咨询与建议

限定检索结果

文献类型

  • 74 篇 会议
  • 14 篇 期刊文献

馆藏范围

  • 88 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52 篇 工学
    • 35 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 25 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 10 篇 电气工程
    • 9 篇 控制科学与工程
    • 8 篇 动力工程及工程热...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 5 篇 生物工程
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 4 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 2 篇 航空宇航科学与技...
  • 29 篇 理学
    • 17 篇 数学
    • 6 篇 物理学
    • 6 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 3 篇 化学
    • 3 篇 系统科学
  • 9 篇 管理学
    • 5 篇 图书情报与档案管...
    • 4 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 4 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 3 篇 药学(可授医学、理...
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 农学
    • 2 篇 作物学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学

主题

  • 5 篇 throughput
  • 5 篇 network topology
  • 4 篇 systematics
  • 4 篇 resource managem...
  • 4 篇 protocols
  • 3 篇 bibliographies
  • 3 篇 wireless communi...
  • 3 篇 interference
  • 3 篇 diffusion proces...
  • 3 篇 computers
  • 3 篇 organizations
  • 3 篇 cloud computing
  • 3 篇 digital signal p...
  • 2 篇 power demand
  • 2 篇 internet of thin...
  • 2 篇 scalability
  • 2 篇 network topology...
  • 2 篇 matrix represent...
  • 2 篇 deep learning
  • 2 篇 simulation

机构

  • 4 篇 dept. of network...
  • 3 篇 waseda universit...
  • 3 篇 dept. of signal ...
  • 2 篇 research institu...
  • 2 篇 computer science...
  • 2 篇 wireless intelli...
  • 2 篇 dept. of compute...
  • 2 篇 dept. of comput....
  • 2 篇 hellenic aerospa...
  • 2 篇 dept. of comput....
  • 2 篇 institute for da...
  • 2 篇 king faisal univ...
  • 2 篇 dept. computer s...
  • 2 篇 computer enginee...
  • 2 篇 dept. of data co...
  • 2 篇 dept. of compute...
  • 2 篇 dept. of compute...
  • 2 篇 department of co...
  • 2 篇 dept. of electro...
  • 2 篇 dept. of electri...

作者

  • 5 篇 wang jian
  • 5 篇 hu erh-wen
  • 5 篇 su bogong
  • 4 篇 m m hafizur rahm...
  • 3 篇 hirasawa shigeic...
  • 3 篇 gonzalo mateos
  • 3 篇 nikumani choudhu...
  • 3 篇 yagi hideki
  • 3 篇 manzano joseph
  • 3 篇 moustafa m. nasr...
  • 3 篇 antonio g. marqu...
  • 3 篇 tan nguyen duy
  • 3 篇 santiago segarra
  • 2 篇 shoeibi afshin
  • 2 篇 rasoul shafipour
  • 2 篇 ercetin ozgur
  • 2 篇 yiu-ming cheung
  • 2 篇 xin liu
  • 2 篇 hidetomo sakaino
  • 2 篇 kobayashi manabu

语言

  • 86 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"机构=Dept. of Data Communications and Computer Networks"
88 条 记 录,以下是1-10 订阅
排序:
Holistic Design of Economical and Secure data Centers for Developing Countries: A Free Integrative Approach  21
Holistic Design of Economical and Secure Data Centers for De...
收藏 引用
2024 IEEE/ACS 21st International Conference on computer Systems and Applications, AICCSA 2024
作者: Bouri, Mohamed Ali Kammoun, Habib M. Aouicha, Mohamed Ben Dept. Computer Sciences and Communications Data Engineering and Semantics Sfax Tunisia University of Sfax Dept. Computer Sciences and Communications Research Groups in Intelligent Machines Sfax Tunisia University of Sfax Dept. Computer Sciences and Communications Data Engineering and Semantics Sfax Tunisia
This proposal aims to suggest improvements for the article titled 'Low-Cost data Centers in Developing Countries' with the aim of enhancing its content, relevance, and practicality. Our expertise in data infra...
来源: 评论
A Systematic Literature Review on Symmetric and Asymmetric Encryption Comparison Key Size  3
A Systematic Literature Review on Symmetric and Asymmetric E...
收藏 引用
3rd International Conference on Smart data Intelligence, ICSMDI 2023
作者: Althamir, Mohammed Alabdulhay, Abdullah Yasin, Muhammad M King Faisal University Ccsit Dept. of Computer Networks and Communications Al Hassa31982 Saudi Arabia
Symmetric and asymmetric encryption methods are used when a web browser is used to reply to emails, submit website forms, and perform similar activities. Key size is essential to enable security, which means the longe... 详细信息
来源: 评论
Holistic Design of Economical and Secure data Centers for Developing Countries: A Free Integrative Approach
Holistic Design of Economical and Secure Data Centers for De...
收藏 引用
ACS/IEEE International Conference on computer Systems and Applications
作者: Mohamed Ali Bouri Habib M. Kammoun Mohamed Ben Aouicha Dept. Computer Sciences and Communications Data Engineering and Semantics Sfax Tunisia Dept. Computer Sciences and Communications Research Groups in Intelligent Machines University of Sfax Sfax Tunisia Dept. Computer Sciences and Communications Data Engineering and Semantics University of Sfax Sfax Tunisia
This proposal aims to suggest improvements for the article titled “Low-Cost data Centers in Developing Countries” with the aim of enhancing its content, relevance, and practicality. Our expertise in data infrastruct... 详细信息
来源: 评论
A Review Paper for the Role of Cryptography in Network Security  4
A Review Paper for the Role of Cryptography in Network Secur...
收藏 引用
4th International Conference on Electrical, Control and Instrumentation Engineering, ICECIE 2022
作者: Alshehri, Jawaher Alhamed, Almaha King Faisal University Ccsit Dept. of Computer Networks & Communications. Al Hassa Al Hofuf31982 Saudi Arabia
Protecting the security and privacy of data has become extremely important in this period, especially with the increase in new technologies and the adoption of government and private agencies in converting all procedu... 详细信息
来源: 评论
A Mini Literature Review on Integrating Cybersecurity for Business Continuity
A Mini Literature Review on Integrating Cybersecurity for Bu...
收藏 引用
International Conference on Artificial Intelligence in Information and Communication (ICAIIC)
作者: Safa Altaha M M Hafizur Rahman Dept. of Computer Networks & Communications King Faisal University Saudi Arabia
Governments, organizations, and companies shall implement some measures to ensure the security and continuity of their business operations especially those with high criticality and availability. If cyber threats can ... 详细信息
来源: 评论
Virtual Cluster Security Challenges and Solutions in Cloud Computing Environments
Virtual Cluster Security Challenges and Solutions in Cloud C...
收藏 引用
International Conference on communications and Networking, ComNet
作者: Almaha Almuqren Hanan Alsuwaelim Mounir Frikha Abdullah Albuali dept. Department of Computer Networks and Communications King F'aisal University Al Hofuf Saudi Arabia
Virtual cluster environments in cloud computing offer significant advantages, particularly in terms of scalability, resource flexibility, and optimization. However, these benefits are accompanied by distinct security ... 详细信息
来源: 评论
Performance Analysis for Biometric Identification Systems with Nonlegitimate Users
Performance Analysis for Biometric Identification Systems wi...
收藏 引用
2022 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2022
作者: Yagi, Hideki Hirasawa, Shigeichi University of Electro-Communications Dept. of Computer and Network Engineering Tokyo Japan Waseda University Center for Data Science Tokyo Japan
The biometric identification system, introduced by Willems et al., is a mathematical model to identify users based on their physical features. Although the maximum rate of the number of users which are reliably dealt ... 详细信息
来源: 评论
LIDS: Lightweight Dynamic Scheduling Technique for 6G-enabled Massive LoRa based IoT Systems
LIDS: Lightweight Dynamic Scheduling Technique for 6G-enable...
收藏 引用
2022 IEEE GLOBECOM Workshops, GC Wkshps 2022
作者: Kumbam, Akshitha Choudhury, Nikumani Nasralla, Moustafa M. Birla Institute of Technology & Science Dept. of Computer Science & Information Systems Pilani Hyderabad India Prince Sultan University Dept. of Communications & Networks Engineering Riyadh Saudi Arabia
The sixth-generation (6G) wireless communication networks are envisioned to deliver improved Quality of Services (QoS) such as data-rate, latency, localization, etc., compared to 5G services. This demand will mainly a... 详细信息
来源: 评论
Effect of Hamming Distance on Performance of ECOC with Estimated Binary Classifiers
Effect of Hamming Distance on Performance of ECOC with Estim...
收藏 引用
2022 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2022
作者: Kumoi, Gendo Yagi, Hideki Kobayashi, Manabu Hirasawa, Shigeichi Waseda University Center for Data Science Tokyo Japan University of Electro-Communications Dept. of Computer & Network Eng. Tokyo Japan
Error-Correcting Output Coding (ECOC) is a method for constructing a multi-valued classifier using a combination of binary classifiers. The effectiveness of ECOC for multivalued classification problems has been demons... 详细信息
来源: 评论
A Dual-Port, and Single-Element Planar Inverted-F Antenna for Current 4G/5G Portable Applications  21
A Dual-Port, and Single-Element Planar Inverted-F Antenna fo...
收藏 引用
21st International Multi-Conference on Systems, Signals and Devices, SSD 2024
作者: Alja'Afreh, Saqer S. Altakhaineh, Amjaad T. Al-Shamaileh, Mallak H. Matarneh, Aser M Daoud, Omar R. Al-Khawaldah I, Mohammad School of Engineering and Computing American International University Electrical and Computing Engineering Al-Jahra Kuwait Pioneers International Academy Data Science and Machine Learning Dept. Amman Jordan Al-Ahliyya Amman University Communications and Computer Engineering Amman Jordan
A first-hand, low-profile, two-port planar inverted-F antenna is proposed for current 4G/5G sub-3 GHz hand-portable multiple-input and multiple-output (MIMO) applications. The design features a profile of about 5 mm a... 详细信息
来源: 评论