咨询与建议

限定检索结果

文献类型

  • 106 篇 会议
  • 62 篇 期刊文献

馆藏范围

  • 168 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 125 篇 工学
    • 87 篇 计算机科学与技术...
    • 75 篇 软件工程
    • 18 篇 信息与通信工程
    • 18 篇 控制科学与工程
    • 14 篇 生物工程
    • 13 篇 电气工程
    • 11 篇 机械工程
    • 10 篇 化学工程与技术
    • 8 篇 电子科学与技术(可...
    • 7 篇 光学工程
    • 6 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 4 篇 冶金工程
    • 4 篇 动力工程及工程热...
    • 4 篇 交通运输工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 安全科学与工程
  • 70 篇 理学
    • 39 篇 数学
    • 17 篇 物理学
    • 13 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 9 篇 化学
    • 9 篇 系统科学
  • 39 篇 管理学
    • 23 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 7 篇 医学
    • 7 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 11 篇 computer vision
  • 7 篇 active contours
  • 6 篇 laboratories
  • 6 篇 educational tech...
  • 5 篇 image segmentati...
  • 5 篇 convergence
  • 5 篇 semantics
  • 5 篇 equations
  • 4 篇 electrocardiogra...
  • 4 篇 noise robustness
  • 4 篇 forecasting
  • 3 篇 internet of thin...
  • 3 篇 magnetic resonan...
  • 3 篇 image edge detec...
  • 3 篇 redundancy
  • 3 篇 energy consumpti...
  • 3 篇 authentication
  • 3 篇 servers
  • 3 篇 algorithm design...
  • 3 篇 image processing

机构

  • 32 篇 key laboratory o...
  • 17 篇 tianjin key lab ...
  • 14 篇 tianjin key labo...
  • 13 篇 tianjin key lab....
  • 12 篇 tianjin key labo...
  • 10 篇 key laboratory o...
  • 9 篇 tianjin key labo...
  • 9 篇 tianjin key lab ...
  • 9 篇 key laboratory o...
  • 6 篇 engineering rese...
  • 5 篇 school of comput...
  • 5 篇 tianjin key labo...
  • 5 篇 tianjin key labo...
  • 5 篇 school of electr...
  • 4 篇 college of intel...
  • 4 篇 dalian universit...
  • 4 篇 engineering rese...
  • 3 篇 tianjin key labo...
  • 3 篇 tianjin key labo...
  • 3 篇 tianjin key labo...

作者

  • 10 篇 zhang de-gan
  • 9 篇 zhang degan
  • 9 篇 ning hongyun
  • 9 篇 yuanquan wang
  • 8 篇 xiao yingyuan
  • 8 篇 xia chengyi
  • 7 篇 hongyun ning
  • 7 篇 degan zhang
  • 6 篇 de-gan zhang
  • 5 篇 zheng wenguang
  • 5 篇 zhou shihua
  • 5 篇 yingyuan xiao
  • 4 篇 junqing sun
  • 4 篇 liu jinyuan
  • 4 篇 zhang hua
  • 4 篇 sun junqing
  • 4 篇 ting zhang
  • 4 篇 zhao dexin
  • 4 篇 童峥嵘
  • 4 篇 li jiawei

语言

  • 161 篇 英文
  • 4 篇 中文
  • 3 篇 其他
检索条件"机构=Tianjin Intelligent Computing and Software New Technology Key Laboratory"
168 条 记 录,以下是61-70 订阅
排序:
Spike sorting based on radial basis function network with overlap decomposition
Spike sorting based on radial basis function network with ov...
收藏 引用
作者: Dai, Min Hu, Su-Rui Qi, Jia Tianjin Key Lab of Intelligent Computing and Novel Software Technology School of Computer and Communication Engineering Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
Spike sorting is the essential step in analyzing recording spike signals for studying information processing mechanisms within the nervous system. Overlapping is one of the most serious problems in the spike sorting f... 详细信息
来源: 评论
A clustering algorithm use SOM and K-Means in Intrusion Detection
A clustering algorithm use SOM and K-Means in Intrusion Dete...
收藏 引用
International Conference on E-Business and E-Government (ICEE)
作者: Wang, Huai-Bin Yang, Hong-Liang Xu, Zhi-Jian Yuan, Zheng Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China
Improving detection definition is a pivotal problem for intrusion detection. Many intelligent algorithms were used to improve the detection rate and reduce the false rate. Traditional SOM cannot provide the precise cl... 详细信息
来源: 评论
DNS Covert Channel Attack Detection Based on Spatio-Temporal Feature Fusion  22
DNS Covert Channel Attack Detection Based on Spatio-Temporal...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: You, Wei Zhao, Chunlei Shan, Chao Dong, Guozhong Yu, Jie Guan, Yong Tianjin University of Technology Tianjin Key Laboratory of Intelligent Computing and Software New Technology Tianjin China Coordination Center of China Hubei Branch of National Computer Network Emergency Response Technical Team HuBei China Pengcheng Laboratory Department of New Networks Shenzhen China
An increasing number of Advanced Persistent Threat (APT) organizations are utilizing DNS (Domain Name System) covert channels to evade network intrusion detection systems and establish private authoritative servers fo... 详细信息
来源: 评论
Dynamic Random Route Mutation Mechanism for Moving Target Defense in SDN  6
Dynamic Random Route Mutation Mechanism for Moving Target De...
收藏 引用
6th International Symposium on Computer and Information Processing technology, ISCIPT 2021
作者: Zhang, Bofeng Han, Li Sun, Shimin Tianjin University of Technology School of Computer Science and Engineering Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China Tiangong University Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Computer Science and Technology Tianjin China
Moving Target Defense (MTD) is commonly used in changing the asymmetric situation between attack and defense in cyberspace. Route mutation is a vital branch of MTD. Current route mutation methods still have some limit... 详细信息
来源: 评论
A pervasive service discovery strategy based on peer to peer model
A pervasive service discovery strategy based on peer to peer...
收藏 引用
作者: Zhang, De-Gan Chen, Xu-Yan Li, Chao Li, Lin-Qing Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300191 China
In order to improve the efficiency of service discovery in the pervasive environment, this paper presents a new strategy of service discovery based on p2p network model. Reference the ring topology of chord algorithm ... 详细信息
来源: 评论
A new method for image fusion based on fuzzy neural network
A new method for image fusion based on fuzzy neural network
收藏 引用
作者: Zhang, De-Gan Wang, Yuan-Yuan Liu, Wei-Wei Zhang, Xiao-Li Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology 300191 China
In pervasive computing paradigm, the image data obtained by a variety of multimedia, information equipment. In order to make use of these information reasonably and efficiently, a new method for image fusion based on ... 详细信息
来源: 评论
Node Coupling for Inferring Networks from Short Time Series  5th
Node Coupling for Inferring Networks from Short Time Series
收藏 引用
5th Chinese Conference on Swarm Intelligence and Cooperative Control, CCSICC 2021
作者: Li, Hang Wang, Li Xia, Chengyi Tianjin University of Technology Tianjin300382 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Engineering Research Center of Learning-Based Intelligent System Ministry of Education Beijing China
Commonly abstracted as a set of units, the complex systems in the real world are interconnected with each other using the specific dynamical methods. However, in practice, there is nothing else but the performances of... 详细信息
来源: 评论
A Kind of new parallax algorithm based on symmetric continuous optimization  5
A Kind of new parallax algorithm based on symmetric continuo...
收藏 引用
2020 5th International Seminar on Computer technology, Mechanical and Electrical Engineering, ISCME 2020
作者: Jiang, Kaiwen Zhang, Degan Xu, Haixia Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300384 China Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin China School of Electronic and Information Engineering Tianjin Vocational Institute Tianjin300410 China
With the fast development of 3D imaginations becomes more and more fascination, multi-view stereo based 3D reconstruction is a significant technique for those application. To facilitate the subsequent processing of 3D... 详细信息
来源: 评论
Semi-supervised classification method of SAR images using spectral clustering in contourlet domain  4
Semi-supervised classification method of SAR images using sp...
收藏 引用
2019 4th International Seminar on Computer technology, Mechanical and Electrical Engineering, ISCME 2019
作者: Jiang, Kaiwen Zhang, Degan Xu, Haixia Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300384 China Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin China School of Electronic and Information Engineering Tianjin Vocational Institute Tianjin300410 China
A new based on Semi-supervised classification theory for SAR images in contourlet domain is proposed, in this paper. Attempting to get better and faster performance, the PSO algorithm (Particle swarm optimization algo... 详细信息
来源: 评论
Ecg Based Identification Under Different Physical Status
Ecg Based Identification Under Different Physical Status
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Gang Zheng Hong-Yuan Zhang Shen-Zhen Ji Tianjin Key Laboratory of Intelligent Computing and Software New Technique Tianjin University of Technology Tianjin China
Relatively stable feature of Electrocardiogram (ECG) waveform in ECG based identification authentication is an important issue to be discovered in biometric. It can benefit the biomaterial which is weak and easy to be... 详细信息
来源: 评论