咨询与建议

限定检索结果

文献类型

  • 846 篇 会议
  • 466 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,313 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 944 篇 工学
    • 697 篇 计算机科学与技术...
    • 579 篇 软件工程
    • 252 篇 信息与通信工程
    • 112 篇 控制科学与工程
    • 101 篇 生物工程
    • 98 篇 电气工程
    • 84 篇 电子科学与技术(可...
    • 81 篇 光学工程
    • 66 篇 生物医学工程(可授...
    • 61 篇 机械工程
    • 37 篇 化学工程与技术
    • 36 篇 仪器科学与技术
    • 34 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 32 篇 动力工程及工程热...
    • 30 篇 交通运输工程
    • 24 篇 材料科学与工程(可...
  • 451 篇 理学
    • 243 篇 数学
    • 113 篇 生物学
    • 112 篇 物理学
    • 66 篇 统计学(可授理学、...
    • 42 篇 化学
    • 36 篇 系统科学
  • 248 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 112 篇 图书情报与档案管...
    • 42 篇 工商管理
  • 59 篇 医学
    • 50 篇 临床医学
    • 43 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
  • 35 篇 法学
    • 31 篇 社会学
  • 25 篇 农学
  • 17 篇 教育学
  • 9 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 5 篇 艺术学

主题

  • 68 篇 feature extracti...
  • 39 篇 semantics
  • 30 篇 convolution
  • 29 篇 training
  • 28 篇 accuracy
  • 27 篇 deep learning
  • 27 篇 image segmentati...
  • 24 篇 data mining
  • 24 篇 computational mo...
  • 23 篇 signal processin...
  • 23 篇 speech processin...
  • 22 篇 object detection
  • 20 篇 convolutional ne...
  • 18 篇 optimization
  • 17 篇 transformers
  • 17 篇 computer vision
  • 17 篇 information proc...
  • 15 篇 image reconstruc...
  • 14 篇 computer science
  • 14 篇 neural networks

机构

  • 103 篇 provincial key l...
  • 70 篇 fujian provincia...
  • 61 篇 school of comput...
  • 55 篇 key laboratory o...
  • 50 篇 college of compu...
  • 44 篇 shandong provinc...
  • 44 篇 fujian provincia...
  • 42 篇 hunan provincial...
  • 28 篇 hubei province k...
  • 28 篇 guangdong provin...
  • 26 篇 college of mathe...
  • 24 篇 college of compu...
  • 22 篇 provincial key l...
  • 22 篇 national enginee...
  • 19 篇 school of comput...
  • 18 篇 college of elect...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 18 篇 college of compu...
  • 16 篇 school of comput...

作者

  • 60 篇 li zuoyong
  • 37 篇 zhang fuquan
  • 24 篇 zuoyong li
  • 19 篇 fan haoyi
  • 18 篇 zhu qiaoming
  • 17 篇 yu fei
  • 17 篇 li lang
  • 16 篇 shen linlin
  • 16 篇 lang li
  • 14 篇 kong fang
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 chen yang
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 zhou guodong
  • 12 篇 wang jinbao
  • 12 篇 guohua lv
  • 12 篇 xu lin
  • 12 篇 jiang feibo

语言

  • 1,216 篇 英文
  • 64 篇 其他
  • 34 篇 中文
检索条件"机构=Provincial Key Laboratory for Computer Information Processing Technology Soochow University"
1313 条 记 录,以下是581-590 订阅
排序:
Quality Assessment of Electrocardiogram Signals Using Contrastive Learning
Quality Assessment of Electrocardiogram Signals Using Contra...
收藏 引用
IEEE International Symposium on information (IT) in Medicine and Education, ITME
作者: Meiping Zhong Zuoyong Li ChuanSheng Wang Jiayan Huang WanQi Zhao Haoyi Fan College of Computer and Big Data Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou China Department of Automatic Control Technical Polytechnic University of Catalonia Barcelona Spain New Engineering Industry College Putian University Putian China School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou China
Quality assessment of electrocardiogram (ECG) signals holds significant importance in reducing the high-frequency false alarms in automated arrhythmia diagnosis. Existing quality assessment methods primarily rely on e...
来源: 评论
A Reconstruction Method for Cross-Cut Shredded Documents Based on the Extreme Learning Machine Algorithm
Research Square
收藏 引用
Research Square 2022年
作者: Zhang, Zhenghui Zou, Juan Zheng, Jinhua Yang, Shengxiang Gong, Dunwei Pei, Tingrui Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan University Hunan Xiangtan411105 China Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Information Engineering College of Xiangtan University Hunan Xiangtan411105 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China School of Computer Science and Informatics De Montfort University LeicesterLE1 9BH United Kingdom School of Information and Electronic Engineering China University of Mining and Technology Xuzhou221116 China
Reconstruction of cross-cut shredded text documents (RCCSTD) has important applications for information security and judicial evidence collection. The traditional method of manual construction is a very time-consuming... 详细信息
来源: 评论
Unsupervised Graph-Sequence Anomaly Detection for 5G Core Network Control Plane Traffic
Unsupervised Graph-Sequence Anomaly Detection for 5G Core Ne...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Min Wang Peng Li Zhang Cheng Wenmao Liu Lei Nie Haizhou Bao Qin Liu Kai Zhang School of Computer Science and Technology Wuhan University of Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System China NSFOCUS Technologies Group Co. Ltd School of Cyber Science and Engineering Wuhan University China
5G Core network (5GC) employs a Service Based Architecture (SBA). This architecture decomposes the control plane into multiple independent Network Functions (NFs). NFs open interfaces to provide services to other NFs,...
来源: 评论
EEG based Parkinson Detection through Supervised information Enhanced Contrastive Learning
EEG based Parkinson Detection through Supervised Information...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jian Song Xiang Li Wenjing Jiang Chunxiao Wang Zhigang Zhao Jialiang Lv Bin Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Geriatric Neurology Key Laboratory of Cardiovascular Proteomics of Shandong Province Qilu Hospital of Shandong University Jinan China Institute of Engineering Medicine Beijing Institute of Technology Beijing China
This study presents a novel Supervised information Enhanced Contrastive Learning Algorithm for Parkinson’s Disease Detection (SI-CLAPD) based on Electroencephalography (EEG). SI-CLAPD performs contrastive learning in...
来源: 评论
Semi-Supervised Time Series Classification by Temporal Relation Prediction
Semi-Supervised Time Series Classification by Temporal Relat...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal processing
作者: Haoyi Fan Fengbin Zhang Ruidong Wang Xunhua Huang Zuoyong Li School of Computer Science and Technology Harbin University of Science and Technology Harbin China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China
Semi-supervised learning (SSL) has proven to be a powerful algorithm in different domains by leveraging unlabeled data to mitigate the reliance on the tremendous annotated data. However, few efforts consider the under... 详细信息
来源: 评论
Large AI Model-Based Semantic Communications
arXiv
收藏 引用
arXiv 2023年
作者: Jiang, Feibo Peng, Yubo Dong, Li Wang, Kezhi Yang, Kun Pan, Cunhua You, Xiaohu Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha China School of Information Science and Engineering Hunan Normal University Changsha China Changsha Social Laboratory of Artificial Intelligence Hunan University of Technology and Business Changsha China Department of Computer Science Brunel University London United Kingdom School of Computer Science and Electronic Engineering University of Essex ColchesterCO4 3SQ United Kingdom Changchun Institute of Technology China National Mobile Communications Research Laboratory Southeast University Nanjing210096 China
Semantic communication (SC) is an emerging intelligent paradigm, offering solutions for various future applications like metaverse, mixed reality, and the Internet of Everything. However, in current SC systems, the co... 详细信息
来源: 评论
Design and Implementation of Firmware Data Acquisition System Based on Scrapy Framework
Design and Implementation of Firmware Data Acquisition Syste...
收藏 引用
2020 IEEE International Conference on Power, Intelligent Computing and Systems, ICPICS 2020
作者: Han, Xiaowei Zheng, Likun School of Computer and Information Engineering Harbin University of Commerce Harbin China Heilongjiang Provincial Key Laboratory of Electronic Commerce and Information Processing Harbin University of Commerce Harbin China
In recent years, the scale of Internet data grows exponentially with the development of Internet technology. Such huge amount of Internet data is valuable. Web crawler is one of the most popular technology, which is o... 详细信息
来源: 评论
A Profile Matching Scheme based on Private Set Intersection for Cyber-Physical-Social Systems
A Profile Matching Scheme based on Private Set Intersection ...
收藏 引用
IEEE Conference on Dependable and Secure Computing
作者: Yalian Qian Xueya Xia Jian Shen School of Computer and Software Nanjing university of information science and technology Nanjing China Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing Fuzhou University Fujian China
The cyber-physical-social system (CPSS) is a three-layer system framework that combines the human society on the basis of the cyber-physical system (CPS), so that the human society, the cyber world and the physical wo... 详细信息
来源: 评论
Geometry-based non-line-of-sight error mitigation and localization in wireless communications
收藏 引用
Science China(information Sciences) 2019年 第10期62卷 149-163页
作者: Jingyu HUA Yejia YIN Anding WANG Yu ZHANG Weidang LU School of Information and Electronic Engineering Zhejiang Gongshang University Zhejiang Provincial Key Laboratory of Information Processing Communication and Networking College of Information Engineering Zhejiang University of Technology
Recently, positioning services have received considerable attention. The primary source of the positioning error is non-line-of-sight(NLOS) propagation. To address this problem, we propose a novel NLOS mitigation sche... 详细信息
来源: 评论
A Novel Dynamic Group Signature with Membership Privacy
A Novel Dynamic Group Signature with Membership Privacy
收藏 引用
IEEE Conference on Dependable and Secure Computing
作者: Junqing Lu Rongxin Qi Jian Shen School of Computer and Software Nanjing University of Information Science & Technology Nanjing China Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing Fuzhou University Fuzhou China
Group signature is a cryptography primitive that has been widely researched. It strikes a balance between digital signature and the user's demand for anonymity. A valid member in the group can generate a signature... 详细信息
来源: 评论