咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,160 篇 期刊文献

馆藏范围

  • 3,200 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,073 篇 工学
    • 1,135 篇 计算机科学与技术...
    • 988 篇 软件工程
    • 509 篇 控制科学与工程
    • 384 篇 信息与通信工程
    • 280 篇 生物工程
    • 279 篇 电气工程
    • 256 篇 机械工程
    • 239 篇 生物医学工程(可授...
    • 237 篇 电子科学与技术(可...
    • 214 篇 光学工程
    • 127 篇 化学工程与技术
    • 113 篇 仪器科学与技术
    • 84 篇 材料科学与工程(可...
    • 84 篇 交通运输工程
    • 71 篇 动力工程及工程热...
    • 55 篇 力学(可授工学、理...
    • 49 篇 航空宇航科学与技...
    • 46 篇 土木工程
  • 1,238 篇 理学
    • 675 篇 数学
    • 336 篇 物理学
    • 315 篇 生物学
    • 189 篇 系统科学
    • 187 篇 统计学(可授理学、...
    • 123 篇 化学
  • 448 篇 管理学
    • 286 篇 管理科学与工程(可...
    • 167 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 164 篇 医学
    • 136 篇 临床医学
    • 113 篇 基础医学(可授医学...
    • 87 篇 药学(可授医学、理...
  • 52 篇 法学
  • 38 篇 农学
  • 28 篇 经济学
  • 27 篇 教育学
  • 12 篇 军事学
  • 9 篇 文学
  • 8 篇 艺术学
  • 2 篇 哲学

主题

  • 127 篇 feature extracti...
  • 82 篇 training
  • 70 篇 image segmentati...
  • 66 篇 semantics
  • 56 篇 computational mo...
  • 50 篇 accuracy
  • 47 篇 object detection
  • 46 篇 deep learning
  • 44 篇 optimization
  • 43 篇 convolution
  • 42 篇 robustness
  • 40 篇 machine learning
  • 37 篇 support vector m...
  • 37 篇 predictive model...
  • 36 篇 neural networks
  • 36 篇 mathematical mod...
  • 35 篇 image processing
  • 35 篇 clustering algor...
  • 34 篇 stability analys...
  • 31 篇 control systems

机构

  • 121 篇 fujian provincia...
  • 114 篇 department of au...
  • 113 篇 shanghai enginee...
  • 111 篇 key laboratory o...
  • 88 篇 school of artifi...
  • 69 篇 key laboratory o...
  • 60 篇 school of automa...
  • 57 篇 guangxi key labo...
  • 52 篇 fujian provincia...
  • 52 篇 shaanxi key labo...
  • 51 篇 key laboratory o...
  • 48 篇 key laboratory o...
  • 41 篇 key laboratory o...
  • 40 篇 key laboratory o...
  • 37 篇 shaanxi key labo...
  • 35 篇 shenzhen huazhon...
  • 35 篇 key laboratory o...
  • 31 篇 key laboratory o...
  • 30 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 71 篇 li zuoyong
  • 65 篇 wu dongrui
  • 63 篇 sang nong
  • 59 篇 zhang fuquan
  • 52 篇 gao changxin
  • 49 篇 zeng zhigang
  • 49 篇 zhigang zeng
  • 48 篇 jiao licheng
  • 45 篇 jian huang
  • 43 篇 yongji wang
  • 38 篇 huang jian
  • 37 篇 ding mingyue
  • 37 篇 pan linqiang
  • 35 篇 zuoyong li
  • 33 篇 cao zhiguo
  • 33 篇 mingyue ding
  • 33 篇 wang yongji
  • 32 篇 licheng jiao
  • 31 篇 wang hesheng
  • 30 篇 hai-tao zhang

语言

  • 3,001 篇 英文
  • 135 篇 其他
  • 68 篇 中文
检索条件"机构=Key Laboratory of Image Processing and Intelligent Control"
3200 条 记 录,以下是2031-2040 订阅
排序:
Future Development Trend of Multimedia Network  2
Future Development Trend of Multimedia Network
收藏 引用
2018 2nd Annual International Conference on Cloud Technology and Communication Engineering, CTCE 2018
作者: Huang, Li Zhang, Kai Hu, Wei Li, Chengcheng College of Computer Science and Technology Wuhan University of Science and Technology Wuhan Hubei430081 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology Wuhan Hubei430081 China Key Laboratory of Metallurgical Equipment and Control Technology Ministry of Education Wuhan University of Science and Technology Wuhan Hubei430081 China
With the rapid development of computer network, multimedia technology has gradually spread throughout all aspects of people's life. This article, based on the concept and characteristics of multimedia, expounds th... 详细信息
来源: 评论
Research on Novel Fountain code for UAV Formation Flight control in UV Communication  7
Research on Novel Fountain code for UAV Formation Flight Con...
收藏 引用
2017 7th IEEE International Symposium on Microwave, Antenna, Propagation, and EMC Technologies
作者: Tai-fei Zhao YingXie XueLiu Peng Song Information Processing Xi'an University of Technology Shannxi Key Laboratory of Complex System Control and Intelligent Xi'an University of Technology
Research of Unmanned Aerial Vehicle(UAV) formation is a hot spot in the field of UAV applications. Based on the fountain code, an encoding communication scheme using unequal level coding Lu by Transform(ULC-LT) code a... 详细信息
来源: 评论
Object Detection in 20 Years: A Survey
arXiv
收藏 引用
arXiv 2019年
作者: Zou, Zhengxia Chen, keyan Shi, Zhenwei Guo, Yuhong Ye, Jieping The Department of Guidance Navigation and Control School of Astronautics Beihang University Beijing100191 China The Shanghai Artificial Intelligence Laboratory Shanghai200232 China The Image Processing Center School of Astronautics The Beijing Key Laboratory of Digital Media China The State Key Laboratory of Virtual Reality Technology and Systems Beihang University Beijing100191 China The School of Computer Science Carleton University OttawaONK1S 5B6 Canada The Alibaba Group Hangzhou310030 China
Object detection, as of one the most fundamental and challenging problems in computer vision, has received great attention in recent years. Over the past two decades, we have seen a rapid technological evolution of ob... 详细信息
来源: 评论
Learning oriented cross-entropy approach to user association in load-balanced HetNet
arXiv
收藏 引用
arXiv 2018年
作者: Huang, Xietian Xu, Wei Xie, Guo Jin, Shi You, Xiaohu Southeast University Nanjing China Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'An University of Technology Xi'an China
This letter considers optimizing user association in a heterogeneous network via utility maximization, which is a combinatorial optimization problem due to integer constraints. Different from existing solutions based ... 详细信息
来源: 评论
Interdependent order allocation in the two-echelon supply chain using agent-based negotiation  36
Interdependent order allocation in the two-echelon supply ch...
收藏 引用
第36届中国控制会议
作者: Jian Wang Huimin Miao System Engineering Institute School of AutomationHuazhong University of Science and Technology Key Laboratory of Image Processing and Intelligent Control Huazhong University of Science and Technology Hubei Province Key Laboratory of Systems Science in Metallurgical Process Wuhan University of Science and Technology
Nowadays,many researches study the negotiation-based order allocation problem in the supply chain environment,aiming to improve the efficiency of the allocation and the profits of the supply chain *** competition and ... 详细信息
来源: 评论
Research on Linear Quadratic Robust control Algorithm for Non-stochastic Uncertain System  29
Research on Linear Quadratic Robust Control Algorithm for No...
收藏 引用
第29届中国控制与决策会议
作者: Jiaoru Huang Jiayue Ma Fucai Qian Chaobo Chen Xiaoru Song The International Joint Research Center of Autonomous Systems and Intelligent Control Xi'an Technological University Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an University of Technology
A Linear Quadratic robust control algorithm is proposed for the system with non-stochastic *** this paper,the uncertainties are the noises which lie in a bounded ellipsoid *** assumption weakens the requirements of th... 详细信息
来源: 评论
A double-integrator system for distributed optimization of convex cost functions  29
A double-integrator system for distributed optimization of c...
收藏 引用
第29届中国控制与决策会议
作者: Ngoc-Tu Tran Xuan Feng Wen-Yuan Xu Na Zhan Xi Wang School of Automation Huazhong University of Science and Technology Key Laboratory of Image Processing and Intelligent Control(Huazhong University of Science and Technology) Ministry of Education Hubei Electric Power Company
In this paper,the distributed optimization problem is investigated under a second-order multi-agent *** the proposed algorithm,each agent solves the optimization via local computation and information exchange with its... 详细信息
来源: 评论
Chain Recurrent Point and Devaney Chaos of Topological Groups
Chain Recurrent Point and Devaney Chaos of Topological Group...
收藏 引用
International Conference on Smart City and Systems Engineering
作者: JI Zhanjiang QIN Guijiang ZHAI Cong Guangxi Colleges and Universities Key Laboratory of Image Processing and Intelligent Information System Wuzhou University China School of Transportation and Civil Engineering and Architecture Fo Shan University China
Chain recurrent point, strong chain recurrent point and Devaney chaos have an important significance in terms of theory and application. In this paper, we will introduce the concept of chain recurrent point, strong ch... 详细信息
来源: 评论
Protecting privacy of users in brain-computer interface applications
arXiv
收藏 引用
arXiv 2019年
作者: Agarwal, Anisha Dowsley, Rafael McKinney, Nicholas D. Wu, Dongrui Lin, Chin-Teng De Cock, Martine Nascimento, Anderson C.A. School of Engineering and Technology University of Washington TacomaWA98402 United States Department of Computer Science Bar-Ilan University Israel School of Engineering and Technology University of Washington TacomaWA98402 United States Key Laboratory of the Ministry of Education for Image Processing and Intelligent Control School of Automation Huazhong University of Science and Technology Wuhan China School of Software University of Technology Sydney Australia Department of Applied Mathematics Computer Science and Statistics Ghent University Ghent9000 Belgium
Machine learning (ML) is revolutionizing research and industry. Many ML applications rely on the use of large amounts of personal data for training and inference. Among the most intimate exploited data sources is elec... 详细信息
来源: 评论
Research on the key Technology of Safety Protection in Application Environment of Blockchain
收藏 引用
IOP Conference Series: Materials Science and Engineering 2019年 第3期569卷
作者: Hua Zhang Jiong Wang Ge Xu Zhiqiang Ruan College of Computer and Control Engineering Mmjiang University Fuzhou 350108 china Fujian Provincial Key Laboratory of Information Processing and Intelligent Control (Minjiang University)
This paper analyzes the current situation of blockchain application security. Then, makes a concrete analysis on the problems existing in the application safety of blockchain, including the attack of consensus algorit...
来源: 评论