咨询与建议

限定检索结果

文献类型

  • 851 篇 会议
  • 456 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,308 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 934 篇 工学
    • 693 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 248 篇 信息与通信工程
    • 111 篇 控制科学与工程
    • 101 篇 生物工程
    • 96 篇 电气工程
    • 84 篇 电子科学与技术(可...
    • 78 篇 光学工程
    • 65 篇 生物医学工程(可授...
    • 62 篇 机械工程
    • 37 篇 化学工程与技术
    • 35 篇 仪器科学与技术
    • 33 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 32 篇 动力工程及工程热...
    • 29 篇 交通运输工程
    • 22 篇 材料科学与工程(可...
  • 446 篇 理学
    • 241 篇 数学
    • 113 篇 生物学
    • 110 篇 物理学
    • 64 篇 统计学(可授理学、...
    • 42 篇 化学
    • 35 篇 系统科学
  • 246 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 112 篇 图书情报与档案管...
    • 42 篇 工商管理
  • 59 篇 医学
    • 51 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
  • 35 篇 法学
    • 31 篇 社会学
  • 25 篇 农学
  • 17 篇 教育学
  • 9 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 5 篇 艺术学

主题

  • 68 篇 feature extracti...
  • 38 篇 semantics
  • 31 篇 training
  • 30 篇 convolution
  • 30 篇 accuracy
  • 28 篇 deep learning
  • 28 篇 computational mo...
  • 26 篇 image segmentati...
  • 25 篇 data mining
  • 24 篇 speech processin...
  • 23 篇 signal processin...
  • 20 篇 object detection
  • 20 篇 optimization
  • 20 篇 convolutional ne...
  • 18 篇 information proc...
  • 17 篇 transformers
  • 17 篇 computer vision
  • 17 篇 robustness
  • 15 篇 visualization
  • 14 篇 computer science

机构

  • 104 篇 provincial key l...
  • 70 篇 fujian provincia...
  • 61 篇 school of comput...
  • 59 篇 key laboratory o...
  • 50 篇 college of compu...
  • 44 篇 fujian provincia...
  • 43 篇 shandong provinc...
  • 43 篇 hunan provincial...
  • 28 篇 hubei province k...
  • 27 篇 guangdong provin...
  • 26 篇 college of mathe...
  • 24 篇 college of compu...
  • 23 篇 provincial key l...
  • 22 篇 national enginee...
  • 19 篇 school of comput...
  • 18 篇 college of elect...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 18 篇 college of compu...
  • 17 篇 shandong provinc...

作者

  • 60 篇 li zuoyong
  • 37 篇 zhang fuquan
  • 24 篇 zuoyong li
  • 19 篇 fan haoyi
  • 18 篇 zhu qiaoming
  • 17 篇 yu fei
  • 17 篇 li lang
  • 16 篇 shen linlin
  • 16 篇 lang li
  • 14 篇 kong fang
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 dong li
  • 12 篇 zhou guodong
  • 12 篇 wang jinbao
  • 12 篇 guohua lv
  • 12 篇 jiao ge
  • 12 篇 xu lin
  • 12 篇 jiang feibo
  • 11 篇 li chenglong

语言

  • 1,146 篇 英文
  • 128 篇 其他
  • 40 篇 中文
检索条件"机构=Provincial Key Laboratory for Computer Information Processing Technology Soochow University"
1308 条 记 录,以下是991-1000 订阅
排序:
Connected dominating set construction algorithm for wireless networks based on connected subset
收藏 引用
Journal of Communications 2016年 第1期11卷 50-57页
作者: Tang, Qiang Luo, Yuan-Sheng Xie, Ming-Zhong Li, Ping Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology Changsha410114 China School of Computer and Communication Engineering Changsha University of Science and Technology Changsha410114 China
In this paper, a Connected Dominating Set (CDS) construction algorithm CSCDS (Connected Subset based CDS) is proposed, which is based on the connected subset concept. The CSCDS contains two main stages, which are domi... 详细信息
来源: 评论
Real-time information Service System for the Meteorological Screen Base on CDMA
Real-time Information Service System for the Meteorological ...
收藏 引用
2016 International Conference on Wireless Communication and Network Engineering (WCNE2016)
作者: Tai-sheng ZENG Ji-chang WEN College of Mathematics and Computer Science Quanzhu Normal University Fujian Provincial Key Laboratory of Data Intensive Computing Key Laboratory of Intelligent Computing and Information Processing Fujian Province University College of Engineering Quanzhou Meteorological Bureau
Real-time information Service System for the Meteorological Screen Base on CDMA is designed, a complete set of information gathering, processing, aggregating and publishing system for weather prediction products, disa... 详细信息
来源: 评论
Utilizing Cat Swarm Optimization in Allocating the Sink Node in the Wireless Sensor Network Environment  3
Utilizing Cat Swarm Optimization in Allocating the Sink Node...
收藏 引用
3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016
作者: Tsai, Pei-Wei Kong, Lingping Vaclav, Snasel Pan, Jeng-Shyang Istanda, Vaci Hu, Zhi-Yong College of Information Science and Engineering Fujian University of Technology Fuzhou China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou China Innovative Information Industry Research Center Harbin Institute of Technology Shenzhen Graduate School Shenzhen China Department of Computer Science VSB Technical University of Ostrava Ostrava Czech Republic Council of Indigenous Peoples Executive Yuan New Taipei City Taiwan
A general wireless sensor network (WSN) is a system composed of a large number of sensor nodes. In the WSN system, all sensor nodes are responsible for sensing the interested events and transmitting the related inform... 详细信息
来源: 评论
On the Training of DNN-based Average Voice Model for Speech Synthesis
On the Training of DNN-based Average Voice Model for Speech ...
收藏 引用
Asia-Pacific Signal and information processing Association Annual Summit and Conference
作者: Shan Yang Zhizheng Wu Lei Xie Shaanxi Provincial Key Lab of Speech and Image Information Processing School of Computer Science Northwestern Polytechnical University Xi'an China The Centre for Speech Technology Research University of Edinburgh UK
Adaptability and controllability are the major advantages of statistical parametric speech synthesis (SPSS) over unit-selection synthesis. Recently, deep neural networks (DNNs) have significantly improved the performa... 详细信息
来源: 评论
An improved image saliency detection approach based on features of space  4th
An improved image saliency detection approach based on featu...
收藏 引用
4th International Conference on Electronics, Communications and Networks, CECNet2014
作者: Wang, Yan Yu, Weiyu Qian, Shaohui Tang, Rundong School of Electronic and Information Engineering South China University of Technology Guangzhou China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China School of Electronic and Information Engineering South China University of Technology Guangzhou China
Automatic detection salient region of images is widely used in image applications such as image editor, segmentation, retrieval and object recognition. The AC algorithm is one of the typical algorithms, which uses reg... 详细信息
来源: 评论
A characteristic-preserving steganographic method based on revision identifiers
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous Engineering 2016年 第9期11卷 29-38页
作者: Xiang, Lingyun Sun, Caixia Liao, Niandong Wang, Weizheng Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology ChangshaHunan Province410114 China School of Computer and Communication Engineering Changsha University of Science and Technology ChangshaHunan Province410114 China
Since the majority of the available steganographic schemes in OOXML format documents suffered the disadvantages of unsatisfactory anti-detection capability and security level, a characteristic-preserving steganographi... 详细信息
来源: 评论
Runtime model based approach to IoT application development
收藏 引用
Frontiers of computer Science 2015年 第4期9卷 540-553页
作者: Xing CHEN College of Mathematics and Computer Science Fuzhou University Fuzhou 350116 China Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing Fuzhou 350116 China Key Laboratory of High Confidence Software Technologies (Ministry of Education) Beijing 100871 China School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
The internet of things (loT) attracts great interest in many application domains concerned with monitoring and :ontrol of physical phenomena. However, application devel- opment is still one of the main hurdles to a... 详细信息
来源: 评论
A New Logistic Map Based Chaotic Biogeography-based Optimization Approach for Cluster Analysis
A New Logistic Map Based Chaotic Biogeography-based Optimiza...
收藏 引用
2016 IEEE International Conference on Progress in Informatics and Computing
作者: Shui-Hua Wang Hui-Min Lu Yu-Jie Li Yang Wang Zhi-Min Chen Yu-Min Wei Wen-Juan Jia Fang-Yuan Liu Yu-Dong Zhang School of Computer Science and Technology Nanjing Normal University Hunan Provincial Key Laboratory of Network Investigational Technology Hunan Policy Academy Department of Electrical Engineering The city college of New YorkCUNY Department of Mechanical and Control Engineering Kyushu Institute of Technology School of Information Engineering Yangzhou University School of Physics and Electronic Engineering Taizhou University School of Electronic Information Shanghai Dianji University School of Energy and Mechanical Engineering Nanjing Normal University Key Laboratory of Intelligent Computing and Information Processing in Fujian Provincial University Quanzhou Normal University
Cluster analysis is important in scientific and industrial fields. In this study, we proposed a novel chaotic biogeography-based optimization(CBBO) method, and applied it in centroid-based clustering methods. The resu... 详细信息
来源: 评论
Security improvement on a three party password based authenticated key exchange scheme using chaotic maps
收藏 引用
Journal of information Hiding and Multimedia Signal processing 2016年 第6期7卷 1365-1372页
作者: Chen, Yu Chen, Chien-Ming Pan, Jeng-Shyang Wu, Tsu-Yang Liu, Shuai Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China Innovative Information Industry Research Center School of Computer Science and Technology Shenzhen Graduate School Harbin Institute of Technology Shenzhen518055 China
Recently, password based authenticated key exchange (or called PAKE for short) with chaotic maps has been received much attention for researchers. In 2013, Xie et al. proposed a three party PAKE scheme (based on chaot... 详细信息
来源: 评论
A Parallel Algorithm to Construct BISTs on Parity Cubes
A Parallel Algorithm to Construct BISTs on Parity Cubes
收藏 引用
International Conference on information Science and Control Engineering (ICISCE)
作者: Yan Wang Jianxi Fan Wenjun Liu Yuejuan Han Provincial Key Laboratory for Computer Information Processing Technology Soochow University School of Computer Science and Technology Soochow University Suzhou China
Independent spanning trees(ISTs) have applications in interconnection networks such as reliable communication protocols, and secure message distribution, etc. In this paper, we use BIST to denote the IST isomorphic to... 详细信息
来源: 评论