Resource Type

Journal Article 217

Conference Videos 2

Year

2023 16

2022 14

2021 18

2020 17

2019 16

2018 9

2017 13

2016 8

2015 19

2014 10

2013 4

2012 7

2011 4

2010 7

2009 5

2008 5

2007 9

2006 5

2005 9

2004 4

open ︾

Keywords

failure mode 6

sliding mode control 4

mode 3

sustainable development 3

circular plate 2

development mode 2

ecological civilization 2

guard mode 2

management mode 2

mass customization 2

mechanism 2

mode switching 2

operation mode 2

production mode 2

resource utilization 2

transportation 2

13-mode procedure 1

3D co-catalyst 1

802.11i 1

open ︾

Search scope:

排序: Display mode:

Parallel Authentication Modes Based on Double Blocks or Key Counter

Huang Yuhua,Huai Aiqun,Song Yubo

Strategic Study of CAE 2004, Volume 6, Issue 7,   Pages 70-74

Abstract: A parallel authentication mode (PKCB) based on double blocks was put forward in this paper.The PKCB mode had a marked improvement on security & speed over parallel authentication mode, PMACAnd it may be combined with the CTR (counter) encryption mode to form a full block cipher mode.On this ground, another parallel authentication mode (KCTR - MAC) based on key counter was advanced.The KCTR - MAC authentication mode may be combined with the CTR (counter) encryption mode to form a full

Keywords: authentication mode     CBC - MAC mode     PMAC mode     CTR mode     CCM mode    

Developing Medical Examiner Offices in China: Necessity and Administration Mode

Song Suimin, Ma Chunling, Li Shujin, Cong Bin

Strategic Study of CAE 2020, Volume 22, Issue 4,   Pages 154-160 doi: 10.15302/J-SSCAE-2020.04.022

Abstract: the reform of the judicial system in China and improving the unified management system for judicial authenticationof forensic identification is the top priority to establish a unified management system for judicial authenticationBased on this, the feasibility and necessity of establishing an administration mode of medical examinerThe medical examiner offices should be responsible for judicial authentication, scientific research,

Keywords: the administration of judicial authentication     bureau of medical examiner     administration mode     social governance    

A lightweight authentication scheme with user untraceability

Kuo-Hui YEH

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 4,   Pages 259-271 doi: 10.1631/FITEE.1400232

Abstract: To guarantee robust security and computational efficiency for service retrieval, a variety of authenticationRecently, Chang (2014) introduced a formally provable secure authentication protocol with the propertyA security enhanced authentication scheme is proposed to eliminate all identified weaknesses.

Keywords: Authentication     Privacy     Security     Smart card     Untraceability    

The Design on the Security Architecture of Public WLAN Based on Access Controller Mode

Song Yubo, Huai qun, Yang Xiaohui

Strategic Study of CAE 2008, Volume 10, Issue 8,   Pages 56-59

Abstract: style="text-align: justify;">The security problem, such as network security, user data protection, authenticationFurthermore, a compound 802.1x and WEB authentication scheme is provided to ensures cryptographically

Keywords: public WLAN     security architecture     authentication     access controller    

Molecular authentication of the traditional Chinese medicine Tongren Dahuoluo Wan and its alternative

Jikun WANG, Jing DU, Meng CAO, Lu YAO, Suhua XIE, Jiafu CHEN, Xingbo ZHAO

Frontiers of Agricultural Science and Engineering 2017, Volume 4, Issue 3,   Pages 353-357 doi: 10.15302/J-FASE-2017157

Abstract: For the patent medicine authentication, we set up a molecular diagnostic assay to resolve the difficultiesWe recommend a common technical strategy for authentication of species origins in traditional Chinese

Keywords: Tongren Dahuoluo Wan     molecular diagnostic assay     Eospalax baileyi     Panthera pardus     species-specific primers    

IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication

Wang Xingjian,Hu Aiqun,Huang Yuhua

Strategic Study of CAE 2006, Volume 8, Issue 9,   Pages 69-73

Abstract: Aimed at the weakness both in security and efficiency of one-hop one-way authentication SA (securityassociation) mechanism employed by Mesh network, an multi-hops mutual authentication SA mechanism associated

Keywords: IEEE 802.16     mesh     node     multi-hops mutual authentication     self-modified routing    

Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing Research Article

Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 1,   Pages 88-103 doi: 10.1631/FITEE.2200118

Abstract: information, authenticate the shadow image mainly during the decoding phase, also known as unidirectional authenticationThe authentication of the shadow image in the distributing (encoding) phase is also important for the

Keywords: Image secret sharing     Shadow image authentication     Public key     Pixel expansion     Lossless decoding    

Robust SVM-direct torque control of induction motor based on sliding mode controller and sliding mode

Abdelkarim AMMAR,Amor BOUREK,Abdelhamid BENAKCHA

Frontiers in Energy 2020, Volume 14, Issue 4,   Pages 836-849 doi: 10.1007/s11708-017-0444-z

Abstract: It describes a coupling of sliding mode direct torque control (DTC) with sliding mode flux and speedThis algorithm uses direct torque control basics and the sliding mode approach.The sliding mode controller is used to generate reference voltages in stationary frame and give themThe second aim of this paper is to design a sliding mode speed/flux observer which can improve the control

Keywords: induction motor     direct torque control (DTC)     space vector modulation (SVM)     sliding mode control (SMC)     sliding mode observer (SMO)     dS1104    

The Research and Implementation of WAPI Authentication on WLAN Access Point

Song Yubo,Yang Xiaohui,Hu Aiqun,Wang Zhili

Strategic Study of CAE 2005, Volume 7, Issue 9,   Pages 65-69

Abstract: characteristic and the basic framework of the WAPI standard, the detail of the application of the WAPI authenticationFurthermore, the performance of the authentication procedure was discussed.

Keywords: WLAN     WAPI     test analysis    

Probabilistic stability of uncertain composite plates and stochastic irregularity in their buckling mode

Frontiers of Structural and Civil Engineering   Pages 179-190 doi: 10.1007/s11709-022-0888-z

Abstract: plate were considered Gaussian random fields and their effects on the buckling load and corresponding modespatially varying stochastic properties on the critical load of the plate and the irregularity of buckling modethe plate properties as random fields, a significant stochastic irregularity is obtained in buckling mode

Keywords: uncertain composite plate     stochastic assume mode method     Karhunen−Loève theorem     polynomial chaos approach     plate buckling     irregularity in buckling mode shapes    

Experimental investigation of evolutive mode-I and mode-II fracture behavior of fiber-reinforced cemented

Frontiers of Structural and Civil Engineering 2023, Volume 17, Issue 2,   Pages 256-270 doi: 10.1007/s11709-022-0924-z

Abstract: temperature (20, 35, and 45 °C) and cement hydration at different curing times (3, 7, and 28 d) on the mode-Iand mode-II fracture behavior and properties of fiber-reinforced CPB is investigated.

Keywords: fiber reinforcement     cemented paste backfill     fracture behavior     underground mine     cement hydration    

Double-authentication-preventing signatures revisited: new definition and construction from chameleon None

Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2,   Pages 176-186 doi: 10.1631/FITEE.1700005

Abstract:

Double-authentication-preventing signature (DAPS) is a novel signature notion proposed at ESORICSThe double-authentication-preventing property means that any pair of signatures on two different messages

Keywords: Double-authentication-preventing signatures     Chameleon hash function     Digital signature     Provable security    

An adaptive sliding mode control technology for weld seam tracking

Jie LIU,Youmin HU,Bo WU,Kaibo ZHOU,Mingfeng GE

Frontiers of Mechanical Engineering 2015, Volume 10, Issue 1,   Pages 95-101 doi: 10.1007/s11465-015-0332-3

Abstract:

A novel adaptive sliding mode control algorithm is derived to deal with seam tracking control problemalgorithm enables better high-precision tracking performance with chattering-free than traditional sliding mode

Keywords: weld seam tracking     welding robotic manipulator     adaptive control     sliding mode control    

Relative vibration identification of cutter and workpiece based on improved bidimensional empirical mode

Jiasheng LI, Xingzhan LI, Wei WEI, Pinkuan LIU

Frontiers of Mechanical Engineering 2020, Volume 15, Issue 2,   Pages 227-239 doi: 10.1007/s11465-020-0587-1

Abstract: In this study, the bidimensional empirical mode decomposition (BEMD) method is used to identify such

Keywords: bidimensional empirical mode decomposition     spatial spectrum analysis     boundary effect     vibration identification    

Exploration of interconnected factory mode: Haier Jiaozhou Air Conditioner Interconnected Factory

Yunjie ZHOU

Frontiers of Engineering Management 2017, Volume 4, Issue 4,   Pages 500-503 doi: 10.15302/J-FEM-2017105

Keywords: interconnected factory mode     user-centered     mass customization     interconnection    

Title Author Date Type Operation

Parallel Authentication Modes Based on Double Blocks or Key Counter

Huang Yuhua,Huai Aiqun,Song Yubo

Journal Article

Developing Medical Examiner Offices in China: Necessity and Administration Mode

Song Suimin, Ma Chunling, Li Shujin, Cong Bin

Journal Article

A lightweight authentication scheme with user untraceability

Kuo-Hui YEH

Journal Article

The Design on the Security Architecture of Public WLAN Based on Access Controller Mode

Song Yubo, Huai qun, Yang Xiaohui

Journal Article

Molecular authentication of the traditional Chinese medicine Tongren Dahuoluo Wan and its alternative

Jikun WANG, Jing DU, Meng CAO, Lu YAO, Suhua XIE, Jiafu CHEN, Xingbo ZHAO

Journal Article

IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication

Wang Xingjian,Hu Aiqun,Huang Yuhua

Journal Article

Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing

Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com

Journal Article

Robust SVM-direct torque control of induction motor based on sliding mode controller and sliding mode

Abdelkarim AMMAR,Amor BOUREK,Abdelhamid BENAKCHA

Journal Article

The Research and Implementation of WAPI Authentication on WLAN Access Point

Song Yubo,Yang Xiaohui,Hu Aiqun,Wang Zhili

Journal Article

Probabilistic stability of uncertain composite plates and stochastic irregularity in their buckling mode

Journal Article

Experimental investigation of evolutive mode-I and mode-II fracture behavior of fiber-reinforced cemented

Journal Article

Double-authentication-preventing signatures revisited: new definition and construction from chameleon

Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG

Journal Article

An adaptive sliding mode control technology for weld seam tracking

Jie LIU,Youmin HU,Bo WU,Kaibo ZHOU,Mingfeng GE

Journal Article

Relative vibration identification of cutter and workpiece based on improved bidimensional empirical mode

Jiasheng LI, Xingzhan LI, Wei WEI, Pinkuan LIU

Journal Article

Exploration of interconnected factory mode: Haier Jiaozhou Air Conditioner Interconnected Factory

Yunjie ZHOU

Journal Article