Search scope:
排序: Display mode:
Secure connectivity analysis in unmanned aerial vehicle networks None
Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 3, Pages 409-422 doi: 10.1631/FITEE.1700032
Keywords: Unmanned aerial vehicle networks (UAVNs) Trust model Secure connectivity Doppler shift
Frontiers of Chemical Science and Engineering 2022, Volume 16, Issue 12, Pages 1743-1750 doi: 10.1007/s11705-022-2184-9
Keywords: standard enthalpy of formation polycyclic aromatic hydrocarbons connectivity based hierarchy high-precision
Managing obsolescence of embedded hardware and software in secure and trusted systems
Zachary A. COLLIER, James H. LAMBERT
Frontiers of Engineering Management 2020, Volume 7, Issue 2, Pages 172-181 doi: 10.1007/s42524-019-0032-5
Keywords: enterprise risk management diminishing manufacturing sources and material shortages scenario-based preferences systems engineering deep uncertainty product life cycle
Preliminary Analysis of Power Connectivity along the Belt and Road
Liu Zhe, Gao Yi, Wang Yusheng, Li Jun, Huang Weihe
Strategic Study of CAE 2019, Volume 21, Issue 4, Pages 76-81 doi: 10.15302/J-SSCAE-2019.04.007
Keywords: the Belt and Road energy internet clean energy power connectivity energy transition
Saeed KHORASHADIZADEH, Mohammad-Hassan MAJIDI
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 9, Pages 1180-1190 doi: 10.1631/FITEE.1601814
Keywords: Observer-based synchronization Chaotic systems Legendre polynomials Secure communications
Multi-UAV cooperative target tracking with bounded noise for connectivity preservation
Rui Zhou, Yu Feng, Bin Di, Jiang Zhao, Yan Hu,jzhao@buaa.edu.cn
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 10, Pages 1413-1534 doi: 10.1631/FITEE.1900617
A Security Middleware for Web Applications Based on JavaBeans and Secure Cookie
Cai Zhun,Kong Fanyu,Li Daxing
Strategic Study of CAE 2005, Volume 7, Issue 3, Pages 74-77
This paper discusses the secure operations in the web applications, and designs a framework of middlewareThe paper implements the security middleware based on the “JavaBeans” and “Secure Cookie
Keywords: JavaBeans Secure Cookie middleware PMI RBAC
The research of connectivity-credibility restricted clustering algorithm in wireless sensor networks
Yu Jiming,Sun Yamin,Lei Yanjing,Yang Yuwang
Strategic Study of CAE 2010, Volume 12, Issue 9, Pages 73-77
This paper proposed a speeding clustering algorithm of connectivity-credibilityComparing to the lowerst-ID clustering and highest-connectivity clustering algorithm, the algorithm can
Keywords: wireless sensor networks connectivity-credibility clustering algorithm
Advanced Antennas Push Forward Wireless Connectivity
Kwai Man Luk, Baoyan Duan
Engineering 2022, Volume 11, Issue 4, Pages 1-2 doi: 10.1016/j.eng.2022.03.003
The Dynamic Functional Network Connectivity Analysis Framework
Zening Fu, Yuhui Du, Vince D. Calhoun
Engineering 2019, Volume 5, Issue 2, Pages 190-193 doi: 10.1016/j.eng.2018.10.001
Cao Yaofeng
Strategic Study of CAE 2013, Volume 15, Issue 11, Pages 49-52
To solve the multi-types of technical problem concerning with the development technology of Puguang Gas Field which is deeply reserved and abounds with hydrogen sulfide, we have organized a scientific innovation team of industry- teaching- research integration. So that, we have formed a technology innovation system,realized the general interaction of key science and technology program and site-testing,promoted the research and development of gas field with super- deep and high-sulfur, localization of key equipment,the construction of standard system and its industrial application, pushed China to be one of the few countries of holding the core technology for high-sulfur gas field development,and made important contribution to superdeep and high-sulfur gas field development of China and even the whole world.
Keywords: Puguang Gas Field super-deep and high-sulfur technology innovation industrial application
Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data Research Articles
S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7, Pages 940-956 doi: 10.1631/FITEE.2000071
Keywords: 医学图像加密;DNA;混沌吸引子;交叉;突变;电子医疗
Cerebral regional and network characteristics in asthma patients: a resting-state fMRI study
Siyi Li, Peilin Lv, Min He, Wenjing Zhang, Jieke Liu, Yao Gong, Ting Wang, Qiyong Gong, Yulin Ji, Su Lui
Frontiers of Medicine 2020, Volume 14, Issue 6, Pages 792-801 doi: 10.1007/s11684-020-0745-1
Keywords: asthma brain regional activation functional connectivity resting-state fMRI
Reducing power grid cascading failure propagation by minimizing algebraic connectivity in edge addition Research Articles
Supaporn LONAPALAWONG, Jiangzhe YAN, Jiayu LI, Deshi YE, Wei CHEN, Yong TANG, Yanhao HUANG, Can WANG,11821132@zju.edu.cn,wcan@zju.edu.cn
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 3, Pages 382-397 doi: 10.1631/FITEE.2000596
Keywords: Network robustness Cascading failure Average propagation Algebraic connectivity Power grid
An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication Research Articles
Masoud Kaveh, Abolfazl Falahati,afalahati@iust.ac.ir
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7, Pages 1010-1019 doi: 10.1631/FITEE.2000043
Keywords: 海豚哨音;改进Merkle哈希树;安全水声通信(UWAC)
Title Author Date Type Operation
Secure connectivity analysis in unmanned aerial vehicle networks
Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU
Journal Article
High-precision standard enthalpy of formation for polycyclic aromatic hydrocarbons predicting from general connectivity
Journal Article
Managing obsolescence of embedded hardware and software in secure and trusted systems
Zachary A. COLLIER, James H. LAMBERT
Journal Article
Preliminary Analysis of Power Connectivity along the Belt and Road
Liu Zhe, Gao Yi, Wang Yusheng, Li Jun, Huang Weihe
Journal Article
Synchronization of two different chaotic systems using Legendre polynomials with applications in secure
Saeed KHORASHADIZADEH, Mohammad-Hassan MAJIDI
Journal Article
Multi-UAV cooperative target tracking with bounded noise for connectivity preservation
Rui Zhou, Yu Feng, Bin Di, Jiang Zhao, Yan Hu,jzhao@buaa.edu.cn
Journal Article
A Security Middleware for Web Applications Based on JavaBeans and Secure Cookie
Cai Zhun,Kong Fanyu,Li Daxing
Journal Article
The research of connectivity-credibility restricted clustering algorithm in wireless sensor networks
Yu Jiming,Sun Yamin,Lei Yanjing,Yang Yuwang
Journal Article
The Dynamic Functional Network Connectivity Analysis Framework
Zening Fu, Yuhui Du, Vince D. Calhoun
Journal Article
The secure and highly efficient development technology for Puguang Gas Field and its industrial application
Cao Yaofeng
Journal Article
Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data
S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu
Journal Article
Cerebral regional and network characteristics in asthma patients: a resting-state fMRI study
Siyi Li, Peilin Lv, Min He, Wenjing Zhang, Jieke Liu, Yao Gong, Ting Wang, Qiyong Gong, Yulin Ji, Su Lui
Journal Article
Reducing power grid cascading failure propagation by minimizing algebraic connectivity in edge addition
Supaporn LONAPALAWONG, Jiangzhe YAN, Jiayu LI, Deshi YE, Wei CHEN, Yong TANG, Yanhao HUANG, Can WANG,11821132@zju.edu.cn,wcan@zju.edu.cn
Journal Article