咨询与建议

限定检索结果

文献类型

  • 135 篇 会议
  • 90 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 226 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 166 篇 工学
    • 122 篇 计算机科学与技术...
    • 100 篇 软件工程
    • 43 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 14 篇 电气工程
    • 14 篇 生物工程
    • 13 篇 电子科学与技术(可...
    • 11 篇 化学工程与技术
    • 11 篇 农业工程
    • 10 篇 光学工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 机械工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 5 篇 交通运输工程
    • 4 篇 仪器科学与技术
  • 80 篇 理学
    • 48 篇 数学
    • 17 篇 生物学
    • 15 篇 物理学
    • 13 篇 化学
    • 13 篇 统计学(可授理学、...
    • 5 篇 系统科学
  • 54 篇 管理学
    • 32 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 14 篇 农学
    • 13 篇 作物学
  • 10 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
    • 6 篇 公共卫生与预防医...
  • 4 篇 法学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 10 篇 semantics
  • 9 篇 information proc...
  • 6 篇 convolution
  • 6 篇 data mining
  • 6 篇 feature extracti...
  • 5 篇 computer science
  • 5 篇 support vector m...
  • 5 篇 image segmentati...
  • 5 篇 training
  • 4 篇 intrusion detect...
  • 4 篇 grid computing
  • 4 篇 educational inst...
  • 4 篇 computed tomogra...
  • 4 篇 algorithm design...
  • 4 篇 image reconstruc...
  • 3 篇 deep learning
  • 3 篇 trees (mathemati...
  • 3 篇 engineering in m...
  • 3 篇 face recognition
  • 3 篇 laboratories

机构

  • 24 篇 provincial key l...
  • 24 篇 school of comput...
  • 12 篇 jiangsu provinci...
  • 9 篇 school of comput...
  • 9 篇 school of comput...
  • 9 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 6 篇 provincial key l...
  • 6 篇 college of infor...
  • 6 篇 zhejiang lab
  • 5 篇 laboratory of im...
  • 5 篇 department of co...
  • 5 篇 state key labora...
  • 5 篇 school of inform...
  • 5 篇 provincial key l...
  • 5 篇 jiangsu provinci...
  • 5 篇 laboratory of im...
  • 5 篇 college of commu...
  • 4 篇 school of cyber ...

作者

  • 17 篇 yu fei
  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 11 篇 chen yang
  • 10 篇 yang chen
  • 9 篇 yue guangxue
  • 7 篇 wu zhan
  • 6 篇 yang yang
  • 6 篇 zhan wu
  • 6 篇 li peifeng
  • 6 篇 zhang zhizheng
  • 6 篇 huang chongwen
  • 6 篇 guodong zhou
  • 6 篇 yan xi
  • 5 篇 fei yu
  • 5 篇 yanqin zhu
  • 5 篇 lyu tianling
  • 5 篇 qian peide
  • 5 篇 tianling lyu

语言

  • 210 篇 英文
  • 13 篇 中文
  • 3 篇 其他
检索条件"机构=Jiangsu Provincial Key Lab of Computer Information Processing Technology"
226 条 记 录,以下是161-170 订阅
排序:
On the Training of DNN-based Average Voice Model for Speech Synthesis
On the Training of DNN-based Average Voice Model for Speech ...
收藏 引用
Asia-Pacific Signal and information processing Association Annual Summit and Conference
作者: Shan Yang Zhizheng Wu Lei Xie Shaanxi Provincial Key Lab of Speech and Image Information Processing School of Computer Science Northwestern Polytechnical University Xi'an China The Centre for Speech Technology Research University of Edinburgh UK
Adaptability and controllability are the major advantages of statistical parametric speech synthesis (SPSS) over unit-selection synthesis. Recently, deep neural networks (DNNs) have significantly improved the performa... 详细信息
来源: 评论
Intrusion detection based on fuzzy reasoning
Intrusion detection based on fuzzy reasoning
收藏 引用
26th Chinese Control Conference, CCC 2007
作者: Fei, Yu Yue, Shen Guiping, Liao Linfeng, Zhang Cheng, Xu School of Computer Andinformation Engineering Hunan Agricultural University Changsha 410128 China Guangdong Province Key Lab. of Electronic Commerce Market Application Technology Guangdong University of Business Studies Guangzhou 510320 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou 2150063 China
The paper proposes a new network intrusion detection system based on fuzzy neural network by redesigning the intrusion detection system's architecture and arithmetic. In order to overcome the difficulty of specify... 详细信息
来源: 评论
3D FACE REPRESENTATION AND RECOGNITION BY INTRINSIC SHAPE DESCRIPTION MAPS
3D FACE REPRESENTATION AND RECOGNITION BY INTRINSIC SHAPE DE...
收藏 引用
IEEE International Conference on Acoustics, Speech, and Signal processing
作者: Zhe Guo Yanning Zhang Yong Xia Zenggang Lin Dagan Feng Shaanxi Provincial Key Lab of Speech & Image Information Processing (SAIIP) School of Computer Science Northwestern Polytechnical University Xi'an China Biomedical and Multimedia Information Technology (BMIT) Research Group School of Information Technologies University of Sydney Australia
We present a novel method for 3D face recognition, in which the 3D facial surface is first mapped into a 2D domain with specified resolution through a global optimization by constrained conformal geometric maps. The I... 详细信息
来源: 评论
Computational modeling of binding site for RNA-ligand complex by learning Multi-modal features
TechRxiv
收藏 引用
TechRxiv 2023年
作者: Wang, Junkai Quan, Lijun Jin, Zhi Wu, Hongjie Ma, Xuhao Wang, Xuejiao Xie, Jingxin Pan, Deng Chen, Taoning Wu, Tingfang Lyu, Qiang School of Computer Science and Technology of Soochow University Jiangsu215006 China Province Key Lab for Information Processing Technologies Soochow University Jiangsu215006 China Collaborative Innovation Center of Novel Software Technology and Industrialization Jiangsu210000 China School of Electronic and Information Engineering Suzhou University of Science and Technology Jiangsu215009 China
This study aims to address the complexity of predicting RNA-small molecule binding sites to explore the potential value in the field of RNA drug targets. To address this challenge, we propose the MultiModRLBP method, ... 详细信息
来源: 评论
On automatic classification for agricultural products web pages in chinese based on LVQ network and ontology
收藏 引用
Journal of Computational information Systems 2008年 第3期4卷 971-976页
作者: Wang, Chuanyi Fu, Zetian Zhang, Jian Hu, Liang Wang, Feng Zhang, Xiaoshuan China Agricultural University Beijing 100083 China Key Laboratory for Modern Precision Agriculture System Integration China Agricultural University Beijing 100083 China Beijing Information S and T University Beijing 100000 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou 215000 China
The user often retrieves few anticipated results when searching information in Internet via generalized search engine due that the web pages also exist the synonymous and ambiguous characteristic. How to classify the ... 详细信息
来源: 评论
Research on intrusion detection model of heterogeneous attributes clustering
Journal of Software
收藏 引用
Journal of Software 2012年 第12期7卷 2823-2831页
作者: Xie, Linquan Wang, Ying Yu, Fei Xu, Chen Yue, Guangxue School of Science Jiangxi University of Science and Technology 341000 Ganzhou China School of Science Jiangxi University of Science and Technology 341000 Ganzhou China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University 215000 Soochow China School of Information Science and Engineering Hunan University 416000 Changsha China Department of Computer Science and Technology Huaihua University Huaihua China
A fuzzy clustering algorithm for intrusion detection based on heterogeneous attributes is proposed in this paper. Firstly, the algorithm modifies the comparability measurement for the categorical attributes according ... 详细信息
来源: 评论
Research on Remote Heterogeneous Disaster Recovery technology in Grid Computing Security
Research on Remote Heterogeneous Disaster Recovery Technolog...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Ronghui Wu Ronghui Wu Renfa Li Renfa Li Fei Yu Fei Yu Guangxue Yue Guangxue Yue Jigang Wen Jigang Wen State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Computer & Communication Hunan University Changsha China Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou Jiangsu Province China College of Informationg Engineering JiaXing University JiaXing China
The tradition standby mechanism can't carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid ...
来源: 评论
Annular pupil in optical scanning holography
Annular pupil in optical scanning holography
收藏 引用
2019 Conference on Digital Holography and Three-Dimensional Imaging, DH 2019
作者: Zhang, Yaping Wang, Rende Wang, Lin Tsang, Peter Poon, T.-C. Key Lab of Laser Information Processing Technology and Application Kunming University of Science and Technology Kunming650500 China School of Electronic and Optical Engineering Nanjing University of Science and Technology Nanjing Jiangsu210094 China Department of Electronic Engineering City University of Hong Kong 83 Tat Chee Avenue Kowloon Hong Kong Bradley Department of Electrical and Computer Engineering Virginia Tech BlacksburgVA24061 United States
Optical scanning holography (OSH) is a variant of two-pupil heterodyning image processing. We investigate the use of one pupil as a delta function and the other being an annulus as an extended application of OSH. ... 详细信息
来源: 评论
Cross-domain attribute representation based on convolutional neural network*
arXiv
收藏 引用
arXiv 2018年
作者: Zhang, Guohui Liang, Gaoyuan Su, Fang Qu, Fanxin Wang, Jing-Yan Huawei Technologies Co. Ltd. Shanghai China Jiangsu University of Technology Jiangsu213001 China Shaanxi University of Science & Technology Xi’an China Northwestern Polytechnical University Xi’an China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou215006 China
In the problem of domain transfer learning, we learn a model for the prediction in a target domain from the data of both some source domains and the target domain, where the target domain is in lack of labels while th... 详细信息
来源: 评论
Research on User Authentication for Grid Computing Security
Research on User Authentication for Grid Computing Security
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Ronghui Wu Ronghui Wu Renfa Li Renfa Li Fei Yu Fei Yu Guangxue Yue Guangxue Yue Cheng Xu Cheng Xu State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing China School of Computer & Communication Hunan University Changsha China Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou Jiangsu Province China College of Informationg Engineering JiaXing University JiaXing China
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
来源: 评论