咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是81-90 订阅
排序:
A Method for Improving CNN-Based Image Recognition Using DCGAN
收藏 引用
computers, Materials & Continua 2018年 第10期57卷 167-178页
作者: Wei Fang Feihong Zhang Victor S.Sheng Yewen Ding School of Computer&Software Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science&TechnologyNanjing210044China State Key Lab.for Novel Software Technology Nanjing UniversityNanjing210023China Computer Science Department University of Central ArkansasConway AR72035USA
Image recognition has always been a hot research topic in the scientific community and *** emergence of convolutional neural networks(CNN)has made this technology turned into research focus on the field of computer vi... 详细信息
来源: 评论
Efficient sampling methods for characterizing POIs on maps based on road networks
收藏 引用
Frontiers of computer Science 2018年 第3期12卷 582-592页
作者: Ziting ZHOU Pengpeng ZHAO Victor S. SHENG Jiajie XU Zhixu LI Jian WU Zhiming CUI School of Computer Science and Technology Soochow University Suzhou 215006 China Department of Computer Science University of Central Arkansas Conway AR 72035 USA Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing 210044 China
With the rapid development of location-based services, a particularly important aspect of start-up marketing research is to explore and characterize points of interest (PoIs) such as restaurants and hotels on maps. ... 详细信息
来源: 评论
Full-blind delegating private quantum computation
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Wen-Jie Chen, Zhen-Yu Liu, Jin-Suo Su, Zhao-Feng Chi, Lian-Hua Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China State Grid Electric Power Research Institute NARI Group Corporation Nanjing210003 China Centre for Quantum Software and Information Faculty of Engineering and Information Technology University of Technology SydneyNSW2007 Australia Department of Computer Science and Information Technology La Trobe University VIC3086 Australia
The delegating private quantum computation (DQC) protocol with the universal quantum gate set {X, Z, H, P, R, CNOT} was firstly proposed by Broadbent et al., and then Tan et al. tried to put forward an half-blind DQC ... 详细信息
来源: 评论
Multiparty quantum sealed-bid auction using single photons as message carrier
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Wen-Jie Wang, Hai-Bin Yuan, Gong-Lin Xu, Yong Chen, Zhen-Yu An, Xing-Xing Ji, Fu-Gao Gnitou, Gnim Tchalim Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China College of Mathematics and Information Science Guangxi University Nanning Guangxi China School of Electronics & Information Engineering Nanjing University of Information Science & Technology Nanjing210044 China
In this study, a novel multiparty quantum sealed-bid auction protocol using the single photons as the message carrier of bids is proposed, followed by an example of three-party auction. Compared with those protocols b... 详细信息
来源: 评论
Feature Relationships Learning Incorporated Age Estimation Assisted by Cumulative Attribute Encoding
收藏 引用
computers, Materials & Continua 2018年 第9期56卷 467-482页
作者: Qing Tian Meng Cao Tinghuai Ma School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Electrical and Electronic Engineering University of ManchesterManchesterM139PLUK
The research of human facial age estimation(AE)has attracted increasing attention for its wide *** to date,a number of models have been constructed or employed to perform *** the goal of AE can be achieved by either c... 详细信息
来源: 评论
Implementing real-time RCF-Retinex image enhancement method using CUDA
Implementing real-time RCF-Retinex image enhancement method ...
收藏 引用
作者: Yang, Xiaomin Jian, Lihua Wu, Wei Liu, Kai Yan, Binyu Zhou, Zhili Peng, Jian College of Electronics and Information Engineering Sichuan University No. 24 South Section 1 Yihuan Road Chengdu China College of Computer Science Sichuan University No. 24 South Section 1 Yihuan Road Chengdu China School of Electrical Engineering and Information Sichuan University No. 24 South Section 1 Yihuan Road Chengdu China Jiangsu Engineering Center of Network Monitoring and School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
RCF-Retinex is a novel Retinex-based image enhancement method which can improve contrast, eliminate noise, and enhance details simultaneously. It utilizes region covariance filter (RCF) to estimate the illumination. H... 详细信息
来源: 评论
A Novel Steganography Scheme Combining Coverless Information Hiding and Steganography
收藏 引用
Journal of Information Hiding and Privacy Protection 2019年 第1期1卷 43-48页
作者: Ruohan Meng Zhili Zhou Qi Cui Xingming Sun Chengsheng Yuan School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Centre of Network Monitoring Nanjing210044China Department of Electrical and computer Engineering University of WindsorWindsorONCanada N9B 3P4
At present,the coverless information hiding has been ***,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity of coverless i... 详细信息
来源: 评论
Big data trip classification on the New York City Taxi and uber sensor network
Big data trip classification on the New York City Taxi and u...
收藏 引用
作者: Sun, Huiyu Hu, Siyuan McIntosh, Suzanne Cao, Yi Department of Computer Science New York University United States Jiangsu Engineering Centre of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology China
Millions of trips are made every day by taxis and Uber in New York City. We first employ big data technologies to analyze this vast dataset: Apache Spark is used for data processing and classification, Apache Hive is ... 详细信息
来源: 评论
A novel convolution neural network for background segmentation recognition  4th
A novel convolution neural network for background segmentati...
收藏 引用
4th International Conference on Cloud Computing and Security, ICCCS 2018
作者: Fang, Wei Ding, Yewen Zhang, Feihong School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
The convolution neural network for image classification is an application of deep learning on image processing. Convolutional neural networks have the advantage of being able to convolve directly with image pixels and... 详细信息
来源: 评论
Identifying Materials of Photographic Images and Photorealistic computer Generated Graphics Based on Deep CNNs
收藏 引用
computers, Materials & Continua 2018年 第5期55卷 229-241页
作者: Qi Cui Suzanne McIntosh Huiyu Sun School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNo.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Computer Science Department New York UniversityNew YorkNY 10012USA
Currently,some photorealistic computer graphics are very similar to photographic *** computer generated graphics can be forged as photographic images,causing serious security *** aim of this work is to use a deep neur... 详细信息
来源: 评论