咨询与建议

限定检索结果

文献类型

  • 144 篇 期刊文献
  • 136 篇 会议

馆藏范围

  • 280 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 196 篇 工学
    • 161 篇 计算机科学与技术...
    • 123 篇 软件工程
    • 43 篇 控制科学与工程
    • 32 篇 电气工程
    • 32 篇 信息与通信工程
    • 24 篇 生物医学工程(可授...
    • 22 篇 光学工程
    • 20 篇 生物工程
    • 16 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 7 篇 仪器科学与技术
    • 7 篇 建筑学
    • 7 篇 土木工程
    • 6 篇 化学工程与技术
    • 5 篇 力学(可授工学、理...
  • 101 篇 理学
    • 61 篇 数学
    • 25 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 23 篇 生物学
    • 12 篇 系统科学
    • 8 篇 化学
  • 67 篇 管理学
    • 45 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 22 篇 医学
    • 20 篇 临床医学
    • 17 篇 基础医学(可授医学...
    • 9 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 14 篇 法学
    • 10 篇 社会学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 2 篇 教育学
  • 2 篇 艺术学
  • 1 篇 农学

主题

  • 17 篇 feature extracti...
  • 14 篇 predictive model...
  • 12 篇 deep learning
  • 10 篇 semantics
  • 9 篇 contrastive lear...
  • 9 篇 data models
  • 7 篇 accuracy
  • 6 篇 convolution
  • 6 篇 federated learni...
  • 5 篇 anomaly detectio...
  • 5 篇 noise
  • 5 篇 computational mo...
  • 5 篇 tensors
  • 5 篇 visualization
  • 5 篇 prediction algor...
  • 5 篇 training
  • 4 篇 magnetic resonan...
  • 4 篇 signal processin...
  • 4 篇 neural networks
  • 4 篇 knowledge graph

机构

  • 25 篇 national enginee...
  • 23 篇 college of compu...
  • 20 篇 engineering rese...
  • 18 篇 college of compu...
  • 17 篇 fujian key labor...
  • 15 篇 guangdong provin...
  • 11 篇 shenzhen institu...
  • 11 篇 college of compu...
  • 10 篇 chongqing key la...
  • 9 篇 inner mongolia e...
  • 9 篇 computer vision ...
  • 9 篇 guangdong key la...
  • 9 篇 inner mongolia k...
  • 8 篇 key laboratory o...
  • 7 篇 college of big d...
  • 7 篇 college of compu...
  • 7 篇 college of compu...
  • 6 篇 the college of c...
  • 6 篇 key laboratory o...
  • 6 篇 the school of co...

作者

  • 15 篇 shen linlin
  • 13 篇 wang lihui
  • 10 篇 gao can
  • 9 篇 wang jinbao
  • 9 篇 jian-tao zhou
  • 9 篇 penghua li
  • 8 篇 yuan ye
  • 6 篇 zhou jie
  • 6 篇 zhu yuemin
  • 6 篇 wang guoyin
  • 6 篇 guo kun
  • 6 篇 lihui wang
  • 5 篇 niyato dusit
  • 5 篇 huang jiwu
  • 5 篇 zhang wen
  • 5 篇 yu zitong
  • 5 篇 chen huajun
  • 5 篇 zhang yichi
  • 5 篇 wang li
  • 5 篇 chen zhuo

语言

  • 228 篇 英文
  • 47 篇 其他
  • 12 篇 中文
检索条件"机构=Key Laboratory of Intelligent Computing for Big Data College of Automation"
280 条 记 录,以下是201-210 订阅
排序:
Time-aware bike flow prediction framework with dynamic edge fusion and memory integration
收藏 引用
Knowledge-Based Systems 2025年 322卷
作者: M.Rajeh, Taha Li, Tianrui Luo, Zhpeng Javed, Muhammad Hafeez Alhaek, Fares School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu611756 China Engineering Research Center of Sustainable Urban Intelligent Transportation Ministry of Education Chengdu611756 China National Engineering Laboratory of Integrated Transportation Big Data Application Technology Southwest Jiaotong University Chengdu611756 China Manufacturing Industry Chains Collaboration and Information Support Technology Key Laboratory of Sichuan Province Southwest Jiaotong University Chengdu611756 China Stirling College Chengdu University Chengdu610106 China Computing Science Faculty of Natural Sciences University of Stirling StirlingFK9 4LA United Kingdom
Bike-Sharing Systems (BSSs) have become a popular solution to urban sustainability concerns, providing affordable and environmentally friendly transportation. However, modeling and predicting shared-bike flow patterns... 详细信息
来源: 评论
Robust optimization for quantum reinforcement learning control using partial observations
收藏 引用
Physical Review A 2022年 第6期105卷 062443-062443页
作者: Chen Jiang Yu Pan Zheng-Guang Wu Qing Gao Daoyi Dong State Key Laboratory of Industrial Control Technology Institute of Cyber-Systems and Control College of Control Science and Engineering Zhejiang University Hangzhou 310027 China The School of Automation Science and Electrical Engineering and Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing 100191 China The School of Engineering and Information Technology University of New South Wales Canberra Australian Capital Territory 2600 Australia
The current quantum reinforcement learning control models often assume that the quantum states are known a priori for control optimization. However, full observation of the quantum state is experimentally infeasible d... 详细信息
来源: 评论
An intelligent Resource Scheduling Method with Edge Channel Deployment for BPM
An Intelligent Resource Scheduling Method with Edge Channel ...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted computing, UIC-ATC
作者: Bowen Liu Wanchun Dou Xiaokang Zhou Xuyun Zhang Lianyong Qi Fei Dai Chaochao Chen State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Faculty of Data Science Shiga University Hikone Japan Department of Computing Macquarie University Sydney Australia College of Computer and Software China University of Petroleum (East China) Qingdao China College of Big Data and Intelligent Engineering Southwest Forestry University Kunming China College of Computer Science and Technology Zhejiang University Hangzhou China
Edge computing is a novel computing paradigm that offers kinds of resources at the network edge. In edge computing, terminal users are connected to edge servers via the wireless network and there are various channels ...
来源: 评论
Chronic Disease Detection Via Non-negative Latent Feature Analysis
Chronic Disease Detection Via Non-negative Latent Feature An...
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Leming Zhou Qing Li Mingsheng Shang College of Computer Science and Technology Chongqing University of Posts and Telecommunications Academy of Sciences Chongqing China Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing China
Chronic diseases such as coronary heart disease (CHD) are of significant harm to human health. However, chronic disease detection commonly relies on many examinations to implement reliable diagnosis, resulting in a fa... 详细信息
来源: 评论
Deep learning radiomics model related with genomics phenotypes for pathological complete response prediction in locally advanced rectal cancer under neoadjuvant chemoradiotherapy
Deep learning radiomics model related with genomics phenotyp...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Ye Wang Zhen Pan Lanyan Lin Huajun Cai Feng Ding Chaojun Tan Dingyuan Zheng Yajun Xie Guoxian Guan Department of Colorectal Surgery The First Affiliated Hospital of Fujian Medical University Fuzhou China Department of Geriatric Medicine Fujian Key Laboratory of Geriatrics Diseases Fujian Provincial Center for Geriatrics Fuzhou University Affiliated Provincial Hospital Shengli Clinical Medical College of Fujian Medical University Fuzhou China Fujian Huaye Information Technology Co. Ltd China School of Big Data \& Key Laboratory of Data Science and Intelligent Computing Fuzhou University of International Studies and Trade Fuzhou China Department of Colorectal Surgery The First Affiliated Hospital of Fujian Medical University National Regional Medical Center Binhai Campus of the First Affiliated Hospital Fuzhou China
Background: Developing a treatment strategy after neoadjuvant chemoradiotherapy (nCRT) based on accurate pathological complete response (pCR) predictions is crucial for locally advanced rectal cancer (LARC).Objective:... 详细信息
来源: 评论
MC3D-AD: A Unified Geometry-aware Reconstruction Model for Multi-category 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Cheng, Jiayi Gao, Can Zhou, Jie Wen, Jiajun Dai, Tao Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
3D Anomaly Detection (AD) is a promising means of controlling the quality of manufactured products. However, existing methods typically require carefully training a task-specific model for each category independently,... 详细信息
来源: 评论
Exploration of Novel Nsm Methods to Achieve Stronger Frps with Minimal Epoxy
SSRN
收藏 引用
SSRN 2024年
作者: Yan, Handong Yin, Jianli Zhu, Xinan Lou, Tiejiong Li, Haifeng Sun, Wei College of Civil Engineering Huaqiao University Xiamen361021 China Higher-educational Engineering Research Centre for Intelligence and Automation in Construction of Fujian Province College of Civil Engineering Huaqiao University Xiamen361021 China Key Laboratory for Intelligent Infrastructure and Monitoring of Fujian Province College of Civil Engineering Huaqiao University Xiamen361021 China KZJ New Materials Group Co. Ltd. Xiamen361101 China Shandong Province Big Data Center Shandong Jinan250000 China University of Coimbra Department of Civil Engineering Cemmpre Arise 3030-788 Portugal
Conventional NSM methods require a significant amount of epoxy to achieve the desired bond strength, leading to substantial material costs and carbon emissions. Anchorages offer an opportunity to fully develop the ten... 详细信息
来源: 评论
GenFace: A Large-Scale Fine-Grained Face Forgery Benchmark and Cross Appearance-Edge Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yaning Yu, Zitong Wang, Tianyi Huang, Xiaobin Shen, Linlin Gao, Zan Ren, Jianfeng Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Nanyang Technological University 50 Nanyang Ave Block N 4 639798 Singapore Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518129 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University China Jinan250014 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China School of Computer Science University of Nottingham Ningbo China
The rapid advancement of photorealistic generators has reached a critical juncture where the discrepancy between authentic and manipulated images is increasingly indistinguishable. Thus, benchmarking and advancing tec... 详细信息
来源: 评论
Graph Regularized Nonnegative Latent Factor Analysis Model for Temporal Link Prediction in Cryptocurrency Transaction Networks
arXiv
收藏 引用
arXiv 2022年
作者: Zhou, Yue Liu, Zhigang Yuan, Ye The School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China The Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing400714 China The Chongqing School University of Chinese Academy of Sciences Chongqing400714 China The College of Computer and Information Science Southwest University Chongqing400715 China
With the development of blockchain technology, the cryptocurrency based on blockchain technology is becoming more and more popular. This gave birth to a huge cryptocurrency transaction network has received widespread ... 详细信息
来源: 评论
Domain generalization for document authentication against practical recapturing attacks
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Changsheng Zhang, Shuzheng Lan, Fengbo Huang, Jiwu The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology College of Electronics and Information Engineering Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
Recapturing attack can be employed as a simple but effective anti-forensic tool for digital document images. Inspired by the document inspection process that compares a questioned document against a reference sample, ... 详细信息
来源: 评论