咨询与建议

限定检索结果

文献类型

  • 124 篇 期刊文献
  • 117 篇 会议
  • 2 册 图书

馆藏范围

  • 243 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 182 篇 工学
    • 117 篇 计算机科学与技术...
    • 110 篇 软件工程
    • 47 篇 信息与通信工程
    • 31 篇 光学工程
    • 31 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 电子科学与技术(可...
    • 20 篇 电气工程
    • 19 篇 控制科学与工程
    • 19 篇 化学工程与技术
    • 19 篇 生物医学工程(可授...
    • 15 篇 仪器科学与技术
    • 10 篇 安全科学与工程
    • 9 篇 材料科学与工程(可...
    • 7 篇 交通运输工程
    • 6 篇 冶金工程
    • 3 篇 动力工程及工程热...
  • 109 篇 理学
    • 43 篇 数学
    • 38 篇 物理学
    • 33 篇 生物学
    • 21 篇 化学
    • 12 篇 统计学(可授理学、...
    • 3 篇 系统科学
  • 43 篇 管理学
    • 27 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 12 篇 医学
    • 10 篇 临床医学
    • 9 篇 基础医学(可授医学...
    • 4 篇 药学(可授医学、理...
  • 4 篇 法学
    • 3 篇 社会学
  • 2 篇 经济学
  • 2 篇 农学
  • 1 篇 艺术学

主题

  • 8 篇 feature extracti...
  • 7 篇 computer vision
  • 7 篇 training
  • 6 篇 object detection
  • 5 篇 conferences
  • 5 篇 visualization
  • 5 篇 semantics
  • 4 篇 image enhancemen...
  • 4 篇 support vector m...
  • 4 篇 deep learning
  • 4 篇 three-dimensiona...
  • 4 篇 image segmentati...
  • 4 篇 signal processin...
  • 4 篇 image edge detec...
  • 4 篇 speech processin...
  • 4 篇 network security
  • 3 篇 writing
  • 3 篇 optical radar
  • 3 篇 energy consumpti...
  • 3 篇 codes

机构

  • 24 篇 key laboratory o...
  • 20 篇 national enginee...
  • 16 篇 tianjin key lab ...
  • 13 篇 tianjin key lab....
  • 11 篇 guangdong key la...
  • 10 篇 shanxi key labor...
  • 10 篇 tianjin key lab ...
  • 10 篇 shenzhen institu...
  • 10 篇 institutes for r...
  • 9 篇 university of ch...
  • 9 篇 key laboratory o...
  • 9 篇 key laboratory o...
  • 9 篇 guangdong provin...
  • 8 篇 national key lab...
  • 8 篇 college of compu...
  • 7 篇 computer vision ...
  • 7 篇 shenyang institu...
  • 7 篇 computer vision ...
  • 6 篇 key laboratory o...
  • 6 篇 hubei province k...

作者

  • 21 篇 shen linlin
  • 10 篇 sang shengbo
  • 10 篇 zhang de-gan
  • 8 篇 zhang degan
  • 7 篇 linlin shen
  • 6 篇 yu zitong
  • 6 篇 de-gan zhang
  • 6 篇 wang yonghao
  • 6 篇 han dan
  • 6 篇 palaiahnakote sh...
  • 6 篇 li donghui
  • 6 篇 xie weicheng
  • 6 篇 degan zhang
  • 5 篇 umapada pal
  • 5 篇 ye chen
  • 5 篇 han xiaomei
  • 5 篇 tong lu
  • 5 篇 chen yi
  • 5 篇 zhao junqiao
  • 5 篇 hu wei

语言

  • 226 篇 英文
  • 12 篇 其他
  • 5 篇 中文
检索条件"机构=Key Lab of Computer Vision and Intelligent Information System"
243 条 记 录,以下是221-230 订阅
排序:
A new method of image data fusion based on FNN
A new method of image data fusion based on FNN
收藏 引用
2010 6th International Conference on Natural Computation, ICNC'10
作者: Zhang, De-Gan Li, Chao Wang, Dong Zhang, Xiao-Li Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300191 China
The image data are obtained by a variety of multimedia, information equipment, which include amount of information, extensive coverage, and redundancy in ubiquitous computing paradigm. In order to make use of these in... 详细信息
来源: 评论
The detection of IRC botnet based on abnormal behavior
The detection of IRC botnet based on abnormal behavior
收藏 引用
2010 2nd International Conference on MultiMedia and information Technology, MMIT 2010
作者: Zilong, Wang Jinsong, Wang Wenyi, Huang Chengyi, Xia Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
Botnet is one of the major security threats to Internet. In this paper, botnet communication and attack patterns were introduced, and the discovery method of botnet based on abnormal behavior was studied. For the curr... 详细信息
来源: 评论
Spike sorting based on radial basis function network with overlap decomposition
Spike sorting based on radial basis function network with ov...
收藏 引用
2010 6th International Conference on Natural Computation, ICNC'10
作者: Dai, Min Hu, Su-Rui Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300191 Tianjin China
Spike sorting is the essential step in analyzing recording spike signals for studying information processing mechanisms within the nervous system. Overlapping is one of the serious problems in the spike sorting of mul... 详细信息
来源: 评论
A pervasive service discovery strategy based on peer to peer model
A pervasive service discovery strategy based on peer to peer...
收藏 引用
作者: Zhang, De-Gan Chen, Xu-Yan Li, Chao Li, Lin-Qing Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300191 China
In order to improve the efficiency of service discovery in the pervasive environment, this paper presents a new strategy of service discovery based on p2p network model. Reference the ring topology of chord algorithm ... 详细信息
来源: 评论
A new method for image fusion based on fuzzy neural network
A new method for image fusion based on fuzzy neural network
收藏 引用
作者: Zhang, De-Gan Wang, Yuan-Yuan Liu, Wei-Wei Zhang, Xiao-Li Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300191 China
In pervasive computing paradigm, the image data obtained by a variety of multimedia, information equipment. In order to make use of these information reasonably and efficiently, a new method for image fusion based on ... 详细信息
来源: 评论
Technique and application of End-hopping in network defense
Technique and application of End-hopping in network defense
收藏 引用
作者: Zhao, Chunlei Jia, Chunfu Lin, Kai College of Information Technical Science Nankai University Tianjin China Key Lab of Computer Vision and System Tianjin University of Technology Ministry of Education Tianjin China Tianjin Key Lab of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China
End-hopping is a technique proposed in the study of active defense in network security. In this paper, some supplements and modifications are made to the conception of "End-hopping" based on the previous res... 详细信息
来源: 评论
A new method for image fusion based on fuzzy neural network
A new method for image fusion based on fuzzy neural network
收藏 引用
International Conference on Modelling, Identification and Control (ICMIC)
作者: De-gan Zhang Yuan-yuan Wang Wei-wei Liu Xiao-li Zhang Tianjin Key Lab of Intelligent Computing & Novel software Technology Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology China
In pervasive computing paradigm, the image data obtained by a variety of multimedia, information equipment. In order to make use of these information reasonably and efficiently, a new method for image fusion based on ... 详细信息
来源: 评论
Application of multidimensional association rule techniques in manufacturing resource planning system
Application of multidimensional association rule techniques ...
收藏 引用
International Conference on Fuzzy systems and Knowledge Discovery (FSKD)
作者: Fayu Wang Key Laboratory of Computer Vision and System Ministry of Education Ministry of Education Tianjin China Tianjin Key Lab of Intelligent Computing & Novel Software Technology Tianjin university of technology Tianjin China
Association rules mining is a popular and well researched method in data mining research field , its purpose is to mine interesting relations between attributes in transaction database. Classic Apriori algorithm is on... 详细信息
来源: 评论
Design and implementation of a kind of EUPS for mobile service
收藏 引用
Journal of information and Computational Science 2010年 第11期7卷 2248-2257页
作者: Zhang, Xiaodan Zhang, Degan Qiao, Xiaodong Liang, Bing Peng, Hongtao Institute of Scientific and Technical Information of China Beijing 100038 China Tianjin Key Lab. of Intelligent Computing and Novel software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China Beijing Petroleum Managers Training Institute Beijing 100096 China
In order to support mobile service of long-distance monitoring and controlling UPS based on Web, a kind of design and implementation solution of embedded UPS (EUPS) system is brought forward in this paper. The design ... 详细信息
来源: 评论
Research on context-aware computing with uncertainty for proactive service
收藏 引用
International Journal of Modelling, Identification and Control 2009年 第3期8卷 248-255页
作者: Zhang, De-Gan Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education Tianjin 300191 China Key Lab of Industrial Controlling Technology Zhejiang University Hangzhou 310027 China
It is known to all that context-aware computing with uncertainty is an important part of pervasive computing for proactive service. Because multi-source evidence context-aware information with uncertainty is dynamic a... 详细信息
来源: 评论