咨询与建议

限定检索结果

文献类型

  • 943 篇 会议
  • 713 篇 期刊文献

馆藏范围

  • 1,656 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,050 篇 工学
    • 558 篇 计算机科学与技术...
    • 412 篇 软件工程
    • 306 篇 信息与通信工程
    • 259 篇 电子科学与技术(可...
    • 199 篇 电气工程
    • 136 篇 控制科学与工程
    • 81 篇 光学工程
    • 74 篇 机械工程
    • 70 篇 生物工程
    • 69 篇 仪器科学与技术
    • 64 篇 化学工程与技术
    • 50 篇 动力工程及工程热...
    • 49 篇 生物医学工程(可授...
    • 42 篇 材料科学与工程(可...
    • 30 篇 网络空间安全
    • 26 篇 力学(可授工学、理...
    • 26 篇 建筑学
    • 22 篇 土木工程
    • 19 篇 环境科学与工程(可...
  • 738 篇 理学
    • 480 篇 数学
    • 236 篇 物理学
    • 101 篇 统计学(可授理学、...
    • 90 篇 生物学
    • 80 篇 系统科学
    • 69 篇 化学
  • 180 篇 管理学
    • 113 篇 管理科学与工程(可...
    • 75 篇 图书情报与档案管...
    • 39 篇 工商管理
  • 27 篇 法学
    • 21 篇 社会学
  • 26 篇 医学
    • 22 篇 临床医学
  • 22 篇 农学
  • 13 篇 经济学
  • 9 篇 军事学
  • 5 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 35 篇 bandwidth
  • 35 篇 feature extracti...
  • 28 篇 simulation
  • 25 篇 semantics
  • 25 篇 signal processin...
  • 24 篇 image segmentati...
  • 24 篇 signal processin...
  • 23 篇 optimization
  • 18 篇 wireless communi...
  • 18 篇 computational mo...
  • 17 篇 slot antennas
  • 17 篇 accuracy
  • 16 篇 deep learning
  • 16 篇 interference
  • 16 篇 training
  • 15 篇 complex networks
  • 15 篇 neural networks
  • 15 篇 laboratories
  • 15 篇 resonant frequen...
  • 14 篇 metals

机构

  • 210 篇 key laboratory o...
  • 101 篇 key laboratory o...
  • 61 篇 key laboratory o...
  • 55 篇 school of comput...
  • 53 篇 anhui university...
  • 42 篇 college of infor...
  • 35 篇 key laboratory o...
  • 33 篇 key laboratory o...
  • 28 篇 college of compu...
  • 25 篇 the key laborato...
  • 24 篇 key lab of intel...
  • 24 篇 anhui province k...
  • 24 篇 anhui university
  • 23 篇 school of electr...
  • 23 篇 key lab of intel...
  • 23 篇 school of mathem...
  • 22 篇 fujian key labor...
  • 19 篇 engineering rese...
  • 17 篇 college of mathe...
  • 17 篇 key laboratory o...

作者

  • 82 篇 huang zhixiang
  • 76 篇 li yingsong
  • 57 篇 yingsong li
  • 57 篇 zhixiang huang
  • 55 篇 shi minjia
  • 41 篇 xianliang wu
  • 37 篇 wu xianliang
  • 30 篇 zhang xingyi
  • 29 篇 jiang kai
  • 29 篇 luo bin
  • 26 篇 solé patrick
  • 24 篇 zou juan
  • 24 篇 li liping
  • 24 篇 tang jin
  • 23 篇 bin luo
  • 21 篇 wu xian-liang
  • 21 篇 liping li
  • 21 篇 li xiaohui
  • 20 篇 li chenglong
  • 20 篇 yanjun hu

语言

  • 1,575 篇 英文
  • 48 篇 其他
  • 40 篇 中文
检索条件"机构=Key Laboratory Intelligent Computing and Signal Processing of the Ministry of Education"
1656 条 记 录,以下是1491-1500 订阅
排序:
Speech Endpoint Detection in Noisy Environments Using EMD and Teager Energy Operator
收藏 引用
Journal of Electronic Science and Technology 2010年 第2期8卷 183-186页
作者: De-Xiang Zhang Xiao-Pei Wu Zhao Lv Key Lab. of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei 230039 China
Accurate endpoint detection is a necessary capability for speech recognition. A new energy measure method based on the empirical mode decomposition (EMD) algorithm and Teager energy operator (TEO) is proposed to l... 详细信息
来源: 评论
Locating Human Eyes in Face Images Based on Illumination Normalization and Progressive Thresholding
Locating Human Eyes in Face Images Based on Illumination Nor...
收藏 引用
The 5th International Conference on Computer Science & education(第五届国际计算机新技术与教育学术研讨会 ICCSE'10)
作者: Hua-bin Wang Liang Tao Xue-you Hu Shi-yi Wang Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University HefeiAnhui230039China
Based on illumination normalization and progressive thresholding, this paper presents a novel algorithm for automatic localization of human eyes in still images with complex background. First of all, Retinex method is... 详细信息
来源: 评论
Mobility robustness optimization based on UE mobility for LTE system
Mobility robustness optimization based on UE mobility for LT...
收藏 引用
International Conference on Wireless Communications and signal processing (WCSP)
作者: Zhenzhen Wei Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University of Science and Technology Hefei China
Self-organizing networks (SON) for cellular systems are emerging as an important technology to reduce the cost of network deployment and maintenances. Mobility robustness optimization (MRO) is one of the main use case... 详细信息
来源: 评论
Subspace selection using semi-supervised harmonic mean of Kullback-Leibler divergences
Subspace selection using semi-supervised harmonic mean of Ku...
收藏 引用
2010 7th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2010
作者: Chen, Si-Bao Wang, Hai-Xian Luo, Bin Key Lab of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei Anhui 230039 China Key Lab of Child Development and Learning Science of Ministry of Education Research Center for Learning Science Southeast University Nanjing Jiangsu 210096 China
In many areas of pattern recognition and machine learning, subspace selection is an essential step. Fisher's linear discriminant analysis (LDA) is one of the most well-known linear subspace selection methods. Howe... 详细信息
来源: 评论
SPEECH ENDPOINT DETECTION IN NOISY ENVIRONMENTS USING EMD AND TEAGER ENERGY OPERATOR
收藏 引用
Journal of Electronic Science and Technology 2010年 第2期000卷 183-186页
作者: DE-XIANG ZHANG XIAO-PEI WU ZHAO Lü Key Lab.of Intelligent Computing and Signal Processing of Ministry of Education.Anhui University Hefei 230039China
Accurate endpoint detection is a necessary capability for speech recognition. A new energy measure method based on the empirical mode decomposition (EMD) algorithm and Teager energy operator (TEO) is proposed to locat... 详细信息
来源: 评论
Two protocols for computing the sub-polygon's areas divided by a line
Two protocols for computing the sub-polygon's areas divided ...
收藏 引用
International Conference on Advanced Computer Theory and Engineering, ICACTE
作者: Hong Zhong Hongsheng Huang Runhua Shi Key Laboratory of Intelligent Computing & Signal Processing Anhui University Ministry of Education Hefei China 230039 Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Hefei Anhui PR China School of Computer Science and Technology Anhui University Hefei Anhui PR China
Secure Multi-party Computation (SMC) plays an important role in information security under the circumstance of cooperation calculation, so SMC on privacy-preservation is of great interest. In this paper we discuss an ... 详细信息
来源: 评论
Image denoising based on non-local means and multi-scale dyadic wavelet transform
Image denoising based on non-local means and multi-scale dya...
收藏 引用
2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010
作者: Yu, Gang Yin, Yong Wang, Hongjun Liu, Zhi Li, Oengwang School of Information Science and Engineering Shandong University Jinan China Department of Radiation Oncology Shandong Tumor Hospital China Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Xiangtan China
A variety of wavelet transform methods have been introduced to remove noise from images. However, many of these algorithms remove the fine details and smooth the structures of the image when removing noise. The wavele... 详细信息
来源: 评论
GPU-Based Accelerated FDTD Simulations for Double Negative (DNG) Materials Applications
GPU-Based Accelerated FDTD Simulations for Double Negative (...
收藏 引用
2010 International Conference on Microwave and Millimeter Wave Technology(2010国际微波与毫米波技术会议 ICMMT2010)
作者: Shen Chen Sun Dong Wu Xian-liang Key Lab of Intelligent Computing & Signal Processing of Ministry of Education Anhui University Hefei 230039 china
Recently, double-negative meta-materials are widely studied in scientific research. The double-negative (DNG) mediums are characterized by simultaneous negative permittivity and permeability. In order to make the FDTD... 详细信息
来源: 评论
A Secure Distributed key Management Scheme for AD Hoc Network
A Secure Distributed Key Management Scheme for AD Hoc Networ...
收藏 引用
2010 IEEE International Conference on Information Theory and Information Security(2010 IEEE 国际信息论与信息安全会议)
作者: Xianping Yuan Yan Xu Hong Zhong Jia Yu Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui Univers College of Information Engineering Qingdao University Qingdao China
An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced b... 详细信息
来源: 评论
Application of AWE to scattering analysis of the double-negative medium (RCS) within a wider band.
Application of AWE to scattering analysis of the double-nega...
收藏 引用
第九届国际天线、电波传播及电磁理论学术研讨会(ISAPE2010)
作者: Mei Yang Yu-Xin Sun Hui Wang Ming-Sheng Chen Xian-liang Wu Key Lab of Intelligent Computing & Signal Processing Anhui University Ministry of Education Hefei Department of Physics and Electronic Engineering Hefei Normal University Hefei China School of In Key Lab of Intelligent Computing & Signal Processing Anhui University Ministry of Education Hefei
The PMCHWT equation of the double negative media (DNG) is obtained based on its constitutive relationship. And the surface currents and radar cross section (RCS) at a single frequency point is computed by Method of mo... 详细信息
来源: 评论