咨询与建议

限定检索结果

文献类型

  • 3,082 篇 会议
  • 1,366 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 4,504 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,641 篇 工学
    • 1,471 篇 计算机科学与技术...
    • 1,135 篇 软件工程
    • 1,017 篇 信息与通信工程
    • 663 篇 电子科学与技术(可...
    • 425 篇 电气工程
    • 322 篇 控制科学与工程
    • 292 篇 光学工程
    • 228 篇 仪器科学与技术
    • 209 篇 生物工程
    • 168 篇 生物医学工程(可授...
    • 159 篇 动力工程及工程热...
    • 153 篇 机械工程
    • 105 篇 化学工程与技术
    • 98 篇 材料科学与工程(可...
    • 83 篇 交通运输工程
    • 78 篇 安全科学与工程
    • 72 篇 网络空间安全
  • 1,326 篇 理学
    • 605 篇 数学
    • 521 篇 物理学
    • 236 篇 生物学
    • 236 篇 统计学(可授理学、...
    • 124 篇 系统科学
    • 117 篇 化学
  • 496 篇 管理学
    • 350 篇 管理科学与工程(可...
    • 181 篇 工商管理
    • 173 篇 图书情报与档案管...
  • 178 篇 医学
    • 152 篇 临床医学
    • 120 篇 基础医学(可授医学...
    • 74 篇 公共卫生与预防医...
  • 93 篇 法学
    • 73 篇 社会学
  • 63 篇 经济学
  • 38 篇 农学
  • 37 篇 教育学
  • 18 篇 文学
  • 7 篇 军事学
  • 7 篇 艺术学
  • 1 篇 历史学

主题

  • 96 篇 wireless communi...
  • 89 篇 signal to noise ...
  • 84 篇 quality of servi...
  • 83 篇 bandwidth
  • 83 篇 wireless sensor ...
  • 80 篇 protocols
  • 76 篇 throughput
  • 72 篇 machine learning
  • 70 篇 computational mo...
  • 66 篇 accuracy
  • 65 篇 feature extracti...
  • 64 篇 wireless network...
  • 61 篇 internet of thin...
  • 61 篇 deep learning
  • 61 篇 optimization
  • 60 篇 bit error rate
  • 60 篇 mobile communica...
  • 59 篇 systems engineer...
  • 58 篇 interference
  • 57 篇 artificial intel...

机构

  • 110 篇 state key labora...
  • 45 篇 school of comput...
  • 44 篇 department of la...
  • 39 篇 research institu...
  • 37 篇 state key labora...
  • 37 篇 department of in...
  • 31 篇 department of co...
  • 31 篇 graduate school ...
  • 29 篇 department of el...
  • 27 篇 state key labora...
  • 25 篇 state key labora...
  • 24 篇 department of sy...
  • 21 篇 department of in...
  • 20 篇 universiti putra...
  • 20 篇 department of co...
  • 19 篇 state key labora...
  • 19 篇 institute of ult...
  • 18 篇 department of co...
  • 17 篇 ieee
  • 17 篇 school of comput...

作者

  • 63 篇 leonard barolli
  • 58 篇 fatos xhafa
  • 48 篇 arjan durresi
  • 47 篇 guo hong
  • 31 篇 yanikomeroglu ha...
  • 28 篇 shur m.s.
  • 25 篇 ng chee kyun
  • 25 篇 ryzhii v.
  • 24 篇 segal michael
  • 24 篇 ryzhii m.
  • 23 篇 fazirulhisyam ha...
  • 23 篇 otsuji t.
  • 23 篇 mesaritakis char...
  • 22 篇 nor kamariah noo...
  • 22 篇 chee kyun ng
  • 21 篇 akio koyama
  • 21 篇 demosthenes vouy...
  • 21 篇 xiang cheng
  • 21 篇 zhiping zhou
  • 20 篇 muhaidat sami

语言

  • 4,238 篇 英文
  • 173 篇 其他
  • 90 篇 中文
  • 2 篇 德文
  • 2 篇 日文
检索条件"机构=Computer and Communication Systems Engineering"
4504 条 记 录,以下是31-40 订阅
排序:
TRUSTCACHE: Trust-based Content Caching in Information-Centric Networks
TRUSTCACHE: Trust-based Content Caching in Information-Centr...
收藏 引用
2024 IEEE Global communications Conference, GLOBECOM 2024
作者: Tsikteris, Sean Rahman, Aisha B. Siraj, Md Sadman Charatsaris, Panagiotis Tsiropoulou, Eirini Eleni Papavassiliou, Symeon National Technical University of Athens Institute of Communication and Computer Systems School of Electrical and Computer Engineering Athens Greece University of New Mexico Dept. of Electrical and Computer Engineering AlbuquerqueNM United States
The Information-Centric Networking (ICN) paradigm has reshaped the modern network architectures and promises efficient content delivery to the end-users. This paper introduces TRUSTCACHE, a novel framework enabling th... 详细信息
来源: 评论
Frequency Dependent RSSI Behavior of Rotating Polarization Waves in Diverse Environmental Conditions  13
Frequency Dependent RSSI Behavior of Rotating Polarization W...
收藏 引用
13th IEEE International Conference on communication, Networks and Satellite, COMNETSAT 2024
作者: Ali, Muhammad Moazzam Hashim, Shaiful Jahari Ahmad, Zaid Ferré, Guillaume Rokhani, Fakhrul Zaman Chaudhary, Muhammad Akmal Universiti of Putra Malaysia Department of Computer and Communication Systems Engineering Malaysia Inspem Universiti of Putra Malaysia Department of Computer and Communication Systems Engineering Malaysia Islamabad Pakistan Univ. Bordeaux Cnrs Bordeaux Inp Ims Umr 5218 TalenceF-33400 France Ajman University Department of Electrical and Computer Engineering Ajman346 United Arab Emirates
This study examines the effectiveness of Rotating Polarization Waves (RPW) in Low Power Wide Area Networks (LPWAN) under various frequencies and environmental conditions. MATLAB simulations quantified the Received Sig... 详细信息
来源: 评论
Advancing Skin Cancer Detection: Deep Learning Approaches for Enhanced Diagnostic Accuracy
Advancing Skin Cancer Detection: Deep Learning Approaches fo...
收藏 引用
2024 International Conference on Advances in Computing Research on Science engineering and Technology, ACROSET 2024
作者: Chatterjee, Sandipan Sharma, Arpit Kumar Rathore, Pramod Singh Manipal University Department of IoT and Intelligent Systems Jaipur India Manipal University Department of Computer and Communication Engineering Jaipur India
Skin cancer, a common and potentially fatal condition, greatly benefits from early detection. This helps accurately identify whether lesions are malignant or benign, thereby aiding dermatologists in making well-inform... 详细信息
来源: 评论
Chlorophyll-based Saturable Absorber for Q-switched Pulse Generation in Er-Doped Fiber Laser Cavity  10
Chlorophyll-based Saturable Absorber for Q-switched Pulse Ge...
收藏 引用
10th IEEE International Conference on Photonics, ICP 2024
作者: Tarmizi, S.Z.A. Ahmad Mansor, M. Abidin, N.H. Zainol Mahdi, M.A. Mazlan, M.F. Computer and Communication Systems Engineering Universiti Putra Malaysia Selangor UPM Serdang 43400 Malaysia Department of Computing and Information Systems School of Engineering and Technology Sunway University Selangor 47500 Malaysia
In this paper, we present experimental results on the use of all-organic Chlorophyll-based saturable absorber (Chl-SA) extracted from spinach for the generation of Q- switched pulse. The Chl-SA was fabricated by depos... 详细信息
来源: 评论
iLIAC: An approach of identifying dissimilar groups on unstructured numerical image dataset using improved agglomerative clustering technique
收藏 引用
Multimedia Tools and Applications 2024年 第39期83卷 86359-86381页
作者: S, Sreedhar Kumar Ahmed, Syed Thouheed Fathima, Afifa Salsabil Mathivanan, Sandeep Kumar Jayagopal, Prabhu Saif, Abdu Gupta, Sachin Kumar Sinha, Garima Department of Computer Science and Engineering School of Engineering and Technology CMR University Karnataka Bengaluru India Department of Electrical Engineering Indian Institute of Technology Hyderabad Telangana Kandi India School of Computer Science and Engineering REVA University Bangalore India School of Computer Science and Engineering Galgotias University Uttar Pradesh Greater Noida203201 India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore632014 India Department of Communication and Computer Engineering Faculty of Engineering and IT Taiz University Taiz Yemen Katra India Department of Computer Science Engineering Jain University Bangalore India
Unstructured Numerical Image Dataset Separation (UNIDS) method employing an enhanced unsupervised clustering technique. The objective is to delineate an optimal number of distinct groups within the input grayscale (G-... 详细信息
来源: 评论
Careful Resume: Design and Analysis with Picoquic over Satellite Paths  12
Careful Resume: Design and Analysis with Picoquic over Satel...
收藏 引用
12th Advanced Satellite Multimedia systems Conference and the 18th Signal Processing for Space communications Workshop, ASMS/SPSC 2025
作者: Hofstatter, Matthias Deutschmann, Jörg Secchi, Raffaello Fairhurst, Gorry German, Reinhard Friedrich-Alexander-Universität Erlangen-Nürnberg Computer Networks and Communication Systems Germany University of Aberdeen Department of Engineering United Kingdom
Slow Start increases the congestion window by doubling each round trip until congestion is detected. As a result, reaching optimal speed typically takes several round trip times, especially important in high bandwidth... 详细信息
来源: 评论
Ruppert's Delaunay Triangulation Refinement Scheme for Optimal RSUs Placement in Vehicle to Infrastructure communication Network
收藏 引用
China communications 2023年 第7期20卷 303-320页
作者: Selvakumari P Chinnasamy A Sree Rathna Lakshmi NVS Sheela D Department of Computer Science and Engineering Tagore Engineering CollegeChennai 600048India Department of Data Science and Business Systems School of ComputingSRMIST kattankulathur CampusChennai 603203India Department of Electronics and Communication Engineering Department of ECE at Agni College of TechnologyChennai 603103India Department of Electronics and Communication Engineering Saveetha School of Engineering SIMATSChennai 600124India
Road Side Units(RSUs)are the essential component of vehicular communication for the objective of improving safety and mobility in the road *** are generally deployed at the roadside and more specifically at the inters... 详细信息
来源: 评论
Predicting software vulnerability based on software metrics: a deep learning approach
收藏 引用
Iran Journal of computer Science 2024年 第4期7卷 801-812页
作者: Agbenyegah, Francis Kwadzo Asante, Micheal Chen, Jinfu Akpaku, Ernest Department of Computer Science Kwame Nkrumah University of Science and Technology Kumasi Ghana School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China Department of Information Technology Faculty of Computing and Information Systems Ghana Communication Technology University Accra Ghana
The security of IT systems is the topmost priority of software developers. Software vulnerabilities undermine the security of computer systems. Lately, there have been a lot of reported issues of software vulnerabilit... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
Generating synthetic mixed-type tabular data by decoding samples from a latent-space: a case study in healthcare  28th
Generating synthetic mixed-type tabular data by decoding sam...
收藏 引用
28th International Conference on Knowledge Based and Intelligent information and engineering systems, KES 2024
作者: Drapala, Jaroslaw Swiatek, Jerzy Department of Computer Science and Systems Engineering Faculty of Information and Communication Technology Wroclaw University of Science and Technology Wroclaw50-370 Poland
Medical data are subject to privacy regulations, which severely limit AI specialists who wish to construct decision support systems for medicine. Large amounts of this data are tabular, indicating that they are organi... 详细信息
来源: 评论