咨询与建议

限定检索结果

文献类型

  • 234 篇 期刊文献
  • 208 篇 会议
  • 10 册 图书
  • 2 篇 学位论文

馆藏范围

  • 454 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 368 篇 工学
    • 205 篇 计算机科学与技术...
    • 153 篇 电气工程
    • 77 篇 信息与通信工程
    • 42 篇 机械工程
    • 40 篇 软件工程
    • 38 篇 电子科学与技术(可...
    • 25 篇 控制科学与工程
    • 14 篇 仪器科学与技术
    • 9 篇 光学工程
    • 7 篇 航空宇航科学与技...
    • 5 篇 网络空间安全
    • 3 篇 化学工程与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
  • 156 篇 理学
    • 93 篇 数学
    • 34 篇 物理学
    • 17 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 3 篇 化学
    • 2 篇 地球物理学
  • 32 篇 管理学
    • 31 篇 管理科学与工程(可...
  • 13 篇 医学
    • 7 篇 基础医学(可授医学...
    • 5 篇 临床医学
    • 3 篇 特种医学
  • 8 篇 教育学
    • 7 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 6 篇 法学
    • 3 篇 法学
    • 3 篇 社会学
  • 5 篇 农学
  • 3 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 经济学

主题

  • 454 篇 binary code
  • 57 篇 binary codes
  • 37 篇 codes
  • 36 篇 hashing
  • 22 篇 binary
  • 19 篇 image retrieval
  • 16 篇 hamming distance
  • 15 篇 decoding
  • 14 篇 gray code
  • 13 篇 neural network
  • 10 篇 linear code
  • 10 篇 semantics
  • 10 篇 machine learning
  • 10 篇 nearest neighbor...
  • 9 篇 optimization
  • 9 篇 linear codes
  • 9 篇 images
  • 8 篇 quantization
  • 8 篇 cryptography
  • 8 篇 upper bound

机构

  • 7 篇 princeton univ d...
  • 5 篇 southwest jiaoto...
  • 4 篇 univ east anglia...
  • 4 篇 univ elect sci &...
  • 3 篇 moscow tech univ...
  • 3 篇 shizuoka univ de...
  • 3 篇 tohoku univ grad...
  • 3 篇 tel aviv univ de...
  • 2 篇 inst. of inf. sc...
  • 2 篇 tsinghua univ ts...
  • 2 篇 georgia inst tec...
  • 2 篇 princeton univ d...
  • 2 篇 swiss fed inst t...
  • 2 篇 univ manitoba de...
  • 2 篇 chinese acad sci...
  • 2 篇 tech univ cluj n...
  • 2 篇 jilin univ sch c...
  • 2 篇 beihang univ sta...
  • 2 篇 chitkara univ in...
  • 2 篇 department of ma...

作者

  • 7 篇 hecht michael h.
  • 6 篇 coxson gregory e...
  • 6 篇 liu li
  • 5 篇 harada masaaki
  • 5 篇 shao ling
  • 5 篇 shen fumin
  • 4 篇 takase hiroshi
  • 4 篇 shinriki masanor...
  • 3 篇 adzhemov a. s.
  • 3 篇 ostergard prj
  • 3 篇 shen heng tao
  • 3 篇 tian qi
  • 3 篇 hecht mh
  • 3 篇 araya makoto
  • 3 篇 ahn seok-ki
  • 3 篇 saito ken
  • 3 篇 ma rui
  • 3 篇 chae sung ho
  • 2 篇 zhou jie
  • 2 篇 vostrukhin aleks...

语言

  • 427 篇 英文
  • 22 篇 其他
  • 5 篇 中文
检索条件"主题词=binary code"
454 条 记 录,以下是61-70 订阅
排序:
Search of Periodic binary code Compressed to Several Subpulses using Simulated Annealing and Hill Climbing
Search of Periodic Binary Code Compressed to Several Subpuls...
收藏 引用
International Radar Symposium
作者: Hiroshi Takase Nobuaki Abe Masanori Shinriki Nippon Institute of Technology
Periodic binary codes, which are compressed to a signal with a width of several subpulses and small sidelobes, are searched using simulated annealing and hill climbing methods, because they can not be found by exhaust... 详细信息
来源: 评论
All-optical graphene-based plasmonic binary to gray code converter
收藏 引用
OPTICAL AND QUANTUM ELECTRONICS 2022年 第3期54卷 142-142页
作者: Abbasi, Mahmoud Sadeghi, Mojtaba Adelpour, Zahra Islamic Azad Univ Dept Elect Engn Shiraz Branch Shiraz Iran
In this paper, a binary to gray code converter based on graphene-plasmonic waveguides using the interference effect is proposed. The plasmonic waveguides are made of graphene nano-ribbons located on the dielectric lay... 详细信息
来源: 评论
On the use of binary and gray code schemes for continuous-tone picture representation
收藏 引用
Pattern Recognition 1973年 第2期5卷 121-128,IN5-IN12,129-132页
作者: Deutsch, E.S. Computer Science Center University of Maryland College Park MD 20742 United States
The paper discusses the idea of iterating the conversion of a continuous-tone picture from binary to Gray code representation. A simple recursive function is defined by means of which the value of the ith bit represen... 详细信息
来源: 评论
Detection Optimization of Brute-Force Cyberattack Using Modified Caesar Cipher Algorithm Based on binary codes (MCBC)
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2025年 第3期16卷 523-530页
作者: Tahboush, Muhannad Hamdan, Adel Klaib, Mohammad Adawy, Mohammad Alzobi, Firas World Islamic Sci & Educ Univ Informat Syst & Network Dept Amman Jordan World Islamic Sci & Educ Univ Comp Sci Dept Amman Jordan Middle East Univ Intelligent Syst Engn Dept Amman Jordan
security is considered vital aspects that are employed to protect user credentials and digital information from cyber security threats. A Caesar cipher is an ancient cryptography algorithm, and it is susceptible to be... 详细信息
来源: 评论
Homogenization of binary linear codes and their applications
收藏 引用
FINITE FIELDS AND THEIR APPLICATIONS 2025年 103卷
作者: Hyun, Jong Yoon Mondal, Nilay Kumar Lee, Yoonjin Konkuk Univ Glocal Campus268 Chungwon Daero Chungju Si 27478 Chungcheongbuk South Korea Ewha Womans Univ Inst Math Sci Seoul 03760 South Korea Ewha Womans Univ Dept Math Seoul 03760 South Korea
We introduce a new technique, called homogenization, for a systematic construction of augmented codes of binary linear codes, using the defining set approach in connection to multivariable functions. We explicitly det... 详细信息
来源: 评论
AOIFF: A Precise Attack Method for PLCs Based on Awareness of Industrial Field Information
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING
收藏 引用
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING 2025年 第2期10卷 232-243页
作者: Yao, Wenjun Sun, Yanbin Wu, Guodong Fang, Binxing Liu, Yuan Tian, Zhihong Guangzhou Univ Cyberspace Inst Adv Technol Guangzhou 510006 Peoples R China
PLC, as the core of industrial control systems, has been turned into a focal point of research for attackers targeting industrial control systems. However, current researched methods for attacking PLCs suffer from iss... 详细信息
来源: 评论
Variety of mutual-visibility problems in hypercubes
收藏 引用
APPLIED MATHEMATICS AND COMPUTATION 2025年 491卷
作者: Korze, Danilo Vesel, Aleksander Univ Maribor Fac Elect Engn & Comp Sci Koroska Cesta 46 SI-2000 Maribor Slovenia Univ Maribor Fac Nat Sci & Math Koroska Cesta 160 SI-2000 Maribor Slovenia
Let G be a graph and M c V(G). Vertices x, y E Mare M-visible if there exists a shortest x, y-path of G that does not pass through any vertex of M \ {x,y}. We say that M is a mutual-visibility set if each pair of vert... 详细信息
来源: 评论
binary codes of odd-order nets
收藏 引用
DESIGNS codeS AND CRYPTOGRAPHY 1999年 第1-3期17卷 15-36页
作者: Assmus, EF Drisko, AA Lehigh Univ Dept Math Bethlehem PA 18015 USA Natl Secur Agcy Ft George G Meade MD 20755 USA
来源: 评论
binary codes storage and data encryption in substrates with single proton beam writing technology
收藏 引用
NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION B-BEAM INTERACTIONS WITH MATERIALS AND ATOMS 2006年 第1期248卷 54-58页
作者: Zhang, Jun Zhan, Fu-Ru Hu, Zhi-Wen Chen, Lian-Yun Yu, Zeng-Liang Acad Sinica Inst Plasma Phys Key Lab Ion Beam Bioengn Hefei 230031 Anhui Peoples R China
It has been demonstrated that characters can be written by proton beams in various materials. In contributing to the rapid development of proton beam writing technology, we introduce a new method for binary code stora... 详细信息
来源: 评论
binary codes and partial permutation decoding sets from biadjacency matrices of bipartite graphs Γ(2k, k, k+1, 1)
收藏 引用
QUAESTIONES MATHEMATICAE 2020年 第4期43卷 523-538页
作者: Fish, W. Mumba, N. B. Mwambene, E. Rodrigues, B. G. Univ Western Cape Dept Math & Appl Math Private Bag X17 Bellville 7535 South Africa Mzuzu Univ Dept Math & Stat Private Bag 201 Mzuzu Malawi Univ KwaZulu Natal Sch Math Stat & Comp Sci Durban 4041 South Africa
For a set omega = {1, 2, . . . , n} where n = 2k >= 6, let omega({k}) denote the set of all subsets of omega of size k. We examine the binary codes from the row span of biadjacency matrices of bipartite graphs with... 详细信息
来源: 评论