咨询与建议

限定检索结果

文献类型

  • 1,808 篇 会议
  • 1,210 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 3,020 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,939 篇 工学
    • 1,343 篇 计算机科学与技术...
    • 1,132 篇 软件工程
    • 451 篇 信息与通信工程
    • 223 篇 电气工程
    • 222 篇 生物工程
    • 212 篇 控制科学与工程
    • 207 篇 电子科学与技术(可...
    • 182 篇 机械工程
    • 135 篇 光学工程
    • 120 篇 生物医学工程(可授...
    • 107 篇 化学工程与技术
    • 80 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 66 篇 材料科学与工程(可...
    • 48 篇 建筑学
    • 47 篇 土木工程
    • 46 篇 网络空间安全
    • 45 篇 交通运输工程
  • 1,146 篇 理学
    • 707 篇 数学
    • 297 篇 物理学
    • 252 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 112 篇 化学
    • 91 篇 系统科学
  • 548 篇 管理学
    • 290 篇 图书情报与档案管...
    • 274 篇 管理科学与工程(可...
    • 99 篇 工商管理
  • 102 篇 医学
    • 81 篇 临床医学
    • 71 篇 基础医学(可授医学...
  • 65 篇 法学
    • 51 篇 社会学
  • 46 篇 农学
  • 31 篇 经济学
  • 20 篇 教育学
  • 9 篇 哲学
  • 7 篇 艺术学
  • 6 篇 文学
  • 6 篇 军事学

主题

  • 140 篇 feature extracti...
  • 103 篇 semantics
  • 81 篇 training
  • 70 篇 information proc...
  • 63 篇 laboratories
  • 58 篇 computational mo...
  • 51 篇 data mining
  • 51 篇 computers
  • 50 篇 visualization
  • 49 篇 image segmentati...
  • 48 篇 face recognition
  • 45 篇 optimization
  • 45 篇 accuracy
  • 43 篇 deep learning
  • 41 篇 machine learning
  • 39 篇 robustness
  • 37 篇 object detection
  • 37 篇 support vector m...
  • 36 篇 humans
  • 35 篇 three-dimensiona...

机构

  • 436 篇 key laboratory o...
  • 214 篇 university of ch...
  • 191 篇 school of inform...
  • 128 篇 shandong provinc...
  • 84 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 81 篇 shandong provinc...
  • 63 篇 college of compu...
  • 62 篇 peng cheng labor...
  • 61 篇 college of mathe...
  • 48 篇 key laboratory o...
  • 45 篇 hunan provincial...
  • 45 篇 the key laborato...
  • 44 篇 college of infor...
  • 43 篇 key laboratory o...
  • 43 篇 graduate univers...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 40 篇 chinese academy ...
  • 38 篇 fujian provincia...

作者

  • 94 篇 zhongzhi shi
  • 91 篇 shi zhongzhi
  • 74 篇 xilin chen
  • 71 篇 shiguang shan
  • 62 篇 liu qun
  • 62 篇 huang qingming
  • 48 篇 li yingsong
  • 41 篇 xu qianqian
  • 40 篇 huang zhixiang
  • 40 篇 feng yang
  • 37 篇 feng zhiquan
  • 36 篇 he qing
  • 35 篇 yingsong li
  • 32 篇 wen gao
  • 31 篇 qing he
  • 29 篇 jiang kai
  • 29 篇 guo wenzhong
  • 28 篇 li hua
  • 28 篇 zhuang fuzhen
  • 28 篇 zhixiang huang

语言

  • 2,849 篇 英文
  • 101 篇 其他
  • 77 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Intelligent Information Processing"
3020 条 记 录,以下是301-310 订阅
排序:
Identification of differential brain regions in MCI progression via clustering-evolutionary weighted SVM ensemble algorithm
收藏 引用
Frontiers of Computer Science 2021年 第6期15卷 165-173页
作者: Xia-an BI Yiming XIE Hao WU Luyun XU Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal UniversityChangsha 410081China College of Information Science and Engineering Hunan Normal UniversityChangsha 410081China Business School of Hunan Normal University Changsha 410081China
Mild cognitive impairment(MCI)as the potential sign of serious cognitive decline could be divided into two stages,i.e.,late MCI(LMCI)and early MCI(EMCI).Although the different cognitive states in the MCI progression h... 详细信息
来源: 评论
Exploiting Multi-Decision and Deep Refinement for Ultrasound Image Segmentation  48
Exploiting Multi-Decision and Deep Refinement for Ultrasound...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal processing, ICASSP 2023
作者: Liu, Wenjing Li, Xuanya Hu, Kai Gao, Xieping Xiangtan University Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan411105 China Baidu Inc Beijing100085 China Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Changsha410081 China
In this paper, we propose a novel convolutional neural network (MDR-Net) for ultrasound image segmentation by exploiting multi-decision and deep refinement of the target. Our MDR-Net consists of two main parts, i.e., ... 详细信息
来源: 评论
An attention-based cascade R-CNN model for sternum fracture detection in X-ray images
收藏 引用
CAAI Transactions on Intelligence Technology 2022年 第4期7卷 658-670页
作者: Yang Jia Haijuan Wang Weiguang Chen Yagang Wang Bin Yang School of Computer Xi'an University of Posts and TelecommunicationsXi'anShaanxiChina Shaanxi Key Laboratory of Network Data Intelligent Processing Xi'an University of Posts and TelecommunicationsXi'anShaanxiChina Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'anShaanxiChina Department of Radiology Xi'an Honghui HospitalXi'anChina
Fracture is one of the most common and unexpected *** not treated in time,it may cause serious consequences such as joint stiffness,traumatic arthritis,and nerve *** computer vision technology to detect fractures can ... 详细信息
来源: 评论
Online optimization scheduling for scientific workflows with deadline constraint on hybrid clouds
Online optimization scheduling for scientific workflows with...
收藏 引用
作者: Lin, Bing Guo, Wenzhong Lin, Xiuyan School of Mathematics and Computer Science Fuzhou University Fuzhou350116 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350116 China
The tremendous parallel computing ability of cloud computing encourages investigators to research its drawbacks and advantages on processing large-scale scientific applications such as workflows. The current cloud mar... 详细信息
来源: 评论
Attack intent analysis method based on attack path graph  9
Attack intent analysis method based on attack path graph
收藏 引用
9th International Conference on Communication and network Security, ICCNS 2019
作者: Chen, Biqiong Liu, Yanhua Li, Shijin Gao, Xiaoling College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the rapid development of network technology, network security problems are gradually increasing, and the network attack situation is very severe. In a complex attack scenario, timely detection of potential attack... 详细信息
来源: 评论
An SDN Traffic Engineering Approach Based on Traffic Unsupervised Contrastive Representation and Reinforcement Learning  6
An SDN Traffic Engineering Approach Based on Traffic Unsuper...
收藏 引用
6th International Conference on Next Generation Data-Driven networks, NGDN 2024
作者: Yang, Ruiyu Tang, Qi Guo, Yingya College of Computer and Data Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China
With the rapid development of Internet technology and the continuous explosive growth of network traffic, Traffic Engineering (TE), as a viable method for optimizing network traffic distribution and improving network ... 详细信息
来源: 评论
A comprehensive assessment method of asset importance for key asset protection  9
A comprehensive assessment method of asset importance for ke...
收藏 引用
9th International Conference on Communication and network Security, ICCNS 2019
作者: Gao, Xiaoling Liu, Yanhua Qiu, Yanbin Liu, Huajun College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
In a given system network, an important prerequisite for security risk control is how to accurately calculate the impact of different host assets in the topology on the spread of attack risk. In this regard, we propos... 详细信息
来源: 评论
A services development approach for smart home based on natural language instructions  31
A services development approach for smart home based on natu...
收藏 引用
31st International Conference on Software Engineering and Knowledge Engineering, SEKE 2019
作者: Chen, Yiyan Liu, Zhanghui Huang, Zhiming Hu, Chuanshumin Chen, Xing College of Mathematics and Computer Science Fuzhou University Fuzhou350116 China Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China
With development of the infrastructures supporting smart home which has entered in a new stage featured by intelligent services. The services based on natural language instructions are aimed at simplifying and improvi... 详细信息
来源: 评论
Text Guided Road Marking Point Cloud Completion  6
Text Guided Road Marking Point Cloud Completion
收藏 引用
6th International Conference on Next Generation Data-Driven networks, NGDN 2024
作者: He, Xu Xu, Qihong Luo, Huan Fuzhou University College of Computer and Data Science Fuzhou China Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China
With the continuous development of intelligent transportation technologies such as autonomous driving and navigation, accurate perception of road markings becomes crucial. However, due to limitations in sensor perspec... 详细信息
来源: 评论
Syntactic and Semantic Features Based Relation Extraction in Agriculture Domain  15th
Syntactic and Semantic Features Based Relation Extraction in...
收藏 引用
15th Web information Systems and Applications Conference, WISA 2018
作者: Liu, Zhanghui Chen, Yiyan Dai, Yuanfei Guo, Chenhao Zhang, Zuwen Chen, Xing College of Mathematics and Computer Science Fuzhou University Fuzhou350116 China Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China
Relation extraction plays an important role in many natural language processing tasks, such as knowledge graph and question answering system. Up to the present, many of the former relation methods work directly on the... 详细信息
来源: 评论