咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 385 篇 期刊文献

馆藏范围

  • 1,057 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 522 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 630 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,021 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1057 条 记 录,以下是661-670 订阅
排序:
The design of rotor position observer for dfig during transient grid voltage imbalance
UPB Scientific Bulletin, Series C: Electrical Engineering an...
收藏 引用
UPB Scientific Bulletin, Series C: Electrical engineering and Computer Science 2020年 第4期82卷 275-286页
作者: Wu, Qianqiong Chang, Xiaoying Zhao, Meihua Li, Mingwei College of electrical engineering and automation Luoyang Institute of Science and Technology Luoyang China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
A rotor position observer based on hysteresis comparator (HC) was presented to acquire the rotor position angle of the Doubly-fed induction generator (DFIG) under unbalanced grid Voltage conditions. The position and v... 详细信息
来源: 评论
Body Shape Recognition and Prototype Construction Based on LightGBM Algorithm
Body Shape Recognition and Prototype Construction Based on L...
收藏 引用
2021 International Conference on Applied Mathematics, Modeling and Computer Simulation, AMMCS 2021
作者: Wang, Lanmin Wang, Hongmin Liu, Li Liu, Hao School of Textile Science and Engineering Tiangong University Tianjin China School of Fashion Art and Engineering Beijing Institute of Fashion Technology Beijing China Institute of Smart Wearable Electronic Textiles Tiangong University Tianjin China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The regional characteristics of middle-aged women in Xinjiang are obvious, and the phenomenon of incompatible clothing is prominent. In order to avoid the information loss of principal component analysis or factor ana... 详细信息
来源: 评论
Certificateless non-interactive key exchange protocol without pairings
Certificateless non-interactive key exchange protocol withou...
收藏 引用
International Conference on Security and Cryptography (SECRYPT)
作者: Yun Wei Fushan Wei Chuangui Ma State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute Zhengzhou China
Non-interactive key exchange (NIKE) allows two parties to establish a shared key without communications. In ID-based non-interactive key exchange (ID-NIKE) protocols, private key generator (PKG) knows user's priva... 详细信息
来源: 评论
A Parallel Probabilistic Approach to Factorize a Semiprime
收藏 引用
American Journal of Computational Mathematics 2018年 第2期8卷 175-183页
作者: Jianhui Li Department of Computer Science Guangdong Neusoft Institute Foshan City Foshan China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
In accordance with the distributive traits of semiprimes’ divisors, the article proposes an approach that can find out the small divisor of a semiprime by parallel computing. The approach incorporates a deterministic... 详细信息
来源: 评论
LENSER: A Channel state Information Based Indoor Localization Scheme for Malicious Devices
LENSER: A Channel State Information Based Indoor Localizatio...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Yongqiang Ma Xiangyang Luo Ruixiang Li Shaoyong Du Wenyan Liu Key Laboratory of Cyberspace Situation Awareness of Henan Province State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Rapid and accurate localization of illicit micro-recorders, cameras, and other wireless network devices is of great significance for ensuring public privacy and security. However, existing methods are susceptible to e...
来源: 评论
Bandwidth-based Application-Aware Multipath Routing for NoCs
Bandwidth-based Application-Aware Multipath Routing for NoCs
收藏 引用
2015 International Conference on Computer Information Systems and Industrial Applications(CISIA2015)
作者: X.T.Ding C.X.Yang X.W.Ren P J.Ren Institute of Artificial Intelligence and Robotics Xi'an Jiaotong University State Key Laboratory of Mathematical Engineering and Advanced Computing
Most of routing algorithms for On-chip communication are neither application-aware nor routing packets using multiple *** addition,they hardly consider link bandwidth variation resulting from widely applied global asy... 详细信息
来源: 评论
Fast Scalar Multiplication Algorithm Using Constrained Triple-Base Number System and Its Applications
Fast Scalar Multiplication Algorithm Using Constrained Tripl...
收藏 引用
International Conference on Broadband, Wireless computing, Communication and Applications (BWCCA)
作者: Yunqi Dou Jiang Weng Chuangui Ma Fushan Wei Zhengzhou Information Science and Technology Institute State key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the rapid development of embedded devices, wireless sensor network and Internet of Things, elliptic curve cryptography as a public key cryptography plays an important role to solve the security challenges. How to... 详细信息
来源: 评论
Network Coordinate System using Non-negative Matrix Factorization based on KL Divergence
Network Coordinate System using Non-negative Matrix Factoriz...
收藏 引用
International Conference on advanced Communication Technology
作者: Lixiang Chai Xiangyang Luo Fan Zhao Mingyue Li Siqi Liu The State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute Zhengzhou China
Network coordinate is used to predict the network delay between the network nodes, for the problem that the accuracy of predicting the network delay of the network coordinate system based on non-negative matrix factor... 详细信息
来源: 评论
Design and Implementation of Links Generation for Inter Domain Routing System  12
Design and Implementation of Links Generation for Inter Doma...
收藏 引用
12th International Conference on Information Science and Technology, ICIST 2022
作者: Wang, Yu Qiao, Zhi Yin, Junru Zhang, Mingliang College of Software Henan University of Engineering Zhengzhou China College of Information and Electrical Engineering China Agriculture University Beijing China College of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Network Research Department Zhengzhou China
Due to the inherent flaws of BGP protocol, the security of inter domain routing system has been regularly threatened. Since it is difficult to achieve collaborative defense against existing resources and strategies of... 详细信息
来源: 评论
Interference-assisted kaleidoscopic meta-plexer for arbitrary spin-wavefront manipulation
收藏 引用
Light(Science & Applications) 2019年 第1期8卷 1141-1150页
作者: He-Xiu Xu Guangwei Hu Ying Li Lei Han Jianlin Zhao Yunming Sun Fang Yuan Guang-Ming Wang Zhi Hao Jiang Xiaohui Ling Tie Jun Cui Cheng-Wei Qiu Department of Electrical and Computer Engineering National University of SingaporeSingapore 117583Singapore Air and Missile Defense College Air force Engineering University710051 Xi’anChina Hunan Provincial Key Laboratory of Intelligent Information Processing and Applications College of Physics and Electronics EngineeringHengyang Normal University421008 HengyangChina School of Natural and Applied Sciences Northwestern Polytechnical University710072 Xi’anChina Advanced Technique Department Key Lab of Aeronautics Computing Technique710075 Xi’anChina State Key Laboratory of Millimeter Waves Southeast University210096 NanjingChina
Achieving simultaneous polarization and wavefront control,especially circular polarization with the auxiliary degree of freedom of light and spin angular momentum,is of fundamental importance in many optical *** are t... 详细信息
来源: 评论