咨询与建议

限定检索结果

文献类型

  • 334 篇 期刊文献
  • 316 篇 会议

馆藏范围

  • 650 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 417 篇 工学
    • 249 篇 计算机科学与技术...
    • 211 篇 软件工程
    • 86 篇 信息与通信工程
    • 67 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 55 篇 电气工程
    • 54 篇 控制科学与工程
    • 52 篇 机械工程
    • 41 篇 光学工程
    • 39 篇 电子科学与技术(可...
    • 31 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 18 篇 仪器科学与技术
    • 15 篇 土木工程
    • 12 篇 建筑学
    • 12 篇 交通运输工程
    • 11 篇 动力工程及工程热...
    • 10 篇 力学(可授工学、理...
  • 278 篇 理学
    • 133 篇 数学
    • 93 篇 物理学
    • 77 篇 生物学
    • 40 篇 统计学(可授理学、...
    • 31 篇 化学
    • 26 篇 系统科学
  • 87 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
  • 39 篇 医学
    • 29 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
    • 11 篇 公共卫生与预防医...
  • 10 篇 农学
  • 7 篇 教育学
  • 6 篇 法学
  • 3 篇 经济学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 31 篇 feature extracti...
  • 18 篇 semantics
  • 17 篇 training
  • 13 篇 deep learning
  • 13 篇 accuracy
  • 12 篇 face recognition
  • 12 篇 dna
  • 11 篇 algorithm design...
  • 11 篇 robustness
  • 9 篇 image segmentati...
  • 9 篇 computational mo...
  • 9 篇 cryptography
  • 8 篇 reinforcement le...
  • 8 篇 three-dimensiona...
  • 8 篇 educational inst...
  • 8 篇 data mining
  • 8 篇 visualization
  • 8 篇 emotion recognit...
  • 7 篇 conferences
  • 7 篇 image encryption

机构

  • 57 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 27 篇 anhui province k...
  • 25 篇 school of comput...
  • 23 篇 school of comput...
  • 21 篇 key laboratory o...
  • 19 篇 anhui province k...
  • 17 篇 university of ch...
  • 17 篇 key laboratory o...
  • 15 篇 school of mechan...
  • 14 篇 state key labora...
  • 12 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 11 篇 affective comput...
  • 10 篇 peng cheng labor...
  • 9 篇 key laboratory o...
  • 8 篇 hubei key labora...
  • 8 篇 neuroscience and...
  • 8 篇 shenzhen institu...
  • 8 篇 shenzhen institu...

作者

  • 77 篇 zhang qiang
  • 61 篇 qiang zhang
  • 48 篇 wei xiaopeng
  • 39 篇 fuji ren
  • 31 篇 xiaopeng wei
  • 26 篇 zhou changjun
  • 24 篇 min hu
  • 24 篇 changjun zhou
  • 23 篇 ren fuji
  • 23 篇 wang bin
  • 18 篇 hu min
  • 17 篇 zhou shihua
  • 17 篇 xiaohua wang
  • 16 篇 zhou dongsheng
  • 12 篇 bin wang
  • 12 篇 sun xiao
  • 12 篇 xiao sun
  • 11 篇 zhao lasheng
  • 11 篇 zheng xuedong
  • 11 篇 che chao

语言

  • 605 篇 英文
  • 32 篇 其他
  • 15 篇 中文
检索条件"机构=Key Laboratory of Advanced and Intelligent Computing"
650 条 记 录,以下是71-80 订阅
排序:
DNA self-assembly model to solve compound logic operators problem  11th
DNA self-assembly model to solve compound logic operators pr...
收藏 引用
11th International Conference on Bio-inspired computing – Theories and Applications, BIC-TA 2016
作者: Zhou, Shihua Wang, Bin Zheng, Xuedong Zhou, Changjun Key Laboratory of Advanced Design and Intelligent Computing Dalian University Ministry of Education Dalian116622 China
Self-assembly is the process that the component form an ordered form or structure. Because of the biochemical characteristics of DNA molecules, they become a research emphasis in the field of selfassembly. DNA-based s... 详细信息
来源: 评论
Research on Speech Synthesis Technology Based on Rhythm Embedding  3
Research on Speech Synthesis Technology Based on Rhythm Embe...
收藏 引用
2020 3rd International Conference on Computer Information Science and Artificial Intelligence, CISAI 2020
作者: Wu, Tianxin Zhao, Lasheng Zhang, Qiang Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Dalian University Dalian116622 China
In recent years, Text-To-Speech (TTS) technology has developed rapidly. People have also been paying more attention to how to narrow the gap between synthetic speech and real speech, hoping that synthesized speech can... 详细信息
来源: 评论
Hand Pose Estimation Using Convolutional Neural Networks and Support Vector Regression  12th
Hand Pose Estimation Using Convolutional Neural Networks and...
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Dong, Yufeng Lu, Jian Zhang, Qiang Key Laboratory of Advanced Design and Intelligent Computing Dalian University Ministry of Education Dalian116622 China
In order to improve the accuracy of hand pose estimation from a depth image, a method based on convolutional neural network (CNN) is proposed in this paper. First of all, we modify the structure of traditional CNN to ... 详细信息
来源: 评论
Segmentation of human motion capture data based on Laplasse Eigenmaps
Segmentation of human motion capture data based on Laplasse ...
收藏 引用
International Conference on Smart Health, ICSH 2017
作者: Xie, Xiaodong Liu, Rui Zhou, Dongsheng Wei, Xiaopeng Zhang, Qiang Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Dalian University Dalian116622 China
The segmentation of motion capture data is to separate the different types of human motion data contains long movement sequence into motion clips with independent semantics in order to facilitate the storage in the da... 详细信息
来源: 评论
Term translation extraction from historical classics using modern Chinese explanation  17th
Term translation extraction from historical classics using m...
收藏 引用
17th China National Conference on Computational Linguistics, CCL 2018 and 6th International Symposium on Natural Language Processing Based on Naturally Annotated Big Data, NLP-NABD 2018
作者: Wu, Xiaoting Zhao, Hanyu Che, Chao Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Dalian University Dalian116622 China
Extracting term translation pairs is of great help for Chinese historical classics translation since term translation is the most time-consuming and challenging part in the translation of historical classics. However,... 详细信息
来源: 评论
Image encryption algorithm based on high-dimensional chaotic systems
Image encryption algorithm based on high-dimensional chaotic...
收藏 引用
2010 International Conference on intelligent Control and Information Processing, ICICIP 2010
作者: Yu, Wanbo Chi, Chunjian Wei, Xiaopeng Yang, Xuesong Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Dalian University DalianLiaoning 116622 China
In order to protect image effectively, presented an image encryption algorithm based on wavelet function and four-dimension chaotic system. The algorithm firstly uses Wavelet function chaotic maps to scramble the imag... 详细信息
来源: 评论
Laplacian coordinates-based motion transition for data-driven motion synthesis
收藏 引用
IET Image Processing 2012年 第9期6卷 1331-1337页
作者: Yi, P. Zhang, Q. Wei, X. School of Mechanical and Engineering Dalian University of Technology Dalian 116024 China Key Laboratory of Advanced Design and Intelligent Computing Dalian University Ministry of Education Dalian 116622 China
As a fundamental technique in data-driven (or example-based) methods, motion blending has been employed to produce new motion clip from two or more clips or introduced as a medium to improve the final result of other ... 详细信息
来源: 评论
The Temporal Structural Pattern in Scientific Collaborative Behavior from the Perspective of Complex Network  23rd
The Temporal Structural Pattern in Scientific Collaborative...
收藏 引用
23rd International Symposium on Knowledge and Systems Sciences, KSS 2024
作者: Zholdoshbaeva, Elina Zhang, Shuang Liu, Feifan Xia, Haoxiang Institute of Systems Engineering Dalian University of Technology No. 2 Linggong Road Liaoning Dalian116024 China Center for Big Data and Intelligent Decision-Making Dalian University of Technology Linggong Road Liaoning Dalian116024 China School of Business East China University of Science and Technology 130 Meilong Road Xuhui District Shanghai200237 China Institute for Advanced Intelligence Dalian University of Technology Linggong Road Liaoning Dalian116024 China Key Laboratory of Social Computing and Cognitive Intelligence Ministry of Education of China Linggong Road Liaoning Dalian116024 China
The rapid advancement of science has underscored the importance of collaboration among scientists. While many studies have explored the structure of collaboration networks, there is a lack of comprehensive quantitativ... 详细信息
来源: 评论
Digital image watermarking robust to geometric attacks based on Wavelet domain
Digital image watermarking robust to geometric attacks based...
收藏 引用
2010 IEEE 5th International Conference on Bio-Inspired computing: Theories and Applications, BIC-TA 2010
作者: Ma, Na Zhang, Qiang Li, Ying Key Laboratory of Advanced Design and Intelligent Computing Dalian university Ministry of Education Province Dalian 116622 China
This paper presents a new wavelet domain watermarking method, the carrier image using wavelet decomposition. After the Walsh transform low frequency wavelet coefficients, calculated by block adaptive embedding strengt... 详细信息
来源: 评论
3D Ear Shape Matching Using Joint -Entropy
收藏 引用
Journal of Computer Science & Technology 2015年 第3期30卷 565-577页
作者: 孙晓鹏 李思慧 韩枫 魏小鹏 Institute of Computer Systems School of Computer and Information Technology Liaoning Normal University Dalian 116029 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing 100876 China School of Mechanical and Engineering Dalian University of Technology Dalian 116024 China Key Laboratory of Advanced Design and Intelligent Computing Dalian University Dalian 116622 China
In this article, we investigate the use of joint a-entropy for 3D ear matching by incorporating the local shape feature of 3D ears into the joint a-entropy. First, we extract a sut^cient number of key points from the ... 详细信息
来源: 评论