咨询与建议

限定检索结果

文献类型

  • 3,370 篇 会议
  • 2,271 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 5,643 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,731 篇 工学
    • 2,580 篇 计算机科学与技术...
    • 2,109 篇 软件工程
    • 989 篇 信息与通信工程
    • 477 篇 生物工程
    • 449 篇 控制科学与工程
    • 428 篇 电子科学与技术(可...
    • 407 篇 电气工程
    • 321 篇 光学工程
    • 281 篇 生物医学工程(可授...
    • 236 篇 机械工程
    • 221 篇 化学工程与技术
    • 157 篇 仪器科学与技术
    • 109 篇 动力工程及工程热...
    • 105 篇 网络空间安全
    • 95 篇 材料科学与工程(可...
    • 84 篇 建筑学
    • 81 篇 交通运输工程
  • 2,152 篇 理学
    • 1,236 篇 数学
    • 560 篇 物理学
    • 524 篇 生物学
    • 318 篇 统计学(可授理学、...
    • 229 篇 化学
    • 175 篇 系统科学
  • 959 篇 管理学
    • 527 篇 图书情报与档案管...
    • 454 篇 管理科学与工程(可...
    • 151 篇 工商管理
  • 201 篇 医学
    • 167 篇 临床医学
    • 142 篇 基础医学(可授医学...
    • 101 篇 药学(可授医学、理...
  • 125 篇 法学
    • 109 篇 社会学
  • 59 篇 农学
  • 53 篇 教育学
  • 51 篇 经济学
  • 17 篇 文学
  • 17 篇 军事学
  • 12 篇 艺术学
  • 4 篇 哲学

主题

  • 245 篇 feature extracti...
  • 202 篇 semantics
  • 140 篇 training
  • 107 篇 deep learning
  • 100 篇 computational mo...
  • 97 篇 accuracy
  • 90 篇 convolution
  • 81 篇 object detection
  • 75 篇 image segmentati...
  • 71 篇 neural networks
  • 71 篇 data mining
  • 68 篇 optimization
  • 65 篇 signal processin...
  • 64 篇 predictive model...
  • 61 篇 laboratories
  • 61 篇 machine learning
  • 58 篇 robustness
  • 56 篇 contrastive lear...
  • 56 篇 clustering algor...
  • 56 篇 data models

机构

  • 210 篇 key laboratory o...
  • 210 篇 shanghai key lab...
  • 189 篇 hubei province k...
  • 184 篇 school of comput...
  • 156 篇 shanghai key lab...
  • 145 篇 key laboratory o...
  • 143 篇 school of comput...
  • 117 篇 college of compu...
  • 102 篇 key laboratory o...
  • 96 篇 school of comput...
  • 74 篇 fujian provincia...
  • 73 篇 shanghai key lab...
  • 72 篇 university of ch...
  • 72 篇 college of compu...
  • 69 篇 college of mathe...
  • 68 篇 school of comput...
  • 62 篇 key laboratory o...
  • 62 篇 hubei province k...
  • 61 篇 school of comput...
  • 53 篇 anhui university...

作者

  • 108 篇 huang xuanjing
  • 83 篇 qiu xipeng
  • 82 篇 huang zhixiang
  • 73 篇 li yingsong
  • 63 篇 li zuoyong
  • 58 篇 zhixiang huang
  • 57 篇 yingsong li
  • 57 篇 huang qingming
  • 55 篇 shen linlin
  • 48 篇 zhang qi
  • 47 篇 xianliang wu
  • 47 篇 xue xiangyang
  • 44 篇 li wei
  • 43 篇 li bin
  • 42 篇 zhang yuejie
  • 40 篇 shi minjia
  • 39 篇 gui tao
  • 39 篇 feng rui
  • 32 篇 zhang fuquan
  • 32 篇 xu qianqian

语言

  • 5,226 篇 英文
  • 323 篇 其他
  • 108 篇 中文
检索条件"机构=Key Laboratory of Intelligent Computer & Signal Processing"
5643 条 记 录,以下是81-90 订阅
排序:
Micro-Expression Recognition Based on Spatio-Temporal Feature Extraction of key Regions
收藏 引用
computers, Materials & Continua 2023年 第10期77卷 1373-1392页
作者: Wenqiu Zhu Yongsheng Li Qiang Liu Zhigao Zeng College of Computer Science Hunan University of TechnologyZhuzhou412007China Intelligent Information Perception and Processing Technology Hunan Province Key LaboratoryZhuzhou412007China
Aiming at the problems of short duration,low intensity,and difficult detection of micro-expressions(MEs),the global and local features of ME video frames are extracted by combining spatial feature extraction and tempo... 详细信息
来源: 评论
CBNet: Cooperation-Based Weakly Supervised Polyp Detection  24
CBNet: Cooperation-Based Weakly Supervised Polyp Detection
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Du, Xiuquan Chen, Jiajia Zhang, Xuejun Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Anhui Hefei China School of Computer Science and Technology Anhui University Anhui Hefei China
Missed polyps are the major risk factor for colorectal cancer. To minimize misdiagnosis, many methods have been developed. However, they either rely on laborious instance-level annotations, require labeling of prompt ... 详细信息
来源: 评论
Image Enhancement via Associated Perturbation Removal and Texture Reconstruction Learning
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2253-2269页
作者: Kui Jiang Ruoxi Wang Yi Xiao Junjun Jiang Xin Xu Tao Lu IEEE the School of Computer Science and Technology Harbin Institute of Technology Zhengzhou Research Institute Harbin Institute of Technology the School of Artificial Intelligence Jianghan University the School of Geodesy and Geomatics Wuhan University the Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan University of Science and Technology the School of Computer Science and Engineering and also with the Hubei Province Key Laboratory of Intelligent Robot Wuhan Institute of Technology
Degradation under challenging conditions such as rain, haze, and low light not only diminishes content visibility, but also results in additional degradation side effects, including detail occlusion and color distorti... 详细信息
来源: 评论
Non-intrusive Load Monitoring Based Data-Free Incremental Electrical Appliance Identification  8th
Non-intrusive Load Monitoring Based Data-Free Incremental El...
收藏 引用
8th International Conference on Energy and Environmental Science, ICEES 2024
作者: Zhou, Rui Fang, Xiaohan The Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Electrical Engineering and Automation Anhui University Hefei230601 China
In the realm of modern energy management systems, Non-Intrusive Load Monitoring (NILM) technology provides an innovative solution for power suppliers. It allows for remote monitoring and analysis of users’ electricit... 详细信息
来源: 评论
Improved YOLOv8n Model for Detecting Helmets and License Plates on Electric Bicycles
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 449-466页
作者: Qunyue Mu Qiancheng Yu Chengchen Zhou Lei Liu Xulong Yu The College of Computer Science and Engineering North Minzu UniversityYinchuan750021China The Key Laboratory of Images and Graphics Intelligent Processing of State Ethnic Affairs Commission North Minzu UniversityYinchuan750021China
Wearing helmetswhile riding electric bicycles can significantly reduce head injuries resulting fromtraffic *** effectively monitor compliance,the utilization of target detection algorithms through traffic cameras play... 详细信息
来源: 评论
Joint Secure Transmit Beamforming Designs for Physical Layer Security in MIMO-ISAC System  2
Joint Secure Transmit Beamforming Designs for Physical Layer...
收藏 引用
2nd IEEE International Conference on signal, Information and Data processing, ICSIDP 2024
作者: Guo, Sitong Zheng, Hao Zhang, Yinghui Yan, Junkun Inner Mongolia University College of Electronic Information Engineering Hohhot China Inner Mongolia University Inner Mongolia Key Laboratory of Intelligent Communication and Sensing and Signal Processing Hohhot China Xidian University National Key Laboratory of Radar Signal Processing Xian China
This article concentrates on the physical layer security (PLS) towards an integrated sensing and communication (ISAC) system, which communicates with legitimate communication users (CUs) and detects the single sensing... 详细信息
来源: 评论
A Multi-strategy Improved Snake Optimizer Assisted with Population Crowding Analysis for Engineering Design Problems
收藏 引用
Journal of Bionic Engineering 2024年 第3期21卷 1567-1591页
作者: Lei Peng Zhuoming Yuan Guangming Dai Maocai Wang Jian Li Zhiming Song Xiaoyu Chen School of Computer Science China University of GeosciencesWuhan430074China Hubei Key Laboratory of Intelligent Geo-Information Processing China University of GeosciencesWuhan430074China China Astronautics Standards Institute Beijing100071China
Snake Optimizer(SO)is a novel Meta-heuristic Algorithm(MA)inspired by the mating behaviour of snakes,which has achieved success in global numerical optimization problems and practical engineering ***,it also has certa... 详细信息
来源: 评论
Research on Improved MobileViT Image Tamper Localization Model
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 3173-3192页
作者: Jingtao Sun Fengling Zhang Huanqi Liu Wenyan Hou School of Computer Science and Technology Xi’an University of Posts and TelecommunicationsXi’an710121China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an University of Posts and TelecommunicationsXi’an710121China
As image manipulation technology advances rapidly,the malicious use of image tampering has alarmingly escalated,posing a significant threat to social *** the realm of image tampering localization,accurately localizing... 详细信息
来源: 评论
Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism
收藏 引用
Science China(Information Sciences) 2023年 第3期66卷 273-286页
作者: Weixuan TANG Bin LI Weixiang LI Yuangen WANG Jiwu HUANG Institute of Artificial Intelligence and Blockchain Guangzhou University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen Institute of Artificial Intelligence and Robotics for Society School of Computer Science and Cyber Engineering Guangzhou University
Image steganography is the art and science of secure communication by concealing information within digital images. In recent years, the techniques of steganographic cost learning have developed rapidly. Although the ... 详细信息
来源: 评论
Accuracy verification of sulfur dioxide data based on ultraviolet hyperspectral solar radiometer observations  3
Accuracy verification of sulfur dioxide data based on ultrav...
收藏 引用
3rd International Conference on Environmental Remote Sensing and Geographic Information Technology, ERSGIT 2024
作者: Zeng, Hao Wang, Shun Xun, Lina The Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Electrical Engineering and Automation Anhui University Hefei China
One of the primary air pollutants that has a detrimental effect on both the environment and human health is sulfur dioxide. The ecosystem and climate greatly depend on the high-precision monitoring of sulfur dioxide. ... 详细信息
来源: 评论