期刊文献+
共找到785篇文章
< 1 2 40 >
每页显示 20 50 100
Resource Allocation based on Shared Criterion in OFDMA Distributed Radio Access Network 被引量:1
1
作者 Yang Bo Tang Youxi 《China Communications》 SCIE CSCD 2010年第1期16-22,共7页
Distributed radio access network (DRAN) is a novel wireless access architecture and can solve the problem of the available spectrum scarcity in wireless communications. In this paper, we investigate resource allocatio... Distributed radio access network (DRAN) is a novel wireless access architecture and can solve the problem of the available spectrum scarcity in wireless communications. In this paper, we investigate resource allocation for the downlink of OFDMA DRAN. Unlike previous exclusive criterion based algorithms that allocate each subcarrier to only one user in the system, the proposed algorithms are based on shared criterion that allow each subcarrier to be allocated to multiple users through different antennas and to only one user through same antenna. First, an adaptive resource allocation algorithm based on shared criterion is proposed to maximize total system rate under each user's minimal rate and each antenna's maximal power constraints. Then we improve the above algorithm by considering the influence of the resource allocation scheme on single user. The simulation results show that the shared criterion based algorithm provide much higher total system rate than that of the exclusive criterion based algorithm at the expense of the outage performance and the fairness, while the improved algorithm based on shared criterion can achieve a good tradeoff performance. 展开更多
关键词 resource ALLOCATION distributed radio access network (DRAN) ORTHOGONAL frequency DIVISION multiple access (OFDMA) shared criterion
下载PDF
Adaptive resource allocation in downlink multi-user MC-CDMA systems
2
作者 王俊波 陈明 王江舟 《Journal of Southeast University(English Edition)》 EI CAS 2008年第4期402-406,共5页
The joint channel and power allocation in the downlink transmission of multi-user multi-carrier code division multiple access(MC-CDMA) systems are investigated and the throughput maximization problem is considered a... The joint channel and power allocation in the downlink transmission of multi-user multi-carrier code division multiple access(MC-CDMA) systems are investigated and the throughput maximization problem is considered as a mixed integer optimization problem. For simplicity of analysis, the problem is divided into two less complex sub-problems: power allocation and channel allocation, which can be solved by a suboptimal adaptive power allocation (APA)algorithm and an optimal adaptive channel allocation (ACA) algorithm, respectively. By combining APA and ACA algorithms, an adaptive channel and power allocation scheme is proposed. The numerical results show that the proposed APA algorithm is more suitable for MC-CDMA systems than the conventional equal power allocation algorithm, and that the proposed channel and power allocation scheme can significantly improve the system throughout performance. 展开更多
关键词 code division multiple access (CDMA) multi-carriertransmission multi-user channel allocation power allocation
下载PDF
Development Of Multi-users Multi-function Watt-hour Meter Based On ATT7022B
3
作者 Mao-fa GONG~1,Chang-lun HU~1,Jing-yin HE~2,Xiao-ming ZHANG~1,Long-qing CHAI~1 (1.Collage of information and electrical engineering,Shandong University Of Science and Technology,Qingdao266510,China 2.Qingdao Technical Collage,Qingdao 266555,China) 《Journal of Measurement Science and Instrumentation》 CAS 2010年第S1期123-125,共3页
According to the feature of city’s apartment building in China,a kind of Multi-users Watt-hour Meter based on ATT7022B has been developed in this paper.The master-slave MCU control model and the principles of Time Sh... According to the feature of city’s apartment building in China,a kind of Multi-users Watt-hour Meter based on ATT7022B has been developed in this paper.The master-slave MCU control model and the principles of Time Sharing Multiplex are adopted in this Watt-hour Meter,its function includes the measurement of current, voltage,power,power factor and the overload protection.It supports remote reading,pre-payment,multi-rate and etc. The practice shows that this meter has high accuracy,runs stable.It has wide prospect in the future market. 展开更多
关键词 multi-users ATT7022B Time Sharing Multiplex Master-Slave Control Mode
下载PDF
Dynamic multi-user detection scheme based on CVA-SSAOMP algorithm in uplink grant-free NOMA
4
作者 Xu Lei Tao Shangjin +3 位作者 Bai Shichao Zhang Jian Fang Hongyu Li Xiaohui 《High Technology Letters》 EI CAS 2021年第1期10-16,共7页
In the uplink grant-free non-orthogonal multiple access(NOMA)scenario,since the active user at the sender has a structured sparsity transmission characteristic,the compressive sensing recovery algorithm is initially a... In the uplink grant-free non-orthogonal multiple access(NOMA)scenario,since the active user at the sender has a structured sparsity transmission characteristic,the compressive sensing recovery algorithm is initially applied to the joint detection of the active user and the transmitted data.However,the existing compressed sensing recovery algorithms with unknown sparsity often require noise power or signal-to-noise ratio(SNR)as the priori conditions,which greatly reduces the algorithm adaptability in multi-user detection.Therefore,an algorithm based on cross validation aided structured sparsity adaptive orthogonal matching pursuit(CVA-SSAOMP)is proposed to realize multi-user detection in dynamic change communication scenario of channel state information(CSI).The proposed algorithm transforms the structured sparsity model into a block sparse model,and without the priori conditions above,the cross validation method in the field of statistics and machine learning is used to adaptively estimate the sparsity of active user through the residual update of cross validation.The simulation results show that,compared with the traditional orthogonal matching pursuit(OMP)algorithm,subspace pursuit(SP)algorithm and cross validation aided block sparsity adaptive subspace pursuit(CVA-BSASP)algorithm,the proposed algorithm can effectively improve the accurate estimation of the sparsity of active user and the performance of system bit error ratio(BER),and has the advantage of low-complexity. 展开更多
关键词 non-orthogonal multiple access(NOMA) multi-user detection cross validation structured sparsity(SP) orthogonal matching pursuit(OMP)
下载PDF
Downlink network-coded multiple access with diverse power
5
作者 Bohao Cao Zheng Xiang +2 位作者 Peng Ren Qiao Li Baoyi Xu 《Digital Communications and Networks》 SCIE CSCD 2024年第4期956-964,共9页
Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have differen... Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have different Quality of Service(QoS)requirements.Hence,we study the power allocation in the downlink NCMA system in this paper,and propose a downlink Network-Coded Multiple Access with Diverse Power(NCMA-DP),wherein different amounts of power are allocated to different users.In terms of the Bit Error Rate(BER)of the multi-user decoder,and the number of packets required to correctly decode the message,the performance of the user with more allocated power is greatly improved compared to the Conventional NCMA(NCMA-C).Meanwhile,the performance of the user with less allocated power is still much better than NCMA-C.Furthermore,the overall throughput of NCMA-DP is greatly improved compared to that of NCMA-C.The simulation results demonstrate the remarkable performance of the proposed NCMA-DP. 展开更多
关键词 Network-coded multiple access Physical-layer network coding multi-user decoder Power allocation Throughput Downlink network
下载PDF
Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System
6
作者 Youngho Park Su Jin Shin Sang Uk Shin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期671-688,共18页
Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly... Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly,to reduce the on-chain storage cost,a novel paradigm of blockchain and cloud fusion has been widely considered as a promising data trading platform.Moreover,the fact that data can be used for commercial purposes will encourage users and organizations from various fields to participate in the data marketplace.In the data marketplace,it is a challenge how to trade the data securely outsourced to the external cloud in a way that restricts access to the data only to authorized users across multiple domains.In this paper,we propose a cross-domain bilateral access control protocol for blockchain-cloud based data trading systems.We consider a system model that consists of domain authorities,data senders,data receivers,a blockchain layer,and a cloud provider.The proposed protocol enables access control and source identification of the outsourced data by leveraging identity-based cryptographic techniques.In the proposed protocol,the outsourced data of the sender is encrypted under the target receiver’s identity,and the cloud provider performs policy-match verification on the authorization tags of the sender and receiver generated by the identity-based signature scheme.Therefore,data trading can be achieved only if the identities of the data sender and receiver simultaneously meet the policies specified by each other.To demonstrate efficiency,we evaluate the performance of the proposed protocol and compare it with existing studies. 展开更多
关键词 Bilateral access control blockchain data sharing policy-match
下载PDF
Triple-Polarized Multi-User Mimo-Idma System under Correlated Fading Channel
7
作者 B. Partibane V. Nagarajan 《Circuits and Systems》 2016年第8期1623-1634,共12页
A multiple-input multiple-output interleave division multiple access (MIMO-IDMA) system with Triple Polarized Division Multiplexing (TPDM) is presented in this paper. The present methodology replaces three indepe... A multiple-input multiple-output interleave division multiple access (MIMO-IDMA) system with Triple Polarized Division Multiplexing (TPDM) is presented in this paper. The present methodology replaces three independent linearly polarized antennas with a single triple polarized antenna at both the transmitter and receiver. The users in the communication link are accommodated and separated using a user-specific interleaver combined with low rate spreading sequence. To eliminate the effects of multi-stream interference (MSI), minimum mean square error (MMSE) algorithm based on successive interference cancellation (SIC) Multi-user detection (MUD) technique is employed at the receiver. Furthermore, log-maximum a posteriori probability (MAPP) decoding algorithm is implemented at the mobile stations (MSs) to overcome the effects of multi-user interference (MUI) effects. The paper also evaluates the effects of coded MIMO-IDMA in the downlink communication by adopting the Stanford University Interim (SUI) and Long-term Evolution (LTE)channel model specifications. In comparison with the traditional uncoded system, the present solution considering turbo coded triple-polarized MIMO-IDMA system with iterative decoding algorithm provides better bit error rate (BER) with reduced signal to noise ratio (SNR). The simulation results also show that though the SNR requirement is higher for the proposed technique compared to the conventional uni-polarized antenna based MIMO-IDMA system, it gives the advantages of achieving higher data rate with reduced cost and space requirements in the context of a downlink (DL). 展开更多
关键词 Interleave Division Multiple access (IDMA) Multiple Input Multiple Output (MIMO) multi-user Interference (MUI) Stanford University Interim (SUI) Channel Model Long Term Evolution (LTE) Channel Model
下载PDF
面向政务协同的访问控制模型
8
作者 赵大燕 何华均 +3 位作者 李宇平 张钧波 李天瑞 郑宇 《计算机应用》 北大核心 2025年第1期162-169,共8页
针对政务协同场景需求复杂多样、人员流动管理困难、数据隐私度高和数据量大的特点,提出面向政务协同办公的访问控制(GBAC)模型。政务协同场景中的访问控制需要实现多部门对同一资源进行不同操作的需求,而现有的主流访问控制技术面临访... 针对政务协同场景需求复杂多样、人员流动管理困难、数据隐私度高和数据量大的特点,提出面向政务协同办公的访问控制(GBAC)模型。政务协同场景中的访问控制需要实现多部门对同一资源进行不同操作的需求,而现有的主流访问控制技术面临访问控制粒度不够精细和管理维护成本过高的问题,缺乏安全、灵活、精准的访问控制模型。因此,结合政务部门的运行机制,首先,将政府组织结构和行政区划结构融入访问控制模型,并构建政务人员、组织、资源和行政区划的归属关系树;其次,结合政务工作人员所属组织和岗位等属性,构建联合主体,以实现自动化的权限授予和解除;然后,根据组织职能和行政区划等级设计主客体属性匹配策略,从而打通数据壁垒,并提高鉴权效率;最后,引入权限分级思想,为资源设置数据级别和功能级别,以控制主体的访问阈值,从而提高模型灵活性,并进一步保障数据安全。实验结果表明,与基准模型如基于角色的访问控制(RBAC)和基于属性的访问控制(ABAC)相比,GBAC模型的内存消耗大幅减小,访问时延更低。可见,所提模型能安全、高效、灵活地实现政务协同场景下的权限管理。 展开更多
关键词 访问控制 访问策略 政务协同 数据共享 基于角色的访问控制 基于属性的访问控制
下载PDF
Access XP数据库的安全性研究 被引量:2
9
作者 李海燕 《中国安全科学学报》 CAS CSCD 2005年第5期67-70,共4页
在信息化时代来临、Internet高速发展的今天,信息资源的经济和社会价值越来越明显,而数据库系统所管理、存储的数据已成为各个部门宝贵的信息资源,所以其安全保密性是目前所迫切需要解决的问题。笔者从数据库的安全性、保密性的角度,详... 在信息化时代来临、Internet高速发展的今天,信息资源的经济和社会价值越来越明显,而数据库系统所管理、存储的数据已成为各个部门宝贵的信息资源,所以其安全保密性是目前所迫切需要解决的问题。笔者从数据库的安全性、保密性的角度,详细地阐述了MicrosoftAccessXP数据库的安全机制;探讨了实现MicrosoftAccessXP数据库不同保护级别的各种方法;还讨论了共享级安全性和用户级安全性问题。 展开更多
关键词 access 安全性研究 XP MICROSOFT Internet 信息资源 信息化时代 数据库系统 安全保密性 安全性问题 社会价值 安全机制 保护级别 用户级 共享
下载PDF
应用Microsoft Access建立编辑信息的数据库 被引量:1
10
作者 庄晓琼 《佛山科学技术学院学报(自然科学版)》 CAS 2000年第3期30-33,共4页
把科技期刊编辑部的信息分门别类 ,采用 Microsoft Access数据库 ,建立若干有关编辑信息的数据库 ,以利于信息管理、信息共享。
关键词 MICROSOFTaccess 数据库管理系统 编辑信息
下载PDF
“大流行协定”中“获取和惠益分享”机制构建——基于全球卫生公平的视角
11
作者 苏玉菊 李宇澜 《医学与法学》 2025年第1期15-22,共8页
现行以《国际卫生条例(2005)》为中心的全球卫生治理体系存在不公平难题,其中一个难题就是在全球范围内尚未能建立起行之有效的病原体获取和惠益分享机制。“大流行协定”拟通过引入“获取和惠益分享”机制,以实现全球卫生资源的公平分... 现行以《国际卫生条例(2005)》为中心的全球卫生治理体系存在不公平难题,其中一个难题就是在全球范围内尚未能建立起行之有效的病原体获取和惠益分享机制。“大流行协定”拟通过引入“获取和惠益分享”机制,以实现全球卫生资源的公平分配。这一机制早先出现在《生物多样性公约》及《大流行性流感防范框架》中,但是由于这两个国际性文件存在各自特定的立法目标与适用范围等方面的问题,使得该机制无法适用于大流行发生时的病原体获取和惠益分享。“大流行协定”试图在引入这一机制的同时,对其加以改进,以推动全球卫生公平。但经考察“大流行协定”谈判中所形成的历代草案,可以发现其中的“病原体获取和惠益机制”还存在诸多不足,例如,历代文本中呈现出措辞软化现象,对“多边”获取和惠益分享机制被刻意规避的问题未得到解决等。针对上述问题,在“大流行协定”的后续谈判与制定过程中,可采取框架协议结构以谋求共识;需要各国从全球健康福祉的角度出发,对世界卫生组织“病原体获取和惠益分享系统”的适用范围等核心内容达成共识,并在协定中予以明确;需要就世界卫生组织“病原体获取和惠益分享系统”实施细则的后续构建制定规划。 展开更多
关键词 大流行协定 全球卫生公平 获取和惠益分享
下载PDF
Privacy Protection Based Access Control Scheme in Cloud-Based Services 被引量:3
12
作者 Kai Fan Qiong Tian +2 位作者 Junxiong Wang Hui Li Yintang Yang 《China Communications》 SCIE CSCD 2017年第1期61-71,共11页
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu... With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services. 展开更多
关键词 access control data sharing privacy protection cloud-based services
下载PDF
An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures 被引量:2
13
作者 PANG Liaojun LI Huixian WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1649-1652,共4页
A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n... A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures. 展开更多
关键词 CRYPTOGRAPHY information security secret sharing access structure
下载PDF
Achieving Fine-Grained and Flexible Access Control on Blockchain-Based Data Sharing for the Internet of Things 被引量:3
14
作者 Ruimiao Wang Xiaodong Wang +2 位作者 Wenti Yang Shuai Yuan Zhitao Guan 《China Communications》 SCIE CSCD 2022年第6期22-34,共13页
The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central node.As a distributed and collaborative alternative,approaches based upo... The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central node.As a distributed and collaborative alternative,approaches based upon blockchain have been explored recently for Internet of Things(IoTs).However,the access from a legitimate user may be denied without the pre-defined policy and data update on the blockchain could be costly to the owners.In this paper,we first address these issues by incorporating the Accountable Subgroup Multi-Signature(ASM)algorithm into the Attribute-based Access Control(ABAC)method with Policy Smart Contract,to provide a finegrained and flexible solution.Next,we propose a policy-based Chameleon Hash algorithm that allows the data to be updated in a reliable and convenient way by the authorized users.Finally,we evaluate our work by comparing its performance with the benchmarks.The results demonstrate significant improvement on the effectiveness and efficiency. 展开更多
关键词 blockchain access control smart contract MULTI-SIGNATURE chameleon-hash data sharing Internet of Things
下载PDF
共享Access数据库设计和开发策略研究 被引量:1
15
作者 王彦良 《延安职业技术学院学报》 2014年第5期153-154,共2页
Access是微软公司下的一种关系型数据库系统,简单易用,现在被大多数用户使用。ACCESS数据库有两种模式:共享模式和独占模式,在独占模式下,只有一个用户使用数据库是可行的。但是在共享模式下,多人使用ACCESS数据库时数据库经常会被锁死... Access是微软公司下的一种关系型数据库系统,简单易用,现在被大多数用户使用。ACCESS数据库有两种模式:共享模式和独占模式,在独占模式下,只有一个用户使用数据库是可行的。但是在共享模式下,多人使用ACCESS数据库时数据库经常会被锁死。本文就针对这样的问题,提出了几种在共享ACCESS数据库开发时的策略。解决在共享模式下的诸多问题,大大加快了开发的效率。 展开更多
关键词 access 数据库 管理系统 共享模式
下载PDF
基于Access Grid的共享应用程序开发
16
作者 朱旭庆 宋广华 黄争舸 《计算机应用研究》 CSCD 北大核心 2007年第4期223-225,共3页
为降低基于AG的共享应用程序的开发难度,在AG体系结构以及相关的API基础上实现了一个开发框架。利用此框架,能够在很大程度上提高开发共享应用程序的效率并缩短开发周期。此外,该框架还提供了一个通用访问界面,方便用户集成和调用相应... 为降低基于AG的共享应用程序的开发难度,在AG体系结构以及相关的API基础上实现了一个开发框架。利用此框架,能够在很大程度上提高开发共享应用程序的效率并缩短开发周期。此外,该框架还提供了一个通用访问界面,方便用户集成和调用相应的共享应用程序。 展开更多
关键词 网格 访问网格 虚拟会议 视频会议 共享应用程序
下载PDF
基于ACCESS的产品实时库存及质量检验管理系统 被引量:2
17
作者 郁雷 张骋 樊黎 《计算机时代》 2015年第7期42-45,共4页
为使产品库存和产品质量检验数据管理规范化、便捷化,并且在企业内部局域网实现数据共享,对企业的库存管理方式和产品质检过程进行充分调研,针对中小型机械制造类企业的实际需求,利用Microsoft Access 2003开发了产品实时库存及质量检... 为使产品库存和产品质量检验数据管理规范化、便捷化,并且在企业内部局域网实现数据共享,对企业的库存管理方式和产品质检过程进行充分调研,针对中小型机械制造类企业的实际需求,利用Microsoft Access 2003开发了产品实时库存及质量检验管理系统。实践证明,该数据库系统解决了企业旧的台账管理方式中数据处理机械化、低效率问题。 展开更多
关键词 access数据库 实时库存 质量检验 数据共享 中小企业
下载PDF
Sub-channel shared resource allocation for multi-user distributed MIMO-OFDM systems
18
作者 Na-e ZHENG You ZHOU +1 位作者 Han-ying HU Sheng WANG 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2014年第11期1048-1057,共10页
Well-controlled resource allocation is crucial for promoting the performance of multiple input multiple output orthogonal frequency division multiplexing(MIMO-OFDM) systems. Recent studies have focused primarily on tr... Well-controlled resource allocation is crucial for promoting the performance of multiple input multiple output orthogonal frequency division multiplexing(MIMO-OFDM) systems. Recent studies have focused primarily on traditional centralized systems or distributed antenna systems(DASs), and usually assumed that one sub-carrier or sub-channel is exclusively occupied by one user. To promote system performance, we propose a sub-channel shared resource allocation algorithm for multiuser distributed MIMO-OFDM systems. Each sub-channel can be shared by multiple users in the algorithm, which is different from previous algorithms. The algorithm assumes that each user communicates with only two best ports in the system. On each sub-carrier, it allocates a sub-channel in descending order, which means one sub-channel that can minimize signal to leakage plus noise ratio(SLNR) loss is deleted until the number of remaining sub-channels is equal to that of receiving antennas. If there are still sub-channels after all users are processed, these sub-channels will be allocated to users who can maximize the SLNR gain. Simulations show that compared to other algorithms, our proposed algorithm has better capacity performance and enables the system to provide service to more users under the same capacity constraints. 展开更多
关键词 MIMO-OFDM multi-user Resource allocation Sub-channel shared Signal to leakage plus noise ratio(SLNR)
原文传递
HYBRID ORTHOGONAL/RANDOM MULTIPLE ACCESS SCHEME WITH IMPROVED PERFORMANCE FOR DOWNLINK CDMA SYSTEMS
19
作者 Zhou Gao Fan Pingzhi Hao Li 《Journal of Electronics(China)》 2008年第1期47-52,共6页
In this paper, a hybrid orthogonal and random multiple access scheme with improved performance for capacity-enhanced downlink Code-Division Multiple-Access (CDMA) systems is presented, which is in fact a combination o... In this paper, a hybrid orthogonal and random multiple access scheme with improved performance for capacity-enhanced downlink Code-Division Multiple-Access (CDMA) systems is presented, which is in fact a combination of the conventional orthogonal spreading scheme and the synchronous Interleave Division Multiple Access (IDMA) scheme. The proposed scheme can achieve near single user performance for very large number of users by the iterative turbo like detection. Analysis and simulation results show that the proposed scheme performs better than the synchronous IDMA scheme for the same time complexity. Meanwhile, larger capacity can be provided compared with the conventional orthogonal schemes. 展开更多
关键词 Code-Division Multiple-access (CDMA) Interleave-Division Multiple-access (IDMA) multi-user Detection (MUD) Hybrid multiple access
下载PDF
Secret Sharing Schemes Based on the Dual Code of the Code of a Symmetric (v, k, λ)-Design and Minimal Access Sets
20
作者 Selda Calkavur 《Computer Technology and Application》 2015年第2期95-100,共6页
Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct... Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct the secret sharing schemes. Since the code of a symmetric (V, k, λ)-design is a linear code, this study is about the secret sharing schemes based on C of Fp-code C of asymmetric (v, k, λ)-design. 展开更多
关键词 Linear code the code of a symmetric design secret sharing scheme minimal access set.
下载PDF
上一页 1 2 40 下一页 到第
使用帮助 返回顶部