Resource Type

Journal Article 152

Conference Information 1

Year

2023 9

2022 16

2021 18

2020 6

2019 9

2018 5

2017 8

2016 13

2015 5

2014 6

2013 3

2012 6

2011 8

2010 8

2009 5

2008 6

2007 12

2006 1

2005 3

2004 2

open ︾

Keywords

particle swarm optimization 6

particle 3

Fine particle 2

Fischer-Tropsch synthesis 2

Lattice 2

Particle filter 2

Particle size 2

Particle swarm optimization 2

discrete element method 2

particle shape 2

particle size distribution 2

1

(DEM) 1

1 1

2-propylene glycol 1

2D nanoparticles 1

AOD 1

ATOFMS 1

Absorptivity 1

open ︾

Search scope:

排序: Display mode:

A novel algorithm to counter cross-eye jamming based on a multi-target model Research Articles

Zhi-yong SONG, Xing-lin SHEN, Qiang FU

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7,   Pages 988-1001 doi: 10.1631/FITEE.1800394

Abstract: characteristic differences between target and jamming and the releasing process of jamming are used to optimize particleParticle identity labels that represent the properties of target and jamming are introduced into thedistinction between true targets and false jamming is realized through correlation and transmission between labels

Keywords: Particle identity labels     Probability hypothesis density     Cross-eye jamming     Anti-jamming     Random finite    

Development and Application of Network Electronic Identity Management in Major Countries and Regions

Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 99-103 doi: 10.15302/J-SSCAE-2016.06.020

Abstract: paper analyzes and sorts out the latest developments and typical applications of network electronic identitymanagement in major countries and regions around the world, and discusses development trends in network identityIt outlines network electronic identity management in China according to the 13th Five-Year Plan, includingthe development of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system.

Keywords: network electronic identity     identity management     digital signature    

A Study on the Policies and Regulations of Network Electronic Identity Management

Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 23-27 doi: 10.15302/J-SSCAE-2016.06.005

Abstract:

This paper analyzes and sorts out the policies, laws, and regulations of network electronic identityIt discusses the development of China's network identity management, and outlines the 13th Five-YearPlan's policies and regulations for network electronic identity management in China, including thedevelopment of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system.

Keywords: network electronic identity     identity management     policies and regulations    

CONSUMER PREFERENCE FOR ENVIRONMENTALLY-FRIENDLY BEVERAGE PACKAGING: THE ROLE OF INFORMATION PROVISION AND IDENTITY

Frontiers of Agricultural Science and Engineering 2023, Volume 10, Issue 1,   Pages 95-108 doi: 10.15302/J-FASE-2022478

Abstract:

● Consumer preference for environmentally-friendly beverage packaging was investigated.

Keywords: China     consumer preference     food and beverage packaging     green identity label     information treatment    

The effects of festivals and special events on city image design

LIU Yuan, CHEN Chong

Frontiers of Structural and Civil Engineering 2007, Volume 1, Issue 2,   Pages 255-259 doi: 10.1007/s11709-007-0032-0

Abstract: The unique image of the city could be identified by the City Mind Identity, the City Visual Identityand the City Behavior Identity concerned with festivals and special events.

Keywords: Visual Identity     reversal     transmission     marketing     Behavior Identity    

Efficient identity-based signature over NTRU lattice

Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 2,   Pages 135-142 doi: 10.1631/FITEE.1500197

Abstract:

Identity-based signature has become an important technique for lightweight authentication as soonThereafter, identity-based signature schemes based on the integer factorization problem and discreteRecently,many efforts have been made to construct identity-based signatures over lattice assumptionsIn this study, an efficient identity-based signature scheme is presented over the number theory researchThe new scheme is more efficient than other lattice- and identity-based signature schemes.

Keywords: Identity     Signature     Lattice     Number theory research unit (NTRU)    

Efficient hierarchical identity based encryption scheme in the standard model over lattices Article

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8,   Pages 781-791 doi: 10.1631/FITEE.1500219

Abstract: Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identitya novel public key assignment rule is used to averagely assign one random and public matrix to two identityhardness of the learning with errors problem, we demonstrate that the scheme is secure under selective identity

Keywords: Hierarchical identity based encryption scheme     Lattice-based cryptography     Standard model     Learning with    

Integration of current identity-based district-varied health insurance schemes in China: implications

Hai-Qiang Wang, Zhi-Heng Liu, Yong-Zhao Zhang, Zhuo-Jing Luo

Frontiers of Medicine 2012, Volume 6, Issue 1,   Pages 79-84 doi: 10.1007/s11684-012-0179-5

Abstract: Despite their phasic success, these substantially identity-based, district-varied health insurance schemes

Keywords: health insurance     urban employee basic health insurance scheme     urban-resident scheme     new rural cooperative medical system    

Catalyst particle shapes and pore structure engineering for hydrodesulfurization and hydrodenitrogenation

Frontiers of Chemical Science and Engineering 2022, Volume 16, Issue 6,   Pages 897-908 doi: 10.1007/s11705-021-2127-x

Abstract: Catalyst particle shapes and pore structure engineering are crucial for alleviating internal diffusionThe effects of catalyst particle shapes (sphere, cylinder, trilobe, and tetralobe) and pore structuresThe relationship between particle shape and effectiveness factor is first established, and the specificThe catalyst particle shapes primarily alter the average HDS/HDN reaction rate to adjust the HDS/HDNimproving HDS/HDN catalyst particle efficiency.

Keywords: hydrodesulfurization     hydrodenitrogenation     particle shape     pore structure    

A novel light fluctuation spectrum method for in-line particle sizing

Shouxuan QIN, Xiaoshu CAI, Li MA

Frontiers in Energy 2012, Volume 6, Issue 1,   Pages 89-97 doi: 10.1007/s11708-012-0176-z

Abstract: This paper discusses two problems in in-line particle sizing when using light fluctuation method.First, by retrieving the ratio of particle concentrations at different time, the intensity of incidentmulti-sub-size zone model is proposed, with which the relationship between the distribution of turbidity and the particle

Keywords: in-line measurement     particle size distribution (PSD)     incident light intensity     particle concentration    

Independent cover meshless particle method for complex geotechnical engineering

Jianqiu WU, Yongchang CAI

Frontiers of Structural and Civil Engineering 2018, Volume 12, Issue 4,   Pages 515-526 doi: 10.1007/s11709-017-0428-4

Abstract: A new Independent Cover Meshless Particle (ICMP) method is proposed for the analysis of complex geotechnical

Keywords: meshless method     particle method     independent cover     CTM     geotechnical engineering    

Microdamage study of granite under thermomechanical coupling based on the particle flow code

Frontiers of Structural and Civil Engineering   Pages 1413-1427 doi: 10.1007/s11709-023-0953-2

Abstract: an improved temperature-dependent linear parallel bond model is introduced under the framework of a particle

Keywords: thermomechanical coupling effect     granite     improved linear parallel bond model     thermal property     particle    

Study on direct measurement method of vorticity from particle images

RUAN Xiaodong, FU Xin, YANG Huayong

Frontiers in Energy 2007, Volume 1, Issue 4,   Pages 408-412 doi: 10.1007/s11708-007-0059-1

Abstract: vorticity measurement, a new direct measurement of vorticity (DMV) method extracting vorticity from particle

Keywords: conventional     vorticity measurement     particle     DMV     theory    

Response surface regression analysis on FeCrBSi particle in-flight properties by plasma spray

Runbo MA,Lihong DONG,Haidou WANG,Shuying CHEN,Zhiguo XING

Frontiers of Mechanical Engineering 2016, Volume 11, Issue 3,   Pages 250-257 doi: 10.1007/s11465-016-0401-2

Abstract: response surface methodology show that the interactive effects between voltage and spray distance on particleFor a given argon flow rate, particle velocity and temperature response surface are obviously bendingWith an increase in spray distance, the interactive effects between voltage and argon flow rate on particleWith an increase in voltage, the interactive effects between spray distance and argon flow rate on particle

Keywords: particle velocity     particle temperature     interactive effects     response surface    

Novel efficient identity-based signature on lattices

Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 2,   Pages 141-286 doi: 10.1631/FITEE.1900318

Abstract: Identity-based cryptosystems can avoid the certificate management issues.In the , it is proved that our scheme is strongly unforgeable against adaptive chosen messages and identity

Keywords: Identity-based signature     Lattice     Strong unforgeability     Random oracle model    

Title Author Date Type Operation

A novel algorithm to counter cross-eye jamming based on a multi-target model

Zhi-yong SONG, Xing-lin SHEN, Qiang FU

Journal Article

Development and Application of Network Electronic Identity Management in Major Countries and Regions

Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang

Journal Article

A Study on the Policies and Regulations of Network Electronic Identity Management

Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing

Journal Article

CONSUMER PREFERENCE FOR ENVIRONMENTALLY-FRIENDLY BEVERAGE PACKAGING: THE ROLE OF INFORMATION PROVISION AND IDENTITY

Journal Article

The effects of festivals and special events on city image design

LIU Yuan, CHEN Chong

Journal Article

Efficient identity-based signature over NTRU lattice

Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO

Journal Article

Efficient hierarchical identity based encryption scheme in the standard model over lattices

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Journal Article

Integration of current identity-based district-varied health insurance schemes in China: implications

Hai-Qiang Wang, Zhi-Heng Liu, Yong-Zhao Zhang, Zhuo-Jing Luo

Journal Article

Catalyst particle shapes and pore structure engineering for hydrodesulfurization and hydrodenitrogenation

Journal Article

A novel light fluctuation spectrum method for in-line particle sizing

Shouxuan QIN, Xiaoshu CAI, Li MA

Journal Article

Independent cover meshless particle method for complex geotechnical engineering

Jianqiu WU, Yongchang CAI

Journal Article

Microdamage study of granite under thermomechanical coupling based on the particle flow code

Journal Article

Study on direct measurement method of vorticity from particle images

RUAN Xiaodong, FU Xin, YANG Huayong

Journal Article

Response surface regression analysis on FeCrBSi particle in-flight properties by plasma spray

Runbo MA,Lihong DONG,Haidou WANG,Shuying CHEN,Zhiguo XING

Journal Article

Novel efficient identity-based signature on lattices

Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn

Journal Article