咨询与建议

限定检索结果

文献类型

  • 846 篇 会议
  • 466 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,313 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 944 篇 工学
    • 697 篇 计算机科学与技术...
    • 579 篇 软件工程
    • 252 篇 信息与通信工程
    • 112 篇 控制科学与工程
    • 101 篇 生物工程
    • 98 篇 电气工程
    • 84 篇 电子科学与技术(可...
    • 81 篇 光学工程
    • 66 篇 生物医学工程(可授...
    • 61 篇 机械工程
    • 37 篇 化学工程与技术
    • 36 篇 仪器科学与技术
    • 34 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 32 篇 动力工程及工程热...
    • 30 篇 交通运输工程
    • 24 篇 材料科学与工程(可...
  • 451 篇 理学
    • 243 篇 数学
    • 113 篇 生物学
    • 112 篇 物理学
    • 66 篇 统计学(可授理学、...
    • 42 篇 化学
    • 36 篇 系统科学
  • 248 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 112 篇 图书情报与档案管...
    • 42 篇 工商管理
  • 59 篇 医学
    • 50 篇 临床医学
    • 43 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
  • 35 篇 法学
    • 31 篇 社会学
  • 25 篇 农学
  • 17 篇 教育学
  • 9 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 5 篇 艺术学

主题

  • 68 篇 feature extracti...
  • 39 篇 semantics
  • 30 篇 convolution
  • 29 篇 training
  • 28 篇 accuracy
  • 27 篇 deep learning
  • 27 篇 image segmentati...
  • 24 篇 data mining
  • 24 篇 computational mo...
  • 23 篇 signal processin...
  • 23 篇 speech processin...
  • 22 篇 object detection
  • 20 篇 convolutional ne...
  • 18 篇 optimization
  • 17 篇 transformers
  • 17 篇 computer vision
  • 17 篇 information proc...
  • 15 篇 image reconstruc...
  • 14 篇 computer science
  • 14 篇 neural networks

机构

  • 103 篇 provincial key l...
  • 70 篇 fujian provincia...
  • 61 篇 school of comput...
  • 55 篇 key laboratory o...
  • 50 篇 college of compu...
  • 44 篇 shandong provinc...
  • 44 篇 fujian provincia...
  • 42 篇 hunan provincial...
  • 28 篇 hubei province k...
  • 28 篇 guangdong provin...
  • 26 篇 college of mathe...
  • 24 篇 college of compu...
  • 22 篇 provincial key l...
  • 22 篇 national enginee...
  • 19 篇 school of comput...
  • 18 篇 college of elect...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 18 篇 college of compu...
  • 16 篇 school of comput...

作者

  • 60 篇 li zuoyong
  • 37 篇 zhang fuquan
  • 24 篇 zuoyong li
  • 19 篇 fan haoyi
  • 18 篇 zhu qiaoming
  • 17 篇 yu fei
  • 17 篇 li lang
  • 16 篇 shen linlin
  • 16 篇 lang li
  • 14 篇 kong fang
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 chen yang
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 zhou guodong
  • 12 篇 wang jinbao
  • 12 篇 guohua lv
  • 12 篇 xu lin
  • 12 篇 jiang feibo

语言

  • 1,216 篇 英文
  • 64 篇 其他
  • 34 篇 中文
检索条件"机构=Provincial Key Laboratory for Computer Information Processing Technology Soochow University"
1313 条 记 录,以下是1001-1010 订阅
排序:
A Clustering Method of Chinese Medicine Prescriptions Based on Modified Firefly Algorithm
收藏 引用
Chinese Journal of Integrative Medicine 2016年 第12期22卷 941-946页
作者: 袁锋 刘弘 陈守强 徐亮 School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University School of Information Engineering Shandong Management University Heart Center Second Hospital Affiliated to Shandong University of Traditional Chinese Medicine School of Traditional Chinese Medicine Shandong University of Traditional Chinese Medicine
This paper is aimed to study the clustering method for Chinese medicine(CM) medical cases. The traditional K-means clustering algorithm had shortcomings such as dependence of results on the selection of initial valu... 详细信息
来源: 评论
A characteristic-preserving steganographic method based on revision identifiers
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous Engineering 2016年 第9期11卷 29-38页
作者: Xiang, Lingyun Sun, Caixia Liao, Niandong Wang, Weizheng Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology ChangshaHunan Province410114 China School of Computer and Communication Engineering Changsha University of Science and Technology ChangshaHunan Province410114 China
Since the majority of the available steganographic schemes in OOXML format documents suffered the disadvantages of unsatisfactory anti-detection capability and security level, a characteristic-preserving steganographi... 详细信息
来源: 评论
Runtime model based approach to IoT application development
收藏 引用
Frontiers of computer Science 2015年 第4期9卷 540-553页
作者: Xing CHEN College of Mathematics and Computer Science Fuzhou University Fuzhou 350116 China Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing Fuzhou 350116 China Key Laboratory of High Confidence Software Technologies (Ministry of Education) Beijing 100871 China School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
The internet of things (loT) attracts great interest in many application domains concerned with monitoring and :ontrol of physical phenomena. However, application devel- opment is still one of the main hurdles to a... 详细信息
来源: 评论
A New Logistic Map Based Chaotic Biogeography-based Optimization Approach for Cluster Analysis
A New Logistic Map Based Chaotic Biogeography-based Optimiza...
收藏 引用
2016 IEEE International Conference on Progress in Informatics and Computing
作者: Shui-Hua Wang Hui-Min Lu Yu-Jie Li Yang Wang Zhi-Min Chen Yu-Min Wei Wen-Juan Jia Fang-Yuan Liu Yu-Dong Zhang School of Computer Science and Technology Nanjing Normal University Hunan Provincial Key Laboratory of Network Investigational Technology Hunan Policy Academy Department of Electrical Engineering The city college of New YorkCUNY Department of Mechanical and Control Engineering Kyushu Institute of Technology School of Information Engineering Yangzhou University School of Physics and Electronic Engineering Taizhou University School of Electronic Information Shanghai Dianji University School of Energy and Mechanical Engineering Nanjing Normal University Key Laboratory of Intelligent Computing and Information Processing in Fujian Provincial University Quanzhou Normal University
Cluster analysis is important in scientific and industrial fields. In this study, we proposed a novel chaotic biogeography-based optimization(CBBO) method, and applied it in centroid-based clustering methods. The resu... 详细信息
来源: 评论
Security improvement on a three party password based authenticated key exchange scheme using chaotic maps
收藏 引用
Journal of information Hiding and Multimedia Signal processing 2016年 第6期7卷 1365-1372页
作者: Chen, Yu Chen, Chien-Ming Pan, Jeng-Shyang Wu, Tsu-Yang Liu, Shuai Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China Innovative Information Industry Research Center School of Computer Science and Technology Shenzhen Graduate School Harbin Institute of Technology Shenzhen518055 China
Recently, password based authenticated key exchange (or called PAKE for short) with chaotic maps has been received much attention for researchers. In 2013, Xie et al. proposed a three party PAKE scheme (based on chaot... 详细信息
来源: 评论
A Parallel Algorithm to Construct BISTs on Parity Cubes
A Parallel Algorithm to Construct BISTs on Parity Cubes
收藏 引用
International Conference on information Science and Control Engineering (ICISCE)
作者: Yan Wang Jianxi Fan Wenjun Liu Yuejuan Han Provincial Key Laboratory for Computer Information Processing Technology Soochow University School of Computer Science and Technology Soochow University Suzhou China
Independent spanning trees(ISTs) have applications in interconnection networks such as reliable communication protocols, and secure message distribution, etc. In this paper, we use BIST to denote the IST isomorphic to... 详细信息
来源: 评论
Longest Common Sub-sequence Computation and Retrieve for Encrypted Character Strings
Longest Common Sub-sequence Computation and Retrieve for Enc...
收藏 引用
International Conference on Network-Based information Systems (NBIS)
作者: Minghao Zhao Zhen Li Yilei Wang Qiuliang Xu School of Computer Science and Technology Shandong University Jinan China School of Computer Science and Technology Shandong University of Finance and Economics Jinan China Shandong Provincial Key Laboratory of Software Engineering Jinan China School of Information and Electric Engineering Ludong University Yantai Shandong
Longest Common Sub-sequence is a basic algorithm problem. It serves as a basic component for a variety of applications in information processing and bioinformatics. It is a NP-hard problem and often manipulated using ... 详细信息
来源: 评论
Predicting helix boundaries of α-helix transmembrane protein with feedback conditional random fields  11th
Predicting helix boundaries of α-helix transmembrane protei...
收藏 引用
11th International Conference on Intelligent Computing, ICIC 2015
作者: Wang, Kun Wu, Hongjie Lu, Weizhong Fu, Baochuan Lü, Qiang Huang, Xu School of Electronic and Information Engineering Suzhou University of Science and Technology Suzhou215009 China School of Computer Science and Technology Soochow University Suzhou215006 China Jiangsu Provincial Key Lab for Information Processing Technologies Suzhou215006 China School of Information Engineering Huzhou University Huzhou313000 China
Transmembrane proteins play an important role in cellular energy production, signal transmission, metabolism. Existing machine learning methods are difficult to model the global correlation of the membrane protein seq... 详细信息
来源: 评论
Semantic automatic image annotation based on Non-Abstract Visual keywords
Semantic automatic image annotation based on Non-Abstract Vi...
收藏 引用
2014 International Conference on information technology and Application, ITA2014
作者: Ke, Xiao Chen, Guolong College of Mathematics and Computer Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing Fuzhou University Fuzhou China
Automatic image annotation is a significant and challenging problem in pattern recognition and computer vision. Existing models did not describe the visual representations of corresponding keywords, which would lead t... 详细信息
来源: 评论
Regression-based execution time prediction in hadoop environment
Regression-based execution time prediction in hadoop environ...
收藏 引用
International Conference on information technology and computer Application Engineering, ITCAE 2014
作者: Wu, Xiao Dong Zeng, Yu Zhu Zhao, C.T. Faculty of Mathematics and Computer Science Quanzhou Normal University China Fujian Provincial Key Laboratory of Data Intensive Computing China Key Laboratory of Intelligent Computing and Information Processing Fujian Province University China
Hadoop MapReduce has been proven an effective computing model to deal with big data for the last few years. However, one technical challenge facing this framework is how to predict the execution time of an individual ... 详细信息
来源: 评论