咨询与建议

限定检索结果

文献类型

  • 446 篇 会议
  • 87 篇 期刊文献

馆藏范围

  • 533 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 208 篇 工学
    • 164 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 49 篇 电气工程
    • 29 篇 控制科学与工程
    • 18 篇 生物工程
    • 15 篇 机械工程
    • 15 篇 电子科学与技术(可...
    • 15 篇 交通运输工程
    • 14 篇 网络空间安全
    • 13 篇 光学工程
    • 11 篇 安全科学与工程
    • 10 篇 仪器科学与技术
    • 10 篇 土木工程
    • 9 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 4 篇 化学工程与技术
  • 91 篇 理学
    • 58 篇 数学
    • 20 篇 物理学
    • 16 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 7 篇 系统科学
  • 53 篇 管理学
    • 32 篇 图书情报与档案管...
    • 31 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 14 篇 法学
    • 8 篇 法学
    • 8 篇 社会学
  • 10 篇 医学
    • 9 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 公共卫生与预防医...
  • 3 篇 军事学
  • 2 篇 教育学
  • 2 篇 农学
  • 1 篇 经济学
  • 1 篇 文学

主题

  • 74 篇 feature extracti...
  • 62 篇 accuracy
  • 48 篇 semantics
  • 42 篇 computational mo...
  • 38 篇 data models
  • 30 篇 federated learni...
  • 30 篇 training
  • 27 篇 neural networks
  • 26 篇 transformers
  • 21 篇 predictive model...
  • 19 篇 deep learning
  • 18 篇 data mining
  • 17 篇 noise
  • 17 篇 visualization
  • 17 篇 adaptation model...
  • 16 篇 attention mechan...
  • 15 篇 measurement
  • 14 篇 object detection
  • 14 篇 image segmentati...
  • 14 篇 analytical model...

机构

  • 201 篇 key laboratory o...
  • 198 篇 shandong provinc...
  • 44 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 36 篇 shandong fundame...
  • 35 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 22 篇 shandong provinc...
  • 15 篇 quan cheng labor...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...
  • 12 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 shandong fundame...
  • 11 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 10 篇 faculty of data ...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 18 篇 xiaoming wu
  • 17 篇 hei xinhong
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 aimin li
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 lei zhu
  • 11 篇 wenpeng lu
  • 10 篇 wang lei
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 guixin zhao

语言

  • 508 篇 英文
  • 24 篇 其他
  • 3 篇 中文
检索条件"机构=Shaanxi Provincial Key Laboratory of Network Computing and Security Technology"
533 条 记 录,以下是491-500 订阅
排序:
Velocity-Driven Particle Swarm Optimization  19
Velocity-Driven Particle Swarm Optimization
收藏 引用
Proceedings of the 2019 8th International Conference on computing and Pattern Recognition
作者: Wei Li Yaochi Fan Qiaoyong Jiang Qingzheng Xu School of Computer Science and Engineering Xi'an University of Technology and Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China College of Information and Communication National University of Defense Technology Xi'an China
Particle swarm optimization (PSO) is an efficient nature-inspired optimization algorithm, which has been widely applied in many engineering fields. The performance of particle swarm optimization (PSO) has been signifi... 详细信息
来源: 评论
A novel Image security Protection Method Based on DCT Compression Theory and Hyper-chaotic Mapping
收藏 引用
Journal of Physics: Conference Series 2021年 第1期2066卷
作者: Xianglian Xue Haiyan Jin School of Computer Science and Engineering Xi'an University of Technology Xi'an 710077Shaanxi China Shaanxi University of Chinese Medicine Xianyang712046Shaanxi China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an710077Shaanxi China
This paper studies the current situation of image compression encryption and analyzes the influence of low frequency (DC coefficient) and high frequency (AC coefficient) on image structure in DCT transformation. Based...
来源: 评论
Velocity-driven particle swarm optimization  8
Velocity-driven particle swarm optimization
收藏 引用
8th International Conference on computing and Pattern Recognition, ICCPR 2019
作者: Li, Wei Fan, Yaochi Jiang, Qiaoyong Xu, Qingzheng School of Computer Science and Engineering Xi'An University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an710048 China School of Computer Science and Engineering Xi'An University of Technology Xi'an710048 China College of Information and Communication National University of Defense Technology Xi'an710106 China
Particle swarm optimization (PSO) is an efficient nature-inspired optimization algorithm, which has been widely applied in many engineering fields. The performance of particle swarm optimization (PSO) has been signifi... 详细信息
来源: 评论
Revisiting Recent and Current Anomaly Detection based on Machine Learning in Ad-Hoc networks  5
Revisiting Recent and Current Anomaly Detection based on Mac...
收藏 引用
5th Annual International Conference on network and Information Systems for Computers, ICNISC 2019
作者: Wang, Zhixiao Chen, Mingyu Yan, Wenyao Wang, Wendong Gao, Ang Nie, Gaoyang Wang, Feng Yang, Shaobo Xi'An University of Technology Xi'an710048 China Goettingen University Goettingen37077 Germany Xi'An Jiaotong University Xi'an710049 China Shaanxi Provincial Key Laboratory of Network Computing and Security Technology Xi'an710048 China College of xi'An Innovation Yan'An University Xi'an710100 China Yan'An University Yan'an716000 China National Satellite Meteorological Center China Meteorological Administration Beijing100081 China
Ad-Hoc network which is one kind of self-organized networks is much more vulnerable than the infrastructural network with the properties of highly changeable linkage, dynamic structure, and wireless connections so tha... 详细信息
来源: 评论
Intelligent recommendation of related items based on naive bayes and collaborative filtering combination model
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1682卷
作者: Wei Wei Zhuo Wang Changlong Fu Robertas Damaševičius Rafal Scherer Marcin Wožniak School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 Shaanxi Key Laboratory for Network Computing and Security Technology China.
Nowadays, data plays a unique role in various fields. Based on the background of the era of big data, this paper collects user evaluations of certain commodities and labels the evaluations into positive emotions and n...
来源: 评论
A Hole Repairing Method Based on Edge-Preserving Projection  12th
A Hole Repairing Method Based on Edge-Preserving Projection
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Wang, Yinghui Zhao, Yanni Wang, Ningna Ning, Xiaojuan Shi, Zhenghao Zhao, Minghua Lv, Ke Huang, Liangyi Institute of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an China Department of Computer Science Shannxi Vocational and Technical College Xi’an China Booking B.V. Herengracht 597 Amsterdam1017 CE Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington D.C. United States
A point cloud hole repairing method based on edge-preserving projection is proposed in order to maintain sharp features of holes. First, the hole boundary points are acquired by quadrants and angles, then connections ... 详细信息
来源: 评论
A Hole Repairing Method Based on Slicing  12th
A Hole Repairing Method Based on Slicing
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Zhao, Yanni Wang, Yinghui Wang, Ningna Ning, Xiaojuan Shi, Zhenghao Zhao, Minghua Lv, Ke Huang, Liangyi Institute of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an China Department of Computer Science Shannxi Vocational and Technical College Xi’an China Booking B.V. Herengracht 597 Amsterdam1017 CE Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington D.C. United States
The repairing of 3D point cloud holes has an important meaning to ensure the integrity of cloud data. We present a slice-based repairing method for 3D point cloud in this paper. Firstly, the model is horizontal sliced... 详细信息
来源: 评论
A Slice-Guided Method of Indoor Scene Structure Retrieving  12th
A Slice-Guided Method of Indoor Scene Structure Retrieving
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Wang, Lijuan Wang, Yinghui Wang, Ningna Ning, Xiaojuan Lv, Ke Huang, Liangyi Xi’an University of Technology South Jinhua Road no. 5 Xi’an710032 China Xi’an Technology University Mid Xuefu Road no. 2 Xi’an710021 China Shaanxi Key Laboratory of Network Computing and Security Technology South Jinhua Road no. 5 Xi’an710032 China *** B.V. Vijzelstraat 66-80 Amsterdam1017HL Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington DC20052 United States
The structure information of indoor scene is necessary for a robot who works in a room. In order to achieve structure of an indoor scene, a slice-guided method of indoor scene structure retrieving is proposed in this ... 详细信息
来源: 评论
Exploiting Meta-Path with Attention Mechanism for Fine-Grained User Location Prediction in LBSNs  3
Exploiting Meta-Path with Attention Mechanism for Fine-Grain...
收藏 引用
2019 3rd International Conference on Data Mining, Communications and Information technology, DMCIT 2019
作者: Wang, Zhixiao Yan, Wenyao Wang, Wendong Gao, Ang Yu, Lei Yang, Shaobo Nie, GaoYang School of Computer Science and Engineering Xi'an University of Technology Xi'an710048 China Telematics Group University of Goettingen Goettingen37077 Germany Shaanxi Key Laboratory of Network Computing and Security Xi'an710048 China School of Electronic and Information Engineering Xi'an Jiaotong University Xi'an710048 China College of Xi'an Innovation Yan'an University Xi'an710100 China Yan'an University Yan'an716000 China National Satellite Meteorological Center China Meteorological Administration Beijing100081 China
Based on the huge volumes of user check-in data in LBSNs, users' intrinsic mobility patterns can be well explored, which is fundamental for predicting where a user will visit next given his/her historical check-in... 详细信息
来源: 评论
Slice-Based Window Detection from Scene Point Clouds
Slice-Based Window Detection from Scene Point Clouds
收藏 引用
International Conference on Virtual Reality and Visualization (ICVRV)
作者: Wen Hao Yinghui Wang Wei Liang Xiaojuan Ning Ye Li Institute of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
In this paper, we propose a comprehensive strategy to detect the windows from scene point clouds. First, the planar points are extracted after computing the dimensionality structure of each point. The planar points ar... 详细信息
来源: 评论