咨询与建议

限定检索结果

文献类型

  • 1,716 篇 会议
  • 1,013 篇 期刊文献

馆藏范围

  • 2,729 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,753 篇 工学
    • 964 篇 计算机科学与技术...
    • 845 篇 软件工程
    • 461 篇 控制科学与工程
    • 323 篇 信息与通信工程
    • 239 篇 生物工程
    • 230 篇 电气工程
    • 219 篇 机械工程
    • 192 篇 电子科学与技术(可...
    • 190 篇 生物医学工程(可授...
    • 164 篇 光学工程
    • 97 篇 化学工程与技术
    • 90 篇 仪器科学与技术
    • 80 篇 材料科学与工程(可...
    • 68 篇 交通运输工程
    • 62 篇 动力工程及工程热...
    • 44 篇 力学(可授工学、理...
    • 39 篇 安全科学与工程
    • 38 篇 航空宇航科学与技...
  • 1,072 篇 理学
    • 595 篇 数学
    • 272 篇 生物学
    • 268 篇 物理学
    • 180 篇 系统科学
    • 168 篇 统计学(可授理学、...
    • 94 篇 化学
  • 386 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 136 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 127 篇 医学
    • 106 篇 临床医学
    • 84 篇 基础医学(可授医学...
    • 69 篇 药学(可授医学、理...
  • 44 篇 法学
  • 32 篇 农学
  • 25 篇 经济学
  • 19 篇 教育学
  • 10 篇 军事学
  • 8 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 102 篇 feature extracti...
  • 66 篇 training
  • 56 篇 semantics
  • 51 篇 computational mo...
  • 47 篇 image segmentati...
  • 43 篇 object detection
  • 39 篇 convolution
  • 38 篇 optimization
  • 36 篇 deep learning
  • 36 篇 accuracy
  • 36 篇 robustness
  • 34 篇 machine learning
  • 31 篇 predictive model...
  • 31 篇 mathematical mod...
  • 30 篇 neural networks
  • 30 篇 stability analys...
  • 29 篇 support vector m...
  • 28 篇 simulation
  • 28 篇 image processing
  • 27 篇 multi-agent syst...

机构

  • 121 篇 fujian provincia...
  • 116 篇 shanghai enginee...
  • 115 篇 department of au...
  • 113 篇 key laboratory o...
  • 82 篇 school of artifi...
  • 69 篇 key laboratory o...
  • 57 篇 school of automa...
  • 52 篇 fujian provincia...
  • 52 篇 key laboratory o...
  • 52 篇 shaanxi key labo...
  • 48 篇 key laboratory o...
  • 40 篇 key laboratory o...
  • 40 篇 key laboratory o...
  • 37 篇 shaanxi key labo...
  • 35 篇 key laboratory o...
  • 33 篇 shenzhen huazhon...
  • 30 篇 key laboratory o...
  • 27 篇 department of co...
  • 26 篇 shaanxi key labo...
  • 26 篇 alibaba group

作者

  • 71 篇 li zuoyong
  • 64 篇 wu dongrui
  • 63 篇 sang nong
  • 59 篇 zhang fuquan
  • 53 篇 gao changxin
  • 50 篇 zeng zhigang
  • 46 篇 jiao licheng
  • 45 篇 zhigang zeng
  • 43 篇 jian huang
  • 36 篇 yongji wang
  • 36 篇 pan linqiang
  • 35 篇 huang jian
  • 34 篇 zuoyong li
  • 32 篇 licheng jiao
  • 32 篇 cao zhiguo
  • 31 篇 wang hesheng
  • 30 篇 hai-tao zhang
  • 30 篇 guan xinping
  • 29 篇 ding liu
  • 29 篇 wang yongji

语言

  • 2,426 篇 英文
  • 248 篇 其他
  • 62 篇 中文
检索条件"机构=Key Laboratory of Image Information Processing and Intelligent Control"
2729 条 记 录,以下是1341-1350 订阅
排序:
Fault detection of lithium-ion batteries subject to probabilistic parametric uncertainties  11
Fault detection of lithium-ion batteries subject to probabil...
收藏 引用
11th CAA Symposium on Fault Detection, Supervision, and Safety for Technical Processes, SAFEPROCESS 2019
作者: Liu, Yuhao Wan, Yiming Huazhong University of Science and Technology Key Laboratory of Image Processing and Intelligent Control of Education Ministry of China Wuhan430074 China
The fault detection task in lithium-ion battery management system (BMS) is critical to the safety and reliability of rechargeable and hybrid electric vehicles. To explicitly account for inevitable errors of battery mo... 详细信息
来源: 评论
A New control System Based on An Improved PID Neural Network controller for Landslide System control
A New Control System Based on An Improved PID Neural Network...
收藏 引用
Chinese control Conference (CCC)
作者: Ying Zhang Shu Sun Cheng Lian Xiaoping Wang School of Artificial Intelligence and Automation the Key Laboratory of Image Processing and Intelligent Control Huazhong University of Science and Technology Wuhan China
In this paper, a new control system based on the improved PID neural network controller (PIDNNC) is designed to control the landslide displacement. In the control system, the fuzzy comprehensive judgement model of lan... 详细信息
来源: 评论
Prox-DBRO-VR: A Unified Analysis on Byzantine-Resilient Decentralized Stochastic Composite Optimization with Variance Reduction
arXiv
收藏 引用
arXiv 2023年
作者: Hu, Jinhui Chen, Guo Li, Huaqing Guo, Xiaoyu Ran, Liang Huang, Tingwen School of Automation Central South University Hunan Changsha410083 China School of Electrical Engineering and Telecommunications University of New South Wales SydneyNSW2052 Australia Department of Mechanical Engineering City University of Hong Kong Kowloon Tong Hong Kong Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing College of Electronic and Information Engineering Southwest University Chongqing400715 China Faculty of Computer Science and Control Engineering Shenzhen University of Advanced Technology Shenzhen518055 China
Decentralized stochastic gradient algorithms efficiently solve large-scale finite-sum optimization problems when all agents in the network are reliable. However, most of these algorithms are not resilient to adverse c... 详细信息
来源: 评论
Adaptive Histogram Thresholding-Based Leukocyte image Segmentation  15th
Adaptive Histogram Thresholding-Based Leukocyte Image Segmen...
收藏 引用
15th International Conference on intelligent information Hiding and Multimedia Signal processing, IIH-MSP 2019, held in conjunction with the 12th International Conference on Frontiers of information Technology, Applications and Tools, FITAT 2019
作者: Zhou, Xiaogen Wang, Chuansheng Li, Zuoyong Zhang, Fuquan College of Mathematics and Computer Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China School of Computer Science and Technology Harbin University of Science and Technology Harbin China
To improve the accuracy of leukocyte segmentation, this paper presents a novel method based on adaptive histogram thresholding (AHT). The proposed method first employs color component combination and AHT to extract th... 详细信息
来源: 评论
Indicators of Learning Ability of Autonomous Vehicles
Indicators of Learning Ability of Autonomous Vehicles
收藏 引用
Chinese Automation Congress (CAC)
作者: Yimin Su Junjie Zhou Hongrong Huang Lin Wang Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai Engineering Research Center of Intelligent Control and Management Shanghai Jiao Tong University Shanghai China Saie Volkswagen Automotive Co. Ltd. Shanghai China
With the increase of research on autonomous vehicles, the evaluation research of autonomous vehicles has gradually attracted attention. Effective evaluation of autonomous vehicles can ensure the safety of autonomous v... 详细信息
来源: 评论
An agricultural data storage mechanism based on HBase
收藏 引用
International Journal of information and Communication Technology 2019年 第4期14卷 456-469页
作者: Li, Changyun Zhang, Qingqing He, Pinjie Wang, Zhibing Chen, Li College of Computer and Science Hunan University of Technology Zhuzhou412007 China Intelligent Information Perception and Processing Technology Hunan Province Key Laboratory Zhuzhou412007 China Intelligent Perception and Networked Control Hunan Province Key Laboratory of College Zhuzhou412007 China
With the development of agricultural space-Time localisation, sensor network and cloud computing, the amount of agricultural data is increasing rapidly and the data structure becomes more complicated and changeable. C... 详细信息
来源: 评论
Research on Ultra-wideband Signal Detection Method Based on Improved Stochastic Resonance
Research on Ultra-wideband Signal Detection Method Based on ...
收藏 引用
Chinese Automation Congress (CAC)
作者: Dingxin Zhang Shangbin Jiao Qing Zhang Yannan Wang Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi’an University of Technology Xi’an China
In order to improve the detection performance of ultra-wideband signals and obtain a higher detection signal-to-noise ratio, based on the traditional bistable stochastic resonance model, an improved stochastic resonan... 详细信息
来源: 评论
A Privacy-Enhanced Mobile Crowdsensing Strategy for Blockchain Empowered Internet of Medical Things
A Privacy-Enhanced Mobile Crowdsensing Strategy for Blockcha...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Mengyao Peng Jia Hu Hui Lin Xiaoding Wang Wenzhong Lin College of Computer and Cyber Security Fujian Normal University Fuzhou Fujian China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou Fujian China University of Exeter Exeter UK
The emergence of the Internet of Medical Things (IoMT) brings a huge impact on current medical system in the detection and prevention of medical diseases, as well as the sharing and analysis of medical data. To effici... 详细信息
来源: 评论
Redundancy reduction penalty term of loss function in deep neural network
收藏 引用
Knowledge-Based Systems 2025年
作者: Xueheng Hu Shuhuan Wen H.K. Lam Engineering Research Center of the Ministry of Education for Intelligent Control System and Intelligent Equipment Yanshan University Qinhuangdao China Key Laboratory of Industrial Computer Control Engineering of Hebei Province Yanshan University Qinhuangdao China Key Laboratory of Intelligent Control and Neural Information Processing Ministry of Education Yanshan University Qinhuangdao 066004 Hebei Province China The Department of Engineering King’s College London London WC2R 2LS United Kingdom
In this paper, we propose a novel regularization algorithm that is introduced as a penalty term to the loss function. Differing from conventional L1 and L2 regularization methods, our approach does not aim to diminish...
来源: 评论
An Anomalous Traffic Detection Approach for the Private Network Based on Self-learning Model  1
收藏 引用
3rd International Conference on Machine Learning for Cyber Security, ML4CS 2020
作者: Han, Weijie Xue, Jingfeng Zhang, Fuquan Zhang, Yingfeng School of Computer Science and Technology Beijing Institute of Technology Beijing China School of Space Information Space Engineering University Beijing China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China Equipment Development Department Beijing100071 China
Although being isolated from the external network, the private network is still faced with some security threats, such as violations communications, malware attacks, and illegal operations. It is an attractive approac... 详细信息
来源: 评论