咨询与建议

限定检索结果

文献类型

  • 95 篇 期刊文献
  • 80 篇 会议

馆藏范围

  • 175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 110 篇 工学
    • 71 篇 计算机科学与技术...
    • 61 篇 软件工程
    • 19 篇 生物工程
    • 16 篇 信息与通信工程
    • 14 篇 电气工程
    • 11 篇 控制科学与工程
    • 11 篇 化学工程与技术
    • 10 篇 电子科学与技术(可...
    • 8 篇 材料科学与工程(可...
    • 8 篇 生物医学工程(可授...
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 建筑学
    • 4 篇 土木工程
    • 4 篇 安全科学与工程
  • 82 篇 理学
    • 41 篇 数学
    • 22 篇 物理学
    • 18 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 12 篇 化学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 7 篇 医学
    • 6 篇 公共卫生与预防医...
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 6 篇 法学
    • 5 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 2 篇 教育学
  • 2 篇 文学

主题

  • 5 篇 forecasting
  • 4 篇 deep learning
  • 4 篇 memory managemen...
  • 3 篇 deep neural netw...
  • 3 篇 costs
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 transforms
  • 3 篇 clustering algor...
  • 3 篇 data visualizati...
  • 3 篇 cryptography
  • 3 篇 transportation
  • 2 篇 parallel process...
  • 2 篇 representation l...
  • 2 篇 distillation
  • 2 篇 data centers
  • 2 篇 motion planning
  • 2 篇 anomaly detectio...
  • 2 篇 planning
  • 2 篇 network topology

机构

  • 16 篇 peng cheng labor...
  • 11 篇 peking universit...
  • 10 篇 national enginee...
  • 8 篇 national enginee...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 college of compu...
  • 6 篇 zte corporation
  • 6 篇 inner mongolia e...
  • 6 篇 shenyang branch ...
  • 6 篇 liaoning provinc...
  • 6 篇 peking universit...
  • 6 篇 inner mongolia k...
  • 5 篇 college of compu...
  • 5 篇 national enginee...
  • 5 篇 college of mecha...
  • 5 篇 national enginee...
  • 5 篇 school of inform...
  • 5 篇 beijing normal u...
  • 5 篇 fujian provincia...

作者

  • 11 篇 bin cui
  • 10 篇 tong yang
  • 9 篇 yang tong
  • 9 篇 cui bin
  • 8 篇 jian-tao zhou
  • 6 篇 wei zeng
  • 6 篇 yuan xiaoru
  • 6 篇 chang kuo-chi
  • 6 篇 jianxiao wang
  • 5 篇 zhao yikai
  • 5 篇 yuhan wu
  • 5 篇 shuai yuan
  • 5 篇 yikai zhao
  • 5 篇 wu yuhan
  • 5 篇 yuan shuai
  • 4 篇 deng yongqiang
  • 4 篇 xiong yi
  • 4 篇 guo jiarui
  • 4 篇 zheng zhong
  • 4 篇 yang xinquan

语言

  • 157 篇 英文
  • 14 篇 其他
  • 5 篇 中文
检索条件"机构=National Engineering Laboratory of Big Data Algorithms and Analysis Technology"
175 条 记 录,以下是41-50 订阅
排序:
HyperCalm Sketch: One-Pass Mining Periodic Batches in data Streams
HyperCalm Sketch: One-Pass Mining Periodic Batches in Data S...
收藏 引用
International Conference on data engineering
作者: Zirui Liu Chaozhe Kong Kaicheng Yang Tong Yang Ruijie Miao Qizhi Chen Yikai Zhao Yaofeng Tu Bin Cui School of Computer Science and National Engineering Laboratory for Big Data Analysis Technology and Application Peking University Beijing China Peng Cheng Laboratory Shenzhen China ZTE Corporation
Batch is an important pattern in data streams, which refers to a group of identical items that arrive closely. We find that some special batches that arrive periodically are of great value. In this paper, we formally ...
来源: 评论
Research of Improved TD3 Robotic Arm Path Planning using Evolutionary Algorithm  5
Research of Improved TD3 Robotic Arm Path Planning using Evo...
收藏 引用
5th World Robot Conference Symposium on Advanced Robotics and Automation, WRC SARA 2023
作者: Zhang, Feng Xiong, Jianqiang Yuan, Shuai Wen, Ke Shenyang Jianzhu University Liaoning Province Big Data Management and Analysis Laboratory of Urban Construction Shenyang Branch of National Special Computer Engineering Technology Research Center School of Electrical and Control Engineering Shenyang110168 China Shenyang Jianzhu University School of Electrical and Control Engineering Shenyang110168 China Shenyang Jianzhu University School of Computer Science and Engineering Shenyang110168 China
Nowadays, application of automated intelligent robot arm devices to improve industrial production efficiency has become a popular research field in the world. The previous off-line path planning method of robotic arm ... 详细信息
来源: 评论
A Weighted Flat Lattice Transformer-based Knowledge Extraction Architecture for Chinese Named Entity Recognition
A Weighted Flat Lattice Transformer-based Knowledge Extracti...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Hengwei Zhang Yuejia Wu Jian-Tao Zhou Inner Mongolia University College of Computer Science Hohhot China Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Hohhot China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Named Entity Recognition (NER) is one of the contents of Knowledge Extraction (KE) that transforms data into knowledge representation. However, Chinese NER faces the problem of lacking clear word boundaries that limit... 详细信息
来源: 评论
Framework for Fuzzy Temporal Association Rule Mining Based on Density Clustering Optimization
Framework for Fuzzy Temporal Association Rule Mining Based o...
收藏 引用
6th International Conference on Intelligent Computing and Signal Processing (ICSP)
作者: Yang Cao Pengzhi Ma School of Computer Science and Engineering Shenyang Jianzhu University(SJZU) Liaoning Province Big Data Management and Analysis Laboratory of Urban Construction Shenyang Branch of National Special Computer Engineering Technology Research Center Shenyang China
This paper proposes a framework for fuzzy temporal association rule mining based on density clustering optimization, aimed at improving the fuzzification of continuous attributes and enhancing the efficiency of mining... 详细信息
来源: 评论
A Simulation Method to Play with Porosity and Particle Size Distribution for Characterizing Porous Media
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yuhe National & Local Joint Engineering Laboratory for Big Data Analysis and Computing Technology Beijing100190 China Institute for Scientific Computation Texas A&M University College StationTX77843 United States
This note presents a simulation method for investigating the relationship between porosity and particle size distribution in porous media characterization. The method simulates particle packing based on particle size ... 详细信息
来源: 评论
Reservoir Static Property Estimation Using Nearest-Neighbor Neural Network
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yuhe National & Local Joint Engineering Laboratory for Big Data Analysis and Computing Technology Beijing100190 China Institute for Scientific Computation Texas A&M University College StationTX77843 United States
This note presents an approach for estimating the spatial distribution of static properties in reservoir modeling using a nearest-neighbor neural network. The method leverages the strengths of neural networks in appro... 详细信息
来源: 评论
Visitors Vis: Interactive Mining of Suspected Medical Insurance Fraud Groups  18th
Visitors Vis: Interactive Mining of Suspected Medical Insura...
收藏 引用
18th CCF Conference on Computer Supported Cooperative Work and Social Computing, ChineseCSCW 2023
作者: Dong, Rixin Liu, Hanlin Guo, Xu Zhou, Jiantao College of Computer Science Inner Mongolia University Hohhot China National and Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolia Hohhot China Engineering Research Center of Ecological Big Data Ministry of Education Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Hohhot China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
As medical insurance continues to grow in size, the losses caused by medical insurance fraud cannot be underestimated. Current data mining and predictive techniques have been applied to analyze and explore the health ... 详细信息
来源: 评论
Using Rough Sets to Improve the High-dimensional data Anomaly Detection Method Based on Extended Isolation Forest
Using Rough Sets to Improve the High-dimensional Data Anomal...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Hanlin Liu Jiantao Zhou Hua Li College of Computer Science Inner Mongolia University Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Hohhot China
Anomaly detection refers to the identification of data objects that deviate from the general data distribution. One of the important challenges in anomaly detection is handling high-dimensional data, especially when i...
来源: 评论
An Uncovered Neurons Information-Based Fuzzing Method for DNN
An Uncovered Neurons Information-Based Fuzzing Method for DN...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Kecheng Tang Jian-Tao Zhou Xu Guo College of Computer Science Inner Mongolia University Hohhot China National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Hohhot China Engineering Research Center of Ecological Big Data Ministry of Education Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Hohhot China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Fuzzing is increasingly being utilized as a method to test the reliability of Deep Learning (DL) systems. In order to detect more errors in DL systems, exploring the internal logic of more DNNs has become the main obj... 详细信息
来源: 评论
A Graph Sequence Generator and Multi-head Self-attention Mechanism based Knowledge Graph Reasoning Architecture
A Graph Sequence Generator and Multi-head Self-attention Mec...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Yuejia Wu Jian-Tao Zhou College of Computer Science Inner Mongolia University National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Knowledge Graph (KG) is an essential research direction that involves storing and managing knowledge data, but its incompleteness and sparsity hinder its development in various applications. Knowledge Graph Reasoning ...
来源: 评论