咨询与建议

限定检索结果

文献类型

  • 941 篇 会议
  • 712 篇 期刊文献

馆藏范围

  • 1,653 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,048 篇 工学
    • 557 篇 计算机科学与技术...
    • 412 篇 软件工程
    • 306 篇 信息与通信工程
    • 259 篇 电子科学与技术(可...
    • 199 篇 电气工程
    • 135 篇 控制科学与工程
    • 81 篇 光学工程
    • 74 篇 机械工程
    • 70 篇 生物工程
    • 69 篇 仪器科学与技术
    • 64 篇 化学工程与技术
    • 50 篇 动力工程及工程热...
    • 49 篇 生物医学工程(可授...
    • 42 篇 材料科学与工程(可...
    • 30 篇 网络空间安全
    • 26 篇 力学(可授工学、理...
    • 26 篇 建筑学
    • 22 篇 土木工程
    • 19 篇 环境科学与工程(可...
  • 736 篇 理学
    • 478 篇 数学
    • 236 篇 物理学
    • 101 篇 统计学(可授理学、...
    • 90 篇 生物学
    • 80 篇 系统科学
    • 69 篇 化学
  • 180 篇 管理学
    • 113 篇 管理科学与工程(可...
    • 75 篇 图书情报与档案管...
    • 39 篇 工商管理
  • 27 篇 法学
    • 21 篇 社会学
  • 26 篇 医学
    • 22 篇 临床医学
  • 22 篇 农学
  • 13 篇 经济学
  • 9 篇 军事学
  • 5 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 35 篇 bandwidth
  • 35 篇 feature extracti...
  • 28 篇 simulation
  • 25 篇 semantics
  • 25 篇 signal processin...
  • 24 篇 image segmentati...
  • 24 篇 signal processin...
  • 23 篇 optimization
  • 18 篇 wireless communi...
  • 18 篇 computational mo...
  • 17 篇 slot antennas
  • 17 篇 accuracy
  • 16 篇 deep learning
  • 16 篇 interference
  • 16 篇 training
  • 15 篇 complex networks
  • 15 篇 neural networks
  • 15 篇 laboratories
  • 15 篇 resonant frequen...
  • 14 篇 metals

机构

  • 210 篇 key laboratory o...
  • 101 篇 key laboratory o...
  • 61 篇 key laboratory o...
  • 55 篇 school of comput...
  • 53 篇 anhui university...
  • 42 篇 college of infor...
  • 35 篇 key laboratory o...
  • 33 篇 key laboratory o...
  • 28 篇 college of compu...
  • 25 篇 the key laborato...
  • 24 篇 key lab of intel...
  • 24 篇 anhui province k...
  • 24 篇 anhui university
  • 23 篇 school of electr...
  • 23 篇 key lab of intel...
  • 23 篇 school of mathem...
  • 22 篇 fujian key labor...
  • 19 篇 engineering rese...
  • 17 篇 college of mathe...
  • 17 篇 key laboratory o...

作者

  • 82 篇 huang zhixiang
  • 76 篇 li yingsong
  • 57 篇 yingsong li
  • 57 篇 zhixiang huang
  • 55 篇 shi minjia
  • 41 篇 xianliang wu
  • 37 篇 wu xianliang
  • 30 篇 zhang xingyi
  • 29 篇 jiang kai
  • 29 篇 luo bin
  • 26 篇 solé patrick
  • 24 篇 zou juan
  • 24 篇 li liping
  • 24 篇 tang jin
  • 23 篇 bin luo
  • 21 篇 wu xian-liang
  • 21 篇 liping li
  • 21 篇 li xiaohui
  • 20 篇 li chenglong
  • 20 篇 yanjun hu

语言

  • 1,572 篇 英文
  • 48 篇 其他
  • 40 篇 中文
检索条件"机构=Key Laboratory Intelligent Computing and Signal Processing of the Ministry of Education"
1653 条 记 录,以下是1541-1550 订阅
排序:
A Multiuser Detector Based on Schur Algorithm
A Multiuser Detector Based on Schur Algorithm
收藏 引用
International Conference on Wireless Communications, Networking and Mobile computing (WiCom)
作者: Yanjun Hu Fang Hu Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei Anhui China
A multiuser detector based on Schur algorithm is studied in this paper. Because the computational complexity of the conventional decorrelating detector is high while computing the inverse of system matrices, especiall... 详细信息
来源: 评论
SAR image compression based on multi-bandelets and geometric flow optimization
SAR image compression based on multi-bandelets and geometric...
收藏 引用
MIPPR 2009 - Multispectral Image Acquisition and processing: 6th International Symposium on Multispectral Image processing and Pattern Recognition
作者: Yang, Shuyuan Qi, Weidong Wang, Zhaoxia Jiao, Licheng Key Laboratory of Intelligent Perception and Image Understanding Ministry of Education of China Xidian University Xi'an 710071 China Institute of Intelligent Information Processing Xidian University Xi'an 710071 China National Key Laboratory of Radar Signal Processing School of Electricity Engineering Xidian University Xian 710071 China
Bandelet transform is an efficient image sparse representation approach which can adaptively approximate the geometrical regularity of image structures. In this paper, a multi-bandelets based method for SAR image comp... 详细信息
来源: 评论
A Secret Sharing Scheme with the Changeable Threshold Value
A Secret Sharing Scheme with the Changeable Threshold Value
收藏 引用
International Symposium on Information Engineering and Electronic Commerce, IEEC
作者: Runhua Shi Hong Zhong Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei China Anhui University Hefei Anhui CN
In this paper, we investigate the problem of increasing the threshold value of the Shamirpsilas (t, n)-threshold scheme without the dealerpsilas helps, and present a new secret sharing scheme with the threshold value ... 详细信息
来源: 评论
WIRELESS INTRUSION DETECTION FOR DEFENDING AGAINST TCP SYN FLOODING ATTACK AND MAN-IN-THE-MIDDLE ATTACK
WIRELESS INTRUSION DETECTION FOR DEFENDING AGAINST TCP SYN F...
收藏 引用
2009 International Conference on Machine Learning and Cybernetics(2009机器学习与控制论国际会议)
作者: HUAN-RONG TANG ROU-LING SUN WEI-QIANG KONG Key Laboratory of Intelligent Computing & Information Processing (Xiangtan University) Ministry of Education China 411105
With the popularity of wireless communication application in a wide range of industry and daily life, it is more and more important to solve security problems of wireless local area network (WLAN). In this paper, we p... 详细信息
来源: 评论
CONCEPT SIMILARITY COMPUTATION BASED ON ONTOLOGY
CONCEPT SIMILARITY COMPUTATION BASED ON ONTOLOGY
收藏 引用
2009 International Conference on Machine Learning and Cybernetics(2009机器学习与控制论国际会议)
作者: CHENG ZHENG YA-PING SHEN ZHE HU Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University School of Science of Anhui Agricultural University Hefei 230036 China
Finding a good similarity algorithm for the use on ontology is important to some techniques such as semantic retrieval, data mining, ontology translations etc. Similarity computation has special characters when applie... 详细信息
来源: 评论
Identifying protein-protein interaction sites using adapted Bayesian classifier
Identifying protein-protein interaction sites using adapted ...
收藏 引用
2009 Second ISECS International Colloquium on computing, Communication, Control, and Management, CCCM 2009
作者: Chishe, Wang Jie, Song Fangping, Li Junsong, Lv School of Information Technology Jinling Institute of Technology Nanjing 211169 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China Center of Network University of Science and Technology of China Hefei 230029 China Anhui Statistics Bureau Hefei 230001 China
Identifying protein-protein interaction sites have important connotations ranging from rational drug design to analysis metabolic and signal transduction networks. In this paper, we presented an adapted Bayesian class... 详细信息
来源: 评论
Traceback-Based Bloomfilter IPS in Defending SYN Flooding Attack
Traceback-Based Bloomfilter IPS in Defending SYN Flooding At...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile computing (WiCom)
作者: Huan-rong Tang Chao Xu Xin-gao Luo Jian-quan OuYang Key Laboratory of Intelligent Computing & Information Processing Ministry of Education Xiangtan University Xiangtan Hunan China
Recently, the key of network security is turning from passive detection to active defense. However, most works focused on how fast it can detect the DDoS attack and start defence, and existing methods for differentiat... 详细信息
来源: 评论
Rate-Embedded Doubly Directional Differential Space-Time-Frequency Coding Schemes
Rate-Embedded Doubly Directional Differential Space-Time-Fre...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile computing (WiCom)
作者: Hongwei Zhang Xiaohui Li Lu Lu The Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei China Hefei Information Resource Management Center Hefei China
Due to a great many redundancy symbols, most of the existing differential space-time-frequency (DSTF) coding schemes suffer very low transmission rates. To overcome the disadvantage and obviously enhance the total tra... 详细信息
来源: 评论
Phase Retrieval Using the Transport-of-Intensity Equation
Phase Retrieval Using the Transport-of-Intensity Equation
收藏 引用
International Conference on Image and Graphics (ICIG)
作者: Hong Cheng Hong Liu Quanbing Zhang Sui Wei Education Ministry Key Laboratory of Intelligent Computing and Signal Processing Anhui University Hefei China College of Electronic Science and Technology Anhui University Hefei China
The transport-of-intensity equation describes the internal relationship between the intensity and phase distribution while wave is propagating in the mobile space. So the phase distribution can be solved by the use of... 详细信息
来源: 评论
A Threshold RSA Signature Scheme with Traceable Signers
A Threshold RSA Signature Scheme with Traceable Signers
收藏 引用
International Conference on E-Business and Information System Security, EBISS
作者: Runhua Shi Hong Zhong Key Laboratory of Intelligent Computing & Signal Processing Anhui University Ministry of Education Hefei China School of Computer Science and Technology Anhui University Hefei China
This paper proposed a threshold RSA signature with traceable signers. In such scheme, there is a trusted center (TC), which generates all system parameters, the secret keys and the corresponding public keys of the gro... 详细信息
来源: 评论