咨询与建议

限定检索结果

文献类型

  • 802 篇 会议
  • 646 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 956 篇 工学
    • 520 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 562 篇 理学
    • 282 篇 数学
    • 209 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 168 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,326 篇 英文
  • 87 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1449 条 记 录,以下是1191-1200 订阅
排序:
A Kind of Better Adjacent Channel Suppression Multiple Frequency Shift Keying Signal Simulation Method Based on MATLAB
A Kind of Better Adjacent Channel Suppression Multiple Frequ...
收藏 引用
2015 IEEE 16th International Conference on communication technology(ICCT 2015)
作者: Huan Li Wenhua Ye No.36 Research Institute of CETC Science Technology on Communication Information Security Control Laboratory
Frequency shift keying(FSK) modulation function in MATLAB without filter function, leading to poor adjacent channel suppression, which causes aliasing after a non-linear device easily. Based on FSK modulation signal... 详细信息
来源: 评论
Profiling and identifying users' activities with network traffic analysis
Profiling and identifying users' activities with network tra...
收藏 引用
IEEE International Conference on Software Engineering and Service sciences (ICSESS)
作者: Ma Tao Ye Chun Ming Chen Juan Science and Technology on Communication Information Security Control Laboratory Jiaxing China Army Officer Academy Hefei China
Traffic identification technique is used for classification of different network protocols and applications even with detection of users' network activities. In this paper, we conduct our study on some typical use... 详细信息
来源: 评论
A new important-place identification method
A new important-place identification method
收藏 引用
International Conference on Computer and communications (ICCC)
作者: Chun-lai Ma Tao Ma Hong Shan Electronic Engineering Institute Hefei China Science and Technology on Communication Information Security Control Laboratory Hefei China
For the problem that the location of LBSN users was sparse because of it was updated sporadically. An important place identification method was studied by improving the clustering algorithm. Firstly, a velocity prunin... 详细信息
来源: 评论
Global, regional, and national sex-specific burden and control of the HIV epidemic, 1990–2019, for 204 countries and territories: the Global Burden of Diseases Study 2019
收藏 引用
The Lancet HIV 2021年 第10期8卷 e633-e651页
作者: Jahagirdar, Deepa Walters, Magdalene K. Novotney, Amanda Brewer, Edmond D. Frank, Tahvi D. Carter, Austin Biehl, Molly H. Abbastabar, Hedayat Abhilash, E.S. Abu-Gharbieh, Eman Abu-Raddad, Laith Jamal Adekanmbi, Victor Adeyinka, Daniel Adedayo Adnani, Qorinah Estiningtyas Sakilah Afzal, Saira Aghababaei, Soodabeh Ahinkorah, Bright Opoku Ahmad, Sajjad Ahmadi, Keivan Ahmadi, Sepideh Ahmadpour, Ehsan Ahmed, Muktar Beshir Rashid, Tarik Ahmed Salih, Yusra Ahmed Aklilu, Addis Akram, Tayyaba Akunna, Chisom Joyqueenet Al Hamad, Hanadi Alahdab, Fares Alanezi, Fahad Mashhour Aleksandrova, Ekaterina A. Alene, Kefyalew Addis Ali, Liaqat Alipour, Vahid Almustanyir, Sami Alvis-Guzman, Nelson Ameyaw, Edward Kwabena Amu, Hubert Andrei, Catalina Liliana Andrei, Tudorel Anvari, Davood Arabloo, Jalal Aremu, Olatunde Arulappan, Judie Atnafu, Desta Debalkie Quintanilla, Beatriz Paulina Ayala Ayza, Muluken Altaye Azari, Samad Darshan, B.B. Banach, Maciej Bärnighausen, Till Winfried Barra, Fabio Barrow, Amadou Basu, Sanjay Bazargan-Hejazi, Shahrzad Belay, Habtamu Gebrehana Berheto, Tezera Moshago Bezabhe, Woldesellassie Mequanint Bezabih, Yihienew Mequanint Bhagavathula, Akshaya Srikanth Bhardwaj, Nikha Bhardwaj, Pankaj Bhattacharyya, Krittika Bibi, Sadia Bijani, Ali Bisignano, Catherine Bolarinwa, Obasanjo Afolabi Boloor, Archith Boltaev, Azizbek A. Briko, Nikolay Ivanovich Buonsenso, Danilo Burkart, Katrin Butt, Zahid A. Cao, Chao Charan, Jaykaran Chatterjee, Souranshu Chattu, Soosanna Kumary Chattu, Vijay Kumar Choudhari, Sonali Gajanan Chu, Dinh-Toi Couto, Rosa A.S. Cowden, Richard G. Dachew, Berihun Assefa Dadras, Omid Dagnew, Amare Belachew Dahlawi, Saad M.A. Dai, Xiaochen Dandona, Lalit Dandona, Rakhi das Neves, José Degenhardt, Louisa Demeke, Feleke Mekonnen Desta, Abebaw Alemayehu Deuba, Keshab Dhamnetiya, Deepak Dhungana, Govinda Prasad Dianatinasab, Mostafa Diaz, Daniel Djalalinia, Shirin Doan, Linh Phuong Dorostkar, Fariba Edinur, Hisham Atan Effiong, Andem Eftekharzadeh, Sahar El Sayed Zaki, Maysaa Elayedath, Rajesh Elhadi, Institute for Health Metrics and Evaluation University of Washington Seattle WA United States Department of Health Metrics Sciences School of Medicine University of Washington Seattle WA United States Division of Allergy and Infectious Diseases University of Washington Seattle WA United States Department of Global Health University of Washington Seattle WA United States School of Social Work University of Washington Seattle WA United States Department of Medicine University of Washington Seattle WA United States Vagelos College of Physicians and Surgeones Columbia University Medical Center New York NY United States Division of Data Analytics and Delivery for Impact WHO Geneva Switzerland Advanced Diagnostic and Interventional Radiology Research Centre Tehran University of Medical Sciences Tehran Iran Multiple Sclerosis Research Centre Tehran University of Medical Sciences Tehran Iran School of Public Health Tehran University of Medical Sciences Tehran Iran Department of Epidemiology and Biostatistics Tehran University of Medical Sciences Tehran Iran Paediatric Chronic Kidney Disease Research Centre Tehran University of Medical Sciences Tehran Iran Department of Psychiatry Tehran University of Medical Sciences Tehran Iran Metabolomics and Genomics Research Centre Tehran University of Medical Sciences Tehran Iran Sina Trauma and Surgery Research Centre Tehran University of Medical Sciences Tehran Iran Research Centre for Immunodeficiencies Tehran University of Medical Sciences Tehran Iran Non-Communicable Diseases Research Centre Tehran University of Medical Sciences Tehran Iran Department of Botany Sree Narayana Guru College Chelannur Kozhikode India Clinical Sciences Department University of Sharjah Sharjah United Arab Emirates Mass Communication Department University of Sharjah Sharjah United Arab Emirates Department of Health-Care Policy and Research Weill Cornell Medical College in Qatar Doha Qatar Department of Population Medicine Ca
Background: The sustainable development goals (SDGs) aim to end HIV/AIDS as a public health threat by 2030. Understanding the current state of the HIV epidemic and its change over time is essential to this effort. Thi...
来源: 评论
On the achievability of interference alignment for three-cell MIMO interfering broadcast channel
On the achievability of interference alignment for three-cel...
收藏 引用
International Conference on communication technology (ICCT)
作者: Xiaofeng Xu Caowei Wang Science and Technology on Communication Information Security Control Laboratory JiaXing China Beijing University of Posts and Telecommunications Beijing China
Interference alignment (IA) is a promising technique to effectively mitigate interference in wireless communication systems. In this paper, a novel IA based scheme is proposed, which is jointed design of transmit prec... 详细信息
来源: 评论
Study of Digital Modulation Signal Error Vector Magnitude Based on Vector Signal Analyzer
Study of Digital Modulation Signal Error Vector Magnitude Ba...
收藏 引用
International Symposium on Computational Intelligence and Design
作者: Huan Li Wenhua Ye No.36 Research Institute of CETC Jiaxing Zhejiang 314033China Science Technology on Communication Information Security Control Laboratory
In this article, based on the working principle of vector signal analyzer and theories of error vector magnitude (EVM), Combined signal demodulation experiment of vector signal analyzer, converting some types of digit... 详细信息
来源: 评论
An improved algorithm for minimum connected dominating sets in ad hoc networks
收藏 引用
ICIC Express Letters, Part B: Applications 2015年 第1期6卷 201-206页
作者: Yang, Hong-Wa Yang, Xiao-Niu Li, Xin-Feng Lu, Zhe-Ming Science and Technology on Communication Information Security Control Laboratory Jiaxing China School of Aeronautics and Astronautics Zhejiang University No. 38 Zheda Road Hangzhou China
Given a graph, a connected dominating set is a subset of vertices such that every vertex is either in the subset or adjacent to a vertex in the subset and the subgraph induced by the subset is connected. A minimum con... 详细信息
来源: 评论
Improved (Pseudo) preimage attacks on reduced-round GOST and Grøstl-256 and studies on several truncation patterns for AES-like compression functions  10th
Improved (Pseudo) preimage attacks on reduced-round GOST and...
收藏 引用
10th International Workshop on security, IWSEC 2015
作者: Ma, Bingke Li, Bao Hao, Ronglin Li, Xiaoqian State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Data Assurance and Communication Security Research Center Chinese Academy of Sciences Beijing100093 China University of Chinese Academy of Sciences Beijing China Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei230027 China
In this paper, we present improved preimage attacks on the reduced-round GOST hash function family, which serves as the new Russian hash standard, with the aid of techniques such as the rebound attack, the Meet-in-the... 详细信息
来源: 评论
Tunnel moving target detection based on local structure of image and gray scale information
Tunnel moving target detection based on local structure of i...
收藏 引用
IEEE International Conference on Intelligent Transportation Engineering (ICITE)
作者: Haiyang Yu Yawen Hu Hongyu Guo Lin Fang People's Republic of China Key Laboratory of Urban ITS Technology Optimization and Integration Ministry of Public Security Hefei China School of Transportation Science and Engineering Beihang University Beijing China Infrastructure Systems and Safety Control Beihang University Beijing China Information Industry Co. Ltd. Beijing China
Tunnel moving target detection is subject to the influence of light condition and motion blur, the traditional motion detection method based on pixel points can not be very good at segmenting moving target. To solve t... 详细信息
来源: 评论
A Zero-Stored Biometric Authentication Scheme Based on the Fuzzy Vault
A Zero-Stored Biometric Authentication Scheme Based on the F...
收藏 引用
2015 World Conference on control, Electronics and Electrical Engineering(WCEE 2015)
作者: Xu Yao Jiayong Liu Dianhua Tang Enbo Fang College of Electronics and Information Engineering Sichuan University Science and Technology on Communication Security Laboratory
Traditional remote authentication based on the passwords is vulnerable for password guessing attacks and simple dictionary *** have following advantages:(i)they cannot be forgotten(ii)they are very difficult to guess(... 详细信息
来源: 评论