咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是41-50 订阅
排序:
An effective scheme for biometric cryptosystems  2
An effective scheme for biometric cryptosystems
收藏 引用
2nd IEEE International Conference on computer and Communications, ICCC 2016
作者: Zhou, Yu Zhao, Bo Han, Jin Jun, Zheng School of Computer Science and Software Engineering East China Normal University Shanghai China School of Software and Microelectronics Peking University Beijing China Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology China
Compared with traditional cryptography, biometric cryptosystems provide more convenient and safe protection of keys. In this paper, an effective scheme for biometric cryptosystems based on the intersections of hyper-p... 详细信息
来源: 评论
Combining active learning and semi-supervised for improving learning performance  11
Combining active learning and semi-supervised for improving ...
收藏 引用
4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, ISABEL'11
作者: Ma, Tinghuai Ge, Jian Wang, Jin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing Jiangsu Province China School of Computer and Software Nanjing University of Information Science and Technology Nanjing Jiangsu Province China
In many learning tasks, there are abundant unlabeled samples but the number of labeled training samples is limited, because labeling the samples requires the efforts of human annotators and expertise. There are three ... 详细信息
来源: 评论
A novel convolution neural network for background segmentation recognition  4th
A novel convolution neural network for background segmentati...
收藏 引用
4th International Conference on Cloud Computing and Security, ICCCS 2018
作者: Fang, Wei Ding, Yewen Zhang, Feihong School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
The convolution neural network for image classification is an application of deep learning on image processing. Convolutional neural networks have the advantage of being able to convolve directly with image pixels and... 详细信息
来源: 评论
The research of acceptance and scheduling scheme based on the overall network QoS
收藏 引用
2011 International Conference on Instrumentation, Measurement, Circuits and Systems, ICIMCS 2011
作者: Xu, Zhanyang Ping, Huang Li Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
Many factors affect the QoS of network, and the congestion control mechanism is the most important one. In many references, the research on QoS is focused on the specific network architecture, while the QoS of overall... 详细信息
来源: 评论
A Soft Tissue Acupuncture Model Based on Mass-Spring Force Ne
收藏 引用
computers, Materials & Continua 2021年 第10期69卷 727-745页
作者: Xiaorui Zhang Tong Xu Wei Sun Jiali Duan Sunil Kumar Jha Jiangsu Engineering Center of Network Monitoring Engineering Research Center of Digital ForensicsMinistry of EducationSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China Faculty of Information Technology University of Information Technology and ManagementRzeszow35-225Poland
In the simulation of acupuncture manipulation,it is necessary to accurately capture the information of acupuncture points and particles around ***,a soft tissue modeling method that can accurately track model particle... 详细信息
来源: 评论
A Three-Stage Cutting Simulation System Based on Mass-Spring Model
收藏 引用
computer Modeling in engineering & Sciences 2021年 第4期127卷 117-133页
作者: Xiaorui Zhang Jiali Duan Wei Sun Tong Xu Sunil Kumar Jha Jiangsu Engineering Center of Network Monitoring Engineering Research Center of Digital ForensicsMinistry of EducationSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China Faculty of Information Technology University of Information Technology and ManagementRzeszow35-225Poland
The cutting simulation of soft tissue is important in virtual *** includes three major challenges in computation:Soft tissue simulation,collision detection,and handling,as well as soft tissue *** order to address the ... 详细信息
来源: 评论
A Robust Watermarking Scheme Based on ROI and IWT for Remote Consultation of COVID-19
收藏 引用
computers, Materials & Continua 2020年 第9期64卷 1435-1452页
作者: Xiaorui Zhang Wenfang Zhang Wei Sun Tong Xu Sunil Kumar Jha Jiangsu Engineering Center of Network Monitoring Engineering Research Center of Digital ForensicsMinistry of EducationSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow100031Poland
In the current dire situation of the corona virus COVID-19,remote consultations were proposed to avoid cross-infection and regional differences in medical ***,the safety of digital medical imaging in remote consultati... 详细信息
来源: 评论
A Phase Estimation Algorithm for Quantum Speed-Up Multi-Party Computing
收藏 引用
computers, Materials & Continua 2021年 第4期67卷 241-252页
作者: Wenbin Yu Hao Feng Yinsong Xu Na Yin Yadang Chen Zhi-Xin Yang Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Jiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Department of Computer Science and Engineering Michigan State UniversityEast Lansing48824MIUSA State Key Laboratory of Internet of Things for Smart City and Department of Electromechanical Engineering University of Macao999078Macao
Security and privacy issues have attracted the attention of researchers in the field of IoT as the information processing scale grows in sensor *** computing,theoretically known as an absolutely secure way to store an... 详细信息
来源: 评论
Soft Tissue Deformation Model Based on Marquardt Algorithm and Enrichment Function
收藏 引用
computer Modeling in engineering & Sciences 2020年 第9期124卷 1131-1147页
作者: Xiaorui Zhang Xuefeng Yu Wei Sun Aiguo Song Jiangsu Engineering Center of Network Monitoring Engineering Research Center of Digital ForensicsMinistry of EducationSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Bioelectronics Jiangsu Key Lab of Remote Measurement and ControlSchool of Instrument Science and EngineeringSoutheast UniversityNanjing210096China
In order to solve the problem of high computing cost and low simulation accuracy caused by discontinuity of incision in traditional meshless model,this paper proposes a soft tissue deformation model based on the Marqu... 详细信息
来源: 评论
Coverless image steganography without embedding  1st
Coverless image steganography without embedding
收藏 引用
1st International Conference on Cloud Computing and Security, ICCCS 2015
作者: Zhou, Zhili Sun, Huiyu Harit, Rohan Chen, Xianyi Sun, Xingming School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China Department of Computer Science New York University New YorkNY10012 United States
The traditional image steganography technologies designate a cover image and embed secret data into it to form the stego-image. However, the modification traces caused by the embedding will be left in the cover image,... 详细信息
来源: 评论