咨询与建议

限定检索结果

文献类型

  • 916 篇 会议
  • 483 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,400 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 885 篇 工学
    • 435 篇 计算机科学与技术...
    • 329 篇 软件工程
    • 276 篇 信息与通信工程
    • 272 篇 电子科学与技术(可...
    • 187 篇 电气工程
    • 120 篇 控制科学与工程
    • 71 篇 光学工程
    • 64 篇 仪器科学与技术
    • 57 篇 机械工程
    • 48 篇 生物工程
    • 47 篇 化学工程与技术
    • 36 篇 生物医学工程(可授...
    • 32 篇 材料科学与工程(可...
    • 29 篇 动力工程及工程热...
    • 25 篇 网络空间安全
    • 20 篇 力学(可授工学、理...
    • 16 篇 建筑学
    • 16 篇 航空宇航科学与技...
  • 548 篇 理学
    • 347 篇 数学
    • 204 篇 物理学
    • 67 篇 统计学(可授理学、...
    • 59 篇 生物学
    • 57 篇 系统科学
    • 53 篇 化学
  • 139 篇 管理学
    • 91 篇 管理科学与工程(可...
    • 54 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 21 篇 医学
    • 18 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 19 篇 农学
  • 18 篇 法学
    • 13 篇 社会学
  • 12 篇 经济学
  • 9 篇 军事学
  • 3 篇 文学
  • 2 篇 艺术学
  • 1 篇 教育学

主题

  • 39 篇 bandwidth
  • 38 篇 signal processin...
  • 35 篇 signal processin...
  • 29 篇 simulation
  • 28 篇 feature extracti...
  • 20 篇 optimization
  • 19 篇 wireless communi...
  • 19 篇 computational mo...
  • 19 篇 method of moment...
  • 18 篇 slot antennas
  • 17 篇 image segmentati...
  • 17 篇 couplings
  • 17 篇 laboratories
  • 17 篇 robustness
  • 16 篇 interference
  • 16 篇 finite differenc...
  • 16 篇 accuracy
  • 15 篇 metals
  • 15 篇 time-domain anal...
  • 15 篇 equations

机构

  • 210 篇 key laboratory o...
  • 102 篇 key laboratory o...
  • 65 篇 school of comput...
  • 62 篇 key laboratory o...
  • 53 篇 anhui university...
  • 53 篇 key laboratory o...
  • 42 篇 college of infor...
  • 33 篇 key laboratory o...
  • 33 篇 key laboratory o...
  • 25 篇 the key laborato...
  • 25 篇 department of ph...
  • 24 篇 key lab of intel...
  • 24 篇 anhui province k...
  • 24 篇 anhui university
  • 23 篇 school of electr...
  • 23 篇 key lab of intel...
  • 21 篇 school of mathem...
  • 18 篇 key lab. of inte...
  • 16 篇 national mobile ...
  • 16 篇 key lab of intel...

作者

  • 87 篇 huang zhixiang
  • 75 篇 li yingsong
  • 71 篇 zhixiang huang
  • 57 篇 yingsong li
  • 56 篇 xianliang wu
  • 53 篇 shi minjia
  • 42 篇 wu xianliang
  • 36 篇 wu xian-liang
  • 36 篇 luo bin
  • 35 篇 bin luo
  • 31 篇 zhang xingyi
  • 28 篇 tang jin
  • 26 篇 solé patrick
  • 25 篇 li liping
  • 22 篇 minquan li
  • 22 篇 huang zhi-xiang
  • 21 篇 li chenglong
  • 21 篇 yanjun hu
  • 21 篇 zhang yanping
  • 21 篇 liping li

语言

  • 1,328 篇 英文
  • 38 篇 中文
  • 36 篇 其他
检索条件"机构=Intelligent Computing and Signal Processing"
1400 条 记 录,以下是1151-1160 订阅
排序:
Locating human eyes in face images based on illumination normalization and progressive thresholding
Locating human eyes in face images based on illumination nor...
收藏 引用
International Conference on Computer Science and Education
作者: Wang, Hua-Bin Tao, Liang Hu, Xue-You Wang, Shi-Yi Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei Anhui 230039 China
Based on illumination normalization and progressive thresholding, this paper presents a novel algorithm for automatic localization of human eyes in still images with complex background. First of all, Retinex method is... 详细信息
来源: 评论
Teaching reform and innovation of the course - Digital image processing experiments
Teaching reform and innovation of the course - Digital image...
收藏 引用
International Conference on Computer Science and Education
作者: Zhao, Haifeng Tang, Jin Luo, Bin Key Lab of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei 230039 China
Digital image processing is an interdisciplinary course, which needs students have a strong background in mathematics. To help them change from passive learning to active learning, teaching reform and innovation of th... 详细信息
来源: 评论
A secure distributed key management scheme for ad hoc network
A secure distributed key management scheme for ad hoc networ...
收藏 引用
2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010
作者: Xu, Yan Zhong, Hong Yuan, Xianping Yu, Jia Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei China College of Information Engineering Qingdao University Qingdao China
An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced b... 详细信息
来源: 评论
An automatic image annotation method based on the mutual K-nearest neighbor graph
An automatic image annotation method based on the mutual K-n...
收藏 引用
International Conference on Natural Computation
作者: Guo, Yu Tang Luo, Bin Department of Computer Science and Technology Hefei Normal University Hefei China Key Lab. of Intelligent Computing and Signal Processing Anhui University Hefei China
In order to improve the accuracy of the image annotation, an automatic image annotation method based on mutual K-nearest neighbor graph(MKNN) is proposed. The peoposed algorithm describes the relationship between low-... 详细信息
来源: 评论
Face recognition using fuzzy rough set and support vector machine
Face recognition using fuzzy rough set and support vector ma...
收藏 引用
2010 IEEE International Conference on intelligent computing and intelligent Systems, ICIS 2010
作者: Wang, Shi-Yi Tao, Liang MOE Key Laboratory of Intelligent Computing and Signal Processing Anhui University Hefei Anhui 230039 China Computer Department Chaohu College Chaohu 238000 China
This paper proposes a method of face recognition using the support vector machine (SVM) based on the fuzzy rough set theory (FRST). Firstly, features from human face images are extracted by combining the 2-D wavelet d... 详细信息
来源: 评论
Motor imagery classification based on the optimized SVM and BPNN by GA
Motor imagery classification based on the optimized SVM and ...
收藏 引用
2010 International Conference on intelligent Control and Information processing, ICICIP 2010
作者: Jiao, Yingying Wu, Xiaopei Guo, Xiaojing Key Laboratory of Intelligent Computing and Signal Processing of MOE Anhui University Hefei 230039 Anhui Province China School of Computer Science and Technology Anhui University China
Brain-computer interface (BCI) is a specific Human-Computer interface in which the brain wave is employed as the carrier of control information. The ultimate goal of BCI is to build a direct communication pathway betw... 详细信息
来源: 评论
Design of image-reject hairpin filter applied for Ku-band LNB
Design of image-reject hairpin filter applied for Ku-band LN...
收藏 引用
2010 9th International Symposium on Antennas Propagation and EM Theory, ISAPE 2010
作者: Sun, Jia-Xun Huang, Zhi-Xiang Wu, Xian-Liang Wang, Hui Zhou, Yan Key Lab of Intelligent Computing and Signal Processing Anhui University Ministry of Education Hefei China Department of Physics and Electronic Engineering Hefei Normal University Hefei China
An image-reject hairpin bandpass filter used in Ku-band low noise block (LNB) is designed, and optimized in the paper. The designed detail of the filter is explained and the image-reject is illustrated theoretically. ... 详细信息
来源: 评论
Block wavelet transforms of image reconstruction using compressed sampling
Block wavelet transforms of image reconstruction using compr...
收藏 引用
International Congress on Image and signal processing
作者: Zhang, Liang Wu, Xian-Liang Key Laboratory of Intelligent Computing and Signal Processing Anhui University Hefei 230039 China Department of Physics and Electronic Engineering Hefei Teachers College Hefei 230061 China
This paper describes the compressed sampling using the block wavelet transform which has more flexibility in reconstruction the images. Compressed sampling is considered for signals and images that are sparse in a wav... 详细信息
来源: 评论
A distributed group signature scheme with traceable signers for mobile Ad hoc networks
A distributed group signature scheme with traceable signers ...
收藏 引用
2010 International Conference on Computer Application and System Modeling, ICCASM 2010
作者: Zhong, Hong Shi, Runhua Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China School of Computer Science and Technology Anhui University Hefei 230039 China
In this paper, we propose a distributed group signature scheme with traceable signers for mobile Ad hoc networks. In such scheme, there isn't a trusted center, and all members of Ad hoc group cooperate to generate... 详细信息
来源: 评论
Analysis of mode characteristic of guided electromagnetic wave in mine tunnels
Analysis of mode characteristic of guided electromagnetic wa...
收藏 引用
International Conference on intelligent computing and intelligent Systems
作者: Yao, Shan-Hua Wu, Xian-Liang School of Electric and Information Engineering Anhui University of Science and Technology Huainan China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei China
According to the surface impedance method, the equations of both monofilar mode and bifilar mode of guided electromagnetic waves in mine tunnels were presented, the distribution of synthesized electromagnetic field in... 详细信息
来源: 评论