咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是31-40 订阅
排序:
Dynamic resource provisioning for workflow scheduling under uncertainty in edge computing environment
Dynamic resource provisioning for workflow scheduling under ...
收藏 引用
作者: Xu, Xiaolong Cao, Hao Geng, Qingfan Liu, Xihua Dai, Fei Wang, Chuanjian School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China Nanjing University of Information Science and Technology Nanjing China Engineering Research Center of Digital Forensics Ministry of Education Nanjing China School of Big Data and Intelligence Engineering Southwest Forestry University Kunming China College of Information Science and Technology Shihezi University Xinjiang China
Edge computing, an extension of cloud computing, is introduced to provide sufficient computing and storage resources for mobile devices. Moreover, a series of computing tasks in a mobile device are set as structured c... 详细信息
来源: 评论
A blockchain-based computation offloading method for edge computing in 5G networks
A blockchain-based computation offloading method for edge co...
收藏 引用
作者: Xu, Xiaolong Chen, Yi Zhang, Xuyun Liu, Qingxiang Liu, Xihua Qi, Lianyong School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Electrical and Computer Engineering University of Auckland Auckland New Zealand School of Information Science and Engineering Qufu Normal University Qufu China
Edge computing (EC) emerges as a novel computing paradigm to offload computing tasks from user equipments (UEs) to edge notes (ENs) in fifth-generation networks, which definitely breaks the resource limitation of UEs ... 详细信息
来源: 评论
COVID TCL:A Joint Metric Loss Function for Diagnosing COVID-19 Patient in the Early and Incubation Period
收藏 引用
computer Systems Science & engineering 2023年 第10期47卷 187-204页
作者: Rui Wen Jie Zhou Zhongliang Shen Xiaorui Zhang Sunil Kumar Jha Department of Electromechanical Engineering Zhejiang Business Technology InstituteNingbo315012China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China Department of Physics Faculty of ScienceAdani UniversityAhmedabadIndia
Convolution Neural networks(CNN)can quickly diagnose COVID-19 patients by analyzing computed tomography(CT)images of the lung,thereby effectively preventing the spread of ***,the existing CNN-based COVID-19 diagnosis ... 详细信息
来源: 评论
An Application Review of Artificial Intelligence in Prevention and Cure of COVID-19 Pandemic
收藏 引用
computers, Materials & Continua 2020年 第10期65卷 743-760页
作者: Peipeng Yu Zhihua Xia Jianwei Fei Sunil Kumar Jha Engineering Research Center of Digital Forensics Ministry of EducationSchool of Computer and SoftwareJiangsu Engineering Center of Network MonitoringJiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment TechnologyNanjing University of Information Science&TechnologyNanjing210044China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow Voivodeship100031Poland
Coronaviruses are a well-known family of viruses that can infect humans or ***,the new coronavirus(COVID-19)has spread *** countries in the world are working hard to control the coronavirus ***,many countries are face... 详细信息
来源: 评论
A New Sequential Image Prediction Method Based on LSTM and DCGAN
收藏 引用
computers, Materials & Continua 2020年 第7期64卷 217-231页
作者: Wei Fang Feihong Zhang Yewen Ding Jack Sheng School of Computer&Software Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing210023China Department of Economics FinanceInsurance and Risk Management University of Central ArkansasConway72035USA
Image recognition technology is an important field of artificial *** with the development of machine learning technology in recent years,it has great researches value and commercial *** a matter of fact,a single recog... 详细信息
来源: 评论
A novel quantum visual secret sharing scheme
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wenjie Xu, Yinsong Zhang, Maojun Chen, Junxiu Yang, Ching-Nung Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin541004 China Division Department of Computer Science and Information Engineering National Dong Hwa University Taiwan97441 Taiwan
Inspired by Naor et al.’s visual secret sharing (VSS) scheme, a novel n out of n quantum visual secret sharing (QVSS) scheme is proposed, which consists of two phases: sharing process and recovering process. In the f... 详细信息
来源: 评论
A Robust Document Image Watermarking Scheme using Deep Neural network
arXiv
收藏 引用
arXiv 2022年
作者: Ge, Sulong Xia, Zhihua Fei, Jianwei Sun, Xingming Weng, Jian Engineering Research Center of Digital Forensics Ministry of Education School of Computer and Software Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science & Technology Nanjing210044 China College of Cyber Security Jinan University Guangzhou510632 China
Watermarking is an important copyright protection technology which generally embeds the identity information into the carrier imperceptibly. Then the identity can be extracted to prove the copyright from the watermark... 详细信息
来源: 评论
A WiFi-aware method for mobile data offloading with deadline constraints
A WiFi-aware method for mobile data offloading with deadline...
收藏 引用
作者: Tang, Wenda Wu, Chaobing Qi, Lianyong Zhang, Xuyun Xu, Xiaolong Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China School of Information Science and Engineering Chinese Academy of Education Big Data Qufu Normal University Rizhao China Department of Electrical and Computer Engineering The University of Auckland Auckland New Zealand Jiangsu Engineering Centre of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
With an increasing number of public WiFi hotspots have been constructed in metropolitan areas, citizens can leverage these WiFi hotspots to surf the Internet with their smart devices almost everywhere. Compared to cel... 详细信息
来源: 评论
Access Control Policy Based on Friend Circle
收藏 引用
computers, Materials & Continua 2020年 第3期62卷 1143-1159页
作者: Qin Liu Tinghuai Ma Fan Xing Yuan Tian Abdullah Al-Dhelaan Mohammed Al-Dhelaan School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China CICAEET Jiangsu Engineering Centre of Network MonitoringNanjing University of Information Science and TechnologyNanjing210044China Computer Science Department College of Computer and Information SciencesKing Saud UniversityRiyadh11362Saudi Arabia
Nowadays,the scale of the user’s personal social network(personal network,a network of the user and their friends,where the user we call“center user”)is becoming larger and more *** is difficult to find a suitable ... 详细信息
来源: 评论
Non-Exchangeable Error Compensation for Strapdown Inertial Navigation System in High Dynamic Environment
收藏 引用
computers, Materials & Continua 2020年 第8期64卷 973-986页
作者: Qi Wang Changsong Yang Shao’en Wu School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Automation Nanjing University of Information Science and TechnologyNanjing210044China Department of Computer Science Ball State UniversityMuncie47306USA
Strapdown non-exchangeable error compensation technology in high dynamic environment is one of the key technologies of strapdown inertial navigation *** platform is used in strapdown inertial navigation system instead... 详细信息
来源: 评论