咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software & Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是21-30 订阅
排序:
Analysis and Improvement of Steganography Protocol Based on Bell States in Noise Environment
收藏 引用
computers, Materials & Continua 2019年 第5期59卷 607-624页
作者: Zhiguo Qu Shengyao Wu Wenjie Liu Xiaojun Wang Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Computer&Software Nanjing University of Information Science and TechnologyNanjing210044China School of Electronic Engineering Dublin City UniversityDublinIreland
In the field of quantum communication,quantum steganography is an important branch of quantum information *** a realistic quantum communication system,quantum noises are unavoidable and will seriously impact the safet... 详细信息
来源: 评论
Lever Arm Compensation of Autonomous Underwater Vehicle for Fast Transfer Alignment
收藏 引用
computers, Materials & Continua 2019年 第4期59卷 105-118页
作者: Qi Wang Changsong Yang Shaoen Wu Yuxiang Wang School of Computer and software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China Department of Computer Science Ball State UniversityMuncie 47306USA
Transfer alignment is used to initialize SINS(Strapdown Inertial Navigation System)in ***-arm effect compensation is studied existing in an AUV(Autonomous Underwater Vehicle)before launched from the mother *** AUV is ... 详细信息
来源: 评论
Minimum length key in MST cryptosystems
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 142-152页
作者: Haibo HONG Licheng WANG Haseeb AHMAD Yixian YANG Zhiguo QU School of Computer Science and Information Engineering Zhejiang Gongshang University Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology
As a special factorization category of finite groups, logarithmic signature(LS) is used as the main component of cryptographic keys that operate within secret key cryptosystems such as PGM and public key cryptosystems... 详细信息
来源: 评论
Feature Relationships Learning Incorporated Age Estimation Assisted by Cumulative Attribute Encoding
收藏 引用
computers, Materials & Continua 2018年 第9期56卷 467-482页
作者: Qing Tian Meng Cao Tinghuai Ma School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Electrical and Electronic Engineering University of ManchesterManchesterM139PLUK
The research of human facial age estimation(AE)has attracted increasing attention for its wide *** to date,a number of models have been constructed or employed to perform *** the goal of AE can be achieved by either c... 详细信息
来源: 评论
A Method for Improving CNN-Based Image Recognition Using DCGAN
收藏 引用
computers, Materials & Continua 2018年 第10期57卷 167-178页
作者: Wei Fang Feihong Zhang Victor S.Sheng Yewen Ding School of Computer&Software Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science&TechnologyNanjing210044China State Key Lab.for Novel Software Technology Nanjing UniversityNanjing210023China Computer Science Department University of Central ArkansasConway AR72035USA
Image recognition has always been a hot research topic in the scientific community and *** emergence of convolutional neural networks(CNN)has made this technology turned into research focus on the field of computer vi... 详细信息
来源: 评论
An Application Review of Artificial Intelligence in Prevention and Cure of COVID-19 Pandemic
收藏 引用
computers, Materials & Continua 2020年 第10期65卷 743-760页
作者: Peipeng Yu Zhihua Xia Jianwei Fei Sunil Kumar Jha Engineering Research Center of Digital Forensics Ministry of EducationSchool of Computer and SoftwareJiangsu Engineering Center of Network MonitoringJiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment TechnologyNanjing University of Information Science&TechnologyNanjing210044China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow Voivodeship100031Poland
Coronaviruses are a well-known family of viruses that can infect humans or ***,the new coronavirus(COVID-19)has spread *** countries in the world are working hard to control the coronavirus ***,many countries are face... 详细信息
来源: 评论
Motor Fault Diagnosis Based on Short-time Fourier Transform and Convolutional Neural network
收藏 引用
Chinese Journal of Mechanical engineering 2017年 第6期30卷 1357-1368页
作者: Li-Hua Wang Xiao-Ping Zhao Jia-Xin Wu Yang-Yang Xie Yong-Hong Zhang School of Information and Control Nanjing University ofInformation Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University ofInformation Science and Technology Nanjing 210044 China Network Monitoring Center of Jiangsu Province NanjingUniversity of Information Science and TechnologyNanjing 210044 China
With the rapid development of mechanical equipment, the mechanical health monitoring field has entered the era of big data. However, the method of manual feature extraction has the disadvantages of low efficiency and ... 详细信息
来源: 评论
An effective scheme for biometric cryptosystems  2
An effective scheme for biometric cryptosystems
收藏 引用
2nd IEEE International Conference on computer and Communications, ICCC 2016
作者: Zhou, Yu Zhao, Bo Han, Jin Jun, Zheng School of Computer Science and Software Engineering East China Normal University Shanghai China School of Software and Microelectronics Peking University Beijing China Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology China
Compared with traditional cryptography, biometric cryptosystems provide more convenient and safe protection of keys. In this paper, an effective scheme for biometric cryptosystems based on the intersections of hyper-p... 详细信息
来源: 评论
Efficient sampling methods for characterizing POIs on maps based on road networks
收藏 引用
Frontiers of computer Science 2018年 第3期12卷 582-592页
作者: Ziting ZHOU Pengpeng ZHAO Victor S. SHENG Jiajie XU Zhixu LI Jian WU Zhiming CUI School of Computer Science and Technology Soochow University Suzhou 215006 China Department of Computer Science University of Central Arkansas Conway AR 72035 USA Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing 210044 China
With the rapid development of location-based services, a particularly important aspect of start-up marketing research is to explore and characterize points of interest (PoIs) such as restaurants and hotels on maps. ... 详细信息
来源: 评论
A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things
收藏 引用
computers, Materials & Continua 2019年 第3期58卷 679-695页
作者: Baowei Wang Weiwen Kong Wei Li Neal NXiong Jiangsu Engineering Centre of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment TechnologySchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Engineering Research Center of Electronic Information and Control from Fujian Provincial Education Department Fuzhou350108China Department of Mathematics and Computer Science Northeastern State UniversityOklahomaUSA.
Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment,especially in resource-constrained sensor networks,such as the perception layer of Internet of Things **... 详细信息
来源: 评论