×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
上海大学 [45]
内容类型
会议论文 [29]
期刊论文 [16]
发表日期
2018 [10]
2017 [3]
2016 [1]
2015 [1]
2014 [4]
2013 [11]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共45条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
One-step assembly of CuMo2S3 nanocrystals for the synergistic effect of photothermal therapy and photodynamic therapy
期刊论文
Dalton transactions (Cambridge, England : 2003), 2018
作者:
Huang Zhi[1]
;
Liu Xijian[2]
;
Deng Guoying[3]
;
Yuan Haikuan[4]
;
Wang Qiugeng[5]
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/04/24
Human Pose Recognition Based on Depth Image Multifeature Fusion
期刊论文
COMPLEXITY, 2018
作者:
Wang, Haikuan[1]
;
Zhou, Feixiang[2]
;
Zhou, Wenju[3]
;
Chen, Ling[4]
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/04/22
Maximally Stable Extremal Regions Improved Tracking Algorithm Based on Depth Image
会议论文
1st International Conference on Intelligent Manufacturing and Internet of Things, IMIOT 2018 and International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2018, 2018-09-21
作者:
Wang, Haikuan[1]
;
Xie, Dong[2]
;
Sun, Haoxiang[3]
;
Zhou, Wenju[4]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/22
Experimental Analysis of Networked Visual Servoing Inverted Pendulum System under Noise Attacks
会议论文
27th IEEE International Symposium on Industrial Electronics, ISIE 2018, 2018-06-13
作者:
Zhan, Guohua[1]
;
Du, Dajun[2]
;
Wang, Haikuan[3]
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/04/22
Head Ternary Pattern-Head Shoulder Density Features Pedestrian Detection Algorithm Based on Depth Image
会议论文
1st International Conference on Intelligent Manufacturing and Internet of Things, IMIOT 2018 and International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2018, 2018-09-21
作者:
Wang, Haikuan[1]
;
Sun, Haoxiang[2]
;
Liu, Kangli[3]
;
Fei, Minrui[4]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/22
Dynamic Hand Gesture Recognition Based on the Three-Dimensional Spatial Trajectory Feature and Hidden Markov Model
会议论文
1st International Conference on Intelligent Manufacturing and Internet of Things, IMIOT 2018 and International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2018, 2018-09-21
作者:
Liu, Kangli[1]
;
Zhou, Feixiang[2]
;
Wang, Haikuan[3]
;
Fei, Minrui[4]
;
Du, Dajun[5]
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/04/22
A Novel 3D Head Multi-feature Constraint Method for Human Localization Based on Multiple Depth Cameras
会议论文
1st International Conference on Intelligent Manufacturing and Internet of Things, IMIOT 2018 and International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2018, 2018-09-21
作者:
Zhou, Feixiang[1]
;
Wang, Haikuan[2]
;
Yang, Zhile[3]
;
Xie, Dong[4]
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/04/22
Facile assembling of novel polypyrrole nanocomposites theranostic agent for magnetic resonance and computed tomography imaging guided efficient photothermal ablation of tumors
期刊论文
Journal of colloid and interface science, 2018, 卷号: 530, 页码: 547-555
作者:
Yan Dawei[1]
;
Liu Xijian[2]
;
Deng Guoying[3]
;
Yuan Haikuan[4]
;
Wang Qiugeng[5]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/22
Computed tomography imaging
Photothermal therapy
Polypyrrole nanocomposites
Theranostic agent
Stability analysis of token-based wireless networked control systems under deception attacks
期刊论文
INFORMATION SCIENCES, 2018, 卷号: 459, 页码: 168-182
作者:
Du, Dajun[1]
;
Zhang, Changda[2]
;
Wang, Haikuan[3]
;
Li, Xue[4]
;
Hu, Huosheng[5]
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/04/22
Deception attacks
Token-based protocol
Kalman filter
Wireless networked control systems
Switched systems
Anomaly behavior detection and reliability assessment of control systems based on association rules
期刊论文
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 卷号: 22, 页码: 90-99
作者:
Jie, Xinchun[1]
;
Wang, Haikuan[2]
;
Fei, Minrui[3]
;
Du, Dajun[4]
;
Sun, Qing[5]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/22
Anomaly detection
Network intrusion
Association rules
Apriori algorithm
©版权所有 ©2017 CSpace - Powered by
CSpace