咨询与建议

限定检索结果

文献类型

  • 943 篇 会议
  • 867 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,174 篇 工学
    • 868 篇 计算机科学与技术...
    • 713 篇 软件工程
    • 266 篇 信息与通信工程
    • 138 篇 控制科学与工程
    • 124 篇 电气工程
    • 121 篇 生物工程
    • 77 篇 机械工程
    • 68 篇 化学工程与技术
    • 67 篇 电子科学与技术(可...
    • 54 篇 动力工程及工程热...
    • 52 篇 生物医学工程(可授...
    • 46 篇 仪器科学与技术
    • 46 篇 交通运输工程
    • 37 篇 光学工程
    • 37 篇 建筑学
    • 31 篇 土木工程
    • 27 篇 材料科学与工程(可...
  • 581 篇 理学
    • 338 篇 数学
    • 133 篇 生物学
    • 109 篇 统计学(可授理学、...
    • 106 篇 物理学
    • 71 篇 化学
    • 43 篇 系统科学
  • 433 篇 管理学
    • 240 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 91 篇 工商管理
  • 55 篇 经济学
    • 55 篇 应用经济学
  • 50 篇 法学
    • 43 篇 社会学
  • 50 篇 医学
    • 43 篇 临床医学
    • 34 篇 基础医学(可授医学...
  • 34 篇 农学
  • 13 篇 教育学
  • 8 篇 文学
  • 3 篇 军事学
  • 3 篇 艺术学

主题

  • 61 篇 semantics
  • 53 篇 data mining
  • 42 篇 training
  • 35 篇 knowledge engine...
  • 33 篇 feature extracti...
  • 31 篇 big data
  • 28 篇 deep learning
  • 25 篇 computational mo...
  • 22 篇 visualization
  • 22 篇 data models
  • 21 篇 conferences
  • 21 篇 task analysis
  • 21 篇 laboratories
  • 21 篇 machine learning
  • 20 篇 data engineering
  • 20 篇 information retr...
  • 19 篇 databases
  • 18 篇 object detection
  • 18 篇 ontology
  • 17 篇 convolution

机构

  • 156 篇 key laboratory o...
  • 155 篇 school of inform...
  • 133 篇 school of econom...
  • 104 篇 school of comput...
  • 98 篇 fujian provincia...
  • 82 篇 research center ...
  • 51 篇 key laboratory o...
  • 50 篇 key laboratory o...
  • 49 篇 school of inform...
  • 47 篇 school of inform...
  • 34 篇 school of comput...
  • 34 篇 college of compu...
  • 34 篇 school of inform...
  • 32 篇 jiangxi key labo...
  • 31 篇 key laboratory o...
  • 31 篇 school of mathem...
  • 31 篇 research center ...
  • 29 篇 institute of env...
  • 29 篇 key laboratory o...
  • 28 篇 college of mecha...

作者

  • 49 篇 shi yong
  • 49 篇 chen hong
  • 46 篇 chang kuo-chi
  • 45 篇 pan jeng-shyang
  • 41 篇 yong shi
  • 39 篇 zhang jing
  • 34 篇 du xiaoyong
  • 33 篇 wu xindong
  • 32 篇 xue xingsi
  • 32 篇 wang meng
  • 30 篇 li cuiping
  • 29 篇 chu kai-chun
  • 29 篇 huang qingming
  • 28 篇 xiaoyong du
  • 27 篇 xindong wu
  • 27 篇 wang shan
  • 24 篇 sun geng
  • 24 篇 hong chen
  • 24 篇 tian yingjie
  • 23 篇 xu qianqian

语言

  • 1,691 篇 英文
  • 98 篇 其他
  • 26 篇 中文
检索条件"机构=Key Laboratory of Data Mining and Knowledge Engineering"
1815 条 记 录,以下是941-950 订阅
排序:
Software Defect Prediction via Deep Belief Network
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 925-932页
作者: WEI Hua SHAN Chun HU Changzhen ZHANG Yu YU Xiao School of Computer Science and Technology Beijing Institute of Technology China Information Technology Security Evaluation Center Beijing Key Laboratory of Software Security Engineering Technology Beijing Institute of Technology School of Electrical and Information Engineering and Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing University of Civil Engineering and Architecture State Key Laboratory in China for Geomechanics and Deep Underground Engineering (Beijing) China University of Mining and Technology School of Computer Science and Technology Shandong University of Technology
Defect distribution prediction is a meaningful topic because software defects are the fundamental cause of many attacks and data loss. Building accurate prediction models can help developers find bugs and prioritize t... 详细信息
来源: 评论
A Survey of Common IOT Communication Protocols and IOT Smart-X Applications of 5G Cellular  1
收藏 引用
16th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2020 in conjunction with the 13th International Conference on Frontiers of Information Technology, Applications and Tools, FITAT 2020
作者: Chu, Kai-Chun Turatsinze, Elias Chang, Kuo-Chi Zhou, Yu-Wen Chang, Fu-Hsiang Wang, Ming-Tsung Department of Business Management Fujian University of Technology Fuzhou China School of Information and Engineering Fujian University of Technology Fuzhou China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou China Department of Tourism Shih-Hsin University Taipei Taiwan Institute of Communications Engineering National Yunlin University of Science and Technology Yunlin Taiwan College of Mechanical and Electrical Engineering National Taipei University of Technology Taipei Taiwan Department of Business Administration North Borneo University College Sabah Malaysia
New technologies and the potential development of Internet-connected devices have made the IoT one of the main concerns in the areas of computing. In this review paper, Bluetooth, Zigbee, Z-Wave, Wi-Fi, 5G cellular, N... 详细信息
来源: 评论
Rockburst prediction using artificial intelligence techniques:A review
岩石力学通报(英文)
收藏 引用
岩石力学通报(英文) 2024年 第3期3卷 1-13页
作者: Yu Zhang Kongyi Fang Manchao He Dongqiao Liu Junchao Wang Zhengjia Guo School of Electrical and Information Engineering Beijing University of Civil Engineering and ArchitectureBeijing100044China Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing University of Civil Engineering and ArchitectureBeijing100044China State Key Laboratory for Geomechanics and Deep Underground Engineering China University of Mining and TechnologyBeijing100083China School of Electrical and Information Engineering Beijing University of Civil Engineering and ArchitectureBeijing100044China Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing University of Civil Engineering and ArchitectureBeijing100044China State Key Laboratory for Geomechanics and Deep Underground Engineering China University of Mining and TechnologyBeijing100083China Thomas Lord Department of Computer Science University of Southern CaliforniaLos Angeles90007CAUSA
Rockburst is a phenomenon where sudden,catastrophic failure of the rock mass occurs in underground deep regions or areas with high tectonic stress during the excavation *** disasters endanger the safety of people'... 详细信息
来源: 评论
Study of Assessing the Stability of Rwanda’s Power System from Big data Based on Power Generation  1
收藏 引用
16th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2020 in conjunction with the 13th International Conference on Frontiers of Information Technology, Applications and Tools, FITAT 2020
作者: Shyirambere, Gilbert Chang, Kuo-Chi Chu, Kai-Chun Wang, Hsiao-Chuan Omer, AbdalazizAltayeb Ibrahim Amesimenu, Governor David Kwabena Chang, Fu-Hsiang Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou China School of Information Science and Engineering Fujian University of Technology Fuzhou China Department of Business Management Fujian University of Technology Fuzhou China Institute of Environmental Engineering National Taiwan University Taipei Taiwan College of Mechanical and Electrical Engineering National Taipei University of Technology Taipei Taiwan Department of Business Administration North Borneo University College Sabah Malaysia Department of Tourism Shih-Hsin University Taipei Taiwan
Rwanda has insufficient of electricity in which the electricity access among its citizens is at 53% equals to 224 MW of power generation. However, even among 53% of electrification, there are still some blackouts... 详细信息
来源: 评论
Two Tasks, One Goal: Uniting Motion and Planning for Excellent End To End Autonomous Driving Performance
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Lin Song, Ziying Pan, Hongyu Yang, Lei Jia, Caiyan Luo, Y. Beijing Key Laboratory of Traffic Data Mining and Embodied Intelligence Beijing Jiaotong University China Horizon Robotics China School of Information Technology and Electrical Engineering The University of Queensland Australia School of Vehicle and Mobility Tsinghua University China
End-to-end autonomous driving has made impressive progress in recent years. Former end-to-end autonomous driving approaches often decouple planning and motion tasks, treating them as separate modules. This separation ... 详细信息
来源: 评论
Study of Smart Decorating Machine on Cake Patten  1
收藏 引用
16th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2020 in conjunction with the 13th International Conference on Frontiers of Information Technology, Applications and Tools, FITAT 2020
作者: Jiang, Shi-Jie Chang, Kuo-Chi Wang, Hong-Jiang Chu, Kai-Chun Wang, Hsiao-Chuan Chang, Fu-Hsiang School of Information Science and Engineering Fujian University of Technology Fuzhou China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou China Department of Business Management Fujian University of Technology Fuzhou China Institute of Environmental Engineering National Taiwan University Taipei Taiwan Department of Tourism Shih-Hsin University Taipei Taiwan College of Mechanical and Electrical Engineering National Taipei University of Technology Taipei Taiwan Department of Business Administration North Borneo University College Sabah Malaysia
Adding some shapes to food in the production process can greatly increase the added value of food and make the same food. The market is more competitive. At present, cake decorating is mainly done manually, which requ... 详细信息
来源: 评论
Matching Ontologies Through Evolutionary Algorithm with Context-Based Reasoning  6th
Matching Ontologies Through Evolutionary Algorithm with Cont...
收藏 引用
6th International Conference on Advanced Machine Learning Technologies and Applications, AMLTA 2021
作者: Yang, Chaofan Xue, Xingsi Yue, Cai Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou Fujian350118 China Intelligent Information Processing Research Center Fujian University of Technology Fuzhou Fujian350118 China College of Information Science and Engineering Fujian University of Technology Fuzhou Fujian350118 China Fujian Key Lab for Automotive Electronics and Electric Drive Fujian University of Technology Fuzhou Fujian350118 China Guangxi Key Laboratory of Automatic Detecting Technology and Instruments Guilin University of Electronic Technology Guilin Guangxi541004 China School of Information and Communication Guilin University of Electronic Technology Guilin Guangxi541004 China
Ontology matching can solve the heterogeneity problem between two ontologies, and EA represents a state-of-the-art technique for matching ontologies. However, there are two defects concerning the EA-based ontology mat... 详细信息
来源: 评论
Robust and Fast Measure of Information via Low-rank Representation
arXiv
收藏 引用
arXiv 2022年
作者: Dong, Yuxin Gong, Tieliang Yu, Shujian Chen, Hong Li, Chen School of Computer Science and Technology Xi’an Jiaotong University Xi’an710049 China Shaanxi Provincial Key Laboratory of Big Data Knowledge Engineering Ministry of Education Xi’an710049 China Machine Learning Group UiT - The Arctic University of Norway Norway College of Science Huazhong Agriculture University Wuhan430070 China Engineering Research Center of Intelligent Technology for Agriculture Ministry of Education Wuhan430070 China
The matrix-based Rényi’s entropy allows us to directly quantify information measures from given data, without explicit estimation of the underlying probability distribution. This intriguing property makes it wid... 详细信息
来源: 评论
Visual Feedback in Eye-Controlled Interaction: A Study on the Applicability for Pointing and Selection Tasks Across Different Vibration Environments
SSRN
收藏 引用
SSRN 2025年
作者: Ai, Mingyu Wei, Wanni Yang, Xiaonan Hao, Jia Niu, Hongwei Wang, Shuai Industrial and Systems Engineering Laboratory School of Mechanical Engineering Beijing Institute of Technology Beijing100081 China Yangtze Delta Region Academy Beijing Institute of Technology Jiaxing314019 China Key Laboratory of Industry Knowledge & Data Fusion Technology and Application Ministry of Industry and Information Technology Beijing Institute of Technology Beijing100081 China
Because of the advantages of short learning time and strong collaborative ability, eye-control interaction is considered to be a promising human-computer interaction method. In the process of eye-controlled interactio... 详细信息
来源: 评论
Face SSD: A Real-time Face Detector based on SSD
Face SSD: A Real-time Face Detector based on SSD
收藏 引用
第31届中国过程控制会议(CPCC 2020)
作者: Yunlin Shi Huijun Li Bin Ye School of Information and Control Engineering China University of Mining and Technology Xuzhou Key Laboratory of Artificial Intelligence and Big Data
Face detection has gotten some great breakthroughs in recent years. In many application scenarios, face detectors run on mobile and other embedded devices. However, it is difficult to achieve real-time and accurate pr... 详细信息
来源: 评论