咨询与建议

限定检索结果

文献类型

  • 5,445 篇 期刊文献
  • 662 篇 会议

馆藏范围

  • 6,107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,917 篇 工学
    • 2,324 篇 计算机科学与技术...
    • 1,466 篇 软件工程
    • 912 篇 机械工程
    • 679 篇 控制科学与工程
    • 505 篇 仪器科学与技术
    • 393 篇 信息与通信工程
    • 364 篇 网络空间安全
    • 287 篇 电子科学与技术(可...
    • 180 篇 交通运输工程
    • 152 篇 材料科学与工程(可...
    • 100 篇 电气工程
    • 91 篇 航空宇航科学与技...
    • 90 篇 动力工程及工程热...
    • 78 篇 建筑学
    • 68 篇 土木工程
    • 65 篇 力学(可授工学、理...
    • 64 篇 光学工程
    • 42 篇 化学工程与技术
    • 35 篇 水利工程
  • 1,286 篇 管理学
    • 1,186 篇 管理科学与工程(可...
    • 100 篇 工商管理
  • 868 篇 理学
    • 464 篇 数学
    • 221 篇 系统科学
    • 94 篇 物理学
    • 51 篇 生物学
  • 230 篇 教育学
    • 187 篇 教育学
  • 152 篇 经济学
    • 147 篇 应用经济学
  • 146 篇 医学
    • 60 篇 临床医学
  • 138 篇 艺术学
    • 134 篇 设计学(可授艺术学...
  • 86 篇 军事学
    • 74 篇 军队指挥学
  • 50 篇 法学
  • 50 篇 农学
  • 32 篇 文学
  • 18 篇 哲学
  • 17 篇 历史学

主题

  • 104 篇 计算机网络
  • 76 篇 遗传算法
  • 75 篇 数据挖掘
  • 68 篇 计算机
  • 66 篇 网络安全
  • 59 篇 internet
  • 50 篇 设计
  • 45 篇 面向对象
  • 44 篇 算法
  • 37 篇 计算机模拟
  • 37 篇 数据库
  • 36 篇 神经网络
  • 35 篇 xml
  • 33 篇 信息安全
  • 31 篇 单片机
  • 29 篇 java
  • 28 篇 人工智能
  • 28 篇 多媒体
  • 27 篇 simulation
  • 27 篇 体系结构

机构

  • 334 篇 国防科技大学
  • 191 篇 上海交通大学
  • 188 篇 山东大学
  • 172 篇 武汉大学
  • 154 篇 上海大学
  • 144 篇 武汉理工大学
  • 127 篇 天津大学
  • 114 篇 北京航空航天大学
  • 103 篇 华中科技大学
  • 99 篇 西安电子科技大学
  • 97 篇 西南交通大学
  • 94 篇 四川大学
  • 73 篇 西安交通大学
  • 69 篇 北京交通大学
  • 68 篇 合肥工业大学
  • 68 篇 东北大学
  • 67 篇 苏州大学
  • 67 篇 中南大学
  • 66 篇 西北工业大学
  • 64 篇 国防科学技术大学

作者

  • 30 篇 钟珞
  • 19 篇 赵海
  • 19 篇 李涛
  • 14 篇 王建新
  • 14 篇 李思昆
  • 13 篇 金士尧
  • 13 篇 黄柯棣
  • 13 篇 陈一民
  • 13 篇 李晓梅
  • 12 篇 夏红霞
  • 12 篇 吴玲达
  • 12 篇 王宝树
  • 12 篇 杨炳儒
  • 11 篇 涂序彦
  • 11 篇 杨波
  • 10 篇 邱晓刚
  • 10 篇 龚正虎
  • 10 篇 张焕国
  • 10 篇 刘晓平
  • 9 篇 陈建二

语言

  • 4,639 篇 中文
  • 1,468 篇 英文
检索条件"作者=2 School of Computer,National University of Defense Technology,Changsha 410073,China"
6107 条 记 录,以下是71-80 订阅
排序:
(2,n)secret sharing scheme for gray and color images based on Boolean operation
收藏 引用
Science china(Information Sciences) 2012年 第5期55卷 1151-1161页
作者: DONG Lin 1,WANG DaoShun 1,LI ShunDong 2 & DAI YiQi 1 1 Department of computer Science and technology,Tsinghua university,Beijing 100084,china 2 school of computer Science,Shaanxi Normal university,Xi'an 710062,china 1. Department of computer Science and technology Tsinghua University Beijing 100084 China2. School of Computer Science Shaanxi Normal University Xi’an 710062 China
Traditional secret sharing (SS) schemes can reconstruct the secret precisely,but have high com-putation *** secret sharing (VSS) schemes use human visual system to reconstruct the secret without cryptographic computat... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Medical image segmentation using improved FCM
收藏 引用
Science china(Information Sciences) 2012年 第5期55卷 1052-1061页
作者: ZHANG XiaoFeng 1,2,ZHANG CaiMing 1,3,4,TANG WenJing 1,2 & WEI ZhenWen 1 1 school of computer Science and technology,Shandong university,Jinan 250101,china 2 school of Information and Electrical Engineering,Ludong university,Yantai 264025,china 3 school of computer Science and technology,Shandong university of Finance and Economics,Jinan 250014,china 4 Shandong Province Key Lab of Digital Media technology,Jinan 250014,china 1. school of computer Science and technology Shandong University Jinan 250101 China2. School of Information and Electrical Engineering Ludong University Yantai 264025 China3. School of Computer Science and Technology Shandong University of Finance and Economics Jinan 250014 China4. Shandong Province Key Lab of Digital Media Technology Jinan 250014 China
Image segmentation is one of the most important problems in medical image processing,and the existence of partial volume effect and other phenomena makes the problem much more *** C-means,as an effective tool to deal ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A new scheme of digital communication using chaotic signals in MIMO channels
收藏 引用
Science china(Information Sciences) 2012年 第10期55卷 2183-2193页
作者: MA HuanFei 1 & KAN HaiBin 2 1 school of Mathematical Sciences,Soochow university,Suzhou 215006,china 2 school of computer Science,Fudan university,Shanghai 200433,china 1. school of Mathematical Sciences Soochow University Suzhou 215006 China 2. school of computer Science Fudan University Shanghai 200433 China
This paper proposes a new digital communication scheme,which uses chaotic signals based on the adaptive synchronization and parameter identification technique of chaotic systems reported *** to the multi signal charac... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An efficient quantum secret sharing protocol with orthogonal product states
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2007年 第3期50卷 331-338页
作者: YANG YuGuang1,2, WEN QiaoYan3 & ZHU FuChen4 1 school of computer, Beijing university of technology, Beijing 100022, china 2 State Key Laboratory of Information Security, Graduate university of Chinese Academy of Sciences, Beijing 100022, china 3 school of Science, Beijing university of Posts and Telecommunications, Beijing 100876, china 4 national Key Laboratory for Modern Communications, Chengdu 610041, china 1. school of computer Beijing University of Technology Beijing 100022 China 2. State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100022 China 3. school of Science Beijing University of Posts and Telecommunications Beijing 100876 China 4. national Key Laboratory for Modern Communications Chengdu 610041 China
An efficient quantum secret sharing protocol with orthogonal product states in the 33 Hilbert space is presented. The particles in the orthogonal product states form two particle sequences. One sequence is sent to B... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Statistical modeling and analysis of the influence of antenna polarization error on received power
收藏 引用
Progress in Natural Science:Materials International 2002年 第4期 67-71页
作者: WANG Xuesong , ZENG Yonghu, CHEN Zhijie , XU Zhenhai and LI Yongzhen( school of Electronic Science and Engineering, national university of defense technology, changsha 410073, china Department of Foundation, national university of defense technology, changsha 410073, china)
The problem of statistical modeling of antenna polarization error is studied and the statistical characteristics of antenna's received power are analyzed. A novel Stokes-vector-based method is presented to describe th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A new heuristic algorithm for the circular packing problem with equilibrium constraints
收藏 引用
Science china(Information Sciences) 2011年 第8期54卷 1572-1584页
作者: LIU JingFa 1,2,LI Gang 3 & GENG HuanTong 1 1 school of computer and Software,Nanjing university of Information Science & technology,Nanjing 210044,china 2 Network Information Center,Nanjing university of Information Science & technology, Nanjing 210044,china 3 school of Mathematics and Physics,Nanjing university of Information Science & technology,Nanjing 210044,china 1. school of computer and Software Nanjing University of Information Science & Technology Nanjing 210044 China2. Network Information Center Nanjing University of Information Science & Technology Nanjing 210044 China3. School of Mathematics and Physics Nanjing University of Information Science & Technology Nanjing 210044 China
The circular packing problem with equilibrium constraints is an optimization problem about simplified satellite module layout design.A heuristic algorithm based on tabu search is put forward for solving this *** algor... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Threshold quantum secure direct communication without entanglement
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第2期51卷 176-183页
作者: YANG YuGuang1,3 & WEN QiaoYan2 1 College of computer Science and technology, Beijing university of technology, Beijing 100022, china 2 school of Science, Beijing university of Posts and Telecommunications, Beijing 100876, china 3 State Key Laboratory of Information Security (Graduate school of Chinese Academy of Sciences), Beijing 100049, china 1. College of computer Science and technology Beijing University of Technology Beijing 100022 China 3. State Key Laboratory of Information Security (Graduate school of Chinese Academy of Sciences) Beijing 100049 China 2. school of Science Beijing University of Posts and Telecommunications Beijing 100876 China
For the first time, a threshold quantum secure direct communication (TQSDC) scheme is presented. Similar to the classical Shamir's secret sharing scheme, the sender makes n shares, S1, …, Sn of secret key K and each ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Algorithm of simulation time synchronization over large-scale nodes
收藏 引用
Science in china(Series F) 2008年 第9期51卷 1239-1255页
作者: ZHAO QinPing1,2,ZHOU Zhong1,2 & Lü Fang1,2 1 State Key Laboratory of Virtual Reality technology and Systems,Beihang university,Beijing 100083,china 2 school of computer Science and Engineering,Beihang university,Beijing 100083,china State Key Laboratory of Virtual Reality technology and Systems Beihang University Beijing 100083 China school of computer Science and Engineering Beihang University Beijing 100083 China
In distributed simulation, there is no uniform physical clock. And delay cannot be estimated because of jitter. So simulation time synchronization is essential for the event consistency among nodes. This paper investi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Accountability Analysis of Electronic Commerce Protocols by Finite Automaton Model
收藏 引用
Wuhan university Journal of Natural Sciences 2004年 第3期9卷 293-295页
作者: Xie Xiao-yao 1,2 , Zhang Huan-guo 1 1. school of computer, Wuhan university, Wuhan 430072, Hubei, china 2. Institute of Network technology, Guizhou university of technology, Guiyang 550003, Guizhou, china Wuhan university School of Computer Wuhan Hubei China (GRID:grid.49470.3e) (ISNI:***) Guizhou university of technology Institute of Network Technology Guiyang Guizhou China (GRID:grid.443382.a) (ISNI:***) Wuhan university School of Computer Wuhan Hubei China (GRID:grid.49470.3e) (ISNI:***)
The accountability of electronic commerce protocols is an important aspect to insures security of electronic transaction. This paper proposes to use Finite Automaton (FA) model as a new kind of framework to analyze th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
New method for measuring the degree of conflict among general basic probability assignments
收藏 引用
Science china(Information Sciences) 2012年 第2期55卷 312-321页
作者: HE You1,HU LiFang1,2,GUAN Xin1,3,DENG Yong4 & HAN DeQiang5 1Research Institute of Information Fusion,Naval Aeronautical and Astronautical university,Yantai 264001,china 2Navy Armament Academy,Beijing 102249,china 3The Institute of Electronic Science and Engineering,national university of defense technology,changsha 410073,china 4school of Electronics and Information technology,Shanghai Jiao Tong university,Shanghai 200240,china 5Institute of Integrated Automation,Xi'an Jiaotong university,Xi'an 710049,china 1. Research Institute of Information Fusion Naval Aeronautical and Astronautical University Yantai 264001 China2. Navy Armament Academy Beijing 102249 China3. The Institute of Electronic Science and Engineering National University of Defense Technology Changsha 410073 China4. School of Electronics and Information Technology Shanghai Jiao Tong University Shanghai 200240 China5. Institute of Integrated Automation Xi’an Jiaotong University Xi’an 710049 China
There is doubt about Dempster's rule of combination because of counter-intuitive results when dealing with conflict information in intelligent ***,many modified combination rules have been presented in the literature ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论