咨询与建议

限定检索结果

文献类型

  • 477 篇 会议
  • 78 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 565 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 344 篇 工学
    • 277 篇 计算机科学与技术...
    • 239 篇 软件工程
    • 109 篇 信息与通信工程
    • 50 篇 控制科学与工程
    • 38 篇 电气工程
    • 33 篇 生物工程
    • 28 篇 电子科学与技术(可...
    • 25 篇 安全科学与工程
    • 21 篇 交通运输工程
    • 20 篇 动力工程及工程热...
    • 18 篇 生物医学工程(可授...
    • 17 篇 机械工程
    • 13 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 10 篇 化学工程与技术
  • 140 篇 理学
    • 80 篇 数学
    • 37 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 25 篇 系统科学
    • 11 篇 化学
  • 95 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 27 篇 法学
    • 19 篇 社会学
  • 21 篇 医学
    • 19 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 教育学
  • 4 篇 农学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 19 篇 security
  • 15 篇 real-time system...
  • 14 篇 computational mo...
  • 14 篇 protocols
  • 13 篇 accuracy
  • 13 篇 training
  • 13 篇 convolutional ne...
  • 12 篇 authentication
  • 11 篇 wireless sensor ...
  • 11 篇 feature extracti...
  • 11 篇 artificial intel...
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 9 篇 optimization
  • 9 篇 data mining
  • 9 篇 servers
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 wireless communi...
  • 8 篇 predictive model...

机构

  • 6 篇 dept. of automat...
  • 6 篇 ufa state aviati...
  • 6 篇 dept. of softwar...
  • 5 篇 dept. of automat...
  • 4 篇 dept. of compute...
  • 4 篇 dept. of compute...
  • 4 篇 networking and i...
  • 4 篇 cyber security s...
  • 4 篇 dept. of informa...
  • 4 篇 dept. of compute...
  • 4 篇 sri lanka instit...
  • 3 篇 dept. of electri...
  • 3 篇 the hashemite un...
  • 3 篇 dept. of compute...
  • 3 篇 dept. of compute...
  • 3 篇 national univers...
  • 3 篇 dept. of digital...
  • 3 篇 dept. of compute...
  • 3 篇 saic motor ai la...
  • 3 篇 max planck insti...

作者

  • 6 篇 nikumani choudhu...
  • 6 篇 vulfin alexey
  • 5 篇 xi zhang
  • 5 篇 nataliia zaiets
  • 5 篇 lidiia vlasenko
  • 5 篇 nataliia lutska
  • 5 篇 farkas csilla
  • 5 篇 jong-hyouk lee
  • 4 篇 wijesekera dumin...
  • 4 篇 chen bing
  • 4 篇 vlasenko lidiia
  • 4 篇 lee jong-hyouk
  • 4 篇 sarantoglou geor...
  • 4 篇 zaiets nataliia
  • 4 篇 v. sreejith
  • 4 篇 weng jian
  • 4 篇 lutska nataliia
  • 4 篇 lee hoon jae
  • 4 篇 koushik reddy ch...
  • 4 篇 mesaritakis char...

语言

  • 550 篇 英文
  • 12 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Dept. of Computer and Network Engineering Dept. of Information Systems and Security"
565 条 记 录,以下是91-100 订阅
排序:
Selfish Users in Listen-Before-Talk Co-existence of Cellular-Wi-Fi networks: Counteraction Methods
Selfish Users in Listen-Before-Talk Co-existence of Cellular...
收藏 引用
International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless networks (WiOpt)
作者: Saibharath S Sudeepta Mishra Gazal Arora Anamika Sharma Chittaranjan Hota Dept. of Computer Science and Information systems BITS Pilani Hyderabad Campus India Dept. of Computer Science and Engineering IIT Ropar Punjab India
5G operates in the unlicensed spectrum to expand its capacity. This spectrum provides more uplink and downlink frequency bands in 5G to satisfy ultra-dense and scalability requirements. Wi-Fi is a prominent wireless t...
来源: 评论
FedStar Caching: Decision Center Assisted Federated Cooperative Edge Caching
FedStar Caching: Decision Center Assisted Federated Cooperat...
收藏 引用
IEEE International Conference on Human-Machine systems
作者: Sirvan Gharib Mohammad Mansour Kesargheh S. Jamal Seyedmohammadi Zohreh Hajiakhondi Jamshid Abouei Konstantinos N. Plataniotis Dept. of Electrical Engineering Yazd University Yazd Iran Inst. of Information Systems Engineering Concordia University Montreal Canada Dept. of Electrical Engineering Concordia University Montreal Canada Dept. of Electrical and Computer Engineering University of Toronto Toronto Canada
With the explosion of data, Wireless Edge Caching (WEC) has become a promising approach for locally accessing cached contents. Due to the limited storage capacity of local caching devices and the varying preferences o... 详细信息
来源: 评论
Weapon detection system for surveillance and security
Weapon detection system for surveillance and security
收藏 引用
2023 International Conference on IT Innovation and Knowledge Discovery, ITIKD 2023
作者: Khalid, Shehzad Waqar, Abdullah Ain Tahir, Hoor Ul Edo, Onome Christopher Tenebe, Imokhai Theophilus Bahria University Dept. of Computer Engineering Islamabad Pakistan Auburn University at Montgomery Department of Information Systems Alabama United States Mineta Transportation Institute San Jose State University CA United States
Weapon detection is a critical and serious topic in terms of public security and safety, however, it's a difficult and time-consuming operation. Due to the increase in demand for security, safety, and personal pro... 详细信息
来源: 评论
Coordinate Attention-enabled Ship Object Detection with Electro-optical Image  11
Coordinate Attention-enabled Ship Object Detection with Elec...
收藏 引用
11th International Conference on Computing and Pattern Recognition, ICCPR 2022
作者: Xu, Hongbin Jiang, Xiantao Yin, Tao Cen, Qi Zhang, Zhijian Song, Tian Yu, F. Richard Dept.Information Engineering Shanghai Maritime University Shanghai China Ningbo Special Equipment Inpection and Research Institute Ningbo China Dept. Electrical and Electronics Engineering Tokushima University Tokushima Japan Dept. Systems and Computer Engineering Carleton University Ottawa Canada
Shipping safety is one of the factors restricting the development of navigation. In particular, the route near the shore is prone to unknown risks due to the existence of multiple types of ships, the density of ships,... 详细信息
来源: 评论
Device Identification using network Traces in a Smart Home IoT network
Device Identification using Network Traces in a Smart Home I...
收藏 引用
International Symposium on Advanced networks and Telecommunication systems (ANTS)
作者: Jwngfu Brahma Rakesh Matam Nikumani Choudhury Dept. of Computer Science & Engineering Indian Institute of Information Technology Guwahati India Dept. of Computer Science & Information Systems Birla Institute of Technology & Science Hyderabad India
Device identification is a crucial aspect of securing networks, particularly in the context of the Internet of Things (IoT), where a vast variety of devices are interconnected. Recently, there has been significant res...
来源: 评论
A Comprehensive Threat Model for Autonomous Vehicle Communication security
A Comprehensive Threat Model for Autonomous Vehicle Communic...
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: Niranjan W. Meegammana Harinda Fernando Cyber Security Research Lab Shilpa Sayura Foundation Kandy Sri Lanka Dept. of Computer Systems Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
The rapid advancement of autonomous vehicles (AVs) promises to enhance transportation efficiency, reliability, and safety. However, these systems, particularly multi-channel vehicular communications, are vulnerable to... 详细信息
来源: 评论
Advancements in Jute Leaf Disease Detection: A Comprehensive Study Utilizing Machine Learning and Deep Learning Techniques
Advancements in Jute Leaf Disease Detection: A Comprehensive...
收藏 引用
Power, Electrical, and Electronics and Industrial Applications (PEEIACON), IEEE International Conference on
作者: Rezaul Haque Md Miraz Miah Shayma Sultana Hasib Fardin Abdullah Al Noman Abdullah Al-Sakib Md Kamrul Hasan Al Rafy Rahman Md Shihabur Shafiur Rahman Dept. of CSE East West University Dhaka Bangladesh Dept. of CSE BRAC University Dhaka Bangladesh Dept. of Management Information System International American University CA USA Dept. of Engineering Management Westcliff University CA USA Dept. of Information Technology Westcliff University CA USA Dept. of Cyber security Touro University CA USA Dept. of Computer Engineering Kyungdong University Gangwon-do Republic of Korea Dept. of Software Engineering Daffodil International University Dhaka Bangladesh
Detecting diseases in jute leaves is difficult due to the variability in how the diseases appear. Manually identifying these diseases is challenging because it requires expert knowledge and visual inspections take a l... 详细信息
来源: 评论
Secure data exchange system in software-defined networks of energy complex facilities
Secure data exchange system in software-defined networks of ...
收藏 引用
2021 International Conference on Electrotechnical Complexes and systems, ICOECS 2021
作者: Khayretdinov, Rinat Dautov, Damir Vulfin, Alexey Mironov, Konstantin Frid, Arkadij Ufa State Aviation Technical University Dept. of Computer Engineering and Information Security Ufa Russia
The analysis of threats to information security breaches was carried out and the corresponding countermeasures were provided by the levels of the SDN architecture. Tools (algorithms, software and architecture of the i... 详细信息
来源: 评论
Macula Swelling Detection using Retinal Fundus Images
Macula Swelling Detection using Retinal Fundus Images
收藏 引用
IEEE International Workshop on Imaging systems and Techniques (IST)
作者: Rukham Mumtaz Khan Fazal Saadat Ali Khan Fauzia Khan Rafia Hassan Dept. of Computer Engineering National University of Sciences and Technology Islamabad Pakistan Dept. of Information Security National University of Sciences and Technology Islamabad Pakistan Dept. of Computer Science University of Tartu Tartu Estonia Dept. of Software Engineering Bahria University Islamabad Pakistan
Diabetic Macular Edema (DME) is an advanced symptom of Diabetic Retinopathy (DR) and can lead to irreversible vision loss. Macular Edema (ME) is the swelling of the macula, the part of the eye accountable for thorough...
来源: 评论
Using AI and Natural Language Processing to Enhance Consumer Banking Decision-Making
Using AI and Natural Language Processing to Enhance Consumer...
收藏 引用
2024 International Conference on E-Mobility, Power Control and Smart systems, ICEMPS 2024
作者: Temara, Sheetal Samanthapudi, Sagar Varma Rohella, Piyush Gupta, Ketan Ashokkumar, S.R. University of The Cumberlands Dept of Computer & Information Sciences WilliamsburgKY United States The Polis Center Indiana University Purdue University Indianapolis Applied Data Science IndianapolisIN United States Payments & Commerce GoDaddy EdmondsWA United States University of The Cumberlands Dept. of Information Technology WilliamsburgKY United States Sri Eshwar College of Engineering Centre For Blockchain and Cyber Security Department of Computer and Communication Engineering Tamil Nadu Coimbatore India
This technical summary outlines the use of Artificial Intelligence (AI) and Natural Language Processing (NLP) to beautify patron banking decision-making. AI-based banking systems can autonomously identify patterns in ... 详细信息
来源: 评论