咨询与建议

限定检索结果

文献类型

  • 151 篇 会议
  • 95 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 247 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 185 篇 工学
    • 136 篇 计算机科学与技术...
    • 113 篇 软件工程
    • 46 篇 信息与通信工程
    • 20 篇 控制科学与工程
    • 17 篇 生物工程
    • 15 篇 电气工程
    • 15 篇 电子科学与技术(可...
    • 13 篇 农业工程
    • 12 篇 光学工程
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 9 篇 机械工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
    • 4 篇 仪器科学与技术
  • 92 篇 理学
    • 59 篇 数学
    • 20 篇 生物学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 6 篇 系统科学
  • 59 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 16 篇 农学
    • 15 篇 作物学
  • 11 篇 医学
    • 10 篇 临床医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 5 篇 法学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 10 篇 semantics
  • 9 篇 information proc...
  • 7 篇 feature extracti...
  • 6 篇 support vector m...
  • 6 篇 convolution
  • 6 篇 data mining
  • 5 篇 computer science
  • 5 篇 image segmentati...
  • 5 篇 training
  • 4 篇 intrusion detect...
  • 4 篇 grid computing
  • 4 篇 educational inst...
  • 4 篇 computed tomogra...
  • 4 篇 algorithm design...
  • 4 篇 machine learning
  • 4 篇 image reconstruc...
  • 3 篇 deep learning
  • 3 篇 trees (mathemati...
  • 3 篇 engineering in m...
  • 3 篇 face recognition

机构

  • 25 篇 school of comput...
  • 24 篇 provincial key l...
  • 12 篇 jiangsu provinci...
  • 10 篇 school of comput...
  • 9 篇 school of comput...
  • 9 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 6 篇 provincial key l...
  • 6 篇 college of infor...
  • 6 篇 zhejiang lab
  • 5 篇 laboratory of im...
  • 5 篇 department of co...
  • 5 篇 state key labora...
  • 5 篇 school of inform...
  • 5 篇 provincial key l...
  • 5 篇 college of compu...
  • 5 篇 jiangsu provinci...
  • 5 篇 laboratory of im...
  • 5 篇 jiangsu high tec...

作者

  • 18 篇 yu fei
  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 11 篇 yue guangxue
  • 11 篇 chen yang
  • 10 篇 yang chen
  • 7 篇 wu zhan
  • 6 篇 yang yang
  • 6 篇 zhan wu
  • 6 篇 li peifeng
  • 6 篇 zhang zhizheng
  • 6 篇 huang chongwen
  • 6 篇 guodong zhou
  • 6 篇 yan xi
  • 5 篇 fei yu
  • 5 篇 yanqin zhu
  • 5 篇 lyu tianling
  • 5 篇 qian peide
  • 5 篇 tianling lyu

语言

  • 231 篇 英文
  • 13 篇 中文
  • 3 篇 其他
检索条件"机构=Provincial Key Lab. for Computer Information processing Technology in Jiangsu"
247 条 记 录,以下是141-150 订阅
排序:
Hybrid algorithm combining ant colony optimization algorithm with genetic algorithm
Hybrid algorithm combining ant colony optimization algorithm...
收藏 引用
26th Chinese Control Conference, CCC 2007
作者: Gao, Shang Jiang, Xinzi Tang, Kezong School of Electronics and Information Jiangsu University of Science and Technology Zhenjiang 212003 China Provincial Key Laboratory of Computer Information Processing Technology Soochow University Suzhou 215006 China
By use of the properties of ant colony algorithm and genetic algorithm, a hybrid algorithm is proposed to solve the traveling salesman problems. First, it adopts genetic algorithm to give information pheromone to dist... 详细信息
来源: 评论
NEAT-Net: An Unsupervised Cross-View Prior Inpainting Network for CBCT Metal Artifact Reduction  46
NEAT-Net: An Unsupervised Cross-View Prior Inpainting Networ...
收藏 引用
46th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2024
作者: Yang, Yang Tong, Zhan Zhong, Xinyun Shi, Yijie Xi, Yan Yu, Wenxue Wu, Zhan Chen, Yang First-Imaging Tech Shanghai China Southeast University Laboratory of Image Science and Technology The School of Computer Science and Engineering Nanjing China Southeast University Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing The Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Nanjing China
Intraoperative Cone-Beam Computed Tomography (CBCT) facilitates intraoperative navigation for Minimally Invasive Spine Surgery (MISS). However, high-attenuation metal implants used in MISS often cause metal artifacts ... 详细信息
来源: 评论
A new type of dehumidifier for enclosed high-voltage switchgear cabinet
收藏 引用
Telkomnika - Indonesian Journal of Electrical Engineering 2012年 第7期10卷 1637-1642页
作者: Zhang, Jinbo Shao, Tongguang Wang, Yu Wang, Jing College of Computer and Information Engineering Hohai University Changzhou 213022 China Jiangsu Provincial Key Lab. of Power Transmission Equipment Technology Changzhou 213022 China
In order to eliminate the internal condensation of enclosed switchgear cabinet, this paper introduced a subminiature and high-performance dehumidifier based on semiconductor refrigeration technology. This equipment ut... 详细信息
来源: 评论
Research of secure intranet/internet access platform based on ontology
收藏 引用
Journal of Networks 2009年 第10期4卷 1009-1016页
作者: Shen, Shigen Ye, Lihua Yue, Guangxue Yu, Fei College of Mathematics and Information Engineering Jiaxing University Jiaxing China College of Computer and Communication Hunan University Changsha China Department of Computer Science and Technology Huaihua University Huaihua China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou China
Faced with the general trend of centralization of information, the biggest challenge to enterprise is how to ensure that all fixed computers and different mobile devices anywhere can access securely and quickly enterp... 详细信息
来源: 评论
Research on network malicious code dendritic cell immune algorithm based on fuzzy weighted support vector machine
Research on network malicious code dendritic cell immune alg...
收藏 引用
6th China Conference of Wireless Sensor Networks, CWSN 2012
作者: Li, Peng Wang, Ruchuan Zhou, Yanting Dai, Qiuyu College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China
According to the significant impact on the accuracy rate of detection of current immune algorithms brought by incorrect classification of signal, it proposes network malicious code dendritic cell immune algorithm base... 详细信息
来源: 评论
Data expression method in enterprise application using J2EE architecture
收藏 引用
WSEAS Transactions on Communications 2008年 第6期7卷 541-550页
作者: Zhang, Xiaoshuan Chen, Peijun Zhao, Ming College of Information and Electrical Engineering China Agricultural University Qinghua Donglu 17 Haidian Beijing 100083 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Shixinjie 1 Suzhou Jiangsu 215006 China
With use of the Internet, web browser-enabled software applications are developed rapidly. Nowadays enterprises are paying more attention than ever on developing their business on the Web. The demand for rapidly deliv... 详细信息
来源: 评论
A Packet Loss Discrimination Algorithm in Wireless IP Networks
A Packet Loss Discrimination Algorithm in Wireless IP Networ...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Hai-tao Zhao Yu-ning Dong Yang Li College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou China
In this paper, we propose an algorithm WMTA (wireless multimedia transmission algorithm) for multimedia transmission control over wireless-wired IP networks. The relationship between packet length and packet loss rate... 详细信息
来源: 评论
The application of flash into M-learning in 3G initial stage
The application of flash into M-learning in 3G initial stage
收藏 引用
International Symposium on Knowledge Acquisition and Modeling, KAM
作者: Yue-ming Tang Quan Liu Ling-ling Wang Department of Educational Technology Henan Normal University Xinxiang Henan China Institute of Computer Science and Technology Provincial Key Laboratory of Computer Information Processing Technology Soochow University Suzhou Jiangsu China
With the development of the 3G technology, M-learning enters a period of rapid development. But meanwhile 3G also restrains the development of M-learning due to several drawbacks in its early days. According to the ap... 详细信息
来源: 评论
Intra-Guided Dual-Energy Material Decomposition Method for Dual-Source CBCT Systems  46
Intra-Guided Dual-Energy Material Decomposition Method for D...
收藏 引用
46th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2024
作者: Zhong, Xinyun Lyu, Tianling Wu, Zhan Gao, Wei Xi, Yan Zhao, Wei Zhu, Wentao Chen, Yang Zhejiang Lab Hangzhou China First-Imaging Tech. Shanghai China Beihang University Beijing China Southeast University School of Computer Science and Engineering Laboratory of Image Science and Technology Nanjing China Southeast University Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Nanjing China
Dual-energy CBCT imaging plays a crucial role in advanced imaging applications due to its ability to quantify material components. Although there are multiple established systems for dual-energy imaging, they often co... 详细信息
来源: 评论
The system design of a node of P2P networks for intrusion detection
收藏 引用
Journal of Networks 2013年 第8期8卷 1920-1927页
作者: Ding, Lei Yu, Fei Yang, Zhenghua Yue, Guangxue School of Information Science and Engineering Jishou University Jishou 416000 China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow 215006 China School of Mathematic and Computer Jiaxin University Jiaxin 314001 China
To improve the measuring accuracy of intrusion detection, a system design of a node for intrusion detection is proposed in this paper. First, the technology that applies the traditional intrusion detection method, suc... 详细信息
来源: 评论