咨询与建议

限定检索结果

文献类型

  • 844 篇 会议
  • 459 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 1,309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 905 篇 工学
    • 615 篇 计算机科学与技术...
    • 500 篇 软件工程
    • 177 篇 信息与通信工程
    • 150 篇 控制科学与工程
    • 92 篇 机械工程
    • 82 篇 电气工程
    • 79 篇 电子科学与技术(可...
    • 78 篇 生物工程
    • 53 篇 光学工程
    • 46 篇 化学工程与技术
    • 44 篇 生物医学工程(可授...
    • 38 篇 仪器科学与技术
    • 38 篇 动力工程及工程热...
    • 32 篇 安全科学与工程
    • 22 篇 交通运输工程
    • 21 篇 材料科学与工程(可...
    • 21 篇 建筑学
    • 21 篇 土木工程
    • 18 篇 冶金工程
  • 437 篇 理学
    • 250 篇 数学
    • 84 篇 生物学
    • 83 篇 物理学
    • 78 篇 系统科学
    • 64 篇 统计学(可授理学、...
    • 41 篇 化学
  • 216 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 34 篇 医学
    • 30 篇 临床医学
    • 23 篇 基础医学(可授医学...
  • 21 篇 法学
  • 17 篇 经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 7 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 40 篇 feature extracti...
  • 27 篇 training
  • 24 篇 computer science
  • 22 篇 support vector m...
  • 21 篇 heuristic algori...
  • 19 篇 computational mo...
  • 18 篇 image segmentati...
  • 18 篇 neural networks
  • 18 篇 educational inst...
  • 18 篇 optimization
  • 17 篇 software enginee...
  • 17 篇 wireless sensor ...
  • 16 篇 internet of thin...
  • 16 篇 accuracy
  • 15 篇 algorithm design...
  • 14 篇 deep learning
  • 14 篇 data mining
  • 14 篇 authentication
  • 14 篇 security
  • 14 篇 robustness

机构

  • 137 篇 school of comput...
  • 88 篇 school of comput...
  • 57 篇 school of comput...
  • 52 篇 college of compu...
  • 45 篇 school of electr...
  • 43 篇 beijing key labo...
  • 40 篇 school of comput...
  • 35 篇 department of co...
  • 28 篇 college of intel...
  • 21 篇 school of comput...
  • 20 篇 department of co...
  • 20 篇 school of comput...
  • 18 篇 school of comput...
  • 17 篇 school of mechan...
  • 16 篇 state key labora...
  • 16 篇 seventh research...
  • 16 篇 school of softwa...
  • 15 篇 tianjin key labo...
  • 15 篇 school of softwa...
  • 14 篇 school of comput...

作者

  • 36 篇 junping du
  • 35 篇 yingmin jia
  • 31 篇 wu jigang
  • 28 篇 fashan yu
  • 25 篇 jigang wu
  • 16 篇 xiaofei wang
  • 16 篇 ke yongzhen
  • 15 篇 qin jing
  • 14 篇 shun-yan ren
  • 13 篇 xiuhua li
  • 13 篇 victor c. m. leu...
  • 13 篇 du junping
  • 13 篇 jia yingmin
  • 13 篇 guozhi song
  • 12 篇 yongzhen ke
  • 12 篇 hung chih-cheng
  • 12 篇 yu fashan
  • 11 篇 lianhe yang
  • 10 篇 thambipillai sri...
  • 10 篇 jin-liang wang

语言

  • 1,172 篇 英文
  • 102 篇 其他
  • 34 篇 中文
检索条件"机构=School of Computer Science and Software Engineering Tianjin Polytechnic University"
1309 条 记 录,以下是431-440 订阅
排序:
Multi-modal data information alignment based SOH estimation for lithium-ion batteries using a local–global parallel CNN-Transformer Network
收藏 引用
Journal of Energy Storage 2025年 129卷
作者: Xuanang Gui Junrong Du Qianlong Wang Huan Zhao Yuheng Cheng Junhua Zhao School of Science and Engineering The Chinese University of Hong Kong Shenzhen 518172 China National Computer System Engineering Research Institute of China Beijing 100083 China Business School Nankai University Tianjin 300071 China Department of Building Environment and Energy Engineering The Hong Kong Polytechnic University Hong Kong China
Accurate State of Health (SOH) estimation of lithium-ion batteries is crucial for safe and reliable operation. However, real-world applications often lack comprehensive labeled data across diverse operating conditions...
来源: 评论
AI-based Fog and Edge Computing: A Systematic Review, Taxonomy and Future Directions
arXiv
收藏 引用
arXiv 2022年
作者: Iftikhar, Sundas Gill, Sukhpal Singh Song, Chenghao Xu, Minxian Aslanpour, Mohammad Sadegh Toosi, Adel N. Du, Junhui Wu, Huaming Ghosh, Shreya Chowdhury, Deepraj Golec, Muhammed Kumar, Mohit Abdelmoniem, Ahmed M. Cuadrado, Felix Varghese, Blesson Rana, Omer Dustdar, Schahram Uhlig, Steve School of Electronic Engineering and Computer Science Queen Mary University of London London United Kingdom University of Kotli Azad Jammu & Kashmir Azad Kashmir Kotli Pakistan Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China Department of Software Systems and Cybersecurity Faculty of Information Technology Monash University Australia Csiro DATA61 Australia Center for Applied Mathematics Tianjin University Tianjin China The Pennsylvania State University PA United States Naya Raipur India Abdullah Gül University Kayseri Turkey Department of Information Technology National Institute of Technology Jalandhar India Spain School of Computer Science University of St Andrews United Kingdom School of Computer Science and Informatics Cardiff University Cardiff United Kingdom Distributed Systems Group Vienna University of Technology Vienna Austria
Resource management in computing is a very challenging problem that involves making sequential decisions. Resource limitations, resource heterogeneity, dynamic and diverse nature of workload, and the unpredictability ... 详细信息
来源: 评论
Dual Representation Learning for One-Step Clustering of Multi-View Data
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Wei Deng, Zhaohong Choi, Kup-Sze Wang, Jun Wang, Shitong The School of Artificial Intelligence and Computer Science Jiangnan University Jiangsu Key Laboratory of Media Design and Software Technology Wuxi214122 China The School of Artificial Intelligence and Computer Science Jiangnan University Wuxi214122 China ZJLab Shanghai200433 China The Centre for Smart Health The Hong Kong Polytechnic University Hong Kong The Key laboratory of Specialty Fiber Optics and Optical Access Networks Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication Shanghai Institute for Advanced Communication and Data Science School of Communication and Information Engineering Shanghai University Shanghai200444 China
Multi-view data are commonly encountered in data mining applications. Effective extraction of information from multi-view data requires specific design of clustering methods to cater for data with multiple views, whic... 详细信息
来源: 评论
Culturally-embedded visual literacy: A study of impression management via emoticon, emoji, sticker, and meme on social media in China
收藏 引用
Proceedings of the ACM on Human-computer Interaction 2019年 第CSCW期3卷 1-24页
作者: Wang, Yuan Li, Yukun Gui, Xinning Kou, Yubo Liu, Fenglian School of Computer Science and Engineering Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin300384 China Penn State State CollegePA United States
Social media is often analyzed as a "front stage" where social media users perform their identities and manage impressions through various forms of user-generated content: text, picture, video, as well as vi... 详细信息
来源: 评论
Nanoscale control of grain boundary potential barrier, dopant density and filled trap state density for higher efficiency perovskite solar cells
收藏 引用
InfoMat 2020年 第2期2卷 409-423页
作者: Behzad Bahrami Sally Mabrouk Nirmal Adhikari Hytham Elbohy Ashim Gurung Khan M.Reza Rajesh Pathak Ashraful H.Chowdhury Gopalan Saianand Wenjin Yue Jiantao Zai Xuefeng Qian Mao Liang Qiquan Qiao Department of Electrical Engineering and Computer Science Center for Advanced Photovoltaics and Sustainable EnergySouth Dakota State UniversityBrookingsSouth Dakota Physics Department Damietta UniversityNew Damietta CityEgypt Global Innovative Center for Advanced Nanomaterials Faculty of EngineeringThe University of NewcastleCallaghanNew South WalesAustralia College of Biochemical Engineering Anhui Polytechnic UniversityWuhuChina Shanghai Electrochemical Energy Devices Research Center School of Chemistry and Chemical EngineeringState Key Laboratory of Metal Matrix CompositesShanghai Jiao Tong UniversityShanghaiChina Tianjin Key Laboratory of Organic Solar Cells and Photochemical Conversion Department of Applied ChemistryTianjin University of TechnologyTianjinChina
In this work,grain boundary(GB)potential barrier(ΔφGB),dopant density(Pnet),and filled trap state density(PGB,trap)were manipulated at the nanoscale by exposing the fabricated perovskite films to various relative hu... 详细信息
来源: 评论
A Feature Subset Selection Method Based on the Combination of PCA and Improved GA
A Feature Subset Selection Method Based on the Combination o...
收藏 引用
International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)
作者: Yinghao Li Kai Shi Fuqiang Qiao Hongyu Luo School of Computer Science and Engineering Tianjin University of Technology China College of Software and Communication Tianjin Sino-German University of Applied Sciences China
Nowadays, intrusion detection data has redundant features, which leads to unsatisfactory detection results. This paper proposes a feature selection method based on the combination of principal component analysis (PCA)... 详细信息
来源: 评论
ATVHUNTER: Reliable version detection of third-party libraries for vulnerability identification in android applications
arXiv
收藏 引用
arXiv 2021年
作者: Zhan, Xian Fan, Lingling Chen, Sen Wu, Feng Liu, Tianming Luo, Xiapu Liu, Yang Department of Computing The Hong Kong Polytechnic University Hong Kong College of Cyber Science Nankai Univerisity China College of Intelligence and Computing Tianjin University China School of Computer Science and Engineering Nanyang Technological University Singapore Faculty of Information Technology Monash University Australia
Third-party libraries (TPLs) as essential parts in the mobile ecosystem have become one of the most significant contributors to the huge success of Android, which facilitate the fast development of Android application... 详细信息
来源: 评论
Scenario referring expression comprehension via attributes of vision and language  1
收藏 引用
2nd Chinese Conference on Pattern Recognition and computer Vision, PRCV 2019
作者: Wei, Shaonan Wang, Jianming Sun, Yukuan Jin, Guanghao Liang, Jiayu Liu, Kunliang School of Electronics and Information Engineering Tianjin Polytechnic University Tianjin China School of Computer Science and Technology Tianjin Polytechnic University Tianjin China Tianjin International Joint Research and Development Center of Autonomous Intelligence Technology and Systems Tianjin Polytechnic University Tianjin China Tianjin Key Laboratory of Autonomous Intelligence Technology and Systems Tianjin Polytechnic University Tianjin China Center for Engineering Internship and Training Tianjin Polytechnic University Tianjin China
Referring Expression Comprehension (REC) is a task that requires to indicate particular objects within an image by natural language expressions. Previous studies on this task have assumed that the language expression ... 详细信息
来源: 评论
One-shot video object segmentation initialized with referring expression  1
收藏 引用
2nd Chinese Conference on Pattern Recognition and computer Vision, PRCV 2019
作者: Bu, Xiaoqing Wang, Jianming Liang, Jiayu Liu, Kunliang Sun, Yukuan Jin, Guanghao School of Electronic and Information Engineering Tianjin Polytechnic University Tianjin China School of Computer Science and Technology Tianjin Polytechnic University Tianjin China Tianjin International Joint Research and Development Center of Autonomous Intelligence Technology and Systems Tianjin Polytechnic University Tianjin China Center for Engineering Internship and Training Tianjin China Tianjin Key Laboratory of Autonomous Intelligence Technology and Systems Tianjin Polytechnic University Tianjin China
One-Shot Video Object Segmentation (OSVOS) is a CNN architecture to tackle the problem of semi-supervised video object segmentation, which performs the separation of an object from the background in a frame-independen... 详细信息
来源: 评论
Task Offloading for End-Edge-Cloud Orchestrated Computing in Mobile Networks
Task Offloading for End-Edge-Cloud Orchestrated Computing in...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Chuan Sun L. Hui Xiuhua Li Junhao We Qingyu Xiongl Xiaofei Wang Victor C.M. Leun School of Big Data Software Engineering Chongqing University Chongqing China TKLAN College of Intelligence & Computing Tianjin University Tianjin China College of Computer Science Software Engineering Shenzhen University Shenzhen China
Recently, mobile edge computing has received widespread attention, which provides computing infrastructure via pushing cloud computing, network control, and storage to the network edges. To improve the resource utiliz...
来源: 评论