咨询与建议

限定检索结果

文献类型

  • 851 篇 会议
  • 456 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,308 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 934 篇 工学
    • 693 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 248 篇 信息与通信工程
    • 111 篇 控制科学与工程
    • 101 篇 生物工程
    • 96 篇 电气工程
    • 84 篇 电子科学与技术(可...
    • 78 篇 光学工程
    • 65 篇 生物医学工程(可授...
    • 62 篇 机械工程
    • 37 篇 化学工程与技术
    • 35 篇 仪器科学与技术
    • 33 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 32 篇 动力工程及工程热...
    • 29 篇 交通运输工程
    • 22 篇 材料科学与工程(可...
  • 446 篇 理学
    • 241 篇 数学
    • 113 篇 生物学
    • 110 篇 物理学
    • 64 篇 统计学(可授理学、...
    • 42 篇 化学
    • 35 篇 系统科学
  • 246 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 112 篇 图书情报与档案管...
    • 42 篇 工商管理
  • 59 篇 医学
    • 51 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
  • 35 篇 法学
    • 31 篇 社会学
  • 25 篇 农学
  • 17 篇 教育学
  • 9 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 5 篇 艺术学

主题

  • 68 篇 feature extracti...
  • 38 篇 semantics
  • 31 篇 training
  • 30 篇 convolution
  • 30 篇 accuracy
  • 28 篇 deep learning
  • 28 篇 computational mo...
  • 26 篇 image segmentati...
  • 25 篇 data mining
  • 24 篇 speech processin...
  • 23 篇 signal processin...
  • 20 篇 object detection
  • 20 篇 optimization
  • 20 篇 convolutional ne...
  • 18 篇 information proc...
  • 17 篇 transformers
  • 17 篇 computer vision
  • 17 篇 robustness
  • 15 篇 visualization
  • 14 篇 computer science

机构

  • 104 篇 provincial key l...
  • 70 篇 fujian provincia...
  • 61 篇 school of comput...
  • 59 篇 key laboratory o...
  • 50 篇 college of compu...
  • 44 篇 fujian provincia...
  • 43 篇 shandong provinc...
  • 43 篇 hunan provincial...
  • 28 篇 hubei province k...
  • 27 篇 guangdong provin...
  • 26 篇 college of mathe...
  • 24 篇 college of compu...
  • 23 篇 provincial key l...
  • 22 篇 national enginee...
  • 19 篇 school of comput...
  • 18 篇 college of elect...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 18 篇 college of compu...
  • 17 篇 shandong provinc...

作者

  • 60 篇 li zuoyong
  • 37 篇 zhang fuquan
  • 24 篇 zuoyong li
  • 19 篇 fan haoyi
  • 18 篇 zhu qiaoming
  • 17 篇 yu fei
  • 17 篇 li lang
  • 16 篇 shen linlin
  • 16 篇 lang li
  • 14 篇 kong fang
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 dong li
  • 12 篇 zhou guodong
  • 12 篇 wang jinbao
  • 12 篇 guohua lv
  • 12 篇 jiao ge
  • 12 篇 xu lin
  • 12 篇 jiang feibo
  • 11 篇 li chenglong

语言

  • 1,145 篇 英文
  • 128 篇 其他
  • 41 篇 中文
检索条件"机构=Provincial Key Laboratory for Computer Information Processing Technology Soochow University"
1308 条 记 录,以下是751-760 订阅
排序:
Instant Edit Propagation on Images Based on Bilateral Grid
收藏 引用
computers, Materials & Continua 2019年 第8期61卷 643-656页
作者: Feng Li Chaofeng Ou Yan Gui Lingyun Xiang Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and TechnologyChangsha410114China School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China School of Mechanical and Aerospace Engineering Nanyang Technological UniversitySingapore639798Singapore
The ability to quickly and intuitively edit digital content has become increasingly important in our everyday ***,existing edit propagation methods for editing digital images are typically based on optimization with h... 详细信息
来源: 评论
A data clustering strategy for enhancing mutual privacy in healthcare system of IoT
A data clustering strategy for enhancing mutual privacy in h...
收藏 引用
2019 IEEE International Conferences on Ubiquitous Computing and Communications and Data Science and Computational Intelligence and Smart Computing, Networking and Services, IUCC/DSCI/SmartCNS 2019
作者: Guo, Xuancheng Lin, Hui Xu, Chuanfeng Lin, Wenzhong School of Mathematics and Computer Science Fujian Normal University Fuzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China
Recent advances in the healthcare system of Internet of Things (IoT) has led to a generation of a large amount of physic sensor data. Data analyst collects and analyzes these sensor data through wireless sensor networ... 详细信息
来源: 评论
Representation Matching For Remote Quantum Computing
收藏 引用
PRX Quantum 2021年 第2期2卷 020327-020327页
作者: Yuxiang Yang Masahito Hayashi Institute for Theoretical Physics ETH Zürich Switzerland QICI Quantum Information and Computation Initiative Department of Computer Science The University of Hong Kong Pokfulam Road Hong Kong Shenzhen Institute for Quantum Science and Engineering Southern University of Science and Technology Shenzhen 518055 China Guangdong Provincial Key Laboratory of Quantum Science and Engineering Southern University of Science and Technology Shenzhen 518055 China Shenzhen Key Laboratory of Quantum Science and Engineering Southern University of Science and Technology Shenzhen 518055 China Graduate School of Mathematics Nagoya University Nagoya 464-8602 Japan
Many quantum computational tasks have inherent symmetries, suggesting a path to enhancing their efficiency and performance. Exploiting this observation, we propose representation matching, a generic probabilistic prot... 详细信息
来源: 评论
Survey on Multi-Objective Evolutionary Algorithms  5
Survey on Multi-Objective Evolutionary Algorithms
收藏 引用
5th Annual International Conference on Network and information Systems for computers, ICNISC 2019
作者: Huang, Wenlan Zhang, Yu Li, Lan School of Computer and Information Engineering Harbin University of Commerce Harbin150028 China Heilongjiang Provincial Key Laboratory of Electronic Commerce and Information Processing Harbin University of Commerce Harbin150028 China
Multi-objective evolutionary algorithm (MOEA) is the main method to solve multi-objective optimization problem (MOP), which has become one of the hottest research areas of evolutionary computation. This paper surveys ... 详细信息
来源: 评论
Research on Wave-Off Risk Estimation Based on WODCP  3
Research on Wave-Off Risk Estimation Based on WODCP
收藏 引用
3rd IEEE Advanced information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2019
作者: Li, Hui Su, Xiaodong Zhang, Yuru Zhao, Ming Li, Yun Hao, Gang Harbin University of Commerce School of Computer and Information Engineering China Heilongjiang Provincial Key Laboratory of Electronic Commerce and Information Processing China Heilongjiang University School of Electronic Engineering Harbin China
Consider the high risk of carrier-based aircraft wave-off operation, this paper has a research on wave-off decision making technology based on Wave-Off Decision Critical Position (WODCP). In this paper, after analyzin... 详细信息
来源: 评论
Self-Supervised Speech Denoising Using Only Noisy Audio Signals
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Jiasong Li, Qingchun Yang, Guanyu Li, Lei Senhadji, Lotfi Shu, Huazhong LIST Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing210096 China Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing Southeast University Nanjing210096 China RennesF-35042 France The 28th Research Institute of China Electronics Technology Group Corporation Nanjing210007 China Univ Rennes INSERM LTSI UMR 1099 RennesF-35042 France
In traditional speech denoising tasks, clean audio signals are often used as the training target, but absolutely clean signals are collected from expensive recording equipment or in studios with the strict environment... 详细信息
来源: 评论
Parameter training methods for convolutional neural networks with adaptive adjustment method based on Caputo fractional-order differences
收藏 引用
Chaos, Solitons and Fractals 2025年 199卷
作者: Zhao, Haiming Yang, Honggang Chen, Jiejie Jiang, Ping Zeng, Zhigang School of Computer and Information Engineering Hubei Normal University Huangshi435000 China School of Automation Wuhan University of Technology Wuhan430000 China School of Computer Hubei Polytechnic University Huangshi435000 China School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan430000 China Key Laboratory of Image Information Processing and Intelligent Control Ministry of Education of China Wuhan430000 China
As deep learning technologies continue to permeate various sectors, optimization algorithms have become increasingly crucial in neural network training. This paper introduces two adaptive momentum algorithms based on ... 详细信息
来源: 评论
MR-APG: An improved model for swarm intelligence movement coordination  2nd
MR-APG: An improved model for swarm intelligence movement co...
收藏 引用
2nd International Conference on Smart Vehicular technology, Transportation, Communication and Applications, VTCA 2018
作者: Yang, Hui Ci, Linlin Zhang, Fuquan Yang, Minghua Mao, Yu Niu, Ke School of Computer Science and Technology Beijing Institute of Technology Beijing China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350121 China RocketMilitary Equipment Research Institute Beijing China Computer School Beijing Information Science and Technology University Beijing China
Swarm intelligence based on the bionics have become an emerging research field, and researchers have proposed some kinds of intelligent models, such as ant colony, free group wolves, fish flock, insects group, bacteri... 详细信息
来源: 评论
Attack intent analysis method based on attack path graph  9
Attack intent analysis method based on attack path graph
收藏 引用
9th International Conference on Communication and Network Security, ICCNS 2019
作者: Chen, Biqiong Liu, Yanhua Li, Shijin Gao, Xiaoling College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the rapid development of network technology, network security problems are gradually increasing, and the network attack situation is very severe. In a complex attack scenario, timely detection of potential attack... 详细信息
来源: 评论
A comprehensive assessment method of asset importance for key asset protection  9
A comprehensive assessment method of asset importance for ke...
收藏 引用
9th International Conference on Communication and Network Security, ICCNS 2019
作者: Gao, Xiaoling Liu, Yanhua Qiu, Yanbin Liu, Huajun College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
In a given system network, an important prerequisite for security risk control is how to accurately calculate the impact of different host assets in the topology on the spread of attack risk. In this regard, we propos... 详细信息
来源: 评论