咨询与建议

限定检索结果

文献类型

  • 795 篇 会议
  • 640 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,436 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 945 篇 工学
    • 511 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 363 篇 信息与通信工程
    • 241 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 96 篇 控制科学与工程
    • 88 篇 仪器科学与技术
    • 86 篇 光学工程
    • 77 篇 生物工程
    • 53 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 30 篇 土木工程
    • 30 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 555 篇 理学
    • 278 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 165 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 20 篇 key laboratory o...
  • 19 篇 school of cyber ...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of inform...
  • 17 篇 university of el...
  • 16 篇 institute of cyb...
  • 16 篇 school of inform...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 shilian zheng

语言

  • 1,343 篇 英文
  • 59 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1436 条 记 录,以下是1331-1340 订阅
排序:
Distributed consensus algorithms for decision fusion based cooperative spectrum sensing in cognitive radio
Distributed consensus algorithms for decision fusion based c...
收藏 引用
11th International Symposium on communications and information Technologies, ISCIT 2011
作者: Zheng, Shilian Yang, Xiaoniu Lou, Caiyi Science and Technology on Communication Information Security Control Laboratory Jiaxing China
Spectrum sensing is one of the fundamental problems for cognitive radio. In cognitive radio networks, cognitive radios can cooperatively sense the spectrum to detect the presence of primary users with higher sensitivi... 详细信息
来源: 评论
Implementation of sample rate conversion in direct RF synthesis transmitter
Implementation of sample rate conversion in direct RF synthe...
收藏 引用
2011 Cross Strait Quad-Regional Radio science and Wireless technology Conference, CSQRWC 2011
作者: Zhao, Yun Wang, LiJun Xu, JianLiang Science and Technology on Communication Information Security Control Laboratory Jiaxing China
In software defined radio (SDR) transmitter, the baseband data with protocol-specific symbol rate should be up-sampled to the fixed sample rate of synthesized carrier by arbitrary sample rate conversion (ASRC), before... 详细信息
来源: 评论
Wideband spectrum sensing in modulated wideband converter based cognitive radio system
Wideband spectrum sensing in modulated wideband converter ba...
收藏 引用
11th International Symposium on communications and information Technologies, ISCIT 2011
作者: Zheng, Shilian Yang, Xiaoniu Science and Technology on Communication Information Security Control Laboratory Jiaxing China
Wideband spectrum sensing is a fundamental problem in cognitive radio networks. In this paper, a wideband spectrum sensing procedure which consists of four steps, i.e., coarse support recovery, fine binary detection, ... 详细信息
来源: 评论
Specific primary user sensing for wireless security in IEEE 802.22 network
Specific primary user sensing for wireless security in IEEE ...
收藏 引用
11th International Symposium on communications and information Technologies, ISCIT 2011
作者: Luo, Zhenxing Lou, Caiyi Chen, Shichuan Zheng, Shilian Li, Shaowei Science and Technology on Communication Information Security Control Laboratory Jiaxing China
Cognitive Radio (CR) is considered as an effective technology for alleviating the spectrum shortage problem by enabling secondary users to utilize vacant spectrum allocated to a primary user (PU). IEEE 802.22 which is... 详细信息
来源: 评论
Bit Stream Oriented Enumeration Tree Pruning Algorithm
收藏 引用
Journal of Shanghai Jiaotong university(science) 2011年 第5期16卷 567-570页
作者: 邱卫东 金凌 杨小牛 杨红娃 School of Information Security Engineering Shanghai Jiaotong University National Science and Technology on Communication Information Security Control Laboratory No. 36 Institute of China Electronics Technology Group Corporation
Packet analysis is very important in our digital life. But what protocol analyzers can do is limited because they can only process data in determined format. This paper puts forward a solution to decode raw data in an... 详细信息
来源: 评论
PSO Based Passive Satellite Localization Using TDOA and FDOA Measurements
PSO Based Passive Satellite Localization Using TDOA and FDOA...
收藏 引用
2011 10th IEEE/ACIS International Conference on Computer and information science, ICIS 2011
作者: Bin, Yang Zheng Yan, Qiu Nan, Lu An Science and Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang 314033 China
Passive localization using TDOA and FDOA measurements usually does not have direct solution and requires numerical methods to determine the emitter's geolocation. We examine a satellite passive localization method... 详细信息
来源: 评论
Analysis on Token-controlled Public Key Encryption
Analysis on Token-Controlled Public Key Encryption
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Changlu Lin Yong Li Sriramkrishnan Srinivasan Li Lu Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China Key Laboratory of Communication & Information Systems Beijing Municipal Commission of Education Beijing Jiaotong University Beijing China Department of Computing University of Surrey Guildford UK School of Computer Science University of Electronic Science and Technology Chengdu China
In this paper, we analyze on the use of token-controlled public key encryption (TCE)schemes. We argue that for many of the applications in some possibilities of application in financial or legal scenarios, for example... 详细信息
来源: 评论
Cooperative MIMO Channel Modeling and Multi-Link Spatial Correlation Properties
收藏 引用
IEEE Journal on Selected Areas in communications 2012年 第2期30卷 388-396页
作者: Xiang Cheng Cheng-Xiang Wang Haiming Wang Xiqi Gao Xiao-Hu You Dongfeng Yuan Bo Ai Qiang Huo Ling-Yang Song Bing-Li Jiao School of Electronics and Computer Science Peking University Beijing China Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences China State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University China Joint Research Institute for Signal and Image Processing School of Engineering & Physical Sciences Heriot-Watt University Edinburgh UK School of Information Science and Engineering South East University Najing China School of Information Science and Engineering Shandong University Jinan China State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing China
In this paper, a novel unified channel model framework is proposed for cooperative multiple-input multiple-output (MIMO) wireless channels. The proposed model framework is generic and adaptable to multiple cooperative... 详细信息
来源: 评论
Issues and guiding principles for opening governmental judicial research data
Issues and guiding principles for opening governmental judic...
收藏 引用
11th IFIP WG 8.5 International Conference on Electronic Government, EGOV 2012
作者: Zuiderwijk, Anneke Janssen, Marijn Meijer, Ronald Choenni, Sunil Charalabidis, Yannis Jeffery, Keith Delft University of Technology Faculty of Technology Policy and Management Jaffalaan 5 2628 BX Delft Netherlands Ministry of Security and Justice Schedeldoekshaven 131 2511 EM Den Haag Netherlands Rotterdam University of Applied Sciences Creating 010 G.J. de Jonghweg 4-6 3015 GG Rotterdam Netherlands University of Aegean Department of Information and Communication Systems Engineering Karlovassi 83200 Samos Greece Science and Technology Facilities Council Rutherford Appleton Laboratory Didcot OX11 0QX Harwell Oxford United Kingdom
The opening of data is considered to provide many benefits. However, opening up data by public bodies is a complex and ill-understood activity. Although many public bodies might be willing to open up their data, they ... 详细信息
来源: 评论
Temperature control system of air-conditioning based on the fuzzy theory
Temperature control system of air-conditioning based on the ...
收藏 引用
2011 IEEE International Conference on Mechatronics and Automation, ICMA 2011
作者: Jing, Jiang Xuesong, Zhang Science and Technology on Electro-optical Information Security Control Laboratory Beijing China Science and Technology on Electro-optical Information Security Control Laboratory Northeast Institute of Electronics Technology Hebei China
Two-dimensional fuzzy temperature controller was used in the system of inverter air-conditioner to control the room temperature. Self-adjustment PID fuzzy controller was proposed to realize real-time control function.... 详细信息
来源: 评论