咨询与建议

限定检索结果

文献类型

  • 74 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 77 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36 篇 工学
    • 33 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 19 篇 信息与通信工程
    • 6 篇 控制科学与工程
    • 6 篇 交通运输工程
    • 6 篇 生物工程
    • 5 篇 仪器科学与技术
    • 4 篇 机械工程
    • 4 篇 电气工程
    • 4 篇 生物医学工程(可授...
    • 4 篇 网络空间安全
    • 3 篇 安全科学与工程
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 航空宇航科学与技...
    • 2 篇 农业工程
  • 20 篇 理学
    • 12 篇 数学
    • 6 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 化学
    • 2 篇 系统科学
  • 13 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 2 篇 农学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 5 篇 routing
  • 4 篇 conferences
  • 4 篇 roads
  • 4 篇 blockchain
  • 4 篇 software
  • 4 篇 privacy
  • 3 篇 simulation
  • 3 篇 relays
  • 3 篇 task analysis
  • 3 篇 delays
  • 3 篇 bandwidth
  • 3 篇 data communicati...
  • 3 篇 energy consumpti...
  • 3 篇 wireless sensor ...
  • 3 篇 location awarene...
  • 3 篇 protocols
  • 3 篇 data collection
  • 3 篇 vehicular ad hoc...
  • 2 篇 scalability
  • 2 篇 automation

机构

  • 23 篇 college of compu...
  • 18 篇 inner mongolia a...
  • 11 篇 inner mongolia k...
  • 9 篇 inner mongolia k...
  • 6 篇 inner mongolia k...
  • 4 篇 engineering rese...
  • 4 篇 inner mongolia u...
  • 3 篇 inner mongolia k...
  • 3 篇 college of compu...
  • 2 篇 college of compu...
  • 2 篇 ordos dongsheng ...
  • 2 篇 inner mongolia a...
  • 2 篇 inner mongolia a...
  • 2 篇 inner mongolia k...
  • 2 篇 inner mongolia a...
  • 2 篇 inner mongolia p...
  • 1 篇 inner mongolia a...
  • 1 篇 inner mongolia a...
  • 1 篇 jiangsu high tec...
  • 1 篇 inner mongolia u...

作者

  • 24 篇 xiangyu bai
  • 14 篇 bai xiangyu
  • 10 篇 baoqi huang
  • 8 篇 xu gang
  • 8 篇 kexin zhou
  • 8 篇 huang baoqi
  • 7 篇 bo cui
  • 7 篇 gang xu
  • 7 篇 cui bo
  • 7 篇 jia bing
  • 6 篇 zhaoran wang
  • 5 篇 wang zhaoran
  • 5 篇 bing jia
  • 4 篇 wenhan hou
  • 4 篇 hao lifei
  • 4 篇 zhou kexin
  • 3 篇 lei yao
  • 3 篇 qi zhihan
  • 3 篇 wuyungerile li
  • 3 篇 li wuyungerile

语言

  • 77 篇 英文
检索条件"机构=Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing College of Computer"
77 条 记 录,以下是11-20 订阅
排序:
Research on the Application of Drone Remote Sensing and Target Detection in Civilian Fields  5
Research on the Application of Drone Remote Sensing and Targ...
收藏 引用
5th International Conference on High Performance Big Data and Intelligent Systems, HDIS 2023
作者: Gao, Xiaochen Bai, Xiangyu Zhou, Kexin Key of Wireless Networking and Mobile Computing College of Computer Inner Mongolia University Inner Mongolia Hohhot China
Unmanned aerial vehicle (UAV) remote sensing has evolved as an efficient means of geospatial data acquisition. This paper provides a comprehensive review of the key technologies enabling intelligent analysis of UAV re... 详细信息
来源: 评论
Node Importance Algorithm of Opportunistic Network Based on Social Properties of Nodes  26
Node Importance Algorithm of Opportunistic Network Based on ...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Xu, Gang Hao, Xinyu Qi, Zhihan Huang, Baoqi Inner Mongolia University College of Computer Science Hohhot China Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Hohhot China
Recent research on opportunistic network routing protocols has found that the efficiency of message forwarding varies with the selection of next-hop nodes, so it is of great significance to select the appropriate next... 详细信息
来源: 评论
A Review of Vertical Switching Algorithms for Heterogeneous wireless Networks  8
A Review of Vertical Switching Algorithms for Heterogeneous ...
收藏 引用
8th International Conference on computer and Communication Systems, ICCCS 2023
作者: Zhou, Kexin Bai, Xiangyu Wang, Zhaoran School of Computer Science Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Inner Mongolia University Inner Mongolia Autonomous Region Hohhot China
It is expected that the next generation wireless network will provide users with excessive mobile wireless services and cover the ubiquitous network at any time. It is urgent to further study the integration and inter... 详细信息
来源: 评论
Detecting Phishing Scams on Ethereum Using Graph Convolutional Networks with Conditional Random Field  24
Detecting Phishing Scams on Ethereum Using Graph Convolution...
收藏 引用
24th IEEE International Conference on High Performance computing and Communications, 8th IEEE International Conference on Data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Hou, Wenhan Cui, Bo Li, Ru College of Computer Science Inner Mongolia University Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing Hohhot China
As an innovative technology of great significance, blockchain has been widely used in various walks of life. Meanwhile, scams have experienced rapid growth on the blockchain, the phishing scam is a classic fraud among... 详细信息
来源: 评论
Comparation of UAV Path Planning for Logistics Distribution  6th
Comparation of UAV Path Planning for Logistics Distribution
收藏 引用
6th International Conference on Intelligent Transportation Engineering, ICITE 2021
作者: Wang, Guotai Bai, Xiangyu Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing College of Computer Science Inner Mongolia University Hohhot China
In recent years, unmanned aerial vehicle (UAV), has been increasingly applied to research in various fields due to its small size and fast speed. Among them, the path planning of UAV under various actual environmental... 详细信息
来源: 评论
An Improved Spray and Wait Algorithm Based on Q-learning in Delay Tolerant Network
An Improved Spray and Wait Algorithm Based on Q-learning in ...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Lei Yao Xiangyu Bai Kexin Zhou Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing College of Computer Inner Mongolia University Hohhot China
Unlike traditional networks, Delay Tolerant Network (DTN) does not have a stable end-to-end connection, so it adopts the store-carry-forward transmission mode. In DTN routing, the context information of nodes and mess... 详细信息
来源: 评论
Vertical switching algorithm of fuzzy logic heterogeneous networks based on reinforcement learning assistance
Vertical switching algorithm of fuzzy logic heterogeneous ne...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Kexin Zhou Xiangyu Bai Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing College of Computer Inner Mongolia University Hohhot China
In response to the challenge of users lacking access to accurate network attributes, this paper proposes a heterogeneous network vertical handover algorithm that combines a fuzzy logic system with reinforcement learni... 详细信息
来源: 评论
CLPSD: Detecting Ethereum Phishing Scams based on Curriculum Learning
CLPSD: Detecting Ethereum Phishing Scams based on Curriculum...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wenhan Hou Bo Cui Yongxin Chen Ru Li Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing College of Computer Science Inner Mongolia University Hohhot China
Phishing scams have become one of the primary frauds on Ethereum, leading to substantial financial losses for users. Therefore, developing an effective phishing detection method for Ethereum holds significant importan...
来源: 评论
Seed Node Selection Algorithm Based on Node Influence in Opportunistic Offloading  28
Seed Node Selection Algorithm Based on Node Influence in Opp...
收藏 引用
28th IEEE Symposium on computers and Communications, ISCC 2023
作者: Tang, Qi Hang, Ruijie Xu, Gang Zhang, Gaofeng Li, Shuai Huang, Baoqi College of Computer Science Inner Mongolia University Hohhot010021 China Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Hohhot010021 China Ordos Dongsheng Manshi Middle School Ordos017000 China
As a kind of mobile traffic offloading technology, opportunistic triage downloads and distributes data through seed nodes. Therefore, how to efficiently and accurately select suitable seed nodes becomes a key problem ... 详细信息
来源: 评论
2-Hop Routing Strategy for Overlapping Communities based on Social Intimacy  25
2-Hop Routing Strategy for Overlapping Communities based on ...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Liu, Zhanguo Xu, Gang Cheng, Yuan Huang, Baoqi Bai, Xiangyu Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Hohhot010021 China Inner Mongolia University College of Computer Science Hohhot010021 China
In an opportunistic network with social attributes, the selection of relay nodes is mainly done according to community division. In the social opportunity network, community partition is the key to reducing data forwa... 详细信息
来源: 评论