咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software and Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是91-100 订阅
排序:
Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage
收藏 引用
computers, Materials & Continua 2019年 第1期58卷 135-151页
作者: Zhiliang Deng Yongjun Ren Yepeng Liu Xiang Yin Zixuan Shen Hye-Jin Kim School of Information and Control Nanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science&TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China College of Information Engineering Yangzhou UniversityYangzhou225127China Business Administration Research Institute Sungshin W.UniversitySeoulKorea
Cloud storage represents the trend of intensive,scale and specialization of information technology,which has changed the technical architecture and implementation method of electronic records ***,it will provide a con... 详细信息
来源: 评论
Image Emotion Classification network Based on Multilayer Attentional Interaction,Adaptive Feature Aggregation
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4273-4291页
作者: Xiaorui Zhang Chunlin Yuan Wei Sun Sunil Kumar Jha Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China Adani University AhmedabadGujaratIndia
The image emotion classification task aims to use the model to automatically predict the emotional response of people when they see the *** have shown that certain local regions are more likely to inspire an emotional... 详细信息
来源: 评论
A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection
收藏 引用
computer Systems Science & engineering 2022年 第6期41卷 1043-1056页
作者: Xiaorui Zhang Wenfang Zhang Wei Sun Xingming Sun Sunil Kumar Jha Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszowVoivodeship100031Poland
In a telemedicine diagnosis system,the emergence of 3D imaging enables doctors to make clearer judgments,and its accuracy also directly affects doctors’diagnosis of the *** order to ensure the safe transmission and s... 详细信息
来源: 评论
Semi-supervised stacked autoencoder-based deep hierarchical semantic feature for real-time fingerprint liveness detection
Semi-supervised stacked autoencoder-based deep hierarchical ...
收藏 引用
作者: Yuan, Chengsheng Chen, Xianyi Yu, Peipeng Meng, Ruohan Cheng, Weijin Wu, Q. M. Jonathan Sun, Xingming School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing210044 China Department of Electrical and Computer Engineering University of Windsor WindsorONN9B 3P4 Canada
The popularity of biometric authentication technology benefits from the rapid development of smart mobile devices in recent years, and fingerprints, which are inherent human traits and neither easily revealed nor deci... 详细信息
来源: 评论
Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 3035-3050页
作者: Xiaorui Zhang Xun Sun Xingming Sun Wei Sun Sunil Kumar Jha Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow Voivodeship100031Poland
The leakage of medical audio data in telemedicine seriously violates the privacy of *** order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algorithm is p... 详细信息
来源: 评论
Order tracking based on Gabor and Viterbi algorithm
Order tracking based on Gabor and Viterbi algorithm
收藏 引用
2011 International Conference on Mechatronic Science, Electric engineering and computer, MEC 2011
作者: Zhao, Xiaoping Zhao, Xiuli Wang, Yan Zheng, Yuhui Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Hebei Software Institute Baoding 071000 China School of Electrical Engineering and Information Anhui University of Technology Maanshan China
The study proposes an improved Gabor order tracking technique based on Viterbi algorithm (V-GOT) to cope with close orders and crossing orders that cannot be effectively separated by using the original Gabor order tra... 详细信息
来源: 评论
Resource Allocation for Throughput Maximization in Cognitive Radio network with NOMA
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 195-212页
作者: Xiaoli He Yu Song Yu Xue Muhammad Owais Weijian Yang Xinwen Cheng School of Computer Science Sichuan University of Science and EngineeringZigong643000China Department of Network Information Management Center Sichuan University of Science and EngineeringZigong643000China School of Information Engineering South West University of Science and TechnologyMianyang621010China School of Computer and Software Nanjing University of Information Science and TechnologyJiangsu210044China Alhamd Islamic University Airport Road Quetta BalochistanPakistan
Spectrum resources are the precious and limited natural *** order to improve the utilization of spectrum resources and maximize the network throughput,this paper studies the resource allocation of the downlink cogniti... 详细信息
来源: 评论
VPIT: An improved range-free localization algorithm using voronoi diagrams for wireless sensor networks
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2015年 第8期10卷 23-34页
作者: Sun, Xingming Hu, Yachao Wang, Baowei Zhan, Jian Li, Tao School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing China
Localization systems have been identified as key issues in the development and operation of wireless sensor networks. The global positioning system (GPS) solves the problem about localization, but it is not suitable f... 详细信息
来源: 评论
Outsourced data modification algorithm with assistance of multi-assistants in cloud computing
Outsourced data modification algorithm with assistance of mu...
收藏 引用
作者: Shen, Jian Shen, Jun Li, Xiong Wei, Fushan Li, Jiguo Department of Jiangsu Engineering Center of Network Monitoring Jiangsu210044 China Technology and Engineering Center of Meteorological Sensor Network Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing Jiangsu210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Hunan University of Science and Technology Hunan410082 China PLA Information Engineering University Henan450002 China Hohai University Nanjing210098 China
The rapid development of cloud storage has caused a wave of research craze. To improve cloud user experience, a large number of schemes are proposed with various practical performances, like long-term correct ensurenc... 详细信息
来源: 评论
A fibonacci based batch auditing protocol for cloud data  1
收藏 引用
9th International Symposium on Cyberspace Safety and Security, CSS 2017
作者: Shen, Jian Shen, Jun Wang, Chen Wang, Anxi Jiangsu Engineering Center of Network Monitoring Nanjing China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China
As cloud storage is developing fast with time going by, the design of auditing protocols has caught a large number of researchers’ eyes. However, though most of the existing auditing protocols have considered batch a... 详细信息
来源: 评论