咨询与建议

限定检索结果

文献类型

  • 35,628 篇 期刊文献
  • 4,449 篇 会议
  • 1 册 图书

馆藏范围

  • 40,078 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 32,002 篇 工学
    • 7,373 篇 计算机科学与技术...
    • 6,934 篇 电子科学与技术(可...
    • 5,420 篇 控制科学与工程
    • 5,048 篇 仪器科学与技术
    • 4,895 篇 软件工程
    • 4,888 篇 机械工程
    • 4,233 篇 信息与通信工程
    • 3,510 篇 材料科学与工程(可...
    • 2,201 篇 光学工程
    • 1,720 篇 化学工程与技术
    • 1,605 篇 电气工程
    • 1,347 篇 航空宇航科学与技...
    • 1,343 篇 网络空间安全
    • 871 篇 交通运输工程
    • 662 篇 动力工程及工程热...
    • 528 篇 地质资源与地质工...
    • 482 篇 环境科学与工程(可...
    • 439 篇 力学(可授工学、理...
    • 408 篇 测绘科学与技术
    • 406 篇 生物医学工程(可授...
  • 10,474 篇 理学
    • 3,629 篇 物理学
    • 2,658 篇 数学
    • 1,715 篇 系统科学
    • 1,041 篇 化学
    • 482 篇 生物学
    • 440 篇 大气科学
  • 4,850 篇 管理学
    • 4,413 篇 管理科学与工程(可...
  • 2,128 篇 医学
    • 1,564 篇 临床医学
  • 852 篇 经济学
    • 822 篇 应用经济学
  • 803 篇 农学
  • 703 篇 军事学
    • 655 篇 军队指挥学
  • 419 篇 艺术学
  • 397 篇 文学
  • 361 篇 教育学
  • 236 篇 法学
  • 21 篇 哲学
  • 21 篇 历史学

主题

  • 721 篇 deep learning
  • 341 篇 machine learning
  • 213 篇 network
  • 190 篇 internet of thin...
  • 166 篇 communication
  • 164 篇 system
  • 145 篇 analysis
  • 138 篇 fault diagnosis
  • 137 篇 polarization
  • 132 篇 clustering
  • 123 篇 blockchain
  • 122 篇 reinforcement le...
  • 120 篇 security
  • 119 篇 information
  • 119 篇 optimization
  • 103 篇 covid-19
  • 91 篇 structure
  • 86 篇 temperature
  • 86 篇 model
  • 86 篇 quantum

机构

  • 147 篇 school of inform...
  • 134 篇 university of ch...
  • 134 篇 ieee
  • 124 篇 school of inform...
  • 96 篇 school of comput...
  • 78 篇 school of electr...
  • 74 篇 school of electr...
  • 73 篇 school of automa...
  • 71 篇 national mobile ...
  • 61 篇 school of inform...
  • 54 篇 school of comput...
  • 54 篇 school of electr...
  • 45 篇 hubei key labora...
  • 44 篇 school of electr...
  • 43 篇 school of electr...
  • 42 篇 school of inform...
  • 40 篇 school of electr...
  • 40 篇 school of electr...
  • 40 篇 school of inform...
  • 40 篇 school of electr...

作者

  • 78 篇 lei wang
  • 77 篇 jian wang
  • 76 篇 jun wang
  • 62 篇 yu wang
  • 59 篇 jing zhang
  • 52 篇 jun zhang
  • 48 篇 rui wang
  • 46 篇 meng wang
  • 45 篇 wei wang
  • 44 篇 li li
  • 39 篇 xin liu
  • 38 篇 qing wang
  • 37 篇 bin wang
  • 37 篇 qi liu
  • 37 篇 yu zhang
  • 36 篇 li yang
  • 35 篇 feng liu
  • 34 篇 xi chen
  • 32 篇 wang lei
  • 32 篇 wei liu

语言

  • 36,201 篇 英文
  • 3,877 篇 中文
检索条件"机构=School of Communication & Information Engineering"
40078 条 记 录,以下是4991-5000 订阅
排序:
Local spatial properties based image interpolation scheme using SVMs
收藏 引用
Journal of Systems engineering and Electronics 2008年 第3期19卷 618-623页
作者: Ma Liyong Shen Yi Ma Jiachen school of information Science and engineering Harbin Inst. of Technology Weihai 264209 P. R. China
Image interpolation plays an important role in image process applications. A novel support vector machines (SVMs) based interpolation scheme is proposed with increasing the local spatial properties in the source ima... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system
收藏 引用
Chinese Physics B 2016年 第10期25卷 76-88页
作者: 柴秀丽 甘志华 路杨 张苗辉 陈怡然 school of Computer and information engineering Institute of Image Processing and Pattern Recognition Henan University Department of Electrical and Computer engineering University of Pittsburgh school of Software Henan University Research Department Henan University
Recently, many image encryption algorithms based on chaos have been proposed. Most of the previous algorithms encrypt components R, G, and B of color images independently and neglect the high correlation between them.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
First-principles calculations and experimental studies of Sn-Zn alloys as negative electrode materials for lithium-ion batteries
收藏 引用
Rare Metals 2011年 第2期30卷 160-165页
作者: RU Qiang PENG Wei ZHANG Zhiwen HU Shejun LI Yanling Laboratory of Quantum information Technology School of Physics and Telecommunication Engineering South China Normal University Guangzhou 510006 China
The physical characters and electrochemical properties of various phases in a Sn-Zn electrode, such as formation energy, plateau potential, specific capacity, as well as volume expansion, were calculated by the first-... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
On the Effects of Exploring Historical Commit Messages for Developer Recommendation
收藏 引用
Chinese Journal of Electronics 2016年 第4期25卷 658-664页
作者: YANG Hui SUN Xiaobing DUAN Yucong LI Bin school of information engineering Yangzhou University State Key Laboratory for Novel Software Technology Nanjing University Hainan University
Many developer recommendation techniques have been developed in the *** existing studies,most of them are performed based on exploring the historical commit *** thought behind them is that developers who submit simila... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Phase retrieval algorithm for optical information security
收藏 引用
Chinese Physics B 2019年 第8期28卷 132-147页
作者: Shi-Qing Wang Xiang-Feng Meng Yu-Rong Wang Yong-Kai Yin Xiu-Lun Yang Department of Optics School of Information Science and Engineering and Shandong Provincial Key Laboratory of Laser Technology and ApplicationShandong University
As a typical technology for optical encryption,phase retrieval algorithms have been widely used in optical information encryption and authentication *** paper presents three applications of two-dimensional(2D)phase re... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
SIGNAL CONSTELLATIONS DESIGN FOR DIFFERENTIAL UNITARY SPACE-TIME IN MIMO-OFDM SYSTEM OVER FREQUENCY-SELECTIVE FADING CHANNELS
收藏 引用
Journal of Electronics(China) 2008年 第3期25卷 300-304页
作者: Chen Jing Zhu Qi College of communicationinformation engineering Nanjing University of Posts & Telecommunications Nanjing 210003 China
In this paper, the design of signal constellations parameters is studied for Differential Unitary Space-Time Modulation (DUSTM) based on the design criterion of maximizing the diversity product. Further, noninteger se... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Identity-based proxy multi-signature applicable to secure E-transaction delegations
收藏 引用
High Technology Letters 2016年 第2期22卷 199-206页
作者: 刘建华 Wu Qianhong Liu Jianwei Shang Tao Aviation engineering Institute Civil Aviation Flight University of China school of Electronics and information engineering Beihang University
To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based pro... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Efficient Quantum Secure Direct communication with Authentication
收藏 引用
Chinese Physics Letters 2008年 第7期25卷 2354-2357页
作者: 刘文杰 陈汉武 李志强 刘志昊 school of Computer Science and engineering Southeast University Nanjing 210096 school of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044
Two protocols of quantum direct communication with authentication [Phys. Rev. A 73 (2006) 042305] were recently indicated to be insecure against the authenticator Trent attacks [Phys. Rev. A 75 (2007) 026301]. We ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Hybrid Model of Molten Steel Temperature Prediction Based on Ladle Heat Status and Artificial Neural Network
收藏 引用
Journal of Iron and Steel Research International 2014年 第2期21卷 181-190页
作者: Fei HE Dong-feng HE An-jun XU Hong-bing WANG Nai-yuan TIAN school of Metallurgical and Ecological engineering University of Science and Technology Beijing State Key Laboratory of Advanced Metallurgy University of Science and Technology Beijing school of Computer and communication engineering University of Science and Technology Beijing
Aiming at the characteristics of the practical steelmaking process, a hybrid model based on ladle heat sta- tus and artificial neural network has been proposed to predict molten steel temperature. The hybrid model cou... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Memway:In-Memory Waylaying Acceleration for Practical Rowhammer Attacks Against Binaries
收藏 引用
Tsinghua Science and Technology 2019年 第5期24卷 535-545页
作者: Lai Xu Rongwei Yu Lina Wang Weijie Liu the Key Laboratory of Aerospace information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University
The Rowhammer bug is a novel micro-architectural security threat, enabling powerful privilege-escalation attacks on various mainstream platforms. It works by actively flipping bits in Dynamic Random Access Memory(DRAM... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论