咨询与建议

限定检索结果

文献类型

  • 262 篇 会议
  • 91 篇 期刊文献

馆藏范围

  • 353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 125 篇 信息与通信工程
    • 105 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 74 篇 电子科学与技术(可...
    • 29 篇 电气工程
    • 27 篇 仪器科学与技术
    • 21 篇 控制科学与工程
    • 19 篇 生物工程
    • 12 篇 材料科学与工程(可...
    • 11 篇 机械工程
    • 11 篇 网络空间安全
    • 7 篇 土木工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 船舶与海洋工程
    • 6 篇 航空宇航科学与技...
    • 6 篇 安全科学与工程
    • 4 篇 化学工程与技术
  • 110 篇 理学
    • 59 篇 数学
    • 31 篇 物理学
    • 19 篇 生物学
    • 19 篇 统计学(可授理学、...
    • 12 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 36 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 9 篇 军事学
    • 6 篇 军队指挥学
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 医学
  • 1 篇 农学

主题

  • 15 篇 simulation
  • 15 篇 feature extracti...
  • 14 篇 deep learning
  • 14 篇 bandwidth
  • 14 篇 cognitive radio
  • 13 篇 modulation
  • 8 篇 signal to noise ...
  • 8 篇 metamaterials
  • 8 篇 receivers
  • 8 篇 heuristic algori...
  • 7 篇 interference
  • 7 篇 algorithm design...
  • 7 篇 microstrip anten...
  • 7 篇 clustering algor...
  • 7 篇 sensors
  • 6 篇 optimization
  • 6 篇 time-frequency a...
  • 6 篇 location awarene...
  • 6 篇 security
  • 6 篇 estimation

机构

  • 180 篇 science and tech...
  • 43 篇 science and tech...
  • 16 篇 institute of cyb...
  • 15 篇 no.36 research i...
  • 14 篇 the 36th researc...
  • 12 篇 dept. of microwa...
  • 11 篇 college of infor...
  • 9 篇 school of commun...
  • 8 篇 the science and ...
  • 7 篇 science and tech...
  • 7 篇 college of under...
  • 6 篇 no.36 research i...
  • 6 篇 university of el...
  • 6 篇 school of softwa...
  • 5 篇 state key labora...
  • 5 篇 no.36 research i...
  • 5 篇 school of inform...
  • 5 篇 school of comput...
  • 5 篇 electronic engin...
  • 5 篇 shenzhen researc...

作者

  • 23 篇 hua jun
  • 22 篇 yang xiaoniu
  • 20 篇 xiaoniu yang
  • 17 篇 wu qun
  • 15 篇 xuan qi
  • 14 篇 shilian zheng
  • 13 篇 zheng shilian
  • 13 篇 zhu huijie
  • 11 篇 wang lijun
  • 11 篇 lijun wang
  • 11 篇 huijie zhu
  • 10 篇 xiaofeng xu
  • 9 篇 huaji zhou
  • 9 篇 wang wei
  • 9 篇 jiahao dai
  • 8 篇 wenhua ye
  • 8 篇 dai jiahao
  • 8 篇 weiguo shen
  • 8 篇 jiang bin
  • 8 篇 huan li

语言

  • 330 篇 英文
  • 15 篇 中文
  • 8 篇 其他
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory NO.36"
353 条 记 录,以下是191-200 订阅
排序:
Feature Explainable Deep Classification for Signal Modulation Recognition
Feature Explainable Deep Classification for Signal Modulatio...
收藏 引用
Annual Conference of Industrial Electronics Society
作者: Jinyin Chen Shenghuan Miao Haibin Zheng Shilian Zheng College of Information Engineering Zhejiang University of Technology Hangzhou China Science and Technology on Communication Information Security Control Laboratory Jiaxing China
Signal modulation recognition plays a critical role in many fields to identify the modulation type of wireless signals. Since the deep learning based models have achieved great success in classification tasks, more de... 详细信息
来源: 评论
An Intrusion Prevention Scheme for Malicious Network Traffic Based on SDN
An Intrusion Prevention Scheme for Malicious Network Traffic...
收藏 引用
作者: Xiaofeng Xu Jiahao Dai Yifang Zhi Science and Technology on Communication Information Security Control Laboratory China Electronic Group Corporation NO.36 Institute Xidian University
In recent years,SDN technology has developed rapidly,and the security of SDN is the key to its further development and *** prevention system possesses both the features of intrusion detection and protection,which is o... 详细信息
来源: 评论
An Indoor Wi-Fi Positioning Approach optimized by Virtual Node
An Indoor Wi-Fi Positioning Approach optimized by Virtual No...
收藏 引用
International Conference on Computers, communications, and Systems (ICCCS)
作者: Jie-tai Wang Xiao-niu Yang Zhen-xing Luo School of Mathematics and Information Engineering Jiaxing University Jiaxing China Science and Technology on Communication Information Security Control Laboratory Jiaxing China
In the indoor positioning application based on the Wi-Fi range-based positioning algorithm, on the one hand, due to the characteristics of the wireless propagation model, the final position of the node calculated by t... 详细信息
来源: 评论
Research on the Construction of a Novel Cyberspace security Ecosystem
收藏 引用
Engineering 2018年 第1期4卷 47-52页
作者: Xiao-Niu Yang Wei Wang Xiao-Feng Xu Guo-Rong Pang Chun-Lei Zhang Science and Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang 314033 China Science and Technology on Electro-Optical Information Security Control Laboratory Tianfin 300300 China
Given the challenges facing the cyberspace of the nation, this paper presents the tripartite theory of cyberspace, based on the status quo of cyberspace. Corresponding strategies and a research architecture are propos... 详细信息
来源: 评论
Code Similarity Detection Technique Based on AST Unsupervised Clustering Method
Code Similarity Detection Technique Based on AST Unsupervise...
收藏 引用
International Conference on Computer and communications (ICCC)
作者: Yifan Xie Wenan Zhou Huamiao Hu Zhicheng Lu Mengyuan Wu School of Computer Science Beijing University of Posts and Telecommunications Beijing China Science and Technology on Communication Information Security Control Laboratory Beijing China
Code similarity detection is one of the important means to maintain the healthy development of the software eco-environment. Early code similarity detection method is mainly based on the code attribute measurement tec... 详细信息
来源: 评论
Bitstream Protocol Classification Mechanism Based on Feature Extraction
Bitstream Protocol Classification Mechanism Based on Feature...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Wei Wang Binbin Bai Yichuan Wang Xinhong Hei Li Zhang Science and Technology on communication Information Security control Laboratory No.36 Research Institution of CETC College of Computer Science and Engineering Xi'an University of Technology Xi'an China
In recent years, with the continuous expansion of network communication scale, the types of niche protocols and various proprietary communication protocols are increasing day by day, but botnet and various network att... 详细信息
来源: 评论
SAR Image Processing and Target Detection Based on 2D Singularity Power Spectrum in Time-frequency Domain
SAR Image Processing and Target Detection Based on 2D Singul...
收藏 引用
IEEE International Conference on Signal and Image Processing (ICSIP)
作者: Junye Li Gang Xiong Baigang Huang School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Science and Technology on Communication Information Security Control Laboratory Jiaxing China
A method for SAR image processing and target detection based on two-dimensional singularity power spectrum (2D-SPS) in time-frequency domain is proposed in this paper. Firstly, the two-dimensional pseudo Wigner-Ville ... 详细信息
来源: 评论
Mobile communication Signal Selection Algorithm for Signal of Opportunity Navigation
Mobile Communication Signal Selection Algorithm for Signal o...
收藏 引用
International Conference on Advanced communication technology (ICACT)
作者: Huijie Zhu Wei Xu Yalou Sang Zhiqiang Yao Limei Liu Moses C. Okonkw Science and Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang China Changsha Technology Research Institute of Beidou Industry Safety Changsha Hunan China People's Liberation Army of China PLA92126 Fuzhou Fujian China School of Automation and Electronic Information Xiangtan University Xiangtan Hunan China
At present, the satellite navigation and positioning system can provide a high precision positioning service to end users in outdoor environments. But in urban canyons, high-rise buildings, urban tunnels, tree canopy ... 详细信息
来源: 评论
Distributed Blanket Jamming Resource Scheduling for Satellite Navigation Based on Particle Swarm Optimization and Genetic Algorithm
Distributed Blanket Jamming Resource Scheduling for Satellit...
收藏 引用
International Conference on communication technology (ICCT)
作者: Zhaoyi Luo Min Deng Zhiqiang Yao Xiaofan Leng Yongqi Chen Science and Technology on Communication Information Security Control Laboratory Jiaxing China Xiangtan University Xiangtan China Navigation and Remote Sensing Research Xiangtan University’s Centre for Intelligent Xiangtan China Security Control Laboratory Science and Technology on Communication Information Jiaxing China Changsha Technology Research Institute of Beidou Industry Safety Changsha China
Jamming technology for satellite navigation has been widely used in some fields. The distributed jamming system contains a large number of jamming sources. How to schedule the limited resources efficiently to fully ut... 详细信息
来源: 评论
Data Link Modeling and Simulation Based on DEVS  19
Data Link Modeling and Simulation Based on DEVS
收藏 引用
Proceedings of the 2019 2nd International Conference on Signal Processing and Machine Learning
作者: Zhenxing Luo Lulu Zhao Wanyong Tian Dan Yang Yiyuan Chen Jiabin Yu Jianjun Li Science and Technology on Communication Information Security Control Laboratory Jiaxing China CETC Key Laboratory of Data Link Technology Xi'An China Hangzhou Dianzi University Hangzhou China
The Discrete Event System (DEVS)[1] Specification provides a reference standard for the model design and simulation development of complex discrete event state system. It designs a formal mechanism to describe discret... 详细信息
来源: 评论