咨询与建议

限定检索结果

文献类型

  • 5,367 篇 会议
  • 3,476 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 8,874 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,710 篇 工学
    • 2,905 篇 计算机科学与技术...
    • 2,249 篇 软件工程
    • 1,891 篇 信息与通信工程
    • 1,299 篇 电子科学与技术(可...
    • 994 篇 电气工程
    • 667 篇 控制科学与工程
    • 533 篇 仪器科学与技术
    • 460 篇 机械工程
    • 443 篇 光学工程
    • 418 篇 材料科学与工程(可...
    • 400 篇 化学工程与技术
    • 347 篇 生物工程
    • 295 篇 动力工程及工程热...
    • 272 篇 网络空间安全
    • 187 篇 生物医学工程(可授...
    • 176 篇 交通运输工程
    • 130 篇 安全科学与工程
    • 127 篇 航空宇航科学与技...
  • 3,053 篇 理学
    • 1,381 篇 数学
    • 1,341 篇 物理学
    • 527 篇 统计学(可授理学、...
    • 389 篇 化学
    • 377 篇 生物学
    • 259 篇 系统科学
  • 1,141 篇 管理学
    • 801 篇 管理科学与工程(可...
    • 381 篇 图书情报与档案管...
    • 282 篇 工商管理
  • 185 篇 医学
    • 159 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 174 篇 法学
    • 137 篇 社会学
  • 107 篇 经济学
  • 78 篇 军事学
  • 51 篇 农学
  • 25 篇 教育学
  • 22 篇 艺术学
  • 21 篇 文学

主题

  • 177 篇 simulation
  • 170 篇 wireless communi...
  • 146 篇 feature extracti...
  • 138 篇 signal to noise ...
  • 131 篇 resource managem...
  • 122 篇 optimization
  • 117 篇 interference
  • 114 篇 computational mo...
  • 105 篇 quality of servi...
  • 98 篇 accuracy
  • 97 篇 throughput
  • 96 篇 deep learning
  • 95 篇 wireless sensor ...
  • 90 篇 relays
  • 88 篇 semantics
  • 87 篇 bandwidth
  • 84 篇 predictive model...
  • 84 篇 protocols
  • 83 篇 training
  • 80 篇 machine learning

机构

  • 661 篇 beijing universi...
  • 438 篇 state key labora...
  • 261 篇 school of electr...
  • 223 篇 institute of adv...
  • 180 篇 nanjing universi...
  • 171 篇 institute of qua...
  • 165 篇 state key labora...
  • 153 篇 institute of net...
  • 145 篇 school of inform...
  • 133 篇 school of inform...
  • 132 篇 wireless technol...
  • 111 篇 school of artifi...
  • 109 篇 institute of com...
  • 95 篇 school of comput...
  • 91 篇 institute of com...
  • 90 篇 chongqing univer...
  • 86 篇 china mobile res...
  • 82 篇 posts and teleco...
  • 79 篇 institute of adv...
  • 79 篇 school of scienc...

作者

  • 87 篇 qi zhang
  • 78 篇 yang yang
  • 72 篇 xiangjun xin
  • 59 篇 ma yan
  • 59 篇 zhiyong feng
  • 49 篇 yan ma
  • 47 篇 yue dong
  • 47 篇 qinghua tian
  • 47 篇 feng tian
  • 43 篇 guoyin wang
  • 43 篇 duy tran trung
  • 42 篇 xiaohong huang
  • 41 篇 li yang
  • 41 篇 xin xiangjun
  • 41 篇 hui tian
  • 40 篇 wei li
  • 39 篇 yongjun wang
  • 39 篇 qin wang
  • 36 篇 luo haiyong
  • 35 篇 zhao fang

语言

  • 7,352 篇 英文
  • 1,216 篇 其他
  • 317 篇 中文
  • 1 篇 捷克文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Posts and Telecommunications and Institute of Technology"
8874 条 记 录,以下是1-10 订阅
排序:
QoE-Energy Consumption Optimization for End-User Devices in Adaptive Bitrate Video Streaming Using the Lagrange Multiplier Method
EAI Endorsed Transactions on Industrial Networks and Intelli...
收藏 引用
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 2025年 第3期12卷 1-12页
作者: Huu, Tien Vu Huong, Thao Nguyen Thi Faculty of Multimedia Posts and Telecommunications Institute of Technology Hanoi Viet Nam Faculty of Electronics Engineering Posts and Telecommunications Institute of Technology Hanoi Viet Nam
The reduction of greenhouse gas emissions in the Internet and ICT sectors has become a critical challenge. According to recent research, the key contributors to greenhouse gas emissions in Internet include high energy... 详细信息
来源: 评论
A novel approach for software vulnerability detection based on advanced computing
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 5121-5139页
作者: Do Xuan, Cho Anh, Huynh Nhat Posts and Telecommunications Institute of Technology Ha Noi Viet Nam
Because the damage caused by source code vulnerabilities to agencies and organizations is increasing, early detection and warning of these vulnerabilities is very necessary today. In recent times, approaches based on ... 详细信息
来源: 评论
Quantum-enhanced interferometry with unbalanced entangled coherent states
收藏 引用
Chinese Physics B 2025年 第2期34卷 54-62页
作者: Jun Tang Zi-Hang Du Wei Zhong Lan Zhou Yu-Bo Sheng Institute of Quantum Information and Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China School of Science Nanjing University of Posts and TelecommunicationsNanjing 210003China College of Electronic and Optical Engineering and College of Flexible Electronics(Future Technology) Nanjing University of Posts and TelecommunicationsNanjing 210003China
We propose a quantum-enhanced metrological scheme utilizing unbalanced entangled coherent states(ECSs) generated by passing a coherent state and a coherent state superposition through an unbalanced beam splitter(BS). ... 详细信息
来源: 评论
Classifying extended,localized and critical states in quasiperiodic lattices via unsupervised learning
收藏 引用
Chinese Physics B 2025年 第1期34卷 422-427页
作者: Bohan Zheng Siyu Zhu Xingping Zhou Tong Liu School of Computer Science and Technology School of SoftwareNanjing University of Posts and TelecommunicationsNanjing 210023China Institute of Quantum Information and Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China Department of Applied Physics School of ScienceNanjing University of Posts and TelecommunicationsNanjing 210003China
Classification of quantum phases is one of the most important areas of research in condensed matter *** this work,we obtain the phase diagram of one-dimensional quasiperiodic models via unsupervised ***,we choose two ... 详细信息
来源: 评论
Passive-state preparation for quantum secure direct communication
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2025年 第4期68卷 35-44页
作者: Jia-Wei Ying Jin-Yu Wang Yu-Xiang Xiao Shi-Pu Gu Xing-Fu Wang Wei Zhong Ming-Ming Du Xi-Yun Li Shu-Ting Shen An-Lei Zhang Lan Zhou Yu-Bo Sheng College of Electronic and Optical Engineering and College of Flexible Electronics(Future Technology) Nanjing University of Posts and TelecommunicationsNanjing 210023China Institute of Quantum Information and Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China College of Science Nanjing University of Posts and TelecommunicationsNanjing 210023China
Quantum secure direct communication(QSDC)can transmit the secret message ***-photon-based QSDC protocol requires the active modulation of the quantum state of the source,potentially introducing various side-channel **... 详细信息
来源: 评论
Switched event-triggered control using a non-monotonic Lyapunov function
收藏 引用
Science China(Information Sciences) 2024年 第11期67卷 365-366页
作者: Yajing MA Zhanjie LI Chao DENG Lei DING Dong YUE School of Internet of Things Nanjing University of Posts and Telecommunications Institute of Advanced Technology for Carbon Neutrality Nanjing University of Posts and Telecommunications
Networked control systems(NCSs), whose feedback loops are connected via the communication networks, have a wide application in computer science, medicine, telecommunications, and so on. However, communication networks...
来源: 评论
Measurement-based entanglement purification for hybrid entangled state
收藏 引用
Chinese Physics B 2025年 第3期34卷 104-114页
作者: Cheng-Chen Luo Shi-Pu Gu Xing-Fu Wang Lan Zhou Yu-Bo Sheng College of Science Nanjing University of Posts and TelecommunicationsNanjing 210023China College of Electronic and Optical Engineering&College of Flexible Electronics(Future Technology) Nanjing University of Posts and TelecommunicationsNanjing 210023China Institute of Quantum Information and Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China
Hybrid entangled states(HESs),which involve different particles with various degrees of freedom,have garnered significant attention and been applied in a wide range of quantum ***,similar to other categories of entang... 详细信息
来源: 评论
A Novel Approach for Android Malware Detection Based on Intelligent Computing
收藏 引用
Computers, Materials & Continua 2024年 第12期81卷 4371-4396页
作者: Manh Vu Minh Cho Do Xuan Faculty of Information Security Posts and Telecommunications Institute of TechnologyHanoi100000Vietnam
Detecting malware on mobile devices using the Android operating system has become a critical challenge in the field of cybersecurity,in the context of the rapid increase in the number of malware variants and the frequ... 详细信息
来源: 评论
Side-channel free quantum digital signature with source monitoring
收藏 引用
Chinese Physics B 2025年 第1期34卷 53-58页
作者: Luo-Jia Ma Ming-Shuo Sun Chun-Hui Zhang Hua-Jian Ding Xing-Yu Zhou Jian Li Qin Wang Institute of Quantum Information and Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China Broadband Wireless Communication and Sensor Network Technology Key Laboratory of Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing 210003China
Quantum digital signature(QDS)can guarantee the information-theoretical security of a signature with the fundamental laws of quantum ***,most current QDS protocols do not take source security into account,leading to a... 详细信息
来源: 评论
A Data Intrusion Tolerance Model Based on an Improved Evolutionary Game Theory for the Energy Internet
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 3679-3697页
作者: Song Deng Yiming Yuan Institute of Advanced Technology Nanjing University of Posts and TelecommunicationsNanjing210003China College of Automation Nanjing University of Posts and TelecommunicationsNanjing210003China
Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of *** intrusion tolerant techniques suffered fr... 详细信息
来源: 评论