筛选条件 共查询到46条结果
排序方式
A truss-based approach for densest homogeneous subgraph mining in node-attributed graphs

期刊: COMPUTATIONAL INTELLIGENCE, 2021; 37 (2)

In a wide range of graph analysis tasks such as community detection and event detection, densest subgraph mining is important and primitive. With the ......

Multi-angle face expression recognition based on generative adversarial networks

期刊: COMPUTATIONAL INTELLIGENCE, ; ()

Because of the different features of the same facial expressions from different angles, most of the methods are only suitable for face images, and the......

Intelligent document-filling system on mobile devices by document classification and electronization

期刊: COMPUTATIONAL INTELLIGENCE, 2020; 36 (4)

Both of an automatic classification method for original documents based on image feature and a layout analysis method based on rule hypothesis tree ar......

Energy-efficient routing technique for reliable data transmission under the background of big data for disaster region

期刊: COMPUTATIONAL INTELLIGENCE, 2020; 36 (4)

Big data analysis and cloud computing are gaining much interest in various applications including disaster management. One of the major difficulties i......

Web service composition on IoT reliability test based on cross entropy

期刊: COMPUTATIONAL INTELLIGENCE, 2020; 36 (4)

Web service has developed the managed IoT application to let connected devices easily and securely interact with cloud applications and other devices.......

Study on the algorithm for smart community sensor network routing with adaptive optimization via cluster head election

期刊: COMPUTATIONAL INTELLIGENCE, 2020; 36 (4)

To reduce the uneven energy consumption for the data transmission and extend network life of intelligent community sensor network, an adaptive routing......

Research on the clustering algorithm of ocean big data based on self-organizing neural network

期刊: COMPUTATIONAL INTELLIGENCE, 2020; 36 (4)

In the construction of a smart marine, marine big data mining has a significant impact on the growing maritime industry in the Beibu Gulf. Clustering ......

Parallel genetic algorithm for N-Queens problem based on message passing interface-compute unified device architecture

期刊: COMPUTATIONAL INTELLIGENCE, 2020; 36 (4)

N-Queens problem derives three variants: obtaining a specific solution, obtaining a set of solutions and obtaining all solutions. The purpose of the v......

Knowledge mapping of supply chain risk research based on CiteSpace

期刊: COMPUTATIONAL INTELLIGENCE, 2020; 36 (4)

Supply chain risk is a relatively new research field, and research results have been published in journals, and in master and doctoral articles. In th......

Sequence recommendation based on deep learning

期刊: COMPUTATIONAL INTELLIGENCE, 2020; 36 (4)

In order to solve the cold start problem of traditional recommendation algorithm, the sequence change of user interaction information and deep learnin......

Integrated kitchen design and optimization based on the improved particle swarm intelligent algorithm

期刊: COMPUTATIONAL INTELLIGENCE, 2020; 36 (4)

The layout and design of the integrated kitchen can affect the efficiency of people's cooking work greatly. An excellent integrated kitchen design req......

Research on personalized recommendation hybrid algorithm for interactive experience equipment

期刊: COMPUTATIONAL INTELLIGENCE, 2020; 36 (3)

Interactive calligraphy experience equipment has the characteristics of a large amount of data, various types, and strong homogeneity, which makes it ......

Internet of things assisted condition-based support for smart manufacturing industry using learning technique

期刊: COMPUTATIONAL INTELLIGENCE, 2020; 36 (4)

Nowadays, countless industrial IIoT contraptions and sensors are conveyed a sharp plant to gather tremendous information regarding system conditions a......

Smart grid data access control scheme based on blockchain

期刊: COMPUTATIONAL INTELLIGENCE, 2020; 36 (4)

The smart grid communication parties need to process the data by the trusted central node, which will lead to security issues such as single-point att......

共46条页码: 1/4页15条/页