咨询与建议

限定检索结果

文献类型

  • 110 篇 会议
  • 85 篇 期刊文献

馆藏范围

  • 195 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 140 篇 工学
    • 98 篇 计算机科学与技术...
    • 69 篇 软件工程
    • 32 篇 信息与通信工程
    • 21 篇 电子科学与技术(可...
    • 19 篇 电气工程
    • 17 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 10 篇 机械工程
    • 10 篇 光学工程
    • 10 篇 控制科学与工程
    • 9 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 8 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 5 篇 安全科学与工程
    • 4 篇 建筑学
    • 4 篇 生物医学工程(可授...
    • 3 篇 力学(可授工学、理...
    • 3 篇 土木工程
  • 63 篇 理学
    • 27 篇 数学
    • 19 篇 生物学
    • 17 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 7 篇 化学
    • 6 篇 系统科学
  • 26 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 12 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 5 篇 法学
    • 4 篇 社会学
  • 4 篇 医学
    • 3 篇 临床医学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 6 篇 deep learning
  • 6 篇 energy consumpti...
  • 6 篇 hardware
  • 5 篇 semantics
  • 5 篇 algorithm design...
  • 4 篇 deep neural netw...
  • 4 篇 computer archite...
  • 4 篇 logic gates
  • 4 篇 convolution
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 real-time system...
  • 4 篇 feature extracti...
  • 4 篇 field programmab...
  • 4 篇 encryption
  • 4 篇 cloud computing
  • 4 篇 scheduling
  • 4 篇 training
  • 3 篇 object detection
  • 3 篇 fault tolerance

机构

  • 21 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 14 篇 college of compu...
  • 10 篇 key laboratory f...
  • 7 篇 network resource...
  • 6 篇 school of inform...
  • 5 篇 hunan provincial...
  • 5 篇 college of infor...
  • 5 篇 college of compu...
  • 4 篇 dalian maritime ...
  • 4 篇 northeastern uni...
  • 4 篇 national collabo...
  • 4 篇 school of electr...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...
  • 4 篇 baidu inc.
  • 4 篇 department of co...
  • 4 篇 hunan university...
  • 4 篇 hunan province h...
  • 4 篇 college of compu...

作者

  • 20 篇 renfa li
  • 18 篇 li renfa
  • 14 篇 xie guoqi
  • 12 篇 guoqi xie
  • 7 篇 wu di
  • 6 篇 yi wang
  • 6 篇 liu yan
  • 6 篇 long jun
  • 6 篇 wanli chang
  • 6 篇 wang yi
  • 5 篇 li zhetao
  • 5 篇 yang zhan
  • 5 篇 tian shujuan
  • 5 篇 junli wang
  • 5 篇 shujuan tian
  • 5 篇 li keqin
  • 5 篇 chungang yan
  • 4 篇 xie xin
  • 4 篇 raymond osolo ia...
  • 4 篇 wang kezhi

语言

  • 191 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University"
195 条 记 录,以下是131-140 订阅
排序:
Study on data de-duplication based on bloom filter in fault tolerant erasure codes
收藏 引用
Journal of Computational and Theoretical Nanoscience 2016年 第1期13卷 179-185页
作者: Yan, Xiai Zhang, Dafang Zhang, Boyun College of Computer Science and Elctronic Engineering Hunan University 410082 China Department of Information Technology Hunan Police Academy Changsha410138 China Key Laboratory of Network Crime Investigation Colleges of Hunan Province Changsha410138 China
Erasure codes have become a mainstream fault-tolerant method in the field of cloud storage fault tolerance. Erasure codes will be the data from the file level storage into a block level storage, there will be a lot of... 详细信息
来源: 评论
NTE Treatment Results in Increased Fpn Expression in Hippocampus of Rats Subjected to Cerebral Ischemia
NTE Treatment Results in Increased Fpn Expression in Hippoca...
收藏 引用
第九次全国中西医结合基础理论研究学术研讨会
作者: Jun Liao Xing Xia Guo-zuo Wang Yong-mei Shi Jin-wen Ge Department of Anatomy Hunan University of Chinese Medicine Campus Network Center Hunan University of Chinese Medicine College of Integrated Medicine Hunan University of Chinese Medicine Hunan Province Key Laboratory of Integrated Medicine for Cardi-Cerebrovascular Disease Hunan University of Chinese Medicine
Objective:To observe the expression of Ferroportin(Fpn) at different time points in rats after focal cerebral ischemia treated with or without Chinese medicine NTE(extract of HuangQi,Chuan Xiong,Di Long,Jiang Can)... 详细信息
来源: 评论
Hexagonal Convolutional Neural network for Spatial Transcriptomics Classification
Hexagonal Convolutional Neural Network for Spatial Transcrip...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Gao, Jing Zhang, Fa Hu, Kai Cui, Xuefeng Xiangtan University Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan China Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Medical Technology Beijing Institute of Technology Beijing China Xiangnan University Key Laboratory of Medical Imaging and Artificial Intelligence of Hunan Province Chenzhou China Shandong University School of Computer Science and Technology Qingdao China
Recent advances in spatial transcriptomics have enabled the comprehensive measurement of transcriptional profiles while retaining the spatial contextual information. Identifying spatial domains is a critical step in t... 详细信息
来源: 评论
A delay-derivative-dependent approach to robust H ∞ filter design for uncertain systems with time-varying distributed delays
收藏 引用
Journal of the Franklin Institute 2011年 第2期348卷 179-200页
作者: Jiyao An Guilin Wen Nianfei Gan Renfa Li State Key Laboratory of Advanced Design and Manufacture for Vehicle Body the Key Laboratory of Advanced Design and Simulation Techniques for Special Equipment Ministry of Education Hunan University Changsha 410082 PR China School of Computer and Communication Institute of Embedded Systems and Network Hunan University Changsha 410082 PR China
This paper focuses on the problem of robust H ∞ filter design for uncertain systems with time-varying state and distributed delays. System uncertainties are considered as norm-bounded time-varying parametric uncertai...
来源: 评论
TS-ENAS:Two-Stage Evolution for Cell-based network Architecture Search
arXiv
收藏 引用
arXiv 2023年
作者: Zou, Juan Wu, Shenghong Xia, Yizhang Jiang, Weiwei Wu, Zeping Zheng, Jinhua Engineering Research Center of Hunan Province for Optimization and Security of Intelligent System Key Laboratory of Intelligent Computing and Information Processing Ministry of Education of China Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan University Hunan Province Xiangtan411105 China The College of Aerospace Science and Engineering National University of Defense Technology Hunan Changsha410073 China
Neural network architecture search provides a solution to the automatic design of network structures. However, it is difficult to search the whole network architecture directly. Although using stacked cells to search ... 详细信息
来源: 评论
BGRA-Net: Boundary-Guided and Region-Aware Convolutional Neural network for the Segmentation of Breast Ultrasound Images
BGRA-Net: Boundary-Guided and Region-Aware Convolutional Neu...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xiang Zhang Xuanya Li Kai Hu Xieping Gao Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan China Baidu Inc. Beijing China Key Laboratory of Medical Imaging and Artifical Intelligence of Hunan Province Xiangnan University Chenzhou China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha China
In this paper, we propose a novel convolutional neural network based on boundary-guided and region-aware (BGRA-Net) for breast tumor segmentation in ultrasound images. In particular, in the encoding stage, we propose ... 详细信息
来源: 评论
A recommendation method of educational resources based on knowledge structure  4
A recommendation method of educational resources based on kn...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Shi, Ronghua Mao, Lei Hu, Chao Li, Sixiang Information and Network Center Central South University Changsha China School of Information Science and Engineering Central South University Changsha China Key Laboratory of Medical Information Research of Hunan Province Central South University Changsha China School of Software Central South University Changsha China
With the development of online learning platform, network education resources become more and more rich. It makes online learners easier to choose the time, place and content of learning. Because of the huge number of... 详细信息
来源: 评论
Improvement on masked S-box hardware implementation
Improvement on masked S-box hardware implementation
收藏 引用
International Conference on Innovations in Information Technology
作者: Juanli Zeng Yi Wang Cheng Xu Renfa Li College of Information Science and Engineering Hunan University Changsha Hunan P. R. China Department of Electrical & Computer Engineering National University of Singapore Singapore Hunan Province Key Laboratory of Network and Information Security
Masking in gate level could efficiently protect AES S-box out of power analysis attack. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. Some ... 详细信息
来源: 评论
AR-CNN: an attention ranking network for learning urban perception
收藏 引用
Science China(Information Sciences) 2022年 第1期65卷 164-174页
作者: Zhetao LI Ziwen CHEN Wei-Shi ZHENG Sangyoon OH Kien NGUYEN Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan University Key Laboratory of Intelligent Computing & Information Processing of Ministry of Education Xiangtan University School of Data and Computer Science Sun Yat-sen University Department of Computer and Information Engineering Ajou University Graduate School of Engineering Chiba University
An increasing number of deep learning methods is being applied to quantify the perception of urban environments, study the relationship between urban appearance and resident safety, and improve urban appearance. Most ... 详细信息
来源: 评论
Efficient group signature scheme without pairings
收藏 引用
International Journal of network Security 2020年 第3期22卷 504-515页
作者: Gu, Ke Liu, Dianxing Yin, Bo School of Computer and Communication Engineering Changsha University of Science and Technology Wangjiali Rd Tianxin district Changsha Hunan Province410114 China Key Laboratory of Network Crime Investigation of Hunan Provincial Colleges Hunan Police Academy Wangjiali Rd Tianxin district Changsha Hunan Province410114 China
Although currently many group signature schemes have been proposed, most of them are constructed on pair-ings. In this paper, we present an efficient group signature scheme without pairings under the model of verifier... 详细信息
来源: 评论