Resource Type

Journal Article 548

Conference Videos 17

Year

2024 1

2023 62

2022 59

2021 62

2020 54

2019 34

2018 31

2017 45

2016 18

2015 25

2014 12

2013 16

2012 14

2011 6

2010 5

2009 9

2008 15

2007 17

2006 10

2005 15

open ︾

Keywords

neural network 32

artificial neural network 21

Neural network 11

network 10

optimization 9

Artificial intelligence 7

convolutional neural network 7

genetic algorithm 7

artificial neural network (ANN) 6

Deep learning 5

BP neural network 4

6G 3

ANN 3

Artificial neural network 3

Bayesian belief network 3

Network security 3

finite element method 3

3D printing 2

ANOVA 2

open ︾

Search scope:

排序: Display mode:

A Study on the Policies and Regulations of Network Electronic Identity Management

Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 23-27 doi: 10.15302/J-SSCAE-2016.06.005

Abstract:

This paper analyzes and sorts out the policies, laws, and regulations of network electronic identityIt discusses the development of China's network identity management, and outlines the 13th Five-YearPlan's policies and regulations for network electronic identity management in China, including thedevelopment of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system.

Keywords: network electronic identity     identity management     policies and regulations    

Development and Application of Network Electronic Identity Management in Major Countries and Regions

Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 99-103 doi: 10.15302/J-SSCAE-2016.06.020

Abstract:

This paper analyzes and sorts out the latest developments and typical applications of network electronicin network identity management technology.It outlines network electronic identity management in China according to the 13th Five-Year Plan, including, and the construction of a network space identity management system.users; thus, it provides a reference for China’s network identity management development during

Keywords: network electronic identity     identity management     digital signature    

Efficient controller area network data compression for automobile applications

Yu-jing WU,Jin-Gyun CHUNG

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 1,   Pages 70-78 doi: 10.1631/FITEE.1400136

Abstract: Controller area networks (CANs) have been designed for multiplexing communication between electronic

Keywords: Controller area network (CAN)     Electronic control units (ECUs)     Data compression     Signal rearrangement    

CONSUMER PREFERENCE FOR ENVIRONMENTALLY-FRIENDLY BEVERAGE PACKAGING: THE ROLE OF INFORMATION PROVISION AND IDENTITY

Frontiers of Agricultural Science and Engineering 2023, Volume 10, Issue 1,   Pages 95-108 doi: 10.15302/J-FASE-2022478

Abstract:

● Consumer preference for environmentally-friendly beverage packaging was investigated.

Keywords: China     consumer preference     food and beverage packaging     green identity label     information treatment    

The effects of festivals and special events on city image design

LIU Yuan, CHEN Chong

Frontiers of Structural and Civil Engineering 2007, Volume 1, Issue 2,   Pages 255-259 doi: 10.1007/s11709-007-0032-0

Abstract: The unique image of the city could be identified by the City Mind Identity, the City Visual Identityand the City Behavior Identity concerned with festivals and special events.

Keywords: Visual Identity     reversal     transmission     marketing     Behavior Identity    

Technology and application of Chinese electronic detonator

Yan Jinglong

Strategic Study of CAE 2015, Volume 17, Issue 1,   Pages 36-41

Abstract: the cofferdam demolition blasting engineering in Three Gorges Project of Yangtze River in 2006, the electronicThis paper discussed the technical development and the market application situation of Chinese electronicindustrial generalizability and engineering application, and lastly provided some suggestions of the electronicdetonator product, the application advantages and value of electronic detonators have become increasinglyprominent, so the spring of electronic detonator development in China will come soon.

Keywords: electronic detonator; digital electronic detonator; digital detonator    

Symptom network topological features predict the effectiveness of herbal treatment for pediatric cough

Mengxue Huang, Jingjing Wang, Runshun Zhang, Zhuying Ni, Xiaoying Liu, Wenwen Liu, Weilian Kong, Yao Chen, Tiantian Huang, Guihua Li, Dan Wei, Jianzhong Liu, Xuezhong Zhou

Frontiers of Medicine 2020, Volume 14, Issue 3,   Pages 357-367 doi: 10.1007/s11684-019-0699-3

Abstract: Symptom phenotypes hold complicated interactions between each other to form an intricate network structureThis study aims to investigate whether the network structure of pediatric cough symptoms is associatedA total of 384 cases were derived from the electronic medical records of a highly experienced traditionalSeveral well-established analysis methods, namely, statistical test, correlation analysis, and complex networkInterventions with the most different symptoms in the symptom network may have improved therapeutic effects

Keywords: pediatric cough     complex network     symptoms     traditional Chinese medicine     electronic medical records    

Efficient identity-based signature over NTRU lattice

Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 2,   Pages 135-142 doi: 10.1631/FITEE.1500197

Abstract:

Identity-based signature has become an important technique for lightweight authentication as soonThereafter, identity-based signature schemes based on the integer factorization problem and discreteRecently,many efforts have been made to construct identity-based signatures over lattice assumptionsIn this study, an efficient identity-based signature scheme is presented over the number theory researchThe new scheme is more efficient than other lattice- and identity-based signature schemes.

Keywords: Identity     Signature     Lattice     Number theory research unit (NTRU)    

Recycling Materials from Waste Electrical and Electronic Equipment

Jinhui Li

Frontiers of Environmental Science & Engineering 2017, Volume 11, Issue 5, doi: 10.1007/s11783-017-1001-z

Information and Electronic Engineering Front 2021

Information and Electronic Engineering Project Team

Engineering Fronts 2021, Volume 5, Issue 1,   Pages 31-58

Efficient hierarchical identity based encryption scheme in the standard model over lattices Article

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8,   Pages 781-791 doi: 10.1631/FITEE.1500219

Abstract: Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identitya novel public key assignment rule is used to averagely assign one random and public matrix to two identityhardness of the learning with errors problem, we demonstrate that the scheme is secure under selective identity

Keywords: Hierarchical identity based encryption scheme     Lattice-based cryptography     Standard model     Learning with    

Human power-based energy harvesting strategies for mobile electronic devices

Dewei JIA, Jing LIU

Frontiers in Energy 2009, Volume 3, Issue 1,   Pages 27-46 doi: 10.1007/s11708-009-0002-4

Abstract: Energy problems arise with the proliferation of mobile electronic devices, which range from entertainmentThe large amount of energy consumption and increasing mobility of electronic devices make it urgent that

Keywords: mobile electronic device     human power     energy harvesting     micro/miniaturized generator     battery     green energy    

Integrated energy storage system based on triboelectric nanogenerator in electronic devices

Xiao Feng, Yang Zhang, Le Kang, Licheng Wang, Chongxiong Duan, Kai Yin, Jinbo Pang, Kai Wang

Frontiers of Chemical Science and Engineering 2021, Volume 15, Issue 2,   Pages 238-250 doi: 10.1007/s11705-020-1956-3

Abstract: The emergence of electronic devices has brought earth-shaking changes to people’s life.However, an external power source may become indispensable to the electronic devices due to the limited, the triboelectric nanogenerator (TENG) provides a novel idea to the increasing number of personal electronicintegrated with the energy storage system into a self-powered system, which can supply power to the electronic

Keywords: electronic devices     triboelectric nanogenerator     mechanical energy     self-powered system    

Electronic and mechanical responses of two-dimensional HfS

Mohammad SALAVATI

Frontiers of Structural and Civil Engineering 2019, Volume 13, Issue 2,   Pages 486-494 doi: 10.1007/s11709-018-0491-5

Abstract: During the last decade, numerous high-quality two-dimensional (2D) materials with semiconducting electronicWe accordingly conducted first-principles calculations to explore the mechanical and electronic responsesWe particularly studied the possibility of engineering of the electronic properties of these attractive

Keywords: 2D materials     mechanical     electronic     DFT    

social profit of cooperative models in three-echelon reverse supply chain for waste electrical and electronic

Jian Li, Zhen Wang, Bao Jiang

Frontiers of Environmental Science & Engineering 2017, Volume 11, Issue 5, doi: 10.1007/s11783-017-0999-2

Abstract: should further seek to maximize social benefits by increasing the quantity of waste electrical and electronic

Keywords: Waste electrical and electronic equipment (WEEE)     Reverse supply chains     Recycle quantity     Social benefit    

Title Author Date Type Operation

A Study on the Policies and Regulations of Network Electronic Identity Management

Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing

Journal Article

Development and Application of Network Electronic Identity Management in Major Countries and Regions

Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang

Journal Article

Efficient controller area network data compression for automobile applications

Yu-jing WU,Jin-Gyun CHUNG

Journal Article

CONSUMER PREFERENCE FOR ENVIRONMENTALLY-FRIENDLY BEVERAGE PACKAGING: THE ROLE OF INFORMATION PROVISION AND IDENTITY

Journal Article

The effects of festivals and special events on city image design

LIU Yuan, CHEN Chong

Journal Article

Technology and application of Chinese electronic detonator

Yan Jinglong

Journal Article

Symptom network topological features predict the effectiveness of herbal treatment for pediatric cough

Mengxue Huang, Jingjing Wang, Runshun Zhang, Zhuying Ni, Xiaoying Liu, Wenwen Liu, Weilian Kong, Yao Chen, Tiantian Huang, Guihua Li, Dan Wei, Jianzhong Liu, Xuezhong Zhou

Journal Article

Efficient identity-based signature over NTRU lattice

Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO

Journal Article

Recycling Materials from Waste Electrical and Electronic Equipment

Jinhui Li

Journal Article

Information and Electronic Engineering Front 2021

Information and Electronic Engineering Project Team

Journal Article

Efficient hierarchical identity based encryption scheme in the standard model over lattices

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Journal Article

Human power-based energy harvesting strategies for mobile electronic devices

Dewei JIA, Jing LIU

Journal Article

Integrated energy storage system based on triboelectric nanogenerator in electronic devices

Xiao Feng, Yang Zhang, Le Kang, Licheng Wang, Chongxiong Duan, Kai Yin, Jinbo Pang, Kai Wang

Journal Article

Electronic and mechanical responses of two-dimensional HfS

Mohammad SALAVATI

Journal Article

social profit of cooperative models in three-echelon reverse supply chain for waste electrical and electronic

Jian Li, Zhen Wang, Bao Jiang

Journal Article