咨询与建议

限定检索结果

文献类型

  • 6 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 4 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 生物工程
  • 4 篇 理学
    • 2 篇 数学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 1 篇 computer science
  • 1 篇 public key crypt...
  • 1 篇 peer to peer com...
  • 1 篇 proposals
  • 1 篇 network servers
  • 1 篇 computer display...
  • 1 篇 ad hoc networks
  • 1 篇 fuzzy neural net...
  • 1 篇 quality of servi...
  • 1 篇 oilseeds
  • 1 篇 authentication
  • 1 篇 certification
  • 1 篇 computer crime
  • 1 篇 monitoring
  • 1 篇 web crawler
  • 1 篇 internet
  • 1 篇 algorithm design...
  • 1 篇 computer worms
  • 1 篇 technology manag...
  • 1 篇 routing protocol...

机构

  • 1 篇 college of compu...
  • 1 篇 jiangsu provinci...
  • 1 篇 school of comput...
  • 1 篇 school of comput...
  • 1 篇 college of busin...
  • 1 篇 department of co...
  • 1 篇 college of telec...
  • 1 篇 school of comput...
  • 1 篇 school of scienc...
  • 1 篇 guangdong provin...
  • 1 篇 school of comput...
  • 1 篇 department ofcom...
  • 1 篇 school of econom...
  • 1 篇 school of mathem...
  • 1 篇 school of comput...

作者

  • 1 篇 fei yu
  • 1 篇 li yao
  • 1 篇 li qiukun
  • 1 篇 du dengyu
  • 1 篇 myung-kyun kim
  • 1 篇 li ying
  • 1 篇 nguyen quang tun...
  • 1 篇 linfeng zhang
  • 1 篇 pan xiang
  • 1 篇 balasubramaniyan...
  • 1 篇 d. xuan
  • 1 篇 yue hu
  • 1 篇 song haoran
  • 1 篇 x. fu
  • 1 篇 guiping liao
  • 1 篇 heesung jun
  • 1 篇 zhi xiaoli
  • 1 篇 liao qiuyan
  • 1 篇 tong weiqin
  • 1 篇 liang fei

语言

  • 6 篇 英文
  • 1 篇 中文
检索条件"机构=School of Computer Andinformation Engineering"
7 条 记 录,以下是1-10 订阅
排序:
Research on the Construction of Digitization Protection Platform for Ethnic Food Resources  22
Research on the Construction of Digitization Protection Plat...
收藏 引用
5th International Conference on computer Science and Software engineering, CSSE 2022
作者: Li, Qiukun Liao, Qiuyan Pan, Xiang Liang, Fei School of Computer AndInformation Engineering Guangxi Vocational Normal University China
Digital method is an effective way to protect the intangible cultural heritage food resources. In this paper, with the development background of modern digital transformation, the use of "Internet plus", web... 详细信息
来源: 评论
The service template composition method based on separation-of-concerns
The service template composition method based on separation-...
收藏 引用
IEEE International Conference on Progress in Informatics and Computing (PIC)
作者: Li, Ying Yue, Hu Tong, Weiqin Zhi, Xiaoli School of Computer Engineering and Science Shanghai University Shanghai China School of Mathematics Andinformation Technology Nanjing XiaoZhuang University Nanjing China
For reducing the complexity, improving the reusability and shorten the composition period, the service composition process is proposed to be divided into service template composition based on functional planning and t... 详细信息
来源: 评论
Peanut maturity detection assessment using cross-layer multi-perception neural network based on hyperspectral sensory image feature observation
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第4期46卷 9393-9407页
作者: Balasubramaniyan, M. Navaneethan, C. School of Computer Science Engineering andInformation Systems VIT University Tamil Nadu Vellore India
Artificial intelligence has played a significant role in the expansion of the agriculture industry in recent times by evaluating data and making recommendations for better production. An automated method for determini... 详细信息
来源: 评论
Group-based public-key management for self-securing large mobile ad-hoc networks
Group-based public-key management for self-securing large mo...
收藏 引用
International Forum on Strategic Technology, IFOST
作者: Nguyen Van Vinh Myung-Kyun Kim Heesung Jun Nguyen Quang Tung School of Computer Engineering andInformation Technology University of Ulsan Ulsan South Korea
For securing mobile ad-hoc networks, asymmetric key cryptosystem is one of effective technologies for encryption and authentication. However, for public-key distribution, the assumption about the availability of on-li... 详细信息
来源: 评论
Research on Precise Demand Forecast of Retail Commodities Based on LSTM-ARIMA Joint Model
Research on Precise Demand Forecast of Retail Commodities Ba...
收藏 引用
2021 International Conference on Advances in Optics and Computational Sciences, ICAOCS 2021
作者: Song, Haoran Du, Dengyu Li, Yao College of Telecommunications AndInformation Engineering Nanjing University of Posts and Telecommunications Nanjing Jiangsu210003 China College of Computer Science Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China School of Economics Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China
Aiming at the retail forecasting problem, this article uses software such as MATLAB, SPSS, and Python as tools, and uses dual correlation analysis, LSTM neural network-ARIMA joint model, and BP neural network-based su... 详细信息
来源: 评论
Intrusion detection based on fuzzy reasoning
Intrusion detection based on fuzzy reasoning
收藏 引用
26th Chinese Control Conference, CCC 2007
作者: Fei, Yu Yue, Shen Guiping, Liao Linfeng, Zhang Cheng, Xu School of Computer Andinformation Engineering Hunan Agricultural University Changsha 410128 China Guangdong Province Key Lab. of Electronic Commerce Market Application Technology Guangdong University of Business Studies Guangzhou 510320 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou 2150063 China
The paper proposes a new network intrusion detection system based on fuzzy neural network by redesigning the intrusion detection system's architecture and arithmetic. In order to overcome the difficulty of specify... 详细信息
来源: 评论
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems
iLOC: An invisible LOCalization Attack to Internet Threat Mo...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: X. Wang W. Yu X. Fu D. Xuan W. Zhao Department of Computer Scienceand Engineering Ohio State Uinversity Columbus OH USA Department ofComputer Science Texas A and M University College Station TX USA College of Business andInformation Systems Dakota State University Madison SD USA School of Science Rensselaer Polytechnic Institute Troy NY USA
In this paper, we study a new class of attacks, the i nvisible LOC alization ( iLOC ) attack, which can accurately and invisibly localize monitors of Internet threat monitoring (ITM) systems, a class of widely deplo... 详细信息
来源: 评论