咨询与建议

限定检索结果

文献类型

  • 2,212 篇 会议
  • 1,137 篇 期刊文献
  • 24 册 图书

馆藏范围

  • 3,373 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,026 篇 工学
    • 1,075 篇 计算机科学与技术...
    • 830 篇 软件工程
    • 791 篇 信息与通信工程
    • 422 篇 电子科学与技术(可...
    • 398 篇 电气工程
    • 262 篇 控制科学与工程
    • 160 篇 仪器科学与技术
    • 152 篇 光学工程
    • 137 篇 动力工程及工程热...
    • 123 篇 生物工程
    • 114 篇 机械工程
    • 83 篇 生物医学工程(可授...
    • 62 篇 网络空间安全
    • 60 篇 航空宇航科学与技...
    • 54 篇 材料科学与工程(可...
    • 52 篇 交通运输工程
    • 49 篇 化学工程与技术
    • 37 篇 安全科学与工程
  • 953 篇 理学
    • 538 篇 数学
    • 269 篇 物理学
    • 176 篇 统计学(可授理学、...
    • 149 篇 生物学
    • 137 篇 系统科学
    • 56 篇 化学
  • 399 篇 管理学
    • 295 篇 管理科学与工程(可...
    • 143 篇 工商管理
    • 116 篇 图书情报与档案管...
  • 88 篇 医学
    • 74 篇 临床医学
    • 61 篇 基础医学(可授医学...
  • 68 篇 法学
    • 45 篇 社会学
  • 35 篇 经济学
  • 19 篇 文学
  • 13 篇 军事学
  • 12 篇 农学
  • 7 篇 教育学
  • 6 篇 艺术学

主题

  • 120 篇 computer network...
  • 116 篇 bandwidth
  • 94 篇 quality of servi...
  • 90 篇 protocols
  • 84 篇 throughput
  • 83 篇 wireless sensor ...
  • 76 篇 wireless communi...
  • 71 篇 delay
  • 67 篇 wireless network...
  • 62 篇 telecommunicatio...
  • 60 篇 computer archite...
  • 60 篇 laboratories
  • 60 篇 computational mo...
  • 58 篇 computer science
  • 56 篇 intelligent netw...
  • 53 篇 interference
  • 52 篇 ip networks
  • 51 篇 routing
  • 51 篇 traffic control
  • 51 篇 resource managem...

机构

  • 72 篇 state key labora...
  • 63 篇 state key labora...
  • 35 篇 peng cheng labor...
  • 30 篇 computer enginee...
  • 28 篇 department of el...
  • 27 篇 state key labora...
  • 24 篇 state key labora...
  • 21 篇 frontiers scienc...
  • 21 篇 department of co...
  • 20 篇 state key labora...
  • 20 篇 department of el...
  • 19 篇 state key labora...
  • 18 篇 department of el...
  • 15 篇 state key labora...
  • 14 篇 state key labora...
  • 14 篇 xidian universit...
  • 13 篇 ieee
  • 13 篇 center for ultra...
  • 13 篇 national key lab...
  • 13 篇 peking universit...

作者

  • 32 篇 fred wang
  • 31 篇 han zhu
  • 30 篇 sarigiannidis pa...
  • 25 篇 zhu han
  • 25 篇 leon m. tolbert
  • 25 篇 argyriou vasilei...
  • 24 篇 panagiotis sarig...
  • 24 篇 zhong-ping jiang
  • 24 篇 xingjun wang
  • 23 篇 wang xingjun
  • 23 篇 vasileios argyri...
  • 21 篇 lagkas thomas
  • 21 篇 marios m. polyca...
  • 20 篇 cheng xiang
  • 20 篇 hui li
  • 20 篇 xiang cheng
  • 19 篇 thomas lagkas
  • 19 篇 christos g. pana...
  • 18 篇 al-dhahir naofal
  • 18 篇 bowers john e.

语言

  • 3,190 篇 英文
  • 98 篇 其他
  • 84 篇 中文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Networks and Engineering"
3373 条 记 录,以下是1-10 订阅
排序:
Millimeter Wave Massive MIMO Heterogeneous networks Using Fuzzy-Based Deep Convolutional Neural Network (FDCNN)
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 633-646页
作者: Hussain Alaaedi Masoud Sabaei Department of Computer Engineering at Computer Networks and Architecture Amirkabir University of TechnologyTehran***Iran
Enabling high mobility applications in millimeter wave(mmWave)based systems opens up a slew of new possibilities,including vehicle communi-cations in addition to wireless virtual/augmented *** narrow beam usage in add... 详细信息
来源: 评论
Hybrid DF and SIR Forwarding Strategy in Conventional and Distributed Alamouti Space-Time Coded Cooperative networks
收藏 引用
computer Modeling in engineering & Sciences 2025年 第2期142卷 1933-1954页
作者: Slim Chaoui Omar Alruwaili Faeiz Alserhani Haifa Harrouch Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySakaka72388Saudi Arabia Computer Science Department Applied CollegeUniversity of HailHail55424Saudi Arabia
In this paper,we propose a hybrid decode-and-forward and soft information relaying(HDFSIR)strategy to mitigate error propagation in coded cooperative *** the HDFSIR approach,the relay operates in decode-and-forward(DF... 详细信息
来源: 评论
Deep Learning-Based Approaches for Effective IoT Malware Classification  2
Deep Learning-Based Approaches for Effective IoT Malware Cla...
收藏 引用
2nd DMIHER International Conference on Artificial Intelligence in Healthcare, Education and Industry, IDICAIEI 2024
作者: Al Abbas, Marwa A. Abd Al-Mustaqbal University Collage of Computer Engineering Department of Computer Networks Engineering Babil Iraq
The Internet of Things (IoT) has gained significant attention as a research domain due to its wide-ranging applications. In this paper , we propose two deep learning models for IoT malware classification. Both models ... 详细信息
来源: 评论
Enhanced Neural Differential Distinguisher for Speck32/64 Using Attention Mechanisms and Multi Ciphertext Inputs
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第19期49卷 197-210页
作者: Jiang, Xue Li, Min Kaiyrbek, Makulov Lakhno, Valerii Andrii, Sahun School of Computer and Information Engineering Bengbu University Bengbu233030 China Department of Computer Systems Networks and Cybersecurity National University of Life and Environmental Sciences of Ukraine Kyiv03041 Ukraine Department of Computer Science Caspian University of Technology and Engineering Almaty050151 Kazakhstan
In recent years, neural network-based differential distinguishers have demonstrated significant advantages in accuracy and effi-ciency over traditional differential distinguishers in symmetric cipher differential anal... 详细信息
来源: 评论
Dual-Cloud Multi-Secret Sharing Architecture for Privacy Preserving Persistent Computation
收藏 引用
IEEE Transactions on Information Forensics and Security 2024年 19卷 7523-7535页
作者: Chen, Yu-Chi Yang, Jhe-Kai Yen, Hsin-Chan Lin, Pei-Wen National Taipei University of Technology Department of Computer Science and Information Engineering Taipei10608 Taiwan Yuan Ze University Department of Computer Science and Engineering Taoyuan32003 Taiwan Genie Networks Taipei114064 Taiwan
With the prevalence of artificial intelligence, people collect data through numerous sensors and use machine learning to create models for intelligent services. However, data privacy and massive data issues are raised... 详细信息
来源: 评论
Optimizing YOLOv8-cls: A Step Towards Smarter Edge Environments  1
Optimizing YOLOv8-cls: A Step Towards Smarter Edge Environme...
收藏 引用
1st International Conference on Emerging Technologies for Dependable Internet of Things, ICETI 2024
作者: Al-Zihairy, Athraa Kh. Abdelkareem, A.E. Computer Networks Engineering Department Al-Nahrain University Baghdad Iraq
Optimized YOLOv8 for classifying images into predefined labels is proposed to efficiently deploy convolutional neural networks (CNNs) on Internet of Things (IoT) edge devices. It is an advanced deep learning (DL) mode... 详细信息
来源: 评论
Granular classifier:Building traffic granules for encrypted traffic classification based on granular computing
收藏 引用
Digital Communications and networks 2024年 第5期10卷 1428-1438页
作者: Xuyang Jing Jingjing Zhao Zheng Yan Witold Pedrycz Xian Li State Key Laboratory on Integrated Services Networks School of Cyber EngineeringXidian UniversityChina Department of Electrical and Computer Engineering University of AlbertaCanada Institute for Future(IFF) Qingdao UniversityQingdaoChina
Accurate classification of encrypted traffic plays an important role in network ***,current methods confronts several problems:inability to characterize traffic that exhibits great dispersion,inability to classify tra... 详细信息
来源: 评论
A Fuzzy Multi-Objective Framework for Energy Optimization and Reliable Routing in Wireless Sensor networks via Particle Swarm Optimization
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2773-2792页
作者: Medhat A.Tawfeek Ibrahim Alrashdi Madallah Alruwaili Fatma M.Talaat Department of Computer Science College of Computer and Information SciencesJouf UniversitySakaka72341AljoufSaudi Arabia Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySakaka72341AljoufSaudi Arabia Faculty of Artificial Intelligence Kafrelsheikh UniversityKafrelsheikh33516Egypt Faculty of Computer Science&Engineering New Mansoura UniversityGamasa35712Egypt
Wireless Sensor networks(WSNs)are one of the best technologies of the 21st century and have seen tremendous growth over the past *** work has been put into its development in various aspects such as architectural atte... 详细信息
来源: 评论
Enhancing the efficiency of lung cancer screening: predictive models utilizing deep learning from CT scans
收藏 引用
Neural Computing and Applications 2025年 1-19页
作者: Tawfeek, Medhat A. Alrashdi, Ibrahim Alruwaili, Madallah Shaban, Warda M. Talaat, Fatma M. Department of Computer Science Faculty of Computers and Information Menoufia University Shebin Elkom32511 Egypt Department of Computer Science College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia Department of Computer Engineering and Networks College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia Department of Communication and Electronics Engineering Nile Higher Institute for Engineering and Technology Mansoura Egypt Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh Egypt Faculty of Computer Science and Engineering New Mansoura University Gamasa35712 Egypt
Lung cancer is the most lethal form of cancer. This paper introduces a novel framework to discern and classify pulmonary disorders such as pneumonia, tuberculosis, and lung cancer by analyzing conventional X-ray and C... 详细信息
来源: 评论
STATE-OF-THE-ART FOR EMAIL PHISHING DETECTION TECHNIQUES BASED ON DEEP LEARNING  18th
STATE-OF-THE-ART FOR EMAIL PHISHING DETECTION TECHNIQUES BAS...
收藏 引用
18th International Middle Eastern Simulation and Modelling Conference, MESM 2023
作者: Dahham, Narmin Majid Jawad, Lahieb Mohammed Department of Computer Networks Engineering College of Information Engineering Al-Nahrain University Baghdad Jadriya Iraq
Phishing is the most prevalent cybercrime that involves deceptive email. It is how fraudsters get victims to reveal their personal information by pretending to be a bank or government organisation. Modern business and... 详细信息
来源: 评论