咨询与建议

限定检索结果

文献类型

  • 203 篇 会议
  • 113 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 320 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 258 篇 工学
    • 193 篇 计算机科学与技术...
    • 157 篇 软件工程
    • 61 篇 电气工程
    • 60 篇 信息与通信工程
    • 43 篇 控制科学与工程
    • 26 篇 生物工程
    • 20 篇 动力工程及工程热...
    • 18 篇 建筑学
    • 17 篇 化学工程与技术
    • 16 篇 机械工程
    • 14 篇 电子科学与技术(可...
    • 12 篇 生物医学工程(可授...
    • 11 篇 交通运输工程
    • 10 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 环境科学与工程(可...
    • 6 篇 安全科学与工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 网络空间安全
  • 149 篇 理学
    • 103 篇 数学
    • 27 篇 生物学
    • 20 篇 统计学(可授理学、...
    • 18 篇 化学
    • 14 篇 物理学
    • 13 篇 系统科学
    • 5 篇 大气科学
  • 66 篇 管理学
    • 45 篇 管理科学与工程(可...
    • 25 篇 工商管理
    • 23 篇 图书情报与档案管...
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 5 篇 法学
  • 5 篇 医学
  • 4 篇 教育学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 艺术学

主题

  • 11 篇 genetic algorith...
  • 11 篇 ontology
  • 10 篇 authentication
  • 9 篇 global optimizat...
  • 7 篇 object detection
  • 7 篇 big data
  • 7 篇 optimization
  • 7 篇 semantics
  • 5 篇 sensor nodes
  • 5 篇 ontologies
  • 5 篇 swarm intelligen...
  • 5 篇 artificial intel...
  • 5 篇 forecasting
  • 4 篇 urban areas
  • 4 篇 roads
  • 4 篇 image segmentati...
  • 4 篇 signal, image an...
  • 4 篇 computational in...
  • 4 篇 convolution
  • 4 篇 data mining

机构

  • 138 篇 fujian provincia...
  • 47 篇 school of inform...
  • 34 篇 fujian provincia...
  • 31 篇 college of compu...
  • 29 篇 institute of env...
  • 28 篇 college of mecha...
  • 24 篇 department of bu...
  • 24 篇 institute of con...
  • 22 篇 college of infor...
  • 22 篇 fujian provincia...
  • 18 篇 fujian universit...
  • 17 篇 school of comput...
  • 17 篇 department of to...
  • 15 篇 department of bu...
  • 13 篇 national demonst...
  • 12 篇 college of mecha...
  • 11 篇 fujian universit...
  • 11 篇 fujian provincia...
  • 10 篇 intelligent info...
  • 10 篇 school of manage...

作者

  • 70 篇 pan jeng-shyang
  • 51 篇 chang kuo-chi
  • 38 篇 xue xingsi
  • 33 篇 chu kai-chun
  • 30 篇 nguyen trong-the
  • 26 篇 sung tien-wen
  • 23 篇 wu tsu-yang
  • 21 篇 wang hsiao-chuan
  • 20 篇 chang fu-hsiang
  • 20 篇 dao thi-kien
  • 20 篇 lin yuh-chung
  • 18 篇 chen chien-ming
  • 18 篇 chu shu-chuan
  • 17 篇 zhang jing
  • 15 篇 hsu tsui-lien
  • 13 篇 jeng-shyang pan
  • 12 篇 kuo-chi chang
  • 12 篇 zhou yu-wen
  • 11 篇 kai-chun chu
  • 10 篇 yuh-chung lin

语言

  • 311 篇 英文
  • 8 篇 其他
  • 2 篇 中文
检索条件"机构=Fujian Provincial Key Lab of Big Data Mining&Applications"
320 条 记 录,以下是1-10 订阅
排序:
Enhancing Entity Relationship Extraction in Dialogue Texts Using Hypergraph and Heterogeneous Graph
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 295-308页
作者: Shunmiao Zhang Siyuan Zheng Degen Huang Dan Li School of Computer Science and Mathematics Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology School of Computer Science and Technology Dalian University of Technology Elsevier
Dialogue-based relation extraction(DialogRE) aims to predict relationships between two entities in dialogue. Current approaches to dialogue relationship extraction grapple with long-distance entity relationships in di... 详细信息
来源: 评论
Hierarchical Privacy Protection Model in Advanced Metering Infrastructure Based on Cloud and Fog Assistance
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3193-3219页
作者: Linghong Kuang Wenlong Shi Jing Zhang School of Computer Science and Mathematics Fujian University of TechnologyFuzhou350118China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fuzhou350118China
The Advanced Metering Infrastructure(AMI),as a crucial subsystem in the smart grid,is responsible for measuring user electricity consumption and plays a vital role in communication between providers and ***,with the a... 详细信息
来源: 评论
An Optimal Node Localization in WSN Based on Siege Whale Optimization Algorithm
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第3期138卷 2201-2237页
作者: Thi-Kien Dao Trong-The Nguyen Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of TechnologyFuzhou350118China Multimedia Communication Lab University of Information TechnologyHo Chi Minh CityVietnam
Localization or positioning scheme in Wireless sensor networks (WSNs) is one of the most challenging andfundamental operations in various monitoring or tracking applications because the network deploys a large areaand... 详细信息
来源: 评论
HFANet: Hierarchical Feature-Enhanced Aggregation Network for Camouflaged Object Detection
收藏 引用
Journal of Shanghai Jiaotong University (Science) 2025年 1-9页
作者: Zhang, Xinchao Zhu, Hengliang Mao, Guojun Department of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fuzhou350118 China
Camouflaged object detection (COD) aims to identify target objects in complex scenes with extremely high similarity to their surroundings, and has significant applications in military, medical, and other fields. This ... 详细信息
来源: 评论
FHO-based Hybrid Neural Networks for Short-Term Load Forecasting in Economic Dispatch of Power Systems
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2025年 第1期10卷 262-284页
作者: Wei, Yi Wang, Chia-Hung Suo, Yi-Fan Zhao, Qi-Gen Yuan, Jin-Chen Chen, Shu-Meng College of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China
With the development of the smart grid era, the data volume of the power system on the user side is growing rapidly, and the dependence of citizens on electricity is increasing significantly. In this paper, we aim to ... 详细信息
来源: 评论
A Novel Action Recognition Method Based on Attention Enhancement and Relative Entropy  1
收藏 引用
2nd International Conference on Artificial Intelligence, Robotics, and Communication, ICAIRC 2022
作者: Liu, Xing-Sheng Liu, Shi-Jian Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fujian Fuzhou350118 China
Action recognition is a hotspot field in computer vision for video understanding. To achieve accurate and real-time action recognition, a novel skeleton-based method combined with attention enhancement and relative en... 详细信息
来源: 评论
A RECEPTIVE ENHANCED BASED MULTI-SCALE FEATURE FUSION NETWORK  18
A RECEPTIVE ENHANCED BASED MULTI-SCALE FEATURE FUSION NETWOR...
收藏 引用
18th International Conference on Interfaces and Human Computer Interaction 2024, IHCI 2024, the 17th International Conference on Game and Entertainment Technologies 2024, GET 2024 and the 18th International Conference on Computer Graphics, Visualization, Computer Vision and Image Processing 2024, CGVCVIP 2024, Part of the 18th Multi Conference on Computer Science and Information Systems 2024, MCCSIS 2024
作者: Mao, Guojun Zhang, Xinchao Fujian Provincial Key Lab of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China School of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China
Camouflaged Object Detection (COD) aims to identify target objects with high similarity to the surrounding environment in complex scenes, and has high application value in military, medical and other fields. This pape... 详细信息
来源: 评论
Compact Multitasking Multichromosome Genetic Algorithm for Heuristic Selection in Ontology Matching
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6752-6766页
作者: Xue, Xingsi Lin, Jerry Chun-Wei Su, Tong Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian Fuzhou350118 China Silesian University of Technology Department of Distributed Systems and IT Devices Akademicka Gliwice44-100 Poland Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China
Ontology matching (OM) is critical for knowledge integration and system interoperability on the semantic web, tasked with identifying semantically related entities across different ontologies. Despite its importance, ... 详细信息
来源: 评论
A new network intrusion detection system based on auto-encoding and variance analysis  5
A new network intrusion detection system based on auto-encod...
收藏 引用
5th IEEE International Conference on Civil Aviation Safety and Information Technology, ICCASIT 2023
作者: Chen, Dequ Zhang, Ming Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fujian Fuzhou China
In today's big data era, ensuring the network security of information technology (IT) communication facilities is one of the most challenging issues. In fact, with progress in technology, hackers have developed in... 详细信息
来源: 评论
A Multi-Objective Particle Swarm Optimization Algorithm Based on Decomposition and Multi-Selection Strategy
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 997-1026页
作者: Li Ma Cai Dai Xingsi Xue Cheng Peng School of Computer Science Shaanxi Normal UniversityXi’an710119China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of TechnologyFuzhou350118China Information Construction and Management Center and Institute of Artificial Intelligence and Educational New Productivity Ningxia Normal UniversityGuyuan756099China
The multi-objective particle swarm optimization algorithm(MOPSO)is widely used to solve multi-objective optimization *** the article,amulti-objective particle swarm optimization algorithmbased on decomposition and mul... 详细信息
来源: 评论