咨询与建议

限定检索结果

文献类型

  • 397 篇 会议
  • 233 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 631 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 445 篇 工学
    • 277 篇 计算机科学与技术...
    • 207 篇 软件工程
    • 97 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 48 篇 电子科学与技术(可...
    • 42 篇 机械工程
    • 39 篇 电气工程
    • 37 篇 生物工程
    • 33 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 16 篇 仪器科学与技术
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 光学工程
    • 12 篇 动力工程及工程热...
    • 12 篇 网络空间安全
    • 9 篇 材料科学与工程(可...
  • 215 篇 理学
    • 149 篇 数学
    • 44 篇 系统科学
    • 41 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 13 篇 化学
  • 135 篇 管理学
    • 87 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 23 篇 法学
    • 21 篇 社会学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
    • 9 篇 临床医学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 27 篇 petri nets
  • 24 篇 feature extracti...
  • 16 篇 web services
  • 16 篇 training
  • 13 篇 support vector m...
  • 11 篇 data mining
  • 10 篇 roads
  • 10 篇 optimization
  • 10 篇 computational mo...
  • 10 篇 algorithm design...
  • 9 篇 conferences
  • 9 篇 graph neural net...
  • 9 篇 accuracy
  • 9 篇 synchronization
  • 9 篇 mathematical mod...
  • 8 篇 throughput
  • 8 篇 laboratories
  • 8 篇 schedules
  • 8 篇 mapreduce
  • 8 篇 wireless sensor ...

机构

  • 121 篇 key laboratory o...
  • 86 篇 department of co...
  • 71 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 19 篇 department of el...
  • 14 篇 department of co...
  • 14 篇 department of co...
  • 14 篇 shanghai artific...
  • 13 篇 the key laborato...
  • 13 篇 key laboratory o...
  • 13 篇 department of el...
  • 11 篇 key laboratory o...
  • 11 篇 school of softwa...
  • 10 篇 school of engine...
  • 10 篇 the key laborato...
  • 10 篇 ieee
  • 9 篇 key laboratory o...
  • 9 篇 school of electr...
  • 9 篇 school of electr...

作者

  • 37 篇 changjun jiang
  • 36 篇 jiang changjun
  • 34 篇 zhou mengchu
  • 24 篇 mengchu zhou
  • 21 篇 cheng wang
  • 20 篇 zhao junqiao
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 ye chen
  • 17 篇 li maozhen
  • 17 篇 wang cheng
  • 17 篇 miao duoqian
  • 16 篇 wang hanli
  • 15 篇 chungang yan
  • 13 篇 liu xiwei
  • 13 篇 fuqiang liu
  • 12 篇 xiwei liu
  • 12 篇 xiang-yang li
  • 12 篇 zhijun ding
  • 11 篇 liu guanjun

语言

  • 594 篇 英文
  • 27 篇 中文
  • 13 篇 其他
检索条件"机构=Key Laboratory on Embedded System and Service Computing"
631 条 记 录,以下是251-260 订阅
排序:
Traffic parameters prediction using a three-channel convolutional neural network  2nd
Traffic parameters prediction using a three-channel convolut...
收藏 引用
2nd IFIP TC 12 International Conference on Intelligence Science, ICIS 2017
作者: Zang, Di Wang, Dehai Cheng, Jiujun Tang, Keshuang Li, Xin Department of Computer Science and Technology Tongji University Shanghai China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Department of Transportation Information and Control Engineering Tongji University Shanghai China Shanghai Lujie Electronic Technology Co. Ltd. PudongShanghai China
Traffic three elements consisting of flow, speed and occupancy are very important parameters representing the traffic information. Prediction of them is a fundamental problem of Intelligent Transportation systems (ITS... 详细信息
来源: 评论
Using convolutional neural network with asymmetrical kernels to predict speed of elevated highway  2nd
Using convolutional neural network with asymmetrical kernels...
收藏 引用
2nd IFIP TC 12 International Conference on Intelligence Science, ICIS 2017
作者: Zang, Di Ling, Jiawei Cheng, Jiujun Tang, Keshuang Li, Xin Department of Computer Science and Technology Tongji University Shanghai China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Department of Transportation Information and Control Engineering Tongji University Shanghai China Shanghai Lujie Electronic Technology Co. Ltd. Pudong Shanghai China
In this paper, we present a deep learning based approach to performing the whole-day prediction of the traffic speed for the elevated highway. In order to learn the temporal features of traffic speed data in a hierarc... 详细信息
来源: 评论
Building a Large Scale Wireless Sensor Network for the Industrial Environment  22
Building a Large Scale Wireless Sensor Network for the Indus...
收藏 引用
22nd IEEE International Conference on embedded and Real-Time computing systems and Applications, RTCSA 2016
作者: Yuan, Bo Fu, Chuan Chen, Deji Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai200092 China
Real-time wireless sensor networks in the industrial settings usually consist of tens of nodes. Seldom do we see a network of over 100 wireless nodes. The smaller size is usually sufficient as a typical plane unit is ...
来源: 评论
Classification of bearing faults combining compressive sampling, laplacian score, and support vector machine  43
Classification of bearing faults combining compressive sampl...
收藏 引用
43rd Annual Conference of the IEEE Industrial Electronics Society, IECON 2017
作者: Ahmed, H.O.A. Dennis Wong, M.L. Nandi, A.K. Department of Electronic and Computer Engineering Brunei University London UxbridgeUB8 3PH United Kingdom Heriot-Watt University Malaysia Precinct 5 Putrajaya62200 Malaysia Key Laboratory of Embedded Systems and Service Computing College of Electronic and Information Engineering Tongji University Shanghai China
Rolling element bearings have a pivotal role in rotating machine and their failures are the leading cause of more substantial failures in the machine. In response to their importance, there is a growing body of resear... 详细信息
来源: 评论
Accelerating large-scale human action recognition with GPU-based spark  17th
Accelerating large-scale human action recognition with GPU-b...
收藏 引用
17th Pacific-Rim Conference on Multimedia, PCM 2016
作者: Wang, Hanli Zheng, Xiaobin Xiao, Bo Department of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China
In this paper, a large-scale human action recognition system is proposed which is built upon the combination of the rising big data processing technology Spark and the powerful Graphics Processing Unit (GPU) in order ... 详细信息
来源: 评论
Behavioral authentication method for mobile gesture against resilient user posture  3
Behavioral authentication method for mobile gesture against ...
收藏 引用
2016 3rd International Conference on systems and Informatics, ICSAI 2016
作者: Liu, Qiang Wang, Mimi Zhao, Peihai Yan, Chungang Ding, Zhijun Department of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Tongji University Ministry of Education Shanghai China
The password pattern has become a widely used mobile authentication method. However, there are still some potential security problems since the passwords are easy to be cracked by some malicious software. An important... 详细信息
来源: 评论
A fault prediction method based on modified Genetic Algorithm using BP neural network algorithm
A fault prediction method based on modified Genetic Algorith...
收藏 引用
2016 IEEE International Conference on systems, Man, and Cybernetics, SMC 2016
作者: Liu, Qing Feng, Zhang Liu, Min Shen, Weiming School of Electronic and Information Engineering Tongji University Shanghai201804 China Key Laboratory of Embedded System and Service Computing Tongji University Shanghai201804 China
In order to improve fault forecasting model accuracy of back propagation neural network (BPNN), an improved prediction method of optimized BPNN based on Multilevel Genetic Algorithm (MGA) was proposed. We design new c... 详细信息
来源: 评论
Improving image retrieval by local feature reselection with query expansion  1
收藏 引用
17th Pacific-Rim Conference on Multimedia, PCM 2016
作者: Wang, Hanli Sun, Tianyao Department of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China
A novel approach related to query expansion is proposed to improve image retrieval performance. The proposed approach investigates the problem that not all of the visual features extracted from images are appropriate ... 详细信息
来源: 评论
Adaptive morphological reconstruction for seeded image segmentation
arXiv
收藏 引用
arXiv 2019年
作者: Lei, Tao Jia, Xiaohong Liu, Tongliang Liu, Shigang Meng, Hongying Nandi, Asoke K. School of Electronical and Information Engineering Shaanxi University of Science and Technology Xi’an710021 China School of Computer Science Northwestern Polytechnical University Xi’an710072 China School of Electronical and Information Engineering Shaanxi University of Science and Technology Xi’an710021 China School of Computer Science University of Sydney Sydney Australia School of Computer Science Shaanxi Normal University Xi’an710119 China Department of Electronic and Computer Engineering Brunel University London Uxbridge MiddlesexUB8 3PH United Kingdom Department of Electronic and Computer Engineering Brunel University London Uxbridge MiddlesexUB8 3PH United Kingdom Key Laboratory of Embedded Systems and Service Computing Col- lege of Electronic and Information Engineering Tongji University Shanghai200092 China
—Morphological reconstruction (MR) is often employed by seeded image segmentation algorithms such as watershed transform and power watershed as it is able to filter seeds (regional minima) to reduce over-segmentation... 详细信息
来源: 评论
Behavioral equivalence of security-oriented interactive systems
Behavioral equivalence of security-oriented interactive syst...
收藏 引用
作者: Liu, Guanjun Jiang, Changjun Department of Computer Science Tongji University Shanghai201804 China Key Laboratory of the Ministry of Education for Embedded System and Service Computing Tongji University Shanghai201804 China
In the classical computation theory, the language of a system features the computational behavior of the system but it does not distinguish the determinism and nondeterminism of actions. However, Milner found that the... 详细信息
来源: 评论