咨询与建议

限定检索结果

文献类型

  • 3,302 篇 会议
  • 2,000 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,339 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,147 篇 工学
    • 1,970 篇 计算机科学与技术...
    • 1,522 篇 软件工程
    • 952 篇 信息与通信工程
    • 484 篇 电气工程
    • 472 篇 电子科学与技术(可...
    • 399 篇 控制科学与工程
    • 274 篇 生物工程
    • 213 篇 生物医学工程(可授...
    • 190 篇 光学工程
    • 172 篇 机械工程
    • 168 篇 仪器科学与技术
    • 151 篇 动力工程及工程热...
    • 119 篇 化学工程与技术
    • 99 篇 材料科学与工程(可...
    • 87 篇 网络空间安全
    • 84 篇 安全科学与工程
  • 1,644 篇 理学
    • 823 篇 数学
    • 554 篇 物理学
    • 313 篇 生物学
    • 249 篇 统计学(可授理学、...
    • 171 篇 系统科学
    • 128 篇 化学
  • 719 篇 管理学
    • 479 篇 管理科学与工程(可...
    • 249 篇 图书情报与档案管...
    • 234 篇 工商管理
  • 239 篇 医学
    • 194 篇 临床医学
    • 164 篇 基础医学(可授医学...
    • 88 篇 药学(可授医学、理...
  • 121 篇 法学
    • 89 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 90 篇 教育学
  • 50 篇 农学
  • 22 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 160 篇 computer network...
  • 138 篇 computer science
  • 115 篇 bandwidth
  • 106 篇 hadron colliders
  • 105 篇 protocols
  • 87 篇 throughput
  • 87 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 79 篇 computer archite...
  • 79 篇 wireless communi...
  • 77 篇 internet
  • 72 篇 accuracy
  • 71 篇 routing
  • 71 篇 computational mo...
  • 68 篇 delay
  • 67 篇 resource managem...
  • 65 篇 monitoring
  • 65 篇 feature extracti...
  • 64 篇 costs
  • 64 篇 machine learning

机构

  • 150 篇 national and kap...
  • 150 篇 centro brasileir...
  • 149 篇 istanbul technic...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 147 篇 university of sp...
  • 145 篇 brunel universit...
  • 145 篇 academy of scien...
  • 145 篇 indian institute...
  • 145 篇 charles universi...
  • 142 篇 university of de...
  • 140 篇 rwth aachen univ...
  • 139 篇 department of ph...
  • 138 篇 università di to...
  • 138 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 134 篇 zhejiang univers...
  • 131 篇 department of ph...
  • 130 篇 università di ca...
  • 130 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 5,104 篇 英文
  • 143 篇 其他
  • 84 篇 中文
  • 9 篇 日文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5339 条 记 录,以下是471-480 订阅
排序:
Modified Bat Algorithm: A Newly Proposed Approach for Solving Complex and Real-World Problems
arXiv
收藏 引用
arXiv 2024年
作者: Umar, Shahla U. Rashid, Tarik A. Ahmed, Aram M. Hassan, Bryar A. Baker, Mohammed Rashad Network Department College of Computer Science and Information Technology Kirkuk University Kirkuk Iraq Computer Science and Engineering Department School of Science and Engineering University of Kurdistan Hewler KRI Iraq Department of Computer Science College of Science Charmo University Sulaimani Chamchamal46023 Iraq
Bat Algorithm (BA) is a nature-inspired metaheuristic search algorithm designed to efficiently explore complex problem spaces and find near-optimal solutions. The algorithm is inspired by the echolocation behavior of ... 详细信息
来源: 评论
Numerical analysis of unsteady free convection under the combined influence of inclined magnetohydrodynamic and exothermic chemical reaction in an enclosure filled with nanofluid
收藏 引用
International Journal of Thermofluids 2024年 23卷
作者: Alaydamee, Hussein H. Alomari, Mohammed Azeez Al-Salami, Qusay H. Alyousuf, Farah Q.A. Alqurashi, Faris Flayyih, Mujtaba A. Department of Chemical Engineering University of Al-Qadisiyah College of Engineering Al-Qadisiyah58002 Iraq Department of Mechanical Engineering University of Al-Qadisiyah Ad-Diwaniyah58001 Iraq College of Engineering University of Warith Al-Anbiyaa Karbala Iraq Department of Business Administration College of Administrative and Financial Sciences Cihan University-Erbil Iraq Department of Computer Network College of Engineering and Computer Science Lebanese French University Erbil Kurdistan Region Iraq Mechanical Engineering Dept. College of Engineering University of Bisha Bisha Saudi Arabia Biomedical Engineering Department College of Engineering and Technologies Al-Mustaqbal University Hillah Iraq
Unsteady study of the natural convection of aluminum oxide-water nanofluid within a trapezoidal geometry containing a circular cylinder located at its center. Finite Element method has been considered for the numerica... 详细信息
来源: 评论
Secrecy energy efficiency maximization in D2D-enabled MEC networks: a GNN-based approach  3
Secrecy energy efficiency maximization in D2D-enabled MEC ne...
收藏 引用
3rd International Conference on Electronic Information engineering, Big Data, and computer Technology, EIBDCT 2024
作者: Hu, Jingying Zhang, Zhifei Ge, Yiyang Mao, Jin Chu, Zhipeng Xiong, Ke Fan, Pingyi Eng. Res. Center of Network Management Technology for High Speed Railway of Ministry of Education School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China Collaborative Innovation Center of Railway Traffic Safety Beijing Jiaotong University Beijing100044 China National Engineering Research Center of Advanced Network Technologies Beijing Jiaotong University Beijing100044 China Department of Electronic Engineering Tsinghua University Beijing100084 China
This paper investigates the device-to-device (D2D)-enabled mobile edge computing (MEC) network, where multiple users offload their tasks to an MEC server or their paired devices for computing. In such a network, secre... 详细信息
来源: 评论
Anomaly Detection in Quasi-Periodic Time Series based on Automatic Data Segmentation and Attentional LSTM-CNN (Extended Abstract)  39
Anomaly Detection in Quasi-Periodic Time Series based on Aut...
收藏 引用
39th IEEE International Conference on Data engineering, ICDE 2023
作者: Liu, Fan Zhou, Xingshe Cao, Jinli Wang, Zhu Wang, Tianben Wang, Hua Zhang, Yanchun Nanjing Research Institute of Electronics Technology Nanjing China School of Computer Science Northwestern Polytechnical University Xi'an China Department of Computer Science and Computer Engineering La Trobe University Melbourne Australia Northwest A&f University Yangling China College of Engineering and Science Victoria University Melbourne Australia Guangzhou University Guangzhou China New Network Dept. Pengcheng Lab Shenzhen China
Quasi-periodic time series (QTS) exists widely in the real world, and it is important to detect the anomalies of QTS. In this paper, we propose an automatic QTS anomaly detection framework (AQADF) consisting of a two-... 详细信息
来源: 评论
Numerical analysis of free convection under the influence of radiation and inclined MHD in a triangular cavity filled with hybrid nanofluid and a porous fin
收藏 引用
International Journal of Thermofluids 2024年 24卷
作者: Hassan, Ahmed M. Alomari, Mohammed Azeez Al-Salami, Qusay H. Alyousuf, Farah Q.A. Alqurashi, Faris Flayyih, Mujtaba A. Department of Mechanical Engineering University of Al-Qadisiyah Al-Qadisiyah58001 Iraq Department of Mechanical Engineering University of Al-Qadisiyah Ad-Diwaniyah58001 Iraq College of Engineering University of Warith Al-Anbiyaa Karbala Iraq Department of Business Administration College of Administrative and Financial Sciences Cihan University Erbil Iraq Department of Computer Network College of Engineering and Computer Science Lebanese French University Kurdistan Region Erbil Iraq Mechanical Engineering Dept. College of Engineering University of Bisha Bisha Saudi Arabia Biomedical Engineering Department College of Engineering and Technologies Al-Mustaqbal University Hillah Iraq
This study presents a novel investigation into the thermal behavior of a hybrid nanofluid (MgO − Ag − H2O) in natural convection around a porous fin in a triangular enclosure under the influence of radiation and magne... 详细信息
来源: 评论
Maximizing Efficiency: Relocation and Deduplication for Result Caching in Distributed and Collaborative Edge Computing networks
Maximizing Efficiency: Relocation and Deduplication for Resu...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: Abbas Yekanlou Jun Cai Samuel D. Okegbile Department of Electrical and Computer Engineering Network Intelligence and Innovation Lab (NI2L) Concordia University Montreal Canada
With the rapid growth of internet of things (IoT) devices, edge computing has emerged as a crucial technology for delivering low-latency and resource-efficient services. However, the surge in edge computing capabiliti... 详细信息
来源: 评论
Propagating Threat Scores with a TLS Ecosystem Graph Model Derived by Active Measurements
Propagating Threat Scores with a TLS Ecosystem Graph Model D...
收藏 引用
network Traffic Measurement and Analysis Conference (TMA)
作者: Markus Sosnowski Patrick Sattler Johannes Zirngibl Tim Betzer Georg Carle Technical University of Munich Germany Department of Computer Engineering Chair of Network Architectures and Services TUM School of Computation Information and Technology
The Internet is shaped by independent actors and heterogeneous deployments. With the wide adoption of Transport Layer Security (TLS), a whole ecosystem of intertwined entities emerged. Acquiring a comprehensive view a... 详细信息
来源: 评论
A Novelty Decision-Making Based on Hybrid Indexing, Clustering, and Classification Methodologies: An Application to Map the Relevant Experts Against the Rural Problem
Decision Making: Applications in Management and Engineering
收藏 引用
Decision Making: Applications in Management and engineering 2024年 第2期7卷 132-171页
作者: Faisal, Muhammad Rahman, Titik Khawa Abd Mulyadi, Ida Aryasa, Komang Irmawati Thamrin, Musdalifa Department of Computer Science STMIK Profesional Makassar Indonesia Department of Ph.D ICT AeU University Kuala Lumpur Malaysia Department of Informatics Engineering DIPA University Makassar Indonesia Department of Computer and Network Engineering Politeknik Negeri Ujung Pandang Indonesia Department of Informatics Management STMIK Profesional Makassar Indonesia
Exploring the potential of technology in addressing Sustainable Development Goals (SDGs) within intricate rural contexts holds paramount significance. Sustainable rural development holds profound significance for both... 详细信息
来源: 评论
Secured Cluster-Based Electricity Theft Detectors Against Blackbox Evasion Attacks
Secured Cluster-Based Electricity Theft Detectors Against Bl...
收藏 引用
Consumer Communications and networking Conference, CCNC IEEE
作者: Islam Elgarhy Ahmed T. El-Toukhy Mahmoud M. Badr Mohamed Mahmoud Mostafa M. Fouda Maazen Alsabaan Hisham A. Kholidy Department of Electrical and Computer Engineering Tennessee Tech. University Cookeville TN USA Department of Computer Systems Faculty of Computer and Information Sciences Ain Shams University Cairo Egypt Department of Electrical Engineering College of Engineering Al-Azhar University Cairo Egypt Department of Network and Computer Security College of Engineering SUNY Polytechnic Institute Utica NY USA Department of Electrical and Computer Engineering Idaho State University Pocatello ID USA Center for Advanced Energy Studies (CAES) Idaho Falls ID USA Department of Computer Engineering College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia
In smart power grids, electricity theft causes huge economic losses to electrical utility companies. Machine learning (ML), especially deep neural network (DNN) models hold state-of-the-art performance in detecting el...
来源: 评论
A Cloud Computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm  18th
A Cloud Computing User Experience Focused Load Balancing Met...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Luo, Jihai Dong, Chen Chen, Zhenyi Xu, Li Chen, Tianci College of Computer and Data Science - Fuzhou University Xueyuan Road Fujian Fuzhou360108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Department of Computer Science and Engineering University of South Florida TampaFL33620 United States College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China
The development of the software and hardware has brought about the abundance and overflow of computing resources. Many Internet companies can lease idle computing resources based on the peak and valley cycles of usage... 详细信息
来源: 评论