咨询与建议

限定检索结果

文献类型

  • 307 篇 会议
  • 229 篇 期刊文献

馆藏范围

  • 536 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 390 篇 工学
    • 203 篇 计算机科学与技术...
    • 195 篇 信息与通信工程
    • 141 篇 软件工程
    • 79 篇 电子科学与技术(可...
    • 48 篇 仪器科学与技术
    • 44 篇 控制科学与工程
    • 33 篇 机械工程
    • 31 篇 光学工程
    • 27 篇 电气工程
    • 24 篇 动力工程及工程热...
    • 16 篇 网络空间安全
    • 13 篇 生物工程
    • 11 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 8 篇 安全科学与工程
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 土木工程
  • 188 篇 理学
    • 101 篇 物理学
    • 84 篇 数学
    • 23 篇 统计学(可授理学、...
    • 15 篇 系统科学
    • 14 篇 生物学
    • 7 篇 化学
  • 71 篇 管理学
    • 56 篇 管理科学与工程(可...
    • 21 篇 工商管理
    • 18 篇 图书情报与档案管...
  • 15 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 法学
  • 4 篇 农学
  • 4 篇 医学
  • 1 篇 文学

主题

  • 27 篇 wireless communi...
  • 24 篇 wireless sensor ...
  • 22 篇 quantum cryptogr...
  • 16 篇 quantum communic...
  • 12 篇 cognitive radio
  • 12 篇 network coding
  • 11 篇 simulation
  • 11 篇 delays
  • 11 篇 energy efficienc...
  • 10 篇 quality of servi...
  • 10 篇 optimization
  • 10 篇 cloud computing
  • 9 篇 routing
  • 9 篇 interference
  • 9 篇 computational mo...
  • 9 篇 feature extracti...
  • 9 篇 correlation
  • 9 篇 mathematical mod...
  • 8 篇 encoding
  • 7 篇 signal to noise ...

机构

  • 62 篇 key lab of broad...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 54 篇 college of compu...
  • 44 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 41 篇 institute of qua...
  • 21 篇 national mobile ...
  • 15 篇 key lab of broad...
  • 15 篇 institute of sig...
  • 15 篇 institute of sig...
  • 13 篇 key lab of broad...
  • 10 篇 nanjing universi...
  • 10 篇 key lab of broad...
  • 9 篇 school of scienc...
  • 9 篇 broadband wirele...
  • 8 篇 education minist...
  • 8 篇 key lab. of broa...
  • 8 篇 key lab. of broa...
  • 8 篇 key lab of broad...

作者

  • 29 篇 yang zhen
  • 28 篇 wang ruchuan
  • 21 篇 lei wang
  • 20 篇 qin wang
  • 18 篇 wang qin
  • 16 篇 jianxin chen
  • 15 篇 dong hu
  • 15 篇 baoyu zheng
  • 14 篇 yang geng
  • 13 篇 jingwu cui
  • 13 篇 lan zhou
  • 12 篇 kun wang
  • 12 篇 ruchuan wang
  • 12 篇 yu-bo sheng
  • 12 篇 zhixin sun
  • 11 篇 chun-hui zhang
  • 10 篇 wang lei
  • 10 篇 zhang dengyin
  • 10 篇 sun lijuan
  • 10 篇 xiao fu

语言

  • 510 篇 英文
  • 19 篇 中文
  • 7 篇 其他
检索条件"机构=Key Lab of Broadcast Wireless Communication and Sensor Network Technology"
536 条 记 录,以下是181-190 订阅
排序:
Co-whitening of i-vectors for short and long duration speaker verification  19
Co-whitening of i-vectors for short and long duration speake...
收藏 引用
19th Annual Conference of the International Speech communication, INTERSPEECH 2018
作者: Xu, Longting Lee, Kong Aik Li, Haizhou Yang, Zhen Department of Electrical and Computer Engineering National University of Singapore Singapore Data Science Research Laboratories NEC Corporation Japan Broadband Wireless Communication and Sensor Network Technology Key Lab Nanjing University of Posts and Telecommunications China
An i-vector is a fixed-length and low-rank representation of a speech utterance. It has been used extensively in text-independent speaker verification. Ideally, speech utterances from the same speaker would map to an ... 详细信息
来源: 评论
Secrecy outage analysis of integrated satellite-terrestrial relay networks  24
Secrecy outage analysis of integrated satellite-terrestrial ...
收藏 引用
24th Asia-Pacific Conference on communications, APCC 2018
作者: Tao, Xiangshuai Huang, Qingquan Yin, Chunyan Cheng, Guoqiang Ouyang, Jian Liu, Xin College of Communications Engineering Army Engineering University of PLA Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing China Nanjing Institute of Telecommunication Technology Nanjing China
This paper addresses the secure transmission problem of an integrated satellite-terrestrial relay networks (ISTRN), where multiple malicious eavesdroppers attempt to overhear the confidential signals from the satellit... 详细信息
来源: 评论
Research on Path Selection for Space network Based on Fuzzy Neural network
Research on Path Selection for Space Network Based on Fuzzy ...
收藏 引用
International Conference on wireless communications and Signal Processing (WCSP)
作者: Yueyue Zhang Yunchi Shi Yihuan Pang Fei Shen Feng Yan Lianfeng Shen School of Information Science and Engineering Southeast University Nanjing Jiangsu P. R. China Shanghai Aerospace Electronic Technology Institute Shanghai China Key Lab for Wireless Sensor Network and Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences China
With the development of space communication technology, space network is gradually enhanced by distributed spacecraft. This novel architecture of space network brings new challenges on self-organization and self-adapt... 详细信息
来源: 评论
Heralded amplification of single-photon entanglement with polarization feature
收藏 引用
Frontiers of physics 2018年 第5期13卷 241-249页
作者: Yu-Yu Jin Sheng-Xian Qin Hao Zu Lan Zhou Wei Zhong Yu-Bo Sheng School of Science Nanjing University of Posts and Telecommunications Nanjing 210003 China New Energy Technology Engineering Laboratory of Jiangsu Province Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Nanjing 210003 China Institute of Signal Processing Transmission Nanjing University of Posts and Telecommunications Nanjing 210003 China
Heralded noiseless amplification is beneficial in overcoming transmission photon loss in a noisy quantum channel. We propose a single-photon-assisted heralded noiseless amplification protocol of the single- photon ent... 详细信息
来源: 评论
An Improved Centroid Localization Algorithm Based on Virtual Beacon Nodes for WSNs  3
An Improved Centroid Localization Algorithm Based on Virtual...
收藏 引用
3rd IEEE International Conference on Cloud Computing and Internet of Things, CCIOT 2018
作者: Jiang, Rui Wu, Qian Xu, Youyun Nanjing University of Posts and Telecommunications Telecommunication and Networks National Engineering Nanjing Jiangsu210023 China Broadband Wireless Communication and Sensor Network Technology Key Lab of Ministry of Education Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China
According to the application of range-free localization technology for wireless sensor networks (WSNs), an improved centroid localization algorithm is proposed in the paper. In this methodology, the centroid of the sp... 详细信息
来源: 评论
Author Correction: An Effective Way for Simulating Oceanic Turbulence Channel on the Beam Carrying Orbital Angular Momentum
收藏 引用
Scientific reports 2020年 第1期10卷 1268页
作者: Sunxiang Pan Le Wang Wennai Wang Shengmei Zhao Institute of Signal Processing and Transmission Nanjing University of Posts and Telecommunications(NUPT) Nanjing 210003 China. Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing 210003 China. wangwn@***. Institute of Signal Processing and Transmission Nanjing University of Posts and Telecommunications(NUPT) Nanjing 210003 China. zhaosm@***. Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing 210003 China. zhaosm@***.
An amendment to this paper has been published and can be accessed via a link at the top of the paper.
来源: 评论
Robust and Passive Motion Detection with COTS WiFi Devices
收藏 引用
Tsinghua Science and technology 2017年 第4期22卷 345-359页
作者: Hai Zhu Fu Xiao Lijuan Sun Xiaohui Xie Panlong Yang Ruchuan Wang the College of Computer Nanjing University of Posts and Telecommunications the Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education and College of Computer Nanjing University of Posts and Telecommunications the College of Computer Science and Technology University of Science and Technology of China
Device-free Passive(DfP) detection has received increasing attention for its ability to support various pervasive applications. Instead of relying on variable Received Signal Strength(RSS), most recent studies rel... 详细信息
来源: 评论
GRIDLESS TWO-DIMENSIONAL DOA ESTIMATION WITH L-SHAPED ARRAY BASED ON THE CROSS-COVARIANCE MATRIX
GRIDLESS TWO-DIMENSIONAL DOA ESTIMATION WITH L-SHAPED ARRAY ...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Xiaohuan Wu Wei-Ping Zhu Jun Yan Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Nanjing China
The atomic norm minimization (ANM) has been successfully incorporated into the two-dimensional (2-D) direction-of-arrival (DOA) estimation problem for super-resolution. However, its computational workload might be una... 详细信息
来源: 评论
Real-time Hand Tracking Using Kinect
Real-time Hand Tracking Using Kinect
收藏 引用
作者: Chenxuan Xi Jianxin Chen Chenxue Zhao Qicheng Pei Lizheng Liu Key Lab of Broadband Wireless Communication and Sensor Network Technology(Nanjing University of Posts and Telecommunications) Ministry of Education
Real-time hand tracking is fundamental to human gesture recognition. However, due to the huge computation, previous studies are either off-line or limited to given poses. In order to satisfy the requirement of real-ti... 详细信息
来源: 评论
Multidimensional reconciliation protocol for continuous-variable quantum key agreement with polar coding
收藏 引用
中国科学(物理学 力学 天文学) 2018年 第9期61卷 99-102页
作者: ShengMei Zhao ZhiGang Shen Hong Xiao Le Wang Institute of Signal Processing Transmission Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing 210003 China Institute of Signal Processing Transmission Nanjing University of Posts and Telecommunications Nanjing 210003 China
Continuous-variable quantum key distribution (CVQKD) [1-7] allows two remote parties (Alice and Bob) to share a secret key,even in the presence of an eavesdropper (Eve) with unlimited computational power [8-17].While,...
来源: 评论