咨询与建议

限定检索结果

文献类型

  • 6 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 8 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 3 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 2 篇 electrodes
  • 1 篇 shape optimizati...
  • 1 篇 automation
  • 1 篇 gesture recognit...
  • 1 篇 real-time system...
  • 1 篇 control systems
  • 1 篇 feature extracti...
  • 1 篇 network security
  • 1 篇 computer softwar...
  • 1 篇 classification (...
  • 1 篇 skin

机构

  • 2 篇 institute of inf...
  • 2 篇 school of cyber ...
  • 2 篇 office of networ...
  • 1 篇 shandong univers...
  • 1 篇 informatization ...
  • 1 篇 shandong univers...
  • 1 篇 network security...
  • 1 篇 college of elect...
  • 1 篇 china university...
  • 1 篇 ideological and ...
  • 1 篇 network security...
  • 1 篇 administrative d...
  • 1 篇 research center ...
  • 1 篇 party committee ...
  • 1 篇 national compute...
  • 1 篇 school of govern...
  • 1 篇 natl. comp. netw...
  • 1 篇 shandong univers...
  • 1 篇 college of elect...

作者

  • 1 篇 da chen
  • 1 篇 sun hongtao
  • 1 篇 fenglin qin
  • 1 篇 xu chuanbin
  • 1 篇 wu yuanjiang
  • 1 篇 qin fenglin
  • 1 篇 jiao liang
  • 1 篇 xu wenli
  • 1 篇 yuan ye
  • 1 篇 zhang xinmiao
  • 1 篇 hongrui liang
  • 1 篇 pan huiyao
  • 1 篇 qingyun liu
  • 1 篇 xueting zhou
  • 1 篇 liang hongrui
  • 1 篇 yujia zhu
  • 1 篇 zhou yi
  • 1 篇 yan chen
  • 1 篇 qu xiangwen
  • 1 篇 xingyu fu

语言

  • 8 篇 英文
检索条件"机构=Office of Network Security and Informatization"
8 条 记 录,以下是1-10 订阅
排序:
Simulation Research on Data Acquisition and Supervisory Control System of Distribution network Based on Vector Regression Model
收藏 引用
International Journal of High Speed Electronics and Systems 2025年 第3期34卷
作者: Wu, Shujin Yuan, Ye Wu, Yuanjiang Xu, Wenli Network Security and Informatization Office Tianjin Maritime College Tianjin300350 China Party Committee Safety Work Department Tianjin Maritime College Tianjin300350 China Ideological and Political Education Department Tianjin Maritime College Tianjin300350 China
With the gradual maturity of deep learning and the Internet of Things, a smart grid is urgently needed to be established. For the intellectualization of the power grid, non-intrusive load monitoring (NILM) technology ... 详细信息
来源: 评论
A wearable, real-time sEMG gesture classifier based on E-tattoo and CDF-CNN for prosthetic control  6
A wearable, real-time sEMG gesture classifier based on E-tat...
收藏 引用
6th IEEE Information Technology, networking, Electronic and Automation Control Conference, ITNEC 2023
作者: Xu, Chuanbin Qu, Xiangwen Liang, Hongrui Chen, Da Shandong University of Science and Technology College of Electronics and Information Engineering Qingdao China Shandong University of Science and Technology Office of Network Security and Informatization Qingdao China
Bionic prosthetic hands are essential for the disabled to deal with most affairs of life independently. The surface electromyography(sEMG) is considered as a developing vigorous solution to realize the artificial limb... 详细信息
来源: 评论
Prediction of Cyberspace security Data Based on the Markov Chain Model
收藏 引用
Applied Mathematics and Nonlinear Sciences 2023年 第2期8卷 2539-2548页
作者: Zhang, Xinmiao Network Security and Informatization Office of Tianjin Normal University Tianjin300387 China
In the era of people's access to information, the network has undergone tremendous development, the connection patterns of network attacks have become endless, and the number of attack network methods is increasin... 详细信息
来源: 评论
CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6  28
CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Att...
收藏 引用
28th IEEE Symposium on Computers and Communications, ISCC 2023
作者: Jiao, Liang Zhu, Yujia Fu, Xingyu Zhou, Yi Qin, Fenglin Liu, Qingyun School of Cyber Security University of Chinese Academy of Sciences China Natl. Comp. Network Emergency Response Technical Team/Coordination Center of China Shandong Branch China Institute of Information Engineering Chinese Academy of Sciences China Shandong University Informatization Office China
In this paper, we first show DNS-over-HTTPS (DoH) tunneling detection methods verified to be effective over IPv4 can be applied to IPv6, and then propose a new model called CCSv6, using attention-based convolution neu... 详细信息
来源: 评论
Learner Modeling Framework Based on Learning Analytics  2
Learner Modeling Framework Based on Learning Analytics
收藏 引用
2nd IEEE International Conference on Data Science and Computer Application, ICDSCA 2022
作者: Sun, Hongtao Zheng, Qinhua Zhang, Hengguo Pan, Huiyao Administrative Data Management Center Beijing Normal University Beijing China Research Center of Distance Education Beijing Normal University Beijing China China University of Political Science and Law Network Security and Informatization Office Beijing China School of Government Beijing Normal University Beijing China
Learner modeling is essential to adaptive learning, which is the trend of online learning. Learning analytics is an effective way of learner modeling. This paper suggests a learner modeling framework from the perspect... 详细信息
来源: 评论
Deep learning for image segmentation: Ultrasound image segmentation of thyroid nodules based on U_Net  22
Deep learning for image segmentation: Ultrasound image segme...
收藏 引用
Proceedings of the 6th International Conference on Advances in Image Processing
作者: Xueting Zhou Yan Chen Shoushan Liu College of Electronic Information Engineering Shandong University of Science and Technology China Office of Network Security and Informatization Shandong University of Science and Technology China
The purpose of this article is to investigate the value of deep learning algorithms in the application of ultrasound images of thyroid nodules. Using a dataset of 7288 ultrasound images of thyroid nodules provided by ...
来源: 评论
A wearable, real-time sEMG gesture classifier based on E-tattoo and CDF-CNN for prosthetic control
A wearable, real-time sEMG gesture classifier based on E-tat...
收藏 引用
IEEE Information Technology, networking, Electronic and Automation Control Conference
作者: Chuanbin Xu Xiangwen Qu Hongrui Liang Da Chen College of Electronics and Information Engineering Shandong University of Science and Technology Qingdao China Office of Network Security and Informatization Shandong University of Science and Technology Qingdao China
Bionic prosthetic hands are essential for the disabled to deal with most affairs of life independently. The surface electromyography(sEMG) is considered as a developing vigorous solution to realize the artificial limb... 详细信息
来源: 评论
CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6
CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Att...
收藏 引用
IEEE Symposium on Computers and Communications (ISCC)
作者: Liang Jiao Yujia Zhu Xingyu Fu Yi Zhou Fenglin Qin Qingyun Liu Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences National Computer Network Emergency Response Technical Team/Coordination Center of China Shandong Branch Informatization Office Shandong University
In this paper, we first show DNS-over-HTTPS (DoH) tunneling detection methods verified to be effective over IPv4 can be applied to IPv6, and then propose a new model called CCSv6, using attention-based convolution neu...
来源: 评论