咨询与建议

限定检索结果

文献类型

  • 941 篇 会议
  • 716 篇 期刊文献

馆藏范围

  • 1,657 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,060 篇 工学
    • 561 篇 计算机科学与技术...
    • 415 篇 软件工程
    • 308 篇 信息与通信工程
    • 258 篇 电子科学与技术(可...
    • 203 篇 电气工程
    • 137 篇 控制科学与工程
    • 81 篇 光学工程
    • 73 篇 机械工程
    • 70 篇 生物工程
    • 66 篇 仪器科学与技术
    • 64 篇 化学工程与技术
    • 50 篇 动力工程及工程热...
    • 49 篇 生物医学工程(可授...
    • 44 篇 材料科学与工程(可...
    • 30 篇 网络空间安全
    • 28 篇 力学(可授工学、理...
    • 26 篇 建筑学
    • 22 篇 土木工程
    • 18 篇 环境科学与工程(可...
  • 745 篇 理学
    • 487 篇 数学
    • 238 篇 物理学
    • 105 篇 统计学(可授理学、...
    • 90 篇 生物学
    • 81 篇 系统科学
    • 70 篇 化学
  • 182 篇 管理学
    • 114 篇 管理科学与工程(可...
    • 77 篇 图书情报与档案管...
    • 39 篇 工商管理
  • 27 篇 法学
    • 21 篇 社会学
  • 25 篇 医学
    • 21 篇 临床医学
  • 22 篇 农学
  • 13 篇 经济学
  • 9 篇 军事学
  • 5 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 35 篇 bandwidth
  • 35 篇 feature extracti...
  • 28 篇 simulation
  • 26 篇 signal processin...
  • 25 篇 semantics
  • 24 篇 image segmentati...
  • 24 篇 signal processin...
  • 23 篇 optimization
  • 18 篇 wireless communi...
  • 18 篇 computational mo...
  • 18 篇 accuracy
  • 17 篇 slot antennas
  • 16 篇 deep learning
  • 16 篇 neural networks
  • 16 篇 interference
  • 16 篇 training
  • 15 篇 complex networks
  • 15 篇 laboratories
  • 15 篇 resonant frequen...
  • 14 篇 metals

机构

  • 208 篇 key laboratory o...
  • 102 篇 key laboratory o...
  • 61 篇 key laboratory o...
  • 54 篇 anhui university...
  • 54 篇 school of comput...
  • 43 篇 college of infor...
  • 34 篇 key laboratory o...
  • 33 篇 key laboratory o...
  • 29 篇 college of compu...
  • 25 篇 key lab of intel...
  • 25 篇 the key laborato...
  • 24 篇 fujian key labor...
  • 24 篇 anhui province k...
  • 23 篇 school of electr...
  • 23 篇 key lab of intel...
  • 23 篇 school of mathem...
  • 23 篇 anhui university
  • 20 篇 engineering rese...
  • 17 篇 college of mathe...
  • 17 篇 key laboratory o...

作者

  • 80 篇 huang zhixiang
  • 77 篇 li yingsong
  • 59 篇 zhixiang huang
  • 58 篇 yingsong li
  • 57 篇 shi minjia
  • 40 篇 xianliang wu
  • 37 篇 wu xianliang
  • 30 篇 luo bin
  • 29 篇 jiang kai
  • 29 篇 zhang xingyi
  • 28 篇 solé patrick
  • 24 篇 li liping
  • 23 篇 zou juan
  • 23 篇 bin luo
  • 22 篇 tang jin
  • 22 篇 liping li
  • 21 篇 wu xian-liang
  • 21 篇 li xiaohui
  • 19 篇 minquan li
  • 19 篇 li chenglong

语言

  • 1,580 篇 英文
  • 44 篇 其他
  • 39 篇 中文
检索条件"机构=Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education"
1657 条 记 录,以下是1521-1530 订阅
排序:
A Weighted Flat Lattice Transformer-based Knowledge Extraction Architecture for Chinese Named Entity Recognition
A Weighted Flat Lattice Transformer-based Knowledge Extracti...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Hengwei Zhang Yuejia Wu Jian-Tao Zhou Inner Mongolia University College of Computer Science Hohhot China Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Hohhot China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Named Entity Recognition (NER) is one of the contents of Knowledge Extraction (KE) that transforms data into knowledge representation. However, Chinese NER faces the problem of lacking clear word boundaries that limit... 详细信息
来源: 评论
Risk analysis of system security based on evidence theory
Risk analysis of system security based on evidence theory
收藏 引用
International Conference on Computer Design and Applications (ICCDA)
作者: Peida Xu Yong Deng Jianling Xu Xiaoyan Su Key Laboratory of Digital Agricultural Early-warning Technology Ministry of Agriculture of China Beijing China Key Laboratory of Intelligent Computing & Information Processing of Ministry of Education Xiangtan University China School of Electronics & Information Technology Shanghai Jiaotong University China School of Electronics & Information Technology Shanghai Jiaotong University Shanghai China Hangzhou Key Laboratory of E-Business and Information Security Hangzhou Normal University Shanghai Zhejiang China Grain Economics Institute Nanjing University of Finance and Economics Nanjing China
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In t... 详细信息
来源: 评论
On self-dual and LCD double circulant and double negacirculant codes over Fq+ uFq
arXiv
收藏 引用
arXiv 2018年
作者: Shi, Minjia Zhu, Hongwei Qian, Liqin Sok, Lin Sol, Patrick Key Laboratory of Intelligent Computing Signal Processing Ministry of Education Anhui University No.3 Feixi Road Hefei Anhui230039 China School of Mathematical Sciences Anhui University Hefei Anhui230601 China National Mobile Communications Research Laboratory Southeast University China Department of Mathematics Royal University of Phnom Penh Phnom Penh12156 Cambodia CNRS LAGA University of Paris 8 Saint-Denis93526 France
Double circulant codes of length 2n over the semilocal ring R = Fq + uFq, u2 = u, are studied when q is an odd prime power, and-1 is a square in Fq. Double negacirculant codes of length 2n are studied over R when n is...
来源: 评论
SpreadFGL: Edge-Client Collaborative Federated Graph Learning with Adaptive Neighbor Generation
arXiv
收藏 引用
arXiv 2024年
作者: Zhong, Luying Pi, Yueyang Chen, Zheyi Yu, Zhengxin Miao, Wang Chen, Xing Min, Geyong College of Computer and Data Science Fuzhou University China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University China Engineering Research Center of Big Data Intelligence Ministry of Education China School of Computing and Communications University of Lancaster United Kingdom School of Engineering Computing and Mathematics University of Plymouth United Kingdom Department of Computer Science University of Exeter United Kingdom
Federated Graph Learning (FGL) has garnered widespread attention by enabling collaborative training on multiple clients for semi-supervised classification tasks. However, most existing FGL studies do not well consider... 详细信息
来源: 评论
LCD codes from tridiagonal Toeplitz matrice
arXiv
收藏 引用
arXiv 2021年
作者: Shi, Minjia Özbudak, Ferruh Xu, Li Solé, Patrick Key Laboratory of Intelligent Computing Signal Processing Ministry of Education School of Mathematical Sciences Anhui University HefeiAnhui230601 China Department of Mathematics Institute of Applied Mathematics Middle East Technical University Ankara Turkey School of Mathematical Sciences Anhui University HefeiAnhui230601 China I2M Aix Marseille Univ. Centrale Marseille CNRS Marseille France
Double Toeplitz (DT) codes are codes with a generator matrix of the form (I, T) with T a Toeplitz matrix, that is to say constant on the diagonals parallel to the main. When T is tridiagonal and symmetric we determine... 详细信息
来源: 评论
How many weights can a linear code have?
arXiv
收藏 引用
arXiv 2018年
作者: Shi, Minjia Zhu, Hongwei Solé, Patrick Cohen, Gérard D. Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University No. 3 Feixi Road Hefei Anhui Province230039 China School of Mathematical Sciences Anhui University Hefei230601 China CNRS/LAGA University of Paris 8 2 rue de la Liberté Saint-Denis93 526 France TelecomParisTech 46 rue Barrault Paris75 013 France
We study the combinatorial function L(k, q), the maximum number of nonzero weights a linear code of dimension k over Fq can have. We determine it completely for q = 2, and for k = 2, and provide upper and lower bounds... 详细信息
来源: 评论
Quasi-cyclic perfect codes in Doob graphs and special partitions of Galois rings
arXiv
收藏 引用
arXiv 2023年
作者: Shi, Minjia Li, Xiaoxiao Krotov, Denis S. Özbudak, Ferruh Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education School of Mathematical Sciences Anhui University Hefei230601 China School of Mathematical Sciences Anhui University Hefei230601 China Sobolev Institute of Mathematics pr. Akademika Koptyuga 4 Novosibirsk630090 Russia Faculty of Engineering and Natural Sciences Sabancı University Middle East Technical University 34956 Istanbul Ankara06800 Turkey
The Galois ring GR(4∆) is the residue ring Z4[x]/(h(x)), where h(x) is a basic primitive polynomial of degree ∆ over Z4. For any odd ∆ larger than 1, we construct a partition of GR(4∆)\{0} into 6-subsets of type {a, b... 详细信息
来源: 评论
Erratum to: Multi-party quantum key agreement with Bell states and Bell measurements
收藏 引用
Quantum Information processing 2012年 第2期12卷 933-933页
作者: Shi, Run-Hua Zhong, Hong Key Laboratory of Intelligent Computing & Signal Processing of Ministry of Education Anhui University Hefei China School of Computer Science and Technology Anhui University Hefei China
来源: 评论
The Graph Structure of Chebyshev Permutation Polynomials over Ring pk
arXiv
收藏 引用
arXiv 2022年
作者: Li, Chengqing Lu, Xiaoxiong Tan, Kai Chen, Guanrong The School of Computer Science Xiangtan University Hunan Xiangtan411105 China The School of Mathematics and Computational Science Xiangtan University Xiangtan411105 China The Key Laboratory of Intelligent Computing & Information Processing Ministry of Education Xiangtan University Hunan Xiangtan411105 China The Department of Electrical Engineering City University of Hong Kong Hong Kong
Understanding the underlying graph structure of a nonlinear map over a particular domain is essential in evaluating its potential for real applications. In this paper, we investigate the structure of the associated fu... 详细信息
来源: 评论
CSCL-DTI: predicting drug-target interaction through cross-view and self-supervised contrastive learning
CSCL-DTI: predicting drug-target interaction through cross-v...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xuan Lin Xi Zhang Zu-Guo Yu Yahui Long Xiangxiang Zeng Philip S. Yu College of Computer Science Xiangtan University China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University China Singapore Immunology Network (SIgN) Agency for Science Technology and Research (A*STAR) Singapore College of Information Science and Engineering Hunan University China Department of Computer Science University of Illinois Chicago USA
Accurately predicting drug-target interactions (DTI) is a critical step in drug discovery. Existing methods of DTI prediction primarily employ Simplified Molecular-Input Line-Entry System (SMILES) sequences or molecul... 详细信息
来源: 评论