咨询与建议

限定检索结果

文献类型

  • 956 篇 会议
  • 732 篇 期刊文献

馆藏范围

  • 1,688 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,074 篇 工学
    • 581 篇 计算机科学与技术...
    • 418 篇 软件工程
    • 310 篇 信息与通信工程
    • 260 篇 电子科学与技术(可...
    • 204 篇 电气工程
    • 143 篇 控制科学与工程
    • 81 篇 光学工程
    • 76 篇 机械工程
    • 70 篇 生物工程
    • 69 篇 仪器科学与技术
    • 64 篇 化学工程与技术
    • 50 篇 动力工程及工程热...
    • 49 篇 生物医学工程(可授...
    • 42 篇 材料科学与工程(可...
    • 31 篇 网络空间安全
    • 28 篇 建筑学
    • 26 篇 力学(可授工学、理...
    • 23 篇 土木工程
    • 19 篇 环境科学与工程(可...
  • 749 篇 理学
    • 487 篇 数学
    • 241 篇 物理学
    • 101 篇 统计学(可授理学、...
    • 90 篇 生物学
    • 80 篇 系统科学
    • 69 篇 化学
  • 180 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 39 篇 工商管理
  • 27 篇 法学
    • 21 篇 社会学
  • 26 篇 医学
    • 22 篇 临床医学
  • 22 篇 农学
  • 13 篇 经济学
  • 9 篇 军事学
  • 5 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 37 篇 feature extracti...
  • 35 篇 bandwidth
  • 28 篇 simulation
  • 26 篇 semantics
  • 25 篇 image segmentati...
  • 25 篇 signal processin...
  • 24 篇 signal processin...
  • 23 篇 optimization
  • 18 篇 wireless communi...
  • 18 篇 computational mo...
  • 17 篇 deep learning
  • 17 篇 slot antennas
  • 17 篇 accuracy
  • 17 篇 training
  • 16 篇 interference
  • 15 篇 complex networks
  • 15 篇 neural networks
  • 15 篇 laboratories
  • 15 篇 resonant frequen...
  • 14 篇 metals

机构

  • 210 篇 key laboratory o...
  • 102 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 58 篇 school of comput...
  • 53 篇 anhui university...
  • 42 篇 college of infor...
  • 35 篇 key laboratory o...
  • 33 篇 key laboratory o...
  • 30 篇 college of compu...
  • 25 篇 the key laborato...
  • 24 篇 key lab of intel...
  • 24 篇 anhui province k...
  • 24 篇 anhui university
  • 23 篇 school of electr...
  • 23 篇 key lab of intel...
  • 23 篇 school of mathem...
  • 22 篇 fujian key labor...
  • 21 篇 engineering rese...
  • 17 篇 fujian provincia...
  • 17 篇 hunan key labora...

作者

  • 82 篇 huang zhixiang
  • 76 篇 li yingsong
  • 57 篇 yingsong li
  • 57 篇 zhixiang huang
  • 55 篇 shi minjia
  • 41 篇 xianliang wu
  • 37 篇 wu xianliang
  • 30 篇 zhang xingyi
  • 30 篇 luo bin
  • 28 篇 jiang kai
  • 26 篇 solé patrick
  • 24 篇 zou juan
  • 24 篇 li liping
  • 24 篇 tang jin
  • 23 篇 bin luo
  • 21 篇 wu xian-liang
  • 21 篇 li chenglong
  • 21 篇 liping li
  • 21 篇 li xiaohui
  • 20 篇 yanjun hu

语言

  • 1,567 篇 英文
  • 87 篇 其他
  • 43 篇 中文
检索条件"机构=Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education"
1688 条 记 录,以下是1571-1580 订阅
排序:
Shape Representation and Clustering Based on Laplacian Spectrum
Shape Representation and Clustering Based on Laplacian Spect...
收藏 引用
Congress on Image and signal processing, CISP
作者: Hong-Fei Pan Don Liang Jun Tang Nian Wang Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei China
The spectrum of a graph has been widely used to characterize the properties of a graph and extract information from its structure. In this paper, we investigate the performance of Laplacian spectrum and multidimension... 详细信息
来源: 评论
Foundation of granular computing
Foundation of granular computing
收藏 引用
2009 International Conference on Theoretical and Mathematical Foundations of Computer Science, TMFCS 2009
作者: Zhao, Liquan Zhang, Ling Province Key Laboratory of Electronic Business Nanjing University of Finance and Economics Nanjing 210003 China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei 230039 China Artificial Intelligence Institute Anhui University Hefei 230039 China
Granular computing which imitates the manner of human thinking is the foundation of artificial intelligence. This paper discusses some operations of granules including quotient intersection, quotient union, quotient c... 详细信息
来源: 评论
Multiuser-based gray-level watermarking sharing system
收藏 引用
Journal of Multimedia 2009年 第6期4卷 341-348页
作者: Luo, Bin Wu, Youqing Tang, Jin Lv, Wanli Gu, Wei Key Lab of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei Anhui China
A novel watermarking sharing system having the ability of sharing gray-level secret images with multi-user is proposed. Multiple-based number system is used to split the secret into n meaningless shares, each share is... 详细信息
来源: 评论
A Multiuser Detector Based on Schur Algorithm
A Multiuser Detector Based on Schur Algorithm
收藏 引用
International Conference on Wireless Communications, Networking and Mobile computing (WiCom)
作者: Yanjun Hu Fang Hu Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei Anhui China
A multiuser detector based on Schur algorithm is studied in this paper. Because the computational complexity of the conventional decorrelating detector is high while computing the inverse of system matrices, especiall... 详细信息
来源: 评论
SAR image compression based on multi-bandelets and geometric flow optimization
SAR image compression based on multi-bandelets and geometric...
收藏 引用
MIPPR 2009 - Multispectral Image Acquisition and processing: 6th International Symposium on Multispectral Image processing and Pattern Recognition
作者: Yang, Shuyuan Qi, Weidong Wang, Zhaoxia Jiao, Licheng Key Laboratory of Intelligent Perception and Image Understanding Ministry of Education of China Xidian University Xi'an 710071 China Institute of Intelligent Information Processing Xidian University Xi'an 710071 China National Key Laboratory of Radar Signal Processing School of Electricity Engineering Xidian University Xian 710071 China
Bandelet transform is an efficient image sparse representation approach which can adaptively approximate the geometrical regularity of image structures. In this paper, a multi-bandelets based method for SAR image comp... 详细信息
来源: 评论
A Secret Sharing Scheme with the Changeable Threshold Value
A Secret Sharing Scheme with the Changeable Threshold Value
收藏 引用
International Symposium on Information Engineering and Electronic Commerce, IEEC
作者: Runhua Shi Hong Zhong Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei China Anhui University Hefei Anhui CN
In this paper, we investigate the problem of increasing the threshold value of the Shamirpsilas (t, n)-threshold scheme without the dealerpsilas helps, and present a new secret sharing scheme with the threshold value ... 详细信息
来源: 评论
WIRELESS INTRUSION DETECTION FOR DEFENDING AGAINST TCP SYN FLOODING ATTACK AND MAN-IN-THE-MIDDLE ATTACK
WIRELESS INTRUSION DETECTION FOR DEFENDING AGAINST TCP SYN F...
收藏 引用
2009 International Conference on Machine Learning and Cybernetics(2009机器学习与控制论国际会议)
作者: HUAN-RONG TANG ROU-LING SUN WEI-QIANG KONG Key Laboratory of Intelligent Computing & Information Processing (Xiangtan University) Ministry of Education China 411105
With the popularity of wireless communication application in a wide range of industry and daily life, it is more and more important to solve security problems of wireless local area network (WLAN). In this paper, we p... 详细信息
来源: 评论
CONCEPT SIMILARITY COMPUTATION BASED ON ONTOLOGY
CONCEPT SIMILARITY COMPUTATION BASED ON ONTOLOGY
收藏 引用
2009 International Conference on Machine Learning and Cybernetics(2009机器学习与控制论国际会议)
作者: CHENG ZHENG YA-PING SHEN ZHE HU Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University School of Science of Anhui Agricultural University Hefei 230036 China
Finding a good similarity algorithm for the use on ontology is important to some techniques such as semantic retrieval, data mining, ontology translations etc. Similarity computation has special characters when applie... 详细信息
来源: 评论
Identifying protein-protein interaction sites using adapted Bayesian classifier
Identifying protein-protein interaction sites using adapted ...
收藏 引用
2009 Second ISECS International Colloquium on computing, Communication, Control, and Management, CCCM 2009
作者: Chishe, Wang Jie, Song Fangping, Li Junsong, Lv School of Information Technology Jinling Institute of Technology Nanjing 211169 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China Center of Network University of Science and Technology of China Hefei 230029 China Anhui Statistics Bureau Hefei 230001 China
Identifying protein-protein interaction sites have important connotations ranging from rational drug design to analysis metabolic and signal transduction networks. In this paper, we presented an adapted Bayesian class... 详细信息
来源: 评论
Traceback-Based Bloomfilter IPS in Defending SYN Flooding Attack
Traceback-Based Bloomfilter IPS in Defending SYN Flooding At...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile computing (WiCom)
作者: Huan-rong Tang Chao Xu Xin-gao Luo Jian-quan OuYang Key Laboratory of Intelligent Computing & Information Processing Ministry of Education Xiangtan University Xiangtan Hunan China
Recently, the key of network security is turning from passive detection to active defense. However, most works focused on how fast it can detect the DDoS attack and start defence, and existing methods for differentiat... 详细信息
来源: 评论