咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1455 条 记 录,以下是1221-1230 订阅
排序:
The review of new NDT methods of metal material fatigue monitoring
收藏 引用
International Journal of Hybrid information technology 2015年 第8期8卷 225-232页
作者: Dong, Jingwei Wu, Qijian Jiang, Wenwen Xu, Qi School of Measure-Control Technology Communication Engineering Harbin China University of Science and Technology Higher educational key laboratory for Signal and Information Processing HarbinHeilongjiang China
Non-destructive testing (NDT) techniques have been employed in all kinds of fields successfully for many years. Newly developed and applied NDT methods of detecting and monitoring fatigue crack in metal material are r... 详细信息
来源: 评论
A space-time diversity scheme for interference alignment in uplink cellular systems
收藏 引用
Journal of information and Computational science 2015年 第16期12卷 6177-6185页
作者: Zhang, Jinbo Yuan, Chaowei Wang, Qiucai Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory The 54th Research Institute of CETC Shijiazhuang China School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China School of Electronic and Control Engineering Chang'an University Xi'an China
Interference Alignment (IA) can effectively increase Degrees-of-freedom (DOF) for cellular systems. In order to improve the Bit Error Rate (BER) performance, we propose a space-time diversity scheme for IA in uplink c... 详细信息
来源: 评论
A security routing protocol of ad hoc network based on node trust evalution
A security routing protocol of ad hoc network based on node ...
收藏 引用
2014 International Conference on information and Network security, ICINS 2014
作者: Li, Yahui Yang, Hongwa Xie, Fei Science and technology on communication information security control laboratory Jiaxing China Northern electronic instrument institute Beijing China
The routing protocol is the core of the Ad Hoc network protocols, which largely determines the performance and features of an Ad Hoc network. Aiming at the characteristics of the Mobile Radio Ad Hoc network, this pape... 详细信息
来源: 评论
The improved neural network algorithm of license plate recognition
International Journal of Signal Processing, Image Processing...
收藏 引用
International Journal of Signal Processing, Image Processing and Pattern Recognition 2015年 第5期8卷 49-54页
作者: Dong, Jingwei Sun, Meiting Liang, Gengrui Jin, Kui School of Measure-Control Technology and Communication Engineering The higher educational key laboratory for Signal and Information Processing of Heilongjiang Province Harbin University of Science and Technology Harbin China School of Electric and Electronic Engineering Harbin University of Science and Technology Harbin China
With high definition cameras are widely used in urban traffic monitoring, the resolution of vehicle and traffic monitoring image rises. As the main component of intelligent traffic system, the vehicle license plate re... 详细信息
来源: 评论
The identification algorithm of network key role based on behavior accumulation  10
The identification algorithm of network key role based on be...
收藏 引用
10th International Conference on Wireless communications, Networking and Mobile Computing, WiCOM 2014
作者: Xu, Xiaofeng Li, Xiao Science and Technology on Communication Information Security Control Laboratory Jiaxing China Chinese Electronic Technology Group Corporation No.36 Institute Jiaxing China
Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulati... 详细信息
来源: 评论
Study on the radiation of laser induced air plasma  31
Study on the radiation of laser induced air plasma
收藏 引用
31st General Assembly and Scientific Symposium of the International Union of Radio science, URSI GASS 2014
作者: Xin, Liu Biyi, Wang Wanli, Zhao Shanghong, Guan Xiusheng, Yan Science and Technology on Electro-Optical Information Security Control Laboratory Sanhe Hebei China
This paper details the radiation of laser induced air plasma. The plasma was produced by interacting the air with the Nd: YGA laser focused with optical lens. The relationship between spectrum of laser - induced air p... 详细信息
来源: 评论
26th Annual Computational Neuroscience Meeting (CNS*2017) of the Organization for Computational Neuroscience Antwerp, Belgium, July 15-20, 2017
收藏 引用
BMC NEUROscience 2017年 第SUPPL 1期18卷 59-59页
作者: [Anonymous] Indiana University Purdue University Indianapolis Indianapolis IN 46032 USA Stark Neurosciences Research Institute Indiana University School of Medicine Indianapolis IN 46032 USA Department of Mathematics East Carolina University Greenville NC 27858 USA Jülich Supercomputing Centre Forschungszentrum Jülich 52425 Jülich Germany Future Systems Swiss National Supercomputing Centre 8092 Zurich Switzerland User Engagement and Support Swiss National Supercomputing Centre 6900 Lugano Switzerland Institut de Neurosciences des Systèmes Aix Marseille Univ 13005 Marseille France Simulation Lab Neuroscience Forschungszentrum Jülich Jülich Germany Department of Experimental Psychology Ghent University 9000 Ghent Belgium Donders Center for Cognitive Neuroimaging Radboud University 6525HR Nijmegen The Netherlands Department of Electrical Computer and Energy Engineering University of Colorado Boulder CO 80309 USA Department of Neurosurgery Johns Hopkins School of Medicine Baltimore MD 21287 USA Department of Neurology Johns Hopkins School of Medicine Baltimore MD 21287 USA Department of Otolaryngology Johns Hopkins School of Medicine Baltimore MD 21287 USA INSERM U968 Paris France Sorbonne Universités UPMC University Paris 06 UMR_S 968 Institut de la Vision Paris France CNRS UMR_7210 Paris France Department of Computer Architecture and Technology University of Granada (CITIC) Granada Spain Sorbonne Universités UPMC Univ Paris 06 INSERM CNRS Institut de la Vision Paris France Department of Adaptive Machine Systems Osaka University Osaka Japan Department of Computer Science University of Cergy-Pontoise Cergy-Pontoise France Department of Physics and Astronomy College of Charleston Charleston SC 29424 USA School of Physics Faculty of Science University of Sydney Sydney NSW 2006 Australia Center of Excellence for Integrative Brain Function Australian Research Council Sydney Australia Max Planck Institute for Human Cognitive and Brain Sciences Saxony Lei
来源: 评论
Robust two-factor authentication and key agreement preserving user privacy
收藏 引用
International Journal of Network security 2014年 第3期16卷 229-240页
作者: Jiang, Qi Ma, Jianfeng Li, Guangsong Yang, Li School of Computer Science and Technology Xidian University No.2 South Taibai Road Xi'an Shaanxi 710071 China Science and Technology on Communication Information Security Control Laboratory 36 Research Institute CETC Jiaxing 314033 China Department of Information Research Zhengzhou Information Science and Technology Institute No.5 Wenhua Road Zhengzhou Henan 450002 China
In this paper, we first give a new set of design goals for anonymous two-factor authentication scheme. The new set is a refinement of some previously proposed requirement sets;it not only eliminates the redundancies, ... 详细信息
来源: 评论
Distributed power control algorithm for cognitive radio networks based on geometric programming
收藏 引用
Journal of information and Computational science 2014年 第13期11卷 4747-4757页
作者: Chen, Lingling Zhao, Xiaohui Key Laboratory of Information Science College of Communication Engineering Jilin University Changchun China College of Information and Control Engineering Jilin Institute of Chemical Technology Jilin China
In order to improve spectrum efficiency in Cognitive Radio Networks (CRNs), a standard distributed optimal power control strategy with high Signal to Interference Plus Noise Ratio (SINR) based on maximization of data ... 详细信息
来源: 评论
Power control algorithm for cognitive radio based on chaos particle swarm optimization
收藏 引用
Journal of information and Computational science 2014年 第12期11卷 4277-4287页
作者: Chen, Lingling Zhao, Xiaohui Key Laboratory of Information Science College of Communication Engineering Jilin University Changchun China College of Information and Control Engineering Jilin Institute of Chemical Technology Jilin China
Power control is one of key technologies for Cognitive Radio Networks (CRNs) since it can protect Primary Users (PUs) in the networks and guarantee Quality of Service (QoS) requirements for Second Users (SUs). In this... 详细信息
来源: 评论