咨询与建议

限定检索结果

文献类型

  • 113 篇 会议
  • 93 篇 期刊文献

馆藏范围

  • 206 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 151 篇 工学
    • 114 篇 计算机科学与技术...
    • 99 篇 软件工程
    • 32 篇 信息与通信工程
    • 18 篇 控制科学与工程
    • 17 篇 生物工程
    • 15 篇 机械工程
    • 12 篇 电气工程
    • 10 篇 光学工程
    • 9 篇 化学工程与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 6 篇 电子科学与技术(可...
    • 5 篇 冶金工程
    • 5 篇 建筑学
    • 4 篇 材料科学与工程(可...
    • 4 篇 交通运输工程
    • 4 篇 安全科学与工程
  • 76 篇 理学
    • 43 篇 数学
    • 19 篇 物理学
    • 18 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 10 篇 化学
    • 6 篇 系统科学
  • 49 篇 管理学
    • 29 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 10 篇 医学
    • 10 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 8 篇 法学
    • 8 篇 社会学
  • 3 篇 农学
  • 1 篇 经济学
  • 1 篇 艺术学

主题

  • 4 篇 feature extracti...
  • 4 篇 forecasting
  • 4 篇 training
  • 3 篇 image segmentati...
  • 3 篇 association rule...
  • 3 篇 redundancy
  • 3 篇 optimization
  • 3 篇 energy consumpti...
  • 3 篇 servers
  • 3 篇 computational mo...
  • 3 篇 websites
  • 3 篇 semantics
  • 3 篇 network security
  • 3 篇 edge computing
  • 3 篇 peer-to-peer com...
  • 3 篇 ubiquitous compu...
  • 3 篇 convolutional ne...
  • 3 篇 ontology
  • 2 篇 internet of thin...
  • 2 篇 fuzzy logic

机构

  • 30 篇 tianjin key lab ...
  • 23 篇 key laboratory o...
  • 20 篇 tianjin key lab....
  • 15 篇 tianjin key lab ...
  • 13 篇 university of ch...
  • 11 篇 intelligent soft...
  • 9 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 7 篇 state key lab of...
  • 6 篇 ministry of educ...
  • 6 篇 state key lab of...
  • 5 篇 university of sc...
  • 5 篇 school of softwa...
  • 5 篇 school of softwa...
  • 5 篇 school of electr...
  • 4 篇 school of sports...
  • 4 篇 dalian universit...
  • 4 篇 college of compu...
  • 4 篇 cambricon techno...
  • 3 篇 key laboratory o...

作者

  • 20 篇 zhang de-gan
  • 15 篇 zhang degan
  • 8 篇 sheng lin
  • 8 篇 de-gan zhang
  • 8 篇 zhang ting
  • 8 篇 guangping xu
  • 8 篇 degan zhang
  • 7 篇 zhang rui
  • 7 篇 hua zhang
  • 6 篇 chen yunji
  • 6 篇 li ling
  • 5 篇 hao yifan
  • 5 篇 ting zhang
  • 5 篇 kai shi
  • 5 篇 wang yuanquan
  • 5 篇 zhou shihua
  • 5 篇 zhang jie
  • 5 篇 yunji chen
  • 5 篇 rui zhang
  • 4 篇 peng hao

语言

  • 197 篇 英文
  • 5 篇 其他
  • 4 篇 中文
检索条件"机构=Key Lab of Intelligent Computing and New Software Technology"
206 条 记 录,以下是61-70 订阅
排序:
A GA-based approach for SQL-injection detection
A GA-based approach for SQL-injection detection
收藏 引用
2013 International Conference on Information Engineering, ICIE 2013
作者: Chen, Jianmin Yang, Lin Zhang, Honghao Liu, Yan College of Computer Science Beijing University of Technology Beijing China Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin China National Computer Virus Emergency Response Center Tianjin China
In order to deal with serious security threats of SQL injection to Web applications, this paper proposes a novel SQL-injection detection method based on genetic algorithm (GA). A unified description for characteristic... 详细信息
来源: 评论
A clustering algorithm use SOM and K-Means in Intrusion Detection
A clustering algorithm use SOM and K-Means in Intrusion Dete...
收藏 引用
International Conference on E-Business and E-Government (ICEE)
作者: Wang, Huai-Bin Yang, Hong-Liang Xu, Zhi-Jian Yuan, Zheng Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China
Improving detection definition is a pivotal problem for intrusion detection. Many intelligent algorithms were used to improve the detection rate and reduce the false rate. Traditional SOM cannot provide the precise cl... 详细信息
来源: 评论
Identifying high-impact sub-structures for convolution kernels in document-level sentiment classification
Identifying high-impact sub-structures for convolution kerne...
收藏 引用
50th Annual Meeting of the Association for Computational Linguistics, ACL 2012
作者: Tu, Zhaopeng He, Yifan Foster, Jennifer Van Genabith, Josef Liu, Qun Lin, Shouxun Key Lab. of Intelligent Info. Processing Institute of Computing Technology CAS China Computer Science Department New York University United States School of Computing Dublin City University Ireland
Convolution kernels support the modeling of complex syntactic information in machinelearning tasks. However, such models are highly sensitive to the type and size of syntactic structure used. It is therefore an import... 详细信息
来源: 评论
A new algorithm of service discovery based on DHT for mobile application
收藏 引用
Journal of Networks 2011年 第10期6卷 1466-1474页
作者: Zhang, De-gan Hu, Yu-xia Wang, Dong Liang, Yan-pin Tianjin Key Lab of Intelligent Computing and Novel software Technology Tianjin University of Technology China Ministry of Education China
In order to solve how to enhance the discovery efficiency and coverage, based on DHT (Distributed Hash Table) and Small World Theory, we put forward a new algorithm of service discovery for mobile application. In trad... 详细信息
来源: 评论
A kind of new web-based method of seamless migration
收藏 引用
International Journal of Advancements in computing technology 2011年 第5期3卷 32-40页
作者: Zhang, De-gan Dai, Wen-bo Kang, Xue-jing Wang, Dong Tianjin Key Lab of Intelligent Computing and Novel software Technology Tianjin University of Technology China Ministry of Education China
To improve the mobile applications under the banner of the Internet of Things, we propose and design a new kind of Web-based method of seamless migration. The method can ensure the media seamless migration fast, smoot... 详细信息
来源: 评论
Joint Deep Matching Model of OCT Retinal Layer Segmentation
收藏 引用
Computers, Materials & Continua 2020年 第6期63卷 1485-1498页
作者: Mei Yang Yuanjie Zheng Weikuan Jia Yunlong He Tongtong Che Jinyu Cong School of Information Science and Engineering at Shandong Normal University Jinan250358China Key Lab of Intelligent Computing and Information Security in Universities of Shandong Shandong Provincial Key Laboratory for Novel Distributed Computer Software TechnologyInstitute of Biomedical SciencesShandong Normal UniversityJinan250358China INSA Lyon University of LyonCNRSInsermVilleurbanne69621 CedexFrance
Optical Coherence Tomography(OCT)is very important in medicine and provide useful diagnostic *** retinal layer thicknesses plays a vital role in pathophysiologic factors of many ocular *** the existing retinal layer s... 详细信息
来源: 评论
Semi-supervised classification method of SAR images using spectral clustering in contourlet domain  4
Semi-supervised classification method of SAR images using sp...
收藏 引用
2019 4th International Seminar on Computer technology, Mechanical and Electrical Engineering, ISCME 2019
作者: Jiang, Kaiwen Zhang, Degan Xu, Haixia Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300384 China Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin China School of Electronic and Information Engineering Tianjin Vocational Institute Tianjin300410 China
A new based on Semi-supervised classification theory for SAR images in contourlet domain is proposed, in this paper. Attempting to get better and faster performance, the PSO algorithm (Particle swarm optimization algo... 详细信息
来源: 评论
A Kind of new parallax algorithm based on symmetric continuous optimization  5
A Kind of new parallax algorithm based on symmetric continuo...
收藏 引用
2020 5th International Seminar on Computer technology, Mechanical and Electrical Engineering, ISCME 2020
作者: Jiang, Kaiwen Zhang, Degan Xu, Haixia Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300384 China Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin China School of Electronic and Information Engineering Tianjin Vocational Institute Tianjin300410 China
With the fast development of 3D imaginations becomes more and more fascination, multi-view stereo based 3D reconstruction is a significant technique for those application. To facilitate the subsequent processing of 3D... 详细信息
来源: 评论
DNS Covert Channel Attack Detection Based on Spatio-Temporal Feature Fusion  22
DNS Covert Channel Attack Detection Based on Spatio-Temporal...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: You, Wei Zhao, Chunlei Shan, Chao Dong, Guozhong Yu, Jie Guan, Yong Tianjin University of Technology Tianjin Key Laboratory of Intelligent Computing and Software New Technology Tianjin China Coordination Center of China Hubei Branch of National Computer Network Emergency Response Technical Team HuBei China Pengcheng Laboratory Department of New Networks Shenzhen China
An increasing number of Advanced Persistent Threat (APT) organizations are utilizing DNS (Domain Name System) covert channels to evade network intrusion detection systems and establish private authoritative servers fo... 详细信息
来源: 评论
Hessian based image structure adaptive gradient vector flow for parametric active contours
Hessian based image structure adaptive gradient vector flow ...
收藏 引用
2010 17th IEEE International Conference on Image Processing, ICIP 2010
作者: Wang, Y.Q. Chen, W.F. Yu, T.L. Zhang, Y.T. Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Lab. of Image Processing Southern Medical University Guangzhou 510515 China Dept. of Radiology General Hospital Tianjin Medical University Tianjin 300052 China
Active contours have been one of the most successful methods for image segmentation during the last two decades, but one of the shortcomings of being unable to converge to concavity is a handicap to its effectiveness.... 详细信息
来源: 评论