限定检索结果

检索条件"机构=Computer and Information Engineering College"
26 条 记 录,以下是1-10 订阅
视图:
排序:
基于侧基多通道和对称性破缺效应的分子电导调控
收藏 引用
《Science China Materials》2024年 第6期67卷 1994-1999页
作者:郝杰 汪博宇 赵璁 霍雅妮 王进莹 贾传成 郭雪峰Center of Single-Molecule SciencesInstitute of Modern OpticsFrontiers Science Center for New Organic MatterTianjin Key Laboratory of Micro-scale Optical Information Science and TechnologyCollege of Electronic Information and Optical EngineeringNankai UniversityTianjin 300350China Network for Computational NanotechnologySchool of Electrical and Computer EngineeringPurdue UniversityIndiana 47907USA Beijing National Laboratory for Molecular SciencesNational Biomedical Imaging CenterCollege of Chemistry and Molecular EngineeringPeking UniversityBeijing 100871China 
化学取代是有效调节分子电导,产生多通道输运、量子干涉效应和其他机制的关键方法.但分子骨架和侧基之间存在复杂的相互作用,目前仍未被研究清楚.在本工作中,我们结合扫描隧道显微镜裂结实验技术和第一性原理计算方法,深入研究了具有不...
来源:详细信息评论
Design and Implementation of Distributed Self-Election Dynamic Array Honeypot System
收藏 引用
《China Communications》2011年 第4期8卷 109-115页
作者:石乐义 李婕 韩煦 贾春福College of Computer & Communication EngineeringChina University of Petroleum College of Information Technical ScienceNankai University 
Traditional honeypot is in fact a "passive proactive" defense mechanism because it may lose the value entirely once the adversary has detected the existence of the static trap and bypassed *** work focuses o...
来源:详细信息评论
Adaptive image encryption scheme based on chaotic map
收藏 引用
《High Technology Letters》2013年 第1期19卷 76-81页
作者:邱劲 Liao Xiaofeng Xiao Di Xiang TaoCollege of Computer Science and EngineeringChongqing University College of Computer and Information ScienceSouthwest University 
Most of the existing image encryption schemes with the substitutlon-chltuslon structure are not secure and efficient. In this letter, a chaos-based pseudo-random bit generator with good statistical properties is propo...
来源:详细信息评论
Security Analysis and Enhanced Design of a Dynamic Block Cipher
收藏 引用
《China Communications》2016年 第1期13卷 150-160页
作者:ZHAO Guosheng WANG JianCollege of Computer Science and Information EngineeringHarbin Normal University School of Computer Science and TechnologyHarbin University of Science and Technology 
There are a lot of security issues in block cipher *** analysis and enhanced design of a dynamic block cipher was ***,the safety of ciphertext was enhanced based on confusion substitution of S-box,thus disordering the...
来源:详细信息评论
Joint entity-relation knowledge embedding via cost-sensitive learning
收藏 引用
《Frontiers of information Technology & Electronic engineering2017年 第11期18卷 1867-1873页
作者:Sheng-kang YU Xue-yi ZHAO Xi LI Zhong-fei ZHANGCollege of Information Science and Electronic Engineering Zhejiang University Hangzhou 310027 China College of Computer Science and Technology Zhejiang University Hangzhou 310027 China 
As a joint-optimization problem which simultaneously fulfills two different but correlated embedding tasks (i.e., entity embedding and relation embedding), knowledge embedding problem is solved in a joint embedding ...
来源:详细信息评论
A chaotic coverage path planner for the mobile robot based on the Chebyshev map for special missions
收藏 引用
《Frontiers of information Technology & Electronic engineering2017年 第9期18卷 1305-1319页
作者:Cai-hong LI Yong SONG Feng-ying WANG Zhi-qiang WANG Yi-bin LICollege of Computer Science and Technology Shandong University of Technology Zibo 255000 China School of Mechanical Electrical & Information Engineering Shandong University Weihai 264209 China 
We introduce a novel strategy of designing a chaotic coverage path planner for the mobile robot based on the Che- byshev map for achieving special missions. The designed chaotic path planner consists of a two-dimensio...
来源:详细信息评论
Multiclass classification based on a deep convolutional network for head pose estimation
收藏 引用
《Frontiers of information Technology & Electronic engineering2015年 第11期16卷 930-939页
作者:Ying CAI Meng-long YANG Jun LISchool of Computer Science Sichuan University College of Information Engineering Sichuan Agricultural University School of Aeronautics and Astronautics Sichuan University 
Head pose estimation has been considered an important and challenging task in computer vision. In this paper we propose a novel method to estimate head pose based on a deep convolutional neural network (DCNN) for 2D...
来源:详细信息评论
RePizer:a framework for prioritization of software requirements
收藏 引用
《Frontiers of information Technology & Electronic engineering2016年 第8期17卷 750-765页
作者:Saif Ur Rehman KHAN Sai Peck LEE Mohammad DABBAGH Muhammad TAHIR Muzafar KHAN Muhammad ARIFDepartment of Software Engineering Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur 50603 Malaysia Faculty of Computing and Information Technology University of Jeddah Jeddah 21589 Saudi Arabia College of Computer and Information Sciences (Muzahmiyah Branch) King Saud University Riyadh 11362 Saudi Arabia Department of Computer Science University of Gujrat Gujrat 50700 Pakistan 
The standard software development life cycle heavily depends on requirements elicited from stakeholders. Based on those requirements, software development is planned and managed from its inception phase to closure. Du...
来源:详细信息评论
Design of high reliability RF-LDMOS by suppressing the parasitic bipolar effect using enhanced p-well and double epitaxy
收藏 引用
《Journal of Semiconductors》2015年 第6期36卷 93-98页
作者:徐向明 黄景丰 遇寒 钱文生 周正良 韩波 王勇 王鹏飞 张卫State Key Laboratory of ASIC and System School of Microelectronics Fudan University HuaHong Grace Semiconductor Manufacturing Corporation School of Computer and Information Engineering Fuyang Teachers College 
A laterally diffused metal-oxide-semiconductor (LDMOS) device design with an enhanced p-well and double p-epitaxial structure is investigated for device ruggedness improvement while keeping its high device per- form...
来源:详细信息评论
Two-Hop Gaussian Relay Channel with Linear Relaying: Achievable Rate and Optimization Design
收藏 引用
《China Communications》2012年 第2期9卷 96-104页
作者:Deng Zhixiang Wang Baoyun Lang Fei Ma Yayan Liu ChenState Key Laboratory of Networking and SwitchingBeijing University of Posts and TelecommunicationsBeijing 100876P.R.China College of Telecommunications and Information EngineeringNanjing University of Posts and TelecommunicationsNanjing 210003P.R.China College of AutomationNanjing University of Posts and TelecommunicationsNanjing 210003P.R.China College of Computer and Information EngineeringHohai UniversityChangzhou 213022P.R.China College of Electronic Science EngineeringNanjing University of Posts and TelecommunicationsNanjing 210003P.R.China 
The relay node with linear relaying transmits the linear combination of its past received *** optimization of two-hop relay channel with linear relaying is discussed in this *** capacity for the two-hop Gaussian relay...
来源:详细信息评论
聚类工具 回到顶部