咨询与建议

限定检索结果

文献类型

  • 1,094 篇 会议
  • 788 篇 期刊文献

馆藏范围

  • 1,882 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,185 篇 工学
    • 632 篇 计算机科学与技术...
    • 461 篇 软件工程
    • 341 篇 信息与通信工程
    • 301 篇 电子科学与技术(可...
    • 227 篇 电气工程
    • 153 篇 控制科学与工程
    • 92 篇 光学工程
    • 83 篇 生物工程
    • 81 篇 机械工程
    • 75 篇 仪器科学与技术
    • 69 篇 化学工程与技术
    • 57 篇 生物医学工程(可授...
    • 51 篇 动力工程及工程热...
    • 46 篇 材料科学与工程(可...
    • 31 篇 建筑学
    • 31 篇 网络空间安全
    • 27 篇 力学(可授工学、理...
    • 25 篇 土木工程
  • 815 篇 理学
    • 531 篇 数学
    • 271 篇 物理学
    • 109 篇 统计学(可授理学、...
    • 105 篇 生物学
    • 90 篇 系统科学
    • 76 篇 化学
  • 200 篇 管理学
    • 125 篇 管理科学与工程(可...
    • 83 篇 图书情报与档案管...
    • 42 篇 工商管理
  • 30 篇 医学
    • 25 篇 临床医学
    • 22 篇 基础医学(可授医学...
  • 28 篇 法学
    • 22 篇 社会学
  • 23 篇 农学
  • 14 篇 经济学
  • 9 篇 军事学
  • 6 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 45 篇 feature extracti...
  • 38 篇 signal processin...
  • 37 篇 bandwidth
  • 35 篇 signal processin...
  • 31 篇 image segmentati...
  • 30 篇 simulation
  • 28 篇 semantics
  • 25 篇 optimization
  • 25 篇 computational mo...
  • 25 篇 training
  • 22 篇 accuracy
  • 21 篇 laboratories
  • 19 篇 wireless communi...
  • 18 篇 deep learning
  • 18 篇 neural networks
  • 18 篇 method of moment...
  • 18 篇 slot antennas
  • 17 篇 interference
  • 17 篇 image reconstruc...
  • 17 篇 robustness

机构

  • 210 篇 key laboratory o...
  • 102 篇 key laboratory o...
  • 64 篇 school of comput...
  • 62 篇 key laboratory o...
  • 53 篇 anhui university...
  • 53 篇 key laboratory o...
  • 42 篇 college of infor...
  • 35 篇 key laboratory o...
  • 33 篇 key laboratory o...
  • 33 篇 key laboratory o...
  • 30 篇 college of compu...
  • 26 篇 department of ph...
  • 25 篇 the key laborato...
  • 24 篇 key lab of intel...
  • 24 篇 anhui province k...
  • 24 篇 anhui university
  • 23 篇 school of electr...
  • 23 篇 key lab of intel...
  • 23 篇 school of mathem...
  • 22 篇 fujian key labor...

作者

  • 87 篇 huang zhixiang
  • 76 篇 li yingsong
  • 72 篇 zhixiang huang
  • 57 篇 yingsong li
  • 56 篇 xianliang wu
  • 55 篇 shi minjia
  • 43 篇 wu xianliang
  • 34 篇 wu xian-liang
  • 32 篇 bin luo
  • 31 篇 zhang xingyi
  • 30 篇 luo bin
  • 28 篇 jiang kai
  • 26 篇 solé patrick
  • 25 篇 li liping
  • 25 篇 tang jin
  • 24 篇 zou juan
  • 23 篇 yanjun hu
  • 22 篇 minquan li
  • 22 篇 huang zhi-xiang
  • 21 篇 li chenglong

语言

  • 1,740 篇 英文
  • 94 篇 其他
  • 57 篇 中文
检索条件"机构=Key Laboratory of Intelligent Computing and Signal Processing of Ministry"
1882 条 记 录,以下是1731-1740 订阅
排序:
Text Information Retrieval Based on Concept Semantic Similarity
Text Information Retrieval Based on Concept Semantic Similar...
收藏 引用
Fifth International Conference on Semantics,Knowledge and Grid(第五届语义、知识与网格国际会议 SKG 2009)
作者: Gang Lv Cheng Zheng Li Zhang Key Laboratory of Network and Intelligent Information Processing Hefei University Hefei China Educational Department Key Laboratory of Intelligent Computing & Signal Processing Anhui University Hefei China
In this paper, an improved method of calculating ontology semantic similarity is proposed to enhance the information retrieval recall and precision. To filter out the document which have smaller related degree with or... 详细信息
来源: 评论
Identifying protein-protein interaction sites using adapted Bayesian classifier
Identifying protein-protein interaction sites using adapted ...
收藏 引用
2009 Second ISECS International Colloquium on computing, Communication, Control, and Management, CCCM 2009
作者: Chishe, Wang Jie, Song Fangping, Li Junsong, Lv School of Information Technology Jinling Institute of Technology Nanjing 211169 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China Center of Network University of Science and Technology of China Hefei 230029 China Anhui Statistics Bureau Hefei 230001 China
Identifying protein-protein interaction sites have important connotations ranging from rational drug design to analysis metabolic and signal transduction networks. In this paper, we presented an adapted Bayesian class... 详细信息
来源: 评论
WIRELESS INTRUSION DETECTION FOR DEFENDING AGAINST TCP SYN FLOODING ATTACK AND MAN-IN-THE-MIDDLE ATTACK
WIRELESS INTRUSION DETECTION FOR DEFENDING AGAINST TCP SYN F...
收藏 引用
2009 International Conference on Machine Learning and Cybernetics(2009机器学习与控制论国际会议)
作者: HUAN-RONG TANG ROU-LING SUN WEI-QIANG KONG Key Laboratory of Intelligent Computing & Information Processing (Xiangtan University) Ministry of Education China 411105
With the popularity of wireless communication application in a wide range of industry and daily life, it is more and more important to solve security problems of wireless local area network (WLAN). In this paper, we p... 详细信息
来源: 评论
Rate-Embedded Doubly Directional Differential Space-Time-Frequency Coding Schemes
Rate-Embedded Doubly Directional Differential Space-Time-Fre...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile computing (WiCom)
作者: Hongwei Zhang Xiaohui Li Lu Lu The Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei China Hefei Information Resource Management Center Hefei China
Due to a great many redundancy symbols, most of the existing differential space-time-frequency (DSTF) coding schemes suffer very low transmission rates. To overcome the disadvantage and obviously enhance the total tra... 详细信息
来源: 评论
Traceback-Based Bloomfilter IPS in Defending SYN Flooding Attack
Traceback-Based Bloomfilter IPS in Defending SYN Flooding At...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile computing (WiCom)
作者: Huan-rong Tang Chao Xu Xin-gao Luo Jian-quan OuYang Key Laboratory of Intelligent Computing & Information Processing Ministry of Education Xiangtan University Xiangtan Hunan China
Recently, the key of network security is turning from passive detection to active defense. However, most works focused on how fast it can detect the DDoS attack and start defence, and existing methods for differentiat... 详细信息
来源: 评论
A 5-Parameter Bundle Adjustment Method for Image Mosaic
A 5-Parameter Bundle Adjustment Method for Image Mosaic
收藏 引用
International Conference on Computer and Information Science (ACIS)
作者: Xianyong Fang Bin Luo Haifeng Zhao Yiwen Zhang Key Laboratory of Intelligent Computing and Signal Processing of MOE School of Computer Science and Technology Anhui University China
A 5-parameter bundle adjustment method is proposed in this paper for global mosaic of an image sequence. By decomposing the rotation matrix into a 3-parameter rotation axis and a rotation angle, to each image, there a... 详细信息
来源: 评论
Phase Retrieval Using the Transport-of-Intensity Equation
Phase Retrieval Using the Transport-of-Intensity Equation
收藏 引用
International Conference on Image and Graphics (ICIG)
作者: Hong Cheng Hong Liu Quanbing Zhang Sui Wei Education Ministry Key Laboratory of Intelligent Computing and Signal Processing Anhui University Hefei China College of Electronic Science and Technology Anhui University Hefei China
The transport-of-intensity equation describes the internal relationship between the intensity and phase distribution while wave is propagating in the mobile space. So the phase distribution can be solved by the use of... 详细信息
来源: 评论
A Threshold RSA Signature Scheme with Traceable Signers
A Threshold RSA Signature Scheme with Traceable Signers
收藏 引用
International Conference on E-Business and Information System Security, EBISS
作者: Runhua Shi Hong Zhong Key Laboratory of Intelligent Computing & Signal Processing Anhui University Ministry of Education Hefei China School of Computer Science and Technology Anhui University Hefei China
This paper proposed a threshold RSA signature with traceable signers. In such scheme, there is a trusted center (TC), which generates all system parameters, the secret keys and the corresponding public keys of the gro... 详细信息
来源: 评论
The Implementation of the Web Mining Based on XML Technology
The Implementation of the Web Mining Based on XML Technology
收藏 引用
International Conference on Computational Intelligence and Security
作者: Cheng Zheng Yong Fang Yaping Shen Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei China School of Computer Science and Technology Anhui University Hefei China
The rapid development of the Web technology makes the Web mining become the focus of the current data mining, and the XML technology also becomes the standard of the data exchange on the Web. The paper introduces the ... 详细信息
来源: 评论
3D imaging algorithm and implement for through-wall synthetic aperture radar
3D imaging algorithm and implement for through-wall syntheti...
收藏 引用
Midwest Symposium on Circuits and Systems (MWSCAS)
作者: Jiabing Zhu Yi Hong Liang Tao East China Research Institute of Electronic East China Research Institute of Electronic Engineering Hefei China Education Ministry Key Laboratory of Intelligent Computing and Signal Processing Anhui University Hefei China
Typical synthetic aperture radar (SAR) images are two-dimensional, providing range and azimuth information, but furnish few details with respect to elevation. First of all, one approach to extend SAR to three-dimensio... 详细信息
来源: 评论