咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software & Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是91-100 订阅
排序:
Big data trip classification on the New York City Taxi and uber sensor network
Big data trip classification on the New York City Taxi and u...
收藏 引用
作者: Sun, Huiyu Hu, Siyuan McIntosh, Suzanne Cao, Yi Department of Computer Science New York University United States Jiangsu Engineering Centre of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology China
Millions of trips are made every day by taxis and Uber in New York City. We first employ big data technologies to analyze this vast dataset: Apache Spark is used for data processing and classification, Apache Hive is ... 详细信息
来源: 评论
Intelligent Mobile Drone System Based on Real-Time Object Detection
收藏 引用
Journal on Artificial Intelligence 2019年 第1期1卷 1-8页
作者: Chuanlong Li Xingming Sun Junhao Cai School of Computer and Software Nanjing University of Information Science and TechnologyNanjingChina Jiangsu Engineering Centre of Network Monitoring Nanjing210044China School of Politics Economics and International RelationsUniversity of ReadingBerkshireRG66BGUnited Kingdom
Drone also known as unmanned aerial vehicle(UAV)has drawn lots of attention in recent *** as one of the most popular drones has great potential in both industrial and academic *** drones are capable of taking off vert... 详细信息
来源: 评论
A Novel Quantum Stegonagraphy Based on Brown States
收藏 引用
computers, Materials & Continua 2018年 第7期56卷 47-59页
作者: Zhiguo Qu Tiancheng Zhu Jinwei Wang Xiaojun Wang Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing 210044P.R.China School of Computers&Software Nanjing University of Information Science and TechnologyNanjing 210044P.R.China School of Electronic Engineering Dublin City UniversityDublinIreland
In this paper,a novel quantum steganography protocol based on Brown entangled states is *** new protocol adopts the CNOT operation to achieve the transmission of secret information by the best use of the characteristi... 详细信息
来源: 评论
Study on Initial Alignment Under Large Misalignment Angle
收藏 引用
Journal of Information Hiding and Privacy Protection 2019年 第3期1卷 95-108页
作者: Qi Wang Changsong Yang Shaoen Wu School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China Department of Computer Science Ball State UniversityMuncieUSA School of Automation Nanjing University of Information Science and TechnologyNanjing210044China
Misalignment angle error model describing the SINS mathematical platform error is presented in this paper following the idea of small misalignment angle error model and large azimuth misalignment angle error *** can b... 详细信息
来源: 评论
Identifying Materials of Photographic Images and Photorealistic computer Generated Graphics Based on Deep CNNs
收藏 引用
computers, Materials & Continua 2018年 第5期55卷 229-241页
作者: Qi Cui Suzanne McIntosh Huiyu Sun School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNo.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Computer Science Department New York UniversityNew YorkNY 10012USA
Currently,some photorealistic computer graphics are very similar to photographic *** computer generated graphics can be forged as photographic images,causing serious security *** aim of this work is to use a deep neur... 详细信息
来源: 评论
A Fusion Steganographic Algorithm Based on Faster R-CNN
收藏 引用
computers, Materials & Continua 2018年 第4期55卷 1-16页
作者: Ruohan Meng Steven G.Rice Jin Wang Xingming Sun School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNo.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Mathematics and Computer Science Northeastern State University TahlequahOK 74464USA School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410114China
The aim of information hiding is to embed the secret message in a normal cover media such as image,video,voice or text,and then the secret message is transmitted through the transmission of the cover *** secret messag... 详细信息
来源: 评论
A Survey of Image Information Hiding Algorithms Based on Deep Learning
收藏 引用
computer Modeling in engineering & Sciences 2018年 第12期117卷 425-454页
作者: Ruohan Meng Qi Cui Chengsheng Yuan School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNo.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Electrical and computer Engineering University of Windsor401 Sunset AvenueWindsorONN9B 374Canada.
With the development of data science and technology,information security has been further *** order to solve privacy problems such as personal privacy being peeped and copyright being infringed,information hiding algo... 详细信息
来源: 评论
Instance Retrieval Using Region of Interest Based CNN Features
收藏 引用
Journal of New Media 2019年 第2期1卷 87-99页
作者: Jingcheng Chen Zhili Zhou Zhaoqing Pan Ching-nung Yang Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Department of Electrical and computer Engineer University of WinsorN9B3P4WinsorONCanada Department of Computer Science and Information Engineering National Dong Hwa University ShoufengHualien 974Taiwan
Recently, image representations derived by convolutional neural networks(CNN) have achieved promising performance for instance retrieval, and they outperformthe traditional hand-crafted image features. However, most o... 详细信息
来源: 评论
Quantum Algorithm for Appointment Scheduling
收藏 引用
Journal of Quantum Computing 2019年 第2期1卷 111-118页
作者: Wenbin Yu Yinsong Xu Wenjie Liu Alex Xiangyang Liu Baoyu Zheng Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science&TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Department of Computer Science and Engineering Michigan State UniversityEast LansingMI 48824-1266USA National Engineering Research Center for Communications and Network Technology Nanjing University of Posts and TelecommunicationsNanjing210003China
Suppose a practical scene that when two or more parties want to schedule anappointment, they need to share their calendars with each other in order to make itpossible. According to the present result the whole communi... 详细信息
来源: 评论
Quantum Multi-User Detection Based on Coherent State Signals
收藏 引用
Journal of Quantum Computing 2019年 第2期1卷 81-88页
作者: Wenbin Yu Yinsong Xu Wenjie Liu Alex Xiangyang Liu Baoyu Zheng Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science&TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Department of Computer Science and Engineering Michigan State UniversityEast LansingMI 48824-1266USA National Engineering Research Center for Communications and Network Technology Nanjing University of Posts and TelecommunicationsNanjing210003China
Multi-user detection is one of the important technical problems for moderncommunications. In the field of quantum communication, the multi-access channel onwhich we apply the technology of quantum information processi... 详细信息
来源: 评论