咨询与建议

限定检索结果

文献类型

  • 1,716 篇 会议
  • 1,024 篇 期刊文献

馆藏范围

  • 2,740 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,759 篇 工学
    • 975 篇 计算机科学与技术...
    • 853 篇 软件工程
    • 463 篇 控制科学与工程
    • 329 篇 信息与通信工程
    • 243 篇 生物工程
    • 237 篇 电气工程
    • 219 篇 机械工程
    • 193 篇 生物医学工程(可授...
    • 192 篇 电子科学与技术(可...
    • 166 篇 光学工程
    • 96 篇 化学工程与技术
    • 88 篇 仪器科学与技术
    • 74 篇 材料科学与工程(可...
    • 68 篇 交通运输工程
    • 60 篇 动力工程及工程热...
    • 44 篇 力学(可授工学、理...
    • 39 篇 航空宇航科学与技...
    • 39 篇 安全科学与工程
  • 1,078 篇 理学
    • 591 篇 数学
    • 278 篇 生物学
    • 272 篇 物理学
    • 179 篇 系统科学
    • 162 篇 统计学(可授理学、...
    • 94 篇 化学
  • 388 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 138 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 129 篇 医学
    • 107 篇 临床医学
    • 86 篇 基础医学(可授医学...
    • 70 篇 药学(可授医学、理...
  • 44 篇 法学
  • 32 篇 农学
  • 26 篇 经济学
  • 18 篇 教育学
  • 10 篇 军事学
  • 8 篇 文学
  • 2 篇 哲学
  • 2 篇 艺术学

主题

  • 100 篇 feature extracti...
  • 65 篇 training
  • 56 篇 semantics
  • 51 篇 computational mo...
  • 47 篇 image segmentati...
  • 43 篇 object detection
  • 39 篇 convolution
  • 38 篇 optimization
  • 37 篇 deep learning
  • 36 篇 accuracy
  • 36 篇 robustness
  • 34 篇 machine learning
  • 31 篇 neural networks
  • 31 篇 stability analys...
  • 31 篇 predictive model...
  • 31 篇 mathematical mod...
  • 29 篇 image processing
  • 28 篇 support vector m...
  • 28 篇 simulation
  • 28 篇 multi-agent syst...

机构

  • 121 篇 fujian provincia...
  • 113 篇 department of au...
  • 113 篇 shanghai enginee...
  • 111 篇 key laboratory o...
  • 82 篇 school of artifi...
  • 69 篇 key laboratory o...
  • 57 篇 school of automa...
  • 52 篇 fujian provincia...
  • 52 篇 shaanxi key labo...
  • 51 篇 key laboratory o...
  • 48 篇 key laboratory o...
  • 41 篇 key laboratory o...
  • 40 篇 key laboratory o...
  • 37 篇 shaanxi key labo...
  • 35 篇 shenzhen huazhon...
  • 35 篇 key laboratory o...
  • 30 篇 key laboratory o...
  • 27 篇 department of co...
  • 26 篇 shaanxi key labo...
  • 26 篇 alibaba group

作者

  • 71 篇 li zuoyong
  • 65 篇 wu dongrui
  • 62 篇 sang nong
  • 59 篇 zhang fuquan
  • 53 篇 gao changxin
  • 48 篇 zeng zhigang
  • 48 篇 zhigang zeng
  • 47 篇 jiao licheng
  • 42 篇 jian huang
  • 37 篇 pan linqiang
  • 36 篇 yongji wang
  • 35 篇 zuoyong li
  • 35 篇 huang jian
  • 33 篇 cao zhiguo
  • 32 篇 licheng jiao
  • 31 篇 wang hesheng
  • 30 篇 hai-tao zhang
  • 30 篇 guan xinping
  • 29 篇 ding liu
  • 29 篇 wang yongji

语言

  • 2,571 篇 英文
  • 113 篇 其他
  • 58 篇 中文
检索条件"机构=The Key Laboratory of Image Information Processing and Intelligent Control"
2740 条 记 录,以下是721-730 订阅
排序:
Short-Term Residential Load Forecasting Via Pooling-Ensemble Model with Smoothing Clustering
SSRN
收藏 引用
SSRN 2023年
作者: Fang, Hongliang Xiao, Jiang-Wen Wang, Yan-Wu School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan430074 China Key Laboratory of Image Processing and Intelligent Control Huazhong University of Science and Technology Ministry of Education Wuhan430074 China
Short-term residential load forecasting is essential to demand side response. However, the frequent spikes in the load and the volatile daily load patterns make it difficult to accurately forecast the load. To deal wi... 详细信息
来源: 评论
Joint Load Prediction of Multiple Buildings Using Multi-Task Learning with Selected-Shared-Private Mechanism
SSRN
收藏 引用
SSRN 2023年
作者: Cao, Minghui Xiao, Jiang-Wen Fang, Hongliang Li, Yuan-Zheng Wang, Yan-Wu School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan430074 China Key Laboratory of Image Processing and Intelligent Control Huazhong University of Science and Technology Ministry of Education Wuhan430074 China
Short-term load forecasting for residential buildings is of great significance to ensure the safe and economic operation of power grid. However, most of the existing prediction methods focus on the temporal characteri... 详细信息
来源: 评论
M3YOLOv5: Feature enhanced YOLOv5 model for mandibular fracture detection
收藏 引用
Computers in Biology and Medicine 2024年 173卷 108291-108291页
作者: Zhou, Tao Wang, Hongwei Du, Yuhu Liu, Fengzhen Guo, Yujie Lu, Huiling School of Computer Science and Engineering North Minzu University Yinchuan750021 China School of Medical Information and Engineering Ningxia Medical University Yinchuan750004 China Key Laboratory of Image and Graphics Intelligent Processing of State Ethnic Affairs Commission North Minzu University Yinchuan750021 China
Background: It is very important to detect mandibular fracture region. However, the size of mandibular fracture region is different due to different anatomical positions, different sites and different degrees of force... 详细信息
来源: 评论
Time series generator adversarial network with stochastic process for the degradation generation and prediction
Time series generator adversarial network with stochastic pr...
收藏 引用
Data Driven control and Learning Systems (DDCLS)
作者: Anqi Shangguan Nan Feng Lingxia Mu Rong Fei Xinhong Hei Guo Xie Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an University of Technology Xi'an China School of computer science and Engineering Xi'an University of Technology Xi'an China
Since the cumbersome collection process and high cost, the collected degradation of the product is basically small samples, which will affect the accuracy of reliability evaluation. It is necessary to expand the degra...
来源: 评论
Incipient Gradual Fault Detection via Transformed Component and Dissimilarity Analysis
Incipient Gradual Fault Detection via Transformed Component ...
收藏 引用
Industrial Cyber-Physical Systems (ICPS)
作者: Lingxia Mu Wenzhe Sun Youmin Zhang Nan Feng Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an University of Technology Xi'an China Department of Mechanical Industrial & Aerospace Engineering Concordia University Montreal Canada
This paper proposes a novel method named recursive transformed component dissimilarity analysis (RTCDA) combining dissimilarity analysis algorithm and traditional sliding window technique for detecting incipient gradu... 详细信息
来源: 评论
MindEye-OmniAssist: A Gaze-Driven LLM-Enhanced Assistive Robot System for Implicit Intention Recognition and Task Execution
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Zejia Yang, Bo Chen, Xinxing Shi, Weizhuang Wang, Haoyuan Luo, Wei Huang, Jian Hubei Key Laboratory of Brain-Inspired Intelligent Systems Huazhong University of Science and Technology Wuhan430074 China Key Laboratory of the Ministry of Education for Image Processing and Intelligent Control School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan430074 China State key laboratory of intelligent vehicle safety technology chongqing changan automobile co ltd Chongqing400023 China Science and technology innovation center China ship development and design centre Wuhan430060 China
A promising effective human-robot interaction in assistive robotic systems is gaze-based control. However, current gaze-based assistive systems mainly help users with basic grasping actions, offering limited support. ... 详细信息
来源: 评论
intelligent Speech Enhancement Algorithm Model Based on Recorded Classroom Audio
Intelligent Speech Enhancement Algorithm Model Based on Reco...
收藏 引用
Cognitive Computing and Complex Data (ICCD), International Conference on the
作者: Xinyun Zhang Li Shen Li Zhou Dawei Luo Dejiangmo Xiaonan Luo Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin University of Electronic Technology Guilin China School of Physics and Electronic Information Gannan Normal University Ganzhou China School of Mathematics and Computer Science Northwest Minzu University Lanzhou China
With advancements in communication technology, there is increasing demand for high-quality voice communication and accurate speech recognition. In the complex acoustic environment of a recording classroom, noise, reve... 详细信息
来源: 评论
Optimal Sequential False Data Injection Attack Scheme: Finite-Time Inverse Convergence
Optimal Sequential False Data Injection Attack Scheme: Finit...
收藏 引用
IEEE Conference on Decision and control
作者: Xiaoyu Luo Chongrong Fang Chengcheng Zhao Peng Cheng Jianping He The Department of Automation Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai Jiao Tong University Shanghai Engineering Research Center of Intelligent Control and Management Shanghai China The State Key Laboratory of Industrial Control Technology Institute of Cyberspace Research Zhejiang University China
In this paper, we explore the relationship between the injected attack signal and the attack selection strategy in networked control systems where the adversary desires to steer the system state to the expected malici...
来源: 评论
User Identity Protection in EEG-based Brain-Computer Interfaces
arXiv
收藏 引用
arXiv 2024年
作者: Meng, Lubin Jiang, Xue Huang, Jian Li, Wei Luo, Hanbin Wu, Dongrui The Key Laboratory of Image Processing and Intelligent Control School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan430074 China The Belt and Road Joint Laboratory on Measurement and Control Technology Huazhong University of Science and Technology Wuhan430074 China The School of Civil and Hydraulic Engineering Huazhong University of Science and Technology Wuhan China
A brain-computer interface (BCI) establishes a direct communication pathway between the brain and an external device. Electroencephalogram (EEG) is the most popular input signal in BCIs, due to its convenience and low... 详细信息
来源: 评论
Nash Pursuit Strategy for Nonzero-Sum MPC Game via Inverse Optimal control  13
Nash Pursuit Strategy for Nonzero-Sum MPC Game via Inverse O...
收藏 引用
13th Asian control Conference, ASCC 2022
作者: Qiu, Tianyu Zhang, Han Wang, Jingchuan Department of Automation School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Institute of Medical Robotics Shanghai Jiao Tong University Shanghai China Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai200240 China Shanghai Engineering Research Center of Intelligent Control and Management Shanghai200240 China
In this paper, a traditional one v.s. one pursuit and evasion scenario is considered. The evader aims to reach her target and avoid being captured by the pursuer, while the pursuer, without the knowledge of the evader... 详细信息
来源: 评论