咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是91-100 订阅
排序:
Instance Retrieval Using Region of Interest Based CNN Features
收藏 引用
Journal of New Media 2019年 第2期1卷 87-99页
作者: Jingcheng Chen Zhili Zhou Zhaoqing Pan Ching-nung Yang Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Department of Electrical and computer Engineer University of WinsorN9B3P4WinsorONCanada Department of Computer Science and Information Engineering National Dong Hwa University ShoufengHualien 974Taiwan
Recently, image representations derived by convolutional neural networks(CNN) have achieved promising performance for instance retrieval, and they outperformthe traditional hand-crafted image features. However, most o... 详细信息
来源: 评论
Coverless Information Hiding Based on the Molecular Structure Images of Material
收藏 引用
computers, Materials & Continua 2018年 第2期54卷 197-207页
作者: Yi Cao Zhili Zhou Xingming Sun Chongzhi Gao School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNO.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Electrical and computer Engineering University of Windsor401 Sunset AvenueWindsorONCanada N9B 3P4 School of Computer Science Guangzhou UniversityWaihuanxi RoadNo.230Guangzhou510006China
The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the *** this way,it is hard to resist the detection of steganalysi... 详细信息
来源: 评论
Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage
收藏 引用
computers, Materials & Continua 2019年 第1期58卷 135-151页
作者: Zhiliang Deng Yongjun Ren Yepeng Liu Xiang Yin Zixuan Shen Hye-Jin Kim School of Information and Control Nanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science&TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China College of Information Engineering Yangzhou UniversityYangzhou225127China Business Administration Research Institute Sungshin W.UniversitySeoulKorea
Cloud storage represents the trend of intensive,scale and specialization of information technology,which has changed the technical architecture and implementation method of electronic records ***,it will provide a con... 详细信息
来源: 评论
Image Emotion Classification network Based on Multilayer Attentional Interaction,Adaptive Feature Aggregation
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4273-4291页
作者: Xiaorui Zhang Chunlin Yuan Wei Sun Sunil Kumar Jha Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China Adani University AhmedabadGujaratIndia
The image emotion classification task aims to use the model to automatically predict the emotional response of people when they see the *** have shown that certain local regions are more likely to inspire an emotional... 详细信息
来源: 评论
Resource Allocation for Throughput Maximization in Cognitive Radio network with NOMA
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 195-212页
作者: Xiaoli He Yu Song Yu Xue Muhammad Owais Weijian Yang Xinwen Cheng School of Computer Science Sichuan University of Science and EngineeringZigong643000China Department of Network Information Management Center Sichuan University of Science and EngineeringZigong643000China School of Information Engineering South West University of Science and TechnologyMianyang621010China School of Computer and Software Nanjing University of Information Science and TechnologyJiangsu210044China Alhamd Islamic University Airport Road Quetta BalochistanPakistan
Spectrum resources are the precious and limited natural *** order to improve the utilization of spectrum resources and maximize the network throughput,this paper studies the resource allocation of the downlink cogniti... 详细信息
来源: 评论
Towards Efficient Content-aware Search over Encrypted Outsourced Data in Cloud
Towards Efficient Content-aware Search over Encrypted Outsou...
收藏 引用
Annual IEEE International Conference on computer Communications
作者: Zhangjie Fu Xingming Sun Sai Ji Guowu Xie College of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Department of Computer Science and Engineering University of California Riverside
With the increasing adoption of cloud computing, a growing number of users outsource their datasets into cloud. The datasets usually are encrypted before outsourcing to preserve the privacy. However, the common practi... 详细信息
来源: 评论
Order tracking based on Gabor and Viterbi algorithm
Order tracking based on Gabor and Viterbi algorithm
收藏 引用
2011 International Conference on Mechatronic Science, Electric engineering and computer, MEC 2011
作者: Zhao, Xiaoping Zhao, Xiuli Wang, Yan Zheng, Yuhui Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Hebei Software Institute Baoding 071000 China School of Electrical Engineering and Information Anhui University of Technology Maanshan China
The study proposes an improved Gabor order tracking technique based on Viterbi algorithm (V-GOT) to cope with close orders and crossing orders that cannot be effectively separated by using the original Gabor order tra... 详细信息
来源: 评论
Kernel-based motion-blurred target tracking
Kernel-based motion-blurred target tracking
收藏 引用
7th International Symposium on Visual Computing, ISVC 2011
作者: Wu, Yi Hu, Jing Li, Feng Cheng, Erkang Yu, Jingyi Ling, Haibin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Center for Information Science and Technology Computer and Information Science Department Temple University Philadelphia PA United States Department of Computer and Information Sciences University of Delaware Newark DE 19716 United States Network Center Nanjing University of Information Science and Technology Nanjing 210044 China
Motion blurs are pervasive in real captured video data, especially for hand-held cameras and smartphone cameras because of their low frame rate and material quality. This paper presents a novel Kernel-based motion-Blu... 详细信息
来源: 评论
A blockchain-based computation offloading method for edge computing in 5G networks
A blockchain-based computation offloading method for edge co...
收藏 引用
作者: Xu, Xiaolong Chen, Yi Zhang, Xuyun Liu, Qingxiang Liu, Xihua Qi, Lianyong School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Electrical and Computer Engineering University of Auckland Auckland New Zealand School of Information Science and Engineering Qufu Normal University Qufu China
Edge computing (EC) emerges as a novel computing paradigm to offload computing tasks from user equipments (UEs) to edge notes (ENs) in fifth-generation networks, which definitely breaks the resource limitation of UEs ... 详细信息
来源: 评论
A RFID data-cleaning algorithm based on communication information among RFID readers
收藏 引用
International Journal of u- and e- Service, Science and Technology 2015年 第1期8卷 155-164页
作者: Gu, Yunhua Gao, Bao Wang, Jin Yin, Mingshu Zhang, Junyong Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
For the insufficient of existing algorithms of redundant-reader elimination, the paper proposes a data-cleaning algorithm based on communication information among readers. This algorithm is no longer dependent on the ... 详细信息
来源: 评论