咨询与建议

限定检索结果

文献类型

  • 802 篇 会议
  • 646 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 956 篇 工学
    • 520 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 562 篇 理学
    • 282 篇 数学
    • 209 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 168 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,326 篇 英文
  • 87 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1449 条 记 录,以下是1091-1100 订阅
排序:
A Robust GNSS Polarized Space-Time Anti-Interference Method Based on Null Broadening
A Robust GNSS Polarized Space-Time Anti-Interference Method ...
收藏 引用
International Conference on communications, Circuits and Systems (ICCCAS)
作者: Guoqing Xia Wei Xia Ming Xie Huiyong Li School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu Sichuan China Science and Technology on Electronic Information Control Laboratory Chengdu Sichuan China
We propose a robust null broadening algorithm incorporated with the covariance matrix taper (CMT) for the dual-polarized sensitive arrays (DPSAs) in space-time domain to mitigate the performance degradation of traditi... 详细信息
来源: 评论
A New Construction Method of Regeneration Tree for Single Node Fault Repair Mechanism in Distributed Storage System
A New Construction Method of Regeneration Tree for Single No...
收藏 引用
International Conference on Computational Intelligence and security
作者: Wei Guo Yong Wang Miao Ye School of Computer Science and Information Security Guilin University of Electronic Technoloay Guilin Guangxi China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin Guangxi China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology Guilin Guangxi China School of Information and Communication Guilin University of Electronic Technology Guilin Guangxi China
Comparing with the classic redundancy policy of multi-replica technology, Erasure code is preferred due to its higher utilization rate of storage space in distributed storage system. As one kind of the important Erasu... 详细信息
来源: 评论
Performance evaluation of ad-hoc routing protocols in hybrid MANET-satellite network  3rd
Performance evaluation of ad-hoc routing protocols in hybrid...
收藏 引用
3rd International Conference on Machine Learning and Intelligent communications, MLICOM 2018
作者: Xie, Xiaoye Wang, Jian Guo, Xiaobo Wu, Xiaogang Nanjing University Nanjing China Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory The 54th Institute of CETC ShijiazhuangHebei China State Key Laboratory of Smart Grid Protection and Control NARI Group Corporation 19 Chengxin Road Nanjing China
Hybrid MANET-satellite network is a natural evolution in achieving ubiquitous communication. Their combination gives full play to respective advantages—autonomy and flexibility of MANET, wide coverage and resilience ... 详细信息
来源: 评论
Humidity error compensating of MEMS gyros based on a daptive threshold denoising and RBF neural network  37
Humidity error compensating of MEMS gyros based on a daptive...
收藏 引用
37th Chinese control Conference, CCC 2018
作者: Xin-Wang, Wang Xiao-Lin, Shen Hui-Liang, Cao Bo-Wen, Deng North University of China School of Electrical and Control Engineering Taiyuan030051 China North University of China Science and Technology on Electronic Test Measurement Laboratory Taiyuan030051 China North University of China School of Information and Communication Engineering Taiyuan030051 China
The large random errors in a typical MEMS gyros under the ranges of relative humidity condition. In order to solve the large random error under the ranges of relative humidity, a method based on adaptive threshold den... 详细信息
来源: 评论
Load Feedback-Based Resource Scheduling and Dynamic Migration-Based Data Locality for Virtual Hadoop Clusters in OpenStack-Based Clouds
收藏 引用
Tsinghua science and technology 2017年 第2期22卷 149-159页
作者: Dan Tao Zhaowen Lin Bingxu Wang School of Electronic and Information Engineering Beijing Jiaotong UniversityBeijing 100044China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003China Network and Information Center Institute of Network TechnologyScience and Technology on Information Transmission and Dissemination in Communication Networks LaboratoryNational Engineering Laboratory for Mobile Network SecurityBeijing University of Posts and TelecommunicationsBeijing 100876China
With cloud computing technology becoming more mature, it is essential to combine the big data processing tool Hadoop with the Infrastructure as a Service(Iaa S) cloud platform. In this study, we first propose a new ... 详细信息
来源: 评论
Dense small cell networks: From noise-limited to dense interference-limited
Dense small cell networks: From noise-limited to dense inter...
收藏 引用
作者: Yang, Bin Mao, Guoqiang Ding, Ming Ge, Xiaohu Tao, Xiaofeng School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan430074 China School of Computing and Communication University of Technology Sydney UltimoNSW2007 Australia Data61 CSIRO CanberraACT2601 Australia National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Beijing100876 China
Considering both non-line-of-sight (NLoS) and line-of-sight (LoS) transmissions, the transitional behaviors from noise-limited regime to dense interference-limited regime have been investigated for the fifth generatio... 详细信息
来源: 评论
An Adaptive Energy Saving Scheme of DTN based on Geographic Grid for Human Living Areas
An Adaptive Energy Saving Scheme of DTN based on Geographic ...
收藏 引用
IEEE information technology and Mechatronics Engineering Conference (ITOEC)
作者: Tingwei Fu Zhan Wen Jianwei Liu Zheng Zheng Wenzao Li School of Communication Engineering Chengdu University of Information Technology Chengdu Sichuan China Science and Technology on Aircraft Control Laboratory Beihang University Beijing China
Delay Tolerant Network (DTN) is playing a pivotal role in the future human living areas, especially in the future development of smart cities. In the future smart cities, the available energy resources are very limite... 详细信息
来源: 评论
Real-time network traffic classification based on CDH pattern matching  14
Real-time network traffic classification based on CDH patter...
收藏 引用
14th International Conference on Computational Intelligence and security, CIS 2018
作者: Li, Xunzhang Wang, Yong Ke, Wenlong Feng, Hao School of Computer Science and Information Security Guilin University of Electronic Technology Guilin Guangxi541004 China School of Information and Communication Guilin University of Electronic Technology Guilin Guangxi541004 China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin Guangxi541004 China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology Guilin Guangxi541004 China
In recent years, with the rapid development of the Internet, the data scale of application behavior and application traffic have exploded. How to classify the real-time traffic of network becomes a big challenge. How ... 详细信息
来源: 评论
Optical Image Encryption Based on Mixed Chaotic Maps and Single-Shot Digital Holography
收藏 引用
Transactions of Tianjin University 2017年 第2期23卷 184-191页
作者: Yonggang Su Chen Tang Xia Chen Biyuan Li Wenjun Xu Zhenkun Lei School of Electrical and Information Engineering Tianjin University Tianjin 300072 China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin 300308 China State Key Laboratory of Structural Analysis for Industrial Equipment Dalian University of Technology Dalian 116024China
Random phase masks play a key role in optical image encryption schemes based on double random phase technique. In this paper, a mixed chaotic method is proposed, which can efficiently solve some weaknesses that one-di... 详细信息
来源: 评论
Research on 4G And 5G Authentication Signaling
收藏 引用
Journal of Physics: Conference Series 2019年 第4期1213卷
作者: Lei Song Zhan Xu Zhigang Tian Jinhui Chen Ruxin Zhi School of Information and Communication Engineering Beijing Information Science & Technology University Beijing China Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Key Laboratory of Modern Measurement & Control Technology Ministry of Education
In recent years, the development and standardization of 5G networks have received extensive attention. 3GPP officially confirmed that Service-Based Architecture (SBA) is the unified infrastructure of the 5G core netwo...
来源: 评论