咨询与建议

限定检索结果

文献类型

  • 9,914 篇 会议
  • 568 篇 期刊文献
  • 36 篇 学位论文
  • 35 册 图书

馆藏范围

  • 10,553 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 5,926 篇 工学
    • 3,987 篇 计算机科学与技术...
    • 2,475 篇 信息与通信工程
    • 2,006 篇 电气工程
    • 1,915 篇 软件工程
    • 1,252 篇 控制科学与工程
    • 347 篇 电子科学与技术(可...
    • 344 篇 机械工程
    • 238 篇 动力工程及工程热...
    • 214 篇 交通运输工程
    • 193 篇 仪器科学与技术
    • 152 篇 石油与天然气工程
    • 138 篇 生物工程
    • 101 篇 航空宇航科学与技...
    • 95 篇 环境科学与工程(可...
    • 93 篇 生物医学工程(可授...
    • 92 篇 土木工程
    • 81 篇 建筑学
    • 80 篇 安全科学与工程
  • 1,160 篇 理学
    • 587 篇 数学
    • 328 篇 物理学
    • 180 篇 系统科学
    • 172 篇 统计学(可授理学、...
    • 162 篇 生物学
  • 1,124 篇 管理学
    • 1,007 篇 管理科学与工程(可...
    • 296 篇 工商管理
    • 186 篇 图书情报与档案管...
  • 166 篇 医学
    • 139 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 106 篇 法学
    • 74 篇 社会学
  • 102 篇 经济学
    • 97 篇 应用经济学
  • 38 篇 教育学
  • 36 篇 农学
  • 25 篇 文学
  • 16 篇 军事学
  • 4 篇 艺术学

主题

  • 1,895 篇 quality of servi...
  • 964 篇 internet
  • 872 篇 internet of thin...
  • 753 篇 traffic control
  • 732 篇 bandwidth
  • 648 篇 control systems
  • 626 篇 telecommunicatio...
  • 520 篇 ip networks
  • 479 篇 protocols
  • 437 篇 throughput
  • 368 篇 delay
  • 367 篇 resource managem...
  • 343 篇 web and internet...
  • 339 篇 routing
  • 290 篇 real-time system...
  • 267 篇 streaming media
  • 245 篇 monitoring
  • 238 篇 network topology
  • 231 篇 delays
  • 227 篇 network servers

机构

  • 14 篇 chitkara univers...
  • 13 篇 tsinghua univers...
  • 12 篇 department of co...
  • 11 篇 china electric p...
  • 11 篇 school of electr...
  • 11 篇 beijing universi...
  • 10 篇 state key labora...
  • 10 篇 school of inform...
  • 9 篇 department of sy...
  • 9 篇 shanghai jiao to...
  • 9 篇 beijing jiaotong...
  • 9 篇 china industrial...
  • 9 篇 northeastern uni...
  • 8 篇 department of el...
  • 8 篇 chinese acad sci...
  • 8 篇 university of ch...
  • 8 篇 nanyang technol ...
  • 8 篇 beijing univ pos...
  • 8 篇 electronics and ...
  • 8 篇 state key labora...

作者

  • 14 篇 singh bhim
  • 12 篇 murata m
  • 11 篇 mellouk abdelham...
  • 11 篇 liu yang
  • 10 篇 chuang lin
  • 9 篇 polese michele
  • 9 篇 zhang lei
  • 8 篇 kim jw
  • 8 篇 liu yan
  • 8 篇 zhang hongke
  • 8 篇 chen cailian
  • 8 篇 barolli leonard
  • 8 篇 samouylov konsta...
  • 7 篇 zarai faouzi
  • 7 篇 s. jagannathan
  • 7 篇 wolfgang kellere...
  • 7 篇 li jun
  • 7 篇 yan zhang
  • 6 篇 kirichek ruslan
  • 6 篇 ikenaga takeshi

语言

  • 10,256 篇 英文
  • 205 篇 其他
  • 90 篇 中文
  • 3 篇 西班牙文
  • 2 篇 捷克文
  • 2 篇 土耳其文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
  • 1 篇 乌克兰文
检索条件"任意字段=Conference on Internet Quality and Performance and Control of Network Systems"
10553 条 记 录,以下是441-450 订阅
排序:
Open RAN for detection of a jamming attack in a 5G network  97
Open RAN for detection of a jamming attack in a 5G network
收藏 引用
97th IEEE Vehicular Technology conference (VTC-Spring)
作者: Kryszkiewicz, Pawel Hoffmann, Marcin Poznan Univ Tech Inst Radiocommunicat Rimedo Labs Poznan Poland
One of the essential security threats for 5G networks is jamming. It is relatively easy to be performed utilizing cheap and publically available devices. Open Radio Access network (O-RAN) architecture is very suitable... 详细信息
来源: 评论
Wireless Sensor network Hop Count Theory Modeling and Deep Learning Prediction  4
Wireless Sensor Network Hop Count Theory Modeling and Deep L...
收藏 引用
4th IEEE International Maghreb Meeting of the conference on Sciences and Techniques of Automatic control and Computer Engineering, MI-STA 2024
作者: Sati, Salem Omar Abugharsa, Afif Misurata University Information Technology Faculty Libya
Wireless Sensor networks (WSNs) are utilized as distributed systems for wireless communication and data collection from sensors. A WSN can be represented as a graph consisting of sensors and wireless links. If this gr... 详细信息
来源: 评论
ClassDegSR: A Fast network for Degraded Image Super Resolution Based on Degrade Degree Classification  35
ClassDegSR: A Fast Network for Degraded Image Super Resoluti...
收藏 引用
35th Chinese control and Decision conference (CCDC)
作者: Yan, Weidan Chen, Can Ying, Junhao Feng, Yingying Du, Qunjian Zhang, Dengyin Nanjing Univ Posts & Telecommun Sch Internet Things Nanjing 210003 Peoples R China
Image degradation, which is caused by imaging devices instability, brings great challenges to single image super resolution (SISR). However, the existing degraded image super resolution (DegSR) networks reconstruct al... 详细信息
来源: 评论
Zadeh's Type-2 Fuzzy Logic systems: Precision and High-quality Prediction Intervals
Zadeh's Type-2 Fuzzy Logic Systems: Precision and High-Quali...
收藏 引用
IEEE International conference on Fuzzy systems (FUZZ-IEEE)
作者: Guven, Yusuf Koklu, Ata Kumbasar, Tufan Istanbul Tech Univ Control & Automat Engn Dept Istanbul Turkiye
General Type-2 (GT2) Fuzzy Logic systems (FLSs) are perfect candidates to quantify uncertainty, which is crucial for informed decisions in high-risk tasks, as they are powerful tools in representing uncertainty. In th... 详细信息
来源: 评论
IoT Security: Cost-Effective Solution for Detecting Multiple Attacks in IoT network Using Machine Learning  1st
IoT Security: Cost-Effective Solution for Detecting Multiple...
收藏 引用
1st International conference on Electrical systems and Smart Technologies, ICESST 2024
作者: Rouagubi, Abdelkabir Benmalek, Elmehdi Enassiri, Omar Engineering Sciences Laboratory National School of Applied Sciences Ibn Tofail University Kenitra Morocco ENSAM de Rabat Mohammed V University of Rabat Rabat Morocco
The exponential expansion of the internet of Things (IoT) has resulted in a heightened level of automation and connectedness among gadgets, eliminating the need for deliberate user involvement, thereby augmenting the ... 详细信息
来源: 评论
Optimal denial-of-service attack scheduling for remote state estimation via sequential observations  43
Optimal denial-of-service attack scheduling for remote state...
收藏 引用
43rd Chinese control conference, CCC 2024
作者: Yang, Xinxin Ni, Yuqing Chen, Xiaomeng Chen, Shan Liu, Fei Jiangnan University The Key Laboratory of Advanced Process Control for Light Industry Ministry of Education School of Internet of Things Engineering Wuxi214122 China Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Hong Kong999077 Hong Kong
This study investigates the optimal allocation problem of attack energy in multi-system remote state estimation for Cyber-Physical systems (CPSs). We consider a scenario where there are M independent systems, each equ... 详细信息
来源: 评论
Proceedings - 2024 2nd International conference on Intelligent control and Computing, IC-C 2024
Proceedings - 2024 2nd International Conference on Intellige...
收藏 引用
2nd International conference on Intelligent control and Computing, IC-C 2024
The proceedings contain 14 papers. The topics discussed include: a study on optimizing indoor air quality through the integration of multi-point monitoring and the design of a wet scrubber;phytoplankton classification...
来源: 评论
Zeroth-Order Feedback Optimization for Inverter-based Volt-VAR control in Wind Farm  9
Zeroth-Order Feedback Optimization for Inverter-based Volt-V...
收藏 引用
9th International conference on Power and Renewable Energy
作者: Li, Siyun Wu, Wenchuan Xu, Jun Dong, Jihui Wang, Fanhua Yuan, Qihai Tsinghua Univ Dept Elect Engn Beijing Peoples R China Tsinghua Univ Sichuan Energy Internet Res Inst Chengdu Peoples R China Inner Mongolia Chahar New Energy Co Ltd China Ulanqab Peoples R China
Significant penetration of wind power into power systems gives rise to severe power quality concerns, especially voltage violations. In wind farms, the system model parameters are usually inaccurate or even unknown, w... 详细信息
来源: 评论
IoT-Enabled Real-Time Management of Smart Grids With Demand Response Aggregators
收藏 引用
IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS 2022年 第1期58卷 102-112页
作者: Estebsari, Abouzar Mazzarino, Pietro Rando Bottaccioli, Lorenzo Patti, Edoardo London South Bank Univ London SE1 0AA England Politecn Torino I-10129 Turin Italy
Integration of widely distributed small-scale renewable energy sources like rooftop photovoltaic panels and emerging loads like plug-in electric vehicles would cause more volatility in total net demand of distribution... 详细信息
来源: 评论
Attack Detection on internet of Things Devices using Machine Learning Techniques  7
Attack Detection on Internet of Things Devices using Machine...
收藏 引用
7th International conference on Intelligent Computing and control systems, ICICCS 2023
作者: Sharma, Yatharth Kumar, Vansh Chaudhary, Himanshi KIET Group of Institutions Department of Computer Science and Engineering Ghaziabad India
Today, the exponential growth of technology and the boom in connection demand has resulted in significant growth of internet of Things (IoT) devices. In light of the enormous increase in smart devices, secure communic... 详细信息
来源: 评论