咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 3 篇 电气工程
    • 3 篇 信息与通信工程
    • 3 篇 计算机科学与技术...
    • 2 篇 石油与天然气工程
    • 2 篇 网络空间安全
    • 1 篇 控制科学与工程
    • 1 篇 土木工程
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 6 篇 sm algorithm
  • 2 篇 parameter extrac...
  • 1 篇 space mapping
  • 1 篇 security chip
  • 1 篇 filters and othe...
  • 1 篇 image matching
  • 1 篇 identity authent...
  • 1 篇 privacy protecti...
  • 1 篇 automatic thresh...
  • 1 篇 surrogate-based ...
  • 1 篇 sparse matrices
  • 1 篇 distribution net...
  • 1 篇 microwave circui...
  • 1 篇 image segmentati...
  • 1 篇 mutually inconsi...
  • 1 篇 genomic data
  • 1 篇 microwave circui...
  • 1 篇 hybrid encryptio...
  • 1 篇 mutually inconsi...
  • 1 篇 microstrip filte...

机构

  • 1 篇 school of cyber ...
  • 1 篇 xiamen univ tech...
  • 1 篇 beijing smartchi...
  • 1 篇 reykjavik univ s...
  • 1 篇 reykjavik univ e...
  • 1 篇 louisiana state ...
  • 1 篇 shanghai univ el...

作者

  • 1 篇 yu pan
  • 1 篇 li xin
  • 1 篇 jianwei liu
  • 1 篇 tao shang
  • 1 篇 xiaoyu tong
  • 1 篇 koziel slawomir
  • 1 篇 kang wang
  • 1 篇 chen peizhi
  • 1 篇 xiaoqi liang
  • 1 篇 yatong jiang
  • 1 篇 chuncheng wang
  • 1 篇 xichao yue
  • 1 篇 koziel s.
  • 1 篇 yong wang

语言

  • 6 篇 英文
检索条件"主题词=SM algorithm"
6 条 记 录,以下是1-10 订阅
排序:
Design of Dynamic Password Authentication Scheme Based on sm algorithm  12
Design of Dynamic Password Authentication Scheme Based on SM...
收藏 引用
12th International Conference on Power and Energy Systems (ICPES)
作者: Xiaoqi Liang Yong Wang Xichao Yue Shanghai Univ Elect Power Coll Comp Sci & Technol Shanghai Peoples R China
At present, some identity authentication schemes of intelligent terminals in distribution networks need to install additional hardware or issue digital certificates, and are vulnerable to replay attacks, impersonation... 详细信息
来源: 评论
sm algorithms-based encryption scheme for large genomic data files
收藏 引用
Digital Communications and Networks 2021年 第4期7卷 543-550页
作者: Yatong Jiang Tao Shang Jianwei Liu School of Cyber Science and Technology Beihang UniversityBeijing100083China
With the rapid development of the genomic sequencing technology,the cost of obtaining personal genomic data and effectively analyzing it has been gradually *** analysis and utilization of genomic dam gradually entered... 详细信息
来源: 评论
Role of constraints in surrogate-based design optimisation of microwave structures
收藏 引用
IET MICROWAVES ANTENNAS & PROPAGATION 2011年 第5期5卷 588-595页
作者: Koziel, S. Reykjavik Univ Sch Sci & Engn Engn Optimizat & Modeling Ctr IS-101 Reykjavik Iceland
Space mapping (sm) is probably one of the most efficient simulation-driven design methodologies used in microwave engineering to date. Nevertheless, its performance heavily depends on the proper selection of the surro... 详细信息
来源: 评论
Revised spectral matching algorithm for scenes with mutually inconsistent local transformations
收藏 引用
IET IMAGE PROCESSING 2015年 第10期9卷 916-922页
作者: Chen, Peizhi Li, Xin Xiamen Univ Technol Sch Comp & Informat Engn Xiamen 361024 Peoples R China Louisiana State Univ Sch Elect Engn & Comp Sci Baton Rouge LA 70803 USA
Spectral matching (sm) is an efficient and effective greedy algorithm for solving the graph matching problem in feature correspondence in computer vision and graphics. However, the classic sm algorithm cannot extract ... 详细信息
来源: 评论
Constrained Space Mapping for Design Optimization of Microwave Circuits
Constrained Space Mapping for Design Optimization of Microwa...
收藏 引用
2010 IEEE International Symposium Antennas and Propagation/CNC-USNC/URSI Radio Science Meeting
作者: Koziel, Slawomir Reykjavik Univ Engn Optimizat & Modeling Ctr Sch Sci & Engn IS-103 Reykjavik Iceland
Here, a novel approach is proposed that exploits over-flexible surrogate model and adaptively adjusted constraints imposed on the parameter extraction and surrogate optimization processes. As a result, improved perfor... 详细信息
来源: 评论
Design and Development of an Access Point Based on Secure Chip  3
Design and Development of an Access Point Based on Secure Ch...
收藏 引用
2023 IEEE 3rd International Conference on Data Science and Computer Application, ICDSCA 2023
作者: Yu, Pan Chuncheng, Wang Xiaoyu, Tong Kang, Wang Beijing SmartChip Semiconductor Technology Co. Ltd Beijing China
Digitization has penetrated into every aspect of life, and network security has become one of the main focuses of future security. China has independently developed security chips with intellectual property rights, an... 详细信息
来源: 评论