咨询与建议

限定检索结果

文献类型

  • 74 篇 会议
  • 14 篇 期刊文献

馆藏范围

  • 88 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52 篇 工学
    • 35 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 25 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 10 篇 电气工程
    • 9 篇 控制科学与工程
    • 8 篇 动力工程及工程热...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 5 篇 生物工程
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 4 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 2 篇 航空宇航科学与技...
  • 29 篇 理学
    • 17 篇 数学
    • 6 篇 物理学
    • 6 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 3 篇 化学
    • 3 篇 系统科学
  • 9 篇 管理学
    • 5 篇 图书情报与档案管...
    • 4 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 4 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 3 篇 药学(可授医学、理...
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 农学
    • 2 篇 作物学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学

主题

  • 5 篇 throughput
  • 5 篇 network topology
  • 4 篇 systematics
  • 4 篇 resource managem...
  • 4 篇 protocols
  • 3 篇 bibliographies
  • 3 篇 wireless communi...
  • 3 篇 interference
  • 3 篇 diffusion proces...
  • 3 篇 computers
  • 3 篇 organizations
  • 3 篇 cloud computing
  • 3 篇 digital signal p...
  • 2 篇 power demand
  • 2 篇 internet of thin...
  • 2 篇 scalability
  • 2 篇 network topology...
  • 2 篇 matrix represent...
  • 2 篇 deep learning
  • 2 篇 simulation

机构

  • 4 篇 dept. of network...
  • 3 篇 waseda universit...
  • 3 篇 dept. of signal ...
  • 2 篇 research institu...
  • 2 篇 computer science...
  • 2 篇 wireless intelli...
  • 2 篇 dept. of compute...
  • 2 篇 dept. of comput....
  • 2 篇 hellenic aerospa...
  • 2 篇 dept. of comput....
  • 2 篇 institute for da...
  • 2 篇 king faisal univ...
  • 2 篇 dept. computer s...
  • 2 篇 computer enginee...
  • 2 篇 dept. of data co...
  • 2 篇 dept. of compute...
  • 2 篇 dept. of compute...
  • 2 篇 department of co...
  • 2 篇 dept. of electro...
  • 2 篇 dept. of electri...

作者

  • 5 篇 wang jian
  • 5 篇 hu erh-wen
  • 5 篇 su bogong
  • 4 篇 m m hafizur rahm...
  • 3 篇 hirasawa shigeic...
  • 3 篇 gonzalo mateos
  • 3 篇 nikumani choudhu...
  • 3 篇 yagi hideki
  • 3 篇 manzano joseph
  • 3 篇 moustafa m. nasr...
  • 3 篇 antonio g. marqu...
  • 3 篇 tan nguyen duy
  • 3 篇 santiago segarra
  • 2 篇 shoeibi afshin
  • 2 篇 rasoul shafipour
  • 2 篇 ercetin ozgur
  • 2 篇 yiu-ming cheung
  • 2 篇 xin liu
  • 2 篇 hidetomo sakaino
  • 2 篇 kobayashi manabu

语言

  • 86 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"机构=Dept. of Data Communications and Computer Networks"
88 条 记 录,以下是11-20 订阅
排序:
Biometric in Cyber Security: A Mini Review
Biometric in Cyber Security: A Mini Review
收藏 引用
International Conference on Artificial Intelligence in Information and Communication (ICAIIC)
作者: Elhaam Abdulrahman Debas Razan Sulaiman Alajlan M M Hafizur Rahman Dept. of Computer Networks & Communications CCSIT King Faisal University Al Hofuf Saudi Arabia
Our lives totally depend on computers and mobile devices. Nowadays, we see a massive development in the digital world that makes it easy to stay in touch with friends and family and even work remotely. The growth led ... 详细信息
来源: 评论
A Systematic Literature Review on Symmetric and Asymmetric Encryption Comparison Key Size
A Systematic Literature Review on Symmetric and Asymmetric E...
收藏 引用
Smart data Intelligence (ICSMDI), International Conference on
作者: Mohammed Althamir Abdullah Alabdulhay Muhammad M Yasin Dept. of Computer Networks and Communications CCSIT King Faisal University Al Hassa Saudi Arabia
Symmetric and asymmetric encryption methods are used when a web browser is used to reply to emails, submit website forms, and perform similar activities. Key size is essential to enable security, which means the longe... 详细信息
来源: 评论
A Mini Literature Review on Challenges and Opportunity in Threat Intelligence
A Mini Literature Review on Challenges and Opportunity in Th...
收藏 引用
International Conference on Artificial Intelligence in Information and Communication (ICAIIC)
作者: Mohammed A Althamir Jawhara Z Boodai M M Hafizur Rahman Dept. of Computer Networks & Communications CCSIT King Faisal University Al Hofuf Saudi Arabia
Cybersecurity worldwide has become a challenge for organisations and individuals to be protected against all attacks and malware. Working closely and directly with cyber-attacks and attackers has become a challenge to... 详细信息
来源: 评论
Malware Detection Based on Machine Learning Methods, Analysis, and Tools
Malware Detection Based on Machine Learning Methods, Analysi...
收藏 引用
International Conference on communications and Networking, ComNet
作者: Almaha Almuqren Mounir Frikha Abdullah Albuali Mohammed Amin Almaiah dept. Department of Computer Networks and Communications King Faisal University Al Hofuf Saudi Arabia dept. Department of Computer Science King Abdullah the II IT School The University of Jordan Amman Jordan
Malware identification is essential for safeguarding digital systems from cyber attacks, and machine learning techniques are proving to be efficient in this field. This systematic literature re-view thoroughly analyze... 详细信息
来源: 评论
Cyber Security in Fog Computing Using Blockchain: A Mini Literature Review
Cyber Security in Fog Computing Using Blockchain: A Mini Lit...
收藏 引用
International Conference on Artificial Intelligence in Information and Communication (ICAIIC)
作者: Norah Arif Alhumam Noura Saud Alyemni M M Hafizur Rahman Dept. of Computer Networks & Communications King Faisal University CCSIT Al Hofuf Al Hassa Saudi Arabia
Due to its many uses and ability to save and restore data, whether for businesses or individuals, cloud computing has become one of the mainstays in the technology world over the past few years. However, the limitatio... 详细信息
来源: 评论
Cybersecurity Threats in Line with Awareness in Saudi Arabia
Cybersecurity Threats in Line with Awareness in Saudi Arabia
收藏 引用
2021 International Conference on Information Technology, ICIT 2021
作者: Alhashim, Shaima Salah Hafizur Rahman, M.M. King Faisal University CCSIT Dept. of Computer Networks and Communications Al Hassa31982 Saudi Arabia
This study aims at exploring the cybersecurity threats in line with the awareness of Saudi Arabia nationals. This paper analyzes the recent threats reports conducted by IBM, McAfee and Kaspersky. Then this paper match... 详细信息
来源: 评论
Construction Methods for Error Correcting Output Codes Using Constructive Coding and Their System Evaluations
Construction Methods for Error Correcting Output Codes Using...
收藏 引用
2022 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2022
作者: Hirasawa, Shigeichi Kumoi, Gendo Yagi, Hideki Kobayashi, Manabu Goto, Masayuki Inazumi, Hiroshige Waseda University Center for Data Science Tokyo Japan The University of Electro-Communications Dept. of Computer & Network Eng. Tokyo Japan Waseda University Dept. of Ind. & Mgmt. Systems Eng Tokyo Japan Aoyama Gakuin University Dept. of Social Informatics Tokyo Japan
Consider M-valued (Mgeq3) classification systems realized by combination of N(Ngeqlceillog_{2}Mrceil) binary classifiers. Such a construction method is called an Error Correcting Output Code (ECOC). First, focusing on... 详细信息
来源: 评论
Neural Network Coding in data Compression Systems in Communication Channels  6
Neural Network Coding in Data Compression Systems in Communi...
收藏 引用
6th International Scientific Conference on Information, Control, and Communication Technologies, ICCT 2022
作者: Berezkin, Aleksandr Kukunin, Dmitry Kirichek, Ruslan State University of Telecommunications Bonch-Bruevich Saint-Petersburg Dept. of Software Engineering and Computer Science St. Petersburg Russia Bonch-Bruevich Saint-Petersburg State University of Telecommunications Dept. of Communication Networks and Data Transmission St. Petersburg Russia
The article describes the use of a neural network implementation of BCH codes encoding and decoding devices for error correction in on-the-fly data compression systems. The user payload vector is encoded in the BCH co... 详细信息
来源: 评论
Cost-effectiveness Analysis of a Shifted Completely Connected Network for Massively Parallel computer Systems
Cost-effectiveness Analysis of a Shifted Completely Connecte...
收藏 引用
Computing Innovation, Intelligence, Technologies and Education (CIITE), International Conference on
作者: Mohammed N. M. Ali M. M. Hafizur Rahman Hejab Al Fawareh Dept. of Computer Science and Technology Xiamen University Malaysia Bandar Sunsuria Sepang Selangor Malaysia Dept. of Comp. Networks and Communications CCSIT King Faisal University Al Ahsa Al Hofuf Saudi Arabia School of Computing and Data Science Xiamen University Malaysia Bandar Sunsuria Sepang Selangor Malaysia
The Cost-Effectiveness Analysis (CEA) is a crucial tool for comparing the impact of newly developed technologies to their associated costs. CEA evaluates the costs of two or more new products by examining the benefits... 详细信息
来源: 评论
IsoGAN: A Gan Based Method for Isometric View Images Generation From Three Orthographic Views Contour Drawings
IsoGAN: A Gan Based Method for Isometric View Images Generat...
收藏 引用
Image Processing Challenges (ICIPC), IEEE International Conference on
作者: Thao Nguyen Phuong Hidetomo Sakaino Vinh Nguyen Duy Data Solution Dept. (FCJ.ABC) FPT Consulting Japan AI-Image Group FPT Software Department of Computer Science and Communications Engineering Waseda University
Reconstructing the 2D or 3D shape of an object from several 2D drawings is a crucial problem in computer-aided design (CAD). Despite the advancement of deep neural networks, automatic isometric image generation from t... 详细信息
来源: 评论