咨询与建议

限定检索结果

文献类型

  • 963 篇 会议
  • 722 篇 期刊文献

馆藏范围

  • 1,685 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,064 篇 工学
    • 575 篇 计算机科学与技术...
    • 419 篇 软件工程
    • 309 篇 信息与通信工程
    • 256 篇 电子科学与技术(可...
    • 197 篇 电气工程
    • 138 篇 控制科学与工程
    • 80 篇 光学工程
    • 73 篇 机械工程
    • 70 篇 生物工程
    • 67 篇 仪器科学与技术
    • 65 篇 化学工程与技术
    • 49 篇 动力工程及工程热...
    • 49 篇 生物医学工程(可授...
    • 45 篇 材料科学与工程(可...
    • 30 篇 网络空间安全
    • 26 篇 力学(可授工学、理...
    • 26 篇 建筑学
    • 22 篇 土木工程
    • 19 篇 环境科学与工程(可...
  • 750 篇 理学
    • 492 篇 数学
    • 241 篇 物理学
    • 102 篇 统计学(可授理学、...
    • 91 篇 生物学
    • 79 篇 系统科学
    • 71 篇 化学
  • 183 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 80 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 28 篇 法学
    • 22 篇 社会学
  • 25 篇 医学
    • 21 篇 临床医学
  • 22 篇 农学
  • 13 篇 经济学
  • 9 篇 军事学
  • 6 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 35 篇 bandwidth
  • 35 篇 feature extracti...
  • 28 篇 simulation
  • 27 篇 signal processin...
  • 25 篇 semantics
  • 24 篇 image segmentati...
  • 24 篇 signal processin...
  • 24 篇 optimization
  • 18 篇 wireless communi...
  • 18 篇 computational mo...
  • 18 篇 accuracy
  • 17 篇 deep learning
  • 17 篇 slot antennas
  • 17 篇 training
  • 16 篇 interference
  • 15 篇 complex networks
  • 15 篇 neural networks
  • 15 篇 laboratories
  • 15 篇 resonant frequen...
  • 14 篇 metals

机构

  • 207 篇 key laboratory o...
  • 102 篇 key laboratory o...
  • 63 篇 key laboratory o...
  • 59 篇 school of comput...
  • 53 篇 anhui university...
  • 43 篇 college of infor...
  • 35 篇 key laboratory o...
  • 33 篇 key laboratory o...
  • 29 篇 college of compu...
  • 25 篇 key lab of intel...
  • 25 篇 school of mathem...
  • 24 篇 school of electr...
  • 24 篇 anhui province k...
  • 24 篇 the key laborato...
  • 23 篇 key lab of intel...
  • 23 篇 anhui university
  • 21 篇 engineering rese...
  • 20 篇 fujian key labor...
  • 18 篇 fujian provincia...
  • 17 篇 hunan key labora...

作者

  • 79 篇 huang zhixiang
  • 76 篇 li yingsong
  • 58 篇 yingsong li
  • 58 篇 zhixiang huang
  • 57 篇 shi minjia
  • 41 篇 xianliang wu
  • 37 篇 wu xianliang
  • 30 篇 luo bin
  • 28 篇 zhang xingyi
  • 27 篇 jiang kai
  • 26 篇 solé patrick
  • 24 篇 zou juan
  • 24 篇 li liping
  • 23 篇 tang jin
  • 23 篇 bin luo
  • 22 篇 liping li
  • 21 篇 wu xian-liang
  • 21 篇 li chenglong
  • 21 篇 li xiaohui
  • 19 篇 minquan li

语言

  • 1,470 篇 英文
  • 183 篇 其他
  • 46 篇 中文
检索条件"机构=Key of Intelligent Computing and Signal Processing of Ministry of Education"
1685 条 记 录,以下是1441-1450 订阅
排序:
Through-wall synthetic aperture radar based on finite beamwidth processing
Through-wall synthetic aperture radar based on finite beamwi...
收藏 引用
3rd Microwaves, Radar and Remote Sensing Symposium, MRRS-2011
作者: Zhu, Jiabing Hong, Yi Tao, Liang East China Research Institute of Electronic Engineering Hefei Anhui China Education Ministry Key Lab. of Intelligent Computing and Signal Processing Anhui University China
Standard backprojection technique is used in typical through-wall synthetic aperture radar (TWSAR) image, it implicitly assumes infinite beamwidth, whereby the entire target area is illuminated and returns are collect... 详细信息
来源: 评论
Modeling for MIMO wireless channels in mine tunnels
Modeling for MIMO wireless channels in mine tunnels
收藏 引用
2011 International Conference on Electric Information and Control Engineering, ICEICE 2011
作者: Yao, Shan-Hua Wu, Xian-Liang School of Electric and Information Engineering Anhui University of Science and Technology Huainan China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei China
The electromagnetic waves propagation situation is very complex in mine tunnels, so it is important to establish an efficient MIMO channel model for applying wireless communication technology to coal mine underground.... 详细信息
来源: 评论
Asymmetric multiparty-controlled teleportation of arbitrary n-qudit states using different quantum channels
Asymmetric multiparty-controlled teleportation of arbitrary ...
收藏 引用
2011 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011
作者: Shi, Run-Hua Zhong, Hong Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China School of Computer Science and Technology Anhui University Hefei 230039 China
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes th... 详细信息
来源: 评论
A split-operator method to simulate the left hand materials
A split-operator method to simulate the left hand materials
收藏 引用
2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, CSQRWC 2011
作者: Ren, Xin-Gang Huang, Zhi-Xiang Wu, Xian-Liang Lu, Si-Long Mei, Yi-Cai Du, Hong-Mei Wu, Lei Key Lab. of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei China Department of Physics and Electronic Engineering Hefei Normal University Hefei China
The finite difference time domain (FDTD) is a powerful method in electromagnetic simulation and also widely used in research of the metamaterials recently. In this paper a novel FDTD method based on split operator is ... 详细信息
来源: 评论
Perfect plane wave injection into 3D FDTD (2, 4) scheme
Perfect plane wave injection into 3D FDTD (2, 4) scheme
收藏 引用
2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, CSQRWC 2011
作者: Wang, Hui Huang, Zhi-Xiang Wu, Xian-Liang Wu, Lei Key Lab. of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei China Department of Physics and Electronic Engineering Hefei Normal University Hefei China
In the paper, the authors derive the method of splitting plane wave FDTD (SP-FDTD) method for initiation of plane wave sources in the total-field and scattered-field (TF/SF) formulation of 3D FDTD (2, 4) scheme. By sp... 详细信息
来源: 评论
Inter-piconet interference mitigation schemes for converged BTLE and cellular network
Inter-piconet interference mitigation schemes for converged ...
收藏 引用
2011 International Conference on Wireless Communications and signal processing, WCSP 2011
作者: Hu, Ying Wang, Guizhu Shan, Lianhai Yuan, Zhi Ouyang, Yuling Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei China Shanghai Research Center for Wireless Communications Key Lab of Wireless Sensor Network and Communication CAS Shanghai China
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, d... 详细信息
来源: 评论
Research on the maximum flow in large-scale network
Research on the maximum flow in large-scale network
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Zhang, Yan-Ping Hua, Bo Jiang, Juan Zhang, Yuan Chen, Xiao-Yan School of Computer Science and Technology Anhui University Hefei 230039 China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei 230039 Anhui Province China
This article covers a problem that often arises in real life situations-the maximum flow problem. This problem is a classical combinatorial optimization problem, which arises in many engineering and scientific applica... 详细信息
来源: 评论
Efficient query protocol for database's privacy
Efficient query protocol for database's privacy
收藏 引用
2011 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011
作者: Yuan, Xianping Zhong, Hong Huang, Hongsheng Yi, Lei Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei Anhui 230039 China School of Computer Science and Technology Anhui University Hefei Anhui 230039 China
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to... 详细信息
来源: 评论
A new scheme for information hiding based on digital images
A new scheme for information hiding based on digital images
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Zhang, Yan-Ping Jiang, Juan Xu, Chao Hua, Bo Chen, Xiao-Yan School of Computer Science and Technology Anhui University Hefei 230039 China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei 230039 Anhui Province China
Digital steganography is a kind of data security technique. In this paper, a new information hiding scheme was proposed. In this scheme, we embed secret message into still digital images based on (7, 4) Hamming Code a... 详细信息
来源: 评论
Analysis of asymptotic approximation SER in DiffAF cooperative communication networks
收藏 引用
Journal of Information and Computational Science 2011年 第13期8卷 2893-2901页
作者: Xu, Lei Zhang, Hongwei Li, Xiaohui Wu, Xianliang Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China
In conventional single-antenna systems, differential modulation is useful when the knowledge of channel state information (CSI) is not available. Some time division multiple access (TDMA) wireless cooperative relay pr... 详细信息
来源: 评论