咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software & Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是191-200 订阅
排序:
An Approach of Removing Stroke Based on Touching Pattern for Handwritten Digits Segmentation
An Approach of Removing Stroke Based on Touching Pattern for...
收藏 引用
2013 International Conference on Advanced computer Science and Electronics Information(ICACSEI 2013)
作者: Ma Rui Cheng Yaping Gu Yunhua Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Computer and Software Institute Nanjing University of Information Science & Technology
For finding precise segmentation, a new approach to remove and amend stroke connecting touching handwriting digits based on touching pattern is presented. Firstly, background region of touching digits is analyzed by u... 详细信息
来源: 评论
Bacthing auditing of data in multicloud storage
International Journal of Database Theory and Application
收藏 引用
International Journal of Database Theory and Application 2014年 第6期7卷 139-150页
作者: Xia, Zhihua Wang, Xinhui Sun, Xingming Zhu, Yafeng Ji, Peng Wang, Jin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
Cloud storage enables users to outsource their data to cloud servers and enjoy the on-demand services. However, this new paradigm also introduces integrity threats toward user' outsourced data. This paper develops... 详细信息
来源: 评论
Security data auditing based on multifunction digital watermark for multimedia file in cloud storage
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2014年 第9期9卷 231-240页
作者: Ren, Yongjun Shen, Jian Wang, Jin Xu, Jiang Fang, Liming Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China
Cloud computing is a promising computing model that enables convenient and on-demand network access to a shared pool of configurable computing resources. In cloud computing, data owners host their data on cloud server... 详细信息
来源: 评论
A novel text copy detection method based on semantic feature
International Journal of Database Theory and Application
收藏 引用
International Journal of Database Theory and Application 2014年 第5期7卷 161-170页
作者: Zhang, Jianjun Sun, Xingming Wang, Jin School of Information Science and Engineering Hunan University Changsha China College of Engineering and Design Hunan Normal University Changsha China School of Computer and Software and Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China
With the rapid development of the Internet, getting shared resource on the network is becoming more easy, and various plagiarize is becoming to breed, so the research of text copy detection technology is becoming more... 详细信息
来源: 评论
Research and development of mobile application for android platform
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2014年 第4期9卷 187-198页
作者: Ma, Li Gu, Lei Wang, Jin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Key Laboratory of Meteorological Disaster Ministry of Education Nanjing University of Information Science and Technology Nanjing 210044 China
Today, as the developing of hardware of mobile is getting better, the performance index is much higher than the actual requirements of the software configuration. Phone's features more depend on software. As the A... 详细信息
来源: 评论
CIRM: A candidate item reduce method on mapreduce for meteorological big data application
收藏 引用
Energy Education Science and Technology Part A: Energy Science and Research 2014年 第6期32卷 6209-6220页
作者: Xue, Shengjun Huang, Junsheng Xu, Xiaolong Zhang, Jie Jing, Lu Nanjing University of Information Science and Technology School of Computer and Software Nanjing China Nanjing University of Information Science and Technology Jiangsu Engineering Center of Network Monitoring Nanjing China Nanjing University State Key Laboratory for Novel Software Technology Nanjing China Nanjing University Department of Computer Science and Technology Nanjing China Shanghai Meteorological Information and Technical Support Centre Shanghai China Computer Science Department Oklahoma State University StillwaterOK United States
With the increase of the number of meteorological stations, the meteorological data is growing rapidly. Association analysis algorithm is widely applied to the analysis of meteorological data. The traditional associat... 详细信息
来源: 评论
A study of agricultural meteorological monitoring system based on wireless sensor networks
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2014年 第7期9卷 15-26页
作者: Ma, Li Yan, Jingzhou Yan, Shuangshuang Wang, Baowei Liao, Kuo Wang, Jin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Key Laboratory of Meteorological Disaster of Ministry of Education Nanjing University of Information Science and Technology Nanjing 210044 China Ningde Meteorological Bureau Ningde 352100 China
In order to keep the sustainable development of agricultural industry, monitoring the four basic essential elements' changes, which are temperature, humidity, light intensity, carbon dioxide, and applying the corr... 详细信息
来源: 评论
An enhanced routing algorithm for congestion control in a home energy management system
An enhanced routing algorithm for congestion control in a ho...
收藏 引用
2013 IEEE 2nd Global Conference on Consumer Electronics, GCCE 2013
作者: Liu, Qi Qian, Hong Wei Wang, Bao Wei Shen, Jian Linge, Nigel Jiangsu Engineering Centre of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing China School of Computing Science and Engineering University of Salford Salford United Kingdom
Wireless communication is well used in home energy management systems (HEMS). ZigBee, as a typical example helps to achieve cheap and fast deployment, but also brings resource limits and performance issues. An enhance... 详细信息
来源: 评论
A secure text steganography based on synonym substitution
A secure text steganography based on synonym substitution
收藏 引用
2013 IEEE Conference Anthology, ANTHOLOGY 2013
作者: Qi, Cao Sun, Xingming Xiang, Lingyun Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology China School of Computer and Communication Hunan University Hunan 410082 China
In text steganography based on synonym substitution, the synonym number in synonym set is not always some powers of 2. In traditional methods, the redundant synonyms are always abandoned. Two different coding schedule... 详细信息
来源: 评论
Ground nephogram classification based on Gabor wavelet and SVM
Ground nephogram classification based on Gabor wavelet and S...
收藏 引用
2nd International Conference on Information engineering and Applications, IEA 2012
作者: Li, Hanguang Wang, Qi Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China College of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
Techniques called feature extraction and pattern recognition are implemented for nephogram representation and recognition. In this approach, the Gabor wavelets are used to extract features of ground nephograms. The pr... 详细信息
来源: 评论