咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 194 篇 期刊文献

馆藏范围

  • 590 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 393 篇 工学
    • 199 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 147 篇 信息与通信工程
    • 111 篇 电子科学与技术(可...
    • 56 篇 电气工程
    • 46 篇 仪器科学与技术
    • 43 篇 控制科学与工程
    • 37 篇 光学工程
    • 32 篇 生物工程
    • 30 篇 机械工程
    • 19 篇 材料科学与工程(可...
    • 18 篇 网络空间安全
    • 16 篇 土木工程
    • 14 篇 安全科学与工程
    • 13 篇 建筑学
    • 13 篇 化学工程与技术
    • 12 篇 动力工程及工程热...
    • 11 篇 生物医学工程(可授...
  • 202 篇 理学
    • 104 篇 数学
    • 68 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 34 篇 生物学
    • 18 篇 化学
    • 16 篇 系统科学
  • 62 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 14 篇 军事学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
    • 10 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 9 篇 法学
  • 4 篇 农学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 22 篇 feature extracti...
  • 18 篇 deep learning
  • 16 篇 simulation
  • 16 篇 cognitive radio
  • 13 篇 bandwidth
  • 13 篇 modulation
  • 11 篇 object detection
  • 11 篇 neural networks
  • 11 篇 accuracy
  • 11 篇 training
  • 10 篇 security
  • 9 篇 signal to noise ...
  • 9 篇 metamaterials
  • 9 篇 optimization
  • 9 篇 clustering algor...
  • 9 篇 heuristic algori...
  • 8 篇 graphics process...
  • 8 篇 interference
  • 8 篇 computational mo...
  • 8 篇 algorithm design...

机构

  • 180 篇 science and tech...
  • 66 篇 science and tech...
  • 43 篇 science and tech...
  • 16 篇 institute of cyb...
  • 14 篇 no.36 research i...
  • 13 篇 the 36th researc...
  • 12 篇 dept. of microwa...
  • 11 篇 science and tech...
  • 11 篇 college of infor...
  • 10 篇 science and tech...
  • 9 篇 beijing aerospac...
  • 9 篇 college of under...
  • 9 篇 school of commun...
  • 8 篇 the science and ...
  • 7 篇 school of inform...
  • 7 篇 science and tech...
  • 7 篇 university of el...
  • 7 篇 school of comput...
  • 6 篇 no.36 research i...
  • 6 篇 college of scien...

作者

  • 23 篇 yang xiaoniu
  • 23 篇 hua jun
  • 19 篇 xiaoniu yang
  • 17 篇 wu qun
  • 16 篇 xuan qi
  • 14 篇 shilian zheng
  • 13 篇 zheng shilian
  • 13 篇 zhu huijie
  • 11 篇 wang lijun
  • 11 篇 lijun wang
  • 11 篇 huijie zhu
  • 10 篇 wang wei
  • 10 篇 xiaofeng xu
  • 9 篇 huaji zhou
  • 9 篇 yong zhang
  • 9 篇 jiahao dai
  • 8 篇 dai jiahao
  • 8 篇 weiguo shen
  • 8 篇 wei wang
  • 7 篇 wang yiteng

语言

  • 551 篇 英文
  • 23 篇 中文
  • 16 篇 其他
检索条件"机构=Science and Technology on Commuication Information Security Control Laboratory"
590 条 记 录,以下是461-470 订阅
排序:
Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks  14th
Cooperative Transmission Against Impersonation Attack Using ...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Weidong Yang Le Xiao Limin Sun Qing Li Key Laboratory of Grain Information Processing and Control Ministry of Education Henan University of Technology Zhenzhou China College of Information Science and Engineering Henan University of Technology Zhenzhou China Beijing Key Laboratory of IOT information security technology Institute of Information Engineering Beijing China
The authentication error in Two-Hop wireless networks is considered without knowledge of eavesdropper channels and location. This paper presents an eavesdropper model with authentication error and two eavesdropping wa... 详细信息
来源: 评论
A kind of better adjacent channel suppression multiple frequency shift keying signal simulation method based on MATLAB
A kind of better adjacent channel suppression multiple frequ...
收藏 引用
International Conference on Communication technology (ICCT)
作者: Huan Li Wenhua Ye No.36 Research Institute of CETC Jiaxing Zhejiang China 2Science Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang China
Frequency shift keying (FSK) modulation function in MATLAB without filter function, leading to poor adjacent channel suppression, which causes aliasing after a non-linear device easily. Based on FSK modulation signal ... 详细信息
来源: 评论
Study on the radiation of laser induced air plasma  31
Study on the radiation of laser induced air plasma
收藏 引用
31st General Assembly and Scientific Symposium of the International Union of Radio science, URSI GASS 2014
作者: Xin, Liu Biyi, Wang Wanli, Zhao Shanghong, Guan Xiusheng, Yan Science and Technology on Electro-Optical Information Security Control Laboratory Sanhe Hebei China
This paper details the radiation of laser induced air plasma. The plasma was produced by interacting the air with the Nd: YGA laser focused with optical lens. The relationship between spectrum of laser - induced air p... 详细信息
来源: 评论
Anonymous aggregator election protocol for wireless sensor networks
收藏 引用
Tongxin Xuebao/Journal on Communications 2015年 第2期36卷
作者: Fu, Shuai Ma, Jian-Feng Li, Hong-Tao Jiang, Qi School of Computer Science and Technology Xidian University Xi'an710071 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China
An anonymous cluster head election protocol in clustered wireless sensor networks was proposed. The protocol detailed the decision rules and mode of cluster construction while an anonymous veto protocol based on bilin... 详细信息
来源: 评论
Resource allocation in ofdma-based cognitive radio networks via cooperation with primary users
收藏 引用
Journal of Communications 2015年 第5期10卷 294-300页
作者: Tang, Yi Wang, Lijie Grace, David Wang, Zibin National Key Laboratory of Science and Technology on Information System Security Beijing100101 China College of Electronic Science and Engineering National University of Defense Technology Hunan410073 China China Xi’an Satellite Control Center Xi’an China Department of Electronics University of York YorkYO10 5DD United Kingdom
This paper considers an OFDMA-based cooperative cognitive radio network where the secondary users (SUs) act as the relay of the primary users (PUs) while guaranteeing the quality of service (QoS) of the PUs. In return... 详细信息
来源: 评论
Software design for high-speed data capture
Software design for high-speed data capture
收藏 引用
2014 2nd International Conference on Mechatronics, Robotics and Automation, ICMRA 2014
作者: Zhang, Wei Feng Science and Technology on Communication Information Security Control Laboratory Jiangnan Electronic Communication Institute Jiaxing Zhejiang China
10G Ethernet technology has been widely used in modern high speed communication system. As a result, program design for high-speed data capture on 10G Ethernet, as the first and important step in network monitor and a... 详细信息
来源: 评论
A security routing protocol of ad hoc network based on node trust evalution
A security routing protocol of ad hoc network based on node ...
收藏 引用
2014 International Conference on information and Network security, ICINS 2014
作者: Li, Yahui Yang, Hongwa Xie, Fei Science and technology on communication information security control laboratory Jiaxing China Northern electronic instrument institute Beijing China
The routing protocol is the core of the Ad Hoc network protocols, which largely determines the performance and features of an Ad Hoc network. Aiming at the characteristics of the Mobile Radio Ad Hoc network, this pape... 详细信息
来源: 评论
The identification algorithm of network key role based on behavior accumulation  10
The identification algorithm of network key role based on be...
收藏 引用
10th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2014
作者: Xu, Xiaofeng Li, Xiao Science and Technology on Communication Information Security Control Laboratory Jiaxing China Chinese Electronic Technology Group Corporation No.36 Institute Jiaxing China
Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulati... 详细信息
来源: 评论
Prediction model of aerosol fire extinguishing agent performance based on combination of genetic algorithm and back-propagation neural network
Prediction model of aerosol fire extinguishing agent perform...
收藏 引用
4th International Conference on Materials science and information technology, MSIT 2014
作者: Chen, Zhi Jie Zhu, Chen Guang Zhang, Zi Hao School of Chemical Engineering Nanjing University of Science and Technology Nanjing Jiangsu 210094 China Science and Technology on Electro-optical Information Security Control Laboratory Sanhe 065201 China
The aerosol fire extinguishing agent is a complex pyrotechnic composition, and the extinguishing efficiency need a series of experiments to identify. A method is put forward out based on combining back-propagation neu... 详细信息
来源: 评论
Study on the growth model of expandable graphite
Study on the growth model of expandable graphite
收藏 引用
4th International Conference on Materials science and information technology, MSIT 2014
作者: Ye, Fei Zhu, Chen Guang Zhang, Zi Hao School of Chemical Engineering Nanjing University of Science and Technology Nanjing Jiangsu 210094 China Science and Technology on Electro-optical Information Security Control Laboratory Sanhe 065201 China
The expansion mechanism of expandable graphite (EG) was studied systematically in this paper. Based on the feature of the structure and the linear expansion of expandable graphite, a simple expansion model was establi... 详细信息
来源: 评论