咨询与建议

限定检索结果

文献类型

  • 441 篇 会议
  • 329 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 772 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 490 篇 工学
    • 219 篇 计算机科学与技术...
    • 138 篇 软件工程
    • 132 篇 信息与通信工程
    • 79 篇 电子科学与技术(可...
    • 50 篇 电气工程
    • 46 篇 仪器科学与技术
    • 41 篇 控制科学与工程
    • 34 篇 网络空间安全
    • 33 篇 核科学与技术
    • 31 篇 机械工程
    • 31 篇 材料科学与工程(可...
    • 27 篇 化学工程与技术
    • 22 篇 光学工程
    • 16 篇 生物工程
    • 14 篇 动力工程及工程热...
    • 14 篇 土木工程
    • 12 篇 冶金工程
    • 12 篇 航空宇航科学与技...
  • 231 篇 理学
    • 127 篇 物理学
    • 62 篇 数学
    • 29 篇 化学
    • 21 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 15 篇 系统科学
    • 11 篇 天文学
  • 110 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 20 篇 工商管理
    • 18 篇 图书情报与档案管...
  • 23 篇 医学
    • 19 篇 临床医学
  • 19 篇 文学
    • 18 篇 新闻传播学
  • 15 篇 法学
  • 12 篇 军事学
  • 6 篇 农学
  • 2 篇 经济学
  • 1 篇 艺术学

主题

  • 27 篇 security
  • 16 篇 algorithm design...
  • 15 篇 feature extracti...
  • 13 篇 training
  • 12 篇 signal to noise ...
  • 11 篇 throughput
  • 11 篇 bandwidth
  • 10 篇 high energy phys...
  • 9 篇 routing
  • 9 篇 wireless communi...
  • 9 篇 vectors
  • 9 篇 switches
  • 9 篇 resource allocat...
  • 9 篇 clustering algor...
  • 9 篇 scheduling
  • 8 篇 network topology
  • 8 篇 interference
  • 8 篇 noise
  • 8 篇 internet
  • 8 篇 semantics

机构

  • 105 篇 national digital...
  • 74 篇 florida state un...
  • 74 篇 lawrence livermo...
  • 74 篇 center for nucle...
  • 71 篇 university of ne...
  • 71 篇 oak ridge nation...
  • 71 篇 vanderbilt unive...
  • 70 篇 department of ph...
  • 70 篇 weizmann institu...
  • 69 篇 riken bnl resear...
  • 69 篇 university of te...
  • 69 篇 yonsei universit...
  • 69 篇 abilene christia...
  • 68 篇 los alamos natio...
  • 68 篇 hiroshima univer...
  • 67 篇 laboratoire lepr...
  • 67 篇 nagasaki institu...
  • 67 篇 institute of phy...
  • 66 篇 dapnia cea sacla...
  • 66 篇 iowa state unive...

作者

  • 74 篇 a. bazilevsky
  • 74 篇 y. v. efremenko
  • 74 篇 m. rosati
  • 74 篇 e. kistenev
  • 74 篇 k. shigaki
  • 74 篇 d. jouan
  • 74 篇 s. nagamiya
  • 74 篇 s. l. fokin
  • 73 篇 j. g. lajoie
  • 73 篇 m. l. purschke
  • 73 篇 a. a. vinogradov
  • 73 篇 s. p. stoll
  • 73 篇 j. t. mitchell
  • 72 篇 v. bumazhnov
  • 72 篇 j. s. haggerty
  • 72 篇 r. seto
  • 72 篇 a. yanovich
  • 72 篇 v. riabov
  • 71 篇 k. tanida
  • 71 篇 i. j. choi

语言

  • 721 篇 英文
  • 25 篇 其他
  • 22 篇 中文
  • 2 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=National Digital Switching System Engineering and Technology R and D Center"
772 条 记 录,以下是461-470 订阅
排序:
Network Traffic Anomaly detection Based on Self-similarity Using FrFT
Network Traffic Anomaly Detection Based on Self-similarity U...
收藏 引用
2013 IEEE 4th International Conference on Software engineering and Service Science
作者: Xiaolong Ye Julong Lan Wanwei Huang Department of National Digital Switching System Engineering Technological R&D Center
Since traditional abnormal detection methods have poor performance,and Hurst parameter estimation was affected by non-stationary *** abnormal detection method based on Hurst parameter estimation using Fractional Fouri... 详细信息
来源: 评论
An affinity propagation algorithm base on self-tuning kernel geodesic distance
An affinity propagation algorithm base on self-tuning kernel...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Jianpeng Zhang Fucai Chen Lixiong Liu dongdong Niu Department of China National Digital switching System Engineering & Technological R & D Center Zhengzhou Henan
For affinity propagation algorithm, traditional Euclidean distance measure cannot fully reflect the complex spatial distribution of the data sets. We propose a self-tuning kernel geodesic distance as the similarity me... 详细信息
来源: 评论
A cooperative jamming based security algorithm for multi-user MIMO systems
A cooperative jamming based security algorithm for multi-use...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Huawei Song Meiyue Yang Xiangyang Xu Wenyu Luo National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
The existing physical layer security algorithm could guarantee secure communication to a certain extent. However, eavesdropper can get more information from legitimate receivers whose channel condition is worse than o... 详细信息
来源: 评论
Physical-layer security based on joint scrambling with spatial and frequency resource
Physical-layer security based on joint scrambling with spati...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Mingliang Li Kaizhi Huang Zhou Zhong National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
The projection of the random multi-antenna weighted vector structured with spatial scrambling is of constant modulus on the main channel, Eavesdropper can take the advantage of multi-antenna to intercept private infor... 详细信息
来源: 评论
Practical on-line near-duplicate detection for web video
Practical on-line near-duplicate detection for web video
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Wei Bao Lixin Ji Lixiong Liu National Digital switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
This paper proposes an alternative point of view on the use of ordinal measures to detect near-duplicate web videos. Ordinal measure fingerprints are first extracted in the core area of videos, and ordinal measures ar... 详细信息
来源: 评论
Audio sensing aid based wireless microphone emulation attacks detection
收藏 引用
Telkomnika - Indonesian Journal of Electrical engineering 2013年 第10期11卷 5917-5928页
作者: Shan-Shan, Wang Xing-Guo, Luo Bai-Nan, Li National Digital Switching System Engineering and Technological R and D Center Jinshui Zhengzhou 450001 China
The wireless microphone network is an important PU network for CrN, but there is no effective technology to solve the problem of microphone evaluation attacks. Therefore, this paper propose ASA algorithm, which utiliz... 详细信息
来源: 评论
Adaptive key generation based on quantization of channel characteristics  3rd
Adaptive key generation based on quantization of channel cha...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Qiao dai Jin Liang Kaizhi Huang China National Digital Switching System Engineering & Technological R&D Center Zhengzhou PRC
Length and mismatch rate of secret bit strings derived from channel characteristics by legitimate users for key generation are affected by quantization algorithm significantly. Existing schemes cannot achieve both a s... 详细信息
来源: 评论
A soft fast estimation method of PN sequence based on weighting Walsh Hadamard Transform
A soft fast estimation method of PN sequence based on weight...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Kaizhi Huang Song Chen Meiyue Yang National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
Poor error-tolerance and polynomial taps restriction are the main issues of Walsh Hadamard Transform estimation method. This article is devoted to these issues and a novel soft fast PN sequence estimation algorithm ba... 详细信息
来源: 评论
Primary User Emulation Attacks Analysis for Cognitive radio Networks Communication
收藏 引用
Telkomnika - Indonesian Journal of Electrical engineering 2013年 第7期11卷 3905-3914页
作者: Wang, Shan-Shan Luo, Xing-Guo Li, Bai-Nan National Digital Switching System Engineering Technological R and D Center Jinshui Zhengzhou 450001 China
Cognitive radio Network is an effective technology and a hot research direction which can solve the problem of deficient resource and revolutionize utilization. And its safety technology attracts more and more researc... 详细信息
来源: 评论
Enhancing wireless security with theory of ill-posed problem: A novel physical-layer encryption mechanism
Enhancing wireless security with theory of ill-posed problem...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Xiangyang Xu Wenyu Luo Huawei Song Lizhi Zhang National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
This paper studies physical-layer security without knowing the eavesdropper's channel state information. The use of ill-posed theory to protect wireless transmissions is proposed. Firstly, the problem of randomize... 详细信息
来源: 评论