咨询与建议

限定检索结果

文献类型

  • 746 篇 会议
  • 649 篇 期刊文献

馆藏范围

  • 1,395 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,144 篇 工学
    • 220 篇 控制科学与工程
    • 213 篇 计算机科学与技术...
    • 212 篇 电子科学与技术(可...
    • 186 篇 机械工程
    • 181 篇 软件工程
    • 163 篇 信息与通信工程
    • 138 篇 仪器科学与技术
    • 123 篇 材料科学与工程(可...
    • 64 篇 电气工程
    • 63 篇 航空宇航科学与技...
    • 42 篇 光学工程
    • 42 篇 网络空间安全
    • 34 篇 化学工程与技术
    • 25 篇 兵器科学与技术
    • 24 篇 交通运输工程
    • 19 篇 建筑学
    • 19 篇 土木工程
    • 17 篇 动力工程及工程热...
    • 16 篇 水利工程
    • 15 篇 地质资源与地质工...
  • 274 篇 理学
    • 88 篇 数学
    • 82 篇 系统科学
    • 57 篇 物理学
    • 21 篇 化学
  • 214 篇 管理学
    • 179 篇 管理科学与工程(可...
    • 35 篇 工商管理
  • 66 篇 经济学
    • 59 篇 应用经济学
  • 27 篇 军事学
    • 23 篇 军队指挥学
  • 21 篇 农学
  • 20 篇 艺术学
    • 19 篇 设计学(可授艺术学...
  • 17 篇 医学
  • 15 篇 教育学
    • 15 篇 教育学
  • 7 篇 文学
  • 2 篇 法学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 16 篇 genetic algorith...
  • 15 篇 simulation
  • 12 篇 计算机网络
  • 11 篇 设计
  • 9 篇 adaptive control
  • 9 篇 fault diagnosis
  • 8 篇 internet
  • 8 篇 fpga
  • 8 篇 evaluation
  • 7 篇 model
  • 7 篇 电子商务
  • 7 篇 neural network
  • 7 篇 神经网络
  • 6 篇 matlab
  • 6 篇 optimization
  • 6 篇 particle swarm o...
  • 6 篇 and
  • 6 篇 网络安全
  • 5 篇 analysis
  • 5 篇 数字签名

机构

  • 32 篇 解放军信息工程大...
  • 24 篇 电子科技大学
  • 22 篇 天津大学
  • 21 篇 信息工程大学
  • 18 篇 郑州大学
  • 16 篇 国防科技大学
  • 14 篇 华中科技大学
  • 14 篇 大连理工大学
  • 13 篇 天津理工学院
  • 10 篇 华南理工大学
  • 9 篇 重庆工学院
  • 9 篇 浙江大学
  • 9 篇 清华大学
  • 9 篇 哈尔滨工业大学
  • 9 篇 中原工学院
  • 9 篇 北京理工大学
  • 8 篇 山东建筑工程学院
  • 8 篇 华北水利水电学院
  • 8 篇 西安电子科技大学
  • 7 篇 中国科学技术大学

作者

  • 199 篇 china
  • 34 篇 p.r.china
  • 17 篇 zhengzhou
  • 14 篇 beijing
  • 12 篇 china)
  • 12 篇 university of el...
  • 9 篇 sichuan
  • 9 篇 henan
  • 8 篇 chengdu
  • 7 篇 wuhan
  • 6 篇 nanjing
  • 6 篇 national univers...
  • 5 篇 huazhong univers...
  • 5 篇 china.
  • 5 篇 henan province
  • 5 篇 p. r. china
  • 5 篇 tianjin
  • 5 篇 zhengzhou univer...
  • 5 篇 王亚弟
  • 4 篇 shanghai

语言

  • 936 篇 英文
  • 459 篇 中文
检索条件"作者=4 Institute of Electronic Technology,Information Engineering university,zhengzhou 450004,china"
1395 条 记 录,以下是11-20 订阅
排序:
Massive Data Covert Transmission Scheme Based on Shamir Threshold
收藏 引用
Wuhan university Journal of Natural Sciences 2010年 第3期15卷 227-231页
作者: ZHANG Tao WANG Yadi RONG Xing institute of electronic technology Information Engineering University Zhengzhou 450004 Henan China
Massive data covert transmission scheme based on Shamir threshold is proposed in this paper. This method applies Shamir threshold scheme to divide data, uses information hiding technology to cover shadows, and realize... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A fingerprint feature extraction algorithm based on curvature of Bezier curve
收藏 引用
Progress in Natural Science:Materials International 2007年 第11期17卷 1376-1381页
作者: Yuan Huaqiang1, Ye Yangdong2, Deng Jianguang2, Chai Xiaoguang1 and Li Yong1(1. School of Software, Dongguan university of technology, Dongguan 523808, china 2. information engineering institute, zhengzhou university, zhengzhou 450001, china) School of Software Dongguan University of Technology Dongguan 523808 China information engineering institute Zhengzhou University Zhengzhou 450001 China
Fingerprint feature extraction is a key step of fingerprint identification. A novel feature extraction algorithm is proposed in this paper, which describes fingerprint feature with the bending information of fingerpri... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Design and verification of an FPGA programmable logic element based on Sense-Switch pFLASH
收藏 引用
Frontiers of information technology & electronic engineering 2024年 第4期25卷 485-499页
作者: zhengzhou CAO Guozhu LIU Yanfei ZHANG Yueer SHAN Yuting XU No.58 Research institute China Electronics Technology Group CorporationWuxi 214035China
This paper proposes a kind of programmable logic element(PLE)based on Sense-Switch pFLASH *** programming Sense-Switch pFLASH,all three-bit look-up table(LUT3)functions,partial four-bit look-up table(LUT4)functions,la... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Low-complexity distributed differential spacetime coding scheme for amplify-and-forward cooperative networks
收藏 引用
Science in china(Series F) 2009年 第8期52卷 1418-1427页
作者: YU XiangBin1,2, BI GuangGuo3 & XU WeiYe4 1 College of information Science and technology, Nanjing university of Aeronautics and Astronautics, Nanjing 210016, china 2 Department of electronic engineering, City university of Hong Kong, Hong Kong, china 3 National Mobile Communications Research Laboratory, Southeast university, Nanjing 210096, china 4 Department of Communication engineering, Nanjing institute of technology, Nanjing 211167, china College of information Science and technology Nanjing University of Aeronautics and Astronautics Nanjing China Department of electronic engineering City University of Hong Kong Hong Kong China National Mobile Communications Research Laboratory Southeast University Nanjing China Department of Communication engineering Nanjing Institute of Technology Nanjing China
By introducing a space-time coding scheme based on amicable orthogonality, we develop a distributed differential space-time coding scheme with the amplify-and-forward (AF) method for wireless cooperative networks. T... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
High sensitivity refractive index gas sensing enhanced by surface plasmon resonance with nano-cavity antenna array
收藏 引用
Chinese Physics B 2012年 第8期21卷 416-420页
作者: 赵华君 institute of information Optoelectronics technology and Application Departments of Electronic and Electrical EngineeringChongqing University of Arts and Sciences
The surface plasmon resonance gas sensor is presented for refractive index detection using nano-cavity antenna array. The gas sensor monitors the changes of the refractive index by measuring the spectral shift of the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
基于Web管理技术的安全网络管理系统
收藏 引用
计算机工程 2002年 第1期28卷 170-171,238页
作者: 王海洲 李晓 解放军信息工程大学电子技术学院 郑州450004
分析了基于的网络管理技术,提出了一种解决网络管理安全的方法,并结合基于的网络管理技术进行了安全管理系统的原WebWeb 型设计与实现。
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Using New Fusion Operations to Improve Trust Expressiveness of Subjective Logic
收藏 引用
Wuhan university Journal of Natural Sciences 2011年 第5期16卷 376-382页
作者: ZHOU Hongwei1,2,3,SHI Wenchang1,2,LIANG Zhaohui1,2,LIANG Bin1,2 1.Key Laboratory of Data engineering and Knowledge engineering,Ministry of Education,Beijing 100872,china 2.School of information,Renmin university of china,Beijing 100872,china 3.institute of electronic technology,information engineering university of PLA,zhengzhou 450004,Henan,china Key Laboratory of Data engineering and Knowledge engineering Ministry of Education Beijing China School of information Renmin University of China Beijing China institute of electronic technology Information Engineering University of PLA Zhengzhou Henan China
Subjective logic provides a means to describe the trust relationship of the realworld. However, existing fusion operations it offers Weal fused opiniotts equally, which makes it impossible to deal with the weighted op... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A multicast routing algorithm with multiple trees
收藏 引用
Journal of Systems engineering and electronics 2005年 第2期16卷 426-432页
作者: Cui Xunxue 1,2 , Gao Wei3 & Fang Hongyu41. New Star Research institute of Applied technology, Hefei 230031, P. R. china 2. Jiangsu Key Laboratory of Computer information Processing technology,Soochow university, Suzhou 215006, P. R. china 3. Department of electronic engineering and information Science,university of Science and technology of china, Hefei 230027, P. R. china 4. School of electronic Science and technology, Anhui university, Hefei 230039, P. R. china New Star Research institute of Applied technology Hefei 230031 P. R. China 2. Jiangsu Key Laboratory of Computer information Processing technology Soochow University Suzhou 215006 P. R. China Department of electronic engineering and information Science University of Science and Technology of China Hefei 230027 P. R. China School of electronic Science and technology Anhui University Hefei 230039 P. R. China
Quality of service (QoS) multicast routing has continued to be a very important research topic in the Internet. A method of multicast routing is proposed to simultaneously optimize several parameters based on multiobj... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A MULTICAST KEY MANAGEMENT SCHEME BASED ON CHARACTERISTIC VALUES OF MEMBERS
收藏 引用
Journal of electronics(china) 2012年 第Z2期 294-301页
作者: Du Xiaoqiang* ** Bao Wansu* Fu Xiangqun* *(institute of electronic technology, PLA information engineering university, zhengzhou 450004, china) **(Unit 95019 of the PLA, Xiangyang 441800, china)
A new collusion attack on Pour-like schemes is proposed in this paper. Then, we present a collusion-free centralized multicast key management scheme based on characteristic values of members. The re-keying method that... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Dam risk assistant analysis system design
收藏 引用
Science china(Technological Sciences) 2008年 第S2期51卷 101-109页
作者: HE XianFeng1,2,3,GU ChongShi3,4,WU ZhongRu3,4 & SU HuaiZhi3,4 1 Yellow River institute of Hydraulic Research,zhengzhou 450003,china 2 Embankment Security Defect Prevention and Control engineering Research Center of MWR,zhengzhou 45000,china 3 College of Water Resources and Hydropower engineering,Hohai university,Nanjing 210098,china 4 National engineering Research Center of Water Resources Efficient Utilization and engineering Safety,Hohai university,Nanjing 210098,china Yellow River institute of Hydraulic Research Zhengzhou China Embankment Security Defect Prevention and Control engineering Research Center of MWR Zhengzhou China College of Water Resources and Hydropower engineering Hohai University Nanjing China National engineering Research Center of Water Resources Efficient Utilization and engineering Safety Hohai University Nanjing China
In order to reduce the labor intensity and task difficulty of dam risk analysis and to meet the actual requirement of dam risk analysis,it is necessary to establish a dam risk assistant analysis *** program structure ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论