| 查看: 1858 | 回复: 14 | |||
| 当前只显示满足指定条件的回帖,点击这里查看本话题的所有回帖 | |||
[交流]
ICMIA 2013 桂林会议的论文全部检索啦。恭喜! 已有7人参与
|
|||
| ICMIA 2013 桂林会议的论文全部检索啦,恭喜,不错的会议。 |
» 猜你喜欢
Cas 72-43-5需要30g,定制合成,能接单的留言
已经有8人回复
求助:我三月中下旬出站,青基依托单位怎么办?
已经有6人回复
北京211副教授,35岁,想重新出发,去国外做博后,怎么样?
已经有8人回复
磺酰氟产物,毕不了业了!
已经有5人回复
论文终于录用啦!满足毕业条件了
已经有25人回复
2026年机械制造与材料应用国际会议 (ICMMMA 2026)
已经有3人回复
自荐读博
已经有3人回复
不自信的我
已经有5人回复
投稿Elsevier的杂志(返修),总是在选择OA和subscription界面被踢皮球
已经有8人回复
» 本主题相关价值贴推荐,对您同样有帮助:
请问中国自动化大会2013(CAC2013)怎么样?
已经有6人回复
CyberC2013,有人中这个会议的吗?求交流!
已经有14人回复
会议审稿的评分规则
已经有4人回复
ICMIA2013会议靠谱付?有人投吗?
已经有23人回复
ght1102
木虫 (正式写手)
- 应助: 4 (幼儿园)
- 金币: 8043.1
- 散金: 4614
- 红花: 8
- 帖子: 856
- 在线: 1342.6小时
- 虫号: 813383
- 注册: 2009-07-21
- 专业: 模式识别
★
小木虫: 金币+0.5, 给个红包,谢谢回帖
小木虫: 金币+0.5, 给个红包,谢谢回帖
|
Accession number: 20133516681707 Title: 32-bit datapath AES IP core based on FPGA Authors: Tang, Hong Wei1 Author affiliation: 1 Shaoyang University, Shaoyang, China Corresponding author: Tang, H. (thwei2008@126.com) Source title: Applied Mechanics and Materials Abbreviated source title: Appl. Mech. Mater. Volume: 336-338 Monograph title: Industrial Instrumentation and Control Systems II Issue date: 2013 Publication year: 2013 Pages: 1848-1851 Language: English ISSN: 16609336 E-ISSN: 16627482 ISBN-13: 9783037857519 Document type: Conference article (CA) Conference name: 2013 2nd International Conference on Measurement, Instrumentation and Automation, ICMIA 2013 Conference date: April 23, 2013 - April 24, 2013 Conference location: Guilin, China Conference code: 99007 Sponsor: Korea Maritime University; Hong Kong Industrial Technology Research Centre; Inha University Publisher: Trans Tech Publications Ltd, Kreuzstrasse 10, Zurich-Durnten, CH-8635, Switzerland Abstract: This paper presents an architecture for 32-bit datapath Advanced Encryption Standard(AES) IP core based on FPGA. It uses finite state machine, and supports encryption, decryption and key expansion. The round-key is calculated before the beginning of encryption and decryption. It consumes less hardware resources. It is implemented on Cyclone II FPGA EP2C35F672C6, which consumes less than 55% logic elements of the resources. The IP core can operate at a maximum clock frequency of 100 MHz. Compared with 128-bit datapath AES, it can interface with CPU easily. © (2013) Trans Tech Publications, Switzerland. Number of references: 4 Main heading: Cryptography Controlled terms: Data privacy - Field programmable gate arrays (FPGA) - Storms Uncontrolled terms: Advanced Encryption Standard - CAN interface - Clock frequency - Encryption and decryption - Hardware resources - IP core - Key expansion - Logic elements Classification code: 443.3 Precipitation - 716 Telecommunication; Radar, Radio and Television - 717 Optical Communication - 718 Telephone Systems and Related Technologies; Line Communications - 721.3 Computer Circuits - 723 Computer Software, Data Handling and Applications DOI: 10.4028/www.scientific.net/AMM.336-338.1848 Database: Compendex Compilation and indexing terms, © 2013 Elsevier Inc. |
» 本帖已获得的红花(最新10朵)
6楼2013-09-14 21:50:40
ght1102
木虫 (正式写手)
- 应助: 4 (幼儿园)
- 金币: 8043.1
- 散金: 4614
- 红花: 8
- 帖子: 856
- 在线: 1342.6小时
- 虫号: 813383
- 注册: 2009-07-21
- 专业: 模式识别
★
小木虫: 金币+0.5, 给个红包,谢谢回帖
小木虫: 金币+0.5, 给个红包,谢谢回帖
|
Accession number: 20133516681709 Title: A new best-fit method for distorted reflector antenna surface Authors: Chang, Wen Wen1 ; Yusup, Ai Li1, 2 ; Xiang, Bin Bin1 Author affiliation: 1 Xingjiang Astronomical Observation, Chinese Academy of Science, China 2 Key Laboratory of Radio Astronomy, Chinese Academy of Sciences, China Source title: Applied Mechanics and Materials Abbreviated source title: Appl. Mech. Mater. Volume: 336-338 Monograph title: Industrial Instrumentation and Control Systems II Issue date: 2013 Publication year: 2013 Pages: 1857-1862 Language: English ISSN: 16609336 E-ISSN: 16627482 ISBN-13: 9783037857519 Document type: Conference article (CA) Conference name: 2013 2nd International Conference on Measurement, Instrumentation and Automation, ICMIA 2013 Conference date: April 23, 2013 - April 24, 2013 Conference location: Guilin, China Conference code: 99007 Sponsor: Korea Maritime University; Hong Kong Industrial Technology Research Centre; Inha University Publisher: Trans Tech Publications Ltd, Kreuzstrasse 10, Zurich-Durnten, CH-8635, Switzerland Abstract: Actual reflector antenna always has a deformation which has a serious influence on antenna performance. Establishing the equation of the distorted reflector surface is important for calculating antenna performance and precise control. A new best-fitting method based on least square method is submitted in this paper. This method depart from the ideal parabolic equation, and use the distance between the deformation point and the correspondent fitting point to establish the least square error condition equations, though which the six parameters can be got to determine the geometry position of the deformed parabolic accurately. Matrix operation can make the algorithm easy to realize in computer. Nan-shan 25m antenna's finite element model is established in ANSYS program, and its result is analyzed compared with another method, confirmed the operability and accuracy of this algorithm. © (2013) Trans Tech Publications, Switzerland. Number of references: 10 Main heading: Deformation Controlled terms: Algorithms - Finite element method - Least squares approximations - Parabolic antennas - Receiving antennas Uncontrolled terms: Antenna performance - Least square errors - Least square methods - Matrix operations - Parabolic Equations - Reflector antennas - Reflector surfaces - Surface fitting Classification code: 421 Strength of Building Materials; Mechanical Properties - 422 Strength of Building Materials; Test Equipment and Methods - 716 Telecommunication; Radar, Radio and Television - 723 Computer Software, Data Handling and Applications - 921 Mathematics - 921.6 Numerical Methods DOI: 10.4028/www.scientific.net/AMM.336-338.1857 Database: Compendex Compilation and indexing terms, © 2013 Elsevier Inc. |
» 本帖已获得的红花(最新10朵)
9楼2013-09-15 13:20:05
ght1102
木虫 (正式写手)
- 应助: 4 (幼儿园)
- 金币: 8043.1
- 散金: 4614
- 红花: 8
- 帖子: 856
- 在线: 1342.6小时
- 虫号: 813383
- 注册: 2009-07-21
- 专业: 模式识别
★
小木虫: 金币+0.5, 给个红包,谢谢回帖
小木虫: 金币+0.5, 给个红包,谢谢回帖
|
Accession number: 20133516681850 Title: Research on the model of database intrusion protection system based on E-commerce platform Authors: Guo, Hui Ling1 Email author guo_huiling@126.com Author affiliation: 1 Department of Information Engineering, Environmental Management College of China, Qinhuangdao, Hebei Province, China Corresponding author: Guo, H. L. (guo_huiling@126.com) Source title: Applied Mechanics and Materials Abbreviated source title: Appl. Mech. Mater. Volume: 336-338 Monograph title: Industrial Instrumentation and Control Systems II Issue date: 2013 Publication year: 2013 Pages: 2559-2562 Language: English ISSN: 16609336 E-ISSN: 16627482 ISBN-13: 9783037857519 Document type: Conference article (CA) Conference name: 2013 2nd International Conference on Measurement, Instrumentation and Automation, ICMIA 2013 Conference date: April 23, 2013 - April 24, 2013 Conference location: Guilin, China Conference code: 99007 Sponsor: Korea Maritime University; Hong Kong Industrial Technology Research Centre; Inha University Publisher: Trans Tech Publications Ltd, Kreuzstrasse 10, Zurich-Durnten, CH-8635, Switzerland Abstract: Based on attack model of database, a model of database intrusion prevention system is proposed in electronic commerce platform. The model is divided into session level intrusion detection model, schema level intrusion detection model and semantic level intrusion detection model according to the abstraction level of test information. It extends the COAST firewall model with intrusion detection, and a layered intrusion prevention model which detect intrusion behavior according to session level, schema level and semantic level information of transactions. Thereby, it updates database security from passive protection to proactive protection. © (2013) Trans Tech Publications, Switzerland. Number of references: 6 Main heading: Intrusion detection Controlled terms: Database systems - Electronic commerce Uncontrolled terms: Database security - Intrusion detection models - Intrusion prevention - Intrusion prevention systems - Intrusion protection systems - Layered intrusions - Passive protection - Pro-active protection Classification code: 723 Computer Software, Data Handling and Applications DOI: 10.4028/www.scientific.net/AMM.336-338.2559 Database: Compendex Compilation and indexing terms, © 2013 Elsevier Inc. |
15楼2013-09-26 00:22:23









回复此楼
thwei2008