咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1455 条 记 录,以下是1421-1430 订阅
排序:
A variable step size blind equalization algorithm for QAM signals
A variable step size blind equalization algorithm for QAM si...
收藏 引用
International Conference on Microwave and Millimeter Wave technology Proceedings
作者: Xue Wei Yang Xiaoniu Zhang Zhaoyang Department of Information Science and Electronic Engineering University of Zhejiang Hangzhou Zhejiang China National Laboratory of Information Control Technology for Communication System Jiaxing Zhejiang China
The constant modulus algorithm (CMA) is one widely used algorithm for blind equalization of quadrature amplitude modulation (QAM) signals. The algorithm exhibits slow convergence rate and large steady state mean squar... 详细信息
来源: 评论
Recognition and Parameter Estimation of MPSK Signals Based on Instantaneous Phase Difference
Recognition and Parameter Estimation of MPSK Signals Based o...
收藏 引用
International Conference on Wireless communications, Networking and Mobile Computing (WiCom)
作者: Chunyun Song Yi Zhan Lin Guo Control Technology of Communication System No.36 Research Institute of CETC National Laboratory for Information Science and Technology Zhejiang China Shanghai Acoustic Laboratory Institute of Acoustic Chinese Academy and Sciences Shanghai China
There many researches about modulation mode classification of the MPSK signals, but these studies pay few attentions to some especial MPSK signals such as OQPSK or π/4QPSK. However, the signals are very important in ... 详细信息
来源: 评论
A model checking approach for solving epistemic riddles
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2010年 第3期33卷 406-413页
作者: Luo, Xiang-Yu Su, Kai-Le Gu, Ming Key Laboratory of Security for Information System of Ministry of Education School of Software Tsinghua University Beijing 100084 China School of Computer and Control Guilin University of Electronic Technology Guilin Guangxi 541004 China School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
This paper aims to model and solve the Sum and Product Riddle in public announcement logic. A dynamic epistemic model is proposed, that is the linear temporal combination of the epistemic model of environment and the ... 详细信息
来源: 评论
A Carrier Recovery Algorithm for High Order QAM Signals
A Carrier Recovery Algorithm for High Order QAM Signals
收藏 引用
International Conference on Wireless communications, Networking and Mobile Computing (WiCom)
作者: Wei Xue Xiaoniu Yang Zhaoyang Zhang Department of Information Science and Electronic Engineering Zhejiang Uinversity Hangzhou Zhejiang China National Laboratory of Information Control Technology for Communication System Jiaxing Zhejiang China Dept. of Inf. Sci. & Electron. Eng. Zhejiang Uinversity Hangzhou China
The carrier recovery is one key technique in the demodulation of high order quadrature amplitude modulation (QAM) signals. A carrier recovery algorithm which switches between multi-threshold polarity decision mode and... 详细信息
来源: 评论
Properties of Prisoner's Dilemma Game based on genetic algorithm
Properties of Prisoner's Dilemma Game based on genetic algor...
收藏 引用
Chinese control Conference (CCC)
作者: Tao Wang Zhi-Gang Chen Xiao-Heng Deng Jin Zhagn School of Computer and Communication Hunan University Changsha P.R.China School of Information Science and Engineering Center South University Changsha P.R.China National Laboratory of Industrial Control Technology Zhejiang University Hangzhou P.R.China
Evolutionary games are widely studied in the fields of biology, sociology, economics and informatics. People's interests focus on how cooperation emerged in a system that individuals are selfish. We studied the it... 详细信息
来源: 评论
Threshold Quantum Secret Sharing of Secure Direct communication
收藏 引用
Chinese Physics Letters 2009年 第1期26卷 21-24页
作者: 李宝奎 杨宇光 温巧燕 Department of Automatic Control School of Information Science and Technology Beijing Institute of Technology Beijing 100081 College of Computer Science and Technology Beijing University of Technology Beijing 100124 State Key Laboratory of Integrated Services Network Xidian University Xi'an 710071 State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876
We propose a (L, n)-threshold quantum secret sharing protocol of secure direct communication following some ideas of Zhang's protocol [Phys. Lett. A 342 (2005) 60] and Tokunaga et al.'s protocol [Phys. Rev. A 71... 详细信息
来源: 评论
Ear Detection Based on Arc-Masking Extraction and AdaBoost Polling Verification
Ear Detection Based on Arc-Masking Extraction and AdaBoost P...
收藏 引用
International Conference on Intelligent information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Hao-Chung Shih Chian C. Ho Hsuan T. Chang Chin-Song Wu Department of Electrical Engineering National Yunlin University of Science and Technology Yunlin Taiwan Information & Communication Security Laboratory Chunghwa Telecom Laboratories Taoyuan Taiwan
This paper proposes a simple but practical 2D ear detection algorithm based on arc-masking candidate extraction and AdaBoost polling verification. In the first half phase of the proposed ear detection algorithm, a few... 详细信息
来源: 评论
Calculating Minimum Buffer Requirement of Constant Rate Transmission Scheme Based on SVM
Calculating Minimum Buffer Requirement of Constant Rate Tran...
收藏 引用
International Conference on Computer and information technology (CIT)
作者: Zilei Wang Hongsheng Xi Guo Wei Key Laboratory of Network Communication System and Control Chinese Academy of Sciences University of Science and Technology Hefei Anhui China Department of Electronic Engineering and Information Science USTC Hefei Anhui China
Constant rate transmission and transport (CRTT) is an effective bandwidth smoothing scheme resulting in one fixed rate during the whole duration of variable bit-rate video, which, however, needs a large client buffer ... 详细信息
来源: 评论
Subspace Semi-supervised Fisher Discriminant Analysis
收藏 引用
自动化学报 2009年 第12期35卷 1513-1519页
作者: YANG Wu-Yi LIANG Wei XIN Le ZHANG Shu-Wu Hi-tech Innovation Center Institute of Automation Chinese Academy of Sciences Beijing 100190 P.R. China Key Laboratory of Underwater Acoustic Communication and Marine Information Technology of the Minister of Education Xiamen University Xiamen 361005 P. R. China College of Oceanography and Environmental Science Xiamen University Xiamen 361005 P. R. China School of Electronics Information and Control Engineering Beijing University of Technology Beijing 100124 P. R. China
Fisher discriminant analysis (FDA) is a popular method for supervised dimensionality reduction. FDA seeks for an embedding transformation such that the ratio of the between-class scatter to the within-class scatter is... 详细信息
来源: 评论
Subspace Semi-supervised Fisher Discriminant Analysis
收藏 引用
Acta Automatica Sinica 2009年 第12期35卷 1513-1519页
作者: Wu-Yi YANG Wei LIANG Le XIN Shu-Wu ZHANG Hi-tech Innovation Center Institute of Automation Chinese Academy of Sciences Beijing 100190 P. R. China Key Laboratory of Underwater Acoustic Communication and Marine Information Technology of the Minister of Education Xiamen University Xiamen 361005 P. R. China College of Oceanography and Environmental Science Xiamen University Xiamen 361005 P. R. China School of Electronics Information and Control Engineering Beijing University of Technology Beijing 100124 P. R. China
Fisher discriminant analysis (FDA) is a popular method for supervised dimensionality reduction. FDA seeks for an embedding transformation such that the ratio of the between-class scatter to the within-class scatter is... 详细信息
来源: 评论