咨询与建议

限定检索结果

文献类型

  • 1,300 篇 会议
  • 720 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 2,023 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,291 篇 工学
    • 756 篇 计算机科学与技术...
    • 605 篇 软件工程
    • 361 篇 信息与通信工程
    • 289 篇 电子科学与技术(可...
    • 200 篇 电气工程
    • 163 篇 控制科学与工程
    • 107 篇 光学工程
    • 90 篇 机械工程
    • 84 篇 生物工程
    • 77 篇 仪器科学与技术
    • 74 篇 化学工程与技术
    • 54 篇 生物医学工程(可授...
    • 37 篇 材料科学与工程(可...
    • 35 篇 动力工程及工程热...
    • 35 篇 网络空间安全
    • 26 篇 建筑学
    • 22 篇 力学(可授工学、理...
  • 724 篇 理学
    • 457 篇 数学
    • 247 篇 物理学
    • 106 篇 生物学
    • 97 篇 统计学(可授理学、...
    • 73 篇 化学
    • 64 篇 系统科学
  • 284 篇 管理学
    • 155 篇 图书情报与档案管...
    • 140 篇 管理科学与工程(可...
    • 37 篇 工商管理
  • 34 篇 医学
    • 28 篇 临床医学
    • 23 篇 基础医学(可授医学...
  • 32 篇 农学
    • 22 篇 作物学
  • 26 篇 法学
    • 21 篇 社会学
  • 20 篇 经济学
  • 9 篇 军事学
  • 5 篇 艺术学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 49 篇 semantics
  • 45 篇 feature extracti...
  • 40 篇 signal processin...
  • 40 篇 training
  • 39 篇 bandwidth
  • 35 篇 signal processin...
  • 35 篇 computational mo...
  • 29 篇 simulation
  • 28 篇 optimization
  • 27 篇 robustness
  • 23 篇 image segmentati...
  • 22 篇 object detection
  • 21 篇 neural networks
  • 20 篇 deep learning
  • 20 篇 wireless communi...
  • 20 篇 visualization
  • 19 篇 data mining
  • 19 篇 proteins
  • 19 篇 method of moment...
  • 19 篇 computer vision

机构

  • 207 篇 key laboratory o...
  • 105 篇 university of ch...
  • 102 篇 key laboratory o...
  • 66 篇 school of comput...
  • 65 篇 shanghai key lab...
  • 65 篇 key lab of intel...
  • 63 篇 key laboratory o...
  • 54 篇 key laboratory o...
  • 53 篇 anhui university...
  • 51 篇 key lab of intel...
  • 51 篇 shanghai collabo...
  • 43 篇 college of infor...
  • 39 篇 shanghai collabo...
  • 33 篇 key laboratory o...
  • 33 篇 key laboratory o...
  • 30 篇 key lab. of inte...
  • 25 篇 department of ph...
  • 24 篇 school of electr...
  • 24 篇 school of comput...
  • 24 篇 key lab of intel...

作者

  • 85 篇 huang zhixiang
  • 75 篇 li yingsong
  • 72 篇 zhixiang huang
  • 60 篇 jiang yu-gang
  • 58 篇 yingsong li
  • 56 篇 xianliang wu
  • 55 篇 shi minjia
  • 52 篇 wu zuxuan
  • 42 篇 wu xianliang
  • 36 篇 wu xian-liang
  • 36 篇 luo bin
  • 35 篇 bin luo
  • 29 篇 huang qingming
  • 29 篇 zhang xingyi
  • 28 篇 tang jin
  • 28 篇 zhuge hai
  • 26 篇 chen jingjing
  • 26 篇 solé patrick
  • 25 篇 liu qun
  • 25 篇 li liping

语言

  • 1,812 篇 英文
  • 169 篇 其他
  • 51 篇 中文
检索条件"机构=Key Lab of Intelligent Computing and Signal Processing"
2023 条 记 录,以下是1581-1590 订阅
排序:
Modeling for MIMO wireless channels in mine tunnels
Modeling for MIMO wireless channels in mine tunnels
收藏 引用
2011 International Conference on Electric Information and Control Engineering, ICEICE 2011
作者: Yao, Shan-Hua Wu, Xian-Liang School of Electric and Information Engineering Anhui University of Science and Technology Huainan China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei China
The electromagnetic waves propagation situation is very complex in mine tunnels, so it is important to establish an efficient MIMO channel model for applying wireless communication technology to coal mine underground.... 详细信息
来源: 评论
Asymmetric multiparty-controlled teleportation of arbitrary n-qudit states using different quantum channels
Asymmetric multiparty-controlled teleportation of arbitrary ...
收藏 引用
2011 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011
作者: Shi, Run-Hua Zhong, Hong Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China School of Computer Science and Technology Anhui University Hefei 230039 China
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes th... 详细信息
来源: 评论
Research on the maximum flow in large-scale network
Research on the maximum flow in large-scale network
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Zhang, Yan-Ping Hua, Bo Jiang, Juan Zhang, Yuan Chen, Xiao-Yan School of Computer Science and Technology Anhui University Hefei 230039 China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei 230039 Anhui Province China
This article covers a problem that often arises in real life situations-the maximum flow problem. This problem is a classical combinatorial optimization problem, which arises in many engineering and scientific applica... 详细信息
来源: 评论
Efficient query protocol for database's privacy
Efficient query protocol for database's privacy
收藏 引用
2011 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011
作者: Yuan, Xianping Zhong, Hong Huang, Hongsheng Yi, Lei Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei Anhui 230039 China School of Computer Science and Technology Anhui University Hefei Anhui 230039 China
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to... 详细信息
来源: 评论
A new scheme for information hiding based on digital images
A new scheme for information hiding based on digital images
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Zhang, Yan-Ping Jiang, Juan Xu, Chao Hua, Bo Chen, Xiao-Yan School of Computer Science and Technology Anhui University Hefei 230039 China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei 230039 Anhui Province China
Digital steganography is a kind of data security technique. In this paper, a new information hiding scheme was proposed. In this scheme, we embed secret message into still digital images based on (7, 4) Hamming Code a... 详细信息
来源: 评论
Preface
Proceedings - 2012 3rd Global Congress on Intelligent System...
收藏 引用
Proceedings - 2012 3rd Global Congress on intelligent Systems, GCIS 2012 2012年 xiii-xiv页
作者: Xu, Li Da Key Lab of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China Institute of Systems Science and Engineering Wuhan University of Technology China
来源: 评论
On alpha-mean of Kullback-Leibler divergences for subspace selection
On alpha-mean of Kullback-Leibler divergences for subspace s...
收藏 引用
2011 8th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011, Jointly with the 2011 7th International Conference on Natural Computation, ICNC'11
作者: Chen, Si-Bao Wang, Hai-Xian Zhang, Xing-Yi Luo, Bin Key Lab of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei 230039 China Key Lab of Child Development and Learning Science of Ministry of Education Research Center for Learning Science Southeast University Nanjing Jiangsu 210096 China
Fisher's linear discriminant analysis (FLDA) is one of the most well-known linear subspace selection methods. However, FLDA suffers from the class separation problem. The projection to a subspace tends to merge cl... 详细信息
来源: 评论
Analysis of asymptotic approximation SER in DiffAF cooperative communication networks
收藏 引用
Journal of Information and Computational Science 2011年 第13期8卷 2893-2901页
作者: Xu, Lei Zhang, Hongwei Li, Xiaohui Wu, Xianliang Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China
In conventional single-antenna systems, differential modulation is useful when the knowledge of channel state information (CSI) is not available. Some time division multiple access (TDMA) wireless cooperative relay pr... 详细信息
来源: 评论
Novel Algorithm for Hand Vein Recognition Based on Retinex Method and SIFT Feature Analysis
Novel Algorithm for Hand Vein Recognition Based on Retinex M...
收藏 引用
The 2011 International Conference on Electric and Electronics(EEIC 2011)
作者: Hua-bin Wang Liang Tao Xue-you Hu Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University
Based on the Retinex method and the SIFT feature analysis, this paper presents a novel algorithm for hand vein recognition. First of all, the principle of the near-infrared hand vein image acquisition is introduced. S... 详细信息
来源: 评论
Analysis of asymptotic approximation SER for Alamouti code transmission protocol in cooperative communication networks
收藏 引用
Journal of Information and Computational Science 2011年 第14期8卷 3003-3010页
作者: Xu, Lei Zhang, Hongwei Li, Xiaohui Wu, Xianliang Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China
Some time division multiple access (TDMA) wireless cooperative relay protocols have recently been developed. The works about their symbol error rate (SER) performance, however, are limited to SER upper bounds or SER f... 详细信息
来源: 评论