咨询与建议

限定检索结果

文献类型

  • 523 篇 会议
  • 385 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 909 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 676 篇 工学
    • 495 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 184 篇 信息与通信工程
    • 99 篇 控制科学与工程
    • 74 篇 生物工程
    • 55 篇 电气工程
    • 53 篇 电子科学与技术(可...
    • 53 篇 生物医学工程(可授...
    • 47 篇 光学工程
    • 35 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 23 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 19 篇 仪器科学与技术
    • 17 篇 材料科学与工程(可...
  • 316 篇 理学
    • 176 篇 数学
    • 84 篇 生物学
    • 68 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 201 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 48 篇 医学
    • 41 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 20 篇 农学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 35 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 20 篇 deep learning
  • 20 篇 training
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 12 篇 laboratories
  • 12 篇 computational mo...
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 accuracy
  • 9 篇 streaming media

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 51 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 24 篇 guangdong provin...
  • 22 篇 provincial key l...
  • 22 篇 national enginee...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 16 篇 jiangsu provinci...
  • 15 篇 jiangsu provinci...
  • 14 篇 hunan provincial...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 18 篇 chen yang
  • 17 篇 yu fei
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 wang jinbao
  • 12 篇 shen linlin
  • 12 篇 jiang feibo
  • 11 篇 kong youyong
  • 10 篇 gao shang
  • 10 篇 zhou guodong

语言

  • 827 篇 英文
  • 60 篇 其他
  • 24 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory for Computer Information Processing Technology"
909 条 记 录,以下是471-480 订阅
排序:
Hybrid chaotic encryption algorithm for securing DICOM systems
收藏 引用
International Journal of Performability Engineering 2019年 第5期15卷 1436-1444页
作者: Jiao, Ge Zhou, Sheng Li, Lang Zou, Yi College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China School of Environment Protection and Safety Engineering University of South China Hengyang421002 China
The DICOM system contains patients' personal privacy and may present a risk of information leakage in telemedicine diagnostics. In order to solve the security problem of the DICOM system, we propose a medical imag... 详细信息
来源: 评论
Link perspective based network embedding for link prediction  6
Link perspective based network embedding for link prediction
收藏 引用
6th International Conference on Robotics and Artificial Intelligence, ICRAI 2020
作者: Ni, Qixuan Ma, Lina Ye, Yaling Wang, Yuyao Bu, Zhan School of Information Engineering Nanjing University of Finance and Economics Nanjing China WinGin Business-Intelligence Academy Nanjing Co. Ltd Nanjing China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China Jiangsu Provincial Key Laboratory of E-Business Nanjing University of Finance and Economics Nanjing China
Link prediction is an important task attracting much attention in the field of complex network, and it can be applied to many real-world scenarios such as recommendation engines, protein-protein interactions predictio... 详细信息
来源: 评论
Correlation-aware deep generative model for unsupervised anomaly detection
arXiv
收藏 引用
arXiv 2020年
作者: Fan, Haoyi Zhang, Fengbin Wang, Ruidong Xi, Liang Li, Zuoyong School of Computer Science and Technology Harbin University of Science and Technology Harbin150080 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350121 China
Unsupervised anomaly detection aims to identify anomalous samples from highly complex and unstructured data, which is pervasive in both fundamental research and industrial applications. However, most existing methods ... 详细信息
来源: 评论
Automated segmentation of intraretinal cystoid macular edema based on Gaussian mixture model
收藏 引用
Journal of Innovative Optical Health Sciences 2020年 第1期3卷 35-47页
作者: Jinghong Wu Sijie Niu Qiang Chen Wen Fan Songtao Yuan Dengwang Li Shandong Key Laboratory of Medical Physics and Image Processing&Shandong Provincial Engineering and Technical Center of Light Manipulations School of Physics and Electronics Shandong Normal University Jinan 250358P.R.China School of Information Science and Engineering University of Jinan Jinan 250022P.R.China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing 210094 P.R.China Department of Ophthalmology the First Affiliated Hospital with Nanjing Medical University Nanjing 210094P.R.China
We introduce a method based on Gaussian mixture model(GMM)clustering and level-set to automatically detect intraretina fluid on diabetic retinopathy(DR)from spectral domain optical coherence tomography(SD-OCT)images i... 详细信息
来源: 评论
An Asynchronous Clustering and Mobile Data Gathering Schema Based on Timer Mechanism in Wireless Sensor Networks
收藏 引用
computers, Materials & Continua 2019年 第3期58卷 711-725页
作者: Jin Wang Yu Gao Wei Liu Wenbing Wu Se-Jung Lim Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation School of Computer&Communication EngineeringChangsha University of Science&TechnologyChangsha410114China School of Information Science and Engineering Fujian University of TechnologyFuzhou350000China College of Information Engineering Yangzhou UniversityYangzhou225000China Department of Computer Engineering Chonnam National UniversityYeosu596597Korea.
Recently,Wireless sensor networks(WSNs)have become very popular research topics which are applied to many *** provide pervasive computing services and techniques in various potential applications for the Internet of T... 详细信息
来源: 评论
Reliable Multi-Modal Object Re-Identification via Modality-Aware Graph Reasoning
arXiv
收藏 引用
arXiv 2025年
作者: Wan, Xixi Zheng, Aihua Wang, Zi Jiang, Bo Tang, Jin Ma, Jixin Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Security Artificial Intelligence School of Artificial Intelligence Anhui University Hefei230601 China School of Biomedical Engineering Anhui Medical University Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei China Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei230601 China School of Computing and Mathematical Sciences University of Greenwich LondonSE10 9LS United Kingdom
Multi-modal data provides abundant and diverse object information, crucial for effective modal interactions in Re-Identification (ReID) tasks. However, existing approaches often overlook the quality variations in loca... 详细信息
来源: 评论
Application of R-FCN algorithm in machine visual solutions on tensorflow based  5th
Application of R-FCN algorithm in machine visual solutions o...
收藏 引用
5th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2018
作者: Zhang, Yumeng Ma, Yanchao Zhang, Fuquan Beijing Information Science Technology University Beijing China School of Computer Science and Technology Beijing Institute of Technology Beijing China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350121 China
This paper presents a solution based on Tensorflow platform and R - FCN deep learning model about self-driving cars image processing. Through the Supervised learning of data sets, make them exercise the image segmenta... 详细信息
来源: 评论
LDGCN: An Edge-End Lightweight Dual GCN Based on Single-Channel EEG for Driver Drowsiness Monitoring
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Huang, Jingwei Wang, Chuansheng Huang, Jiayan Fan, Haoyi Xue, Xingsi Zhang, Fuquan Fuzhou University College of Computer and Big Data Fuzhou China Polytechnic University of Catalonia Department of Automatic Control Barcelona Spain Putian University New Engineering Industry College Putian China Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian Fuzhou350118 China Minjiang University Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Fuzhou China Minjiang University College of Computer and Control Engineering Fuzhou China Sichuan Conservatory of Music Digital Media Art Key Laboratory of Sichuan Province Chengdu China Minjiang University Fuzhou Technology Innovation Center of Intelligent Manufacturing information System Fuzhou China Fuzhou China
Driver drowsiness electroencephalogram (EEG) signal monitoring can promptly alert drivers of their drowsiness in edge-end Consumer Electronics (CE), thereby reducing the probability of traffic accidents. Graph convolu... 详细信息
来源: 评论
Social Emergency Event Judgement based on BiLSTM-CRF  19
Social Emergency Event Judgement based on BiLSTM-CRF
收藏 引用
19th Chinese National Conference on Computational Linguistic, CCL 2020
作者: Hu, Huijun Wang, Cong Dai, Jianhua Liu, Maofu School of Computer Science and Technology Wuhan University of Science and Technology Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan430065 China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha410081 China
In recent years, classification and rating of social emergency event have attracted more and more attentions in emergency management. However, most of the current studies adopt the rule-based methods to identify the e... 详细信息
来源: 评论
BCDAS: Blockchain-assisted Classifiable Data Auditing Scheme with Dynamic Operations
收藏 引用
Blockchain: Research and Applications 2025年
作者: Yuxin Cui Chen Wang Bing Yang Wei Tong Jian Shen School of Information Science and Engineering (School of Cyber Science and Technology) Zhejiang Sci-Tech University Hangzhou 310018 Zhejiang China Zhejiang Provincial Key Laboratory of Digital Fashion and Data Governance Zhejiang Sci-Tech University Hangzhou 310018 Zhejiang China Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Zhejiang Sci-Tech University Hangzhou 310018 Zhejiang China Zhejiang Provincial Innovation Center of Advanced Textile Technology Shaoxing 312000 Zhejiang China School of Computer Science Nanjing University of Information Science Technology Nanjing 210044 Jiangsu China
As cloud computing gains widespread adoption, cloud storage services have become the primary means of data management for users. Authenticated data structures (ADS) are a novel computational model designed to address ... 详细信息
来源: 评论