咨询与建议

限定检索结果

文献类型

  • 260 篇 会议
  • 123 篇 期刊文献

馆藏范围

  • 383 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 239 篇 工学
    • 181 篇 计算机科学与技术...
    • 149 篇 软件工程
    • 63 篇 信息与通信工程
    • 27 篇 生物工程
    • 26 篇 电气工程
    • 25 篇 控制科学与工程
    • 21 篇 机械工程
    • 21 篇 电子科学与技术(可...
    • 19 篇 光学工程
    • 12 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 10 篇 动力工程及工程热...
    • 10 篇 交通运输工程
    • 10 篇 生物医学工程(可授...
    • 8 篇 环境科学与工程(可...
    • 7 篇 土木工程
    • 7 篇 安全科学与工程
    • 6 篇 建筑学
  • 138 篇 理学
    • 85 篇 数学
    • 32 篇 统计学(可授理学、...
    • 29 篇 生物学
    • 26 篇 物理学
    • 11 篇 化学
    • 7 篇 系统科学
  • 75 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 20 篇 法学
    • 17 篇 社会学
  • 11 篇 医学
    • 10 篇 临床医学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 3 篇 教育学
  • 3 篇 农学

主题

  • 30 篇 feature extracti...
  • 16 篇 semantics
  • 11 篇 optimization
  • 9 篇 deep learning
  • 9 篇 image segmentati...
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 training
  • 8 篇 predictive model...
  • 7 篇 reinforcement le...
  • 7 篇 big data
  • 7 篇 data mining
  • 7 篇 machine learning
  • 6 篇 task analysis
  • 6 篇 computational mo...
  • 6 篇 particle swarm o...
  • 6 篇 genetic algorith...
  • 6 篇 clustering algor...
  • 6 篇 computer vision
  • 5 篇 computation offl...

机构

  • 63 篇 college of compu...
  • 62 篇 college of mathe...
  • 38 篇 fujian provincia...
  • 35 篇 fujian key labor...
  • 26 篇 fujian key labor...
  • 20 篇 engineering rese...
  • 18 篇 fujian provincia...
  • 17 篇 key laboratory o...
  • 15 篇 fujian provincia...
  • 11 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 9 篇 key laboratory o...
  • 7 篇 shandong college...
  • 7 篇 shandong provinc...
  • 7 篇 peng cheng labor...
  • 7 篇 fuzhou universit...
  • 7 篇 college of mathe...
  • 7 篇 fujian provincia...
  • 7 篇 fujian provincia...
  • 7 篇 school of inform...

作者

  • 29 篇 guo wenzhong
  • 20 篇 guo kun
  • 15 篇 wenzhong guo
  • 13 篇 xing chen
  • 13 篇 xianghan zheng
  • 12 篇 wang shiping
  • 12 篇 chen xing
  • 11 篇 yu zhiyong
  • 10 篇 xiao ke
  • 10 篇 guolong chen
  • 9 篇 li jinping
  • 8 篇 xiaodong wu
  • 8 篇 zheng xianghan
  • 8 篇 ke xiao
  • 8 篇 yanhua liu
  • 8 篇 wu ling
  • 7 篇 huang fangwan
  • 7 篇 kun guo
  • 7 篇 genggeng liu
  • 6 篇 lin dazhen

语言

  • 367 篇 英文
  • 14 篇 中文
  • 7 篇 其他
检索条件"机构=Fujian Key Laboratory of Network Computing and Intelligent Information Processing"
383 条 记 录,以下是251-260 订阅
排序:
Pattern Synthesis of MIMO Radar Based on Immune Differential Evolution Algorithm
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1813卷
作者: Ling Jiang Yi Jiang Guangfu Chen Guimin Shi Qi Cheng School of Mathematics and Computer Wuyi University Wuyishan 354300 China The Key Laboratory of Cognitive Computing and Intelligent Information Processing of Fujian Education Institutions Wuyishan 354300 China Big Data Development Administration of Anji County Huzhou 313000 China
In order to optimize the pattern synthesis of multiple input and multiple output (MIMO) radar, immune mechanism is adopted to overcome the premature risk of differential evolution (DE) algorithm, namely immune differe...
来源: 评论
Detection of Impurity and Bubble Defects in Tire X-Ray Image Based on Improved Extremum Filter and Locally Adaptive-threshold Binaryzation
Detection of Impurity and Bubble Defects in Tire X-Ray Image...
收藏 引用
2018 International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2018
作者: Zheng, Xiunan Ding, Jianpei Pang, Zengzhi Li, Jinping Shandong Provincial Key Laboratory of Network Based Intelligent Computing China Shandong College University Key Laboratory of Information Processing and Cognitive Computing in 13th Five-year China School of Information Science and Engineering University of Jinan China
The manufacturing technology of all steel radial tire is complex. Some defects will inevitably appear in the tire due to the complex production process. Impurity and bubble are two typical kinds of defects in the tire... 详细信息
来源: 评论
DPANet: Depth potentiality-aware gated attention network for RGB-D salient object detection
arXiv
收藏 引用
arXiv 2020年
作者: Chen, Zuyao Cong, Runmin Xu, Qianqian Huang, Qingming The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100190 China The Institute of Information Science Beijing Jiaotong University Beijing100044 China The Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China The Department of Computer Science City University of Hong Kong Hong Kong Hong Kong The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences Beijing101408 China Peng Cheng Laboratory Shenzhen518055 China
There are two main issues in RGB-D salient object detection: (1) how to effectively integrate the complementarity from the cross-modal RGB-D data;(2) how to prevent the contamination effect from the unreliable depth m... 详细信息
来源: 评论
Research on network Intrusion Detection Based on Support Vector Machine Optimized with Grasshopper Optimization Algorithm
Research on Network Intrusion Detection Based on Support Vec...
收藏 引用
IEEE International Conference on intelligent Data Acquisition and Advanced computing Systems
作者: Zhiwei Ye Yiheng Sun Shuang Sun Sikai Zhan Han Yu Quanfeng Yao Key Laboratory of Intelligent Computing and Information Processing Fujian Province University School of computer Science Hubei university of Technology Wuhan China Wuhan FiberHome Technical Services Co. Ltd.
As one of the most important parts of network security, more significance is attached to intrusion detection system (IDS). Numerous techniques including support vector machine (SVM) have been applied to the intrusion ... 详细信息
来源: 评论
Syntactic and Semantic Features Based Relation Extraction in Agriculture Domain  15th
Syntactic and Semantic Features Based Relation Extraction in...
收藏 引用
15th Web information Systems and Applications Conference, WISA 2018
作者: Liu, Zhanghui Chen, Yiyan Dai, Yuanfei Guo, Chenhao Zhang, Zuwen Chen, Xing College of Mathematics and Computer Science Fuzhou University Fuzhou350116 China Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China
Relation extraction plays an important role in many natural language processing tasks, such as knowledge graph and question answering system. Up to the present, many of the former relation methods work directly on the... 详细信息
来源: 评论
Exploring Multi-loss Function Based Attention Framework for Vehicle Re-Identification
Exploring Multi-loss Function Based Attention Framework for ...
收藏 引用
IEEE International Symposium on information (IT) in Medicine and Education, ITME
作者: Wei Liu Yi Zhang Zhiming Luo Shaozi Li East China Jiaotong University Jiangxi China Hubei Key Laboratory of Intelligent Vision Based Monitoring for Hydroelectric Engineering Yi Chang China Postdoc Center of Information and Communication Engineering Xiamen University China The Key Laboratory of Cognitive Computing and Intelligent Information Processing of Fujian Education Institutions Wuyishan China Cognitive Science Department Xiamen University Fujian China
Vehicle Re-identification(Re-ID) refers to the task of matching a specific vehicle across multiple non-overlapping cameras. Precise vehicle Re-ID suffers from two main challenges: (1) different vehicle identities with... 详细信息
来源: 评论
Relative influence maximization in competitive social networks
收藏 引用
Science China(information Sciences) 2017年 第10期60卷 252-254页
作者: Dingda YANG Xiangwen LIAO Huawei SHEN Xueqi CHENG Guolong CHEN College of Physics and Information Engineering Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing College of Mathematics and Computer Science Fuzhou University Institute of Computing Technology Chinese Academy of Sciences
In many realistic scenarios,such as political election and viral marketing,two opposite opinions,i.e.,positive opinion and negative opinion,spread simultaneously in the same social networks[1,2].Consequently,to achiev... 详细信息
来源: 评论
MLXR: multi-layer obstacle-avoiding X-architecture Steiner tree construction for VLSI routing
收藏 引用
Science China(information Sciences) 2017年 第1期60卷 211-213页
作者: Xing HUANG Wenzhong GUO Genggeng LIU Guolong CHEN College of Mathematics and Computer Sciences Fuzhou University Key Laboratory of Network Computing and Intelligent Information Processing (Fujian Province) Fuzhou University
Dear editor,Rectilinear Steiner minimal tree(RSMT)has been widely used in several modern very large scale integration(VLSI)circuit design *** of its importance,it has been fully studied in the past *** addition,the de... 详细信息
来源: 评论
Chinese Lexical Based Sentiment Analysis Framework in Meteorology
Chinese Lexical Based Sentiment Analysis Framework in Meteor...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Yinan Li Fuquan Zhang Yifan Zhu Sifan Zhang Yu Mao Zhendong Niu School of Computer Science and Technology Beijing Institute of Technology Beijing China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China School of Computing and Information University of Pittsburgh Pittsburgh PA USA
Evaluating the performance of meteorological service not only relies on physical measurements but also requires public feedback. As a significant part of the evaluation, assessing the sentiment of these feedbacks give... 详细信息
来源: 评论
Image Segmentation Using Fuzzy C-means Optimized by Ant Lion Optimization
Image Segmentation Using Fuzzy C-means Optimized by Ant Lion...
收藏 引用
IEEE International Conference on intelligent Data Acquisition and Advanced computing Systems
作者: Can Jin Zhiwei Ye Lingyu Yan Ye Cao Aixin Zhang Lie Ma Xiang Hu Jiwei Hu School of Computer Science Hubei University of Technology Wuhan China Fujian Provincial Key Laboratory of Data Intensive Computing Key Laboratory of Intelligent Computing and Information Processing Fujian Province University Wuhan Jingzhi Technology Co. Ltd. Wuhan China Wuhan FiberHome Technical Services Co. Ltd. Wuhan China
Image segmentation is the indispensable part in the field of computer vision. There are tremendous methods for handling this task such as Otsu-thresholding and Fuzzy C-means (FCM). However, the segmentation results of... 详细信息
来源: 评论