限定检索结果

检索条件"机构=College of Information Science and Computer Engineering"
29 条 记 录,以下是1-10 订阅
视图:
排序:
Adaptive image encryption scheme based on chaotic map
收藏 引用
《High Technology Letters》2013年 第1期19卷 76-81页
作者:邱劲 Liao Xiaofeng Xiao Di Xiang TaoCollege of Computer Science and EngineeringChongqing University College of Computer and Information ScienceSouthwest University 
Most of the existing image encryption schemes with the substitutlon-chltuslon structure are not secure and efficient. In this letter, a chaos-based pseudo-random bit generator with good statistical properties is propo...
来源:详细信息评论
Security Analysis and Enhanced Design of a Dynamic Block Cipher
收藏 引用
《China Communications》2016年 第1期13卷 150-160页
作者:ZHAO Guosheng WANG JianCollege of Computer Science and Information EngineeringHarbin Normal University School of Computer Science and TechnologyHarbin University of Science and Technology 
There are a lot of security issues in block cipher *** analysis and enhanced design of a dynamic block cipher was ***,the safety of ciphertext was enhanced based on confusion substitution of S-box,thus disordering the...
来源:详细信息评论
Training SVMs on a bound vectors set based on Fisher projection
收藏 引用
《Frontiers of computer science2014年 第5期8卷 793-806页
作者:Xu YU Jing YANG Zhiqiang XIESchool of Information Science and Technology Qingdao University of Science and Technology Qingdao 266061 China College of Computer Science and Technology Harbin Engineering University Harbin 150001 China College of Computer Science and Technology Harbin University of Science and Technology Harbin 150080 China 
Standard support vector machines (SVMs) train- ing algorithms have O(l3) computational and O(l2) space complexities, where l is the training set size. It is thus com- /putationally infeasible on very large data ...
来源:详细信息评论
Nearest-neighbor classifier motivated marginal discriminant projections for face recognition
收藏 引用
《Frontiers of computer science2011年 第4期5卷 419-428页
作者:Pu HUANG Zhenmin TANG Caikou CHEN Xintian CHENGSchool of Computer Science and Technology Nanjing University of Science and Technology Nanjing 210094 China College of Information Engineering Yangzhou University Yangzhou 225009 China 
Marginal Fisher analysis (MFA) is a repre- sentative margin-based learning algorithm for face recognition. A major problem in MFA is how to select appropriate parameters, k1 and k2, to construct the respective intri...
来源:详细信息评论
Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function
收藏 引用
《Journal of computer science & Technology》2016年 第1期31卷 124-136页
作者:Ji-Liang Zhang Qiang Wu Yi-Peng Ding Yong-Qiang Lv Qiang Zhou Zhi-Hua Xia Xing-Ming Sun Xing-Wei WangSoftware College Northeastern University Shenyang 110819 China College of Information Science and Engineering Hunan University Changsha 410082 China School of Physics and Electronics Central South University Changsha 410083 China Research Institute of Information Technology Tsinghua University Beijing 100084 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China 
Physical unclonable function (PUF) makes use of the uncontrollable process variations during the production of IC to generate a unique signature for each IC. It has a wide application in security such as FPGA intell...
来源:详细信息评论
Design of MCI single and symmetrical on-chip spiral inductors
收藏 引用
《Journal of Semiconductors》2017年 第6期38卷 88-92页
作者:Bo Han Shibing Wang Xiaofeng ShiSchool of Computer and Information EngineeringFuyang Teachers College Department of Electronic Science and TechnologyUniversity of Science and Technology of China 
In this paper,the MCI(multipath crossover interconnection)technique for octagon single and symmetrical spiral inductors has been presented to improve the quality *** metal wires of the single and symmetrical inducto...
来源:详细信息评论
Design of an ultra-compact 3 dB MMI coupler
收藏 引用
《Optoelectronics Letters》2009年 第6期5卷 427-429页
作者:陈媛媛 杨笛 余金中 孙梅 邢素霞College of Computer and Information EngineeringBeijing University of Technology and Business College of ScienceCentral University for Nationalities State Key Laboratory of Integrated OptoelectronicsInstitute of SemiconductorsChinese Academy of Sciences 
The design of an ultra-compact SOI-based 1×2 3 dB multimode interference(MMI) coupler is *** symmetric multimode interference structure and deeply-etched parabolically tapered multimode waveguide are used in the ...
来源:详细信息评论
Cascade control based on minimum sensitivity in outer loop for processes with time delay
收藏 引用
《Journal of Central South University》2012年 第9期19卷 2689-2696页
作者:尹成强 惠鸿忠 岳继光 高洁 郑丽萍School of Automobile and Transportation EngineeringLiaocheng University College of Electronics and Information EngineerTongji University School of Computer ScienceLiaocheng University 
A new cascade control program was proposed based on modified internal model control to handle stable,unstable and integrating processes with time *** program had totally four controllers of which the secondary loop ha...
来源:详细信息评论
Design and Implementation of Distributed Self-Election Dynamic Array Honeypot System
收藏 引用
《China Communications》2011年 第4期8卷 109-115页
作者:石乐义 李婕 韩煦 贾春福College of Computer & Communication EngineeringChina University of Petroleum College of Information Technical ScienceNankai University 
Traditional honeypot is in fact a "passive proactive" defense mechanism because it may lose the value entirely once the adversary has detected the existence of the static trap and bypassed *** work focuses o...
来源:详细信息评论
Shadow obstacle model for realistic corner-turning behavior in crowd simulation
收藏 引用
《Frontiers of information Technology & Electronic engineering2016年 第3期17卷 200-211页
作者:Gao-qi HE Yi JIN Qi CHEN Zhen LIU Wen-hui YUE Xing-jian LUDepartment of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China MOE Key Laboratory of Geographic Information Science East China Normal University Shanghai 200241 China State Key Laboratory of Virtual Reality Technology and Systems Beihang University Beijing 100191 China College of Information Science and Technology Ningbo University Ningbo 315211 China 
This paper describes a novel model known as the shadow obstacle model to generate a realistic comer-tuming behavior in crowd simulation. The motivation for this model comes from the observation that people tend to cho...
来源:详细信息评论
聚类工具 回到顶部