咨询与建议

限定检索结果

文献类型

  • 2,225 篇 会议
  • 1,156 篇 期刊文献
  • 24 册 图书

馆藏范围

  • 3,405 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,047 篇 工学
    • 1,084 篇 计算机科学与技术...
    • 838 篇 软件工程
    • 798 篇 信息与通信工程
    • 427 篇 电子科学与技术(可...
    • 403 篇 电气工程
    • 265 篇 控制科学与工程
    • 160 篇 仪器科学与技术
    • 154 篇 光学工程
    • 138 篇 动力工程及工程热...
    • 123 篇 生物工程
    • 114 篇 机械工程
    • 83 篇 生物医学工程(可授...
    • 63 篇 航空宇航科学与技...
    • 63 篇 网络空间安全
    • 56 篇 材料科学与工程(可...
    • 56 篇 交通运输工程
    • 53 篇 化学工程与技术
    • 38 篇 安全科学与工程
  • 965 篇 理学
    • 543 篇 数学
    • 272 篇 物理学
    • 176 篇 统计学(可授理学、...
    • 150 篇 生物学
    • 137 篇 系统科学
    • 60 篇 化学
  • 397 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 142 篇 工商管理
    • 117 篇 图书情报与档案管...
  • 87 篇 医学
    • 73 篇 临床医学
    • 61 篇 基础医学(可授医学...
  • 68 篇 法学
    • 45 篇 社会学
  • 34 篇 经济学
  • 19 篇 文学
  • 13 篇 军事学
  • 12 篇 农学
  • 7 篇 教育学
  • 6 篇 艺术学

主题

  • 120 篇 computer network...
  • 116 篇 bandwidth
  • 93 篇 quality of servi...
  • 92 篇 protocols
  • 84 篇 throughput
  • 83 篇 wireless sensor ...
  • 76 篇 wireless communi...
  • 71 篇 delay
  • 67 篇 wireless network...
  • 62 篇 telecommunicatio...
  • 61 篇 computational mo...
  • 60 篇 computer archite...
  • 60 篇 laboratories
  • 58 篇 computer science
  • 56 篇 intelligent netw...
  • 53 篇 interference
  • 52 篇 routing
  • 52 篇 traffic control
  • 52 篇 ip networks
  • 51 篇 resource managem...

机构

  • 72 篇 state key labora...
  • 63 篇 state key labora...
  • 35 篇 peng cheng labor...
  • 30 篇 computer enginee...
  • 29 篇 department of el...
  • 27 篇 state key labora...
  • 24 篇 state key labora...
  • 21 篇 frontiers scienc...
  • 21 篇 department of co...
  • 20 篇 state key labora...
  • 20 篇 department of el...
  • 19 篇 state key labora...
  • 18 篇 department of el...
  • 16 篇 state key labora...
  • 15 篇 xidian universit...
  • 14 篇 state key labora...
  • 13 篇 ieee
  • 13 篇 center for ultra...
  • 13 篇 national key lab...
  • 13 篇 peking universit...

作者

  • 32 篇 fred wang
  • 31 篇 sarigiannidis pa...
  • 31 篇 han zhu
  • 25 篇 panagiotis sarig...
  • 25 篇 zhu han
  • 25 篇 leon m. tolbert
  • 25 篇 argyriou vasilei...
  • 24 篇 zhong-ping jiang
  • 24 篇 xingjun wang
  • 23 篇 wang xingjun
  • 22 篇 vasileios argyri...
  • 21 篇 lagkas thomas
  • 21 篇 marios m. polyca...
  • 20 篇 cheng xiang
  • 20 篇 hui li
  • 20 篇 xiang cheng
  • 19 篇 thomas lagkas
  • 19 篇 christos g. pana...
  • 19 篇 zhang haijun
  • 18 篇 al-dhahir naofal

语言

  • 3,173 篇 英文
  • 147 篇 其他
  • 85 篇 中文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Networks and Engineering"
3405 条 记 录,以下是21-30 订阅
排序:
Beyond 5G networks: Integration of Communication, Computing, Caching, and Control
收藏 引用
China Communications 2023年 第7期20卷 137-174页
作者: Musbahu Mohammed Adam Liqiang Zhao Kezhi Wang Zhu Han State Key Laboratory of Integrated Service Networks Xidian UniversityXi’an 710071China Department of Computer and Information Sciences Northumbria UniversityNewcastle upon TyneUK Department of Electrical and Computer Engineering University of HoustonHoustonTX 77004 USAand also with the Department of Computer Science and EngineeringKyung Hee UniversitySeoul 02447 South Korea
In recent years,the exponential proliferation of smart devices with their intelligent applications poses severe challenges on conventional cellular *** challenges can be potentially overcome by integrating communicati... 详细信息
来源: 评论
Leveraging power consumption for anomaly detection on IoT devices in smart homes
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第10期14卷 14045-14056页
作者: Nimmy, K. Dilraj, M. Sankaran, Sriram Achuthan, Krishnashree Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Amritapuri India Center for Cybersecurity Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri India
Anomaly detection in smart homes is paramount in the prevailing information age as smart devices remain susceptible to sophisticated cyber-attacks. Hackers exploit vulnerabilities such as weak passwords and insecure, ... 详细信息
来源: 评论
IoT Malware Detection Technique Based on Deep Learning and Natural Language Processing  3
IoT Malware Detection Technique Based on Deep Learning and N...
收藏 引用
3rd International Conference on Electronic and Electrical engineering and Intelligent System, ICE3IS 2023
作者: Al Abbas, Marwa A. Khammas, Ban M. Collage of Information Engineering Al-Nahrain University Department of Computer Networks Engineering Jadriya Baghdad Iraq
The Internet of Things (IoT) has gained significant popularity and attention as a research topic due to its widespread use and associated concerns. Previous security measures, which focused on specific threats using l... 详细信息
来源: 评论
A Parallel Color Image Encryption Algorithm Based on a 2-D Logistic-Rulkov Neuron Map
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 18115-18124页
作者: Gao, Suo Zhang, Zheyi Iu, Herbert Ho-Ching Ding, Siqi Mou, Jun Erkan, Uğur Toktas, Abdurrahim Li, Qi Wang, Chunpeng Cao, Yinghong Dalian Polytechnic University School of Information Science and Engineering Dalian116034 China The University of Western Australia School of Electrical Electronic and Computer Engineering PerthWA6009 Australia Dalian University of Technology School of Mathematical Sciences Dalian116024 China Karamanoglu Mehmetbey University Faculty of Engineering Department of Computer Engineering Karaman70200 Turkey Ankara University Engineering Faculty Department of Artificial Intelligence and Data Engineering Ankara06830 Turkey Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
Images are widely used in social networks, necessitating efficient and secure transmission, especially in bandwidth-constrained environments. This article aims to develop a color image encryption algorithm that enhanc... 详细信息
来源: 评论
Sem-AI: A Unique Framework for Sentiment Analysis and Opinion Mining Using Social Network Data
收藏 引用
SN computer Science 2025年 第2期6卷 1-23页
作者: Maruthupandi, J. Sivakumar, S. Kumar, V. Senthil Srikaanth, P. Balaji Department of Computer Science and Engineering New Horizon College of Engineering Karnataka Bangalore India Department of Computer Science and Engineering SRM Institute of Science and Technology Tamilnadu Trichy India Department of Networks and Communication SRM Institute of Science and Technology Tamilnadu Chennai India Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology Chennai India
Social media has become an essential forum for people to share their thoughts and sentiments owing to the quick rise in mobile technology. Business and political organizations might benefit from understanding public s... 详细信息
来源: 评论
Control of an Hybrid AC/DC MG Using Raspberry Pi
Control of an Hybrid AC/DC MG Using Raspberry Pi
收藏 引用
International Conference of the TC Electrimacs Committee, ELECTRIMACS 2024
作者: Carrasco-González, David Sarrias-Mena, Raúl Horrillo-Quintero, Pablo Llorens-Iborra, Francisco Fernández-Ramírez, Luis M. Cadiz Spain SURET Research Group Department of Engineering in Automation Electronics and Computer Architecture and Networks ETSI Algeciras Cadiz Spain
Nowadays, hybrid AC/DC microgrids (HMG) are growing in popularity because of human needs and their benefits. They are composed of the interconnection of a DC microgrid (MG) and an AC MG, and each MG is constituted by ... 详细信息
来源: 评论
PAN-DeSpeck:A Lightweight Pyramid and Attention-Based Network for SAR Image Despeckling
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 3671-3689页
作者: Saima Yasmeen Muhammad Usman Yaseen Syed Sohaib Ali Moustafa M.Nasralla Sohaib Bin Altaf Khattak Department of Computer Sciences Comsats UniversityIslamabadPakistan Department of Research and Development Shearwater GeoservicesCrawleyWest SussexUK Department of Communications&Networks Engineering Prince Sultan UniversityRiyadhSaudi Arabia
SAR images commonly suffer fromspeckle noise,posing a significant challenge in their analysis and *** convolutional neural network(CNN)based despeckling methods have shown great performance in removing speckle ***,the... 详细信息
来源: 评论
Robust Authentication: Leveraging Hardware Fingerprints and AI to Enhance Security Against Spoofing
收藏 引用
IEEE Access 2025年 13卷 86912-86926页
作者: Nimmy, K. Jain, Kurunandan Sachin, S.M. Abekaesh, P.A. Venkitasubramaniam, Parv Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri690525 India Center for Cybersecurity Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri Campus Kerala Amritapuri690525 India Lehigh University Department of Electrical and Computer Engineering BethlehemPA18015 United States
Fingerprint authentication blends biometric precision with user convenience, leveraging unique ridge patterns for fast, reliable, and tamper-resistant identity verification. However, it remains vulnerable to spoofing ... 详细信息
来源: 评论
PAC-MC: An Efficient Password-Based Access Control Framework for Time Sequence Aware Media Cloud
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 5632-5648页
作者: Wang, Haiyan Liu, Penghui Zhong, Xiaoxiong Luo, Fucai Xiao, Bin Yang, Yuanyuan Peng Cheng Laboratory Department of New Networks Shenzhen518000 China Zhejiang Gongshang University School of Computer Science and Technology Hangzhou China Hong Kong Polytechnic University Department of Computing Hong Kong Stony Brook University Department of Electrical and Computer Engineering Stony BrookNY11794 United States
Cloud storage makes it easier for users to access and share data remotely, but it often requires integration with cryptographic technologies to address consumer-oriented applications, such as fine-grained data access,... 详细信息
来源: 评论
Multi-agent QoS-aware autonomic resource provisioning framework for elastic BPM in containerized multi-cloud environment
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第9期14卷 12895-12920页
作者: Saif, Mufeed Ahmed Naji Niranjan, S.K. Murshed, Belal Abdullah Hezam Al-ariki, Hasib Daowd Esmail Abdulwahab, Hudhaifa Mohammed Department of Computer Applications Sri Jayachamarajendra College of Engineering VTU Mysore India Department of Studies in Computer Science University of Mysore Karnataka Mysore India Department of Computer Science College of Eng. &IT University of Amran Amran Yemen Department of Information Technology Faculty of Engineering and Information Technology Al-ata’a University for Science and Technology Taiz Yemen Department of Computer Networks Engineering and Technologies Sana’a Community College Sana’a Yemen Department of Computer Application Ramaiah Institute of Technology VTU Bangalore India
Cloud computing enables businesses to improve their market competitiveness, enabling instant and easy access to a pool of virtualized and distributed resources such as virtual machines (VM) and containers for executin... 详细信息
来源: 评论