咨询与建议

限定检索结果

文献类型

  • 794 篇 会议
  • 653 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,448 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 960 篇 工学
    • 515 篇 计算机科学与技术...
    • 402 篇 软件工程
    • 369 篇 信息与通信工程
    • 243 篇 电子科学与技术(可...
    • 162 篇 电气工程
    • 99 篇 控制科学与工程
    • 91 篇 光学工程
    • 89 篇 仪器科学与技术
    • 77 篇 生物工程
    • 55 篇 机械工程
    • 50 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 35 篇 材料科学与工程(可...
    • 32 篇 土木工程
    • 30 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 564 篇 理学
    • 281 篇 数学
    • 213 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 87 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 168 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 49 篇 医学
    • 41 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 27 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 23 篇 optimization
  • 23 篇 accuracy
  • 23 篇 training
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 35 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of cyber ...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,353 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1448 条 记 录,以下是171-180 订阅
排序:
A Latency-offset Online Trajectory Planner based on Successive Convex Approximation
A Latency-offset Online Trajectory Planner based on Successi...
收藏 引用
2022 IEEE International Conference on Unmanned Systems, ICUS 2022
作者: Li, Yiming Jiang, Bin Yang, Junan Wang, Jian Li, Beibei Huang, Keju Shao, Kun College of Electronic Engineering National University of Defense Technology Hefei China Science and Technology on Communication Information Security Control Laboratory Jiaxing China
An online trajectory planner permits autonomous unmanned vehicles to maneuver in a changing mission scenario and varying environment. However, in real-time online plannings, task performance, completeness and accuracy... 详细信息
来源: 评论
A wideband zero index metamaterial lens for directive emission based on Z-shaped meta-atom
A wideband zero index metamaterial lens for directive emissi...
收藏 引用
2012 5th Global Symposium on Millimeter-Waves, GSMM 2012
作者: Lv, Yue-Long Meng, Fan-Yi Hua, Jun Chen, Mei-Liang Department of Microwave Engineering Harbin Institute of Technology Harbin 150001 China Science and Technology on Communication Information Security Control Laboratory Zhejiang China
In this paper, a zero index metamaterial lens (ZIML) based on Z-shaped meta-atom is proposed to achieve directive emission. Z-shaped meta-atom is implement as the unit cell of the ZIML to achieve near zero permittivit... 详细信息
来源: 评论
Spectrum Sensing Based on Deep Learning Classification for Cognitive Radios
收藏 引用
China communications 2020年 第2期17卷 138-148页
作者: Shilian Zheng Shichuan Chen Peihan Qi Huaji Zhou Xiaoniu Yang Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033China State Key Laboratory of Integrated Service Networks Xidian UniversityXi’an 710071China Key Laboratory of Intelligent Perception and Image Understanding Ministry of Education of ChinaXidian UniversityXi’an 710071China
Spectrum sensing is a key technology for cognitive *** present spectrum sensing as a classification problem and propose a sensing method based on deep learning *** normalize the received signal power to overcome the e... 详细信息
来源: 评论
Traffic Analysis of a Networks based on Stochastic Geometry to Exclude Malice Flow  2
Traffic Analysis of a Networks based on Stochastic Geometry ...
收藏 引用
2018 2nd Annual International Conference on Cloud technology and communication Engineering, CTCE 2018
作者: Dai, Jiahao Xu, Xiaofeng Science and Technology on Communication Information Security Control Laboratory China Electronic Group Corporation No.36 Institute Zhejiang Jiaxing China
Based on stochastic geometry, this paper proposes a mathematical method to estimate the traffic in a D2D based cellular network. The purpose is to determine the normal flow of network to exclude heterogeneous Darknet ... 详细信息
来源: 评论
Weak value amplification via second-order correlated technique
收藏 引用
Chinese Physics B 2016年 第2期25卷 58-61页
作者: 崔挺 黄靖正 刘翔 曾贵华 State Key Laboratory of Advanced Optical Communication Systems and Networks Shanghai Key Laboratory on Navigation and Location-based Serviceand Center of Quantum Information Sensing and Processing Shanghai Jiao Tong University Shanghai Key Laboratory of Aerospace Intelligent Control Technology Shanghai Institute of Spaceflight Control Technology College of Information Science and Technology Northwest University
We propose a new framework combining weak measurement and second-order correlated technique. The theoretical analysis shows that weak value amplification (WVA) experiment can also be implemented by a second-order co... 详细信息
来源: 评论
Network node importance measurement method based on vulnerability analysis  4th
Network node importance measurement method based on vulnerab...
收藏 引用
4th International Conference on Computer Engineering and Networks, CENet2014
作者: Li, Yahui Yang, Hongwa Xie, Kai Science and Technology on Communication Information Security Control Laboratory Jiaxing314000 China Northern Electronic Instrument Institute Beijing100191 China
As to select the important nodes from network, the key problems are to determine the basis and quantitative standard of evaluating node importance. This chapter proposes the measurement method of network node importan... 详细信息
来源: 评论
Broadband sleeve monopole with very small ground impedance matching network and resistive load
Broadband sleeve monopole with very small ground impedance m...
收藏 引用
2012 5th Global Symposium on Millimeter-Waves, GSMM 2012
作者: Wu, Zhong-Da Meng, Fan-Yi Hua, Jun Chen, Mei-Liang Department of Microwave Engineering Harbin Institute of Technology Harbin China Science and Technology on Communication Information Security Control Laboratory Jia Xing 314033 China
A broadband sleeve antenna with very small ground has been presented based on impedance matching network and resistive load. The VSWR of the proposed antenna is less than 2 from 0.17GHz to 0.52GHz. The efficiency of t... 详细信息
来源: 评论
Design of the linear array CCD acquisition system that line frequency and integration time adjustable
Design of the linear array CCD acquisition system that line ...
收藏 引用
International Conference on Electronics and Optoelectronics
作者: Hu, Tao Chen, Ya-Nan Science and Technology on Electro-Optical Information Security Control Laboratory Sanhe Hebei China
Linear array CCD acquisition system is generally used for high precision measurement and control field. In this paper, firstly introduce a design of linear array CCD acquisition system that provide two features of adj... 详细信息
来源: 评论
The Method to Recognize Linear Block Code Based on the Distribution of Code Weight  10
The Method to Recognize Linear Block Code Based on the Distr...
收藏 引用
10th International Conference on communication Software and Networks, ICCSN 2018
作者: Lei, Wang Yizhou, Ge Fucai, Zhao Yong, Wang Science and Technology on Communication Information Security Control Laboratory Jiaxing China Key Laboratory of Electronic Restriction Anhui Province National University of Defense Technology Hefei China
The definition and matrix description of linear cyclic code is introduced in this paper first. Then the distribution of code weight is analyzed. The distance of code weight distribution is defined according to distanc... 详细信息
来源: 评论
The identification algorithm of network key role based on behavior accumulation  10
The identification algorithm of network key role based on be...
收藏 引用
10th International Conference on Wireless communications, Networking and Mobile Computing, WiCOM 2014
作者: Xu, Xiaofeng Li, Xiao Science and Technology on Communication Information Security Control Laboratory Jiaxing China Chinese Electronic Technology Group Corporation No.36 Institute Jiaxing China
Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulati... 详细信息
来源: 评论