咨询与建议

限定检索结果

文献类型

  • 10 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 13 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 6 篇 计算机科学与技术...
    • 4 篇 软件工程
    • 2 篇 电气工程
    • 2 篇 信息与通信工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 轻工技术与工程
    • 1 篇 网络空间安全
  • 3 篇 理学
    • 3 篇 数学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 法学

主题

  • 1 篇 magnetic flux
  • 1 篇 air gaps
  • 1 篇 direct product a...
  • 1 篇 dc-dc converters
  • 1 篇 rotors
  • 1 篇 5g
  • 1 篇 current codecs
  • 1 篇 mixed constraint...
  • 1 篇 discrete wavelet...
  • 1 篇 handover
  • 1 篇 windings
  • 1 篇 stator windings
  • 1 篇 resistance
  • 1 篇 hdm
  • 1 篇 optimization
  • 1 篇 data mining
  • 1 篇 authentication
  • 1 篇 wavelet-based im...
  • 1 篇 compression limi...
  • 1 篇 co2

机构

  • 2 篇 leti laboratory ...
  • 1 篇 department of cy...
  • 1 篇 gunma university...
  • 1 篇 yarmouk universi...
  • 1 篇 department of el...
  • 1 篇 dep. of business...
  • 1 篇 school of comput...
  • 1 篇 applied science ...
  • 1 篇 alhuson universi...
  • 1 篇 dep.of electrica...
  • 1 篇 university of pe...
  • 1 篇 dep.of electroni...
  • 1 篇 yarmouk universi...
  • 1 篇 dipartimento ene...
  • 1 篇 trine university...
  • 1 篇 dep.of mechanica...
  • 1 篇 college of compu...
  • 1 篇 dept. of compute...
  • 1 篇 school of comput...
  • 1 篇 dep.of informati...

作者

  • 2 篇 faouzi zarai
  • 2 篇 sirine ben ameur
  • 2 篇 salima smaoui
  • 1 篇 xin yibo
  • 1 篇 zbigniew gmyrek
  • 1 篇 chafaa hamrouni
  • 1 篇 khalid m.o. naha...
  • 1 篇 mohammad alauthm...
  • 1 篇 xiaohui ji
  • 1 篇 yang ching-yu
  • 1 篇 qais al-na'amneh
  • 1 篇 hasan gharaibeh
  • 1 篇 francesc aulí-ll...
  • 1 篇 joan serra-sagri...
  • 1 篇 k.f.hsiao
  • 1 篇 luca ferraris
  • 1 篇 slim chaoui
  • 1 篇 victor sanchez
  • 1 篇 zhuo huang
  • 1 篇 mohammad s. obai...

语言

  • 13 篇 英文
检索条件"机构=Dep.of Computer and Information Engineering"
13 条 记 录,以下是1-10 订阅
排序:
A Controller-Based Architecture for information Centric Network Construction and Topology management
收藏 引用
China Communications 2018年 第7期15卷 131-145页
作者: Zeinab Zali Massoud Reza Hashemi Ilaria Cianci Alfredo Grieco Gennaro Boggia Department of Electrical and Computer Engineering Isfahan University of Technology DEI Dep.of Electrical and Information Engineering
information-Centric Networking(ICN) has recently emerged as a result of the increased demand to access contents regardless of their location in the network services. This new approach facilitates content distribution ... 详细信息
来源: 评论
5G Smart Mobility Management Based Fuzzy Logic Controller Unit
收藏 引用
computers, Materials & Continua 2022年 第6期71卷 4941-4953页
作者: Chafaa Hamrouni Slim Chaoui Taif University-Khurma Univ.College-Department of Computer Sciences Khurma2935Kingdom of Saudi Arabia College of Computer and Information Sciences Dep.of Computer Engineering and NetworksJouf UniversitySkakaK.S.A
In the paper,we propose a fuzzy logic controller system to be implemented for smart mobility management in the 5G wireless communication *** management is considered as a main issue for all-IP mobile networks future *... 详细信息
来源: 评论
Study on a novel DC/DC converter based on interleaved parallel
Study on a novel DC/DC converter based on interleaved parall...
收藏 引用
2nd International Workshop on Intelligent Systems and Applications, ISA2010
作者: Xin, Yibo Wu, Xin Fang, Huajing Dep.of Control Science and Engineering HuaZhong University of Science and Technology Wuhan China Dep. of Electrical Engineering and Automation Luoyang Institute of Science and Technology Luoyang 471023 China Dep.of Computer and Information Engineering Luoyang Institute of Science and Technology Luoyang China
This paper introduces the design of the parallel connection of DC/DC power supplies. The topology of system configuration and performed modeling were stated. The problems such as the ripple electric current sharing of... 详细信息
来源: 评论
Detecting Injection vulnerabilities in Executable Codes with Concolic Execution
Detecting Injection vulnerabilities in Executable Codes with...
收藏 引用
2017 IEEE 8th International Conference on Software engineering and Service Science
作者: Maryam Mouzarani Babak Sadeghiyan Mohammad Zolfaghari Dep.of Computer Engineering& Information Technology Amirkabir University of Technology Dep.of Electronic& Computer Engineering Isfahan University of Technology
Various methods have been suggested for detecting injection vulnerabilities in web-based applications by now. However, some injection vulnerabilities are not only web-based but also occur in stand-alone applications, ...
来源: 评论
Compression limits of wavelet-based image coding
Compression limits of wavelet-based image coding
收藏 引用
Data Compression Conference
作者: Francesc Aulí-Llinàs Joan Serra-Sagristà Victor Sanchez Dep.of Information and Communications Engineering Universitat Autònoma de Barcelona Dep.of Computer Science University of Warwick
This work defines an entropy-based measure aimed to establish the compression limits of wavelet-based image coding. This measure serves to appraise the efficiency of current codecs, determining whether there is margin... 详细信息
来源: 评论
Multipurpose watermarking based on blind vector quantization (BVQ)
收藏 引用
Journal of information Hiding and Multimedia Signal Processing 2011年 第3期2卷 236-246页
作者: Lin, Chih-Hung Yang, Ching-Yu Dep.of Graduate Institute of Mathematics and Science Education National Chiayi University No.85 Wenlong Vil. Minxiong Township Chiayi County 62103 Taiwan Dept. of Computer Science and Information Engineering National Penghu University of Science and Technology No. 300 Liu-Ho Rd. Magong Penghu 880 Taiwan
Several different digital watermarking methods have been researched and proposed in the last ten years. However, most of the proposed methods focused on a single purpose. Recently, some multipurpose watermarking metho... 详细信息
来源: 评论
Optimization Method for Mixed Constraints Problem Solving
Optimization Method for Mixed Constraints Problem Solving
收藏 引用
2010 IEEE International Conference on Intelligent Computing and Intelligent Systems(2010 IEEE 智能计算与智能系统国际会议 ICIS 2010)
作者: Xiaohui Ji Zhuo Huang School of Information Engineering China University of Geosciences Beijing State Key Laboratory of C Dep.of Computer and Information Sei.and Eng.University of Florida Gainesville FL USA
This paper presents a new method that solves a mixed constraints problem by transforming it into a mixed integer programming problem. The method builds the connection between the feasibility of a mixed constraint prob... 详细信息
来源: 评论
A lightweight mutual authentication mechanism for improving fast PMIPV6-based network mobility scheme
A lightweight mutual authentication mechanism for improving ...
收藏 引用
IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)
作者: Sirine Ben Ameur Faouzi Zarai Salima Smaoui Mohammad S. Obaidat K.F. Hsiao LETI laboratory University of Sfax Tunisia Computer Science and Software Engineering Department Monmouth University NJ USA Dep.of Information Management Ming-Chuan University Taiwan
In the last decade, the request for Internet access in heterogeneous environments keeps on growing, principally in mobile platforms such as buses, airplanes and trains. Consequently, several extensions and schemes hav... 详细信息
来源: 评论
A LIGHTWEIGHT MUTUAL AUTHENTICATION MECHANISM FOR IMPROVING FAST PMIPV6-BASED NETWORK MOBILITY SCHEME
A LIGHTWEIGHT MUTUAL AUTHENTICATION MECHANISM FOR IMPROVING ...
收藏 引用
2014 4th IEEE International Conference on Network Infrastructure and Digital Content
作者: Sirine Ben Ameur Faouzi Zarai Salima Smaoui Mohammad S.Obaidat K.F.Hsiao LETI laboratory University of SfaxTunisia Computer Science and Software Engineering Department Monmouth University NJ 07764 USA Dep.of Information Management Ming-Chuan University
In the last decade, the request for Internet access in heterogeneous environments keeps on growing, principally in mobile platforms such as buses, airplanes and trains. Consequently, several extensions and schemes hav... 详细信息
来源: 评论
Next Generation Image Watermarking via Combined DWT-SVD Technique  2
Next Generation Image Watermarking via Combined DWT-SVD Tech...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Al-Na'amneh, Qais Almomani, Ammar Nasayreh, Ahmad Nahar, Khalid M.O. Gharaibeh, Hasan Al Mamlook, Rabia Emhamed Alauthman, Mohammad Applied Science Private University Department Of Cyber Security Amman Jordan School Of Computing Skyline University College P.O. Box 1797 Sharjah United Arab Emirates AlHuson University College AlBalqa Applied University I. T. Department Irbid Jordan Yarmouk University Department Of Computer Sciences Irbid211633 Jordan Yarmouk University Faculty Of Information Technology Computer Sciences Irbid211633 Jordan Trine University Dep. Of Business Administration IN United States University Of Zawia Dep.of Mechanical And Industrial Engineering Tripoli Libya University Of Petra Faculty Of Information Technology Department Of Information Security Amman Jordan
Personal computers and the Internet are used in different areas and are easier to use. Most data is easy to transmit and duplicate in digital format, and being tampered with and stolen easily leads to issues for conte... 详细信息
来源: 评论