咨询与建议

限定检索结果

文献类型

  • 106 篇 会议
  • 62 篇 期刊文献

馆藏范围

  • 168 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 124 篇 工学
    • 86 篇 计算机科学与技术...
    • 74 篇 软件工程
    • 18 篇 控制科学与工程
    • 17 篇 信息与通信工程
    • 14 篇 生物工程
    • 12 篇 电气工程
    • 11 篇 机械工程
    • 10 篇 化学工程与技术
    • 8 篇 电子科学与技术(可...
    • 7 篇 光学工程
    • 6 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 4 篇 冶金工程
    • 4 篇 动力工程及工程热...
    • 4 篇 交通运输工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 安全科学与工程
  • 70 篇 理学
    • 39 篇 数学
    • 17 篇 物理学
    • 13 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 9 篇 化学
    • 9 篇 系统科学
  • 39 篇 管理学
    • 23 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 7 篇 医学
    • 7 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 11 篇 computer vision
  • 7 篇 active contours
  • 6 篇 laboratories
  • 6 篇 educational tech...
  • 5 篇 image segmentati...
  • 5 篇 convergence
  • 5 篇 semantics
  • 5 篇 equations
  • 4 篇 electrocardiogra...
  • 4 篇 noise robustness
  • 4 篇 forecasting
  • 3 篇 internet of thin...
  • 3 篇 magnetic resonan...
  • 3 篇 image edge detec...
  • 3 篇 redundancy
  • 3 篇 energy consumpti...
  • 3 篇 authentication
  • 3 篇 servers
  • 3 篇 algorithm design...
  • 3 篇 image processing

机构

  • 32 篇 key laboratory o...
  • 17 篇 tianjin key lab ...
  • 14 篇 tianjin key labo...
  • 13 篇 tianjin key lab....
  • 12 篇 tianjin key labo...
  • 10 篇 key laboratory o...
  • 9 篇 tianjin key labo...
  • 9 篇 tianjin key lab ...
  • 9 篇 key laboratory o...
  • 6 篇 engineering rese...
  • 5 篇 school of comput...
  • 5 篇 tianjin key labo...
  • 5 篇 tianjin key labo...
  • 4 篇 college of intel...
  • 4 篇 dalian universit...
  • 4 篇 school of electr...
  • 4 篇 engineering rese...
  • 3 篇 tianjin key labo...
  • 3 篇 tianjin key labo...
  • 3 篇 tianjin key labo...

作者

  • 10 篇 zhang degan
  • 10 篇 zhang de-gan
  • 9 篇 ning hongyun
  • 9 篇 yuanquan wang
  • 8 篇 xiao yingyuan
  • 8 篇 xia chengyi
  • 7 篇 hongyun ning
  • 6 篇 de-gan zhang
  • 6 篇 degan zhang
  • 5 篇 zheng wenguang
  • 5 篇 zhou shihua
  • 5 篇 yingyuan xiao
  • 4 篇 junqing sun
  • 4 篇 liu jinyuan
  • 4 篇 zhang hua
  • 4 篇 sun junqing
  • 4 篇 ting zhang
  • 4 篇 zhao dexin
  • 4 篇 童峥嵘
  • 4 篇 li jiawei

语言

  • 162 篇 英文
  • 4 篇 中文
  • 2 篇 其他
检索条件"机构=Tianjin Intelligent Computing and Software New Technology Key Laboratory"
168 条 记 录,以下是51-60 订阅
排序:
new Algorithm of QoS Constrained Routing for Node Energy Optimization of Edge computing
New Algorithm of QoS Constrained Routing for Node Energy Opt...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Degan Zhang Jinyu Du Ting Zhang Peng Yang Hongrui Fan Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China
We propose an oriented edge computing nodes energy optimized QoS constrained routing algorithm. The mechanism of this algorithm is to optimize the network energy consumption and extend the network life cycle by creati... 详细信息
来源: 评论
new Method of MSCA for Edge computing
New Method of MSCA for Edge Computing
收藏 引用
IEEE International Conference on Smart Internet of Things (SmartIoT)
作者: De-gan Zhang Hao-li Zhu Ting Zhang Jia-xu Wang Tianjin Key Lab of Intelligent Computing & Novel software Technology Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System (Tianjin University of Technology) Ministry of Education Tianjin
By innovative use of edge computing technology to construct a node data cache model and step-by-step calculation of node channel separation, a multi-strategy channel allocation algorithm (MSCA) for edge computing is p... 详细信息
来源: 评论
An Adaptive POI Recommendation Algorithm by Integrating User’s Temporal and Spatial Features in LBSNs
An Adaptive POI Recommendation Algorithm by Integrating User...
收藏 引用
作者: Miao Li Wenguang Zheng Yingyuan Xiao Xu Jiao Tianjin Key Laboratory of Intelligence Computing & New Software Technology Tianjin University of Technology Department of Liberal Education Tianjin Foreign Studies University
With the rapid development of Internet technology and global positioning technology, location-based social networks(LBSNs)have emerged. Massive check-in data generated by LBSNs can be employed to explore users’ beh... 详细信息
来源: 评论
A new method of mobile Ad Hoc network routing based on improved GF strategy  3
A new method of mobile Ad Hoc network routing based on impro...
收藏 引用
3rd IEEE International Conference on Smart Internet of Things, SmartIoT 2019
作者: Li, Ke Zhang, De-Gan Qiu, Jian-Ning Chen, Lu Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin300384 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education Tianjin China
We propose a new mobile ad hoc network routing method based on improved GF (greedy forwarding) strategy in this paper. In the greedy forwarding phase, the reliable communication area is calculated, and then the qualit... 详细信息
来源: 评论
MedSteGAN: Medical Embedding-Optimized Steganography with Improved GAN
SSRN
收藏 引用
SSRN 2023年
作者: Peng, Yuxiang Fu, Chong Zheng, Yu Tian, Yunjia Cao, Guixing Chen, Junxin School of Computer Science and Engineering Northeastern University Liaoning Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Liaoning Shenyang110819 China Department of Information Engineering The Chinese University of Hong Kong Ma Liu Shui Shatin New Territories Hong Kong Institute of Telecommunication Satellite China Academy of Space Technology Beijing100094 China School of Software Dalian University of Technology Liaoning Dalian116621 China
Medical diagnosing systems contain sensitive information, especially the resulting certificate of diagnosis that involves the patient’s privacy, required to be protected carefully. An effective way is to secretly emb... 详细信息
来源: 评论
Research on Character Vector Generation Method Based on Words and Context
Research on Character Vector Generation Method Based on Word...
收藏 引用
作者: Yiying Wang Hongyun Ning Tianjin Key Laboratory of Intelligence Computing &New Software Technology Tianjin University of Technology Tianjin Key Laboratory of Intelligence Computing & New Software Technology Tianjin University of Technology
In order to solve the problem of character information limitation and the neglect of polysemy,a character vector generation method based on words and context is *** of all,introduce the concept of context *** the fact... 详细信息
来源: 评论
SG-PBFT: A secure and highly efficient blockchain PBFT Consensus Algorithm for internet of vehicles
arXiv
收藏 引用
arXiv 2021年
作者: Xu, Guangquan Liu, Yihua Xing, Jun Luo, Tao Gu, Yonghao Liu, Shaoying Zheng, Xi Vasilakos, Athanasios V. The Big Data School Qingdao Huanghai University Qingdao266427 China College of Intelligence and Computing Tianjin University Tianjin300350 China The International Engineering Institute Tianjin University Tianjin300350 China The College of Intelligence and Computing Tianjin University Tianjin Tianjin300350 China The school of Computer Science Beijing University of Posts and Telecommunications Beijing100876 China The Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing100876 China School of Informatics and Data Science Hiroshima University Japan The Department of Computing Macquarie University SydneyNSW2109 Australia The University of Technology Sydney Australia The Fuzhou University Fuzhou China Lulea University of Technology Lulea Sweden
The Internet of Vehicles (IoV) is an application of the Internet of things (IoT). It faces two main security problems: (1) the central server of the IoV may not be powerful enough to support the centralized authentica... 详细信息
来源: 评论
On Pricing Problem of Two-Channel Reverse Supply Chain Considering Consumer Psychology under “Internet +” Environment
On Pricing Problem of Two-Channel Reverse Supply Chain Consi...
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Yi Chen Bin Sun Meiling Feng Junqing Sun Tianjin Key Laboratory of Intelligent Computing & Novel Software Tianjin University of Technology Tianjin China
In recent years, “Internet +” and e-commerce technology have had a profound impact on the recycling industry. Consumer psychology, as the most important factor in the positive sales chain, has received little attent... 详细信息
来源: 评论
Research and Construction of Word Vector Extension Structure Based on Context
Research and Construction of Word Vector Extension Structure...
收藏 引用
作者: Yiying Wang Hongyun Ning Tianjin Key Laboratory of Intelligence Computing & New Software Technology Tianjin University of Technology
The CBOW(Continuous Bag-of-Words) model is a three-layer forward neural network that predicts the central word vector by the fixed-size window information. In fact,context has a very important role in understanding th... 详细信息
来源: 评论
A novel method of android malware detection based on ensemble learning algorithm  8
A novel method of android malware detection based on ensembl...
收藏 引用
2018 8th International Workshop on Computer Science and Engineering, WCSE 2018
作者: Zhao, Jingyi Mo, Xiuliang Zheng, Qiao Tianjin Intelligent Computing and Software New Technology Key Laboratory School of computer Science and Engineering Tianjin University of Technology China
Android is popular for mobile devices in recent years. As the risk of malware is sharply increasing in Android platform, Android malware detection has become an important research topic. However, the current work show... 详细信息
来源: 评论