咨询与建议

限定检索结果

文献类型

  • 412 篇 会议
  • 387 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 800 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 568 篇 工学
    • 281 篇 计算机科学与技术...
    • 263 篇 信息与通信工程
    • 201 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 69 篇 仪器科学与技术
    • 67 篇 控制科学与工程
    • 58 篇 机械工程
    • 46 篇 电气工程
    • 43 篇 光学工程
    • 37 篇 动力工程及工程热...
    • 36 篇 网络空间安全
    • 22 篇 生物工程
    • 14 篇 力学(可授工学、理...
    • 13 篇 航空宇航科学与技...
    • 12 篇 化学工程与技术
    • 12 篇 安全科学与工程
    • 8 篇 材料科学与工程(可...
    • 8 篇 土木工程
  • 298 篇 理学
    • 163 篇 物理学
    • 117 篇 数学
    • 31 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 23 篇 生物学
    • 12 篇 化学
  • 105 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 31 篇 工商管理
    • 28 篇 图书情报与档案管...
  • 29 篇 军事学
    • 28 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 法学
  • 5 篇 医学
  • 4 篇 农学
  • 1 篇 文学

主题

  • 41 篇 wireless communi...
  • 31 篇 wireless sensor ...
  • 31 篇 quantum cryptogr...
  • 28 篇 quantum communic...
  • 19 篇 simulation
  • 18 篇 cognitive radio
  • 17 篇 interference
  • 16 篇 quality of servi...
  • 16 篇 optimization
  • 15 篇 delays
  • 13 篇 network coding
  • 13 篇 energy efficienc...
  • 12 篇 routing
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 deep learning
  • 11 篇 resource managem...
  • 11 篇 servers
  • 11 篇 security
  • 11 篇 correlation

机构

  • 63 篇 institute of qua...
  • 62 篇 college of compu...
  • 62 篇 key lab of broad...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 49 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 39 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 31 篇 institute of sig...
  • 29 篇 national mobile ...
  • 28 篇 institute of sig...
  • 18 篇 key laboratory o...
  • 16 篇 key lab of broad...
  • 16 篇 key laboratory o...
  • 14 篇 national laborat...
  • 13 篇 nanjing universi...
  • 13 篇 key lab of broad...
  • 13 篇 school of scienc...
  • 13 篇 college of mathe...

作者

  • 39 篇 qin wang
  • 35 篇 yang zhen
  • 32 篇 wang ruchuan
  • 28 篇 lei wang
  • 21 篇 yu-bo sheng
  • 21 篇 wang qin
  • 21 篇 lan zhou
  • 21 篇 mingkai chen
  • 20 篇 jianxin chen
  • 20 篇 yang geng
  • 19 篇 周澜
  • 18 篇 chun-hui zhang
  • 17 篇 wang lei
  • 17 篇 zhen yang
  • 17 篇 赵生妹
  • 17 篇 盛宇波
  • 17 篇 sun zhixin
  • 17 篇 baoyu zheng
  • 17 篇 zhixin sun
  • 16 篇 jingwu cui

语言

  • 755 篇 英文
  • 35 篇 中文
  • 10 篇 其他
检索条件"机构=Broadband Wireless Communication and Sensor Network Technology Key Lab"
800 条 记 录,以下是621-630 订阅
排序:
Blind quantum computation with a noise channel
收藏 引用
Physical Review A 2018年 第5期98卷 052343-052343页
作者: Yu-Bo Sheng Lan Zhou Institute of Quantum Information and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing 210003 China School of Science Nanjing University of Posts and Telecommunications Nanjing 210003 China
Blind quantum computation (BQC) is a type of quantum computation model. For a client (Alice) who does not have enough sophisticated technology and knowledge to perform universal quantum computation, BQC allows her to ... 详细信息
来源: 评论
An -norm Based Method for Off-grid DOA Estimation
收藏 引用
Circuits, Systems, and Signal Processing 2018年 第2期38卷 904-917页
作者: Zhang, Zeyun Wu, Xiaohuan Li, Chunguo Zhu, Wei-Ping The Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Nanjing People’s Republic of China School of Information Science and Engineering Southeast University Nanjing People’s Republic of China Department of Electrical and Computer Engineering Concordia University Montreal Canada
The sparse signal recovery-based direction of arrival (DOA) estimation has received a great deal of attention over the past decade. From the sparse representation point of view, $$\ell _0$$ -norm is the best choice to...
来源: 评论
A noval data collection approach for Wirelsee sensor networks
A noval data collection approach for Wirelsee Sensor Network...
收藏 引用
International Conference on Electrical and Control Engineering (ICECE)
作者: Haiyong Wang Geng Yang Jian Xu Zhengyu Chen Lei Chen Zhen Yang College of Internet of Things Nanjing University of Posts and Telecommunications Nanjing Jiangsu China Key Laboratory of Broadband Wireless Communication & Sensor Network Technology of Ministry of Education Nanjing University of Posts and Telecommunications Nanjing China
The unmanned nature of wireless sensor networks make them very vulnerable to the malicious attacks. Therefore, how to complete secure data collection under different conditions is the crucial issue to wireless sensor ... 详细信息
来源: 评论
Study on Object Transaction Based on networked RFID Systems
Study on Object Transaction Based on Networked RFID Systems
收藏 引用
2014 IEEE 5th International Conference on Software Engineering and Service Science
作者: Xuan Shen Chenqi Bao Jianmin Bao Huan Wang Department of Computer and Software Nanjing University of Posts and Telecommunications Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of EducationCollege of IOT Nanjing University of Posts and Telecommunications Department of IOT Nanjing University of Posts and Telecommunications
Radio Frequency IDentification(RFID) is a novel technology of automated *** use of RFID,however,raises great concerns due to the serious security *** this paper,we at first propose a Secure Transaction Frame(STF) and ... 详细信息
来源: 评论
Normal Inverse Gaussian Approximation to Downlink Inter-cell Interference
Normal Inverse Gaussian Approximation to Downlink Inter-cell...
收藏 引用
IEEE International Conference on communications
作者: Xiaojun Yan Jing Xu Yuanping Zhu Yang Yang Guoping Tan Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology (SIMIT) Chinese Academy of Sciences (CAS) Telecommunications Lab Saarland University
In orthogonal frequency division multiple access (OFDMA)-based cellular networks subject to the distance-dependent path loss and shadow fading (SF), the downlink inter-cell interference (ICI) for a given user equipmen... 详细信息
来源: 评论
Channel measurement and modeling for the 15-GHz radio band in an indoor corridor environment
收藏 引用
Journal of communications and Information networks 2016年 第2期1卷 102-108页
作者: XU Hui ZHANG Wuxiong YANG Yang Key Lab of Wireless Sensor Network and Communication Chinese Academy of SciencesShanghai 200050China Shanghai Institute of Microsystem and Information Technology Chinese Academy of SciencesShanghai 200050China Shanghai Research Center for Wireless Communications Shanghai 201210China
Traditional mobile communication systems mainly work on the licensed frequency band near or below 3 GHz;however,this band is becoming increasingly *** the other hand,there are abundant unlicensed spectrum resources in... 详细信息
来源: 评论
Deep reinforcement learning for smart home energy management
arXiv
收藏 引用
arXiv 2019年
作者: Yu, Liang Xie, Weiwei Xie, Di Zou, Yulong Zhang, Dengying Sun, Zhixin Zhang, Linghua Jiang, Tao Key Laboratory of Broadband Wireless Communication Sensor Network Technology of Ministry of Education Nanjing University of Posts and Telecommunications Nanjing210003 Jiangsu Key Laboratory of Broadband Wireless Communication and Internet of Things School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210003 Wuhan National Laboratory for Optoelectronics School of Electronics Information and Communications Huazhong University of Science and Technology Wuhan430074
In this paper, we investigate an energy cost minimization problem for a smart home in the absence of a building thermal dynamics model with the consideration of a comfortable temperature range. Due to the existence of... 详细信息
来源: 评论
A high-resolution DOA estimation method with a family of nonconvex penalties
arXiv
收藏 引用
arXiv 2017年
作者: Wu, Xiaohuan Zhu, Wei-Ping Yan, Jun Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Nanjing210003 China Department of Electrical and Computer Engineering Concordia University Montreal Canada School of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing China
The low-rank matrix reconstruction (LRMR) approach is widely used in direction-of-arrival (DOA) estimation. As the rank norm penalty in an LRMR is NP-hard to compute, the nuclear norm (or the trace norm for a positive... 详细信息
来源: 评论
A real-time video watermarking algorithm for streaming media
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第14期6卷 504-511页
作者: Cheng, Chunling Wan, Teng Wei, Lei Zhu, Hong Zhang, Dengyin College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China Power Dispatching Centre Nanjing Power Supply Company Nanjing 210008 China
Video watermarking technology is a useful method to track piracy for digital videos. However, most watermarking algorithms cannot be directly applied to H.264 streaming media because of their poor real-time performanc... 详细信息
来源: 评论
The hybrid encryption algorithm of lightweight data in cloud storage
The hybrid encryption algorithm of lightweight data in cloud...
收藏 引用
International Symposium on Agents, Multi-Agent Systems and Robotics (ISAMSR)
作者: Chengliang Liang Ning Ye Reza Malekian Ruchuan Wang College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Department of Electrical Electronic and Computer Engineering University of Pretoria Pretoria South Africa Key Lab of Broadband Wireless Communication and Sensor Network Nanjing University of Post and Telecommunications Nanjing China
In this paper, we proposed a hybrid encryption algorithm in order to solve the security problems on lightweight data on the cloud storage service. This paper first improves the RSA algorithm in the cloud environment b... 详细信息
来源: 评论