咨询与建议

限定检索结果

文献类型

  • 141 篇 会议
  • 89 篇 期刊文献

馆藏范围

  • 230 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 141 篇 工学
    • 106 篇 计算机科学与技术...
    • 95 篇 软件工程
    • 44 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 19 篇 生物工程
    • 14 篇 电气工程
    • 9 篇 机械工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 交通运输工程
    • 8 篇 网络空间安全
    • 6 篇 安全科学与工程
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 化学工程与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 79 篇 理学
    • 55 篇 数学
    • 30 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 12 篇 物理学
    • 10 篇 系统科学
    • 6 篇 化学
    • 3 篇 地球物理学
  • 45 篇 管理学
    • 25 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 5 篇 法学
    • 5 篇 社会学
  • 4 篇 医学
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 13 篇 feature extracti...
  • 8 篇 task analysis
  • 8 篇 semantics
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 conferences
  • 7 篇 data mining
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 forecasting
  • 5 篇 telecommunicatio...
  • 5 篇 computational mo...
  • 5 篇 machine learning
  • 5 篇 heuristic algori...
  • 4 篇 power demand
  • 4 篇 big data
  • 4 篇 schedules
  • 4 篇 costs
  • 4 篇 security

机构

  • 58 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 11 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 9 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 school of comput...
  • 6 篇 college of compu...
  • 6 篇 jiangsu key labo...
  • 5 篇 nanjing universi...
  • 4 篇 jiangsu key lab ...
  • 4 篇 wireless communi...
  • 4 篇 university of ch...
  • 4 篇 faculty intellig...
  • 4 篇 key laboratory o...

作者

  • 37 篇 xu xiaolong
  • 27 篇 xiaolong xu
  • 15 篇 liu bin
  • 9 篇 chen ke-jia
  • 8 篇 jia xu
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 6 篇 lejun gong
  • 5 篇 xu lijie
  • 5 篇 wang lei
  • 5 篇 chen yunfang
  • 5 篇 liu linfeng
  • 5 篇 tao li
  • 5 篇 yang geng

语言

  • 228 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Big Data Security AND Intelligent Processing Nanjing"
230 条 记 录,以下是81-90 订阅
排序:
Semi-supervised Deep Closest Point Method for Point Cloud Registration
Semi-supervised Deep Closest Point Method for Point Cloud Re...
收藏 引用
2021 International Conference on Robotics Automation and intelligent Control, ICRAIC 2021
作者: Wu, Yong Shen, Lingfeng Li, Ping Jiangsu Power Transmission and Transformation Co. Ltd. Nanjing211106 China College of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
Point cloud registration is one of the key issues in fields that need 3D scenes with global vision, including 3D scene reconstruction in robot technology, high-accuracy 3D map reconstruction in automatic driving, 3D r... 详细信息
来源: 评论
A Point Cloud Registration Method for Substations Based on an Improved SAC-IA Algorithm
A Point Cloud Registration Method for Substations Based on a...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Wang, Lei Chen, Yiping Zong, Haonan Wang, Lulu Yin, Jun School of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210023 China
This paper proposes a point cloud registration method for substations based on an improved SAC-IA algorithm. This method optimizes the SAC-IA algorithm by filtering the randomly selected point pairs to ensure that the... 详细信息
来源: 评论
A Social-Aware Mode Selection Algorithm for D2D Communications
A Social-Aware Mode Selection Algorithm for D2D Communicatio...
收藏 引用
International Conference on Communications, Signal processing, and Systems, CSPS 2018
作者: Lu, Wei-feng Lin, Wei-jun Chen, Si-guang Yang, Li-jun School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China College of IoT Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China
Aiming at mode selection in D2D communication, a mode selection strategy based on social-aware was proposed. In addition to physical connection status, users’ social relationships also served as an observation elemen... 详细信息
来源: 评论
Complex Substation Scene Segmentation Method Based on Optimized Straight Line Detection
Complex Substation Scene Segmentation Method Based on Optimi...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Wang, Lei Huang, Wei Chen, Yiping Chen, Hao Liu, Chuang Yin, Jun School of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210023 China
This paper proposes a scene segmentation method based on optimized line detection to address the difficulty of segmenting spatially independent equipment in complex substation scenes. The method first employs the RANS... 详细信息
来源: 评论
Temporal data fusion at the edge
Temporal data fusion at the edge
收藏 引用
2019 IEEE International Conferences on Ubiquitous Computing and Communications and data Science and Computational Intelligence and Smart Computing, Networking and Services, IUCC/DSCI/SmartCNS 2019
作者: Yang, Linfu Liu, Bin School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Jiangsu Key Lab of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
As an enabler technique, data fusion has gained great attention in the context of Internet of things (IoT). In traditional settings, data fusion is done at the cloud server. So the data to be fused should be transferr... 详细信息
来源: 评论
CROA: A content-based recommendation optimization algorithm for personalized knowledge services  21
CROA: A content-based recommendation optimization algorithm ...
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Sun, Xiao Xu, Xiaolong Xia, Fei Jiangsu Key Laboratory Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Information and communication Branch State Grid Jiangsu Electric Power Company Nanjing China
Information explosion is a typical feature of the big data. Learners can easily find a wide variety of knowledge information online. However, the expansion of information also makes it difficult for learners to retrie... 详细信息
来源: 评论
Path Planning based on Reinforcement Learning with Improved APF model for Synergistic Multi-UAVs  26
Path Planning based on Reinforcement Learning with Improved ...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Ding, Qun Xu, Xiaolong Gui, Wenming Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China Jinling Institute of Technology School of Computer Science Nanjing211169 China
As the emerging technology of Unmanned Aerial Vehicles (UAVs) becomes mature, UAVs are widely used in environmental monitoring, communication and other fields. In view of this, this paper analyzed the task of synergis... 详细信息
来源: 评论
An optimal profit route planning scheme based on ACO-OPP  21
An optimal profit route planning scheme based on ACO-OPP
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Qiu, Yuhua Xu, Xiaolong Xia, Fei Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Information and communication Branch State Grid Jiangsu Electric Power Company Nanjing China
Taxi plays an important role of urban public transportation system. However, without appropriate route planning scheme, taxi drivers can only choose to wait or seek passengers in the absence of orders, leading to wast... 详细信息
来源: 评论
CBLNER: A Multi-models Biomedical Named Entity Recognition System Based on Machine Learning  1
收藏 引用
15th International Conference on intelligent Computing, ICIC 2019
作者: Lejun, Gong Xiaolin, Liu Xuemin, Yang Lipeng, Zhang Yao, Jia Ronggen, Yang Jiangsu Key Lab of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Faculty Intelligent Science and Control Engineering Jinling Institute of Technology Nanjing211169 China
Biomedical named entities is fundamental recognition task in biomedical text mining. This paper developed a system for identifying biomedical entities with four models including CRF, LSTM, Bi-LSTM and BiLSTM-CRF. The ... 详细信息
来源: 评论
Risk evaluation of financial websites based on structure mining
Risk evaluation of financial websites based on structure min...
收藏 引用
International Conference on Applications and Techniques in Cyber security and Intelligence, ATCSI 2017
作者: Li, Huakang Dai, Yuhao Jin, Xu Sun, Guozi Li, Tao Xu, Zheng Jiangsu Key Lab of Big Data and Security and Intelligent Processing School of Computer Science and Technology School of Software Nanjing University of Posts and Telecommunications Nanjing China The Third Research Institute of the Ministry of Public Security Shanghai China
With the development of network communication and security authentication technologies, Internet finance, a new financial business model which allows customers to achieve online financing, payment, investment and lend... 详细信息
来源: 评论