咨询与建议

限定检索结果

文献类型

  • 844 篇 会议
  • 461 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 1,311 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 907 篇 工学
    • 614 篇 计算机科学与技术...
    • 499 篇 软件工程
    • 177 篇 信息与通信工程
    • 151 篇 控制科学与工程
    • 92 篇 机械工程
    • 82 篇 电气工程
    • 79 篇 电子科学与技术(可...
    • 78 篇 生物工程
    • 54 篇 光学工程
    • 46 篇 化学工程与技术
    • 44 篇 生物医学工程(可授...
    • 38 篇 仪器科学与技术
    • 38 篇 动力工程及工程热...
    • 32 篇 安全科学与工程
    • 23 篇 交通运输工程
    • 21 篇 材料科学与工程(可...
    • 21 篇 建筑学
    • 21 篇 土木工程
    • 18 篇 冶金工程
  • 437 篇 理学
    • 250 篇 数学
    • 84 篇 生物学
    • 83 篇 物理学
    • 78 篇 系统科学
    • 64 篇 统计学(可授理学、...
    • 41 篇 化学
  • 216 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 34 篇 医学
    • 30 篇 临床医学
    • 23 篇 基础医学(可授医学...
  • 21 篇 法学
  • 17 篇 经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 7 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 40 篇 feature extracti...
  • 27 篇 training
  • 24 篇 computer science
  • 22 篇 support vector m...
  • 21 篇 heuristic algori...
  • 19 篇 computational mo...
  • 18 篇 image segmentati...
  • 18 篇 neural networks
  • 18 篇 educational inst...
  • 18 篇 optimization
  • 17 篇 software enginee...
  • 17 篇 wireless sensor ...
  • 16 篇 internet of thin...
  • 16 篇 accuracy
  • 15 篇 algorithm design...
  • 14 篇 deep learning
  • 14 篇 data mining
  • 14 篇 authentication
  • 14 篇 security
  • 14 篇 robustness

机构

  • 137 篇 school of comput...
  • 88 篇 school of comput...
  • 56 篇 school of comput...
  • 52 篇 college of compu...
  • 45 篇 school of electr...
  • 43 篇 beijing key labo...
  • 40 篇 school of comput...
  • 35 篇 department of co...
  • 28 篇 college of intel...
  • 21 篇 school of comput...
  • 20 篇 school of comput...
  • 19 篇 department of co...
  • 18 篇 school of comput...
  • 17 篇 school of mechan...
  • 16 篇 state key labora...
  • 16 篇 seventh research...
  • 16 篇 school of softwa...
  • 15 篇 tianjin key labo...
  • 15 篇 school of softwa...
  • 14 篇 school of comput...

作者

  • 38 篇 yingmin jia
  • 37 篇 junping du
  • 31 篇 wu jigang
  • 29 篇 fashan yu
  • 25 篇 jigang wu
  • 16 篇 xiaofei wang
  • 16 篇 ke yongzhen
  • 15 篇 qin jing
  • 14 篇 shun-yan ren
  • 13 篇 xiuhua li
  • 13 篇 victor c. m. leu...
  • 13 篇 du junping
  • 13 篇 jia yingmin
  • 13 篇 guozhi song
  • 12 篇 yongzhen ke
  • 12 篇 hung chih-cheng
  • 12 篇 yu fashan
  • 11 篇 lianhe yang
  • 10 篇 thambipillai sri...
  • 10 篇 jin-liang wang

语言

  • 1,172 篇 英文
  • 104 篇 其他
  • 34 篇 中文
检索条件"机构=School of Computer Science and Software Engineering Tianjin Polytechnic University"
1311 条 记 录,以下是481-490 订阅
排序:
IEEE ICCI*CC Series in Year 20: Latest Advances in Cognitive Computing (Plenary Panel Report-II)  20
IEEE ICCI*CC Series in Year 20: Latest Advances in Cognitive...
收藏 引用
20th IEEE International Conference on Cognitive Informatics and Cognitive Computing, ICCI*CC 2021
作者: Kinsner, Witold Zhu, Haibin Baciu, George Luo, Guiming Rubio, Fernando Sui, Jie Huang, Runhe Hiraishi, Hironori Peng, Jun Chen, Liang Univ. of Manitoba FI2CICC Dept of ECE Winnipeg Canada Nipissing University FI2CICC ON Canada Hong Kong Polytechnic University FI2CICC Dept. of Computing Hong Kong Tsinghua University FI2CICC Software Institute Beijing China Complutense Univ. of Madrid FI2CICC Dept. of Computer Systems and Computation Spain Aberdeen University FI2CICC Aberdeen United Kingdom Hosei University FI2CICC Faculty of Computer and Information Sciences Japan Ashikaga University Faculty of Engineering Tochigi326-8558 Japan Chongqing Univ. of Science and Technology FI2CICC School of AI Chongqing China Univ. of Northern British Columbia Dept. of Computer Science BC Canada
Cognitive Computing (CC) is a contemporary field of fundamental intelligence theories and general AI technologies triggered by the transdisciplinary development in intelligence, computer, brain, knowledge, cognitive, ... 详细信息
来源: 评论
The current research of IoT security  4
The current research of IoT security
收藏 引用
4th IEEE International Conference on Data science in Cyberspace, DSC 2019
作者: Zhang, Jian Chen, Huaijian Gong, Liangyi Cao, Jing Gu, Zhaojun School of Computer Science and Engineering Tianjin University of Technology Tianjin China School of Software and BNRist Tsinghua University Beijing China Tianjin Information System Security and Confidentiality Evaluation Center Tianjin China Information Security Evaluation Center of Civil Aviation Civil Aviation University of China Tianjin China
In recent years, the development of the Internet of Things technology has been very rapid. However, with the explosive growth of IoT devices, the challenges facing the IoT environment are becoming more and more seriou... 详细信息
来源: 评论
A survey: Cloud data security based on blockchain technology  4
A survey: Cloud data security based on blockchain technology
收藏 引用
4th IEEE International Conference on Data science in Cyberspace, DSC 2019
作者: Xu, Hang Cao, Jing Zhang, Jian Gong, Liangyi Gu, Zhaojun School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Information System Security and Confidentiality Evaluation Center Tianjin China School of Software and BNRist Tsinghua University Beijing China Information Security Evaluation Center of Civil Aviation Civil Aviation University of China Tianjin China
The development of cloud computing technology is becoming more and more mature, but its security problems are always accompanied by it. As an emerging technology, blockchain has the characteristics of decentralization... 详细信息
来源: 评论
Overview of IoT security architecture  4
Overview of IoT security architecture
收藏 引用
4th IEEE International Conference on Data science in Cyberspace, DSC 2019
作者: Zhang, Jian Jin, Huanran Gong, Liangyi Cao, Jing Gu, Zhaojun School of Computer Science and Engineering Tianjin University of Technology Tianjin China School of Software and BNRist Tsinghua University Beijing China Tianjin Information System Security and Confidentiality Evaluation Center Tianjin China Information Security Evaluation Center of Civil Aviation Civil Aviation University of China Tianjin China
In the Internet of Things, services can be provisioned using centralized architectures, where central entities acquire, process, and provide information. Alternatively, distributed architectures, where entities at the... 详细信息
来源: 评论
MIPI 2022 Challenge on Under-Display Camera Image Restoration: Methods and Results
arXiv
收藏 引用
arXiv 2022年
作者: Zhu, Yurui Wang, Xi Fu, Xueyang Hu, Xiaowei Hu, Jinfan Liu, Xina Chen, Xiangyu Dong, Chao Zhang, Dafeng Huang, Feiyu Liu, Shizhuo Wang, Xiaobing Jin, Zhezhu Jiang, Xuhao Shao, Guangqi Wang, Xiaotao Lei, Lei Zhang, Zhao Zhao, Suiyi Zheng, Huan Gao, Yangcheng Wei, Yanyan Ren, Jiahuan Huang, Tao Fang, Zhenxuan Huang, Mengluan Xu, Junwei Zhang, Yong Yang, Yuechi Shu, Qidi Yang, Zhiwen Li, Shaocong Yao, Mingde Xu, Ruikang Guan, Yuanshen Huang, Jie Xiong, Zhiwei Zhu, Hangyan Liu, Ming Liu, Shaohui Zuo, Wangmeng Jia, Zhuang Song, Binbin Song, Ziqi Mao, Guiting Hou, Ben Liu, Zhimou Ke, Yi Ouyang, Dengpei Han, Dekui Zhang, Jinghao Zhu, Qi Zheng, Naishan Zhao, Feng Jin, Wu Conde, Marcos Nathan, Sabari Timofte, Radu Xu, Tianyi Xu, Jun Hrishikesh, P.S. Puthussery, Densen Jiji, C.V. Biao, Jiang Yuhan, Ding Zhang, Li Wan Xiaoyue, Feng Sijing, Chen Tianheng, Zhong Lu, Jiyang Chen, Hongming Fan, Zhentao Chen, Xiang University of Science and Technology of China China Shanghai Ai Laboratory China Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China University of Macau China Samsung Research China Beijing China Xiaomi Beijing China Hefei University of Technology China School of Artificial Intelligence Xidian University China School of Remote Sensing and Information Engineering Wuhan University China State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University China Harbin Institute of Technology China Changsha Research Institute of Mining and Metallurgy China Tianjin University China University of Wurzburg Computer Vision Lab Germany Couger Inc. Japan School of Statistics and Data Science Nankai University China Founding Minds Software India Department of Electronics and Communication Srm University Fudan University China Shenyang Aerospace University China Nanjing University of Science and Technology China
Developing and integrating advanced image sensors with novel algorithms in camera systems are prevalent with the increasing demand for computational photography and imaging on mobile platforms. However, the lack of hi... 详细信息
来源: 评论
Edge Caching Replacement Optimization for D2D Wireless Networks via Weighted Distributed DQN
Edge Caching Replacement Optimization for D2D Wireless Netwo...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Ruibin Li Yiwei Zhao Chenyang Wang Xiaofei Wang Victor C. M. Leung Xiuhua Li Tarik Taleb College of Intelligence and Computing Tianjin University Tianjin China College of Computer Science and Software Engineering Shenzhen University Shenzhen China College of Intelligence and Computing Chongqing University Chongqing China School of Electrical Engineering Aalto University Helsinki Finland
Duplicated download has been a big problem that affects the users' quality of service/experience (QoS/QoE) of current mobile networks. Edge caching and Device-to-Device communication are two promising technologies...
来源: 评论
A comparative study of different denoising techniques in digital image processing  8
A comparative study of different denoising techniques in dig...
收藏 引用
8th International Conference on Modeling Simulation and Applied Optimization, ICMSAO 2019
作者: Ahmad, Kamran Khan, Jawad Iqbal, Muhammad Salah Ud Din School of Electronics Information and Engineering Tianjin Polytechnic University Tianjin300387 China School of NARI Electric and Automation Nanjing Normal University Nanjing210042 China School of Computer Science Bahaudin Zakariya University Multan Sub-campus Sahiwal Pakistan
The quality of image usually depends on various factors including noise, light, and temperature. Noise has a decisive role in the image as it is constantly present in different digital images. Noise implication may pr... 详细信息
来源: 评论
Generalized Lag Output Synchronization of the Multiple Output Coupled Complex Dynamical Networks
Generalized Lag Output Synchronization of the Multiple Outpu...
收藏 引用
第三十八届中国控制会议
作者: Lin-Hao Zhao Shun-Yan Ren Yi-Wei Shi Ye-Peng Liu School of Computer Science and Technology Tianjin Polytechnic University School of Mechanical Engineering Tianjin Polytechnic University
The generalized lag output synchronization for a complex dynamical network with multiple output couplings is investigated in the present paper, in which the output matrix is positive definite or semi-positive definite... 详细信息
来源: 评论
Adaptive Control for Passivity and Synchronization of Coupled Reaction-Diffusion Neural Networks with Multiple State Couplings
Adaptive Control for Passivity and Synchronization of Couple...
收藏 引用
第三十八届中国控制会议
作者: Lu Wang Shun-Yan Ren Yu Zhang School of Computer Science and Technology Tianjin Polytechnic University School of Mechanical Engineering Tianjin Polytechnic University
In this paper, a coupled reaction-diffusion neural networks with multiple state couplings is presented. By selecting appropriate adaptive control scheme and employing inequality techniques, several passivity condition... 详细信息
来源: 评论
Task Offloading for Automatic Speech Recognition in Edge-Cloud Computing Based Mobile Networks
Task Offloading for Automatic Speech Recognition in Edge-Clo...
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: Shitong Cheng Zhenghui Xu Xiuhua Li Xiongwei Wu Qilin Fan Xiaofei Wang Victor C. M. Leung School of Big Data & Software Engineering Chongqing University Chongqing China Department of Electronic Engineering The Chinese University of Hong Kong Hong Kong SAR China College of Intelligence and Computing Tianjin University Tianjin China College of Computer Science & Software Engineering Shenzhen University Shenzhen China Dept. Electrical and Computer Engineering The University of British Columbia Vancouver Canada
Explosively increasing multimedia services and applications, e.g., automatic speech recognition (ASR), have aggravated the burden on the cloud server in mobile networks. To address the challenge, mobile edge computing...
来源: 评论