咨询与建议

限定检索结果

文献类型

  • 846 篇 会议
  • 466 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,313 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 944 篇 工学
    • 697 篇 计算机科学与技术...
    • 579 篇 软件工程
    • 252 篇 信息与通信工程
    • 112 篇 控制科学与工程
    • 101 篇 生物工程
    • 98 篇 电气工程
    • 84 篇 电子科学与技术(可...
    • 81 篇 光学工程
    • 66 篇 生物医学工程(可授...
    • 61 篇 机械工程
    • 37 篇 化学工程与技术
    • 36 篇 仪器科学与技术
    • 34 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 32 篇 动力工程及工程热...
    • 30 篇 交通运输工程
    • 24 篇 材料科学与工程(可...
  • 451 篇 理学
    • 243 篇 数学
    • 113 篇 生物学
    • 112 篇 物理学
    • 66 篇 统计学(可授理学、...
    • 42 篇 化学
    • 36 篇 系统科学
  • 248 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 112 篇 图书情报与档案管...
    • 42 篇 工商管理
  • 59 篇 医学
    • 50 篇 临床医学
    • 43 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
  • 35 篇 法学
    • 31 篇 社会学
  • 25 篇 农学
  • 17 篇 教育学
  • 9 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 5 篇 艺术学

主题

  • 68 篇 feature extracti...
  • 39 篇 semantics
  • 30 篇 convolution
  • 29 篇 training
  • 28 篇 accuracy
  • 27 篇 deep learning
  • 27 篇 image segmentati...
  • 24 篇 data mining
  • 24 篇 computational mo...
  • 23 篇 signal processin...
  • 23 篇 speech processin...
  • 22 篇 object detection
  • 20 篇 convolutional ne...
  • 18 篇 optimization
  • 17 篇 transformers
  • 17 篇 computer vision
  • 17 篇 information proc...
  • 15 篇 image reconstruc...
  • 14 篇 computer science
  • 14 篇 neural networks

机构

  • 103 篇 provincial key l...
  • 70 篇 fujian provincia...
  • 61 篇 school of comput...
  • 55 篇 key laboratory o...
  • 50 篇 college of compu...
  • 44 篇 shandong provinc...
  • 44 篇 fujian provincia...
  • 42 篇 hunan provincial...
  • 28 篇 hubei province k...
  • 28 篇 guangdong provin...
  • 26 篇 college of mathe...
  • 24 篇 college of compu...
  • 22 篇 provincial key l...
  • 22 篇 national enginee...
  • 19 篇 school of comput...
  • 18 篇 college of elect...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 18 篇 college of compu...
  • 16 篇 school of comput...

作者

  • 60 篇 li zuoyong
  • 37 篇 zhang fuquan
  • 24 篇 zuoyong li
  • 19 篇 fan haoyi
  • 18 篇 zhu qiaoming
  • 17 篇 yu fei
  • 17 篇 li lang
  • 16 篇 shen linlin
  • 16 篇 lang li
  • 14 篇 kong fang
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 chen yang
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 zhou guodong
  • 12 篇 wang jinbao
  • 12 篇 guohua lv
  • 12 篇 xu lin
  • 12 篇 jiang feibo

语言

  • 1,216 篇 英文
  • 64 篇 其他
  • 34 篇 中文
检索条件"机构=Provincial Key Laboratory for Computer Information Processing Technology Soochow University"
1313 条 记 录,以下是931-940 订阅
排序:
A Dynamic Community Detection Algorithm Based on Parallel Incremental Related Vertices  2
A Dynamic Community Detection Algorithm Based on Parallel In...
收藏 引用
2017 IEEE 2nd International Conference on Big Data Analysis(ICBDA 2017)
作者: Guohui Li Kun Guo YuZhong Chen Ling Wu Danhong Zhu College of Mathematics and Computer Sciences Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing(Fuzhou University) Key Laboratory of Spatial Data Mining & Information Sharing Ministry of Education
One of the traditional ways for detecting dynamic communities is to find the communities at each interval through the static community detection ***,it usually leads to high computation *** this paper,a novel algorith... 详细信息
来源: 评论
A Generation Method of Automation Test Cases Based on Android
A Generation Method of Automation Test Cases Based on Androi...
收藏 引用
2017 5th International Conference on Machinery,Materials and Computing technology(ICMMCT 2017)
作者: Ming Zhang Baolei Cheng Weizhong Zha Jiwen Yang School of Computer Science and Technology Soochow University Provincial Key Laboratory for Computer Information Processing Technology
Aiming at the problems that complex testing process, incomplete testing and poor reusability of test cases for Android automated testing methods, we propose a generation method of automation test cases based on contro... 详细信息
来源: 评论
Research on power attack comprehensive experiment platform based on SAKURA -G hardware circuit  7
Research on power attack comprehensive experiment platform b...
收藏 引用
7th International Conference on computer Engineering and Networks, CENet 2017
作者: Jiao, Ge Li, Lang Zou, Yi College of Computer Science and Technology Hengyang Normal UniversityHunan Provincial Engineering Laboratory for Technology of Traditional Settlements Digitalization Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Hunan421002 China
The power attack of the hardware circuit is going through the steps of algorithm writen in FPGA, power consumption, data processing and analysis. In order to solve the problem of the existing power attack experimental... 详细信息
来源: 评论
Modelling of synchronisation and energy performance of FBE- and LBE-based standalone LTE-U networks
收藏 引用
Journal of Engineering 2017年 第7期2017卷 292-299页
作者: Li, Jiamin Shan, Hangguan Huang, Aiping Yuan, Jiantao Cai, Lin X. Zhejiang Provincial Key Laboratory of Information Processing and Communication Networks Hangzhou China College of Information Science and Electronic Engineering Zhejiang University Hangzhou China Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago United States
Without the aid of licensed channel, deploying long-term evolution (LTE) networks over unlicensed spectrum (named standalone LTE-U networks) faces the difficulty of establishing and maintaining synchronisation between... 详细信息
来源: 评论
Application of Deep Learning in Software Security Detection
Application of Deep Learning in Software Security Detection
收藏 引用
2018 International Conference on Computational Science and Engineering(ICCSE 2018)
作者: Lin Li Ying Ding Jiacheng Mao College of Computer Science and Technology Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System
Machine learning is knowledge of learning rules from data through computational models and algorithms. It has been applied in various fields that require mining rules from complex data, and has become one of the most ... 详细信息
来源: 评论
Research on the key technology of Safety Protection in Application Environment of Blockchain
收藏 引用
IOP Conference Series: Materials Science and Engineering 2019年 第3期569卷
作者: Hua Zhang Jiong Wang Ge Xu Zhiqiang Ruan College of Computer and Control Engineering Mmjiang University Fuzhou 350108 china Fujian Provincial Key Laboratory of Information Processing and Intelligent Control (Minjiang University)
This paper analyzes the current situation of blockchain application security. Then, makes a concrete analysis on the problems existing in the application safety of blockchain, including the attack of consensus algorit...
来源: 评论
The Order and Failure Estimation of Redundancy System Based on Cobweb Model  4th
The Order and Failure Estimation of Redundancy System Based ...
收藏 引用
4th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2017
作者: Xie, Chao-Fan Xu, Lin Xu, Lu-Xiong Zhang, Fuquan Network Center Fuqing Branch of Fujian Normal University Fuqing FuzhouFujian China Economic Institute Fujian Normal University Fuqing FuzhouFujian China Electronic Information and Engineering Institute Fuqing Branch of Fujian Normal University Fuqing FuzhouFujian China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350121 China School of Software Beijing Institute of Technology Beijing100081 China
In order to improve the reliability and life of components, product providers often take the form of redundant backup. The lower the failure rate of the product itself and the more the number of redundant backups, the... 详细信息
来源: 评论
An object classification method based on the improved bacterial foraging optimisation algorithm
收藏 引用
International Journal of Wireless and Mobile Computing 2017年 第2期12卷 166-173页
作者: Zeng, Zhigao Guan, Lianghua Yi, Shengqiu Zhu, Yanhui Liu, Qiang Tong, Qi Zeng, Sanyou College of Computer and Communication Hunan University of Technology Hunan412007 China Intelligent Information Perception and Processing Technology Hunan Province Key Laboratory Hunan China Department of Computer Science China University of GeoSciences Wuhan Hubei China
This paper proposes a new object classification method based on an improved bacterial foraging optimisation algorithm. Firstly, a dynamic step size is used instead of the fixed step size of the chemotaxis. Secondly, t... 详细信息
来源: 评论
Double time slot RFID anti-collision algorithm based on gray code  5
Double time slot RFID anti-collision algorithm based on gray...
收藏 引用
5th International Conference on information Science and Cloud Computing, ISCC 2017
作者: Deng, Hongwei Li, Lang Wang, Hui School of Computer Science and Technology Hengyang Normal University School of Information Science and Engineering Central South University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hunan 421002 China
To solve the radio frequency identification problem, an anti-collision algorithm based on the Gray code (BSGC) was developed. The proposed algorithm reduces the effort required to search for tag prefixes in accordance... 详细信息
来源: 评论
SPESC: A Specification Language for Smart Contracts
SPESC: A Specification Language for Smart Contracts
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Xiao He Bohan Qin Yan Zhu Xing Chen Yi Liu School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China National Computer Network Emergency Response Technical Team Coordination Center of China
The smart contract is an interdisciplinary concept that concerns business, finance, contract law and information technology. Designing and developing a smart contract may require the close cooperation of many experts ... 详细信息
来源: 评论