咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是31-40 订阅
排序:
Feature Relationships Learning Incorporated Age Estimation Assisted by Cumulative Attribute Encoding
收藏 引用
computers, Materials & Continua 2018年 第9期56卷 467-482页
作者: Qing Tian Meng Cao Tinghuai Ma School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Electrical and Electronic Engineering University of ManchesterManchesterM139PLUK
The research of human facial age estimation(AE)has attracted increasing attention for its wide *** to date,a number of models have been constructed or employed to perform *** the goal of AE can be achieved by either c... 详细信息
来源: 评论
Coverless image steganography based on SIFT and BOF
Coverless image steganography based on SIFT and BOF
收藏 引用
作者: Yuan, Chengsheng Xia, Zhihua Sun, Xingming School of Computer and Software Nanjing University of Information Science and Technology China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology China
In order to realize secret communication, conventional steganography techniques can embed the secret message into carrier images by modifying the content and structure of carrier images. Although steganography techniq... 详细信息
来源: 评论
Short text classification technology based on KNN+hierarchy SVM  12th
Short text classification technology based on KNN+hierarchy ...
收藏 引用
12th International Conference on Future Information Technology, FutureTech 2017
作者: Yin, Chunyong Shi, Lingfeng Wang, Jin School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China College of Information Engineering Yangzhou University Yangzhou China
A short text classification method based on combination of KNN and hierarchical SVM is proposed. First, the KNN algorithm is improved to get the K nearest neighbor class labels quickly, so as to effectively filter the... 详细信息
来源: 评论
Improved data stream clustering algorithm for anomaly detection  12th
Improved data stream clustering algorithm for anomaly detect...
收藏 引用
12th International Conference on Future Information Technology, FutureTech 2017
作者: Yin, Chunyong Zhang, Sun Wang, Jin School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China College of Information Engineering Yangzhou University Yangzhou China
Intrusion detection provides important protection for network security and anomaly detection as a type of intrusion detection, can recognize the pattern of normal behaviors and label the behaviors which departure from... 详细信息
来源: 评论
Application of an improved data stream clustering algorithm in intrusion detection system  12th
Application of an improved data stream clustering algorithm ...
收藏 引用
12th International Conference on Future Information Technology, FutureTech 2017
作者: Yin, Chunyong Xia, Lian Wang, Jin School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China College of Information Engineering Yangzhou University Yangzhou China
With the continuous development of computer network technology, traditional intrusion detection system is short of good adaptability. Aiming at the traditional intrusion detection system is difficult to adapt to the i... 详细信息
来源: 评论
Access Control Policy Based on Friend Circle
收藏 引用
computers, Materials & Continua 2020年 第3期62卷 1143-1159页
作者: Qin Liu Tinghuai Ma Fan Xing Yuan Tian Abdullah Al-Dhelaan Mohammed Al-Dhelaan School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China CICAEET Jiangsu Engineering Centre of Network MonitoringNanjing University of Information Science and TechnologyNanjing210044China Computer Science Department College of Computer and Information SciencesKing Saud UniversityRiyadh11362Saudi Arabia
Nowadays,the scale of the user’s personal social network(personal network,a network of the user and their friends,where the user we call“center user”)is becoming larger and more *** is difficult to find a suitable ... 详细信息
来源: 评论
A duplicate data detection approach based on MapReduce and HDFS
收藏 引用
Recent Patents on computer Science 2017年 第2期10卷 140-148页
作者: Wei, Fang Xue-Zhi, Wen Yu, Zheng Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing210066 China Department of Electrical & Computer Engineering University of Florida GainesvilleFL32611 United States
Background: With the surge in the volume of collected data, deduplication will undoubtedly become one of the problems faced by researchers. There is significant advantage for deduplication to reduce storage, network b... 详细信息
来源: 评论
A density-based energy-efficient clustering heterogeneous algorithm for wireless sensor networks
International Journal of Control and Automation
收藏 引用
International Journal of Control and Automation 2014年 第2期7卷 175-188页
作者: Xu, Zhanyang Yin, Yue Wang, Jin Kim, Jeong-Uk School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China Department of Energy Grid Sangmyung University Seoul 110-743 Korea Republic of
Clustering is an efficient method adopted in various routing algorithms for wireless sensor networks. However, most clustering algorithms are not suitable for heterogeneous networks. In this paper, we propose a Densit... 详细信息
来源: 评论
Non-Exchangeable Error Compensation for Strapdown Inertial Navigation System in High Dynamic Environment
收藏 引用
computers, Materials & Continua 2020年 第8期64卷 973-986页
作者: Qi Wang Changsong Yang Shao’en Wu School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Automation Nanjing University of Information Science and TechnologyNanjing210044China Department of Computer Science Ball State UniversityMuncie47306USA
Strapdown non-exchangeable error compensation technology in high dynamic environment is one of the key technologies of strapdown inertial navigation *** platform is used in strapdown inertial navigation system instead... 详细信息
来源: 评论
Big data trip classification on the New York City Taxi and uber sensor network
Big data trip classification on the New York City Taxi and u...
收藏 引用
作者: Sun, Huiyu Hu, Siyuan McIntosh, Suzanne Cao, Yi Department of Computer Science New York University United States Jiangsu Engineering Centre of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology China
Millions of trips are made every day by taxis and Uber in New York City. We first employ big data technologies to analyze this vast dataset: Apache Spark is used for data processing and classification, Apache Hive is ... 详细信息
来源: 评论