咨询与建议

限定检索结果

文献类型

  • 412 篇 会议
  • 388 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 801 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 570 篇 工学
    • 281 篇 计算机科学与技术...
    • 263 篇 信息与通信工程
    • 201 篇 软件工程
    • 124 篇 电子科学与技术(可...
    • 68 篇 仪器科学与技术
    • 67 篇 控制科学与工程
    • 58 篇 机械工程
    • 46 篇 电气工程
    • 44 篇 光学工程
    • 37 篇 动力工程及工程热...
    • 36 篇 网络空间安全
    • 22 篇 生物工程
    • 14 篇 力学(可授工学、理...
    • 13 篇 航空宇航科学与技...
    • 12 篇 安全科学与工程
    • 11 篇 化学工程与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 土木工程
  • 298 篇 理学
    • 164 篇 物理学
    • 117 篇 数学
    • 31 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 23 篇 生物学
    • 11 篇 化学
  • 105 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 31 篇 工商管理
    • 28 篇 图书情报与档案管...
  • 29 篇 军事学
    • 28 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 法学
  • 5 篇 医学
  • 4 篇 农学
  • 1 篇 文学

主题

  • 41 篇 wireless communi...
  • 32 篇 quantum cryptogr...
  • 31 篇 wireless sensor ...
  • 28 篇 quantum communic...
  • 19 篇 simulation
  • 18 篇 cognitive radio
  • 17 篇 interference
  • 16 篇 quality of servi...
  • 16 篇 optimization
  • 15 篇 delays
  • 13 篇 network coding
  • 13 篇 energy efficienc...
  • 12 篇 routing
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 resource managem...
  • 11 篇 servers
  • 11 篇 security
  • 11 篇 correlation
  • 11 篇 cloud computing

机构

  • 63 篇 institute of qua...
  • 62 篇 college of compu...
  • 62 篇 key lab of broad...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 49 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 39 篇 key laboratory o...
  • 33 篇 institute of sig...
  • 31 篇 key laboratory o...
  • 29 篇 national mobile ...
  • 28 篇 institute of sig...
  • 18 篇 key laboratory o...
  • 16 篇 key laboratory o...
  • 16 篇 national laborat...
  • 15 篇 key lab of broad...
  • 15 篇 key laboratory o...
  • 13 篇 nanjing universi...
  • 13 篇 key lab of broad...
  • 13 篇 school of scienc...

作者

  • 36 篇 qin wang
  • 35 篇 yang zhen
  • 32 篇 wang ruchuan
  • 28 篇 lei wang
  • 21 篇 yu-bo sheng
  • 21 篇 wang qin
  • 21 篇 lan zhou
  • 21 篇 mingkai chen
  • 20 篇 jianxin chen
  • 20 篇 yang geng
  • 17 篇 wang lei
  • 17 篇 zhen yang
  • 17 篇 sun zhixin
  • 17 篇 baoyu zheng
  • 17 篇 zhixin sun
  • 16 篇 jingwu cui
  • 16 篇 chun-hui zhang
  • 15 篇 dong hu
  • 14 篇 kun wang
  • 14 篇 chen mingkai

语言

  • 755 篇 英文
  • 35 篇 中文
  • 11 篇 其他
检索条件"机构=Key Lab of Broadband Wireless Communication and Sensor Network Technology"
801 条 记 录,以下是201-210 订阅
排序:
Traffic Matrix Prediction in SDN based on Spatial-Temporal Residual Graph Convolutional network
Traffic Matrix Prediction in SDN based on Spatial-Temporal R...
收藏 引用
Chinese Control and Decision Conference, CCDC
作者: Xintong Wang Yibo Sun Xuan Wang Enliang Wang Zhixin Sun Post Big Data Technology and Application Engineering Research Center of Jiangsu Province Nanjing University of Posts and Telecommunications Nanjing P.R. China Post Industry Technology Research and Development Center of the State Posts Bureau (Internet of Things Technology) Nanjing University of Posts and Telecommunications Nanjing P.R. China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing P.R. China School of Information Technology and Electrical Engineering The University of Queensland Brisbane Brisbane Australia
Traffic prediction is the basis for dynamic network services and resource optimization. Software Defined networking (SDN) provides a global view for network measurement and management, and a reliable way for network i...
来源: 评论
Resource Allocation for Outage Probability Minimization in Cognitive wireless Powered communication networks  19
Resource Allocation for Outage Probability Minimization in C...
收藏 引用
19th IEEE International Conference on communication technology, ICCT 2019
作者: Li, Qun Xu, DIng Nanjing University of Posts and Telecommunications Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing China
This paper considers a cognitive wireless powered communication network (CWPCN) consisting of a cognitive base station (CBS) and a set of secondary users (SUs) sharing spectrum with a primary user (PU). The transmissi... 详细信息
来源: 评论
Secure Transmission in Multicarrier Power-Splitting wireless Powered communication networks with Full-duplex Receivers  19
Secure Transmission in Multicarrier Power-Splitting Wireless...
收藏 引用
19th IEEE International Conference on communication technology, ICCT 2019
作者: Li, Qun Xu, DIng Ministry of Education Nanjing University of Posts and Telecommunications Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing China
We consider a three-node multicarrier network consisting of a source node, a wireless powered full-duplex destination node, and an eavesdropper. The destination node is assumed to adopt the power splitting technique t... 详细信息
来源: 评论
A WOA Based Switching PID Control for Overhead Crane
A WOA Based Switching PID Control for Overhead Crane
收藏 引用
Chinese Control Conference (CCC)
作者: Haoyong Yu Zhe Sun Yuhua Xu Lei Xu Guangfu Gong Xiangpeng Xie Zhixin Sun Post Industry Technology Research and Development Center of the State Posts Bureau (Internet of Things Technology) Nanjing University of Posts and Telecommunications Nanjing P.R. China Post Big Data Technology and Application Engineering Research Center of Jiangsu Province Nanjing University of Posts and Telecommunications Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing P.R. China Anhui Yougu Express Intelligent Technology Co. LTD Nanling Anhui P.R. China
Aiming at the problem that the amplitude of load oscillation is not easy to control in the movement process of overhead crane, this paper designs a switching PID control method based on whale optimization algorithm(WO...
来源: 评论
Heart Rate Detection with the Off-the-Shelf Camera: Static to Non-Static
Heart Rate Detection with the Off-the-Shelf Camera: Static t...
收藏 引用
IEEE International Conference on Signal and Image Processing (ICSIP)
作者: Rui Chen Jianxin Chen LiMing Cheng XiangJun Huang Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing China
Imaging photo-plethysmography (IPPG) technique has been proven to detect heart rate (HR) with a camera. Currently it might be used in a rigid scenario, such as the static subject, the short measurement distance and go... 详细信息
来源: 评论
LQR Control Method based on Improved Antlion Algorithm
LQR Control Method based on Improved Antlion Algorithm
收藏 引用
Chinese Control Conference (CCC)
作者: Zhe Sun Zhi Wen Lei Xu Guangfu Gong Xiangpeng Xie Zhixin Sun Post Industry Technology Research and Development Center of the State Posts Bureau (Internet of Things Technology) Nanjing University of Posts and Telecommunications Nanjing P.R. China Post Big Data Technology and Application Engineering Research Center of Jiangsu Province Nanjing University of Posts and Telecommunications Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing P.R. China Anhui Yougu Express Intelligent Technology Co. LTD Nanling Anhui P.R. China
In the face of the increasing demand of crane transportation speed and stability, an improved Ant-lion algorithm is proposed in this paper. On the original basis, the quasi-reverse learning method is used to improve t...
来源: 评论
Moving Object Distance Estimation Method Based on Target Extraction with a Stereo Camera  4
Moving Object Distance Estimation Method Based on Target Ext...
收藏 引用
4th IEEE International Conference on Image, Vision and Computing, ICIVC 2019
作者: Zhang, Jingyi Chen, Jianxin Lin, Qingyu Cheng, Liming Nanjing University of Posts and Telecommunications Ministry of Education Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing China
Real-time distance estimation with high accuracy is crucial to robot applications such as navigation and obstacle negotiation. However, considering the truth that high accuracy brings huge computation, the previous wo... 详细信息
来源: 评论
Research on Functional Test of Mobile APP Based on Robot
Research on Functional Test of Mobile APP Based on Robot
收藏 引用
IEEE International Conference on Signal and Image Processing (ICSIP)
作者: Zhaolai Pan Jianxin Chen Ling Yao ZhuAn Chen Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing China
With the rapid popularization of smartphones, various applications (Application: APP) have come into being. Therefore, automated testing of mobile applications is particularly important. At present, the automated test... 详细信息
来源: 评论
3D Modeling of the Rotationally Symmetric Objects Using Kinect  4
3D Modeling of the Rotationally Symmetric Objects Using Kine...
收藏 引用
4th IEEE International Conference on Image, Vision and Computing, ICIVC 2019
作者: DIng, Jie Chen, Jianxin Zhou, Anqi Chen, Zhimin Nanjing University of Posts and Telecommunications Ministry of Education Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing China
With the appearance of RGB-D cameras, 3D reconstruction becomes convenient. Previous studies focused on the objects with strong structural features. But for the objects with weak structure, such as rotationally symmet... 详细信息
来源: 评论
High efficiency Polar coding key reconciliation scheme in wireless channel
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2019年 第3期26卷 50-55页
作者: Zhang Xiaotian Zhao Shengmei Institute of Signal Processing and Transmission Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China
Recently, physical layer security in wireless communication system attracts much attention, and the reconciliation protocol plays an important role in the final secure key distillation, since the secret keys extracted... 详细信息
来源: 评论