咨询与建议

限定检索结果

文献类型

  • 285 篇 会议
  • 234 篇 期刊文献

馆藏范围

  • 519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 382 篇 工学
    • 195 篇 计算机科学与技术...
    • 185 篇 信息与通信工程
    • 139 篇 软件工程
    • 77 篇 电子科学与技术(可...
    • 48 篇 仪器科学与技术
    • 41 篇 控制科学与工程
    • 37 篇 机械工程
    • 30 篇 光学工程
    • 25 篇 电气工程
    • 23 篇 动力工程及工程热...
    • 16 篇 网络空间安全
    • 13 篇 生物工程
    • 12 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 8 篇 安全科学与工程
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 6 篇 生物医学工程(可授...
  • 185 篇 理学
    • 103 篇 物理学
    • 78 篇 数学
    • 20 篇 统计学(可授理学、...
    • 14 篇 生物学
    • 12 篇 系统科学
    • 7 篇 化学
  • 72 篇 管理学
    • 56 篇 管理科学与工程(可...
    • 21 篇 工商管理
    • 19 篇 图书情报与档案管...
  • 15 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 法学
  • 4 篇 农学
  • 4 篇 医学
  • 1 篇 文学

主题

  • 27 篇 quantum cryptogr...
  • 24 篇 wireless communi...
  • 22 篇 wireless sensor ...
  • 16 篇 quantum communic...
  • 12 篇 cognitive radio
  • 12 篇 network coding
  • 10 篇 quality of servi...
  • 10 篇 cloud computing
  • 10 篇 energy efficienc...
  • 9 篇 simulation
  • 9 篇 delays
  • 9 篇 optimization
  • 9 篇 mathematical mod...
  • 8 篇 routing
  • 8 篇 interference
  • 8 篇 feature extracti...
  • 8 篇 correlation
  • 7 篇 servers
  • 7 篇 security
  • 7 篇 quantum optics

机构

  • 62 篇 key lab of broad...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 54 篇 college of compu...
  • 44 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 42 篇 institute of qua...
  • 18 篇 national mobile ...
  • 16 篇 institute of sig...
  • 15 篇 key lab of broad...
  • 15 篇 institute of sig...
  • 13 篇 key lab of broad...
  • 10 篇 nanjing universi...
  • 10 篇 broadband wirele...
  • 10 篇 key lab of broad...
  • 10 篇 national laborat...
  • 9 篇 school of scienc...
  • 8 篇 education minist...
  • 8 篇 key lab. of broa...
  • 8 篇 key lab. of broa...

作者

  • 29 篇 wang ruchuan
  • 29 篇 yang zhen
  • 21 篇 lei wang
  • 21 篇 qin wang
  • 18 篇 wang qin
  • 16 篇 jianxin chen
  • 15 篇 dong hu
  • 15 篇 baoyu zheng
  • 14 篇 yang geng
  • 13 篇 jingwu cui
  • 13 篇 lan zhou
  • 12 篇 kun wang
  • 12 篇 zhao shengmei
  • 12 篇 ruchuan wang
  • 12 篇 yu-bo sheng
  • 12 篇 zhixin sun
  • 11 篇 xiao fu
  • 11 篇 chun-hui zhang
  • 10 篇 wang lei
  • 10 篇 zhang dengyin

语言

  • 492 篇 英文
  • 20 篇 中文
  • 7 篇 其他
检索条件"机构=Key Lab of Broadband Wireless Communication and Sensor Network Tech"
519 条 记 录,以下是231-240 订阅
排序:
Reconfigurable vortex beam generator based on the Fourier transformation principle
arXiv
收藏 引用
arXiv 2018年
作者: Liu, Aiping Zou, Chang-Lin Ren, Xifeng He, Wen Wu, Mengze Guo, Guangcan Wang, Qin Affiliation: Institute of Quantum Information and Technology Nanjing University of Posts and Telecommunications Nanjing210003 Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing210003 Synergetic Innovation Center of Quantum Information and Quantum Physics University of Science and Technology of China Hefei230026 China
A method to generate the optical vortex beam with arbitrary superposition of different orders of orbital angular momentum (OAM) on a photonic chip is proposed. The distributed Fourier holographic gratings are proposed... 详细信息
来源: 评论
An improved apriori algorithm with prejudging and screening
An improved apriori algorithm with prejudging and screening
收藏 引用
International Conference on Computer, communication and Computational Sciences, ICCCCS 2016
作者: Zhao, Xuejian Li, Dongjun Yuan, Yuan Sun, Zhixin Chen, Yong Key Lab of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Posts & Telecommunications Planning and Designing Institute Co. LTD Nanjing China Nanjing Longyuan Microelectronic Co. LTD Nanjing China
Association rule analysis, as one of the significant means of data mining, plays an important role in discovering the implicit knowledge in massive transaction data. Aiming at the inherent defects of the classic Aprio... 详细信息
来源: 评论
Users' Media Cloud Assisted D2D communications for Distributed Caching Underlaying Cellular network
收藏 引用
China communications 2016年 第8期13卷 13-23页
作者: Mingkai Chen Lei Wang Jianxin Chen Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications) Ministry of Education The State Key Laboratory of Integrated Services Networks Xidian University
In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component... 详细信息
来源: 评论
Collusion detector based on G-N algorithm for trust model
收藏 引用
Journal of Systems Engineering and Electronics 2016年 第4期27卷 926-935页
作者: Lin Zhang Na Yin Jingwen Liu Ruchuan Wang College of Computer Nanjing University of Posts and TelecommunicationsNanjing 210003China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nangjing University of Posts and TelecommunicationsNangjing 210003China
In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a co... 详细信息
来源: 评论
3D shape segmentation via shape fully convolutional networks
arXiv
收藏 引用
arXiv 2017年
作者: Wang, Pengyu Gan, Yuan Shui, Panpan Yu, Fenggen Zhang, Yan Chen, Songle Sun, Zhengxing State Key Lab for Novel Software Technology Nanjing University Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications
We design a novel fully convolutional network architecture for shapes, denoted by Shape Fully Convolutional networks (SFCN). 3D shapes are represented as graph structures in the SFCN architecture, based on novel graph... 详细信息
来源: 评论
MPLB: A Load Balance Scheme of Joint Resource Scheduling in Heterogeneous wireless network
MPLB: A Load Balance Scheme of Joint Resource Scheduling in ...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Xiaoyong Lin Pengwei Yin Yun Xia Yang Yu Tingting Qiu Xiaoming Wang Lixiang Li Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing China College of Communication & Information Engineering Nanjing University of Posts and Telecommunications Nanjing China
A user terminal with multi-mode wireless interface is always located its position in the covered area of heterogeneous wireless network (HWN), there are too many algorithms about vertical handover (VHO) of multiple at... 详细信息
来源: 评论
Practical decoy-state reference-frame-independent measurement-device-independent quantum key distribution
收藏 引用
Physical Review A 2017年 第3期95卷 032309-032309页
作者: Chun-Mei Zhang Jian-Rong Zhu Qin Wang Institute of Signal Processing Transmission Nanjing University of Posts and Telecommunications Nanjing 210003 China and Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing 210003 China
Reference-frame-independent measurement-device-independent quantum key distribution (RFI-MDI-QKD) is proposed to remove all possible detector side channel attacks without the alignment of reference frames. Due to unav... 详细信息
来源: 评论
Thermal effects of the quantum states generated from the isomorphs of PPKTP crystal
arXiv
收藏 引用
arXiv 2018年
作者: Jin, Rui-Bo Chen, Guo-Qun Laudenbach, Fabian Zhao, Shengmei Lu, Pei-Xiang Laboratory of Optical Information Technology Wuhan Institute of Technology Wuhan430205 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Security & Communication Technologies Center for Digital Safety & Security AIT Austrian Institute of Technology GmbH Donau-City-Str. 1 Vienna1220 Austria Quantum Optics Quantum Nanophysics and Quantum Information Faculty of Physics University of Vienna Boltzmanngasse 5 Vienna1090 Austria
We theoretically and numerically investigate the temperature-dependent properties of the biphotons generated from four isomorphs of periodically poled KTiOPO4 (PPKTP): i.e., PPRTP, PPKTA, PPRTA and PPCTA. It is discov... 详细信息
来源: 评论
Physical-layer security for indoor visible light communications: Secrecy capacity analysis
arXiv
收藏 引用
arXiv 2018年
作者: Wang, Jin-Yuan Liu, Cheng Wang, Jun-Bo Wu, Yongpeng Lin, Min Cheng, Julian Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Nanjing210003 China National Mobile Communications Research Laboratory Southeast University Nanjing210096 China Department of Electronic Engineering Shanghai Jiao Tong University Minhang200240 China School of Engineering University of British Columbia KelownaBCV1V 1V7 Canada
This paper investigates the physical-layer security for an indoor visible light communication (VLC) network consisting of a transmitter, a legitimate receiver and an eavesdropper. Both the main channel and the wiretap... 详细信息
来源: 评论
Bandit inspired beam searching scheme for mmWave high-speed train communications
arXiv
收藏 引用
arXiv 2018年
作者: Wang, Jun-Bo Cheng, Ming Wang, Jin-Yuan Lin, Min Wu, Yongpeng Zhu, Huiling Wang, Jiangzhou National Mobile Communications Research Laboratory Southeast University Nanjing210096 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing210003 China Shanghai Key Laboratory of Navigation and Location Based Services Shanghai Jiao Tong University Minhang200240 China School of Engineering and Digital Arts University of Kent Canterbury KentCT2 7NT United Kingdom
High-speed trains (HSTs) are being widely deployed around the world. To meet the high-rate data transmission requirements on HSTs, millimeter wave (mmWave) HST communications have drawn increasingly attentions. To rea... 详细信息
来源: 评论