咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 194 篇 期刊文献

馆藏范围

  • 590 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 393 篇 工学
    • 199 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 147 篇 信息与通信工程
    • 111 篇 电子科学与技术(可...
    • 56 篇 电气工程
    • 46 篇 仪器科学与技术
    • 43 篇 控制科学与工程
    • 37 篇 光学工程
    • 32 篇 生物工程
    • 30 篇 机械工程
    • 19 篇 材料科学与工程(可...
    • 18 篇 网络空间安全
    • 16 篇 土木工程
    • 14 篇 安全科学与工程
    • 13 篇 建筑学
    • 13 篇 化学工程与技术
    • 12 篇 动力工程及工程热...
    • 11 篇 生物医学工程(可授...
  • 202 篇 理学
    • 104 篇 数学
    • 68 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 34 篇 生物学
    • 18 篇 化学
    • 16 篇 系统科学
  • 62 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 14 篇 军事学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
    • 10 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 9 篇 法学
  • 4 篇 农学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 22 篇 feature extracti...
  • 18 篇 deep learning
  • 16 篇 simulation
  • 16 篇 cognitive radio
  • 13 篇 bandwidth
  • 13 篇 modulation
  • 11 篇 object detection
  • 11 篇 neural networks
  • 11 篇 accuracy
  • 11 篇 training
  • 10 篇 security
  • 9 篇 signal to noise ...
  • 9 篇 metamaterials
  • 9 篇 optimization
  • 9 篇 clustering algor...
  • 9 篇 heuristic algori...
  • 8 篇 graphics process...
  • 8 篇 interference
  • 8 篇 computational mo...
  • 8 篇 algorithm design...

机构

  • 180 篇 science and tech...
  • 66 篇 science and tech...
  • 43 篇 science and tech...
  • 16 篇 institute of cyb...
  • 14 篇 no.36 research i...
  • 13 篇 the 36th researc...
  • 12 篇 dept. of microwa...
  • 11 篇 science and tech...
  • 11 篇 college of infor...
  • 10 篇 science and tech...
  • 9 篇 beijing aerospac...
  • 9 篇 college of under...
  • 9 篇 school of commun...
  • 8 篇 the science and ...
  • 7 篇 school of inform...
  • 7 篇 science and tech...
  • 7 篇 university of el...
  • 7 篇 school of comput...
  • 6 篇 no.36 research i...
  • 6 篇 college of scien...

作者

  • 23 篇 yang xiaoniu
  • 23 篇 hua jun
  • 19 篇 xiaoniu yang
  • 17 篇 wu qun
  • 16 篇 xuan qi
  • 14 篇 shilian zheng
  • 13 篇 zheng shilian
  • 13 篇 zhu huijie
  • 11 篇 wang lijun
  • 11 篇 lijun wang
  • 11 篇 huijie zhu
  • 10 篇 wang wei
  • 10 篇 xiaofeng xu
  • 9 篇 huaji zhou
  • 9 篇 yong zhang
  • 9 篇 jiahao dai
  • 8 篇 dai jiahao
  • 8 篇 weiguo shen
  • 8 篇 wei wang
  • 7 篇 wang yiteng

语言

  • 551 篇 英文
  • 23 篇 中文
  • 16 篇 其他
检索条件"机构=Science and Technology on Commuication Information Security Control Laboratory"
590 条 记 录,以下是201-210 订阅
排序:
FPGA-based Acceleration of Structured Light Depth Estimation
FPGA-based Acceleration of Structured Light Depth Estimation
收藏 引用
Chinese Automation Congress (CAC)
作者: Shijie Wang Xiaodong Deng Wancheng Liu Yuhai Li Shitao Chen Longjun Liu Institute of Artificial Intelligence and Robotics (IAIR) Xi’an Jiaotong University Xi’an China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin China
Stereo depth estimation is widely applied in computer vision and intelligent robotic systems. For real-time mobile stereo vision applications, how to efficiently design and implement stereo matching on resource-limite... 详细信息
来源: 评论
Design an Efficient DNN Inference Framework with PS-PL Synergies in FPGA for Edge Computing
Design an Efficient DNN Inference Framework with PS-PL Syner...
收藏 引用
Chinese Automation Congress (CAC)
作者: Wancheng Liu Yuhai Li Yining Yang Jinyu Zhu Longjun Liu Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin China Institute of Artificial Intelligence and Robotics (IAIR) Xi’an Jiaotong University Xi’an China
in recent years, Deep Neural Network (DNN) based methods have achieved great success for changing inflexible machine to intelligent and live system. Internet of Things (IoT) applications equipped with DNN in domains s... 详细信息
来源: 评论
Factored Trace Lasso Based Linear Regression Methods: Optimizations and Applications  5th
Factored Trace Lasso Based Linear Regression Methods: Optimi...
收藏 引用
5th International Conference on Cognitive Systems and Signal Processing, ICCSIP 2020
作者: Zhang, Hengmin Du, Wenli Liu, Xiaoqian Zhang, Bob Qian, Feng School of Information Science and Engineering Key Laboratory of Advanced Control and Optimization for Chemical Processes Ministry of Education East China University of Science and Technology Shanghai200237 China Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing210031 China Department of Computer and Information Science University of Macau 999078 China
Consider that matrix trace lasso regularized convex p -norm with p= 1, 2 regression methods usually have the higher computational complexity due to the singular value decomposition (SVD) of larger size matrix in big d... 详细信息
来源: 评论
Twitter Bot Detection with Multi-Head Attention and Supervised Contrastive Learning
Twitter Bot Detection with Multi-Head Attention and Supervis...
收藏 引用
International Conference on Wavelet Active Media technology and information Processing (ICWAMTIP)
作者: Liu Qiang Lu Jiazhong Huang Yuanyuan Zhang Weisha Lv Jun School of Cybersecurity (Xin Gu Industrial College) Chengdu University of Information Technology Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu China SUGON Industrial Control and Security Center Chengdu China School of Foreign Languages University of Electronic Science and Technology of China Chengdu China MetaX Integrated Circuits (Shanghai) Co. Ltd
The task of detecting bots on Twitter is an indispensable task for combating social network disinformation, curbing rumors, and managing online public opinion. However, today's social bots often disguise themselve... 详细信息
来源: 评论
Secure Computation Offloading via Cooperative Jamming in Marine IoT Networks
Secure Computation Offloading via Cooperative Jamming in Mar...
收藏 引用
GLOBECOM 2022 - 2022 IEEE Global Communications Conference
作者: Li Ping Qian Mingqing Li Xinyu Dong Yuan Wu Xiaoniu Yang College of Information Engineering Zhejiang University of Technology Hangzhou Zhejiang China Department of Computer and Information Science University of Macau Macao SAR China State Key Laboratory of Internet of Things for Smart City University of Macau Macao SAR China Science and Technology on Communication Information Security Control Laboratory Jiaxing China Institute of Cyberspace Security Zhejiang University of Technology Hangzhou China
Edge computing has been envisioned as a promising approach to enable the computation-intensive yet latencysensitive marine mobile services in the fifth generation and beyond wireless networks. In this paper, we invest... 详细信息
来源: 评论
Deep transfer clustering of radio signals
arXiv
收藏 引用
arXiv 2021年
作者: Xuan, Qi Li, Xiaohui Chen, Zhuangzhi Xu, Dongwei Zheng, Shilian Yang, Xiaoniu The Institute of Cyberspace Security College of Information Engineering Zhejiang University of Technology Hangzhou310023 China The Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China The Institute of Cyberspace Security Zhejiang University of Technology Hangzhou310023 China The Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China
Modulation recognition is an important task in radio signal processing. Most of the current researches focus on supervised learning. However, in many real scenarios, it is difficult and cost to obtain the labels of si... 详细信息
来源: 评论
Adaptive visibility graph neural network and it's application in modulation classification
arXiv
收藏 引用
arXiv 2021年
作者: Xuan, Qi Qiu, Kunfeng Zhou, Jinchao Chen, Zhuangzhi Xu, Dongwei Zheng, Shilian Yang, Xiaoniu The Institute of Cyberspace Security The College of Information Engineering Zhejiang University of Technology Hangzhou310023 China The Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China The Institute of Cyberspace Security Zhejiang University of Technology Hangzhou310023 China The Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China
Our digital world is full of time series and graphs which capture the various aspects of many complex systems. Traditionally, there are respective methods in processing these two different types of data, e.g., Recurre... 详细信息
来源: 评论
Analysis of Frequency Offset for Satellite Navigation Receiver Using Carrier-Aided Code Tracking Loop  20
Analysis of Frequency Offset for Satellite Navigation Receiv...
收藏 引用
20th IEEE International Conference on Communication technology, ICCT 2020
作者: Gao, Teng Wang, Lijun Jin, Xiaofan No.36 Research Institute of Cetc Science and Technology on Communication Information Security Control Laboratory Jiaxing China
Carrier-aided code tracking loop is widely used in satellite navigation receivers. This kind of loop structure can reduce code tracking noise by narrowing the bandwidth of code tracking loop. The performance of carrie... 详细信息
来源: 评论
Multi Topological Charges Vortex Beam Generator Based on Nonlinear Bound States in the Continuum with Improvement of Nonlinear Conversion Efficiency
SSRN
收藏 引用
SSRN 2023年
作者: Xu, Hang Li, Hui Tan, Qi Song, Chunyu Li, Mengyao Liu, Yanyan Zhang, Yating Wang, Bo Li, Jie Yao, Jianquan Ministry of Education School of Precision Instruments and Opto-Electronics Engineering Tianjin University Tianjin300072 China Function laboratory for Marine Fisheries Science and FoocProduction Processes Qingdao National LaboratoryTechnology Qingdao China Key Laboratory of Quantum Matt Science Henan Key Laboratory of Photovoltaic Materials Henan University KaifengHenan475004 China Information Materials and Device Applications Key Laboratory of Sichuan ProvincialUniversities Chengdu University of Information Technology 610225 China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin300308 China
In the momentum space of bound states in the continuum (BIC), vortex configurations around the Γ-point are generated by the selection rules. The electric field distribution close to the BIC satisfies twofold rotation... 详细信息
来源: 评论
Prediction of piRNA-mRNA interactions based on an interactive inference network
Prediction of piRNA-mRNA interactions based on an interactiv...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yajun Liu Ru Li Aimin Li Rong Fei Xie Guo Fang-Xiang Wu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an University of Technology Xi'an China Department of Computer Science Department of Mechanical Engineering Division of Biomedical Engineering University of Saskatchewan Saskatoon Canada
As the largest class of small non-coding RNAs, piRNAs primarily present in the reproductive cells of mammals, which influence post-transcriptional processes of mRNAs in multiple ways. Effective methods for predicting ...
来源: 评论