咨询与建议

限定检索结果

文献类型

  • 284 篇 会议
  • 219 篇 期刊文献

馆藏范围

  • 503 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 368 篇 工学
    • 188 篇 计算机科学与技术...
    • 178 篇 信息与通信工程
    • 134 篇 软件工程
    • 71 篇 电子科学与技术(可...
    • 46 篇 仪器科学与技术
    • 41 篇 控制科学与工程
    • 34 篇 机械工程
    • 30 篇 光学工程
    • 24 篇 电气工程
    • 22 篇 动力工程及工程热...
    • 17 篇 网络空间安全
    • 12 篇 生物工程
    • 11 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 8 篇 安全科学与工程
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 土木工程
  • 179 篇 理学
    • 98 篇 物理学
    • 76 篇 数学
    • 20 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 12 篇 系统科学
    • 7 篇 化学
  • 70 篇 管理学
    • 55 篇 管理科学与工程(可...
    • 20 篇 工商管理
    • 18 篇 图书情报与档案管...
  • 16 篇 军事学
    • 15 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 法学
  • 4 篇 农学
  • 4 篇 医学
  • 1 篇 文学

主题

  • 24 篇 wireless communi...
  • 22 篇 wireless sensor ...
  • 22 篇 quantum cryptogr...
  • 17 篇 quantum communic...
  • 12 篇 network coding
  • 11 篇 cognitive radio
  • 10 篇 cloud computing
  • 10 篇 energy efficienc...
  • 9 篇 simulation
  • 9 篇 quality of servi...
  • 9 篇 optimization
  • 9 篇 mathematical mod...
  • 8 篇 routing
  • 8 篇 delays
  • 8 篇 interference
  • 8 篇 feature extracti...
  • 8 篇 correlation
  • 7 篇 servers
  • 7 篇 security
  • 7 篇 quantum optics

机构

  • 62 篇 key lab of broad...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 54 篇 college of compu...
  • 44 篇 jiangsu high tec...
  • 43 篇 institute of qua...
  • 43 篇 key lab of broad...
  • 18 篇 national mobile ...
  • 15 篇 key lab of broad...
  • 15 篇 institute of sig...
  • 15 篇 institute of sig...
  • 13 篇 key lab of broad...
  • 10 篇 nanjing universi...
  • 10 篇 broadband wirele...
  • 10 篇 key lab of broad...
  • 9 篇 school of scienc...
  • 8 篇 education minist...
  • 8 篇 key lab. of broa...
  • 8 篇 key lab. of broa...
  • 8 篇 key lab of broad...

作者

  • 29 篇 yang zhen
  • 28 篇 wang ruchuan
  • 21 篇 lei wang
  • 20 篇 qin wang
  • 18 篇 wang qin
  • 16 篇 jianxin chen
  • 15 篇 dong hu
  • 15 篇 baoyu zheng
  • 14 篇 yang geng
  • 14 篇 lan zhou
  • 13 篇 yu-bo sheng
  • 13 篇 jingwu cui
  • 12 篇 kun wang
  • 12 篇 ruchuan wang
  • 12 篇 zhixin sun
  • 11 篇 chun-hui zhang
  • 10 篇 wang lei
  • 10 篇 zhang dengyin
  • 10 篇 sun lijuan
  • 10 篇 xiao fu

语言

  • 477 篇 英文
  • 19 篇 中文
  • 7 篇 其他
检索条件"机构=Key Lab of Broadband Vireless Communication and Sensor Network Technology"
503 条 记 录,以下是261-270 订阅
排序:
Compressive Wideband Spectrum Sensing Based on Random Matrix Theory
收藏 引用
Journal of Donghua University(English Edition) 2015年 第2期32卷 248-251页
作者: 曹开田 戴林燕 杭燚灵 张蕾 顾凯冬 Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of EducationNanjing University of Posts and Telecommunications College of Overseas Education Nanjing University of Posts and Telecommunications
Spectrum sensing in a wideband regime for cognitive radio network(CRN) faces considerably technical challenge due to the constraints on analog-to-digital converters(ADCs).To solve this problem,an eigenvalue-based comp... 详细信息
来源: 评论
Online video synopsis method through simple tube projection strategy
Online video synopsis method through simple tube projection ...
收藏 引用
International Conference on Wireless communications and Signal Processing (WCSP)
作者: Jing Jin Feng Liu Zongliang Gan Ziguan Cui Jiangsu Province Key Lab on Image Processing & Image Communications Nanjing University of Posts and Telecommunications Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing China
Traditional video synopsis methods model the processing into an optimization formula where relations among objects such as collision cost are utilized while entire re-calculation is introduced under each possible temp... 详细信息
来源: 评论
A Novel Two-Stage PCA Algorithm for Object Tracking
A Novel Two-Stage PCA Algorithm for Object Tracking
收藏 引用
2016 International Conference on communications, Information Management and network Security (CIMNS2016)
作者: Yuanyuan Yang Dong Hu Education Ministry's Key Lab of Broadband Wireless Communication and Sensor Network Technology Education Ministry's Engineering Research Center of Ubiquitous Network and Heath Service Jiangsu Province's Key Lab of Image Procession and Image Communications Nanjing University of Posts and Telecommunications
In this paper, we propose a two-stage PCA algorithm to deal with the problem of target appearance changes in object tracking. Our method is based on particle filter framework and aims at building up a robust appearanc... 详细信息
来源: 评论
Effective Scheme for Global Abnormal Event Detection for Surveillance Video
Effective Scheme for Global Abnormal Event Detection for Sur...
收藏 引用
2016 International Conference on communications, Information Management and network Security (CIMNS2016)
作者: Fangxu Dong Dong Hu Education Ministry's Key Lab of Broadband Wireless Communication and Sensor Network Technology Education Ministry's Engineering Research Center of Ubiquitous Network and Heath Service Jiangsu Province's Key Lab of Image Processing and Image Communications Nanjing University of Posts and Telecommunications
An effective algorithm for global abnormal detection from surveillance video is proposed in this paper. The algorithm is based on sparse representation. To deal with the illumination change in video scenes, specific f... 详细信息
来源: 评论
A novel saliency detection model based on curvelet transform
A novel saliency detection model based on curvelet transform
收藏 引用
International Conference on Wireless communications and Signal Processing (WCSP)
作者: Peiqing Bai Ziguan Cui Zongliang Gan Guijin Tang Feng Liu Image Processing & Image Communication Lab Nanjing University of Posts & Telecommunications Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts & Telecommunications Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Visually salient object or region detection in images is an active research field in recent years. Inspired by that curvelets can provide multi-scale sparse representation of objects with edges and textures, in this p... 详细信息
来源: 评论
Blind spot coverage strategy based on D2D communications for electric LTE network
Blind spot coverage strategy based on D2D communications for...
收藏 引用
International Conference on Wireless communications and Signal Processing (WCSP)
作者: Jiming Yao Tao Wang Xiao Wu Lei Wang Baoyu Zheng Global Energy Interconnection Research institute Nanjing China National Mobile Communications Research Laboratory Southeast University Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology (NUPT) Nanjing China
With the development of smart of grid, the traditional wireless communication cannot meet the new service requirement. In this paper, we propose a blind spots coverage based on D2D communication scheme to solve the pr... 详细信息
来源: 评论
An improved flooding protocol based on network coding
An improved flooding protocol based on network coding
收藏 引用
International Conference on Information technology and Computer Application Engineering, ITCAE 2014
作者: Zhang, Li Na Zhang, Deng Yin Ji, Ying Tian Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing China
network coding allows network node to process data by the traditional method of data forwarding, which can effectively improve network throughput, robustness and reliability. In this paper, we propose an improved floo... 详细信息
来源: 评论
A hybrid image registering algorithm of improved Powell algorithm and simulated annealing algorithm  4th
A hybrid image registering algorithm of improved Powell algo...
收藏 引用
4th International Conference on Electronics, communications and networks, CECNet2014
作者: Ji, Yingtian Zhang, Dengyin Tan, Lipin Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education NanjingJiangsu China
With the development of computer technology and Biomedical Engineering, the image registering technology is widely used in healthcare and the disease diagnosis and clinical care demand higher registering precision and... 详细信息
来源: 评论
Invisible cloak fails: CSI-based passive human detection  1
Invisible cloak fails: CSI-based passive human detection
收藏 引用
1st ACM Workshop on Context Sensing and Activity Recognition, CSAR 2015
作者: Xiao, Fu Xie, Xiaohui Zhu, Hai Sun, Lijuan Wang, Ruchuan School of Computer Nanjing University of Posts and Telecommunications China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks China Key Lab of Broadband Wireless Communication and Sensor Network Technology China
WiFi signals have attracted extensive attention for context-aware due to its ubiquity. Traditional WiFi sensing methods mainly adopt Received Signal Strength Indication (RSSI), however the coarse features hamper its e... 详细信息
来源: 评论
The hybrid encryption algorithm of lightweight data in cloud storage
The hybrid encryption algorithm of lightweight data in cloud...
收藏 引用
International Symposium on Agents, Multi-Agent Systems and Robotics (ISAMSR)
作者: Chengliang Liang Ning Ye Reza Malekian Ruchuan Wang College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Department of Electrical Electronic and Computer Engineering University of Pretoria Pretoria South Africa Key Lab of Broadband Wireless Communication and Sensor Network Nanjing University of Post and Telecommunications Nanjing China
In this paper, we proposed a hybrid encryption algorithm in order to solve the security problems on lightweight data on the cloud storage service. This paper first improves the RSA algorithm in the cloud environment b... 详细信息
来源: 评论