NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 601
1.
  • Anti-scanning research for ... Anti-scanning research for MPWFRFT communication signals
    Liu, Fang; Feng, Yongxin Wireless networks, 2020/1, Letnik: 26, Številka: 1
    Journal Article
    Recenzirano

    Due to the importance of weighted fractional Fourier transform (WFRFT) applications, it has become an important technology in the fields of OFDM and CDMA. Although the single parameter weighted ...
Celotno besedilo
2.
  • Incremental-data stealth-tr... Incremental-data stealth-transmission method in DSSS
    Liu, Fang; Liu, Jian; Feng, Yongxin Wireless networks, 05/2021, Letnik: 27, Številka: 4
    Journal Article
    Recenzirano

    A direct-sequence spread-spectrum (DSSS) signal has many advantages, such as low SNR and strong anti-jamming ability; thus, it is widely used in various military and civil communication systems. ...
Celotno besedilo
3.
  • Detrital zircon geochronolo... Detrital zircon geochronology and geochemistry of Jurassic sandstones in the Xiongcun district, southern Lhasa subterrane, Tibet, China: implications for provenance and tectonic setting
    LANG, XINGHAI; LIU, DONG; DENG, YULIN ... Geological magazine, 04/2019, Letnik: 156, Številka: 4
    Journal Article
    Recenzirano

    Jurassic sandstones in the Xiongcun porphyry copper–gold district, southern Lhasa subterrane, Tibet, China were analysed for petrography, major oxides and trace elements, as well as detrital zircon ...
Celotno besedilo
4.
  • A Malicious Code Detection ... A Malicious Code Detection Method Based on FF-MICNN in the Internet of Things
    Zhang, Wenbo; Feng, Yongxin; Han, Guangjie ... Sensors (Basel, Switzerland), 11/2022, Letnik: 22, Številka: 22
    Journal Article
    Recenzirano
    Odprti dostop

    It is critical to detect malicious code for the security of the Internet of Things (IoT). Therefore, this work proposes a malicious code detection algorithm based on the novel feature fusion-malware ...
Celotno besedilo
5.
  • Two-Dimensional Information... Two-Dimensional Information Transmission Method in DSSS
    Liu, Fang; Cheng, Mowen; Feng, Yongxin Wireless personal communications, 05/2021, Letnik: 118, Številka: 2
    Journal Article
    Recenzirano

    In this paper, a two-dimensional information transmission method based on k step-complex spread spectrum (KS-CSS) is proposed. The aim is to solve the contradiction between the bandwidth and ...
Celotno besedilo
6.
  • DIR-Net: Deep Residual Pola... DIR-Net: Deep Residual Polar Decoding Network Based on Information Refinement
    Song, Bixue; Feng, Yongxin; Wang, Yang Entropy (Basel, Switzerland), 12/2022, Letnik: 24, Številka: 12
    Journal Article
    Recenzirano
    Odprti dostop

    Polar codes are closer to the Shannon limit with lower complexity in coding and decoding. As traditional decoding techniques suffer from high latency and low throughput, with the development of deep ...
Celotno besedilo
7.
Celotno besedilo
8.
  • Program Design for Ship Pip... Program Design for Ship Piping Network Visualization Model based on WPF and C#
    Wu, Xiaoyu; He, Zhibin; Feng, Yongxin ... IEEE access, 01/2023, Letnik: 11
    Journal Article
    Recenzirano
    Odprti dostop

    The traditional approach to ship pipeline programming often involves describing and calculating based on text files. This method tends to be error-prone and time-consuming, especially for complex ...
Celotno besedilo
9.
  • Code index modulation metho... Code index modulation method with multidimensional invisible data mapping
    Liu, Fang; Zheng, Yuanfang; Lu, Hongyang ... IET signal processing, December 2022, 2022-12-00, 2022-12-01, Letnik: 16, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    With the continuous improvement of the application requirements of Direct Sequence Spread Spectrum (DSSS), especially the high requirements of data transmission rate, the advantages of traditional ...
Celotno besedilo
10.
  • A Data Set Accuracy Weighte... A Data Set Accuracy Weighted Random Forest Algorithm for IoT Fault Detection Based on Edge Computing and Blockchain
    Zhang, Wenbo; Wang, Jiaxing; Han, Guangjie ... IEEE internet of things journal, 02/2021, Letnik: 8, Številka: 4
    Journal Article

    The continuously increasing number of connected smart devices has led to the emergence of a crucial fault detection challenge to the Internet of Things (IoT). In this study, we aim to identify a ...
Celotno besedilo
1 2 3 4 5
zadetkov: 601

Nalaganje filtrov