>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到clustering相关记录247条 . 查询时间(0.087 秒)
The initial nucleation of ultrafine particle recently attracts more attention as a key factor in visibility degradation during early haze. In this study, we have performed Density Functional Theory (D...
2021年5月21日,《IEEE Transactions on Multimedia》正式刊发了国地质大学计算机学院与国防科技大学、深圳大学以及国家超算济南中心等单位合作完成的研究成果—Consensus Graph Learning for Multi-view Clustering(基于一致图学习的多视图聚类算法),论文的第一作者为中国地质大学计算机学院硕士研究生李正来,通讯作者为唐厂教授。
Clustering analysis is one of the most significant unsupervised machine learning tasks, and it is utilized in various fields associated with privacy issue including bioinformatics, finance and image p...
The automated reconstruction of Building Information Modeling (BIM) objects from point cloud data is still ongoing research. A key aspect is retrieving the proper observations for each object. After s...
Smart city is a connection of physical and social infrastructure together with the information technology to leverage the collective intelligence of the city. Cities will build huge data centres. Thes...
The current global image descriptors are mostly obtained by using the local image features aggregation, which fail to take full account of the details of the image, resulting in the loss of the semant...
The explosive growth of spatial data and widespread use of spatial databases emphasize the need for the spatial data mining. Co-location patterns discovery is an important branch in spatial data minin...
Forecasting the complex deformation patterns (e.g., displacement, velocity, etc.) of landslides is required to prevent property damage and loss of human lives caused by landslide deformation and failu...
Forecasting the complex deformation patterns (e.g., displacement, velocity, etc.) of landslides is required to prevent property damage and loss of human lives caused by landslide deformation and failu...
Side-channel attacks are a threat to cryptographic algorithms running on embedded devices. Public-key cryptosystems, including elliptic curve cryptography (ECC), are particularly vulnerable because th...
The TWEAKEY/STK construction is an increasingly popular approach for designing tweakable block ciphers that notably uses a linear tweakey schedule. Several recent attacks have analyzed the implication...
In distributed storage systems, documents are shared among multiple Cloud providers and stored within their respective storage servers. In social secret sharing-based distributed storage systems, shar...
Locating the boundary parameters of pupil and iris and segmenting the noise free iris portion are the most challenging phases of an automated iris recognition system. In this paper, we have presented ...
Hashtags are creative labels used in micro-blogs to characterize the topic of a message/discussion. Regardless of the use for which they were originally intended, hashtags cannot be used as a means ...
In this study we evaluated forest fire risk in the west of Iran using the Apriori algorithm and fuzzy c-means (FCM) clustering. We used twelve different input parameters to model fire risk in Ilam Pr...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...