咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1455 条 记 录,以下是221-230 订阅
排序:
Cooperative Local Path Planning for Multi-unmanned Vehicles Formation Using the Enhanced Artificial Potential Field  3rd
Cooperative Local Path Planning for Multi-unmanned Vehicles...
收藏 引用
3rd International Conference on Autonomous Unmanned Systems, ICAUS 2023
作者: Zhang, Xin Duan, Xuting Zhou, Jianshan Zhang, Long Opening Project of Key Laboratory of Operation Safety Technology on Transport Vehicles Ministry of Transport PRC Beijing China School of Transportation Science and Engineering Beihang University Beijing China State Key Lab of Intelligent Transportation System Beijing China Beijing Key Laboratory for Cooperative Vehicle Infrastructure Systems and Safety Control Beijing China Zhongguancun Laboratory Beijing China National Key Laboratory of Science and Technology on Information System Security Institute of Systems Engineering Beijing China
An enhanced approach utilizing APF(artificial potential field) method is introduced in this paper. By adopting this approach, the challenge of local minima that may occur when dealing with local path planning for unma... 详细信息
来源: 评论
Research on NER model for coal mine safety hazards based on BERT-CNN-BiGRUs-CRF  5
Research on NER model for coal mine safety hazards based on ...
收藏 引用
5th International Conference on Artificial Intelligence and Computer science, AICS 2023
作者: Ma, Li Yang, Fan Dai, Xinguan Gao, Hangbiao Song, Shuang College of Communication and Information Engineering Xi’an University of Science and Technology Shaanxi Xi’an710054 China Xi’an Key Laboratory of Heterogeneous Network Convergence Communication Xi’an710054 China Safety Supervision Division of Shaanxi Cuijiagou Energy Co. Ltd. Shaanxi Tongchuan727000 China College of Security Science and Engineering Xi’an University of Science and Technology Shaanxi Xi’an710054 China
During the coal mine safety production process, a significant amount of text data containing information about coal mine safety hazards, such as working face, hazard location, hazard subject, and hazard problem descri... 详细信息
来源: 评论
Knowledge-Aided Covariance Matrix Estimation Algorithm Based on Geometric Mean in STAP for Airborne Radar
Knowledge-Aided Covariance Matrix Estimation Algorithm Based...
收藏 引用
IET International Radar Conference 2023, IRC 2023
作者: Jing, Yang Du, Xiaolin Cui, Guolong Zheng, Jibin Li, Jianbo School of Computer and Control Engineering Yantai University Yantai China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China National Key Laboratory of Radar Signal Processing Xidian University Xi'an China School of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China
The problem of knowledge-aided (KA) covariance matrix estimation in airborne radar space-time adaptive processing (STAP) is studied in this paper. In the traditional KA covariance matrix estimation methods, the insuff... 详细信息
来源: 评论
Protected Fair Secret Sharing Based Bivariate Asymmetric Polynomials in Satellite Network
收藏 引用
Computers, Materials & Continua 2022年 第9期72卷 4789-4802页
作者: Yanyan Han Jiangping Yu Guangyu Hu Chenglei Pan Dingbang Xie Chao Guo Abdul Waheed Department of Electronics and Communication Engineering Beijing Electronics Science and Technology InstituteBeijing100070China State Key Laboratory of Integrated Services Networks Xidian UniversityXi’an710126China Department of Cryptography and Technology Beijing Electronics Science and Technology InstituteBeijing100070China Department of Cyberspace Security Beijing Electronic Science and Technology InstituteBeijing100070China School of Communication Engineering Xidian UniversityXi’an710126China Institute of Information Engineering Chinese Academy of SciencesBeijing100093China University of Management Technology Lahore-Pakistan55300Pakistan
Verifiable secret sharing mainly solves the cheating behavior between malicious participants and the ground control center in the satellite *** verification stage can verify the effectiveness of secret shares issued b... 详细信息
来源: 评论
Review of X-ray pulsar spacecraft autonomous navigation
收藏 引用
Chinese Journal of Aeronautics 2023年 第10期36卷 44-63页
作者: Yidi WANG Wei ZHENG Shuangnan ZHANG Minyu GE Liansheng LI Kun JIANG Xiaoqian CHEN Xiang ZHANG Shijie ZHENG Fangjun LU College of Aerospace Science and Engineering National University of Defense TechnologyChangsha 410073China Key Laboratory of Particle Astrophysics Institute of High Energy PhysicsChinese Academy of SciencesBeijing 100049China University of Chinese Academy of Sciences Chinese Academy of SciencesBeijing 100049China Beijing Institute of Control Engineering Beijing 100080China Beijing Institute of Tracking and Communication Technology Beijing 100091China Aerospace Information Research Institute Chinese Academy of ScienceBeijing 100091China Academy of Military Science Beijing 100091China National Innovation Institute of Defense Technology Academy of Military ScienceBeijing 100091China
This article provides a review on X-ray pulsar-based navigation(XNAV).The review starts with the basic concept of XNAV,and briefly introduces the past,present and future projects concerning *** paper focuses on the ad... 详细信息
来源: 评论
Blind identification of MIMO Space-Time Block Codes Based on Convolutional Neural Network  21
Blind identification of MIMO Space-Time Block Codes Based on...
收藏 引用
Proceedings of the 7th International Conference on communication and information Processing
作者: Conglin Pan Si Chen Huijie Zhu Wei Wu Jiachuan Qian Lijun Wang Science and Technology on Communication Information Security Control Laboratory No.36 Research Institute of CETC China and School of Electronic and Optical Engineering Nanjing University of Science and Technology China Science and Technology on Communication Information Security Control Laboratory No.36 Research Institute of CETC China
Aiming at the blind identification of space-time block codes (STBC) in multiple input multiple output (MIMO) system, this paper proposes a new convolutional neural network (CNN-N) to realize the blind identification. ... 详细信息
来源: 评论
Research on Secure communication Methods for High-Speed Cross-Network Data Exchange  4
Research on Secure Communication Methods for High-Speed Cros...
收藏 引用
4th International Conference on Electronic information Engineering and Computer communication, EIECC 2024
作者: Zhang, Yao Chen, Yitao Fei, Jiujiang Peng, Guojun Su, Rong Ministry of Education School of Cyber Science and Engineering Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Hubei Wuhan430072 China Wuhan Maritime Communication Research Institute Hubei Wuhan430205 China Wuhan Railway Vocational College of Technology Hubei Wuhan430200 China
This paper introduces the application requirements for high-speed secure communication across networks, the fundamental principles of cross-network data exchange, and its implementation. Based on high-speed switch tec... 详细信息
来源: 评论
Seamless Decision-Making in the Big Data Era: A Modular Approach to Integrating IoT, Cloud Computing, and Data Lakes  4
Seamless Decision-Making in the Big Data Era: A Modular Appr...
收藏 引用
4th International Conference on Electrical, communication and Computer Engineering, ICECCE 2023
作者: Zemmouri, Mohamed Laalam, Fatma Zohra Kazar, Okba Himeur, Yassine Oulefki, Adel Toumi, Chahrazad Mansoor, Wathiq Attala, Shadi Artificial intelligence and Information Technologies Laboratory Faculty of New Information and Communication Technologies Kasdi Merbah Ouargla University Ouargla30000 Algeria College of Engineering and Information Technology University of Dubai Dubai United Arab Emirates Department of Computer Science University of Sharjah Sharjah United Arab Emirates Mohamed Khider University Department of Computer Science LINFI Laboratory Biskra07000 Algeria United Arab Emirate University Department of Information Systems and Security College of Information Technology Abu Dhabi United Arab Emirates
The integration of big data with cutting-edge technologies like IoT and Cloud Computing has profoundly influenced various aspects of modern life, including everyday service processes. To facilitate data-driven decisio... 详细信息
来源: 评论
Evolutionary Multitasking Based on Team Learning Strategy  6
Evolutionary Multitasking Based on Team Learning Strategy
收藏 引用
6th Asian Conference on Artificial Intelligence technology, ACAIT 2022
作者: Li, Wei Xu, Qingzheng Gao, Xinyu Wang, Lei Xi'an University of Technology School of Computer Science and Engineering Xi'an China National University of Defense Technology College of Information and Communication Wuhan China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Multi-factorial optimization (MFO) is a popular optimization mechanism recently, which aims to optimize multiple tasks in a single run. Generally, the multi-factorial optimization algorithm uses the random learning st... 详细信息
来源: 评论
Mainlobe DRFM Jamming Suppression via Blind Source Separation Using Tensor Decomposition
Mainlobe DRFM Jamming Suppression via Blind Source Separatio...
收藏 引用
IEEE International Conference on Signal and Image Processing (ICSIP)
作者: Luxin Dong Bing Wang Bunian Pan Yukai Kong Xianxiang Yu Guolong Cui School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China Science and Technology on Electronic Information Control Laboratory Chengdu China
This paper deals with the suppression problem of mainlobe digital radio frequency memory (DRFM) jamming especially for intra-pulse slice forwarding jamming for phased array radar. A novel mainlobe DRFM jamming suppres...
来源: 评论