咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software and Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是191-200 订阅
排序:
Fusion of Internal Similarity to Improve the Accuracy of Recommendation Algorithm
收藏 引用
Journal on Internet of Things 2021年 第2期3卷 65-76页
作者: Zejun Yang Denghui Xia Jin Liu Chao Zheng Yanzhen Qu Yadang Chen Chengjun Zhang School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Yukun(Beijing)Network Technology Co. Ltd.Beijing102200China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Computer Science and Technology Colorado Technical UniversityColorado Springs80907USA
Collaborative filtering algorithms(CF)and mass diffusion(MD)algorithms have been successfully applied to recommender systems for years and can solve the problem of information ***,both algorithms suffer from data spar... 详细信息
来源: 评论
Intelligent Mobile Drone System Based on Real-Time Object Detection
收藏 引用
Journal on Artificial Intelligence 2019年 第1期1卷 1-8页
作者: Chuanlong Li Xingming Sun Junhao Cai School of Computer and Software Nanjing University of Information Science and TechnologyNanjingChina Jiangsu Engineering Centre of Network Monitoring Nanjing210044China School of Politics Economics and International RelationsUniversity of ReadingBerkshireRG66BGUnited Kingdom
Drone also known as unmanned aerial vehicle(UAV)has drawn lots of attention in recent *** as one of the most popular drones has great potential in both industrial and academic *** drones are capable of taking off vert... 详细信息
来源: 评论
A Novel Method to against Quantum Noises in Quantum Teleportation
收藏 引用
Journal of Quantum Computing 2020年 第1期2卷 33-55页
作者: Shengyao Wu Wenjie Liu Zhiguo Qu School of Computer&Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China
In order to improve the anti-noise performance of quantum teleportation,this paper proposes a novel dynamic quantum anti-noise scheme based on the quantum teleportation which transmits single qubit state using Bell **... 详细信息
来源: 评论
A copyright protection method for wireless sensor networks based on digital watermarking
收藏 引用
International Journal of Hybrid Information Technology 2015年 第6期8卷 257-268页
作者: Wang, Baowei Su, Jianwei Zhang, Youdong Wang, Biqiang Shen, Jian Ding, Qun Sun, Xingming School of Computer and software Nanjing University of Information Science and Technology Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing210044 China Department of Computer Engineering Huaiyin Institute of Technology Huaian223003 China Hubei Meteorological Service Center Wuhan430074 China
Wireless sensor networks are composed of numerous sensor nodes in the monitored area, which have been well applied in various practical areas. In these applications, data security from sensors has been threatened. The... 详细信息
来源: 评论
Fingerprint liveness detection using difference co-occurrence matrix based texture features
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2016年 第11期11卷 1-16页
作者: Xia, Zhihua Yuan, Chengsheng Sun, Xingming Lv, Rui Sun, Decai Gao, Guangyong Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China College of Information Science and Technology Bohai University Jinzhou121013 China School of Information Science and Technology Jiujiang University Jiujiang332005 China
Fingerprint authentication systems have been widely deployed in both civilian and government applications, however, whether fingerprint authentication systems is security or not has been an important issue under fraud... 详细信息
来源: 评论
On an extension of the mean value theorems of differentiation of high dimension
收藏 引用
International Journal of Applied Mathematics and Statistics 2013年 第20期50卷 132-135页
作者: Zhang, TaiZhong Cheng, YaPing Su, RunQing School of Mathematics and Statistics Nanjing University of Information Science and Technology Nanjing 210044 China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
In this paper, we obtain a deep differential mean value theorem of high dimension which is the exactly generalized form of the classic Role's theorem, Lagrange's theorem and Cauchy's theorem in the real st... 详细信息
来源: 评论
Study on Initial Alignment Under Large Misalignment Angle
收藏 引用
Journal of Information Hiding and Privacy Protection 2019年 第3期1卷 95-108页
作者: Qi Wang Changsong Yang Shaoen Wu School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China Department of Computer Science Ball State UniversityMuncieUSA School of Automation Nanjing University of Information Science and TechnologyNanjing210044China
Misalignment angle error model describing the SINS mathematical platform error is presented in this paper following the idea of small misalignment angle error model and large azimuth misalignment angle error *** can b... 详细信息
来源: 评论
A Robust Document Image Watermarking Scheme using Deep Neural network
arXiv
收藏 引用
arXiv 2022年
作者: Ge, Sulong Xia, Zhihua Fei, Jianwei Sun, Xingming Weng, Jian Engineering Research Center of Digital Forensics Ministry of Education School of Computer and Software Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science & Technology Nanjing210044 China College of Cyber Security Jinan University Guangzhou510632 China
Watermarking is an important copyright protection technology which generally embeds the identity information into the carrier imperceptibly. Then the identity can be extracted to prove the copyright from the watermark... 详细信息
来源: 评论
An Optimized Strategy for Speculative Execution in a Heterogeneous Environment
An Optimized Strategy for Speculative Execution in a Heterog...
收藏 引用
International Conference on Future Generation Communication and networking (FGCN)
作者: Qi Liu Weidong Cai Zhangjie Fu Jian Shen Nigel Linge School of Computer and Software Nanjing University of Information Science and Technology Nanjing Jiangsu China Jiangsu Engineering Centre of Network Monitoring Nanjing University of Information Science and Technology Nanjing Jiangsu China The University of Salford Salford Greater Manchester UK
MapReduce is a popular programming model for the purposes of processing large data sets. Speculative execution known as an approach for dealing with the above problems works by backing up those tasks running on a low ... 详细信息
来源: 评论
Quantum-based Feature Selection for Multi-Classification Problem in Complex Systems with Edge Computing
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wenjie Chen, Junxiu Wang, Yuxiang Gao, Peipei Lei, Zhibin Ma, Xu Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China 999077 Hong Kong School of Software Qufu Normal University Shandong273165 China
The complex systems with edge computing require a huge amount of multi-feature data to extract appropriate insights for their decision-making, so it is important to find a feasible feature selection method to improve ... 详细信息
来源: 评论