咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是151-160 订阅
排序:
An Improved Transmission Control Protocol Effect on Router Performance
An Improved Transmission Control Protocol Effect on Router P...
收藏 引用
International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA)
作者: Chunyong Yin Ardalan Husin Jin Wang School of Computer and Software Nanjing University of Information Science & Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing China
The Transmission Control Protocol (TCP) is expected for use as a very secure host-to-host protocol linking hosts in packet-switched computer transmission networks, and in interconnected frameworks of such networks. Co... 详细信息
来源: 评论
Partial encryption of color image using quaternion discrete cosine transform
International Journal of Signal Processing, Image Processing...
收藏 引用
International Journal of Signal Processing, Image Processing and Pattern Recognition 2015年 第10期8卷 171-190页
作者: Fan, Jing Wang, Jinwei Sun, Xingming Li, Ting Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
In this paper, the quaternion discrete Cosine transform (QDCT) is applied to the color image encryption technology, and partial encryption technique of color image based on QDCT is proposed. Obtained the QDCT spectrum... 详细信息
来源: 评论
A copyright protection method for wireless sensor networks based on digital watermarking
收藏 引用
International Journal of Hybrid Information Technology 2015年 第6期8卷 257-268页
作者: Wang, Baowei Su, Jianwei Zhang, Youdong Wang, Biqiang Shen, Jian Ding, Qun Sun, Xingming School of Computer and software Nanjing University of Information Science and Technology Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing210044 China Department of Computer Engineering Huaiyin Institute of Technology Huaian223003 China Hubei Meteorological Service Center Wuhan430074 China
Wireless sensor networks are composed of numerous sensor nodes in the monitored area, which have been well applied in various practical areas. In these applications, data security from sensors has been threatened. The... 详细信息
来源: 评论
A feature selection algorithm based on Hoeffding inequality and mutual information
International Journal of Signal Processing, Image Processing...
收藏 引用
International Journal of Signal Processing, Image Processing and Pattern Recognition 2015年 第11期8卷 433-444页
作者: Yin, Chunyong Feng, Lu Ma, Luyu Yin, Zhichao Wang, Jin School of Computer and Software Jiangsu Key Laboratory of Meteorological Observation and Information Processing Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China Nanjing No.1 Middle School Nanjing China
With the rapid development of the Internet, the application of data mining in the Internet is becoming more and more extensive. However, the data source’s complex feature redundancy leads that data mining process bec... 详细信息
来源: 评论
An improved spatial-based fuzzy logic event detecting algorithm for wireless sensor networks
收藏 引用
International Journal of u- and e- Service, Science and Technology 2015年 第4期8卷 265-278页
作者: Wang, Baowei Zhuang, Aoran Sun, Huiyu Li, Tao Sun, Xingming School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Jiangsu Engineering Center of Network Monitoring Nanjing 210044 China Nanjing Wisdom Technology Ltd Nanjing 211800 China
At present, event detection technologies have become an important part in building efficient wireless sensor networks. One of the popular and excellent event detecting algorithms is the improved Neighbor-based Fuzzy L... 详细信息
来源: 评论
The 5th International Conference on Biomedical engineering and Biotechnology (ICBEB 2016) Abstracts
收藏 引用
BMC MEDICAL IMAGING 2016年 第SUPPL 1期16卷 65-65页
作者: [Anonymous] Department of MRI Shandong Medical Imaging Research Institute Affiliated to Shandong University Jinan Shandong 250021 People’s Republic of China Department of Interventional Radiology Shandong Provincial Hospital Affiliated to Shandong University Jinan Shandong 250021 People’s Republic of China College of Information Science and Technology Engr. Research Center of Digitized Textile & Fashion Tech. for Ministry of Education Donghua University Shanghai 201620 China Intelligent multimedia information processing Lab College of Software Northeastern University Shenyang Liaoning Province 110004 China Institute of Biomedical and Health Engineering Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen 518055 China School of Computer Science and Technology Nanjing Normal University Nanjing China Department of Electrical Engineering The City College of New York CUNY New York USA Jiangsu Key Laboratory of 3D Printing Equipment and Manufacturing Nanjing China School of Electronic Science and Engineering Nanjing University Nanjing Jiangsu 210046 China College of Engineering Nanyang Technological University Singapore 639798 Singapore School of Electronic Information Shanghai Dianji University Shanghai China School of Natural Sciences and Mathematics Shepherd University Shepherdstown WV 25443 USA Davis College of Agriculture Natural Resources and Design West Virginia University Morgantown WV 26505 USA State Key Laboratory of Millimeter Waves Southeast University Nanjing 210096 China Center of Medical Physics and Technology Hefei Institutes of Physical Science Chinese Academy of Sciences Hefei China College of Agricultural and Life Sciences University of Florida Gainesville FL 32611 USA Courant Institute of Mathematical Sciences New York University New York NY 10012 USA Translational Imaging Division & MRI Unit Columbia University and New York State Psychiatric Institute New York NY 10032 USA Guangxi Key Laboratory of Manufacturing System & Adv
来源: 评论
Attacks and Improvement of Quantum Sealed-Bid Auction with EPR Pairs
收藏 引用
Communications in Theoretical Physics 2014年 第6期61卷 686-690页
作者: 刘文杰 王芳 季赛 瞿治国 王小军 Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology School of Computer and Software Nanjing University of Information Science & Technology School of Electronic Engineering Dublin City University
Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol c... 详细信息
来源: 评论
Cryptanalysis and Improvement of Quantum Private Comparison Protocol Based on Bell Entangled States
收藏 引用
Communications in Theoretical Physics 2014年 第8期61卷 210-214页
作者: 刘文杰 刘超 陈汉武 李志强 刘志昊 Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology School of Computer and Software Nanjing University of Information Science & Technology School of Computer Science and Engineering Southeast University College of Information Engineering Yangzhou University
Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants... 详细信息
来源: 评论
An enhanced grouping proof for multiple rfid readers and tag groups
International Journal of Control and Automation
收藏 引用
International Journal of Control and Automation 2014年 第12期7卷 239-246页
作者: Shen, Jian Tan, Haowen Wang, Yang Ji, Sai Wang, Jin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China Jiangsu Technology and Engineering Center of Meteorological Sensor Network Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
RFID authentication on large numbers of tags or tag groups has attracted many researchers' attention as an extension of initial one-or-two-tags scenarios. Due to demands of RFID application in supply chain, variou... 详细信息
来源: 评论
Improved locality-sensitive hashing method for the approximate nearest neighbor problem
收藏 引用
Chinese Physics B 2014年 第8期23卷 217-225页
作者: 陆颖华 马廷淮 钟水明 曹杰 王新 Abdullah Al-Dhelaane Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology School of Computer & Software Nanjing University of Information Science & Technology School of Economic & Management Nanjing University of Information Science & Technology Huafeng Meteorological Media Group Computer Science Department College of Computer and Information Science King Saud University
In recent years, the nearest neighbor search (NNS) problem has been widely used in various interesting applications. Locality-sensitive hashing (LSH), a popular algorithm for the approximate nearest neighbor probl... 详细信息
来源: 评论