咨询与建议

限定检索结果

文献类型

  • 805 篇 会议
  • 645 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,451 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 949 篇 工学
    • 520 篇 计算机科学与技术...
    • 406 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 153 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 80 篇 光学工程
    • 78 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 41 篇 安全科学与工程
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 566 篇 理学
    • 285 篇 数学
    • 210 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 167 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 45 篇 医学
    • 37 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 39 篇 feature extracti...
  • 36 篇 deep learning
  • 28 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 semantics
  • 24 篇 accuracy
  • 23 篇 optimization
  • 22 篇 computational mo...
  • 21 篇 cognitive radio
  • 20 篇 security
  • 20 篇 heuristic algori...
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 national mobile ...
  • 19 篇 hubei key labora...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,250 篇 英文
  • 162 篇 其他
  • 40 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1451 条 记 录,以下是781-790 订阅
排序:
Metasurfaces with high-Q resonances governed by topological edge state
收藏 引用
Optics letters 2022年 第7期47卷 1822-1825页
作者: Zhidong Gu Jiaxin Chen Bofeng Gao Wei Wu Zhenyu Zhao Wei Cai Xinzheng Zhang Mengxin Ren Jingjun Xu The Key Laboratory of Weak-Light Nonlinear Photonics Ministry of Education School of Physics and TEDA Applied Physics Institute Nankai University Tianjin 300071 China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin 300308 China Department of Physics Shanghai Normal University Shanghai 200234 China e-mail: weicai@*** e-mail: jjxu@***
Achieving high-quality (Q)-factor resonances in metasurfaces is essential for various applications, including nano-lasers, nonlinear optics, and quantum optics. In this work, we propose a high-Q metasurface using a to... 详细信息
来源: 评论
TranDRL: A Transformer-Driven Deep Reinforcement Learning Enabled Prescriptive Maintenance Framework
arXiv
收藏 引用
arXiv 2023年
作者: Zhao, Yang Yang, Jiaxi Wang, Wenbo Yang, Helin Niyato, Dusit 2 Fusionopolis Way Innovis #08-04 Singapore138634 Singapore Shenzhen Institute for Advanced Study School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Faculty of Mechanical and Electrical Engineering Yunnan Key Laboratory of Intelligent Control and Application Kunming University of Science and Technology Kunming650050 China Department of Information and Communication Engineering Xiamen University Xiamen361005 China School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore
Industrial systems require reliable predictive maintenance strategies to enhance operational efficiency and reduce downtime. Existing studies rely on heuristic models which may struggle to capture complex temporal dep... 详细信息
来源: 评论
EDOLAB: An Open-Source Platform for Education and Experimentation with Evolutionary Dynamic Optimization Algorithms
arXiv
收藏 引用
arXiv 2023年
作者: Peng, Mai Yazdani, Delaram She, Zeneng Yazdani, Danial Luo, Wenjian Li, Changhe Branke, Juergen Nguyen, Trung Thanh Gandomi, Amir H. Yang, Shengxiang Jin, Yaochu Yao, Xin School of Automation China University of Geosciences Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems Engineering Research Center of Intelligent Technology for Geo-Exploration Ministry of Education Wuhan China Research Institute Faculty of Engineering and Technology Liverpool John Moores University United Kingdom School of Computer Science and Technology Harbin Institute of Technology China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies School of Computer Science and Technology Harbin Institute of Technology Peng Cheng Laboratory China School of Artificial Intelligence Anhui University of Sciences & Technology China Information Systems Management and Analytics in Warwick Business School University of Warwick United Kingdom Faculty of Engineering & Information Technology University of Technology Sydney Australia Obuda University Hungary School of Computer Science and Informatics De Montfort University United Kingdom Department of Artificial Intelligence School of Engineering Westlake University China School of Computer Science University of Birmingham United Kingdom
Many real-world optimization problems exhibit dynamic characteristics, posing significant challenges for traditional optimization techniques. Evolutionary Dynamic Optimization Algorithms (EDOAs) are designed to addres... 详细信息
来源: 评论
A Novel eemd-based privacy preserving approach for top-k snps query in genome-wide association studies  6
A Novel eemd-based privacy preserving approach for top-k snp...
收藏 引用
6th IEEE International Conference on control science and Systems Engineering, ICCSSE 2020
作者: Xiaoyun, He Hao, Guo Hongsong, Chen Global Energy Interconnection Research Institute Co Ltd State Grid Key Laboratory of Information Network Security Beijing China University of Science and Technology Beijing School of Computer Communication Engineering Beijing China
Genome-wide association studies (GWAS) have been a popular method for querying Top-k most significant sets of singe-nucleotide polymorphism locations (SNPs) to discover the genetic factors of diseases. Doctors have be... 详细信息
来源: 评论
Radar Sea Clutter Modeling and Reconstruction Based on Statistical Singularity Power Spectrum
Radar Sea Clutter Modeling and Reconstruction Based on Stati...
收藏 引用
IEEE International Conference on Signal and Image Processing (ICSIP)
作者: Gang Xiong Baigang Huang Science and Technology on Communication Information Security Control Lab. Jiaxing China Shanghai Key Lab. for Intelligent Sensing and Recognition SJTU Shanghai China Science and Technology on Communication Information Security Control Laboratory No.36 Research Institute of CETC Jiaxing China
In this paper, the radar clutter reconstruction model based on singularity power spectrum (SPS) and instantaneous singularity exponent (ISE) is proposed. The proposed ISE-SPS model consists of power measure channel an... 详细信息
来源: 评论
Research on the Construction of a Novel Cyberspace security Ecosystem
收藏 引用
Engineering 2018年 第1期4卷 47-52页
作者: Xiao-Niu Yang Wei Wang Xiao-Feng Xu Guo-Rong Pang Chun-Lei Zhang Science and Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang 314033 China Science and Technology on Electro-Optical Information Security Control Laboratory Tianfin 300300 China
Given the challenges facing the cyberspace of the nation, this paper presents the tripartite theory of cyberspace, based on the status quo of cyberspace. Corresponding strategies and a research architecture are propos... 详细信息
来源: 评论
Code Similarity Detection Technique Based on AST Unsupervised Clustering Method
Code Similarity Detection Technique Based on AST Unsupervise...
收藏 引用
International Conference on Computer and communications (ICCC)
作者: Yifan Xie Wenan Zhou Huamiao Hu Zhicheng Lu Mengyuan Wu School of Computer Science Beijing University of Posts and Telecommunications Beijing China Science and Technology on Communication Information Security Control Laboratory Beijing China
Code similarity detection is one of the important means to maintain the healthy development of the software eco-environment. Early code similarity detection method is mainly based on the code attribute measurement tec... 详细信息
来源: 评论
Prediction of exosomal piRNAs based on deep learning for sequence embedding with attention mechanism
Prediction of exosomal piRNAs based on deep learning for seq...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yajun Liu Yulian Ding Aimin Li Rong Fei Xie Guo Fangxiang Wu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China Division of Biomedical Engineering University of Saskatchewan Saskatoon Canada Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an University of Technology Xi'an China Department of Computer Science Department of Mechanical Engineering Division of Biomedical Engineering University of Saskatchewan Saskatoon Canada
PIWI-interacting RNAs (piRNAs) are a type of small non-coding RNAs which bind with the PIWI proteins to exert biological effects in various regulatory mechanisms. A growing amount of evidence reveals that exosomal piR... 详细信息
来源: 评论
A Deep Exploration of BitLocker Encryption and security Analysis
A Deep Exploration of BitLocker Encryption and Security Anal...
收藏 引用
International Conference on communication technology (ICCT)
作者: Cheng Tan Lijun Zhang Liang Bao Science and Technology on Communication Security Laboratory Chengdu Key Lab of Information Network Security Ministry of Public Security Shanghai China
Due to the popularity of Windows system, BitLocker is widely used as a built-in disk encryption tool. As a commercial application, the design of BitLocker has to consider a capability of disaster recovery, which helps... 详细信息
来源: 评论
Parallel in-memory wireless computing
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Cong Ruan, Gong-Jie Yang, Zai-Zheng Yangdong, Xing-Jian Li, Yixiang Wu, Liang Ge, Yingmeng Zhao, Yichen Pan, Chen Wei, Wei Wang, Li-Bo Cheng, Bin Zhang, Zaichen Zhang, Chuan Liang, Shi-Jun Miao, Feng Institute of Brain-inspired Intelligence National Laboratory of Solid State Microstructures School of Physics Collaborative Innovation Center of Advanced Microstructures Nanjing University Nanjing China National Mobile Communications Research Laboratory Southeast University Frontiers Science Center for Mobile Information Communication and Security Southeast University Purple Mountain Laboratories Nanjing China Institute of Interdisciplinary Physical Sciences School of Science Nanjing University of Science and Technology Nanjing China Nanjing Drum Tower Hospital The Affiliated Hospital of Nanjing University Medical School Nanjing China
Parallel wireless digital communication with ultralow power consumption is critical for emerging edge technologies such as 5G and Internet of Things. However, the physical separation between digital computing units an... 详细信息
来源: 评论