咨询与建议

限定检索结果

文献类型

  • 9,107 篇 期刊文献
  • 630 篇 会议

馆藏范围

  • 9,737 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,474 篇 工学
    • 1,172 篇 材料科学与工程(可...
    • 793 篇 化学工程与技术
    • 773 篇 计算机科学与技术...
    • 582 篇 机械工程
    • 574 篇 电气工程
    • 518 篇 软件工程
    • 419 篇 电子科学与技术(可...
    • 418 篇 仪器科学与技术
    • 411 篇 控制科学与工程
    • 395 篇 水利工程
    • 300 篇 信息与通信工程
    • 291 篇 环境科学与工程(可...
    • 286 篇 动力工程及工程热...
    • 247 篇 地质资源与地质工...
    • 222 篇 光学工程
    • 184 篇 交通运输工程
    • 181 篇 力学(可授工学、理...
  • 2,332 篇 理学
    • 525 篇 化学
    • 446 篇 物理学
    • 374 篇 生物学
    • 247 篇 生态学
    • 212 篇 地质学
    • 177 篇 大气科学
  • 1,392 篇 医学
    • 698 篇 临床医学
    • 327 篇 中西医结合
    • 231 篇 中药学(可授医学、...
    • 211 篇 药学(可授医学、理...
  • 1,029 篇 农学
    • 303 篇 农业资源与环境
    • 264 篇 作物学
  • 654 篇 管理学
    • 473 篇 管理科学与工程(可...
  • 118 篇 经济学
  • 76 篇 教育学
  • 65 篇 艺术学
  • 52 篇 军事学
  • 31 篇 法学
  • 28 篇 文学
  • 20 篇 历史学
  • 7 篇 哲学

主题

  • 37 篇 力学性能
  • 33 篇 bp神经网络
  • 32 篇 网络药理学
  • 30 篇 遗传算法
  • 30 篇 卷积神经网络
  • 26 篇 network
  • 23 篇 吸附
  • 23 篇 numerical simula...
  • 23 篇 配电网
  • 21 篇 深度学习
  • 20 篇 deep learning
  • 20 篇 气候变化
  • 18 篇 simulation
  • 18 篇 分子对接
  • 17 篇 深度强化学习
  • 17 篇 apoptosis
  • 16 篇 diagnosis
  • 15 篇 crystal
  • 15 篇 中国
  • 15 篇 optimization

机构

  • 280 篇 中国科学院大学
  • 208 篇 西安交通大学
  • 127 篇 上海交通大学
  • 124 篇 university of ch...
  • 97 篇 武汉大学
  • 96 篇 清华大学
  • 91 篇 浙江大学
  • 80 篇 天津大学
  • 75 篇 西北工业大学
  • 74 篇 南京大学
  • 73 篇 四川大学
  • 70 篇 西安电子科技大学
  • 65 篇 中国地质大学
  • 65 篇 河海大学
  • 64 篇 华中科技大学
  • 64 篇 西北大学
  • 64 篇 华北电力大学
  • 62 篇 武汉理工大学
  • 61 篇 同济大学
  • 60 篇 西南石油大学

作者

  • 271 篇 陈曦
  • 95 篇 xi zhang
  • 80 篇 xi chen
  • 75 篇 张曦
  • 52 篇 xi li
  • 43 篇 chen xi
  • 37 篇 张熙
  • 32 篇 王曦
  • 29 篇 李熙
  • 25 篇 王玺
  • 25 篇 陈喜
  • 25 篇 席雷
  • 24 篇 徐亮
  • 23 篇 xi liu
  • 21 篇 李云龙
  • 20 篇 baojuan xi
  • 20 篇 高建民
  • 19 篇 xi luo
  • 19 篇 王芳
  • 18 篇 xi xu

语言

  • 6,185 篇 中文
  • 3,552 篇 英文
检索条件"作者=2 state key laboratory of Integrated services Network,xidian University,xi’an 710071,china"
9737 条 记 录,以下是1-10 订阅
排序:
Quantum threshold group signature
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第10期51卷 1505-1514页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of Computer Science and Technology, Beijing university of Technology, Beijing 100124, china 2 state key laboratory of integrated services network, xidian university, xi’an 710071, china 3 state key laboratory of Information Security (Graduate university of Chinese Academy of Sciences), Beijing 100049, china 4 state key laboratory of networking and Switching Technology, Beijing university of Posts and Tele-communications, Beijing 100876, china College of Computer Science and Technology Beijing University of Technology Beijing China state key laboratory of integrated services network Xidian University Xi’an China state key laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing China state key laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of Computer Science and Technology,Beijing university of Technology,Beijing 100124,china 2 state key laboratory of integrated services network,xidian university,xi’an 710071,china 3 state key laboratory of Information Security (Graduate university of Chinese Academy of Sciences),Beijing 100049,china 4 state key laboratory of networking and Switching Technology,Beijing university of Posts and Tele-communications,Beijing 100876,china College of Computer Science and Technology Beijing University of Technology Beijing China state key laboratory of integrated services network Xidian University Xi’an China state key laboratory of Information Security (Graduate university of Chinese Academy of Sciences) Beijing China state key laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A novel method for the improvement of power efficiency in high peak-to-average-power ratio communication systems
收藏 引用
Science china(Information Sciences) 2010年 第8期53卷 1697-1702页
作者: REN ZhiYuan 1 , ZHANG HaiLin 1 & GUO Kai 2 1 state key laboratory of integrated services network, xidian university, xi’an 710071, china 2 Aerospace Long March Launch Vehicle Technology Co. Ltd., Beijing 100076, china state key laboratory of integrated services network Xidian University Xi’an China Aerospace Long March Launch Vehicle Technology Co. Ltd. Beijing China
To solve the problem of low power efficiency of power amplifiers (PA) in the high peak-to-averagepower ratio (PAPR) communication system, a novel signal decomposed amplifier structure has been proposed in order to dec... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Construction of nonbinary quantum cyclic codes by using graph method
收藏 引用
Science in china(Series F) 2005年 第6期48卷 693-702页
作者: LIU Tailin1,2,3, WEN Qiaoyan1 & LIU Zihui4 1. School of Science, Beijing university of Posts and Telecommunications, Beijing 100876, china 2. state key laboratory of integrated services network, xidian university, xi’an 710071,china 3. Shandong Finance Institute, Jinan 250014, china 4. School of Mathematical Sciences, Peking university, Beijing 100871, china School of Science Beijing University of Posts and Telecommunications Beijing China state key laboratory of integrated services network Xidian University Xi’an China Shandong Finance Institute Jinan China School of Mathematical Sciences Peking University Beijing China
Using the graph method proposed by Schlingemann and Werner, this paper introduces a technique to construct nonbinary quantum cyclic codes and provides a specific example. We also construct the quantum codes [[8, 2, 4]... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A novel distortion elimination method of power amplifier in wideband OFDM system
收藏 引用
Science china(Information Sciences) 2012年 第2期55卷 396-406页
作者: REN ZhiYuan & ZHANG HaiLin state key laboratory of integrated services network,xidian university,xi’an 710071,china state key laboratory of integrated services network Xidian University Xi’an China
The nonlinear,memory and saturate distortion caused by power amplifier lead to low BER per-formance and low power efficiency in wideband OFDM *** solve the related problems,a novel power amplifier based on combined am... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A class of quasi-cyclic LDPC codes from B2 (mod m) sequences
收藏 引用
Science china(Information Sciences) 2011年 第8期54卷 1645-1653页
作者: ZHANG GuoHua & WANG xinMei state key laboratory of integrated Service network,xidian university,xi’an 710071,china state key laboratory of integrated Service network Xidian University Xi’an China
A new class of binary low-density parity-check (LDPC) codes is proposed based on B 2 (mod m) sequences. The parity-check matrix of such a code has a column weight of three and a row weight of an arbitrary integer,and ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A network coding based hybrid ARQ algorithm for wireless video broadcast
收藏 引用
Science china(Information Sciences) 2011年 第6期54卷 1327-1332页
作者: LU Ji , WU ChengKe, xiAO Song & DU JianChao state key laboratory of integrated services network, xidian university, xi’an 710071, china state key laboratory of integrated services network Xidian University Xi’an China
This paper proposes a network coding (NC) based hybrid ARQ (HARQ) algorithm for video broad- cast over wireless networks. The sender applies NC technique to combine the lost packets of different terminals, so that mul... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Threshold proxy quantum signature scheme with threshold shared verification
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第8期51卷 1079-1088页
作者: YANG YuGuang1,3,4 & WEN QiaoYan2 1 College of Computer Science and Technology,Beijing university of Technology,Beijing 100124,china 2 state key laboratory of networking and Switching Technology,Beijing university of Posts and Tele-communications,Beijing 100876,china 3 state key laboratory of integrated services network,xidian university,xi’an 710071,china 4 state key laboratory of Information Security(Graduate university of Chinese Academy of Sciences) ,Beijing 100049,china College of Computer Science and Technology Beijing University of Technology Beijing China state key laboratory of integrated services network Xidian University Xi’an China state key laboratory of Information Security (Graduate university of Chinese Academy of Sciences) Beijing China state key laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Space-time cooperative diversity scheme using full feedback
收藏 引用
The Journal of china Universities of Posts and Telecommunications 2009年 第3期16卷 8-13页
作者: SUN De-chun,YI Ke-chu,LI xiao-hui state key laboratory of integrated Service networks,xidian university,xi’an 710071,china state key laboratory of integrated Service networks Xidian University Xi'an 710071 china
This article proposes a new space-time cooperative diversity scheme called full feedback-based cooperative diversity scheme (FFBCD). In contrast to the conventional adaptive space-time cooperative diversity schemes ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Exact thresholds for low-density parity-check codes over the binary erasure channel
收藏 引用
Progress in Natural Science:Materials International 2009年 第7期19卷 897-900页
作者: Jianjun Mu a, xiaopeng Jiao a, xinmei Wangb a School of Computer Science and Technology, xidian university, xi’an 710071, china b state key laboratory of integrated Service networks, xidian university, xi’an 710071, china School of Computer Science and Technology Xidian University Xi’an 710071 China state key laboratory of integrated Service networks Xidian University Xi’an 710071 China
A simple method for determining the threshold of irregular LDPC codes over the binary erasure channel (BEC) under message-passing decoding is proposed. An exact formula for calculating the threshold of irregular LDPC ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论