Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 213-219.doi: 10.11896/JsJkx.191100089
• Computer Graphics & Multimedia • Previous Articles Next Articles
LI Lin1, ZHAO Kai-yue1, ZHAO Xiao-yong2, WEI Shuai-qin3 and ZHANG Bing4
CLC Number:
[1] LI C Q.Research on Key Technologies of Fuzzy License Plate Image Recognition in Monitoring Video .NanJing:NanJing University of Posts and Telecommunications,2017. [2] HU Z P,CHEN J L,WANG M,et al.New Progress of Convolutional Neural Network Classification Model in Pattern Recognition .Journal of Yanshan University,2015,39(4):283-291. [3] LE C Y,BOTTOU L,BENGIO Y,et al.Gradient-Based learning applied to document recognition//Proc.of the IEEE.1998:2278-2324. [4] BU Y J.Research on Algorithms of License Plate RecognitionSystem Based on Computer Vision .University of Electronic Science and Technology,2015. [5] WANG Z.Research and Improvement of License Plate Recognition System .Shenyang:Shenyang University of Technology,2016. [6] DING M L,DING M Y,NIU Y L,et al.A Method of Identifying Commodity Parameters in Pictures Based on Deep Learning .Journal of Software,2018,29(4):1039-1048. [7] ZHANG S L.Research on Classification of Vehicle Brands Based on Vision .Dalian:Dalian University of Technology,2015. [8] ZHANG S.Research on Docker Fault-tolerant Performance Monitoring and Adaptive Pre-replication Checkpoint Technology .Nanning:Guangxi University,2017. |
[1] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[2] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[3] | XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171. |
[4] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[5] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[6] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[7] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[8] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[9] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[10] | HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163. |
[11] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
[12] | SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235. |
[13] | WANG Jun-feng, LIU Fan, YANG Sai, LYU Tan-yue, CHEN Zhi-yu, XU Feng. Dam Crack Detection Based on Multi-source Transfer Learning [J]. Computer Science, 2022, 49(6A): 319-324. |
[14] | CHU Yu-chun, GONG Hang, Wang Xue-fang, LIU Pei-shun. Study on Knowledge Distillation of Target Detection Algorithm Based on YOLOv4 [J]. Computer Science, 2022, 49(6A): 337-344. |
[15] | ZHOU Zhi-hao, CHEN Lei, WU Xiang, QIU Dong-liang, LIANG Guang-sheng, ZENG Fan-qiao. SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm [J]. Computer Science, 2022, 49(6A): 562-570. |
|