您当前的位置:首页 > 发表论文>论文发表

中国法医学杂志夏玮论文集

2023-02-13 15:30 来源:学术参考网 作者:未知

中国法医学杂志夏玮论文集

2010    [1] ZHANG Wenjuan, LI Zhaohui, HU Yonghui, XIA Wei, SIR Propagation model of Smart phone Bluetooth virus with bimodal variable infection rate, (2010第三届IEEE计算机与电气工程国际会议论文集第二卷,483-487页)(EI收录);  [2] ZHANG Wenjuan, LI Zhaohui, HU Yonghui, XIA Wei, Cluster Features of Bluetooth Mobile Phone virus and Research on Strategies of Control & Prevention,2010 International Conference on Computational Intelligence and Security, CIS2010,(2010国际计算智能与信息安全会议论文集),p 474-477, ;  [3] Shi, Peipei; Li, Zhaohui; Zhang, Tao,A technique of improved steganography text based on chaos and BPCS,Proceedings - 2nd IEEE International Conference on Advanced Computer Control, ICACC 2010, v 2, p 232-236, 2010, Proceedings - 2nd IEEE International Conference on Advanced Computer Control, ICACC 2010,;  [4] Zhang, Tao; Li, Zhaohui; Shi, Peipei,Statistical analysis against improved BPCS steganography,Proceedings - 2nd IEEE International Conference on Advanced Computer Control, ICACC 2010, v 2, p 237-240, 2010, Proceedings - 2nd IEEE International Conference on Advanced Computer Control, ICACC 2010,;  [5] Shi, Peipei; Li, Zhaohui,An improved BPCS steganography based on dynamic threshold, Proceedings - 2010 2nd International Conference on Multimedia Information Networking and Security, MINES 2010, p 388-391, 2010, Proceedings - 2010 2nd International Conference on Multimedia Information Networking and Security, MINES 2010,;  [6] 基于置乱变换的DCT域数字水印改进算法,李朝晖 王旻,第一届中国网络攻防与系统安全会议(NADSS2010),23-28,北京。(A DCT Domain Watermarking Algorithm Based on Scrambling Transforming, LI Zhaohui, WANG Min, 1st Conference on Network Attack & Defense and System Security in China, Beijing, Nov. 2010. NADSS2010)    2009    [1] Wang, Xiao-Yu; Zhang, Han; Li, Zhao-Hui,An improved baptista encryption algorithm based on conservative chaotic system,5th International Conference on Natural Computation, ICNC 2009, v 5, p 442-446, 2009, 5th International Conference on Natural Computation, ICNC 2009,;  [2] Zhang, Qing-Hua; Zhang, Han; Li, Zhao-Hui,One-way hash function construction based on conservative chaotic systems,5th International Conference on Information Assurance and Security, IAS 2009, v 2, p 402-405, 2009, 5th International Conference on Information Assurance and Security, IAS 2009,;  [3] Wang, Tao; Zhang, Han; Li, Zhaohui; Zhang, Qing-Hua,The images encryption algorithm based on the multi-chaotic systems,1st International Conference on Multimedia Information Networking and Security, MINES 2009, v 2, p 145-148, 2009, 1st International Conference on Multimedia Information Networking and Security, MINES 2009;  [4] Yuan, Kun; Zhang, Han; Li, Zhaohui,An improved AES algorithm based on chaos,1st International Conference on Multimedia Information Networking and Security, MINES 2009, v 2, p 326-329, 2009, 1st International Conference on Multimedia Information Networking and Security, MINES 2009,;  [5] 手机蓝牙网络中一种具有可变感染率的SIRQD病毒传播模型,李朝晖 夏玮 张芷源, 《信息网络安全》,2009年第9期.    2008  [1] XIA, Wei; LI, Zhao-hui; CHEN, Zeng-qiang; YUAN, Zhu-zhi, Commwarrior worm propagation model for smart phone networks, Source: Journal of China Universities of Posts and Telecommunications, v 15, n 2, p 60-66, June 2008,;  [2] 基于速度分级的手机蓝牙病毒传播模型研究,夏玮,李朝晖,陈增强,袁著址,《计算机工程》,第34卷第9期, 2008.5.( Epidemic Model of Mobile Phone Bluetooth Virus Based on Velocity Subsection, XIA Wei, LI Zhaohui, CHEN Zeng-qiang, YUAN Zhu-zhi, Computer Engineering, v 34, n 9, p 10-12, May 2008.)    2007    [1] 夏玮 李朝晖 陈增强 袁著祉,带有预防接种的手机蓝牙病毒传播模型, 《天津大学学报》, Vol.40 No.12 , p1426-1430, 2007.12 ;(Xia, Wei; Li, Zhao-Hui; Chen, Zeng-Qiang; Yuan, Zhu-Zhi, Epidemic model of mobile phone bluetooth virus with preventive inoculation, Tianjin Daxue Xuebao (Ziran Kexue yu Gongcheng Jishu Ban)/Journal of Tianjin University Science and Technology, v 40, n 12, p 1426-1430, December 2007 Language: Chinese,;  [2] Xia, Wei; Li, Zhao-Hui; Chen, Zeng-Qiang; Yuan, Zhu-Zhi. The influence of smart Phone's mobility on bluetooth worm propagation, The 3rd IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCom2007), p 2218-2221,September 21-23 2007. ;[3] Xia, Wei; Li, Zhaohui; Chen, Zengqiang; Yuan, Zhuzhi. Dynamic Epidemic Model of Smart Phone Virus Propagated through Bluetooth and MMS, IET Conference Publications, n 533 CP, p 948-953, 2007, The IET Communications Conference on Wireless, Mobile and Sensor Networks 2007(CCWMSN07) ,December12 -14 2007, Shanghai, China. ;[4] Zhang, Han; Huang, Jicai; Li, Zhaohui,New method of digital image scrambling based on binary tree generated by chaotic sequences,Proceedings of SPIE - The International Society for Optical Engineering, v 6790, 2007, MIPPR 2007: Remote Sensing and GIS Data Processing and Applications; and Innovative Multispectral Technology and Applications,  2006    [1] 张瀚 王秀峰 李朝晖等, 基于二维可逆非线性映射的图像加密算法,《南开大学学报(自然科学版)》,Vol.39(4):30-35 ,2006;  [2] 图像加密灰级混合算法的研究,《计算机研究与发展》 Vol.43 Suppl.II, 2006年8月. CTCIS2006----中国可信计算与信息安全学术会议, 2006.10.河北保定;  [3] 一种改进的(3,3)可视密钥分享方案,《武汉大学学报理学版》 Vol.52 S1, 2006年10月. CTCIS2006----中国可信计算与信息安全学术会议, 2006.10.河北保定.    2005    [1] 张瀚 王秀峰 李朝晖 刘大海, 一种基于混沌系统及Henon映射的快速图像加密算法,《计算机研究与发展》, Vol.42(12):2137-2142,2005.12. (Zhang, Han; Wang, Xiufeng; Li, Zhaohui; Liu, Dahai. A fast image encryption algorithm based on chaos system and Henon map, Jisuanji Yanjiu yu Fazhan/Computer Research and Development, v 42, n 12, p 2137-2142, December 2005 Language: Chinese.;  [2] 张瀚 王秀峰 李朝晖 刘大海, 一种基于时空混沌的Hash函数构造,《物理学报》, Vol.54(9):4006-4011,2005.9;(Zhang, Han; Wang, Xiu-Feng; Li, Zhao-Hui; Liu, Da-Hai, One way Hash function construction based on Spatiotemporal chaos, Wuli Xuebao/Acta Physica Sinica, v 54, n 9, p 4006-4011, September 2005 Language: Chinese,, SCI: 960DD).    2003    [1] Zhang, Han; Wang, Xiu-Feng; Li, Zhao-Hui, A New Image Encryption Algorithm Based on Chaos System, Proceedings of the 2003 IEEE International Conference on Robotics, Intelligent Systems and Signal Processing. Changsha,China,2003,778~782.  2002    [1] Li, Zhao-Hui; Wang, Xiu-Feng; Zhang, Han. A research on gray level mixing function in two-dimensional chaotic map image encryption, Proceedings of SPIE - The International Society for Optical Engineering, v 4875, n 1, p 93-102, 2002.   图形、图像处理相关:  [1] 李朝晖 王秀峰,影视字幕文字识别的研究,《计算机工程》, 第28卷第3期, 2002. 3, p175-176 ;  [2] 李朝晖 王秀峰 夏玮,图像矩形窗口加权快速算法的构造思想,《小型微型计算机系统》,第23卷第2期, 2002.2, p142-144 (Inspec:7240502 ) ;  [3] 夏玮 李朝晖,中值滤波的快速算法,《计算机工程与设计》, 第23卷第1期, 2002.1,p58-59.  [4] 李朝晖 牟德一,同位素扫描仪的图像信号特点分析及处理方法,《计算机工程》,第27卷第6期总第155期, 2001.6, P83-84;  [5] 一种增加图像数据量的算法,《微机发展》, 2001.3(第11卷第3期 总第59期)P46-47;.  [6] 基于距离与灰度的混合加权平滑法, 《计算机应用研究》, 第18卷 2001年第1期, supplement,p377;  [7] 三次B样条曲线特征多边形顶点的设计技巧,《河北理工学院学报》, 2000年第4期(第22卷第4期 总第75期) p60-63;  [8] 用双向链表实现绘图软件中的几个常用功能,《河北理工学院学报》, 2000年第2期,p63-68;  [9] 矩形窗口加权平滑的快速算法,《计算机应用研究》, No.1,1997,P64-65;  [10] 矩形花键滚刀CAD系统的研究,《唐山工程技术学院学报》, Vol16, No.1, Sum42, 1994, P11-15;  [11] 矩形花键滚刀工作图绘制的CAD研究, 《唐山工程技术学院学报》, Vol16, No.3, Sum44, 1994, P44-49.      计算机、网络、信息系统等相关:  [1] 夏玮 李朝晖 张静等, 一种改进的无线传感器网络EEMCDS算法, 传感技术学报,Vol.20 No.9 2007年9月, (Inspec:9753889);  [2] 企业网络信息管理系统的总体设计,《微机发展》, 2002.1 p83-84;  [3] 异或运算的原理及其在计算机中的应用,《计算机应用研究》, 2001年12月 supplement;  [4] 《互换性与测量技术》习题解答与指导系统,《计算机应用研究》, 第18卷 2001年第1期, supplement,p321-322;  [5]为中文Windows增加Ucdos5.0的五笔字型输入法,《计算机应用研究》, No.3 ,1997,P230-231;  [6] 以优质软件为教务管理现代化铺路,《河北大学学报》,Vol.17, 1997.12, P119-120;  [7] 多种汉字艺术效果在C语言中的实现,《计算机应用研究》, Vol13,No.2,Sum70,1996,P68.      其他:  [1] 热处理工艺对ZA27铸造合金组织及性能的影响,《河北理工学院学报》,1999.4;  [2] 面向二十一世纪《机械制图》课程教学内容及教学方法改革的研究,《面向二十一世纪河北省各类高校教学内容与课程体系改革研究》,1999年6月,中国文联出版社;  [3] ZA27合金淬火时效早期阶段的研究,《河北理工学院学报》,1998年第3期P20-24;  [4] ZA27合金淬火时效早期过程的研究,《河北大学学报》, No.2,1997 (河北省第十届铸造年会优秀论文).

相关文章
学术参考网 · 手机版
https://m.lw881.com/
首页