咨询与建议

限定检索结果

文献类型

  • 45 篇 期刊文献
  • 36 篇 会议

馆藏范围

  • 81 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52 篇 工学
    • 19 篇 计算机科学与技术...
    • 16 篇 软件工程
    • 15 篇 信息与通信工程
    • 14 篇 电子科学与技术(可...
    • 9 篇 光学工程
    • 8 篇 电气工程
    • 6 篇 控制科学与工程
    • 6 篇 生物工程
    • 4 篇 仪器科学与技术
    • 4 篇 生物医学工程(可授...
    • 3 篇 机械工程
    • 3 篇 冶金工程
    • 3 篇 动力工程及工程热...
    • 3 篇 交通运输工程
    • 3 篇 航空宇航科学与技...
    • 3 篇 网络空间安全
    • 2 篇 船舶与海洋工程
  • 28 篇 理学
    • 11 篇 物理学
    • 8 篇 数学
    • 7 篇 生物学
    • 2 篇 系统科学
    • 1 篇 大气科学
    • 1 篇 海洋科学
  • 14 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 1 篇 军事学

主题

  • 3 篇 computer science
  • 3 篇 deep learning
  • 3 篇 machine learning
  • 3 篇 silicon photonic...
  • 2 篇 intrusion detect...
  • 2 篇 signal to noise ...
  • 2 篇 throughput
  • 2 篇 internet
  • 2 篇 distributed comp...
  • 2 篇 special issues a...
  • 2 篇 computer network...
  • 2 篇 web services
  • 2 篇 resource utiliza...
  • 1 篇 power demand
  • 1 篇 database languag...
  • 1 篇 internet of thin...
  • 1 篇 fading
  • 1 篇 surveys
  • 1 篇 self-aware
  • 1 篇 los

机构

  • 3 篇 state key labora...
  • 3 篇 department of el...
  • 3 篇 frontiers scienc...
  • 3 篇 peng cheng labor...
  • 3 篇 school of inform...
  • 3 篇 key laboratory o...
  • 3 篇 department of in...
  • 3 篇 peking universit...
  • 3 篇 state key labora...
  • 3 篇 key laboratory o...
  • 3 篇 state key labora...
  • 3 篇 key laboratory o...
  • 2 篇 school of mathem...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 institute of com...
  • 2 篇 research center ...
  • 2 篇 department of ps...
  • 2 篇 department of in...
  • 2 篇 department of co...

作者

  • 4 篇 wang xingjun
  • 4 篇 xingjun wang
  • 4 篇 shu haowen
  • 3 篇 bowers john e.
  • 3 篇 sikora marek
  • 3 篇 han changhao
  • 3 篇 henzel joanna
  • 2 篇 wang lei
  • 2 篇 pengyu liu
  • 2 篇 he zhixue
  • 2 篇 zhou yan
  • 2 篇 peng chao
  • 2 篇 qiang cai
  • 2 篇 adonis bogris
  • 2 篇 khalid a.alissa
  • 2 篇 jun fang
  • 2 篇 sun yu
  • 2 篇 jianchao zheng
  • 2 篇 kebin jia
  • 2 篇 zheng zhao

语言

  • 70 篇 英文
  • 8 篇 其他
  • 3 篇 中文
检索条件"机构=Department of Computer Networks and System Technology"
81 条 记 录,以下是1-10 订阅
Covert Channel Detection and Generation Techniques: A Survey  3
Covert Channel Detection and Generation Techniques: A Survey
收藏 引用
3rd International Conference on Emerging Smart Technologies and Applications, eSmarTA 2023
作者: Al-Khulaidi, Nesmah A. Zahary, Ammar T. Hazaa, Muneer A.S Nasser, Adel A. Yemen Academy for Graduate Studies Department of Computer Networks Sana'a Yemen University of Science and Technology Faculty of Computing and It Department of Computer Science Sana'a Yemen Thamar University Faculty of Computer and Information System Department of Computer Science Thamar Yemen Sa'adah University Faculty of Sciences Department of Information Systems and Computer Science Sa'adah Yemen
The use of covert communications has become more widespread recently as a solution to the information security issue. Information security can be partially solved by the discovery and creation of covert routes. Covert... 详细信息
来源: 评论
Guest Editorial Special Section on Distributed Edge Learning in Wireless networks
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2023年 4卷 2729-2732页
作者: Gong, Xiaowen Huang, Kaibin Chen, Mingzhe Fischione, Carlo Zhang, Jun Choi, Wan Auburn University Department of Electrical and Computer Engineering AuburnAL36849 United States The University of Hong Kong Department of Electrical and Electronic Engineering Pokfulam Hong Kong Kth Royal Institute of Technology Division of Networks and System Engineering Stockholm114 28 Sweden University of Miami Department of Electrical and Computer Engineering MiamiFL33146 United States The Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Sai Kung Hong Kong Seoul National University Department of Electrical and Computer Engineering Seoul08826 Korea Republic of
Distributed machine learning at the network edge has emerged as a promising new paradigm. Various machine learning (ML) technologies will distill Artificial Intelligence (AI) from enormous mobile data to automate futu... 详细信息
来源: 评论
Optimal Deep Learning Driven Intrusion Detection in SDN-Enabled IoT Environment
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6587-6604页
作者: Mohammed Maray Haya Mesfer Alshahrani Khalid A.Alissa Najm Alotaibi Abdulbaset Gaddah AliMeree Mahmoud Othman Manar Ahmed Hamza Department of Information Systems College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia SAUDI ARAMCO Cybersecurity Chair Networks and Communications DepartmentCollege of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Prince Saud AlFaisal Institute for Diplomatic Studies RiyadhSaudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science Warwick UniversityCovetryUK Department of Computer Science Faculty of Computers and Information TechnologyFuture University in Egypt New Cairo11835Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
In recent years,wireless networks are widely used in different *** phenomenon has increased the number of Internet of Things(IoT)devices and their *** IoT has numerous advantages,the commonly-used IoT devices are expo... 详细信息
来源: 评论
Towards Swarm Intelligence Ontology for Formal Description of Metaheuristics Algorithms  4
Towards Swarm Intelligence Ontology for Formal Description o...
收藏 引用
4th International Conference on Computing, Networking, Telecommunications and Engineering Sciences Applications, CoNTESA 2023
作者: Tulicic, Domagoj Horvat, Marko Lovrencic, Sandra University of Applied Science in Information Technology Department of Computer System and Networks Zagreb Croatia University of Zagreb Faculty of Electrical Engineering and Computing Department of Applied Computing Zagreb Croatia University of Zagreb Faculty of Organization and Informatics Foundations of Information Sciences Department of Theoretical and Applied Varaždin Croatia
Swarm intelligence is a class of nature-inspired metaheuristic algorithms, that is specifically derived from biological systems in nature with an emphasis on their social interactions. These algorithms have been prima... 详细信息
来源: 评论
A Neuro-Fuzzy Approach to Road Traffic Congestion Prediction
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 295-310页
作者: Mohammed Gollapalli Atta-ur-Rahman Dhiaa Musleh Nehad Ibrahim Muhammad Adnan Khan Sagheer Abbas Ayesha Atta Muhammad Aftab Khan Mehwash Farooqui Tahir Iqbal Mohammed Salih Ahmed Mohammed Imran BAhmed Dakheel Almoqbil Majd Nabeel Abdullah Omer Department of Computer Information System(CIS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Computer Science(CS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Pattern Recognition and Machine Learning Lab Department of Software EngineeringGachon UniversityInchonKorea Department of Computer Science National College of Business Administration and EconomicsLahorePunjab54000Pakistan Department of Computer Science Government College University(GCU)LahorePunjab54000Pakistan Department of Computer Engineering(CE) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia College of Business Administration Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Networks and Communications(NC) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia
The fast-paced growth of artificial intelligence applications provides unparalleled opportunities to improve the efficiency of various *** as the transportation sector faces many obstacles following the implementation... 详细信息
来源: 评论
Optimal energy efficient path planning of UAV using hybrid MACO-MEA* algorithm: theoretical and experimental approach
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第10期14卷 13847-13867页
作者: Balasubramanian, E. Elangovan, E. Tamilarasan, P. Kanagachidambaresan, G.R. Chutia, Dibyajyoti Department of Mechanical Engineering Head-Centre for Autonomous System Research Vel Tech Rangarajan Dr Sagunthala R & D Institute of Science and Technology Avadi Tamilnadu Chennai600062 India Department of Electronics and Communication Engineering Centre for Autonomous System Research Vel Tech Rangarajan Dr Sagunthala R & D Institute of Science and Technology Avadi Tamilnadu Chennai600062 India Department of Aeronautical Engineering Centre for Autonomous System Research Vel Tech Rangarajan Dr Sagunthala R & D Institute of Science and Technology Avadi Tamilnadu Chennai600062 India Department of Computer Science and Engineering and Associate Editor Wireless Networks Springer Vel Tech Rangarajan Dr Sagunthala R & D Institute of Science and Technology Avadi Tamilnadu Chennai600062 India Department of Space North Eastern Space Applications Centre ISRO Meghalaya Umiam793103 India
Autonomous mission capabilities with optimal path are stringent requirements for Unmanned Aerial Vehicle (UAV) navigation in diverse applications. The proposed research framework is to identify an energy-efficient opt... 详细信息
来源: 评论
Machine Learning for Intrusion Detection in Vehicular Ad-hoc networks (VANETs): A Survey
Machine Learning for Intrusion Detection in Vehicular Ad-hoc...
收藏 引用
Emerging Smart Technologies and Applications (eSmarTA), International Conference on
作者: Nesmah A. Al-Khulaidi Ammar T. Zahary Asma A. Al-Shargabi Muneer A. S Hazaa Department of Computer Networks Yemen Academy for Graduate Studies Sana'a Yemen Department of Computer Science Faculty of Computing and IT University of Science and Technology Sana'a Yemen Department of Information Technology College of Computer Qassim University Buraydah Saudi Arabia Department of Computer Science Faculty of Computer and Information System Thamar University Thamar Yemen
Intrusion Detection systems (IDSs) have become a key security problem due to the increasing number of connected automobiles and the sensitive nature of the data transferred in Vehicular Ad-hoc networks (VANETs). By ke... 详细信息
来源: 评论
Optimal Deep Learning Model Enabled Secure UAV Classification for Industry 4.0
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5349-5367页
作者: Khalid A.Alissa Mohammed Maray Areej A.Malibari Sana Alazwari Hamed Alqahtani Mohamed K.Nour Marwa Obbaya Mohamed A.Shamseldin Mesfer Al Duhayyim SAUDI ARAMCO Cybersecurity Chair Networks and Communications DepartmentCollege of Computer Science and Information TechnologyImam Abdulrahman bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Information Systems College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Department of Industrial and Systems Engineering College of EngineeringPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif P.O.Box 11099Taif21944Saudi Arabia Department of Information Systems College of Computer ScienceCenter of Artificial IntelligenceUnit of CybersecurityKing Khalid UniversityAbhaSaudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Biomedical Engineering College of EngineeringPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Mechanical Engineering Faculty of Engineering and TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia
Emerging technologies such as edge computing,Internet of Things(IoT),5G networks,big data,Artificial Intelligence(AI),and Unmanned Aerial Vehicles(UAVs)empower,Industry 4.0,with a progressive production methodology th... 详细信息
来源: 评论
Analysis of the Operational Impact of the Interconnected Wind Power Plant Selac on Enhancing the Quality of Supply and Operational Functionality of the Kosovo Power system
收藏 引用
IEEE Access 2025年 13卷 111699-111709页
作者: Gazmend Pula Kadri Kadriu Petrit Kastrati Qendrim J. Nika Nuri Berisha Department of Power System Faculty of Electrical and Computer Engineering University of Prishtina Prishtina Kosovo Department of Energy Engineering University of Business and Technology Prishtina Kosovo General Electric Prishtina Kosovo Major Projects Department Scottish and Southern Electricity Networks (SSEN) Reading U.K. Faculty of Electrical and Computer Engineering University of Prishtina “Hasan Prishtina” Prishtina Kosovo
This paper deals with the problem of establishing the effects of the technical and functional integration of wind power plants (WPP) in the Kosovo Power system (KPS). The analysis pertains to establishing the impact a... 详细信息
来源: 评论
Adaptive Varying Contention Window MAC Protocol Based on Underwater Acoustic Propagation Delay
收藏 引用
IEEE Sensors Journal 2023年 第13期23卷 15019-15031页
作者: Guo, Yongan Obaidat, Mohammad S. Guo, Jing Wu, Tin-Yu Tey, Fu Jie Engineering Research Center of Health Service System Based on Ubiquitous Wireless Networks Ministry of Education College of Telecommunications and Information Engineering Nanjing210003 China The King Abdullah II School of Information Technology University of Jordan Amman11942 Jordan The School of Computer and Communication Engineering University of Science and Technology Beijing Beijing100083 China Amity University UP Noida201301 India Nanjing University of Posts and Telecommunications College of Telecommunications and Information Engineering Nanjing210003 China National Pingtung University of Science and Technology Department of Management Information Systems Pingtung912301 Taiwan National Taiwan University of Science and Technology Department of Electrical Engineering Taipei106335 Taiwan
Underwater acoustic wave propagation time delay and fluctuations are much greater than radio waves. However, many of the protocols used for underwater acoustic networking and communication are designed according to th... 详细信息
来源: 评论