Search

Your search keyword '"Kaiquan Shi"' showing total 27 results

Search Constraints

Start Over You searched for: Author "Kaiquan Shi" Remove constraint Author: "Kaiquan Shi" Database OpenAIRE Remove constraint Database: OpenAIRE
27 results on '"Kaiquan Shi"'

Search Results

1. Data block decomposition and intelligent secure acquisition of microdata

4. (αF,αF¯)-Information Fusion Generated by Information Segmentation and Its Intelligent Retrieval

5. Dynamic Boundary of P-Set and Intelligent Acquisition for Two Types of Information Fusion

6. Disaster Rescue Dog IOT Device and Chest Strap Design

7. Inverse packet matrix reasoning model-based the intelligent dynamic separation and acquisition of educational information

8. Outer P-information law reasoning and its application in intelligent fusion and separating of information law

9. The generation of band information law and the dynamic hiding of information law

10. Inverse P-data Models and Data Intelligent Separation

11. Inverse P-Information Law Models and the Reality-Camouflage Intelligent Transformations of Information Image

12. Function P-sets

13. Function S-rough sets and security-authentication of hiding law

14. Function S-rough sets and law identification

15. f-heredity knowledge and f-heredity mining

16. Identification and Reduction of F-Recursive Genetic Information

17. Grey group relation and their general problems (I)

18. The dynamic segmentation characteristics of P-augmented matrix and the dynamic intelligent acquisition of P-information

19. Application of the Central Encryption System in the Dynamic Secret Sharing Scheme (II)

20. Notice of Retraction: P-sets and integrated Knowledge generated -filtration

21. Notice of Retraction: Function S-rough sets and intuitionistic fuzzy recognition of law variation

22. Two Direction S-Rough Decision and Rough Decision Law Mining

23. Function S-Rough Sets Method in Feature Selection

24. Function Two Direction S-Rough Sets Method in Image Hiding

25. Weighted Rough Graph and Its Application

26. Function S-Rough Sets and Recognition of Financial Risk Laws

27. Both-branch fuzzy decision and decision encryption-authentication

Catalog

Books, media, physical & digital resources