期刊文献+
共找到494篇文章
< 1 2 25 >
每页显示 20 50 100
改进的量子安全直传Ping-Pong协议
1
作者 梁彦霞 牛静 聂敏 《西安邮电大学学报》 2015年第2期32-35,共4页
为了提高Ping-Pong协议的传输效率,对其加以改进。改进的协议增加了随机数序列。相对于原协议,将传输的经典消息与控制信息从1∶1的比例改变为N∶(M-N)。按照量子通信效率评价公式,相对于原协议0.333的通信效率,改进协议的Matlab仿真和... 为了提高Ping-Pong协议的传输效率,对其加以改进。改进的协议增加了随机数序列。相对于原协议,将传输的经典消息与控制信息从1∶1的比例改变为N∶(M-N)。按照量子通信效率评价公式,相对于原协议0.333的通信效率,改进协议的Matlab仿真和数值推导结果均显示,只需满足条件N<M<2 N,其效率即可提高至N/(2 M-N);在最少控制模式的情况下,只要N>1,极限通信效率可达N/(N+2),故改进后的效率均大于原协议。 展开更多
关键词 量子安全直接通信 ping-pong协议 传输效率
下载PDF
依据“ping-pong”循环机制预测piRNA靶基因的搜索方法 被引量:1
2
作者 许甘霖 齐绪峰 蔡冬青 《基础医学与临床》 CSCD 2017年第3期399-401,共3页
piRNA是指能与PIWI家族蛋白结合的小RNAs,其功能主要是稳定生殖细胞正常发育,在其他体细胞内也参与生理功能的调控[1]。相当一部分的piRNA通过被称作"pingpong"循环机制去识别与切割其靶基因的转录本mRNA(图1),并通过该机制去实现初... piRNA是指能与PIWI家族蛋白结合的小RNAs,其功能主要是稳定生殖细胞正常发育,在其他体细胞内也参与生理功能的调控[1]。相当一部分的piRNA通过被称作"pingpong"循环机制去识别与切割其靶基因的转录本mRNA(图1),并通过该机制去实现初级piRNA(primary piRNA)和次级piRNA(secondary piRNA)循环利用,piwil4或piwil2与相应的piRNA结合,通过piRNA的5'端前10~11个碱基作为介导序列,依照碱基互补原则,对与之互补的靶mRNA进行切割, 展开更多
关键词 循环机制 PIRNA ping-pong 碱基互补 转录本 蛋白结合 起始位点 结果符合率 循环利用 大鼠
下载PDF
基于DMA控制的数据Ping-Pong传输 被引量:1
3
作者 汪智 严洪 李春生 《电子元器件应用》 2006年第4期78-80,共3页
介绍了TI公司TMS320C54xx系列DSP的DMA工作原理,提出了利用TMS320VC5409芯片的DMA方式来实现数据Ping-Pong传输的方法,同时给出了详细的软件设计流程。
关键词 DSP TMS320C54xx DMA ping-pong传输
下载PDF
Eavesdropping on the'ping-pong' quantum communication protocol freely in a noise channel 被引量:10
4
作者 邓富国 李熙涵 +2 位作者 李春燕 周萍 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第2期277-281,共5页
We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdroppe... We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol. 展开更多
关键词 quantum communication ping-pong protocol EAVESDROPPING
下载PDF
Improved Security Detection Strategy for Quantum "Ping-Pong" Protocol and Its Security Analysis 被引量:5
5
作者 李剑 金海菲 景博 《China Communications》 SCIE CSCD 2011年第3期170-179,共10页
In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But ... In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But the protocol was proved to have many vulnerabilities,and can be attacked by eavesdroppers.To overcome the problem,an improved security detection strategy which inserts the | 0〉,| 1〉,|+〉and |-〉particles into the messages as the decoy particles randomly in the"Ping-pong"protocol is presented.During the security analysis,the method of the entropy theory is introduced,and three detection strategies are compared quantitatively by using the constraint between the information which eavesdroppers can obtain and the interference introduced.Because of the presence of the trap particles |+〉and |-〉,the detection rate will be no less than 25% when Eve attacks the communication.The security analysis result shows that the efficiency of eavesdropping detection in the presented protocol is higher than the other two,so the detection strategy in the protocol can ensure that the "Ping-pong"protocol is more secure. 展开更多
关键词 secure quantum direct communication "ping-pong " protocol protocol security eavesdropping detection
下载PDF
Improved Quantum " Ping-Pong" Protocol Based on Extended Three-Particle GHZ State 被引量:5
6
作者 Li Jian Guo Xiaojing +2 位作者 Song Danjie Xie Feng Peng Yong 《China Communications》 SCIE CSCD 2012年第1期111-116,共6页
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro... In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. 展开更多
关键词 quantum key distffoution ping-pong protocol extended three-particle GHZ state eavesdropping detection
下载PDF
A FAST SEAMLESS HANDOVER SCHEME AND ITS CDT OPTIMIZATION FOR PING-PONG TYPE OF MOVEMENT 被引量:3
7
作者 Wang Yumlng Yang Zongkai +2 位作者 Zhao Dasheng He Jianhua Fu Xiaoming 《Journal of Electronics(China)》 2006年第2期298-303,共6页
In mobile IPv6 networks, the ping-pong type of movement brings about frequent handovers and thus increases signaling burden. This letter proposes a fast seamless handover scheme where the access router keeps the mobil... In mobile IPv6 networks, the ping-pong type of movement brings about frequent handovers and thus increases signaling burden. This letter proposes a fast seamless handover scheme where the access router keeps the mobile node's old reservation till the offline Count Down Timer (CDT) expires in order to reduce handover signaling and delay while the mobile node returns in a very short period of time. Based upon a pois son mobility model, an simple expression for CDT optimization is given out for the scheme to achieve the best cost performance of resource reservation. 展开更多
关键词 Mobile IPv6 ping-pong type of movement QoS signaling Handover delay Cost performance.
下载PDF
一种高带宽Ping-pong自调零运算放大器 被引量:3
8
作者 肖宇 《集成电路应用》 2019年第4期41-42,共2页
基于传统的多级运放结构设计了一款低失调,高速高精度的运算放大器。在传统运算放大器的基础上引入Ping-Pong自调零技术结合多级密勒补偿技术,实现了低失调,低噪声以及高精度。采用SMIC 0.18μm CMOS工艺,5 V电压下进行仿真验证。通过Sp... 基于传统的多级运放结构设计了一款低失调,高速高精度的运算放大器。在传统运算放大器的基础上引入Ping-Pong自调零技术结合多级密勒补偿技术,实现了低失调,低噪声以及高精度。采用SMIC 0.18μm CMOS工艺,5 V电压下进行仿真验证。通过Spectre仿真,电路单位增益带宽为9MHz,输出精度达到0.5%。 展开更多
关键词 多级运算放大器 多级密勒补偿 ping-pong自调零
下载PDF
Ping-pong effects study in PIC turbo joint detection for TDD CDMA
9
作者 Song Changjian Zhong Zifa Zhang Shuo 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期260-265,共6页
A kind of turbo joint detection scheme based on parallel interference cancellation (PIC) is studied; then, the eigenvalues of iteration matrix is deeply analyzed for studying the ping-pong effects in PIC JD and the ... A kind of turbo joint detection scheme based on parallel interference cancellation (PIC) is studied; then, the eigenvalues of iteration matrix is deeply analyzed for studying the ping-pong effects in PIC JD and the corresponding compensation approach is introduced. Finally, the proposed algorithm is validated through computer simulation in TDD CDMA uplink transmission. The result shows that the ping-pong effects are almost avoided completely in the presence of the compensation scheme, and system performance is greatly improved. 展开更多
关键词 parallel interference cancellation joint detection CDMA ping-pong TURBO
下载PDF
On the Security of Quantum Key Distribution Ping-Pong Protocol
10
作者 Masakazu Yoshida Takayuki Miyadera Hideki Imai 《Journal of Quantum Information Science》 2013年第1期16-19,共4页
Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security att... Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but also a different information disturbance theorem, which denotes a trade-off relationship between information gain for an eavesdropper and error rate, from the related works for an attack model. 展开更多
关键词 Two-Way QUANTUM KEY Distribution ping-pong Protocol ROBUSTNESS Information DISTURBANCE THEOREM
下载PDF
Analysis on the Current Situation of China's Ping-pong Referee Team above the National Level and Countermeasure Study
11
作者 Qi XIAO 《International Journal of Technology Management》 2013年第9期73-76,共4页
In this paper, the current situation of China' s Ping-pong referees team is studied using the methods such as document literatures and investigation, and the basic situation of the team is analyzed, and also the leve... In this paper, the current situation of China' s Ping-pong referees team is studied using the methods such as document literatures and investigation, and the basic situation of the team is analyzed, and also the level of law enforcement and the existing main problems are summarized, so as to explore the new ideas for the construction of the Ping-pong referees team and also provide a basis for China to train excellent Ping-pong referees. Through investigation, it is found that the problems such as the aging structure, poor English, insufficient training, and less judgment chances of the Ping-pong referee team should be practically solved, and also the artistic judgment quality should be improved. 展开更多
关键词 Above the National Level ping-pong Referees Team Team Construction
下载PDF
Dancing Ping-Pong Promotes Global Collaboration——At the Sports Economy and International Regional Cooperation Forum for the Belt and Road Initiative in 2018
12
作者 Li Houqiang Chen Youbin 《Contemporary Social Sciences》 2018年第5期1-8,共8页
Sichuan is the strongest province in western China, and Chengdu is the first stop of the Silk Road and the Yangtze River Economic Zone. Qingbaijiang,the inception point of the Chengdu-Europe express railway, is an imp... Sichuan is the strongest province in western China, and Chengdu is the first stop of the Silk Road and the Yangtze River Economic Zone. Qingbaijiang,the inception point of the Chengdu-Europe express railway, is an important source of artifacts from the ancient Sichuan civilization, and Sichuan province, the land of abundance, is the cradle and base of ping-pong. Chengdu has been connected to 展开更多
关键词 In At the Sports Economy and International Regional Cooperation Forum for the Belt and Road Initiative in 2018 Dancing ping-pong Promotes Global Collaboration
下载PDF
Improved quantum "Ping-pong" protocol based on GHZ state and classical XOR operation 被引量:13
13
作者 LI Jian JIN HaiFei JING Bo 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第9期1612-1618,共7页
In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 200... In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 2002, 89: 187902]. But the protocol was proved very vulnerable, and can be attacked by an eavesdropper. An improved "Ping-pong" protocol is presented to overcome the problem. The GHZ state particles are used to detect eavesdroppers, and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol. During the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information which an eavesdropper can obtain and the interference introduced. If the eavesdropper gets the full information, the detection rate of the original "Ping-pong" protocol is 50%; the detection rate of the second protocol which used two particles of EPR pair as detection particles is also 50%; and the detection rate of the presented protocol is 75%. In the end, the security of the pro-posed protocol is discussed. The analysis results show that the improved "Ping-pong" protocol in this paper is more secure than the other two. 展开更多
关键词 ping-pong protocol XOR operation GHZ state eavesdropping detection protocol security
原文传递
Kimiyo Matsuzaki, witness of ping-pong diplomacy between China and Japan
14
作者 He Yan 《Voice of Friendship》 2018年第1期8-11,共4页
If the resumption of diplomatic ties between China and the United States by way of ping-pong diplomacy is described as'earth-shattering and heaven-battering',then the process of forging a profound friendship b... If the resumption of diplomatic ties between China and the United States by way of ping-pong diplomacy is described as'earth-shattering and heaven-battering',then the process of forging a profound friendship between China and Japan through ping-pong can be said to be gentle and gradual.From Goto Koji to Koji Kimura,from Kimiyo Matsuzaki to Ai Fukuhara,the gentle stream of the friendship 展开更多
关键词 Kimiyo Matsuzaki witness of ping-pong diplomacy between China and Japan
原文传递
My Ping-Pong Family
15
作者 DENG YAPING CHEN SHANSHAN 《Women of China》 1998年第8期19-20,共2页
WHEN I was born, my father was 40 and my mother was 36. Father is a man of few words and an introverted nature. He belongs to that type of people who are very tough and strong-willed; he has worked hard all his life. ... WHEN I was born, my father was 40 and my mother was 36. Father is a man of few words and an introverted nature. He belongs to that type of people who are very tough and strong-willed; he has worked hard all his life. Mother, on the other hand, is extroverted and eager to excel. My personality is a combination of both of their characters. Father loves playing ping-pong ardently. He used to be a top player of the Henan provincial team and won the men’s singles championship in a contest of five provinces in central and southern China. Mother, a worker at the No. 4 National Textile Mill in Zhengzhou, also loved to play ping-pong when she was young. It was because of the sport that she and Father were brought together and got married. When the 展开更多
关键词 My ping-pong Family
原文传递
文件系统可靠管理方法研究
16
作者 杨琼 任晓瑞 王冬 《航空计算技术》 2024年第1期95-98,共4页
针对系统突发掉电情况下文件系统的可靠性问题,研究一种文件系统可靠管理方法,采用元数据事务管理技术,在数据更新时采用写时拷贝技术实现异地更新,采用PING PONG日志管理技术,对文件系统的空间和节点分配情况采用两级日志进行维护,系... 针对系统突发掉电情况下文件系统的可靠性问题,研究一种文件系统可靠管理方法,采用元数据事务管理技术,在数据更新时采用写时拷贝技术实现异地更新,采用PING PONG日志管理技术,对文件系统的空间和节点分配情况采用两级日志进行维护,系统维护两份事务点日志记录;通过逻辑卷管理关键数据的冗余存储,防止掉电时超级块数据被破坏引起系统无法正常启动。测试表明方法能够解决突发掉电情况下文件系统状态的一致性问题,实现文件系统的可靠管理。 展开更多
关键词 PINGPONG日志 事务 文件系统 可靠性 一致性
下载PDF
励磁系统交流侧接地对转子接地保护的影响
17
作者 侯小虎 肖江滔 +2 位作者 杨维胜 郭文 张舸 《水电与抽水蓄能》 2024年第5期43-46,共4页
励磁系统交流侧接地将引起注入式转子接地保护、乒乓切换式转子接地保护误动作。本文介绍了一起相关案例,并对引起误动的基本原理进行了深入分析和定量计算,总结了励磁系统交流侧接地引起采样数据变化的典型特征,提出了关于缩小转子接... 励磁系统交流侧接地将引起注入式转子接地保护、乒乓切换式转子接地保护误动作。本文介绍了一起相关案例,并对引起误动的基本原理进行了深入分析和定量计算,总结了励磁系统交流侧接地引起采样数据变化的典型特征,提出了关于缩小转子接地保护定位范围的思考。当转子一点接地保护动作后,应首先根据采样数据的变化,对故障点位于励磁系统交流侧还是直流侧做出初步判断,缩小故障定位范围,为快速查找故障提供决策依据。 展开更多
关键词 电力系统及其自动化 交流侧接地 注入式转子接地保护 乒乓切换式转子接地保护
下载PDF
基于象限分割的迟滞软切换VLC-WiFi接入选择算法
18
作者 张慧颖 梁士达 +2 位作者 李月月 盛美春 马成宇 《电子测量技术》 北大核心 2024年第1期63-70,共8页
针对解决无线网络频谱匮乏、用户频繁切换问题,本文提出一种基于象限分割的VLC-WiFi异构接入与迟滞软切换算法。依照三维坐标系将室内分割为4部分建立用户速率模型,获取用户速率,建立遮挡模型模拟VLC链路被遮挡情景。用户依据所在位置... 针对解决无线网络频谱匮乏、用户频繁切换问题,本文提出一种基于象限分割的VLC-WiFi异构接入与迟滞软切换算法。依照三维坐标系将室内分割为4部分建立用户速率模型,获取用户速率,建立遮挡模型模拟VLC链路被遮挡情景。用户依据所在位置、象限、遮挡及速率等参数执行接入操作;切换依据迟滞思想将向内切换与向外切换阈值差异化,使切换存在弹性空间从而抑制乒乓效应。在5 m×5 m×5 m室内空间内经过多次实验表明,提出的室内VLC-WiFi异构组网方案水平切换次数降低43.8%,遮挡及垂直切换数降低45.3%,乒乓次数降低52.27%,吞吐量比传统算法提升约5.84%。该算法可以显著降低切换与乒乓次数。因此本文为室内异构网络通信研究提供理论依据。 展开更多
关键词 光通信 VLC-WiFi网络 用户分配 乒乓效应 吞吐量
下载PDF
模拟乒乓球运动的逻辑电路设计
19
作者 张聪慧 《集成电路应用》 2024年第8期25-27,共3页
阐述在数字逻辑电路实验教学中引入游戏电路设计。以模拟乒乓球游戏电路的设计为例,该游戏电路综合运用计数器、移位寄存器、锁存器等逻辑器件,利用按键模拟两位选手的乒乓球拍,利用发光二极管模拟乒乓球及其运动路径,A端与B端相互击球... 阐述在数字逻辑电路实验教学中引入游戏电路设计。以模拟乒乓球游戏电路的设计为例,该游戏电路综合运用计数器、移位寄存器、锁存器等逻辑器件,利用按键模拟两位选手的乒乓球拍,利用发光二极管模拟乒乓球及其运动路径,A端与B端相互击球,数码管显示选手的当前得分,游戏难度可通过改变时钟电路的频率进行调节。 展开更多
关键词 逻辑电路设计 移位寄存器 时钟频率 计数器 数码显示 模拟乒乓
下载PDF
基于DDR3的大容量数据缓存与传输系统设计
20
作者 王晨 马游春 郭鑫 《仪表技术与传感器》 CSCD 北大核心 2024年第12期71-74,79,共5页
为了解决目前数据存储系统中缓存深度不足、实用性不强等问题,设计了一种高性能数据缓存与传输系统方案。该系统以ZYNQ系列开发板AX7350作为驱动平台,设计了一种以FIFO级联+乒乓操作的大容量缓存方案,该方案增加了5.625 MB的缓存容量,... 为了解决目前数据存储系统中缓存深度不足、实用性不强等问题,设计了一种高性能数据缓存与传输系统方案。该系统以ZYNQ系列开发板AX7350作为驱动平台,设计了一种以FIFO级联+乒乓操作的大容量缓存方案,该方案增加了5.625 MB的缓存容量,极大提高了系统的缓存深度。通过UDP数据组帧的形式进行以太网数据收发,DDR3作为数据存储媒介。测试结果表明:该系统进行以太网数据传输时的平均丢包率为0.054%,该系统具有可靠性。 展开更多
关键词 DDR3 乒乓操作 以太网 ZYNQ FIFO级联 大容量缓存
下载PDF
上一页 1 2 25 下一页 到第
使用帮助 返回顶部