咨询与建议

限定检索结果

文献类型

  • 5 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 2 篇 软件工程
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 数学

主题

  • 2 篇 accuracy
  • 1 篇 sensor systems
  • 1 篇 computer science
  • 1 篇 throughput
  • 1 篇 global conver-ge...
  • 1 篇 biosensors
  • 1 篇 remote monitorin...
  • 1 篇 ad hoc networks
  • 1 篇 power system rel...
  • 1 篇 bidirectional co...
  • 1 篇 computer securit...
  • 1 篇 optimization
  • 1 篇 processor schedu...
  • 1 篇 wireless sensor ...
  • 1 篇 computational mo...
  • 1 篇 nonlinear optimi...
  • 1 篇 long short term ...
  • 1 篇 network intrusio...
  • 1 篇 feature extracti...
  • 1 篇 superlinear conv...

机构

  • 1 篇 department of in...
  • 1 篇 sr university de...
  • 1 篇 college of elect...
  • 1 篇 department of in...
  • 1 篇 department of ma...
  • 1 篇 muma college of ...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 college of mathe...
  • 1 篇 department of co...
  • 1 篇 nitte meenakshi ...
  • 1 篇 sr university de...
  • 1 篇 department of co...
  • 1 篇 the islamic univ...
  • 1 篇 department of cs...
  • 1 篇 department of el...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 j d college of e...
  • 1 篇 college of mathe...

作者

  • 1 篇 jin bao jian
  • 1 篇 maram balajee
  • 1 篇 subramanya s g
  • 1 篇 baig ayub
  • 1 篇 yi-yo lin
  • 1 篇 sonekar shrikant...
  • 1 篇 chakrabarti pras...
  • 1 篇 bhuvan unhelkar
  • 1 篇 shrikant v. sone...
  • 1 篇 balajee maram
  • 1 篇 chi-ren dow
  • 1 篇 hajari manu
  • 1 篇 reddy r. archana
  • 1 篇 manu hajari
  • 1 篇 muhsin hassan mu...
  • 1 篇 qing juan xu
  • 1 篇 yi-yu su
  • 1 篇 ayub baig
  • 1 篇 r. archana reddy
  • 1 篇 shiow-fen hwang

语言

  • 5 篇 英文
  • 1 篇 其他
检索条件"机构=Department of Infornation Engineering and Computer Science"
6 条 记 录,以下是1-10 订阅
排序:
A Beetle Antennae Search-Based Sparrow Search Algorithm for Network Intrusion Detection
A Beetle Antennae Search-Based Sparrow Search Algorithm for ...
收藏 引用
2024 International Conference on Distributed Systems, computer Networks and Cybersecurity, ICDSCNC 2024
作者: Baig, Ayub Reddy, R. Archana Muhsin Hassan, Muntather Subramanya, S.G. Manu, Hajari Department of Infornation Technology Hyderabad India Sr University Department of Computer Science and Engineering Warangal India The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq Nitte Meenakshi Institute of Technology Department of Cse Bengaluru India Gokaraju Rangaraju Institute of Engineering and Technology Department of Ai&ml Hyderabad India
Nowadays, the network Intrusion Detection System (IDS) is a crucial cybersecurity technique that predicts unauthorized access, and exploits malfunction of computer networks. Traditional IDS struggle with classifying m... 详细信息
来源: 评论
An Algorithmic Approach to Intrusion Detection in Ad Hoc Wireless Networks Based on Artificial Intelligence
An Algorithmic Approach to Intrusion Detection in Ad Hoc Wir...
收藏 引用
Intelligent Control, Computing and Communications (IC3), International Conference on
作者: Shrikant V. Sonekar Pravin R. Kshirsagar Bhuvan Unhelkar Prasun Chakrabarti Balajee Maram Kamal Upreti Department of Computer Science & Engineering J D College of Engineering & Management Nagpur India Department of Electronics & Telecommunication Engineering J D College of Engineering & Management Nagpur India Department of Infornation Systems and Decision Sciences Muma College of Business University of South Florida Sarasata USA Department of Computer Science & Engineering Sir Padampat Singhania University Udaipur Rajasthan India Department of Computer Science and Artificial Intelligence SR University Warangal Telangana Department of Computer Science Christ University Ghaziabad India
The self-configured, autonomous, and framework-free modes of communication that mobile adhoc networks (MANETs) offer have revolutionized our culture. As a result, efforts have been made to explore ways to maximize the... 详细信息
来源: 评论
An Algorithmic Approach to Intrusion Detection in Ad Hoc Wireless Networks Based on Artificial Intelligence
An Algorithmic Approach to Intrusion Detection in Ad Hoc Wir...
收藏 引用
2025 International Conference on Intelligent Control, Computing and Communications, IC3 2025
作者: Sonekar, Shrikant V. Kshirsagar, Pravin R. Unhelkar, Bhuvan Chakrabarti, Prasun Maram, Balajee Upreti, Kamal J D College of Engineering & Management Department of Computer Science & Engineering Nagpur India J D College of Engineering & Management Department of Electronics & Telecommunication Engineering Nagpur India Muma College of Business University of South Florida Department of Infornation Systems and Decision Sciences Sarasata United States Sir Padampat Singhania University Department of Computer Science & Engineering Rajasthan Udaipur3313606 India Sr University Department of Computer Science and Artificial Intelligence Telangana Warangal506371 India Christ University Department of Computer Science Delhi NCR Ghaziabad India
The self-configured, autonomous, and framework-free modes of communication that mobile adhoc networks (MANETs) offer have revolutionized our culture. As a result, efforts have been made to explore ways to maximize the... 详细信息
来源: 评论
A Beetle Antennae Search-Based Sparrow Search Algorithm for Network Intrusion Detection
A Beetle Antennae Search-Based Sparrow Search Algorithm for ...
收藏 引用
Distributed Systems, computer Networks and Cybersecurity (ICDSCNC), International Conference on
作者: Ayub Baig R. Archana Reddy Muntather Muhsin Hassan Subramanya S G Hajari Manu Department of Infornation Technology Malla Reddy Engineering College for Women(UGC-Autonomous) Hyderabad India Department of Computer Science and Engineering SR University Warangal India Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of CSE Nitte Meenakshi Institute of Technology Bengaluru India Department of AI&ML Gokaraju Rangaraju Institute of Engineering and Technology Hyderabad India
Nowadays, the network Intrusion Detection System (IDS) is a crucial cybersecurity technique that predicts unauthorized access, and exploits malfunction of computer networks. Traditional IDS struggle with classifying m... 详细信息
来源: 评论
A New Sequential Systems of Linear Equations Algorithm of Feasible Descent for Inequality Constrained Optimization
收藏 引用
Acta Mathematica Sinica,English Series 2010年 第12期26卷 2399-2420页
作者: Jin Bao JIAN Dao Lan HAN Qing Juan XU College of Mathematics and Infornation Science Guangxi University Nanning 530004 P. R. China College of Mathematics and Computer Science Guangxi University for NationalitiesNanning 530006 P. R. China College of Electrical Engineering Guangxi University Nanning 530004 P. R. China Department of Mathematics Shanghai University Shanghai 200444 P. R. China College of Mathematical Science Guangxi Teachers Education University Nanning 530001 P. R. China
Based on a new efficient identification technique of active constraints introduced in this paper, a new sequential systems of linear equations (SSLE) algorithm generating feasible iterates is proposed for solving no... 详细信息
来源: 评论
A Cluster-Based Coverage-Preserved Node Scheduling Scheme in Wireless Sensor Networks
A Cluster-Based Coverage-Preserved Node Scheduling Scheme in...
收藏 引用
International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous)
作者: Shiow-Fen Hwang Yi-Yu Su Yi-Yo Lin Chi-Ren Dow Department of Infornation Engineering and Computer Science Feng Chia University FCU Taichung Taiwan
Wireless sensor networks consist of a large number of low-power, small-scale sensors with limited processing and communication capabilities. Such networks are usually applied to gather data from interested area or spe... 详细信息
来源: 评论