咨询与建议

限定检索结果

文献类型

  • 2,212 篇 会议
  • 1,149 篇 期刊文献
  • 24 册 图书

馆藏范围

  • 3,385 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,035 篇 工学
    • 1,080 篇 计算机科学与技术...
    • 836 篇 软件工程
    • 795 篇 信息与通信工程
    • 425 篇 电子科学与技术(可...
    • 407 篇 电气工程
    • 266 篇 控制科学与工程
    • 162 篇 仪器科学与技术
    • 155 篇 光学工程
    • 137 篇 动力工程及工程热...
    • 124 篇 生物工程
    • 116 篇 机械工程
    • 85 篇 生物医学工程(可授...
    • 63 篇 网络空间安全
    • 60 篇 航空宇航科学与技...
    • 55 篇 材料科学与工程(可...
    • 52 篇 交通运输工程
    • 50 篇 化学工程与技术
    • 37 篇 安全科学与工程
  • 961 篇 理学
    • 540 篇 数学
    • 274 篇 物理学
    • 176 篇 统计学(可授理学、...
    • 151 篇 生物学
    • 137 篇 系统科学
    • 57 篇 化学
  • 400 篇 管理学
    • 295 篇 管理科学与工程(可...
    • 144 篇 工商管理
    • 117 篇 图书情报与档案管...
  • 91 篇 医学
    • 76 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 68 篇 法学
    • 45 篇 社会学
  • 35 篇 经济学
  • 19 篇 文学
  • 13 篇 军事学
  • 12 篇 农学
  • 7 篇 教育学
  • 6 篇 艺术学

主题

  • 120 篇 computer network...
  • 116 篇 bandwidth
  • 95 篇 quality of servi...
  • 89 篇 protocols
  • 84 篇 throughput
  • 83 篇 wireless sensor ...
  • 76 篇 wireless communi...
  • 71 篇 delay
  • 67 篇 wireless network...
  • 63 篇 telecommunicatio...
  • 61 篇 computational mo...
  • 60 篇 laboratories
  • 59 篇 computer archite...
  • 58 篇 computer science
  • 56 篇 intelligent netw...
  • 53 篇 resource managem...
  • 53 篇 interference
  • 52 篇 ip networks
  • 51 篇 routing
  • 51 篇 traffic control

机构

  • 72 篇 state key labora...
  • 63 篇 state key labora...
  • 35 篇 peng cheng labor...
  • 30 篇 computer enginee...
  • 29 篇 state key labora...
  • 28 篇 department of el...
  • 24 篇 state key labora...
  • 21 篇 frontiers scienc...
  • 21 篇 department of co...
  • 20 篇 state key labora...
  • 20 篇 department of el...
  • 19 篇 state key labora...
  • 18 篇 department of el...
  • 15 篇 state key labora...
  • 14 篇 state key labora...
  • 14 篇 xidian universit...
  • 13 篇 ieee
  • 13 篇 center for ultra...
  • 13 篇 national key lab...
  • 13 篇 peking universit...

作者

  • 32 篇 fred wang
  • 31 篇 han zhu
  • 30 篇 sarigiannidis pa...
  • 25 篇 zhu han
  • 25 篇 leon m. tolbert
  • 25 篇 argyriou vasilei...
  • 24 篇 panagiotis sarig...
  • 24 篇 zhong-ping jiang
  • 23 篇 wang xingjun
  • 23 篇 vasileios argyri...
  • 23 篇 xingjun wang
  • 21 篇 lagkas thomas
  • 21 篇 marios m. polyca...
  • 20 篇 cheng xiang
  • 20 篇 hui li
  • 20 篇 xiang cheng
  • 19 篇 thomas lagkas
  • 19 篇 christos g. pana...
  • 19 篇 zhang haijun
  • 18 篇 al-dhahir naofal

语言

  • 3,201 篇 英文
  • 99 篇 其他
  • 84 篇 中文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer and Networks Engineering"
3385 条 记 录,以下是1-10 订阅
排序:
Hybrid DF and SIR Forwarding Strategy in Conventional and Distributed Alamouti Space-Time Coded Cooperative networks
收藏 引用
computer Modeling in engineering & Sciences 2025年 第2期142卷 1933-1954页
作者: Slim Chaoui Omar Alruwaili Faeiz Alserhani Haifa Harrouch Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySakaka72388Saudi Arabia Computer Science Department Applied CollegeUniversity of HailHail55424Saudi Arabia
In this paper,we propose a hybrid decode-and-forward and soft information relaying(HDFSIR)strategy to mitigate error propagation in coded cooperative *** the HDFSIR approach,the relay operates in decode-and-forward(DF... 详细信息
来源: 评论
A Fuzzy Multi-Objective Framework for Energy Optimization and Reliable Routing in Wireless Sensor networks via Particle Swarm Optimization
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2773-2792页
作者: Medhat A.Tawfeek Ibrahim Alrashdi Madallah Alruwaili Fatma M.Talaat Department of Computer Science College of Computer and Information SciencesJouf UniversitySakaka72341AljoufSaudi Arabia Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySakaka72341AljoufSaudi Arabia Faculty of Artificial Intelligence Kafrelsheikh UniversityKafrelsheikh33516Egypt Faculty of Computer Science&Engineering New Mansoura UniversityGamasa35712Egypt
Wireless Sensor networks(WSNs)are one of the best technologies of the 21st century and have seen tremendous growth over the past *** work has been put into its development in various aspects such as architectural atte... 详细信息
来源: 评论
Enhancing the efficiency of lung cancer screening: predictive models utilizing deep learning from CT scans
收藏 引用
Neural Computing and Applications 2025年 1-19页
作者: Tawfeek, Medhat A. Alrashdi, Ibrahim Alruwaili, Madallah Shaban, Warda M. Talaat, Fatma M. Department of Computer Science Faculty of Computers and Information Menoufia University Shebin Elkom32511 Egypt Department of Computer Science College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia Department of Computer Engineering and Networks College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia Department of Communication and Electronics Engineering Nile Higher Institute for Engineering and Technology Mansoura Egypt Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh Egypt Faculty of Computer Science and Engineering New Mansoura University Gamasa35712 Egypt
Lung cancer is the most lethal form of cancer. This paper introduces a novel framework to discern and classify pulmonary disorders such as pneumonia, tuberculosis, and lung cancer by analyzing conventional X-ray and C... 详细信息
来源: 评论
Enhanced Neural Differential Distinguisher for Speck32/64 Using Attention Mechanisms and Multi Ciphertext Inputs
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第19期49卷 197-210页
作者: Jiang, Xue Li, Min Kaiyrbek, Makulov Lakhno, Valerii Andrii, Sahun School of Computer and Information Engineering Bengbu University Bengbu233030 China Department of Computer Systems Networks and Cybersecurity National University of Life and Environmental Sciences of Ukraine Kyiv03041 Ukraine Department of Computer Science Caspian University of Technology and Engineering Almaty050151 Kazakhstan
In recent years, neural network-based differential distinguishers have demonstrated significant advantages in accuracy and effi-ciency over traditional differential distinguishers in symmetric cipher differential anal... 详细信息
来源: 评论
Cost-Effective FBG Demodulation for High-Temperature and Dynamic Strain via Modified Levenberg-Marquardt
收藏 引用
IEEE Sensors Journal 2025年 第10期25卷 17011-17017页
作者: Zhang, Guangyin Zhao, Kehao Wen, Hongqiao Wang, Qirui Wu, Zekun Zhong, Shuda Ma, Guangqun Venediktov, Evgenii Chen, Kevin P. University of Pittsburgh Department of Electrical and Computer Engineering PittsburghPA15261 United States Wuhan University of Technology National Engineering Research Center of Fiber Optic Sensing Technology and Networks Wuhan430063 China
This article presents a high-resolution, signal-jump-free demodulation method for fiber Bragg grating (FBG) systems employing a low-cost spectrometer. Utilizing a modified logarithm Gaussian Levenberg-Marquardt (LGLM)... 详细信息
来源: 评论
IoT-Aware Real-Time Healthcare Diagnostic Framework For Diabetes Using Wearable Sensors through Deep Reinforcement Learning
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 18183-18194页
作者: Farman, Haleem Shahzad, Yasir Jan, Bilal Nasralla, Moustafa M. Sallam, Karam M. Munasinghe, Kumudu Jamalipour, Abbas Prince Sultan University Smart Systems Engineering Lab Department of Communications and Networks Engineering College of Engineering Riyadh Saudi Arabia University of Peshawar Department of Computer Science Pakistan FATA University Department of Computer Science Kohat Pakistan University of Sharjah Computer Science Department Sharjah United Arab Emirates University of Canberra School of Information Technology and Systems ACT2617 Australia The University of Sydney School of Electrical and Information Engineering NSW2006 Australia
Machine Learning (ML) with 5G technology has revolutionized smart healthcare. It has helped improve the quality of care, such as real-time analysis, decision-making, patient monitoring, and personalized treatments. In... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Robust Authentication: Leveraging Hardware Fingerprints and AI to Enhance Security Against Spoofing
收藏 引用
IEEE Access 2025年 13卷 86912-86926页
作者: Nimmy, K. Jain, Kurunandan Sachin, S.M. Abekaesh, P.A. Venkitasubramaniam, Parv Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Amritapuri India Amrita Vishwa Vidyapeetham Center for Cybersecurity Systems and Networks Amritapuri India Lehigh University Department of Electrical & Computer Engineering United States
Fingerprint authentication blends biometric precision with user convenience, leveraging unique ridge patterns for fast, reliable, and tamper-resistant identity verification. However, it remains vulnerable to spoofing ... 详细信息
来源: 评论
Use a Little Force to Move a Great Mass: A Jamming Leverage Strategy for Covert Communications
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 5015-5024页
作者: Wang, Tingting Li, Zan Si, Jiangbo Cheng, Zihao Gao, Yang Al-Dhahir, Naofal Integrated Service Networks Lab of Xidian University Xi’an China Air Force Engineering University Information and Navigation College Xi’an China The University of Texas at Dallas Department of Electrical and Computer Engineering RichardsonTX75080 United States
We propose a joint covert beamforming design and jamming strategy to protect the communication process between Alice and Bob from being discovered by Willie with the help of another pair of neutral nodes. Specifically... 详细信息
来源: 评论
Sem-AI: A Unique Framework for Sentiment Analysis and Opinion Mining Using Social Network Data
收藏 引用
SN computer Science 2025年 第2期6卷 1-23页
作者: Maruthupandi, J. Sivakumar, S. Kumar, V. Senthil Srikaanth, P. Balaji Department of Computer Science and Engineering New Horizon College of Engineering Karnataka Bangalore India Department of Computer Science and Engineering SRM Institute of Science and Technology Tamilnadu Trichy India Department of Networks and Communication SRM Institute of Science and Technology Tamilnadu Chennai India Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology Chennai India
Social media has become an essential forum for people to share their thoughts and sentiments owing to the quick rise in mobile technology. Business and political organizations might benefit from understanding public s... 详细信息
来源: 评论