咨询与建议

限定检索结果

文献类型

  • 283 篇 会议
  • 199 篇 期刊文献

馆藏范围

  • 482 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 339 篇 工学
    • 255 篇 计算机科学与技术...
    • 195 篇 软件工程
    • 87 篇 信息与通信工程
    • 51 篇 控制科学与工程
    • 38 篇 电子科学与技术(可...
    • 34 篇 电气工程
    • 25 篇 生物工程
    • 20 篇 机械工程
    • 19 篇 光学工程
    • 16 篇 化学工程与技术
    • 14 篇 生物医学工程(可授...
    • 14 篇 网络空间安全
    • 12 篇 仪器科学与技术
    • 12 篇 材料科学与工程(可...
    • 11 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 9 篇 航空宇航科学与技...
    • 7 篇 建筑学
  • 181 篇 理学
    • 115 篇 数学
    • 41 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 33 篇 生物学
    • 27 篇 系统科学
    • 19 篇 化学
  • 87 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 19 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 10 篇 法学
    • 9 篇 社会学
  • 5 篇 经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 15 篇 computer science
  • 15 篇 laboratories
  • 14 篇 wireless sensor ...
  • 12 篇 training
  • 11 篇 heuristic algori...
  • 10 篇 genetic algorith...
  • 10 篇 feature extracti...
  • 9 篇 face recognition
  • 9 篇 optimization
  • 8 篇 databases
  • 8 篇 clustering algor...
  • 8 篇 computer network...
  • 8 篇 evolutionary com...
  • 7 篇 statistics
  • 7 篇 semantics
  • 6 篇 vectors
  • 6 篇 monitoring
  • 6 篇 computational mo...
  • 6 篇 sociology
  • 6 篇 cloud computing

机构

  • 27 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 16 篇 key laboratory f...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 school of comput...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 key laboratory f...
  • 9 篇 services computi...
  • 9 篇 state key labora...
  • 9 篇 university of sc...
  • 9 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 13 篇 shangfei wang
  • 10 篇 wan liangtian
  • 10 篇 naijie gu
  • 9 篇 sun lu
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 wang xianpeng
  • 7 篇 baohua zhao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu

语言

  • 457 篇 英文
  • 16 篇 中文
  • 10 篇 其他
检索条件"机构=Province Key Laboratory of Software in Computing and Communication"
482 条 记 录,以下是21-30 订阅
排序:
Research on the transmission performance of turbo codes in DDO-OFDM system
收藏 引用
Optoelectronics Letters 2015年 第2期11卷 134-136页
作者: 童峥嵘 胡桂彬 曹晔 张卫华 Key Laboratory of Film Electronics and Communication Devices and Key Laboratory of Intelligent Computing and Novel Software Technology Tianjin University of Technology
A direct detection optical orthogonal frequency division multiplexing(DDO-OFDM)system using turbo codes is built,and the transmission performance comparison between coded system and uncoded system is *** decoding algo... 详细信息
来源: 评论
Simultaneous measurement of refractive index, temperature and strain based on core diameter mismatch and polarization-maintaining FBG
收藏 引用
Optoelectronics Letters 2013年 第3期9卷 238-240页
作者: 童峥嵘 王洁玉 张卫华 曹晔 Key Laboratory of Film Electronics and Communication Devices and Key Laboratory of Intelligent Computing and Novel Software Technology School of Computer and Communication Engineering Tianjin University of Technology
A kind of fiber-optic sensor for simultaneous measurement of refractive index of surrounding medium, temperature and strain is described. Based on core diameter mismatch, a multimode-single mode-multimode (MSM) struct... 详细信息
来源: 评论
Highly birefringent photonic crystal fibers with flattened dispersion and low confinement loss
收藏 引用
Optoelectronics Letters 2013年 第1期9卷 45-48页
作者: 曹晔 李荣敏 童峥嵘 Key Laboratory of Film Electronics and Communication Devices Key Laboratory of Intelligent Computing and Novel Software Technology School of Computer and Communication Engineering Tianjin University of Technology
A highly birefringent index-guiding photonic crystal fiber (PCF) with flattened dispersion and low confinement loss is proposed by introducing two small air holes with the same diameter in the core area. The fundament... 详细信息
来源: 评论
Source code fragment summarization with small-scale crowdsourcing based features
收藏 引用
Frontiers of Computer Science 2016年 第3期10卷 504-517页
作者: Najam NAZAR He JIANG Guojun GAO Tao ZHANG Xiaochen LI Zhilei REN Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian 116621 China State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 China Department of Computing The Hong Kong Polytechnic University Hong Kong China
Recent studies have applied different approaches for summarizing software artifacts, and yet very few efforts have been made in summarizing the source code fragments available on web. This paper investigates the feasi... 详细信息
来源: 评论
Nanoscaffold Ba0.6Sr0.4TiO3:Nd2O3 ferroelectric memristors crossbar array for neuromorphic computing and secure encryption
收藏 引用
Journal of Materiomics 2025年 第5期11卷
作者: Zhang, Weifeng Xu, Jikang Wang, Yongrui Zhang, Yinxing Wang, Yu Li, Pengfei Jia, Yongqing Zhao, Zhen Li, Changliang Yang, Biao Hou, Yue Guo, Zhenqiang Huang, Zeze Qi, Yincheng Yan, Xiaobing Institute of Life Science and Green Development Key Laboratory of Brain-like Neuromorphic Devices and Systems of Hebei Province College of Electronic and Information Engineering Hebei Baoding 071002 China Hebei Key Lab of Optic-Electronic Information and Materials College of Physics Science & Technology Hebei Baoding 071002 China Department of Electronic and Communication Engineering Intelligent Vision Computing Research Institute North China Electric Power University Hebei Baoding 071003 China
Recent advancements in AI have spurred interest in ferroelectric memristors for neuromorphic chips due to their ability to precisely control resistive states through polarization flip-flop without electroforming. Howe... 详细信息
来源: 评论
Empirical topological investigation of practical supply chains based on complex networks
收藏 引用
Chinese Physics B 2017年 第11期26卷 144-150页
作者: 廖好 沈婧 吴兴桐 陈博奎 周明洋 National Engineering Laboratory for Big Data Computing Systems Guangdong Province Key Laboratory of Popular High Performance ComputersCollege of Computer Science and Software Engineering Shenzhen University Department of Computer Science School of Computing National University of Singapore
The industrial supply chain networks basically capture the circulation of social resource, dominating the stability and efficiency of the industrial system. In this paper, we provide an empirical study of the topology... 详细信息
来源: 评论
Secure Two-Party Point-Circle Inclusion Problem
收藏 引用
Journal of Computer Science & Technology 2007年 第1期22卷 88-91页
作者: 罗永龙 黄刘生 仲红 Department of Computer Science University of Science and Technology of China Hefei 230027 China Department of Computer Science Anhui Normal University Wuhu 241000 China Anhui Province Key laboratory of Software in Computing and Communication Hefei 230027 China
Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous protocols for determining whether a point is inside a circle are not secure enough. We present ... 详细信息
来源: 评论
A Real-Time Multi-Stage Architecture for Pose Estimation of Zebrafish Head with Convolutional Neural Networks
收藏 引用
Journal of Computer Science & Technology 2021年 第2期36卷 434-444页
作者: Zhang-Jin Huang Xiang-Xiang He Fang-Jun Wang Qing Shen School of Computer Science and Technology University of Science and Technology of ChinaHefei 230027China School of Data Science University of Science and Technology of ChinaHefei 230027China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027China
In order to conduct optical neurophysiology experiments on a freely swimming zebrafish,it is essential to quantify the zebrafish head to determine exact lighting *** efficiently quantify a zebrafish head's behavio... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Research and implementation of continuous wave radar ranging method based on tri-frequency
收藏 引用
High Technology Letters 2014年 第2期20卷 111-116页
作者: 袁其平 Fan Lijieare Tong Zhengrong Yang Xiufeng Cao Ye School of Electronics Information Engineering Tianjin University of Technology Key Laboratory of Film Electronics and Communication Devices and Key Laboratory of Intelligent Computing and Novel Software Technolgy School of Computer and Communication EngineeringTianjin University of Technology
In the traditional dual-frequency radar ranging system,there is a contradiction between ranging precision and ranging *** a tri-frequency ranging method is *** principle of the tri-frequency ranging is that the distan... 详细信息
来源: 评论