咨询与建议

限定检索结果

文献类型

  • 418 篇 会议
  • 391 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 810 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 577 篇 工学
    • 288 篇 计算机科学与技术...
    • 269 篇 信息与通信工程
    • 206 篇 软件工程
    • 131 篇 电子科学与技术(可...
    • 69 篇 仪器科学与技术
    • 68 篇 控制科学与工程
    • 58 篇 机械工程
    • 48 篇 电气工程
    • 42 篇 光学工程
    • 38 篇 动力工程及工程热...
    • 36 篇 网络空间安全
    • 22 篇 生物工程
    • 14 篇 力学(可授工学、理...
    • 13 篇 航空宇航科学与技...
    • 12 篇 安全科学与工程
    • 11 篇 化学工程与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 土木工程
  • 301 篇 理学
    • 163 篇 物理学
    • 121 篇 数学
    • 33 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 23 篇 生物学
    • 11 篇 化学
  • 110 篇 管理学
    • 85 篇 管理科学与工程(可...
    • 32 篇 工商管理
    • 30 篇 图书情报与档案管...
  • 29 篇 军事学
    • 28 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 法学
  • 6 篇 医学
  • 4 篇 农学
  • 1 篇 文学

主题

  • 41 篇 wireless communi...
  • 32 篇 quantum cryptogr...
  • 31 篇 wireless sensor ...
  • 28 篇 quantum communic...
  • 19 篇 simulation
  • 18 篇 cognitive radio
  • 16 篇 delays
  • 16 篇 quality of servi...
  • 16 篇 interference
  • 16 篇 optimization
  • 14 篇 network coding
  • 13 篇 energy efficienc...
  • 12 篇 routing
  • 12 篇 servers
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 resource managem...
  • 11 篇 security
  • 11 篇 correlation
  • 11 篇 cloud computing

机构

  • 62 篇 college of compu...
  • 62 篇 key lab of broad...
  • 62 篇 institute of qua...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 49 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 39 篇 key laboratory o...
  • 31 篇 institute of sig...
  • 31 篇 key laboratory o...
  • 30 篇 national mobile ...
  • 28 篇 institute of sig...
  • 18 篇 key laboratory o...
  • 16 篇 key laboratory o...
  • 15 篇 key lab of broad...
  • 14 篇 national laborat...
  • 13 篇 nanjing universi...
  • 13 篇 key lab of broad...
  • 13 篇 school of scienc...
  • 13 篇 college of mathe...

作者

  • 36 篇 qin wang
  • 35 篇 yang zhen
  • 32 篇 wang ruchuan
  • 29 篇 lei wang
  • 22 篇 jianxin chen
  • 22 篇 mingkai chen
  • 21 篇 yu-bo sheng
  • 21 篇 wang qin
  • 21 篇 lan zhou
  • 20 篇 yang geng
  • 19 篇 baoyu zheng
  • 18 篇 jingwu cui
  • 17 篇 wang lei
  • 17 篇 zhen yang
  • 17 篇 sun zhixin
  • 17 篇 zhixin sun
  • 16 篇 chun-hui zhang
  • 15 篇 dong hu
  • 14 篇 kun wang
  • 14 篇 chen mingkai

语言

  • 764 篇 英文
  • 35 篇 中文
  • 11 篇 其他
检索条件"机构=Key Lab. of Broadband Wireless Communication and Sensor Network Technology"
810 条 记 录,以下是431-440 订阅
排序:
Outage Performance of the Integrated Satellite-Terrestrial network Based on the SNR Threshold  12
Outage Performance of the Integrated Satellite-Terrestrial N...
收藏 引用
12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2019
作者: Liu, Xiaoyu Kong, Huaicong Lin, Min Zhu, Wei-Ping College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing China Concordia University Department of Electrical and Computer Engineering Montreal Canada
In this paper, we investigate and propose a new transmission scheme for integrated satellite-terrestrial relay network, where a terrestrial relay equipped with multiple antennas either keeps silent or forwards message... 详细信息
来源: 评论
Spectral Efficient Resource Allocation Algorithm in Indoor Terahertz Downlink networks  13
Spectral Efficient Resource Allocation Algorithm in Indoor T...
收藏 引用
13th International Conference on wireless communications and Signal Processing, WCSP 2021
作者: Zhu, Fanshu Yan, Feng Shen, Fei Xia, Weiwei Hu, Jin Shen, Lianfeng Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Shanghai Institute of Microsystemand and Information Technology Chinese Academy of Sciences Key Lab of Wireless Sensor Network and Communication Shanghai200050 China
Terahertz (THz) communication has become one of the high-profile technologies in the sixth generation (6G) mobile communication networks due to its huge bandwidth and ultra-high data transmission rate. In this paper, ... 详细信息
来源: 评论
Research of Malicious Code Attack Effect Based on Synthetic Entropy Method
收藏 引用
Chinese Journal of Electronics 2023年 第3期22卷 449-454页
作者: LI Peng WANG Ruchuan College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing China
To resolve the problem of assessing the effect of a network attack, this paper combines cross entropy with network character entropy method and proposes scheme to evaluate the malicious code attack effect. It captures... 详细信息
来源: 评论
Dynamic Mapping and Quality of Service Driven Re-Embedding in Virtualization Environment
Dynamic Mapping and Quality of Service Driven Re-Embedding i...
收藏 引用
IEEE Global communications Conference
作者: Haotong Cao Shengchen Wu Qin Wang Longxiang Yang Key Lab of Broadband Wireless Communication and Sensor Network Technique Nanjing University of Posts and Telecommunications Ministry of Education Nanjing China
Embedding customized virtual networks (VNs) onto the underlying physical network (PN) is a key issue in virtualization research. This issue is virtual network embedding (VNE). Since the issue inception, multiple mappi... 详细信息
来源: 评论
Practical quantum key distributions with single-photon-added coherent sources
Practical quantum key distributions with single-photon-added...
收藏 引用
第十六届全国量子光学学术报告会
作者: Dong Wang Zheng-Fu Han Guang-Can Guo Feng Zhu Qin Wang Key Lab of Quantum Information University of Science and Technology of ChinaCAS Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and TelecommunicationsMinistry of Education
We propose new schemes on implementing the single-photon-added coherent source in the quantum key *** apply the source in either the standard BB84 protocol or the new proposed measurement-device-independent quantum ke... 详细信息
来源: 评论
Secure Efficient Routing Based on network Coding in the Delay Tolerant networks
Secure Efficient Routing Based on Network Coding in the Dela...
收藏 引用
2014 IEEE 5th International Conference on Software Engineering and Service Science
作者: Jianmin Bao Shu Zhang Junjie Zhang Kun Wang Haifeng Hu Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing Univ. of Posts and Telecommunications) Ministry of Education Nanjing University of Posts and Telecommunications
The Delay/Disruption Tolerant network(DTN) is characterized with long delay,high bit-error rate,intermittent connectivity and frequent *** to this,network coding is introduced to improve its transmission performance... 详细信息
来源: 评论
A DISTRIBUTED COMPRESSED SENSING APPROACH FOR SPEECH SIGNAL DENOISING
收藏 引用
Journal of Electronics(China) 2011年 第4期28卷 509-517页
作者: Ji Yunyun Yang Zhen College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts & Telecommunications Nanjing 210003 China
Compressed sensing,a new area of signal processing rising in recent years,seeks to minimize the number of samples that is necessary to be taken from a signal for precise *** precondition of compressed sensing theory i... 详细信息
来源: 评论
Stable time synchronization for wireless sensor network by adaptive value tracking
收藏 引用
ICIC Express Letters, Part B: Applications 2016年 第1期7卷 135-141页
作者: Hu, Bing Sun, Zhixin Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications No. 66 New Mofan Road Nanjing210003 China
A desirable time synchronization protocol based on flooding in wireless sensor networks (WSNs) should neither demand fast propagation of latest time information nor keep track of the neighboring nodes. Moreover, such ... 详细信息
来源: 评论
Genetic algorithm based coding aware routing for wireless mesh networks
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第5期4卷 235-243页
作者: Shao, Xing Wang, Ruchuan Xu, He Huang, Haiping Sun, Lijuan College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing 210003 China
network coding has been confirmed as a potential technology to improve performance of wireless mesh networks (WMNs) and a few network coding aware routings have been proposed. However, these mechanisms detect coding o... 详细信息
来源: 评论
Three-step three-party quantum secure direct communication
收藏 引用
中国科学(物理学 力学 天文学) 2018年 第9期61卷 26-30页
作者: Shan-Shan Chen Lan Zhou Wei Zhong Yu-Bo Sheng Institute of Quantum Information and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China College of Mathematics & Physics Nanjing University of Posts and Telecommunications Nanjing 210003 China Institute of Quantum Information and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and TelecommunicationsMinistry of Education Nanjing 210003 China
We propose a three-party quantum secure direct communication (QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of *** secret message can be encoded independently with desired unitary... 详细信息
来源: 评论