咨询与建议

限定检索结果

文献类型

  • 419 篇 会议
  • 396 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 816 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 582 篇 工学
    • 289 篇 计算机科学与技术...
    • 270 篇 信息与通信工程
    • 207 篇 软件工程
    • 132 篇 电子科学与技术(可...
    • 69 篇 仪器科学与技术
    • 68 篇 控制科学与工程
    • 59 篇 机械工程
    • 48 篇 电气工程
    • 44 篇 光学工程
    • 38 篇 动力工程及工程热...
    • 36 篇 网络空间安全
    • 22 篇 生物工程
    • 14 篇 力学(可授工学、理...
    • 13 篇 航空宇航科学与技...
    • 12 篇 安全科学与工程
    • 11 篇 化学工程与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 土木工程
  • 303 篇 理学
    • 165 篇 物理学
    • 121 篇 数学
    • 33 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 23 篇 生物学
    • 11 篇 化学
  • 110 篇 管理学
    • 85 篇 管理科学与工程(可...
    • 32 篇 工商管理
    • 30 篇 图书情报与档案管...
  • 29 篇 军事学
    • 28 篇 军队指挥学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 法学
  • 6 篇 医学
  • 4 篇 农学
  • 1 篇 文学

主题

  • 41 篇 wireless communi...
  • 32 篇 quantum cryptogr...
  • 31 篇 wireless sensor ...
  • 28 篇 quantum communic...
  • 19 篇 simulation
  • 18 篇 cognitive radio
  • 17 篇 interference
  • 16 篇 delays
  • 16 篇 quality of servi...
  • 16 篇 optimization
  • 14 篇 network coding
  • 13 篇 energy efficienc...
  • 12 篇 routing
  • 12 篇 servers
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 resource managem...
  • 11 篇 security
  • 11 篇 correlation
  • 11 篇 cloud computing

机构

  • 63 篇 institute of qua...
  • 62 篇 college of compu...
  • 62 篇 key lab of broad...
  • 62 篇 key lab of broad...
  • 57 篇 key lab of broad...
  • 49 篇 jiangsu high tec...
  • 43 篇 key lab of broad...
  • 39 篇 key laboratory o...
  • 33 篇 institute of sig...
  • 31 篇 key laboratory o...
  • 30 篇 national mobile ...
  • 28 篇 institute of sig...
  • 18 篇 key laboratory o...
  • 16 篇 key laboratory o...
  • 16 篇 national laborat...
  • 15 篇 key lab of broad...
  • 15 篇 key laboratory o...
  • 13 篇 nanjing universi...
  • 13 篇 key lab of broad...
  • 13 篇 school of scienc...

作者

  • 36 篇 qin wang
  • 35 篇 yang zhen
  • 32 篇 wang ruchuan
  • 29 篇 lei wang
  • 22 篇 jianxin chen
  • 22 篇 mingkai chen
  • 21 篇 yu-bo sheng
  • 21 篇 wang qin
  • 21 篇 lan zhou
  • 20 篇 yang geng
  • 19 篇 baoyu zheng
  • 18 篇 jingwu cui
  • 17 篇 wang lei
  • 17 篇 zhen yang
  • 17 篇 sun zhixin
  • 17 篇 zhixin sun
  • 16 篇 chun-hui zhang
  • 15 篇 dong hu
  • 14 篇 kun wang
  • 14 篇 chen mingkai

语言

  • 767 篇 英文
  • 35 篇 中文
  • 14 篇 其他
检索条件"机构=The Key Lab. of Broadband Wireless Communication and Sensor Network Technology"
816 条 记 录,以下是231-240 订阅
排序:
LANDMARC Localization Algorithm Based on Weight Optimization
收藏 引用
Chinese Journal of Electronics 2018年 第6期27卷 1291-1296页
作者: HU Bing PENG Huijun SUN Zhixin Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Ministry of EducationNanjing University of Posts and Telecommunications
In order to solve the problem that the difference of Received signal strength(RSS) between tags will become large when tags are close to the reader, which exists in LANDMARC system, a LANDMARC localization algorithm b... 详细信息
来源: 评论
A Novel Shilling Attack Detection Model Based on Particle Filter and Gravitation
收藏 引用
China communications 2019年 第10期16卷 112-132页
作者: Lingtao Qi Haiping Huang Feng Li Reza Malekian Ruchuan Wang College of Computer Nanjing University of Posts and TelecommunicationsNanjing 210003China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003China “Broadband Wireless Communication and Sensor Network Technology”Key Lab of Ministry of Education NUPTNanjing 210003China College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing 210016China Department of Computer Science and Media Technology Malmo UniversityMalmo 20506Sweden
With the rapid development of e-commerce, the security issues of collab.rative filtering recommender systems have been widely investigated. Malicious users can benefit from injecting a great quantities of fake profile... 详细信息
来源: 评论
Dynamic embedding and scheduling of virtual network service for future networks
Dynamic embedding and scheduling of virtual network service ...
收藏 引用
2019 IEEE International Conference on communications Workshops, ICC Workshops 2019
作者: Cao, Haotong Zhang, Yao Yang, Longxiang Key Lab of Broadband Wireless Communications and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing China
Software defined networking (SDN) and network function virtualization (NFV) are two most promising approaches for implementing the network virtualization. Traditional Internet will be transformed into SDN/NFV-enabled ... 详细信息
来源: 评论
Energy Efficiency Optimization in Heterogeneous networks Based on Deep Reinforcement Learning
Energy Efficiency Optimization in Heterogeneous Networks Bas...
收藏 引用
IEEE International Conference on communications Workshops, ICC
作者: Daoping Shi Feng Tian Shengchen Wu Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing Universityof Posts and Telecommunications) Ministry of Education Nanjing China Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Nanjing China
To meet the rapid increasing requirement of service and application of communication, heterogeneous wireless networks with the macrocell and the femtocells are considered in this paper. How to deal with resource alloc... 详细信息
来源: 评论
Direct measurement of the concurrence of hybrid entangled state based on parity check measurements
收藏 引用
Chinese Physics B 2019年 第1期28卷 205-209页
作者: Man Zhang Lan Zhou Wei Zhong Yu-Bo Sheng Institute of Quantum Information and Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China School of Science Nanjing University of Posts and TelecommunicationsNanjing 210003China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology(Ministry of Education) Nanjing University of Posts and TelecommunicationsNanjing 210003China
The hybrid entangled state is widely discussed in quantum information processing. In this paper, we propose the first protocol to directly measure the concurrence of the hybrid entangled state. To complete the measure... 详细信息
来源: 评论
SiamIRPN: Siamese Visual Tracking with Improved Region Proposal networks
SiamIRPN: Siamese Visual Tracking with Improved Region Propo...
收藏 引用
Frontiers of Robotics and Software Engineering (FRSE), International Conference on
作者: Dun Cao Renhua Dai Tianyu Zhao Fayez Alqahtani Amr Tolba R. Simon Sherratt Min Zhu School of Computer and Communications Engineering Changsha University of Science and Technology Changsha Hunan China Key Lab of Broadcast Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Software Engineering Department College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia Computer Science Department Community College King Saud University Riyadh Saudi Arabia School of Biomedical Engineering The University of Reading United Kingdom College of Information Science and Technology Zhejiang Shuren University Zhejiang China
Though introducing the Region Proposal network (RPN) from object detection enabled Siamese trackers’ success, RPN-based trackers still struggle in challenging scenarios. We posit that the reason comes from two major ...
来源: 评论
Secrecy Outage Probability Analysis Based on Cognitive Decode-and-Forward Relaying
收藏 引用
Computers, Materials & Continua 2020年 第3期62卷 1387-1395页
作者: Ruoyu Su Xiaojun Sun Fei Ding Dengyin Zhang Hongbo Zhu M.I.M.Wahab Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Tele-CommunicationsNanjing210003China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China School of Information Science and Engineering Southeast UniversityNanjing210018China Department of Electrical and Computer Engineering Faculty of Engineering and Applied ScienceMemorial University of NewfoundlandSt.John’sA1B 3X5Canada Department of Mechanical and Industrial Engineering Ryerson UniversityToronto M5B 2K3Canada
wireless communications have to face to several different security issues in practice due to the nature of *** information theory is well known to provide efficient approaches to address security issues in wireless co... 详细信息
来源: 评论
Optimization on Cooperative communications Based on network Coding in Multi-hop wireless networks
Optimization on Cooperative Communications Based on Network ...
收藏 引用
International wireless communications and Mobile Computing Conference, IWCMC
作者: Xiande Bu Chuan Liu Qiang Yu Lei Yin Feng Tian State Grid Laboratory of Electric Power Communication Network Global Energy Interconnection Research Institute Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing Universityof Posts and Telecommunications) Ministry of Education Nanjing China
Cooperative communications (CC) based on network coding (NC) can significantly increase the capacity of wireless networks. In this paper, we investigate how to apply NC in multi-hop wireless networks with multiple rel... 详细信息
来源: 评论
Fog node selection for low latency communication and anomaly detection in fog networks
Fog node selection for low latency communication and anomaly...
收藏 引用
2019 International Conference on communications, Information System, and Computer Engineering, CISCE 2019
作者: Li, Yuxiao Zhang, Yazhong Liu, Yuxiang Meng, Qingmin Tian, Feng Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education College of Telecommunications and Information Engineering Nanjing210003 China
The application of 5G in IOT (Internet of things) puts forward strict requirements for network latency. In view of the fog network scenario with large-scale IOT devices, this paper proposes a procedure of unsupervised... 详细信息
来源: 评论
Privacy amplification scheme based on composite coding
arXiv
收藏 引用
arXiv 2021年
作者: Li, Wei Zhao, Shengmei Nanjing University of Posts and Telecommunications Institute of Signal Processing and Transmission Nanjing210003 China Nanjing University of Posts and Telecommunications Key Lab Broadband Wireless Communication and Sensor Network Ministy of Education Nanjing210003 China National Laboratory of Solid State Microstructures Nanjing University Nanjing210093 China
Privacy amplification is an indispensable step in the post-processing of quantum key distribution, which can be used to compress the redundancy of shared key and improve the security level of the key. The commonly use... 详细信息
来源: 评论