咨询与建议

限定检索结果

文献类型

  • 2,318 篇 期刊文献
  • 1,174 篇 会议

馆藏范围

  • 3,492 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,897 篇 工学
    • 540 篇 电子科学与技术(可...
    • 493 篇 计算机科学与技术...
    • 488 篇 控制科学与工程
    • 422 篇 信息与通信工程
    • 403 篇 机械工程
    • 390 篇 软件工程
    • 366 篇 仪器科学与技术
    • 292 篇 材料科学与工程(可...
    • 192 篇 航空宇航科学与技...
    • 177 篇 电气工程
    • 117 篇 光学工程
    • 115 篇 化学工程与技术
    • 92 篇 网络空间安全
    • 79 篇 水利工程
    • 73 篇 交通运输工程
    • 70 篇 兵器科学与技术
    • 67 篇 土木工程
    • 51 篇 动力工程及工程热...
    • 50 篇 地质资源与地质工...
    • 46 篇 建筑学
  • 664 篇 理学
    • 189 篇 数学
    • 160 篇 系统科学
    • 157 篇 物理学
    • 102 篇 化学
  • 418 篇 管理学
    • 352 篇 管理科学与工程(可...
    • 62 篇 工商管理
  • 123 篇 经济学
    • 114 篇 应用经济学
  • 85 篇 军事学
    • 77 篇 军队指挥学
  • 60 篇 医学
  • 59 篇 农学
  • 54 篇 教育学
    • 48 篇 教育学
  • 52 篇 艺术学
    • 47 篇 设计学(可授艺术学...
  • 11 篇 文学
  • 5 篇 法学
  • 4 篇 历史学
  • 1 篇 哲学

主题

  • 36 篇 计算机网络
  • 34 篇 设计
  • 24 篇 仿真
  • 21 篇 internet
  • 20 篇 simulation
  • 19 篇 genetic algorith...
  • 19 篇 数据库
  • 18 篇 神经网络
  • 17 篇 遗传算法
  • 17 篇 电子商务
  • 17 篇 fpga
  • 16 篇 计算机
  • 15 篇 单片机
  • 14 篇 fault diagnosis
  • 13 篇 应用
  • 13 篇 雷达
  • 13 篇 小波变换
  • 12 篇 matlab
  • 12 篇 面向对象
  • 12 篇 虚拟现实

机构

  • 76 篇 信息工程大学
  • 65 篇 郑州大学
  • 65 篇 中国工程物理研究...
  • 53 篇 解放军信息工程大...
  • 43 篇 杭州电子工业学院
  • 40 篇 装备指挥技术学院
  • 38 篇 北京理工大学
  • 36 篇 郑州工学院
  • 36 篇 华北水利水电学院
  • 36 篇 电子科技大学
  • 31 篇 上海交通大学
  • 31 篇 西安交通大学
  • 31 篇 清华大学
  • 29 篇 国防科技大学
  • 29 篇 天津大学
  • 29 篇 解放军电子工程学...
  • 27 篇 指挥技术学院
  • 27 篇 哈尔滨工业大学
  • 26 篇 中国科学院光电技...
  • 23 篇 山东建筑工程学院

作者

  • 325 篇 china
  • 54 篇 p.r.china
  • 35 篇 china)
  • 28 篇 zhengzhou
  • 27 篇 beijing
  • 15 篇 harbin institute...
  • 15 篇 beijing institut...
  • 14 篇 p. r. china
  • 14 篇 henan
  • 12 篇 university of el...
  • 11 篇 tsinghua univers...
  • 11 篇 chengdu
  • 10 篇 shanghai
  • 10 篇 林琪
  • 9 篇 china.
  • 9 篇 nanjing
  • 9 篇 sichuan
  • 9 篇 wuhan
  • 9 篇 郝重阳
  • 8 篇 王福安

语言

  • 1,897 篇 中文
  • 1,595 篇 英文
检索条件"作者=2.Electronic Technology Institute,information Engineering {2.,Zhengzhou 450004,china"
3492 条 记 录,以下是1-10 订阅
排序:
Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function
收藏 引用
Science china(information Sciences) 2012年 第9期55卷 2161-2170页
作者: ZHANG Bin 1,2.& JIN ChenHui 2.1 P.O.Box 1936,Beijing 100193,china 2.electronic technology institute,{2. engineering University,zhengzhou 450004,china Beijing China electronic technology {2. Information Engineering University Zhengzhou China
SMS4,a block cipher whose global structure adopts a special unbalanced Feistel scheme with SP round function,is accepted as the Chinese National Standard for securing Wireless *** this paper,in order to evaluate the s... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Decoy-state quantum key distribution for the heralded pair coherent state photon source with intensity fluctuations
收藏 引用
Science china(information Sciences) 2010年 第12期53卷 2485-2494页
作者: ZHOU Chun, BAO WanSu & FU XiangQun institute of electronic {2., The PLA information engineering University, zhengzhou 450004, china institute of electronic {2. The PLA Information Engineering University Zhengzhou China
This paper characterizes two important properties of the photon number distribution of the heralded pair coherent state (HPCS) photon source. The formula of secret key generation rates for the decoy-state quantum key ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
The GPS-gravimetry boundary value problem
收藏 引用
Science china Earth Sciences 2005年 第3期48卷 398-405页
作者: YU Jinhai1,2.& ZHANG Chuanding2.1. institute of Geodesy and Geophysics of Chinese Academy of Sciences, Wuhan 430077, china 2. {2. information engineering University, {2. 450052. china institute of Geodesy and Geophysics of Chinese Academy of Sciences Wuhan China zhengzhou information {2. University Zhengzhou China
How to determine the earth’s external gravity field with the accuracy of O(T2. by making use of GPS data and gravity values measured on the earth’s surface is dealt with in this paper. There are two main steps: to e... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A fingerprint feature extraction algorithm based on curvature of Bezier curve
收藏 引用
Progress in Natural Science:Materials International 2007年 第11期17卷 1376-1381页
作者: Yuan Huaqiang1, Ye Yangdong2. Deng Jianguang2. Chai Xiaoguang1 and Li Yong1(1. School of Software, Dongguan University of technology, Dongguan 52.808, china 2. {2. engineering institute, zhengzhou University, zhengzhou 450001, china) School of Software Dongguan University of Technology Dongguan 523808 China information engineering {2. Zhengzhou University Zhengzhou 450001 China
Fingerprint feature extraction is a key step of fingerprint identification. A novel feature extraction algorithm is proposed in this paper, which describes fingerprint feature with the bending information of fingerpri... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Effects of Al on Microstructure and High-Temperature Wear Properties of Austenitic Heat-Resistant Steel
收藏 引用
Journal of Iron and Steel Research International 2012年 第3期19卷 62-66页
作者: ZHANG Yan1, SUN Yu-fu2. ZHAO Jing-yu2. GUAN Shao-kang2.(1. School of Materials engineering, Nanjing institute of {2., Nanjing 2.1167, Jiangsu, china 2. School of Materials Science and engineering, zhengzhou University, zhengzhou 450002. Henan, china) School of Materials engineering Nanjing Institute of Technology Nanjing Jiangsu China School of Materials Science and engineering Zhengzhou University Zhengzhou Henan China
Microstructure and high-temperature dry sliding wear at 600 ~C in ambient air of austenitic heat-resistant steel ZG40Cr2.Ni2. with different contents (mass percent) of AI (0 to 7.10~) have been investigated. The r... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A new approach based on PSO algorithm to find good computational encoding sequences
收藏 引用
Progress in Natural Science:Materials International 2007年 第6期17卷 712-716页
作者: Cui Guangzhao1, Niu Yunyun1, Wang Yanfeng1, Zhang Xuncai2.and Pan Linqiang2.1. School of Electrical and electronic engineering, {2. University of Light Industry, {2. 450002. china 2. Research institute of Biomolecular Computer, Huazhong University of Science and technology, Wuhan 430074, china) School of Electrical and electronic engineering Zhengzhou University of Light Industry Zhengzhou 450002 China Research institute of Biomolecular Computer Huazhong University of Science and Technology Wuhan 430074 China
Computational encoding DNA sequence design is one of the most important steps in molecular computation. A lot of research work has been done to design reliable sequence library. A revised method based on the support s... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Response of flood discharging capacity to the deterioration of the lower Yellow River
收藏 引用
Science china(Technological Sciences) 2004年 第Z1期47卷 152-160页
作者: LI Wenxue1, LI Yong2. YAO Wenyi2. SU Yunqi2.& ZHANG Xiaohua2.1. Yellow River engineering Consulting Co. Ltd., zhengzhou 450003, {2. 2. Yellow River institute of Hydraulic Research, zhengzhou 450003, {2. Yellow River engineering Consulting Co. Ltd. Zhengzhou China Yellow River institute of Hydraulic Research Zhengzhou China
Based on the clarifications of the deterioration characteristics of the lower Yellow River (LYR), the influence of river deterioration on flood discharging capacity is studied through theoretical derivation and analys... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Multiparty simultaneous quantum identity authentication with secret sharing
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第3期51卷 321-327页
作者: YANG YuGuang1,2.WEN QiaoYan3 & ZHANG Xing4,5 1 College of Computer Science and technology,Beijing University of technology,Beijing 10002.,{2. 2.State Key Laboratory of information Security (Graduate University of the Chinese Academy of Sciences),Beijing 100049,{2. 3 School of Science,Beijing University of Posts and Telecommunications,Beijing 100876,{2. 4 institute of electronic technology,information engineering University,zhengzhou 450004,{2. 5 Trusted Computing Laboratory,Beijing University of technology,Beijing 10002.,{2. College of Computer Science and technology Beijing University of Technology Beijing China State Key Laboratory of information Security (Graduate University of the Chinese Academy of Sciences) Beijing China School of Science Beijing University of Posts and Telecommunications Beijing China institute of electronic {2. Information Engineering University Zhengzhou China Trusted Computing Laboratory Beijing University of Technology Beijing China
Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the users can be authenticated by a trusted third party (TTP) simultaneously. In the first proto... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Using New Fusion Operations to Improve Trust Expressiveness of Subjective Logic
收藏 引用
Wuhan University Journal of Natural Sciences 2011年 第5期16卷 376-382页
作者: ZHOU Hongwei1,2.3,SHI Wenchang1,2.LIANG Zhaohui1,2.LIANG Bin1,2.1.Key Laboratory of Data engineering and Knowledge engineering,Ministry of Education,Beijing 100872.{2. 2.School of information,Renmin University of {2.,Beijing 100872.{2. 3.institute of electronic technology,information engineering University of PLA,zhengzhou 450004,Henan,{2. Key Laboratory of Data engineering and Knowledge engineering Ministry of Education Beijing China School of information Renmin University of China Beijing China institute of electronic {2. Information Engineering University of PLA Zhengzhou Henan China
Subjective logic provides a means to describe the trust relationship of the realworld. However, existing fusion operations it offers Weal fused opiniotts equally, which makes it impossible to deal with the weighted op... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Constructing quantum error correcting code via logic function
收藏 引用
Science china(information Sciences) 2010年 第3期53卷 515-523页
作者: ZHONG ShuQin, MA Zhi & XU YaJie zhengzhou institute of {2. engineering, University of {2. engineering of china, zhengzhou 450002. china zhengzhou institute of {2. engineering University of Information Engineering of China Zhengzhou China
We present a systematic way to construct p-ary quantum error correcting codes using logic functions. As a consequence, for a given function with APC distance d′ 2. we can construct quantum codes with parameters ((n, ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论