咨询与建议

限定检索结果

文献类型

  • 802 篇 会议
  • 646 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 956 篇 工学
    • 520 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 562 篇 理学
    • 282 篇 数学
    • 209 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 168 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,326 篇 英文
  • 87 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1449 条 记 录,以下是1241-1250 订阅
排序:
Prediction model of aerosol fire extinguishing agent performance based on combination of genetic algorithm and back-propagation neural network
Prediction model of aerosol fire extinguishing agent perform...
收藏 引用
4th International Conference on Materials science and information technology, MSIT 2014
作者: Chen, Zhi Jie Zhu, Chen Guang Zhang, Zi Hao School of Chemical Engineering Nanjing University of Science and Technology Nanjing Jiangsu 210094 China Science and Technology on Electro-optical Information Security Control Laboratory Sanhe 065201 China
The aerosol fire extinguishing agent is a complex pyrotechnic composition, and the extinguishing efficiency need a series of experiments to identify. A method is put forward out based on combining back-propagation neu... 详细信息
来源: 评论
Study on the growth model of expandable graphite
Study on the growth model of expandable graphite
收藏 引用
4th International Conference on Materials science and information technology, MSIT 2014
作者: Ye, Fei Zhu, Chen Guang Zhang, Zi Hao School of Chemical Engineering Nanjing University of Science and Technology Nanjing Jiangsu 210094 China Science and Technology on Electro-optical Information Security Control Laboratory Sanhe 065201 China
The expansion mechanism of expandable graphite (EG) was studied systematically in this paper. Based on the feature of the structure and the linear expansion of expandable graphite, a simple expansion model was establi... 详细信息
来源: 评论
A fast numerical algorithm for related bessel function integrations
A fast numerical algorithm for related bessel function integ...
收藏 引用
IEEE Asia-Pacific Conference on Antennas and Propagation (APCAP)
作者: Jun Hua Science and Technology of Communication and Information Security Control Laboratory Jiaxing Zhejiang Province China
A new fast numerical algorithm for the double-order double-argument Hankel transformation is proposed in this article. Due to the fact of rapid oscillation and slow attenuation of the kernel function, it is difficult ... 详细信息
来源: 评论
Energy efficient data-centric networking system on JGN-X network virtualization platform
收藏 引用
Journal of the National Institute of information and communications technology 2015年 第2期62卷 93-100页
作者: Okamoto, Satoru Matsubara, Daisuke Yamanaka, Naoaki Keio Leading-edge Laboratory of Science and Technology Japan Graduate School of Informatics and Engineering University of Electro-Communications Photonic Network Network Control Network Architecture Japan Center for Technology Innovation-Information and Telecommunications Hitachi Ltd. New Generation Network IoT M2M Communication System Japan Faculty of Science and Technology Keio University Photonic Network Network Protocol Smart Network Japan
In the New-Generation Network, information-centric Networking (ICN) is one of the most promising technologies for communication systems which are suitable for the content data provisioning and delivery from/to users. ... 详细信息
来源: 评论
Group establishing algorithm for strategic mobile scenario in manets
Group establishing algorithm for strategic mobile scenario i...
收藏 引用
2014 International Conference on information and communications Technologies, ICT 2014
作者: Xu, Xiaofeng Wang, Xiao Science and Technology on Communication Information Security Control Laboratory China Electronic Group Corporation No. 36 Institute Zhejiang Jinxing China School of Instrument Science and Opto-Electronics Engineering Beijing University of Aeronautics and Astronautics Beijing China
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. In MANETS, the performance is significantly degraded as the scale of the network grows, which has lot... 详细信息
来源: 评论
Group establishing algorithm for strategic mobile scenario in manets
Group establishing algorithm for strategic mobile scenario i...
收藏 引用
2014 International Conference on information and communications Technologies, ICT 2014
作者: Xiaofeng, Xu Xiao, Wang Science and Technology on Communication Information Security Control Laboratory China Electronic Group Corporation No. 36 Institute Zhejiang Jinxing China School of Instrument Science and Opto-electronics Engineering Beijing University of Aeronautics and Astronautics Beijing China
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. In MANETS, the performance is significantly degraded as the scale of the network grows, which has lot... 详细信息
来源: 评论
26th Annual Computational Neuroscience Meeting (CNS*2017): Part 3 Antwerp, Belgium. 15-20 July 2017 Abstracts
收藏 引用
BMC NEUROscience 2017年 第SUPPL 1期18卷 95-176页
作者: [Anonymous] Department of Neuroscience Yale University New Haven CT 06520 USA Department Physiology & Pharmacology SUNY Downstate Brooklyn NY 11203 USA NYU School of Engineering 6 MetroTech Center Brooklyn NY 11201 USA Departament de Matemàtica Aplicada Universitat Politècnica de Catalunya Barcelona 08028 Spain Institut de Neurobiologie de la Méditerrannée (INMED) INSERM UMR901 Aix-Marseille Univ Marseille France Center of Neural Science New York University New York NY USA Aix-Marseille Univ INSERM INS Inst Neurosci Syst Marseille France Laboratoire de Physique Théorique et Modélisation CNRS UMR 8089 Université de Cergy-Pontoise 95300 Cergy-Pontoise Cedex France Department of Mathematics and Computer Science ENSAT Abdelmalek Essaadi’s University Tangier Morocco Laboratory of Natural Computation Department of Information and Electrical Engineering and Applied Mathematics University of Salerno 84084 Fisciano SA Italy Department of Medicine University of Salerno 84083 Lancusi SA Italy Dipartimento di Fisica Università degli Studi Aldo Moro Bari and INFN Sezione Di Bari Italy Data Analysis Department Ghent University Ghent Belgium Coma Science Group University of Liège Liège Belgium Cruces Hospital and Ikerbasque Research Center Bilbao Spain BIOtech Department of Industrial Engineering University of Trento and IRCS-PAT FBK 38010 Trento Italy Department of Data Analysis Ghent University Ghent 9000 Belgium The Wellcome Trust Centre for Neuroimaging University College London London WC1N 3BG UK Department of Electronic Engineering NED University of Engineering and Technology Karachi Pakistan Blue Brain Project École Polytechnique Fédérale de Lausanne Lausanne Switzerland Departement of Mathematics Swansea University Swansea Wales UK Laboratory for Topology and Neuroscience at the Brain Mind Institute École polytechnique fédérale de Lausanne Lausanne Switzerland Institute of Mathematics University of Aberdeen Aberdeen Scotland UK Department of Integrativ
来源: 评论
Spectrum leasing and relay selection in multiuser cooperative cognitive radio networks
收藏 引用
Journal of communications 2014年 第3期9卷 198-207页
作者: Tang, Yi Grace, David Wang, Lijie College of Electronic Science and Engineering National University of Defense Technology Hunan 410073 China Science and Technology on Information System Security Laboratory China Department of Electronics University of York York YO10 5DD United Kingdom Beijing Aerospace Control Center Beijing China
In this paper, we consider multiple primary and multiple secondary users cooperative cognitive radio networks, in which the primary users (PUs) lease a portion of their spectrum to the secondary users (SUs) for some r... 详细信息
来源: 评论
Coordinated Attack Model with Multi-Nodes Based on the P2P Structure
Coordinated Attack Model with Multi-Nodes Based on the P2P S...
收藏 引用
2014 International Conference on Electrical and Electronic Engineering(EEE 2014)
作者: Wei WANG Wen-hong ZHAO Science and Technology on Communication Information Security Control Laboratory Jiangnan Electronic Communication Institute Nanhu College Jiaxing University
Based on the P2P structure,a coordinated attack model with multi-nodes is presented for introduction from link configuration,broadcast mechanism and attack *** P2P,Pure P2P and Super P2P are discussed in link configur... 详细信息
来源: 评论
Markov chain-based attack on the CSMA/CA mechanism
Markov chain-based attack on the CSMA/CA mechanism
收藏 引用
International Conference on Multimedia, communication and Computing Application(MCCA 2014)
作者: W.Wang W.H.Zhao Science and Technology on Communication Information Security Control Laboratory Jiangnan Electronic Communication Institute Nanhu College Jiaxing University
The CSMA/CA(Carrier Sense Multiple Access with Collision Avoidance) mechanism is formally modeled ***,based on the Markov Chain theory,the analysis of the attack on CSMA/CA is introduced from two aspects which are the... 详细信息
来源: 评论