咨询与建议

限定检索结果

文献类型

  • 2,876 篇 期刊文献
  • 158 篇 会议

馆藏范围

  • 3,034 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,021 篇 工学
    • 529 篇 计算机科学与技术...
    • 349 篇 软件工程
    • 244 篇 机械工程
    • 236 篇 控制科学与工程
    • 209 篇 仪器科学与技术
    • 185 篇 信息与通信工程
    • 182 篇 电子科学与技术(可...
    • 172 篇 电气工程
    • 159 篇 材料科学与工程(可...
    • 84 篇 水利工程
    • 81 篇 网络空间安全
    • 78 篇 化学工程与技术
    • 78 篇 交通运输工程
    • 77 篇 地质资源与地质工...
    • 64 篇 环境科学与工程(可...
    • 59 篇 光学工程
    • 56 篇 动力工程及工程热...
  • 494 篇 医学
    • 198 篇 临床医学
    • 186 篇 中西医结合
    • 139 篇 中药学(可授医学、...
    • 62 篇 中医学
  • 430 篇 理学
    • 80 篇 物理学
    • 60 篇 生物学
    • 57 篇 生态学
  • 423 篇 管理学
    • 318 篇 管理科学与工程(可...
    • 56 篇 公共管理
  • 197 篇 农学
    • 69 篇 农业资源与环境
  • 77 篇 教育学
    • 58 篇 教育学
  • 73 篇 经济学
    • 66 篇 应用经济学
  • 56 篇 艺术学
    • 56 篇 设计学(可授艺术学...
  • 32 篇 军事学
  • 26 篇 法学
  • 20 篇 文学
  • 4 篇 历史学
  • 2 篇 哲学

主题

  • 108 篇 网络药理学
  • 84 篇 深度学习
  • 56 篇 分子对接
  • 53 篇 神经网络
  • 47 篇 卷积神经网络
  • 32 篇 注意力机制
  • 29 篇 作用机制
  • 28 篇 bp神经网络
  • 19 篇 生物信息学
  • 17 篇 机器学习
  • 15 篇 deep learning
  • 15 篇 network
  • 15 篇 知识图谱
  • 15 篇 目标检测
  • 15 篇 故障诊断
  • 14 篇 无线传感器网络
  • 14 篇 影响因素
  • 14 篇 计算机网络
  • 14 篇 网络安全
  • 13 篇 遗传算法

机构

  • 82 篇 中国科学院大学
  • 77 篇 西安电子科技大学
  • 61 篇 西北工业大学
  • 50 篇 西安交通大学
  • 44 篇 上海交通大学
  • 32 篇 湖南中医药大学
  • 32 篇 河海大学
  • 30 篇 武汉大学
  • 28 篇 北京交通大学
  • 28 篇 华北电力大学
  • 26 篇 东南大学
  • 26 篇 浙江大学
  • 26 篇 清华大学
  • 24 篇 北京中医药大学
  • 24 篇 university of ch...
  • 24 篇 华南理工大学
  • 22 篇 长安大学
  • 22 篇 东北大学
  • 19 篇 华中科技大学
  • 19 篇 武汉理工大学

作者

  • 87 篇 陈曦
  • 35 篇 xi chen
  • 20 篇 奚培锋
  • 18 篇 china
  • 17 篇 xi zhang
  • 16 篇 席磊
  • 15 篇 陈希
  • 14 篇 张曦
  • 13 篇 张希
  • 12 篇 xi li
  • 12 篇 li xi
  • 12 篇 xi wang
  • 12 篇 杨曦
  • 12 篇 李曦
  • 11 篇 王曦
  • 11 篇 李彬
  • 11 篇 王希
  • 10 篇 李熙
  • 10 篇 张茜
  • 10 篇 李鹏

语言

  • 2,236 篇 中文
  • 798 篇 英文
检索条件"作者=3 {2. key laboratory of integrated {12. network,xidian university,xi’an 710071,china"
3034 条 记 录,以下是1-10 订阅
排序:
A class of quasi-cyclic LDPC codes from B2.(mod m) sequences
收藏 引用
Science china(Information Sciences) 2011年 第8期54卷 1645-1653页
作者: ZHANG GuoHua & WANG xinMei State key laboratory of {2. Service network,xidian university,xi’an 710071,china State key laboratory of {2. Service network Xidian University Xi’an China
A new class of binary low-density parity-check (LDPC) codes is proposed based on B 2.(mod m) sequences. The parity-check matrix of such a code has a column weight of three and a row weight of an arbitrary integer,and ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A novel distortion elimination method of power amplifier in wideband OFDM system
收藏 引用
Science china(Information Sciences) 2012年 第2期55卷 396-406页
作者: REN ZhiYuan & ZHANG HaiLin State key laboratory of {2. services network,xidian university,xi’an 710071,china State key laboratory of {2. services network Xidian University Xi’an China
The nonlinear,memory and saturate distortion caused by power amplifier lead to low BER per-formance and low power efficiency in wideband OFDM *** solve the related problems,a novel power amplifier based on combined am... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A network coding based hybrid ARQ algorithm for wireless video broadcast
收藏 引用
Science china(Information Sciences) 2011年 第6期54卷 1327-1332页
作者: LU Ji , WU ChengKe, xiAO Song & DU JianChao State key laboratory of {2. Services network, xidian university, xi’an 710071, china State key laboratory of {2. Services network Xidian University Xi’an China
This paper proposes a network coding (NC) based hybrid ARQ (HARQ) algorithm for video broad- cast over wireless networks. The sender applies NC technique to combine the lost packets of different terminals, so that mul... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Optimal user scheduling and power control in multi-user cognitive broadcast systems
收藏 引用
Science china(Information Sciences) 2012年 第6期55卷 1402-1414页
作者: WANG QunHuan 1,2.3,WANG HuiMing 1,2.3 & YIN QinYe 1,3 1 School of Electronic and Information Engineering,xi'an Jiaotong university,xi'an 710049,china 2.State {2. Lab for integrated Services networks,xidian university,xi'an 710071,china 3 Ministry of Education {2. Lab for Intelligent networks and network Security,xi'an Jiaotong university,xi'an 710071,china. School of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China State key Lab for integrated Services {2.s Xidian University Xi’an China Ministry of Education key Lab for Intelligent networks and network Security Xi’an Jiaotong University Xi’an China
Cognitive radio systems should not only have the ability to sense and exploit "frequency spectrum holes",but also the ability to sense and utilize "spatial spectrum holes".In this paper,we consider the issue of maximi... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Threshold proxy quantum signature scheme with threshold shared verification
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第8期51卷 1079-1088页
作者: YANG YuGuang1,3,4 & WEN QiaoYan2.1 College of Computer Science and Technology,Beijing university of Technology,Beijing 10012.,{2. 2.State key laboratory of networking and Switching Technology,Beijing university of Posts and Tele-communications,Beijing 100876,{2. 3 State key laboratory of integrated Services network,{12.,{12.,{2. 4 State key laboratory of Information Security(Graduate university of Chinese Academy of Sciences) ,Beijing 100049,{2. College of Computer Science and Technology Beijing University of Technology Beijing China State key laboratory of {2. Services network Xidian University Xi’an China State key laboratory of Information Security (Graduate {2. of Chinese Academy of Sciences) Beijing China State key laboratory of {2.ing and Switching Technology Beijing University of Posts and Telecommunications Beijing China
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quantum threshold group signature
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第10期51卷 1505-1514页
作者: YANG YuGuang1,2.3 & WEN QiaoYan4 1 College of Computer Science and Technology, Beijing university of Technology, Beijing 10012., {2. 2.State key laboratory of integrated Services network, xidian university, xi’an 710071, {2. 3 State key laboratory of Information Security (Graduate university of Chinese Academy of Sciences), Beijing 100049, {2. 4 State key laboratory of networking and Switching Technology, Beijing university of Posts and Tele-communications, Beijing 100876, {2. College of Computer Science and Technology Beijing University of Technology Beijing China State key laboratory of {2. Services network Xidian University Xi’an China State key laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing China State key laboratory of {2.ing and Switching Technology Beijing University of Posts and Telecommunications Beijing China
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YANG YuGuang1,2.3 & WEN QiaoYan4 1 College of Computer Science and Technology,Beijing university of Technology,Beijing 10012.,{2. 2.State key laboratory of integrated Services network,xidian university,xi’an 710071,{2. 3 State key laboratory of Information Security (Graduate university of Chinese Academy of Sciences),Beijing 100049,{2. 4 State key laboratory of networking and Switching Technology,Beijing university of Posts and Tele-communications,Beijing 100876,{2. College of Computer Science and Technology Beijing University of Technology Beijing China State key laboratory of {2. Services network Xidian University Xi’an China State key laboratory of Information Security (Graduate {2. of Chinese Academy of Sciences) Beijing China State key laboratory of {2.ing and Switching Technology Beijing University of Posts and Telecommunications Beijing China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Exact thresholds for low-density parity-check codes over the binary erasure channel
收藏 引用
Progress in Natural Science:Materials International 2009年 第7期19卷 897-900页
作者: Jianjun Mu a, xiaopeng Jiao a, xinmei Wangb a School of Computer Science and Technology, xidian university, xi’an 710071, {2. b State key laboratory of integrated Service networks, xidian university, xi’an 710071, {2. School of Computer Science and Technology Xidian University Xi’an 710071 China State key laboratory of {2. Service networks Xidian University Xi’an 710071 China
A simple method for determining the threshold of irregular LDPC codes over the binary erasure channel (BEC) under message-passing decoding is proposed. An exact formula for calculating the threshold of irregular LDPC ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Space-time cooperative diversity scheme using full feedback
收藏 引用
The Journal of china Universities of Posts and Telecommunications 2009年 第3期16卷 8-13页
作者: SUN De-chun,YI Ke-chu,LI xiao-hui State key laboratory of {2. Service networks,xidian university,xi’an 710071,china State key laboratory of {2. Service networks Xidian University Xi'an 710071 china
This article proposes a new space-time cooperative diversity scheme called full feedback-based cooperative diversity scheme (FFBCD). In contrast to the conventional adaptive space-time cooperative diversity schemes ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Construction of nonbinary quantum cyclic codes by using graph method
收藏 引用
Science in china(Series F) 2005年 第6期48卷 693-702页
作者: LIU Tailin1,2.3, WEN Qiaoyan1 & LIU Zihui4 1. School of Science, Beijing university of Posts and Telecommunications, Beijing 100876, china 2. State {2. laboratory of integrated Services network, xidian university, xi’an 710071,china 3. Shandong Finance Institute, Jinan 2.0014, china 4. School of Mathematical Sciences, Peking university, Beijing 100871, china School of Science Beijing University of Posts and Telecommunications Beijing China State key laboratory of {2. Services network Xidian University Xi’an China Shandong Finance Institute Jinan China School of Mathematical Sciences Peking University Beijing China
Using the graph method proposed by Schlingemann and Werner, this paper introduces a technique to construct nonbinary quantum cyclic codes and provides a specific example. We also construct the quantum codes [[8, 2. 4]... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论