咨询与建议

限定检索结果

文献类型

  • 504 篇 会议
  • 374 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 879 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 653 篇 工学
    • 473 篇 计算机科学与技术...
    • 399 篇 软件工程
    • 182 篇 信息与通信工程
    • 85 篇 控制科学与工程
    • 74 篇 生物工程
    • 53 篇 电气工程
    • 53 篇 生物医学工程(可授...
    • 51 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 34 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 22 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 19 篇 仪器科学与技术
  • 314 篇 理学
    • 175 篇 数学
    • 84 篇 生物学
    • 67 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 199 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 47 篇 医学
    • 41 篇 临床医学
    • 37 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 21 篇 农学
    • 18 篇 作物学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 34 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 20 篇 training
  • 19 篇 deep learning
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 12 篇 laboratories
  • 12 篇 computational mo...
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 accuracy
  • 9 篇 streaming media

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 51 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 22 篇 provincial key l...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 17 篇 guangdong provin...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 15 篇 jiangsu provinci...
  • 15 篇 national enginee...
  • 14 篇 hunan provincial...
  • 14 篇 jiangsu provinci...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 17 篇 yu fei
  • 17 篇 chen yang
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 jiang feibo
  • 10 篇 gao shang
  • 10 篇 zhou guodong
  • 10 篇 wang kezhi
  • 10 篇 cao cungen
  • 10 篇 yang chen

语言

  • 823 篇 英文
  • 34 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Information Processing Technology"
879 条 记 录,以下是591-600 订阅
排序:
Correlation-aware deep generative model for unsupervised anomaly detection
arXiv
收藏 引用
arXiv 2020年
作者: Fan, Haoyi Zhang, Fengbin Wang, Ruidong Xi, Liang Li, Zuoyong School of Computer Science and Technology Harbin University of Science and Technology Harbin150080 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350121 China
Unsupervised anomaly detection aims to identify anomalous samples from highly complex and unstructured data, which is pervasive in both fundamental research and industrial applications. However, most existing methods ... 详细信息
来源: 评论
Syndrome Classification Based on Multi-Graph Attention Network  12
Syndrome Classification Based on Multi-Graph Attention Netwo...
收藏 引用
12th International Conference on information technology in Medicine and Education, ITME 2022
作者: Ma, Jishun Lu, Weikai Zhou, Changen Teng, Shenghua Li, Zuoyong Shandong University of Science and Technology College of Electronic and Information Engineering Qingdao266590 China Fujian University of Technology School of Electronic Electrical Engineering and Physics Fuzhou350118 China Fujian University of Traditional Chinese Medicine Research Base of Traditional Chinese Medicine Syndrome Fuzhou350122 China Minjiang University Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Fuzhou350121 China
Syndrome classification is an important step in Traditional Chinese Medicine (TCM) for diagnosis and treatment. In this paper, we propose a multi-graph attention network (MGAT) based method to simulate TCM doctors to ... 详细信息
来源: 评论
Leveraging Knowledge Distillation for Improved Event Extraction in QA Models
Leveraging Knowledge Distillation for Improved Event Extract...
收藏 引用
Frontiers technology of information and computer (ICFTIC), IEEE International Conference on
作者: Peiyao Zhou Zhikui Hu Kangli Zi Dawei Zhang School of Computer Science Jiangsu University of Science and Technology Zhenjiang China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China
Event extraction is an important task in natural language processing, and it is widely utilized in intelligence domains such as business and military for information extraction. Recently, many works have successfully ... 详细信息
来源: 评论
Process Calculus with Data Structure and its Model Checking Algorithm
收藏 引用
Physics Procedia 2012年 33卷 782-789页
作者: Qing Zheng Zi-Ning Cao Department of Computer Science and Technology Nanjing University of Aero. & Astro. Nanjing 210016 P.R. China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 P.R. China National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 P.R. China
Model checking is one of the most important technology for automatically verification. So this paper generally proposed a method of combining CCS and Z language, to perform model checking. It combines the advantage of... 详细信息
来源: 评论
Automated segmentation of intraretinal cystoid macular edema based on Gaussian mixture model
收藏 引用
Journal of Innovative Optical Health Sciences 2020年 第1期3卷 35-47页
作者: Jinghong Wu Sijie Niu Qiang Chen Wen Fan Songtao Yuan Dengwang Li Shandong Key Laboratory of Medical Physics and Image Processing&Shandong Provincial Engineering and Technical Center of Light Manipulations School of Physics and Electronics Shandong Normal University Jinan 250358P.R.China School of Information Science and Engineering University of Jinan Jinan 250022P.R.China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing 210094 P.R.China Department of Ophthalmology the First Affiliated Hospital with Nanjing Medical University Nanjing 210094P.R.China
We introduce a method based on Gaussian mixture model(GMM)clustering and level-set to automatically detect intraretina fluid on diabetic retinopathy(DR)from spectral domain optical coherence tomography(SD-OCT)images i... 详细信息
来源: 评论
Solving clustering problem by hybrid ant colony algorithm
收藏 引用
Journal of information and Computational Science 2009年 第4期6卷 1839-1846页
作者: Gao, Shang Zhang, Zaiyue Zhang, Xiaoru Cao, Cungen School of Computer Science and Engineering Jiangsu University of Science and Technology Zhenjiang 212003 China Key Laboratory of Intelligent Information Processing Chinese Acad. of Sci. Beijing 100080 China
An optimization model of clustering problem is given in this paper. The advantages and shortages of K-Means algorithm, simulated annealing algorithm and basic ant colony algorithm are analyzed. The ant colony algorith... 详细信息
来源: 评论
Multiscale fast correlation filtering tracking algorithm based on a feature fusion model
Multiscale fast correlation filtering tracking algorithm bas...
收藏 引用
作者: null null null null null null null School of Computer and Communication Engineering and Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology Changsha China School of Information Science and Engineering Fujian University of Technology Fujian China Hunan Valin Lianyuan Iron & Steel Corporation Loudi China Electronics & Information School Yangtze University Jingzhou China Hunan Institute of Scientific and Technical Information Changsha China Technical Quality Department Hunan ZOOMLION Heavy Industry Intelligent Technology Corporation Limited Changsha China
© 2019 John Wiley & Sons, Ltd.
来源: 评论
An Optimizing Parameters and Feature Selection in SVM Based on Improved Cockroach Swarm Optimization  16th
An Optimizing Parameters and Feature Selection in SVM Based ...
收藏 引用
16th International Conference on Intelligent information Hiding and Multimedia Signal processing, IIH-MSP 2020 in conjunction with the 13th International Conference on Frontiers of information technology, Applications and Tools, FITAT 2020
作者: Nguyen, Trong-The Yu, Jie Nguyen, Thi-Thanh-Tan Lai, Quoc-Anh Ngo, Truong-Giang Dao, Thi-Kien Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou China College of Mechanical and Automotive Engineering Fujian University of Technology Fuzhou China Information Technology Faculty Electric Power University Hanoi Viet Nam Department of Pattern Recognition & Image Processing Institute of Information Technology Vietnam Academy of Science and Technology Hanoi Viet Nam Faculty of Computer Science and Engineering Thuyloi University 175 Tay Son Dong Da Hanoi Viet Nam
This study improves a classifier of the support vector machine (SVM) by optimizing its parameters by adjusting cockroach swarm optimization (CSO). Classification system design includes data inputs, pre-process, and cl... 详细信息
来源: 评论
Image reconstruction of concrete based on Filtered Backprojection method using ultrasonic time of flight data
收藏 引用
computer Modelling and New Technologies 2014年 第6期18卷 72-78页
作者: Fan, Honghui Zhu, Hongjin Han, Qingbang School of Computer Engineering Jiangsu University of Technology Changzhou Jiangsu China Sichuan Province Key Laboratory of Bridge non-destructive testing and engineering computing Zigong Sichuan China Key Laboratory of Cloud Computing Intelligent Information Processing of Changzhou City Changzhou Jiangsu China College of IOT Engineering Hohai University Jiangsu China
This research aims to recognize the defect of concrete materials using an ultrasonic computed tomography imaging technique. Filtered Backprojection method was used to reconstruct concrete images in this paper. Ultraso... 详细信息
来源: 评论
Building an efficient intrusion detection system based on feature selection and ensemble classifier
arXiv
收藏 引用
arXiv 2019年
作者: Zhou, Yuyang Cheng, Guang Jiang, Shanqing Dai, Mian School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China Jiangsu Provincial Key Laboratory of Computer Network Technology Southeast University Nanjing China National Key Laboratory of Science and Technology on Information System Security Beijing China
Intrusion detection system (IDS) is one of extensively used techniques in a network topology to safeguard the integrity and availability of sensitive assets in the protected systems. Although many supervised and unsup... 详细信息
来源: 评论