咨询与建议

限定检索结果

文献类型

  • 18,112 篇 期刊文献
  • 1,046 篇 会议

馆藏范围

  • 19,158 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,278 篇 工学
    • 2,187 篇 计算机科学与技术...
    • 1,610 篇 材料科学与工程(可...
    • 1,485 篇 软件工程
    • 1,286 篇 机械工程
    • 1,200 篇 电气工程
    • 1,152 篇 控制科学与工程
    • 1,069 篇 化学工程与技术
    • 916 篇 仪器科学与技术
    • 862 篇 电子科学与技术(可...
    • 747 篇 信息与通信工程
    • 569 篇 水利工程
    • 510 篇 动力工程及工程热...
    • 462 篇 交通运输工程
    • 398 篇 环境科学与工程(可...
    • 376 篇 土木工程
    • 341 篇 光学工程
    • 334 篇 地质资源与地质工...
  • 3,520 篇 理学
    • 730 篇 物理学
    • 711 篇 化学
    • 473 篇 生物学
    • 367 篇 数学
  • 2,625 篇 医学
    • 1,280 篇 临床医学
    • 627 篇 中西医结合
    • 388 篇 中药学(可授医学、...
    • 336 篇 药学(可授医学、理...
  • 2,354 篇 管理学
    • 1,599 篇 管理科学与工程(可...
    • 361 篇 公共管理
  • 1,351 篇 农学
    • 414 篇 农业资源与环境
  • 574 篇 经济学
    • 514 篇 应用经济学
  • 544 篇 教育学
    • 385 篇 教育学
  • 388 篇 法学
  • 206 篇 文学
  • 184 篇 艺术学
  • 116 篇 历史学
  • 110 篇 军事学
  • 63 篇 哲学

主题

  • 176 篇 神经网络
  • 135 篇 深度学习
  • 105 篇 遗传算法
  • 78 篇 网络药理学
  • 66 篇 卷积神经网络
  • 61 篇 人工神经网络
  • 57 篇 力学性能
  • 54 篇 bp神经网络
  • 52 篇 支持向量机
  • 47 篇 network
  • 46 篇 特征提取
  • 45 篇 网络
  • 43 篇 中国
  • 42 篇 数值模拟
  • 34 篇 网络管理
  • 33 篇 deep learning
  • 32 篇 磁共振成像
  • 30 篇 迁移学习
  • 29 篇 锂离子电池
  • 29 篇 生成对抗网络

机构

  • 405 篇 西安交通大学
  • 283 篇 中国科学院大学
  • 258 篇 上海交通大学
  • 155 篇 浙江大学
  • 153 篇 西北工业大学
  • 132 篇 长安大学
  • 128 篇 南京大学
  • 126 篇 university of ch...
  • 126 篇 华南理工大学
  • 123 篇 华中科技大学
  • 122 篇 同济大学
  • 120 篇 武汉大学
  • 113 篇 陕西师范大学
  • 112 篇 东南大学
  • 112 篇 北京大学
  • 112 篇 吉林大学
  • 111 篇 武汉理工大学
  • 111 篇 西安电子科技大学
  • 109 篇 重庆大学
  • 102 篇 北京交通大学

作者

  • 519 篇 陈曦
  • 129 篇 张曦
  • 95 篇 王曦
  • 89 篇 xi chen
  • 73 篇 xi zhang
  • 53 篇 张熙
  • 49 篇 王玺
  • 45 篇 刘曦
  • 43 篇 xi li
  • 36 篇 chen xi
  • 31 篇 陈喜
  • 28 篇 张杰
  • 27 篇 徐亮
  • 26 篇 杨玺
  • 26 篇 china
  • 24 篇 陈希
  • 22 篇 郑曦
  • 20 篇 xi xu
  • 19 篇 王晰
  • 19 篇 李云龙

语言

  • 14,432 篇 中文
  • 4,726 篇 英文
检索条件"作者=3.state {3. Laboratory of Integrated Services Network,Xidian University,Xi’an 710071,China"
19158 条 记 录,以下是1-10 订阅
排序:
A novel distortion elimination method of power amplifier in wideband OFDM system
收藏 引用
Science china(Information Sciences) 2012年 第2期55卷 396-406页
作者: REN ZhiYuan & ZHANG HaiLin state key laboratory of integrated {3. network,xidian university,xi’an 710071,china 1. state key laboratory of integrated {3. network Xidian University Xi’an 710071 China
The nonlinear,memory and saturate distortion caused by power amplifier lead to low BER per-formance and low power efficiency in wideband OFDM *** solve the related problems,a novel power amplifier based on combined am... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A class of quasi-cyclic LDPC codes from B2 (mod m) sequences
收藏 引用
Science china(Information Sciences) 2011年 第8期54卷 1645-1653页
作者: ZHANG GuoHua & WANG xinMei state Key laboratory of integrated Service {3.,xidian university,xi’an 710071,china 1. state Key laboratory of integrated Service {3. Xidian University Xi’an 710071 China
A new class of binary low-density parity-check (LDPC) codes is proposed based on B 2 (mod m) sequences. The parity-check matrix of such a code has a column weight of three and a row weight of an arbitrary integer,and ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A network coding based hybrid ARQ algorithm for wireless video broadcast
收藏 引用
Science china(Information Sciences) 2011年 第6期54卷 1327-1332页
作者: LU Ji , WU ChengKe, xiAO Song & DU JianChao state Key laboratory of integrated {3. network, xidian university, xi’an 710071, china 1. state Key laboratory of integrated {3. network Xidian University Xi’an 710071 China
This paper proposes a network coding (NC) based hybrid ARQ (HARQ) algorithm for video broad- cast over wireless networks. The sender applies NC technique to combine the lost packets of different terminals, so that mul... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Optimal user scheduling and power control in multi-user cognitive broadcast systems
收藏 引用
Science china(Information Sciences) 2012年 第6期55卷 1402-1414页
作者: WANG QunHuan 1,2,3.WANG HuiMing 1,2,3.& YIN QinYe 1,3.1 School of Electronic and Information Engineering,xi'an Jiaotong university,xi'an 710049,china 2 state Key Lab for {3. services networks,xidian university,xi'an 710071,china 3.Ministry of Education Key Lab for Intelligent networks and network Security,xi'an Jiaotong university,xi'an 710071,china. 1. School of Electronic and Information Engineering Xi’an Jiaotong University Xi’an 710049 China2. State Key Lab for Integrated Services Networks Xidian University Xi’an 710071 China3. Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an 710071 China
Cognitive radio systems should not only have the ability to sense and exploit "frequency spectrum holes",but also the ability to sense and utilize "spatial spectrum holes".In this paper,we consider the issue of maximi... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Threshold proxy quantum signature scheme with threshold shared verification
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第8期51卷 1079-1088页
作者: YANG YuGuang1,3.4 & WEN QiaoYan2 1 College of Computer Science and Technology,Beijing university of Technology,Beijing 100124,china 2 state Key {3. of networking and Switching Technology,Beijing university of Posts and Tele-communications,Beijing 100876,china 3.state Key {3. of integrated services network,xidian university,{13.,china 4 state Key {3. of Information Security(Graduate university of Chinese Academy of Sciences) ,Beijing 100049,china 1. College of Computer Science and Technology Beijing University of Technology Beijing 100124 China 3. state Key laboratory of integrated {3. network Xidian University Xi’an 710071 China 4. state Key laboratory of Information Security (Graduate university of Chinese Academy of Sciences) Beijing 100049 China 2. state Key laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quantum threshold group signature
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第10期51卷 1505-1514页
作者: YANG YuGuang1,2,3.& WEN QiaoYan4 1 College of Computer Science and Technology, Beijing university of Technology, Beijing 100124, china 2 state Key {3. of integrated services network, xidian university, xi’an 710071, china 3.state Key {3. of Information Security (Graduate university of Chinese Academy of Sciences), Beijing 100049, china 4 state Key {3. of networking and Switching Technology, Beijing university of Posts and Tele-communications, Beijing 100876, china College of Computer Science and Technology Beijing University of Technology Beijing 100124 China state Key laboratory of integrated {3. network Xidian University Xi’an 710071 China state Key laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China state Key laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YANG YuGuang1,2,3.& WEN QiaoYan4 1 College of Computer Science and Technology,Beijing university of Technology,Beijing 100124,china 2 state Key {3. of integrated services network,xidian university,xi’an 710071,china 3.state Key {3. of Information Security (Graduate university of Chinese Academy of Sciences),Beijing 100049,china 4 state Key {3. of networking and Switching Technology,Beijing university of Posts and Tele-communications,Beijing 100876,china College of Computer Science and Technology Beijing University of Technology Beijing 100124 China state Key laboratory of integrated {3. network Xidian University Xi’an 710071 China state Key laboratory of Information Security (Graduate university of Chinese Academy of Sciences) Beijing 100049 China state Key laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Asynchronous cooperative communication systems:A survey on signal designs
收藏 引用
Science china(Information Sciences) 2011年 第8期54卷 1547-1561页
作者: WANG HuiMing 1,2 & xiA xiangGen 3.1 School of Electronic and Information Engineering, xi’an Jiaotong university, xi’an 710049,china 2 state Key {3. of integrated services networks, xidian university,xi’an 710049, china 3.Department of Electrical and Computer Engineering,university of Delaware,Newark,DE 19716,USA 1. School of Electronic and Information Engineering Xi’an Jiaotong University Xi’an 710049 China2. State Key Laboratory of Integrated Services Networks Xidian University Xi’an 710049 China3. Department of Electrical and Computer Engineering University of Delaware Newark DE 19716 USA
Cooperative communications is a promising technique for future high speed wireless *** systems may be formulated as virtual multi-input multi-output (MIMO) systems where spatial/cooperetive diversity is a key advantag... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Construction of nonbinary quantum cyclic codes by using graph method
收藏 引用
Science in china(Series F) 2005年 第6期48卷 693-702页
作者: LIU Tailin1,2,3. WEN Qiaoyan1 & LIU Zihui4 1. School of Science, Beijing university of Posts and Telecommunications, Beijing 100876, china 2. state Key {3. of integrated services network, xidian university, xi’an 710071,china 3. Shandong Finance Institute, Jinan 250014, china 4. School of Mathematical Sciences, Peking university, Beijing 100871, china 1. School of Science Beijing University of Posts and Telecommunications 100876 Beijing China 2. state Key laboratory of integrated {3. network Xidian University 710071 Xi’an China 3. Shandong Finance Institute 250014 Jinan China 4. School of Mathematical Sciences Peking University 100871 Beijing China
Using the graph method proposed by Schlingemann and Werner, this paper introduces a technique to construct nonbinary quantum cyclic codes and provides a specific example. We also construct the quantum codes [[8, 2, 4]... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Exact thresholds for low-density parity-check codes over the binary erasure channel
收藏 引用
Progress in Natural Science:Materials International 2009年 第7期19卷 897-900页
作者: Jianjun Mu a, xiaopeng Jiao a, xinmei Wangb a School of Computer Science and Technology, xidian university, xi’an 710071, china b {3. Key laboratory of integrated Service networks, xidian university, xi’an 710071, china [a]School of Computer Science and Technology Xidian University Xi’an 710071 China [b]State Key Laboratory of Integrated Service Networks Xidian University Xi’an 710071 China
A simple method for determining the threshold of irregular LDPC codes over the binary erasure channel (BEC) under message-passing decoding is proposed. An exact formula for calculating the threshold of irregular LDPC ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论