咨询与建议

限定检索结果

文献类型

  • 153 篇 期刊文献
  • 35 篇 会议

馆藏范围

  • 188 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 150 篇 工学
    • 107 篇 计算机科学与技术...
    • 76 篇 软件工程
    • 25 篇 信息与通信工程
    • 10 篇 电气工程
    • 9 篇 机械工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 土木工程
    • 9 篇 生物工程
    • 8 篇 控制科学与工程
    • 8 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 6 篇 动力工程及工程热...
    • 5 篇 化学工程与技术
    • 4 篇 矿业工程
    • 4 篇 农业工程
    • 3 篇 力学(可授工学、理...
  • 101 篇 理学
    • 77 篇 数学
    • 25 篇 统计学(可授理学、...
    • 14 篇 生物学
    • 11 篇 物理学
    • 7 篇 系统科学
    • 5 篇 化学
  • 66 篇 管理学
    • 50 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 10 篇 法学
    • 10 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 3 篇 经济学
    • 3 篇 应用经济学

主题

  • 11 篇 clustering algor...
  • 7 篇 data mining
  • 6 篇 complex networks
  • 4 篇 visualization
  • 3 篇 information syst...
  • 3 篇 conferences
  • 3 篇 trees (mathemati...
  • 3 篇 efficiency
  • 3 篇 probability
  • 3 篇 directed graphs
  • 3 篇 synchronization
  • 3 篇 virtual reality
  • 3 篇 mesh generation
  • 2 篇 internet of thin...
  • 2 篇 signal detection
  • 2 篇 collaborative fi...
  • 2 篇 support vector m...
  • 2 篇 detection
  • 2 篇 convolution
  • 2 篇 covariance matri...

机构

  • 61 篇 college of infor...
  • 43 篇 the key laborato...
  • 30 篇 school of inform...
  • 20 篇 key laboratory f...
  • 17 篇 key laboratory f...
  • 12 篇 the key laborato...
  • 11 篇 the key laborato...
  • 10 篇 college of infor...
  • 7 篇 data industry re...
  • 7 篇 the key laborato...
  • 6 篇 college of infor...
  • 5 篇 software enginee...
  • 4 篇 key laboratory f...
  • 4 篇 the key laborato...
  • 4 篇 college of infor...
  • 4 篇 department of in...
  • 3 篇 key laboratory f...
  • 3 篇 the key laborato...
  • 3 篇 yanshan universi...
  • 3 篇 college of vehic...

作者

  • 44 篇 ren jiadong
  • 15 篇 dong jun
  • 15 篇 liu yongshan
  • 13 篇 guo jingfeng
  • 13 篇 huang guoyan
  • 10 篇 he haitao
  • 8 篇 jin shunfu
  • 7 篇 zhang fuzhi
  • 7 篇 wu hongfei
  • 7 篇 tang yong
  • 6 篇 wang lei
  • 6 篇 gu xiaoying
  • 6 篇 yin tengteng
  • 6 篇 gong jibing
  • 6 篇 chen wei
  • 6 篇 han gaowei
  • 6 篇 zhang zhongping
  • 5 篇 wen dong
  • 5 篇 lv mengya
  • 5 篇 liu linlin

语言

  • 182 篇 英文
  • 6 篇 中文
  • 1 篇 其他
检索条件"机构=The Key Lab. for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao"
188 条 记 录,以下是101-110 订阅
排序:
Automatic simulated computation of remote sensing information model based on semantic
收藏 引用
Journal of Chemical and Pharmaceutical Research 2014年 第7期6卷 521-529页
作者: Sun, Shengtao Wu, Aizhi The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province School of Information Science and Engineering Yanshan University Qinhuangdao China College of Vehicles and Energy Yanshan University Qinhuangdao China
This paper discusses the simulated computation methods of remote sensing information model, and tries to put forward a more availab.e solution. It presents our research works on the description and simulation methods ... 详细信息
来源: 评论
VReading Multi-Sensory Reading Platform
VReading Multi-Sensory Reading Platform
收藏 引用
International Conference on virtual Reality and Visualization (ICVRV)
作者: Yuhan Liu Yong Tang Jiayin Song Jing Zhao Mengya Lv Qian Sun Yanshan University The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China Yanshan University College of Economics and Management Qinhuangdao China
The form of books is constantly developing with the upgrading of carrying media, and the emergence of electronic books has greatly shaken the traditional paper books. In recent years, with the combination of artificia... 详细信息
来源: 评论
A community detection method to undirected weighted signed social networks
收藏 引用
Journal of Computational Information systems 2015年 第10期11卷 3623-3632页
作者: Guo, Jingfeng Liu, Miaomiao Liu, Linlin Liu, Yuanying College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China Northeast Petroleum University Daqing China
With regard to the community mining in weighted signed networks and weighted social networks containing only positive links, the AGMA algorithm has some imperfections in the second clustering of vertices. So some impr... 详细信息
来源: 评论
Influence maximization in MicroBlog based on a new user influence ranking method
收藏 引用
Journal of Information and Computational Science 2015年 第9期12卷 3729-3737页
作者: Liu, Yuanying Guo, Jingfeng Hu, Xinzhuan Liu, Miaomiao Zhang, Jilong College of Information Science and Engineering Yanshan University Qinhuangdao China College of Information Technology Hebei University of Economics and Business Shijiazhuang China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
The characteristics of the MicroBlog data are analyzed firstly. Then WeiBo graph is constructed through tweets forwarded path and user influence ranking calculation method which according to the classic PageRank is gi... 详细信息
来源: 评论
New methods of constructing quaternary sequence Pairs
收藏 引用
ICIC Express Letters 2016年 第9期10卷 2177-2183页
作者: Jia, Yanguo Shen, Xiumin Duan, Xiaobei Song, Xiaofei School of Information Sciences and Engineering Yanshan University China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province No. 438 Hebei Ave. Qinhuangdao066004 China
In this letter, new methods of constructing quaternary sequence pairs are presented based on binary sequence pairs with two-level autocorrelation, almost perfect binary sequence pairs and cyclic shift sequences. The q... 详细信息
来源: 评论
The constructions of ternary sequence pairs based on cyclotomy
收藏 引用
ICIC Express Letters 2015年 第6期9卷 1761-1767页
作者: Jia, Yanguo Duan, Xiaobei Shi, Yan Shen, Xiumin School of Information Sciences and Engineering Yanshan University No. 438 Hebei Avenue Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Heibei Province No. 438 Hebei Avenue Qinhuangdao China
In this paper, two new methods of constructing ternary sequence pairs based on cyclotomy are presented. The ternary sequence pairs with three-level correlation are constructed based on cyclotomic numbers of order 4. A... 详细信息
来源: 评论
Mining the important nodes of software based on complex networks
收藏 引用
ICIC Express Letters 2015年 第12期9卷 3263-3268页
作者: Huang, Guoyan Zhang, Peng Li, Yanling Ren, Jiadong College of Information Science and Engineering Yanshan University No. 438 Hebei Ave Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University No. 438 Hebei Ave Qinhuangdao China
The main purpose of studying the software structure is considered to understand and recognize the structure easily by also taking into account the quality of software. In this paper, we define and analyze the node imp... 详细信息
来源: 评论
Mining software behavior pattern from software execution trace
收藏 引用
ICIC Express Letters, Part B: Applications 2015年 第12期6卷 3367-3372页
作者: Ren, Jiadong Wu, Hongfei Yin, Tengteng Li, Yanling Liu, Jiaxin Dong, Jun College of Information Science and Engineering Yanshan University No. 438 Hebei Avenue Qinhuangdao066004 China The Key Laboratory for Computer Virtual Technology System Integration of Hebei Province No. 438 Hebei Avenue Qinhuangdao066004 China
A software execution trace can be viewed as a series of events. An event may correspond to the execution of a basic block, the invocation of a class or a method. These traces imply important unique characteristics of ... 详细信息
来源: 评论
Research on community detection algorithm based on modularity maximum
收藏 引用
ICIC Express Letters 2016年 第12期10卷 2995-3003页
作者: Chen, Jing Wan, Yun College of Information Science and Engineering Yanshan University No. 438 Hebei Avenue Qinhuangdao066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province No. 438 Hebei Avenue Qinhuangdao066004 China
It is well known that the drawbacks of lab.l propagation algorithm are high randomness, weak robustness and easy to form monster community. Many improved methods are proposed constantly in order to avoid these problem... 详细信息
来源: 评论
An identity authentication algorithm in the object name service of the internet of things for heat meter
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第22期4卷 174-181页
作者: Han, Yuanyuan Liu, Yongshan Chen, Wei Liu, Chang Shang, Xuehui Lv, Yongteng The Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province Yanshan University Qinhuangdao City 066004 China College of Information Science and Engineering Yanshan University Qinhuangdao City 066004 China
In the environment of the Internet of Things for heat meter, insecurity of the object name service (ONS) is likely to lead to the leakage of user privacy. In order to solve this problem, an identity authentication alg... 详细信息
来源: 评论