咨询与建议

限定检索结果

文献类型

  • 795 篇 会议
  • 640 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,436 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 945 篇 工学
    • 511 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 363 篇 信息与通信工程
    • 241 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 96 篇 控制科学与工程
    • 88 篇 仪器科学与技术
    • 86 篇 光学工程
    • 77 篇 生物工程
    • 53 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 30 篇 土木工程
    • 30 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 555 篇 理学
    • 278 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 165 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 20 篇 key laboratory o...
  • 19 篇 school of cyber ...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of inform...
  • 17 篇 university of el...
  • 16 篇 institute of cyb...
  • 16 篇 school of inform...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 shilian zheng

语言

  • 1,343 篇 英文
  • 59 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1436 条 记 录,以下是1291-1300 订阅
排序:
A novel parameter extracting method for composite right/left-handed structure
A novel parameter extracting method for composite right/left...
收藏 引用
2012 5th Global Symposium on Millimeter-Waves, GSMM 2012
作者: Chen, Wan Fu, Jiahui Hua, Jun Chen, Meiliang Dep. of Electronics and Communication Engineering Harbin Institute of Technology 92 Xidazhi St. Harbin China Science and Technology on Communication Information Security Control Laboratory 3288 Zhongshanxi St. Jiaxing Zhejiang Province China
In this paper, a novel approach is presented to calculate the lumped parameters of right/left-handed Structures. By this method, the equivalent circuit can be extracted, and the left/right handed features can be certi... 详细信息
来源: 评论
A novel left-handed circularly polarized votage-controlled leaky wave antenna
A novel left-handed circularly polarized votage-controlled l...
收藏 引用
2012 5th Global Symposium on Millimeter-Waves, GSMM 2012
作者: Chen, Wan Fu, Jiahui Hua, Jun Chen, Meiliang Dep. of Electronics and Communication Engineering Harbin Institute of Technology 92 Xidazhi St. Harbin China Science and Technology on Communication Information Security Control Laboratory 3288 Zhongshanxi St. Jiaxing Zhejiang Province China
In this literature, a novel left-handed circularly polarized voltage-controlled leaky wave antenna is presented with a scanning range of 0° to -37° with a perfect axial ratio at the most time below 2 dB. The... 详细信息
来源: 评论
A resource distribution algorithm based on node factors of transmission for ad hoc network
A resource distribution algorithm based on node factors of t...
收藏 引用
2012 2nd International Conference on Business Computing and Global Informatization, BCGIN 2012
作者: Xu, Xiaofeng Wei, Guohua Science and Technology on Communication Information Security Control Lab. JiaXing China China Electronic Technology Group Corporation No. 36 Institute JiaXing China
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. Ad hoc network has lots of difficulties in accessing control, bandwidth distribution, resource assign... 详细信息
来源: 评论
A high-resolution weak signal detection method based on stochastic resonance and superhet technology
A high-resolution weak signal detection method based on stoc...
收藏 引用
2012 7th International ICST Conference on communications and Networking in China, CHINACOM 2012
作者: Shi, Shuo Yin, Wanyi Yang, Mingchuan He, Mingjie National Key Laboratory of Communication System and Information Control Technology China Harbin Institute of Technology China University of Science and Technology of China China
A detection method based on the strong low-frequency weak-signal detection ability of stochastic resonance is proposed, aimed at the detection of the unknown weak signal. By mixing the unknown signal with a continuous... 详细信息
来源: 评论
Classification of incomplete data using classifier ensembles
Classification of incomplete data using classifier ensembles
收藏 引用
2012 International Conference on Systems and Informatics, ICSAI 2012
作者: Chen, Haixia Du, Yuping Jiang, Kai Science and Technology on Electro-optical Information Security Control Laboratory Beijing China 45th Research Institute CETC Beijing China
This paper proposes a method for classification of incomplete data using neural network ensembles. In the method, the incomplete data set is analyzed and projected into a group of complete data subsets that give a ful... 详细信息
来源: 评论
Detecting and adapting to drifting concepts
Detecting and adapting to drifting concepts
收藏 引用
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2012
作者: Chen, Haixia Ma, Shengxian Jiang, Kai Science and Technology on Electro-optical Information Security Control Laboratory Beijing China 45th Research Institute of CETC Beijing China
The importance of incremental learning in changing environments has been acknowledged in recent years. In this paper we present an ensemble learning method for supervised learning with drifting concepts. The method em... 详细信息
来源: 评论
Sea cucumber oriented cyber physical systems
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2013年 第SUPPL.1期24卷 41-50页
作者: Du, Xiao-Zhou Jia, Bing Qiao, Jian-Zhong Lin, Shu-Kuan College of Information Science and Engineering Northeastern University Shenyang 110004 China Science and Technology on Underwater Test and Control Laboratory Dalian 116013 China Communication Engineering Design and Research Institute of the General Staff of PLA Shenyang 110005 China
Traditionally, sea cucumber production relies heavily on human labors which results in low production efficiency and inability to meet the demands of a rapidly growing market. To address this problem, this paper bring... 详细信息
来源: 评论
Impacts of subsidy policies on vaccination decisions in contact networks
收藏 引用
Physical Review E 2013年 第1期88卷 012813-012813页
作者: Hai-Feng Zhang Zhi-Xi Wu Xiao-Ke Xu Michael Small Lin Wang Bing-Hong Wang School of Mathematical Science Anhui University Hefei 230039 China Department of Electronic and Information Engineering Hong Kong Polytechnic University Hung Hom Kowloon Hong Kong China Institute of Computational Physics and Complex Systems Lanzhou University Lanzhou 730000 China College of Information and Communication Engineering Dalian Nationalities University Dalian 116605 China School of Mathematics and Statistics University of Western Australia Crawley Australia Adaptive Networks and Control Laboratory Department of Electronic Engineering Fudan University Shanghai 200433 China Department of Modern Physics University of Science and Technology of China Hefei 230026 China
To motivate more people to participate in vaccination campaigns, various subsidy policies are often supplied by government and the health sectors. However, these external incentives may also alter the vaccination deci... 详细信息
来源: 评论
Study on mechanisms of secure data aggregation based on weighted fitting analysis
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2013年 第SUPPL.1期24卷 108-116页
作者: Li, Ping Yang, Wu Xie, Jin-Yang Zhu, Hong-Song Zhang, Yong-Guang Li, Xiao-Feng School of Computer and Telecommunications Changsha University of Science and Technology Changsha 410114 China State Key Laboratory of Information Security Institute of Information Engineering The Chinese Academy of Sciences Beijing 100093 China Software Development Center Beijing Institute of Control Engineering Beijing 100190 China
Cryptographic approaches are vulnerable to impersonation attacks when nodes become compromised. Meanwhile, trust-based judgment and confirmation of cluster heads in WSN imposes higher communication cost. Trust managem... 详细信息
来源: 评论
Mechanism analysis of protocols based on the FPCPN model
Journal of Digital Information Management
收藏 引用
Journal of Digital information Management 2012年 第2期10卷 86-93页
作者: Wang, Wei Science and Technology on Communication Information Security Control Laboratory China No. 36 Research Institute of CETC Jiaxing Zhejiang 314001 China
Focusing on the protection of privacy and non- publicity of special networks, the CPN model is extended to PCPN by the protocol factor and the formal model. The FPCPN (Formal Protocol Colored Petri Net) is presented t... 详细信息
来源: 评论