咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1455 条 记 录,以下是1131-1140 订阅
排序:
Cognitive radio adaptation for power consumption minimization using biogeography-based optimization
收藏 引用
Chinese Physics B 2016年 第12期25卷 499-506页
作者: 齐佩汉 郑仕链 杨小牛 赵知劲 School of Telecommunications Engineering Xidian University Xi'an 710071 China Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033 China School of Telecommunications Hangzhou Dianzi University Hangzhou 310018 China
Adaptation is one of the key capabilities of cognitive radio, which focuses on how to adjust the radio parameters to optimize the system performance based on the knowledge of the radio environment and its capability a... 详细信息
来源: 评论
A Vehicular Positioning Enhancement with Connected Vehicle Assistance Using Extended Kalman Filtering  1st
A Vehicular Positioning Enhancement with Connected Vehicle A...
收藏 引用
1st International Conference on 5G for Future Wireless Networks, 5GWN 2017
作者: Tian, Daxin Liu, Wenhao Duan, Xuting Rong, Hui Guo, Peng Wang, Wenyang Zhang, Haijun Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University XueYuan Road No. 37 Beijing100191 China China Automotive Technology and Research Center Automotive Engineering Research Institute East Xianfeng Road No. 68 Tianjin300300 China School of Computer and Communication Engineering University of Science and Technology Beijing XueYuan Road No. 30 Beijing100083 China Beijing Key Laboratory for Cooperative Vehicle Infrastructure Systems and Safety Control School of Transportation Science and Engineering Beihang University XueYuan Road No. 37 Beijing100191 China Jiangsu Province Collaborative Innovation Center of Modern Urban Traffic Technologies Si Pai Lou. 2 Nanjing210096 China Key Lab of Urban ITS Technology Optimization and Integration The Ministry of Public Security of China Hefei230088 China
In this paper, we consider the problem of vehicular positioning enhancement with emerging connected vehicles (CV) technologies. In order to actually describe the scenario, the Interacting Multiple Model (IMM) filter i... 详细信息
来源: 评论
REFF: REliable and Fast Forwarding in Vehicular Ad-hoc Network  1st
REFF: REliable and Fast Forwarding in Vehicular Ad-hoc Netwo...
收藏 引用
1st International Conference on 5G for Future Wireless Networks, 5GWN 2017
作者: Tian, Daxin Dai, Ziyi Zheng, Kunxian Zhou, Jianshan Duan, Xuting Guo, Peng Rong, Hui Wang, Wenyang Zhang, Haijun Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University XueYuan Road No. 37 Beijing100191 China China Automotive Technology and Research Center Automotive Engineering Research Institute East Xianfeng Road No. 68 Tianjin300300 China School of Computer and Communication Engineering University of Science and Technology Beijing XueYuan Road No. 30 Beijing100083 China Beijing Key Laboratory for Cooperative Vehicle Infrastructure Systems and Safety Control School of Transportation Science and Engineering Beihang University XueYuan Road No. 37 Beijing100191 China Jiangsu Province Collaborative Innovation Center of Modern Urban Traffic Technologies Si Pai Lou. 2 Nanjing210096 China Key Lab of Urban ITS Technology Optimization and Integration The Ministry of Public Security of China Hefei230088 China
Vehicular Ad-Hoc Network (VANET) has emerged as an increasingly dominant technology for future connected vehicle and vehicular networks, where the focus of the development of VANET lies in the standardization of messa... 详细信息
来源: 评论
Modeling and Simulation on Cooperative Movement of Vehicle Group Based on the Behavior of Fish  1st
Modeling and Simulation on Cooperative Movement of Vehicle G...
收藏 引用
1st International Conference on 5G for Future Wireless Networks, 5GWN 2017
作者: Tian, Daxin Kang, Lu Zheng, Kunxian Duan, Xuting Rong, Hui Guo, Peng Wang, Wenyang Zhang, Haijun Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University XueYuan Road No.37 Beijing100191 China China Automotive Technology and Research Center Automotive Engineering Research Institute East Xianfeng Road No.68 Tianjin300300 China School of Computer and Communication Engineering University of Science and Technology Beijing XueYuan Road No.30 Beijing100083 China Beijing Key Laboratory for Cooperative Vehicle Infrastructure Systems and Safety Control School of Transportation Science and Engineering Beihang University XueYuan Road No.37 Beijing100191 China Jiangsu Province Collaborative Innovation Center of Modern Urban Traffic Technologies Si Pai Lou. 2 Nanjing210096 China Key Lab of Urban ITS Technology Optimization and Integration The Ministry of Public Security of China Hefei230088 China
Fatigue driving might affect the traffic safety when the vehicles are on the cruising state in highway. Trying to solve this problem, this paper uses the movement pattern of the fish to the vehicles fleet, and develop... 详细信息
来源: 评论
Pupillary Reactivity to Non-Photorealistic Rendering: A Case Study of Immersion in 3D Cinema
Pupillary Reactivity to Non-Photorealistic Rendering: A Case...
收藏 引用
International Conference on 3D Imaging (IC3D)
作者: Victor FAJNZYLBER Samuel MADARIAGA Rafael DEL VILLAR Pedro MALDONADO Diego Vargas Aria SERRA Milan MAGDICS Mateu SBERT Communication and Imaging Institute University of Chile Departamento de Neurociencia & Biomedical Neuroscience Institute University of Chile National School of Higher Studies Campus Morelia National Autonomous University of Mexico Institute of Informatics and Applications & Graphics and Imaging Laboratory Girona University Department of Control Engineering and Information Technology Budapest University of Technology and Economics School of Computer Science and Technology Tianjin University
The aim of our research is to build an empirical indicator of cinematic immersion based on ocular data. We study immersion as a gradual and adaptive process of corporal involvement in the cinematic experience. To stud... 详细信息
来源: 评论
Big-data analysis of multi-source logs for anomaly detection on network-based system
Big-data analysis of multi-source logs for anomaly detection...
收藏 引用
IEEE International Conference on Automation science and Engineering (CASE)
作者: Zhanpei Jia Chao Shen Xiao Yi Yufei Chen Tianwen Yu Xiaohong Guan Xi'an Jiaotong University Xi'an Shaanxi CN Control Laboratory MOE Key Laboratory for Intelligent Networks and Network Security and Science and Technology on Electronic Information
Log data are important audit basis to record routine events occurring on computer or network system, which are also critical data source for detecting system anomalies. By analyzing the data from multi-source logs, it... 详细信息
来源: 评论
HRPGAN: A GAN-based Model to Generate High-resolution Remote Sensing Images
收藏 引用
IOP Conference Series: Earth and Environmental science 2020年 第1期428卷
作者: Hai Sun Ping Wang Yifan Chang Li Qi Hailei Wang Dan Xiao Cheng Zhong Xuelian Wu Wenbo Li Bingyu Sun China Telecom Shanghai Ideal Information Industry (Group) Co. Ltd Shanghai China Department of Airborne Remote Sensing National Disaster Reduction Center of China Beijing China Institute of Technology Innovation Hefei Institute of Physical Science Chinese Academy of Sciences Hefei China The Third Research Institute of the Ministry of Public Security Shanghai China Guizhou Key Laboratory of Economics System Simulation Guizhou University of Finance and Economics Guiyang China Beijing Aerospace Flight Control Center Beijing China Institute of Intelligent Machines Chinese Academy of Sciences Hefei China
Generative adversarial networks (GAN) has been mainly used in the generation of natural images such as MNIST, CIFAR10 as well as Imagenet datasets and achieves satisfying generation results. However, GAN always fails ...
来源: 评论
A secure and high-performance multi-controller architecture for software-defined networking
收藏 引用
Frontiers of information technology & Electronic Engineering 2016年 第7期17卷 634-646页
作者: Huan-zhao WANG Peng ZHANG Lei XIONG Xin LIU Cheng-chen HU Department of Computer Science and Technology Xi'an Jiaotong UniversityXi'an 710059China Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory Shijiazhuang 050081China MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong UniversityXi'an 710049China
controllers play a critical role in software-defined networking(SDN).However,existing singlecontroller SDN architectures are vulnerable to single-point failures,where a controller's capacity can be saturated by fl... 详细信息
来源: 评论
Weak value amplification via second-order correlated technique
收藏 引用
Chinese Physics B 2016年 第2期25卷 58-61页
作者: 崔挺 黄靖正 刘翔 曾贵华 State Key Laboratory of Advanced Optical Communication Systems and Networks Shanghai Key Laboratory on Navigation and Location-based Serviceand Center of Quantum Information Sensing and Processing Shanghai Jiao Tong University Shanghai Key Laboratory of Aerospace Intelligent Control Technology Shanghai Institute of Spaceflight Control Technology College of Information Science and Technology Northwest University
We propose a new framework combining weak measurement and second-order correlated technique. The theoretical analysis shows that weak value amplification (WVA) experiment can also be implemented by a second-order co... 详细信息
来源: 评论
Semi-fragile watermarking for image authentication based on compressive sensing
收藏 引用
science China(information sciences) 2016年 第5期59卷 248-250页
作者: Ling DU Xiaochun CAO Wei ZHANG Xinpeng ZHANG Na LIU Jianguo WEI School of Computer Science and Technology Tianjin University School of Computer Shenyang Aerospace University State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences School of Communication and Information Engineering Shanghai University
Dear editor,With the aid of sophisticated photoediting software,multimedia content security is becoming increasingly prominent[1,2].The problems of verifying the integrity and recovering the alterations have been a ma... 详细信息
来源: 评论