咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software & Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是81-90 订阅
排序:
Ground nephogram classification based on Gabor wavelet and SVM
Ground nephogram classification based on Gabor wavelet and S...
收藏 引用
2nd International Conference on Information engineering and Applications, IEA 2012
作者: Li, Hanguang Wang, Qi Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China College of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
Techniques called feature extraction and pattern recognition are implemented for nephogram representation and recognition. In this approach, the Gabor wavelets are used to extract features of ground nephograms. The pr... 详细信息
来源: 评论
Training pool selection for semi-supervised learning
Training pool selection for semi-supervised learning
收藏 引用
9th International Symposium on Neural networks, ISNN 2012
作者: Ge, Jian Ma, Tinghuai Yan, Qiaoqiao Yan, Yonggang Tian, Wei Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology 210044 Nanjing China College of Computer and Software Nanjing University of Information Science and Technology 210044 Nanjing China
Semi-supervised leaning deals with methods for automatically exploiting unlabeled samples in addition to labeled set. The data selection is an important topic in active learning. It addresses the selection the valuabl... 详细信息
来源: 评论
Research on the Signal Reconstruction of the Phased Array Structural Health monitoring Based Using the Basis Pursuit Algorithm
收藏 引用
computers, Materials & Continua 2019年 第2期58卷 409-420页
作者: Yajie Sun Yanqing Yuan Qi Wang Lihua Wang Enlu Li Li Qiao Jiangsu Engineering Centre of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China School of Information and Control Nanjing University of Information Science and TechnologyNanjing210044China Capability Systems Centre School of Engineering and Information TechnologyUniversity of New South WalesCanberra2600Australia
The signal processing problem has become increasingly complex and demand high acquisition system,this paper proposes a new method to reconstruct the structure phased array structural health monitoring *** method is de... 详细信息
来源: 评论
Coverless steganography based on english texts using binary tags protocol
Coverless steganography based on english texts using binary ...
收藏 引用
作者: Wu, Yulei Chen, Xianyi Sun, Xingming Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science and Technology China School of Computer and Software Nanjing University of Information Science and Technology China
Information hiding is an evolving and challenging research field. Lately, a novel information hiding method that utilizes the original cover without modification to transmit secret messages has raised attention of the... 详细信息
来源: 评论
Embedding Image Through Generated Intermediate Medium Using Deep Convolutional Generative Adversarial network
收藏 引用
computers, Materials & Continua 2018年 第8期56卷 313-324页
作者: Chuanlong Li Yumeng Jiang Marta Cheslyar School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNo.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China School of Informatics University of EdinburghOld CollegeSouth BridgeEdinburghEH89YLUK
Deep neural network has proven to be very effective in computer vision *** convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of traditi... 详细信息
来源: 评论
Full-Blind Delegating Private Quantum Computation
收藏 引用
computers, Materials & Continua 2018年 第8期56卷 211-223页
作者: Wenjie Liu Zhenyu Chen Jinsuo Liu Zhaofeng Su Lianhua Chi Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science&TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China State Grid Electric Power Research Institute NARI Group CorporationNanjing210003China Centre for Quantum Software and Information Faculty of Engineering and Information TechnologyUniversity of Technology SydneyNSW2007Australia Department of Computer Science and Information Technology La Trobe UniversityVIC3086Australia
The delegating private quantum computation(DQC)protocol with the universal quantum gate set{X,Z,H,P,R,CNOT}was firstly proposed by Broadbent et al.[Broadbent(2015)],and then Tan et al.[Tan and Zhou(2017)]tried to put ... 详细信息
来源: 评论
A simplification method of terrain modeling based on spatial-autocorrelation
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2014年 第5期9卷 185-194页
作者: Gu, Yunhua Wu, Xiaoyan Wang, Jin Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
To solve the problem of three-dimensional terrain simplification in large-scale which was based on digital elevation model (DEM) data, a terrain simplified method based on the theory of spatial autocorrelation was pro... 详细信息
来源: 评论
LKAW: A Robust Watermarking Method Based on Large Kernel Convolution and Adaptive Weight Assignment
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1-17页
作者: Xiaorui Zhang Rui Jiang Wei Sun Aiguo Song Xindong Wei Ruohan Meng Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China School of Instrument Science and Engineering Southeast UniversityNanjing211189China School of Teacher Education Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Science Engineering Nanyang Technological UniversitySingapore
Robust watermarking requires finding invariant features under multiple attacks to ensure correct *** learning has extremely powerful in extracting features,and watermarking algorithms based on deep learning have attra... 详细信息
来源: 评论
Improving communications with bluetooth enabled collaborative middleware in MANET
收藏 引用
Journal of China Universities of Posts and Telecommunications 2012年 第SUPPL. 1期19卷 100-107页
作者: Gao, Feng Liu, Qi Hope, Martin Fan, Tong-Rang School of Information Science and Technology Shijiazhuang Tiedao University Shijiazhuang 050043 China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer Science and Engineering University of Salford Manchester M5 4WT United Kingdom
The main aim of the research presented in this paper was to investigate how can collaborative middleware based collaborative working environment (CWE), combined with bluetooth technology, enhance the communications of... 详细信息
来源: 评论
Coverless information hiding method based on the Chinese mathematical expression  1st
Coverless information hiding method based on the Chinese mat...
收藏 引用
1st International Conference on Cloud Computing and Security, ICCCS 2015
作者: Chen, Xianyi Sun, Huiyu Tobe, Yoshito Zhou, Zhili Sun, Xingming School of Computer and Software and Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing Jiangsu210044 China Department of Computer Science New York University New YorkNY10012 United States Aoyama Gakuin University Kanagawa252-5258 Japan
Recently, many fruitful results have been presented in text information hiding such as text format-based, text image-based method and so on. However, existing information hiding approaches so far have been very diffic... 详细信息
来源: 评论