咨询与建议

限定检索结果

文献类型

  • 768 篇 会议
  • 431 篇 期刊文献

馆藏范围

  • 1,199 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 782 篇 工学
    • 389 篇 计算机科学与技术...
    • 295 篇 软件工程
    • 249 篇 信息与通信工程
    • 226 篇 电子科学与技术(可...
    • 157 篇 电气工程
    • 106 篇 控制科学与工程
    • 60 篇 光学工程
    • 58 篇 仪器科学与技术
    • 53 篇 机械工程
    • 45 篇 化学工程与技术
    • 36 篇 生物工程
    • 30 篇 材料科学与工程(可...
    • 29 篇 生物医学工程(可授...
    • 27 篇 动力工程及工程热...
    • 24 篇 网络空间安全
    • 17 篇 航空宇航科学与技...
    • 16 篇 力学(可授工学、理...
    • 16 篇 建筑学
    • 11 篇 土木工程
  • 482 篇 理学
    • 309 篇 数学
    • 170 篇 物理学
    • 60 篇 统计学(可授理学、...
    • 48 篇 化学
    • 47 篇 系统科学
    • 46 篇 生物学
  • 131 篇 管理学
    • 83 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 17 篇 农学
  • 17 篇 医学
    • 15 篇 临床医学
  • 14 篇 法学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 8 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 教育学

主题

  • 35 篇 bandwidth
  • 28 篇 simulation
  • 23 篇 signal processin...
  • 20 篇 signal processin...
  • 19 篇 optimization
  • 19 篇 feature extracti...
  • 18 篇 wireless communi...
  • 17 篇 slot antennas
  • 15 篇 interference
  • 14 篇 metals
  • 14 篇 resonant frequen...
  • 13 篇 couplings
  • 13 篇 adaptive filteri...
  • 13 篇 broadband antenn...
  • 12 篇 polarization
  • 12 篇 antenna arrays
  • 12 篇 estimation
  • 12 篇 robustness
  • 11 篇 support vector m...
  • 11 篇 image segmentati...

机构

  • 210 篇 key laboratory o...
  • 101 篇 key laboratory o...
  • 61 篇 key laboratory o...
  • 53 篇 anhui university...
  • 53 篇 school of comput...
  • 42 篇 college of infor...
  • 33 篇 key laboratory o...
  • 25 篇 the key laborato...
  • 24 篇 school of electr...
  • 24 篇 key lab of intel...
  • 24 篇 anhui province k...
  • 24 篇 anhui university
  • 23 篇 key lab of intel...
  • 23 篇 school of mathem...
  • 18 篇 key lab. of inte...
  • 16 篇 key lab of intel...
  • 16 篇 key lab. of inte...
  • 15 篇 department of ph...
  • 14 篇 national mobile ...
  • 14 篇 key lab of intel...

作者

  • 82 篇 huang zhixiang
  • 76 篇 li yingsong
  • 57 篇 yingsong li
  • 57 篇 zhixiang huang
  • 54 篇 shi minjia
  • 39 篇 xianliang wu
  • 35 篇 wu xianliang
  • 33 篇 luo bin
  • 30 篇 zhang xingyi
  • 26 篇 solé patrick
  • 26 篇 tang jin
  • 24 篇 li liping
  • 24 篇 bin luo
  • 21 篇 wu xian-liang
  • 21 篇 liping li
  • 20 篇 li chenglong
  • 20 篇 li xiaohui
  • 19 篇 minquan li
  • 18 篇 yanjun hu
  • 18 篇 xu lei

语言

  • 1,155 篇 英文
  • 24 篇 中文
  • 21 篇 其他
检索条件"机构=Education Ministry Key Lab. of Intelligent Computing and Signal Processing"
1199 条 记 录,以下是1021-1030 订阅
排序:
Subspace selection using semi-supervised harmonic mean of Kullback-Leibler divergences
Subspace selection using semi-supervised harmonic mean of Ku...
收藏 引用
2010 7th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2010
作者: Chen, Si-Bao Wang, Hai-Xian Luo, Bin Key Lab of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei Anhui 230039 China Key Lab of Child Development and Learning Science of Ministry of Education Research Center for Learning Science Southeast University Nanjing Jiangsu 210096 China
In many areas of pattern recognition and machine learning, subspace selection is an essential step. Fisher's linear discriminant analysis (LDA) is one of the most well-known linear subspace selection methods. Howe... 详细信息
来源: 评论
An improved target immunization strategy
An improved target immunization strategy
收藏 引用
International Conference on Digital Manufacturing and Automation (ICDMA)
作者: Zhang, Yanping Fang, Baoping Deng, Xiaochao He, Fugui Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China Key Laboratory of Physical Electronics of Anhui University of Science and Technology of China Hefei 230026 China
Strategies for network immunization have been drawing wide interest in the area of complex networks during the past decade. The target strategy, in which degree values are used to determine vaccinating priority, has b... 详细信息
来源: 评论
A more effective definition of evidential conflict combined with evidential distance
收藏 引用
Journal of Information and Computational Science 2011年 第9期8卷 1729-1734页
作者: Chen, Yuxin Wu, Jiyi Cong, Jian Jie, Wenjing Deng, Yong School of Electronics and Information Technology Shanghai Jiao Tong University Shanghai 20024 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou 310036 China College of Food Science and Technology Shanghai Ocean University 999 Hucheng Huan Road Shanghai 201306 China Key Subject Laboratory of National Defense for Radioactive Waste and Environment Security Southwest University of Science and Technology Mianyang 621010 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan Hunan 411105 China College of Computer and Information Sciences Southwest University Chongqing 400715 China
Evidence theory is widely used in many application systems such as information fusion and decision making under uncertainty environment. However, the classical Dempster combination rule is not efficient to deal with h... 详细信息
来源: 评论
Optimal aggregation of interval numbers based on genetic algorithm in group decision
收藏 引用
Journal of Information and Computational Science 2011年 第5期8卷 842-849页
作者: Kang, Bingyi Zhang, Yajuan Deng, Xinyang Wu, Jiyi Sun, Xiaohong Li, Ya Deng, Yong College of Computer and Information Sciences Southwest University Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou 310036 China College of Food Science and Technology Shanghai Ocean University 999 Hucheng Huan Road Shanghai 201306 China Key Subject Laboratory of National Defense for Radioactive Waste and Environmental Security Southwest University of Science and Technology Mianyang 621010 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan Hunan 411105 China School of Electronics and Information Technology Shanghai Jiaotong University Shanghai 200240 China
A group of decision-makers may differ in their choice of alternatives while making a decision. As a result, how to aggregate opinions of different experts is still an open issue. Due to the uncertainty in the process ... 详细信息
来源: 评论
Application of AWE to scattering analysis of the double-negative medium
Application of AWE to scattering analysis of the double-nega...
收藏 引用
2010 9th International Symposium on Antennas Propagation and EM Theory, ISAPE 2010
作者: Sun, Yu-Xin Chen, Ming-Sheng Wu, Xian-Liang Yang, Mei Wang, Hui Key Lab. of Intelligent Computing and Signal Processing Anhui University Ministry of Education Hefei China Department of Physics and Electronic Engineering Hefei Normal University Hefei China School of Information Science and Technology University of Science and Technology of China Hefei 230026 China
The PMCHWT equation of the double negative media (DNG) is obtained based on its constitutive relationship. And the surface currents and radar cross section (RCS) at a single frequency point is computed by Method of mo... 详细信息
来源: 评论
SPEECH ENDPOINT DETECTION IN NOISY ENVIRONMENTS USING EMD AND TEAGER ENERGY OPERATOR
收藏 引用
Journal of Electronic Science and Technology 2010年 第2期000卷 183-186页
作者: DE-XIANG ZHANG XIAO-PEI WU ZHAO Lü Key Lab.of Intelligent Computing and Signal Processing of Ministry of Education.Anhui University Hefei 230039China
Accurate endpoint detection is a necessary capability for speech recognition. A new energy measure method based on the empirical mode decomposition (EMD) algorithm and Teager energy operator (TEO) is proposed to locat... 详细信息
来源: 评论
A secure scheme for data statistics
A secure scheme for data statistics
收藏 引用
International Conference on E-Business and E-Government (ICEE)
作者: Huang, Hongsheng Zhong, Hong Shi, Runhua Key Laboratory of Intelligent Computing and Signal Processing Anhui University Ministry of Education Hefei Anhui 230039 China School of Computer Science and Technology Anhui University Hefei Anhui 230039 China
Secure Multi-party Computation (SMC) is a hot point concerning with information security and it is widely used in many fields, such as e-voting, e-auction and e-payment systems et al. This paper mainly discusses a spe... 详细信息
来源: 评论
Two protocols for computing the sub-polygon's areas divided by a line
Two protocols for computing the sub-polygon's areas divided ...
收藏 引用
International Conference on Advanced Computer Theory and Engineering
作者: Zhong, Hong Huang, Hongsheng Shi, Runhua Key Laboratory of Intelligent Computing and Signal Processing Anhui University Ministry of Education Hefei Anhui 230039 China School of Computer Science and Technology Anhui University Hefei Anhui 230039 China
Secure Multi-party Computation (SMC) plays an important role in information security under the circumstance of cooperation calculation, so SMC on privacy-preservation is of great interest. In this paper we discuss an ... 详细信息
来源: 评论
Ontology mapping based on structures and instances
Ontology mapping based on structures and instances
收藏 引用
International Conference on Machine Learning and Cybernetics
作者: Zheng, Cheng Shen, Ya-Ping Mei, Lin Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University China School of Computer Science Anhui University Hefei 230039 China School of Adult Education Anhui Agricultural University Hefei 230036 China
Ontology mapping is to find the mapping relationship between different ontology to reuse and share ontology. In this paper we present a multi-strategy ontology mapping technique based on the structure and instance. Wh... 详细信息
来源: 评论
Improved particle swarm algorithm for portfolio optimization problem
Improved particle swarm algorithm for portfolio optimization...
收藏 引用
2010 2nd International Conference on Industrial Mechatronics and Automation, ICIMA 2010
作者: Cao, Jianguo Tao, Liang Department of Computer Science Anhui Vocational and Technical College of Industry and Trade Huainan 232007 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China
Particle swarm optimization (PSO) is a recently proposed population-based random search algorithm, which performs well in some optimization problems. In this paper, we proposed an improved PSO algorithm to solve portf... 详细信息
来源: 评论