设为首页 加入收藏
你目前位置: 首页 科研成果 科研论文

科研论文

序号 论文标题 第一作者 通讯作者 刊物名称 发表刊次时间
1 A Novel Energy Efficient Algorithm for Cloud Resource Management 敬思远
International Journal of Knowledge and Language Processing 2013-02-25
2 A Parallel Method for Rough Entropy Computation using MapReduce 敬思远
International Conference on Computational Intelligence and Security 2014-11-25
3 Parallel Computation of Fuzzy Rough Approximation using MapReduce 敬思远
The 2014 International Conference on Computer Science and Software Engineering 2014-11-25
4 A hybrid genetic algorithm for feature subset selection in rough set theory 敬思远
Soft Computing 2014-07-25
5 Keyword Reduction for Text Categorization using Neighborhood Rough Sets 敬思远
International Journal of Computer Science Issues 2015-10-25
6 Measuring Uncertainty in Neighborhood Information System 敬思远
International Journal of Computer Science Issues 2015-01-25
7 基于空间分数阶偏微分方程的图像去噪模型研究 黄果
四川大学学报(工程科学版) 2012-02-25
8 分数阶微积分在图像处理中的研究综述 黄果
计算机应用研究 2012-12-25
9 浅谈以Matlab数字图像处理为例的思维培养 黄果
计算机光盘软件与应用 2014-11-25
10 基于时间-空间分数阶偏微分方程的图像去噪模型 黄果
系统工程与电子技术 2012-08-25
11 非相干光反馈的半导体激光混沌保密通讯性能分析及其仿真 黄果
光电子激光 2012-07-25
12 基于分数阶Riemann-Liouville积分的图像去噪 黄果
计算机应用 2013-01-25
13 带边缘补偿的分数阶积分图像去噪算法 黄果
计算机应用 2014-10-25
14 带边缘补偿的分数阶积分图像去噪算法 黄果
计算机应用 2014-10-25
15 浅谈数字图像处理课程教学改革与设计 黄果
计算机光盘软件与应用 2013-02-25
16 An approach to the security of the energy-efficient internet of things 刘才铭
Energy Education Science and Technology Part A: Energy Science and Research 2013-10-25
17 Artificial Immunity-based Security Response Model for the Internet of Things 刘才铭
Journal of Computers 2013-12-25
18 A Novel Approach to IoT Security Based on Immunology 刘才铭
Proceeding of the 9th International Conference on Computational Intelligence and Security 2013-12-25
19 A Distributed Surveillance Model for Network Security Inspired by Immunology 刘才铭
Lecture Notes in Computer Science 2011-09-25
20 Research on immunity-based intrusion detection technology for the internet of things 刘才铭
Proc. of 2011 7th International Conference on Natural Computation (ICNC2011) 2011-07-25
21 Research on artificial immunity-based monitoring technology of network attack behavior 张雁
Proc. of the 3rd International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC2011) 2011-04-25
22 An immune intrusion detection model based on one-class classification technology 张雁
Proc. of 2011 International Conference on Information Systems and Computational Intelligence (ICISCI2011) 2011-01-25
23 Artificial Immunity-based Anomaly Detection of Network User Behavior 张雁
Procedding of 9th International Conference on Natural Computation 2013-07-25
24 基于克隆选择原理的网络安全监测研究 张雁
成都信息工程学院学报 2012-06-25
25 一种受免疫原理启发的网络入侵行为监测方法 张雁
宜宾学院学报 2012-12-25
26 一种物联网安全威胁危害度计算方法 张雁
信息与电脑(理论版) 2012-03-25
27 The Research on Chinese Coreference Resolution Based on Support Vector Machines 张宜浩
The fourth Interational Conference on Genetic and Evolutionary Computing 2010-12-25
28 基于ERM框架的内部会计控制评价指标体系研究 张锐
财会通讯 2011-09-25
29 模糊评价法在内部会计控制评价中的应用 张锐
企业技术开发 2010-10-25
30 基于共享种子的BitTorrent下载方法研究 门涛
乐山师范学院学报 2009-05-25
[ 1 2 3 4 5 6 7 8 9 10 11 12 ]