咨询与建议

限定检索结果

文献类型

  • 412 篇 会议
  • 388 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 801 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 570 篇 工学
    • 281 篇 计算机科学与技术...
    • 263 篇 信息与通信工程
    • 201 篇 软件工程
    • 124 篇 电子科学与技术(可...
    • 68 篇 仪器科学与技术
    • 67 篇 控制科学与工程
    • 58 篇 机械工程
    • 46 篇 电气工程
    • 44 篇 光学工程
    • 37 篇 动力工程及工程热...
    • 36 篇 网络空间安全
    • 22 篇 生物工程
    • 14 篇 力学(可授工学、理...
    • 13 篇 航空宇航科学与技...
    • 12 篇 安全科学与工程
    • 11 篇 化学工程与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 土木工程
  • 298 篇 理学
    • 164 篇 物理学
    • 117 篇 数学
    • 31 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 23 篇 生物学
    • 11 篇 化学
  • 105 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 31 篇 工商管理
    • 28 篇 图书情报与档案管...
  • 29 篇 军事学
    • 28 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 法学
  • 5 篇 医学
  • 4 篇 农学
  • 1 篇 文学

主题

  • 41 篇 wireless communi...
  • 32 篇 quantum cryptogr...
  • 31 篇 wireless sensor ...
  • 28 篇 quantum communic...
  • 19 篇 simulation
  • 18 篇 cognitive radio
  • 17 篇 interference
  • 16 篇 quality of servi...
  • 16 篇 optimization
  • 15 篇 delays
  • 13 篇 network coding
  • 13 篇 energy efficienc...
  • 12 篇 routing
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 resource managem...
  • 11 篇 servers
  • 11 篇 security
  • 11 篇 correlation
  • 11 篇 cloud computing

机构

  • 63 篇 institute of qua...
  • 62 篇 college of compu...
  • 62 篇 key lab of broad...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 49 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 39 篇 key laboratory o...
  • 33 篇 institute of sig...
  • 31 篇 key laboratory o...
  • 29 篇 national mobile ...
  • 28 篇 institute of sig...
  • 18 篇 key laboratory o...
  • 16 篇 key laboratory o...
  • 16 篇 national laborat...
  • 15 篇 key lab of broad...
  • 15 篇 key laboratory o...
  • 13 篇 nanjing universi...
  • 13 篇 key lab of broad...
  • 13 篇 school of scienc...

作者

  • 36 篇 qin wang
  • 35 篇 yang zhen
  • 32 篇 wang ruchuan
  • 28 篇 lei wang
  • 21 篇 yu-bo sheng
  • 21 篇 wang qin
  • 21 篇 lan zhou
  • 21 篇 mingkai chen
  • 20 篇 jianxin chen
  • 20 篇 yang geng
  • 17 篇 wang lei
  • 17 篇 zhen yang
  • 17 篇 sun zhixin
  • 17 篇 baoyu zheng
  • 17 篇 zhixin sun
  • 16 篇 jingwu cui
  • 16 篇 chun-hui zhang
  • 15 篇 dong hu
  • 14 篇 kun wang
  • 14 篇 chen mingkai

语言

  • 755 篇 英文
  • 35 篇 中文
  • 11 篇 其他
检索条件"机构=Broadband Wireless Communication and Sensor Network Technology Key Lab"
801 条 记 录,以下是471-480 订阅
排序:
Invisible cloak fails: CSI-based passive human detection  1
Invisible cloak fails: CSI-based passive human detection
收藏 引用
1st ACM Workshop on Context Sensing and Activity Recognition, CSAR 2015
作者: Xiao, Fu Xie, Xiaohui Zhu, Hai Sun, Lijuan Wang, Ruchuan School of Computer Nanjing University of Posts and Telecommunications China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks China Key Lab of Broadband Wireless Communication and Sensor Network Technology China
WiFi signals have attracted extensive attention for context-aware due to its ubiquity. Traditional WiFi sensing methods mainly adopt Received Signal Strength Indication (RSSI), however the coarse features hamper its e... 详细信息
来源: 评论
A hybrid image registering algorithm of improved Powell algorithm and simulated annealing algorithm  4th
A hybrid image registering algorithm of improved Powell algo...
收藏 引用
4th International Conference on Electronics, communications and networks, CECNet2014
作者: Ji, Yingtian Zhang, Dengyin Tan, Lipin Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education NanjingJiangsu China
With the development of computer technology and Biomedical Engineering, the image registering technology is widely used in healthcare and the disease diagnosis and clinical care demand higher registering precision and... 详细信息
来源: 评论
The hybrid encryption algorithm of lightweight data in cloud storage
The hybrid encryption algorithm of lightweight data in cloud...
收藏 引用
International Symposium on Agents, Multi-Agent Systems and Robotics (ISAMSR)
作者: Chengliang Liang Ning Ye Reza Malekian Ruchuan Wang College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Department of Electrical Electronic and Computer Engineering University of Pretoria Pretoria South Africa Key Lab of Broadband Wireless Communication and Sensor Network Nanjing University of Post and Telecommunications Nanjing China
In this paper, we proposed a hybrid encryption algorithm in order to solve the security problems on lightweight data on the cloud storage service. This paper first improves the RSA algorithm in the cloud environment b... 详细信息
来源: 评论
A novel Terahertz Integrated Horn Antenna on Silicon Substrate
A novel Terahertz Integrated Horn Antenna on Silicon Substra...
收藏 引用
2016 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics(AMEII 2016)
作者: Lin Guo Haixia Tang Lian Ji Yongpeng Wu Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Ministry of EducationCollege of Internet of ThingsNanjing University of Posts and Telecommunications College of Energy Nanjing University of Technology College of Communication and Information Engineering Institute for Digital CommunicationsUniversitüt Erlangen-Nürnberg
This paper reports the design and analysis of a novel pyramidal horn antenna based on Micro Electro Mechanical Systems(MEMS) technology,which is used in terahertz(THz) *** structure of the antenna includes two parts,p... 详细信息
来源: 评论
Convergence analysis and application of the central force optimization algorithm
收藏 引用
Science China(Information Sciences) 2015年 第5期58卷 208-210页
作者: MENG Chao GONG Jing LIU SanMin SUN ZhiXin Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and TelecommunicationsMinistry of Education College of Mathematics & Physics Nanjing University of Posts and Telecommunications College of Computer and Information Anhui Polytechnic University
Dear editor,The Central Force Optimization(CFO)[1]is a new heuristic *** contrast with the stochastic algorithms such as Particle Swarm Optimization(PSO)[2],Ant Colony Optimization[3]and other such algorithms[4–6],CF... 详细信息
来源: 评论
Improvement of middleware-based redundant reader elimination algorithm in RFID systems  4th
Improvement of middleware-based redundant reader elimination...
收藏 引用
4th International Conference on Electronics, communications and networks, CECNet2014
作者: Zhou, Ning Lv, Qunwu Zhou, Jianxin Hubei Key Laboratory of Broadband Wireless Communication and Sensor Network School of Information Engineering Wuhan University of Technology Wu Han China
This article gives a general introduction to some common algorithms of redundant reader elimination in Radio Frequency Identification Devices (RFID) systems, such as Redundant Reader Elimination (RRE), Layered Elimina... 详细信息
来源: 评论
Free-space measurement-device-independent quantum-key-distribution protocol using decoy states with orbital angular momentum
收藏 引用
Chinese Physics B 2015年 第12期24卷 238-245页
作者: 王乐 赵生妹 巩龙延 程维文 Institute of Signal Processing and Transmission Nanjing University of Posts and Telecommunications Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Information Physics Research Center and Department of Applied Physics Nanjing University of Posts and Telecommunications
In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protoc... 详细信息
来源: 评论
Location Similarity Based Replica Node Detection for sensor networks
Location Similarity Based Replica Node Detection for Sensor ...
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: Lijun Yang Chao Ding Meng Wu College of Internet of Things Nanjing University of Posts and Telecommunications Nanjing China College of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Key Lab of “Broadband Wireless Communication and Sensor Network Technology” of Ministry of Education Nanjing University of Posts and Telecommunications Nanjing China
The node replica attack is known to be dangerous to wireless sensor networks (WSNs) because it enables the adversary to extend the damage throughout the network with very low cost. To stop such attack, we propose a si... 详细信息
来源: 评论
Scheme for realizing passive quantum key distribution with heralded single-photon sources
收藏 引用
Physical Review A 2016年 第3期93卷 032312-032312页
作者: Qin Wang Chun-Hui Zhang Xiang-Bin Wang Institute of Signal Processing and Transmission Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing 210003 China Key Laboratory of Quantum Information University of Science and Technology of China Hefei 230026 China Department of Physics and State Key Laboratory of Low Dimensional Quantum Physics Tsinghua University Beijing 100084 China Jinan Institute of Quantum Technology Shandong Academy of Information Technology Jinan China
We present a scheme for realizing passive quantum key distribution with heralded single-photon sources. In this scheme, the idler light from the parametric down-conversion process is split into two parts and sent into... 详细信息
来源: 评论
T-QoS-aware based parallel ant colony algorithm for services composition
收藏 引用
Journal of Systems Science & Complexity 2015年 第5期28卷 1100-1106页
作者: Lin Zhang Kaili Rao Ruchuan Wang College of Computer Nanjing University of Posts and Telecommunications Institute of Computer Technology Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology Nangjing University of Posts and Telecommunications
In order to make cloud users get credible, high-quality composition of services, the trust quality of service aware(TQoS-aware) based parallel ant colony algorithm is proposed. Our approach takes the service credibili... 详细信息
来源: 评论