×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [40]
内容类型
期刊论文 [31]
学位论文 [6]
会议论文 [3]
发表日期
2022 [12]
2021 [9]
2020 [9]
2019 [1]
2018 [2]
2017 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共40条,第1-10条
帮助
限定条件
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Effect of alloying elements on the interface of fcc-Fe/Ni3Al by first principle calculations
期刊论文
Computational Materials Science, 2022, 卷号: 214
作者:
Guo, Xin
;
Zhou, Jitian
;
Zhang, Xingxing
;
Yang, Ping
;
Ren, Junqiang
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2022/09/22
Alloying
Atoms
Austenite
Calculations
Chemical bonds
Density functional theory
Electrons
Density diagram
Differential charge
First principle calculations
First principles
Heat-resistant steel
Interface energy
Interface property
Orbital electrons
Orbitals
Segregation
First Principle Study on Effects of Al and Fe Doping on Properties of Cr20Ni80 Electrothermal Alloy
期刊论文
Cailiao Daobao/Materials Reports, 2022, 卷号: 36, 期号: 11
作者:
Li, Yamin
;
Zhang, Yaoyao
;
Zhou, Shengrui
;
Liu, Hongjun
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/07/20
Aluminum
Binary alloys
Binding energy
Calculations
Chromium alloys
Iron alloys
Al-doping
Cr20ni80 electrothermal alloy
Elastic properties
Fe doping
First principles
First-principle study
Formation heat
Property
Super cell
Supercell model
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:
Zhang, Qiu-yu
;
Bai, Jian
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/06/20
Authentication
Chaotic systems
Discrete wavelet transforms
Efficiency
Extraction
Hamming distance
Hash functions
Information retrieval
Principal component analysis
Speech
Cepstrum
Chaotic mapping
Encrypted speech
Encrypted speech retrieval
Features extraction
Henon chaotic mapping
Perceptual hashing
Power
Power normalized cepstrum coefficient
Speech feature extraction
Speech features
Speech retrieval
Survey of Industrial Control Systems Security
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 卷号: 59, 期号: 5, 页码: 1035-1053
作者:
Yang, Ting
;
Zhang, Jiayuan
;
Huang, Zaiqi
;
Chen, Yujie
;
Huang, Chenglong
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/08/09
Computer architecture
Control systems
Digital devices
Firmware
Industrial research
Industrial water treatment
Internet of things
Network architecture
Network security
Attack
Communications security
Control system security
Countermeasure
Digital technologies
Energy
Industrial control system security
Industrial control systems
Manufacturing industries
Security research
Encrypted speech retrieval based on long sequence Biohashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 9, 页码: 13065-13085
作者:
Huang, Yi-bo
;
Wang, Yong
;
Li, Hao
;
Zhang, Yuan
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/06/20
Biometrics
Cryptography
Efficiency
Search engines
Vectors
BioHashing
Biometric template
Content preservation operation
Encrypted speech
Encrypted speech retrieval
Features vector
Improved sha256
Long sequences
Sha-256
Speech retrieval
Content-based encrypted speech retrieval scheme with deep hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 7, 页码: 10221-10242
作者:
Zhang, Qiu-yu
;
Zhao, Xue-jiao
;
Zhang, Qi-wen
;
Li, Yu-zhou
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/04/21
Binary codes
Convolutional neural networks
Cryptography
Deep neural networks
Efficiency
Extraction
Feature extraction
Hamming distance
Information retrieval
Mapping
Semantic Web
Semantics
Spectrographs
Speech
Content-based
Convolutional neural network
Deep hashing
Deep semantic feature
Encrypted speech
Encrypted speech retrieval
Semantic features
Spectrograms
Speech retrieval
Research on condition monitoring and fault diagnosis of intelligent copper ball production lines based on big data
期刊论文
IET Collaborative Intelligent Manufacturing, 2022, 卷号: 4, 期号: 1, 页码: 45-57
作者:
Zhang, Zhongke
;
Li, Zhao
;
Zhao, Changzhong
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/04/21
Big data
Display devices
Failure analysis
Fault detection
Light emission
Metadata
Program debugging
Trees (mathematics)
Virtual private networks
Cloud platforms
Condition monitoring and faults diagnosis
Electronics materials
Fault prediction
Faults diagnosis
Manufacturing industries
On condition monitoring
Production line
Window control center configuration
Windows control centers
Blockchain Data Privacy Protection and Sharing Scheme Based on Zero-Knowledge Proof
期刊论文
Wireless Communications and Mobile Computing, 2022, 卷号: 2022
作者:
Feng, Tao
;
Yang, Pu
;
Liu, Chunyan
;
Fang, Junli
;
Ma, Rong
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/04/21
Cloud security
Data privacy
Industrial research
Network security
Block-chain
Cloud service providers
Data availability
Data privacy protections
Data Sharing
Privacy protection
Protection schemes
Semitrusted
Sharing schemes
Zero-knowledge proofs
Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage
期刊论文
Security and Communication Networks, 2022, 卷号: 2022
作者:
Zhang, Qiuyu
;
Fu, Minrui
;
Huang, Yibo
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/20
Access control
Cryptography
Digital storage
Long short-term memory
Semantics
Ciphertext-policy attribute-based encryptions
Cloud storages
Encrypted speech
Memory network
Multiusers
Privacy protection
Searchable encryptions
Speech data
Speech encryption
Speech retrieval
Speech BioHashing security authentication algorithm based on CNN hyperchaotic map
期刊论文
Multimedia Tools and Applications, 2022
作者:
Huang, Yi-bo
;
Yuan-Zhang
;
Chen, Teng-Fei
;
Yan, Shao-Hui
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/07/20
Authentication
Cryptography
Speech recognition
BioHashing
Biosafety template
CNN hyperchaotic map
Content authentication
Hyperchaotic maps
Security authentication
Speech content
Speech content authentication
Tamper detection
Tamper detection and location
©版权所有 ©2017 CSpace - Powered by
CSpace