首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2篇
  免费   2篇
物理学   4篇
  2019年   1篇
  2014年   1篇
  2013年   1篇
  2012年   1篇
排序方式: 共有4条查询结果,搜索用时 15 毫秒
1
1.
结合《数字信号处理》课程自身的特点和性质,根据课堂实践教学过程中遇到的问题和情况,分别从本科教学内容与模式、教学方法与教学手段、基于 Matlab的实验教学三个侧重点进行了分析与总结,并且根据实践教学经验,对《数字信号处理》课程的教学改革提出了一些相应的思考与探索,希望能够有效帮助学生提高自主学习和独立创新的能力。  相似文献   
2.
在当前"新工科"创新理念的背景下,高校对电子信息类本科人才的培养要求越来越高,为更好的满足社会的需求,对传统的教学模式进行改革显得尤为迫切。本文通过探索多年以竞赛为驱动的电子信息类课程教学与实践取得的经验,通过实施教学改革,激发学生的积极钻研的求知热情,以达到全面促进学生实践动手能力提高的目的,培养学生解决实际问题的能力和创新精神。  相似文献   
3.
罗玉玲  杜明辉 《中国物理 B》2012,21(6):60503-060503
Based on the spatiotemporal chaotic system,a novel algorithm for constructing a one-way hash function is proposed and analysed.The message is divided into fixed length blocks.Each message block is processed by the hash compression function in parallel.The hash compression is constructed based on the spatiotemporal chaos.In each message block,the ASCII code and its position in the whole message block chain constitute the initial conditions and the key of the hash compression function.The final hash value is generated by further compressing the mixed result of all the hash compression values.Theoretic analyses and numerical simulations show that the proposed algorithm presents high sensitivity to the message and key,good statistical properties,and strong collision resistance.  相似文献   
4.
To ensure the security of a digital image, a new self-adapting encryption algorithm based on the spatiotemporal chaos and ergodic matrix is proposed in this paper. First, the plain-image is divided into different blocks of the same size, and each block is sorted in ascending order to obtain the corresponding standard ergodic matrix. Then each block is encrypted by the spatiotemporal chaotic system and shuffled according to the standard ergodic matrix. Finally, all modules are rearranged to acquire the final encrypted image. In particular, the plain-image information is used in the initial conditions of the spatiotemporal chaos and the ergodic matrices, so different plain-images will be encrypted to obtain different cipherimages. Theoretical analysis and simulation results indicate that the performance and security of the proposed encryption scheme can encrypt the image effectively and resist various typical attacks.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号