咨询与建议

限定检索结果

文献类型

  • 523 篇 会议
  • 385 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 909 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 676 篇 工学
    • 495 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 184 篇 信息与通信工程
    • 99 篇 控制科学与工程
    • 74 篇 生物工程
    • 55 篇 电气工程
    • 53 篇 电子科学与技术(可...
    • 53 篇 生物医学工程(可授...
    • 47 篇 光学工程
    • 35 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 23 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 19 篇 仪器科学与技术
    • 17 篇 材料科学与工程(可...
  • 316 篇 理学
    • 176 篇 数学
    • 84 篇 生物学
    • 68 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 201 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 48 篇 医学
    • 41 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 20 篇 农学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 35 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 20 篇 deep learning
  • 20 篇 training
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 12 篇 laboratories
  • 12 篇 computational mo...
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 accuracy
  • 9 篇 streaming media

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 51 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 24 篇 guangdong provin...
  • 22 篇 provincial key l...
  • 22 篇 national enginee...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 16 篇 jiangsu provinci...
  • 15 篇 jiangsu provinci...
  • 14 篇 hunan provincial...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 18 篇 chen yang
  • 17 篇 yu fei
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 wang jinbao
  • 12 篇 shen linlin
  • 12 篇 jiang feibo
  • 11 篇 kong youyong
  • 10 篇 gao shang
  • 10 篇 zhou guodong

语言

  • 827 篇 英文
  • 60 篇 其他
  • 24 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory for Computer Information Processing Technology"
909 条 记 录,以下是421-430 订阅
排序:
An Effective Remote Data Disaster Recovery Plan for the Space TT&C System  1
收藏 引用
3rd International Conference on Machine Learning for Cyber Security, ML4CS 2020
作者: Han, Weijie Xue, Jingfeng Zhang, Fuquan Sun, Zhonghui School of Computer Science and Technology Beijing Institute of Technology Beijing China School of Space Information Space Engineering University Beijing China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China Baicheng Weapon Test Center of China Baicheng137001 China
The critical asset data of the Space Tracking Telemetry and Command (TT&C) System plays an important role in fulfilling space missions. According to analyze the current storing methods and disaster recovery requir... 详细信息
来源: 评论
A hybridized parallel bats algorithm for combinatorial problem of traveling salesman
A hybridized parallel bats algorithm for combinatorial probl...
收藏 引用
作者: Nguyen, Trong-The Qiao, Yu Pan, Jeng-Shyang Chu, Shu-Chuan Chang, Kuo-Chi Xue, Xingsi Dao, Thi-Kien Intelligent Information Processing Research Center Fujian University of Technology Fujian Fuzhou China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fujian China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao China Department of Information Technology University of Manage and Technology Haiphong Viet Nam
Metaheuristic algorithms have been applied widely for real-world problems in many fields, e.g., engineering, financial, healthcare. Bats algorithm (BA) is a recent metaheuristic algorithm with considering as a robust ... 详细信息
来源: 评论
ReactFace: Online Multiple Appropriate Facial Reaction Generation in Dyadic Interactions
arXiv
收藏 引用
arXiv 2023年
作者: Luo, Cheng Song, Siyang Xie, Weicheng Spitale, Micol Ge, Zongyuan Shen, Linlin Gunes, Hatice Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China Department of Computer Science University of Nottingham Ningbo China Ningbo315100 China Computer Sciences University of Exeter ExeterEX4 4PY United Kingdom Department of Computer Science and Technology University of Cambridge CambridgeCB3 0FT United Kingdom Airdoc-Monash Research Centre Monash University Faculty of IT Monash University Melbourne Australia
In dyadic interaction, predicting the listener’s facial reactions is challenging as different reactions could be appropriate in response to the same speaker’s behaviour. Previous approaches predominantly treated thi... 详细信息
来源: 评论
LasHeR: A large-scale high-diversity benchmark for RGBT tracking
arXiv
收藏 引用
arXiv 2021年
作者: Li, Chenglong Xue, Wanlin Jia, Yaqing Qu, Zhichen Luo, Bin Tang, Jin Sun, Dengdi Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Artificial Intelligence Anhui University Hefei230601 China Information Materials and Intelligent Sensing Laboratory of Anhui Province Key Lab of Intelligent Computing and Signal Processing of Ministry of Education Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei230601 China
RGBT tracking receives a surge of interest in the computer vision community, but this research field lacks a large-scale and high-diversity benchmark dataset, which is essential for both the training of deep RGBT trac... 详细信息
来源: 评论
Research on Differential Power Analysis of Lightweight Block Cipher LED
Research on Differential Power Analysis of Lightweight Block...
收藏 引用
作者: Yi Zou Lang Li Hui-huang Zhao Ge Jiao College of Computer Science and Technology Hengyang Normal University Human Provincial Key Laboratory of Intelligent Information Processing and Application
LED algorithm is a new lightweight encryption algorithm proposed in CHES 2011, which is used for IOT to protect the communication security of RFID tags and smart cards. It has been found that it is possible to retriev... 详细信息
来源: 评论
WeChat Public Platform for Customers Reserving Bank Branches Based IoT
WeChat Public Platform for Customers Reserving Bank Branches...
收藏 引用
作者: Jie Chen Xiaoman Liang Jian Zhang College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
With the developing of the social economy,the amount of currency circulation has increased and become more frequent,but the customer gathering is often occurred in the many bank's *** this paper,with some framewor... 详细信息
来源: 评论
The Optimal Implementation of Khudra Lightweight Block Cipher
The Optimal Implementation of Khudra Lightweight Block Ciphe...
收藏 引用
作者: Xiantong Huang Lang Li Ying Guo College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
In this paper,we discuss the area and speed balance optimization of Khudra lightweight block *** are three major ***,because the whole structure of the Khudra block cipher and its F-function are based on a Feistel str... 详细信息
来源: 评论
Research on Task Scheduling in Distributed Vulnerability Scanning System
Research on Task Scheduling in Distributed Vulnerability Sca...
收藏 引用
作者: Jie Jiang Sixin Tang College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
Network threats caused by system vulnerabilities is increasing gradually, the distributed vulnerability scanning system can scan large-scale and complex networks and report the vulnerability information. Task scheduli... 详细信息
来源: 评论
An Optimized Scheme of information Hiding-Based Visual Secret Sharing
An Optimized Scheme of Information Hiding-Based Visual Secre...
收藏 引用
作者: Yi Zou Lang Li Ge Jiao College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
information hiding-based visual secret sharing(IH-VSS) uses the information hiding techniques to embed secret data into *** the IH-VSS scheme,hidden images are divided into n shadows under the guidance and constraints... 详细信息
来源: 评论
A Image Adaptive Steganography Algorithm Combining Chaotic Encryption and Minimum Distortion Function
A Image Adaptive Steganography Algorithm Combining Chaotic E...
收藏 引用
作者: Ge Jiao Jiahao Liu Sheng Zhou Ning Luo College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
Digital image has the characteristics of high redundancy and convenient processing, which is the ideal carrier of information hiding ***, digital image steganography has become a hot research direction in the field of... 详细信息
来源: 评论