咨询与建议

限定检索结果

文献类型

  • 769 篇 会议
  • 431 篇 期刊文献

馆藏范围

  • 1,200 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 785 篇 工学
    • 391 篇 计算机科学与技术...
    • 294 篇 软件工程
    • 249 篇 信息与通信工程
    • 226 篇 电子科学与技术(可...
    • 157 篇 电气工程
    • 105 篇 控制科学与工程
    • 60 篇 光学工程
    • 58 篇 仪器科学与技术
    • 53 篇 机械工程
    • 45 篇 化学工程与技术
    • 36 篇 生物工程
    • 31 篇 材料科学与工程(可...
    • 29 篇 生物医学工程(可授...
    • 27 篇 动力工程及工程热...
    • 24 篇 网络空间安全
    • 17 篇 航空宇航科学与技...
    • 16 篇 力学(可授工学、理...
    • 16 篇 建筑学
    • 11 篇 土木工程
  • 482 篇 理学
    • 309 篇 数学
    • 170 篇 物理学
    • 60 篇 统计学(可授理学、...
    • 48 篇 化学
    • 47 篇 系统科学
    • 46 篇 生物学
  • 130 篇 管理学
    • 82 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 17 篇 农学
  • 17 篇 医学
    • 15 篇 临床医学
  • 14 篇 法学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 8 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 教育学

主题

  • 35 篇 bandwidth
  • 28 篇 simulation
  • 23 篇 signal processin...
  • 20 篇 signal processin...
  • 19 篇 optimization
  • 19 篇 feature extracti...
  • 18 篇 wireless communi...
  • 17 篇 slot antennas
  • 15 篇 interference
  • 14 篇 metals
  • 14 篇 resonant frequen...
  • 13 篇 couplings
  • 13 篇 adaptive filteri...
  • 13 篇 broadband antenn...
  • 12 篇 polarization
  • 12 篇 antenna arrays
  • 12 篇 estimation
  • 12 篇 robustness
  • 11 篇 support vector m...
  • 11 篇 image segmentati...

机构

  • 210 篇 key laboratory o...
  • 101 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 54 篇 school of comput...
  • 53 篇 anhui university...
  • 42 篇 college of infor...
  • 33 篇 key laboratory o...
  • 25 篇 the key laborato...
  • 24 篇 school of electr...
  • 24 篇 key lab of intel...
  • 24 篇 anhui province k...
  • 24 篇 anhui university
  • 23 篇 key lab of intel...
  • 23 篇 school of mathem...
  • 18 篇 key lab. of inte...
  • 16 篇 key lab of intel...
  • 16 篇 key lab. of inte...
  • 15 篇 department of ph...
  • 14 篇 national mobile ...
  • 14 篇 key lab of intel...

作者

  • 82 篇 huang zhixiang
  • 76 篇 li yingsong
  • 57 篇 yingsong li
  • 57 篇 zhixiang huang
  • 54 篇 shi minjia
  • 39 篇 xianliang wu
  • 35 篇 wu xianliang
  • 33 篇 luo bin
  • 30 篇 zhang xingyi
  • 26 篇 solé patrick
  • 26 篇 tang jin
  • 24 篇 li liping
  • 24 篇 bin luo
  • 21 篇 wu xian-liang
  • 21 篇 liping li
  • 20 篇 li chenglong
  • 20 篇 li xiaohui
  • 19 篇 minquan li
  • 18 篇 xingyi zhang
  • 18 篇 yanjun hu

语言

  • 1,156 篇 英文
  • 24 篇 中文
  • 21 篇 其他
检索条件"机构=Education Ministry Key Lab. of Intelligent Computing and Signal Processing"
1200 条 记 录,以下是1021-1030 订阅
排序:
An automatic image annotation method based on the mutual K-nearest neighbor graph
An automatic image annotation method based on the mutual K-n...
收藏 引用
International Conference on Natural Computation
作者: Guo, Yu Tang Luo, Bin Department of Computer Science and Technology Hefei Normal University Hefei China Key Lab. of Intelligent Computing and Signal Processing Anhui University Hefei China
In order to improve the accuracy of the image annotation, an automatic image annotation method based on mutual K-nearest neighbor graph(MKNN) is proposed. The peoposed algorithm describes the relationship between low-... 详细信息
来源: 评论
Aggregation of interval numbers in group decision making
收藏 引用
ICIC Express Letters 2011年 第4 A期5卷 1057-1062页
作者: Deng, Yong Wu, Jiyi Sun, Xiaohong Xu, Peida Zhang, Yajuan College of Computer and Information Sciences Southwest University Tiansheng Road Beibei District Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University No. 16 Xuelin Street Xiasha Higher Education Zone Hanzhou 310036 China Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Xiangtan University Xiangtan 411105 China College of Food Science and Technology Shanghai Ocean University Hu Cheng Loop-road Lingang New City Shanghai 201306 China School of Electronics and Information Technology Shanghai Jiao Tong University Dongchuan Rd. Shanghai 200240 China
A group of decision-makers may differ in their choice of alternatives while taking a decision. So, in any decision-making problem concerning decisions made by a group, the question arises how best we can aggregate ind... 详细信息
来源: 评论
Subspace selection using semi-supervised harmonic mean of Kullback-Leibler divergences
Subspace selection using semi-supervised harmonic mean of Ku...
收藏 引用
2010 7th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2010
作者: Chen, Si-Bao Wang, Hai-Xian Luo, Bin Key Lab of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei Anhui 230039 China Key Lab of Child Development and Learning Science of Ministry of Education Research Center for Learning Science Southeast University Nanjing Jiangsu 210096 China
In many areas of pattern recognition and machine learning, subspace selection is an essential step. Fisher's linear discriminant analysis (LDA) is one of the most well-known linear subspace selection methods. Howe... 详细信息
来源: 评论
An improved target immunization strategy
An improved target immunization strategy
收藏 引用
International Conference on Digital Manufacturing and Automation (ICDMA)
作者: Zhang, Yanping Fang, Baoping Deng, Xiaochao He, Fugui Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China Key Laboratory of Physical Electronics of Anhui University of Science and Technology of China Hefei 230026 China
Strategies for network immunization have been drawing wide interest in the area of complex networks during the past decade. The target strategy, in which degree values are used to determine vaccinating priority, has b... 详细信息
来源: 评论
A more effective definition of evidential conflict combined with evidential distance
收藏 引用
Journal of Information and Computational Science 2011年 第9期8卷 1729-1734页
作者: Chen, Yuxin Wu, Jiyi Cong, Jian Jie, Wenjing Deng, Yong School of Electronics and Information Technology Shanghai Jiao Tong University Shanghai 20024 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou 310036 China College of Food Science and Technology Shanghai Ocean University 999 Hucheng Huan Road Shanghai 201306 China Key Subject Laboratory of National Defense for Radioactive Waste and Environment Security Southwest University of Science and Technology Mianyang 621010 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan Hunan 411105 China College of Computer and Information Sciences Southwest University Chongqing 400715 China
Evidence theory is widely used in many application systems such as information fusion and decision making under uncertainty environment. However, the classical Dempster combination rule is not efficient to deal with h... 详细信息
来源: 评论
Optimal aggregation of interval numbers based on genetic algorithm in group decision
收藏 引用
Journal of Information and Computational Science 2011年 第5期8卷 842-849页
作者: Kang, Bingyi Zhang, Yajuan Deng, Xinyang Wu, Jiyi Sun, Xiaohong Li, Ya Deng, Yong College of Computer and Information Sciences Southwest University Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou 310036 China College of Food Science and Technology Shanghai Ocean University 999 Hucheng Huan Road Shanghai 201306 China Key Subject Laboratory of National Defense for Radioactive Waste and Environmental Security Southwest University of Science and Technology Mianyang 621010 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan Hunan 411105 China School of Electronics and Information Technology Shanghai Jiaotong University Shanghai 200240 China
A group of decision-makers may differ in their choice of alternatives while making a decision. As a result, how to aggregate opinions of different experts is still an open issue. Due to the uncertainty in the process ... 详细信息
来源: 评论
Application of AWE to scattering analysis of the double-negative medium
Application of AWE to scattering analysis of the double-nega...
收藏 引用
2010 9th International Symposium on Antennas Propagation and EM Theory, ISAPE 2010
作者: Sun, Yu-Xin Chen, Ming-Sheng Wu, Xian-Liang Yang, Mei Wang, Hui Key Lab. of Intelligent Computing and Signal Processing Anhui University Ministry of Education Hefei China Department of Physics and Electronic Engineering Hefei Normal University Hefei China School of Information Science and Technology University of Science and Technology of China Hefei 230026 China
The PMCHWT equation of the double negative media (DNG) is obtained based on its constitutive relationship. And the surface currents and radar cross section (RCS) at a single frequency point is computed by Method of mo... 详细信息
来源: 评论
SPEECH ENDPOINT DETECTION IN NOISY ENVIRONMENTS USING EMD AND TEAGER ENERGY OPERATOR
收藏 引用
Journal of Electronic Science and Technology 2010年 第2期000卷 183-186页
作者: DE-XIANG ZHANG XIAO-PEI WU ZHAO Lü Key Lab.of Intelligent Computing and Signal Processing of Ministry of Education.Anhui University Hefei 230039China
Accurate endpoint detection is a necessary capability for speech recognition. A new energy measure method based on the empirical mode decomposition (EMD) algorithm and Teager energy operator (TEO) is proposed to locat... 详细信息
来源: 评论
A secure scheme for data statistics
A secure scheme for data statistics
收藏 引用
International Conference on E-Business and E-Government (ICEE)
作者: Huang, Hongsheng Zhong, Hong Shi, Runhua Key Laboratory of Intelligent Computing and Signal Processing Anhui University Ministry of Education Hefei Anhui 230039 China School of Computer Science and Technology Anhui University Hefei Anhui 230039 China
Secure Multi-party Computation (SMC) is a hot point concerning with information security and it is widely used in many fields, such as e-voting, e-auction and e-payment systems et al. This paper mainly discusses a spe... 详细信息
来源: 评论
Two protocols for computing the sub-polygon's areas divided by a line
Two protocols for computing the sub-polygon's areas divided ...
收藏 引用
International Conference on Advanced Computer Theory and Engineering
作者: Zhong, Hong Huang, Hongsheng Shi, Runhua Key Laboratory of Intelligent Computing and Signal Processing Anhui University Ministry of Education Hefei Anhui 230039 China School of Computer Science and Technology Anhui University Hefei Anhui 230039 China
Secure Multi-party Computation (SMC) plays an important role in information security under the circumstance of cooperation calculation, so SMC on privacy-preservation is of great interest. In this paper we discuss an ... 详细信息
来源: 评论