咨询与建议

限定检索结果

文献类型

  • 3,612 篇 会议
  • 1,962 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 5,578 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,629 篇 工学
    • 1,670 篇 计算机科学与技术...
    • 1,497 篇 软件工程
    • 962 篇 控制科学与工程
    • 751 篇 信息与通信工程
    • 575 篇 机械工程
    • 471 篇 电气工程
    • 422 篇 电子科学与技术(可...
    • 342 篇 生物工程
    • 320 篇 仪器科学与技术
    • 276 篇 光学工程
    • 230 篇 化学工程与技术
    • 217 篇 生物医学工程(可授...
    • 203 篇 交通运输工程
    • 190 篇 动力工程及工程热...
    • 165 篇 材料科学与工程(可...
    • 115 篇 安全科学与工程
    • 113 篇 航空宇航科学与技...
    • 99 篇 土木工程
  • 2,002 篇 理学
    • 1,031 篇 数学
    • 511 篇 物理学
    • 371 篇 生物学
    • 350 篇 系统科学
    • 289 篇 统计学(可授理学、...
    • 226 篇 化学
  • 731 篇 管理学
    • 526 篇 管理科学与工程(可...
    • 214 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 179 篇 医学
    • 143 篇 临床医学
    • 115 篇 基础医学(可授医学...
    • 95 篇 药学(可授医学、理...
  • 86 篇 经济学
  • 84 篇 法学
  • 74 篇 农学
  • 26 篇 教育学
  • 22 篇 军事学
  • 13 篇 艺术学
  • 10 篇 文学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 200 篇 feature extracti...
  • 120 篇 training
  • 98 篇 optimization
  • 87 篇 accuracy
  • 86 篇 semantics
  • 81 篇 computational mo...
  • 80 篇 robustness
  • 78 篇 predictive model...
  • 77 篇 simulation
  • 75 篇 object detection
  • 72 篇 synthetic apertu...
  • 68 篇 image segmentati...
  • 66 篇 real-time system...
  • 65 篇 heuristic algori...
  • 61 篇 visualization
  • 61 篇 mathematical mod...
  • 60 篇 three-dimensiona...
  • 59 篇 convolution
  • 58 篇 data models
  • 56 篇 reinforcement le...

机构

  • 331 篇 department of au...
  • 312 篇 key laboratory o...
  • 197 篇 hubei province k...
  • 157 篇 department of au...
  • 142 篇 key laboratory o...
  • 138 篇 cas key laborato...
  • 132 篇 school of comput...
  • 119 篇 fujian provincia...
  • 112 篇 shanghai enginee...
  • 110 篇 college of compu...
  • 82 篇 department of au...
  • 71 篇 hubei province k...
  • 67 篇 university of ch...
  • 60 篇 aerospace inform...
  • 54 篇 key laboratory o...
  • 54 篇 state key labora...
  • 53 篇 fujian provincia...
  • 51 篇 shaanxi key labo...
  • 47 篇 school of electr...
  • 45 篇 college of infor...

作者

  • 104 篇 shaoyuan li
  • 102 篇 xinping guan
  • 78 篇 cailian chen
  • 75 篇 chen cailian
  • 73 篇 dewei li
  • 68 篇 li zuoyong
  • 68 篇 guan xinping
  • 59 篇 yugeng xi
  • 58 篇 jingcheng wang
  • 56 篇 zhang fuquan
  • 52 篇 li dewei
  • 52 篇 wang hesheng
  • 50 篇 hesheng wang
  • 49 篇 li shaoyuan
  • 47 篇 yang bo
  • 45 篇 chen zhibo
  • 44 篇 bo yang
  • 44 篇 xiaofan wang
  • 42 篇 weidong chen
  • 42 篇 yin xiang

语言

  • 5,247 篇 英文
  • 213 篇 其他
  • 115 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=and Key Laboratory of System Control and Information Processing"
5578 条 记 录,以下是4711-4720 订阅
排序:
Vision-based environmental perception and navigation of micro-intelligent vehicles  7
收藏 引用
7th International Conference on Intelligent systems and Knowledge Engineering, ISKE 2012 with 1st International Conference on Cognitive systems and information processing, CSIP 2012
作者: Yang, Ming Lu, Zhengchen Guo, Lindong Wang, Bing Wang, Chunxiang Department of Automation Shanghai Jiao Tong University Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai200240 China Research Institute of Robotics Shanghai Jiao Tong University Shanghai200240 China
The adjustment of actual environmental traffic flow experiments is complicated and time-consuming. In this paper, a method based on micro-intelligent vehicles (micro-IV) is proposed to overcome these unfavorable facto... 详细信息
来源: 评论
Improving L2 gain performance of linear systems by reset control  19
Improving L2 gain performance of linear systems by reset con...
收藏 引用
19th IFAC World Congress on International Federation of Automatic control, IFAC 2014
作者: Zhao, Guanglei Nešić, Dragan Tan, Ying Wang, Jingcheng Department of Automation Shanghai Jiao Tong University Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai200240 China Department of Electrical and Electronic Engineering University of Melbourne ParkvilleVIC3010 Australia
In this paper, new Lyapunov-based reset rules are constructed to improve C2 gain performance of linear-time-invariant (LTI) systems. By using the hybrid system framework, sufficient conditions for exponential and fini... 详细信息
来源: 评论
Implemention of cyber security situation awareness based on knowledge discovery with trusted computer
Implemention of cyber security situation awareness based on ...
收藏 引用
APWeb 2014 Workshops: 1st International Workshop on Social Network Analysis, SNA 2014, 1st International Workshop on Network and information Security, NIS 2014 and 1st International Workshop on Internet of Things Search, IOTS 2014
作者: Jiemei, Zeng Xuewei, Feng Dongxia, Wang Lan, Fang Beijing Aerospace Control Center Beijing 100296 China Beijing Institute of System Engineer National Key Laboratory of Science and Technology on Information System Security Beijing 100101 China
Situation awareness aims to provide the global security views of the cyberspace for administrators. In this paper, a novel framework of cyber security situation awareness is proposed. The framework is based on a trust... 详细信息
来源: 评论
A Low-Power Task Mapping Method for Network on Chip
A Low-Power Task Mapping Method for Network on Chip
收藏 引用
Chinese Automation Congress
作者: Wenwen Cao Wei Hu Puzhang Wang Mengke Song Ruomiao Li College of Computer Science and Technology Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System
When more and more processor cores are integrated onto a single chip, the computing ability has been improved dramatically. And the power consumed by the cores is also increased. More tasks can run in parallel for hig... 详细信息
来源: 评论
Fault subspace selection and analysis of relative changes based reconstruction modeling for multi-fault diagnosis
Fault subspace selection and analysis of relative changes ba...
收藏 引用
第26届中国控制与决策会议
作者: Chunhui Zhao State Key Laboratory of Industrial Control Technology Department of Control Science and EngineeringZhejiang University Key Laboratory of System Control and Information Processing Ministry of Education
Online fault diagnosis has been a crucial task for industrial processes. Reconstruction-based fault diagnosis has been drawing special attentions as a good alternative to the traditional contribution plot. It identifi... 详细信息
来源: 评论
Persistent Tracking of a Dynamic Target by a Mobile Robot  33
Persistent Tracking of a Dynamic Target by a Mobile Robot
收藏 引用
第三十三届中国控制会议
作者: LIANG Xiao FANG Yongchun YANG Dedong Institute of Robotics and Automatic Information System Nankai University Tianjin Key Laboratory of Intelligent Robotics Nankai University Shool of Control Science and Engineering Hebei University of Technology
A novel pursuing algorithm, together with a new experiment method, is introduced to drive a nonholonomic mobile robot tracking a dynamic target in the framework of pursuit-evasion game. Specifically, a pan-tilt with a... 详细信息
来源: 评论
Optimum Design of Fractional Order PID controller for an AVR system Using an Improved Artificial Bee Colony Algorithm
收藏 引用
自动化学报 2014年 第5期40卷 973-980页
作者: ZHANG Dong-Li TANG Ying-Gan GUAN Xin-Ping Institute of Electrical Engineering Yanshan University Qinhuangdao 066004 China Key Laboratory of System Control and Information Processing Ministry of Education Shanghai 200240 China Institute of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai 200240 China
Fractional order proportional-integral-derivative (FOPID) controller generalizes the standard PID controller. Compared to PID controller, FOPID controller has more parameters and the tuning of parameters is more compl... 详细信息
来源: 评论
Reversible spiking neural P systems with astrocytes
Communications in Computer and Information Science
收藏 引用
Communications in Computer and information Science 2014年 472卷 221-224页
作者: Kong, Yuan Shi, Xiaolong Xu, Jinbang Huang, Xinquan Key Laboratory of Image Information Processing and Intelligent Control School of Automation Huazhong University of Science and Technology Wuhan Hubei430074 China School of Computer Science Wuhan University of Science and Technology Wuhan Hubei430081 China
Spiking neural P systems with astrocytes (SNPA systems, for short) are a class of distributed parallel computing devices inspired from the way neurons communicate by means of spikes. In this work, we investigate the r... 详细信息
来源: 评论
Learning to Rank for Blind Image Quality Assessment
收藏 引用
IEEE Transactions on Neural Networks and Learning systems 2015年 第10期26卷 2275-2290页
作者: Gao, Fei Tao, Dacheng Gao, Xinbo Li, Xuelong Video and Image Processing System Laboratory School of Electronic Engineering Xidian University Xi'an710071 China Centre for Quantum Computation and Intelligent Systems Faculty of Engineering and Information Technology University of Technology 235 Jones Street Sydney UltimoNSW2007 Australia State Key Laboratory of Integrated Services Networks School of Electronic Engineering Xidian University Xi'an710071 China State Key Laboratory of Transient Optics and Photonics Xi'An Institute of Optics and Precision Mechanics Chinese Academy of Sciences Xi'an Shaanxi710119 China
Blind image quality assessment (BIQA) aims to predict perceptual image quality scores without access to reference images. State-of-the-art BIQA methods typically require subjects to score a large number of images to t... 详细信息
来源: 评论
On YASS’s Non-monotonic Security Performance
收藏 引用
Circuits, systems, and Signal processing 2014年 第11期33卷 3527-3537页
作者: Yu, Lifang Zhao, Yao Ni, Rongrong Shi, Yun Qing Institute of Information Science Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Signal and Information Processing for High-end Printing Equipments Beijing Institute of Graphic Communication Beijing102600 China State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China Department of Electrical and Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States
Recently, researchers have discovered unexpected bumps in the detection rate curve of yet another steganographic scheme (YASS). We refer to this abnormal phenomenon as non-monotonic security performance. This paper fi... 详细信息
来源: 评论