咨询与建议

限定检索结果

文献类型

  • 698 篇 会议
  • 437 篇 期刊文献

馆藏范围

  • 1,135 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 689 篇 工学
    • 480 篇 计算机科学与技术...
    • 369 篇 软件工程
    • 198 篇 信息与通信工程
    • 113 篇 电气工程
    • 105 篇 电子科学与技术(可...
    • 84 篇 控制科学与工程
    • 62 篇 机械工程
    • 46 篇 仪器科学与技术
    • 42 篇 生物工程
    • 35 篇 网络空间安全
    • 27 篇 光学工程
    • 25 篇 动力工程及工程热...
    • 22 篇 生物医学工程(可授...
    • 19 篇 化学工程与技术
    • 19 篇 安全科学与工程
    • 17 篇 交通运输工程
  • 274 篇 理学
    • 156 篇 数学
    • 61 篇 物理学
    • 48 篇 生物学
    • 46 篇 统计学(可授理学、...
    • 25 篇 系统科学
    • 23 篇 化学
  • 178 篇 管理学
    • 122 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 38 篇 法学
    • 19 篇 法学
    • 19 篇 社会学
  • 30 篇 医学
    • 27 篇 临床医学
    • 20 篇 基础医学(可授医学...
    • 15 篇 公共卫生与预防医...
  • 14 篇 经济学
  • 13 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 80 篇 feature extracti...
  • 58 篇 accuracy
  • 51 篇 semantics
  • 45 篇 computational mo...
  • 41 篇 training
  • 39 篇 data models
  • 37 篇 wireless sensor ...
  • 33 篇 federated learni...
  • 28 篇 deep learning
  • 27 篇 data mining
  • 26 篇 transformers
  • 26 篇 neural networks
  • 25 篇 robustness
  • 21 篇 image segmentati...
  • 21 篇 predictive model...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 17 篇 object detection
  • 17 篇 measurement

机构

  • 203 篇 shandong provinc...
  • 196 篇 key laboratory o...
  • 59 篇 college of compu...
  • 58 篇 jiangsu high tec...
  • 45 篇 shandong enginee...
  • 37 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 21 篇 school of comput...
  • 21 篇 provincial key l...
  • 20 篇 shandong provinc...
  • 20 篇 shandong provinc...
  • 19 篇 jiangsu provinci...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 college of infor...
  • 17 篇 jiangsu provinci...
  • 17 篇 jiangsu engineer...
  • 15 篇 shandong provinc...
  • 15 篇 state key labora...

作者

  • 33 篇 wang ruchuan
  • 19 篇 xiaoming wu
  • 17 篇 yu fei
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 13 篇 xiao fu
  • 13 篇 chen yang
  • 12 篇 wang jin
  • 11 篇 sun lijuan
  • 11 篇 jing zhao
  • 11 篇 ruchuan wang
  • 11 篇 mingle zhou
  • 11 篇 wenpeng lu
  • 10 篇 huang haiping
  • 10 篇 xin wang
  • 10 篇 wei zhang
  • 10 篇 wang ru-chuan
  • 9 篇 yue guangxue
  • 9 篇 guixin zhao
  • 9 篇 jinbo xiong

语言

  • 1,049 篇 英文
  • 47 篇 中文
  • 44 篇 其他
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Network Technology"
1135 条 记 录,以下是111-120 订阅
排序:
Design and optimization of a 0.5 V CMOS LNA for 2.4-GHz WSN application
收藏 引用
Journal of Semiconductors 2012年 第10期33卷 109-115页
作者: 陈亮 李智群 Institute of RF-&OE-ICs Southeast University Engineering Research Center of RF-ICs&RF-Systems Ministry of EducationSoutheast University Jiangsu Provincial Key Laboratory of Sensor Network Technology
This paper presents a low noise amplifier(LNA),which could work at an ultra-low voltage of 0.5 V and was optimized for WSN application using 0.13μm RF-CMOS *** circuit was analyzed and a new optimization method for... 详细信息
来源: 评论
Design of low power common-gate low noise amplifier for 2.4 GHz wireless sensor network applications
收藏 引用
Journal of Semiconductors 2012年 第10期33卷 85-91页
作者: 张萌 李智群 Institute of RF-&OE-ICs Southeast University Engineering Research Center of RF-ICs&RF-Systems Ministry of EducationSoutheast University Jiangsu Provincial Key Laboratory of Sensor Network Technology
This paper presents a differential low power low noise amplifier designed for the wireless sensor network (WSN) in a TSMC 0.18μm RF CMOS process.A two-stage cross-coupling cascaded common-gate(CG) topology has be... 详细信息
来源: 评论
Achieve Personalized Anonymity Through Query Blocks Exchanging
收藏 引用
China Communications 2016年 第11期13卷 106-118页
作者: Chunguang Ma Lei Zhang Songtao Yang Xiaodong Zheng Pinhui Ke College of Computer Science and Technology Harbin Engineering University Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University College of Information and Electronic Technology Jiamusi University College of Applied Technology Qiqihar University
In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become ... 详细信息
来源: 评论
A survey of botnet size measurement
A survey of botnet size measurement
收藏 引用
2nd International Conference on networking and Distributed Computing, ICNDC 2011
作者: Liu, Shangdong Gong, Jian Yang, Wang Jakalan, Ahmad Key Laboratory of Computer Network Technology of Jiangsu Province Southeast University Nanjing China
Botnet size is one of the most important characteristics to evaluate the threat of botnet. Previous studies of botnet size basically focus on details and concreteness instead of nature of problem due to polymorphic, v... 详细信息
来源: 评论
Residential HVAC Aggregation Based on Risk-averse Multi-armed Bandit Learning for Secondary Frequency Regulation
收藏 引用
Journal of Modern Power Systems and Clean Energy 2020年 第6期8卷 1160-1167页
作者: Xinyi Chen Qinran Hu Qingxin Shi Xiangjun Quan Zaijun Wu Fangxing Li the School of Electrical Engineering Southeast UniversityNanjingChina Jiangsu Provincial Key Laboratory of Smart Grid Technology and Equipment NanjingChina the School of Electrical Engineering and Computer Science University of TennesseeKnoxvilleUSA
As the penetration of renewable energy continues to increase,stochastic and intermittent generation resources gradually replace the conventional generators,bringing significant challenges in stabilizing power system *... 详细信息
来源: 评论
BCE-PPDS: Blockchain-based cloud–edge collaborative privacy-preserving data sharing scheme for IoT
收藏 引用
Future Generation computer Systems 2026年 174卷
作者: Guijuan Wang Qi Liu Zhongyuan Yu Hongliang Zhang Anming Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong 250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan Shandong 250353 China China University of Petroleum Qingdao Shandong 266000 China
Internet of Things (IoT) devices generate large amounts of data every day that can be combined with intelligent platforms for predictive analytics and scientific research. However, concerns about privacy and security ...
来源: 评论
Low power consumption reduced state and transition MLSE in optical interconnects
收藏 引用
Science China(Information Sciences) 2023年 第10期66卷 325-326页
作者: Weihao NI Fan LI Wei WANG Zhibin LUO Xingwen YI Yi CAI Zhaohui LI School of Electronics and Information Technology Guangdong Provincial Key Laboratory of Optoelectronic Information Processing Chips and Systems Sun Yat-sen University Southern Marine Science and Engineering Guangdong Laboratory(Zhuhai) Jiangsu Engineering Research Center of Novel Optical Fiber Technology and Communication Network Suzhou Key Laboratory of Advanced Optical Communication Network Technology Soochow University
Intensity modulation/direct detection(IM/DD) optical fiber communication system is an appropriate candidate for optical interconnect applications due to its low cost and low power consumption characteristics [1]. 4-le... 详细信息
来源: 评论
Mobile Anchor Assisted Localization in Wireless Sensor networks with Regular Polygon Path
Mobile Anchor Assisted Localization in Wireless Sensor Netwo...
收藏 引用
2013 IEEE 4th International Conference on Software Engineering and Service Science
作者: Huanqing Cui Chuan'ai Zhou Xiaojing Meng Rong Hua Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center College of Information Science and Engineering Shandong University of Science and Technology
Mobile anchor assisted localization methods for wireless sensor networks can decrease the cost while improving the accuracy,and the moving trajectory is an interesting and basic issue in this kind of *** paper propose... 详细信息
来源: 评论
Nonequilibrium transport and the fluctuation theorem in the thermodynamic behaviors of nonlinear photonic systems
收藏 引用
Physical Review Research 2025年 第1期7卷 013084-013084页
作者: Yang Liu Jincheng Lu Zhongfei Xiong Fan O. Wu Demetrios Christodoulides Yuntian Chen Jian-Hua Jiang School of Physical Science and Technology & Collaborative Innovation Center of Suzhou Nano Science and Technology Soochow University 1 Shizi Street Suzhou 215006 China Key Laboratory of Efficient Low-carbon Energy Conversion and Utilization of Jiangsu Provincial Higher Education Institutions School of Physical Science and Technology Suzhou University of Science and Technology Suzhou 215009 China School of Optical and Electronic Information Huazhong University of Science and Technology Wuhan 430074 China CREOL College of Optics and Photonics University of Central Florida Orlando Florida 32816-2700 USA Ming Hsieh Department of Electrical and Computer Engineering University of Southern California Los Angeles California 90089 USA School of Biomedical Engineering Division of Life Sciences and Medicine University of Science and Technology of China Hefei 230026 China Suzhou Institute for Advanced Research University of Science and Technology of China Suzhou 215123 China School of Physical Sciences University of Science and Technology of China Hefei 230026 China
Nonlinear multimode optical systems have attracted substantial attention due to their rich physical properties. Complex interplay between the nonlinear effects and mode couplings makes it difficult to understand the c... 详细信息
来源: 评论
Study of dynamic timeout strategy based on flow rate metrics in high-speed networks  06
Study of dynamic timeout strategy based on flow rate metrics...
收藏 引用
1st International Conference on Scalable Information Systems, InfoScale '06
作者: Zhou, Ming-Zhong Gong, Jian Ding, Wei Southeast Univ. and Jiangsu Province Key Laboratory of Computer Networking Technology and Jiangsu Province Key Laboratory of Network and Information Security Nanjing Jiangsu China
The measurements based on flow characteristics are playing more and more important roles in the analysis of network Behavior. As one of main methods for flow recognition, the timeout strategies have a significant impa... 详细信息
来源: 评论