咨询与建议

限定检索结果

文献类型

  • 38 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 39 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 9 篇 网络空间安全
    • 4 篇 计算机科学与技术...
    • 4 篇 土木工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 软件工程
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 建筑学
    • 1 篇 水利工程
    • 1 篇 船舶与海洋工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 农业工程
    • 1 篇 食品科学与工程(可...
    • 1 篇 公安技术
  • 16 篇 理学
    • 9 篇 物理学
    • 3 篇 化学
    • 1 篇 数学
    • 1 篇 大气科学
    • 1 篇 海洋科学
    • 1 篇 生物学
  • 7 篇 军事学
    • 7 篇 军队指挥学
  • 5 篇 农学
    • 3 篇 作物学
    • 1 篇 农业资源与环境
  • 4 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 农林经济管理
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 1 篇 艺术学

主题

  • 2 篇 analysis
  • 2 篇 shandong provinc...
  • 2 篇 quantum steganog...
  • 2 篇 quantum cryptogr...
  • 2 篇 quantum communic...
  • 1 篇 eurotiomycetes
  • 1 篇 secret sharing
  • 1 篇 exome capture se...
  • 1 篇 allogeneic trans...
  • 1 篇 ghz4 entangled s...
  • 1 篇 signatures
  • 1 篇 functional genom...
  • 1 篇 source error
  • 1 篇 asphalt binder
  • 1 篇 germplasm
  • 1 篇 perovskite
  • 1 篇 inorganic
  • 1 篇 the smart home
  • 1 篇 sebastes schlege...
  • 1 篇 project manageme...

机构

  • 4 篇 information secu...
  • 3 篇 information secu...
  • 3 篇 college of mathe...
  • 3 篇 shandong provinc...
  • 2 篇 state key labora...
  • 2 篇 school of electr...
  • 2 篇 center for futur...
  • 2 篇 jiangsu engineer...
  • 2 篇 state key labora...
  • 2 篇 school of qilu t...
  • 1 篇 russian research...
  • 1 篇 school of softwa...
  • 1 篇 school of vehicl...
  • 1 篇 departamento de ...
  • 1 篇 royal botanic ga...
  • 1 篇 school of comput...
  • 1 篇 college of agric...
  • 1 篇 school of engine...
  • 1 篇 beijing engineer...
  • 1 篇 shandong enginee...

作者

  • 3 篇 feng wang
  • 2 篇 徐淑奖
  • 2 篇 huiran li
  • 2 篇 zhiguo qu
  • 2 篇 qinghua liu
  • 2 篇 xiao-long hu
  • 2 篇 陈秀波
  • 2 篇 cihui liu
  • 2 篇 xiang-bin wang
  • 2 篇 zhixing gan
  • 2 篇 mingxing luo
  • 2 篇 jun li
  • 2 篇 yunsong di
  • 2 篇 yanfeng wang
  • 2 篇 fangjian xing
  • 2 篇 钮心忻
  • 2 篇 cong jiang
  • 2 篇 shihong xu
  • 2 篇 zong-wen yu
  • 2 篇 杨义先

语言

  • 37 篇 英文
  • 2 篇 中文
检索条件"机构=Subgrade Security Engineering Research Center of Shandong Province"
39 条 记 录,以下是1-10 订阅
排序:
Study on Ultimate Pullout Force of Grouting Anchors of the Anchor-Pull Retaining Wall
收藏 引用
Journal of Geoscience and Environment Protection 2014年 第5期2卷 32-37页
作者: Hongbo Zhang Yifan Yu Xiuguang Song Yingyong Li Jianqing Wu School of Civil engineering Shandong University Jinan 250061 China subgrade security engineering research center of shandong province Jinan 250061 China
Determination of the grouting anchor pullout force is a key step during the design of anchor-pull retaining wall, but it is mostly determined relied on empirical formula at present, and the rationality and the safety ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Automatic recognition of depression based on audio and video:A review
收藏 引用
World Journal of Psychiatry 2024年 第2期14卷 225-233页
作者: Meng-Meng Han Xing-Yun Li Xin-Yu Yi Yun-Shao Zheng Wei-Li Xia Ya-Fei Liu Qing-Xiang Wang shandong Mental Health center Shandong UniversityJinan 250014Shandong ProvinceChina Key Laboratory of Computing Power Network and Information security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina shandong engineering research center of Big Data Applied Technology Faculty of Computer Science and TechnologyQilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250353Shandong ProvinceChina Department of Ward Two Shandong Mental Health CenterShandong UniversityJinan 250014Shandong ProvinceChina
Depression is a common mental health *** current depression detection methods,specialized physicians often engage in conversations and physiological examinations based on standardized scales as auxiliary measures for ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers
收藏 引用
Science China(Information Sciences) 2020年 第3期63卷 49-63页
作者: Quan YUAN Puwen WEI Keting JIA Haiyang XUE Key Laboratory of Cryptologic Technology and Information security Ministry of EducationShandong University Department of Computer Science and Technology Tsinghua University State Key Laboratory of Information security Institute of Information EngineeringChinese Academy of Sciences Data Assurance and Communication security research center Chinese Academy of Sciences
Bitcoin, which was initially introduced by Nakamoto, is the most disruptive and impactive cryptocurrency. The core Bitcoin technology is the so-called blockchain protocol. In recent years, several studies have focused... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Steganalysis and improvement of a quantum steganography protocol via a GHZ_4 state
收藏 引用
Chinese Physics B 2013年 第6期22卷 199-202页
作者: 徐淑奖 陈秀波 钮心忻 杨义先 Information security center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information security (Institute of Information EngineeringChinese Academy of Sciences)
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
收藏 引用
Communications in Theoretical Physics 2013年 第5期59卷 547-553页
作者: 徐淑奖 陈秀波 钮心忻 杨义先 Information security center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information security (Institute of Information engineering Chinese Academy of Sciences)
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
High-efficiency quantum steganography based on the tensor product of Bell states
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2013年 第9期56卷 1745-1754页
作者: XU ShuJiang CHEN XiuBo NIU XinXin YANG YiXian Information security center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information security Institute of Information EngineeringChinese Academy of Sciences
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first pa... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Changes of structure and functional properties of rice protein in the fresh edible rice during the seed development
收藏 引用
Food Science and Human Wellness 2023年 第5期12卷 1850-1860页
作者: Dan Li Mingjing Yao Yang Yang Bing Wang Dongjie Zhang Na Zhang College of Food Science Heilongjiang Bayi Agriculture UniversityDaqing 163319China engineering research center of Processing and Utilization of Grain By-products Ministry of EducationDaqing 163319China Key Laboratory of Food Science and engineering of Heilongjiang province Harbin University of CommerceHarbin 150076China shandong Provincial Key Laboratory of Food and Fermentation engineering Shandong Food Ferment Industry Research&Design InstituteQilu University of Technology(Shandong Academy of Sciences)Jinan 250013China
It has been reported that fresh edible rice has more bioactive compounds and its protein is easier to digest and has lower hypoallergenic than mature rice. In this paper, the changes in structure and functional proper... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Multi-party privacy-preserving decision tree training with a privileged party
收藏 引用
Science China(Information Sciences) 2024年 第8期67卷 253-268页
作者: Yiwen TONG Qi FENG Min LUO Debiao HE Key Laboratory of Aerospace Information security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Key Laboratory of Computing Power Network and Information security Ministry of EducationShandong Computer Science Center Qilu University of Technology(Shandong Academy of Sciences)
Currently, a decision tree is the most commonly used data mining algorithm for classification tasks. While a significant number of studies have investigated privacy-preserving decision trees, the methods proposed in t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
FDSC-YOLOv8:Advancements in Automated Crack Identification for Enhanced Safety in Underground engineering
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第9期140卷 3035-3049页
作者: Rui Wang Zhihui Liu Hongdi Liu Baozhong Su Chuanyi Ma Key Laboratory of Computing Power Network and Information security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan250353China School of Qilu Transportation Shandong UniversityJinan250100China Geotechnical and Structural engineering center Shandong UniversityJinan250061China shandong Lairong High-Speed Railway Co. Ltd.Weihai264200China shandong High-Speed Group Co. Ltd.Jinan250014China
In underground engineering,the detection of structural cracks on tunnel surfaces stands as a pivotal task in ensuring the health and reliability of tunnel ***,the dim and dusty environment inherent to under-ground eng... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
WCM-WTrA: A Cross-Project Defect Prediction Method Based on Feature Selection and Distance-Weight Transfer Learning
收藏 引用
Chinese Journal of Electronics 2022年 第2期31卷 354-366页
作者: LEI Tianwei XUE Jingfeng WANG Yong NIU Zequn SHI Zhiwei ZHANG Yu School of Computer Science and Technology Beijing Institute of Technology China Information Technology security Evaluation center School of Electrical and Information engineering Beijing University of Civil Engineering and Architecture
Cross-project defect prediction is a hot topic in the field of defect prediction. How to reduce the difference between projects and make the model have better accuracy is the core problem. This paper starts from two p... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论