期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Forecasting promising technology using analysis of patent information:Focused on next generation mobile communications 被引量:8
1
作者 CHOI Seung-Wook YOU Yen-Yoo NA Kwan-Sik 《Journal of Central South University》 SCIE EI CAS 2014年第11期4303-4310,共8页
In order to forecast promising technologies in the field of next generation mobile communication, various patent indicators were analyzed such as citation per patent, patent family information, patent share, increase ... In order to forecast promising technologies in the field of next generation mobile communication, various patent indicators were analyzed such as citation per patent, patent family information, patent share, increase rate, and patent activity. These indicators were quantified into several indexes and then integrated into an evaluation score to provide promising technologies. As a result of the suggested patent analysis, four technologies out of twenty two in details classification were selected, which showed outstanding technology competitiveness, high patent share and increasing rates as well as high recent-patent-ratios and triad-patent-family-ratios. Each of the selected technologies scored more than 10 points in total, and the following four technologies were suggested as promising ones in the field of next generation mobile communication: 1) 3GPP based mobile communication, 2) beyond 4G mobile communication, 3) IEEE 802.16 based mobile communication, which are in medium classification of broadband mobile communication system, and 4) testing/certification system of mobile communication, which is in medium classification of mobile communication testing/certification system. 展开更多
关键词 next generation mobile communication promising technology forecasting patent information patent analysis patent indicators
下载PDF
The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel 被引量:2
2
作者 李剑 孙风琪 +3 位作者 潘泽世 聂金瑞 陈彦桦 袁开国 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期1-5,共5页
To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, a... To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Qo(M : (Q0, 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ~ is, the larger the error rate Q is. When the noise level ~ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q 〈 0.153. Similarly, if error rate Q〉 0.153 = Q0, eavesdropping information I 〉 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. 展开更多
关键词 The Security analysis of Two-Step Quantum Direct communication Protocol in Collective-Rotation Noise Channel EPR
下载PDF
Analysis on China's Satellite Communications Market
3
作者 By Min Changning, Bao Miaoqin 《Aerospace China》 1995年第2期31-34,共4页
This paper analyses in detail the uses of communications satellite transponders andusers’ demand at present in China based on the investigation and other related data about the satellite communications market.Meanwhi... This paper analyses in detail the uses of communications satellite transponders andusers’ demand at present in China based on the investigation and other related data about the satellite communications market.Meanwhile,it also analyses satellite transponder resources that China may provide before 2000. 展开更多
关键词 analysis on China’s Satellite communications Market
下载PDF
An Efficient CSI Feedback Scheme for Dual-Polarized MIMO Systems Using Layered Multi-Paths Information
4
作者 Feng Zheng Yijian Chen +1 位作者 Qian Zhan Jie Zhang 《China Communications》 SCIE CSCD 2017年第5期91-104,共14页
Massive MIMO is one of tile enabling technologies tbr beyond 4G and 5G systems due to its ability to provide beamforming gain and reduce interference Dual-polarized antenna is widely adopted to accommodate a large num... Massive MIMO is one of tile enabling technologies tbr beyond 4G and 5G systems due to its ability to provide beamforming gain and reduce interference Dual-polarized antenna is widely adopted to accommodate a large number of antenna elements in limited space. However, current CSI(channel state information) feedback schemes developed in LTE for conventional MIMO systems are not efficient enough for massive MIMO systems since the overhead increases almost linearly with the number of antenna. Moreover, the codebook for massive MIMO will be huge and difficult to design with the LTE methodology. This paper proposes a novel CSI feedback scheme named layered Multi-paths Information based CSI Feedback (LMPIF), which can achieve higher spectrum efficiency for dual-polarized antenna system with low feedback overhead. The MIMO channel is decomposed into long term components (multipath directions and amplitudes) and short term components (multipath phases). The relationship between the two components and the optimal precoder is derived in closed form. To reduce the overhead, different granularities in feedback time have been applied for the long term components and short term components Link and system level simulation results prove that LMPIF can improve performance considerably with low CSI feedback overhead. 展开更多
关键词 communication and information system: efficient CSI feedback: channel characteristie analysis dual-polarized: massive MIMO: layered Multi-Paths information codeword model
下载PDF
An Active De-anonymizing Attack Against Tor Web Traffic 被引量:3
5
作者 Ming Yang Xiaodan Gu +2 位作者 Zhen Ling Changxin Yin Junzhou Luo 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第6期702-713,共12页
Tor is pervasively used to conceal target websites that users are visiting. A de-anonymization technique against Tor, referred to as website fingerprinting attack, aims to infer the websites accessed by Tor clients by... Tor is pervasively used to conceal target websites that users are visiting. A de-anonymization technique against Tor, referred to as website fingerprinting attack, aims to infer the websites accessed by Tor clients by passively analyzing the patterns of encrypted traffic at the Tor client side. However, HTTP pipeline and Tor circuit multiplexing techniques can affect the accuracy of the attack by mixing the traffic that carries web objects in a single TCP connection. In this paper, we propose a novel active website fingerprinting attack by identifying and delaying the HTTP requests at the first hop Tor node. Then, we can separate the traffic that carries distinct web objects to derive a more distinguishable traffic pattern. To fulfill this goal, two algorithms based on statistical analysis and objective function optimization are proposed to construct a general packet delay scheme. We evaluate our active attack against Tor in empirical experiments and obtain the highest accuracy of 98.64%, compared with 85.95% of passive attack. We also perform experiments in the open-world scenario. When the parameter k of k-NN classifier is set to 5, then we can obtain a true positive rate of 90.96% with a false positive rate of 3.9%. 展开更多
关键词 traffic analysis active website fingerprinting anonymous communication Tor
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部