咨询与建议

限定检索结果

文献类型

  • 81 篇 会议
  • 64 篇 期刊文献

馆藏范围

  • 145 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 108 篇 工学
    • 75 篇 计算机科学与技术...
    • 51 篇 软件工程
    • 25 篇 信息与通信工程
    • 15 篇 生物工程
    • 14 篇 电子科学与技术(可...
    • 13 篇 电气工程
    • 11 篇 动力工程及工程热...
    • 9 篇 机械工程
    • 8 篇 光学工程
    • 7 篇 仪器科学与技术
    • 6 篇 控制科学与工程
    • 6 篇 交通运输工程
    • 6 篇 网络空间安全
    • 5 篇 安全科学与工程
    • 4 篇 化学工程与技术
    • 3 篇 力学(可授工学、理...
    • 3 篇 建筑学
    • 3 篇 生物医学工程(可授...
  • 55 篇 理学
    • 24 篇 数学
    • 16 篇 生物学
    • 15 篇 物理学
    • 7 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 4 篇 化学
  • 20 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 11 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 4 篇 法学
    • 3 篇 社会学
  • 3 篇 医学
    • 3 篇 临床医学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 4 篇 deep neural netw...
  • 4 篇 computer archite...
  • 4 篇 logic gates
  • 4 篇 algorithm design...
  • 4 篇 hardware
  • 3 篇 deep learning
  • 3 篇 fault tolerance
  • 3 篇 energy consumpti...
  • 3 篇 schedules
  • 3 篇 computational mo...
  • 3 篇 real-time system...
  • 3 篇 semantics
  • 3 篇 scheduling algor...
  • 3 篇 field programmab...
  • 3 篇 encryption
  • 3 篇 edge computing
  • 3 篇 cloud computing
  • 3 篇 scheduling
  • 3 篇 heuristic algori...
  • 2 篇 internet of thin...

机构

  • 20 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 14 篇 college of compu...
  • 10 篇 key laboratory f...
  • 7 篇 network resource...
  • 6 篇 school of inform...
  • 5 篇 hunan provincial...
  • 5 篇 college of compu...
  • 4 篇 dalian maritime ...
  • 4 篇 northeastern uni...
  • 4 篇 school of electr...
  • 4 篇 school of comput...
  • 4 篇 college of infor...
  • 4 篇 department of co...
  • 4 篇 hunan university...
  • 4 篇 hunan province h...
  • 4 篇 college of compu...
  • 4 篇 hunan university...
  • 3 篇 school of comput...
  • 3 篇 the key laborato...

作者

  • 18 篇 renfa li
  • 17 篇 li renfa
  • 14 篇 xie guoqi
  • 12 篇 guoqi xie
  • 7 篇 wu di
  • 6 篇 liu yan
  • 6 篇 long jun
  • 6 篇 wanli chang
  • 5 篇 yang zhan
  • 5 篇 yi wang
  • 5 篇 li keqin
  • 5 篇 wang yi
  • 4 篇 xie xin
  • 4 篇 raymond osolo ia...
  • 4 篇 wang kezhi
  • 4 篇 kehua yang
  • 4 篇 zhao qi
  • 4 篇 wenhong ma
  • 4 篇 xu cheng
  • 4 篇 li zhiyong

语言

  • 142 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Changsha"
145 条 记 录,以下是121-130 订阅
排序:
BGRA-Net: Boundary-Guided and Region-Aware Convolutional Neural network for the Segmentation of Breast Ultrasound Images
BGRA-Net: Boundary-Guided and Region-Aware Convolutional Neu...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xiang Zhang Xuanya Li Kai Hu Xieping Gao Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan China Baidu Inc. Beijing China Key Laboratory of Medical Imaging and Artifical Intelligence of Hunan Province Xiangnan University Chenzhou China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha China
In this paper, we propose a novel convolutional neural network based on boundary-guided and region-aware (BGRA-Net) for breast tumor segmentation in ultrasound images. In particular, in the encoding stage, we propose ... 详细信息
来源: 评论
Improvement on masked S-box hardware implementation
Improvement on masked S-box hardware implementation
收藏 引用
International Conference on Innovations in Information Technology
作者: Juanli Zeng Yi Wang Cheng Xu Renfa Li College of Information Science and Engineering Hunan University Changsha Hunan P. R. China Department of Electrical & Computer Engineering National University of Singapore Singapore Hunan Province Key Laboratory of Network and Information Security
Masking in gate level could efficiently protect AES S-box out of power analysis attack. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. Some ... 详细信息
来源: 评论
Energy-Efficient Functional Safety Design Methodology Using ASIL Decomposition for Automotive Cyber-Physical Systems
收藏 引用
IEEE Transactions on Reliability 2024年 1-23页
作者: Xie, Guoqi Peng, Hao Huang, Jing Li, Renfa Li, Keqin Department of Computer Engineering College of Computer Science and Electronic Engineering Hunan University Changsha 410082 China and also with the Key Laboratory for Embedded and Cyber-Physical Systems of Hunan Province Changsha 410082 China College of Computer Science and Electronic Engineering Hunan University Changsha 410082 China and also with the Department of Computer Science State University of New York New Paltz NY 12561 USA
Automotive cyber-physical systems (ACPS) are typical cyber-physical systems because of the joint interaction between the cyber part and physical part. Functional safety requirement (including response time and reliabi... 详细信息
来源: 评论
Monocular Camera-Based Visual Truck Type Recognition
SSRN
收藏 引用
SSRN 2024年
作者: Luo, Haibo Ye, Huaisheng Feng, Chao Shi, Xin Xie, Guoqi School of Computer and Data Science Minjiang University Fuzhou350018 China College of Computer and Data Science Fuzhou University Fuzhou350018 China College of Network and Information Security Fujian Agriculture and Forestry University Fuzhou350018 China Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University Changsha410082 China College of Computer Science and Electronic Engineering Hunan University Changsha410082 China
Truck overload and over-limit are the primary causes of infrastructure damage and traffic safety accidents. In the past 2 years, researchers have started to deploy intelligent Internet of Things system at the source o... 详细信息
来源: 评论
Nonlinear Prediction with Deep Recurrent Neural networks for Non-Blind Audio Bandwidth Extension
收藏 引用
China Communications 2018年 第4期15卷 72-85页
作者: Lin Jiang Ruimin Hu Xiaochen Wang Weiping Tu Maosheng Zhang National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan 430072 China Institute of Big Data and internet Innovation Hunan University of Commerce Changsha 410205 China Software College East China University of Technology Nanchang 330013 China Collaborative Innovation Center for Economics crime investigation and prevention technology Jiangxi Province Nanchang 330103China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan 430072 China Collaborative Innovation Center of Geospatial Technology Wuhan 430079 China
Non-blind audio bandwidth extension is a standard technique within contemporary audio codecs to efficiently code audio signals at low bitrates. In existing methods, in most cases high frequencies signal is usually gen... 详细信息
来源: 评论
DFTerNet: Towards 2-bit dynamic fusion networks for accurate human activity recognition
arXiv
收藏 引用
arXiv 2018年
作者: Yang, Zhan Raymond, Osolo Ian Zhang, Cheng Yuan Wan, Ying Long, Jun School of Information Science and Engineering Central South University Changsha410083 China Network Resources Management and Trust Evaluation Key Laboratory of Hunan Province
Deep Convolutional Neural networks (DCNNs) are currently popular in human activity recognition (HAR) applications. However, in the face of modern artificial intelligence sensor-based games, many research achievements ... 详细信息
来源: 评论
Asymmetric residual neural network for accurate human activity recognition
arXiv
收藏 引用
arXiv 2019年
作者: Long, Jun Sun, WuQing Raymond, Osolo Ian Yang, Zhan School of Information Science and Engineering Central South University Changsha410083 China Network Resources Management and Trust Evaluation Key Laboratory of Hunan Province
Human Activity Recognition (HAR) using deep neural network has become a hot topic in human-computer interaction. Machine can effectively identify human naturalistic activities by learning from a large collection of se... 详细信息
来源: 评论
Asymmetric deep semantic quantization for image retrieval
arXiv
收藏 引用
arXiv 2019年
作者: Yang, Zhan Raymond, Osolo Ian Sun, WuQing Long, Jun School of Computer Science and Engineering Central South University Changsha410083 China Network Resources Management and Trust Evaluation Key Laboratory of Hunan Province
Due to its fast retrieval and storage efficiency capabilities, hashing has been widely used in nearest neighbor retrieval tasks. By using deep learning based techniques, hashing can outperform non-learning based hashi... 详细信息
来源: 评论
Deep attention-guided Hashing
arXiv
收藏 引用
arXiv 2018年
作者: Yang, Zhan Raymond, Osolo Ian Sun, WuQing Long, Jun School of Information Science and Engineering Central South University Changsha410083 China Network Resources Management and Trust Evaluation Key Laboratory of Hunan Province
With the rapid growth of multimedia data (e.g., image, audio and video etc.) on the web, learning-based hashing techniques such as Deep Supervised Hashing (DSH) have proven to be very efficient for large-scale multime... 详细信息
来源: 评论
Accurate Recovery of Internet Traffic Data: A Sequential Tensor Completion Approach
Accurate Recovery of Internet Traffic Data: A Sequential Ten...
收藏 引用
作者: Xie, Kun Wang, Lele Wang, Xin Xie, Gaogang Wen, Jigang Zhang, Guangxing Cao, Jiannong Zhang, Dafang College of Computer Science and Electronics Engineering Hunan University Changsha410006 China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing100864 China Department of Electrical and Computer Engineering State University of New York at Stony Brook Stony BrookNY11794 United States Network Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing100864 China Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
The inference of traffic volume of the whole network from partial traffic measurements becomes increasingly critical for various network engineering tasks, such as capacity planning and anomaly detection. Previous stu... 详细信息
来源: 评论