咨询与建议

限定检索结果

文献类型

  • 956 篇 会议
  • 732 篇 期刊文献

馆藏范围

  • 1,688 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,074 篇 工学
    • 581 篇 计算机科学与技术...
    • 418 篇 软件工程
    • 310 篇 信息与通信工程
    • 260 篇 电子科学与技术(可...
    • 204 篇 电气工程
    • 143 篇 控制科学与工程
    • 81 篇 光学工程
    • 76 篇 机械工程
    • 70 篇 生物工程
    • 69 篇 仪器科学与技术
    • 64 篇 化学工程与技术
    • 50 篇 动力工程及工程热...
    • 49 篇 生物医学工程(可授...
    • 42 篇 材料科学与工程(可...
    • 31 篇 网络空间安全
    • 28 篇 建筑学
    • 26 篇 力学(可授工学、理...
    • 23 篇 土木工程
    • 19 篇 环境科学与工程(可...
  • 749 篇 理学
    • 487 篇 数学
    • 241 篇 物理学
    • 101 篇 统计学(可授理学、...
    • 90 篇 生物学
    • 80 篇 系统科学
    • 69 篇 化学
  • 180 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 39 篇 工商管理
  • 27 篇 法学
    • 21 篇 社会学
  • 26 篇 医学
    • 22 篇 临床医学
  • 22 篇 农学
  • 13 篇 经济学
  • 9 篇 军事学
  • 5 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 37 篇 feature extracti...
  • 35 篇 bandwidth
  • 28 篇 simulation
  • 26 篇 semantics
  • 25 篇 image segmentati...
  • 25 篇 signal processin...
  • 24 篇 signal processin...
  • 23 篇 optimization
  • 18 篇 wireless communi...
  • 18 篇 computational mo...
  • 17 篇 deep learning
  • 17 篇 slot antennas
  • 17 篇 accuracy
  • 17 篇 training
  • 16 篇 interference
  • 15 篇 complex networks
  • 15 篇 neural networks
  • 15 篇 laboratories
  • 15 篇 resonant frequen...
  • 14 篇 metals

机构

  • 210 篇 key laboratory o...
  • 102 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 58 篇 school of comput...
  • 53 篇 anhui university...
  • 42 篇 college of infor...
  • 35 篇 key laboratory o...
  • 33 篇 key laboratory o...
  • 30 篇 college of compu...
  • 25 篇 the key laborato...
  • 24 篇 key lab of intel...
  • 24 篇 anhui province k...
  • 24 篇 anhui university
  • 23 篇 school of electr...
  • 23 篇 key lab of intel...
  • 23 篇 school of mathem...
  • 22 篇 fujian key labor...
  • 21 篇 engineering rese...
  • 17 篇 fujian provincia...
  • 17 篇 hunan key labora...

作者

  • 82 篇 huang zhixiang
  • 76 篇 li yingsong
  • 57 篇 yingsong li
  • 57 篇 zhixiang huang
  • 55 篇 shi minjia
  • 41 篇 xianliang wu
  • 37 篇 wu xianliang
  • 30 篇 zhang xingyi
  • 30 篇 luo bin
  • 28 篇 jiang kai
  • 26 篇 solé patrick
  • 24 篇 zou juan
  • 24 篇 li liping
  • 24 篇 tang jin
  • 23 篇 bin luo
  • 21 篇 wu xian-liang
  • 21 篇 li chenglong
  • 21 篇 liping li
  • 21 篇 li xiaohui
  • 20 篇 yanjun hu

语言

  • 1,567 篇 英文
  • 87 篇 其他
  • 43 篇 中文
检索条件"机构=the Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education"
1688 条 记 录,以下是1491-1500 订阅
排序:
Fast calculation of wide-band RCS for three-dimensional PEC objects based on preconditioned AWE technique
Fast calculation of wide-band RCS for three-dimensional PEC ...
收藏 引用
URSI International Symposium on signals, Systems, and Electronics (ISSSE)
作者: Zhao, Ke-Ming Sun, Yu-Fa Key Lab. of Intelligent Computing and Signal Processing Ministry Education Anhui University Hefei 230039 China
The asymptotic waveform evaluation (AWE) technique combined with the method of moments (MOM) is often applied to accelerate the calculation of the wide-band radar cross section (RCS) of the target. However, the techni... 详细信息
来源: 评论
An efficient technique for extracting singularity arising in RCS computation of cylindrical antenna
An efficient technique for extracting singularity arising in...
收藏 引用
2010 International Conference on Microwave and Millimeter Wave Technology, ICMMT 2010
作者: Li, Jing Sun, Yufa Key Lab. of Intelligent Computing and Signal Processing Anhui University Ministry Education Hefei 230039 China
Analysis of electromagnetic scattering characteristics from wire antennas using method of moments has been performed over the past decades. In this paper, an efficient technique is adopted to evaluate the potential an... 详细信息
来源: 评论
GPU-based accelerated FDTD simulations for double negative (DNG) materials applications
GPU-based accelerated FDTD simulations for double negative (...
收藏 引用
2010 International Conference on Microwave and Millimeter Wave Technology, ICMMT 2010
作者: Chen, Shen Dong, Sun Xian-Liang, Wu Key Lab. of Intelligent Computing and Signal Processing Anhui University Ministry of Education Hefei 230039 China
Recently, double-negative meta-materials are widely studied in scientific research. The double-negative (DNG) mediums are characterized by simultaneous negative permittivity and permeability. In order to make the FDTD... 详细信息
来源: 评论
A secure distributed key management scheme for ad hoc network
A secure distributed key management scheme for ad hoc networ...
收藏 引用
2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010
作者: Xu, Yan Zhong, Hong Yuan, Xianping Yu, Jia Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei China College of Information Engineering Qingdao University Qingdao China
An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced b... 详细信息
来源: 评论
Assessment of genetically modified food security-first results
收藏 引用
Journal of Information and Computational Science 2011年 第12期8卷 2493-2500页
作者: Chai, Jie Wu, Jiyi Cong, Jiang Sun, Xiaohong Kang, Bingyi Deng, Yong School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai 200240 China Hangzhou Key Laboratory of E-Business and Information Security Hangzhou Normal University Zhejiang 310036 China College of Food Science and Technology Shanghai Ocean University Shanghai 201306 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Hunan 411105 China Key Subject Laboratory of National Defense for Radioactive Waste and Environmental Security Southwest University of Science and Technology Mianyang 621010 China College of Computer and Information Sciences Southwest University Chongqing 400715 China
With the development of Genetically Modified (GM) food, security issue is being paid increasing attention. In this paper, a comprehensive model taking account factors which influencing GM food security is proposed. An... 详细信息
来源: 评论
Teaching reform and innovation of the course - Digital image processing experiments
Teaching reform and innovation of the course - Digital image...
收藏 引用
International Conference on Computer Science and education
作者: Zhao, Haifeng Tang, Jin Luo, Bin Key Lab of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei 230039 China
Digital image processing is an interdisciplinary course, which needs students have a strong background in mathematics. To help them change from passive learning to active learning, teaching reform and innovation of th... 详细信息
来源: 评论
A method for translating belief function models to probability models
收藏 引用
Journal of Information and Computational Science 2011年 第10期8卷 1817-1823页
作者: Xu, Peida Wu, Jiyi Li, Ya Cong, Jiang Sun, Xiaohong Kang, Bingyi Deng, Yong School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai 200240 China Hangzhou Key Laboratory of E-Business and Information Security Hangzhou Normal University Zhejiang 310036 China College of Food Science and Technology Shanghai Ocean University Shanghai 201306 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Hunan 411105 China Key Subject Laboratory of National defense for Radioactive Waste and Environmental Security Southwest University of Science and Technology Mianyang 621010 China College of Computer and Information Sciences Southwest University Chongqing 400715 China
One of the key issues in the applications of Dempster-Shafer evidence theory is how to make a decision based on Basic Probability Assignment (BPA). The conventional method is Pignistic Probability Transformation (PPT)... 详细信息
来源: 评论
An improved target immunization strategy
An improved target immunization strategy
收藏 引用
International Conference on Digital Manufacturing and Automation (ICDMA)
作者: Zhang, Yanping Fang, Baoping Deng, Xiaochao He, Fugui Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China Key Laboratory of Physical Electronics of Anhui University of Science and Technology of China Hefei 230026 China
Strategies for network immunization have been drawing wide interest in the area of complex networks during the past decade. The target strategy, in which degree values are used to determine vaccinating priority, has b... 详细信息
来源: 评论
A distributed group signature scheme with traceable signers for mobile Ad hoc networks
A distributed group signature scheme with traceable signers ...
收藏 引用
2010 International Conference on Computer Application and System Modeling, ICCASM 2010
作者: Zhong, Hong Shi, Runhua Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei 230039 China School of Computer Science and Technology Anhui University Hefei 230039 China
In this paper, we propose a distributed group signature scheme with traceable signers for mobile Ad hoc networks. In such scheme, there isn't a trusted center, and all members of Ad hoc group cooperate to generate... 详细信息
来源: 评论
Analysis of mode characteristic of guided electromagnetic wave in mine tunnels
Analysis of mode characteristic of guided electromagnetic wa...
收藏 引用
International Conference on intelligent computing and intelligent Systems
作者: Yao, Shan-Hua Wu, Xian-Liang School of Electric and Information Engineering Anhui University of Science and Technology Huainan China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei China
According to the surface impedance method, the equations of both monofilar mode and bifilar mode of guided electromagnetic waves in mine tunnels were presented, the distribution of synthesized electromagnetic field in... 详细信息
来源: 评论