咨询与建议

限定检索结果

文献类型

  • 113 篇 会议
  • 93 篇 期刊文献

馆藏范围

  • 206 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 151 篇 工学
    • 114 篇 计算机科学与技术...
    • 99 篇 软件工程
    • 32 篇 信息与通信工程
    • 18 篇 控制科学与工程
    • 17 篇 生物工程
    • 15 篇 机械工程
    • 12 篇 电气工程
    • 10 篇 光学工程
    • 9 篇 化学工程与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 6 篇 电子科学与技术(可...
    • 5 篇 冶金工程
    • 5 篇 建筑学
    • 4 篇 材料科学与工程(可...
    • 4 篇 交通运输工程
    • 4 篇 安全科学与工程
  • 76 篇 理学
    • 43 篇 数学
    • 19 篇 物理学
    • 18 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 10 篇 化学
    • 6 篇 系统科学
  • 49 篇 管理学
    • 29 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 10 篇 医学
    • 10 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 8 篇 法学
    • 8 篇 社会学
  • 3 篇 农学
  • 1 篇 经济学
  • 1 篇 艺术学

主题

  • 4 篇 feature extracti...
  • 4 篇 forecasting
  • 4 篇 training
  • 3 篇 image segmentati...
  • 3 篇 association rule...
  • 3 篇 redundancy
  • 3 篇 optimization
  • 3 篇 energy consumpti...
  • 3 篇 servers
  • 3 篇 computational mo...
  • 3 篇 websites
  • 3 篇 semantics
  • 3 篇 network security
  • 3 篇 edge computing
  • 3 篇 peer-to-peer com...
  • 3 篇 ubiquitous compu...
  • 3 篇 convolutional ne...
  • 3 篇 ontology
  • 2 篇 internet of thin...
  • 2 篇 fuzzy logic

机构

  • 30 篇 tianjin key lab ...
  • 23 篇 key laboratory o...
  • 20 篇 tianjin key lab....
  • 15 篇 tianjin key lab ...
  • 13 篇 university of ch...
  • 11 篇 intelligent soft...
  • 9 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 7 篇 state key lab of...
  • 6 篇 ministry of educ...
  • 6 篇 state key lab of...
  • 5 篇 university of sc...
  • 5 篇 school of softwa...
  • 5 篇 school of softwa...
  • 5 篇 school of electr...
  • 4 篇 school of sports...
  • 4 篇 dalian universit...
  • 4 篇 college of compu...
  • 4 篇 cambricon techno...
  • 3 篇 key laboratory o...

作者

  • 20 篇 zhang de-gan
  • 15 篇 zhang degan
  • 8 篇 sheng lin
  • 8 篇 de-gan zhang
  • 8 篇 zhang ting
  • 8 篇 guangping xu
  • 8 篇 degan zhang
  • 7 篇 zhang rui
  • 7 篇 hua zhang
  • 6 篇 chen yunji
  • 6 篇 li ling
  • 5 篇 hao yifan
  • 5 篇 ting zhang
  • 5 篇 kai shi
  • 5 篇 wang yuanquan
  • 5 篇 zhou shihua
  • 5 篇 zhang jie
  • 5 篇 yunji chen
  • 5 篇 rui zhang
  • 4 篇 peng hao

语言

  • 197 篇 英文
  • 5 篇 其他
  • 4 篇 中文
检索条件"机构=Key Lab of Intelligent Computing and New Software Technology"
206 条 记 录,以下是171-180 订阅
排序:
Spike sorting based on radial basis function network with overlap decomposition
Spike sorting based on radial basis function network with ov...
收藏 引用
2010 6th International Conference on Natural Computation, ICNC'10
作者: Dai, Min Hu, Su-Rui Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300191 Tianjin China
Spike sorting is the essential step in analyzing recording spike signals for studying information processing mechanisms within the nervous system. Overlapping is one of the serious problems in the spike sorting of mul... 详细信息
来源: 评论
The detection of IRC botnet based on abnormal behavior
The detection of IRC botnet based on abnormal behavior
收藏 引用
2010 2nd International Conference on MultiMedia and Information technology, MMIT 2010
作者: Zilong, Wang Jinsong, Wang Wenyi, Huang Chengyi, Xia Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
Botnet is one of the major security threats to Internet. In this paper, botnet communication and attack patterns were introduced, and the discovery method of botnet based on abnormal behavior was studied. For the curr... 详细信息
来源: 评论
Aggregation of interval numbers in group decision making
收藏 引用
ICIC Express Letters 2011年 第4 A期5卷 1057-1062页
作者: Deng, Yong Wu, Jiyi Sun, Xiaohong Xu, Peida Zhang, Yajuan College of Computer and Information Sciences Southwest University Tiansheng Road Beibei District Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University No. 16 Xuelin Street Xiasha Higher Education Zone Hanzhou 310036 China Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Xiangtan University Xiangtan 411105 China College of Food Science and Technology Shanghai Ocean University Hu Cheng Loop-road Lingang New City Shanghai 201306 China School of Electronics and Information Technology Shanghai Jiao Tong University Dongchuan Rd. Shanghai 200240 China
A group of decision-makers may differ in their choice of alternatives while taking a decision. So, in any decision-making problem concerning decisions made by a group, the question arises how best we can aggregate ind... 详细信息
来源: 评论
A pervasive service discovery strategy based on peer to peer model
A pervasive service discovery strategy based on peer to peer...
收藏 引用
作者: Zhang, De-Gan Chen, Xu-Yan Li, Chao Li, Lin-Qing Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300191 China
In order to improve the efficiency of service discovery in the pervasive environment, this paper presents a new strategy of service discovery based on p2p network model. Reference the ring topology of chord algorithm ... 详细信息
来源: 评论
A new method for image fusion based on fuzzy neural network
A new method for image fusion based on fuzzy neural network
收藏 引用
作者: Zhang, De-Gan Wang, Yuan-Yuan Liu, Wei-Wei Zhang, Xiao-Li Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300191 China
In pervasive computing paradigm, the image data obtained by a variety of multimedia, information equipment. In order to make use of these information reasonably and efficiently, a new method for image fusion based on ... 详细信息
来源: 评论
From use case model to service model: An environment ontology based approach
From use case model to service model: An environment ontolog...
收藏 引用
International Conference on Grid and Cloud computing
作者: Zhao, Bin Cai, Guangjun Jin, Zhi Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS Graduate University of the Chinese Academy of Sciences Beijing China Software Engineering Institute Peking University Beijing China
One fundamental problem in services computing is how to bridge the gap between business requirements and various heterogeneous IT services. This involves eliciting business requirements and building a solution accordi... 详细信息
来源: 评论
A clustering algorithm use SOM and K-Means in Intrusion Detection
A clustering algorithm use SOM and K-Means in Intrusion Dete...
收藏 引用
International Conference on E-Business and E-Government (ICEE)
作者: Wang, Huai-Bin Yang, Hong-Liang Xu, Zhi-Jian Yuan, Zheng Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China
Improving detection definition is a pivotal problem for intrusion detection. Many intelligent algorithms were used to improve the detection rate and reduce the false rate. Traditional SOM cannot provide the precise cl... 详细信息
来源: 评论
Hessian based image structure adaptive gradient vector flow for parametric active contours
Hessian based image structure adaptive gradient vector flow ...
收藏 引用
2010 17th IEEE International Conference on Image Processing, ICIP 2010
作者: Wang, Y.Q. Chen, W.F. Yu, T.L. Zhang, Y.T. Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Lab. of Image Processing Southern Medical University Guangzhou 510515 China Dept. of Radiology General Hospital Tianjin Medical University Tianjin 300052 China
Active contours have been one of the most successful methods for image segmentation during the last two decades, but one of the shortcomings of being unable to converge to concavity is a handicap to its effectiveness.... 详细信息
来源: 评论
A new method for image fusion based on fuzzy neural network
A new method for image fusion based on fuzzy neural network
收藏 引用
International Conference on Modelling, Identification and Control (ICMIC)
作者: De-gan Zhang Yuan-yuan Wang Wei-wei Liu Xiao-li Zhang Tianjin Key Lab of Intelligent Computing & Novel software Technology Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology China
In pervasive computing paradigm, the image data obtained by a variety of multimedia, information equipment. In order to make use of these information reasonably and efficiently, a new method for image fusion based on ... 详细信息
来源: 评论
From Use Case Model to Service Model An Environment Ontology Based Approach
From Use Case Model to Service Model An Environment Ontology...
收藏 引用
The Ninth International Conference on Grid and Cloud computing(第九届网格与云计算国际学术会议 GCC 2010)
作者: Guangjun Cai Bin Zhao Zhi Jin Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS Graduate Unive Software Engineering Institute Peking University Beijing China
One fundamental problem in services computing is how to bridge the gap between business requirements and various heterogeneous IT services. This involves eliciting business requirements and building a solution accordi... 详细信息
来源: 评论