咨询与建议

限定检索结果

文献类型

  • 123 篇 会议
  • 84 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 208 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 138 篇 工学
    • 62 篇 计算机科学与技术...
    • 48 篇 软件工程
    • 46 篇 信息与通信工程
    • 39 篇 电子科学与技术(可...
    • 31 篇 光学工程
    • 17 篇 电气工程
    • 14 篇 生物工程
    • 13 篇 控制科学与工程
    • 12 篇 仪器科学与技术
    • 12 篇 材料科学与工程(可...
    • 11 篇 机械工程
    • 11 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 7 篇 冶金工程
    • 6 篇 交通运输工程
    • 6 篇 航空宇航科学与技...
    • 5 篇 土木工程
    • 4 篇 船舶与海洋工程
  • 76 篇 理学
    • 33 篇 物理学
    • 27 篇 数学
    • 16 篇 生物学
    • 9 篇 统计学(可授理学、...
    • 7 篇 系统科学
    • 3 篇 海洋科学
  • 28 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
    • 8 篇 图书情报与档案管...
  • 9 篇 医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 法学
    • 4 篇 社会学
  • 2 篇 经济学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 9 篇 computer network...
  • 8 篇 silicon photonic...
  • 5 篇 computer science
  • 5 篇 deep learning
  • 5 篇 authentication
  • 5 篇 aluminum gallium...
  • 5 篇 energy efficienc...
  • 4 篇 internet of thin...
  • 4 篇 application soft...
  • 4 篇 data mining
  • 4 篇 resource allocat...
  • 4 篇 humans
  • 4 篇 lasers and elect...
  • 3 篇 intrusion detect...
  • 3 篇 information anal...
  • 3 篇 signal to noise ...
  • 3 篇 neural networks
  • 3 篇 bandwidth
  • 3 篇 resource managem...
  • 3 篇 computer securit...

机构

  • 21 篇 frontiers scienc...
  • 15 篇 department of el...
  • 14 篇 peng cheng labor...
  • 11 篇 state key labora...
  • 9 篇 state key labora...
  • 7 篇 state key labora...
  • 6 篇 peking universit...
  • 5 篇 department of el...
  • 5 篇 state key labora...
  • 4 篇 beijing laborato...
  • 4 篇 beijing key labo...
  • 3 篇 beijing universi...
  • 3 篇 state key labora...
  • 3 篇 research center ...
  • 3 篇 center of materi...
  • 3 篇 beijing universi...
  • 3 篇 state key labora...
  • 3 篇 school of inform...
  • 3 篇 state key labora...
  • 3 篇 key laboratory o...

作者

  • 19 篇 wang xingjun
  • 19 篇 shu haowen
  • 17 篇 bowers john e.
  • 15 篇 chang lin
  • 15 篇 xingjun wang
  • 13 篇 haowen shu
  • 13 篇 xie weiqiang
  • 12 篇 shen bitao
  • 10 篇 yu shaohua
  • 9 篇 yang yang
  • 9 篇 lin chang
  • 8 篇 zhang xuguang
  • 8 篇 chen ruixuan
  • 8 篇 tao zihan
  • 8 篇 weiqiang xie
  • 7 篇 jin ming
  • 7 篇 john e. bowers
  • 7 篇 bitao shen
  • 6 篇 guo caili
  • 6 篇 tao yuansheng

语言

  • 194 篇 英文
  • 9 篇 其他
  • 5 篇 中文
检索条件"机构=Department of Computer System and Networks"
208 条 记 录,以下是11-20 订阅
排序:
Machine Learning for Intrusion Detection in Vehicular Ad-hoc networks (VANETs): A Survey
Machine Learning for Intrusion Detection in Vehicular Ad-hoc...
收藏 引用
Emerging Smart Technologies and Applications (eSmarTA), International Conference on
作者: Nesmah A. Al-Khulaidi Ammar T. Zahary Asma A. Al-Shargabi Muneer A. S Hazaa Department of Computer Networks Yemen Academy for Graduate Studies Sana'a Yemen Department of Computer Science Faculty of Computing and IT University of Science and Technology Sana'a Yemen Department of Information Technology College of Computer Qassim University Buraydah Saudi Arabia Department of Computer Science Faculty of Computer and Information System Thamar University Thamar Yemen
Intrusion Detection systems (IDSs) have become a key security problem due to the increasing number of connected automobiles and the sensitive nature of the data transferred in Vehicular Ad-hoc networks (VANETs). By ke... 详细信息
来源: 评论
A Neuro-Fuzzy Approach to Road Traffic Congestion Prediction
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 295-310页
作者: Mohammed Gollapalli Atta-ur-Rahman Dhiaa Musleh Nehad Ibrahim Muhammad Adnan Khan Sagheer Abbas Ayesha Atta Muhammad Aftab Khan Mehwash Farooqui Tahir Iqbal Mohammed Salih Ahmed Mohammed Imran BAhmed Dakheel Almoqbil Majd Nabeel Abdullah Omer Department of Computer Information System(CIS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Computer Science(CS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Pattern Recognition and Machine Learning Lab Department of Software EngineeringGachon UniversityInchonKorea Department of Computer Science National College of Business Administration and EconomicsLahorePunjab54000Pakistan Department of Computer Science Government College University(GCU)LahorePunjab54000Pakistan Department of Computer Engineering(CE) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia College of Business Administration Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Networks and Communications(NC) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia
The fast-paced growth of artificial intelligence applications provides unparalleled opportunities to improve the efficiency of various *** as the transportation sector faces many obstacles following the implementation... 详细信息
来源: 评论
Improving Routing Decision Algorithm for RPL networks  11
Improving Routing Decision Algorithm for RPL Networks
收藏 引用
11th International Conference on Information Technology, ICIT 2023
作者: Zaqebah, Abdullah Al Almomani, Omar Almomani, Malek Alsaaidah, Adeeb Abu-Shareha, Ahmad Adel Althunibat, Ahmad The World IslamicSciences and Education University Department of Computer Science Amman Jordan The World Islamic Sciences and Education University Department of Information System and Networks Amman Jordan Software Engineering The World Islamic Sciences and Education University Amman Jordan Al-Ahliyya Amman University Department of Networks and Information Security Amman Jordan Al-Ahliyya Amman University Department of Data Science and Artificial Intelligence Amman Jordan Al-Zaytoonah University of Jordan Department of Software Engineering Amman11733 Jordan
Low Power networks are spreading worldwide, seeking to enable small devices to join wireless networks. This requires a routing mechanism that makes it possible and seamless. This research aims to create a Low Power an... 详细信息
来源: 评论
Online Computation Offloading and Trajectory Scheduling for UAV-Enabled Wireless Powered Mobile Edge Computing
收藏 引用
China Communications 2022年 第4期19卷 257-273页
作者: Han Hu Xiang Zhou Qun Wang Rose Qingyang Hu The Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and TelecommunicationsNanjing 210003China The Engineering Research Center of Health Service System Based on Ubiquitous Wireless Networks Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing 210003China The Department of Electrical and Computer Engineering Utah State UniversityLoganUTUSA.
The unmanned aerial vehicle(UAV)-enabled mobile edge computing(MEC) architecture is expected to be a powerful technique to facilitate 5 G and beyond ubiquitous wireless connectivity and diverse vertical applications a... 详细信息
来源: 评论
Broadband and repetition rate tunable frequency comb based on electro-optic time lens with AlGaAsOl waveguide  49
Broadband and repetition rate tunable frequency comb based o...
收藏 引用
49th European Conference on Optical Communications, ECOC 2023
作者: Ma, Chunyang Wang, Chaopeng Pi, Yazhi Wang, Lei He, Zhixue Bowers, John E. Chnag, Lin Zizheng Cao, Lin Yu, Shaohua Research Center of Circuits and Systems Peng Cheng Laboratory Guangdong Shenzhen518055 China Department of Electrical and Computer Engineering University of California Santa BarbaraCA93106 United States State Key Laboratory of Advanced Optical Communications System and Networks Peking University Beijing100871 China
We present a tunable repetition rate frequency comb realized by cascaded electro-optical modulators with a high nonlinear AlGaAs-on-isolator waveguide. 18-26.5 GHz comb spacing tunability with broadband spectra was ac... 详细信息
来源: 评论
Integrated Parallel Chaos driven LiDAR system with High Interference Tolerance
Integrated Parallel Chaos driven LiDAR System with High Inte...
收藏 引用
2023 Conference on Lasers and Electro-Optics, CLEO 2023
作者: Chen, Ruixuan Shen, Bitao Shu, Haowen Chang, Lin Xie, Weiqiang Liao, Wenchao Tao, Zihan Bowers, John Wang, Xingjun State Key Laboratory of Advanced Optical Communications System and Networks School of Electronics Peking University Beijing100871 China Department of Electrical and Computer Engineering University of California Santa BarbaraCA93106 United States Frontiers Science Center for Nano-Optoelectronics Peking University Beijing100871 China
We introduce a chaotic microcomb based high interference-tolerance parallel LiDAR. Parallel chaos with record-high noise spectra beyond 7 GHz leads to sub-cm-level ranging accuracy. The intrinsic orthogonality permits... 详细信息
来源: 评论
Optimal energy efficient path planning of UAV using hybrid MACO-MEA* algorithm: theoretical and experimental approach
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第10期14卷 13847-13867页
作者: Balasubramanian, E. Elangovan, E. Tamilarasan, P. Kanagachidambaresan, G.R. Chutia, Dibyajyoti Department of Mechanical Engineering Head-Centre for Autonomous System Research Vel Tech Rangarajan Dr Sagunthala R & D Institute of Science and Technology Avadi Tamilnadu Chennai600062 India Department of Electronics and Communication Engineering Centre for Autonomous System Research Vel Tech Rangarajan Dr Sagunthala R & D Institute of Science and Technology Avadi Tamilnadu Chennai600062 India Department of Aeronautical Engineering Centre for Autonomous System Research Vel Tech Rangarajan Dr Sagunthala R & D Institute of Science and Technology Avadi Tamilnadu Chennai600062 India Department of Computer Science and Engineering and Associate Editor Wireless Networks Springer Vel Tech Rangarajan Dr Sagunthala R & D Institute of Science and Technology Avadi Tamilnadu Chennai600062 India Department of Space North Eastern Space Applications Centre ISRO Meghalaya Umiam793103 India
Autonomous mission capabilities with optimal path are stringent requirements for Unmanned Aerial Vehicle (UAV) navigation in diverse applications. The proposed research framework is to identify an energy-efficient opt... 详细信息
来源: 评论
Optimal Deep Learning Model Enabled Secure UAV Classification for Industry 4.0
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5349-5367页
作者: Khalid A.Alissa Mohammed Maray Areej A.Malibari Sana Alazwari Hamed Alqahtani Mohamed K.Nour Marwa Obbaya Mohamed A.Shamseldin Mesfer Al Duhayyim SAUDI ARAMCO Cybersecurity Chair Networks and Communications DepartmentCollege of Computer Science and Information TechnologyImam Abdulrahman bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Information Systems College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Department of Industrial and Systems Engineering College of EngineeringPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif P.O.Box 11099Taif21944Saudi Arabia Department of Information Systems College of Computer ScienceCenter of Artificial IntelligenceUnit of CybersecurityKing Khalid UniversityAbhaSaudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Biomedical Engineering College of EngineeringPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Mechanical Engineering Faculty of Engineering and TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia
Emerging technologies such as edge computing,Internet of Things(IoT),5G networks,big data,Artificial Intelligence(AI),and Unmanned Aerial Vehicles(UAVs)empower,Industry 4.0,with a progressive production methodology th... 详细信息
来源: 评论
Covert Channel Detection and Generation Techniques: A Survey
Covert Channel Detection and Generation Techniques: A Survey
收藏 引用
Emerging Smart Technologies and Applications (eSmarTA), International Conference on
作者: Nesmah A. AL-Khulaidi Ammar T. Zahary Muneer A.S Hazaa Adel A. Nasser Department of Computer Networks Yemen Academy for Graduate Studies Sana'a Yemen Department of Computer Science Faculty of Computing and IT University of Science and Technology Sana'a Yemen Department of Computer Science Faculty of Computer and Information System Thamar University Thamar Yemen Department of Information Systems and Computer Science Faculty of Sciences Sa'adah University Sa'adah Yemen
The use of covert communications has become more widespread recently as a solution to the information security issue. Information security can be partially solved by the discovery and creation of covert routes. Covert...
来源: 评论
Context-Awareness in Ensemble Recommender system Framework  3
Context-Awareness in Ensemble Recommender System Framework
收藏 引用
3rd International Conference on Electrical, Communication and computer Engineering, ICECCE 2021
作者: Drif, Ahlem Zerrad, Houssem Eddine Cherifi, Hocine Ferhat Abbas University Networks and Distributed System Laboratory Setif Algeria Ferhat Abbas University Computer Science Department Setif Algeria University of Burgundy Computer Laboratory of Burgundy Dijon France
Recommender systems that provide recommendations based uniquely on information over users and items may not be very accurate in some situations. Therefore, adding contextual information to recommendations may be a goo... 详细信息
来源: 评论