咨询与建议

限定检索结果

文献类型

  • 174 篇 期刊文献
  • 60 篇 会议

馆藏范围

  • 234 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 183 篇 工学
    • 127 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 31 篇 信息与通信工程
    • 14 篇 机械工程
    • 13 篇 电子科学与技术(可...
    • 13 篇 控制科学与工程
    • 11 篇 电气工程
    • 11 篇 生物工程
    • 10 篇 土木工程
    • 9 篇 建筑学
    • 8 篇 农业工程
    • 8 篇 生物医学工程(可授...
    • 7 篇 光学工程
    • 6 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 力学(可授工学、理...
    • 4 篇 矿业工程
  • 114 篇 理学
    • 84 篇 数学
    • 26 篇 统计学(可授理学、...
    • 18 篇 生物学
    • 17 篇 物理学
    • 7 篇 系统科学
    • 6 篇 化学
  • 72 篇 管理学
    • 50 篇 图书情报与档案管...
    • 22 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 13 篇 农学
    • 13 篇 作物学
  • 10 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
  • 3 篇 经济学

主题

  • 11 篇 clustering algor...
  • 8 篇 complex networks
  • 6 篇 data mining
  • 4 篇 conferences
  • 4 篇 visualization
  • 3 篇 internet of thin...
  • 3 篇 information syst...
  • 3 篇 trees (mathemati...
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 computer vision
  • 3 篇 synchronization
  • 3 篇 influence maximi...
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...

机构

  • 60 篇 college of infor...
  • 43 篇 the key laborato...
  • 32 篇 school of inform...
  • 20 篇 key laboratory f...
  • 16 篇 key laboratory f...
  • 13 篇 key laboratory o...
  • 12 篇 the key laborato...
  • 11 篇 the key laborato...
  • 10 篇 college of infor...
  • 9 篇 school of inform...
  • 9 篇 college of infor...
  • 7 篇 key laboratory f...
  • 7 篇 college of infor...
  • 7 篇 the key laborato...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 5 篇 software enginee...
  • 5 篇 data industry re...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...

作者

  • 46 篇 ren jiadong
  • 16 篇 dong jun
  • 15 篇 huang guoyan
  • 13 篇 guo jingfeng
  • 13 篇 liu yongshan
  • 11 篇 liu gang
  • 10 篇 he haitao
  • 9 篇 wu hongfei
  • 7 篇 zhang fuzhi
  • 7 篇 gong jibing
  • 7 篇 tang yong
  • 7 篇 jin shunfu
  • 7 篇 han gaowei
  • 7 篇 zhang zhongping
  • 6 篇 wang lei
  • 6 篇 jing chen
  • 6 篇 yin tengteng
  • 6 篇 chen jing
  • 6 篇 chen wei
  • 5 篇 wen dong

语言

  • 220 篇 英文
  • 14 篇 中文
  • 1 篇 其他
检索条件"机构=Hebei Key Laboratory of Virtual Technology and System Integration"
234 条 记 录,以下是21-30 订阅
排序:
PromptHC: Multi-attention prompt guided haze-weather crowd counting
收藏 引用
Expert systems with Applications 2025年 286卷
作者: Jienan Shen Liangang Tong Shaohua Li Weihang Kong School of Information Science and Engineering Yanshan University Qinhuangdao 066004 China Information Technology Center Yanshan University Qinhuangdao 066004 China Hebei Key Laboratory of Computer Virtual Technology and System Integration Qinhuangdao 066004 China
Existing crowd counting methods encounter the challenge of degraded performance in hazy weather due to the blurring of pedestrian outlines. However, current hazy-weather crowd counting methods primarily focus on extra...
来源: 评论
Road network information based edge bundling
收藏 引用
Journal of Information and Computational Science 2015年 第13期12卷 4909-4918页
作者: Nie, Junlan Zhang, Jikai Xin, Shuyue Guo, Dongliang College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
To solve edge confusion problems in the geo-related graph visualization, here we present an edge bundling algorithm based on the road network information. First, the improved Dijkstra shortest path algorithm is employ... 详细信息
来源: 评论
Improving neighbourhood quality for CHUCKY: An empirical study
收藏 引用
Journal of Computational Information systems 2015年 第16期11卷 5967-5977页
作者: Zhao, Fengda Yang, Ke Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Vulnerability discovery is at the centre of attention in computer security. Most vulnerability detection methods need considerable human auditing, thus making vulnerability detection inefficient and unreliable. Simila... 详细信息
来源: 评论
A novel approach to efficiently mine structural patterns from software execution sequence
收藏 引用
Journal of Computational Information systems 2015年 第3期11卷 1109-1119页
作者: Huang, Guoyan Zhang, Bing Ren, Rong Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Analyzing structure of a software system is not sufficient for understanding its functionality. Certain characteristics of software are often hidden in its structure and can only be discovered when the various executi... 详细信息
来源: 评论
Non-human-like characters' facial animation driven by one or two actors
收藏 引用
Journal of Information and Computational Science 2015年 第10期12卷 3937-3944页
作者: Tang, Yong Liu, Yuhan Guo, Dan Liang, Haiyan Luo, Yanqing Lv, Mengya College of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
We present a novel system that can transfer facial expressions from an actor to a non-human-like character. Compared with a lot of previous studies, our system requires no special light conditions or facial markers fo... 详细信息
来源: 评论
Kainate induced gamma oscillations and spike-gamma relationship analysis
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第21期4卷 606-612页
作者: Wen, Dong Peng, Ce Li, Xiaoli Lu, Chengbiao The Key Laboratory for Computer Virtual Technology System Integration of HeBei Province Yanshan University Qinhuangdao Hebei 066004 China Institue of Electrical Engineering Yanshan University Qinhuangdao Hebei 066004 China
Neuronal oscillations in the gamma frequency range and spikes have been reported in many cortical areas in the information processing, but the role of spikes play in cortical processing remains unclear. The aim of thi... 详细信息
来源: 评论
Mining weighted closed sequential patterns by memory indexing
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第19期6卷 432-440页
作者: Ren, Jiadong Li, Shuo Dong, Jun College of Information Science and Engineering Yanshan University Qinhuangdao Hebei 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China
There exist two major problems in weighted closed sequential patterns mining. The first is that only the weights of items are considered and they ignore the time-interval information of data elements during the mining... 详细信息
来源: 评论
Subspace clustering based on finding effective spaces
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第22期6卷 580-589页
作者: Ren, Jiadong Liu, Zhigang Dong, Jun College of Information Science and Engineering Yanshan University Qinhuangdao Hebei 066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China
In high-dimensional data space, because the data is sparse inherently, clusters tend to exist in different subspaces, which makes the traditional methods no longer suitable for use. In this paper, we present SCFES, a ... 详细信息
来源: 评论
Data stream clustering algorithm based on spatial directed graph
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第20期4卷 241-249页
作者: Ren, Jiadong Yuan, Xuemei Dong, Jun College of Information Science and Engineering Yanshan University Qinhuangdao Hebei 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China
Recently, the grid-density based clustering has become one of the major issues among all of the clustering approaches, it has special advantages over other clustering algorithms, such as less computation and the abili... 详细信息
来源: 评论
Real-time simulation of action-driven 3D subtle facial expressions
收藏 引用
Journal of Computational Information systems 2014年 第5期10卷 2137-2144页
作者: Tang, Yong Liang, Haiyan Guo, Dan Lv, Mengya Zhao, Jing College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
While the large-scale deformations such as the Laplacian deformation method could not synthesize new expressional details, this paper proposes a method for simulating different subtle facial expressions based on the K... 详细信息
来源: 评论