咨询与建议

限定检索结果

文献类型

  • 133 篇 期刊文献
  • 48 篇 会议

馆藏范围

  • 181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 177 篇 工学
    • 113 篇 计算机科学与技术...
    • 75 篇 电气工程
    • 35 篇 信息与通信工程
    • 19 篇 软件工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 仪器科学与技术
    • 16 篇 控制科学与工程
    • 15 篇 测绘科学与技术
    • 14 篇 环境科学与工程(可...
    • 8 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 船舶与海洋工程
    • 4 篇 土木工程
    • 3 篇 石油与天然气工程
    • 2 篇 建筑学
    • 2 篇 水利工程
    • 2 篇 交通运输工程
    • 1 篇 光学工程
  • 46 篇 医学
    • 28 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 10 篇 特种医学
  • 34 篇 理学
    • 13 篇 生物学
    • 10 篇 地球物理学
    • 8 篇 物理学
    • 6 篇 化学
    • 1 篇 地理学
    • 1 篇 海洋科学
    • 1 篇 系统科学
  • 11 篇 管理学
    • 11 篇 管理科学与工程(可...
  • 6 篇 农学
    • 3 篇 农业资源与环境
  • 1 篇 艺术学

主题

  • 181 篇 encoder-decoder ...
  • 29 篇 deep learning
  • 17 篇 attention mechan...
  • 14 篇 semantic segment...
  • 13 篇 feature extracti...
  • 13 篇 convolutional ne...
  • 12 篇 image segmentati...
  • 8 篇 real-time semant...
  • 7 篇 convolutional ne...
  • 6 篇 computational mo...
  • 6 篇 decoding
  • 6 篇 lightweight netw...
  • 5 篇 convolution
  • 5 篇 image inpainting
  • 4 篇 task analysis
  • 4 篇 computer archite...
  • 4 篇 transfer learnin...
  • 4 篇 transformers
  • 4 篇 residual network
  • 4 篇 feature fusion

机构

  • 5 篇 chongqing univ p...
  • 5 篇 tianjin univ sch...
  • 4 篇 xian hitech res ...
  • 3 篇 xian hitech res ...
  • 2 篇 chongqing univ p...
  • 2 篇 qingzhou hitech ...
  • 2 篇 lakehead univ de...
  • 2 篇 cent south univ ...
  • 2 篇 chinese acad sci...
  • 2 篇 wuhan univ state...
  • 2 篇 south china univ...
  • 2 篇 univ illinois de...
  • 2 篇 east china norma...
  • 2 篇 nanjing univ sci...
  • 2 篇 chongqing univ p...
  • 2 篇 southwest univ s...
  • 1 篇 etri artificial ...
  • 1 篇 telkom univ sch ...
  • 1 篇 king saud univ c...
  • 1 篇 beijing inst tec...

作者

  • 5 篇 hu xuegang
  • 4 篇 wang shuyang
  • 4 篇 he hao
  • 4 篇 yang dongfang
  • 3 篇 mu xiaodong
  • 3 篇 gong jun
  • 3 篇 yu wenxin
  • 3 篇 wang qi
  • 3 篇 watanabe shinji
  • 3 篇 zhao peng
  • 2 篇 liu wenhao
  • 2 篇 turkoglu muammer
  • 2 篇 nie liang
  • 2 篇 liu yuan
  • 2 篇 jing liyuan
  • 2 篇 liu qi
  • 2 篇 fu yingnan
  • 2 篇 wang bing
  • 2 篇 reyes mauricio
  • 2 篇 scott matthew r.

语言

  • 174 篇 英文
  • 7 篇 其他
检索条件"主题词=Encoder-Decoder Network"
181 条 记 录,以下是151-160 订阅
排序:
Crack segmentation through deep convolutional neural networks and heterogeneous image fusion
收藏 引用
AUTOMATION IN CONSTRUCTION 2021年 125卷 103605-103605页
作者: Zhou, Shanglian Song, Wei Univ Alabama Dept Civil Construct & Environm Engn Tuscaloosa AL 35487 USA
A DCNN-based crack segmentation methodology is proposed by leveraging heterogeneous image fusion to alleviate image-related disturbances in intensity or range image data and mitigate uncertainties through crossdomain ... 详细信息
来源: 评论
A 3D Reconstruction Framework of Buildings Using Single Off-Nadir Satellite Image
收藏 引用
REMOTE SENSING 2021年 第21期13卷 4434-4434页
作者: Zhao, Chunhui Zhang, Chi Yan, Yiming Su, Nan Harbin Engn Univ Coll Informat & Commun Engn Harbin 150001 Peoples R China Harbin Engn Univ Minist Ind & Informat Technol Key Lab Adv Marine Commun & Informat Technol Harbin 150001 Peoples R China
A novel framework for 3D reconstruction of buildings based on a single off-nadir satellite image is proposed in this paper. Compared with the traditional methods of reconstruction using multiple images in remote sensi... 详细信息
来源: 评论
Improving Attention-Based Handwritten Mathematical Expression Recognition with Scale Augmentation and Drop Attention  17
Improving Attention-Based Handwritten Mathematical Expressio...
收藏 引用
17th International Conference on Frontiers in Handwriting Recognition (ICFHR)
作者: Li, Zhe Jin, Lianwen Lai, Songxuan Zhu, Yecheng South China Univ Technol Sch Elect & Informat Engn Guangzhou Peoples R China
Handwritten mathematical expression recognition (HMER) is an important research direction in handwriting recognition. The performance of HMER suffers from the two-dimensional structure of mathematical expressions (MEs... 详细信息
来源: 评论
Generating Adversarial Examples with Image-To-Perturbation network  39
Generating Adversarial Examples with Image-To-Perturbation N...
收藏 引用
39th Chinese Control Conference (CCC)
作者: Wang, Desheng Jin, Weidong Wu, Yunpu Southwest Jiaotong Univ Sch Elect Engn Chengdu 611756 Peoples R China
Deep neural networks have been found to be easily misled by adversarial examples that are maliciously crafted by adding small perturbations. A variety of methods have been proposed to generate adversarial examples, bu... 详细信息
来源: 评论
Detection of black box signal based on encoder-decoder fully convolutional networks
Detection of black box signal based on encoder-decoder fully...
收藏 引用
Global OCEANS Singapore - U.S. Gulf Coast Conference
作者: Ji, Huazhong Zhou, Jie Pan, Xiang Zhejiang Univ Coll Informat Sci & Elect Engn Hangzhou 310027 Peoples R China Hangzhou Dianzi Univ Coll Mat & Environm Engn Hangzhou 310018 Peoples R China
As a logger of aircraft data, the black box is the most reliable and effective means of identifying the cause of an accident after an aircraft crash. An underwater acoustic beacon was installed in the black box to dea... 详细信息
来源: 评论
DEEP IMAGE DEBLURRING USING LOCAL CORRELATION BLOCK
DEEP IMAGE DEBLURRING USING LOCAL CORRELATION BLOCK
收藏 引用
IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Su, Wei Yuan, Yuan Wang, Qi Northwestern Polytech Univ Sch Comp Sci Xian 710072 Shaanxi Peoples R China Northwestern Polytech Univ Ctr Opt IMagery Anal & Learning Optimal Xian 710072 Shaanxi Peoples R China
Dynamic scene deblurring is a challenging problem due to the various blurry source. Many deep learning based approaches try to train end-to-end deblurring networks, and achieve successful performance. However, the arc... 详细信息
来源: 评论
encoder-decoder Architecture for Crop-Weed Classification Using Pixel-Wise Labelling
Encoder-Decoder Architecture for Crop-Weed Classification Us...
收藏 引用
International Conference on Artificial Intelligence and Signal Processing (AISP)
作者: Umamaheswari, S. Jain, Ashvini, V Anna Univ Dept Informat Technol Madras Tamil Nadu India
Agricultural growth is an important pathway in development of any country. Its productivity contributes in full filling the basic need of the human society. The productivity is therefore must be smoothen to provide qu... 详细信息
来源: 评论
Maximal Information Complemented Refinement network for Gland Instance Segmentation
Maximal Information Complemented Refinement Network for Glan...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (IEEE BIBM)
作者: Xu, Bowen Wang, Yankai Yang, Dawei Zhang, Wei Zhang, Ye Kong, Yajie Zhang, Wenqiang Fudan Univ Acad Engn & Technol Shanghai Peoples R China Fudan Univ Shanghai Key Lab Intelligent Informat Proc Shanghai Peoples R China Chinese Acad Sci Changchun Inst Opt Fine Mech & Phys Changchun Jilin Peoples R China
The analysis of glandular morphology is a crucial step to determine the presence and grade of cancer. The rise of computational pathology has led to the development of automated segmentation to overcome the time-consu... 详细信息
来源: 评论
Supportive and Self Attentions for Image Caption
Supportive and Self Attentions for Image Caption
收藏 引用
Asia-Pacific-Signal-and-Information-Processing-Association Annual Summit and Conference (APSIPA ASC)
作者: Chien, Jen-Tzung Lin, Ting-An Natl Chiao Tung Univ Dept Elect & Comp Engn Hsinchu Taiwan
Attention over an observed image or natural sentence is run by spotting or locating the region or position of interest for pattern classification. The attention parameter is seen as a latent variable, which was indire... 详细信息
来源: 评论
Video Foreground Extraction Using Multi-View Receptive Field and encoderdecoder DCNN for Traffic and Surveillance Applications
收藏 引用
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 2019年 第10期68卷 9478-9493页
作者: Akilan, Thangarajah Wu, Q. M. Jonathan Zhang, Wandong Lakehead Univ Dept Comp Sci Thunder Bay ON P7B 5E1 Canada Univ Windsor Dept Elect & Comp Engn Windsor ON N9B 3P4 Canada
The automatic detection of foreground (FG) objects in videos is a demanding area of computer vision, with essential applications in video-based traffic analysis and surveillance. New solutions have attempted exploitin... 详细信息
来源: 评论