咨询与建议

限定检索结果

文献类型

  • 284 篇 会议
  • 218 篇 期刊文献

馆藏范围

  • 502 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 367 篇 工学
    • 188 篇 计算机科学与技术...
    • 177 篇 信息与通信工程
    • 134 篇 软件工程
    • 71 篇 电子科学与技术(可...
    • 46 篇 仪器科学与技术
    • 41 篇 控制科学与工程
    • 33 篇 机械工程
    • 30 篇 光学工程
    • 24 篇 电气工程
    • 22 篇 动力工程及工程热...
    • 17 篇 网络空间安全
    • 12 篇 生物工程
    • 11 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 8 篇 安全科学与工程
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 土木工程
  • 179 篇 理学
    • 98 篇 物理学
    • 76 篇 数学
    • 20 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 12 篇 系统科学
    • 7 篇 化学
  • 70 篇 管理学
    • 55 篇 管理科学与工程(可...
    • 20 篇 工商管理
    • 18 篇 图书情报与档案管...
  • 16 篇 军事学
    • 15 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 法学
  • 4 篇 农学
  • 4 篇 医学
  • 1 篇 文学

主题

  • 24 篇 wireless communi...
  • 22 篇 wireless sensor ...
  • 21 篇 quantum cryptogr...
  • 17 篇 quantum communic...
  • 12 篇 network coding
  • 11 篇 cognitive radio
  • 10 篇 cloud computing
  • 10 篇 energy efficienc...
  • 9 篇 simulation
  • 9 篇 quality of servi...
  • 9 篇 interference
  • 9 篇 optimization
  • 9 篇 mathematical mod...
  • 8 篇 routing
  • 8 篇 delays
  • 8 篇 feature extracti...
  • 8 篇 correlation
  • 7 篇 servers
  • 7 篇 security
  • 7 篇 quantum optics

机构

  • 62 篇 key lab of broad...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 54 篇 college of compu...
  • 44 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 42 篇 institute of qua...
  • 18 篇 national mobile ...
  • 15 篇 key lab of broad...
  • 15 篇 institute of sig...
  • 15 篇 institute of sig...
  • 13 篇 key lab of broad...
  • 10 篇 nanjing universi...
  • 10 篇 key lab of broad...
  • 9 篇 school of scienc...
  • 9 篇 broadband wirele...
  • 8 篇 education minist...
  • 8 篇 key lab. of broa...
  • 8 篇 key lab. of broa...
  • 8 篇 key lab of broad...

作者

  • 29 篇 yang zhen
  • 28 篇 wang ruchuan
  • 21 篇 lei wang
  • 20 篇 qin wang
  • 18 篇 wang qin
  • 16 篇 jianxin chen
  • 15 篇 dong hu
  • 15 篇 baoyu zheng
  • 14 篇 yang geng
  • 14 篇 lan zhou
  • 13 篇 yu-bo sheng
  • 13 篇 jingwu cui
  • 12 篇 kun wang
  • 12 篇 ruchuan wang
  • 12 篇 zhixin sun
  • 11 篇 chun-hui zhang
  • 10 篇 wang lei
  • 10 篇 zhang dengyin
  • 10 篇 sun lijuan
  • 10 篇 xiao fu

语言

  • 477 篇 英文
  • 19 篇 中文
  • 6 篇 其他
检索条件"机构=Key Lab of Broadband Vireless Communication and Sensor Network Technology"
502 条 记 录,以下是141-150 订阅
排序:
Measurement-based entanglement purification for entangled coherent states
收藏 引用
Frontiers of physics 2022年 第2期17卷 71-81页
作者: Pei-Shun Yan Lan Zhou Wei Zhong Yu-Bo Sheng Institute of Quantum Information and Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China School of Science Nanjing University of Posts and TelecommunicationsNanjing 210003China Institute of Signal Processing Transmission Nanjing University of Posts and TelecommunicationsNanjing 210003China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing 210003China
The entangled coherent states(ECSs)have been widely used to realize quantum information processing ***,the ECSs may suffer from photon loss and decoherence due to the inherent noise in quantum channel,which may degrad... 详细信息
来源: 评论
An all dynamic MAC protocol for Wireless Body Area network
An all dynamic MAC protocol for Wireless Body Area Network
收藏 引用
11th International Conference on Wireless communications, networking and Mobile Computing (WiCOM 2015)
作者: Jun Wang Yutian Xie Qiong Yi Key Lab of Broadband Wireless Communication and Sensor Network Technology NJUPT Nanjing Jiangsu China
Wireless Body Area network (WBAN) is considered as a special type of WSN. It consists of low-power wireless sensor nodes, which are placed on or implanted in the body for continuous health monitoring. MAC protocol is ... 详细信息
来源: 评论
Improved Quantum Genetic Algorithm for Competitive Spectrum Sharing in Cognitive Radios
Improved Quantum Genetic Algorithm for Competitive Spectrum ...
收藏 引用
International Conference in Electrics, communication and Automatic Control, ECAC 2011
作者: Li, Fei Zhu, Dongpo Tian, Feng Li, Haibo Institute of Signal Processing and Transmission Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing China Department of Applied Physics and Electronics Umeå University Umeå Sweden
This chapter investigates a kind of whole new approach to spectrum sharing in cognitive radio (CR) system, quantum-inspired approach. First, we improved Quantum Genetic Algorithm (QGA) by adding quantum crossover oper... 详细信息
来源: 评论
Performance analysis of data aggregation algorithms in wireless sensor networks
Performance analysis of data aggregation algorithms in wirel...
收藏 引用
2nd Annual Conference on Electrical and Control Engineering, ICECE 2011
作者: Xu, Jian Yang, Geng Chen, Zheng-Yu Chen, Lei Yang, Zhen College of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 Jiangsu China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing 210003 Jiangsu China
Resource-constrained is a critical issue in Wireless sensor networks (WSN) applications. Data aggregation (or data fusion) is one of the key techniques to solve the problem. Data aggregation can effectively reduce the... 详细信息
来源: 评论
Social Awareness-Based Collaboration Interferes with Physical Layer Secure communication  13
Social Awareness-Based Collaboration Interferes with Physica...
收藏 引用
13th International Conference on Wireless communications and Signal Processing, WCSP 2021
作者: Zhang, Teng Wei, Cun Wang, Jun Wang, Lei Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing210003 China Nanjing University of Posts and Telecommunications School of Geographic and Biologic Information Nanjing210003 China
This paper proposes a social-aware cooperative interference strategy for physical layer security, which not only considers the physical characteristics of the devices, but also considers the social relationship among ... 详细信息
来源: 评论
Passive decoy-state quantum key distribution with the SARG04 protocol
Passive decoy-state quantum key distribution with the SARG04...
收藏 引用
作者: Liu, Kang Wei, Jie Zhang, Chun-Mei Wang, Qin Institute of Signal Processing Transmission Nanjing University of Posts and Telecommunications Nanjing210003 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing210003 China
We present a new scheme for realizing passive decoy-state quantum key distribution with the SARG04 protocol. It is based on parametric down-conversion sources, and we do not need to modulate the pumping light into dif... 详细信息
来源: 评论
Co-whitening of i-vectors for short and long duration speaker verification  19
Co-whitening of i-vectors for short and long duration speake...
收藏 引用
19th Annual Conference of the International Speech communication, INTERSPEECH 2018
作者: Xu, Longting Lee, Kong Aik Li, Haizhou Yang, Zhen Department of Electrical and Computer Engineering National University of Singapore Singapore Data Science Research Laboratories NEC Corporation Japan Broadband Wireless Communication and Sensor Network Technology Key Lab Nanjing University of Posts and Telecommunications China
An i-vector is a fixed-length and low-rank representation of a speech utterance. It has been used extensively in text-independent speaker verification. Ideally, speech utterances from the same speaker would map to an ... 详细信息
来源: 评论
Information encryption based on virtual optical imaging system and Chen's chaos
Information encryption based on virtual optical imaging syst...
收藏 引用
2012 International Conference on Web Information Systems and Mining, WISM 2012
作者: Zhu, Wei Yang, Geng Xu, Jian Yang, Xiao-Ling College of Science Nanjing University of Posts and Telecommunications Nanjing 210003 Jiangsu China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing 210003 Jiangsu China
A new scheme of information encryption is presented in this paper, which employs Chen's chaos to construct the random mask of the virtual optical imaging system instead of randomly generated by computer. The gener... 详细信息
来源: 评论
An improved static B+ tree index adaptive to cloud environment for analytic application  5th
An improved static B+ tree index adaptive to cloud environme...
收藏 引用
5th International Conference on Environmental Science and Information Application technology, ESIAT 2014
作者: Wan, Mingxiang Ren, Chunshao Zhang, Dengyin Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunication Ministry of Education Nanjing China Sci-tech Park of Internet of Things Nanjing University of Posts and Telecommunication Nanjing210003 China
B+ Tree is a special balanced multiway tree with flexible structure and node pages linking to each other. It supports not only rapid random query, but also range query. But B+ Tree index cannot be directly migrated si... 详细信息
来源: 评论
A noval data collection approach for Wirelsee sensor networks
A noval data collection approach for Wirelsee Sensor Network...
收藏 引用
2nd Annual Conference on Electrical and Control Engineering, ICECE 2011
作者: Wang, Haiyong Yang, Geng Xu, Jian Chen, Zhengyu Chen, Lei Yang, Zhen College of Internet of Things Nanjing University of Posts and Telecommunications Nanjing 210003 Jiangsu China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Post and Telecommunications Nanjing 210003 China
The unmanned nature of wireless sensor networks make them very vulnerable to the malicious attacks. Therefore, how to complete secure data collection under different conditions is the crucial issue to wireless sensor ... 详细信息
来源: 评论