咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring and School of Computer and Software"
246 条 记 录,以下是151-160 订阅
排序:
A RFID data-cleaning algorithm based on communication information among RFID readers
收藏 引用
International Journal of u- and e- Service, Science and Technology 2015年 第1期8卷 155-164页
作者: Gu, Yunhua Gao, Bao Wang, Jin Yin, Mingshu Zhang, Junyong Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
For the insufficient of existing algorithms of redundant-reader elimination, the paper proposes a data-cleaning algorithm based on communication information among readers. This algorithm is no longer dependent on the ... 详细信息
来源: 评论
Semantics-based text copy detection method supporting similarity ranking
Semantics-based text copy detection method supporting simila...
收藏 引用
第十二届全国信息隐藏暨多媒体信息安全学术大会
作者: FU Zhangjie SUN Xingming ZHOU Lu HUANG Fengxiao School of Computer and Software & Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044
Text document is the most widely used medium on the ***, there are some emerging problems that cannot be neglected, such as plagiarism, reproduction of information content, illicit redistribution, and copyright disput... 详细信息
来源: 评论
Short text classification algorithm based on semi-supervised learning and SVM
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2015年 第12期10卷 195-206页
作者: Yin, Chunyong Xiang, Jun Zhang, Hui Yin, Zhichao Wang, Jin Jiangsu Key Laboratory of Meteorological Observation and Information Processing School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China Nanjing No.1 Middle School NanjingJiangsu China
Short text is a popular text form, which is widely used in real-time network news, short commentary, micro-blog and many other fields. With the development of the application such as QQ, mobile phone text messages and... 详细信息
来源: 评论
A feature selection algorithm towards efficient intrusion detection
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2015年 第11期10卷 253-264页
作者: Yin, Chunyong Ma, Luyu Feng, Lu Yin, Zhichao Wang, Jin School of Computer and Software Jiangsu Key Laboratory of Meteorological Observation and Information Processing Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China Nanjing No.1 Middle School Nanjing China
Feature selection algorithm plays a crucial role in intrusion detection, data mining and pattern recognition. According to some evaluation criteria, it gets optimal feature subset by deleting unrelated and redundant f... 详细信息
来源: 评论
Efficient and secure multi-keyword ranked search over encrypted office open XML data
收藏 引用
Journal of Computational Information Systems 2015年 第7期11卷 2701-2708页
作者: Xi, Jie Sun, Xingming Fu, Zhangjie Zhang, Youdong Xin, Lin Cao, Xinyue School of Computer & Software Nanjing University of Information Science & Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing China Department of Computer Engineering Huaiyin Institute of Technology Huaian China
As cloud computing goes increasingly mature, searchable encryption schemes have been widely applied to the real world. Those not only provide high efficiency but also protect users' privacy well. However, the exis... 详细信息
来源: 评论
An Improved Transmission Control Protocol Effect on Router Performance
An Improved Transmission Control Protocol Effect on Router P...
收藏 引用
International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA)
作者: Chunyong Yin Ardalan Husin Jin Wang School of Computer and Software Nanjing University of Information Science & Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing China
The Transmission Control Protocol (TCP) is expected for use as a very secure host-to-host protocol linking hosts in packet-switched computer transmission networks, and in interconnected frameworks of such networks. Co... 详细信息
来源: 评论
The performance research of artificial bee colony algorithm on the large scale global optimisation problems
收藏 引用
International Journal of Wireless and Mobile Computing 2015年 第3期9卷 300-305页
作者: Xue, Yu Jiang, Jiongming Ma, Tinghuai Li, Chi School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology Nanjing210044 China
Swarm intelligent optimisation algorithms have been researched widely in recent years. Artificial Bee Colony (ABC) algorithm is a kind of swarm intelligent algorithm with briefness and efficiency for global optimisati... 详细信息
来源: 评论
Partial encryption of color image using quaternion discrete cosine transform
International Journal of Signal Processing, Image Processing...
收藏 引用
International Journal of Signal Processing, Image Processing and Pattern Recognition 2015年 第10期8卷 171-190页
作者: Fan, Jing Wang, Jinwei Sun, Xingming Li, Ting Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
In this paper, the quaternion discrete Cosine transform (QDCT) is applied to the color image encryption technology, and partial encryption technique of color image based on QDCT is proposed. Obtained the QDCT spectrum... 详细信息
来源: 评论
A feature selection algorithm based on Hoeffding inequality and mutual information
International Journal of Signal Processing, Image Processing...
收藏 引用
International Journal of Signal Processing, Image Processing and Pattern Recognition 2015年 第11期8卷 433-444页
作者: Yin, Chunyong Feng, Lu Ma, Luyu Yin, Zhichao Wang, Jin School of Computer and Software Jiangsu Key Laboratory of Meteorological Observation and Information Processing Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China Nanjing No.1 Middle School Nanjing China
With the rapid development of the Internet, the application of data mining in the Internet is becoming more and more extensive. However, the data source’s complex feature redundancy leads that data mining process bec... 详细信息
来源: 评论
Erratum to: Fingerprint liveness detection using gradient-based texture features
收藏 引用
Signal, Image and Video Processing 2016年 第2期11卷 389-389页
作者: Xia, Zhihua Lv, Rui Zhu, Yafeng Ji, Peng Sun, Huiyu Shi, Yun-Qing Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology College of Computer and Software Nanjing University of Information Science and Technology Nanjing China Department of Computer Science New York University New York USA Department of Electrical and Computer Engineering New Jersey Institute of Technology New York USA
来源: 评论