咨询与建议

限定检索结果

文献类型

  • 222 篇 期刊文献

馆藏范围

  • 222 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 213 篇 工学
    • 139 篇 计算机科学与技术...
    • 37 篇 网络空间安全
    • 32 篇 软件工程
    • 27 篇 机械工程
    • 21 篇 信息与通信工程
    • 16 篇 电子科学与技术(可...
    • 15 篇 仪器科学与技术
    • 8 篇 控制科学与工程
    • 5 篇 材料科学与工程(可...
    • 2 篇 动力工程及工程热...
    • 2 篇 交通运输工程
    • 2 篇 船舶与海洋工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 光学工程
    • 1 篇 电气工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 测绘科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 纺织科学与工程
  • 73 篇 管理学
    • 71 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 5 篇 理学
    • 3 篇 系统科学
    • 1 篇 物理学
    • 1 篇 生态学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 艺术学
    • 3 篇 设计学(可授艺术学...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学
    • 1 篇 林学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 19 篇 无线传感器网络
  • 11 篇 移动代理
  • 11 篇 网格计算
  • 6 篇 无线多媒体传感器...
  • 5 篇 安全
  • 5 篇 位置隐私
  • 4 篇 对等计算
  • 4 篇 差分隐私
  • 4 篇 隐私保护
  • 4 篇 grid
  • 4 篇 自相似
  • 4 篇 入侵检测
  • 4 篇 无线传感网
  • 3 篇 云存储
  • 3 篇 对等网络
  • 3 篇 网络管理
  • 3 篇 大数据一体机
  • 3 篇 authentication
  • 3 篇 多媒体传感器网络
  • 3 篇 路由协议

机构

  • 135 篇 南京邮电大学
  • 26 篇 江苏省无线传感网...
  • 19 篇 南京邮电学院
  • 15 篇 jiangsu high tec...
  • 14 篇 college of compu...
  • 12 篇 南京大学
  • 11 篇 宽带无线通信与传...
  • 8 篇 苏州大学
  • 7 篇 college of compu...
  • 6 篇 江苏大学
  • 4 篇 南京广播电视大学
  • 4 篇 东南大学
  • 4 篇 江苏省无线传感网...
  • 4 篇 jiangsu high tec...
  • 4 篇 南京人口管理干部...
  • 4 篇 池州学院
  • 3 篇 key lab of broad...
  • 3 篇 西北工业大学
  • 3 篇 南京工业职业技术...
  • 3 篇 广东省普及型高性...

作者

  • 156 篇 王汝传
  • 30 篇 孙力娟
  • 24 篇 黄海平
  • 19 篇 wang ruchuan
  • 19 篇 肖甫
  • 17 篇 ruchuan wang
  • 16 篇 季一木
  • 12 篇 沙超
  • 12 篇 王海艳
  • 9 篇 张琳
  • 8 篇 刘尚东
  • 7 篇 李致远
  • 6 篇 徐小龙
  • 6 篇 叶宁
  • 5 篇 ji yimu
  • 5 篇 郭剑
  • 5 篇 尧海昌
  • 5 篇 lijuan sun
  • 5 篇 王如川
  • 5 篇 徐佳

语言

  • 177 篇 中文
  • 45 篇 英文
检索条件"作者=Ruchuan WANG"
222 条 记 录,以下是1-10 订阅
排序:
Research on Network Malicious Code Immune Based on Imbalanced Support Vector Machines
收藏 引用
Chinese Journal of Electronics 2015年 第1期24卷 181-186页
作者: LI Peng wang ruchuan College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks
The malicious computer code immune system and the biological immune system are highly similar:both preserve the stability of the system in real time in a constantly changing environment. This similarity is exploited t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Malicious code passive propagation model and vaccine distribution model of P2P networks
收藏 引用
Journal of Systems Engineering and Electronics 2010年 第1期21卷 161-167页
作者: Xiaolong Xu ruchuan wang Fu Xiao School of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 E R. China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 P. R. China
To fight against malicious codes of P2P networks, it is necessary to study the malicious code propagation model of P2P networks in depth. The epidemic of malicious code threatening P2P systems can be divided into the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
T-QoS-aware based parallel ant colony algorithm for services composition
收藏 引用
Journal of Systems Engineering and Electronics 2015年 第5期26卷 1100-1106页
作者: Lin Zhang Kaili Rao ruchuan wang College of Computer Nanjing University of Posts and Telecommunications Institute of Computer Technology Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology Nangjing University of Posts and Telecommunications
In order to make cloud users get credible, high-quality composition of services, the trust quality of service aware(TQoS-aware) based parallel ant colony algorithm is proposed. Our approach takes the service credibili... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Collusion detector based on G-N algorithm for trust model
收藏 引用
Journal of Systems Engineering and Electronics 2016年 第4期27卷 926-935页
作者: Lin Zhang Na Yin Jingwen Liu ruchuan wang College of Computer Nanjing University of Posts and TelecommunicationsNanjing 210003China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nangjing University of Posts and TelecommunicationsNangjing 210003China
In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a co... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Low-power task scheduling algorithm for large-scale cloud data centers
收藏 引用
Journal of Systems Engineering and Electronics 2013年 第5期24卷 870-878页
作者: Xiaolong Xu Jiaxing Wu Geng Yang ruchuan wang College of Computer Nanjing University of Posts and Telecommunications State Key Laboratory for Novel Software Technology Nanjing University Key Lab of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education Nanjing University of Posts and Telecommunications
How to effectively reduce the energy consumption of large-scale data centers is a key issue in cloud computing. This paper presents a novel low-power task scheduling algorithm (L3SA) for large-scale cloud data cente... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Secure Localization Technology Based on Dynamic Trust Management in Wireless Sensor Networks
收藏 引用
Chinese Journal of Electronics 2021年 第4期30卷 759-768页
作者: LI Peng YU Xiaotian XU He wang ruchuan School of Computer Science and Technology Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks
Wireless sensor networks have critical applications in various fields, and the algorithm of their secure localization has become a vital technology to support a network. In the light of the self-organization, random d... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Load Balanced Coding Aware Multipath Routing for Wireless Mesh Networks
收藏 引用
Chinese Journal of Electronics 2015年 第1期24卷 8-12页
作者: SHAO Xing wang ruchuan HUANG Haiping SUN Lijuan College of Computer Nanjing University of Posts and Telecommunications College of Information Engneering Yancheng Institutue of Technology Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology
The growth of network coding opportunities is considered the unique optimization goal by most current network coding based routing algorithms for wireless mesh networks. This usually results in flows aggregation probl... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Intrusion Detection Methods Based on Incomplete RFID Traces
收藏 引用
Chinese Journal of Electronics 2017年 第4期26卷 675-680页
作者: LI Peng wang Zhen XU He ZHU Feng wang ruchuan School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks
According to the Radio frequency identification(RFID) tag cloning attack problems of RFID system and the existing problems of intrusion detection research based on incomplete RFID traces, this paper proposes a method ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Smart Attendance System Based on Frequency Distribution Algorithm with Passive RFID Tags
收藏 引用
Tsinghua Science and Technology 2020年 第2期25卷 217-226页
作者: Qianwen Miao Fu Xiao Haiping Huang Lijuan Sun ruchuan wang School of Computer Nanjing University of Posts and TelecommunicationsNanjing 210046China Department of Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210046China
Staff attendance information has always been an important part of corporate ***,some opportunistic employees may consign others to punch their time cards,which hampers the authenticity of attendance and effectiveness ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Improved Cross-Corpus Speech Emotion Recognition Using Deep Local Domain Adaptation
收藏 引用
Chinese Journal of Electronics 2023年 第3期32卷 640-646页
作者: ZHAO Huijuan YE Ning wang ruchuan College of Internet of Things Nanjing University of Posts and Telecommunications College of Computer and Software Nanjing Vocational University of Industry Technology College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Network
Due to the scarcity of high-quality labeled speech emotion data, it is natural to apply transfer learning to emotion recognition. However, transfer learning-based speech emotion recognition becomes more challenging be... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论