咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是51-60 订阅
排序:
Delay-Tolerant Rendezvous-Based Data Collection for Target Tracking in Large-Scale Wireless Sensor networks with UGV  1
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Zhang, Jian Xu, Jiang Wang, Tianbao College of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing210044 China School of Electrical and Information Engineering Jiangsu University Zhenjiang212013 China
Energy efficiency receives significant attention in wireless sensor networks. In this paper, a UGV is employed as an energy-efficient solution to prolong the network lifetime in target tracking. Data collection strate... 详细信息
来源: 评论
Identifying Materials of Photographic Images and Photorealistic computer Generated Graphics Based on Deep CNNs
收藏 引用
computers, Materials & Continua 2018年 第5期55卷 229-241页
作者: Qi Cui Suzanne McIntosh Huiyu Sun School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNo.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Computer Science Department New York UniversityNew YorkNY 10012USA
Currently,some photorealistic computer graphics are very similar to photographic *** computer generated graphics can be forged as photographic images,causing serious security *** aim of this work is to use a deep neur... 详细信息
来源: 评论
Air Quality Forcasting based on Gated Recurrent Long Short-Term Memory Model  19
Air Quality Forcasting based on Gated Recurrent Long Short-T...
收藏 引用
2019 ACM Turing Celebration Conference - China, ACM TURC 2019
作者: Wang, Baowei Kong, Weiwen Guan, Hui School of Computer and Software Jiangsu Engineering Centre of Network Monitoring Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology Nanjing China
With the continuous development of Chinese economy and the gradual acceleration of urbanization, it has caused tremendous damage to the *** effect of smog on people's lives has become more apparent. The bad air en... 详细信息
来源: 评论
Classification based on brain storm optimization algorithm  11th
Classification based on brain storm optimization algorithm
收藏 引用
11th International Conference on Bio-inspired Computing – Theories and Applications, BIC-TA 2016
作者: Xue, Yu Tang, Tao Ma, Tinghuai Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China
As one of the important issues of data classification, classification has attracted the attention of many researchers in the field of data mining. Different from clustering research issues, in classification research ... 详细信息
来源: 评论
Security system construction of land and resources network based on intrusion detection  8
Security system construction of land and resources network b...
收藏 引用
8th International Conference on BioMedical engineering and Informatics, BMEI 2015
作者: Shen, Chao Chen, Zhongyang Xue, Yu Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology NUIST Nanjing China School of Computer and Software Nanjing University of Information Science and Technology NUIST Nanjing China
Intrusion detection can decide whether there are dangerous user behaviors. It can also timely detect network security vulnerabilities of inner attacks, and it can make quick response and improve network security. Ther... 详细信息
来源: 评论
Ground nephogram classification based on Gabor wavelet and SVM
Ground nephogram classification based on Gabor wavelet and S...
收藏 引用
2nd International Conference on Information engineering and Applications, IEA 2012
作者: Li, Hanguang Wang, Qi Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China College of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
Techniques called feature extraction and pattern recognition are implemented for nephogram representation and recognition. In this approach, the Gabor wavelets are used to extract features of ground nephograms. The pr... 详细信息
来源: 评论
Training pool selection for semi-supervised learning
Training pool selection for semi-supervised learning
收藏 引用
9th International Symposium on Neural networks, ISNN 2012
作者: Ge, Jian Ma, Tinghuai Yan, Qiaoqiao Yan, Yonggang Tian, Wei Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology 210044 Nanjing China College of Computer and Software Nanjing University of Information Science and Technology 210044 Nanjing China
Semi-supervised leaning deals with methods for automatically exploiting unlabeled samples in addition to labeled set. The data selection is an important topic in active learning. It addresses the selection the valuabl... 详细信息
来源: 评论
High Efficiency Quantum Image Steganography Protocol Based on ZZW Framework  7th
High Efficiency Quantum Image Steganography Protocol Based o...
收藏 引用
7th International Conference on Artificial Intelligence and Security, ICAIS 2021
作者: Sun, Hanrong Qu, Zhiguo School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China
This paper proposes an efficient quantum image steganography protocol based on Zhang Weiming, Zhang Xinpeng and Wang Shuozhong’s steganography framework (ZZW). Based on the high embedding efficiency of the classical ... 详细信息
来源: 评论
Hybrid multiplicative watermarking and its decoders
Hybrid multiplicative watermarking and its decoders
收藏 引用
3rd International Conference on Multimedia Information networking and Security, MINES 2011
作者: Wang, Jinwei Lian, Shiguo Yan, Leiming Wang, Yuxiang Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Beijing Beijing 10080 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
With the rapid development and the richer content of the Internet, the copyright protection of the works should be further developed. The watermarking has become a possible solution. In this paper, firstly, a novel hy... 详细信息
来源: 评论
Impact Force Magnitude and Location Recognition of Composite Materials
收藏 引用
computers, Materials & Continua 2020年 第9期64卷 1647-1656页
作者: Yajie Sun Yanqing Yuan Qi Wang Sai Ji Lihua Wang Shao’en Wu Jiangsu Engineering Centre of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China School of Information and Control Nanjing University of Information Science and TechnologyNanjing210044China Department of Computer Science Ball State UniversityMuncieUSA
In order to identify the location and magnitude of the impact force accurately,determine the damage range of the structure and accelerate the health monitoring of key components of the composite,this paper studies the... 详细信息
来源: 评论