咨询与建议

限定检索结果

文献类型

  • 165 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 167 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 166 篇 工学
    • 99 篇 计算机科学与技术...
    • 80 篇 信息与通信工程
    • 75 篇 电气工程
    • 74 篇 机械工程
    • 63 篇 电子科学与技术(可...
    • 56 篇 仪器科学与技术
    • 50 篇 网络空间安全
    • 47 篇 控制科学与工程
    • 34 篇 材料科学与工程(可...
    • 12 篇 动力工程及工程热...
    • 12 篇 生物医学工程(可授...
    • 11 篇 生物工程
    • 10 篇 软件工程
    • 4 篇 化学工程与技术
    • 3 篇 光学工程
    • 3 篇 航空宇航科学与技...
    • 2 篇 力学(可授工学、理...
    • 2 篇 测绘科学与技术
    • 2 篇 公安技术
  • 68 篇 理学
    • 35 篇 物理学
    • 21 篇 数学
    • 12 篇 生物学
    • 11 篇 化学
    • 10 篇 天文学
    • 4 篇 系统科学
    • 2 篇 大气科学
  • 32 篇 管理学
    • 27 篇 图书情报与档案管...
    • 6 篇 管理科学与工程(可...
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
  • 2 篇 法学
    • 1 篇 社会学
  • 2 篇 农学
  • 1 篇 教育学

主题

  • 14 篇 无线传感器网络
  • 13 篇 wireless sensor ...
  • 6 篇 传感器节点
  • 5 篇 wireless sensor ...
  • 5 篇 路由协议
  • 4 篇 clustering
  • 3 篇 internet of thin...
  • 3 篇 low power
  • 3 篇 network
  • 3 篇 wireless multime...
  • 3 篇 wireless sensor ...
  • 3 篇 privacy
  • 3 篇 routing
  • 3 篇 传感器网络
  • 3 篇 wireless
  • 3 篇 quantum communic...
  • 2 篇 network lifetime
  • 2 篇 wsns
  • 2 篇 分布式
  • 2 篇 deep learning

机构

  • 21 篇 jiangsu high tec...
  • 20 篇 college of compu...
  • 8 篇 jiangsu high tec...
  • 7 篇 college of compu...
  • 5 篇 jiangsu high tec...
  • 5 篇 jiangsu provinci...
  • 4 篇 institute of com...
  • 4 篇 key laboratory o...
  • 4 篇 institute of sig...
  • 3 篇 key laboratory o...
  • 3 篇 jiangsu key labo...
  • 3 篇 engineering rese...
  • 3 篇 state key labora...
  • 3 篇 broadband wirele...
  • 3 篇 school of comput...
  • 3 篇 institute of qua...
  • 3 篇 college of mathe...
  • 2 篇 state key labora...
  • 2 篇 national mobile ...
  • 2 篇 institute of adv...

作者

  • 14 篇 wang ruchuan
  • 10 篇 ruchuan wang
  • 6 篇 赵生妹
  • 6 篇 wang ru-chuan
  • 6 篇 fu xiao
  • 5 篇 lin zhang
  • 4 篇 ji yimu
  • 4 篇 李智群
  • 4 篇 sun lijuan
  • 4 篇 xiao fu
  • 4 篇 yang geng
  • 4 篇 王琴
  • 4 篇 zhu qi
  • 3 篇 吴晨健
  • 3 篇 周澜
  • 3 篇 li peng
  • 3 篇 ye ning
  • 3 篇 王乐
  • 3 篇 lijuan sun
  • 3 篇 huang haiping

语言

  • 160 篇 英文
  • 7 篇 中文
检索条件"机构=Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks"
167 条 记 录,以下是1-10 订阅
排序:
Trust Evaluation Model Based on PSO and LSTM for Huge Information Environments
收藏 引用
Chinese Journal of Electronics 2021年 第1期30卷 92-101页
作者: ZHANG Lin HUANG Yanwen XUAN Jie FU Xiong LIN Qiaomin WANG Ruchuan College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks
Due to the challenge of increasing data volume, the traditional trust model is unable to manage data with high efficiency and effectively extract useful information hidden in big data. To fully utilize big data and co... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Secure Localization technology Based on Dynamic Trust Management in wireless sensor networks
收藏 引用
Chinese Journal of Electronics 2021年 第4期30卷 759-768页
作者: LI Peng YU Xiaotian XU He WANG Ruchuan School of Computer Science and technology Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks
wireless sensor networks have critical applications in various fields, and the algorithm of their secure localization has become a vital technology to support a network. In the light of the self-organization, random d... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Echo State Network Based on Improved Knowledge Distillation for Edge Intelligence
收藏 引用
Chinese Journal of Electronics 2023年
作者: ZHOU Jian JIANG Yuwen XU Lijie ZHAO Lu XIAO Fu College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks
Echo state network (ESN) as a novel artificial neural network has drawn much attention from time series prediction in edge intelligence. ESN is slightly insufficient in long-term memory, thereby impacting the predicti...
来源: 同方期刊数据库 同方期刊数据库 评论
Echo State Network Based on Improved Knowledge Distillation for Edge Intelligence
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 101-111页
作者: Jian ZHOU Yuwen JIANG Lijie XU Lu ZHAO Fu XIAO College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks
Echo state network(ESN) as a novel artificial neural network has drawn much attention from time series prediction in edge intelligence. ESN is slightly insufficient in long-term memory, thereby impacting the predictio... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Intrusion Detection Methods Based on Incomplete RFID Traces
收藏 引用
Chinese Journal of Electronics 2017年 第4期26卷 675-680页
作者: LI Peng WANG Zhen XU He ZHU Feng WANG Ruchuan School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks
According to the Radio frequency identification(RFID) tag cloning attack problems of RFID system and the existing problems of intrusion detection research based on incomplete RFID traces, this paper proposes a method ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
research on Network Malicious Code Immune Based on Imbalanced Support Vector Machines
收藏 引用
Chinese Journal of Electronics 2015年 第1期24卷 181-186页
作者: LI Peng WANG Ruchuan College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks
The malicious computer code immune system and the biological immune system are highly similar:both preserve the stability of the system in real time in a constantly changing environment. This similarity is exploited t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
New spray and wait protocol with node activity in heterogeneous delay tolerant networks
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2015年 第2期22卷 60-68页
作者: Wu Jiagao Ye Ke Zhu Yiji Liu Linfeng College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks
The spray and wait protocol is a classic copy-limited spraying protocol in delay tolerant networks, in which, the binary spray mode can be improved for heterogeneous delay tolerant networks. In this article, a new con... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Communication and performance evaluation of 3-ary n-cubes onto network-on-chips
收藏 引用
Science China(Information Sciences) 2022年 第7期65卷 245-247页
作者: Weibei FAN Jianxi FAN Yujie ZHANG Zhijie HAN Guoliang CHEN School of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing University of Posts and Telecommunications School of Computer Science and technology Soochow University
Dear editor, Network-on-chip (No C) has the advantages of highly integrated, ultralow-power, low cost and small volume, and it has become one of the mainstreams of VLSI system design [1, 2]. Wirelength and layout area...
来源: 同方期刊数据库 同方期刊数据库 评论
Smart Attendance System Based on Frequency Distribution Algorithm with Passive RFID Tags
收藏 引用
Tsinghua Science and technology 2020年 第2期25卷 217-226页
作者: Qianwen Miao Fu Xiao Haiping Huang Lijuan Sun Ruchuan Wang School of Computer Nanjing University of Posts and TelecommunicationsNanjing 210046China Department of Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210046China
Staff attendance information has always been an important part of corporate management.However,some opportunistic employees may consign others to punch their time cards,which hampers the authenticity of attendance and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
research on Security of key Algorithms in Intelligent Driving System
收藏 引用
Chinese Journal of Electronics 2019年 第1期28卷 29-38页
作者: LIU Shangdong WU Ye JI Yimu CHEN Chen BI Qiang JIAO Zhipeng GONG Jian WANG Ruchuan School of Computer Science and Engineering Southeast University School of Computer Science Nanjing University of Posts and Telecommunications jiangsu Provincial key laboratory of Computer Network technology Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks
With the rapid development of the smart driving technology, the security of smart driving algorithms is becoming more and more important. Four core smart driving algorithms are determined by studying the architecture ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论