咨询与建议

限定检索结果

文献类型

  • 825 篇 会议
  • 457 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,283 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 920 篇 工学
    • 677 篇 计算机科学与技术...
    • 561 篇 软件工程
    • 251 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 100 篇 生物工程
    • 95 篇 电气工程
    • 83 篇 电子科学与技术(可...
    • 79 篇 光学工程
    • 64 篇 生物医学工程(可授...
    • 60 篇 机械工程
    • 37 篇 化学工程与技术
    • 34 篇 仪器科学与技术
    • 33 篇 网络空间安全
    • 32 篇 动力工程及工程热...
    • 32 篇 安全科学与工程
    • 29 篇 交通运输工程
    • 23 篇 材料科学与工程(可...
  • 444 篇 理学
    • 240 篇 数学
    • 112 篇 生物学
    • 108 篇 物理学
    • 65 篇 统计学(可授理学、...
    • 42 篇 化学
    • 36 篇 系统科学
  • 243 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 59 篇 医学
    • 50 篇 临床医学
    • 44 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
  • 34 篇 法学
    • 30 篇 社会学
  • 25 篇 农学
  • 16 篇 教育学
  • 9 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 5 篇 艺术学

主题

  • 68 篇 feature extracti...
  • 39 篇 semantics
  • 30 篇 convolution
  • 28 篇 accuracy
  • 28 篇 training
  • 27 篇 deep learning
  • 26 篇 image segmentati...
  • 24 篇 data mining
  • 24 篇 computational mo...
  • 23 篇 signal processin...
  • 23 篇 speech processin...
  • 21 篇 object detection
  • 19 篇 convolutional ne...
  • 18 篇 optimization
  • 17 篇 transformers
  • 17 篇 computer vision
  • 17 篇 information proc...
  • 14 篇 computer science
  • 14 篇 neural networks
  • 14 篇 visualization

机构

  • 104 篇 provincial key l...
  • 70 篇 fujian provincia...
  • 61 篇 school of comput...
  • 53 篇 key laboratory o...
  • 51 篇 college of compu...
  • 44 篇 shandong provinc...
  • 44 篇 fujian provincia...
  • 42 篇 hunan provincial...
  • 28 篇 hubei province k...
  • 26 篇 college of mathe...
  • 24 篇 college of compu...
  • 22 篇 provincial key l...
  • 20 篇 guangdong provin...
  • 19 篇 school of comput...
  • 18 篇 college of elect...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 17 篇 school of comput...
  • 17 篇 college of compu...
  • 16 篇 school of comput...

作者

  • 60 篇 li zuoyong
  • 37 篇 zhang fuquan
  • 24 篇 zuoyong li
  • 19 篇 fan haoyi
  • 18 篇 zhu qiaoming
  • 17 篇 yu fei
  • 17 篇 li lang
  • 17 篇 lang li
  • 14 篇 kong fang
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 shen linlin
  • 13 篇 chen yang
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 zhou guodong
  • 12 篇 guohua lv
  • 12 篇 xu lin
  • 12 篇 jiang feibo
  • 11 篇 wang tao

语言

  • 1,205 篇 英文
  • 46 篇 其他
  • 32 篇 中文
检索条件"机构=Provincial Key Laboratory for Computer Information Processing Technology Soochow University"
1283 条 记 录,以下是121-130 订阅
排序:
A Dynamic Task Assignment Strategy for Emitter Reconnaissance and Positioning through Use of UAV Swarms  11th
A Dynamic Task Assignment Strategy for Emitter Reconnaissanc...
收藏 引用
11th International Conference on computer Engineering and Networks, CENet2021
作者: Wang, Ruonan Gu, Yu Zhou, Zou Wang, Zhehao Xu, Fangwen Luo, Jian Ma, Lulu Qiu, Hongbing Provincial Ministry of Education Key Laboratory of Cognitive Radio and Information Processing Guilin University of Electronic Technology Guilin541004 China
With three advantages of information sharing, system survival, and cost-effective exchange, Unmanned Aerial Vehicle (UAV) swarms can perform tasks at risk, such as emitter reconnaissance and positioning. Due to high r... 详细信息
来源: 评论
Rotation-DPeak: Improving Density Peaks Selection for Imbalanced Data  1
收藏 引用
8th China computer Federation International Conference on Big Data, CCF BIGDATA 2020
作者: Hu, Xiaoliang Yan, Ming Chen, Yewang Yang, Lijie Du, Jixiang The College of Computer Science and Technology Huaqiao University Xiamen China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao University Xiamen China
Density Peak (DPeak) is an effective clustering algorithm. It maps arbitrary dimensional data onto a 2-dimensional space, which yields cluster centers and outliers automatically distribute on upper right and upper lef... 详细信息
来源: 评论
A Multi-station Signal Sorting Method Based on Time Difference Pair and Azimuth information  12th
A Multi-station Signal Sorting Method Based on Time Differen...
收藏 引用
12th International Conference on computer Engineering and Networks, CENet 2022
作者: Xiang, Zhexi Zhou, Zou Gu, Yu Bai, Xiao Liang, Caisheng Provincial Ministry of Education Key Laboratory of Cognitive Radio and Information Processing Guilin University of Electronic Technology Guilin541004 China
Current sorting methods based on time difference of arrival (TDOA) can not concurrently realize the high sorting accuracy and low computational complexity with pulse loss and interference. This paper proposes a multi-... 详细信息
来源: 评论
EPI-Mamba: State Space Model for Semantic Segmentation from Light Fields
EPI-Mamba: State Space Model for Semantic Segmentation from ...
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Yan Li Jianan Chen Qiong Wang Jinshan Xu College of Computer Science & Technology Zhejiang University of Technology Hangzhou China Guangdong Provincial Key Laboratory of Intelligent Information Processing & Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China
Global contextual dependency is of significance for semantic segmentation from light fields. However, previous works mostly exploit attention mechanisms to model spatial context dependency and angular context dependen... 详细信息
来源: 评论
A New Image Encryption Strategy Based on Arnold Transformation and Logistic Map  11th
A New Image Encryption Strategy Based on Arnold Transformati...
收藏 引用
11th International Conference on computer Engineering and Networks, CENet2021
作者: Sun, Xiyu Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Aiming at the problem of digital image encryption, an image encryption algorithm is proposed. The algorithm is divided into preparation stage and permutation diffusion stage. In the preparation stage, Arnold algorithm... 详细信息
来源: 评论
A Radar Working Mode Recognition Algorithm with Approximate Coherent Metric and Multi-Agent PSR Model  12th
A Radar Working Mode Recognition Algorithm with Approximate ...
收藏 引用
12th International Conference on computer Engineering and Networks, CENet 2022
作者: Zhou, Zou Fei, Wenhao Zheng, Fei Luo, Jian Provincial Ministry of Education Key Laboratory of Cognitive Radio and Information Processing Guilin University of Electronic Technology Guilin541004 China
Multifunctional radar(MFR) has non-cooperative, narrow beam, and flexible agile characteristics. The traditional radar feature parameters and syntactic modeling methods are difficult to make the information of radar w... 详细信息
来源: 评论
A new S-box construction method meeting strict avalanche criterion
A new S-box construction method meeting strict avalanche cri...
收藏 引用
作者: Li, Lang Liu, Jinggen Guo, Ying Liu, Botao College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
S-box is the main security component in lightweight block ciphers. Finding new algorithms and technical applications to generate S-box is still a current research topic. We proposed an S-box construction method that s... 详细信息
来源: 评论
Hyperchaotic Image Encryption Algorithm Based on BD-Zigzag Transformation and DNA Coding  12th
Hyperchaotic Image Encryption Algorithm Based on BD-Zigzag T...
收藏 引用
12th International Conference on computer Engineering and Networks, CENet 2022
作者: Wang, Lujie Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
For the features of Zigzag transformation, a Bidirectional Deformed Zigzag (BD-Zigzag) transformation is proposed in this paper, which starts from both sides of the diagonal and crosses in both directions. This method... 详细信息
来源: 评论
A robust and automatic method for the recognition of speech category in online learning discourse
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第12期15卷 3913-3924页
作者: Jiang, Dazhi He, Zhihui Chen, Yifei Xu, Linyan Lin, Jiali Guangdong Provincial Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510399 China Department of Computer Science Shantou University Shantou515063 China Department of Management Economics and Industrial Engineering Politecnico di Milano MI Milan20156 Italy School of Business Shantou University Shantou515063 China
It is a rapid and irresistible developing trend that the traditional classroom learning mode is transformed into an online learning mode. In the online learning process, it is important to achieve effective voice sepa... 详细信息
来源: 评论
A New Encryption Scheme Based on RSA Encryption Algorithm and Chen Chaotic System  12th
A New Encryption Scheme Based on RSA Encryption Algorithm an...
收藏 引用
12th International Conference on computer Engineering and Networks, CENet 2022
作者: He, Chenchen Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Nowadays the security of images is obviously more important. Some scholars have applied Rivest-Shamir-Adleman (RSA) algorithm and Chen chaotic system to image encryption. However, the application of the two methods in... 详细信息
来源: 评论