RECTANGLE

作品数:102被引量:165H指数:6
导出分析报告
相关作者:张文涛包珍珍李超郭虎许发诺更多>>
相关机构:中国科学院中国科学院大学深圳市赛音电子有限公司深圳软牛科技有限公司更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家高技术研究发展计划国家重点基础研究发展计划高等学校学科创新引智计划更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
TWO FAMILIES OF n-RECTANGLE NONCONFORMING FINITE ELEMENTS FOR SIXTH-ORDER ELLIPTIC EQUATIONS
《Journal of Computational Mathematics》2025年第1期121-142,共22页Xianlin Jin Shuonan Wu 
supported in part by the National Natural Science Foundation of China(Grant No.12222101).
In this paper, we propose two families of nonconforming finite elements on n-rectangle meshes of any dimension to solve the sixth-order elliptic equations. The unisolvent property and the approximation ability of the ...
关键词:Nonconforming finite element method n-Rectangle element Sixth-order elliptic equation Exchange of sub-rectangles 
Neural Codes Constructs Based on Combinatorial Design
《Applied Mathematics》2025年第1期42-60,共19页Jin Huang 
Neuroscience (also known as neurobiology) is a science that studies the structure, function, development, pharmacology and pathology of the nervous system. In recent years, C. Cotardo has introduced coding theory into...
关键词:Combinatorial Neural Codes Orthogonal Latin Rectangle Steiner System Group Divisible Design Transversal Design 
From rectangle to parallelogram:an area-weighted method to make time-space diagrams incorporate traffic waves
《Digital Transportation and Safety》2024年第1期1-7,共7页Ning Wang Xingye Wang Hai Yan Zhengbing He 
National Natural Science Foundation of China(71871010).
A time-space(TS)traffic diagram is one of the most important tools for traffic visualization and analysis.Recently,it has been empirically shown that using parallelogram cells to construct a TS diagram outperforms usi...
关键词:Spatiotemporal speed contour diagram Vehicle trajectory Traffic wave Traffic state 
A New Double Layer Multi-Secret Sharing Scheme
《China Communications》2024年第1期297-309,共13页Elavarasi Gunasekaran Vanitha Muthuraman 
supported by RUSA PHASE 2.0,Alagappa University,Karaikudi,India。
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i...
关键词:genetic algorithm oppositional whale optimization algorithm rectangle block cipher secret sharing scheme SHARES universal share 
Statistical dynamics of noise-like rectangle pulse fiber laser被引量:1
《Advanced Photonics Nexus》2023年第3期40-52,共13页Yujia Li Dongmei Huang Yihuan Shi Chao Wang Feng Li 
support from the National Key R&D Program of China(Grant No.2020YFB1805901);the National Natural Science Foundation of China(Grant No.62105274);the Technology and Innovation Commission of Shenzhen Municipality(Grant No.JCYJ20210324133406018);the Research Grants Council,University Grants Committee of Hong Kong SAR(Grant No.PolyU15301022).
The statistical dynamics of partially incoherent ultrafast lasers are complex and chaotic,which is significant for fundamental research and practical applications.We experimentally and theoretically reveal the statist...
关键词:fiber laser statistical analysis laser dynamics noise-like rectangle laser 
MIBS-64算法Rectangle与Boomerang攻击的改进
《密码学报》2023年第3期634-649,共16页梁轩宇 陈胤岑 杨倩倩 宋凌 
国家自然科学基金(62022036,62132008,62202460)。
MIBS算法是Izadi等人于2009年提出的一种轻量级分组密码,包含MIBS-64和MIBS-80两个版本.2019年,Chen等人对MIBS-64开展了基于13轮Rectangle区分器的15轮密钥恢复攻击,时间、数据和存储复杂度为(T,D,M)=(2^(59),2^(45),2^(45)).本文进一...
关键词:MIBS Boomerang攻击 Rectangle攻击 密钥恢复算法 
Application of a Parallel Adaptive Cuckoo Search Algorithm in the Rectangle Layout Problem被引量:2
《Computer Modeling in Engineering & Sciences》2023年第6期2173-2196,共24页Weimin Zheng Mingchao Si Xiao Sui Shuchuan Chu Jengshyang Pan 
funded by the NationalKey Research and Development Program of China under Grant No.11974373.
The meta-heuristic algorithm is a global probabilistic search algorithm for the iterative solution.It has good performance in global optimization fields such as maximization.In this paper,a new adaptive parameter stra...
关键词:Rectangular layout cuckoo search algorithm parallel communication strategy adaptive parameter 
Automatic recognition and intelligent analysis of central shrinkage defects of continuous casting billets based on deep learning被引量:3
《Journal of Iron and Steel Research International》2023年第5期937-948,共12页Gong-hao Lian Qi-hao Sun Xiao-ming Liu Wei-miao Kong Ming Lv Jian-jun Qi Yong Liu Ben-ming Yuan Qiang Wang 
the National Natural Science Foundation of China(Nos.U21A20117,U1560207 and 52003039);the National Key R&D Program of China(No.2017YFB0304402);the Fundamental Research Funds for the Central Universities(Nos.N2125018 and N2109001);the Liaoning Natural Science Foundation(No.2022-MS-365);the Liaoning Innovative Research Team in University(No.LT2017011).
The internal quality inspection of the continuous casting billets is very important,and mis-inspection will seriously affect the subsequent production process.The UNet-VGG16 transfer learning model was used for semant...
关键词:Central shrinkage Deep learning Image segmentation Circumscribed rectangle Automatic recognition 
How Does Topology Help Solve the Inscribed Rectangle Problem by Proving that Every Jordan Curve Has 4 Vertices that Form a Rectangle?
《Journal of Applied Mathematics and Physics》2023年第4期859-873,共15页Heidi Hassan 
When we stare into our complex surroundings, we see objects of different shapes and sizes. However, the shape that is always present, regardless of the complexity of the object, is the circle. The circle is arguably t...
关键词:Inscribed Rectangle Problem TOPOLOGY Jordan Curve Mobius Strip 
Rectangle Attack Against Type-I Generalized Feistel Structures
《Chinese Journal of Electronics》2022年第4期713-720,共8页ZHANG Yi LIU Guoqiang SHEN Xuan LI Chao 
supported by the National Natural Science Foundation of China(62172427,61702537,61772545,62002370);State Key Laboratory of Information Security(2020-MS-02);Scientific Research Plan of National University of Defense Technology(ZK21-36).
Type-I generalized Feistel networks(GFN)are widely used frameworks in symmetric-key primitive designs such as CAST-256 and Lesamnta.Different from the extensive studies focusing on specific block cipher instances,the ...
关键词:Block cipher structures Rectangle attack Boomerang switch Structural attack Generalized Feistel networks 
检索报告 对象比较 聚类工具 使用帮助 返回顶部