咨询与建议

限定检索结果

文献类型

  • 927 篇 期刊文献
  • 252 篇 会议

馆藏范围

  • 1,179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 913 篇 工学
    • 471 篇 计算机科学与技术...
    • 313 篇 软件工程
    • 159 篇 控制科学与工程
    • 123 篇 机械工程
    • 99 篇 仪器科学与技术
    • 79 篇 网络空间安全
    • 63 篇 信息与通信工程
    • 47 篇 电子科学与技术(可...
    • 23 篇 交通运输工程
    • 20 篇 电气工程
    • 17 篇 环境科学与工程(可...
    • 16 篇 农业工程
    • 14 篇 光学工程
    • 14 篇 材料科学与工程(可...
    • 12 篇 测绘科学与技术
    • 11 篇 地质资源与地质工...
  • 294 篇 管理学
    • 271 篇 管理科学与工程(可...
    • 12 篇 工商管理
    • 11 篇 公共管理
  • 219 篇 理学
    • 99 篇 数学
    • 42 篇 系统科学
    • 26 篇 物理学
    • 16 篇 生态学
    • 13 篇 生物学
  • 48 篇 教育学
    • 40 篇 教育学
  • 41 篇 农学
    • 16 篇 农业资源与环境
  • 27 篇 艺术学
    • 27 篇 设计学(可授艺术学...
  • 26 篇 医学
    • 12 篇 临床医学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 19 篇 军事学
    • 18 篇 军队指挥学
  • 7 篇 文学
  • 3 篇 法学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 21 篇 遗传算法
  • 19 篇 数据库
  • 16 篇 数据挖掘
  • 16 篇 计算机网络
  • 16 篇 网络安全
  • 13 篇 神经网络
  • 12 篇 卷积神经网络
  • 11 篇 xml
  • 11 篇 设计
  • 11 篇 计算机
  • 11 篇 图像处理
  • 10 篇 小波变换
  • 10 篇 深度学习
  • 9 篇 无线传感器网络
  • 9 篇 web
  • 8 篇 数字签名
  • 8 篇 密码学
  • 7 篇 信息处理
  • 7 篇 internet
  • 7 篇 gis

机构

  • 39 篇 西南师范大学
  • 36 篇 中南大学
  • 33 篇 四川大学
  • 27 篇 西南交通大学
  • 23 篇 西南大学
  • 23 篇 山东科技大学
  • 21 篇 西南民族学院
  • 21 篇 西南民族大学
  • 16 篇 浙江大学
  • 15 篇 西南科技大学
  • 14 篇 湖南师范大学
  • 14 篇 广西大学
  • 13 篇 重庆大学
  • 12 篇 华中科技大学
  • 12 篇 北京科技大学
  • 11 篇 吉林大学
  • 11 篇 华南理工大学
  • 11 篇 南开大学
  • 11 篇 哈尔滨工业大学
  • 11 篇 电子科技大学

作者

  • 41 篇 china
  • 6 篇 余建桥
  • 6 篇 p.r.china
  • 6 篇 陈志刚
  • 6 篇 beijing
  • 5 篇 张连明
  • 5 篇 张为群
  • 5 篇 王燕
  • 5 篇 陈松乔
  • 5 篇 张小真
  • 5 篇 谈文蓉
  • 4 篇 changsha
  • 4 篇 党小超
  • 4 篇 丁世飞
  • 4 篇 马希荣
  • 4 篇 李涛
  • 4 篇 何志国
  • 4 篇 王行愚
  • 4 篇 陈建二
  • 4 篇 杜军

语言

  • 813 篇 中文
  • 366 篇 英文
检索条件"作者=DU Xiaojie1 college of computer and information Science Southwest University"
1179 条 记 录,以下是1-10 订阅
排序:
Design and Research of WIA-PA Network
Design and Research of WIA-PA Network
收藏 引用
2010 ETP/IITA Conference on Telecommunication and information(TEIN 2010)
作者: du xiaojie1 college of computer and information science southwest university swu ChongQing ChinaLIU Feng2 college of computer and information science southwest university swu CongQing China
WIA industrial wireless network technology is a highly reliable, ultra low-power intelligent multi-hop wireless sensor network technology;the technology uses self-organizing, self-healing mechanism Intelligent Mesh Ne... 详细信息
来源: cnki会议 评论
IQABC-Based Hybrid Deployment Algorithm for Mobile Robotic Agents Providing Network Coverage
收藏 引用
Tsinghua science and Technology 2024年 第2期29卷 589-604页
作者: Shuang Xu xiaojie Liu Dengao Li Jumin Zhao college of computer science and Technology(college of Data science) Taiyuan University of TechnologyTaiyuan 030024China Pengcheng Laboratory Shenzhen 518055China college of information and computer Taiyuan University of TechnologyTaiyuan 030024China
Working as aerial base stations,mobile robotic agents can be formed as a wireless robotic network to provide network services for on-ground mobile devices in a target ***,a challenging issue is how to deploy these mob... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A survey on semantic communications:Technologies,solutions,applications and challenges
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 528-545页
作者: Yating Liu xiaojie Wang Zhaolong Ning MengChu Zhou Lei Guo Behrouz Jedari School of Communication and information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China Baotou Vocational&Technical college Baotou 014035China School of information and Electronic Engineering Zhejiang Gongshang UniversityHangzhou 310018China Department of Electrical and computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102USA Nokia Finland
Semantic Communication(SC)has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput in wireless networ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The structural analysis of fuzzy measures
收藏 引用
science China(information sciences) 2011年 第1期54卷 38-50页
作者: ZHANG Ling1,ZHANG Bo2 & ZHANG YanPing1 1 computer science college,Anhui university,Hefei 230039,China 2State Key Lab of Intelligent Technology & Systems Tsinghua National Lab for information science & Technology information science & Technology college,computer science & Technology,Tsinghua university,Beijing 100084,China 1. computer science college Anhui University Hefei 230039 China2. State Key Lab of Intelligent Technology & Systems Tsinghua National Lab for information science & Technology information science & Technology college Computer Science & Technology Tsinghua University Beijing 100084 China
From quotient space based granular computing theory we explore the fuzzy measures of fuzzy sets. Based on the structural analysis of fuzzy sets,we present an"isotropism"*** this assumption we achieved the following in... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Construction and cross-correlation analysis of the affective physiological response database
收藏 引用
science China(information sciences) 2010年 第9期53卷 1774-1784页
作者: WEN WanHui1,QIU YuHui2,LIU GuangYuan1*,CHENG NanPu3 & HUANG XiTing4 1School of Electronic and information Engineering,southwest university,Chongqing 400715,China 2college of computer and information science,southwest university,Chongqing 400715,China 3School of Materials science and Engineering,southwest university,Chongqing 400715,China 4School of Psychology,southwest university,Chongqing 400715,China 1. School of Electronic and information Engineering Southwest University Chongqing 400715 China2. College of Computer and Information Science Southwest University Chongqing 400715 China3. School of Materials Science and Engineering Southwest University Chongqing 400715 China4. School of Psychology Southwest University Chongqing 400715 China
Six kinds of emotions,namely joy,surprise,disgust,grief,anger and fear,are elicited from 300 ordinary college students by means of high-rated movie *** signals of galvanic skin response(GSR),heart rate(HR),blood volum... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Deterministic secure quantum communication without unitary operation based on high-dimensional entanglement swapping
收藏 引用
science China(information sciences) 2012年 第2期55卷 360-367页
作者: LIU ZhiHao1,CHEN HanWu1,LIU WenJie2,XU Juan1 & LI ZhiQiang3 1School of computer science and Engineering,Southeast university,Nanjing 211189,China 2School of computer and Software,Nanjing university of information science & Technology,Nanjing 210044,China 3college of information Engineering,Yangzhou university,Yangzhou 225009,China 1. School of computer science and Engineering Southeast University Nanjing 211189 China2. School of Computer and Software Nanjing University of Information Science & Technology Nanjing 210044 China3. College of Information Engineering Yangzhou University Yangzhou 225009 China
By analysis of the basic properties of entanglement swapping of high-dimensional Bell states,a universal and general deterministic secure quantum communication(DSQC)protocol is proposed,in which unitary operation is n... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Fuzzy tolerance quotient spaces and fuzzy subsets
收藏 引用
science China(information sciences) 2010年 第4期53卷 704-714页
作者: ZHANG Ling1 & ZHANG Bo2,3,4* 1computer science & Technology college, Anhui university, Anhui 230039, China 2State Key Laboratory of Intelligent Technology and Systems, Beijing 100084, China 3Tsinghua National Laboratory of information science & Technology, Beijing 100084, China 4information science & Technology college, computer science & Technology Department, Tsinghua university, Beijing 100084, China 1. computer science & Technology college Anhui University Anhui 230039 China2. State Key Laboratory of Intelligent Technology and Systems Beijing 100084 China3. Tsinghua National Laboratory of Information Science & Technology Beijing 100084 China4. Information Science & Technology College Computer Science & Technology Department Tsinghua University Beijing 100084 China
The structure and characteristic of fuzzy subsets are discussed by using the concepts of granulation and hierarchy in quotient space theory. First, the equivalence relation based quotient space theory is extended to t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Frequency/time hopping sequence sets with optimal partial Hamming correlation properties
收藏 引用
science China(information sciences) 2012年 第10期55卷 2207-2215页
作者: NIU XianHua 1,2,PENG DaiYuan 1 & ZHOU ZhengChun 3 1 The Provincial Key Laboratory of information Coding and Transmission,Institute of Mobile Communications,southwest Jiaotong university,Chengdu 610031,China 2 The School of Mathematics and computer Engineering,Xihua university,Chengdu 610039,China 3 The college of Maths,southwest Jiaotong university,Chengdu 610031,China 1. The Provincial Key Laboratory of information Coding and Transmission Institute of Mobile Communications Southwest Jiaotong University Chengdu 610031 China 2. The School of Mathematics and computer Engineering Xihua University Chengdu 610039 China 3. The college of Maths Southwest Jiaotong University Chengdu 610031 China
Frequency hopping/time hopping(FH/TH) sequences have found wide applications in various modern FH/TH spread spectrum communications,such as digital cellular mobile communication,short-range wireless communication,pers... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Group sparse representation for image categorization and semantic video retrieval
收藏 引用
science China(information sciences) 2011年 第10期54卷 2051-2063页
作者: LIU YaNan 1,2 ,WU Fei 2 & ZHUANG YueTing 2 1 School of information,Zhejiang university of Finance & Economics,Hangzhou,310018,China 2 college of computer science and Technology,Zhejiang university,Hangzhou,310012,China 1. School of information Zhejiang University of Finance & Economics Hangzhou 310018 China2. College of Computer Science and Technology Zhejiang University Hangzhou 310012 China
Multimedia content analysis and management are a promising and challenging *** this paper we develop a novel approach to image representation,which we call group sparse representation (GSR),for image classification an... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Analysis of a kind of quantum cryptographic schemes based on secret sharing
收藏 引用
science China(Physics,Mechanics & Astronomy) 2009年 第9期52卷 1313-1316页
作者: ZHANG XingLan1 & JI DongYao2 1 college of computer science and Technology, Beijing university of Technology, Beijing 100124, China 2 State Key Laboratory of information Security, Graduate university of Chinese Academy of sciences, Beijing 100049, China college of computer science and Technology Beijing University of Technology Beijing 100124 China State Key Laboratory of information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China
Recently, Yang et al. proposed a kind of quantum cryptographic schemes based on secret sharing. The main idea is drawn from the case, where any n participants who share a secret K can co-operate as K does. This proces... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论