×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
自动化研究所 [30]
清华大学 [5]
北京大学 [4]
深圳先进技术研究院 [3]
长春光学精密机械与物... [3]
沈阳自动化研究所 [3]
更多...
内容类型
学位论文 [28]
期刊论文 [27]
会议论文 [10]
其他 [4]
专利 [3]
发表日期
2020 [3]
2018 [5]
2017 [2]
2016 [2]
2015 [2]
2014 [4]
更多...
学科主题
Biochemica... [1]
Chemistry,... [1]
Computer S... [1]
computer s... [1]
生物材料::生物基化... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共72条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Spatial and temporal microseismic evolution before rock burst in steeply dipping thick coal seams under alternating mining of adjacent coal seams
期刊论文
ARABIAN JOURNAL OF GEOSCIENCES, 2021, 卷号: 14, 期号: 20, 页码: 28
作者:
Wu, Zhenhua
;
Pan, Peng-Zhi
;
Konicek, Petr
;
Zhao, Shankun
;
Chen, Jianqiang
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2022/01/05
Rock burst
Steeply dipping thick coal seam
Adjacent coal seams
Microseismic
Precursor characteristics
A Study of Personal Recognition Method Based on EMG Signal
期刊论文
IEEE TRANSACTIONS ON BIOMEDICAL CIRCUITS AND SYSTEMS, 2020, 卷号: 14, 期号: 4, 页码: 681-691
作者:
Lu, Lijing
;
Mao, Jingna
;
Wang, Wuqi
;
Ding, Guangxin
;
Zhang, Zhiwei
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2020/09/28
Electromyography
personal identification
personal verification
discrete wavelet transform
ExtraTreesClassifer
continuous wavelet transform
convolutional neural networks
transfer learning
siamese network
Spatio-Temporal Coordination and Conflict of Production-Living-Ecology Land Functions in the Beijing-Tianjin-Hebei Region, China
期刊论文
LAND, 2020, 卷号: 9, 期号: 5, 页码: 22
作者:
Yu, Zhuxiao
;
Xu, Erqi
;
Zhang, Hongqi
;
Shang, Erping
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2021/07/09
production-living-ecology
land use multifunctionality
spatio-temporal patterns
coupling coordination and conflict
entropy weight
triangle model
QPMASS: A parallel peak alignment and quantification software for the analysis of large-scale gas chromatography-mass spectrometry (GC-MS)-based metabolomics datasets
期刊论文
JOURNAL OF CHROMATOGRAPHY A, 2020, 卷号: 1620
作者:
Duan, Lixin
;
Ma, Aimin
;
Meng, Xianbin
;
Shen, Guo-an
;
Qi, Xiaoquan
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2022/03/01
QPMASS
GC-MS
Metabolomics
Data analysis
Parallel computing
Design of polarization imaging optical system with divided aperture
会议论文
Chengdu, China, 2018-06-26
作者:
Ren, Zhi-Guang
;
Li, Xu-Yang
;
Ni, Dong-Wei
;
Yang, Ming-Yang
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2019/03/22
An efficient fingerprint identification algorithm based on minutiae and invariant moment
期刊论文
PERSONAL AND UBIQUITOUS COMPUTING, 2018, 卷号: 22, 期号: 1, 页码: 71-80
作者:
Sang, Jing
;
Wang, Hongxia
;
Qian, Qing
;
Wu, Hanzhou
;
Chen, Yi
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2019/12/16
Fingerprint identification
STFT
Minutiae
Invariant moment
Home entertainment
A self-powered 2D barcode recognition system based on sliding mode triboelectric nanogenerator for personal identification
期刊论文
2018, 卷号: 43, 页码: 253-258
作者:
Chen, Jie[1]
;
Pu, Xianjie[1]
;
Guo, Hengyu[1,2]
;
Tang, Qian[1]
;
Feng, Li[1]
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2019/11/28
Palmprint recognition using siamese network
会议论文
作者:
Zhong, Dexing
;
Yang, Yuan
;
Du, Xuefeng
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/11/26
Convolutional neural network
Descriptors
End to end
Equal error rate
Palm-print image
Palmprints
Personal identification system
Two parameter
Multimodal Feature-Level Fusion for Biometrics Identification System on IoMT Platform
期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 21418-21426
作者:
Xin, Yang
;
Kong, Lingshuang
;
Liu, Zhi
;
Wang, Chunhua
;
Zhu, Hongliang
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2019/12/11
Multi-model fusion
fisher vector
liveness detection
personal
identification
IoMT
RFID/NFC device with embedded fingerprint authentication system
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS
作者:
Deelaka Ranasinghe, R.M.N.
;
Yu, G.Z.
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2019/12/30
Application programs
Authentication
Computer crime
Crime
Cryptography
Digital storage
Malware
Personal computing
Radio frequency identification (RFID)
Security of data
Data corruption
Data encryption
Fingerprint authentication
Fingerprint authentication system
Identification cards
Isolated systems
Personal information
Security threats
Near field communication
©版权所有 ©2017 CSpace - Powered by
CSpace