咨询与建议

限定检索结果

文献类型

  • 547 篇 会议
  • 533 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,081 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 785 篇 工学
    • 570 篇 计算机科学与技术...
    • 468 篇 软件工程
    • 183 篇 信息与通信工程
    • 106 篇 控制科学与工程
    • 99 篇 生物工程
    • 76 篇 电气工程
    • 69 篇 光学工程
    • 69 篇 电子科学与技术(可...
    • 64 篇 机械工程
    • 58 篇 生物医学工程(可授...
    • 46 篇 化学工程与技术
    • 37 篇 仪器科学与技术
    • 22 篇 网络空间安全
    • 21 篇 建筑学
    • 21 篇 交通运输工程
    • 19 篇 土木工程
    • 18 篇 材料科学与工程(可...
  • 383 篇 理学
    • 225 篇 数学
    • 101 篇 物理学
    • 101 篇 生物学
    • 69 篇 统计学(可授理学、...
    • 52 篇 化学
    • 27 篇 系统科学
  • 230 篇 管理学
    • 131 篇 图书情报与档案管...
    • 102 篇 管理科学与工程(可...
    • 33 篇 工商管理
  • 48 篇 医学
    • 37 篇 临床医学
    • 30 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
  • 22 篇 农学
  • 21 篇 法学
    • 19 篇 社会学
  • 11 篇 教育学
  • 9 篇 经济学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 哲学
  • 1 篇 军事学

主题

  • 46 篇 semantics
  • 33 篇 training
  • 31 篇 feature extracti...
  • 25 篇 image segmentati...
  • 20 篇 object detection
  • 19 篇 convolution
  • 18 篇 deep learning
  • 16 篇 machine learning
  • 15 篇 data mining
  • 15 篇 visualization
  • 15 篇 computer vision
  • 14 篇 support vector m...
  • 14 篇 computational mo...
  • 14 篇 pattern recognit...
  • 14 篇 information proc...
  • 13 篇 face recognition
  • 12 篇 generative adver...
  • 12 篇 accuracy
  • 11 篇 conferences
  • 11 篇 signal processin...

机构

  • 78 篇 shanghai key lab...
  • 34 篇 institute of sci...
  • 28 篇 pca lab key lab ...
  • 26 篇 school of comput...
  • 25 篇 school of comput...
  • 24 篇 provincial key l...
  • 23 篇 school of comput...
  • 22 篇 shanghai enginee...
  • 21 篇 key laboratory o...
  • 21 篇 university of ch...
  • 21 篇 shanghai key lab...
  • 18 篇 shanghai center ...
  • 17 篇 pca lab key lab ...
  • 15 篇 department of co...
  • 15 篇 national key lab...
  • 15 篇 key lab of intel...
  • 14 篇 national enginee...
  • 13 篇 key lab. of inte...
  • 13 篇 school of comput...
  • 13 篇 peng cheng labor...

作者

  • 74 篇 yang jian
  • 33 篇 jian yang
  • 32 篇 zhang wenqiang
  • 30 篇 zhang junping
  • 27 篇 shan hongming
  • 25 篇 xie jin
  • 19 篇 zhou shuigeng
  • 19 篇 shuigeng zhou
  • 17 篇 guan jihong
  • 17 篇 yu fei
  • 17 篇 gong chen
  • 16 篇 zhu qiaoming
  • 16 篇 junping zhang
  • 16 篇 jihong guan
  • 15 篇 huang zhizhong
  • 15 篇 hongming shan
  • 15 篇 jiang haobo
  • 14 篇 kong fang
  • 14 篇 chen zhaoyu
  • 14 篇 huang qingming

语言

  • 1,004 篇 英文
  • 57 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Key Lab of Computer Information Processing Technology"
1081 条 记 录,以下是891-900 订阅
排序:
Fast Template Matching with Partial Skipping Using Sub-template
Fast Template Matching with Partial Skipping Using Sub-templ...
收藏 引用
International Conference on Audio, Language and Image processing
作者: Qiao Zhang Huijie Gao Zhen Kang State Key Lab. of Multi-spectral Information Processing Technology Institute for Pattern Recognition and Artificial Intelligence School of Mathematic & Computer Science Wuhan Polytechnic University
This paper presents a new fast template matching method with partial skipping using sub-template. In this method, we use sub-template to search point by point in the current searched window, and compare every SAD with... 详细信息
来源: 评论
Convergence analysis of particle swarm optimization algorithm
收藏 引用
Advances in information Sciences and Service Sciences 2012年 第14期4卷 25-32页
作者: Gao, Shang Cao, Cungen School of Computer Science and Engineering Jiangsu University of Science and Technology Zhenjiang 212003 China Key Laboratory of Intelligent Computing Information Processing of Ministry of Education Xiangtan University Xiantan 411105 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
Using Particle Swarm Optimization to handle complex functions with high-dimension it has the problems of low convergence speed and sensitivity to local convergence. The convergence of particle swarm algorithm is studi... 详细信息
来源: 评论
Research on intrusion detection model of heterogeneous attributes clustering
Journal of Software
收藏 引用
Journal of Software 2012年 第12期7卷 2823-2831页
作者: Xie, Linquan Wang, Ying Yu, Fei Xu, Chen Yue, Guangxue School of Science Jiangxi University of Science and Technology 341000 Ganzhou China School of Science Jiangxi University of Science and Technology 341000 Ganzhou China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University 215000 Soochow China School of Information Science and Engineering Hunan University 416000 Changsha China Department of Computer Science and Technology Huaihua University Huaihua China
A fuzzy clustering algorithm for intrusion detection based on heterogeneous attributes is proposed in this paper. Firstly, the algorithm modifies the comparability measurement for the categorical attributes according ... 详细信息
来源: 评论
Sentence alignment for web page text based on vector space model
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第17期6卷 144-153页
作者: Zhang, Guan-Hong Odbal Department of Computer science and technology Key Lab of Network and Intelligent Information Processing Hefei University Anhui Hefei 230601 China Hefei Institutes of Physical Science of Chinese Academy Science Anhui Hefei 230031 China
There exist noisy, unparallel sentences in parallel web pages. Web page structure is subjected to some limitation for sentences alignment task for web page text. The most straightforward way of aligning sentences is u... 详细信息
来源: 评论
A new type of dehumidifier for enclosed high-voltage switchgear cabinet
收藏 引用
Telkomnika - Indonesian Journal of Electrical Engineering 2012年 第7期10卷 1637-1642页
作者: Zhang, Jinbo Shao, Tongguang Wang, Yu Wang, Jing College of Computer and Information Engineering Hohai University Changzhou 213022 China Jiangsu Provincial Key Lab. of Power Transmission Equipment Technology Changzhou 213022 China
In order to eliminate the internal condensation of enclosed switchgear cabinet, this paper introduced a subminiature and high-performance dehumidifier based on semiconductor refrigeration technology. This equipment ut... 详细信息
来源: 评论
Malware Detection in Smartphone Using Hidden Markov Model
Malware Detection in Smartphone Using Hidden Markov Model
收藏 引用
International Conference on Multimedia information Networking and Security (MINES)
作者: Kejun Xin Gang Li Zhongyuan Qin Qunfang Zhang Nanjing Sample Technology Co. Ltd. Nanjing Jiangsu China Ministry of Public Security Key Lab of Information Network Security Shanghai China Computer Department Nanjing Institute of Artillery Corps Nanjing Jiangsu China
In recent years, smart phone technology is becoming increasingly popular. The dangers of mobile phone malwares are becoming more and more serious. In this paper we present a new mobile smartphone malware detection sch... 详细信息
来源: 评论
Provably secure and efficient cross realm client-to-client authenticated key exchange protocol for wireless sensor networks
收藏 引用
Journal of Convergence information technology 2012年 第22期7卷 48-56页
作者: Wang, Bin Yang, Junhan Zhang, Peng Su, Bo The State Key Lab.of ISN Xidian University Xi'an Shaanxi 710071 China School of Computer China University of Mining and Technology Xuzhou Jiangsu 221116 China China Transport Telecommunications and Information Center Beijing 100011 China
Based on certificateless key encapsulation mechanisms, a novel cross realm client-to-client authenticated key exchange protocol for clustered wireless sensor networks is proposed in this paper. A detailed security pro... 详细信息
来源: 评论
Improve tree kernel-based event pronoun resolution with competitive information
Improve tree kernel-based event pronoun resolution with comp...
收藏 引用
22nd International Joint Conference on Artificial Intelligence, IJCAI 2011
作者: Kong, Fang Zhou, Guodong JiangSu Provincial Key Lab. for Computer Information Processing Technology School of Computer Science and Technology Soochow University China
Event anaphora resolution plays a critical role in discourse analysis. This paper proposes a tree kernel- based framework for event pronoun resolution. In particular, a new tree expansion scheme is introduced to autom... 详细信息
来源: 评论
Chinese zero anaphor detection: Rule-based approach
Chinese zero anaphor detection: Rule-based approach
收藏 引用
作者: Qin, Kaiwei Kong, Fang Li, Peifeng Zhu, Qiaoming School of Computer Science and Technology Soochow University Jiangsu 215006 China Key Lab. of Computer Information Processing Technology of Jiangsu Province Suzhou Jiangsu 215006 China
A rule-based approach for Chinese zero anaphor detection is proposed. Given a parse tree, the smallest IP sub-tree covering the current predicate is captured. Based on this IP sub-tree, some rules are proposed for det... 详细信息
来源: 评论
Adaptive Neural Sliding Mode Control of MEMS Triaxial Gyroscope Based on Feedback Linearization Approach
Adaptive Neural Sliding Mode Control of MEMS Triaxial Gyrosc...
收藏 引用
Society of Instrument and Control Engineers Annual Conference
作者: Juntao Fei Hongfei Ding Jiangsu Key Lab. of Power Transmission and Distribution Equipment Technology College of Computer and Information Hohai University
In this paper, a neural network adaptive sliding mode control is proposed for the MEMS triaixal gyroscope with unknown system nonlinearities. An input-output linearization technique is incorporated into the neural ada... 详细信息
来源: 评论