咨询与建议

限定检索结果

文献类型

  • 507 篇 会议
  • 373 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 881 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 653 篇 工学
    • 474 篇 计算机科学与技术...
    • 399 篇 软件工程
    • 182 篇 信息与通信工程
    • 84 篇 控制科学与工程
    • 74 篇 生物工程
    • 53 篇 电气工程
    • 53 篇 生物医学工程(可授...
    • 51 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 34 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 22 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 19 篇 仪器科学与技术
    • 17 篇 材料科学与工程(可...
  • 314 篇 理学
    • 175 篇 数学
    • 84 篇 生物学
    • 67 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 199 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 47 篇 医学
    • 41 篇 临床医学
    • 37 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 20 篇 农学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 34 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 20 篇 training
  • 19 篇 deep learning
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 12 篇 laboratories
  • 12 篇 computational mo...
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 accuracy
  • 9 篇 streaming media

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 51 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 22 篇 provincial key l...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 17 篇 guangdong provin...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 15 篇 jiangsu provinci...
  • 15 篇 national enginee...
  • 14 篇 hunan provincial...
  • 14 篇 jiangsu provinci...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 17 篇 yu fei
  • 17 篇 chen yang
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 jiang feibo
  • 10 篇 gao shang
  • 10 篇 zhou guodong
  • 10 篇 wang kezhi
  • 10 篇 cao cungen
  • 10 篇 yang chen

语言

  • 825 篇 英文
  • 34 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Information Processing Technology"
881 条 记 录,以下是381-390 订阅
排序:
Modeling and Analysis of Pumping Cell of Nox Sensor - Part Ii: Nox Pumping Cell
SSRN
收藏 引用
SSRN 2022年
作者: Wang, Zhen Deng, Zhong-Hua Wang, Jie Lin, Wei-Xun Fu, Xiao-Wei Li, Xi School of Artificial Intelligence and Automation Key Laboratory of Imaging Processing and Intelligent Control Education Ministry Huazhong University of Science and Technology Hubei Wuhan430074 China Shenzhen Huazhong University of Science and Technology Research Institute Guangdong Shenzhen518055 China Lambda Company Jiangsu Changzhou213100 China College of Computer Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology Hubei Wuhan430081 China
To improve the performance of the NOx sensor, a combined model based on the electrochemical model and the diffusion model is developed for the NOx pumping cell of the NOx sensor. Considering that a small amount of oxy... 详细信息
来源: 评论
Image Dust Storm Synthetic Method Based on Optical Model  3rd
Image Dust Storm Synthetic Method Based on Optical Model
收藏 引用
3rd International Conference on Machine Learning for Cyber Security, ML4CS 2020
作者: Huang, Jiayan Li, Zuoyong Wang, Chuansheng College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou350121 China School of Computer Science and Technology Harbin University of Science and Technology Harbin150080 China
To address the problem that the dusty image dataset is small and difficult to collect, this paper presents a synthetic method for generating dusty image based on a classical optical model. The proposed method first le... 详细信息
来源: 评论
An Anomalous Traffic Detection Approach for the Private Network Based on Self-learning Model  1
收藏 引用
3rd International Conference on Machine Learning for Cyber Security, ML4CS 2020
作者: Han, Weijie Xue, Jingfeng Zhang, Fuquan Zhang, Yingfeng School of Computer Science and Technology Beijing Institute of Technology Beijing China School of Space Information Space Engineering University Beijing China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China Equipment Development Department Beijing100071 China
Although being isolated from the external network, the private network is still faced with some security threats, such as violations communications, malware attacks, and illegal operations. It is an attractive approac... 详细信息
来源: 评论
Occlusion Scene Classification via Cascade Supervised Contrastive Learning
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Xu, Jianming Li, Yunfei He, Li Li, Jun The Guangdong Provincial Key Laboratory of Urbanization and Geosimulation Center of Integrated Geographic Information Analysis School of Geography and Planning Sun Yatsen University Guangzhou510275 China The School of Computer Science China University of Geosciences Wuhan430078 China The Hubei Key Laboratory of Intelligent Geo-Information Processing China University of Geosciences Wuhan430078 China The School of Automation Science and Engineering South China University of Technology Guangzhou510640 China
Recent occlusion scene classification focuses on extracting occlusion-invariant features by considering class separability, unsupervised learning, and generalization ability, separately. Considering them together is p... 详细信息
来源: 评论
Restoration-enhanced reversible information steganography network for CT images in the Internet of Medical Things
收藏 引用
IEEE Transactions on Instrumentation and Measurement 2025年
作者: Chen, Kai Chen, Yang Coatrieux, Gouenou Wu, Jiasong Coatrieux, Jean-Louis School of Cyber Science and Engineering Southeast University Nanjing210096 China Southeast University Nanjing210096 China IMT Atlantique Inserm LaTIM UMR1101 Brest29000 France Laboratoire Traitement du Signal et de L'Image Université de Rennes 1 RennesF-35000 France Centre de Recherche en Information Biomédicale Sino-francais Rennes35042 France National Institute for Health and Medical Research RennesF-35000 France Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Southeast University Nanjing210096 China Jiangsu Key Laboratory of Molecular and Functional Imaging Department of Radiology Zhongda Hospital Southeast University Nanjing210009 China Ministry of Education Nanjing210096 China Ministry of Education Nanjing210096 China
Smart health and emotional care powered by the Internet of Medical Things (IoMT) are revolutionizing the healthcare industry by adopting several technologies related to multimodal physiological data collection, commun... 详细信息
来源: 评论
Unsupervised Time Series Anomaly Detection under Data Contamination
Unsupervised Time Series Anomaly Detection under Data Contam...
收藏 引用
IEEE International Symposium on information (IT) in Medicine and Education, ITME
作者: Xiaohui Lin Zuoyong Li Xunhua Huang Xinwei Chen Haoyi Fan College of Computer and Data Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou China School of Computer Science and Technology Harbin University of Science and Technology Harbin China Fujian Engineering and Research Center of New Chinese Lacquer Materials Minjiang University Fuzhou China School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou China
Unsupervised learning utilizes unlabeled data to alleviate the reliance on large amounts of labeled data, and it has made great progress in time series anomaly detection. However, there are still some thorny issues un... 详细信息
来源: 评论
Asymmetry Total Variation and Framelet Regularized Nonconvex Low-Rank Tensor Completion
SSRN
收藏 引用
SSRN 2022年
作者: Chen, Yongyong Zhao, Xiaojia Xu, Tingting Zeng, Haijin Xu, Yanhui Chen, Junxing The School of Computer Science and Technology Harbin Institute of Technology Shenzhen518055 China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Shenzhen518055 China Image Processing and Interpretation Imec Research Group Ghent University Belgium Department of Electrical and Computer Engineering Faculty of Science and Technology University of Macau China The College of Medicine and Biological Information Engineering Northeastern University Shenyang110004 China
The low-rank tensor representation has shown enormous potential and advantages in diverse applications. However, (1) due to the inherent limitations of the low-rank tensor model, the tensor nuclear norm is utilized ye... 详细信息
来源: 评论
Improved Security for Android System based on Multi-Chaotic Maps using a Novel Image Encryption Algorithm
收藏 引用
International Journal of Performability Engineering 2019年 第6期15卷 1692-1701页
作者: Jiao, Ge Li, Lang Zou, Yi College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Aimed at the unsatisfactory effect of security in mobile cloud computing, we propose a novel image encryption algorithm by using the Improved Fruit Fly Optimization Algorithm-Artificial Bee Colony (hereafter referred ... 详细信息
来源: 评论
Improved hybrid query tree anti-collision algorithm  8th
Improved hybrid query tree anti-collision algorithm
收藏 引用
8th International Conference on computer Engineering and Networks, CENet 2018
作者: Deng, Hongwei Li, Lang Liang, Xiaoman School of Computer Science and Technology Hengyang Normal University HengyangHunan421002 China School of Information Science and Engineering Central South University ChangshaHunan410083 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
An improved algorithm based on the hybrid query tree (HQT) algorithm is proposed in this work. Tags are categorized according to the combined information of the highest bit of collision and second-highest bit of colli... 详细信息
来源: 评论
Syndrome Classification Based on Multi-Graph Attention Network
Syndrome Classification Based on Multi-Graph Attention Netwo...
收藏 引用
IEEE International Symposium on information (IT) in Medicine and Education, ITME
作者: Jishun Ma Weikai Lu Changen Zhou Shenghua Teng Zuoyong Li College of Electronic and Information Engineering Shandong University of Science and Technology Qingdao China School of Electronic Electrical Engineering and Physics Fujian University of Technology Fuzhou China Research Base of Traditional Chinese Medicine Syndrome Fujian University of Traditional Chinese Medicine Fuzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou China
Syndrome classification is an important step in Traditional Chinese Medicine (TCM) for diagnosis and treatment. In this paper, we propose a multi-graph attention network (MGAT) based method to simulate TCM doctors to ... 详细信息
来源: 评论