咨询与建议

限定检索结果

文献类型

  • 262 篇 会议
  • 91 篇 期刊文献

馆藏范围

  • 353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 125 篇 信息与通信工程
    • 105 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 74 篇 电子科学与技术(可...
    • 29 篇 电气工程
    • 27 篇 仪器科学与技术
    • 21 篇 控制科学与工程
    • 19 篇 生物工程
    • 12 篇 材料科学与工程(可...
    • 11 篇 机械工程
    • 11 篇 网络空间安全
    • 7 篇 土木工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 船舶与海洋工程
    • 6 篇 航空宇航科学与技...
    • 6 篇 安全科学与工程
    • 4 篇 化学工程与技术
  • 110 篇 理学
    • 59 篇 数学
    • 31 篇 物理学
    • 19 篇 生物学
    • 19 篇 统计学(可授理学、...
    • 12 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 36 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 9 篇 军事学
    • 6 篇 军队指挥学
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 医学
  • 1 篇 农学

主题

  • 15 篇 simulation
  • 15 篇 feature extracti...
  • 14 篇 deep learning
  • 14 篇 bandwidth
  • 14 篇 cognitive radio
  • 13 篇 modulation
  • 8 篇 signal to noise ...
  • 8 篇 metamaterials
  • 8 篇 receivers
  • 8 篇 heuristic algori...
  • 7 篇 interference
  • 7 篇 algorithm design...
  • 7 篇 microstrip anten...
  • 7 篇 clustering algor...
  • 7 篇 sensors
  • 6 篇 optimization
  • 6 篇 time-frequency a...
  • 6 篇 location awarene...
  • 6 篇 security
  • 6 篇 estimation

机构

  • 180 篇 science and tech...
  • 43 篇 science and tech...
  • 16 篇 institute of cyb...
  • 15 篇 no.36 research i...
  • 14 篇 the 36th researc...
  • 12 篇 dept. of microwa...
  • 11 篇 college of infor...
  • 9 篇 school of commun...
  • 8 篇 the science and ...
  • 7 篇 science and tech...
  • 7 篇 college of under...
  • 6 篇 no.36 research i...
  • 6 篇 university of el...
  • 6 篇 school of softwa...
  • 5 篇 state key labora...
  • 5 篇 no.36 research i...
  • 5 篇 school of inform...
  • 5 篇 school of comput...
  • 5 篇 electronic engin...
  • 5 篇 shenzhen researc...

作者

  • 23 篇 hua jun
  • 22 篇 yang xiaoniu
  • 20 篇 xiaoniu yang
  • 17 篇 wu qun
  • 15 篇 xuan qi
  • 14 篇 shilian zheng
  • 13 篇 zheng shilian
  • 13 篇 zhu huijie
  • 11 篇 wang lijun
  • 11 篇 lijun wang
  • 11 篇 huijie zhu
  • 10 篇 xiaofeng xu
  • 9 篇 huaji zhou
  • 9 篇 wang wei
  • 9 篇 jiahao dai
  • 8 篇 wenhua ye
  • 8 篇 dai jiahao
  • 8 篇 weiguo shen
  • 8 篇 jiang bin
  • 8 篇 huan li

语言

  • 330 篇 英文
  • 15 篇 中文
  • 8 篇 其他
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory NO.36"
353 条 记 录,以下是261-270 订阅
排序:
On the Achievability of Interference Alignment for Three-Cell MIMO Interfering Broadcast Channel
On the Achievability of Interference Alignment for Three-Cel...
收藏 引用
2015 IEEE 16th International Conference on communication technology(ICCT 2015)
作者: Xiaofeng Xu Caowei Wang Science and Technology on Communication Information Security Control Laboratory Beijing University of Posts and Telecommunications
Interference alignment(IA) is a promising technique to effectively mitigate interference in wireless communication *** this paper,a novel IA based scheme is proposed,which is jointed design of transmit precoding matri... 详细信息
来源: 评论
Uncertain dynamic skyline queries for uncertain databases
Uncertain dynamic skyline queries for uncertain databases
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: ZhiBang Yang XiaoNiu Yang Xu Zhou Science and Technology on Communication Information Security Control Laboratory Zhejiang Jiaxing 314001 China Science and Technology on Communication Information Security Control Laboratory Zhejiang Jiaxing China College of Mathematics and Information Engineering Jiaxing University Zhejiang Jiaxing China
In this paper, we research the relationship between the probabilistic products and customer preferences, which has not been studied before. In order to find out products which can meet a customer's maximum demand,... 详细信息
来源: 评论
Profiling and identifying users' activities with network traffic analysis
Profiling and identifying users' activities with network tra...
收藏 引用
IEEE International Conference on Software Engineering and Service sciences (ICSESS)
作者: Ma Tao Ye Chun Ming Chen Juan Science and Technology on Communication Information Security Control Laboratory Jiaxing China Army Officer Academy Hefei China
Traffic identification technique is used for classification of different network protocols and applications even with detection of users' network activities. In this paper, we conduct our study on some typical use... 详细信息
来源: 评论
A new important-place identification method
A new important-place identification method
收藏 引用
International Conference on Computer and communications (ICCC)
作者: Chun-lai Ma Tao Ma Hong Shan Electronic Engineering Institute Hefei China Science and Technology on Communication Information Security Control Laboratory Hefei China
For the problem that the location of LBSN users was sparse because of it was updated sporadically. An important place identification method was studied by improving the clustering algorithm. Firstly, a velocity prunin... 详细信息
来源: 评论
On the achievability of interference alignment for three-cell MIMO interfering broadcast channel
On the achievability of interference alignment for three-cel...
收藏 引用
International Conference on communication technology (ICCT)
作者: Xiaofeng Xu Caowei Wang Science and Technology on Communication Information Security Control Laboratory JiaXing China Beijing University of Posts and Telecommunications Beijing China
Interference alignment (IA) is a promising technique to effectively mitigate interference in wireless communication systems. In this paper, a novel IA based scheme is proposed, which is jointed design of transmit prec... 详细信息
来源: 评论
The identification algorithm of network key role based on behavior accumulation  10
The identification algorithm of network key role based on be...
收藏 引用
10th International Conference on Wireless communications, Networking and Mobile Computing, WiCOM 2014
作者: Xu, Xiaofeng Li, Xiao Science and Technology on Communication Information Security Control Laboratory Jiaxing China Chinese Electronic Technology Group Corporation No.36 Institute Jiaxing China
Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulati... 详细信息
来源: 评论
An improved algorithm for minimum connected dominating sets in ad hoc networks
收藏 引用
ICIC Express Letters, Part B: Applications 2015年 第1期6卷 201-206页
作者: Yang, Hong-Wa Yang, Xiao-Niu Li, Xin-Feng Lu, Zhe-Ming Science and Technology on Communication Information Security Control Laboratory Jiaxing China School of Aeronautics and Astronautics Zhejiang University No. 38 Zheda Road Hangzhou China
Given a graph, a connected dominating set is a subset of vertices such that every vertex is either in the subset or adjacent to a vertex in the subset and the subgraph induced by the subset is connected. A minimum con... 详细信息
来源: 评论
Using MATSim to simulate carpooling and car-sharing trips
Using MATSim to simulate carpooling and car-sharing trips
收藏 引用
World Congress on information technology and Computer Applications
作者: Hedi Ayed Djamel Khadraoui Riad Aggoune Science and Technology on Communication Information Security Control Laboratory Jiangnan Electronic Communication Research Institute Jiaxing China College of Information and Control Engineering China University of Petroleum (East China) Qingdao China
The car still represents the bulk of urban transport in large cities. However the weight of the car tends to be reduced as a result of public policies, the emergence of new transport alternatives and the increasing co... 详细信息
来源: 评论
A Method of the Detection of Frequency-hopping Signal Based on Channelized Receiver in the Complicated Electromagnetic Environment
A Method of the Detection of Frequency-hopping Signal Based ...
收藏 引用
International Conference on Intelligent information Hiding and Multimedia Signal Processing
作者: Yi-jia Zhang Rui-ying Liu Hua-jun Song Science and Technology on Communication Information Security Control Laboratory Jiangnan Electronic Communication Research Institute Jiaxing China College of Information and Control Engineering China University of Petroleum (East China) Qingdao China
A new method is studied and designed in this paper to strengthen the adaptability and practicability of frequency-hopping (FH) signal detection under the complicated electromagnetic environment. The proposed method in... 详细信息
来源: 评论
Topology analysis of wireless mesh network based on 802.11a
Topology analysis of wireless mesh network based on 802.11a
收藏 引用
Chinese control and Decision Conference, CCDC
作者: Yi-jia Zhang Jun Sun Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033 China China Electronics Technology Group Corporation No.36 Institute Jiaxing 314033 China
The system architecture, analysis process and the key technology and test results of the topology analysis system, which based on wireless Mesh network are introduced in this paper. This paper is achieved the 802.11a ... 详细信息
来源: 评论