咨询与建议

限定检索结果

文献类型

  • 106 篇 会议
  • 64 篇 期刊文献

馆藏范围

  • 170 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 126 篇 工学
    • 86 篇 计算机科学与技术...
    • 74 篇 软件工程
    • 18 篇 信息与通信工程
    • 18 篇 控制科学与工程
    • 14 篇 生物工程
    • 13 篇 电气工程
    • 11 篇 机械工程
    • 10 篇 化学工程与技术
    • 8 篇 电子科学与技术(可...
    • 7 篇 光学工程
    • 6 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 4 篇 冶金工程
    • 4 篇 动力工程及工程热...
    • 4 篇 交通运输工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 安全科学与工程
  • 70 篇 理学
    • 39 篇 数学
    • 17 篇 物理学
    • 13 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 9 篇 化学
    • 9 篇 系统科学
  • 39 篇 管理学
    • 23 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 7 篇 医学
    • 7 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 11 篇 computer vision
  • 7 篇 active contours
  • 6 篇 laboratories
  • 6 篇 educational tech...
  • 5 篇 image segmentati...
  • 5 篇 convergence
  • 5 篇 semantics
  • 5 篇 equations
  • 4 篇 electrocardiogra...
  • 4 篇 noise robustness
  • 4 篇 forecasting
  • 3 篇 internet of thin...
  • 3 篇 magnetic resonan...
  • 3 篇 image edge detec...
  • 3 篇 redundancy
  • 3 篇 energy consumpti...
  • 3 篇 authentication
  • 3 篇 servers
  • 3 篇 algorithm design...
  • 3 篇 image processing

机构

  • 32 篇 key laboratory o...
  • 17 篇 tianjin key lab ...
  • 14 篇 tianjin key labo...
  • 13 篇 tianjin key lab....
  • 12 篇 tianjin key labo...
  • 10 篇 key laboratory o...
  • 9 篇 tianjin key labo...
  • 9 篇 tianjin key lab ...
  • 9 篇 key laboratory o...
  • 6 篇 engineering rese...
  • 5 篇 school of comput...
  • 5 篇 tianjin key labo...
  • 5 篇 tianjin key labo...
  • 4 篇 college of intel...
  • 4 篇 dalian universit...
  • 4 篇 school of electr...
  • 4 篇 engineering rese...
  • 3 篇 tianjin key labo...
  • 3 篇 tianjin key labo...
  • 3 篇 tianjin key labo...

作者

  • 11 篇 zhang de-gan
  • 10 篇 zhang degan
  • 9 篇 ning hongyun
  • 9 篇 yuanquan wang
  • 8 篇 xiao yingyuan
  • 8 篇 xia chengyi
  • 7 篇 hongyun ning
  • 6 篇 de-gan zhang
  • 6 篇 degan zhang
  • 5 篇 zheng wenguang
  • 5 篇 zhou shihua
  • 5 篇 yingyuan xiao
  • 4 篇 junqing sun
  • 4 篇 liu jinyuan
  • 4 篇 zhang hua
  • 4 篇 sun junqing
  • 4 篇 ting zhang
  • 4 篇 zhao dexin
  • 4 篇 童峥嵘
  • 4 篇 li jiawei

语言

  • 161 篇 英文
  • 5 篇 其他
  • 4 篇 中文
检索条件"机构=Tianjin Intelligent Computing and Software New Technology Key Laboratory"
170 条 记 录,以下是121-130 订阅
排序:
No-go theorem for one-way quantum computing on naturally occurring two-level systems
收藏 引用
Physical Review A 2011年 第5期83卷 050301(R)-050301(R)页
作者: Jianxin Chen Xie Chen Runyao Duan Zhengfeng Ji Bei Zeng Department of Computer Science and Technology Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Department of Physics Massachusetts Institute of Technology Cambridge Massachusetts USA Centre for Quantum Computation and Intelligent Systems (QCIS) Faculty of Engineering and Information Technology University of Technology Sydney New South Wales Australia Perimeter Institute for Theoretical Physics Waterloo Ontario Canada State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Institute for Quantum Computing and Department of Combinatorics and Optimization University of Waterloo Waterloo Ontario Canada
The ground states of some many-body quantum systems can serve as resource states for the one-way quantum computing model, achieving the full power of quantum computation. Such resource states are found, for example, i... 详细信息
来源: 评论
A FUZZY IDENTIFICATION METHOD OF CONTOURS BASED ON CHAIN-CODE FEATURES
A FUZZY IDENTIFICATION METHOD OF CONTOURS BASED ON CHAIN-COD...
收藏 引用
第三届全国智能视觉监控学术会议
作者: Qi Dong Guangping Xu Liu Jing Yanbing Xue Hua Zhang Key Laboratory of Intelligence Computing and New Software Technology TianjinChina300384 Key Laboratory of Computer Vision and SystemMinistry of EducationTianjinChina300384 School of Computer and CommunicationTianjin University of TechnologyTianjinChina300384
The contour analysis and identification are the important aspects in visual surveillance *** paper proposes a fuzzy identification method of ***,according to the description of a contour based on the chain-code method... 详细信息
来源: 评论
A fuzzy identification method of contours based on chain-code features
A fuzzy identification method of contours based on chain-cod...
收藏 引用
2011 3rd Chinese Conference on intelligent Visual Surveillance, IVS 2011
作者: Dong, Qi Xu, Guangping Jing, Liu Xue, Yanbing Zhang, Hua Key Laboratory of Intelligence Computing and New Software Technology Tianjin 300384 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin 300384 China School of Computer and Communication Tianjin University of Technology Tianjin 300384 China
The contour analysis and identification are the important aspects in visual surveillance research. The paper proposes a fuzzy identification method of contours. First, according to the description of a contour based o... 详细信息
来源: 评论
An sir epidemic model with cleared state in complex networks
收藏 引用
ICIC Express Letters 2011年 第9 A期5卷 3053-3058页
作者: Xia, Chengyi Liu, Zichao Sun, Shiwen Wang, Li Chen, Zengqiang Tianjin Key Laboratory of Intelligent Computing and Novel Software Technology Tianjin University of Technology No. 391 Bingshui West Road Xiqing District Tianjin 300384 China Key Laboratory of Computer Vision and System of Ministry of Education Tianjin University of Technology No. 391 Bingshui West Road Xiqing District Tianjin 300384 China Department of Automation Nankai University No. 94 Weijin Road Nankai District Tianjin 300071 China
Based on the susceptible-infective-removed (SIR) compartmental model and real conditions of computer virus outbreaks, we present a new epidemic model with cleared or repair state to investigate epidemic spreading beha... 详细信息
来源: 评论
Employee performance assessment of state-owned enterprise based on super-efficient DEA model
收藏 引用
ICIC Express Letters 2011年 第1期5卷 107-112页
作者: Bai, Chengcheng Ma, Junhai Xia, Chengyi School of Management Tianjin University No. 92 Weijin Road Nankai District Tianjin 300072 China Shandong Luhua Energy Group No. 17 Quancheng Road Jinan 250011 China Tianjin Key Laboratory of Intelligent Computing and Novel Software Technology Tianjin University of Technology No. 263 Red flag south Road Nankai District Tianjin 300191 China
Assessment of employee performance lays the foundation for enterprises to motivate their employees and work out compensation allocation schemes, so how to evaluate employee performance objectively and scientifically b... 详细信息
来源: 评论
Study on the classification of multi-spectral images based on a FSVM multi-class classifier with the binary tree
收藏 引用
Optoelectronics Letters 2010年 第1期6卷 61-64页
作者: 王怀彬 马京华 王春东 Tianjin Key Laboratory of Intelligent Computing and Novel Software Technology and Key Laboratory of Computer Visionand System Ministry of EducationTianjin University of Technology
Due to the features of the multi-spectral images, the result with the usual methods based on the support vector machine (SVM) and binary tree is not satisfactory. In this paper, a fuzzy SVM multi-class classifier with... 详细信息
来源: 评论
Research on adaptive strategy for end-hopping system
收藏 引用
Tongxin Xuebao/Journal on Communications 2011年 第11 A期32卷 51-57页
作者: Zhao, Chun-Lei Jia, Chun-Fu Weng, Chen Lin, Kai College of Information Technical Science Nankai University Tianjin 300071 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300384 China Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China
An adaptive strategy was proposed for EH system. Modules of attack detection, feedback transmission and adaptive control were added to original EH system. They could help to make threats analysis and adjust hopping st... 详细信息
来源: 评论
Spike sorting based on radial basis function network with overlap decomposition
Spike sorting based on radial basis function network with ov...
收藏 引用
2010 6th International Conference on Natural Computation, ICNC'10
作者: Dai, Min Hu, Su-Rui Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300191 Tianjin China
Spike sorting is the essential step in analyzing recording spike signals for studying information processing mechanisms within the nervous system. Overlapping is one of the serious problems in the spike sorting of mul... 详细信息
来源: 评论
The detection of IRC botnet based on abnormal behavior
The detection of IRC botnet based on abnormal behavior
收藏 引用
2010 2nd International Conference on MultiMedia and Information technology, MMIT 2010
作者: Zilong, Wang Jinsong, Wang Wenyi, Huang Chengyi, Xia Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
Botnet is one of the major security threats to Internet. In this paper, botnet communication and attack patterns were introduced, and the discovery method of botnet based on abnormal behavior was studied. For the curr... 详细信息
来源: 评论
A new clustering classification approach based on FCR
A new clustering classification approach based on FCR
收藏 引用
2010 7th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2010
作者: Zhang, De-Gan Liu, Weiwei Kang, Xuejing Chen, Ying Dai, Wenbo Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300191 China
A new clustering classification approach based on fuzzy closeness relationship (FCR) is studied in this paper. As we know, fuzzy clustering classification is one of important and valid methods to knowledge discovery. ... 详细信息
来源: 评论