期刊文献+
共找到491篇文章
< 1 2 25 >
每页显示 20 50 100
改进的量子安全直传Ping-Pong协议
1
作者 梁彦霞 牛静 聂敏 《西安邮电大学学报》 2015年第2期32-35,共4页
为了提高Ping-Pong协议的传输效率,对其加以改进。改进的协议增加了随机数序列。相对于原协议,将传输的经典消息与控制信息从1∶1的比例改变为N∶(M-N)。按照量子通信效率评价公式,相对于原协议0.333的通信效率,改进协议的Matlab仿真和... 为了提高Ping-Pong协议的传输效率,对其加以改进。改进的协议增加了随机数序列。相对于原协议,将传输的经典消息与控制信息从1∶1的比例改变为N∶(M-N)。按照量子通信效率评价公式,相对于原协议0.333的通信效率,改进协议的Matlab仿真和数值推导结果均显示,只需满足条件N<M<2 N,其效率即可提高至N/(2 M-N);在最少控制模式的情况下,只要N>1,极限通信效率可达N/(N+2),故改进后的效率均大于原协议。 展开更多
关键词 量子安全直接通信 ping-pong协议 传输效率
下载PDF
依据“ping-pong”循环机制预测piRNA靶基因的搜索方法 被引量:1
2
作者 许甘霖 齐绪峰 蔡冬青 《基础医学与临床》 CSCD 2017年第3期399-401,共3页
piRNA是指能与PIWI家族蛋白结合的小RNAs,其功能主要是稳定生殖细胞正常发育,在其他体细胞内也参与生理功能的调控[1]。相当一部分的piRNA通过被称作"pingpong"循环机制去识别与切割其靶基因的转录本mRNA(图1),并通过该机制去实现初... piRNA是指能与PIWI家族蛋白结合的小RNAs,其功能主要是稳定生殖细胞正常发育,在其他体细胞内也参与生理功能的调控[1]。相当一部分的piRNA通过被称作"pingpong"循环机制去识别与切割其靶基因的转录本mRNA(图1),并通过该机制去实现初级piRNA(primary piRNA)和次级piRNA(secondary piRNA)循环利用,piwil4或piwil2与相应的piRNA结合,通过piRNA的5'端前10~11个碱基作为介导序列,依照碱基互补原则,对与之互补的靶mRNA进行切割, 展开更多
关键词 循环机制 PIRNA ping-pong 碱基互补 转录本 蛋白结合 起始位点 结果符合率 循环利用 大鼠
下载PDF
基于DMA控制的数据Ping-Pong传输 被引量:1
3
作者 汪智 严洪 李春生 《电子元器件应用》 2006年第4期78-80,共3页
介绍了TI公司TMS320C54xx系列DSP的DMA工作原理,提出了利用TMS320VC5409芯片的DMA方式来实现数据Ping-Pong传输的方法,同时给出了详细的软件设计流程。
关键词 DSP TMS320C54xx DMA ping-pong传输
下载PDF
Eavesdropping on the'ping-pong' quantum communication protocol freely in a noise channel 被引量:10
4
作者 邓富国 李熙涵 +2 位作者 李春燕 周萍 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第2期277-281,共5页
We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdroppe... We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol. 展开更多
关键词 quantum communication ping-pong protocol EAVESDROPPING
下载PDF
Improved Security Detection Strategy for Quantum "Ping-Pong" Protocol and Its Security Analysis 被引量:5
5
作者 李剑 金海菲 景博 《China Communications》 SCIE CSCD 2011年第3期170-179,共10页
In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But ... In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But the protocol was proved to have many vulnerabilities,and can be attacked by eavesdroppers.To overcome the problem,an improved security detection strategy which inserts the | 0〉,| 1〉,|+〉and |-〉particles into the messages as the decoy particles randomly in the"Ping-pong"protocol is presented.During the security analysis,the method of the entropy theory is introduced,and three detection strategies are compared quantitatively by using the constraint between the information which eavesdroppers can obtain and the interference introduced.Because of the presence of the trap particles |+〉and |-〉,the detection rate will be no less than 25% when Eve attacks the communication.The security analysis result shows that the efficiency of eavesdropping detection in the presented protocol is higher than the other two,so the detection strategy in the protocol can ensure that the "Ping-pong"protocol is more secure. 展开更多
关键词 secure quantum direct communication "ping-pong " protocol protocol security eavesdropping detection
下载PDF
Improved Quantum " Ping-Pong" Protocol Based on Extended Three-Particle GHZ State 被引量:5
6
作者 Li Jian Guo Xiaojing +2 位作者 Song Danjie Xie Feng Peng Yong 《China Communications》 SCIE CSCD 2012年第1期111-116,共6页
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro... In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. 展开更多
关键词 quantum key distffoution ping-pong protocol extended three-particle GHZ state eavesdropping detection
下载PDF
A FAST SEAMLESS HANDOVER SCHEME AND ITS CDT OPTIMIZATION FOR PING-PONG TYPE OF MOVEMENT 被引量:3
7
作者 Wang Yumlng Yang Zongkai +2 位作者 Zhao Dasheng He Jianhua Fu Xiaoming 《Journal of Electronics(China)》 2006年第2期298-303,共6页
In mobile IPv6 networks, the ping-pong type of movement brings about frequent handovers and thus increases signaling burden. This letter proposes a fast seamless handover scheme where the access router keeps the mobil... In mobile IPv6 networks, the ping-pong type of movement brings about frequent handovers and thus increases signaling burden. This letter proposes a fast seamless handover scheme where the access router keeps the mobile node's old reservation till the offline Count Down Timer (CDT) expires in order to reduce handover signaling and delay while the mobile node returns in a very short period of time. Based upon a pois son mobility model, an simple expression for CDT optimization is given out for the scheme to achieve the best cost performance of resource reservation. 展开更多
关键词 Mobile IPv6 ping-pong type of movement QoS signaling Handover delay Cost performance.
下载PDF
一种高带宽Ping-pong自调零运算放大器 被引量:3
8
作者 肖宇 《集成电路应用》 2019年第4期41-42,共2页
基于传统的多级运放结构设计了一款低失调,高速高精度的运算放大器。在传统运算放大器的基础上引入Ping-Pong自调零技术结合多级密勒补偿技术,实现了低失调,低噪声以及高精度。采用SMIC 0.18μm CMOS工艺,5 V电压下进行仿真验证。通过Sp... 基于传统的多级运放结构设计了一款低失调,高速高精度的运算放大器。在传统运算放大器的基础上引入Ping-Pong自调零技术结合多级密勒补偿技术,实现了低失调,低噪声以及高精度。采用SMIC 0.18μm CMOS工艺,5 V电压下进行仿真验证。通过Spectre仿真,电路单位增益带宽为9MHz,输出精度达到0.5%。 展开更多
关键词 多级运算放大器 多级密勒补偿 ping-pong自调零
下载PDF
Ping-pong effects study in PIC turbo joint detection for TDD CDMA
9
作者 Song Changjian Zhong Zifa Zhang Shuo 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期260-265,共6页
A kind of turbo joint detection scheme based on parallel interference cancellation (PIC) is studied; then, the eigenvalues of iteration matrix is deeply analyzed for studying the ping-pong effects in PIC JD and the ... A kind of turbo joint detection scheme based on parallel interference cancellation (PIC) is studied; then, the eigenvalues of iteration matrix is deeply analyzed for studying the ping-pong effects in PIC JD and the corresponding compensation approach is introduced. Finally, the proposed algorithm is validated through computer simulation in TDD CDMA uplink transmission. The result shows that the ping-pong effects are almost avoided completely in the presence of the compensation scheme, and system performance is greatly improved. 展开更多
关键词 parallel interference cancellation joint detection CDMA ping-pong TURBO
下载PDF
On the Security of Quantum Key Distribution Ping-Pong Protocol
10
作者 Masakazu Yoshida Takayuki Miyadera Hideki Imai 《Journal of Quantum Information Science》 2013年第1期16-19,共4页
Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security att... Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but also a different information disturbance theorem, which denotes a trade-off relationship between information gain for an eavesdropper and error rate, from the related works for an attack model. 展开更多
关键词 Two-Way QUANTUM KEY Distribution ping-pong Protocol ROBUSTNESS Information DISTURBANCE THEOREM
下载PDF
Analysis on the Current Situation of China's Ping-pong Referee Team above the National Level and Countermeasure Study
11
作者 Qi XIAO 《International Journal of Technology Management》 2013年第9期73-76,共4页
In this paper, the current situation of China' s Ping-pong referees team is studied using the methods such as document literatures and investigation, and the basic situation of the team is analyzed, and also the leve... In this paper, the current situation of China' s Ping-pong referees team is studied using the methods such as document literatures and investigation, and the basic situation of the team is analyzed, and also the level of law enforcement and the existing main problems are summarized, so as to explore the new ideas for the construction of the Ping-pong referees team and also provide a basis for China to train excellent Ping-pong referees. Through investigation, it is found that the problems such as the aging structure, poor English, insufficient training, and less judgment chances of the Ping-pong referee team should be practically solved, and also the artistic judgment quality should be improved. 展开更多
关键词 Above the National Level ping-pong Referees Team Team Construction
下载PDF
Dancing Ping-Pong Promotes Global Collaboration——At the Sports Economy and International Regional Cooperation Forum for the Belt and Road Initiative in 2018
12
作者 Li Houqiang Chen Youbin 《Contemporary Social Sciences》 2018年第5期1-8,共8页
Sichuan is the strongest province in western China, and Chengdu is the first stop of the Silk Road and the Yangtze River Economic Zone. Qingbaijiang,the inception point of the Chengdu-Europe express railway, is an imp... Sichuan is the strongest province in western China, and Chengdu is the first stop of the Silk Road and the Yangtze River Economic Zone. Qingbaijiang,the inception point of the Chengdu-Europe express railway, is an important source of artifacts from the ancient Sichuan civilization, and Sichuan province, the land of abundance, is the cradle and base of ping-pong. Chengdu has been connected to 展开更多
关键词 In At the Sports Economy and International Regional Cooperation Forum for the Belt and Road Initiative in 2018 Dancing ping-pong Promotes Global Collaboration
下载PDF
文件系统可靠管理方法研究
13
作者 杨琼 任晓瑞 王冬 《航空计算技术》 2024年第1期95-98,共4页
针对系统突发掉电情况下文件系统的可靠性问题,研究一种文件系统可靠管理方法,采用元数据事务管理技术,在数据更新时采用写时拷贝技术实现异地更新,采用PING PONG日志管理技术,对文件系统的空间和节点分配情况采用两级日志进行维护,系... 针对系统突发掉电情况下文件系统的可靠性问题,研究一种文件系统可靠管理方法,采用元数据事务管理技术,在数据更新时采用写时拷贝技术实现异地更新,采用PING PONG日志管理技术,对文件系统的空间和节点分配情况采用两级日志进行维护,系统维护两份事务点日志记录;通过逻辑卷管理关键数据的冗余存储,防止掉电时超级块数据被破坏引起系统无法正常启动。测试表明方法能够解决突发掉电情况下文件系统状态的一致性问题,实现文件系统的可靠管理。 展开更多
关键词 PINGPONG日志 事务 文件系统 可靠性 一致性
下载PDF
基于象限分割的迟滞软切换VLC-WiFi接入选择算法
14
作者 张慧颖 梁士达 +2 位作者 李月月 盛美春 马成宇 《电子测量技术》 北大核心 2024年第1期63-70,共8页
针对解决无线网络频谱匮乏、用户频繁切换问题,本文提出一种基于象限分割的VLC-WiFi异构接入与迟滞软切换算法。依照三维坐标系将室内分割为4部分建立用户速率模型,获取用户速率,建立遮挡模型模拟VLC链路被遮挡情景。用户依据所在位置... 针对解决无线网络频谱匮乏、用户频繁切换问题,本文提出一种基于象限分割的VLC-WiFi异构接入与迟滞软切换算法。依照三维坐标系将室内分割为4部分建立用户速率模型,获取用户速率,建立遮挡模型模拟VLC链路被遮挡情景。用户依据所在位置、象限、遮挡及速率等参数执行接入操作;切换依据迟滞思想将向内切换与向外切换阈值差异化,使切换存在弹性空间从而抑制乒乓效应。在5 m×5 m×5 m室内空间内经过多次实验表明,提出的室内VLC-WiFi异构组网方案水平切换次数降低43.8%,遮挡及垂直切换数降低45.3%,乒乓次数降低52.27%,吞吐量比传统算法提升约5.84%。该算法可以显著降低切换与乒乓次数。因此本文为室内异构网络通信研究提供理论依据。 展开更多
关键词 光通信 VLC-WiFi网络 用户分配 乒乓效应 吞吐量
下载PDF
模拟乒乓球运动的逻辑电路设计
15
作者 张聪慧 《集成电路应用》 2024年第8期25-27,共3页
阐述在数字逻辑电路实验教学中引入游戏电路设计。以模拟乒乓球游戏电路的设计为例,该游戏电路综合运用计数器、移位寄存器、锁存器等逻辑器件,利用按键模拟两位选手的乒乓球拍,利用发光二极管模拟乒乓球及其运动路径,A端与B端相互击球... 阐述在数字逻辑电路实验教学中引入游戏电路设计。以模拟乒乓球游戏电路的设计为例,该游戏电路综合运用计数器、移位寄存器、锁存器等逻辑器件,利用按键模拟两位选手的乒乓球拍,利用发光二极管模拟乒乓球及其运动路径,A端与B端相互击球,数码管显示选手的当前得分,游戏难度可通过改变时钟电路的频率进行调节。 展开更多
关键词 逻辑电路设计 移位寄存器 时钟频率 计数器 数码显示 模拟乒乓
下载PDF
Improved quantum "Ping-pong" protocol based on GHZ state and classical XOR operation 被引量:13
16
作者 LI Jian JIN HaiFei JING Bo 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第9期1612-1618,共7页
In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 200... In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 2002, 89: 187902]. But the protocol was proved very vulnerable, and can be attacked by an eavesdropper. An improved "Ping-pong" protocol is presented to overcome the problem. The GHZ state particles are used to detect eavesdroppers, and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol. During the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information which an eavesdropper can obtain and the interference introduced. If the eavesdropper gets the full information, the detection rate of the original "Ping-pong" protocol is 50%; the detection rate of the second protocol which used two particles of EPR pair as detection particles is also 50%; and the detection rate of the presented protocol is 75%. In the end, the security of the pro-posed protocol is discussed. The analysis results show that the improved "Ping-pong" protocol in this paper is more secure than the other two. 展开更多
关键词 ping-pong protocol XOR operation GHZ state eavesdropping detection protocol security
原文传递
体育教学乒乓球专项研究生校外实践基地高质量发展研究
17
作者 王浩然 沈磊 杨仪 《当代体育科技》 2024年第16期126-129,共4页
高校校外实践基地是大学生参加教育实习、社会实践和岗前职业模拟的重要平台。近年来,各高校建设了不同专业的校外实践基地,取得了显著成果,不仅推动了现代化高校教育教学理念的转变,改革了高校人才的培养模式,而且在一定程度上提高了... 高校校外实践基地是大学生参加教育实习、社会实践和岗前职业模拟的重要平台。近年来,各高校建设了不同专业的校外实践基地,取得了显著成果,不仅推动了现代化高校教育教学理念的转变,改革了高校人才的培养模式,而且在一定程度上提高了学生的实践能力、团结合作能力、创新精神、就业竞争力和社会责任感。乒乓球专项研究生校外实习基地建设,对于后期学生进入社会稳定就业有着承前启后的作用。基于此,该文通过对相关校外实习基地的调研,找出乒乓球专项研究生实习基地当前面临的困境,剖析深层次原因,提出相应的高质量发展策略,促进体育教学乒乓球专项研究生校外实践基地高质量发展。 展开更多
关键词 体育教学 乒乓球专项 校外实践基地 高质量发展
下载PDF
手机位置数据中“乒乓效应”的时空特征研究
18
作者 赵志远 张雯婷 +1 位作者 杨喜平 吴升 《测绘与空间地理信息》 2024年第3期12-17,共6页
“乒乓效应”是手机位置数据中一种典型的噪声数据,分析其时空分布特征对科学应对噪音数据影响、准确理解分析结果、提高手机位置数据质量具有重要意义。本研究基于速度阈值、重复跳转和频繁大幅度转向3种模式的“乒乓效应”检测方法,采... “乒乓效应”是手机位置数据中一种典型的噪声数据,分析其时空分布特征对科学应对噪音数据影响、准确理解分析结果、提高手机位置数据质量具有重要意义。本研究基于速度阈值、重复跳转和频繁大幅度转向3种模式的“乒乓效应”检测方法,采用3个不同研究区(上海、西宁和深圳)的手机位置数据,构建了时间与空间易发指数,对手机数据中的“乒乓效应”进行识别,并从跳转距离特征、空间分布特征、时间分布特征3个方面进行了对比分析。结果表明:空间分布上,“乒乓效应”总体呈现出较高的空间自相关现象,表现为远郊区易发、基站密度高处不易发的特点;在时间分布特征上,呈现出白天易发、夜晚不易发的特点;同时“乒乓效应”的存在会对研究结果产生一定程度的影响。 展开更多
关键词 手机位置数据 “乒乓效应” 时空数据挖掘 数据质量
下载PDF
多通道串行通信数据存储算法研究与应用
19
作者 陈冬方 王恺 《仪表技术与传感器》 CSCD 北大核心 2024年第6期115-120,共6页
针对多通道串行通信数据中数据丢失和通信波特率自识别的问题,研究了一种多数据流多缓冲乒乓算法存储串行通信数据,解决了帧间隔时间不确定、长度不定长的多通道串行通信数据接收和存储难题。利用微处理器的DMA和串口中断技术,设计了一... 针对多通道串行通信数据中数据丢失和通信波特率自识别的问题,研究了一种多数据流多缓冲乒乓算法存储串行通信数据,解决了帧间隔时间不确定、长度不定长的多通道串行通信数据接收和存储难题。利用微处理器的DMA和串口中断技术,设计了一款多串行通信数据记录器。实验测试表明:应用多串口存储算法的数据记录器能够有效解决串行数据丢失与波特率自识别问题,数据记录器可应用于大容量数据存储。 展开更多
关键词 串行通信数据存储 乒乓算法 自适应波特率 数据记录器
下载PDF
一种快速连续跳频的超宽带多功能频综模块设计
20
作者 胡劲涵 陈文涛 《现代电子技术》 北大核心 2024年第18期65-69,共5页
基于快速连续跳频和超宽带射频收发电路的应用,设计了一种快速连续跳频的超宽带多功能频综模块,可实现0.1~9.8 GHz工作频段的快速连续或非连续跳频功能,以及FDD、TDD收发电路中上下变频的处理。采用“乒乓”锁相环(PLL)作为整体架构,结... 基于快速连续跳频和超宽带射频收发电路的应用,设计了一种快速连续跳频的超宽带多功能频综模块,可实现0.1~9.8 GHz工作频段的快速连续或非连续跳频功能,以及FDD、TDD收发电路中上下变频的处理。采用“乒乓”锁相环(PLL)作为整体架构,结合多路复用开关(MUX)实现快速跳频功能,并产生收发电路所需的本振信号。最终实现适用于通信、雷达无线电跳频、软件无线电、干扰抗扰等相关领域的频综模块。结果表明,6 GHz相位噪声不大于-110 dBc/Hz@100 kHz,快速连续跳频可达至少30 000跳/s,具有优良的时钟性能。 展开更多
关键词 快速连续跳频 超宽带 收发电路模块 “乒乓”锁相环 频率综合器 相位噪声 本振信号
下载PDF
上一页 1 2 25 下一页 到第
使用帮助 返回顶部