咨询与建议

限定检索结果

文献类型

  • 86 篇 会议
  • 66 篇 期刊文献

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 109 篇 工学
    • 74 篇 计算机科学与技术...
    • 48 篇 软件工程
    • 18 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 10 篇 电气工程
    • 10 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 8 篇 生物工程
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 5 篇 材料科学与工程(可...
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 3 篇 公安技术
  • 48 篇 理学
    • 28 篇 数学
    • 14 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 11 篇 生物学
    • 6 篇 系统科学
    • 3 篇 化学
  • 22 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 4 篇 法学
    • 3 篇 社会学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 6 篇 algorithm design...
  • 5 篇 hardware
  • 5 篇 training
  • 4 篇 energy consumpti...
  • 4 篇 schedules
  • 4 篇 real-time system...
  • 4 篇 field programmab...
  • 4 篇 scheduling
  • 3 篇 prediction model...
  • 3 篇 computer archite...
  • 3 篇 logic gates
  • 3 篇 optimization
  • 3 篇 particle swarm o...
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 scheduling algor...
  • 3 篇 encryption
  • 3 篇 heuristic algori...
  • 2 篇 internet of thin...
  • 2 篇 object detection

机构

  • 21 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 15 篇 college of compu...
  • 11 篇 key laboratory f...
  • 6 篇 college of infor...
  • 6 篇 collaborative in...
  • 5 篇 department of co...
  • 5 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 4 篇 national collabo...
  • 4 篇 key laboratory o...
  • 4 篇 hunan university...
  • 4 篇 college of compu...
  • 3 篇 the key laborato...
  • 3 篇 department of el...
  • 3 篇 school of comput...
  • 3 篇 school of mathem...
  • 3 篇 key laboratory o...
  • 3 篇 college of infor...
  • 3 篇 embedded systems...

作者

  • 19 篇 renfa li
  • 17 篇 li renfa
  • 14 篇 xie guoqi
  • 12 篇 guoqi xie
  • 7 篇 wang junli
  • 7 篇 wu di
  • 7 篇 wanli chang
  • 6 篇 liu yan
  • 6 篇 wang yi
  • 5 篇 yi wang
  • 5 篇 junli wang
  • 5 篇 changjun jiang
  • 5 篇 chungang yan
  • 4 篇 yan chungang
  • 4 篇 kehua yang
  • 4 篇 wenhong ma
  • 4 篇 xu cheng
  • 4 篇 xiongren xiao
  • 4 篇 jiang changjun
  • 4 篇 li zhiyong

语言

  • 151 篇 英文
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan"
152 条 记 录,以下是131-140 订阅
排序:
Monocular Camera-Based Visual Truck Type Recognition
SSRN
收藏 引用
SSRN 2024年
作者: Luo, Haibo Ye, Huaisheng Feng, Chao Shi, Xin Xie, Guoqi School of Computer and Data Science Minjiang University Fuzhou350018 China College of Computer and Data Science Fuzhou University Fuzhou350018 China College of Network and Information Security Fujian Agriculture and Forestry University Fuzhou350018 China Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University Changsha410082 China College of Computer Science and Electronic Engineering Hunan University Changsha410082 China
Truck overload and over-limit are the primary causes of infrastructure damage and traffic safety accidents. In the past 2 years, researchers have started to deploy intelligent Internet of Things system at the source o... 详细信息
来源: 评论
An Improved Convolutional Neural network Algorithm for Multi-Label Classification
An Improved Convolutional Neural Network Algorithm for Multi...
收藏 引用
International Conference on Audio, Language and Image Processing, ICALIP
作者: Xinsheng Wang Lijun Sun Zhihua Wei Department of Computer Science and Technology Tongji University Shanghai China Research Center of Big Data and Network Security Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China
Recent years conventional neural network(CNN) has been applied to different natural language processing(NLP) tasks such as sentence classification, sentence modeling, etc. Some researchers use CNN to do multi-label cl... 详细信息
来源: 评论
Effcient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems
Security and Safety
收藏 引用
Security and Safety 2022年 第1期1卷 145-165页
作者: Zhong Li Xianke Wu Changjun Jiang College of Information Science and Technology Donghua UniversityShanghai 201620China Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer ScienceTongji UniversityShanghai 201804China Shanghai Network Financial Security Collaborative Innovation Center Tongji UniversityShanghai 201804China
Nowadays,large numbers of smart sensors(e.g.,road-side cameras)which com-municate with nearby base stations could launch distributed denial of services(DDoS)attack storms in intelligent transportation *** attacks disa... 详细信息
来源: 评论
A Money Laundering Structure Detection Method Based on Incremental Transaction Analysis
A Money Laundering Structure Detection Method Based on Incre...
收藏 引用
Data Science and Information Technology (DSIT), International Conference on
作者: Yifei Meng Zhong Li Key Laboratory of Embedded System and Service Computing Ministry of Education National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University Shanghai China College of Information Science and Technology Donghua University Shanghai China
Money laundering is the process of legitimizing dirty money through complex transactions, posing a serious threat to a country’s financial stability and national security. Nowadays, with the prevalence of organized m...
来源: 评论
Related families-based attribute reduction of dynamic covering information systems with variations of object sets
arXiv
收藏 引用
arXiv 2017年
作者: Lang, Guangming School of Mathematics and Statistics Changsha University of Science and Technology Changsha Hunan410114 China Department of Computer Science and Technology Tongji University Shanghai201804 China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China College of Mathematics and Econometrics Hunan University Changsha Hunan410004 China
In practice, there are many dynamic covering decision information systems, and knowledge reduction of dynamic covering decision information systems is a significant challenge of covering-based rough sets. In this pape... 详细信息
来源: 评论
Related family-based attribute reduction of covering information systems when varying attribute sets
arXiv
收藏 引用
arXiv 2017年
作者: Lang, Guangming School of Mathematics and Statistics Changsha University of Science and Technology Changsha Hunan410114 China Department of Computer Science and Technology Tongji University Shanghai201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China College of Mathematics and Econometrics Hunan University Changsha Hunan410004 China
In practical situations, there are many dynamic covering information systems with variations of attributes, but there are few studies on related family-based attribute reduction of dynamic covering information systems... 详细信息
来源: 评论
HEN:a novel hybrid explainable neural network based framework for robust network intrusion detection
收藏 引用
Science China(Information Sciences) 2024年 第7期67卷 72-90页
作者: Wei WEI Sijin CHEN Cen CHEN Heshi WANG Jing LIU Zhongyao CHENG Xiaofeng ZOU School of Computer Science and Engineering Xi'an University of TechnologyShaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Technology Wuhan University of Science and Technology School of Future Technology South China University of Technology Shenzhen Research Institute of Hunan University School of Computer Science Hunan University of Technology and Business Institute for Infocomm Research (I2R) Agency for Science Technology and Reseach (A*STAR)
With the rapid development of network technology and the automation process for 5G, cyberattacks have become increasingly complex and threatening. In response to these threats, researchers have developed various netwo... 详细信息
来源: 评论
Conflict Analysis for Pythagorean Fuzzy Information Systems with Group Decision Making
arXiv
收藏 引用
arXiv 2017年
作者: Lang, Guangming Department of Computer Science and Technology Tongji University Shanghai201804 China School of Mathematics and Statistics Changsha University of Science and Technology Changsha Hunan410114 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China
Pythagorean fuzzy sets provide stronger ability than intuitionistic fuzzy sets to model uncertainty information and knowledge, but little effort has been paid to conflict analysis of Pythagorean fuzzy information syst... 详细信息
来源: 评论
Cell-Free Massive MIMO-OFDM for High-Speed Train Communications
arXiv
收藏 引用
arXiv 2022年
作者: Zheng, Jiakang Zhang, Jiayi Björnson, Emil Li, Zhetao Ai, Bo The School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China The Department of Computer Science KTH Royal Institute of Technology Kista Sweden The Hunan International Scientific and Technological Cooperation Base of Intelligent Network Key Laboratory of Intelligent Computing & Information Processing Ministry of Education Xiangtan University Hunan411105 China The State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing100044 China
Cell-free (CF) massive multiple-input multiple-output (MIMO) systems show great potentials in low-mobility scenarios, due to cell boundary disappearance and strong macro diversity. However, the great Doppler frequency... 详细信息
来源: 评论
Compressed sensing based on best wavelet packet basis for image processing
收藏 引用
Journal of Computers (Finland) 2013年 第8期8卷 1947-1950页
作者: Li, Zhe Tao Xie, Jing Xiong Yu, Zu Guo Tu, Deng Biao Choi, Young June The College of Information Engineering Xiangtan University Hunan 411105 China School of Computer National University of Defense Technology Hunan 410073 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Hunan 411105 China School of Mathematics and Computational Science Xiangtan University Hunan 411105 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China Department of Information and Computer Engineering Ajou University Suwon 443749 Korea Republic of
In this paper, an algorithm named best wavelet packet tree decomposition (BWPTD) is proposed for image compression. In order to obtain better sparse representation of image, best wavelet packet basis is introduced to ... 详细信息
来源: 评论