咨询与建议

限定检索结果

文献类型

  • 9,007 篇 期刊文献
  • 630 篇 会议

馆藏范围

  • 9,637 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,386 篇 工学
    • 1,158 篇 材料科学与工程(可...
    • 785 篇 化学工程与技术
    • 759 篇 计算机科学与技术...
    • 576 篇 机械工程
    • 551 篇 电气工程
    • 512 篇 软件工程
    • 415 篇 电子科学与技术(可...
    • 412 篇 仪器科学与技术
    • 404 篇 控制科学与工程
    • 387 篇 水利工程
    • 296 篇 信息与通信工程
    • 289 篇 环境科学与工程(可...
    • 277 篇 动力工程及工程热...
    • 242 篇 地质资源与地质工...
    • 223 篇 光学工程
    • 182 篇 交通运输工程
    • 178 篇 力学(可授工学、理...
  • 2,311 篇 理学
    • 519 篇 化学
    • 446 篇 物理学
    • 373 篇 生物学
    • 243 篇 生态学
    • 209 篇 地质学
    • 176 篇 大气科学
  • 1,390 篇 医学
    • 701 篇 临床医学
    • 327 篇 中西医结合
    • 230 篇 中药学(可授医学、...
    • 210 篇 药学(可授医学、理...
  • 1,023 篇 农学
    • 300 篇 农业资源与环境
    • 264 篇 作物学
  • 647 篇 管理学
    • 467 篇 管理科学与工程(可...
  • 119 篇 经济学
  • 75 篇 教育学
  • 64 篇 艺术学
  • 52 篇 军事学
  • 31 篇 法学
  • 28 篇 文学
  • 20 篇 历史学
  • 7 篇 哲学

主题

  • 36 篇 力学性能
  • 35 篇 网络药理学
  • 32 篇 bp神经网络
  • 32 篇 卷积神经网络
  • 30 篇 遗传算法
  • 26 篇 network
  • 23 篇 吸附
  • 23 篇 numerical simula...
  • 22 篇 深度学习
  • 21 篇 配电网
  • 20 篇 deep learning
  • 20 篇 气候变化
  • 18 篇 simulation
  • 18 篇 分子对接
  • 17 篇 深度强化学习
  • 17 篇 apoptosis
  • 16 篇 diagnosis
  • 15 篇 crystal
  • 15 篇 中国
  • 15 篇 optimization

机构

  • 273 篇 中国科学院大学
  • 185 篇 西安交通大学
  • 128 篇 上海交通大学
  • 124 篇 university of ch...
  • 96 篇 清华大学
  • 95 篇 武汉大学
  • 90 篇 浙江大学
  • 80 篇 天津大学
  • 75 篇 南京大学
  • 72 篇 西北工业大学
  • 70 篇 四川大学
  • 66 篇 河海大学
  • 65 篇 西安电子科技大学
  • 64 篇 华中科技大学
  • 64 篇 中国地质大学
  • 62 篇 武汉理工大学
  • 61 篇 同济大学
  • 60 篇 西南石油大学
  • 60 篇 华北电力大学
  • 57 篇 华南理工大学

作者

  • 271 篇 陈曦
  • 95 篇 xi zhang
  • 81 篇 xi chen
  • 75 篇 张曦
  • 53 篇 xi li
  • 43 篇 chen xi
  • 37 篇 张熙
  • 32 篇 王曦
  • 29 篇 李熙
  • 25 篇 王玺
  • 25 篇 陈喜
  • 25 篇 席雷
  • 24 篇 徐亮
  • 23 篇 xi liu
  • 21 篇 李云龙
  • 20 篇 baojuan xi
  • 20 篇 高建民
  • 19 篇 xi luo
  • 19 篇 王芳
  • 18 篇 xi xu

语言

  • 6,114 篇 中文
  • 3,523 篇 英文
检索条件"作者=3 state key {4. of Integrated Services Network,Xidian University,Xi’an 710071,china"
9637 条 记 录,以下是1-10 订阅
排序:
A novel distortion elimination method of power amplifier in wideband OFDM system
收藏 引用
Science china(Information Sciences) 2012年 第2期55卷 396-406页
作者: REN ZhiYuan & ZHANG HaiLin state key laboratory of integrated services {4.,xidian university,xi’an 710071,china 1. state key laboratory of integrated services {4. Xidian University Xi’an 710071 China
The nonlinear,memory and saturate distortion caused by power amplifier lead to low BER per-formance and low power efficiency in wideband OFDM *** solve the related problems,a novel power amplifier based on combined am... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A class of quasi-cyclic LDPC codes from B2 (mod m) sequences
收藏 引用
Science china(Information Sciences) 2011年 第8期54卷 1645-1653页
作者: ZHANG GuoHua & WANG xinMei state key Laboratory of integrated Service network,{4.,xi’an 710071,china 1. state key Laboratory of integrated Service network Xidian University Xi’an 710071 China
A new class of binary low-density parity-check (LDPC) codes is proposed based on B 2 (mod m) sequences. The parity-check matrix of such a code has a column weight of three and a row weight of an arbitrary integer,and ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A network coding based hybrid ARQ algorithm for wireless video broadcast
收藏 引用
Science china(Information Sciences) 2011年 第6期54卷 1327-1332页
作者: LU Ji , WU ChengKe, xiAO Song & DU JianChao state key Laboratory of integrated services {4., xidian university, xi’an 710071, china 1. state key Laboratory of integrated services {4. Xidian University Xi’an 710071 China
This paper proposes a network coding (NC) based hybrid ARQ (HARQ) algorithm for video broad- cast over wireless networks. The sender applies NC technique to combine the lost packets of different terminals, so that mul... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Quantum threshold group signature
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第10期51卷 1505-1514页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4.1 College of Computer Science and Technology, Beijing university of Technology, Beijing 100124. china 2 state key Laboratory of {4. services network, xidian university, xi’an 710071, china 3 state key Laboratory of Information Security (Graduate university of Chinese Academy of Sciences), Beijing 10004., china 4.state key Laboratory of networking and Switching Technology, Beijing university of Posts and Tele-communications, Beijing 100876, china College of Computer Science and Technology Beijing University of Technology Beijing 100124 China state key Laboratory of integrated services {4. Xidian University Xi’an 710071 China state key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China state key Laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold proxy quantum signature scheme with threshold shared verification
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第8期51卷 1079-1088页
作者: YANG YuGuang1,3,4.& WEN QiaoYan2 1 College of Computer Science and Technology,Beijing university of Technology,Beijing 100124.china 2 state key Laboratory of {4.ing and Switching Technology,Beijing university of Posts and Tele-communications,Beijing 100876,china 3 state key Laboratory of integrated services {4.,xidian university,xi’an 710071,china 4.state key Laboratory of Information Security(Graduate university of Chinese Academy of Sciences) ,Beijing 10004.,china 1. College of Computer Science and Technology Beijing University of Technology Beijing 100124 China 3. state key Laboratory of integrated services {4. Xidian University Xi’an 710071 China 4. state key Laboratory of Information Security (Graduate university of Chinese Academy of Sciences) Beijing 100049 China 2. state key Laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4.1 College of Computer Science and Technology,Beijing university of Technology,Beijing 100124.china 2 state key Laboratory of {4. services network,xidian university,xi’an 710071,china 3 state key Laboratory of Information Security (Graduate university of Chinese Academy of Sciences),Beijing 10004.,china 4.state key Laboratory of networking and Switching Technology,Beijing university of Posts and Tele-communications,Beijing 100876,china College of Computer Science and Technology Beijing University of Technology Beijing 100124 China state key Laboratory of integrated services {4. Xidian University Xi’an 710071 China state key Laboratory of Information Security (Graduate university of Chinese Academy of Sciences) Beijing 100049 China state key Laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Optimal user scheduling and power control in multi-user cognitive broadcast systems
收藏 引用
Science china(Information Sciences) 2012年 第6期55卷 1402-1414页
作者: WANG QunHuan 1,2,3,WANG HuiMing 1,2,3 & YIN QinYe 1,3 1 School of Electronic and Information Engineering,xi'an Jiaotong university,xi'an 71004.,china 2 state key Lab for {4. services networks,xidian university,xi'an 710071,china 3 Ministry of Education key Lab for Intelligent networks and network Security,xi'an Jiaotong university,xi'an 710071,china. 1. School of Electronic and Information Engineering Xi’an Jiaotong University Xi’an 710049 China2. State Key Lab for Integrated Services Networks Xidian University Xi’an 710071 China3. Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an 710071 China
Cognitive radio systems should not only have the ability to sense and exploit "frequency spectrum holes",but also the ability to sense and utilize "spatial spectrum holes".In this paper,we consider the issue of maximi... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Construction of nonbinary quantum cyclic codes by using graph method
收藏 引用
Science in china(Series F) 2005年 第6期48卷 693-702页
作者: LIU Tailin1,2,3, WEN Qiaoyan1 & LIU Zihui4.1. School of Science, Beijing university of Posts and Telecommunications, Beijing 100876, china 2. state key Laboratory of {4. services network, xidian university, xi’an 710071,china 3. Shandong Finance Institute, Jinan 250014. china 4. School of Mathematical Sciences, Peking university, Beijing 100871, china 1. School of Science Beijing University of Posts and Telecommunications 100876 Beijing China 2. state key Laboratory of integrated services {4. Xidian University 710071 Xi’an China 3. Shandong Finance Institute 250014 Jinan China 4. School of Mathematical Sciences Peking University 100871 Beijing China
Using the graph method proposed by Schlingemann and Werner, this paper introduces a technique to construct nonbinary quantum cyclic codes and provides a specific example. We also construct the quantum codes [[8, 2, 4.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Approximating maximum likelihood performance reduced dimension VBLAST detection algorithm
收藏 引用
Science china(Information Sciences) 2010年 第7期53卷 1439-1445页
作者: CHENG WenChi & ZHANG HaiLin state key Lab of ISN, xidian university, xi’an 710071, {4. 1. state key Lab of ISN Xidian University Xi’an 710071 China
SM (spatial multiplexing) can effectively increase the information rate in multiple input multiple output system. BLAST is the typical representation of SM, especially VBLAST, which has some simple de- tection algorit... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Exact thresholds for low-density parity-check codes over the binary erasure channel
收藏 引用
Progress in Natural Science:Materials International 2009年 第7期19卷 897-900页
作者: Jianjun Mu a, xiaopeng Jiao a, xinmei Wangb a School of Computer Science and Technology, xidian university, xi’an 710071, china b state {4. Laboratory of integrated Service networks, xidian university, xi’an 710071, china [a]School of Computer Science and Technology Xidian University Xi’an 710071 China [b]State Key Laboratory of Integrated Service Networks Xidian University Xi’an 710071 China
A simple method for determining the threshold of irregular LDPC codes over the binary erasure channel (BEC) under message-passing decoding is proposed. An exact formula for calculating the threshold of irregular LDPC ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论