相似文献/References:
[1]韩景灵 孙敏.入侵检测报警信息融合系统的构建与实现[J].计算机技术与发展,2007,(06):159.
HAN Jing-ling,SUN Min.Design and Implementation of Intrusion Detection Alert Fusion System[J].,2007,(04):159.
[2]王毅 雷英杰.基于Vague集的多传感器信息融合方法[J].计算机技术与发展,2007,(04):232.
WANG Yi,LEI Ying-jie.Method for Multisensor Information Fusion Based on Vague Sets[J].,2007,(04):232.
[3]方宏彬 张铃.领域信息在信息融合进程中的优化处理[J].计算机技术与发展,2006,(05):31.
FANG Hong-bin,ZHANG Ling.Optimization of Region Information in Process of Information Fusion[J].,2006,(04):31.
[4]陶秀凤 周鸣争.基于支持向量机的多传感器信息融合算法[J].计算机技术与发展,2006,(06):177.
TAO Xiu-feng,ZHOU Ming-zheng.An Algorithm of Multiple Sensor Information Fusion Based on SVM[J].,2006,(04):177.
[5]谢振国 凌捷.网络安全预警系统的研究[J].计算机技术与发展,2011,(11):250.
XIE Zhen-guo,LING Jie.Study of a Network Security and Early-Warning System[J].,2011,(04):250.
[6]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(04):1.
[7]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(04):5.
[8]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(04):13.
[9]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(04):21.
[10]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(04):25.
[11]许少华,张亚光,李学贵.一种基于逆向云变换的混合推理神经网络[J].计算机技术与发展,2015,25(03):118.
XU Shao-hua,ZHANG Ya-guang,LI Xue-gui.A Reasoning Neural Network Based on Reverse Cloud Transformation[J].,2015,25(04):118.
[12]王巍,燕雪峰. 基于面向对象贝叶斯网络的威胁评估模型[J].计算机技术与发展,2016,26(05):7.
WANG Wei,YAN Xue-feng. Threat Source Comprehensive Evaluation Model Based on Object-oriented Bayesian Networks[J].,2016,26(04):7.