咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1455 条 记 录,以下是1411-1420 订阅
排序:
Impulsive synchronization of two nonidentical chaotic systems with time-varying delay
收藏 引用
Physics Letters A 2011年 第3期375卷 498-504页
作者: Wangli He Feng Qian Jinde Cao Qing-Long Han The Key Laboratory of Advanced Control and Optimization for Chemical Processes Ministry of Education East China University of Science and Technology Shanghai 200237 China Centre for Intelligent and Networked Systems Central Queensland University Rockhampton QLD 4702 Australia School of Information and Communication Technology Central Queensland University Rockhampton QLD 4702 Australia Department of Mathematics Southeast University Nanjing 210096 China
This Letter investigates synchronization of two nonidentical Lur'e systems with time-varying delay and parameter mismatches via impulsive control. Based on the theory of impulsive functional differential equations... 详细信息
来源: 评论
A stop and go blind equalization algorithm for QAM signals
A stop and go blind equalization algorithm for QAM signals
收藏 引用
International Conference on Wireless communications, Networking and Mobile Computing (WiCom)
作者: Wei, Xue Xiaoniu, Yang Zhaoyang, Zhang National Laboratory of Information Control Technology for Communication System Jiaxing Zhejiang 314033 China Department of Information Science and Electronic Engineering Zhejiang Uinversity Hangzhou Zhejiang 310027 China
The constant modulus algorithm (CMA) has been widely used in the blind equalization of quadrature amplitude modulation (QAM) signals, but it has slow convergence rate and large steady state mean square error and the p... 详细信息
来源: 评论
A variable step size blind equalization algorithm for QAM signals
A variable step size blind equalization algorithm for QAM si...
收藏 引用
2010 International Conference on Microwave and Millimeter Wave technology, ICMMT 2010
作者: Wei, Xue Xiaoniu, Yang Zhaoyang, Zhang National Laboratory of Information Control Technology for Communication System Jiaxing Zhejiang 314033 China Department of Information Science and Electronic Engineering Zhejiang Uinversity Hangzhou Zhejiang 310027 China
The constant modulus algorithm (CMA) is one widely used algorithm for blind equalization of quadrature amplitude modulation (QAM) signals. The algorithm exhibits slow convergence rate and large steady state mean squar... 详细信息
来源: 评论
A carrier recovery algorithm for high order QAM signals
A carrier recovery algorithm for high order QAM signals
收藏 引用
International Conference on Wireless communications, Networking and Mobile Computing
作者: Xue, Wei Yang, Xiaoniu Zhang, Zhaoyang National Laboratory of Information Control Technology for Communication System Jiaxing Zhejiang 314033 China Department of Information Science and Electronic Engineering Zhejiang Uinversity Hangzhou Zhejiang 310027 China
The carrier recovery is one key technique in the demodulation of high order quadrature amplitude modulation (QAM) signals. A carrier recovery algorithm which switches between multi-threshold polarity decision mode and... 详细信息
来源: 评论
Recognition and parameter estimation of MPSK signals based on instantaneous phase difference
Recognition and parameter estimation of MPSK signals based o...
收藏 引用
6th International Conference on Wireless communications, Networking and Mobile Computing (WICOM)
作者: Song, Chunyun Zhan, Yi Guo, Lin National Laboratory of Information Control Technology for Communication System 2. No.36 Research Institute of CETC Zhejiang China Shanghai Acoustic Laboratory Institute of Acoustic Chinese Academy of Science Shanghai China
There many researches about modulation mode classification of the MPSK signals, but these studies pay few attentions to some especial MPSK signals such as OQPSK or pi/4QPSK. However, the signals are very important in ... 详细信息
来源: 评论
Analyzing and correlating security events using state machine
Analyzing and correlating security events using state machin...
收藏 引用
10th IEEE International Conference on Computer and information technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable Computing and communications, ScalCom-2010
作者: Feng, Xuewei Wang, Dongxia Zeng, Jiemei Ma, Guoqing Li, Jin National Key Laboratory of Science and Technology on Information System Security Beijing Institute of System Engineer Beijing 100101 China Beijing Aerospace Control Center Beijing 100296 China
It is unfeasible to analyze the security events by the manual way for the security manager, because the number of the events is huge and the information contained in the events is meaningless. After analyzing the exis... 详细信息
来源: 评论
A variable step size algorithm for blind equalization of QAM signals
A variable step size algorithm for blind equalization of QAM...
收藏 引用
作者: Xue, Wei Yang, Xiaoniu Zhang, Zhaoyang National Laboratory of Information Control Technology for Communication System Jiaxing Zhejiang 314033 China Department of Information Science and Electronic Engineering Zhejiang Uinversity Hangzhou Zhejiang 310027 China
The constant modulus algorithm (CMA) is one widely used algorithm for blind equalization of QAM signals. The algorithm exhibits slow convergence rate and large steady state mean square error and the phase-blind nature... 详细信息
来源: 评论
An approach for design and formal verification of safety-critical software
An approach for design and formal verification of safety-cri...
收藏 引用
2010 International Conference on Computer Application and System Modeling, ICCASM 2010
作者: Ma, Wei-Gang Hei, Xin-Hong School of Computer Science and Engineering Xi'an University of Technology Xi'an Shaanxi 710071 China Key Laboratory of Computer Networks and Information Security Xidian University Ministry of Education Xi'an Shaanxi 710071 China State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing 100044 China
A modeling and verification methodology is presented for railway interlocking system which is regarded as a safety-critical system. The methodology utilizes UML (Unified Modeling Language) to model the function requir... 详细信息
来源: 评论
Properties of Prisoner's Dilemma Game based on genetic algorithm
Properties of Prisoner's Dilemma Game based on genetic algor...
收藏 引用
作者: Wang, Tao Chen, Zhi-Gang Deng, Xiao-Heng Zhagn, Jin School of Information Science and Engineering Center South University Changsha 410083 China School of Computer and Communication Hunan University Changsha 410082 China National Laboratory of Industrial Control Technology Zhejiang University Hangzhou 310027 China
Evolutionary games are widely studied in the fields of biology, sociology, economics and informatics. People's interests focus on how cooperation emerged in a system that individuals are selfish. We studied the it... 详细信息
来源: 评论
Analyzing and Correlating security Events Using State Machine
Analyzing and Correlating Security Events Using State Machin...
收藏 引用
International Conference on Computer and information technology (CIT)
作者: Feng Xuewei Wang Dongxia Zeng Jiemei Ma Guoqing Li Jin National Key Laboratory of Science and Technology on Information System Security Beijing Institute Beijing China Beijing Aerospace Control Center Beijing China
It is unfeasible to analyze the security events by the manual way for the security manager, because the number of the events is huge and the information contained in the events is meaningless. After analyzing the exis... 详细信息
来源: 评论