咨询与建议

限定检索结果

文献类型

  • 73 篇 会议
  • 55 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 129 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 80 篇 工学
    • 44 篇 计算机科学与技术...
    • 33 篇 软件工程
    • 27 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 仪器科学与技术
    • 9 篇 电气工程
    • 8 篇 机械工程
    • 6 篇 网络空间安全
    • 4 篇 化学工程与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 安全科学与工程
    • 2 篇 测绘科学与技术
    • 2 篇 航空宇航科学与技...
    • 2 篇 生物工程
  • 57 篇 理学
    • 31 篇 物理学
    • 12 篇 数学
    • 5 篇 系统科学
    • 4 篇 化学
    • 4 篇 地球物理学
    • 4 篇 统计学(可授理学、...
    • 3 篇 大气科学
    • 2 篇 生物学
  • 12 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 教育学

主题

  • 15 篇 quantum cryptogr...
  • 7 篇 quantum communic...
  • 4 篇 wireless communi...
  • 4 篇 quantum optics
  • 3 篇 compressed sensi...
  • 3 篇 delays
  • 3 篇 communication
  • 3 篇 real-time system...
  • 3 篇 machine learning
  • 3 篇 encryption
  • 3 篇 solar energy
  • 3 篇 optical quantum ...
  • 2 篇 image enhancemen...
  • 2 篇 reinforcement le...
  • 2 篇 support vector m...
  • 2 篇 video coding
  • 2 篇 deep learning
  • 2 篇 target tracking
  • 2 篇 computational el...
  • 2 篇 support vector m...

机构

  • 27 篇 institute of qua...
  • 10 篇 telecommunicatio...
  • 8 篇 key lab of broad...
  • 8 篇 ma'anshan techni...
  • 7 篇 education minist...
  • 7 篇 post big data te...
  • 7 篇 broadband wirele...
  • 7 篇 ma'anshan engine...
  • 6 篇 "telecommunicati...
  • 5 篇 college of telec...
  • 5 篇 wanjiang univers...
  • 5 篇 education minist...
  • 4 篇 nanjing universi...
  • 4 篇 shanghai researc...
  • 4 篇 telecommunicatio...
  • 4 篇 shanghai researc...
  • 4 篇 jiangsu province...
  • 4 篇 wanjiang univers...
  • 4 篇 education minist...
  • 4 篇 key lab of broad...

作者

  • 14 篇 qin wang
  • 12 篇 wang qin
  • 9 篇 dong hu
  • 9 篇 hu xusheng
  • 8 篇 xing-yu zhou
  • 8 篇 chun-hui zhang
  • 8 篇 zhixin sun
  • 7 篇 liu juan
  • 7 篇 jian li
  • 6 篇 lei xu
  • 6 篇 zhe sun
  • 6 篇 zhang chun-hui
  • 6 篇 li jian
  • 6 篇 xiangpeng xie
  • 6 篇 weidong fang
  • 6 篇 guangfu gong
  • 5 篇 jing-yang liu
  • 5 篇 hua-jian ding
  • 5 篇 hu dong
  • 5 篇 wei chen

语言

  • 124 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=Maanshan Engineering Technology Research Center for Wireless Sensor Network and IntelliSense"
129 条 记 录,以下是91-100 订阅
排序:
Experimental generation of entanglement-assisted quantum random access code
收藏 引用
Physical Review A 2019年 第5期99卷 052313-052313页
作者: Xiao-Run Wang Lu-Yan Wu Chen-Xi Liu Tong-Jun Liu Jian Li Qin Wang Institute of Quantum Information and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China Broadband Wireless Communication and Sensor Network Technology Key Lab of Ministry of Education NUPT Nanjing 210003 China Telecommunication and Networks National Engineering Research Center NUPT Nanjing 210003 China
n→m random access code (RAC) is an information task to encode an n-bit random message into a shorter m-bit string. Resulting from the compression loss from n to m bits, there exists success probabilities for the stri... 详细信息
来源: 评论
Asymmetric sending or not sending twin-field quantum key distribution in practice
收藏 引用
Physical Review A 2019年 第6期99卷 062316-062316页
作者: Xing-Yu Zhou Chun-Hui Zhang Chun-Mei Zhang Qin Wang Institute of Quantum Information and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China Broadband Wireless Communication and Sensor Network Technology Key Lab of Ministry of Education NUPT Nanjing 210003 China Telecommunication and Networks National Engineering Research Center NUPT Nanjing 210003 China
Quantum key distribution (QKD) offers a secret way to share keys between legitimate users which is guaranteed by the law of quantum mechanics. Most recently, the limitation of transmission distance without quantum rep... 详细信息
来源: 评论
Practical Phase-Modulation Stabilization in Quantum Key Distribution via Machine Learning
收藏 引用
Physical Review Applied 2019年 第1期12卷 014059-014059页
作者: Jing-Yang Liu Hua-Jian Ding Chun-Mei Zhang Shi-Peng Xie Qin Wang Institute of Quantum Information and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China Broadband Wireless Communication and Sensor Network Technology Key Lab of Ministry of Education Ministry of Education Nanjing 210003 China Telecommunication and Networks National Engineering Research Center NUPT Nanjing 210003 China
Practical implementation of quantum key distributions (QKD) requires efficient, real-time feedback control to maintain system stability when facing disturbance from either external environment or imperfect internal co... 详细信息
来源: 评论
Efficient passive measurement-device-independent quantum key distribution
收藏 引用
Physical Review A 2019年 第5期99卷 052325-052325页
作者: Chun-Hui Zhang Chun-Mei Zhang Qin Wang Institute of Quantum Information and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China Broadband Wireless Communication and Sensor Network Technology Key Laboratory of Ministry of Education Nanjing University of Posts and Telecommunications Nanjing 210003 China Telecommunication and Networks National Engineering Research Center Nanjing University of Posts and Telecommunications Nanjing 210003 China
To date, only active-decoy-state methods have been adopted in current measurement-device-independent (MDI) quantum key distribution (QKD) protocols, causing security loopholes when modulating multiple light intensitie... 详细信息
来源: 评论
Scale Adaptive Block Target Tracking Based on Multi-layer Convolution Features and Kernel Correlation Filter
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1828卷
作者: Ting Zhang Dong Hu Jing Zhang Jiangsu Province's Key Lab of Image Procession and Image Communications Nanjing 210003 China Education Ministry's Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing 210003 China Education Ministry's Engineering Research Center of Ubiquitous Network and Heath Service Nanjing University of Posts and Telecommunications Nanjing 210003 China
Target tracking is currently a hot research topic in Computer Vision and has a wide range of use in many research fields. However, due to factors such as occlusion, fast motion, blur and scale variation, tracking meth...
来源: 评论
Joint DBF and SAO Parallel Filtering Based on Multithread Load Balancing
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1828卷
作者: Hao Ma Dong Hu Yi Li Jiangsu Province's Key Lab of Image Procession and Image Communications Nanjing 210003 China Education Ministry's Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing 210003 China Education Ministry's Engineering Research Center of Ubiquitous Network and Heath Service Nanjing University of Posts and Telecommunications Nanjing 210003 China
This paper presents a joint parallel loop filtering algorithm based on multi-thread load balancing in HEVC decoding, which implements the parallel processing of deblocking filtering (DBF) and sample adaptive compensat...
来源: 评论
Adaptive Multi-Attention Convolutional Neural network for Fine-Grained Image Recognition
Adaptive Multi-Attention Convolutional Neural Network for Fi...
收藏 引用
IEEE Globecom Workshops
作者: Ang Li Jianxin Chen Bin Kang Wenqin Zhuang Xuguang Zhang College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing China National Engineering Research Center for Communication and Information Technology (NUPT) Nanjing China Key Laboratory of Broadband Wireless Communications and Sensor Network Technology Ministry of Education (NUPT) Nanjing China
Fine-grained recognition is still a difficult task in pattern recognition applications due to the challenge of accurate localization of discriminative parts. Recent CNN-based methods generally utilize attention mechan... 详细信息
来源: 评论
A Siamese network Tracking Algorithm Based on Hierarchical Attention Mechanism
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1828卷
作者: Hu Zhang Dong Hu Yingcan Qiu Jiangsu Province's Key Lab of Image Procession and Image Communications Nanjing 210003 China Nanjing University of Posts and Telecommunications Nanjing 210003 China Education Ministry's Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing 210003 China Education Ministry's Engineering Research Center of Ubiquitous Network and Heath Service Nanjing 210003 China
A siamese network tracking algorithm based on hierarchical attention mechanism is proposed in this paper. In order to obtain more robust target tracking results, different layer features are fused effectively. In the ...
来源: 评论
An obstacle avoidance design of UAV based on genetic algorithm
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1633卷
作者: Xusheng Hu Juan Liu Key Laboratory of Unmanned Aerial Vehicle Development & Data Application of Anhui Higher Education Institutes Wanjiang University of Technology Ma'anshan 243031 China Ma'anshan Engineering Technology Research Center for Wireless Sensor Network and IntelliSense Ma'anshan 243031 China Ma'anshan Technical College Ma'anshan 243030 China
In order to improve the effect of obstacle avoidance, a PID control algorithm combined with genetic algorithm is proposed. By establishing the mathematical model of UAV, the auxiliary control system of UAV is analyzed...
来源: 评论
IONSS: Indirect Observation Node Selection Scheme in Trust Management for UAV network
IONSS: Indirect Observation Node Selection Scheme in Trust M...
收藏 引用
IEEE Globecom Workshops
作者: Weidong Fang Wuxiong Zhang Wei Chen Weiwei Gao Guoqing Jia Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Micro-system and Information Technology Chinese Academy of Sciences Shanghai China Shanghai Research Center for Wireless Communication Shanghai China School of Computer Science and Technology China University of Mining and Technology Xuzhou China College of Physics and Electronic Information Engineering Qinghai University for Nationalities Xining China
As a three-dimensional distributed network, the UAV network is very critical for communication security. The current security approaches for UAV are mainly traditional secure schemes, such as encryption, authenticatio... 详细信息
来源: 评论