咨询与建议

限定检索结果

文献类型

  • 523 篇 会议
  • 385 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 909 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 676 篇 工学
    • 495 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 184 篇 信息与通信工程
    • 99 篇 控制科学与工程
    • 74 篇 生物工程
    • 55 篇 电气工程
    • 53 篇 电子科学与技术(可...
    • 53 篇 生物医学工程(可授...
    • 47 篇 光学工程
    • 35 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 23 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 19 篇 仪器科学与技术
    • 17 篇 材料科学与工程(可...
  • 316 篇 理学
    • 176 篇 数学
    • 84 篇 生物学
    • 68 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 201 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 48 篇 医学
    • 41 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 20 篇 农学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 35 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 20 篇 deep learning
  • 20 篇 training
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 12 篇 laboratories
  • 12 篇 computational mo...
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 accuracy
  • 9 篇 streaming media

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 51 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 24 篇 guangdong provin...
  • 22 篇 provincial key l...
  • 22 篇 national enginee...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 16 篇 jiangsu provinci...
  • 15 篇 jiangsu provinci...
  • 14 篇 hunan provincial...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 18 篇 chen yang
  • 17 篇 yu fei
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 wang jinbao
  • 12 篇 shen linlin
  • 12 篇 jiang feibo
  • 11 篇 kong youyong
  • 10 篇 gao shang
  • 10 篇 zhou guodong

语言

  • 827 篇 英文
  • 60 篇 其他
  • 24 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory for Computer Information Processing Technology"
909 条 记 录,以下是431-440 订阅
排序:
Constant-Weight Group Coded Bloom Filter for Multiple-Set Membership Queries
Constant-Weight Group Coded Bloom Filter for Multiple-Set Me...
收藏 引用
作者: Xiaomei Tian Huihuang Zhao College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
Multiple-set membership query problem plays a very important role in many network systems, including packet forwarding architectures in big data centers, routing switching devices and internet firewall systems. Many s... 详细信息
来源: 评论
Analysis and Design of Image Encryption Algorithms Based on Interlaced Chaos
Analysis and Design of Image Encryption Algorithms Based on ...
收藏 引用
作者: Kangman Li Qiuping Li College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
For chaotic encryption algorithm, the algorithm of generating chaotic sequence is complex, and the data is float, which directly affects the speed of encryption. In this paper, an interlaced chaotic encryption algorit... 详细信息
来源: 评论
Design of a Real-Time and Reliable Multi-machine System
Design of a Real-Time and Reliable Multi-machine System
收藏 引用
作者: Jian Zhang Lang Li Qiuping Li Junxia Zhao Xiaoman Liang College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
An IoT(Internet of Things) system is a multi-machine system composed of a master controller and multiple slave controllers. In some automatic control systems such as petroleum and electric power, the main control uses... 详细信息
来源: 评论
Design and Implementation of Handwritten Digit Recognition Based on K-Nearest Neighbor Algorithm
Design and Implementation of Handwritten Digit Recognition B...
收藏 引用
作者: Ying Wang Qingyun Liu Yaqi Sun Feng Zhang Yining Zhu College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
In this paper, a handwritten digit recognition system based on Knearest neighbor algorithm is designed and implemented. By analyzing the application principle and steps of k-nearest neighbor algorithm in machine learn... 详细信息
来源: 评论
Gender Identification for Coloring Black and White Portrait with cGan
Gender Identification for Coloring Black and White Portrait ...
收藏 引用
作者: Qingyun Liu Mugang Lin Yaqi Sun Feng Zhang College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
This paper proposes a method to color black & white portrait images with gender recognition model and condition generation network(cGan). As a c Gan model essentially, a method named pix2 pix interprets image styl... 详细信息
来源: 评论
A Novel AES Random Mask Scheme Against Correlation Power Analysis
A Novel AES Random Mask Scheme Against Correlation Power Ana...
收藏 引用
作者: Ge Jiao Lang Li Yi Zou College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
With the wide application of smart card,people's demand for the security of smart card is *** AES(Advanced Encryption Standard)algorithm in smart card itself is safe enough,but the encryption algorithm is still th... 详细信息
来源: 评论
Power Analysis Attack on a Lightweight Block Cipher GIFT
Power Analysis Attack on a Lightweight Block Cipher GIFT
收藏 引用
作者: Jian Zhang Lang Li Qiuping Li Junxia Zhao Xiaoman Liang College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
GIFT is a new lightweight block cipher with smaller area and higher efficiency,which is very suitable for the Internet of Things(IoT) devices with constrained *** power analysis attack is an efficient method to extrac... 详细信息
来源: 评论
Deep dual support vector data description for anomaly detection on attributed networks
arXiv
收藏 引用
arXiv 2021年
作者: Zhang, Fengbin Fan, Haoyi Wang, Ruidong Li, Zuoyong Liang, Tiancai School of Computer Science and Technology Harbin University of Science and Technology Harbin China School of Information Engineering Zhengzhou University Zhengzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China GRG Banking Technology Co. Ltd Guangzhou China
Networks are ubiquitous in the real world such as social networks and communication networks, and anomaly detection on networks aims at finding nodes whose structural or attributed patterns deviate significantly from ... 详细信息
来源: 评论
Analysis of Big Data Complex Network Structure Based on Fuzzy Clustering Algorithm
Analysis of Big Data Complex Network Structure Based on Fuzz...
收藏 引用
Networking, Communications and information technology (NetCIT), International Conference on
作者: Fu Shanshan Ruan Zhiqiang Center of Modem Education Technology and Information Management Minjiang University Fujian China College of Computer and Control Engineering Minjiang University Fujian China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Fujian China Digital Fujian IoT Laboratory of Intelligent Production Fujian China
In the era of artificial intelligence with big data as the background, the statistical analysis method based on complex network has become a research hotspot and actively promoted the development of big data visualiza... 详细信息
来源: 评论
CrimeSTC: A Deep Spatial-Temporal-Categorical Network for Citywide Crime Prediction  3
CrimeSTC: A Deep Spatial-Temporal-Categorical Network for Ci...
收藏 引用
3rd International Conference on Computational Intelligence and Intelligent Systems, CIIS 2020
作者: Wei, Yue Liang, Weichao Wang, Youquan Cao, Jie College of Information Engineering Nanjing University of Finance and Economics Nanjing China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China Jiangsu Provincial Key Laboratory of E-business Nanjing University of Finance and Economics Nanjing China
Crime is one of the most complex social problems around the world, posing a major threat to human life and property. Predicting crime incidents in advance can be a great help in fighting against crime and has drawn co... 详细信息
来源: 评论