期刊文献+
共找到582篇文章
< 1 2 30 >
每页显示 20 50 100
Underwater Pulse Waveform Recognition Based on Hash Aggregate Discriminant Network
1
作者 WANG Fangchen ZHONG Guoqiang WANG Liang 《Journal of Ocean University of China》 SCIE CAS CSCD 2024年第3期654-660,共7页
Underwater pulse waveform recognition is an important method for underwater object detection.Most existing works focus on the application of traditional pattern recognition methods,which ignore the time-and space-vary... Underwater pulse waveform recognition is an important method for underwater object detection.Most existing works focus on the application of traditional pattern recognition methods,which ignore the time-and space-varying characteristics in sound propagation channels and cannot easily extract valuable waveform features.Sound propagation channels in seawater are time-and space-varying convolutional channels.In the extraction of the waveform features of underwater acoustic signals,the effect of high-accuracy underwater acoustic signal recognition is identified by eliminating the influence of time-and space-varying convolutional channels to the greatest extent possible.We propose a hash aggregate discriminative network(HADN),which combines hash learning and deep learning to minimize the time-and space-varying effects on convolutional channels and adaptively learns effective underwater waveform features to achieve high-accuracy underwater pulse waveform recognition.In the extraction of the hash features of acoustic signals,a discrete constraint between clusters within a hash feature class is introduced.This constraint can ensure that the influence of convolutional channels on hash features is minimized.In addition,we design a new loss function called aggregate discriminative loss(AD-loss).The use of AD-loss and softmax-loss can increase the discriminativeness of the learned hash features.Experimental results show that on pool and ocean datasets,which were collected in pools and oceans,respectively,by using acoustic collectors,the proposed HADN performs better than other comparative models in terms of accuracy and mAP. 展开更多
关键词 convolutional channel hash aggregate discriminative network aggregate discriminant loss waveform recognition
在线阅读 下载PDF
One-way hash function based on hyper-chaotic cellular neural network 被引量:1
2
作者 杨群亭 高铁杠 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第7期2388-2393,共6页
The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos ... The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos characteristics is proposed. First, the chaos sequence is gotten by iterating cellular neural network with Runge Kutta algorithm, and then the chaos sequence is iterated with the message. The hash code is obtained through the corre- sponding transform of the latter chaos sequence. Simulation and analysis demonstrate that the new method has the merit of convenience, high sensitivity to initial values, good hash performance, especially the strong stability. 展开更多
关键词 one-way hash function HYPER-CHAOS cellular neural network Runge Kutta formula
原文传递
Constructing Hash Function Based on Coupled Network Generated by Logarithmic Map
3
作者 SONG Yu-rong JIANG Guo-ping 《南京邮电大学学报(自然科学版)》 2010年第1期6-10,共5页
In this paper,based on coupled network generated by chaotic logarithmic map,a novel algorithm for constructing hash functions is proposed,which can transform messages and can establish a mapping from the transformed m... In this paper,based on coupled network generated by chaotic logarithmic map,a novel algorithm for constructing hash functions is proposed,which can transform messages and can establish a mapping from the transformed messages to the coupled matrix of the network.The network model is carefully designed to ensure the network dynamics to be chaotic.Through the chaotic iterations of the network,quantization and exclusive-or (XOR) operations,the algorithm can construct hash value with arbitrary length.It is shown by simulations that the algorithm is extremely sensitive to the initial values and the coupled matrix of the network,and has excellent performance in one-way,confusion and diffusion,and collision resistance. 展开更多
关键词 计算机网络 应用程序 网络安全 网络协议
在线阅读 下载PDF
An Online Malicious Spam Email Detection System Using Resource Allocating Network with Locality Sensitive Hashing 被引量:1
4
作者 Siti-Hajar-Aminah Ali Seiichi Ozawa +2 位作者 Junji Nakazato Tao Ban Jumpei Shimamura 《Journal of Intelligent Learning Systems and Applications》 2015年第2期42-57,共16页
In this paper, we propose a new online system that can quickly detect malicious spam emails and adapt to the changes in the email contents and the Uniform Resource Locator (URL) links leading to malicious websites by ... In this paper, we propose a new online system that can quickly detect malicious spam emails and adapt to the changes in the email contents and the Uniform Resource Locator (URL) links leading to malicious websites by updating the system daily. We introduce an autonomous function for a server to generate training examples, in which double-bounce emails are automatically collected and their class labels are given by a crawler-type software to analyze the website maliciousness called SPIKE. In general, since spammers use botnets to spread numerous malicious emails within a short time, such distributed spam emails often have the same or similar contents. Therefore, it is not necessary for all spam emails to be learned. To adapt to new malicious campaigns quickly, only new types of spam emails should be selected for learning and this can be realized by introducing an active learning scheme into a classifier model. For this purpose, we adopt Resource Allocating Network with Locality Sensitive Hashing (RAN-LSH) as a classifier model with a data selection function. In RAN-LSH, the same or similar spam emails that have already been learned are quickly searched for a hash table in Locally Sensitive Hashing (LSH), in which the matched similar emails located in “well-learned” are discarded without being used as training data. To analyze email contents, we adopt the Bag of Words (BoW) approach and generate feature vectors whose attributes are transformed based on the normalized term frequency-inverse document frequency (TF-IDF). We use a data set of double-bounce spam emails collected at National Institute of Information and Communications Technology (NICT) in Japan from March 1st, 2013 until May 10th, 2013 to evaluate the performance of the proposed system. The results confirm that the proposed spam email detection system has capability of detecting with high detection rate. 展开更多
关键词 MALICIOUS SPAM EMAIL Detection System INCREMENTAL Learning Resource Allocating network LOCALITY Sensitive hashING
在线阅读 下载PDF
Cross-Modal Hashing Retrieval Based on Deep Residual Network
5
作者 Zhiyi Li Xiaomian Xu +1 位作者 Du Zhang Peng Zhang 《Computer Systems Science & Engineering》 SCIE EI 2021年第2期383-405,共23页
In the era of big data rich inWe Media,the single mode retrieval system has been unable to meet people’s demand for information retrieval.This paper proposes a new solution to the problem of feature extraction and un... In the era of big data rich inWe Media,the single mode retrieval system has been unable to meet people’s demand for information retrieval.This paper proposes a new solution to the problem of feature extraction and unified mapping of different modes:A Cross-Modal Hashing retrieval algorithm based on Deep Residual Network(CMHR-DRN).The model construction is divided into two stages:The first stage is the feature extraction of different modal data,including the use of Deep Residual Network(DRN)to extract the image features,using the method of combining TF-IDF with the full connection network to extract the text features,and the obtained image and text features used as the input of the second stage.In the second stage,the image and text features are mapped into Hash functions by supervised learning,and the image and text features are mapped to the common binary Hamming space.In the process of mapping,the distance measurement of the original distance measurement and the common feature space are kept unchanged as far as possible to improve the accuracy of Cross-Modal Retrieval.In training the model,adaptive moment estimation(Adam)is used to calculate the adaptive learning rate of each parameter,and the stochastic gradient descent(SGD)is calculated to obtain the minimum loss function.The whole training process is completed on Caffe deep learning framework.Experiments show that the proposed algorithm CMHR-DRN based on Deep Residual Network has better retrieval performance and stronger advantages than other Cross-Modal algorithms CMFH,CMDN and CMSSH. 展开更多
关键词 Deep residual network cross-modal retrieval hashING cross-modal hashing retrieval based on deep residual network
在线阅读 下载PDF
Hash function construction using weighted complex dynamical networks
6
作者 宋玉蓉 蒋国平 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第4期172-177,共6页
A novel scheme to construct a hash function based on a weighted complex dynamical network (WCDN) generated from an original message is proposed in this paper. First, the original message is divided into blocks. Then... A novel scheme to construct a hash function based on a weighted complex dynamical network (WCDN) generated from an original message is proposed in this paper. First, the original message is divided into blocks. Then, each block is divided into components, and the nodes and weighted edges are well defined from these components and their relations. Namely, the WCDN closely related to the original message is established. Furthermore, the node dynamics of the WCDN are chosen as a chaotic map. After chaotic iterations, quantization and exclusive-or operations, the fixed-length hash value is obtained. This scheme has the property that any tiny change in message can be diffused rapidly through the WCDN, leading to very different hash values. Analysis and simulation show that the scheme possesses good statistical properties, excellent confusion and diffusion, strong collision resistance and high efficiency. 展开更多
关键词 hash function weighted complex dynamical networks chaotic map CRYPTOGRAPHY
原文传递
Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network
7
作者 Xiaomin Zhao Keji Mao +1 位作者 Shaohua Cai Qingzhang Chen 《Wireless Sensor Network》 2010年第9期710-717,共8页
Traditional routing protocols as TCP/IP can not be directly used in WSN, so special data-centric routing protocols must be established. The raised data-centric routing protocols can not identify the sensor nodes, beca... Traditional routing protocols as TCP/IP can not be directly used in WSN, so special data-centric routing protocols must be established. The raised data-centric routing protocols can not identify the sensor nodes, because many nodes work under a monitoring task, and the source of data is not so important some times. The sensor node in the network can not judge weather data is come from the some sink node. What’s more, the traditional method use IP to identify sensors in Internet is not suitable for WSN. In this paper, we propose a new naming scheme to identify sensor nodes, which based on a description of sensor node, the description of a sensor node is hashed to a hash value to identify this sensor. The different description generates different identifier. Different from IP schema, this identifier is something about the information of the sensor node. In the above naming scheme, we propose a new data-centric routing mechanism. Finally, the simulation of the routing mechanism is carried out on MATLAB. The result shows our routing mechanism’s predominate increase when network size increase. 展开更多
关键词 Wireless SENSOR network Routing hash Value SENSOR IDENTIFIER
暂未订购
Lung Nodule Image Retrieval Based on Convolutional Neural Networks and Hashing
8
作者 Yan Qiang Xiaolan Yang +2 位作者 Juanjuan Zhao Qiang Cui Xiaoping Du 《Journal of Beijing Institute of Technology》 EI CAS 2019年第1期17-26,共10页
Lung medical image retrieval based on content similarity plays an important role in computer-aided diagnosis of lung cancer.In recent years,binary hashing has become a hot topic in this field due to its compressed sto... Lung medical image retrieval based on content similarity plays an important role in computer-aided diagnosis of lung cancer.In recent years,binary hashing has become a hot topic in this field due to its compressed storage and fast query speed.Traditional hashing methods often rely on highdimensional features based hand-crafted methods,which might not be optimally compatible with lung nodule images.Also,different hashing bits contribute to the image retrieval differently,and therefore treating the hashing bits equally affects the retrieval accuracy.Hence,an image retrieval method of lung nodule images is proposed with the basis on convolutional neural networks and hashing.First,apre-trained and fine-tuned convolutional neural network is employed to learn multilevel semantic features of the lung nodules.Principal components analysis is utilized to remove redundant information and preserve informative semantic features of the lung nodules.Second,the proposed method relies on nine sign labels of lung nodules for the training set,and the semantic feature is combined to construct hashing functions.Finally,returned lung nodule images can be easily ranked with the query-adaptive search method based on weighted Hamming distance.Extensive experiments and evaluations on the dataset demonstrate that the proposed method can significantly improve the expression ability of lung nodule images,which further validates the effectiveness of the proposed method. 展开更多
关键词 LUNG NODULE image retrieval convolutional neural networks INFORMATIVE SEMANTIC features hashING
在线阅读 下载PDF
Homomorphic Hashing Verification for Wireless Sensor Networks Rateless Codes Over-the-Air Programming
9
作者 Hao He Weidong Yi +1 位作者 Ming Li Yongrui Chen 《Journal of Beijing Institute of Technology》 EI CAS 2019年第1期109-118,共10页
The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of... The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of data by homomorphic hash function,and then it compares the hash value with the receiving message digest.Because the feedback channel is deliberately removed during the distribution process,the rateless codes are often vulnerable when they face security issues such as packets contamination or attack.This method prevents contaminating or attack on rateless codes and reduces the potential risks of decoding failure.Compared with the SHA1 and MD5,HHA,which has a much shorter message digest,will deliver more data.The simulation results show that to transmit and verify the same amount of OAP data,HHA method sends 17.9% to 23.1%fewer packets than MD5 and SHA1 under different packet loss rates. 展开更多
关键词 wireless sensor network(WSN) over-the-air PROGRAMMING rateless CODES homomorphic hashING security
在线阅读 下载PDF
基于Hash函数的TIN拓扑关系重建 被引量:4
10
作者 潘胜玲 刘学军 +1 位作者 黄雄 唐秀娟 《地理与地理信息科学》 CSCD 北大核心 2006年第2期21-24,29,共5页
STL模型是CAD、景观造型器等图形处理软件中常用的三角形网络文件格式,该文件由于不带有三角形的拓扑关系,使其不便与GIS中的地形模型(如TIN)进行叠置分析等操作。提出一种基于Hash函数的STL模型的三角形拓扑重建算法,讨论Hash函数设计... STL模型是CAD、景观造型器等图形处理软件中常用的三角形网络文件格式,该文件由于不带有三角形的拓扑关系,使其不便与GIS中的地形模型(如TIN)进行叠置分析等操作。提出一种基于Hash函数的STL模型的三角形拓扑重建算法,讨论Hash函数设计和评价,给出基于Hash函数的TIN拓扑重建算法和拓扑检查方法,并通过实例对该算法进行验证。 展开更多
关键词 hash函数 TIN 拓扑关系
在线阅读 下载PDF
基于Hash函数的抗攻击无线认证方案 被引量:6
11
作者 史庭俊 马建峰 《系统工程与电子技术》 EI CSCD 北大核心 2006年第1期122-126,共5页
针对无线网络的特点,给出了一种高效的抗攻击认证方案。此方案通过建立服务器与客户机之间的提问(puzzle)机制,有效均衡了服务器与整个网络间资源的不对称。协议的主要思想是,当服务器的资源使用率达到一定阈值时,服务器触发puzzle机制... 针对无线网络的特点,给出了一种高效的抗攻击认证方案。此方案通过建立服务器与客户机之间的提问(puzzle)机制,有效均衡了服务器与整个网络间资源的不对称。协议的主要思想是,当服务器的资源使用率达到一定阈值时,服务器触发puzzle机制,即采用Hash函数产生并向客户机提交puzzle,当客户机正确求解puzzle后方可获得服务器相应的认证服务。在此过程中,服务器产生puzzle与客户机求解puzzle所需的系统代价相比要小得多。对协议的分析表明,协议安全可靠,能够有效抵御DoS等多种类型的攻击,并且具有计算负荷小、附加通信量低、协商次数少和自适应抗DoS攻击等特点。 展开更多
关键词 DOS攻击 无线网络 认证 hash函数
在线阅读 下载PDF
基于Hash函数的WSN密钥分配方案 被引量:2
12
作者 方旺盛 张涛 陈康 《计算机工程》 CAS CSCD 北大核心 2010年第11期161-163,共3页
针对经典随机密钥预分配方案存储和通信开销大、安全性不足的问题,提出一种基于Hash函数的无线传感器网络密钥预分配方案。采用Hash函数单向运算提高密钥安全性,通过单次广播过程分配密钥法降低通信开销。仿真结果表明,该方案可降低存... 针对经典随机密钥预分配方案存储和通信开销大、安全性不足的问题,提出一种基于Hash函数的无线传感器网络密钥预分配方案。采用Hash函数单向运算提高密钥安全性,通过单次广播过程分配密钥法降低通信开销。仿真结果表明,该方案可降低存储开销,提高节点抗俘获攻击能力,且通信开销从O(2N)降至O(N)。 展开更多
关键词 hash函数 无线传感器网络 密钥预分配
在线阅读 下载PDF
基于网络编码的同态HASH抗污染攻击系统研究 被引量:5
13
作者 陈福臻 程久军 +1 位作者 廖竞学 邵剑雨 《信息网络安全》 2015年第6期33-40,共8页
文章在已有的同态HASH签名基础上,为了解决网络编码传输过程中容易遭受污染攻击的问题,提出了一种新型的应用同态HASH函数的抗污染攻击系统,网络中的各个节点通过同步同态HASH函数的参数和原始消息分组的HASH值来对所收到的每个分组进... 文章在已有的同态HASH签名基础上,为了解决网络编码传输过程中容易遭受污染攻击的问题,提出了一种新型的应用同态HASH函数的抗污染攻击系统,网络中的各个节点通过同步同态HASH函数的参数和原始消息分组的HASH值来对所收到的每个分组进行验证,只有通过验证的分组才会转发给下一个节点。该方案结合了针对源节点与目标节点端对端在线验证的安全ACK验证方案,从而能有效抵抗网络编码中的污染攻击。同时,为了有效降低网络编码中各节点的运算时间,文章提出了硬件加速的方法,利用FPGA开发板进行数据分组的验证以及编码操作,以提高系统的运行效率。该系统能够提高整体网络吞吐量,并确保被篡改的数据不会因为编码在整个网络中扩散,对于网络编码环境下的网络传输安全具有重要的作用。 展开更多
关键词 网络编码 同态hash FPGA 抗污染攻击
在线阅读 下载PDF
基于HASH表的二叉树结构在网络处理器系统中的应用 被引量:1
14
作者 许宪成 张凌 《河南大学学报(自然科学版)》 CAS 北大核心 2011年第1期85-88,共4页
提出将基于HASH表的二叉排序树结构应用于高速网络数据包流的动态存储和检测,提高查找效率.以所研制原型网路处理器系统的IP分片重组、流缓存和TCP会话重组等经典模块为实例,分别给出了方案选择、理论分析和测试结果,并对具体实现进行... 提出将基于HASH表的二叉排序树结构应用于高速网络数据包流的动态存储和检测,提高查找效率.以所研制原型网路处理器系统的IP分片重组、流缓存和TCP会话重组等经典模块为实例,分别给出了方案选择、理论分析和测试结果,并对具体实现进行了深入讨论.指出该结构对入侵检测、状态防火墙和流量监测等网络安全系统的构建更具借鉴价值. 展开更多
关键词 网络处理器 hash 二叉排序树
在线阅读 下载PDF
DeduBS:一种基于Hash匹配的数据消重远程备份系统
15
作者 刘靖宇 杨雷 +2 位作者 赵秀平 李娟 武优西 《河北工业大学学报》 CAS 2015年第4期32-37,共6页
数据备份规模的不断增大,网络带宽成为了远程数据备份系统的瓶颈.针对这个问题,本文提出了一种基于Hash匹配的数据消重远程备份系统:DeduBS系统.DeduBS系统通过数据消重,避免了在数据备份过程中传输重复数据,有效地提高了网络传输效率.D... 数据备份规模的不断增大,网络带宽成为了远程数据备份系统的瓶颈.针对这个问题,本文提出了一种基于Hash匹配的数据消重远程备份系统:DeduBS系统.DeduBS系统通过数据消重,避免了在数据备份过程中传输重复数据,有效地提高了网络传输效率.DeduBS系统在源节点和目标节点建立Hash库存储数据块的Hash值,数据传输前通过比对Hash值判断其是否为重复数据,只传输重复数据的Hash值和非重复数据,对于重复数据接收端通过Hash库恢复数据.实验数据表明,DeduBS系统可以减少网络传输的数据量,在降低成本、节省能耗的同时,提高数据备份的效率. 展开更多
关键词 备份 数据消重 hash 网络传输
在线阅读 下载PDF
基于混沌消息扩展的单向Hash函数 被引量:1
16
作者 郭伟 王小敏 +1 位作者 刘景 何大可 《西南交通大学学报》 EI CSCD 北大核心 2010年第5期751-757,共7页
为克服现有Hash函数结构的缺陷,结合混沌系统与传统单向Hash函数的优点,提出了一种新的基于混沌消息扩展的Hash函数.该方案沿用传统Hash函数的Merkle-Damgard迭代结构和压缩函数,利用混沌映射网络实现消息扩展,从而进一步影响Hash迭代过... 为克服现有Hash函数结构的缺陷,结合混沌系统与传统单向Hash函数的优点,提出了一种新的基于混沌消息扩展的Hash函数.该方案沿用传统Hash函数的Merkle-Damgard迭代结构和压缩函数,利用混沌映射网络实现消息扩展,从而进一步影响Hash迭代过程.与现有混沌Hash函数相比,新方案继承了传统Hash函数的高效性,提高了算法的安全性.理论分析和实验结果表明,新方案具有良好的单向性、抗碰撞特性及雪崩特性,满足Hash函数的要求,且易于并行实现. 展开更多
关键词 hash函数 混沌 消息扩展 混沌映射网络
在线阅读 下载PDF
层叠式并行图像Hash函数的结构及其算法实现 被引量:1
17
作者 周庆 张燕贞 《重庆大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第4期107-111,共5页
传统Hash函数采用链式结构,不能充分利用图形和图像的二维特征来提高处理速度,更难以支持并行计算。为克服这2个缺点,提出了一种Hash函数结构,其在并行计算平台上的时间复杂度仅为o(logn)。分析了该结构相关的基本问题,并设计了在该结... 传统Hash函数采用链式结构,不能充分利用图形和图像的二维特征来提高处理速度,更难以支持并行计算。为克服这2个缺点,提出了一种Hash函数结构,其在并行计算平台上的时间复杂度仅为o(logn)。分析了该结构相关的基本问题,并设计了在该结构下基于细胞神经网络实现的Hash函数。实验结果表明该Hash函数具有优异的敏感性、随机性和抗碰撞能力。 展开更多
关键词 图像认证 hash函数 并行计算 细胞神经网络
原文传递
命名数据网络中基于Hash映射的命名检索 被引量:3
18
作者 张良 刘敬浩 李卓 《计算机工程》 CAS CSCD 2014年第4期108-111,115,共5页
命名数据网络(NDN)是一种以内容为中心的新型网络架构,可有效提高网络资源的共享利用率。但与传统的IPv4、IPv6相比,NDN命名的长度更长且具有可变性,因此实现NDN中命名的快速检索对提高网络性能具有重要作用。为此,提出一种基于Hash映... 命名数据网络(NDN)是一种以内容为中心的新型网络架构,可有效提高网络资源的共享利用率。但与传统的IPv4、IPv6相比,NDN命名的长度更长且具有可变性,因此实现NDN中命名的快速检索对提高网络性能具有重要作用。为此,提出一种基于Hash映射的分治命名检索方法,将命名分解为组件并进行CRC32映射后分别存储在相应的Hash表中,对Hash表中的数据进行快速排序后使用二分查找定位Hash值,并利用排序后Hash表的递增数据结构进行Hash冲突的快速检测,通过对Hash值添加标志位的方法解决冲突问题。实验结果表明,相比建立命名前缀树的检索方法,该分治命名检索方法可将NDN命名的存储空间压缩近65%,并且大幅提升了检索速度。 展开更多
关键词 命名检索 命名数据网络 前缀匹配 hash映射 hash冲突检测 最长匹配原则
在线阅读 下载PDF
基于Hash机制的WSN密钥预分配方案 被引量:1
19
作者 贺智明 曹谦 《计算机工程与设计》 CSCD 北大核心 2013年第11期3770-3774,共5页
在q-composite随机密钥预分配方案基础上,提出了一种基于Hash机制的无线传感器网络密钥预分配方案。密钥预分配阶段利用Hash函数单向性的特点对密钥进行预加载,有效地隐藏了节点的部分密钥信息,攻击者仅能通过被捕获节点的密钥信息由回... 在q-composite随机密钥预分配方案基础上,提出了一种基于Hash机制的无线传感器网络密钥预分配方案。密钥预分配阶段利用Hash函数单向性的特点对密钥进行预加载,有效地隐藏了节点的部分密钥信息,攻击者仅能通过被捕获节点的密钥信息由回溯机制攻破网络中部分密钥。理论和仿真分析结果表明,在保证相同网络安全连通率、存储和通信能力的前提下,该方案较q-composite方案获得抗捕获攻击的能力更高。 展开更多
关键词 无线传感器网络 密钥预分配 hash函数 连通性 抗毁性
在线阅读 下载PDF
一种应用神经网络模拟Hash函数的算法
20
作者 于南翔 于凤敏 《重庆邮电大学学报(自然科学版)》 2006年第z1期178-179,共2页
首先介绍了Hash函数的原理以及Hash算法的设计方法,提出了用神经网络模拟Hash函数的思想,并给出了用(径向基函数)RBF网络模拟Hash函数的具体算法。
关键词 hash函数 神经网络 加密
在线阅读 下载PDF
上一页 1 2 30 下一页 到第
使用帮助 返回顶部