×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
兰州财经大学机构知识库
Lanzhou University of Finance and Economics. All
登录
注册
ALL
ORCID
题名
作者
发表日期
学科领域
关键词
文献类型
原始文献类型
出处
存缴日期
收录类别
出版者
资助项目
学科门类
馆藏号
学习讨论厅
首页
机构组织
作者
文献类型
知识图谱
学位论文
在结果中检索
机构组织
信息工程与人工智能学... [4]
外语学院 [1]
作者
李晓亮 [1]
王国兴 [1]
曹晓军 [1]
武跟强 [1]
杨思华 [1]
李海燕 [1]
更多...
语种
英语 [5]
出处
Proceeding... [2]
2nd Intern... [1]
Proceeding... [1]
Proceeding... [1]
收录类别
EI [5]
CPCI [2]
CPCI-S [2]
来源期刊等级
文献类型
会议论文 [5]
发表日期
2017 [1]
2016 [1]
2012 [2]
2010 [1]
版权保护
学位类别
×
知识图谱
LZUFE-KMS
反馈留言
浏览/检索结果:
共5条,第1-5条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
相关度降序
WOS被引频次升序
WOS被引频次降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
期刊影响因子升序
期刊影响因子降序
作者升序
作者降序
题名升序
题名降序
The juncture structure and statistical analysis of Tibetan Amdo dialect
会议论文
2nd International Conference on Information Science and Engineering, ICISE2010 - Proceedings
作者:
Li, Xiaoliang
收藏
  |  
浏览/下载:76/0
  |  
提交时间:2021/03/24
Telephone sets
Co-articulation
Continuous speech corpus
Diphones
Phone
Research achievements
Tibetans
Triphones
On couple magic total labellings of graphs for designing new graphical cryptographs
会议论文
Proceedings - 2017 4th International Conference on Information Science and Control Engineering, ICISCE 2017, Changsha, Hunan, China, 2017-07-21 - 2017-07-23
作者:
Yao, Bing
;
Sun, Hui
;
Zhang, Xiaohui
;
Zhang, Mingjun
;
Yang, Sihua
收藏
  |  
浏览/下载:79/0
  |  
提交时间:2021/03/24
Authentication
Control theory
Number theory
Graph labelling
Graphical password
Password
Storage spaces
Theoretical algorithms
Inherit differential privacy in distributed setting: Multiparty randomized function computation
会议论文
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, Tianjin, China, 2016-08-23 - 2016-08-26
作者:
Wu, Genqiang
;
He, Yeping
;
Wu, Jingzheng
;
Xia, Xianyao
收藏
  |  
浏览/下载:95/0
  |  
提交时间:2021/03/24
Big data
Cryptography
Data privacy
Composition theorem
Differential privacies
Function computations
Obliviousness
Private protocols
Random variable generations
Secure multi-party computation
Sufficient and necessary condition
Mining accurate top-K frequent closed itemset from data stream
会议论文
Proceedings - 2012 International Conference on Computer Science and Electronics Engineering, ICCSEE 2012, Hangzhou, Zhejiang, China, 2012-03-23 - 2012-03-25
作者:
Cao, Xiaojun
收藏
  |  
浏览/下载:62/0
  |  
提交时间:2021/03/24
Computer science
Computers
Electronics industry
Engineering
Industrial engineering
Closed frequent itemsets
Data stream
Frequent closed itemsets
Frequent item sets
Minimum support
Minimum support thresholds
Novel algorithm
Single-pass algorithm
Channel capacity and channel estimation of OFDM ultra-wide-band systems
会议论文
Proceedings - 2012 International Conference on Computer Science and Electronics Engineering, ICCSEE 2012, Hangzhou, Zhejiang, China, 2012-03-23 - 2012-03-25
作者:
Li, Haiyan
收藏
  |  
浏览/下载:71/0
  |  
提交时间:2021/03/24
Bandwidth
Bit error rate
Broadband networks
Channel capacity
Channel estimation
Data communication systems
Data transfer
MIMO systems
Orthogonal frequency division multiplexing
Receiving antennas
Signal receivers
Signal to noise ratio
Transmitters
Wave transmission
Bit error rate (BER) performance
Channel estimation algorithms
High-speed data transmission
Multi-band orthogonal frequency division multiplexing
Multiple input multiple output antennas
Signal-to-noise power ratio
Transmitter and receiver
Ultra Wide Band wireless systems