咨询与建议

限定检索结果

文献类型

  • 794 篇 会议
  • 653 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,448 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 960 篇 工学
    • 515 篇 计算机科学与技术...
    • 402 篇 软件工程
    • 369 篇 信息与通信工程
    • 243 篇 电子科学与技术(可...
    • 162 篇 电气工程
    • 99 篇 控制科学与工程
    • 91 篇 光学工程
    • 89 篇 仪器科学与技术
    • 77 篇 生物工程
    • 55 篇 机械工程
    • 50 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 35 篇 材料科学与工程(可...
    • 32 篇 土木工程
    • 30 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 564 篇 理学
    • 281 篇 数学
    • 213 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 87 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 168 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 49 篇 医学
    • 41 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 27 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 23 篇 optimization
  • 23 篇 accuracy
  • 23 篇 training
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 35 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of cyber ...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,353 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1448 条 记 录,以下是151-160 订阅
排序:
Temperature control system of air-conditioning based on the fuzzy theory
Temperature control system of air-conditioning based on the ...
收藏 引用
2011 IEEE International Conference on Mechatronics and Automation, ICMA 2011
作者: Jing, Jiang Xuesong, Zhang Science and Technology on Electro-optical Information Security Control Laboratory Beijing China Science and Technology on Electro-optical Information Security Control Laboratory Northeast Institute of Electronics Technology Hebei China
Two-dimensional fuzzy temperature controller was used in the system of inverter air-conditioner to control the room temperature. Self-adjustment PID fuzzy controller was proposed to realize real-time control function.... 详细信息
来源: 评论
A security routing protocol of ad hoc network based on node trust evalution
A security routing protocol of ad hoc network based on node ...
收藏 引用
2014 International Conference on information and Network security, ICINS 2014
作者: Li, Yahui Yang, Hongwa Xie, Fei Science and technology on communication information security control laboratory Jiaxing China Northern electronic instrument institute Beijing China
The routing protocol is the core of the Ad Hoc network protocols, which largely determines the performance and features of an Ad Hoc network. Aiming at the characteristics of the Mobile Radio Ad Hoc network, this pape... 详细信息
来源: 评论
An analysis of network traffic identification based on decision tree  2
An analysis of network traffic identification based on decis...
收藏 引用
2nd International Conference on Artificial Intelligence and Electromechanical Automation, AIEA 2021
作者: Dai, Jiahao Chen, Yongqun Chen, Yucheng Meng, Aodong China Electronic Corporation NO.36 Institute Science and Technology on Communication Information Security Control Laboratory Jiaxing China
With the strong development momentum of the Internet, network not only brings convenience to our life, but also poses threats to our network security. Users can hide their IP and identity information through encryptio... 详细信息
来源: 评论
A Novel Orthogonal LoRa Multiple Access Algorithm for Satellite Internet of Things
收藏 引用
China communications 2022年 第3期19卷 279-289页
作者: Chengwen Zhang Liankai Wang Libin Jiao Shipeng Wang Jun Shi Jia Yue School of Electronics and Information Engineering Harbin Institute of TechnologyHarbin 150080China Science and Technology on Communication Networks Laboratory Shijiazhuang 050081China Key Laboratory of Police Wireless Digital Communication Ministry of Public SecurityHarbin 150001China
In recent years,LoRa has been extensively researched in the satellite Internet of Things(IoT).However,the multiple access technology of LoRa is still one of the bottlenecks of satellite *** improve the multiple access... 详细信息
来源: 评论
A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers
收藏 引用
science China(information sciences) 2019年 第3期62卷 196-198页
作者: Yusong DU Baodian WEI Huang ZHANG School of Data and Computer Science Sun Yat-sen University Guangdong Key Laboratory of Information Security Technology Chongqing Key Lab of Computer Network and Communication Technology
Dear editor,Discrete Gaussian sampling, that is, sampling from a discrete Gaussian distribution DΛ,σ,cwith parameter σ> 0 and center c∈R~n over an ndimensional lattice Λ, has been considered by the cryptograph... 详细信息
来源: 评论
A broadband fractal AMC ground plane for low-profile antennas
A broadband fractal AMC ground plane for low-profile antenna...
收藏 引用
2012 5th Global Symposium on Millimeter-Waves, GSMM 2012
作者: Liu, Shengying Wu, Qun Hua, Jun Chen, Meiliang Dept. of Microwave Engineering Harbin Institute of Technology Harbin China Science and Technology on Communication Information Security Control Laboratory China
Through introducing Koch fractal theory, an ordinary AMC structure and broadband Koch fractal AMC ground planes are designed and compared. The bandwidth and performance improvement of the fractal AMC ground plane are ... 详细信息
来源: 评论
A hybrid biometric identification framework for high security applications
收藏 引用
Frontiers of Computer science 2015年 第3期9卷 392-401页
作者: Xuzhou LI Yilong YIN Yanbin NING Gongping YANG Lei PAN School of Computer Science and Technology Shandong University Jinan 250101 China Key Laboratory of Information Security and Intelligent Control of Shandong Province Shandong Youth University of Political Science Jinan 250103 China
Research on biometrics for high security applica- tions has not attracted as much attention as civilian or foren- sic applications. Limited research and deficient analysis so far has led to a lack of general solutions... 详细信息
来源: 评论
High-rate discrete-modulated continuous-variable quantum key distribution with composable security
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Mingze Pan, Yan Li, Junhui Wang, Heng Fan, Lu Shao, Yun Li, Yang Huang, Wei Yu, Song Xu, Bingjie Zhang, Yichen Yang, Jie Pi, Yaodi Ye, Ting Sun, Ao Jiang, Lin Yan, Lianshan Pan, Wei National Key Laboratory of Security Communication Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Information Photonics and Optical Communications School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing100876 China Center for Information Photonics & Communications School of Information Science and Technology Southwest Jiaotong University Sichuan Chengdu611756 China
Discrete modulation represents a practical and device-friendly solution for high speed transmission in continuous-variable quantum key distribution (CV-QKD), offering high compatibility with coherent optical communica... 详细信息
来源: 评论
EMO: Edge Model Overlays to Scale Model Size in Federated Learning
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Di He, Weibo Feng, Wanglei Wen, Zhenyu Qian, Bin Varghese, Blesson School of Computer Science University of St Andrews United Kingdom Institute of Cyberspace Security College of Information Engineering Zhejiang University of Technology China University of Science and Technology of China China State Key Laboratory of Industrial Control Technology Zhejiang University China
Federated Learning (FL) trains machine learning models on edge devices with distributed data. However, the computational and memory limitations of these devices restrict the training of large models using FL. Split Fe... 详细信息
来源: 评论
An Optimized Method of Packet Loss Rate under Backup Path Protection in OBS Network  3
An Optimized Method of Packet Loss Rate under Backup Path Pr...
收藏 引用
2020 3rd International Conference on Modeling, Simulation and Optimization Technologies and Applications, MSOTA 2020
作者: Meng, Aodong Chen, Yucheng Dai, Jiahao Chen, Yongqun Science and Technology on Communication Information Security Control Laboratory Jiaxing China No.36 Research Institute of Cetc Jiaxing China
In order to calculate the packet loss rate in OBS network, this paper proposes a method, which performs good in both accuracy and rapidity, based on Erlang B formula to estimate the packet loss probability in OBS netw... 详细信息
来源: 评论