咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software & Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是71-80 订阅
排序:
A robust instantaneous frequency estimation of rotating machinery
A robust instantaneous frequency estimation of rotating mach...
收藏 引用
2011 International Conference on Mechatronic Science, Electric engineering and computer, MEC 2011
作者: Zhao, Xiaoping Zhao, Xiuli Zheng, Yuhui Xie, Shengdong Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Hebei Software Institute Baoding 071000 China
The problem of estimating and tracking the fundamental frequency of a periodic signal is formulated in short Fourier transform and viterbi algorithm (STFT-VA) is proposed. An improvement to peak search is proposed, wh... 详细信息
来源: 评论
Dynamic Resource Scheduling in Emergency Environment
收藏 引用
Journal of Information Hiding and Privacy Protection 2019年 第3期1卷 143-155页
作者: Yuankun Yan Yan Kong Zhangjie Fu School of Computer&Software Nanjing University of Information Science&TechnologyNanjingChina Jiangsu Engineering Center of Network Monitoring School of Computer and SoftwareNanjingChina
Nowadays,emergency accidents could happen at any *** accidents occur unpredictably and the accidents requirements are *** accidents happen in a dynamic environment and the resource should be cooperative to solve the *... 详细信息
来源: 评论
A Fusion Steganographic Algorithm Based on Faster R-CNN
收藏 引用
computers, Materials & Continua 2018年 第4期55卷 1-16页
作者: Ruohan Meng Steven G.Rice Jin Wang Xingming Sun School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNo.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Mathematics and Computer Science Northeastern State University TahlequahOK 74464USA School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410114China
The aim of information hiding is to embed the secret message in a normal cover media such as image,video,voice or text,and then the secret message is transmitted through the transmission of the cover *** secret messag... 详细信息
来源: 评论
A Phase Estimation Algorithm for Quantum Speed-Up Multi-Party Computing
收藏 引用
computers, Materials & Continua 2021年 第4期67卷 241-252页
作者: Wenbin Yu Hao Feng Yinsong Xu Na Yin Yadang Chen Zhi-Xin Yang Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Jiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Department of Computer Science and Engineering Michigan State UniversityEast Lansing48824MIUSA State Key Laboratory of Internet of Things for Smart City and Department of Electromechanical Engineering University of Macao999078Macao
Security and privacy issues have attracted the attention of researchers in the field of IoT as the information processing scale grows in sensor *** computing,theoretically known as an absolutely secure way to store an... 详细信息
来源: 评论
RFID indoor localization algorithm based on adaptive self-correction
收藏 引用
International Journal of Smart Home 2014年 第6期8卷 205-216页
作者: Gu, Yunhua Zhang, Junyong Wang, Jin Gao, Bao Du, Jie Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
With the rapid development of wireless communication and embedded system, wireless positioning systems are paid more and more attention to. Radio Frequency Identification (RFID) localization system is getting more imp... 详细信息
来源: 评论
A Survey of Image Information Hiding Algorithms Based on Deep Learning
收藏 引用
computer Modeling in engineering & Sciences 2018年 第12期117卷 425-454页
作者: Ruohan Meng Qi Cui Chengsheng Yuan School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNo.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Electrical and computer Engineering University of Windsor401 Sunset AvenueWindsorONN9B 374Canada.
With the development of data science and technology,information security has been further *** order to solve privacy problems such as personal privacy being peeped and copyright being infringed,information hiding algo... 详细信息
来源: 评论
Multi-objective layout optimization of a satellite module using the Wang-Landau sampling method with local search
收藏 引用
Frontiers of Information Technology & Electronic engineering 2016年 第6期17卷 527-542页
作者: Jing-fa LIU Liang HAO Gang LI Yu XUE Zhao-xia LIU Juan HUANG Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science&TechnologyNanjing 210044China School of Computer&Software Nanjing University of Information Science&TechnologyNanjing 210044China School of Mathematics and Statistics Nanjing University of Information Science&TechnologyNanjing 210044China Office of lnformationization Construction and Management Nanjing University of Information Science&TechnologyNanjing 210044China
The layout design of satellite modules is considered to be NP-hard. It is not only a complex coupled system design problem but also a special multi-objective optimization problem. The greatest challenge in solving thi... 详细信息
来源: 评论
An incentive mechanism for crowdsourcing markets with social welfare maximization in cloud-edge computing
An incentive mechanism for crowdsourcing markets with social...
收藏 引用
作者: Xu, Xiaolong Cai, Qing Zhang, Guoming Zhang, Jie Tian, Wei Zhang, Xiaorui Liu, Alex X. School of Computer and Software Nanjing University of Information Science and Technology Jiangsu China Jiangsu Engineering Centre of Network Monitoring Nanjing University of Information Science and Technology Jiangsu China State Key Laboratory for Novel Software Technology Nanjing University Jiangsu China Department of Computer Science and Engineering Michigan State University MI United States
Crowdsourcing is emerging as a powerful paradigm that utilizes the distributed devices to sense, collect, and upload data to satisfy the requirements of the users. Currently, with the popularity of edge computing, edg... 详细信息
来源: 评论
A practical RFID grouping authentication protocol in multiple-tag arrangement with adequate security assurance  18
A practical RFID grouping authentication protocol in multipl...
收藏 引用
18th International Conference on Advanced Communications Technology, ICACT 2016
作者: Shen, Jian Tan, Haowen Ren, Yongjun Liu, Qi Wang, Baowei Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology China Jiangsu Technology and Engineering Center of Meteorological Sensor Network Nanjing University of Information Science and Technology China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology China School of Computer and Software Nanjing University of Information Science and Technology China
Radio Frequency Identification (RFID) is considered to be an authentication technology of great potential. Due to the bright future of low-cost RFID tags in practical situations, the authentication towards multiple ta... 详细信息
来源: 评论
Fingerprint Liveness Detection from Different Fingerprint Materials Using Convolutional Neural network and Principal Component Analysis
收藏 引用
computers, Materials & Continua 2017年 第4期53卷 357-372页
作者: Chengsheng Yuan Xinting Li Q.M.Jonathan Wu Jin Li Xingming Sun School of Computer and Software Nanjing University of Information Science&TechnologyNing Liu RoadNo.219NanjingChina210044 Jiangsu Engineering Center of Network Monitoring Ning Liu RoadNo.219NanjingChina210044 Department of Electrical and Computer Engineering University of Windsor401 Sunset AvenueWindsorONCanada N9B 3P4 School of Computer Science Guangzhou UniversityYudongxi Road 36Tianhe DistrictGuangzhouChina510500
Fingerprint-spoofing attack often occurs when imposters gain access illegally by using artificial fingerprints,which are made of common fingerprint materials,such as silicon,latex,***,to protect our privacy,many finge... 详细信息
来源: 评论