咨询与建议

限定检索结果

文献类型

  • 164 篇 会议
  • 68 篇 期刊文献

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 155 篇 工学
    • 120 篇 计算机科学与技术...
    • 107 篇 软件工程
    • 36 篇 信息与通信工程
    • 23 篇 生物工程
    • 16 篇 电子科学与技术(可...
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 13 篇 电气工程
    • 13 篇 生物医学工程(可授...
    • 10 篇 仪器科学与技术
    • 10 篇 化学工程与技术
    • 9 篇 控制科学与工程
    • 9 篇 土木工程
    • 7 篇 建筑学
    • 6 篇 安全科学与工程
  • 94 篇 理学
    • 52 篇 数学
    • 32 篇 物理学
    • 25 篇 生物学
    • 17 篇 统计学(可授理学、...
    • 10 篇 化学
    • 6 篇 系统科学
  • 30 篇 管理学
    • 17 篇 图书情报与档案管...
    • 13 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 11 篇 医学
    • 11 篇 临床医学
    • 10 篇 基础医学(可授医学...
    • 6 篇 药学(可授医学、理...
  • 10 篇 农学
    • 8 篇 作物学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 6 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学

主题

  • 11 篇 synthetic apertu...
  • 9 篇 object detection
  • 9 篇 feature extracti...
  • 9 篇 remote sensing
  • 7 篇 neural networks
  • 6 篇 deep learning
  • 6 篇 training
  • 5 篇 semantics
  • 4 篇 semantic segment...
  • 4 篇 convolution
  • 4 篇 predictive model...
  • 4 篇 genetic algorith...
  • 4 篇 blockchain
  • 4 篇 students
  • 4 篇 satellites
  • 4 篇 sensors
  • 4 篇 data models
  • 3 篇 conferences
  • 3 篇 reliability
  • 3 篇 anomaly detectio...

机构

  • 94 篇 henan key labora...
  • 68 篇 school of comput...
  • 20 篇 college of compu...
  • 14 篇 henan university...
  • 13 篇 henan engineerin...
  • 11 篇 henan key labora...
  • 10 篇 henan key labora...
  • 9 篇 henan university...
  • 9 篇 school of data a...
  • 9 篇 school of comput...
  • 9 篇 guangdong provin...
  • 8 篇 henan engineerin...
  • 8 篇 henan key labora...
  • 5 篇 henan key labora...
  • 5 篇 henan province e...
  • 4 篇 school of inform...
  • 4 篇 henan industrial...
  • 4 篇 school of artifi...
  • 4 篇 school of artifi...
  • 4 篇 henan engineerin...

作者

  • 15 篇 zuo xianyu
  • 13 篇 zhang lei
  • 13 篇 li ning
  • 12 篇 xiaoke zhu
  • 12 篇 dang lanxue
  • 12 篇 zhu xiaoke
  • 11 篇 liu yang
  • 11 篇 xiaopan chen
  • 11 篇 lei zhang
  • 10 篇 hou yan-e
  • 10 篇 qiao baojun
  • 10 篇 chen xiaopan
  • 8 篇 guo zhengwei
  • 8 篇 zhao jianhui
  • 8 篇 zhou liming
  • 7 篇 xu tao
  • 7 篇 xiajiong shen
  • 7 篇 xie yi
  • 6 篇 han daojun
  • 6 篇 han hongyu

语言

  • 221 篇 英文
  • 10 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory of Big Data Analysis and Processing of Henan Province"
232 条 记 录,以下是161-170 订阅
排序:
Design and Research of Remote Sensing Process Language based on XML
Design and Research of Remote Sensing Process Language based...
收藏 引用
Information Technology,big data and Artificial Intelligence (ICIBA), International Conference on IEEE International Conference on
作者: Xianyu Zuo Heng Li Liming Zhou Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China School of Computer and Information Engineering Henan University Kaifeng China
In the era of rapid development of remote sensing technology, in order to improve the production efficiency of remote sensing data processing flow and further optimize the editing of remote sensing processes in the vi... 详细信息
来源: 评论
Diffusion Model-based Contrastive Learning for Human Activity Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Xiao, Chunjing Han, Yanhui Yang, Wei Hou, Yane Shi, Fangzhan Chetty, Kevin The School of Computer and Information Engineering Henan University Kaifeng475004 China University College London LondonWC1E 6BT United Kingdom The School of Computer and Information Engineering Henan University China The Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng475004 China The Department of Security and Crime Science University College London LondonWC1E 6BT United Kingdom
WiFi Channel State Information (CSI)-based activity recognition has sparked numerous studies due to its widespread availability and privacy protection. However, when applied in practical applications, general CSI-base... 详细信息
来源: 评论
Improved Dota2 Lineup Recommendation Model Based on a Bidirectional LSTM
收藏 引用
Tsinghua Science and Technology 2020年 第6期25卷 712-720页
作者: Lei Zhang Chenbo Xu Yihua Gao Yi Han Xiaojiang Du Zhihong Tian Henan Key Laboratory of Big Data Analysis and Processing Kaifeng 457004China Institute of Data and Knowledge Engineering Henan UniversityKaifeng 475004.China National Internet Emergency Center Zhengzhou 450000China Department of Computer and Information Sciences Temple UniversityPhiladelphiaPA 19122-6008USA Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou 510006China
In recent years,e-sports has rapidly developed,and the industry has produced large amounts of data with specifications,and these data are easily to be *** to the above characteristics,data mining and deep learning met... 详细信息
来源: 评论
Access control of blockchain based on dual-policy attribute-based encryption  22
Access control of blockchain based on dual-policy attribute-...
收藏 引用
22nd IEEE International Conference on High Performance Computing and Communications, 18th IEEE International Conference on Smart City and 6th IEEE International Conference on data Science and Systems, HPCC-SmartCity-DSS 2020
作者: Han, Daojun Chen, Jinyu Zhang, Lei Shen, Yatian Wang, Xueheng Gao, Yihua Institute of Data and Knowledge Engineering School of Computer and Information Engineering Henan University Kaifeng China Henan University Henan Key Laboratory of Big Data Analysis and Processing School of Computer and Information Engineering Kaifeng China
In scenarios where multiple parties such as the Internet of Things and Supply Chains participate in data sharing and computing, when accessing data, users not only need to accept the forward access control of the data... 详细信息
来源: 评论
Online Multiple Object Tracking with Reid Feature Extraction Network and Similarity Matrix Network  5
Online Multiple Object Tracking with Reid Feature Extraction...
收藏 引用
2020 5th International Conference on Intelligent Computing and Signal processing, ICSP 2020
作者: Ji, Qingge Yu, Haoqiang School of Data and Computer Science Sun Yat-sen University Guangzhou510006 China Guangdong Province Key Laboratory Big Data Analysis and Processing Guangzhou510006 China
In multiple object tracking(MOT), data association is a crucial part. By constructing similarity loss matrix for trajectories and detections, they can be matched correspondingly by using Hungarian matching algorithm. ... 详细信息
来源: 评论
Heterogeneous Software Effort Estimation via Cascaded Adversarial Auto-Encoder  1
收藏 引用
21st International Conference on Parallel and Distributed Computing, Applications, and Technologies, PDCAT 2020
作者: Qi, Fumin Jing, Xiao-Yuan Zhu, Xiaoke Jia, Xiaodong Cheng, Li Dong, Yichuan Fang, Ziseng Ma, Fei Feng, Shengzhong College of Computer Science and Software Engineering Shenzhen University Shenzhen China School of Computer Wuhan University Wuhan China Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China National Supercomputing Center in Shenzhen Guangzhou Guangdong China School of Computer Science Qufu Normal University Rizhao China
In Software Effort Estimation (SEE) practice, the data drought problem has been plaguing researchers and practitioners. Leveraging heterogeneous SEE data collected by other companies is a feasible solution to relieve ... 详细信息
来源: 评论
An Adaptive Framework of Multimodal Emotion Recognition Based on Collaborative Discriminative Learning
An Adaptive Framework of Multimodal Emotion Recognition Base...
收藏 引用
International Workshop on Advanced Computational Intelligence (IWACI)
作者: Yadi Wang Xiaoding Guo Yibo Zhang Yiyuan Ren Wendi Huang Zunyan Liu Yuming Feng Xiangguang Dai Wei Zhang Hangjun Che School of Computer and Information Engineering Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China School of Computer and Information Engineering Henan University Kaifeng China Key Laboratory of Intelligent Information Processing and Control Chongqing Three Gorges University Chongqing China School of Computer Science and Engineering Chongqing Three Gorges University Chongqing China School of Three Gorges Artificial Intelligence Chongqing Three Gorges University Chongqing China College of Electronic and Information Engineering Southwest University Chongqing China
Multimodal emotion recognition has great application scenarios in the field of human-computer interaction, and the main task lies in how to capture and handle the consistency and complementarity of multimodal signals....
来源: 评论
An Improved 2P-CFAR Method for Ship Detection in SAR Images
An Improved 2P-CFAR Method for Ship Detection in SAR Images
收藏 引用
IEEE International Conference on Radar
作者: Jiahui Chang Qing Wang Jianhui Zhao Ning Li Henan Key Laboratory of Big Data Analysis and Processing (of Henan University) College of Computer and Information Engineering (of Henan University) Kaifeng China Air Force Research Institute Beijing China
Synthetic Aperture Radar (SAR) systems can be used for discovery and surveillance. According to the current requirements, accurate ship detection is becoming more and more important. However, the interference factors ... 详细信息
来源: 评论
An Orbital Angular Momentum Mode Estimation Method with an Unknown Beam Axis
An Orbital Angular Momentum Mode Estimation Method with an U...
收藏 引用
IEEE SENSORS
作者: Gaofeng Shu Bingxu Chen Ning Li School of Computer and Information Engineering Henan University Henan Engineering Research Center of Intelligent Technology and Application Henan University Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China
Orbital angular momentum (OAM) beam is very difficult to receive due to the divergence of the beam. The position of the beam axis must be known by the existing receiving methods, including the single point method and ... 详细信息
来源: 评论
Research on Penetration Strategy of UAV  2020
Research on Penetration Strategy of UAV
收藏 引用
Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies
作者: Daojun Han Hongzhen Xiang Haolin Chen Yi Xie Institute of Data and Knowledge Engineering Henan University Kaifeng PR China School of Computer and Information Engineering Henan University Kaifeng PR China Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng PR China
Taking a military operation as an example, this paper makes an in-depth study of what tactics a single UAV should adopt when facing the interception of multiple enemy UAV groups. According to the analysis of the impac... 详细信息
来源: 评论