咨询与建议

限定检索结果

文献类型

  • 729 篇 会议
  • 426 篇 期刊文献

馆藏范围

  • 1,155 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 351 篇 计算机科学与技术...
    • 262 篇 软件工程
    • 215 篇 信息与通信工程
    • 205 篇 电子科学与技术(可...
    • 153 篇 电气工程
    • 91 篇 控制科学与工程
    • 62 篇 光学工程
    • 54 篇 仪器科学与技术
    • 43 篇 机械工程
    • 41 篇 化学工程与技术
    • 39 篇 生物工程
    • 29 篇 生物医学工程(可授...
    • 28 篇 动力工程及工程热...
    • 27 篇 材料科学与工程(可...
    • 21 篇 网络空间安全
    • 16 篇 力学(可授工学、理...
    • 16 篇 建筑学
    • 12 篇 冶金工程
    • 12 篇 土木工程
  • 443 篇 理学
    • 272 篇 数学
    • 168 篇 物理学
    • 54 篇 统计学(可授理学、...
    • 52 篇 生物学
    • 49 篇 化学
    • 49 篇 系统科学
  • 113 篇 管理学
    • 71 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 19 篇 农学
  • 19 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 14 篇 法学
  • 11 篇 经济学
  • 7 篇 军事学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 33 篇 signal processin...
  • 31 篇 bandwidth
  • 28 篇 simulation
  • 27 篇 signal processin...
  • 23 篇 feature extracti...
  • 19 篇 optimization
  • 18 篇 computational mo...
  • 17 篇 laboratories
  • 17 篇 robustness
  • 16 篇 wireless communi...
  • 15 篇 metals
  • 15 篇 couplings
  • 15 篇 accuracy
  • 14 篇 time-domain anal...
  • 13 篇 support vector m...
  • 13 篇 image segmentati...
  • 13 篇 metamaterials
  • 13 篇 slot antennas
  • 13 篇 equations
  • 13 篇 resonant frequen...

机构

  • 210 篇 key laboratory o...
  • 102 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 59 篇 school of comput...
  • 53 篇 anhui university...
  • 53 篇 key laboratory o...
  • 42 篇 college of infor...
  • 33 篇 key laboratory o...
  • 33 篇 key laboratory o...
  • 25 篇 the key laborato...
  • 24 篇 anhui province k...
  • 22 篇 anhui university
  • 21 篇 school of mathem...
  • 16 篇 national mobile ...
  • 15 篇 school of electr...
  • 14 篇 anhui university...
  • 13 篇 key laboratory o...
  • 13 篇 school of electr...
  • 12 篇 key laboratory o...
  • 12 篇 information mate...

作者

  • 84 篇 huang zhixiang
  • 76 篇 li yingsong
  • 68 篇 zhixiang huang
  • 57 篇 yingsong li
  • 54 篇 shi minjia
  • 47 篇 xianliang wu
  • 32 篇 wu xianliang
  • 29 篇 zhang xingyi
  • 26 篇 solé patrick
  • 26 篇 bin luo
  • 25 篇 li liping
  • 22 篇 minquan li
  • 21 篇 wu xian-liang
  • 21 篇 liping li
  • 20 篇 zhao shu
  • 20 篇 zhang yanping
  • 19 篇 li chenglong
  • 19 篇 tang jin
  • 18 篇 xiaopei wu
  • 18 篇 xingyi zhang

语言

  • 1,088 篇 英文
  • 40 篇 其他
  • 28 篇 中文
检索条件"机构=Key Laboratory of Intelligent Computing and Signal Processing of the MoE"
1155 条 记 录,以下是951-960 订阅
排序:
Posterior Probability Support Vector Machine Applied in Motor Imagery Classification
Posterior Probability Support Vector Machine Applied in Moto...
收藏 引用
International Conference on Bioinformatics and Biomedical Engineering (ICBBE)
作者: Ying-ying Jiao Xiao-pei Wu Key Laboratory of Intelligent Computing &Signal Processing of MOE Anhui University Hehui China
Abstract-Brain-computer interface (BCI) which transforms signals from the brain into control signals can help people with disabilities communicate with others. In this paper, posteriori probability support vector mach... 详细信息
来源: 评论
Wave separation for the great Sumatra-Andaman earthquake with regional seismic array
收藏 引用
Earthquake Science 2011年 第1期24卷 127-132页
作者: Chunyan Zhang Sidao Ni Key Lab of Intelligent Computing and Signal Processing of Ministry of Education School of Mathematics Anhui University Hefei 230039 China Key Laboratory of Dynamic Geodesy Institute of Geodesy and Geophysics Chinese Academy of Sciences Wuhan 430077 China
We analyzed the seismic waveforms from the December 26, 2004 Sumatra-Andaman earthquake recorded at broadband seismic stations in western Europe. Previous studies involving of the beam-forming technique and high frequ... 详细信息
来源: 评论
Erratum to: Multi-party quantum key agreement with Bell states and Bell measurements
收藏 引用
Quantum Information processing 2012年 第2期12卷 933-933页
作者: Shi, Run-Hua Zhong, Hong Key Laboratory of Intelligent Computing & Signal Processing of Ministry of Education Anhui University Hefei China School of Computer Science and Technology Anhui University Hefei China
来源: 评论
A novel description of the reproducing kernel support vector machines
A novel description of the reproducing kernel support vector...
收藏 引用
2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011
作者: Xu, Li-Xiang Luo, Bin Yu, Feng-Hai Xie, Jin Department of Mathematics and Physics Hefei University Hefei China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Anhui 230039 China
Support vector machines (SVMs) and related kernel-based algorithms have become one of the most popular approaches for many machine learning problems. but little is known about the structure of their reproducing kernel... 详细信息
来源: 评论
Spiking neural P systems for arithmetic operations
Spiking neural P systems for arithmetic operations
收藏 引用
6th International Conference on Bio-Inspired computing: Theories and Applications, BIC-TA 2011
作者: Zeng, Xiangxiang Song, Tao Pan, Linqiang Zhang, Xingyi Key Laboratory on Image Processing and Intelligent Control Department of Control Science and Engineering Huazhong University of Science and Technology Wuhan 430074 China Key Lab of Intelligent Computing and Signal Processing School of Computer Science and Technology Anhui University Hefei 230039 China
Recently, Gutiérrez-Naranjo and Leporati considered performing basic arithmetic operations on a new class of bioinspired computing devices - spiking neural P systems (for short, SN P systems). However, the binary... 详细信息
来源: 评论
Modeling for MIMO wireless channels in mine tunnels
Modeling for MIMO wireless channels in mine tunnels
收藏 引用
2011 International Conference on Electric Information and Control Engineering, ICEICE 2011
作者: Yao, Shan-Hua Wu, Xian-Liang School of Electric and Information Engineering Anhui University of Science and Technology Huainan China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei China
The electromagnetic waves propagation situation is very complex in mine tunnels, so it is important to establish an efficient MIMO channel model for applying wireless communication technology to coal mine underground.... 详细信息
来源: 评论
Asymmetric multiparty-controlled teleportation of arbitrary n-qudit states using different quantum channels
Asymmetric multiparty-controlled teleportation of arbitrary ...
收藏 引用
2011 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011
作者: Shi, Run-Hua Zhong, Hong Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China School of Computer Science and Technology Anhui University Hefei 230039 China
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes th... 详细信息
来源: 评论
Inter-piconet interference mitigation schemes for converged BTLE and cellular network
Inter-piconet interference mitigation schemes for converged ...
收藏 引用
2011 International Conference on Wireless Communications and signal processing, WCSP 2011
作者: Hu, Ying Wang, Guizhu Shan, Lianhai Yuan, Zhi Ouyang, Yuling Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei China Shanghai Research Center for Wireless Communications Key Lab of Wireless Sensor Network and Communication CAS Shanghai China
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, d... 详细信息
来源: 评论
Research on the maximum flow in large-scale network
Research on the maximum flow in large-scale network
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Zhang, Yan-Ping Hua, Bo Jiang, Juan Zhang, Yuan Chen, Xiao-Yan School of Computer Science and Technology Anhui University Hefei 230039 China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei 230039 Anhui Province China
This article covers a problem that often arises in real life situations-the maximum flow problem. This problem is a classical combinatorial optimization problem, which arises in many engineering and scientific applica... 详细信息
来源: 评论
Efficient query protocol for database's privacy
Efficient query protocol for database's privacy
收藏 引用
2011 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011
作者: Yuan, Xianping Zhong, Hong Huang, Hongsheng Yi, Lei Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei Anhui 230039 China School of Computer Science and Technology Anhui University Hefei Anhui 230039 China
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to... 详细信息
来源: 评论