咨询与建议

限定检索结果

文献类型

  • 2,016 篇 期刊文献
  • 1,496 篇 会议
  • 1 册 图书

馆藏范围

  • 3,513 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,407 篇 工学
    • 1,559 篇 计算机科学与技术...
    • 1,251 篇 软件工程
    • 599 篇 信息与通信工程
    • 383 篇 电气工程
    • 286 篇 电子科学与技术(可...
    • 276 篇 控制科学与工程
    • 250 篇 生物工程
    • 185 篇 化学工程与技术
    • 181 篇 光学工程
    • 159 篇 生物医学工程(可授...
    • 148 篇 机械工程
    • 140 篇 仪器科学与技术
    • 101 篇 材料科学与工程(可...
    • 86 篇 动力工程及工程热...
    • 74 篇 交通运输工程
    • 73 篇 建筑学
  • 1,351 篇 理学
    • 631 篇 数学
    • 437 篇 物理学
    • 299 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 186 篇 化学
    • 86 篇 系统科学
    • 74 篇 地球物理学
  • 670 篇 管理学
    • 384 篇 管理科学与工程(可...
    • 322 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 169 篇 医学
    • 143 篇 临床医学
    • 106 篇 基础医学(可授医学...
    • 70 篇 药学(可授医学、理...
  • 96 篇 法学
    • 81 篇 社会学
  • 59 篇 经济学
  • 45 篇 农学
  • 28 篇 教育学
  • 9 篇 文学
  • 9 篇 军事学
  • 3 篇 艺术学

主题

  • 98 篇 semantics
  • 74 篇 deep learning
  • 74 篇 feature extracti...
  • 61 篇 training
  • 58 篇 data mining
  • 47 篇 computational mo...
  • 43 篇 convolution
  • 37 篇 data models
  • 33 篇 machine learning
  • 32 篇 object detection
  • 31 篇 visualization
  • 31 篇 accuracy
  • 30 篇 task analysis
  • 30 篇 optimization
  • 28 篇 knowledge engine...
  • 28 篇 big data
  • 28 篇 federated learni...
  • 27 篇 semantic segment...
  • 26 篇 knowledge graph
  • 26 篇 contrastive lear...

机构

  • 156 篇 school of inform...
  • 102 篇 school of comput...
  • 99 篇 university of ch...
  • 55 篇 university of sc...
  • 52 篇 school of econom...
  • 51 篇 school of inform...
  • 51 篇 fujian provincia...
  • 48 篇 key laboratory o...
  • 47 篇 school of physic...
  • 44 篇 hebei normal uni...
  • 44 篇 state key labora...
  • 44 篇 yunnan observato...
  • 43 篇 school of cyber ...
  • 42 篇 tianfu cosmic ra...
  • 42 篇 center for astro...
  • 42 篇 key laboratory o...
  • 42 篇 school of inform...
  • 41 篇 department of ph...
  • 40 篇 college of physi...
  • 39 篇 key laboratory o...

作者

  • 46 篇 feng c.f.
  • 46 篇 guo y.q.
  • 45 篇 bao y.w.
  • 44 篇 niyato dusit
  • 44 篇 hu h.b.
  • 44 篇 liu b.
  • 44 篇 danzengluobu
  • 43 篇 li xin
  • 42 篇 li cheng
  • 41 篇 liu c.
  • 40 篇 axikegu
  • 39 篇 fang j.
  • 39 篇 huang y.
  • 38 篇 bastieri d.
  • 38 篇 jiang k.
  • 38 篇 kuleshov d.
  • 38 篇 min z.
  • 38 篇 liu d.
  • 38 篇 chen m.j.
  • 38 篇 luo q.

语言

  • 2,809 篇 英文
  • 632 篇 其他
  • 81 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Information Technology Jiangxi Key Laboratory of Data and Knowledge Engineering"
3513 条 记 录,以下是3421-3430 订阅
排序:
Combining different visual vocabularies with different sizes for image categorization
Combining different visual vocabularies with different sizes...
收藏 引用
Pacific-Asia Workshop on Computational Intelligence and Industrial Application, PACIIA
作者: Hui-Lan Luo Hui Wei Yuan Ren School of Information Engineering Jiangxi University of Science and Technology Ganzhou Jiangxi China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China
In this paper, the advantages of ensemble methods are applied to image categorization. A novel method is introduced for image categorization by combining various visual vocabularies with different sizes in the popular... 详细信息
来源: 评论
An efficient fair off-line E-cash system based on a fully hierarchical proxy blind signature
收藏 引用
Journal of information and Computational Science 2009年 第1期6卷 407-414页
作者: Tan, Zuowen School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China State Key Laboratory of Information Security Institute of Software CAS Beijing 100190 China Jiangxi Research Center of E-Commerce Engineering and Technology Nanchang 330013 China
We design a fully hierarchical proxy blind signature scheme. Then we propose an efficient fair off-line electronic cash system based on the fully hierarchical proxy blind signature scheme with provable security. Our e... 详细信息
来源: 评论
Against Code Injection with System Call Randomization
Against Code Injection with System Call Randomization
收藏 引用
International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC
作者: Zhaohui Liang Bin Liang Luping Li Wei Chen Qingqing Kang Yingqin Gu Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Beijing China Renmin University of China Beijing CN School of Information Renmin University of China China
The existing code injection attack defense methods have some deficiencies on performance overhead and effectiveness. In order to ensure the system performance, we propose a method that uses system call randomization t... 详细信息
来源: 评论
Malicious Web Pages Detection Based on Abnormal Visibility Recognition
Malicious Web Pages Detection Based on Abnormal Visibility R...
收藏 引用
International Conference on E-Business and information System Security, EBISS
作者: Bin Liang Jianjun Huang Fang Liu Dawei Wang Daxiang Dong Zhaohui Liang Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China Beijing China School of Information Renmin University of China Beijing China Renmin University of China Beijing CN
In recent years, Web sites have already become the attackers' main target. When attackers embed malicious code in the Web pages, they generally change the display mode of the corresponding HTML tags to make the di... 详细信息
来源: 评论
Region of Interest Automatic Extraction for Color Image Based on Mathematical Morphology
Region of Interest Automatic Extraction for Color Image Base...
收藏 引用
International Conference on Computer and information technology (CIT)
作者: Xiao-hong Zhang Yuan-yuan Zhu Zhong-kui Fan School of Information Engineering Jiangxi University of Science and Technology Ganzhou China Information Security Center State Key Laboratory of Networking and Switching Beijing University of Posts and Telecommunications Beijing China
Combined with human visual characteristics and morphological watershed algorithm, a novel image processing method was proposed for automatic region of interest (ROI) extraction. The color image would be converted into... 详细信息
来源: 评论
Design and Implement of Digital Modulator Based on Improved DDS technology and DSP Builder
Design and Implement of Digital Modulator Based on Improved ...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Kangshun Li Xiaoqiao Lu Wensheng Zhang Feng Wang School of Information South China Agricultural University Guangzhou China School of Information Engineering Jiangxi University of Science and Technology Jiangxi China Institute of Automation Chinese Academy and Sciences Beijing China State Key Laboratory of Software Engineering Wuhan University of China Wuhan China
In this paper, according to the basic theory of digital modulator, the design model of digital modulator is built by using the improved Direct Digital Synthesizer (DDS) technology through running the Matlab/DSP Builde... 详细信息
来源: 评论
A Novel Spatial Obstructed Distance Using Quantum-Behaved Particle Swarm Optimization
A Novel Spatial Obstructed Distance Using Quantum-Behaved Pa...
收藏 引用
International Conference on Intelligent Computation technology and Automation, ICICTA
作者: Xueping Zhang Hong Yi Dan Cao Yawei Liu Tengfei Yang Key Laboratory of Spatial Data Mining & Information Sharing of Ministry of Education Fuzhou University Fuzhou China School of Information Science & Engineering Henan University of Technology Zhengzhou China
Spatial clustering with obstacles constraints (SCOC) has been a new topic in spatial data mining (SDM). Spatial obstructed distance (SOD) is the key to SCOC. The obstacles constraint is generally ignored in computing ... 详细信息
来源: 评论
Spatial Clustering with Obstacles Constraints by Ant Colony Optimization and Quantum Particle Swarm Optimization
Spatial Clustering with Obstacles Constraints by Ant Colony ...
收藏 引用
International Conference on Artificial Intelligence and Computational Intelligence (AICI)
作者: Xueping Zhang Jianjun Wu Haifang Si Tengfei Yang Yawei Liu Key Laboratory of Spatial Data Mining & Information Sharing of Ministry of Education Fuzhou University Fuzhou China School of Information Science & Engineering Henan University of Technology Zhengzhou China
The paper proposed a novel ant colony optimization (ACO) and quantum particle swarm optimization (QPSO) method for spatial clustering with obstacles constraints (SCOC). We first developed AQPGSOD using ACO and QPSO ba... 详细信息
来源: 评论
An Improved Weighted Posterior Probability Reconstruction Strategy for Multi-class Support Vector Machine
An Improved Weighted Posterior Probability Reconstruction St...
收藏 引用
2009年中国控制与决策会议(2009 Chinese Control and Decision Conference)
作者: Xiaohong Wang Key Laboratory of Numerical Control of Jiangxi Province Jiujiang University Jiujiang 332005 China School of Electronic and Information Engineering Dalian University of Technology Dalian 116024 China
After analysis of the existing one-versus-one (OVO) decomposition methods for multi-class support vector machine (SVM), the improved weighted posterior probability (IWPP) reconstruction strategy is presented to combin... 详细信息
来源: 评论
Web page malicious code detection based on embedded fingerprints
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2009年 第SUPPL. 2期49卷 2208-2214页
作者: Huang, Jianjun Liang, Bin Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education School of Information Renmin University of China Beijing 100872 China
Web sites have become the main targets of many attackers. Signature-based detection needs to maintain a large signature database and Honeypot based methods are not efficient. Since attackers always make the malicious ... 详细信息
来源: 评论