咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1455 条 记 录,以下是1211-1220 订阅
排序:
A kind of better adjacent channel suppression multiple frequency shift keying signal simulation method based on MATLAB
A kind of better adjacent channel suppression multiple frequ...
收藏 引用
International Conference on communication technology (ICCT)
作者: Huan Li Wenhua Ye No.36 Research Institute of CETC Jiaxing Zhejiang China 2Science Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang China
Frequency shift keying (FSK) modulation function in MATLAB without filter function, leading to poor adjacent channel suppression, which causes aliasing after a non-linear device easily. Based on FSK modulation signal ... 详细信息
来源: 评论
Fast multi-level connected component labeling for large-scale images
Fast multi-level connected component labeling for large-scal...
收藏 引用
International Conference on Optoelectronics and Microelectronics (ICOM)
作者: Yuhai Li Science and Technology on Electro-Optical Information Security Control Laboratory Sanhe Hebei P.R.China
Connected component (CC) labeling is time consuming during image segmentation and object identification, especially when input images are large-scale and binary converting uses multi-threshold. So in this paper, we pr... 详细信息
来源: 评论
Experimental studies on beam quality-improving of 8μm ZGP optical parametric oscillator
Experimental studies on beam quality-improving of 8μm ZGP o...
收藏 引用
International Conference on Optoelectronics and Microelectronics (ICOM)
作者: Kuaikuai Yu Zhiqiang Liang Xiusheng Yan Science and Technology on Electro-Optical Information Security Control Laboratory Sanhe Hebei P. R. China
We report on experimental studies on the beam quality of the 8μm ZGP optical parametric oscillator(OPO). Through conducting a series of comparative experiments, the effects of resonator length, type of phase matching... 详细信息
来源: 评论
Power control algorithm based on dynamic particle swarm optimization in cognitive radio networks
收藏 引用
Journal of Computational information Systems 2015年 第8期11卷 2863-2872页
作者: Chen, Lingling Zhao, Xiaohui Key Laboratory of Information Science College of Communication Engineering Jilin University Changchun China College of Information and Control Engineering Jilin Institute of Chemical Technology Jilin China
Most resource allocation algorithms are based on perfect channel and constant system parameters information in cognitive radio networks (CRNs). In order to adapt real communication environment, a dynamic particle swar... 详细信息
来源: 评论
Distributed power control algorithm in multiuser cognitive radio networks for minimizing interference to primary user
收藏 引用
Journal of Computational information Systems 2015年 第5期11卷 1799-1808页
作者: Chen, Lingling Zhao, Xiaohui Key Laboratory of Information Science College of Communication Engineering Jilin University Changchun China College of Information and Control Engineering Jilin Institute of Chemical Technology Jilin China
In order to guarantee quality of service (QoS) for secondary users (SUs) and primary users (PUs) in underlay cognitive radio networks (CRNs), the objective of this paper is to obtain minimum interference power to PUs ... 详细信息
来源: 评论
Low-Rank Tensor Constrained Multiview Subspace Clustering
Low-Rank Tensor Constrained Multiview Subspace Clustering
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Changqing Zhang Huazhu Fu Si Liu Guangcan Liu Xiaochun Cao School of Computer Science and Technology Tianjin University Institute for Infocomm Research Technology and Research Singapore State Key Laboratory of Information Security Chinese Academy of Sciences School of Information and Control Nanjing University of Information Science and Technology
In this paper, we explore the problem of multiview subspace clustering. We introduce a low-rank tensor constraint to explore the complementary information from multiple views and, accordingly, establish a novel method... 详细信息
来源: 评论
On the equivalence of LBlock and TWINE in structure
On the equivalence of LBlock and TWINE in structure
收藏 引用
International Conference on communications and Networking in China (CHINACOM)
作者: Zhen Ju Peiyuan Liu Weijia Xue Daoguang Mu Xuejia Lai Science and Technology on Communication Security Laboratory Chengdu China College of Information Security Shanghai Jiao Tong University China Department of Computer Science and Engineering Shanghai Jiao Tong University China
Feistel structure is widely used in the design of block ciphers. With many Feistel-type ciphers being designed, it is likely for some of them to have some similarity which can be shown in their differential characteri... 详细信息
来源: 评论
Software design for high-speed data capture
Software design for high-speed data capture
收藏 引用
2014 2nd International Conference on Mechatronics, Robotics and Automation, ICMRA 2014
作者: Zhang, Wei Feng Science and Technology on Communication Information Security Control Laboratory Jiangnan Electronic Communication Institute Jiaxing Zhejiang China
10G Ethernet technology has been widely used in modern high speed communication system. As a result, program design for high-speed data capture on 10G Ethernet, as the first and important step in network monitor and a... 详细信息
来源: 评论
Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks  14th
Cooperative Transmission Against Impersonation Attack Using ...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and communications (TrustCom)
作者: Weidong Yang Le Xiao Limin Sun Qing Li Key Laboratory of Grain Information Processing and Control Ministry of Education Henan University of Technology Zhenzhou China College of Information Science and Engineering Henan University of Technology Zhenzhou China Beijing Key Laboratory of IOT information security technology Institute of Information Engineering Beijing China
The authentication error in Two-Hop wireless networks is considered without knowledge of eavesdropper channels and location. This paper presents an eavesdropper model with authentication error and two eavesdropping wa... 详细信息
来源: 评论
Anonymous aggregator election protocol for wireless sensor networks
收藏 引用
Tongxin Xuebao/Journal on communications 2015年 第2期36卷
作者: Fu, Shuai Ma, Jian-Feng Li, Hong-Tao Jiang, Qi School of Computer Science and Technology Xidian University Xi'an710071 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China
An anonymous cluster head election protocol in clustered wireless sensor networks was proposed. The protocol detailed the decision rules and mode of cluster construction while an anonymous veto protocol based on bilin... 详细信息
来源: 评论