×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [8]
西安交通大学 [2]
北京航空航天大学 [1]
国家空间科学中心 [1]
自动化研究所 [1]
上海大学 [1]
更多...
内容类型
会议论文 [18]
发表日期
2016 [2]
2014 [2]
2011 [4]
2010 [1]
2009 [7]
2008 [1]
更多...
学科主题
空间技术 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共18条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A CFAR Detection Algorithm for X-ray Pulsar Signal Based on Time-Frequency Entropy
会议论文
7th China Satellite Navigation Conference (CSNC), Changsha, PEOPLES R CHINA, 2016-01-01
作者:
Wang, Lu
;
Ke, Xizheng
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/20
X-ray pulsar
Signal detection
Shannon entropy
Renyi entropy
Consistency analysis of an empirical minimum error entropy algorithm
会议论文
作者:
Fan, Jun
;
Hu, Ting
;
Wu, Qiang
;
Zhou, Ding-Xuan
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
Minimum error entropy
Learning theory
Renyi's entropy
Error entropy consistency
Regression consistency
Renyi's Entropy Based Method for Analog Circuits Soft Fault Detection
会议论文
Chengdu, PEOPLES R CHINA, DEC 19-21, 2014
作者:
Xie, Xuan
;
Li, Xifeng
;
Bi, Dongjie
;
Zhou, Qizhong
;
Xie, Yongle
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/09
Overcoming Weak Expectations via the Renyi Entropy and the Expanded Computational Entropy
会议论文
7th International Conference on Information Theoretic Security (ICITS), Nanyang Technol Univ, Singapore, SINGAPORE, 2014-01-01
作者:
Yao, Yanqing
;
Li, Zhoujun
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/01/06
Weak secret sources
The renyi entropy
Computational entropy
Symmetric-key encryption schemes
Weak pseudorandom functions
Computational extractors
A new ground control point image-chip automatic matching method for remote sensing image location processing
会议论文
2011 IEEE International Symposium on IT in Medicine and Education, ITME 2011, Guangzhou, China, December 9, 2011 - December 11, 2011
作者:
Hu, Tai
;
Li, Ligang
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2014/12/15
An approach on detecting network attack based on entropy
会议论文
作者:
Wang, Zhiwen
;
Xia, Qin
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/10
Distribution characteristics
Intrusion Detection Systems
Key attributes
Large amounts
Network attack
Renyi entropy
Security administrator
Shannon entropy
Prediction Model of Least Squares Support Vector Machine of Increased Memory Type Based on GA and Quadratic Renyi-entropy
会议论文
International Conference on Information Science, Automation and Material System, MAY 21-22, 2011
作者:
Zhao, Guanhua
;
Yan, Wenwen
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/31
genetic algorithm
quadratic Renyi-entropy
increased memory type
neighborhood rough set
least squares support vector machine
Prediction Model of Non-iterative Least Squares Support Vector Machines Based on Quadratic Renyi-Entropy
会议论文
International Conference on Advanced Materials and Computer Science, MAY 01-02, 2011
作者:
Zhao Guanhua
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/31
quadratic renyi-entropy
least squares support vector machines
non-iterative
financial distress prediction
Audio similarity measure based on Renyi's quadratic entropy
会议论文
2010 International Conference on Audio, Language and Image Processing, ICALIP 2010, 2010-11-23
作者:
Yu, Xiaoqing[1]
;
Pan, Xueqian[2]
;
Yang, Wei[3]
;
Wan, Wanggen[4]
;
Zhang, Jing[5]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/30
Mutual Information Based on Renyi's Entropy Feature Selection
会议论文
2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 1, 2009
作者:
Hu, BG
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2015/08/19
©版权所有 ©2017 CSpace - Powered by
CSpace