咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software & Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是111-120 订阅
排序:
CACA-UAN: A context-aware communication approach to efficient and reliable underwater acoustic sensor networks
CACA-UAN: A context-aware communication approach to efficien...
收藏 引用
作者: Liu, Qi Chen, Xuedong Liu, Xiaodong Linge, Nigel Jiangsu Collaborative Innovation Centre of Atmospheric Environment and Equipment Technology School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China School of Computer and Software Jiangsu Engineering Centre of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China School of Computing Edinburgh Napier University 10 Clinton Road EdinburghEH10 5DT United Kingdom School of Computing Science and Engineering University of Salford Salford Greater ManchesterM5 4WT United Kingdom
Underwater acoustic sensor networks (UANs) have emerged as a promising technology recently, which can be applied in many areas such as military and civil, where the communication between devices is crucial and challen... 详细信息
来源: 评论
Minimum length key in MST cryptosystems
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 142-152页
作者: Haibo HONG Licheng WANG Haseeb AHMAD Yixian YANG Zhiguo QU School of Computer Science and Information Engineering Zhejiang Gongshang University Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology
As a special factorization category of finite groups, logarithmic signature(LS) is used as the main component of cryptographic keys that operate within secret key cryptosystems such as PGM and public key cryptosystems... 详细信息
来源: 评论
Motor Fault Diagnosis Based on Short-time Fourier Transform and Convolutional Neural network
收藏 引用
Chinese Journal of Mechanical engineering 2017年 第6期30卷 1357-1368页
作者: Li-Hua Wang Xiao-Ping Zhao Jia-Xin Wu Yang-Yang Xie Yong-Hong Zhang School of Information and Control Nanjing University ofInformation Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University ofInformation Science and Technology Nanjing 210044 China Network Monitoring Center of Jiangsu Province NanjingUniversity of Information Science and TechnologyNanjing 210044 China
With the rapid development of mechanical equipment, the mechanical health monitoring field has entered the era of big data. However, the method of manual feature extraction has the disadvantages of low efficiency and ... 详细信息
来源: 评论
Coverless image steganography based on SIFT and BOF
Coverless image steganography based on SIFT and BOF
收藏 引用
作者: Yuan, Chengsheng Xia, Zhihua Sun, Xingming School of Computer and Software Nanjing University of Information Science and Technology China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology China
In order to realize secret communication, conventional steganography techniques can embed the secret message into carrier images by modifying the content and structure of carrier images. Although steganography techniq... 详细信息
来源: 评论
Short text classification technology based on KNN+hierarchy SVM  12th
Short text classification technology based on KNN+hierarchy ...
收藏 引用
12th International Conference on Future Information Technology, FutureTech 2017
作者: Yin, Chunyong Shi, Lingfeng Wang, Jin School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China College of Information Engineering Yangzhou University Yangzhou China
A short text classification method based on combination of KNN and hierarchical SVM is proposed. First, the KNN algorithm is improved to get the K nearest neighbor class labels quickly, so as to effectively filter the... 详细信息
来源: 评论
Improved data stream clustering algorithm for anomaly detection  12th
Improved data stream clustering algorithm for anomaly detect...
收藏 引用
12th International Conference on Future Information Technology, FutureTech 2017
作者: Yin, Chunyong Zhang, Sun Wang, Jin School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China College of Information Engineering Yangzhou University Yangzhou China
Intrusion detection provides important protection for network security and anomaly detection as a type of intrusion detection, can recognize the pattern of normal behaviors and label the behaviors which departure from... 详细信息
来源: 评论
Application of an improved data stream clustering algorithm in intrusion detection system  12th
Application of an improved data stream clustering algorithm ...
收藏 引用
12th International Conference on Future Information Technology, FutureTech 2017
作者: Yin, Chunyong Xia, Lian Wang, Jin School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China College of Information Engineering Yangzhou University Yangzhou China
With the continuous development of computer network technology, traditional intrusion detection system is short of good adaptability. Aiming at the traditional intrusion detection system is difficult to adapt to the i... 详细信息
来源: 评论
A duplicate data detection approach based on MapReduce and HDFS
收藏 引用
Recent Patents on computer Science 2017年 第2期10卷 140-148页
作者: Wei, Fang Xue-Zhi, Wen Yu, Zheng Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing210066 China Department of Electrical & Computer Engineering University of Florida GainesvilleFL32611 United States
Background: With the surge in the volume of collected data, deduplication will undoubtedly become one of the problems faced by researchers. There is significant advantage for deduplication to reduce storage, network b... 详细信息
来源: 评论
Error analysis of time delay based on ultrasonic phased array structural health monitoring
收藏 引用
Journal of computers (Taiwan) 2018年 第4期29卷 176-184页
作者: Ji, Sai Gu, Feihong Sun, Yajie Wang, Jin Jiangsu engineering Centre of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China School of Information Engineering Yangzhou University Yangzhou225002 China
Ultrasonic phased array technology becomes significant in structural health monitoring with its flexible beam deflection and strong focusing performance. The transducer is used to complete the multiple directions scan... 详细信息
来源: 评论
Fingerprint Liveness Detection from Different Fingerprint Materials Using Convolutional Neural network and Principal Component Analysis
收藏 引用
computers, Materials & Continua 2017年 第4期53卷 357-372页
作者: Chengsheng Yuan Xinting Li Q.M.Jonathan Wu Jin Li Xingming Sun School of Computer and Software Nanjing University of Information Science&TechnologyNing Liu RoadNo.219NanjingChina210044 Jiangsu Engineering Center of Network Monitoring Ning Liu RoadNo.219NanjingChina210044 Department of Electrical and Computer Engineering University of Windsor401 Sunset AvenueWindsorONCanada N9B 3P4 School of Computer Science Guangzhou UniversityYudongxi Road 36Tianhe DistrictGuangzhouChina510500
Fingerprint-spoofing attack often occurs when imposters gain access illegally by using artificial fingerprints,which are made of common fingerprint materials,such as silicon,latex,***,to protect our privacy,many finge... 详细信息
来源: 评论