咨询与建议

限定检索结果

文献类型

  • 2,259 篇 会议
  • 1,452 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 3,716 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,326 篇 工学
    • 1,484 篇 计算机科学与技术...
    • 1,220 篇 软件工程
    • 588 篇 信息与通信工程
    • 378 篇 电子科学与技术(可...
    • 310 篇 电气工程
    • 280 篇 控制科学与工程
    • 189 篇 生物工程
    • 178 篇 机械工程
    • 173 篇 光学工程
    • 126 篇 生物医学工程(可授...
    • 121 篇 化学工程与技术
    • 113 篇 仪器科学与技术
    • 83 篇 动力工程及工程热...
    • 68 篇 材料科学与工程(可...
    • 55 篇 网络空间安全
    • 51 篇 建筑学
    • 45 篇 土木工程
  • 1,410 篇 理学
    • 905 篇 数学
    • 410 篇 物理学
    • 226 篇 生物学
    • 216 篇 统计学(可授理学、...
    • 130 篇 化学
    • 123 篇 系统科学
  • 561 篇 管理学
    • 296 篇 管理科学与工程(可...
    • 282 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 94 篇 医学
    • 78 篇 临床医学
    • 64 篇 基础医学(可授医学...
    • 43 篇 药学(可授医学、理...
  • 59 篇 法学
    • 46 篇 社会学
  • 48 篇 农学
  • 33 篇 经济学
  • 23 篇 教育学
  • 11 篇 军事学
  • 9 篇 哲学
  • 8 篇 文学
  • 8 篇 艺术学

主题

  • 142 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 training
  • 78 篇 laboratories
  • 68 篇 information proc...
  • 66 篇 computational mo...
  • 64 篇 image segmentati...
  • 56 篇 optimization
  • 53 篇 data mining
  • 53 篇 computers
  • 50 篇 face recognition
  • 49 篇 signal processin...
  • 49 篇 accuracy
  • 48 篇 visualization
  • 48 篇 robustness
  • 47 篇 signal processin...
  • 43 篇 deep learning
  • 42 篇 support vector m...
  • 42 篇 machine learning
  • 42 篇 humans

机构

  • 431 篇 key laboratory o...
  • 222 篇 university of ch...
  • 207 篇 key laboratory o...
  • 102 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 67 篇 school of comput...
  • 65 篇 peng cheng labor...
  • 63 篇 key laboratory o...
  • 63 篇 college of compu...
  • 54 篇 key laboratory o...
  • 53 篇 anhui university...
  • 53 篇 college of mathe...
  • 48 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 46 篇 hunan provincial...
  • 46 篇 the key laborato...
  • 44 篇 school of comput...
  • 44 篇 graduate univers...
  • 42 篇 college of infor...
  • 40 篇 fujian provincia...

作者

  • 90 篇 zhongzhi shi
  • 83 篇 huang zhixiang
  • 81 篇 shi zhongzhi
  • 74 篇 li yingsong
  • 73 篇 shiguang shan
  • 73 篇 xilin chen
  • 70 篇 zhixiang huang
  • 62 篇 liu qun
  • 62 篇 huang qingming
  • 58 篇 yingsong li
  • 56 篇 xianliang wu
  • 53 篇 shi minjia
  • 42 篇 xu qianqian
  • 41 篇 wu xianliang
  • 39 篇 wu xian-liang
  • 38 篇 feng yang
  • 36 篇 luo bin
  • 33 篇 he qing
  • 33 篇 bin luo
  • 32 篇 wen gao

语言

  • 3,287 篇 英文
  • 344 篇 其他
  • 102 篇 中文
检索条件"机构=The Key Laboratory of Intelligent Computing and Signal Processing"
3716 条 记 录,以下是2931-2940 订阅
排序:
Efficient query protocol for database's privacy
Efficient query protocol for database's privacy
收藏 引用
2011 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011
作者: Yuan, Xianping Zhong, Hong Huang, Hongsheng Yi, Lei Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei Anhui 230039 China School of Computer Science and Technology Anhui University Hefei Anhui 230039 China
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to... 详细信息
来源: 评论
Fusion of polarimetric image using contourlet transform
Fusion of polarimetric image using contourlet transform
收藏 引用
2011 International Conference on Consumer Electronics, Communications and Networks, CECNet 2011
作者: Zong-Hu, He De-Xiang, Zhang Ling-Jun, Zhang Bao-Hong, Yuan Key Lab. of Intelligent Computing and Signal Processing Anhui University Hefei China Institute of Electrical Engineering and Automation Anhui University Hefei China
Contourlet transform is the combination of the multi-scale analysis and multi-directional analysis in processing high-dimensional signals and has better approximation precision and better sparse description. Firstly, ... 详细信息
来源: 评论
A new scheme for information hiding based on digital images
A new scheme for information hiding based on digital images
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Zhang, Yan-Ping Jiang, Juan Xu, Chao Hua, Bo Chen, Xiao-Yan School of Computer Science and Technology Anhui University Hefei 230039 China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei 230039 Anhui Province China
Digital steganography is a kind of data security technique. In this paper, a new information hiding scheme was proposed. In this scheme, we embed secret message into still digital images based on (7, 4) Hamming Code a... 详细信息
来源: 评论
Monitoring the PSO process based on fuzzy random variables
Monitoring the PSO process based on fuzzy random variables
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Feng, J.Q. Xu, C. Xie, W.X. Institute of Intelligent Computing Science Shenzhen University Shenzhen China Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen Guangdong 518060 China
This paper presents a method for monitoring the particle swarm optimization process that accounts for the random nature of the system's external environment and the fuzzy character of the particles' decision-m... 详细信息
来源: 评论
Effectively Discriminating Fighting Shots in Action Movies
收藏 引用
Journal of Computer Science & Technology 2011年 第1期26卷 187-194页
作者: 马述高 王伟强 School of Information Science and Engineering Graduate University of Chinese Academy of Sciences Computer Science Department Boston UniversityBoston MA 02215U.S.A. Key Laboratory of Intelligent Information Processing Institute of Computing TechnologyChinese Academy of Sciences
Fighting shots are the highlights of action movies and an effective approach to discriminating fighting shots is very useful for many applications, such as movie trailer construction, movie content filtering, and movi... 详细信息
来源: 评论
Analysis of asymptotic approximation SER in DiffAF cooperative communication networks
收藏 引用
Journal of Information and Computational Science 2011年 第13期8卷 2893-2901页
作者: Xu, Lei Zhang, Hongwei Li, Xiaohui Wu, Xianliang Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China
In conventional single-antenna systems, differential modulation is useful when the knowledge of channel state information (CSI) is not available. Some time division multiple access (TDMA) wireless cooperative relay pr... 详细信息
来源: 评论
Novel Algorithm for Hand Vein Recognition Based on Retinex Method and SIFT Feature Analysis
Novel Algorithm for Hand Vein Recognition Based on Retinex M...
收藏 引用
The 2011 International Conference on Electric and Electronics(EEIC 2011)
作者: Hua-bin Wang Liang Tao Xue-you Hu Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University
Based on the Retinex method and the SIFT feature analysis, this paper presents a novel algorithm for hand vein recognition. First of all, the principle of the near-infrared hand vein image acquisition is introduced. S... 详细信息
来源: 评论
Analysis of asymptotic approximation SER for Alamouti code transmission protocol in cooperative communication networks
收藏 引用
Journal of Information and Computational Science 2011年 第14期8卷 3003-3010页
作者: Xu, Lei Zhang, Hongwei Li, Xiaohui Wu, Xianliang Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China
Some time division multiple access (TDMA) wireless cooperative relay protocols have recently been developed. The works about their symbol error rate (SER) performance, however, are limited to SER upper bounds or SER f... 详细信息
来源: 评论
Analysis of asymptotic approximation SER for TDMA relay protocol in cooperative communication networks
收藏 引用
Journal of Information and Computational Science 2011年 第12期8卷 2367-2374页
作者: Xu, Lei Zhang, Hongwei Li, Xiaohui Wu, Xianliang Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China
Some Time Division Multiple Access (TDMA) wireless cooperative relay protocols and their Symbol Error Rate (SER) performance have recently been developed. These works, however, are limited to SER upper bounds or SER f... 详细信息
来源: 评论
Answering contextual questions based on ontologies and question templates
收藏 引用
Frontiers of Computer Science 2011年 第4期5卷 405-418页
作者: Dongsheng WANG Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Graduate University of the Chinese Academy of Sciences Beijing 100049 China Department of Computer Science Jiangsu University of Science and Technology Zhenjiang 212003 China
Contextual question answering (CQA), in which user information needs are satisfied through an interactive question answering (QA) dialog, has recently attracted more research attention. One challenge is to fuse co... 详细信息
来源: 评论