咨询与建议

限定检索结果

文献类型

  • 1,852 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,318 篇 工学
    • 1,697 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 617 篇 信息与通信工程
    • 302 篇 电气工程
    • 248 篇 电子科学与技术(可...
    • 236 篇 控制科学与工程
    • 221 篇 生物工程
    • 153 篇 机械工程
    • 131 篇 网络空间安全
    • 111 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 76 篇 交通运输工程
    • 61 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,084 篇 理学
    • 638 篇 数学
    • 246 篇 生物学
    • 231 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 化学
    • 91 篇 系统科学
  • 677 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 312 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 107 篇 法学
    • 72 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 63 篇 deep learning
  • 61 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 security
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 172 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 38 篇 university of ch...
  • 36 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 liu ximeng
  • 16 篇 zhenrong zhang

语言

  • 3,073 篇 英文
  • 253 篇 其他
  • 146 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3455 条 记 录,以下是2941-2950 订阅
排序:
Analysis of Phase Noise in Vector OFDM Systems
Analysis of Phase Noise in Vector OFDM Systems
收藏 引用
IEEE Global Communications Conference
作者: Ibo Ngebani Yabo Li Xiang-Gen Xia Haider Sami Ahmed Minjian Zhao Department of Information Science and Electrical Engineering Zhejiang Provincial Key Laboratory of Information Network Technology Zhejiang University Department of Electrical and Computer Engineering University of Delaware
Vector Orthogonal Frequency Division Multiplexing (V-OFDM) for single transmit antenna systems is a generalization of OFDM where Single-Carrier Frequency Domain Equalization (SC-FDE) and OFDM are two special cases. It... 详细信息
来源: 评论
A Recurrence method of attribute reduction based on rough set
收藏 引用
ICIC Express Letters 2013年 第3 B期7卷 1025-1030页
作者: Zhang, Tao Lu, Jing Chen, Nan Gao, Zhi College of Information Engineering Yanshan University No. 438 Hebei Ave. Qinhuangdao 066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University No. 438 Hebei Ave. Qinhuangdao 066004 China College of Foreign Languages Yanshan University No. 438 Hebei Ave. Qinhuangdao 066004 China Institute of Electrical Engineering Yanshan University No. 438 Hebei Ave. Qinhuangdao 066004 China
According to the classical rough set, the attribute reduction set may be far from satisfactory due to the non-existence of core in the attribute reduction process of decision table. Aiming at this issue, this paper pu... 详细信息
来源: 评论
Multi-sensor data fusion and target location in pipeline monitoring and a pre-warning system based on multi-seismic sensors
Multi-sensor data fusion and target location in pipeline mon...
收藏 引用
International Conference on Pipelines and Trenchless Technology 2012: Better Pipeline Infrastructure for a Better Life, ICPTT 2012
作者: Sun, Jiedi Zhang, Jinquan Wang, Xiaojun College of Information Science and Engineering Yanshan University No. 438 Hebei Avenue Qinhuangdao City Hebei Province China Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province No. 438 Hebei Avenue Qinhuangdao City 066004 China Information Technology Unit of China Petrolium Communication Company No. 49 Jin'guang Road Langfang Hebei Province 065000 China
As a safe and economical method the pipeline is widely used to transport the oil and gas. At present, most of serious pipeline accidents are the artificial damages. The traditional leakage detection methods only infer... 详细信息
来源: 评论
An Improved Chaotic Cryptosystem Based on Circular Bit Shift and XOR Operations
An Improved Chaotic Cryptosystem Based on Circular Bit Shift...
收藏 引用
第十一届全国博士生学术年会——信息技术与安全专题
作者: Shu-Jiang Xua Xiu-Bo Chen Ru Zhang Yi-Xian Yang Yu-Cui Guo Information Security Center Beijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information Security(Graduate University of Chinese Academy of Sciences) School of Science Beijing University of Posts and Telecommunications
A type of chaotic enciyption scheme by combining circular bit shift with XOR operations was proposed in2006 based on iterating chaotic *** after the proposal,it was cryptanalyzed and ***,there are still two drawbacks ... 详细信息
来源: 评论
A Dynamic Probabilistic Marking Approach with Multi-Tag for Tracing ICMP-Based DoS Attacks
收藏 引用
Wuhan University Journal of Natural Sciences 2013年 第6期18卷 484-488页
作者: CHEN Xiuzhen MA Jin LI Shenghong CHEN Ken SERHROUCHNI Ahmed State Key Laboratory for Manufacturing Systems Engineering Xi'an Jiaotong University School of Information Security Engineering Shanghai Jiao Tong University Les Laboratoires de l'Institut Galilée Université Paris 13Paris 93430 France Network and Computer Science Department Telecom ParisTech Paris 75634 France
This paper presents a dynamic probabilistic marking algorithm with multiple routing address tags, which allows the vic- tim to traceback the origin of ICMP (Internet Control Message Pro- tocol)-based direct and refl... 详细信息
来源: 评论
IEEE 802.15.4 Performance with Wi-Fi Interference
IEEE 802.15.4 Performance with Wi-Fi Interference
收藏 引用
2013 International Conference on Mechanical Engineering and Instrumentation(ICMEI 2013)
作者: Fuqiang Wang Xiaoming Wu Yong Pang Yan Liang Yifan Hu Shandong Computer Science Center Shandong Academy of Sciences & Shandong Provincial Key Laboratory Of Computer Network College of Information Science and Engineering Shandong University of Science and Technology Shandong University
This The IEEE 802.15.4 devices are proposed to operate in the 2.4 GHz industrial, scientific and medical(ISM) band. The other devices that use IEEE 802.11 b, g and n share the same frequency band. The interference cau... 详细信息
来源: 评论
High-payload spread spectrum based audio watermarking via M-ary code phase shift keying
High-payload spread spectrum based audio watermarking via M-...
收藏 引用
International Conference on information Science and Technology (ICIST)
作者: Youzhi Zhang Peng Zhang Ye Li Wenshuo Zhang Lin Zhao Department of Information Shandong Kaiwen College of Science and Technology Jinan 250200 China Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center Jinan 250101 China
This paper presents a method to improve the payload of spread spectrum (SS) based audio watermarking via an M-ary SS modulation technique called code phase shift keying (CPSK), in which the code phase of the spreading... 详细信息
来源: 评论
Using Chou’s Pseudo Amino Acid Composition for Protein Remote Homology Detection
Using Chou’s Pseudo Amino Acid Composition for Protein Remo...
收藏 引用
The 7th International Conference on Bioinformatics and Biomedical Engineering(ICBBE 2013)
作者: Bin Liu Xiaolong Wang School of Computer Science and Technology Harbin Institute of TechnologyShenzhen Graduate School Key Laboratory of Network Oriented Intelligent Computation Harbin Institute of TechnologyShenzhen Graduate School Shanghai Key Laboratory of Intelligent Information Processing
Protein remote homology detection is a key problem in ***,the discriminative methods,such as Support Vector Machine(SVM),can achieve the best *** most efficient approa
来源: 评论
Using Chou's Pseudo Amino Acid Composition for Protein Remote Homology Detection
Using Chou's Pseudo Amino Acid Composition for Protein Remot...
收藏 引用
The 7th International Conference on Management and Service Science(MASS 2013)
作者: Bin Liu Xiaolong Wang School of Computer Science and Technology Harbin Institute of TechnologyShenzhen Graduate School Key Laboratory of Network Oriented Intelligent Computation Harbin Institute of TechnologyShenzhen Graduate School Shanghai Key Laboratory of Intelligent Information Processing
Protein remote homology detection is a key problem in ***,the discriminative methods,such as Support Vector Machine(SVM),can achieve the best *** most efficient approach to improve the performance of the SVM-based met... 详细信息
来源: 评论
Correction: Differential structural dynamics and antigenicity of two similar influenza H5N1 virus HA-specific HLA-A*0201-restricted CLT epitopes
收藏 引用
RSC Advances 2014年 第9期5卷 6742-6742页
作者: Yeping Sun Qian Liu Zhong Jin CAS Key Laboratory of Pathogenic Microbiology and Immunology Institute of Microbiology Chinese Academy of Sciences Beijing 100101 P. R. China Supercomputing Center Computer Network Information Center Chinese Academy of Sciences Beijing 100190 P. R. China
Correction for ‘Differential structural dynamics and antigenicity of two similar influenza H5N1 virus HA-specific HLA-A*0201-restricted CLT epitopes’ by Yeping Sun et al., RSC Adv., 2015, 5, 2318–2327.
来源: 评论