×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [94]
内容类型
期刊论文 [94]
发表日期
2022 [8]
2021 [15]
2020 [14]
2019 [7]
2018 [6]
2017 [6]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共94条,第1-10条
帮助
限定条件
内容类型:期刊论文
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:
Zhang, Qiu-yu
;
Bai, Jian
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/06/20
Authentication
Chaotic systems
Discrete wavelet transforms
Efficiency
Extraction
Hamming distance
Hash functions
Information retrieval
Principal component analysis
Speech
Cepstrum
Chaotic mapping
Encrypted speech
Encrypted speech retrieval
Features extraction
Henon chaotic mapping
Perceptual hashing
Power
Power normalized cepstrum coefficient
Speech feature extraction
Speech features
Speech retrieval
Proximity-Distance Mapping and Jaya Optimization Algorithm Based on Localization for Wireless Sensor Network
期刊论文
INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2022, 卷号: 36, 期号: 6
作者:
Peng, Duo
;
Gao, Yuwei
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/06/21
Wireless sensor network
localization algorithm
Jaya optimization algorithm
proximity-distance mapping
Sensor management method based on weighted optimal sub-pattern assignment distance in multiple extended target tracking
期刊论文
Kongzhi Lilun Yu Yingyong/Control Theory and Applications, 2022, 卷号: 39, 期号: 5, 页码: 887-896
作者:
Chen, Hui
;
Liu, Ya-Ting
;
Zhang, Shuang-Qing
;
Han, Chong-Zhao
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/07/20
Clutter (information theory)
Decision making
Decision theory
Dispersions
Inverse problems
Markov processes
Numerical methods
Set theory
State estimation
Extended targets
Extendedtarget tracking (ETT)
Management method
Multiple extended target tracking
Optimisations
Partially observable Markov decision process
Random finite sets
Sensor management
Sub-patterns
Weighted optimal sub-pattern assignment
Content-based encrypted speech retrieval scheme with deep hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 7, 页码: 10221-10242
作者:
Zhang, Qiu-yu
;
Zhao, Xue-jiao
;
Zhang, Qi-wen
;
Li, Yu-zhou
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/04/21
Binary codes
Convolutional neural networks
Cryptography
Deep neural networks
Efficiency
Extraction
Feature extraction
Hamming distance
Information retrieval
Mapping
Semantic Web
Semantics
Spectrographs
Speech
Content-based
Convolutional neural network
Deep hashing
Deep semantic feature
Encrypted speech
Encrypted speech retrieval
Semantic features
Spectrograms
Speech retrieval
Remaining Useful Life prediction of rolling bearings based on risk assessment and degradation state coefficient
期刊论文
ISA Transactions, 2022
作者:
Li, Qiang
;
Yan, Changfeng
;
Chen, Guangyi
;
Wang, Huibin
;
Li, Hongkun
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/07/20
Condition based maintenance
Economic and social effects
Forecasting
Frequency domain analysis
Genetic algorithms
Health
Health risks
Roller bearings
Singular value decomposition
Degradation state
Degradation state coefficient
Genetic algorithm-support vector regression
Health indicators
Mode decomposition
Modified health indicator
Remaining useful lives
Risks assessments
Support vector regressions
Variational mode decomposition-singular value decomposition
Speech BioHashing security authentication algorithm based on CNN hyperchaotic map
期刊论文
Multimedia Tools and Applications, 2022
作者:
Huang, Yi-bo
;
Yuan-Zhang
;
Chen, Teng-Fei
;
Yan, Shao-Hui
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/07/20
Authentication
Cryptography
Speech recognition
BioHashing
Biosafety template
CNN hyperchaotic map
Content authentication
Hyperchaotic maps
Security authentication
Speech content
Speech content authentication
Tamper detection
Tamper detection and location
RGB-D Point Cloud Registration Based on Salient Object Detection
期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2022
作者:
Wan, Teng
;
Du, Shaoyi
;
Cui, Wenting
;
Yao, Runzhao
;
Ge, Yuyan
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/03/01
Image color analysis
Three-dimensional displays
Colored noise
Object detection
Standards
Robustness
Registers
Bidirectional color distance (BCD)
maximum correntropy criterion (MCC)
red green blue-depth (RGB-D) point-set registration
salient object detection (SOD)
Online monitoring and fault diagnosis for uneven length batch process based on multi-way orthogonal enhanced neighborhood preserving embedding
期刊论文
ASIA-PACIFIC JOURNAL OF CHEMICAL ENGINEERING, 2022, 卷号: 17, 期号: 3
作者:
Zhang, Yan
;
Zhao, Xiaoqiang
;
Hui, Yongyong
;
Liu, Kai
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2022/04/21
batch process
fault diagnosis
neighborhood preserving embedding
orthogonal basis functions
uneven length
Long sequence biometric hashing authentication based on 2D-SIMM and CQCC cosine values
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 卷号: 81, 期号: 2, 页码: 2873-2899
作者:
Huang, Yi-bo
;
Hou, Hexiang
;
Chen, Tengfei
;
Li, Hao
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2021/12/17
Speech content authentication
Biometric security template
2D-SIMM
CQCC cosine
Discrimination
Unidirectional
A high security BioHashing encrypted speech retrieval algorithm based on feature fusion
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 卷号: 80, 期号: 25, 页码: 33615-33640
作者:
Huang, Yi-bo
;
Li, Hao
;
Wang, Yong
;
Xie, Yi-rong
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2021/10/14
Encrypted speech retrieval
Biometric template
BioHashing
K-means-KNN
Improved Marotto chaos measurement matrix
SPM chaotic map
©版权所有 ©2017 CSpace - Powered by
CSpace