咨询与建议

限定检索结果

文献类型

  • 262 篇 会议
  • 91 篇 期刊文献

馆藏范围

  • 353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 125 篇 信息与通信工程
    • 105 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 74 篇 电子科学与技术(可...
    • 29 篇 电气工程
    • 27 篇 仪器科学与技术
    • 21 篇 控制科学与工程
    • 19 篇 生物工程
    • 12 篇 材料科学与工程(可...
    • 11 篇 机械工程
    • 11 篇 网络空间安全
    • 7 篇 土木工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 船舶与海洋工程
    • 6 篇 航空宇航科学与技...
    • 6 篇 安全科学与工程
    • 4 篇 化学工程与技术
  • 110 篇 理学
    • 59 篇 数学
    • 31 篇 物理学
    • 19 篇 生物学
    • 19 篇 统计学(可授理学、...
    • 12 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 36 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 9 篇 军事学
    • 6 篇 军队指挥学
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 医学
  • 1 篇 农学

主题

  • 15 篇 simulation
  • 15 篇 feature extracti...
  • 14 篇 deep learning
  • 14 篇 bandwidth
  • 14 篇 cognitive radio
  • 13 篇 modulation
  • 8 篇 signal to noise ...
  • 8 篇 metamaterials
  • 8 篇 receivers
  • 8 篇 heuristic algori...
  • 7 篇 interference
  • 7 篇 algorithm design...
  • 7 篇 microstrip anten...
  • 7 篇 clustering algor...
  • 7 篇 sensors
  • 6 篇 optimization
  • 6 篇 time-frequency a...
  • 6 篇 location awarene...
  • 6 篇 security
  • 6 篇 estimation

机构

  • 180 篇 science and tech...
  • 43 篇 science and tech...
  • 16 篇 institute of cyb...
  • 15 篇 no.36 research i...
  • 14 篇 the 36th researc...
  • 12 篇 dept. of microwa...
  • 11 篇 college of infor...
  • 9 篇 school of commun...
  • 8 篇 the science and ...
  • 7 篇 science and tech...
  • 7 篇 college of under...
  • 6 篇 no.36 research i...
  • 6 篇 university of el...
  • 6 篇 school of softwa...
  • 5 篇 state key labora...
  • 5 篇 no.36 research i...
  • 5 篇 school of inform...
  • 5 篇 school of comput...
  • 5 篇 electronic engin...
  • 5 篇 shenzhen researc...

作者

  • 23 篇 hua jun
  • 22 篇 yang xiaoniu
  • 20 篇 xiaoniu yang
  • 17 篇 wu qun
  • 15 篇 xuan qi
  • 14 篇 shilian zheng
  • 13 篇 zheng shilian
  • 13 篇 zhu huijie
  • 11 篇 wang lijun
  • 11 篇 lijun wang
  • 11 篇 huijie zhu
  • 10 篇 xiaofeng xu
  • 9 篇 huaji zhou
  • 9 篇 wang wei
  • 9 篇 jiahao dai
  • 8 篇 wenhua ye
  • 8 篇 dai jiahao
  • 8 篇 weiguo shen
  • 8 篇 jiang bin
  • 8 篇 huan li

语言

  • 330 篇 英文
  • 15 篇 中文
  • 8 篇 其他
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory NO.36"
353 条 记 录,以下是11-20 订阅
排序:
Research on the Construction of a Novel Cyberspace security Ecosystem
收藏 引用
Engineering 2018年 第1期4卷 47-52页
作者: Xiao-Niu Yang Wei Wang Xiao-Feng Xu Guo-Rong Pang Chun-Lei Zhang Science and Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang 314033 China Science and Technology on Electro-Optical Information Security Control Laboratory Tianfin 300300 China
Given the challenges facing the cyberspace of the nation, this paper presents the tripartite theory of cyberspace, based on the status quo of cyberspace. Corresponding strategies and a research architecture are propos... 详细信息
来源: 评论
Analysis of Attack Effectiveness Evaluation of AD hoc Networks based on Rough Set Theory  17
Analysis of Attack Effectiveness Evaluation of AD hoc Networ...
收藏 引用
17th International Conference on Computational Intelligence and security, CIS 2021
作者: Dai, Jiahao Chen, Yongqun China Electronic Corporation NO.36 Institute Science and Technology on Communication Information Security Control Laboratory Jiaxing China
This paper mainly studies an attack effectiveness evaluation method for AD hoc networks based on rough set theory. Firstly, we use OPNET to build AD hoc network simulation scenario, design and develop attack module, a... 详细信息
来源: 评论
An analysis of network traffic identification based on decision tree  2
An analysis of network traffic identification based on decis...
收藏 引用
2nd International Conference on Artificial Intelligence and Electromechanical Automation, AIEA 2021
作者: Dai, Jiahao Chen, Yongqun Chen, Yucheng Meng, Aodong China Electronic Corporation NO.36 Institute Science and Technology on Communication Information Security Control Laboratory Jiaxing China
With the strong development momentum of the Internet, network not only brings convenience to our life, but also poses threats to our network security. Users can hide their IP and identity information through encryptio... 详细信息
来源: 评论
An Optimized Method of Packet Loss Rate under Backup Path Protection in OBS Network  3
An Optimized Method of Packet Loss Rate under Backup Path Pr...
收藏 引用
2020 3rd International Conference on Modeling, Simulation and Optimization Technologies and Applications, MSOTA 2020
作者: Meng, Aodong Chen, Yucheng Dai, Jiahao Chen, Yongqun Science and Technology on Communication Information Security Control Laboratory Jiaxing China No.36 Research Institute of Cetc Jiaxing China
In order to calculate the packet loss rate in OBS network, this paper proposes a method, which performs good in both accuracy and rapidity, based on Erlang B formula to estimate the packet loss probability in OBS netw... 详细信息
来源: 评论
Geometric Dilution of Precision for Far-Distance TDOA Location of Shortwave  2
Geometric Dilution of Precision for Far-Distance TDOA Locati...
收藏 引用
2nd information communication Technologies Conference, ICTC 2021
作者: Yang, Xin Ye, Yun-Xia No.36 Research Institute of Cetc Jiaxing Zhejiang China No.36 Research Institute of Cetc Science and Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang China
A method of time difference of arrival (TDOA) location for shortwave signal source by four receiving stations is introduced. The precision of time difference and the Geometric Dilution of Precision (GDOP) of TDOA loca... 详细信息
来源: 评论
Chaos characteristics analysis about transient signals of FH radio with PLL synthesizer
Chaos characteristics analysis about transient signals of FH...
收藏 引用
International Conference on Multimedia and Signal Processing
作者: Song, Chunyun Science and Technology on Communication Information Security Control Laboratory Jiaxing China No.36 Research Institute of CETC Jiaxing China
Chaos characteristic analysis of the phase-locked loop (PLL) synthesizer has been made in this paper based on the phase model of it, and we conclude the state equation of this model and the condition when the system b... 详细信息
来源: 评论
Traffic Analysis of a Networks based on Stochastic Geometry to Exclude Malice Flow  2
Traffic Analysis of a Networks based on Stochastic Geometry ...
收藏 引用
2018 2nd Annual International Conference on Cloud technology and communication Engineering, CTCE 2018
作者: Dai, Jiahao Xu, Xiaofeng Science and Technology on Communication Information Security Control Laboratory China Electronic Group Corporation No.36 Institute Zhejiang Jiaxing China
Based on stochastic geometry, this paper proposes a mathematical method to estimate the traffic in a D2D based cellular network. The purpose is to determine the normal flow of network to exclude heterogeneous Darknet ... 详细信息
来源: 评论
The identification algorithm of network key role based on behavior accumulation  10
The identification algorithm of network key role based on be...
收藏 引用
10th International Conference on Wireless communications, Networking and Mobile Computing, WiCOM 2014
作者: Xu, Xiaofeng Li, Xiao Science and Technology on Communication Information Security Control Laboratory Jiaxing China Chinese Electronic Technology Group Corporation No.36 Institute Jiaxing China
Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulati... 详细信息
来源: 评论
Congestion control of Multi-layer Cellular Networks based on Modeling of Transmit Power  3
Congestion Control of Multi-layer Cellular Networks based on...
收藏 引用
2020 3rd International Conference on Modeling, Simulation and Optimization Technologies and Applications, MSOTA 2020
作者: Dai, Jiahao Chen, Yongqun Chen, Yucheng Meng, Aodong Science and Technology on Communication Information Security Control Laboratory China China Electronic Group Corporation NO.36 Institute Zhejiang Jiaxing China
The explosive growth of network traffic and the limited storage node resources make the existing network architecture bear great pressure, and network congestion appears in work and life from time to time. In order to... 详细信息
来源: 评论
A Single-Observer Passive Location Algorithm Base on Weighted Least Squares Criterion  22
A Single-Observer Passive Location Algorithm Base on Weighte...
收藏 引用
22nd IEEE International Conference on communication technology, ICCT 2022
作者: Bin, Jiang An'nan, Lu Mingyi, You Caiyi, Lou Yunxia, Ye Kai, Huang Binhua, Shi Communication Information Security Control Laboratory No.36 Research Institute of Cetc Jiaxing314033 China
Passive location system that locates 'silent' targets using an non-cooperative opportunistic source (also called external illuminator) is great importance in a variety of applications. To solve the problem of ... 详细信息
来源: 评论