咨询与建议

限定检索结果

文献类型

  • 841 篇 会议
  • 453 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 1,300 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 898 篇 工学
    • 612 篇 计算机科学与技术...
    • 493 篇 软件工程
    • 178 篇 信息与通信工程
    • 155 篇 控制科学与工程
    • 91 篇 机械工程
    • 80 篇 电气工程
    • 77 篇 生物工程
    • 75 篇 电子科学与技术(可...
    • 52 篇 光学工程
    • 41 篇 生物医学工程(可授...
    • 40 篇 化学工程与技术
    • 37 篇 仪器科学与技术
    • 32 篇 安全科学与工程
    • 31 篇 动力工程及工程热...
    • 24 篇 交通运输工程
    • 21 篇 材料科学与工程(可...
    • 21 篇 建筑学
    • 21 篇 土木工程
  • 428 篇 理学
    • 248 篇 数学
    • 83 篇 生物学
    • 78 篇 物理学
    • 78 篇 系统科学
    • 65 篇 统计学(可授理学、...
    • 35 篇 化学
  • 217 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 33 篇 医学
    • 29 篇 临床医学
    • 21 篇 基础医学(可授医学...
  • 22 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 7 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 40 篇 feature extracti...
  • 29 篇 training
  • 24 篇 computer science
  • 22 篇 support vector m...
  • 21 篇 heuristic algori...
  • 19 篇 computational mo...
  • 18 篇 educational inst...
  • 18 篇 optimization
  • 17 篇 deep learning
  • 17 篇 image segmentati...
  • 17 篇 software enginee...
  • 17 篇 neural networks
  • 17 篇 wireless sensor ...
  • 16 篇 internet of thin...
  • 15 篇 algorithm design...
  • 14 篇 data mining
  • 14 篇 authentication
  • 14 篇 security
  • 14 篇 accuracy
  • 13 篇 monitoring

机构

  • 137 篇 school of comput...
  • 88 篇 school of comput...
  • 57 篇 school of comput...
  • 53 篇 college of compu...
  • 45 篇 school of electr...
  • 43 篇 beijing key labo...
  • 39 篇 school of comput...
  • 37 篇 department of co...
  • 28 篇 college of intel...
  • 21 篇 school of comput...
  • 19 篇 department of co...
  • 19 篇 school of comput...
  • 18 篇 school of comput...
  • 17 篇 school of mechan...
  • 17 篇 tianjin key labo...
  • 16 篇 state key labora...
  • 16 篇 seventh research...
  • 16 篇 school of softwa...
  • 15 篇 school of softwa...
  • 14 篇 school of comput...

作者

  • 38 篇 yingmin jia
  • 37 篇 junping du
  • 31 篇 wu jigang
  • 29 篇 fashan yu
  • 25 篇 jigang wu
  • 16 篇 xiaofei wang
  • 16 篇 ke yongzhen
  • 14 篇 qin jing
  • 14 篇 shun-yan ren
  • 13 篇 xiuhua li
  • 13 篇 victor c. m. leu...
  • 13 篇 du junping
  • 13 篇 jia yingmin
  • 13 篇 guozhi song
  • 12 篇 hung chih-cheng
  • 12 篇 yu fashan
  • 11 篇 yongzhen ke
  • 11 篇 lianhe yang
  • 10 篇 thambipillai sri...
  • 10 篇 jin-liang wang

语言

  • 1,219 篇 英文
  • 58 篇 其他
  • 22 篇 中文
检索条件"机构=School of Computer Science and Software Engineering Tianjin Polytechnic University"
1300 条 记 录,以下是1191-1200 订阅
排序:
A new K-View algorithm for texture image classification using rotation-invariant feature  09
A new K-View algorithm for texture image classification usin...
收藏 引用
24th Annual ACM Symposium on Applied Computing, SAC 2009
作者: Liu, Hong Dai, Siguang Song, Enmin Yang, Cihui Hung, Chih-Cheng School of Computer Science Huazhong University of Science and Technology Wuhan China School of Computing and Software Engineering Southern Polytechnic State University Marietta GA 30060 United States
This paper proposes a new K-View algorithm for texture image classification using rotation-invariant features. These features are statistically derived from characteristic view sets for each texture. Unlike the existi... 详细信息
来源: 评论
A prototype of H.264-based remote video surveillance system
A prototype of H.264-based remote video surveillance system
收藏 引用
2nd International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2009
作者: Yuan, Chunmiao Jin, Zhigang Yang, Qingyong School of Computer Science and Tech. Tianjian University Tianjin China Tianjin Polytechnic University Tianjin China School of Electroic and Info. Engineering Tianjian University Tianjin China Tiandy Digital Tech. Co. Ltd. Tianjin China
The paper proposes a prototype of H.264-based remote network video surveillance system. H.264 is adopted as encoding/decoding technology which has the higher compression rate than other technologies such as MPEG seria... 详细信息
来源: 评论
A adaptive frame rate QoS control in wireless video surveillance system
A adaptive frame rate QoS control in wireless video surveill...
收藏 引用
5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009
作者: Chunmiao, Yuan Zhigang, Jin Qingyong, Yang School of Computer Science and Tech. Tianjian University Tianjin China Tianjin Polytechnic University Tianjin China School of Electronic and Info. Engineering Tianjian University Tianjin China Tiandy Digital Tech. Co. Ltd. Tianjin China
A novel prototype QoS control scheme AFRS for wireless video surveillance system is proposed. AFRS means adaptive frame rate scheme which is terminal-centric and will dynamically adjust the frame rate according to the... 详细信息
来源: 评论
Applying LBP operator to Gabor response for palmprint identification
Applying LBP operator to Gabor response for palmprint identi...
收藏 引用
2009 International Conference on Information engineering and computer science, ICIECS 2009
作者: Shen, Linlin Ji, Zhen Zhang, Lei Guo, Zhenhua School of Computer Science and Software Engineering Shenzhen University Shenzhen China Biometrics Research Centre Department of Computing Hongkong Polytechnic University HongKong Hong Kong
We proposed in this paper an accurate and efficient approach for palmprint identification. In this method, a Gabor wavelet is first convolved with the palmprint image to produce a response image, where LBP is then app... 详细信息
来源: 评论
Research on sharing platform of urban spatial information service
Research on sharing platform of urban spatial information se...
收藏 引用
International Symposium on Spatial Analysis, Spatial-Temporal Data Modeling, and Data Mining
作者: Wang, Gang Hu, Ruipeng School of Resource and Environmental Science Wuhan University China Computer and Information Engineering Department Wuhan Polytechnic University China Tianjin Institute of Surveying and Mapping China
With the development of GIS, intelligent management and networking, sharing the urban spatial information is becoming more and more important. This paper researches four important aspects of building the sharing platf... 详细信息
来源: 评论
Generating test case from functional requirement of Web applications
Generating test case from functional requirement of Web appl...
收藏 引用
2nd International Symposium on Electronic Commerce and Security, ISECS 2009
作者: Zhu, Bin Miao, Huaikou Zeng, Hongwei Chen, Shengbo School of Computer Engineering and Science Shanghai University Shanghai 200072 China School of Computer and Information Shanghai Second Polytechnic University Shanghai 201209 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
E-commerce has been developing rapidly around the world. We run Web application to support e-commerce. Quality of Web applications influences the functionalities and security of e-commerce. Modeling and testing are im... 详细信息
来源: 评论
A Fast Algorithm for Improving the Visual Distance in Fog
收藏 引用
Semiconductor Photonics and Technology 2009年 第4期15卷 241-246页
作者: YANG Wei XIAO Zhi-tao YU Jian YAN Zhi-jie School of Information and Communication Engineering Tianjin Polytechnic University Tianjin 300160 CHN School of Computer Science and Technology Tianjin University Tianjin 300072 CHN
Images captured outdoor usually degenerate because of the bad weather conditions,among which fog,one of the widespread phenomena,affects the video quality *** physical features of fog make the video blurred and the vi... 详细信息
来源: 评论
A directed signature scheme and its application to group key initial distribution  09
A directed signature scheme and its application to group key...
收藏 引用
2nd International Conference on Interaction sciences: Information Technology, Culture and Human, ICIS 2009
作者: Wei, Qian He, Jingsha Shao, Huiying College of Computer Science and Technology Beijing University of Technology Beijing China School of Software Engineering Beijing University of Technology Beijing China Information Engineering Department Xingtai Polytechnic College Xingtai China
Each member entering into a confidential group is unwilling to make the private information, i.e., which group he wants to join, who is the group manager and who issues the admission token, available to the general pu... 详细信息
来源: 评论
Location security in geographic ad hoc routing for VANETs
Location security in geographic ad hoc routing for VANETs
收藏 引用
2009 International Conference on Ultra Modern Telecommunications and Workshops
作者: Ren, Ziwei Li, Wenfan Yang, Qing Wu, Shaoen Chen, Lei Computer Science and Software Engineering Southern Polytechnic State University Marietta GA 30060 United States Computer Science and Software Engineering Auburn University Auburn AL 36849 United States School of Computing University of Southern Mississippi Hattiesburg MS 39406 United States Department of Computer Science Sam Houston State University Huntsville TX 77341 United States
Vehicle-to-vehicle communication among vehicular ad hoc networks (VANETs) plays an important role in providing a high level of safety and convenience to drivers. Geographic routing protocol has been identified to be s... 详细信息
来源: 评论
Scheduling for Uncertain Data Broadcast in Mobile Networks
收藏 引用
Journal of Southwest Jiaotong university(English Edition) 2009年 第3期17卷 192-198页
作者: 许华杰 李国徽 胡小明 余艳玮 School of Computer and Information Shanghai Second Polytechnic University School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering University of Science and Technology of China
With the increasing popularity of wireless sensor network and GPS ( global positioning system), uncertain data as a new type of data brings a new challenge for the traditional data processing methods. Data broadcast... 详细信息
来源: 评论