Zobrazeno 1 - 10
of 177
pro vyhledávání: '"Feng-hua Li"'
Publikováno v:
Asian Journal of Andrology, Vol 25, Iss 4, Pp 544-546 (2023)
Externí odkaz:
https://doaj.org/article/aa4868ad1bbf4c2aad8b8331c0be5f53
Autor:
Dian‐yao Gong, Feng‐hua Li
Publikováno v:
Engineering Reports, Vol 4, Iss 3, Pp n/a-n/a (2022)
Abstract Appropriate work roll shifting strategy in the finishing hot strip mill can make roll wear uniform and contour smooth. To eliminate the problem of roll shifting position duplication due to available roll shifting strategy, the optimized work
Externí odkaz:
https://doaj.org/article/fad4aef689314918a89957342ec56f43
Publikováno v:
Tongxin xuebao, Vol 38, Pp 63-72 (2017)
Migrating traditional access control,such as mandatory and discretionary access control,into role-based access control(RBAC)lightens a practical way to improve the user-permission management efficiency.To guarantee the security of RBAC system,it is i
Externí odkaz:
https://doaj.org/article/510ee4b313ea4b24a22988fdf10da52d
Publikováno v:
Tongxin xuebao, Vol 38, Pp 148-157 (2017)
With the development of mobile Internet and the popularization of intelligent terminals,location based services(LBS) has been widespread in navigation,social network and other fields.Due to the sensitivity of personal location information,data privac
Externí odkaz:
https://doaj.org/article/5f92792d02c44714841540c8aa993953
Publikováno v:
Tongxin xuebao, Vol 38, Pp 57-65 (2017)
In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of
Externí odkaz:
https://doaj.org/article/9ae35b1e6830493996dd8d175914e602
Publikováno v:
Scientific Reports, Vol 7, Iss 1, Pp 1-8 (2017)
Abstract The aim of this study was to find an accurate method for the detection of extracapsular extension (ECE) in papillary thyroid carcinoma (PTC). A total of 102 patients with 109 PTC nodules were retrospectively enrolled. Contrast-enhanced ultra
Externí odkaz:
https://doaj.org/article/16965573aa66437ba66878eaa5d8985b
Publikováno v:
Tongxin xuebao, Vol 37, Pp 86-94 (2016)
Aiming at the rich of safety requirements of tasks which resulting in random cross access to multi cipher algorithms, a hierarchical hardware scheduling method was presented with associated control based on data identifica-tion. The first level was r
Externí odkaz:
https://doaj.org/article/551d6fdd93fa438d9a2973a261d6d0bf
Publikováno v:
Tongxin xuebao, Vol 37, Pp 124-141 (2016)
While providing plenty of convenience for users in daily life, the increasingly popular location-based ser-vice(LBS) posed a serious threat to users' privacy. The research about privacy-preserving techniques for LBS is becoming a hot spot, and there
Externí odkaz:
https://doaj.org/article/4a0bb7a1438a4a348f3fc9b39c36f012
Publikováno v:
网络与信息安全学报, Vol 2, Pp 1-11 (2016)
The development of location-based services (LBS) caused serious privacy concerns.Semantic-based pri-vacy-preserving approaches is an important part of privacy protection in LBS.The recent work on location privacy protection based on semantics were su
Externí odkaz:
https://doaj.org/article/c1e0acb7132e425cac3a4106157d130e
Publikováno v:
Tongxin xuebao, Vol 37, Pp 169-180 (2016)
In order to improve the efficiency of cloud storage and save the communication bandwidth, a deduplication mechanism for multi-duplicate of the same data in cloud environment was needed. However, the implement of the secure data deduplication was seri
Externí odkaz:
https://doaj.org/article/5b1f4cd3923e40d8ad3e637aded7d067