Search Results - "Zhang, C.N."

Refine Results
  1. 1
  2. 2

    A combustion control strategy of hot blast stove based on kernel fuzzy c-means (FCM) by C. N. Zhang, Y. R. Li

    Published in Metalurgija (01-07-2019)
    “…During the combustion process of hot blast stove, controlling the steady rise of vault temperature and flue gas temperature is an important link. A large…”
    Get full text
    Journal Article
  3. 3

    Optimization analysis based on intelligent control of the process of the blast furnace by C. N. Zhang, Y. R. Li

    Published in Metalurgija (01-01-2019)
    “…The blast furnace needs to continuously improve of thermal efficiency so as to achieve the goal of energy saving and consumption reduction. By collecting a…”
    Get full text
    Journal Article
  4. 4

    Some space considerations of VLSI systolic array mappings by Weston, J.H., Zhang, C.N., Hua Li

    “…In this brief, the space-time mapping of the dependency matrix of an algorithm is used to study spatial properties of a systolic array implementation of a…”
    Get full text
    Journal Article
  5. 5

    The performance of a soluble lead-acid flow battery and its comparison to a static lead-acid battery by Zhang, C.P., Sharkh, S.M., Li, X., Walsh, F.C., Zhang, C.N., Jiang, J.C.

    Published in Energy conversion and management (01-11-2011)
    “…► We compared the electrochemical characteristics of two types of the batteries. ► SLAFB shows as good performance as SLAB under the same current density. ►…”
    Get full text
    Journal Article
  6. 6

    The SiPM with bulk quenching resistor: progress at NDL and applications in Raman spectroscopy by Hu, X.B., Hu, C.Z., Yin, D.P., Zhang, L.Y., Zhang, C.N., Chen, Y., Zhang, G.Q., Yang, R., Liang, K., Musienko, Yu, Han, D.J.

    “…The SiPMs with quenching resistors integrated into bulk epitaxial silicon have been investigated at the Novel Device Laboratory (NDL), Beijing Normal…”
    Get full text
    Journal Article
  7. 7
  8. 8
  9. 9

    Some space considerations of VLSI systolic array mappings by Weston, J.H., Zhang, C.N., Li, H.

    “…The space-time mapping of the dependency matrix of an algorithm is used to study spatial properties of a systolic array implementation of a 3-nested loop…”
    Get full text
    Conference Proceeding
  10. 10

    Single neuron local rational arithmetic revealed in phase space of input conductances by Wang, M., Zhang, C.N.

    Published in Biophysical journal (01-11-1996)
    “…We present a phase space analysis to explore the potential of single neuron local arithmetic operations on its input conductances. This analysis was conducted…”
    Get full text
    Journal Article
  11. 11

    Secure Broadcast in Wireless Sensor Networks by Qian Yu, Zhang, C.N.

    “…In this paper we present a secure broadcast scheme for wireless sensor networks. The proposed scheme provides data confidentiality, data authentication, data…”
    Get full text
    Conference Proceeding
  12. 12

    A Criterion-Based Role-Based Multilayer Access Control Model for Multimedia Applications by Pan, L., Zhang, C.N.

    “…This paper presents a criterion-based role-based multilayer access control model in which a number of security criterion expressions are embedded into every…”
    Get full text
    Conference Proceeding
  13. 13

    Mapping multiple algorithms into a reconfigurable systolic array by Wei Jin, Zhang, C.N., Hua Li

    “…Systolic array is a well known VLSI architecture to achieve extensive parallel and pipelining computing. Many systolic designs have been reported. All are…”
    Get full text
    Conference Proceeding
  14. 14

    Determining objective functions in systolic array designs by Zhang, C.N., Weston, J.H., Yan, Y.-F.

    “…The space-time mapping of the dependency matrix of an algorithm may be used to study proposed systolic array implementations. In this paper we consider nested…”
    Get full text
    Journal Article
  15. 15

    An Algorithm Based Fault Tolerant Scheme for Elliptic Curve Public-Key Cryptography by Zhang, C.N., Xiao Wei Liu

    “…In this paper, an algorithm based fault tolerant (ABFT) scheme for Elliptic Curve Cryptography (ECC) public-key cipher is presented. By adding 2n+1 check sums,…”
    Get full text
    Conference Proceeding
  16. 16

    An Efficient Fault Tolerant Cryptosystem by Chunren Lai, Zhang, C.N., Xiaowei Liu

    “…This paper proposes an efficient fault tolerant cryptosystem to integrate authentication and encryption with error detection/correction for general…”
    Get full text
    Conference Proceeding
  17. 17

    An RC4-Based Lightweight Security Protocol for Resource-constrained Communications by Zhang, C.N., Qian Yu, Xun Huang, Cungang Yang

    “…In this paper, we present a simple, lightweight, but robust security protocol for resource-constrained communications. This protocol is based on the backward…”
    Get full text
    Conference Proceeding
  18. 18

    Two improved algorithms and hardware implementations for key distribution using extended programmable cellular automata by Zhang, C.N., Deng, M., Mason, R.

    “…Presents two efficient algorithms and a simple hardware structure for the implementation of Diffie-Hellman (1976) key exchange (DHKE) in GF(2/sup n/). The two…”
    Get full text
    Conference Proceeding
  19. 19

    DSP security communication designing and implementation by Zhang, C.N., Li, C.

    “…In this paper, we present a security data communication solution to resolve the problem of getting information in a secure way from the remote site in which no…”
    Get full text
    Conference Proceeding
  20. 20

    Multi-mode single neuron arithmetics and logics by Zhang, C.N., Ming Zhao, Meng Wang

    “…This paper focuses on phase analysis to explore the potential of single neuron local arithmetic and logic operations on input conductances. The analysis is…”
    Get full text
    Conference Proceeding