咨询与建议

限定检索结果

文献类型

  • 60 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 101 篇 工学
    • 64 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 11 篇 软件工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
  • 13 篇 理学
    • 8 篇 物理学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学

主题

  • 107 篇 hash algorithm
  • 10 篇 cryptography
  • 9 篇 image encryption
  • 8 篇 security
  • 6 篇 sha-3
  • 6 篇 chaos
  • 6 篇 fpga
  • 5 篇 information secu...
  • 3 篇 message digest
  • 3 篇 hardware impleme...
  • 3 篇 rfid security
  • 3 篇 convolutional ne...
  • 3 篇 tag
  • 3 篇 keccak
  • 3 篇 pipeline
  • 2 篇 satellite naviga...
  • 2 篇 global positioni...
  • 2 篇 sparser probe da...
  • 2 篇 hls
  • 2 篇 symmetric encryp...

机构

  • 4 篇 natl inst techno...
  • 2 篇 northwest normal...
  • 2 篇 hitachi ltd smar...
  • 2 篇 hitachi ltd soci...
  • 2 篇 konkuk univ dept...
  • 2 篇 hitachi ltd soci...
  • 2 篇 manipal acad hig...
  • 2 篇 tottori univ fac...
  • 2 篇 konkuk univ dept...
  • 1 篇 northeastern uni...
  • 1 篇 minnan sci & tec...
  • 1 篇 chongqing univ p...
  • 1 篇 china univ min &...
  • 1 篇 school of inform...
  • 1 篇 centrin data grp...
  • 1 篇 north china univ...
  • 1 篇 univ dehradun uc...
  • 1 篇 katholieke univ ...
  • 1 篇 coe cgc cse land...
  • 1 篇 changchun acad a...

作者

  • 6 篇 patro k. abhiman...
  • 5 篇 acharya bibhuden...
  • 2 篇 yan shaohui
  • 2 篇 kim keecheon
  • 2 篇 gu binxian
  • 2 篇 okude mariko
  • 2 篇 sakamoto toshiyu...
  • 2 篇 park sun-young
  • 2 篇 kitahara reiji
  • 2 篇 yokota takayoshi
  • 2 篇 zhang wei
  • 1 篇 liu bowen
  • 1 篇 kang joo-young
  • 1 篇 du xiaojing
  • 1 篇 mayilsamy kathir...
  • 1 篇 kralik lukas
  • 1 篇 meikandan padmap...
  • 1 篇 pun chi-man
  • 1 篇 gao zhenguo
  • 1 篇 wang lei

语言

  • 101 篇 英文
  • 4 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=hash algorithm"
107 条 记 录,以下是11-20 订阅
排序:
A New hash algorithm Exploiting Triple-state Bucket Directory for Flash Storage Devices
收藏 引用
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS 2016年 第4期62卷 398-404页
作者: Kim, Bo-kyeong Kang, Joo-Young Lee, Dong-Ho Hanyang Univ Dept Comp Sci & Engn Seoul South Korea
Recently, the flash storage device becomes more important to the mobile consumer electronics that supports various functionalities because of its portability and reliability. The capacity of the flash storage device i... 详细信息
来源: 评论
The Incremental Knowledge Acquisition Based on hash algorithm
收藏 引用
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS 2016年 第3期24卷 347-366页
作者: Zhang, Qing-Hua Yao, Long-Yang Zhang, Guan-Sheng Xin, Yu-Ke Chongqing Univ Posts & Telecommun Chongqing Key Lab Computat Intelligence Chongqing 40065 Peoples R China Chongqing Univ Posts & Telecommun Sch Sci 2 Chongwen Rd Chongqing 400065 Peoples R China Chongqing Univ Posts & Telecommun Res Ctr Intelligent Syst & Robot Chongqing 400065 Peoples R China
In this paper, a new incremental knowledge acquisition method is proposed based on rough set theory, decision tree and granular computing. In order to effectively process dynamic data, describing the data by rough set... 详细信息
来源: 评论
A Seven Tuple Firewall Rule Matching algorithm Based on hash Table  14
A Seven Tuple Firewall Rule Matching Algorithm Based on Hash...
收藏 引用
14th Asian Control Conference (ASCC)
作者: Teng, Yuc Li, Zhuohan Dalian Univ Technol Sch Control Sci & Engn Dalian Peoples R China
The traditional firewall packet filtering process primarily relies on five tuple firewall filtering rules for matching, encompassing the source IP address, destination IP, protocol type, source port, and destination p... 详细信息
来源: 评论
RETRACTED: Simulation of cross-modal image-text retrieval algorithm under convolutional neural network structure and hash method
收藏 引用
JOURNAL OF SUPERCOMPUTING 2022年 第5期78卷 7106-7132页
作者: Yang, XianBen Zhang, Wei Beihua Univ Coll Comp Sci & Technol Jilin 132000 Jilin Peoples R China
The purpose of this work is to quickly find useful information from the massive image database in view of the images, videos, and other multimedia data generated on Internet platforms, such as Wechat, Sina Weibo and T... 详细信息
来源: 评论
High Performance Pipelined FPGA Implementation of the SHA-3 hash algorithm  4
High Performance Pipelined FPGA Implementation of the SHA-3 ...
收藏 引用
4th Mediterranean Conference on Embedded Computing (MECO
作者: Ioannou, Lenos Michail, Harris E. Voyiatzis, Artemios G. Cyprus Univ Technol Dept Elect Engn Comp Engn & Informat CY-3036 Lemesos Cyprus SBA Res Vienna Austria
The SHA-3 cryptographic hash algorithm is standardized in FIPS 202. We present a pipelined hardware architecture supporting all the four SHA-3 modes of operation and a high-performance implementation for FPGA devices ... 详细信息
来源: 评论
LBP feature and hash function based dual watermarking algorithm for database
收藏 引用
DATA & KNOWLEDGE ENGINEERING 2023年 148卷
作者: Li, De Ma, Chi Gao, Haoyang Jin, Xun Yanbian Univ Dept Comp Sci Yanji Peoples R China
In this paper, we propose a local binary pattern (LBP) feature and hash function based dual watermarking algorithm for database. Attribute feature columns are selected to generate zero watermarks using the Pearson cor... 详细信息
来源: 评论
A hash Approach to Refine CNC Computation of Arc Length and Parameter of NURBS with High Efficiency and Precision
收藏 引用
INTERNATIONAL JOURNAL OF PRECISION ENGINEERING AND MANUFACTURING 2024年 第6期25卷 1243-1256页
作者: Han, Xueting Zhu, Kongfeng Wang, Xingbo Foshan Univ Dept Mechatron 33 Guangyun Rd Foshan 528000 Guangdong Peoples R China GSK CNC Equipment Co Ltd R&D 22 Guanda Rd Guangzhou 510000 Guangdong Peoples R China Guangdong Coll Appl Sci & Technol Dept Intelligent Manufacture 20 Fengle Rd Zhaoqing 526000 Guangdong Peoples R China
A hash method is proposed to compute bi-directionally the arc length and the parameter of the NURBS curve in curve interpolation. By using a hash table that adopts a doubly linked circular list and a red-black tree, t... 详细信息
来源: 评论
Anew compact belief rule model for fault diagnosis
收藏 引用
CONTROL ENGINEERING PRACTICE 2025年 159卷
作者: Ming, Zhichao Zhou, Zhijie Hu, Changhua Feng, Zhichao Lian, Zheng Zhang, Chunchao Rocket Force Univ Engn Dept Missile Engn Xian 710025 Shaanxi Peoples R China
Amidst growing scrutiny of "black box" models in fault diagnosis applications that demand high interpretability, rule-based models are regaining prominence due to their inherent interpretability. Belief rule... 详细信息
来源: 评论
Safeguarding confidentiality and privacy in cloud-enabled healthcare systems with spectrasafe encryption and dynamic k-anonymity algorithm
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2025年 279卷
作者: Dhinakaran, D. Kumar, N. Jagadish Ponnuviji, N. P. Kumar, B. Praveen Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci & T Dept Comp Sci & Engn Chennai India SRM Inst Sci & Technol Dept Data Sci & Business Syst Chennai India RMK Coll Engn & Technol Dept Comp Sci & Engn Puduvoyal India GITAM Sch Technol Dept Comp Sci & Engn Bengaluru India
Healthcare is no exception to the requirement of cutting-edge solutions for healthcare data security and privacy: novel strategies need be formulated on a regular basis given contemporary threat in order to reliable s... 详细信息
来源: 评论
Illustration visual communication based on computer vision image retrieval algorithm
COMPUTER OPTICS
收藏 引用
COMPUTER OPTICS 2025年 第1期49卷 132-140页
作者: Zhang, H. Z. Minnan Sci & Technol Coll Sch Art & Design Kangyuan Rd 8 Kangmei Town 362000 Quanzhou Peoples R China
In illustration design, good visual communication can make the audience resonate. Computer vision image retrieval algorithm provides important support and assistance for the visual communication of illustration. Howev... 详细信息
来源: 评论