咨询与建议

限定检索结果

文献类型

  • 151 篇 会议
  • 95 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 247 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 185 篇 工学
    • 136 篇 计算机科学与技术...
    • 113 篇 软件工程
    • 46 篇 信息与通信工程
    • 20 篇 控制科学与工程
    • 17 篇 生物工程
    • 15 篇 电气工程
    • 15 篇 电子科学与技术(可...
    • 13 篇 农业工程
    • 12 篇 光学工程
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 9 篇 机械工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
    • 4 篇 仪器科学与技术
  • 92 篇 理学
    • 59 篇 数学
    • 20 篇 生物学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 6 篇 系统科学
  • 59 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 16 篇 农学
    • 15 篇 作物学
  • 11 篇 医学
    • 10 篇 临床医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 5 篇 法学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 10 篇 semantics
  • 9 篇 information proc...
  • 7 篇 feature extracti...
  • 6 篇 support vector m...
  • 6 篇 convolution
  • 6 篇 data mining
  • 5 篇 computer science
  • 5 篇 image segmentati...
  • 5 篇 training
  • 4 篇 intrusion detect...
  • 4 篇 grid computing
  • 4 篇 educational inst...
  • 4 篇 computed tomogra...
  • 4 篇 algorithm design...
  • 4 篇 machine learning
  • 4 篇 image reconstruc...
  • 3 篇 deep learning
  • 3 篇 trees (mathemati...
  • 3 篇 engineering in m...
  • 3 篇 face recognition

机构

  • 25 篇 school of comput...
  • 24 篇 provincial key l...
  • 12 篇 jiangsu provinci...
  • 10 篇 school of comput...
  • 9 篇 school of comput...
  • 9 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 6 篇 provincial key l...
  • 6 篇 college of infor...
  • 6 篇 zhejiang lab
  • 5 篇 laboratory of im...
  • 5 篇 department of co...
  • 5 篇 state key labora...
  • 5 篇 school of inform...
  • 5 篇 provincial key l...
  • 5 篇 college of compu...
  • 5 篇 jiangsu provinci...
  • 5 篇 laboratory of im...
  • 5 篇 jiangsu high tec...

作者

  • 18 篇 yu fei
  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 11 篇 yue guangxue
  • 11 篇 chen yang
  • 10 篇 yang chen
  • 7 篇 wu zhan
  • 6 篇 yang yang
  • 6 篇 zhan wu
  • 6 篇 li peifeng
  • 6 篇 zhang zhizheng
  • 6 篇 huang chongwen
  • 6 篇 guodong zhou
  • 6 篇 yan xi
  • 5 篇 fei yu
  • 5 篇 yanqin zhu
  • 5 篇 lyu tianling
  • 5 篇 qian peide
  • 5 篇 tianling lyu

语言

  • 231 篇 英文
  • 13 篇 中文
  • 3 篇 其他
检索条件"机构=Provincial Key Lab. for Computer Information processing Technology in Jiangsu"
247 条 记 录,以下是151-160 订阅
排序:
Learning convolutional neural network to maximize Pos@Top performance measure  25
Learning convolutional neural network to maximize Pos@Top pe...
收藏 引用
25th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, ESANN 2017
作者: Geng, Yanyan Liang, Ru-Ze Li, Weizhi Wang, Jingbin Liang, Gaoyuan Xu, Chenhao Wang, Jing-Yan Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou215006 China King Abdullah University of Science and Technology Thuwal23955 Saudi Arabia Suning Commerce RandD Center USA Inc. Palo AltoCA94304 United States Information Technology Service Center Intermediate People's Court of Linyi City Linyi China Jiangsu University of Technology Jiangsu213001 China New York University Abu Dhabi Abu Dhabi United Arab Emirates
In the machine learning problems, the performance measure is used to evaluate the machine learning models. Recently, the number positive data points ranked at the top positions (Pos@Top) has been a popular performance... 详细信息
来源: 评论
A survey on video-based vehicle behavior analysis algorithms
收藏 引用
Journal of Multimedia 2012年 第3期7卷 223-230页
作者: Wu, Jian Cui, Zhi-Ming Chen, Jian-Ming Zhang, Guang-Ming The Institute of Intelligent Information Processing and Application Soochow University Suzhou 215006 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China Jiangsu Yihe Traffic Engineering Co. Ltd Suzhou 215002 China
Analysis of the Vehicle Behavior is mainly to analyze and identify the vehicles' motion pattern, and describe it by the use of natural language. It is a considerable challenge to analyze and describe the vehicles&... 详细信息
来源: 评论
A Privacy Policy of P3P Based on Relational Database
A Privacy Policy of P3P Based on Relational Database
收藏 引用
International Multi-Symposiums on computer and Computational Sciences (IMSCCS)
作者: Bin Jiang Da-fung Zhang Chao Yang Guangxue Yue Fei Yu Software School Hunan University Changsha Hunan China College of Computer and Communication Hunan University Changsha Hunan China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Jiangsu Province China
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited. Traditional methods of database access control places great depe... 详细信息
来源: 评论
An Algorithm for 3D Image Segmentation
An Algorithm for 3D Image Segmentation
收藏 引用
International Conference on Image and Graphics (ICIG)
作者: Ding Zhi Dong Yu-ning College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Jiangsu Provincial Key Lab of Computer Information Processing Technology Suzhou University Suzhou China
We propose a new 3D image segmentation method based on prediction, block-matching and partial 3D constraint in this paper. The algorithm only needs to set a few key points in the first image. We use intensity informat... 详细信息
来源: 评论
Dual-Source CBCT for Larger Longitudinal Coverage: System Design and Image Reconstruction  46
Dual-Source CBCT for Larger Longitudinal Coverage: System De...
收藏 引用
46th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2024
作者: Zhang, Xusheng Lyu, Tianling Shi, Yijie Zhong, Xinyun Wu, Zhan Xi, Yan Wang, Shijie Chen, Yang Zhu, Wentao Southeast University School of Software Nanjing China Zhejiang Lab Hangzhou China First-Imaging Tech. Shanghai China Southeast University Laboratory of Image Science and Technology The School of Computer Science and Engineering Nanjing China Southeast University Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing The Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Nanjing China
The application of CBCT systems in intraoperative environments has become increasingly common, but concurrent CBCT systems are unsuitable for situations that require a large longitudinal imaging FoV, such as orthopedi... 详细信息
来源: 评论
Generalized geometry-based optimal power control in wireless networks
Generalized geometry-based optimal power control in wireless...
收藏 引用
2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2012
作者: Wang, Wei Shin, Kang G. Zhang, Zhaoyang Wang, Wenbo Peng, Tao Department of Information Science and Electronic Engineering Zhejiang Provincial Key Laboratory of Information Network Technology Zhejiang University Hangzhou 310027 China Department of Electrical Engineering and Computer Science University of Michigan Ann Arbor MI 48109-2121 United States Wireless Signal Processing and Networking Lab Beijing University of Posts and Telecommunications Beijing 100876 China
Geometry-based optimal power control was proposed in [14] to transform the power-control problem to a new geometrical problem on the position relationship between a line and some points. This scheme provides a novel v... 详细信息
来源: 评论
Assigning method for decision power based on linguisitc 2-tuple judgment matrices
Journal of Software
收藏 引用
Journal of Software 2011年 第3期6卷 508-515页
作者: Zhang, Xixiang Yue, Guangxue Zheng, Xiajie Yu, Fei Business School of Jiaxing University Jiaxing China Mathematics and Information Engineering School of Jiaxing University Jiaxing China Department of Computer Science and Technology Huaihua University Huaihua China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China
Decision power is very important in group decision making, which effects the final decision making result. When there exists uncertainty in group decision making, it is easy for an expert to express his/her preference... 详细信息
来源: 评论
Linear support vector machine based on kernel function
收藏 引用
Journal of Computational information Systems 2009年 第4期5卷 1089-1095页
作者: Gao, Shang Hu, Xuekun Zhang, Zaiyue Cao, Cungen School of Computer Science and Engineering Jiangsu University of Science and Technology Zhenjiang 212003 China Provincial Key Laboratory of Computer Information Processing Technology Soochow University Suzhou 215006 China Institute of Computing Technology The Chinese Academy of Sciences Beijing 100080 China
Support vector machine is kind of novel machine learning method, based on statistical learning theory, which becomes the hotspot of machine learning because of its excellent learning performance. The method of support... 详细信息
来源: 评论
Fuzzy inference mechanism based automatic elastic registration of two-dimensional gel electrophoresis images
收藏 引用
information technology Journal 2012年 第1期11卷 20-29页
作者: Pan, Yonghui Deng, Zhaohong Wang, Shitong Gao, Qun Jiangsu Engineering R and D Center for Information Fusion Software Jiangsu Jiangyin 214405 China School of Digital Media Jiangnan University Lihu Avenue 1800 Wuxi Jiangsu 214122 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Jiangsu Suzhou 215123 China
A key technique for protein analysis is the geometric alignment of two-dimensional polyacrylamide gel electrophoresis (2-D PAGE), i.e., 2-D PAGE image registration. In this study, the adaptability in elastic image reg... 详细信息
来源: 评论
Intrusion Detection for High-Speed Networks Based on Producing System
Intrusion Detection for High-Speed Networks Based on Produci...
收藏 引用
International Workshop on Knowledge Discovery and Data Mining (WKDD)
作者: Ken Chen Fei Yu Cheng Xu Yan Liu School of Computer &Information Engineering Hunan Agricultural University Changsha China College of Computer & Communication Hunan University Changsha China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou China
This paper firstly analyzed the front pattern matching algorithm of intrusion detection system, and improved on the pattern matching algorithm. Having immediately analyzed Rete algorithm and aimed at its shortage, the... 详细信息
来源: 评论