咨询与建议

限定检索结果

文献类型

  • 810 篇 会议
  • 659 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,470 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 969 篇 工学
    • 524 篇 计算机科学与技术...
    • 409 篇 软件工程
    • 371 篇 信息与通信工程
    • 249 篇 电子科学与技术(可...
    • 163 篇 电气工程
    • 101 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 78 篇 生物工程
    • 58 篇 机械工程
    • 51 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 41 篇 安全科学与工程
    • 38 篇 化学工程与技术
    • 35 篇 材料科学与工程(可...
    • 34 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 571 篇 理学
    • 287 篇 数学
    • 213 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 167 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 45 篇 医学
    • 37 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 39 篇 feature extracti...
  • 36 篇 deep learning
  • 27 篇 training
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 semantics
  • 24 篇 accuracy
  • 23 篇 optimization
  • 22 篇 computational mo...
  • 21 篇 cognitive radio
  • 21 篇 security
  • 20 篇 heuristic algori...
  • 18 篇 modulation
  • 17 篇 machine learning
  • 17 篇 estimation
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 60 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 27 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 national mobile ...
  • 19 篇 hubei key labora...
  • 18 篇 university of el...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,215 篇 英文
  • 216 篇 其他
  • 40 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security/Control Laboratory"
1470 条 记 录,以下是1361-1370 订阅
排序:
Recovering geometric detail by octree normal maps
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2012年 7145 LNCS卷 62-73页
作者: Fan, Wenshan Wang, Bin Chan, Bin Paul, Jean-Claude Sun, Jiaguang School of Software Tsinghua University China Beijing Aerospace Control Center China Department of Computer Science and Technology Tsinghua University China Key Laboratory for Information System Security Ministry of Education China Tsinghua National Laboratory for Information Science and Technology China University of Hong Kong Hong Kong INRIA France
This paper presents a new approach for constructing normal maps that capture high-frequency geometric detail from dense models of arbitrary topology and are applied to the simplified version of the same models generat... 详细信息
来源: 评论
A study of EM scattering characteristics of complex conduct target based on the physical optics method of plane cell
A study of EM scattering characteristics of complex conduct ...
收藏 引用
International Symposium on Antennas, Propagation and EM Theory (ISAPE)
作者: Wenhua Ye Huan Li Zhensen Wu Science Technology on Communication Iinformation Security Control Laboratory Jiaxing Zhejiang China No.36 Research Institute 0f CETC Jiaxing Zhejiang China School of Science Xidian University China
In this paper, the PO(physical optics) method is used to study the electromagnetic scattering properties of the complex electrically large conduct target. The target is modelled by software 3DS MAX and divided into tr... 详细信息
来源: 评论
A Survey on Problems in Smart Grid with Large Capacity Wind Farm Interconnected
收藏 引用
Energy Procedia 2012年 17卷 776-782页
作者: Yang Peihong Liu Wenying Wei Yili School of Information Engineering Inner Mongolia University of Science and Technology Baotou China Key Laboratory of Power System Protection and Dynamic Security Monitoring and Control Under Ministry of Education North China Electric Power University Beijing China
The basic concepts and development of smart grid is described. The influence of large capacity wind farm interconnected on the smart grid is analyzed particularly, following contents are emphatically presented: model ... 详细信息
来源: 评论
Distributed consensus algorithms for decision fusion based cooperative spectrum sensing in cognitive radio
Distributed consensus algorithms for decision fusion based c...
收藏 引用
11th International Symposium on communications and information Technologies, ISCIT 2011
作者: Zheng, Shilian Yang, Xiaoniu Lou, Caiyi Science and Technology on Communication Information Security Control Laboratory Jiaxing China
Spectrum sensing is one of the fundamental problems for cognitive radio. In cognitive radio networks, cognitive radios can cooperatively sense the spectrum to detect the presence of primary users with higher sensitivi... 详细信息
来源: 评论
Implementation of sample rate conversion in direct RF synthesis transmitter
Implementation of sample rate conversion in direct RF synthe...
收藏 引用
2011 Cross Strait Quad-Regional Radio science and Wireless technology Conference, CSQRWC 2011
作者: Zhao, Yun Wang, LiJun Xu, JianLiang Science and Technology on Communication Information Security Control Laboratory Jiaxing China
In software defined radio (SDR) transmitter, the baseband data with protocol-specific symbol rate should be up-sampled to the fixed sample rate of synthesized carrier by arbitrary sample rate conversion (ASRC), before... 详细信息
来源: 评论
Wideband spectrum sensing in modulated wideband converter based cognitive radio system
Wideband spectrum sensing in modulated wideband converter ba...
收藏 引用
11th International Symposium on communications and information Technologies, ISCIT 2011
作者: Zheng, Shilian Yang, Xiaoniu Science and Technology on Communication Information Security Control Laboratory Jiaxing China
Wideband spectrum sensing is a fundamental problem in cognitive radio networks. In this paper, a wideband spectrum sensing procedure which consists of four steps, i.e., coarse support recovery, fine binary detection, ... 详细信息
来源: 评论
Specific primary user sensing for wireless security in IEEE 802.22 network
Specific primary user sensing for wireless security in IEEE ...
收藏 引用
11th International Symposium on communications and information Technologies, ISCIT 2011
作者: Luo, Zhenxing Lou, Caiyi Chen, Shichuan Zheng, Shilian Li, Shaowei Science and Technology on Communication Information Security Control Laboratory Jiaxing China
Cognitive Radio (CR) is considered as an effective technology for alleviating the spectrum shortage problem by enabling secondary users to utilize vacant spectrum allocated to a primary user (PU). IEEE 802.22 which is... 详细信息
来源: 评论
Bit Stream Oriented Enumeration Tree Pruning Algorithm
收藏 引用
Journal of Shanghai Jiaotong university(science) 2011年 第5期16卷 567-570页
作者: 邱卫东 金凌 杨小牛 杨红娃 School of Information Security Engineering Shanghai Jiaotong University National Science and Technology on Communication Information Security Control Laboratory No. 36 Institute of China Electronics Technology Group Corporation
Packet analysis is very important in our digital life. But what protocol analyzers can do is limited because they can only process data in determined format. This paper puts forward a solution to decode raw data in an... 详细信息
来源: 评论
PSO Based Passive Satellite Localization Using TDOA and FDOA Measurements
PSO Based Passive Satellite Localization Using TDOA and FDOA...
收藏 引用
2011 10th IEEE/ACIS International Conference on Computer and information science, ICIS 2011
作者: Bin, Yang Zheng Yan, Qiu Nan, Lu An Science and Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang 314033 China
Passive localization using TDOA and FDOA measurements usually does not have direct solution and requires numerical methods to determine the emitter's geolocation. We examine a satellite passive localization method... 详细信息
来源: 评论
Analysis on Token-controlled Public Key Encryption
Analysis on Token-Controlled Public Key Encryption
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Changlu Lin Yong Li Sriramkrishnan Srinivasan Li Lu Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China Key Laboratory of Communication & Information Systems Beijing Municipal Commission of Education Beijing Jiaotong University Beijing China Department of Computing University of Surrey Guildford UK School of Computer Science University of Electronic Science and Technology Chengdu China
In this paper, we analyze on the use of token-controlled public key encryption (TCE)schemes. We argue that for many of the applications in some possibilities of application in financial or legal scenarios, for example... 详细信息
来源: 评论