咨询与建议

限定检索结果

文献类型

  • 1,808 篇 会议
  • 1,210 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 3,020 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,939 篇 工学
    • 1,343 篇 计算机科学与技术...
    • 1,132 篇 软件工程
    • 451 篇 信息与通信工程
    • 223 篇 电气工程
    • 222 篇 生物工程
    • 212 篇 控制科学与工程
    • 207 篇 电子科学与技术(可...
    • 182 篇 机械工程
    • 135 篇 光学工程
    • 120 篇 生物医学工程(可授...
    • 107 篇 化学工程与技术
    • 80 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 66 篇 材料科学与工程(可...
    • 48 篇 建筑学
    • 47 篇 土木工程
    • 46 篇 网络空间安全
    • 45 篇 交通运输工程
  • 1,146 篇 理学
    • 707 篇 数学
    • 297 篇 物理学
    • 252 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 112 篇 化学
    • 91 篇 系统科学
  • 548 篇 管理学
    • 290 篇 图书情报与档案管...
    • 274 篇 管理科学与工程(可...
    • 99 篇 工商管理
  • 102 篇 医学
    • 81 篇 临床医学
    • 71 篇 基础医学(可授医学...
  • 65 篇 法学
    • 51 篇 社会学
  • 46 篇 农学
  • 31 篇 经济学
  • 20 篇 教育学
  • 9 篇 哲学
  • 7 篇 艺术学
  • 6 篇 文学
  • 6 篇 军事学

主题

  • 140 篇 feature extracti...
  • 103 篇 semantics
  • 81 篇 training
  • 70 篇 information proc...
  • 63 篇 laboratories
  • 58 篇 computational mo...
  • 51 篇 data mining
  • 51 篇 computers
  • 50 篇 visualization
  • 49 篇 image segmentati...
  • 48 篇 face recognition
  • 45 篇 optimization
  • 45 篇 accuracy
  • 43 篇 deep learning
  • 41 篇 machine learning
  • 39 篇 robustness
  • 37 篇 object detection
  • 37 篇 support vector m...
  • 36 篇 humans
  • 35 篇 three-dimensiona...

机构

  • 436 篇 key laboratory o...
  • 214 篇 university of ch...
  • 191 篇 school of inform...
  • 128 篇 shandong provinc...
  • 84 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 81 篇 shandong provinc...
  • 63 篇 college of compu...
  • 62 篇 peng cheng labor...
  • 61 篇 college of mathe...
  • 48 篇 key laboratory o...
  • 45 篇 hunan provincial...
  • 45 篇 the key laborato...
  • 44 篇 college of infor...
  • 43 篇 key laboratory o...
  • 43 篇 graduate univers...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 40 篇 chinese academy ...
  • 38 篇 fujian provincia...

作者

  • 94 篇 zhongzhi shi
  • 91 篇 shi zhongzhi
  • 74 篇 xilin chen
  • 71 篇 shiguang shan
  • 62 篇 liu qun
  • 62 篇 huang qingming
  • 48 篇 li yingsong
  • 41 篇 xu qianqian
  • 40 篇 huang zhixiang
  • 40 篇 feng yang
  • 37 篇 feng zhiquan
  • 36 篇 he qing
  • 35 篇 yingsong li
  • 32 篇 wen gao
  • 31 篇 qing he
  • 29 篇 jiang kai
  • 29 篇 guo wenzhong
  • 28 篇 li hua
  • 28 篇 zhuang fuzhen
  • 28 篇 zhixiang huang

语言

  • 2,849 篇 英文
  • 101 篇 其他
  • 77 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Intelligent Information Processing"
3020 条 记 录,以下是291-300 订阅
排序:
Application of Maehly Approximation to em scattering from a Three-dimensional Rough Surface over a Frequency Band  5
Application of Maehly Approximation to em scattering from a ...
收藏 引用
5th IEEE International Conference on Computational Electromagnetics, ICCEM 2019
作者: Wang, An Qi Zhang, Xue Huang, Zhi Xiang Anhui University School of Electronics and Information Engineering Key Laboratory of Intelligent Computing Signal Processing Hefei China
In this paper, the Maehly approximation, which is based on Chebyshev series, is proposed to fast simulate the EM scattering from a three-dimensional (3D) rough surface over a frequency band. Comparing with the exact r... 详细信息
来源: 评论
Dual form back propagation on the EM algorithm
Dual form back propagation on the EM algorithm
收藏 引用
2011 IEEE International Conference on Granular computing, GrC 2011
作者: Hu, Hong Shi, Zhongzhi Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Science Beijing 100190 China
Vladimir N. Vapnik. (1998) pointed out that maxlikelihood functions in EM algorithms are just a special risk function. Based on this opinion, a novel EM algorithm uses a risk function differ with maxlikelihood functio... 详细信息
来源: 评论
Locality-constrained framework for face alignment
收藏 引用
Frontiers of Computer Science 2019年 第4期13卷 789-801页
作者: Jie ZHANG Xiaowei ZHAO Meina KAN Shiguang SHAN Xiujuan CHAI Xilin CHEN Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China University of Chinese Academy of Sciences Beijing 100049 China Alibaba Group Hangzhou 311121 China
Although the conventional active appearance model (AAM) has achieved some success for face alignment, it still suffers from the generalization problem when be applied to unseen subjects and images. To deal with the ge... 详细信息
来源: 评论
Optimal multilevel thresholding based on molecular kinetic theory optimization algorithm and line intercept histogram
收藏 引用
Journal of Central South University 2016年 第4期23卷 880-890页
作者: 范朝冬 任柯 张英杰 易灵芝 Key Laboratory of Intelligent Computing and Information Processing(Xiangtan University) Xiangtan 411105China Hunan Province Cooperative Innovation Center for Wind Power Equipment and Energy Conversion Xiangtan 411101China College of Information Science and Engineering Hunan UniversityChangsha 410082China
Among all segmentation techniques, Otsu thresholding method is widely used. Line intercept histogram based Otsu thresholding method(LIH Otsu method) can be more resistant to Gaussian noise, highly efficient in computi... 详细信息
来源: 评论
A Gradient-Guided Evolutionary Approach to Training Deep Neural networks
收藏 引用
IEEE TRANSACTIONS ON NEURAL networkS AND LEARNING SYSTEMS 2022年 第9期33卷 4861-4875页
作者: Yang, Shangshang Tian, Ye He, Cheng Zhang, Xingyi Tan, Kay Chen Jin, Yaochu Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Institutes of Physical Science and Information Technology Anhui University Hefei China Department of Computer Science and Engineering Guangdong Provincial Key Laboratory of Brain-Inspired Intelligent Computation Southern University of Science and Technology Shenzhen China Department of Computing The Hong Kong Polytechnic University Hong Kong SAR Department of Computer Science University of Surrey Guildford U.K
It has been widely recognized that the efficient training of neural networks (NNs) is crucial to classification performance. While a series of gradient-based approaches have been extensively developed, they are critic... 详细信息
来源: 评论
Detection of Impurity and Bubble Defects in Tire X-Ray Image Based on Improved Extremum Filter and Locally Adaptive-threshold Binaryzation
Detection of Impurity and Bubble Defects in Tire X-Ray Image...
收藏 引用
2018 International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2018
作者: Zheng, Xiunan Ding, Jianpei Pang, Zengzhi Li, Jinping Shandong Provincial Key Laboratory of Network Based Intelligent Computing China Shandong College University Key Laboratory of Information Processing and Cognitive Computing in 13th Five-year China School of Information Science and Engineering University of Jinan China
The manufacturing technology of all steel radial tire is complex. Some defects will inevitably appear in the tire due to the complex production process. Impurity and bubble are two typical kinds of defects in the tire... 详细信息
来源: 评论
Granular computing in the information transformation of patten recognition
Granular computing in the information transformation of patt...
收藏 引用
2007 IEEE International Conference on Granular computing, GrC 2007
作者: Hu, Hong Shi, Zhongzhi Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Science Beijing 100080 China
In the past decade, many papers about granular computing(GrC) have been published, but the keypoints about granular computing(GrC) are still unclear. In this paper, we try to find the key points of GrC in the informat... 详细信息
来源: 评论
The possibility of using simple neuron models to design brain-like computers
The possibility of using simple neuron models to design brai...
收藏 引用
5th International Conference on Advances in Brain Inspired Cognitive Systems, BICS 2012
作者: Hu, Hong Shi, Zhongzhi Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Science Beijing 100190 China
IBM Research and five leading universities are partnering to create computing systems that are expected to simulate and emulate the brain's abilities. Although this project has achieved some successes, it meets gr... 详细信息
来源: 评论
Variant quantifiers in L_(3)-valued first-order logic
收藏 引用
Frontiers of Computer Science 2021年 第5期15卷 151-159页
作者: Wei LI Yuefei SUI State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100083China Key Laboratory of Intelligent Information Processing Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China School of Computer Science and Technology University of Chinese Academy of SciencesBeijing 100049China
Traditional first-order logic has four definitions for quantifiers,which are defined by universal and existential *** L_(3)-valued(three-valued)first-order logic,there are eight kinds of definitions for quantifiers;an... 详细信息
来源: 评论
Monotonicity and nonmonotonicity in L3-valued propositional logic
收藏 引用
Frontiers of Computer Science 2022年 第4期16卷 33-43页
作者: Wei Li Yuefei Sui State Key Laboratory of Software Development Environment Beihang UniversityBeijing100083China Key Laboratory of Intelligent Information Processing Institute of Computing TechnologyChinese Academy of SciencesBeijing100190China School of Computer Science and Technology University of Chinese Academy of SciencesBeijing100049China
A sequent is a pair (Γ, Δ), which is true under an assignment if either some formula in Γ is false, or some formula in Δ is true. In L_(3)-valued propositional logic, a multisequent is a triple Δ∣Θ∣Γ, which i... 详细信息
来源: 评论