咨询与建议

限定检索结果

文献类型

  • 77 篇 会议
  • 10 篇 期刊文献

馆藏范围

  • 87 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51 篇 工学
    • 29 篇 计算机科学与技术...
    • 23 篇 软件工程
    • 15 篇 控制科学与工程
    • 10 篇 信息与通信工程
    • 9 篇 生物工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 2 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 仪器科学与技术
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
    • 1 篇 船舶与海洋工程
    • 1 篇 航空宇航科学与技...
  • 25 篇 理学
    • 16 篇 数学
    • 9 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 5 篇 系统科学
    • 2 篇 物理学
    • 2 篇 化学
    • 1 篇 天文学
  • 14 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 2 篇 军事学
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 5 篇 reinforcement le...
  • 3 篇 5g mobile commun...
  • 3 篇 data mining
  • 3 篇 information and ...
  • 3 篇 correlation
  • 2 篇 object detection
  • 2 篇 interoperability
  • 2 篇 probes
  • 2 篇 task analysis
  • 2 篇 indexes
  • 2 篇 automation
  • 2 篇 redundancy
  • 2 篇 resource managem...
  • 2 篇 interference
  • 2 篇 computational mo...
  • 2 篇 unmanned aerial ...
  • 2 篇 itemsets
  • 2 篇 measurement unce...
  • 2 篇 semantics
  • 2 篇 feature extracti...

机构

  • 23 篇 cetc key laborat...
  • 9 篇 cetc key laborat...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 5 篇 northwestern pol...
  • 4 篇 china cetc key l...
  • 3 篇 linköping univer...
  • 3 篇 huawei technolog...
  • 3 篇 school of electr...
  • 3 篇 school of comput...
  • 3 篇 china electronic...
  • 3 篇 state key labora...
  • 3 篇 department of el...
  • 3 篇 20th institute k...
  • 3 篇 school of automa...
  • 2 篇 centre for wirel...
  • 2 篇 department of co...
  • 2 篇 school of engine...
  • 2 篇 department of el...
  • 2 篇 hangzhou dianzi ...

作者

  • 9 篇 yang feng
  • 8 篇 nan ma
  • 7 篇 wanyong tian
  • 7 篇 chen chilian
  • 6 篇 li fuqiang
  • 6 篇 zhao lulu
  • 6 篇 wang zhigang
  • 6 篇 chen liang
  • 5 篇 lulu zhao
  • 5 篇 jianqiao chen
  • 5 篇 chilian chen
  • 5 篇 tian wanyong
  • 4 篇 li yafeng
  • 4 篇 guo chubing
  • 4 篇 baoling liu
  • 4 篇 ke liangjun
  • 4 篇 chubing guo
  • 4 篇 feng yang
  • 4 篇 fuqiang li
  • 3 篇 jianjun li

语言

  • 86 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory of Data Link Technology"
87 条 记 录,以下是31-40 订阅
排序:
A Complex Time Management Method Driven by Composite Event in Cloud Simulation Platform
A Complex Time Management Method Driven by Composite Event i...
收藏 引用
IEEE International Conference on Electronic Information and Communication technology (ICEICT)
作者: Sule Wang Chilian Chen Tao Zhang Key Laboratory of Technology on Data link China Electronics Technology Group Corporation (CETC) 20th Institute Xi'an China
At present, cloud computing related technologies have developed rapidly. Among them, cloud simulation platforms play a vital role in complex military projects. The complex time management under the cloud simulation pl...
来源: 评论
Mining Frequent Closed Itemsets and Generators Over Uncertain data
Mining Frequent Closed Itemsets and Generators Over Uncertai...
收藏 引用
IEEE International Conference on Electronic Information and Communication technology (ICEICT)
作者: Lulu Zhao Chilian Chen Wanyong Tian Key Laboratory of Technology on Data link China Electronics Technology Group Corporation(CETC) 20th Institute Xi'an China
The rapid development of computer technology and the widespread use of Internet products have already led us into the era of big data, and researchers are increasingly focused on developing advanced data mining techni...
来源: 评论
Information value measurement distribution model based on improved information entropy  4
Information value measurement distribution model based on im...
收藏 引用
4th IEEE International Conference on Electronic Information and Communication technology, ICEICT 2021
作者: Chen, Liang Chen, Chilian Zhao, Lulu Key Laboratory of Technology on Data link China Electronics Technology Group Corporation 20th Institute Xi’an China
in order to meet the needs of modern war for high-quality situation information, this paper first proposes a battlefield situation information value measurement model based on improved information entropy from the per... 详细信息
来源: 评论
Tactical data Chain link Effectiveness Assessment Based on Cloud Theory
Tactical Data Chain Link Effectiveness Assessment Based on C...
收藏 引用
IEEE International Conference on Electronic Information and Communication technology (ICEICT)
作者: Liang Chen FuQiang Li Lulu Zhao Qian Zhang Key Laboratory of Technology on Data link China Electronics Technology Group Corporation 20th Institute Xi'an China Xi'an China
To address the complexity of tactical data chain system effectiveness assessment, a tactical data chain system effectiveness assessment index system is established by drawing on the principles of cloud theory, and a t...
来源: 评论
NOMA-D2D technology-aided Low delay resource allocation for MEC networks  7
NOMA-D2D Technology-aided Low delay resource allocation for ...
收藏 引用
7th International Conference on Computer and Communications, ICCC 2021
作者: Tao, Huameng Ma, Nan Qin, Xiaoqi Liu, Baoling Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China CETC Key Laboratory of Data Link Technology Xi'an710068 China
In this paper, we propose a joint communication and computing resource allocation scheme in mobile edge computing (MEC) networks aided by non-orthogonal multiple access (NOMA) device-to-device (D2D) technology, in whi... 详细信息
来源: 评论
Image Compression and Meaningful Ciphertext Encryption Based on Histogram Shift Embedding  25th
Image Compression and Meaningful Ciphertext Encryption Base...
收藏 引用
25th International Computer Symposium on New Trends in Computer Technologies and Applications, ICS 2022
作者: Tang, Zheng Jing, Shiwei Li, Jianjun Hui, Guobao Tian, Wanyong Key Laboratory of Data Link CETC 21th Institute China Electronics Technology Group Corporation Shanxi XiAn710071 China School of Computer Science and Technology Hangzhou Dianzi University Hangzhou310018 China
In this paper, a meaningful ciphertext compression and encryption method is proposed. Firstly, the image is sparsely transformed based on wavelet transform, scrambled and compressed to get the Gaussian noise-like ciph... 详细信息
来源: 评论
Meaningful ciphertext image encryption based on histogram shift and ND-ICM hyperchaos
Meaningful ciphertext image encryption based on histogram sh...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Shiwei Jing Jianjun Li Wanyong Tian School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China The Key Laboratory of Data Link of China Electronics Technology Group Corporation Xi‘An China
A novel method for meaningful ciphertext image encryption is proposed in this paper. The method involves a series of steps, including image compression, histogram shift, and disordered cyclic shift scrambling under M-...
来源: 评论
Dual-level Consistency Learning for Unsupervised Domain Adaptive Night-time Semantic Segmentation
Dual-level Consistency Learning for Unsupervised Domain Adap...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Feifei Ding Jianjun Li Wanyong Tian School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China The Key Laboratory of Data Link of China Electronics Technology Group Corporation Xi‘An China
In autonomous driving, it is crucial to train a segmentation model that can perform well in poor illumination. Due to the lack of pixel-level annotated nighttime images and a large domain discrepancy between day-night...
来源: 评论
Multi-Agent Confrontation Game Based on Multi-Agent Reinforcement Learning
Multi-Agent Confrontation Game Based on Multi-Agent Reinforc...
收藏 引用
2021 IEEE International Conference on Unmanned Systems, ICUS 2021
作者: Han, Shuo Ke, Liangjun Wang, Zhigang School of Automation Science and Engineering Xi'Anjiaotong University The State Key Laboratory for Manufacturing Systems Engineering Xi'an China CETC Key Laboratory of Data Link Technology Xi'an China
This paper studies the multi-agent confrontation game problem, and takes unmanned aerial vehicle (UAV) offense-defense confrontation as the research object. Deep Deterministic Policy Gradient (DDPG) and Multi-Agent De... 详细信息
来源: 评论
A High-Isolation Millimeter-Wave Dual-Polarized Antenna for 5G Applications
A High-Isolation Millimeter-Wave Dual-Polarized Antenna for ...
收藏 引用
IEEE Asia-Pacific Conference on Antennas and Propagation (APCAP)
作者: ChengTao Dong ZhiYa Zhang Yu Wang National Key Laboratory of Science and Technology on Antennas and Microwaves Xidian University Xi'an China CETC Key Laboratory of Data Link Technology Xi'an China
This paper proposes a high isolation broadband dual-polarized antenna for mmWave communications. The antenna adopts the multi-layer patch stacking form, which improves the working bandwidth of the antenna. The working... 详细信息
来源: 评论