咨询与建议

限定检索结果

文献类型

  • 258 篇 会议
  • 122 篇 期刊文献

馆藏范围

  • 380 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 238 篇 工学
    • 180 篇 计算机科学与技术...
    • 149 篇 软件工程
    • 63 篇 信息与通信工程
    • 27 篇 生物工程
    • 26 篇 电气工程
    • 25 篇 控制科学与工程
    • 21 篇 机械工程
    • 21 篇 电子科学与技术(可...
    • 19 篇 光学工程
    • 12 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 10 篇 动力工程及工程热...
    • 10 篇 交通运输工程
    • 10 篇 生物医学工程(可授...
    • 8 篇 环境科学与工程(可...
    • 7 篇 土木工程
    • 7 篇 安全科学与工程
    • 6 篇 建筑学
  • 138 篇 理学
    • 85 篇 数学
    • 32 篇 统计学(可授理学、...
    • 29 篇 生物学
    • 26 篇 物理学
    • 11 篇 化学
    • 7 篇 系统科学
  • 75 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 20 篇 法学
    • 17 篇 社会学
  • 10 篇 医学
    • 9 篇 临床医学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 3 篇 教育学
  • 3 篇 农学

主题

  • 30 篇 feature extracti...
  • 16 篇 semantics
  • 11 篇 optimization
  • 9 篇 deep learning
  • 9 篇 image segmentati...
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 training
  • 8 篇 predictive model...
  • 7 篇 reinforcement le...
  • 7 篇 big data
  • 7 篇 data mining
  • 7 篇 machine learning
  • 6 篇 task analysis
  • 6 篇 computational mo...
  • 6 篇 particle swarm o...
  • 6 篇 genetic algorith...
  • 6 篇 clustering algor...
  • 6 篇 computer vision
  • 5 篇 computation offl...

机构

  • 62 篇 college of mathe...
  • 62 篇 college of compu...
  • 38 篇 fujian provincia...
  • 35 篇 fujian key labor...
  • 26 篇 fujian key labor...
  • 19 篇 engineering rese...
  • 18 篇 fujian provincia...
  • 17 篇 key laboratory o...
  • 15 篇 fujian provincia...
  • 11 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 9 篇 key laboratory o...
  • 7 篇 shandong college...
  • 7 篇 shandong provinc...
  • 7 篇 peng cheng labor...
  • 7 篇 fuzhou universit...
  • 7 篇 college of mathe...
  • 7 篇 fujian provincia...
  • 7 篇 fujian provincia...
  • 7 篇 school of inform...

作者

  • 29 篇 guo wenzhong
  • 20 篇 guo kun
  • 14 篇 wenzhong guo
  • 13 篇 xing chen
  • 13 篇 xianghan zheng
  • 12 篇 wang shiping
  • 12 篇 chen xing
  • 11 篇 yu zhiyong
  • 10 篇 guolong chen
  • 9 篇 xiao ke
  • 9 篇 li jinping
  • 8 篇 xiaodong wu
  • 8 篇 zheng xianghan
  • 8 篇 ke xiao
  • 8 篇 yanhua liu
  • 8 篇 wu ling
  • 7 篇 huang fangwan
  • 7 篇 kun guo
  • 7 篇 genggeng liu
  • 6 篇 lin dazhen

语言

  • 364 篇 英文
  • 14 篇 中文
  • 7 篇 其他
检索条件"机构=Fujian Key Laboratory of Network Computing and Intelligent Information Processing"
380 条 记 录,以下是231-240 订阅
排序:
Research On Short-term Electric Load Forecast Based On Grey Neural network and Snap-drift Cuckoo Search Algorithm
Research On Short-term Electric Load Forecast Based On Grey ...
收藏 引用
IEEE International Conference on intelligent Data Acquisition and Advanced computing Systems
作者: Feng Chen Zhiwei Ye Jun Su Haofeng Lang Xiaoxiao Shi Shuqing Wang School of computer Science Hubei university of Technology Wuhan China Key Laboratory of Intelligent Computing and Information Processing Fujian Province University
In order to provide users with reliable and qualified power, it becomes an indispensable task to enhance the forecasting capability of the short-term power load. However, the existing approaches of short-term electric... 详细信息
来源: 评论
Improved Quality Aware network Using Quality and Max Pooling Based Late Feature Fusion for Video-Based Person Re-Identification
Improved Quality Aware Network Using Quality and Max Pooling...
收藏 引用
International Conference on Computer Science and network Technology (ICCSNT)
作者: Yude Shi Xiao Ke Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing College of Mathematics and Computer Science Fuzhou University Fuzhou China
Video-based person re-identification is an important research area in computer vision. Quality Aware network (QAN) is a model that is robust to noise in the videos. It calculates the weighted average of all the frames... 详细信息
来源: 评论
Image Classification Based on BP Neural network and Sine Cosine Algorithm
Image Classification Based on BP Neural Network and Sine Cos...
收藏 引用
IEEE International Conference on intelligent Data Acquisition and Advanced computing Systems
作者: Haoqiu Song Zhiwei Ye Chunzhi Wang Lingyu Yan School of Computer Science Hubei University of Technology China Key Laboratory of Intelligent Computing and Information Processing Fujian Province University China
Image classification is one of the most important tasks in image analysis and computer vision. BP neural network is a successful classifier for the task. However, with regard to the low study efficiency and the slow c...
来源: 评论
Automated classification of Wuyi rock tealeaves based on support vector machine
Automated classification of Wuyi rock tealeaves based on sup...
收藏 引用
作者: Lin, Li-Hui Li, Cheng-Hsuan Yang, Sheng Li, Shao-Zi Wei, Yi College of Mathematics and Computer Science Wuyi University Wuyishan354300 China Graduate Institute of Educational Information and Measurement National Taichung University of Education Taichung40306 Taiwan School of Information Science and Engineering Xiamen University Xiamen361005 China The Key Laboratory of Cognitive Computing and Intelligent Information Processing Fujian Education Institutions Wuyishan354300 China
This paper describes a new automated classification method for Wuyi rock tealeaves based on the best penalty parameter selection for the support vector machine with RBF (Radial Basis Function) kernel. A total of 3590 ... 详细信息
来源: 评论
An enhanced cuckoo search using dimension selection
收藏 引用
International Journal of Innovative computing and Applications 2019年 第1期10卷 3-11页
作者: Wang, Lijin Zhuang, Yihong Chen, Zhennan Zhong, Yiwen College of Computer and Information Science Fujian Agriculture and Forestry University Fuzhou China Key Laboratory of Smart Agriculture and Forestry Fujian Province University Fuzhou China Key Laboratory of Cognitive Computing and Intelligent Information Processing of Fujian Education Institutions Wuyi University Wuyishan Shi China
This paper proposes an enhanced cuckoo search algorithm using dimension selection. In the proposed strategy, the dimensional distance measure is used to select a part of dimensions of each solution to search for the n... 详细信息
来源: 评论
Learning from context: a mutual reinforcement model for Chinese microblog opinion retrieval
收藏 引用
Frontiers of Computer Science 2018年 第4期12卷 714-724页
作者: Jingjing WEI Xiangwen LIAO Houdong ZHENG Guolong CHEN Xueqi CHENG College of Mathematics and Computer Science Fuzhou University Fuzhou 350108 China College of Electronics and Information Science Fujian Jiangxia University Fuzhou 350108 China Fujian Provincial Key Laboratory of Network Computing and Intelligence Processing Fuzhou University Fuzhou 350108 China Institute of Computing Technology Chinese Academic of Sciences Beijing 100190 China
This study addresses the problem of Chinese microblog opinion retrieval, which aims to retrieve opinionated Chinese microblog posts relevant to a target specified by a user query. Existing studies have shown that lexi... 详细信息
来源: 评论
Copyright Protection Application Based on Blockchain Technology
Copyright Protection Application Based on Blockchain Technol...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Yi Ouyang Xianghan Zheng Xiaoliang Lu Lin Xiaowei Shengyin Zhang Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China MingByte Technology (Qingdao) Co. Ltd MingByte Technology Co. Ltd Qingdao China
In the traditional copyright protection platform, there are problems such as copyright information security and high registration cost. With the rapid development of blockchain technology, blockchain technology, as a ... 详细信息
来源: 评论
Quantum identity-authentication scheme based on randomly selected third-party  5th
Quantum identity-authentication scheme based on randomly sel...
收藏 引用
5th Euro-China Conference on intelligent Data Analysis and Applications, ECC 2018
作者: Zheng, Xiaobo Zhang, Fuquan Zhao, Zhiwen College of Information and Technology Beijing Normal University Beijing100875 China Information and Network Management Center Beijing Information Science and Technology University Beijing100101 China School of Computer Science and Technology Beijing Institute of Technology Beijing China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350121 China Beijing Normal University Zhuhai China
In our article we give a scheme to complete identity-authentication by quantum fingerprinting. Our scheme can overcome the vulnerability of one certification authority and tolerate a controlled error. The cost of our ... 详细信息
来源: 评论
Cost Efficient Offloading Strategy for DNN-Based Applications in Edge-Cloud Environment
Cost Efficient Offloading Strategy for DNN-Based Application...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Yinhao Huang Bing Lin Yongjie Zheng Junqin Hu Yuchang Mo Xing Chen College of Mathematics and Computer Science Fuzhou University Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China College of Physics and Energy Fujian Normal University Fuzhou China Fujian Province University Key Laboratory of Computational Science Huaqiao University Quanzhou China
Deep Neural networks (DNNs) are pervasively used in a large number of applications, such as Microsoft Cortana, Apple Siri, and Google Now. The traditional method is to offload them in the cloud, which causes serious d... 详细信息
来源: 评论
Automatic Text Summarization Based on Transformer and Switchable Normalization
Automatic Text Summarization Based on Transformer and Switch...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Tao Luo Kun Guo Hong Guo College of Mathematics and Computer Sciences Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Key Laboratory of Spatial Data Mining & Information Sharing Ministry of Education Fuzhou University Fuzhou China
With the development of text summarization research, the methods based on RNN with the Encoder-Decoder model gradually become the mainstream. However, RNN tends to forget previous context information and leads to the ... 详细信息
来源: 评论