咨询与建议

限定检索结果

文献类型

  • 262 篇 会议
  • 91 篇 期刊文献

馆藏范围

  • 353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 125 篇 信息与通信工程
    • 105 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 74 篇 电子科学与技术(可...
    • 29 篇 电气工程
    • 27 篇 仪器科学与技术
    • 21 篇 控制科学与工程
    • 19 篇 生物工程
    • 12 篇 材料科学与工程(可...
    • 11 篇 机械工程
    • 11 篇 网络空间安全
    • 7 篇 土木工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 船舶与海洋工程
    • 6 篇 航空宇航科学与技...
    • 6 篇 安全科学与工程
    • 4 篇 化学工程与技术
  • 110 篇 理学
    • 59 篇 数学
    • 31 篇 物理学
    • 19 篇 生物学
    • 19 篇 统计学(可授理学、...
    • 12 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 36 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 9 篇 军事学
    • 6 篇 军队指挥学
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 医学
  • 1 篇 农学

主题

  • 15 篇 simulation
  • 15 篇 feature extracti...
  • 14 篇 deep learning
  • 14 篇 bandwidth
  • 14 篇 cognitive radio
  • 13 篇 modulation
  • 8 篇 signal to noise ...
  • 8 篇 metamaterials
  • 8 篇 receivers
  • 8 篇 heuristic algori...
  • 7 篇 interference
  • 7 篇 algorithm design...
  • 7 篇 microstrip anten...
  • 7 篇 clustering algor...
  • 7 篇 sensors
  • 6 篇 optimization
  • 6 篇 time-frequency a...
  • 6 篇 location awarene...
  • 6 篇 security
  • 6 篇 estimation

机构

  • 180 篇 science and tech...
  • 43 篇 science and tech...
  • 16 篇 institute of cyb...
  • 15 篇 no.36 research i...
  • 14 篇 the 36th researc...
  • 12 篇 dept. of microwa...
  • 11 篇 college of infor...
  • 9 篇 school of commun...
  • 8 篇 the science and ...
  • 7 篇 science and tech...
  • 7 篇 college of under...
  • 6 篇 no.36 research i...
  • 6 篇 university of el...
  • 6 篇 school of softwa...
  • 5 篇 state key labora...
  • 5 篇 no.36 research i...
  • 5 篇 school of inform...
  • 5 篇 school of comput...
  • 5 篇 electronic engin...
  • 5 篇 shenzhen researc...

作者

  • 23 篇 hua jun
  • 22 篇 yang xiaoniu
  • 20 篇 xiaoniu yang
  • 17 篇 wu qun
  • 15 篇 xuan qi
  • 14 篇 shilian zheng
  • 13 篇 zheng shilian
  • 13 篇 zhu huijie
  • 11 篇 wang lijun
  • 11 篇 lijun wang
  • 11 篇 huijie zhu
  • 10 篇 xiaofeng xu
  • 9 篇 huaji zhou
  • 9 篇 wang wei
  • 9 篇 jiahao dai
  • 8 篇 wenhua ye
  • 8 篇 dai jiahao
  • 8 篇 weiguo shen
  • 8 篇 jiang bin
  • 8 篇 huan li

语言

  • 330 篇 英文
  • 15 篇 中文
  • 8 篇 其他
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory NO.36"
353 条 记 录,以下是271-280 订阅
排序:
Software design for high-speed data capture
Software design for high-speed data capture
收藏 引用
2014 2nd International Conference on Mechatronics, Robotics and Automation, ICMRA 2014
作者: Zhang, Wei Feng Science and Technology on Communication Information Security Control Laboratory Jiangnan Electronic Communication Institute Jiaxing Zhejiang China
10G Ethernet technology has been widely used in modern high speed communication system. As a result, program design for high-speed data capture on 10G Ethernet, as the first and important step in network monitor and a... 详细信息
来源: 评论
Anonymous aggregator election protocol for wireless sensor networks
收藏 引用
Tongxin Xuebao/Journal on communications 2015年 第2期36卷
作者: Fu, Shuai Ma, Jian-Feng Li, Hong-Tao Jiang, Qi School of Computer Science and Technology Xidian University Xi'an710071 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China
An anonymous cluster head election protocol in clustered wireless sensor networks was proposed. The protocol detailed the decision rules and mode of cluster construction while an anonymous veto protocol based on bilin... 详细信息
来源: 评论
A security routing protocol of ad hoc network based on node trust evalution
A security routing protocol of ad hoc network based on node ...
收藏 引用
2014 International Conference on information and Network security, ICINS 2014
作者: Li, Yahui Yang, Hongwa Xie, Fei Science and technology on communication information security control laboratory Jiaxing China Northern electronic instrument institute Beijing China
The routing protocol is the core of the Ad Hoc network protocols, which largely determines the performance and features of an Ad Hoc network. Aiming at the characteristics of the Mobile Radio Ad Hoc network, this pape... 详细信息
来源: 评论
The identification algorithm of network key role based on behavior accumulation
The identification algorithm of network key role based on be...
收藏 引用
10th International Conference on Wireless communications, Networking and Mobile Computing (WiCOM 2014)
作者: Xiaofeng Xu Xiao Li Science and Technology on Communication Information Security Control Laboratory Jiaxing China Chinese Electronic Technology Group Corporation No.36 Institute Jiaxing China
Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulati... 详细信息
来源: 评论
Group establishing algorithm for strategic mobile scenario in manets
Group establishing algorithm for strategic mobile scenario i...
收藏 引用
2014 International Conference on information and communications Technologies, ICT 2014
作者: Xu, Xiaofeng Wang, Xiao Science and Technology on Communication Information Security Control Laboratory China Electronic Group Corporation No. 36 Institute Zhejiang Jinxing China School of Instrument Science and Opto-Electronics Engineering Beijing University of Aeronautics and Astronautics Beijing China
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. In MANETS, the performance is significantly degraded as the scale of the network grows, which has lot... 详细信息
来源: 评论
Group establishing algorithm for strategic mobile scenario in manets
Group establishing algorithm for strategic mobile scenario i...
收藏 引用
2014 International Conference on information and communications Technologies, ICT 2014
作者: Xiaofeng, Xu Xiao, Wang Science and Technology on Communication Information Security Control Laboratory China Electronic Group Corporation No. 36 Institute Zhejiang Jinxing China School of Instrument Science and Opto-electronics Engineering Beijing University of Aeronautics and Astronautics Beijing China
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. In MANETS, the performance is significantly degraded as the scale of the network grows, which has lot... 详细信息
来源: 评论
A virtual machine migration scheme toward green cloud  5
A virtual machine migration scheme toward green cloud
收藏 引用
2013 5th International Conference on Advanced Computer control, ICACC 2013
作者: Zhang, Liu-Mei Ma, Jian-Feng Lu, D. Wang, Yi-Chuan School of Computer Science and Technology Xidian University Xian China School of Computer Science Xian Shiyou University Xian China Science and Technology on Communication Information Security Control Laboratory Jiaxing China
As Cloud computing is growing, severe energy consumption of the cloud cluster poses new challenges for environmental protection. In this paper, we present a novel algorithm to support the concept of Green Cloud comput... 详细信息
来源: 评论
Game optimization for incomplete key set MAC signature scheme  5
Game optimization for incomplete key set MAC signature schem...
收藏 引用
2013 5th International Conference on Advanced Computer control, ICACC 2013
作者: Wang, Yichuan Ma, Jianfeng Zhang, Liumei Lu, D. School of Computer Science and Technology Xidian University Xi’an China Science and Technology on Communication Information Security Control Laboratory Jiaxing China School of Computer Science Xi’an Shiyou University Xi’an China
security and efficiency for using RSA signature scheme are critical requirements for many network applications. In this paper, we present a game model for Incomplete Key Set Signature Scheme (GMIKSS). By analyzing our... 详细信息
来源: 评论
Passive Radar Source Localization Based on PSAAA Using Single Small Size Aircraft
Passive Radar Source Localization Based on PSAAA Using Singl...
收藏 引用
IEEE Globecom Workshops
作者: Benjian Hao Jianfeng Zhu Zan Li Song Xiao Lang Tong State Key Laboratory of Integrated Services Networks Xidian University Xi an China 710071 Science and Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang China 314033
This paper considers the problem of how to accurately and passively localise the hostile radar position based on only one small size aircraft. Inspired by Synthetic Aperture Sonar (SAS), Synthetic Aperture Radar (SAR)... 详细信息
来源: 评论
Dynamic fairness evaluation framework for cloud computing
收藏 引用
Tongxin Xuebao/Journal on communications 2014年 第7期35卷 140-150页
作者: Lu, Di Ma, Jian-Feng Wang, Yi-Chuan Xi, Ning Meng, Xian-Jia School of Computer Science Xidian University Xi'an710071 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China
Dynamic fairness evaluation framework (DFE) was given according to the dynamic features of resources in cloud environment. In DFE, the factors of fairness, efficiency and time were introduced, and the allocation resul... 详细信息
来源: 评论