咨询与建议

限定检索结果

文献类型

  • 941 篇 会议
  • 712 篇 期刊文献

馆藏范围

  • 1,653 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,048 篇 工学
    • 557 篇 计算机科学与技术...
    • 412 篇 软件工程
    • 306 篇 信息与通信工程
    • 259 篇 电子科学与技术(可...
    • 199 篇 电气工程
    • 135 篇 控制科学与工程
    • 81 篇 光学工程
    • 74 篇 机械工程
    • 70 篇 生物工程
    • 69 篇 仪器科学与技术
    • 64 篇 化学工程与技术
    • 50 篇 动力工程及工程热...
    • 49 篇 生物医学工程(可授...
    • 42 篇 材料科学与工程(可...
    • 30 篇 网络空间安全
    • 26 篇 力学(可授工学、理...
    • 26 篇 建筑学
    • 22 篇 土木工程
    • 19 篇 环境科学与工程(可...
  • 736 篇 理学
    • 478 篇 数学
    • 236 篇 物理学
    • 101 篇 统计学(可授理学、...
    • 90 篇 生物学
    • 80 篇 系统科学
    • 69 篇 化学
  • 180 篇 管理学
    • 113 篇 管理科学与工程(可...
    • 75 篇 图书情报与档案管...
    • 39 篇 工商管理
  • 27 篇 法学
    • 21 篇 社会学
  • 26 篇 医学
    • 22 篇 临床医学
  • 22 篇 农学
  • 13 篇 经济学
  • 9 篇 军事学
  • 5 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 35 篇 bandwidth
  • 35 篇 feature extracti...
  • 28 篇 simulation
  • 25 篇 semantics
  • 25 篇 signal processin...
  • 24 篇 image segmentati...
  • 24 篇 signal processin...
  • 23 篇 optimization
  • 18 篇 wireless communi...
  • 18 篇 computational mo...
  • 17 篇 slot antennas
  • 17 篇 accuracy
  • 16 篇 deep learning
  • 16 篇 interference
  • 16 篇 training
  • 15 篇 complex networks
  • 15 篇 neural networks
  • 15 篇 laboratories
  • 15 篇 resonant frequen...
  • 14 篇 metals

机构

  • 210 篇 key laboratory o...
  • 101 篇 key laboratory o...
  • 61 篇 key laboratory o...
  • 55 篇 school of comput...
  • 53 篇 anhui university...
  • 42 篇 college of infor...
  • 35 篇 key laboratory o...
  • 33 篇 key laboratory o...
  • 28 篇 college of compu...
  • 25 篇 the key laborato...
  • 24 篇 key lab of intel...
  • 24 篇 anhui province k...
  • 24 篇 anhui university
  • 23 篇 school of electr...
  • 23 篇 key lab of intel...
  • 23 篇 school of mathem...
  • 22 篇 fujian key labor...
  • 19 篇 engineering rese...
  • 17 篇 college of mathe...
  • 17 篇 key laboratory o...

作者

  • 82 篇 huang zhixiang
  • 76 篇 li yingsong
  • 57 篇 yingsong li
  • 57 篇 zhixiang huang
  • 55 篇 shi minjia
  • 41 篇 xianliang wu
  • 37 篇 wu xianliang
  • 30 篇 zhang xingyi
  • 29 篇 jiang kai
  • 29 篇 luo bin
  • 26 篇 solé patrick
  • 24 篇 zou juan
  • 24 篇 li liping
  • 24 篇 tang jin
  • 23 篇 bin luo
  • 21 篇 wu xian-liang
  • 21 篇 liping li
  • 21 篇 li xiaohui
  • 20 篇 li chenglong
  • 20 篇 yanjun hu

语言

  • 1,572 篇 英文
  • 48 篇 其他
  • 40 篇 中文
检索条件"机构=Key Laboratory of Intelligent Computing and Signal Processing of the Ministry of Education"
1653 条 记 录,以下是1521-1530 订阅
排序:
Shape Recognition and Retrieval Based on Edit Distance and Dynamic Programming
收藏 引用
Tsinghua Science and Technology 2009年 第6期14卷 739-745页
作者: 潘鸿飞 梁栋 唐俊 王年 李薇 Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University
An important aim in pattern recognition is to cluster the given shapes. This paper presents a shape recognition and retrieval algorithm. The algorithm first extracts the skeletal features using the medial axis transfo... 详细信息
来源: 评论
Subspace selection using semi-supervised harmonic mean of Kullback-Leibler divergences
Subspace selection using semi-supervised harmonic mean of Ku...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Si-Bao Chen Hai-Xian Wang Bin Luo Key Lab of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei Anhui China Key Lab of Child Development and Learning Science of Ministry of Education Research Center of Learning Sciences South-East University Nanjing Jiangsu China
In many areas of pattern recognition and machine learning, subspace selection is an essential step. Fisher's linear discriminant analysis (LDA) is one of the most well-known linear subspace selection methods. Howe... 详细信息
来源: 评论
Single-side-band optical modulation in SCM systems for high-speed optical transmission
收藏 引用
Optoelectronics Letters 2009年 第1期5卷 48-50页
作者: 李忠义 廖同庆 Key Laboratory on Intelligent Computing & Signal Processing of Ministry of Education Anhui University
In order to decrease dispersion penalty and increase the optical bandwidth efficiency,an optical single-side-band modulation(SSBM) scheme in sub-carrier multiplexing(SCM) is *** principle of the SSBM is analytically p... 详细信息
来源: 评论
Risk analysis of system security based on evidence theory
Risk analysis of system security based on evidence theory
收藏 引用
2010 International Conference on Computer Design and Applications, ICCDA 2010
作者: Xu, Peida Xu, Jianling Deng, Yong Su, Xiaoyan Key Laboratory of Digital Agricultural Early-warning Technology Ministry of Agriculture of China Beijing China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University China School of Electronics and Information Technology Shanghai Jiao Tong University Shanghai China Grain Economics Institute Nanjing University of Finance and Economics Nanjing China Hangzhou Key Lab. of E-Business and Information Security Hangzhou Normal University Hanzhou Zhejiang China Hangzhou Key Lab. of E-Business and Information Security Hangzhou Normal University Shanghai China
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In t... 详细信息
来源: 评论
Matrix representation of spiking neural P systems
Matrix representation of spiking neural P systems
收藏 引用
11th International Conference on Membrane computing, CMC 2010
作者: Zeng, Xiangxiang Adorna, Henry Martínez-Del-Amor, Miguel Ángel Pan, Linqiang Pérez-Jiménez, Mario J. Image Processing and Intelligent Control Key Laboratory of Education Ministry Department of Control Science and Engineering Huazhong University of Science and Technology Wuhan 430074 Hubei China University of the Philippines Diliman 1101 Quezon City Philippines Research Group on Natural Computing Department of Computer Science and Artificial Intelligence University of Sevilla Avda. Reina Mercedes s/n 41012 Sevilla Spain
Spiking neural P systems (SN P systems, for short) are a class of distributed parallel computing devices inspired from the way neurons communicate by means of spikes. In this work, a discrete structure representation ... 详细信息
来源: 评论
Shot Transition Detection Based on Locally Linear Embedding
Shot Transition Detection Based on Locally Linear Embedding
收藏 引用
2010 International Conference on Measuring Technology and Mechatronics Automation(ICMTMA 2010)(2010年检测技术与机电自动化国际会议)
作者: MaoSheng Fu DaMing Zhang Min Kong Bin Luo Key Lab of Intelligent Computing & Signal Processing of Ministry of Education Anhui University Hefei230039. P. R. China Department of Computer Science and Technology in West Anhui University Anhui Lu'an 237012. P. R. China
Detection of shot transitions servers as the preliminary step to video indexing and retrieval. Locally linear embedding (LLE) algorithm fails when it is applied to video with multi-shot. In this paper, we present a ... 详细信息
来源: 评论
Predicting RNA secondary structure with Tabu Search
Predicting RNA secondary structure with Tabu Search
收藏 引用
IEEE International Conference on Cognitive Informatics
作者: Yongguo Liu Jianrui Hao Jun Peng Key Laboratory of Intelligent Computing & Information Processing of Ministry of Education Xiangtan University Xiangtan China School of Computer Science and Engineering University of Electronic Science and Technology Chengdu China College of Electronic Information Engineering Chongqing University of Science and Technology Chongqing China
In this paper, a novel method for predicting RNA secondary structure called RNA secondary structure prediction based on Tabu Search (RNATS) is proposed. In RNATS, two search models, intensification search and diversif... 详细信息
来源: 评论
Non-rigid object reconstruction based on multiview images: A survey
Non-rigid object reconstruction based on multiview images: A...
收藏 引用
Congress on Image and signal processing, CISP
作者: Zhi Liu Hongjun Wang Qingli Li Shi Jun Key Laboratory of Intelligent Computing & Information Processing Ministry of Education China School of Information Science and Engineering Shandong University Jinan China School of Information Science East China Jiao Tong University Shanghai China Shandong Institute of Light Industry Jinan China
In this paper we review the major approaches to nonrigid object reconstruction based on multi-view images. It tries to reflect the profile of this area by focusing more on those subjects that have been given more impo... 详细信息
来源: 评论
Risk analysis of system security based on evidence theory
Risk analysis of system security based on evidence theory
收藏 引用
International Conference on Computer Design and Applications (ICCDA)
作者: Peida Xu Yong Deng Jianling Xu Xiaoyan Su Key Laboratory of Digital Agricultural Early-warning Technology Ministry of Agriculture of China Beijing China Key Laboratory of Intelligent Computing & Information Processing of Ministry of Education Xiangtan University China School of Electronics & Information Technology Shanghai Jiaotong University China School of Electronics & Information Technology Shanghai Jiaotong University Shanghai China Hangzhou Key Laboratory of E-Business and Information Security Hangzhou Normal University Shanghai Zhejiang China Grain Economics Institute Nanjing University of Finance and Economics Nanjing China
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In t... 详细信息
来源: 评论
A Spectrum Based Algorithm for Image Classification
收藏 引用
电子学报(英文版) 2009年 第3期18卷 427-430页
作者: WANG Nian ZHANG Jiang TANG Jun FAN Yizheng LIANG Dong Key Laboratory of Intelligent Computing and Signal Processing Anhui University Education Ministry Hefei 230039 China Hefei Teachers College Hefei 230601 China Department of Mathematics Anhui University Hefei 230039 China
In this paper, a novel algorithm for image classification is presented which uses the projective value of adjacency spectrum as classified samples. Firstly, the eigenvalues of adjacency matrices constructed on the fea... 详细信息
来源: 评论