咨询与建议

限定检索结果

文献类型

  • 1,093 篇 会议
  • 782 篇 期刊文献

馆藏范围

  • 1,875 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,177 篇 工学
    • 622 篇 计算机科学与技术...
    • 462 篇 软件工程
    • 338 篇 信息与通信工程
    • 300 篇 电子科学与技术(可...
    • 226 篇 电气工程
    • 148 篇 控制科学与工程
    • 93 篇 光学工程
    • 82 篇 生物工程
    • 79 篇 机械工程
    • 75 篇 仪器科学与技术
    • 69 篇 化学工程与技术
    • 57 篇 生物医学工程(可授...
    • 51 篇 动力工程及工程热...
    • 46 篇 材料科学与工程(可...
    • 30 篇 建筑学
    • 30 篇 网络空间安全
    • 27 篇 力学(可授工学、理...
    • 25 篇 土木工程
  • 818 篇 理学
    • 533 篇 数学
    • 274 篇 物理学
    • 109 篇 统计学(可授理学、...
    • 105 篇 生物学
    • 90 篇 系统科学
    • 76 篇 化学
  • 201 篇 管理学
    • 125 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 42 篇 工商管理
  • 30 篇 医学
    • 25 篇 临床医学
    • 22 篇 基础医学(可授医学...
  • 29 篇 法学
    • 23 篇 社会学
  • 23 篇 农学
  • 14 篇 经济学
  • 9 篇 军事学
  • 7 篇 教育学
  • 3 篇 文学
  • 2 篇 艺术学

主题

  • 45 篇 feature extracti...
  • 38 篇 signal processin...
  • 37 篇 bandwidth
  • 35 篇 signal processin...
  • 30 篇 simulation
  • 30 篇 image segmentati...
  • 28 篇 semantics
  • 25 篇 optimization
  • 25 篇 computational mo...
  • 25 篇 training
  • 22 篇 accuracy
  • 21 篇 laboratories
  • 19 篇 wireless communi...
  • 18 篇 deep learning
  • 18 篇 neural networks
  • 18 篇 method of moment...
  • 18 篇 slot antennas
  • 17 篇 interference
  • 17 篇 image reconstruc...
  • 17 篇 robustness

机构

  • 210 篇 key laboratory o...
  • 102 篇 key laboratory o...
  • 64 篇 school of comput...
  • 62 篇 key laboratory o...
  • 53 篇 anhui university...
  • 53 篇 key laboratory o...
  • 42 篇 college of infor...
  • 35 篇 key laboratory o...
  • 33 篇 key laboratory o...
  • 33 篇 key laboratory o...
  • 29 篇 college of compu...
  • 26 篇 department of ph...
  • 25 篇 the key laborato...
  • 24 篇 key lab of intel...
  • 24 篇 anhui province k...
  • 24 篇 anhui university
  • 23 篇 school of electr...
  • 23 篇 key lab of intel...
  • 23 篇 school of mathem...
  • 21 篇 engineering rese...

作者

  • 87 篇 huang zhixiang
  • 76 篇 li yingsong
  • 72 篇 zhixiang huang
  • 57 篇 yingsong li
  • 56 篇 xianliang wu
  • 55 篇 shi minjia
  • 43 篇 wu xianliang
  • 34 篇 wu xian-liang
  • 32 篇 bin luo
  • 31 篇 zhang xingyi
  • 30 篇 luo bin
  • 28 篇 jiang kai
  • 26 篇 solé patrick
  • 25 篇 zou juan
  • 25 篇 li liping
  • 25 篇 tang jin
  • 23 篇 yanjun hu
  • 22 篇 minquan li
  • 22 篇 huang zhi-xiang
  • 21 篇 li chenglong

语言

  • 1,743 篇 英文
  • 86 篇 其他
  • 55 篇 中文
检索条件"机构=Key Laboratory of Intelligent Computing and Signal Processing of Ministry"
1875 条 记 录,以下是1571-1580 订阅
排序:
Semi-supervised geometric mean of Kullback-Leibler divergences for subspace selection
Semi-supervised geometric mean of Kullback-Leibler divergenc...
收藏 引用
2011 8th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011, Jointly with the 2011 7th International Conference on Natural Computation, ICNC'11
作者: Chen, Si-Bao Wang, Hai-Xian Zhang, Xing-Yi Luo, Bin Key Lab of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei 230039 China
Subspace selection is widely adopted in many areas of pattern recognition. A recent result, named maximizing the geometric mean of Kullback-Leibler (KL) divergences of class pairs (MGMD), is a successful method for su... 详细信息
来源: 评论
Modeling for MIMO wireless channels in mine tunnels
Modeling for MIMO wireless channels in mine tunnels
收藏 引用
2011 International Conference on Electric Information and Control Engineering, ICEICE 2011
作者: Yao, Shan-Hua Wu, Xian-Liang School of Electric and Information Engineering Anhui University of Science and Technology Huainan China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei China
The electromagnetic waves propagation situation is very complex in mine tunnels, so it is important to establish an efficient MIMO channel model for applying wireless communication technology to coal mine underground.... 详细信息
来源: 评论
Asymmetric multiparty-controlled teleportation of arbitrary n-qudit states using different quantum channels
Asymmetric multiparty-controlled teleportation of arbitrary ...
收藏 引用
2011 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011
作者: Shi, Run-Hua Zhong, Hong Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China School of Computer Science and Technology Anhui University Hefei 230039 China
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes th... 详细信息
来源: 评论
Inter-piconet interference mitigation schemes for converged BTLE and cellular network
Inter-piconet interference mitigation schemes for converged ...
收藏 引用
2011 International Conference on Wireless Communications and signal processing, WCSP 2011
作者: Hu, Ying Wang, Guizhu Shan, Lianhai Yuan, Zhi Ouyang, Yuling Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei China Shanghai Research Center for Wireless Communications Key Lab of Wireless Sensor Network and Communication CAS Shanghai China
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, d... 详细信息
来源: 评论
Research on the maximum flow in large-scale network
Research on the maximum flow in large-scale network
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Zhang, Yan-Ping Hua, Bo Jiang, Juan Zhang, Yuan Chen, Xiao-Yan School of Computer Science and Technology Anhui University Hefei 230039 China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei 230039 Anhui Province China
This article covers a problem that often arises in real life situations-the maximum flow problem. This problem is a classical combinatorial optimization problem, which arises in many engineering and scientific applica... 详细信息
来源: 评论
Efficient query protocol for database's privacy
Efficient query protocol for database's privacy
收藏 引用
2011 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011
作者: Yuan, Xianping Zhong, Hong Huang, Hongsheng Yi, Lei Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei Anhui 230039 China School of Computer Science and Technology Anhui University Hefei Anhui 230039 China
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to... 详细信息
来源: 评论
A new scheme for information hiding based on digital images
A new scheme for information hiding based on digital images
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Zhang, Yan-Ping Jiang, Juan Xu, Chao Hua, Bo Chen, Xiao-Yan School of Computer Science and Technology Anhui University Hefei 230039 China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei 230039 Anhui Province China
Digital steganography is a kind of data security technique. In this paper, a new information hiding scheme was proposed. In this scheme, we embed secret message into still digital images based on (7, 4) Hamming Code a... 详细信息
来源: 评论
Analysis of asymptotic approximation SER in DiffAF cooperative communication networks
收藏 引用
Journal of Information and Computational Science 2011年 第13期8卷 2893-2901页
作者: Xu, Lei Zhang, Hongwei Li, Xiaohui Wu, Xianliang Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China
In conventional single-antenna systems, differential modulation is useful when the knowledge of channel state information (CSI) is not available. Some time division multiple access (TDMA) wireless cooperative relay pr... 详细信息
来源: 评论
Novel Algorithm for Hand Vein Recognition Based on Retinex Method and SIFT Feature Analysis
Novel Algorithm for Hand Vein Recognition Based on Retinex M...
收藏 引用
The 2011 International Conference on Electric and Electronics(EEIC 2011)
作者: Hua-bin Wang Liang Tao Xue-you Hu Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University
Based on the Retinex method and the SIFT feature analysis, this paper presents a novel algorithm for hand vein recognition. First of all, the principle of the near-infrared hand vein image acquisition is introduced. S... 详细信息
来源: 评论
Analysis of asymptotic approximation SER for Alamouti code transmission protocol in cooperative communication networks
收藏 引用
Journal of Information and Computational Science 2011年 第14期8卷 3003-3010页
作者: Xu, Lei Zhang, Hongwei Li, Xiaohui Wu, Xianliang Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China
Some time division multiple access (TDMA) wireless cooperative relay protocols have recently been developed. The works about their symbol error rate (SER) performance, however, are limited to SER upper bounds or SER f... 详细信息
来源: 评论