咨询与建议

限定检索结果

文献类型

  • 60 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 101 篇 工学
    • 64 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 11 篇 软件工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
  • 13 篇 理学
    • 8 篇 物理学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学

主题

  • 107 篇 hash algorithm
  • 10 篇 cryptography
  • 9 篇 image encryption
  • 8 篇 security
  • 6 篇 sha-3
  • 6 篇 chaos
  • 6 篇 fpga
  • 5 篇 information secu...
  • 3 篇 message digest
  • 3 篇 hardware impleme...
  • 3 篇 rfid security
  • 3 篇 convolutional ne...
  • 3 篇 tag
  • 3 篇 keccak
  • 3 篇 pipeline
  • 2 篇 satellite naviga...
  • 2 篇 global positioni...
  • 2 篇 sparser probe da...
  • 2 篇 hls
  • 2 篇 symmetric encryp...

机构

  • 4 篇 natl inst techno...
  • 2 篇 northwest normal...
  • 2 篇 hitachi ltd smar...
  • 2 篇 hitachi ltd soci...
  • 2 篇 konkuk univ dept...
  • 2 篇 hitachi ltd soci...
  • 2 篇 manipal acad hig...
  • 2 篇 tottori univ fac...
  • 2 篇 konkuk univ dept...
  • 1 篇 northeastern uni...
  • 1 篇 minnan sci & tec...
  • 1 篇 chongqing univ p...
  • 1 篇 china univ min &...
  • 1 篇 school of inform...
  • 1 篇 centrin data grp...
  • 1 篇 north china univ...
  • 1 篇 univ dehradun uc...
  • 1 篇 katholieke univ ...
  • 1 篇 coe cgc cse land...
  • 1 篇 changchun acad a...

作者

  • 6 篇 patro k. abhiman...
  • 5 篇 acharya bibhuden...
  • 2 篇 yan shaohui
  • 2 篇 kim keecheon
  • 2 篇 gu binxian
  • 2 篇 okude mariko
  • 2 篇 sakamoto toshiyu...
  • 2 篇 park sun-young
  • 2 篇 kitahara reiji
  • 2 篇 yokota takayoshi
  • 2 篇 zhang wei
  • 1 篇 liu bowen
  • 1 篇 kang joo-young
  • 1 篇 du xiaojing
  • 1 篇 mayilsamy kathir...
  • 1 篇 kralik lukas
  • 1 篇 meikandan padmap...
  • 1 篇 pun chi-man
  • 1 篇 gao zhenguo
  • 1 篇 wang lei

语言

  • 101 篇 英文
  • 4 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=hash algorithm"
107 条 记 录,以下是91-100 订阅
排序:
De-duplication in File Sharing Network
De-duplication in File Sharing Network
收藏 引用
4th International Conference on Contemporary Computing
作者: Yadav, Divakar Dani, Deepali Kumari, Preeti Jaypee Inst Informat Technol Noida India
Redundant data transfer over a network is one of the important reasons of traffic congestion today. In this paper, we proposed an efficient and secure file sharing model using de-duplication technology to resolve it. ... 详细信息
来源: 评论
National Cryptographic algorithms based Personalized Federated Learning with Flight Data  6
National Cryptographic Algorithms based Personalized Federat...
收藏 引用
6th International Conference on Robotics, Intelligent Control and Artificial Intelligence, RICAI 2024
作者: Sun, Aohan Lu, Yanrong Liu, Xinyu School of Computer Science and Technology Civil Aviation University of China Tianjin China College of Safety Science and Engineering Civil Aviation University of China Tianjin China
This paper designed FedPDA (Federated Learning Personalized Data Authentication) a new architecture that combines personalized federated learning and domestic encryption algorithms. The FedPDA enhanced the adaptabilit... 详细信息
来源: 评论
Design of an Automatic Testing System for Camera UI Test  39
Design of an Automatic Testing System for Camera UI Test
收藏 引用
39th Chinese Control Conference (CCC)
作者: Ji, Pengfei Qi, Yiwen Zhang, Chi Xing, Ning Shenyang Aerosp Univ Sch Automat Shenyang 110136 Peoples R China
In view of the current tedious camera inspection process, limited test cycle and complex test content, in order to reduce the work intensity of testers, the automatic test is designed for functional test with high rep... 详细信息
来源: 评论
A Dynamic Weights Consistent hashing Load Balancing Method Based on Heuristic Optimization  3
A Dynamic Weights Consistent Hashing Load Balancing Method B...
收藏 引用
3rd International Conference on Electronic Information Engineering and Computer Science, EIECS 2023
作者: Wang, Chen Chen, Yingzheng Wang, Jingfeng Wang, Baocheng North China University of Technology Beijing China East China University of Science and Technology Shanghai China Datang Microelectronics Technology Co. Ltd Beijing China
With the increasing scale of distributed systems, Load balancing becomes a key issue to ensure system performance and scalability. However, load balancing has some limitations in dynamic environment, and it is difficu... 详细信息
来源: 评论
Dynamical analysis and image encryption application of a novel memristive hyperchaotic system
收藏 引用
OPTICS AND LASER TECHNOLOGY 2021年 133卷 106553-106553页
作者: Yang, Yang Wang, Lidan Duan, Shukai Luo, Li Southwest Univ Coll Elect & Informat Engn Chongqing 400715 Peoples R China Southwest Univ Coll Artificial Intelligence Chongqing 400715 Peoples R China Brain Inspired Comp & Intelligent Control Chongqi Chongqing 400715 Peoples R China Natl & Local Joint Engn Lab Intelligent Transmiss Chongqing 400715 Peoples R China Chongqing Brain Sci Collaborat Innovat Ctr Chongqing 400715 Peoples R China
In this paper, a new four-dimensional memristive hyperchaotic system is constructed based on Liu chaotic system by introducing a flux-controlled memristor model. Then the dynamic characteristics of the new system such... 详细信息
来源: 评论
Implementation of TRNG with SHA-3 for hardware security
收藏 引用
MICROELECTRONICS JOURNAL 2022年 123卷 105410-105410页
作者: Kamadi, Annapurna Abbas, Zia Int Inst Informat Technol IIIT CVEST Hyderabad India
Random Number Generators (RNGs) are the solution for cryptographic applications to enhance hardware security. These RNGs ought to have three specific properties unpredictability, aperiodic, and good statistical criter... 详细信息
来源: 评论
Investor attention and the pricing of cryptocurrency market
收藏 引用
EVOLUTIONARY AND INSTITUTIONAL ECONOMICS REVIEW 2020年 第2期17卷 445-468页
作者: Zhang, Wei Wang, Pengfei Tianjin Univ Coll Management & Econ 92 Weijin Rd Tianjin 300072 Peoples R China
This paper examines the underlying relationship between investor attention measured by Google Trends and the top twenty cryptocurrencies from April 2013 to April 2018. We show the bi-directional Granger causality betw... 详细信息
来源: 评论
An improved smart key frame extraction algorithm for vehicle target recognition
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2022年 97卷 107540-107540页
作者: Wang, Jianguo Zeng, Cheng Wang, Zhongsheng Jiang, Kun Xian Technol Univ Sch Comp Sci & Engn Xian Shaanxi Peoples R China Novel Network & Detect Control Engn Lab Natl & Lo Xian Peoples R China
The smart extraction of key frames is one of the critical technologies for vehicle target recognition in the video streaming environment. Currently, the common algorithms are scale-invariant feature transform (SIFT) o... 详细信息
来源: 评论
Security Analysis of RFID based on Multiple Readers
收藏 引用
Procedia Engineering 2011年 15卷 2598-2602页
作者: Bo Jin Hongyu Jin Taiyuan University of Science and Technology Taiyuan030024China Camp Subdistrict Taiyuan030012China
RFID systems and equipments have many particularities and limitations which will bring a wide range of security issues, especially when the system contains a large number of tags and multiple readers, some of the trad... 详细信息
来源: 评论
Top Position Sensitive Ordinal Relation Preserving Bitwise Weight for Image Retrieval
收藏 引用
algorithmS 2020年 第1期13卷 18页
作者: Wang, Zhen Sun, Fuzhen Zhang, Longbo Wang, Lei Liu, Pingping Shandong Univ Technol Sch Comp Sci & Technol Zibo 255000 Peoples R China Jilin Univ Sch Comp Sci & Technol Changchun 130000 Peoples R China
In recent years, binary coding methods have become increasingly popular for tasks of searching approximate nearest neighbors (ANNs). High-dimensional data can be quantized into binary codes to give an efficient simila... 详细信息
来源: 评论