咨询与建议

限定检索结果

文献类型

  • 106 篇 会议
  • 62 篇 期刊文献

馆藏范围

  • 168 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 125 篇 工学
    • 87 篇 计算机科学与技术...
    • 75 篇 软件工程
    • 18 篇 信息与通信工程
    • 18 篇 控制科学与工程
    • 14 篇 生物工程
    • 13 篇 电气工程
    • 11 篇 机械工程
    • 10 篇 化学工程与技术
    • 8 篇 电子科学与技术(可...
    • 7 篇 光学工程
    • 6 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 4 篇 冶金工程
    • 4 篇 动力工程及工程热...
    • 4 篇 交通运输工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 安全科学与工程
  • 70 篇 理学
    • 39 篇 数学
    • 17 篇 物理学
    • 13 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 9 篇 化学
    • 9 篇 系统科学
  • 39 篇 管理学
    • 23 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 7 篇 医学
    • 7 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 11 篇 computer vision
  • 7 篇 active contours
  • 6 篇 laboratories
  • 6 篇 educational tech...
  • 5 篇 image segmentati...
  • 5 篇 convergence
  • 5 篇 semantics
  • 5 篇 equations
  • 4 篇 electrocardiogra...
  • 4 篇 noise robustness
  • 4 篇 forecasting
  • 3 篇 internet of thin...
  • 3 篇 magnetic resonan...
  • 3 篇 image edge detec...
  • 3 篇 redundancy
  • 3 篇 energy consumpti...
  • 3 篇 authentication
  • 3 篇 servers
  • 3 篇 algorithm design...
  • 3 篇 image processing

机构

  • 32 篇 key laboratory o...
  • 17 篇 tianjin key lab ...
  • 14 篇 tianjin key labo...
  • 13 篇 tianjin key lab....
  • 12 篇 tianjin key labo...
  • 10 篇 key laboratory o...
  • 9 篇 tianjin key labo...
  • 9 篇 tianjin key lab ...
  • 9 篇 key laboratory o...
  • 6 篇 engineering rese...
  • 5 篇 school of comput...
  • 5 篇 tianjin key labo...
  • 5 篇 tianjin key labo...
  • 5 篇 school of electr...
  • 4 篇 college of intel...
  • 4 篇 dalian universit...
  • 4 篇 engineering rese...
  • 3 篇 tianjin key labo...
  • 3 篇 tianjin key labo...
  • 3 篇 tianjin key labo...

作者

  • 10 篇 zhang de-gan
  • 9 篇 zhang degan
  • 9 篇 ning hongyun
  • 9 篇 yuanquan wang
  • 8 篇 xiao yingyuan
  • 8 篇 xia chengyi
  • 7 篇 hongyun ning
  • 7 篇 degan zhang
  • 6 篇 de-gan zhang
  • 5 篇 zheng wenguang
  • 5 篇 zhou shihua
  • 5 篇 yingyuan xiao
  • 4 篇 junqing sun
  • 4 篇 liu jinyuan
  • 4 篇 zhang hua
  • 4 篇 sun junqing
  • 4 篇 ting zhang
  • 4 篇 zhao dexin
  • 4 篇 童峥嵘
  • 4 篇 li jiawei

语言

  • 161 篇 英文
  • 4 篇 中文
  • 3 篇 其他
检索条件"机构=Tianjin Intelligent Computing and Software New Technology Key Laboratory"
168 条 记 录,以下是21-30 订阅
排序:
ECG Based Identification by Deep Learning  12th
ECG Based Identification by Deep Learning
收藏 引用
12th Chinese Conference on Biometric Recognition, CCBR 2017
作者: Zheng, Gang Ji, Shengzhen Dai, Min Sun, Ying Tianjin Key Laboratory of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin300384 China
Strategies were proposed for Electrocardiogram (ECG) based identification. Firstly, a selecting mechanism based on information entropy was used to obtain whole heart beat signal;Secondly, a Depth Neural Network (DNN) ... 详细信息
来源: 评论
Research and implementation of continuous wave radar ranging method based on tri-frequency
收藏 引用
High technology Letters 2014年 第2期20卷 111-116页
作者: 袁其平 Fan Lijieare Tong Zhengrong Yang Xiufeng Cao Ye School of Electronics Information Engineering Tianjin University of Technology Key Laboratory of Film Electronics and Communication Devices and Key Laboratory of Intelligent Computing and Novel Software Technolgy School of Computer and Communication EngineeringTianjin University of Technology
In the traditional dual-frequency radar ranging system,there is a contradiction between ranging precision and ranging *** a tri-frequency ranging method is *** principle of the tri-frequency ranging is that the distan... 详细信息
来源: 评论
The improvement of HDFS authentication model based on token push mechanism  18
The improvement of HDFS authentication model based on token ...
收藏 引用
2018 International Conference on Big Data and computing, ICBDC 2018
作者: Wang, Guiyuan Ning, Hongyun Tianjin Key Laboratory of Intelligence Computing and New Software Technology Tianjin China
In order to solve the problems of single point overload, repeated authentication, replay attack and time synchronization in the security authentication of HDFS, an improved Kerberos protocol based on token push mechan... 详细信息
来源: 评论
Microblog text clustering based on BK-means algorithm  8
Microblog text clustering based on BK-means algorithm
收藏 引用
2018 8th International Workshop on Computer Science and Engineering, WCSE 2018
作者: Li, Qianru Mo, Xiuliang Wang, Chundong Tianjin Intelligent Computing and Software New Technology Key Laboratory School of Computer Science and Engineering Tianjin university of technology Tianjin300384 China
In recent years, the increasing popularity of social media such as WeChat and Weibo has facilitated the communication among people. However, due to the characteristics like large scale, fast propagation, low quality a... 详细信息
来源: 评论
A novel policy iteration algorithm for solving the optimal consensus control problem of a discrete-time multiagent system with unknown dynamics
收藏 引用
Science China(Information Sciences) 2023年 第8期66卷 269-270页
作者: Wenkai XU Li WANG Shiwen SUN Chengyi XIA Zengqiang CHEN Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology The Engineering Research Center of Learning-Based Intelligent System Ministry of Education College of Artificial Intelligence Nankai University
At present, an increasing number of researchers have noticed the importance of optimal consensus control(OCC) of multiagent systems(MASs) because of their rich practical applications in various areas [1–4]. To accomp...
来源: 评论
keywords extraction method based on two-way feature fusion  2
Keywords extraction method based on two-way feature fusion
收藏 引用
2nd International Conference on Machine Learning and intelligent Systems Engineering, MLISE 2022
作者: Li, Yongrui Ning, Hongyun Tianjin University Of Technology Tianjin Key Laboratory Of Intelligence Computing & New Software Technology Tianjin China
In order to improve the accuracy of keyword extraction, an improved method was proposed to solve the problem of missing keywords in traditional TF-IDF keyword extraction algorithm. In this method, two routes are used ... 详细信息
来源: 评论
TF-IDF keyword extraction method combining context and semantic classification  2020
TF-IDF keyword extraction method combining context and seman...
收藏 引用
3rd International Conference on Data Science and Information technology, DSIT 2020
作者: Wang, Xinyun Ning, Hongyun Tianjin Key Laboratory of Intelligence Computing and New Software Technology Tianjin University of Technology Tianjin China
keyword extraction plays the same role as the cornerstone in the field of natural language processing. Text classification, information retrieval, abstract generation and text clustering are all based on keyword extra... 详细信息
来源: 评论
Text keyword Extraction Method Combined with Dependent Syntax Analysis  22
Text Keyword Extraction Method Combined with Dependent Synta...
收藏 引用
2nd International Conference on Control and intelligent Robotics, ICCIR 2022
作者: Li, Yongrui Ning, Hongyun Tianjin Key Laboratory of Intelligence Computing & New Software Technology Tianjin University of Technology Tianjin China
In order to improve the accuracy of key word extraction, an improved TF-IDF method was proposed to solve the problems that traditional TF-IDF keyword extraction algorithm could not recognize new words and polysemous w... 详细信息
来源: 评论
Chinese keyword extraction method based on context and word classification
Chinese keyword extraction method based on context and word ...
收藏 引用
2020 International Conference on Computer Information and Big Data Applications, CIBDA 2020
作者: Wang, Xinyun Ning, Hongyun Tianjin Key Laboratory of Intelligence Computing &new Software Technology Tianjin University of Technology Tianjin China
The traditional keyword extraction algorithm TextRank increases the weight of the central word through the correlation between the words and the central word in the co-occurrence window, but the number of words in the... 详细信息
来源: 评论
Research on character vector generation method based on words and context  2019
Research on character vector generation method based on word...
收藏 引用
2019 International Conference on Artificial Intelligence and Computer Science, AICS 2019
作者: Wang, Yiying Ning, Hongyun Tianjin Key Laboratory of Intelligence Computing and New Software Technology Tianjin University of Technology Tianjin China
In order to solve the problem of character information limitation and the neglect of polysemy, a character vector generation method based on words and context is proposed. First of all, introduce the concept of contex... 详细信息
来源: 评论