咨询与建议

限定检索结果

文献类型

  • 3,614 篇 会议
  • 1,979 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 5,597 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,645 篇 工学
    • 1,676 篇 计算机科学与技术...
    • 1,489 篇 软件工程
    • 978 篇 控制科学与工程
    • 752 篇 信息与通信工程
    • 578 篇 机械工程
    • 473 篇 电气工程
    • 423 篇 电子科学与技术(可...
    • 343 篇 生物工程
    • 320 篇 仪器科学与技术
    • 274 篇 光学工程
    • 230 篇 化学工程与技术
    • 218 篇 生物医学工程(可授...
    • 204 篇 交通运输工程
    • 193 篇 动力工程及工程热...
    • 164 篇 材料科学与工程(可...
    • 114 篇 安全科学与工程
    • 112 篇 航空宇航科学与技...
    • 99 篇 土木工程
  • 2,004 篇 理学
    • 1,030 篇 数学
    • 510 篇 物理学
    • 373 篇 生物学
    • 350 篇 系统科学
    • 288 篇 统计学(可授理学、...
    • 226 篇 化学
  • 731 篇 管理学
    • 525 篇 管理科学与工程(可...
    • 215 篇 图书情报与档案管...
    • 160 篇 工商管理
  • 180 篇 医学
    • 142 篇 临床医学
    • 116 篇 基础医学(可授医学...
    • 95 篇 药学(可授医学、理...
  • 86 篇 经济学
  • 84 篇 法学
  • 75 篇 农学
  • 25 篇 教育学
  • 22 篇 军事学
  • 13 篇 艺术学
  • 10 篇 文学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 199 篇 feature extracti...
  • 118 篇 training
  • 98 篇 optimization
  • 88 篇 accuracy
  • 86 篇 semantics
  • 81 篇 computational mo...
  • 80 篇 robustness
  • 78 篇 predictive model...
  • 77 篇 simulation
  • 75 篇 object detection
  • 73 篇 synthetic apertu...
  • 68 篇 image segmentati...
  • 66 篇 real-time system...
  • 64 篇 heuristic algori...
  • 61 篇 three-dimensiona...
  • 61 篇 visualization
  • 61 篇 mathematical mod...
  • 59 篇 convolution
  • 58 篇 data models
  • 57 篇 reinforcement le...

机构

  • 332 篇 department of au...
  • 312 篇 key laboratory o...
  • 197 篇 hubei province k...
  • 157 篇 department of au...
  • 142 篇 key laboratory o...
  • 138 篇 cas key laborato...
  • 132 篇 school of comput...
  • 119 篇 fujian provincia...
  • 112 篇 shanghai enginee...
  • 110 篇 college of compu...
  • 82 篇 department of au...
  • 71 篇 hubei province k...
  • 67 篇 university of ch...
  • 60 篇 aerospace inform...
  • 54 篇 key laboratory o...
  • 54 篇 state key labora...
  • 52 篇 fujian provincia...
  • 51 篇 shaanxi key labo...
  • 47 篇 college of infor...
  • 46 篇 school of electr...

作者

  • 103 篇 shaoyuan li
  • 103 篇 xinping guan
  • 79 篇 cailian chen
  • 74 篇 chen cailian
  • 73 篇 dewei li
  • 67 篇 li zuoyong
  • 67 篇 guan xinping
  • 59 篇 yugeng xi
  • 58 篇 jingcheng wang
  • 56 篇 zhang fuquan
  • 52 篇 li dewei
  • 52 篇 wang hesheng
  • 50 篇 hesheng wang
  • 49 篇 li shaoyuan
  • 47 篇 yang bo
  • 45 篇 chen zhibo
  • 44 篇 bo yang
  • 44 篇 xiaofan wang
  • 42 篇 weidong chen
  • 42 篇 yin xiang

语言

  • 5,256 篇 英文
  • 225 篇 其他
  • 115 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=The Key Laboratory of System Control and Information Processing"
5597 条 记 录,以下是541-550 订阅
排序:
Minimizing Data Collection Latency for Coexisting Time-Critical Wireless Networks with Tree Topologies
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2354-2369页
作者: Zhang, Jialin Liang, Wei Yang, Bo Shi, Huaguang Liang, Ying-Chang Chinese Academy of Sciences State Key Laboratory of Robotics Shenyang Institute of Automation Shenyang110016 China Chinese Academy of Sciences Key Laboratory of Networked Control System Shenyang Institute of Automation Shenyang110016 China Northwest A and F University College of Information Engineering Yangling712100 China Henan University School of Artificial Intelligence Zhengzhou450046 China University of Electronic Science and Technology of China Center for Intelligent Networking and Communications Chengdu611731 China
Time-Critical Wireless Network (TCWN) is a promising communication technology that can satisfy the low latency, high reliability, and deterministic requirements of mission-critical applications. Multiple TCWNs require... 详细信息
来源: 评论
Model Predictive control for T-S Fuzzy Markovian Jump systems Using Dynamic Prediction Optimization
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Bin Department of Automation Shanghai Jiao Tong University Shanghai200240 China Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai200240 China
In this paper, the model predictive control (MPC) problem is investigated for the constrained discrete-time Takagi-Sugeno fuzzy Markovian jump systems (FMJSs) under imperfect premise matching rules. To strike a balanc... 详细信息
来源: 评论
Research on Risk Management of Petrochemical Supply Chain Based on Network Dynamic Evolution Model
Research on Risk Management of Petrochemical Supply Chain Ba...
收藏 引用
Chinese Intelligent Automation Conference, CIAC 2021
作者: Pan, Chang-chun Huang, Xiaohao Sun, Weiqi Key Laboratory of Navigation and Location Based Services Shanghai Jiao Tong University Shanghai China Department of Automation Shanghai Jiao Tong University Shanghai China Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai200240 China
This paper studies the quantitative measurement method of risk occurrence and possible spread among petrochemical supply chain enterprise nodes. Combined with the characteristics of petrochemical supply chain network,... 详细信息
来源: 评论
An Unsupervised Person Search Method for Video Surveillance  22
An Unsupervised Person Search Method for Video Surveillance
收藏 引用
8th International Conference on Computing and Artificial Intelligence, ICCAI 2022
作者: Feng, Deying Yang, Jie Wei, Yanxia Xiao, Hairong Zhang, Laigang School of Mechanical and Automotive Engineering Liaocheng University China Key Laboratory of System Control and Information Processing Ministry of Education Shanghai China Institute of Image Processing and Pattern Recognition Shanghai Jiao Tong University Shanghai China Liaocheng University China
We propose an unsupervised person search method for video surveillance. This method considers both the spatial features of persons within each frame and the temporal relationship of the same person among different fra... 详细信息
来源: 评论
SFPNet: Sparse Focal Point Network for Semantic Segmentation on General LiDAR Point Clouds
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yanbo Zhao, Wentao Cao, Chuan Deng, Tianchen Wang, Jingchuan Chen, Weidong Institute of Medical Robotics Department of Automation Shanghai Jiao Tong University China Key Laboratory of System Control and Information Processing Ministry of Education Shanghai200240 China
Although LiDAR semantic segmentation advances rapidly, state-of-the-art methods often incorporate specifically designed inductive bias derived from benchmarks originating from mechanical spinning LiDAR. This can limit... 详细信息
来源: 评论
Application of improved sparrow search algorithm in wave compensation
Application of improved sparrow search algorithm in wave com...
收藏 引用
2024 International Conference on Image, Signal processing, and Pattern Recognition, ISPP 2024
作者: Hu, Ao Lin, Yunhan Chen, Yaojie School of Computer Science and Technology Wuhan University of Science and Technology Hubei Wuhan430065 China Hubei Provincial Key Laboratory of Intelligent Information Processing and Real Time Industrial System Wuhan University of Science and Technology Hubei Wuhan430065 China
To solve the problem of ship heave motion in harsh marine environments, which affects the positioning accuracy and safety of its robotic arm, this paper adopts a PID parameter optimization method based on Tent cold li... 详细信息
来源: 评论
Topology-Preserving Second-Order Consensus: A Strategic Compensation Approach
Topology-Preserving Second-Order Consensus: A Strategic Comp...
收藏 引用
IEEE Conference on Decision and control
作者: Zitong Wang Yushan Li Xiaoming Duan Jianping He Department of Automation Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai Jiao Tong University Shanghai China
The interaction topology plays a significant role in the collaboration of multiagent systems. How to preserve the topology against inference attacks has become an imperative task for security concerns. In this paper, ...
来源: 评论
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
收藏 引用
High-Confidence Computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Liuzhou 545000China Guangxi Education System Network Security Monitoring Center Liuzhou 545000China Center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 评论
Differential Game with Mixed Strategies: A Weak Approximation Approach
Differential Game with Mixed Strategies: A Weak Approximatio...
收藏 引用
IEEE Conference on Decision and control
作者: Tao Xu Wang Xi Jianping He Department of Automation Shanghai Jiao Tong University Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai China
This paper utilizes the weak approximation method to analyze differential games that involve mixed strategies. Mixed strategies have the potential to produce unique strategic behaviors, whereas traditional models and ...
来源: 评论
A Novel Two-Stage Method for Texture Defect Detection  4
A Novel Two-Stage Method for Texture Defect Detection
收藏 引用
4th International Conference on Consumer Electronics and Computer Engineering, ICCECE 2024
作者: Liu, Lu Jiang, Min Xu, Lifa School of Computer Science and Technology Wuhan University of Science and Technology Hubei WuHan430065 China Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Hubei Wuhan430065 China
Texture defect detection has wide applications in both textiles and industry, where traditional defect detection methods focus on costly manual labeling and defect samples are complex to collect in real-world industri... 详细信息
来源: 评论