咨询与建议

限定检索结果

文献类型

  • 114 篇 会议
  • 96 篇 期刊文献

馆藏范围

  • 210 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 151 篇 工学
    • 114 篇 计算机科学与技术...
    • 99 篇 软件工程
    • 32 篇 信息与通信工程
    • 18 篇 控制科学与工程
    • 17 篇 生物工程
    • 15 篇 机械工程
    • 12 篇 电气工程
    • 10 篇 光学工程
    • 9 篇 化学工程与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 6 篇 电子科学与技术(可...
    • 5 篇 冶金工程
    • 5 篇 建筑学
    • 4 篇 材料科学与工程(可...
    • 4 篇 交通运输工程
    • 4 篇 安全科学与工程
  • 76 篇 理学
    • 43 篇 数学
    • 19 篇 物理学
    • 18 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 10 篇 化学
    • 6 篇 系统科学
  • 49 篇 管理学
    • 29 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 10 篇 医学
    • 10 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 8 篇 法学
    • 8 篇 社会学
  • 3 篇 农学
  • 1 篇 经济学
  • 1 篇 艺术学

主题

  • 4 篇 feature extracti...
  • 4 篇 forecasting
  • 4 篇 training
  • 3 篇 deep learning
  • 3 篇 image segmentati...
  • 3 篇 association rule...
  • 3 篇 redundancy
  • 3 篇 optimization
  • 3 篇 energy consumpti...
  • 3 篇 servers
  • 3 篇 computational mo...
  • 3 篇 websites
  • 3 篇 semantics
  • 3 篇 network security
  • 3 篇 edge computing
  • 3 篇 peer-to-peer com...
  • 3 篇 ubiquitous compu...
  • 3 篇 convolutional ne...
  • 3 篇 ontology
  • 2 篇 internet of thin...

机构

  • 30 篇 tianjin key lab ...
  • 23 篇 key laboratory o...
  • 20 篇 tianjin key lab....
  • 15 篇 tianjin key lab ...
  • 13 篇 university of ch...
  • 11 篇 intelligent soft...
  • 9 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 7 篇 state key lab of...
  • 7 篇 state key lab of...
  • 6 篇 ministry of educ...
  • 5 篇 university of sc...
  • 5 篇 school of softwa...
  • 5 篇 school of softwa...
  • 4 篇 school of sports...
  • 4 篇 dalian universit...
  • 4 篇 college of compu...
  • 4 篇 school of electr...
  • 4 篇 cambricon techno...
  • 4 篇 state key labora...

作者

  • 20 篇 zhang de-gan
  • 16 篇 zhang degan
  • 8 篇 sheng lin
  • 8 篇 de-gan zhang
  • 8 篇 zhang ting
  • 8 篇 guangping xu
  • 8 篇 degan zhang
  • 7 篇 zhang rui
  • 7 篇 hua zhang
  • 6 篇 chen yunji
  • 6 篇 yunji chen
  • 6 篇 li ling
  • 6 篇 rui zhang
  • 5 篇 hao yifan
  • 5 篇 ting zhang
  • 5 篇 kai shi
  • 5 篇 wang yuanquan
  • 5 篇 zhou shihua
  • 5 篇 zhang jie
  • 5 篇 ling li

语言

  • 201 篇 英文
  • 5 篇 其他
  • 4 篇 中文
检索条件"机构=Key Lab of Intelligent Computing and New Software Technology"
210 条 记 录,以下是171-180 订阅
排序:
Application of multidimensional association rule techniques in manufacturing resource planning system
Application of multidimensional association rule techniques ...
收藏 引用
2010 7th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2010
作者: Wang, Fayu Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Ministry of Education Tianjin 300191 China
Association rules mining is a popular and well researched method in data mining research field , its purpose is to mine interesting relations between attributes in transaction database. Classic Apriori algorithm is on... 详细信息
来源: 评论
A new clustering classification approach based on FCR
A new clustering classification approach based on FCR
收藏 引用
2010 7th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2010
作者: Zhang, De-Gan Liu, Weiwei Kang, Xuejing Chen, Ying Dai, Wenbo Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300191 China
A new clustering classification approach based on fuzzy closeness relationship (FCR) is studied in this paper. As we know, fuzzy clustering classification is one of important and valid methods to knowledge discovery. ... 详细信息
来源: 评论
Research on face detection based on combination of Haar and skin colors features
Research on face detection based on combination of Haar and ...
收藏 引用
2010 3rd International Congress on Image and Signal Processing, CISP 2010
作者: Wang, Fayu Qi, Baokun Xing, Yong Lu, Baoan Ministry of Education Tianjin University of Technology Tianjin 300191 China Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China
Face detection and recognition is a hot research subject in the fields of image processing, pattern recognition and computer vision, which emphasize on the enhancement of the precision of detection in as short a time ... 详细信息
来源: 评论
A new method of image data fusion based on FNN
A new method of image data fusion based on FNN
收藏 引用
2010 6th International Conference on Natural Computation, ICNC'10
作者: Zhang, De-Gan Li, Chao Wang, Dong Zhang, Xiao-Li Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300191 China
The image data are obtained by a variety of multimedia, information equipment, which include amount of information, extensive coverage, and redundancy in ubiquitous computing paradigm. In order to make use of these in... 详细信息
来源: 评论
Spike sorting based on radial basis function network with overlap decomposition
Spike sorting based on radial basis function network with ov...
收藏 引用
2010 6th International Conference on Natural Computation, ICNC'10
作者: Dai, Min Hu, Su-Rui Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300191 Tianjin China
Spike sorting is the essential step in analyzing recording spike signals for studying information processing mechanisms within the nervous system. Overlapping is one of the serious problems in the spike sorting of mul... 详细信息
来源: 评论
The detection of IRC botnet based on abnormal behavior
The detection of IRC botnet based on abnormal behavior
收藏 引用
2010 2nd International Conference on MultiMedia and Information technology, MMIT 2010
作者: Zilong, Wang Jinsong, Wang Wenyi, Huang Chengyi, Xia Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
Botnet is one of the major security threats to Internet. In this paper, botnet communication and attack patterns were introduced, and the discovery method of botnet based on abnormal behavior was studied. For the curr... 详细信息
来源: 评论
Aggregation of interval numbers in group decision making
收藏 引用
ICIC Express Letters 2011年 第4 A期5卷 1057-1062页
作者: Deng, Yong Wu, Jiyi Sun, Xiaohong Xu, Peida Zhang, Yajuan College of Computer and Information Sciences Southwest University Tiansheng Road Beibei District Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University No. 16 Xuelin Street Xiasha Higher Education Zone Hanzhou 310036 China Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Xiangtan University Xiangtan 411105 China College of Food Science and Technology Shanghai Ocean University Hu Cheng Loop-road Lingang New City Shanghai 201306 China School of Electronics and Information Technology Shanghai Jiao Tong University Dongchuan Rd. Shanghai 200240 China
A group of decision-makers may differ in their choice of alternatives while taking a decision. So, in any decision-making problem concerning decisions made by a group, the question arises how best we can aggregate ind... 详细信息
来源: 评论
A pervasive service discovery strategy based on peer to peer model
A pervasive service discovery strategy based on peer to peer...
收藏 引用
作者: Zhang, De-Gan Chen, Xu-Yan Li, Chao Li, Lin-Qing Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300191 China
In order to improve the efficiency of service discovery in the pervasive environment, this paper presents a new strategy of service discovery based on p2p network model. Reference the ring topology of chord algorithm ... 详细信息
来源: 评论
A new method for image fusion based on fuzzy neural network
A new method for image fusion based on fuzzy neural network
收藏 引用
作者: Zhang, De-Gan Wang, Yuan-Yuan Liu, Wei-Wei Zhang, Xiao-Li Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300191 China
In pervasive computing paradigm, the image data obtained by a variety of multimedia, information equipment. In order to make use of these information reasonably and efficiently, a new method for image fusion based on ... 详细信息
来源: 评论
From use case model to service model: An environment ontology based approach
From use case model to service model: An environment ontolog...
收藏 引用
International Conference on Grid and Cloud computing
作者: Zhao, Bin Cai, Guangjun Jin, Zhi Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS Graduate University of the Chinese Academy of Sciences Beijing China Software Engineering Institute Peking University Beijing China
One fundamental problem in services computing is how to bridge the gap between business requirements and various heterogeneous IT services. This involves eliciting business requirements and building a solution accordi... 详细信息
来源: 评论