咨询与建议

限定检索结果

文献类型

  • 1,011 篇 会议
  • 994 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,012 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,291 篇 工学
    • 843 篇 计算机科学与技术...
    • 653 篇 软件工程
    • 332 篇 信息与通信工程
    • 156 篇 电气工程
    • 135 篇 电子科学与技术(可...
    • 128 篇 控制科学与工程
    • 95 篇 生物工程
    • 81 篇 机械工程
    • 75 篇 核科学与技术
    • 73 篇 光学工程
    • 63 篇 生物医学工程(可授...
    • 61 篇 网络空间安全
    • 57 篇 动力工程及工程热...
    • 55 篇 仪器科学与技术
    • 50 篇 化学工程与技术
    • 46 篇 交通运输工程
    • 40 篇 安全科学与工程
  • 706 篇 理学
    • 302 篇 物理学
    • 289 篇 数学
    • 115 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 50 篇 化学
    • 44 篇 系统科学
  • 340 篇 管理学
    • 209 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 74 篇 工商管理
  • 78 篇 医学
    • 59 篇 临床医学
    • 44 篇 基础医学(可授医学...
  • 52 篇 法学
    • 29 篇 社会学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 3 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 69 篇 computer network...
  • 53 篇 semantics
  • 46 篇 feature extracti...
  • 35 篇 accuracy
  • 34 篇 computational mo...
  • 32 篇 protocols
  • 32 篇 robustness
  • 30 篇 training
  • 28 篇 computer science
  • 28 篇 w & z bosons
  • 28 篇 deep learning
  • 27 篇 bandwidth
  • 27 篇 security
  • 26 篇 federated learni...
  • 24 篇 wireless communi...
  • 24 篇 higgs bosons
  • 24 篇 wireless sensor ...
  • 23 篇 internet
  • 22 篇 data mining

机构

  • 149 篇 centro brasileir...
  • 149 篇 istanbul technic...
  • 148 篇 national and kap...
  • 148 篇 yerevan physics ...
  • 147 篇 university of sp...
  • 146 篇 universidad iber...
  • 145 篇 brunel universit...
  • 145 篇 academy of scien...
  • 144 篇 indian institute...
  • 144 篇 charles universi...
  • 142 篇 department of ph...
  • 141 篇 university of de...
  • 139 篇 imperial college...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 138 篇 indian institute...
  • 135 篇 infn sezione di ...
  • 133 篇 institute for nu...
  • 131 篇 zhejiang univers...
  • 131 篇 centro de invest...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 1,894 篇 英文
  • 76 篇 其他
  • 44 篇 中文
检索条件"机构=Computer Network Engineering Technology Center"
2012 条 记 录,以下是101-110 订阅
排序:
NM-LUD: A NLOS Mitigation Method with Low-cost UWB Devices for Indoor Positioning  8
NM-LUD: A NLOS Mitigation Method with Low-cost UWB Devices f...
收藏 引用
8th International Conference on computer and Communication Systems, ICCCS 2023
作者: Wu, Tong Li, Han Gao, Bo Xiong, Ke Fan, Pingyi Ben Letaief, Khaled Eng. Res. Center of Network Management Technology for High Speed Railway of Ministry of Education School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China Beijing Jiaotong University Collaborative Innovation Center of Railway Traffic Safety Beijing100044 China Beijing Jiaotong University National Engineering Research Center of Advanced Network Technologies Beijing100044 China Tsinghua University Department of Electronic Engineering Beijing100084 China Hong Kong University of Science and Technology Department of Electrical and Computer Engineering Hong Kong Hong Kong
Ultra-wideband (UWB) is a popular technology for indoor positioning. However, non-line-of-sight (NLOS) propagation caused by human occlusion dramatically affects the accuracy of UWB-based indoor positioning. Most of t... 详细信息
来源: 评论
Automated AI Research on Cyber Attack Prediction and Security Design  6
Automated AI Research on Cyber Attack Prediction and Securit...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Madala, Ravikiran Vijayakumar, N. Nandini, N. Verma, Shanti Chandvekar, Samidha Devendra Singh, Devesh Pratap Network and Data Center Engineer Ph.D Information Technology University of Cumberlands DurhamNC United States Karpagam College of Engineering Department of Computer Science and Technology Coimbatore India Dr. Ambedkar Institute of Technology Department of Computer Science and Engineering Karnataka Bengaluru India L J University Department of Computer Application Gujarat Ahmedabad India Department of Information Technology Maharashtra New Panvel India Graphic Era Deemed to Be University Department of Computer Science and Engineering Uttrakhand Dehradun India
A fast expanding topic of study on automated AI is focused on the prediction and prevention of cyber-attacks using machine learning algorithms. In this study, we examined the research on applying machine learning algo... 详细信息
来源: 评论
Resource Allocation for Throughput Maximization in Cognitive Radio network with NOMA
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 195-212页
作者: Xiaoli He Yu Song Yu Xue Muhammad Owais Weijian Yang Xinwen Cheng School of Computer Science Sichuan University of Science and EngineeringZigong643000China Department of Network Information Management Center Sichuan University of Science and EngineeringZigong643000China School of Information Engineering South West University of Science and TechnologyMianyang621010China School of Computer and Software Nanjing University of Information Science and TechnologyJiangsu210044China Alhamd Islamic University Airport Road Quetta BalochistanPakistan
Spectrum resources are the precious and limited natural *** order to improve the utilization of spectrum resources and maximize the network throughput,this paper studies the resource allocation of the downlink cogniti... 详细信息
来源: 评论
Multi-Path Attention Inverse Discrimination network for Offline Signature Verification
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 3057-3071页
作者: Xiaorui Zhang Yingying Wang Wei Sun Qi Cui Xindong Wei School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing 210044China Department of Electrical and Computer Engineering University of WindsorWindsorN9B 3P4Canada School of Teacher Education Nanjing University of Information Science&TechnologyNanjing210044China
Signature verification,which is a method to distinguish the authenticity of signature images,is a biometric verification technique that can effectively reduce the risk of forged signatures in financial,legal,and other... 详细信息
来源: 评论
A Triangular Stable Node network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Qing Gao, Qian Fan, Jun Zhang, Zhiqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd. No.1999 Shunhua road Shandong Jinan250101 China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
Research and Innovation in Next Generation Security and Privacy in Industry 5.0 Iot  6
Research and Innovation in Next Generation Security and Priv...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Navale, Geeta S. Madala, Ravikiran Managuli, Manjunath Jayalakshmi, N. Kadiravan, G. Rawat, Ruchira Sinhgad Institute of Technology and Science Department of Computer Engineering Maharashtra Pune India Ph.D Information Technology Network and Data Center Engineer University of Cumberlands DurhamNC United States KLS Gogte Institute of Technology Department of Electronics and Communication Engineering Karnataka Belagavi India PSNA College of Engineering and Technology Master of Computer Applications Tamilnadu Dindigul India KL Deemed to Be University Department of Computer Science and Information Technology Andhra Pradsh India Graphic Era Deemed to Be University Department of Computer Science and Engineering Uttrakhand Dehradun India
The objective of the newest manufacturing paradigm, known as 'Industry 5.0,'is to combine human intelligence with cutting-edge technology like the Internet of Things (IoT), artificial intelligence (AI), and ro... 详细信息
来源: 评论
Multimedia Fingerprinting Codes Resistant to Linear Attacks and Adversarial Noise
Multimedia Fingerprinting Codes Resistant to Linear Attacks ...
收藏 引用
2023 International Symposium on networks, computers and Communications, ISNCC 2023
作者: Fernandez, Marcel Kabatiansky, Grigory Kamel, Ibrahim Miao, Ying Rabie, Tamer Farouk The Technical University of Catalonia Department of Network Engineering Spain Center for Next Generation Wireless and IoT Skolkovo Institute of Science and Technology Russia University of Sharjah Electrical and Computer Engineering United Arab Emirates Institute of Engineering Information and Systems University of Tsukuba Japan
It has recently been shown that there are no multimedia fingerprinting codes that can find all malicious users when they use arbitrary linear attacks plus adversarial noise. It is shown that such codes exist if the co...
来源: 评论
Optimization of Data Encryption Algorithms in Information Construction
Optimization of Data Encryption Algorithms in Information Co...
收藏 引用
2024 International Conference on Distributed Systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Zhu, Shuai You, Yi Zhou, Bo Chen, Chuanting Yi, Xueqin Hankou University Network Information Center Wuhan China Hankou University School of Computer Science and Technology Wuhan China Wuhan University of Engineering Science Library and Information Center Wuhan China Hankou University School of Music Wuhan China Hankou University Board Office Wuhan China
Data encryption algorithms play a crucial role in information construction, effectively protecting data security. The problems in traditional research include a lack of targeting, a balance between efficiency and safe... 详细信息
来源: 评论
AoI-based Joint User Scheduling and Transmit Power Optimization in High-speed Railway Mobile networks  13
AoI-based Joint User Scheduling and Transmit Power Optimizat...
收藏 引用
13th International Conference on Computing Communication and networking Technologies, ICCCNT 2022
作者: Zhang, Xiang Luan, Ning Lu, Yuping Zhang, Zhifei Dong, Rui Xiong, Ke Engineering Research Center of Network Management Technology for High Speed Railway Ministry of Education School of Computer and Information Technology Beijing Jiaotong University Beijing10044 China
This paper investigates the age of information (AoI)-based joint user scheduling and transmit power optimization on high-speed railway mobile networks, where a base station (BS) positioned close to the railway schedul... 详细信息
来源: 评论
Handover Enhancement in High-Speed Railway 5G networks: A LSTM-based Prediction Method  13
Handover Enhancement in High-Speed Railway 5G Networks: A LS...
收藏 引用
13th International Conference on Computing Communication and networking Technologies, ICCCNT 2022
作者: Lu, Yuping Zhang, Cuntao Chen, Deen Zhang, Wanle Xiong, Ke Engineering Research Center of Network Management Technology for High Speed Railway Ministry of Education School of Computer and Information Technology Beijing Jiaotong University Beijing10044 China
This paper focuses on the handover performance enhancement of high-speed railway (HSR) 5G millimeter wave(mmWave) networks. As starting the handover at different time may yield very different performances, we propose ... 详细信息
来源: 评论