咨询与建议

限定检索结果

文献类型

  • 1,093 篇 会议
  • 782 篇 期刊文献

馆藏范围

  • 1,875 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,177 篇 工学
    • 622 篇 计算机科学与技术...
    • 462 篇 软件工程
    • 338 篇 信息与通信工程
    • 300 篇 电子科学与技术(可...
    • 226 篇 电气工程
    • 148 篇 控制科学与工程
    • 93 篇 光学工程
    • 82 篇 生物工程
    • 79 篇 机械工程
    • 75 篇 仪器科学与技术
    • 69 篇 化学工程与技术
    • 57 篇 生物医学工程(可授...
    • 51 篇 动力工程及工程热...
    • 46 篇 材料科学与工程(可...
    • 30 篇 建筑学
    • 30 篇 网络空间安全
    • 27 篇 力学(可授工学、理...
    • 25 篇 土木工程
  • 818 篇 理学
    • 533 篇 数学
    • 274 篇 物理学
    • 109 篇 统计学(可授理学、...
    • 105 篇 生物学
    • 90 篇 系统科学
    • 76 篇 化学
  • 201 篇 管理学
    • 125 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 42 篇 工商管理
  • 30 篇 医学
    • 25 篇 临床医学
    • 22 篇 基础医学(可授医学...
  • 29 篇 法学
    • 23 篇 社会学
  • 23 篇 农学
  • 14 篇 经济学
  • 9 篇 军事学
  • 7 篇 教育学
  • 3 篇 文学
  • 2 篇 艺术学

主题

  • 45 篇 feature extracti...
  • 38 篇 signal processin...
  • 37 篇 bandwidth
  • 35 篇 signal processin...
  • 30 篇 simulation
  • 30 篇 image segmentati...
  • 28 篇 semantics
  • 25 篇 optimization
  • 25 篇 computational mo...
  • 25 篇 training
  • 22 篇 accuracy
  • 21 篇 laboratories
  • 19 篇 wireless communi...
  • 18 篇 deep learning
  • 18 篇 neural networks
  • 18 篇 method of moment...
  • 18 篇 slot antennas
  • 17 篇 interference
  • 17 篇 image reconstruc...
  • 17 篇 robustness

机构

  • 210 篇 key laboratory o...
  • 102 篇 key laboratory o...
  • 64 篇 school of comput...
  • 62 篇 key laboratory o...
  • 53 篇 anhui university...
  • 53 篇 key laboratory o...
  • 42 篇 college of infor...
  • 35 篇 key laboratory o...
  • 33 篇 key laboratory o...
  • 33 篇 key laboratory o...
  • 29 篇 college of compu...
  • 26 篇 department of ph...
  • 25 篇 the key laborato...
  • 24 篇 key lab of intel...
  • 24 篇 anhui province k...
  • 24 篇 anhui university
  • 23 篇 school of electr...
  • 23 篇 key lab of intel...
  • 23 篇 school of mathem...
  • 21 篇 engineering rese...

作者

  • 87 篇 huang zhixiang
  • 76 篇 li yingsong
  • 72 篇 zhixiang huang
  • 57 篇 yingsong li
  • 56 篇 xianliang wu
  • 55 篇 shi minjia
  • 43 篇 wu xianliang
  • 34 篇 wu xian-liang
  • 32 篇 bin luo
  • 31 篇 zhang xingyi
  • 30 篇 luo bin
  • 28 篇 jiang kai
  • 26 篇 solé patrick
  • 25 篇 zou juan
  • 25 篇 li liping
  • 25 篇 tang jin
  • 23 篇 yanjun hu
  • 22 篇 minquan li
  • 22 篇 huang zhi-xiang
  • 21 篇 li chenglong

语言

  • 1,743 篇 英文
  • 86 篇 其他
  • 55 篇 中文
检索条件"机构=Key Laboratory of Intelligent Computing and Signal Processing of Ministry"
1875 条 记 录,以下是1621-1630 订阅
排序:
SAR image despeckling via Bayesian shrinkage based on nonsubsampled contourlet transform
SAR image despeckling via Bayesian shrinkage based on nonsub...
收藏 引用
2010 International Conference on Computational and Information Sciences, ICCIS2010
作者: Zhang, De-Xiang Gao, Qing-Wei Wu, Xiao-Pei Key Lab. of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei China
We propose a novel and efficient SAR image despeckling via Bayesian shrinkage based on nonsubsampled contourlet transform, which has been recently introduced. Despeckling by means of contourlet transform introduce man... 详细信息
来源: 评论
A Regularized Super Resolution Algorithm for Generalized Gaussian Noise
收藏 引用
Journal of Donghua University(English Edition) 2010年 第1期27卷 25-35页
作者: 陈文 方向忠 刘立峰 蒋伟 丁大为 乔艳涛 Institute of Image Communication and Information Processing Shanghai Jiaotong University Computer and Information Department Shanghai University of Electric Power Key Lab oratory of Intelligent Computing & Signal Processing Ministry of EducationAnhui University
In this paper,an iterative regularized super resolution (SR) algorithm considering non-Gaussian noise is *** on the assumption of a generalized Gaussian distribution for the contaminating noise,an lp norm is adopted t... 详细信息
来源: 评论
Fast calculation of wide-band RCS for three-dimensional PEC objects based on preconditioned AWE technique
Fast calculation of wide-band RCS for three-dimensional PEC ...
收藏 引用
URSI International Symposium on signals, Systems, and Electronics (ISSSE)
作者: Zhao, Ke-Ming Sun, Yu-Fa Key Lab. of Intelligent Computing and Signal Processing Ministry Education Anhui University Hefei 230039 China
The asymptotic waveform evaluation (AWE) technique combined with the method of moments (MOM) is often applied to accelerate the calculation of the wide-band radar cross section (RCS) of the target. However, the techni... 详细信息
来源: 评论
An efficient technique for extracting singularity arising in RCS computation of cylindrical antenna
An efficient technique for extracting singularity arising in...
收藏 引用
2010 International Conference on Microwave and Millimeter Wave Technology, ICMMT 2010
作者: Li, Jing Sun, Yufa Key Lab. of Intelligent Computing and Signal Processing Anhui University Ministry Education Hefei 230039 China
Analysis of electromagnetic scattering characteristics from wire antennas using method of moments has been performed over the past decades. In this paper, an efficient technique is adopted to evaluate the potential an... 详细信息
来源: 评论
GPU-based accelerated FDTD simulations for double negative (DNG) materials applications
GPU-based accelerated FDTD simulations for double negative (...
收藏 引用
2010 International Conference on Microwave and Millimeter Wave Technology, ICMMT 2010
作者: Chen, Shen Dong, Sun Xian-Liang, Wu Key Lab. of Intelligent Computing and Signal Processing Anhui University Ministry of Education Hefei 230039 China
Recently, double-negative meta-materials are widely studied in scientific research. The double-negative (DNG) mediums are characterized by simultaneous negative permittivity and permeability. In order to make the FDTD... 详细信息
来源: 评论
A secure distributed key management scheme for ad hoc network
A secure distributed key management scheme for ad hoc networ...
收藏 引用
2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010
作者: Xu, Yan Zhong, Hong Yuan, Xianping Yu, Jia Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei China College of Information Engineering Qingdao University Qingdao China
An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced b... 详细信息
来源: 评论
Assessment of genetically modified food security-first results
收藏 引用
Journal of Information and Computational Science 2011年 第12期8卷 2493-2500页
作者: Chai, Jie Wu, Jiyi Cong, Jiang Sun, Xiaohong Kang, Bingyi Deng, Yong School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai 200240 China Hangzhou Key Laboratory of E-Business and Information Security Hangzhou Normal University Zhejiang 310036 China College of Food Science and Technology Shanghai Ocean University Shanghai 201306 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Hunan 411105 China Key Subject Laboratory of National Defense for Radioactive Waste and Environmental Security Southwest University of Science and Technology Mianyang 621010 China College of Computer and Information Sciences Southwest University Chongqing 400715 China
With the development of Genetically Modified (GM) food, security issue is being paid increasing attention. In this paper, a comprehensive model taking account factors which influencing GM food security is proposed. An... 详细信息
来源: 评论
A method for translating belief function models to probability models
收藏 引用
Journal of Information and Computational Science 2011年 第10期8卷 1817-1823页
作者: Xu, Peida Wu, Jiyi Li, Ya Cong, Jiang Sun, Xiaohong Kang, Bingyi Deng, Yong School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai 200240 China Hangzhou Key Laboratory of E-Business and Information Security Hangzhou Normal University Zhejiang 310036 China College of Food Science and Technology Shanghai Ocean University Shanghai 201306 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Hunan 411105 China Key Subject Laboratory of National defense for Radioactive Waste and Environmental Security Southwest University of Science and Technology Mianyang 621010 China College of Computer and Information Sciences Southwest University Chongqing 400715 China
One of the key issues in the applications of Dempster-Shafer evidence theory is how to make a decision based on Basic Probability Assignment (BPA). The conventional method is Pignistic Probability Transformation (PPT)... 详细信息
来源: 评论
An improved target immunization strategy
An improved target immunization strategy
收藏 引用
International Conference on Digital Manufacturing and Automation (ICDMA)
作者: Zhang, Yanping Fang, Baoping Deng, Xiaochao He, Fugui Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China Key Laboratory of Physical Electronics of Anhui University of Science and Technology of China Hefei 230026 China
Strategies for network immunization have been drawing wide interest in the area of complex networks during the past decade. The target strategy, in which degree values are used to determine vaccinating priority, has b... 详细信息
来源: 评论
Teaching reform and innovation of the course - Digital image processing experiments
Teaching reform and innovation of the course - Digital image...
收藏 引用
International Conference on Computer Science and Education
作者: Zhao, Haifeng Tang, Jin Luo, Bin Key Lab of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei 230039 China
Digital image processing is an interdisciplinary course, which needs students have a strong background in mathematics. To help them change from passive learning to active learning, teaching reform and innovation of th... 详细信息
来源: 评论