咨询与建议

限定检索结果

文献类型

  • 2,256 篇 会议
  • 1,465 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 3,726 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,352 篇 工学
    • 1,502 篇 计算机科学与技术...
    • 1,239 篇 软件工程
    • 590 篇 信息与通信工程
    • 381 篇 电子科学与技术(可...
    • 318 篇 电气工程
    • 284 篇 控制科学与工程
    • 191 篇 生物工程
    • 180 篇 机械工程
    • 174 篇 光学工程
    • 128 篇 生物医学工程(可授...
    • 123 篇 化学工程与技术
    • 114 篇 仪器科学与技术
    • 84 篇 动力工程及工程热...
    • 67 篇 材料科学与工程(可...
    • 55 篇 网络空间安全
    • 54 篇 建筑学
    • 48 篇 土木工程
  • 1,418 篇 理学
    • 906 篇 数学
    • 414 篇 物理学
    • 225 篇 生物学
    • 216 篇 统计学(可授理学、...
    • 132 篇 化学
    • 124 篇 系统科学
  • 567 篇 管理学
    • 300 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 101 篇 工商管理
  • 96 篇 医学
    • 80 篇 临床医学
    • 64 篇 基础医学(可授医学...
    • 43 篇 药学(可授医学、理...
  • 59 篇 法学
    • 46 篇 社会学
  • 49 篇 农学
  • 33 篇 经济学
  • 23 篇 教育学
  • 11 篇 军事学
  • 9 篇 哲学
  • 9 篇 艺术学
  • 8 篇 文学

主题

  • 143 篇 feature extracti...
  • 105 篇 semantics
  • 88 篇 training
  • 78 篇 laboratories
  • 68 篇 information proc...
  • 65 篇 computational mo...
  • 64 篇 image segmentati...
  • 56 篇 data mining
  • 55 篇 optimization
  • 53 篇 computers
  • 50 篇 face recognition
  • 49 篇 signal processin...
  • 49 篇 accuracy
  • 48 篇 visualization
  • 48 篇 robustness
  • 46 篇 signal processin...
  • 44 篇 deep learning
  • 42 篇 support vector m...
  • 42 篇 humans
  • 41 篇 machine learning

机构

  • 435 篇 key laboratory o...
  • 221 篇 university of ch...
  • 210 篇 key laboratory o...
  • 102 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 65 篇 school of comput...
  • 65 篇 peng cheng labor...
  • 63 篇 college of compu...
  • 62 篇 key laboratory o...
  • 53 篇 anhui university...
  • 53 篇 college of mathe...
  • 53 篇 key laboratory o...
  • 48 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 46 篇 hunan provincial...
  • 45 篇 the key laborato...
  • 44 篇 school of comput...
  • 43 篇 graduate univers...
  • 41 篇 fujian provincia...
  • 41 篇 college of infor...

作者

  • 91 篇 zhongzhi shi
  • 86 篇 huang zhixiang
  • 85 篇 shi zhongzhi
  • 74 篇 li yingsong
  • 73 篇 shiguang shan
  • 73 篇 xilin chen
  • 69 篇 zhixiang huang
  • 62 篇 liu qun
  • 62 篇 huang qingming
  • 57 篇 yingsong li
  • 56 篇 xianliang wu
  • 51 篇 shi minjia
  • 42 篇 xu qianqian
  • 41 篇 wu xianliang
  • 39 篇 wu xian-liang
  • 38 篇 feng yang
  • 35 篇 he qing
  • 35 篇 luo bin
  • 33 篇 bin luo
  • 32 篇 liu yang

语言

  • 3,457 篇 英文
  • 176 篇 其他
  • 103 篇 中文
检索条件"机构=The Key Laboratory of Intelligent Computing and Signal Processing"
3726 条 记 录,以下是2921-2930 订阅
排序:
Asymmetric multiparty-controlled teleportation of arbitrary n-qudit states using different quantum channels
Asymmetric multiparty-controlled teleportation of arbitrary ...
收藏 引用
2011 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011
作者: Shi, Run-Hua Zhong, Hong Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China School of Computer Science and Technology Anhui University Hefei 230039 China
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes th... 详细信息
来源: 评论
RETRACTED ARTICLE: The eqviualence of fuzzy logical dynamics and the neural circuits' dynamics
RETRACTED ARTICLE: The eqviualence of fuzzy logical dynamics...
收藏 引用
2011 7th International Conference on Natural Computation, ICNC 2011
作者: Hu, Hong Shi, Zhongzhi Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Science Beijing 100190 China
In order to probe the secret of our brain, it is necessary to design large scale dynamical neural circuits( more than 106 neurons) to simulate complex process of our brain. But such kind task is not easy to achieve on... 详细信息
来源: 评论
Dual form back propagation on the EM algorithm
Dual form back propagation on the EM algorithm
收藏 引用
2011 IEEE International Conference on Granular computing, GrC 2011
作者: Hu, Hong Shi, Zhongzhi Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Science Beijing 100190 China
Vladimir N. Vapnik. (1998) pointed out that maxlikelihood functions in EM algorithms are just a special risk function. Based on this opinion, a novel EM algorithm uses a risk function differ with maxlikelihood functio... 详细信息
来源: 评论
Nematode sperm maturation triggered by protease involves sperm-secreted serine protease inhibitor (Serpin)
Nematode sperm maturation triggered by protease involves spe...
收藏 引用
第二届模式生物与人类健康研讨会
作者: Yanmei Zhao Youqiao Hu Zhiqi Hao Andreas F.Hühmer Fanxia Meng Steven W.L'Hernault Si-Min He Meng-Qiu Dong Long Miao Wei Sun Pan Zhang Hao Chi Mei-Jun Zhang Chun-Qing Song Xuan Ma Yunlong Shang Bin Wang Graduate School Chinese Academy of Sciences Beijing 100049 China Thermo Fisher Scientific San Jose CA 94539 Department of Biology Emory University Atlanta GA 30322 Key Lab of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China National Institute of Biological Sciences Beijing Beijing 102206 China Graduate School Chinese Academy of Sciences Beijing 100049 China Laboratory of Noncoding RNA Institute of Biophysics Chinese Academy of Sciences Beijing 100101 China Laboratory of Noncoding RNA Institute of Biophysics Chinese Academy of Sciences Beijing 100101 China Key Lab of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
来源: 评论
Inter-piconet interference mitigation schemes for converged BTLE and cellular network
Inter-piconet interference mitigation schemes for converged ...
收藏 引用
2011 International Conference on Wireless Communications and signal processing, WCSP 2011
作者: Hu, Ying Wang, Guizhu Shan, Lianhai Yuan, Zhi Ouyang, Yuling Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei China Shanghai Research Center for Wireless Communications Key Lab of Wireless Sensor Network and Communication CAS Shanghai China
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, d... 详细信息
来源: 评论
Research on the maximum flow in large-scale network
Research on the maximum flow in large-scale network
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Zhang, Yan-Ping Hua, Bo Jiang, Juan Zhang, Yuan Chen, Xiao-Yan School of Computer Science and Technology Anhui University Hefei 230039 China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei 230039 Anhui Province China
This article covers a problem that often arises in real life situations-the maximum flow problem. This problem is a classical combinatorial optimization problem, which arises in many engineering and scientific applica... 详细信息
来源: 评论
Efficient query protocol for database's privacy
Efficient query protocol for database's privacy
收藏 引用
2011 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011
作者: Yuan, Xianping Zhong, Hong Huang, Hongsheng Yi, Lei Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei Anhui 230039 China School of Computer Science and Technology Anhui University Hefei Anhui 230039 China
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to... 详细信息
来源: 评论
Fusion of polarimetric image using contourlet transform
Fusion of polarimetric image using contourlet transform
收藏 引用
2011 International Conference on Consumer Electronics, Communications and Networks, CECNet 2011
作者: Zong-Hu, He De-Xiang, Zhang Ling-Jun, Zhang Bao-Hong, Yuan Key Lab. of Intelligent Computing and Signal Processing Anhui University Hefei China Institute of Electrical Engineering and Automation Anhui University Hefei China
Contourlet transform is the combination of the multi-scale analysis and multi-directional analysis in processing high-dimensional signals and has better approximation precision and better sparse description. Firstly, ... 详细信息
来源: 评论
A new scheme for information hiding based on digital images
A new scheme for information hiding based on digital images
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Zhang, Yan-Ping Jiang, Juan Xu, Chao Hua, Bo Chen, Xiao-Yan School of Computer Science and Technology Anhui University Hefei 230039 China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei 230039 Anhui Province China
Digital steganography is a kind of data security technique. In this paper, a new information hiding scheme was proposed. In this scheme, we embed secret message into still digital images based on (7, 4) Hamming Code a... 详细信息
来源: 评论
Monitoring the PSO process based on fuzzy random variables
Monitoring the PSO process based on fuzzy random variables
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Feng, J.Q. Xu, C. Xie, W.X. Institute of Intelligent Computing Science Shenzhen University Shenzhen China Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen Guangdong 518060 China
This paper presents a method for monitoring the particle swarm optimization process that accounts for the random nature of the system's external environment and the fuzzy character of the particles' decision-m... 详细信息
来源: 评论