咨询与建议

限定检索结果

文献类型

  • 160 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 207 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 161 篇 工学
    • 117 篇 计算机科学与技术...
    • 85 篇 软件工程
    • 28 篇 信息与通信工程
    • 11 篇 电气工程
    • 11 篇 电子科学与技术(可...
    • 10 篇 生物工程
    • 9 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 控制科学与工程
    • 8 篇 土木工程
    • 7 篇 建筑学
    • 6 篇 动力工程及工程热...
    • 5 篇 化学工程与技术
    • 4 篇 矿业工程
    • 4 篇 农业工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
  • 104 篇 理学
    • 78 篇 数学
    • 27 篇 统计学(可授理学、...
    • 15 篇 生物学
    • 11 篇 物理学
    • 6 篇 系统科学
    • 5 篇 化学
  • 72 篇 管理学
    • 49 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 10 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 4 篇 临床医学
  • 4 篇 农学
    • 4 篇 作物学
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 10 篇 clustering algor...
  • 6 篇 complex networks
  • 6 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 detection
  • 2 篇 multi-valued dep...

机构

  • 58 篇 college of infor...
  • 42 篇 the key laborato...
  • 32 篇 school of inform...
  • 20 篇 key laboratory f...
  • 17 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 11 篇 the key laborato...
  • 10 篇 college of infor...
  • 9 篇 school of inform...
  • 8 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 5 篇 software enginee...
  • 5 篇 data industry re...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...
  • 4 篇 department of in...
  • 3 篇 key laboratory f...

作者

  • 43 篇 ren jiadong
  • 15 篇 dong jun
  • 13 篇 guo jingfeng
  • 13 篇 huang guoyan
  • 13 篇 liu yongshan
  • 10 篇 he haitao
  • 8 篇 tang yong
  • 8 篇 jin shunfu
  • 7 篇 zhang fuzhi
  • 7 篇 wu hongfei
  • 7 篇 gong jibing
  • 6 篇 wang lei
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen wei
  • 6 篇 han gaowei
  • 6 篇 zhang zhongping
  • 5 篇 wen dong
  • 5 篇 lv mengya
  • 5 篇 liu linlin

语言

  • 196 篇 英文
  • 11 篇 中文
  • 1 篇 其他
检索条件"机构=Hebei Key Laboratory of Computer Virtual Technology and SystemIntegration"
207 条 记 录,以下是51-60 订阅
排序:
A Robot Pick and Place Skill Learning Method Based on Maximum Entropy and DDQN Algorithm
收藏 引用
Journal of Physics: Conference Series 2022年 第1期2203卷
作者: Peiliang Wu Yan Zhang Yao Li Bingyi Mao Wenbai Chen Guowei Gao School of Information Science and Engineering Yanshan University Qinhuangdao Hebei 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao Hebei 066004 China School of Automation Beijing Information Science & Technology University Beijing 100192 China
Pick and place (PAP) skill learning is a fundamental ability of intelligent robots, such as home service robot. Due to the NP-hard nature of the PAP problem, it takes a long time for an intelligent robot to learn the ...
来源: 评论
Design of Irregular QC-LDPC Code Based Multi-Level Coded Modulation Scheme for High Speed Optical Communication Systems
收藏 引用
China Communications 2019年 第5期16卷 106-120页
作者: Liqian Wang Dongdong Wang Yongjing Ni Xue Chen Midou Cui Fu Yang Beijing University of Posts and Telecommunications Beijing 100876China The 54th Research Institute of China Electronics Technology Group Corporation Shijiazhuang 050081China Science and Technology on Communication Networks Laboratory Shijiazhuang 050081China College of Information Science and Engineering Yanshan UniversityQinhuangdao 066000China College of Information Science and Engineering Hebei University of Science and TechnologyShijiazhuang 050000China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao 066000China
In this paper, we focus on the design of irregular QC-LDPC code based multi-level coded modulation(MLCM) scheme by jointly optimizing the component code rate and the degree distribution of the irregular QC-LDPC compon... 详细信息
来源: 评论
Outlier detection based on cluster outlier factor and mutual density
收藏 引用
International Journal of Intelligent Information and Database Systems 2019年 第1-2期12卷 91-108页
作者: Zhang, Zhongping Zhu, Mengfan Qiu, Jingyang Liu, Cong Zhang, Debin Qi, Jie School of Information Science and Engineering Yanshan University Qinghuangdao Hebei066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province 438 West Section of Hebei Street Haigang District Qinhuangdao City Hebei Province066004 China Hebei Education Examinations Authority 231 Hongqi Street Shijiazhuang City Hebei Province050000 China First Middle School of Qian An Country 347 Wutong Road Qianan Jilin131400 China
Outlier detection is an important task in data mining with numerous applications. Recent years, the study on outlier detection is very active, many algorithms were proposed including based on clustering. However, most... 详细信息
来源: 评论
BAF-detector: An efficient CNN-based detector for photovoltaic cell defect detection
arXiv
收藏 引用
arXiv 2020年
作者: Su, Binyi Chen, Haiyong Zhou, Zhong State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing100191 China School of Artificial Intelligence and Data Science Hebei University of Technology Tianjin300130 China
The multi-scale defect detection for photovoltaic (PV) cell electroluminescence (EL) images is a challenging task, due to the feature vanishing as network deepens. To address this problem, an attention-based top-down ... 详细信息
来源: 评论
Outlier detection based on cluster outlier factor and mutual density  10th
Outlier detection based on cluster outlier factor and mutual...
收藏 引用
10th International Symposium on Intelligence Computation and Applications, ISICA 2018
作者: Zhang, Zhongping Zhu, Mengfan Qiu, Jingyang Liu, Cong Zhang, Debin Qi, Jie School of Information Science and Engineering Yanshan University QinhuangdaoHebei066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province QinhuangdaoHebei066004 China Hebei Education Examinations Authority ShijiazhuangHebei050000 China The First Middle School of Qian An Country Qian’anJilin131400 China
Outlier detection is an important task in data mining with numerous applications. Recent years, the study on outlier detection is very active, many algorithms were proposed including that based on clustering. However,... 详细信息
来源: 评论
Improved BP classifier via distance for sample reduction
收藏 引用
Journal of computers (Taiwan) 2019年 第2期30卷 1-13页
作者: Wen, Jia Deng, Jia Liu, Peng-Fei Wang, Hong-Jun Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao China School of Information Science and Engineering Yanshan University Qinhuangdao China State Key Laboratory of Software Engineering of Hebei Province Yanshan University Qinhuangdao China
The BP neural network algorithm is a commonly used technique in the classification field of pattern recognition, which iterates training samples continuously to obtain the decision boundary, until the error reaches th... 详细信息
来源: 评论
Detecting shilling profiles in collaborative recommender systems via multidimensional profile temporal features
Detecting shilling profiles in collaborative recommender sys...
收藏 引用
作者: Hao, Yaojun Zhang, Fuzhi School of Information Science and Engineering Yanshan University Qinhuangdao Hebei Province China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao Hebei Province China Department of Computer Science and Technology Xinzhou Teachers University Xinzhou Shanxi Province China
To defend recommender systems, various methods have been proposed to detect shilling profiles, which can be categorised as user- and item-based detection methods. Most of the user-based methods identify shilling profi... 详细信息
来源: 评论
Robust visual tracking via combinative deep learning
Robust visual tracking via combinative deep learning
收藏 引用
International Conference on Mechanical, Electric and Industrial Engineering, MEIE 2018
作者: Wen, Jia Zhao, Jiwei Liu, Pengfei Wang, Hongjun Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao China Information Science and Engineering College Yanshan University Qinhuangdao China State Key Laboratory of Software Engineering of Hebei Province Yanshan University Qinhuangdao China
Object tracking is a hot topic in computer vision. In recent years, a large number of trackers has been proposed, in which the deep learning tracker has achieved excellent performance. The real-time capability of the ... 详细信息
来源: 评论
Dynamic community mining based on behavior prediction
收藏 引用
International Journal of Performability Engineering 2018年 第7期14卷 1590-1599页
作者: Chen, Xiao Hu, Xinzhuan Pan, Xiao Guo, Jingfeng Network Technology Center Hebei Normal University of Science and Technology Qinhuangdao066004 China College of Economics and Management YanShan University Qinhuangdao066004 China College of Economic and Management Shijiazhuang Tiedao University Shijiazhuang050043 China College of Information Science and Engineering YanShan University Qinhuangdao066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao066004 China
Dynamic network research has been a new trend in recent years. Based on the influence of vertex behavior on community structure, this paper studies signed network dynamic community mining. Firstly, the set pair connec... 详细信息
来源: 评论
Mining Important Functions in Software Network by Node Vulnerability
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1453卷
作者: Bing Zhang Shengting Sun Xiaobing Hao School of Information Science and Engineering Yanshan University Qinhuangdao Hebei P.R.China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City China 066004
Given that analysis on the vulnerability of functions is helpful to the detection and improvement of software security, this paper aims to propose an efficient methods to identify the vulnerable nodes (ITVN) in differ...
来源: 评论