咨询与建议

限定检索结果

文献类型

  • 161 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 208 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 118 篇 计算机科学与技术...
    • 84 篇 软件工程
    • 27 篇 信息与通信工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 电气工程
    • 9 篇 生物工程
    • 8 篇 控制科学与工程
    • 8 篇 土木工程
    • 8 篇 生物医学工程(可授...
    • 7 篇 建筑学
    • 6 篇 动力工程及工程热...
    • 5 篇 化学工程与技术
    • 4 篇 矿业工程
    • 4 篇 农业工程
    • 3 篇 力学(可授工学、理...
  • 101 篇 理学
    • 77 篇 数学
    • 25 篇 统计学(可授理学、...
    • 14 篇 生物学
    • 10 篇 物理学
    • 7 篇 系统科学
    • 5 篇 化学
  • 73 篇 管理学
    • 50 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 10 篇 法学
    • 10 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 11 篇 clustering algor...
  • 7 篇 complex networks
  • 6 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 feature extracti...
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 detection

机构

  • 59 篇 college of infor...
  • 42 篇 the key laborato...
  • 35 篇 school of inform...
  • 20 篇 key laboratory f...
  • 17 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 11 篇 the key laborato...
  • 10 篇 college of infor...
  • 9 篇 school of inform...
  • 9 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 5 篇 software enginee...
  • 5 篇 data industry re...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...
  • 4 篇 department of in...
  • 3 篇 key laboratory f...

作者

  • 45 篇 ren jiadong
  • 16 篇 dong jun
  • 15 篇 huang guoyan
  • 13 篇 guo jingfeng
  • 13 篇 liu yongshan
  • 10 篇 he haitao
  • 9 篇 wu hongfei
  • 8 篇 jin shunfu
  • 7 篇 zhang fuzhi
  • 7 篇 gong jibing
  • 7 篇 tang yong
  • 6 篇 wang lei
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen wei
  • 6 篇 han gaowei
  • 6 篇 zhang zhongping
  • 5 篇 wen dong
  • 5 篇 lv mengya
  • 5 篇 liu linlin

语言

  • 199 篇 英文
  • 9 篇 中文
  • 1 篇 其他
检索条件"机构=Computer Virtual Technology and System Integration Laboratory of Hebei Province"
208 条 记 录,以下是51-60 订阅
排序:
Outlier detection based on cluster outlier factor and mutual density
收藏 引用
International Journal of Intelligent Information and Database systems 2019年 第1-2期12卷 91-108页
作者: Zhang, Zhongping Zhu, Mengfan Qiu, Jingyang Liu, Cong Zhang, Debin Qi, Jie School of Information Science and Engineering Yanshan University Qinghuangdao Hebei066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province 438 West Section of Hebei Street Haigang District Qinhuangdao City Hebei Province066004 China Hebei Education Examinations Authority 231 Hongqi Street Shijiazhuang City Hebei Province050000 China First Middle School of Qian An Country 347 Wutong Road Qianan Jilin131400 China
Outlier detection is an important task in data mining with numerous applications. Recent years, the study on outlier detection is very active, many algorithms were proposed including based on clustering. However, most... 详细信息
来源: 评论
A Robot Pick and Place Skill Learning Method Based on Maximum Entropy and DDQN Algorithm
收藏 引用
Journal of Physics: Conference Series 2022年 第1期2203卷
作者: Peiliang Wu Yan Zhang Yao Li Bingyi Mao Wenbai Chen Guowei Gao School of Information Science and Engineering Yanshan University Qinhuangdao Hebei 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao Hebei 066004 China School of Automation Beijing Information Science & Technology University Beijing 100192 China
Pick and place (PAP) skill learning is a fundamental ability of intelligent robots, such as home service robot. Due to the NP-hard nature of the PAP problem, it takes a long time for an intelligent robot to learn the ...
来源: 评论
Design of Irregular QC-LDPC Code Based Multi-Level Coded Modulation Scheme for High Speed Optical Communication systems
收藏 引用
China Communications 2019年 第5期16卷 106-120页
作者: Liqian Wang Dongdong Wang Yongjing Ni Xue Chen Midou Cui Fu Yang Beijing University of Posts and Telecommunications Beijing 100876China The 54th Research Institute of China Electronics Technology Group Corporation Shijiazhuang 050081China Science and Technology on Communication Networks Laboratory Shijiazhuang 050081China College of Information Science and Engineering Yanshan UniversityQinhuangdao 066000China College of Information Science and Engineering Hebei University of Science and TechnologyShijiazhuang 050000China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao 066000China
In this paper, we focus on the design of irregular QC-LDPC code based multi-level coded modulation(MLCM) scheme by jointly optimizing the component code rate and the degree distribution of the irregular QC-LDPC compon... 详细信息
来源: 评论
Outlier detection based on cluster outlier factor and mutual density  10th
Outlier detection based on cluster outlier factor and mutual...
收藏 引用
10th International Symposium on Intelligence Computation and Applications, ISICA 2018
作者: Zhang, Zhongping Zhu, Mengfan Qiu, Jingyang Liu, Cong Zhang, Debin Qi, Jie School of Information Science and Engineering Yanshan University QinhuangdaoHebei066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province QinhuangdaoHebei066004 China Hebei Education Examinations Authority ShijiazhuangHebei050000 China The First Middle School of Qian An Country Qian’anJilin131400 China
Outlier detection is an important task in data mining with numerous applications. Recent years, the study on outlier detection is very active, many algorithms were proposed including that based on clustering. However,... 详细信息
来源: 评论
Detecting shilling profiles in collaborative recommender systems via multidimensional profile temporal features
Detecting shilling profiles in collaborative recommender sys...
收藏 引用
作者: Hao, Yaojun Zhang, Fuzhi School of Information Science and Engineering Yanshan University Qinhuangdao Hebei Province China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao Hebei Province China Department of Computer Science and Technology Xinzhou Teachers University Xinzhou Shanxi Province China
To defend recommender systems, various methods have been proposed to detect shilling profiles, which can be categorised as user- and item-based detection methods. Most of the user-based methods identify shilling profi... 详细信息
来源: 评论
Improved BP classifier via distance for sample reduction
收藏 引用
Journal of computers (Taiwan) 2019年 第2期30卷 1-13页
作者: Wen, Jia Deng, Jia Liu, Peng-Fei Wang, Hong-Jun Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao China School of Information Science and Engineering Yanshan University Qinhuangdao China State Key Laboratory of Software Engineering of Hebei Province Yanshan University Qinhuangdao China
The BP neural network algorithm is a commonly used technique in the classification field of pattern recognition, which iterates training samples continuously to obtain the decision boundary, until the error reaches th... 详细信息
来源: 评论
Robust visual tracking via combinative deep learning
Robust visual tracking via combinative deep learning
收藏 引用
International Conference on Mechanical, Electric and Industrial Engineering, MEIE 2018
作者: Wen, Jia Zhao, Jiwei Liu, Pengfei Wang, Hongjun Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao China Information Science and Engineering College Yanshan University Qinhuangdao China State Key Laboratory of Software Engineering of Hebei Province Yanshan University Qinhuangdao China
Object tracking is a hot topic in computer vision. In recent years, a large number of trackers has been proposed, in which the deep learning tracker has achieved excellent performance. The real-time capability of the ... 详细信息
来源: 评论
Research on the Influence of Improved K-shell Algorithm on Commodity Profit
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1631卷
作者: Jing Chen Jincheng Huang College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China Key Laboratory for Computer Virtual Technology and system Integration of Hebei Province Qinhuangdao 066004 China Software Engineering Laboratory in Hebei Province Qinhuangdao 066004 China
In order to maximize the influence of commodity profits in e-commerce platforms, designing and improving the K-shell algorithm to select the more influential seed node sets in this paper. The new algorithm improves th...
来源: 评论
Research on a Novel Influence Maximization Algorithm Based on Community Structure
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1631卷
作者: Jing Chen Jiangchuan Liu College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China Software Engineering Laboratory in Hebei Province Qinhuangdao 066004 China
With the research of influence maximization algorithm, many researchers have found that the existing algorithm has the problem of overlapping influence of seed nodes. In order to solve the problem of overlapping influ...
来源: 评论
Mining Important Functions in Software Network by Node Vulnerability
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1453卷
作者: Bing Zhang Shengting Sun Xiaobing Hao School of Information Science and Engineering Yanshan University Qinhuangdao Hebei P.R.China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City China 066004
Given that analysis on the vulnerability of functions is helpful to the detection and improvement of software security, this paper aims to propose an efficient methods to identify the vulnerable nodes (ITVN) in differ...
来源: 评论