咨询与建议

限定检索结果

文献类型

  • 14,402 篇 会议
  • 172 篇 期刊文献
  • 80 册 图书
  • 1 篇 专利

馆藏范围

  • 14,655 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,635 篇 工学
    • 7,454 篇 计算机科学与技术...
    • 5,450 篇 软件工程
    • 3,756 篇 信息与通信工程
    • 2,135 篇 生物工程
    • 1,603 篇 控制科学与工程
    • 1,443 篇 电气工程
    • 1,085 篇 生物医学工程(可授...
    • 815 篇 网络空间安全
    • 756 篇 电子科学与技术(可...
    • 579 篇 光学工程
    • 523 篇 动力工程及工程热...
    • 484 篇 机械工程
    • 429 篇 安全科学与工程
    • 427 篇 仪器科学与技术
    • 404 篇 化学工程与技术
    • 368 篇 交通运输工程
  • 4,244 篇 理学
    • 2,198 篇 生物学
    • 1,888 篇 数学
    • 827 篇 物理学
    • 811 篇 统计学(可授理学、...
    • 577 篇 化学
    • 422 篇 系统科学
  • 2,272 篇 管理学
    • 1,257 篇 图书情报与档案管...
    • 1,158 篇 管理科学与工程(可...
    • 559 篇 工商管理
  • 1,014 篇 医学
    • 799 篇 临床医学
    • 789 篇 基础医学(可授医学...
    • 650 篇 药学(可授医学、理...
    • 327 篇 公共卫生与预防医...
  • 446 篇 法学
    • 365 篇 社会学
  • 262 篇 农学
  • 219 篇 经济学
  • 157 篇 教育学
  • 66 篇 文学
  • 26 篇 军事学
  • 2 篇 历史学
  • 1 篇 哲学
  • 1 篇 艺术学

主题

  • 1,174 篇 machine learning
  • 868 篇 deep learning
  • 271 篇 network security
  • 258 篇 support vector m...
  • 255 篇 neural networks
  • 247 篇 convolutional ne...
  • 217 篇 convolutional ne...
  • 209 篇 feature extracti...
  • 200 篇 machine learning...
  • 181 篇 internet of thin...
  • 179 篇 training
  • 177 篇 neural network
  • 169 篇 reinforcement le...
  • 159 篇 federated learni...
  • 156 篇 computational mo...
  • 143 篇 predictive model...
  • 138 篇 convolution
  • 134 篇 artificial intel...
  • 132 篇 intrusion detect...
  • 130 篇 forecasting

机构

  • 108 篇 chitkara univers...
  • 58 篇 maharishi school...
  • 45 篇 maharishi school...
  • 41 篇 the islamic univ...
  • 40 篇 nitte meenakshi ...
  • 33 篇 school of inform...
  • 32 篇 department of el...
  • 31 篇 peng cheng labor...
  • 30 篇 centre of interd...
  • 28 篇 karnataka bangal...
  • 27 篇 university of ch...
  • 25 篇 department of el...
  • 24 篇 department of co...
  • 24 篇 presidency unive...
  • 22 篇 department of co...
  • 22 篇 maharishi univer...
  • 21 篇 school of inform...
  • 19 篇 national univers...
  • 19 篇 school of comput...
  • 19 篇 tianjin universi...

作者

  • 22 篇 sharma ishu
  • 17 篇 liu yang
  • 17 篇 sakorn mekruksav...
  • 16 篇 chen chen
  • 15 篇 ramkumar g.
  • 14 篇 wang lei
  • 12 篇 ishu sharma
  • 12 篇 anuchit jitpatta...
  • 11 篇 awotunde joseph ...
  • 10 篇 pareek piyush ku...
  • 10 篇 wang jing
  • 10 篇 kulkarni uday
  • 9 篇 kumar atul
  • 9 篇 nagaraj p.
  • 9 篇 nath vijay
  • 9 篇 yadav rakesh kum...
  • 9 篇 muneeswaran v.
  • 9 篇 ramachandra a c
  • 9 篇 kumar ashok
  • 9 篇 chen hao

语言

  • 14,265 篇 英文
  • 381 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 土耳其文
检索条件"任意字段=2023 International Conference on Communication Network and Machine Learning, CNML 2023"
14655 条 记 录,以下是1-10 订阅
排序:
Proceedings of the 2023 international conference on communication network and machine learning, cnml 2023
Proceedings of the 2023 International Conference on Communic...
收藏 引用
2023 international conference on communication network and machine learning, cnml 2023
The proceedings contain 82 papers. The topics discussed include: rogue nodes detection using idle parking resources;analysis of node importance of satellite network based on triangular motif;research on web configurat...
来源: 评论
Anti-concept Drift-enabled Recognition Method of Encrypted Traffic Behavior  24
Anti-concept Drift-enabled Recognition Method of Encrypted T...
收藏 引用
2nd international conference on communication networks and machine learning, cnml 2024
作者: Zheng, Jicheng Huang, Shuangshuang Ji, Qingbing School of Computer Science and Technology Xi’an Jiaotong University Xi’an China National Key Laboratory of Security Communication Sichuan Chengdu China
Although encrypted traffic ensures information security, it can also be exploited by malicious actors, leading to security risks. This paper addresses the limitations of existing behavior recognition technologies, par... 详细信息
来源: 评论
Research on network security spatial data asset protection technology based on deep learning  24
Research on network security spatial data asset protection t...
收藏 引用
2nd international conference on communication networks and machine learning, cnml 2024
作者: Chen, Lina Meng, Chunzhi Meng, Liang Li, Siwei Guangxi Power Grid Company Information Communication Branch Guangxi Nanning China
In the digital age, the protection of data assets in the enterprise cybersecurity space has become critical. This paper explores a deep learning-based data asset protection technique that aims to solve the challenges ... 详细信息
来源: 评论
Routing Method Based on SD-WAN  24
Routing Method Based on SD-WAN
收藏 引用
2nd international conference on communication networks and machine learning, cnml 2024
作者: Wang, Chengjin Huo, Shiwei Bai, Wenhua Li, Fuquan College of Information and Communication National University of Defense Technology Hubei Wuhan China
In recent years, the rapid development of the Internet industry has made the network traffic show a diversified trend. Different application services have different characteristics and have different requirements on n... 详细信息
来源: 评论
Proceedings of 2024 2nd international conference on communication networks and machine learning, cnml 2024
Proceedings of 2024 2nd International Conference on Communic...
收藏 引用
2nd international conference on communication networks and machine learning, cnml 2024
The proceedings contain 27 papers. The topics discussed include: a load prediction method for data transmission in optical communication networks based on LSTM model;Bayesian-LightGBM classification prediction model o...
来源: 评论
A load prediction method for data transmission in optical communication networks based on LSTM Model  24
A load prediction method for data transmission in optical co...
收藏 引用
2nd international conference on communication networks and machine learning, cnml 2024
作者: Zhu, Ruijie Wang, Haiyang Li, Zhe He, Baoying Duan, Xiao Shandong Jinan China
The massive transmission of data in optical communication networks leads to an increase in the load of optical communication channels, making it more difficult to predict data transmission loads. A data transmission l... 详细信息
来源: 评论
Research on the detection and analysis of weak signals with low SNR based on the Welch algorithm  24
Research on the detection and analysis of weak signals with ...
收藏 引用
2nd international conference on communication networks and machine learning, cnml 2024
作者: Wu, Bin Zhang, Wanqing Zhang, Jun Yu, Jing Huangfu, Taoyu Hebei Key Laboratory of Marine Perception Network and Data Processing School of Computer and Communication Engineering Northeastern University at Qinhuangdao Hebei Qinhuangdao China Southeast University Jiangsu Nanjing China
Submarines are vital for military defense and national security in strategic communication systems. Power Spectral Density (PSD) characterizes signal spectrum frequency dependence and is crucial for analyzing broadban... 详细信息
来源: 评论
Research on UAV-NOMA communication system based on improved grey wolf optimization algorithm  24
Research on UAV-NOMA communication system based on improved ...
收藏 引用
2nd international conference on communication networks and machine learning, cnml 2024
作者: Bai, Xiaojuan Wang, Shenghui Ma, Jingwen Xu, Jing School of Physics and Electronic Engineering Northwest Normal University Gansu Lanzhou China
Considering that UAV, serving as base stations, can enhance the flexibility of communication system transmission, reduce transmission delays, and provide temporary communication, this paper proposes a NOMA-assisted UA... 详细信息
来源: 评论
Introduction to Integration Technology Based on Dispatch Telephone and Human machine Workstation  24
Introduction to Integration Technology Based on Dispatch Tel...
收藏 引用
2nd international conference on communication networks and machine learning, cnml 2024
作者: Qin, Ningli Wu, Feng Du, Changyu Jiao, Le Zhou, Bin Beijing Fibrlink Communications CO. LTD Beijing China Shenzhen Guodian Technology Communication Co. Beijing China
In order to solve the problem of independence and cannot linkage between the traditional dispatching telephone and dispatching control system, better meet the uploading and issuing of dispatching instructions, as well... 详细信息
来源: 评论
Research on Radar communication Jamming Recognition based on Neural networks  24
Research on Radar Communication Jamming Recognition based on...
收藏 引用
2nd international conference on communication networks and machine learning, cnml 2024
作者: Xia, Jiayu Officers College of Pap Sichuan Chengdu China
The identification of communication jamming is a pivotal aspect of cognitive electronic warfare, which is of paramount importance for the advancement of jammer and radar capabilities. Traditional methodologies are sig... 详细信息
来源: 评论