咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software and Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是151-160 订阅
排序:
Cooperative provable data possession with stateless verification in multicloud storage
收藏 引用
Journal of Computational Information Systems 2014年 第8期10卷 3403-3411页
作者: Sun, Xingming Chen, Lihong Xia, Zhihua Zhu, Yanling Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
Provable Data Possession (PDP) is a probabilistic proof technique for checking the availability and integrity of files on untrusted storage servers without downloading the whole data files. Recently, Zhu et al. propos... 详细信息
来源: 评论
Nonsubsampled contourlet transform based illumination invariant extracting method
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第17期4卷 47-55页
作者: Fan, Chun-nian Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
Face recognition research in recent years has made great progress, yet many issues still remain to be addressed. Illumination changes are one of the key issues. In order to eliminate the effect of varying illumination... 详细信息
来源: 评论
An elastic meteorological cloud platform based on Xen
收藏 引用
Information Technology Journal 2013年 第15期12卷 3174-3178页
作者: Wei, Fang Zhi, Wen Xue Xu, Jiang Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology 210044 Nanjing China School of Computer and Software Nanjing University of Information Science and Technology 210044 Nanjing China
In the atmospheric sciences, the scales of atmospheric data are massive and growing rapidly. For complex weather forecast, such as the typhoon track prediction requires the computing of very large of computers. In ord... 详细信息
来源: 评论
Multi-Path Attention Inverse Discrimination network for Offline Signature Verification
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 3057-3071页
作者: Xiaorui Zhang Yingying Wang Wei Sun Qi Cui Xindong Wei School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing 210044China Department of Electrical and Computer Engineering University of WindsorWindsorN9B 3P4Canada School of Teacher Education Nanjing University of Information Science&TechnologyNanjing210044China
Signature verification,which is a method to distinguish the authenticity of signature images,is a biometric verification technique that can effectively reduce the risk of forged signatures in financial,legal,and other... 详细信息
来源: 评论
Energy-landscape paving for prediction of face-centered-cubic hydrophobic-hydrophilic lattice model proteins
收藏 引用
Physical Review E 2013年 第5期88卷 052704-052704页
作者: Jingfa Liu Beibei Song Zhaoxia Liu Weibo Huang Yuanyuan Sun Wenjie Liu Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China Network Information Center Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
Protein structure prediction (PSP) is a classical NP-hard problem in computational biology. The energy-landscape paving (ELP) method is a class of heuristic global optimization algorithm, and has been successfully app... 详细信息
来源: 评论
Wang-Landau sampling in face-centered-cubic hydrophobic-hydrophilic lattice model proteins
收藏 引用
Physical Review E 2014年 第4期90卷 042715-042715页
作者: Jingfa Liu Beibei Song Yonglei Yao Yu Xue Wenjie Liu Zhaoxia Liu Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing 210044 China School of Computer & Software Nanjing University of Information Science & Technology Nanjing 210044 China Network Information Center Nanjing University of Information Science & Technology Nanjing 210044 China
Finding the global minimum-energy structure is one of the main problems of protein structure prediction. The face-centered-cubic (fcc) hydrophobic-hydrophilic (HP) lattice model can reach high approximation ratios of ... 详细信息
来源: 评论
Combiningwavelet transform and LBP related features for fingerprint liveness detection
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer Science 2016年 第3期43卷 290-298页
作者: Xia, Zhihua Yuan, Chengsheng Sun, Xingming Sun, Decai Rui, L. Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology School of Computer and SoftwareNanjing University of Information Science and Technology Nanjing China College of Information Science and Technology Bohai University China
Fingerprint authentication system may verify the identity of the user according to the features of fingerprint. It has been widely used in government departments and national security departments. However, there are s... 详细信息
来源: 评论
Survey on the Application of Deep Reinforcement Learning in Image Processing
收藏 引用
Journal on Artificial Intelligence 2020年 第1期2卷 39-58页
作者: Wei Fang Lin Pang Weinan Yi School of Computer&Software Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science&TechnologyNanjingChina State Key Laboratory for Novel Software Technology Nanjing UniversityNanjingChina Jiangsu Key Laboratory of Computer Information Process Technology Soochow UniversitySuzhouChina
feature representations from a large amount of data,and use reinforcement learning to learn the best strategy to complete the *** the combination of deep learning and reinforcement learning,end-to-end input and output... 详细信息
来源: 评论
Mixed Noise Removal by Residual Learning of Deep CNN
收藏 引用
Journal of New Media 2020年 第1期2卷 1-10页
作者: Kang Yang Jielin Jiang Zhaoqing Pan School of Computer and Software Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science and TechnologyNanjing210044China Country Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science and TechnologyNanjing210044China
Due to the huge difference of noise distribution,the result of a mixture of multiple noises becomes very *** normal circumstances,the most common type of mixed noise is to add impulse noise(IN)and then white Gaussian ... 详细信息
来源: 评论
Efficient and secure multi-keyword ranked search over encrypted office open XML data
收藏 引用
Journal of Computational Information Systems 2015年 第7期11卷 2701-2708页
作者: Xi, Jie Sun, Xingming Fu, Zhangjie Zhang, Youdong Xin, Lin Cao, Xinyue School of Computer & Software Nanjing University of Information Science & Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing China Department of Computer Engineering Huaiyin Institute of Technology Huaian China
As cloud computing goes increasingly mature, searchable encryption schemes have been widely applied to the real world. Those not only provide high efficiency but also protect users' privacy well. However, the exis... 详细信息
来源: 评论