咨询与建议

限定检索结果

文献类型

  • 314 篇 会议
  • 264 篇 期刊文献

馆藏范围

  • 578 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 357 篇 工学
    • 168 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 120 篇 信息与通信工程
    • 85 篇 电子科学与技术(可...
    • 62 篇 控制科学与工程
    • 56 篇 电气工程
    • 37 篇 光学工程
    • 35 篇 机械工程
    • 32 篇 仪器科学与技术
    • 22 篇 化学工程与技术
    • 22 篇 安全科学与工程
    • 20 篇 航空宇航科学与技...
    • 19 篇 生物工程
    • 15 篇 交通运输工程
    • 14 篇 材料科学与工程(可...
    • 12 篇 建筑学
  • 218 篇 理学
    • 95 篇 数学
    • 76 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 29 篇 系统科学
    • 28 篇 生物学
    • 22 篇 化学
    • 14 篇 大气科学
  • 73 篇 管理学
    • 55 篇 管理科学与工程(可...
    • 19 篇 工商管理
    • 16 篇 图书情报与档案管...
  • 27 篇 医学
    • 19 篇 临床医学
    • 15 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 16 篇 法学
    • 15 篇 社会学
  • 8 篇 经济学
  • 5 篇 军事学
  • 4 篇 艺术学
  • 3 篇 文学
  • 3 篇 农学
  • 2 篇 历史学
  • 1 篇 教育学

主题

  • 15 篇 training
  • 13 篇 feature extracti...
  • 12 篇 three-dimensiona...
  • 12 篇 accuracy
  • 10 篇 simulation
  • 10 篇 optimization
  • 10 篇 computational mo...
  • 10 篇 visualization
  • 9 篇 object detection
  • 9 篇 synchronization
  • 8 篇 support vector m...
  • 8 篇 deep learning
  • 8 篇 semantics
  • 7 篇 machine learning
  • 7 篇 estimation
  • 7 篇 satellites
  • 7 篇 adaptation model...
  • 6 篇 signal to noise ...
  • 6 篇 resource managem...
  • 6 篇 predictive model...

机构

  • 33 篇 school of inform...
  • 26 篇 key laboratory o...
  • 19 篇 national laborat...
  • 17 篇 hubei key labora...
  • 17 篇 school of cyber ...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 16 篇 school of inform...
  • 15 篇 school of comput...
  • 15 篇 services computi...
  • 14 篇 cluster and grid...
  • 13 篇 communication un...
  • 12 篇 shaanxi key labo...
  • 11 篇 information engi...
  • 11 篇 key laboratory o...
  • 11 篇 school of inform...
  • 11 篇 school of softwa...
  • 10 篇 national mobile ...
  • 10 篇 beijing key labo...
  • 10 篇 science and tech...

作者

  • 16 篇 ding liu
  • 13 篇 ren hui
  • 13 篇 hu shengshan
  • 13 篇 wei jiang
  • 13 篇 zhang leo yu
  • 12 篇 su zhibin
  • 11 篇 jiang wei
  • 11 篇 shu feng
  • 10 篇 zhibin su
  • 10 篇 hui ren
  • 10 篇 jin hai
  • 9 篇 zhou ziqi
  • 8 篇 wan wei
  • 8 篇 li minghui
  • 7 篇 yujian jiang
  • 7 篇 cai wenlong
  • 7 篇 jin shi
  • 7 篇 liu jingyu
  • 6 篇 mou chengbo
  • 6 篇 jingyu liu

语言

  • 523 篇 英文
  • 36 篇 其他
  • 19 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=National Key Laboratory of Communication System and Information Control Technology"
578 条 记 录,以下是341-350 订阅
排序:
Vision-based and real-time calibration of industrial robot by using deep learning and dimension-reduced models
收藏 引用
Precision Engineering 2025年
作者: Zhouxiang Jiang Ruoheng Ding Yuxuan Liu Zhongjie Long Bao Song College of Mechanical and Electrical Engineering Beijing Information Science & Technology University 12 Xiaoying East Road Qinghe Haidian District Beijing 100192 China Key Laboratory of Modern Measurement & Control Technology Ministry of Education Beijing Information Science & Technology University 12 Xiaoying East Road Qinghe Haidian District Beijing 100192 China National NC System Engineering Research Center Huazhong University of Science & Technology 1037 Luoyu Road Wuhan 430074 China
A real-time calibration method for six-DoF industrial robot is presented. It aims to address the issue that calibration always suspends the work of robot and is quite costly due to repeated utilization of expensive me...
来源: 评论
A Constructive Semi-global Differential Game Design Method for Multi-agent systems under Input Constraint and Collision Avoidance*
A Constructive Semi-global Differential Game Design Method f...
收藏 引用
Chinese Automation Congress (CAC)
作者: Xiongjun Wu Jialing Zhou Yuanlong Li Chunfang Chen Kai Li National Defense Key Laboratory of Science and Technology on Electromagnetic Scattering The 802 Institute of Shanghai Academy of Space Flight Technology The Eighth Academy of China Aerospace Science and Technology Corporation Shanghai China Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai Jiao Tong University Shanghai China School of Automation Nanjing University Science and Technology Nanjing The 802 Institute of Shanghai Academy of Space Flight Shanghai School of Automation Science and Electrical Engineering Beihang University Beijing
The constructive semi-global differential game concept is introduced into the multi-agent’s cooperative controller designing of typical autonomous unmanned systems subject to controller input constraint as well as th... 详细信息
来源: 评论
Study on Subjective Perception of S3D Image with Regular-texture
Study on Subjective Perception of S3D Image with Regular-tex...
收藏 引用
IEEE Joint International information technology and Artificial Intelligence Conference (ITAIC)
作者: Zhibin Su Bing Liu Weiwei Li Hui Ren Rui Huang School of Information and Communication Engineering Communication University of China Beijing China Key Laboratory of Acoustic Visual Technology and Intelligent Control System Ministry of Culture and Tourism Beijing China CITVC KEHUA CO. LTD. Technology Service Branch Beijing China
With the rapid development of binocular stereo vision technology, S3D images and videos have been widely used in many aspects. However, there are few researches on the detail perception of comfortable experience and s... 详细信息
来源: 评论
A MAC Protocol Identification Approach Based on Convolutional Neural Network
A MAC Protocol Identification Approach Based on Convolutiona...
收藏 引用
International Conference on Wireless communications and Signal Processing (WCSP)
作者: Xutong Zhang Weiguo Shen Jianliang Xu Zitong Liu Guoru Ding Colledge of Electronic and Information Engineering Nanjing University of Aeronautics and Astronautics Nanjing China Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Science and Technology on Communication Information Security Control Laboratory No.36 Research Institute of CETC Jiaxing China College of Communication Engineering Army Engineering University Nanjing China
The medium access control (MAC) protocol identification is of great application value in cognitive radio. In order to realize the MAC protocol identification with high accuracy and avoid manual feature extraction, we ... 详细信息
来源: 评论
Content Distribution based on Joint V2I and V2V Scheduling in mmWave Vehicular Networks
arXiv
收藏 引用
arXiv 2022年
作者: Su, Lan Niu, Yong Han, Zhu Ai, Bo He, Ruisi Wang, Yibing Wang, Ning Su, Xiang The State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing100044 China The Frontiers Science Center for Smart High-Speed Railway System Beijing Jiaotong University Beijing100044 China The National Mobile Communications Research Laboratory Southeast University Nanjing211189 China The Department of Electrical and Computer Engineering University of Houston HoustonTX77004 United States The Department of Computer Science and Engineering Kyung Hee University Seoul446-701 Korea Republic of The State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing100044 China The School of Information Engineering Zhengzhou University Zhengzhou450001 China The Norwegian University of Science and Technology Norway and University of Oulu Finland
With the explosive growth of vehicle applications, vehicular networks based on millimeter wave (mmWave) bands have attracted interests from both academia and industry. mmWave communications are able to utilize the hug... 详细信息
来源: 评论
Model based reinforcement learning for robot grasping trajectory generation  4
Model based reinforcement learning for robot grasping trajec...
收藏 引用
4th IEEE International Conference on Advanced Robotics and Mechatronics, ICARM 2019
作者: Xue, Hongxiang Wen, Shuhuan Yang, Chao Liu, Huaping Key Lab of Industrial Computer Control Engineering of Hebei Province Yanshan University Qinhuangdao066004 China Department of Computer Science and Technology State Key Laboratory of Intelligent Technology and System Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing100084 China
Trajectory generation is a fundamental problem for successful robotic grasping. However, most of the existing work dealt with this problem using supervised learning with a prescribed model. It prevents the developed g... 详细信息
来源: 评论
Camouflaged Object Detection via Context-aware Cross-level Fusion
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Geng Liu, Si-Jie Sun, Yu-Jia Ji, Ge-Peng Wu, Ya-Feng Zhou, Tao Northwestern Polytechnical University Xi’an710072 China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Computer Science and Engineering China Data Processing Center School of Power and Energy China Key Laboratory of System Control and Information Processing Ministry of Education Shanghai200240 China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China School of Computer Science Inner Mongolia University Hohhot010021 China Artificial Intelligence Institute School of Computer Science Wuhan University Wuhan430072 China
Camouflaged object detection (COD) aims to identify the objects that conceal themselves in natural scenes. Accurate COD suffers from a number of challenges associated with low boundary contrast and the large variation... 详细信息
来源: 评论
Quantum proof and high-speed privacy amplification for quantum key distribution
收藏 引用
Physical Review Applied 2025年 第5期23卷 054004-054004页
作者: Bing-Qi Yan Jun-Bin Wu Fan Fan Bing-Jie Xu Xiao-Ling Zhang Min Gu Key Laboratory of Atomic and Subatomic Structure and Quantum Control (Ministry of Education) Guangdong Basic Research Center of Excellence for Structure and Fundamental Interactions of Matter School of Physics South China Normal University Guangzhou 510006 China Guangdong Provincial Key Laboratory of Quantum Engineering and Quantum Materials Guangdong-Hong Kong Joint Laboratory of Quantum Matter South China Normal University Guangzhou 510006 China Quantum Science Center of Guangdong-HongKong-Macao Greater Bay Area (Guangdong) Shenzhen 518000 China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu 611731 China National Key Laboratory of Security Communication Institute of Southwestern Communication Chengdu 610041 China
Privacy amplification (PA) is a vital step in the postprocessing stage of quantum key distribution, which can extract a secure key from a source partially leaked to the environment. We propose a PA scheme that uses th... 详细信息
来源: 评论
Energy Management and Trajectory Optimization for UAV-Enabled Legitimate Monitoring systems
arXiv
收藏 引用
arXiv 2020年
作者: Hu, Shuyan Wu, Qingqing Wang, Xin State Key Laboratory of ASIC and System School of Information Science and Technology Fudan University Shanghai200433 China Department of Electrical and Computer Engineering National University of Singapore Singapore119077 Singapore State Key Laboratory of ASIC and System Shanghai Institute for Advanced Communication and Data Science Department of Communication Science and Engineering Fudan University Shanghai200433 China
Thanks to their quick placement and high flexibility, unmanned aerial vehicles (UAVs) can be very useful in the current and future wireless communication systems. With a growing number of smart devices and infrastruct... 详细信息
来源: 评论
LSTM-based Frequency Hopping Sequence Prediction
LSTM-based Frequency Hopping Sequence Prediction
收藏 引用
International Conference on Wireless communications and Signal Processing (WCSP)
作者: Gao Li Jianliang Xu Weiguo Shen Wei Wang Zitong Liu Guoru Ding Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Nanjing University of Aeronautics and Astronautics Nanjing China Science and Technology on Communication Information Security Control Laboratory No.36 Research Institute of CETC Jiaxing China College of Communications Engineering Army Engineering University China
The continuous change of communication frequency brings difficulties to the reconnaissance and prediction of non-cooperative communication. The core of this communication process is the frequency-hopping (FH) sequence... 详细信息
来源: 评论