand
  • 4 篇 telecommunicatio...
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 wireless sensor ...
  • 4 篇 computational mo...
  • 4 篇 clustering algor...

机构

  • 58 篇 school of comput...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 12 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 peng cheng labor...
  • 6 篇 college of compu...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 5 篇 nanjing universi...

作者

  • 37 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 15 篇 liu bin
  • 10 篇 chen ke-jia
  • 10 篇 yang geng
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lejun gong
  • 7 篇 dai hua
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 geng yang
  • 6 篇 li yun
  • 6 篇 huang qingming
  • 6 篇 chen xingguo
  • 6 篇 cao xiaochun
  • 6 篇 xu qianqian

语言

  • 233 篇 英文
  • 7 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Lab of Big Data and Security and Intelligent Processing"
240 条 记 录,以下是191-200 订阅
排序:
Image representation based on multi-features
Image representation based on multi-features
收藏 引用
International Conference on intelligent System and Knowledge Engineering, ISKE
作者: Xianzhong Long Lei Chen Qun Li College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing Jiangsu China School of Computer Science & Technology Nanjing University of Posts and Telecommunications Nanjing China
As one kind of popular application in computer vision, image clustering has attracted many attentions. Some machine learning algorithms have been widely employed, such as K-Means, Non-negative Matrix Factorization (NM... 详细信息
来源: 评论
Extraction of Interactions of Genes2Genes Related to Breast Cancer
Extraction of Interactions of Genes2Genes Related to Breast ...
收藏 引用
International Conference on Software Engineering Research, Management and Applications (SERA)
作者: Lejun Gong Daoyu Huang Shixing Sun Zhihong Gao Chuandi Pan Ronggen Yang Yongmin Li Geng Yang Jiangsu Key Lab of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Zhejiang Engineering Research Center of Intelligent Medicine The First Affiliated Hospital of Wenzhou Medical University Wenzhou China College of Intelligent Science and Control Engineering Jinling Institute of Technology Nanjing China
Breast cancer is the most prevalent disease to females in the worldwide. Its pathology remains unclear. Genetics factors is the ways to understand the molecular mechanism. This paper proposed a computational approach ... 详细信息
来源: 评论
GNEA: A Novel GCN-based Network Embedding Algorithm for Semantic Social Network
GNEA: A Novel GCN-based Network Embedding Algorithm for Sema...
收藏 引用
International Symposium on System and Software Reliability (ISSSR)
作者: Jinbo Zhao Jinling He Yuanhan Du Ming Tang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
With the development of semantic social networks, social networks become more complex and their size expands rapidly, which brings significant challenges to social network analysis. Network Embedding can transform the... 详细信息
来源: 评论
Bidirectional LSTM-CRF for biomedical named entity recognition
Bidirectional LSTM-CRF for biomedical named entity recogniti...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Xuemin Yang Zhihong Gao Yongmin Li Chuandi Pan Ronggen Yang Lejun Gong Geng Yang Jiangsu Key Laboratory of Big Data Security &Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Zhejiang Engineering Research Center of Intelligence Medicine Wenzhou China Faculty Intelligent Science and Control Engineering Jinling Institute of Technology Nanjing China
Bio-medical entity recognition extracts significant entities, for instance cells, proteins and genes, which is an arduous task in an automatic system that mine knowledge in bioinformatics texts. In this thesis, we uti...
来源: 评论
Collaborative Bi-Aggregation for Directed Graph Embedding
SSRN
收藏 引用
SSRN 2023年
作者: Liu, Linsong Chen, Ke-Jia Liu, Zheng Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China State Key Laboratory of Novel Software Technology Nanjing University Jiangsu Nanjing210093 China
Directed graph is able to model asymmetric relationships between nodes and research on directed graph embedding is of great significance in downstream graph analysis and inference. Learning source and target embedding... 详细信息
来源: 评论
Analysis on Attention Mechanism Application Schemes for Automatic Question Answering Systems
Analysis on Attention Mechanism Application Schemes for Auto...
收藏 引用
IEEE International Conference on Progress in Informatics and Computing (PIC)
作者: Xinyuan Lu Xiaolong Xu Yanfei Sun Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing Jiangsu China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing Jiangsu China Office of Scientific R&D Nanjing University of Posts and Telecommunications Nanjing Jiangsu China
An automatic question answering system is generally composed of the question analysis module, the information retrieval module, the answer selection module, etc. The core component of automatic question answering syst... 详细信息
来源: 评论
A Point Cloud Registration Method for Substations Based on an Improved SAC-IA Algorithm
A Point Cloud Registration Method for Substations Based on a...
收藏 引用
Chinese Automation Congress (CAC)
作者: Lei Wang Yiping Chen Haonan Zong Lulu Wang Jun Yin School of Computer Nanjing University of Posts and Telecommunications Nanjing PR China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing PR China School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing PR China
This paper proposes a point cloud registration method for substations based on an improved SAC-IA algorithm. This method optimizes the SAC-IA algorithm by filtering the randomly selected point pairs to ensure that the...
来源: 评论
Online Attentive Kernel-Based Temporal Difference Learning
arXiv
收藏 引用
arXiv 2022年
作者: Yang, Guang Chen, Xingguo Yang, Shangdong Wang, Huihui Dong, Shaokang Gao, Yang The the Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications National Engineering Laboratory for Agri-Product Quality Traceability Beijing Technology and Business University China The State Key Laboratory for Novel Software Technology Nanjing University China The PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China
With rising uncertainty in the real world, online Reinforcement Learning (RL) has been receiving increasing attention due to its fast learning capability and improving data efficiency. However, online RL often suffers... 详细信息
来源: 评论
Identifying outliers in astronomical images with unsupervised machine learning
arXiv
收藏 引用
arXiv 2022年
作者: Han, Yang Zou, Zhiqiang Li, Nan Chen, Yanli School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Jiangsu Nanjing China Key Laboratory of Optical Astronomy National Astronomical Observatories Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Astronomical outliers, such as unusual, rare or unknown types of astronomical objects or phenomena, constantly lead to the discovery of genuinely unforeseen knowledge in astronomy. More unpredictable outliers will be ... 详细信息
来源: 评论
Improving the Efficiency of Blockchain Applications with Smart Contract based Cyber-insurance
Improving the Efficiency of Blockchain Applications with Sma...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Jia Xu Yongqi Wu Xiapu Luo Dejun Yang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Department of Computing The Hong Kong Polytechnic University Hongkong China Department of Computer Science Colorado School of Mines Golden USA
Blockchain based applications benefit from decentralization, data privacy, and anonymity. However, they may suffer from inefficiency due to underlying blockchain. In this paper, we aim to address this limitation while... 详细信息
来源: 评论