咨询与建议

限定检索结果

文献类型

  • 7 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 10 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 4 篇 计算机科学与技术...
    • 4 篇 软件工程
    • 2 篇 控制科学与工程
    • 2 篇 生物工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 信息与通信工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物医学工程(可授...
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 4 篇 理学
    • 3 篇 数学
    • 2 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 2 篇 法学
    • 2 篇 社会学

主题

  • 1 篇 image enhancemen...
  • 1 篇 sea measurements
  • 1 篇 mimo radar
  • 1 篇 rough sets
  • 1 篇 probability dist...
  • 1 篇 describing
  • 1 篇 marine vehicles
  • 1 篇 statistics
  • 1 篇 efficiency
  • 1 篇 education
  • 1 篇 information tech...
  • 1 篇 trajectories
  • 1 篇 optimization
  • 1 篇 seaports
  • 1 篇 databases
  • 1 篇 trajectory
  • 1 篇 approximation
  • 1 篇 universe
  • 1 篇 radar
  • 1 篇 feature extracti...

机构

  • 3 篇 digital fujian b...
  • 2 篇 digital fujian t...
  • 2 篇 college of mathe...
  • 2 篇 department of sc...
  • 2 篇 computer enginee...
  • 2 篇 school of scienc...
  • 1 篇 fujian provincia...
  • 1 篇 college of elect...
  • 1 篇 jimei university...
  • 1 篇 big data develop...
  • 1 篇 the key laborato...
  • 1 篇 key laboratory o...
  • 1 篇 department of sc...
  • 1 篇 college of compu...
  • 1 篇 college of scien...
  • 1 篇 college of scien...
  • 1 篇 digital fujian b...
  • 1 篇 digital fujian i...
  • 1 篇 key laboratory o...
  • 1 篇 school of mathem...

作者

  • 2 篇 li qingyan
  • 2 篇 qingzhao kong
  • 2 篇 li lin
  • 1 篇 han wang
  • 1 篇 li kedi
  • 1 篇 wenzhong guo
  • 1 篇 guimin shi
  • 1 篇 renjie lin
  • 1 篇 chen rongwang
  • 1 篇 ling jiang
  • 1 篇 jianwen wang
  • 1 篇 zhongjie xiao
  • 1 篇 wen yuhan
  • 1 篇 wenbin zhang
  • 1 篇 qilong chen
  • 1 篇 liang shaobin
  • 1 篇 yi jiang
  • 1 篇 xueer chang
  • 1 篇 dong yanmei
  • 1 篇 chen qilong

语言

  • 10 篇 英文
检索条件"机构=Digital Fujian Big Data Modeling and Intelligent Computing Institute"
10 条 记 录,以下是1-10 订阅
排序:
Two kinds of average approximation accuracy
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第2期9卷 481-490页
作者: Qingzhao Kong Wanting Wang Dongxiao Zhang Wenbin Zhang Department of Science Jimei UniversityXiamenChina Digital Fujian Big Data Modeling and Intelligent Computing Institute Jimei UniversityXiamenChina Department of Computer Science Michigan Technological UniversityHoughtonMichiganUSA
Rough set theory places great importance on approximation accuracy,which is used to gauge how well a rough set model describes a target ***,traditional approximation accuracy has limitations since it varies with chang... 详细信息
来源: 评论
Rough set model based on variable universe
收藏 引用
CAAI Transactions on Intelligence Technology 2022年 第3期7卷 503-511页
作者: Qingzhao Kong Xueer Chang Department of Science Jimei UniversityXiamenChina Digital Fujian Big Data Modeling and Intelligent Computing Institute XiamenChina
Rough set theory has a very good effect in information processing and knowledge *** an information table,the current scholars regard all objects as a universe,and then establish various rough set ***,in the analysis o... 详细信息
来源: 评论
Ship AIS Trajectory Outlier Identification Model under High-speed Sampling Conditions  4
Ship AIS Trajectory Outlier Identification Model under High-...
收藏 引用
4th International Symposium on Computer Technology and Information Science, ISCTIS 2024
作者: Wang, Han Chen, Qilong Jimei University College of Science Xiamen China Jimei University Digital Fujian Big Data Modeling and Intelligent Computing Institute College of Science Xiamen China
In order to efficiently identify the outliers of ship AIS trajectories under high-speed sampling conditions, this paper proposes an outlier identification model based on ship position distance distribution. Taking the... 详细信息
来源: 评论
Conditional selection with CNN augmented transformer for multimodal affective analysis
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第4期9卷 917-931页
作者: Jianwen Wang Shiping Wang Shunxin Xiao Renjie Lin Mianxiong Dong Wenzhong Guo College of Computer and Data Science Fuzhou UniversityFuzhouChina College of Computer and Cyber Security Fujian Normal UniversityFuzhouChina Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhouChina Digital Fujian Institute of Big Data Security Technology Fujian Normal UniversityFuzhouChina Department of Sciences and Informatics Muroran Institute of TechnologyMuroranJapan
Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information.... 详细信息
来源: 评论
TransUNet for Image Forgery Localization  3
TransUNet for Image Forgery Localization
收藏 引用
3rd International Conference on Computer Graphics, Image, and Virtualization, ICCGIV 2023
作者: Li, Kedi Li, Lin Li, Qingyan School of Science Jimei University Xiamen361021 China Computer Engineering College Jimei University Xiamen361021 China Digital Fujian Big Data Modeling and Intelligent Computing Institute Jimei University Xiamen361021 China
Image tampering can easily be used in illegal activities such as false propaganda, fake news and falsifying evidence in court which may have a negative impact on society. Therefore, we need to constantly update and im... 详细信息
来源: 评论
Ship AIS Trajectory Outlier Identification Model under High-speed Sampling Conditions
Ship AIS Trajectory Outlier Identification Model under High-...
收藏 引用
Computer Technology and Information Science (ISCTIS), International Symposium on
作者: Han Wang Qilong Chen College of Science Jimei University Xiamen China College of Science Jimei University Digital Fujian Big Data Modeling and Intelligent Computing Institute Xiamen China
In order to efficiently identify the outliers of ship AIS trajectories under high-speed sampling conditions, this paper proposes an outlier identification model based on ship position distance distribution. Taking the... 详细信息
来源: 评论
Reversible data Hiding in Encrypted Images Based on Multi-Predictor and Quad-tree Block Encoding  2022
Reversible Data Hiding in Encrypted Images Based on Multi-Pr...
收藏 引用
7th International Conference on intelligent Information Technology, ICIIT 2022
作者: Zhang, Huiqi Li, Lin Li, Qingyan School Of Science Jimei University Xiamen361021 China Computer Engineering College Jimei University Xiamen361021 China Digital Fujian Big Data Modeling And Intelligent Computing Institute Jimei University Xiamen361021 China
With the rapid development of the Internet, people's awareness of privacy protection is also gradually improved. Reversible data hiding of encrypted image is a technique that encrypts the original image and allows... 详细信息
来源: 评论
A Two-Stage Graph Computation Model with Communication Equilibrium  15th
A Two-Stage Graph Computation Model with Communication Equil...
收藏 引用
15th CCF Conference on Computer Supported Cooperative Work and Social computing, Chinese CSCW 2020
作者: Dong, Yanmei Chen, Rongwang Guo, Kun College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China Key Laboratory of Spatial Data Mining and Information Sharing Ministry of Education Fuzhou350108 China College of Mathematics and Computer Science Wuyi University Wuyishan Fujian354300 China Digital Fujian Tourism Big Data Institute Wuyishan Fujian354300 China
Distributed graph computing aims at performing in-depth analysis on large networks in a parallel manner. Iterative communication computation is an important model to perform graph analysis. Moreover, high-efficiency i... 详细信息
来源: 评论
Array optimization for MIMO radar based on harmony search mechanism
Array optimization for MIMO radar based on harmony search me...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Ling Jiang Yi Jiang Guimin Shi Zhongjie Xiao School of Mathematics and Computer Wuyi University Wuyishan China The Key Laboratory of Cognitive Computing and Intelligent Information Processing of Fujian Education Institutions Wuyishan China Digital Fujian Tourism Big Data Institute Wuyishan China Big Data Development Administration of Anji County Huzhou China
In order to overcome the premarure risk of differential evolution algorithm, harmony search mechanism is introduced to optimize the pattern synthesis of multiple input and multiple output radar. Firstly, the memory of... 详细信息
来源: 评论
Review Spam Detection Based on Multi-dimensional Features  9th
Review Spam Detection Based on Multi-dimensional Features
收藏 引用
9th International Conference on Artificial Intelligence and Mobile Services, AIMS 2020, held as part of the Services Conference Federation, SCF 2020
作者: Deng, Liming Wei, Jingjing Liang, Shaobin Wen, Yuhan Liao, Xiangwen College of Mathematics and Computer Science Fuzhou University Fuzhou350116 China Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China Digital Fujian Institute of Financial Big Data Fuzhou350116 China College of Electronics and Information Science Fujian Jiangxia University Fuzhou350108 China
Review spam detection aims to detect the reviews with false information posted by the spammers on social media. The existing methods of review spam detection ignore the importance of the information hidden in the user... 详细信息
来源: 评论