咨询与建议

限定检索结果

文献类型

  • 375 篇 会议
  • 184 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 561 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 372 篇 工学
    • 187 篇 计算机科学与技术...
    • 116 篇 软件工程
    • 113 篇 信息与通信工程
    • 55 篇 电子科学与技术(可...
    • 40 篇 仪器科学与技术
    • 33 篇 电气工程
    • 32 篇 控制科学与工程
    • 31 篇 网络空间安全
    • 26 篇 机械工程
    • 17 篇 材料科学与工程(可...
    • 17 篇 化学工程与技术
    • 13 篇 生物工程
    • 10 篇 土木工程
    • 9 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 8 篇 航空宇航科学与技...
    • 6 篇 冶金工程
  • 106 篇 理学
    • 43 篇 数学
    • 27 篇 物理学
    • 20 篇 化学
    • 16 篇 生物学
    • 15 篇 统计学(可授理学、...
    • 12 篇 系统科学
  • 95 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 19 篇 工商管理
    • 16 篇 图书情报与档案管...
  • 16 篇 文学
    • 15 篇 新闻传播学
  • 14 篇 法学
    • 9 篇 社会学
  • 10 篇 医学
    • 8 篇 临床医学
  • 10 篇 军事学
    • 8 篇 军队指挥学
  • 2 篇 经济学
  • 2 篇 农学

主题

  • 24 篇 security
  • 14 篇 feature extracti...
  • 13 篇 algorithm design...
  • 11 篇 signal to noise ...
  • 11 篇 training
  • 10 篇 throughput
  • 10 篇 scheduling
  • 9 篇 routing
  • 8 篇 network topology
  • 8 篇 bandwidth
  • 8 篇 vectors
  • 8 篇 switches
  • 8 篇 internet
  • 8 篇 clustering algor...
  • 7 篇 noise
  • 7 篇 semantics
  • 7 篇 virtualization
  • 7 篇 heterogeneous ne...
  • 6 篇 load balancing
  • 6 篇 architecture

机构

  • 102 篇 national digital...
  • 45 篇 national digital...
  • 39 篇 national digital...
  • 18 篇 china national d...
  • 11 篇 national digital...
  • 11 篇 china national d...
  • 11 篇 school of cyber ...
  • 10 篇 purple mountain ...
  • 9 篇 china national d...
  • 9 篇 national digital...
  • 8 篇 national digital...
  • 8 篇 national digital...
  • 8 篇 national digital...
  • 8 篇 national digital...
  • 7 篇 national digital...
  • 7 篇 information engi...
  • 6 篇 national digital...
  • 6 篇 state key labora...
  • 5 篇 school of cyber ...
  • 5 篇 national digital...

作者

  • 24 篇 kaizhi huang
  • 18 篇 guozhen cheng
  • 17 篇 jiangxing wu
  • 16 篇 julong lan
  • 15 篇 hongchang chen
  • 14 篇 xinsheng ji
  • 14 篇 bin yan
  • 12 篇 hongchao hu
  • 11 篇 wang binqiang
  • 11 篇 yunfei guo
  • 10 篇 lan julong
  • 10 篇 jian chen
  • 10 篇 binqiang wang
  • 10 篇 ruiyang huang
  • 10 篇 liang jin
  • 10 篇 fucai chen
  • 9 篇 jianpeng zhang
  • 9 篇 huang kaizhi
  • 9 篇 peng yi
  • 9 篇 hu yuxiang

语言

  • 532 篇 英文
  • 18 篇 中文
  • 8 篇 其他
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=National Digital Switching System Engineering and Technology R&D Center"
561 条 记 录,以下是381-390 订阅
排序:
A soft fast estimation method of PN sequence based on weighting Walsh Hadamard Transform
A soft fast estimation method of PN sequence based on weight...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Kaizhi Huang Song Chen Meiyue Yang National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
Poor error-tolerance and polynomial taps restriction are the main issues of Walsh Hadamard Transform estimation method. This article is devoted to these issues and a novel soft fast PN sequence estimation algorithm ba... 详细信息
来源: 评论
Enhancing wireless security with theory of ill-posed problem: A novel physical-layer encryption mechanism
Enhancing wireless security with theory of ill-posed problem...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Xiangyang Xu Wenyu Luo Huawei Song Lizhi Zhang National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
This paper studies physical-layer security without knowing the eavesdropper's channel state information. The use of ill-posed theory to protect wireless transmissions is proposed. Firstly, the problem of randomize... 详细信息
来源: 评论
A partial CSI based Affinity propagation dynamic clustering algorithm
A partial CSI based Affinity propagation Dynamic clustering ...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Xiaomin ran Min Tong Youquan Mo National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
The precondition of the whole known channel state information (CSI) is impractical in realistic system. To deal with this problem, a partial CSI based Affinity propagation dynamic clustering algorithm was proposed in ... 详细信息
来源: 评论
A polynomial estimation algorithm for PN sequence based on reliability accumulation  3rd
A polynomial estimation algorithm for PN sequence based on r...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Meiyue Yang Kaizhi Huang Wenyu Luo National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
To solve the problems of current polynomial estimation algorithms for PN sequence, such as insufficient efficiency and error-tolerance, a novel algorithm based on reliability accumulation is proposed combining BM iter... 详细信息
来源: 评论
Analysis and Prevention for Cross-site Scripting Attack Based on Encoding
Analysis and Prevention for Cross-site Scripting Attack Base...
收藏 引用
2013 IEEE 4th International Conference on Electronics Information and Emergency Communication
作者: ding Lan Wu ShuTing Ye Xing Zhang Wei Library of Zhengzhou Teachers College Department of Intelligence and Reconnaissance Zhengzhou Teachers CollegeSpecial Police Academy China National Digital Switching System Engineering &Technological R&D Center Information Engineering University
With the development of Web application, cross-site scripting attacks have been rapidly increasing, and the technique of those attacks is constantly updating. There has been some special advanced attacks such as the o... 详细信息
来源: 评论
The community detection algorithm based on transferring the similarity  3rd
The community detection algorithm based on transferring the ...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: dongdong Niu Hongchang Chen Lixiong Liu China National Digital Switching System Engineering & Technological R & D Center
For global community detection algorithm having high computation complexity and local community detection algorithm working bad in community quality, in this paper we propose an algorithm by finding the core nodes in ... 详细信息
来源: 评论
A multicarrier-based physical layer security scheme for the multicast systems  3rd
A multicarrier-based physical layer security scheme for the ...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Tong Lin Kai-Zhi Huang Wen-Yu Luo National Digital Switching System Engineering & Technological R&D Center NDSC Zhengzhou Henan P.R. China
Traditional physical layer security methods, such as artificial noise, commonly require that the sender has more antennas than that of the receivers, which is not practical in the multicasting system. To solve this pr... 详细信息
来源: 评论
An effective community detection algorithm of the social networks
An effective community detection algorithm of the social net...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Yuan Huang Wei Hou Xiaowei Li Shaomei Li National Computer Network and Information Security Administration Center Beijing China National Digital Switching System Engineering & Technological R&D Center Zhengzhou
The traditional social network community detection algorithms generally lack of consideration of link attributes, and full expression using link attribute information model and mechanism. Aiming at this issue, this pa... 详细信息
来源: 评论
Eavesdropping against artificial noise: Hyperplane clustering
Eavesdropping against artificial noise: Hyperplane clusterin...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Lu Liu Jin Liang Kaizhi Huang National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC Information Engineering University Zhengzhou Henan PRC
Wireless secure communication using artificial noise can guarantee security when the transmitter has more antennas than the eavesdropper. Contrarily, this paper considers the problem of eavesdropping when sufficient a... 详细信息
来源: 评论
A second-order spatial hopping transmission scheme for physical layer security
A second-order spatial hopping transmission scheme for physi...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: XinSheng Ji XiaoLei Kang KaiZhi Huang KeMing Ma China National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan P.R. China China Nat. Digital Switching Syst. Eng. & Technol. R&D Center Zhengzhou China
The method of physical layer security in wireless relay communication based on cooperative jamming scheme need the channel of legitimate user keep constant. It fails if the eavesdropper has more antennas than the send... 详细信息
来源: 评论