×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [9]
心理研究所 [6]
自动化研究所 [4]
湖南大学 [2]
北京大学 [1]
武汉大学 [1]
更多...
内容类型
期刊论文 [15]
会议论文 [6]
学位论文 [4]
其他 [1]
发表日期
2023 [1]
2019 [2]
2018 [5]
2015 [2]
2014 [3]
2013 [2]
更多...
学科主题
认知神经科学 [4]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共26条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Seismic Random Noise Suppression Model Based on Downsampling and Superresolution
期刊论文
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2023, 卷号: 61, 页码: 14
作者:
Fang, Ziyi
;
Lin, Hongbo
;
Sun, Fuyao
;
Song, Xue
;
Zhang, Chao
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2023/11/17
Noise reduction
Superresolution
Image restoration
Generators
Data models
Complexity theory
Signal resolution
Seismic exploration
seismic random noise
seismic signal denoising
superresolution (SR)
Human-induced vibration serviceability assessment of the floor based on the full path of the source-path-receiver
期刊论文
Zhongguo Kexue Jishu Kexue/Scientia Sinica Technologica, 2019, 卷号: 49, 期号: 9, 页码: 1089-1099
作者:
Zhu, Qiankun
;
Pu, Xinglong
;
Hui, Xiaoli
;
Zhang, Qiong
;
Du, Yongfeng
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2022/02/17
Acceleration
Probability
Receivers (containers)
Vibrations (mechanical)
Cumulative probabilities
Full path
Iq methods
Peak acceleration
Vibration serviceability
Resolving the Electroencephalographic Correlates of Rapid Goal-Directed Chunking in the Frontal-Parietal Network
期刊论文
FRONTIERS IN NEUROSCIENCE, 2019, 卷号: 13, 页码: 9
作者:
Pang, Jiaoyan
;
Tang, Xiaochen
;
Nie, Qi-Yang
;
Conci, Markus
;
Sun, Peng
收藏
  |  
浏览/下载:62/0
  |  
提交时间:2019/09/10
beta-gamma oscillations
goal-directed chunking
prefrontal-parietal network
parallel-factor analysis model
time-frequency analysis
Traffic characteristic map-based intrusion detection model for industrial internet
期刊论文
International Journal of Network Security, 2018, 卷号: 20, 期号: 2, 页码: 359-370
作者:
Dong, Rui-Hong
;
Wu, Dong-Fang
;
Zhang, Qiu-Yu
;
Zhang, Tao
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/14
Discrete cosine transforms
Hash functions
Singular value decomposition
Discrete Cosine Transform(DCT)
Hash digest
Industrial controls
Information entropy method
Intrusion detection models
Network traffic
Rule set
Singular value decomposition method
Robust speech perception hashing authentication algorithm based on spectral subtraction and multi-feature tensor
期刊论文
International Journal of Network Security, 2018, 卷号: 20, 期号: 2, 页码: 206-216
作者:
Huang, Yi-Bo
;
Zhang, Qiu-Yu
;
Hu, Wen-Jin
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/14
Authentication
Speech
Tensors
Wavelet decomposition
Background noise
Multi features
Perceptual hashing
Robust
Spectral subtractions
How to Use Driving Simulators Properly: Impacts of Human Sensory and Perceptual Capabilities on Visual Fidelity
期刊论文
Transportation Research Part C: Emerging Technologies, 2018, 卷号: 93, 页码: 381-395
作者:
Zhao, Xi*
;
Sarasua, Wayne A.
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/04
Driving simulator
Perception
Raster graphics
Visual acuity
Resolution
Perceptual decomposition
An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string
期刊论文
International Journal of Information and Communication Technology, 2018, 卷号: 12, 期号: 1-2, 页码: 31-50
作者:
Qiuyu, Zhang
;
Pengfei, Xing
;
Yibo, Huang
;
Ruihong, Dong
;
Zhongping, Yang
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/11/14
Authentication
Discrete wavelet transforms
Frequency domain analysis
Signal reconstruction
Speech
Speech communication
Time domain analysis
Wavelet decomposition
Authentication algorithm
Coefficients of low frequencies
Frequency domains
Localisation
Mobile computing environment
Perceptual hashing
Short-time energy
Symmetric ternary string
The Speech multi features fusion perceptual hash algorithm based on tensor decomposition
会议论文
作者:
Huang, Y. B.
;
Fan, M. H.
;
Zhang, Q. Y.
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/11/15
An efficient speech perceptual hashing authentication algorithm based on wavelet packet decomposition
期刊论文
Journal of Information Hiding and Multimedia Signal Processing, 2015, 卷号: 6, 期号: 2, 页码: 311-322
作者:
Zhang, Qiu-Yu
;
Xing, Peng-Fei
;
Huang, Yi-Bo
;
Dong, Rui-Hong
;
Yang, Zhong-Ping
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/14
Authentication
Discrete cosine transforms
Image coding
Robustness (control systems)
Speech
Wavelet analysis
Wavelet decomposition
Authentication algorithm
Givens Rotation
Perceptual hashing
Speech content
Two dimensional discrete cosine transform
Wavelet packet coefficient
Wavelet Packet Decomposition
Wavelet packet decompositions
The hash algorithm of speech perception based on the integration of adaptive MFCC and LPCC
期刊论文
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2015, 卷号: 43, 期号: 2, 页码: 124-128
作者:
Huang, Yibo
;
Zhang, Qiuyu
;
Yuan, Zhanting
;
Yang, Zhongping
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/11/14
Audition
Authentication
Factorization
Hash functions
Matrix algebra
Speech
Cepstral coefficients
Characteristic matrices
Decomposition algorithm
Information security technologies
Mel frequency cepstral co-efficient
Nonnegative matrix factorization
Perceptual speech hash
Tamper localization
©版权所有 ©2017 CSpace - Powered by
CSpace