咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,160 篇 期刊文献

馆藏范围

  • 3,200 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,073 篇 工学
    • 1,135 篇 计算机科学与技术...
    • 988 篇 软件工程
    • 509 篇 控制科学与工程
    • 384 篇 信息与通信工程
    • 280 篇 生物工程
    • 279 篇 电气工程
    • 256 篇 机械工程
    • 239 篇 生物医学工程(可授...
    • 237 篇 电子科学与技术(可...
    • 214 篇 光学工程
    • 127 篇 化学工程与技术
    • 113 篇 仪器科学与技术
    • 84 篇 材料科学与工程(可...
    • 84 篇 交通运输工程
    • 71 篇 动力工程及工程热...
    • 55 篇 力学(可授工学、理...
    • 49 篇 航空宇航科学与技...
    • 46 篇 土木工程
  • 1,238 篇 理学
    • 675 篇 数学
    • 336 篇 物理学
    • 315 篇 生物学
    • 189 篇 系统科学
    • 187 篇 统计学(可授理学、...
    • 123 篇 化学
  • 448 篇 管理学
    • 286 篇 管理科学与工程(可...
    • 167 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 164 篇 医学
    • 136 篇 临床医学
    • 113 篇 基础医学(可授医学...
    • 87 篇 药学(可授医学、理...
  • 52 篇 法学
  • 38 篇 农学
  • 28 篇 经济学
  • 27 篇 教育学
  • 12 篇 军事学
  • 9 篇 文学
  • 8 篇 艺术学
  • 2 篇 哲学

主题

  • 127 篇 feature extracti...
  • 82 篇 training
  • 70 篇 image segmentati...
  • 66 篇 semantics
  • 56 篇 computational mo...
  • 50 篇 accuracy
  • 47 篇 object detection
  • 46 篇 deep learning
  • 44 篇 optimization
  • 43 篇 convolution
  • 42 篇 robustness
  • 40 篇 machine learning
  • 37 篇 support vector m...
  • 37 篇 predictive model...
  • 36 篇 neural networks
  • 36 篇 mathematical mod...
  • 35 篇 image processing
  • 35 篇 clustering algor...
  • 34 篇 stability analys...
  • 31 篇 control systems

机构

  • 121 篇 fujian provincia...
  • 114 篇 department of au...
  • 113 篇 shanghai enginee...
  • 111 篇 key laboratory o...
  • 88 篇 school of artifi...
  • 69 篇 key laboratory o...
  • 60 篇 school of automa...
  • 57 篇 guangxi key labo...
  • 52 篇 fujian provincia...
  • 52 篇 shaanxi key labo...
  • 51 篇 key laboratory o...
  • 48 篇 key laboratory o...
  • 41 篇 key laboratory o...
  • 40 篇 key laboratory o...
  • 37 篇 shaanxi key labo...
  • 35 篇 shenzhen huazhon...
  • 35 篇 key laboratory o...
  • 31 篇 key laboratory o...
  • 30 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 71 篇 li zuoyong
  • 65 篇 wu dongrui
  • 63 篇 sang nong
  • 59 篇 zhang fuquan
  • 52 篇 gao changxin
  • 49 篇 zeng zhigang
  • 49 篇 zhigang zeng
  • 48 篇 jiao licheng
  • 45 篇 jian huang
  • 43 篇 yongji wang
  • 38 篇 huang jian
  • 37 篇 ding mingyue
  • 37 篇 pan linqiang
  • 35 篇 zuoyong li
  • 33 篇 cao zhiguo
  • 33 篇 mingyue ding
  • 33 篇 wang yongji
  • 32 篇 licheng jiao
  • 31 篇 wang hesheng
  • 30 篇 hai-tao zhang

语言

  • 3,001 篇 英文
  • 135 篇 其他
  • 68 篇 中文
检索条件"机构=Key Laboratory for Image Processing and Intelligent control"
3200 条 记 录,以下是511-520 订阅
排序:
Toward Understanding How the Saturation Effect Impacts the Spread of Computer Viruses  6
Toward Understanding How the Saturation Effect Impacts the S...
收藏 引用
6th International Conference on Electronic Engineering and Informatics, EEI 2024
作者: Zhang, Xianxiu Feng, Yuming Yang, Yi Zhang, Baojie School of Computer Science and Engineering Chongqing Three Gorges University Key Laboratory of Intelligent Information Processing and Control of Chongqing Municipal Institutions of Higher Education Chongqing Wanzhou404100 China School of Three Gorges Artificial Intelligence Chongqing Three Gorges University Chongqing Wanzhou404100 China
It is well known that people who know the presence of network viruses will defend against them, and the more computer viruses are detected and the more measures are taken. However, most previous computer virus propaga... 详细信息
来源: 评论
Deterministic-like data-driven discovery of stochastic differential equations via the Feynman–Kac formalism
收藏 引用
The European Physical Journal Special Topics 2024年 1-21页
作者: Ma, Chaoxiang Huang, Cheng Cheng, Cheng Li, Xiuting The College of Informatics Huazhong Agriculture University and the China–Poland Belt and Road Joint Laboratory on Measurement and Control Technology Huazhong University of Science and Technology Wuhan People’s Republic of China School of Artificial Intelligence and Automation Huazhong University of Science and Technology Ministry of Education Key Lab of Intelligent Control and Image Processing Wuhan China
This paper develops a data-driven deterministic identification architecture for discovering stochastic differential equations (SDEs) directly from data. The architecture first generates deterministic data for stochast...
来源: 评论
image Dehazing Network Based on Multi-scale Feature Extraction  4th
Image Dehazing Network Based on Multi-scale Feature Extracti...
收藏 引用
4th International Conference on Smart Vehicular Technology, Transportation, Communication and Applications, VTCA 2021
作者: Feng, Ting Zhang, Fuquan Yu, Zhaochai Li, Zuoyong Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou350121 China College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China
To remove image haze and make haze image scene clear, we proposed an image dehazing network based on multi-scale feature extraction (MSFNet) in this paper. The MSFNet first directly performs feature extraction on hazy... 详细信息
来源: 评论
A Lightweight Chinese Summarization Generation Method Based on Knowledge Distillation  4
A Lightweight Chinese Summarization Generation Method Based ...
收藏 引用
4th International Conference on Information Science, Parallel and Distributed Systems, ISPDS 2023
作者: Liu, Shiyue Xiao, Yannan Wang, Xueyong Huang, Wenming Deng, Zhenrong School of Computer and Information Security Guilin University of Electronic Technology Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin China School of Computer and Information Security Guilin University of Electronic Technology Guilin China Guilin Xintong Technology Co. Guilin China
In recent years, large-scale pretrained natural language processing models such as BERT, GPT3 have achieved good results in processing tasks. However, in daily applications, these large-scale language models usually e... 详细信息
来源: 评论
CMAC-Based Sliding-Mode control for Large-Scale Fuzzy Descriptor Systems
CMAC-Based Sliding-Mode Control for Large-Scale Fuzzy Descri...
收藏 引用
2022 IEEE International Conference on Robotics and Biomimetics, ROBIO 2022
作者: Zhong, Zhixiong Shao, Zhenghua Huan, Zhijie Wang, Xingyi Minjiang University Key Laboratory of Information Processing and Intelligent Control Fuzhou350121 China Research Institute of Intelligent Control and Systems Harbin Institute of Technology Harbin150080 China School of Electrical Engineering and Automation Xiamen University of Technology Xiamen361024 China
This paper addresses the problem of sliding-mode control for large-scale fuzzy descriptor systems subject to unknown uncertainties. First, a CMAC neural network is used to approximate the unknown uncertainties, and th... 详细信息
来源: 评论
Disentangling Spatial and Temporal Learning for Efficient image-to-Video Transfer Learning
arXiv
收藏 引用
arXiv 2023年
作者: Qing, Zhiwu Zhang, Shiwei Huang, Ziyuan Zhang, Yingya Gao, Changxin Zhao, Deli Sang, Nong Key Laboratory of Image Processing Intelligent Control School of Artificial Intelligence and Automation Huazhong University of Science and Technology China Alibaba Group China ARC National University of Singapore Singapore
Recently, large-scale pre-trained language-image models like CLIP have shown extraordinary capabilities for understanding spatial contents, but naively transferring such models to video recognition still suffers from ... 详细信息
来源: 评论
Boarding Pass Positioning with Jointly Multi-channel Segmentation and Perspective Transformation Correction  4th
Boarding Pass Positioning with Jointly Multi-channel Segmen...
收藏 引用
4th International Conference on Machine Learning for Cyber Security, ML4CS 2022
作者: Wu, Jiahui Li, Zuoyong Keikhosrokiani, Pantea Cai, Yuanzheng College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou350121 China School of Computer Sciences Universiti Sains Malaysia Penang Minden11800 Malaysia
To solve the problem of boarding pass positioning with image tilt and sticking, we proposed a jointly boarding pass positioning and correction algorithm using multi-channel color components. First, a local threshold s... 详细信息
来源: 评论
VideoLCM: Video Latent Consistency Model
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Xiang Zhang, Shiwei Zhang, Han Liu, Yu Zhang, Yingya Gao, Changxin Sang, Nong Key Laboratory of Image Processing and Intelligent Control School of Artificial Intelligence and Automation Huazhong University of Science and Technology China Alibaba Group China Shanghai Jiao Tong University China
Consistency models have demonstrated powerful capability in efficient image generation and allowed synthesis within a few sampling steps, alleviating the high computational cost in diffusion models. However, the consi...
来源: 评论
PCB Defect Detection Method Based on Improved RetinaNet  1
收藏 引用
4th International Conference on Machine Learning for Cyber Security, ML4CS 2022
作者: Xu, Yusheng Cao, Xinrong Hu, Rong Keikhosrokiani, Pantea Li, Zuoyong College of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou350121 China School of Computer Sciences Universiti Sains Malaysia Penang11800 Malaysia
In the electronic industry product quality control, PCB defect detection is a crucial part, which has the characteristics of small defect size and high similarity. The existing defect detection methods are still not g... 详细信息
来源: 评论
A New Approach of Intrusion Detection with Command Sequence-To-Sequence Model  6th
A New Approach of Intrusion Detection with Command Sequence-...
收藏 引用
6th Euro-China Conference on intelligent Data Analysis and Applications, ECC 2019
作者: Liu, Wei Mao, Yu Ci, Linlin Zhang, Fuquan School of Computer Science and Technology Beijing Institute of Technology Beijing China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350117 China
Traditionally, researchers have focused on network level intrusion detection and program level intrusion detection to improve computer security. However, neither approach is foolproof. We argue that the internal and e... 详细信息
来源: 评论