期刊文献+
共找到25,165篇文章
< 1 2 250 >
每页显示 20 50 100
Cascaded ELM-Based Joint Frame Synchronization and Channel Estimation over Rician Fading Channel with Hardware Imperfections 被引量:1
1
作者 Qing Chaojin Rao Chuangui +2 位作者 Yang Na Tang Shuhai Wang Jiafan 《China Communications》 SCIE CSCD 2024年第6期87-102,共16页
Due to the interdependency of frame synchronization(FS)and channel estimation(CE),joint FS and CE(JFSCE)schemes are proposed to enhance their functionalities and therefore boost the overall performance of wireless com... Due to the interdependency of frame synchronization(FS)and channel estimation(CE),joint FS and CE(JFSCE)schemes are proposed to enhance their functionalities and therefore boost the overall performance of wireless communication systems.Although traditional JFSCE schemes alleviate the influence between FS and CE,they show deficiencies in dealing with hardware imperfection(HI)and deterministic line-of-sight(LOS)path.To tackle this challenge,we proposed a cascaded ELM-based JFSCE to alleviate the influence of HI in the scenario of the Rician fading channel.Specifically,the conventional JFSCE method is first employed to extract the initial features,and thus forms the non-Neural Network(NN)solutions for FS and CE,respectively.Then,the ELMbased networks,named FS-NET and CE-NET,are cascaded to capture the NN solutions of FS and CE.Simulation and analysis results show that,compared with the conventional JFSCE methods,the proposed cascaded ELM-based JFSCE significantly reduces the error probability of FS and the normalized mean square error(NMSE)of CE,even against the impacts of parameter variations. 展开更多
关键词 channel estimation extreme learning machine frame synchronization hardware imperfection nonlinear distortion synchronization metric
下载PDF
A Novel Quantization and Model Compression Approach for Hardware Accelerators in Edge Computing
2
作者 Fangzhou He Ke Ding +3 位作者 DingjiangYan Jie Li Jiajun Wang Mingzhe Chen 《Computers, Materials & Continua》 SCIE EI 2024年第8期3021-3045,共25页
Massive computational complexity and memory requirement of artificial intelligence models impede their deploy-ability on edge computing devices of the Internet of Things(IoT).While Power-of-Two(PoT)quantization is pro... Massive computational complexity and memory requirement of artificial intelligence models impede their deploy-ability on edge computing devices of the Internet of Things(IoT).While Power-of-Two(PoT)quantization is pro-posed to improve the efficiency for edge inference of Deep Neural Networks(DNNs),existing PoT schemes require a huge amount of bit-wise manipulation and have large memory overhead,and their efficiency is bounded by the bottleneck of computation latency and memory footprint.To tackle this challenge,we present an efficient inference approach on the basis of PoT quantization and model compression.An integer-only scalar PoT quantization(IOS-PoT)is designed jointly with a distribution loss regularizer,wherein the regularizer minimizes quantization errors and training disturbances.Additionally,two-stage model compression is developed to effectively reduce memory requirement,and alleviate bandwidth usage in communications of networked heterogenous learning systems.The product look-up table(P-LUT)inference scheme is leveraged to replace bit-shifting with only indexing and addition operations for achieving low-latency computation and implementing efficient edge accelerators.Finally,comprehensive experiments on Residual Networks(ResNets)and efficient architectures with Canadian Institute for Advanced Research(CIFAR),ImageNet,and Real-world Affective Faces Database(RAF-DB)datasets,indicate that our approach achieves 2×∼10×improvement in the reduction of both weight size and computation cost in comparison to state-of-the-art methods.A P-LUT accelerator prototype is implemented on the Xilinx KV260 Field Programmable Gate Array(FPGA)platform for accelerating convolution operations,with performance results showing that P-LUT reduces memory footprint by 1.45×,achieves more than 3×power efficiency and 2×resource efficiency,compared to the conventional bit-shifting scheme. 展开更多
关键词 Edge computing model compression hardware accelerator power-of-two quantization
下载PDF
V2I Physical Layer Security Beamforming with Antenna Hardware Impairments under RIS Assistance
3
作者 Zerong Tang Tiecheng Song Jing Hu 《Computers, Materials & Continua》 SCIE EI 2024年第10期1835-1854,共20页
The Internet of Vehicles(IoV)will carry a large amount of security and privacy-related data,which makes the secure communication between the IoV terminals increasingly critical.This paper studies the joint beamforming... The Internet of Vehicles(IoV)will carry a large amount of security and privacy-related data,which makes the secure communication between the IoV terminals increasingly critical.This paper studies the joint beamforming for physical-layer security transmission in the coexistence of Vehicle-to-Infrastructure(V2I)and Vehicle-toVehicle(V2V)communication with Reconfigurable Intelligent Surface(RIS)assistance,taking into account hardware impairments.A communication model for physical-layer security transmission is established when the eavesdropping user is present and the base station antenna has hardware impairments assisted by RIS.Based on this model,we propose to maximize the V2I physical-layer security transmission rate.To solve the coupled non-convex optimization problem,an alternating optimization algorithm based on second-order cone programming and semidefinite relaxation is proposed to obtain the optimal V2I base station transmit precoding and RIS reflect phase shift matrix.Finally,simulation results are presented to verify the convergence and superiority of our proposed algorithm while analyzing the impact of system parameters on the V2I physical-layer security transmission rate.The simulation results further demonstrate that the proposed robust beamforming algorithm considering hardware impairments will achieve an average performance improvement of 0.7 dB over a non-robustly designed algorithm.Furthermore,increasing the number of RIS reflective units from 10 to 50 results in an almost 2 dB enhancement in secure transmission rate. 展开更多
关键词 Internet of vehicle reconfigurable intelligent surface physical-layer security transmission antenna hardware impairments
下载PDF
A High Efficiency Hardware Implementation of S-Boxes Based on Composite Field for Advanced Encryption Standard
4
作者 Yawen Wang Sini Bin +1 位作者 Shikai Zhu Xiaoting Hu 《Journal of Computer and Communications》 2024年第4期228-246,共19页
The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization... The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization implementation of the S-box is proposed based on the composite field inverse operation in this paper. This proposed S-box implementation is modeled using Verilog language and synthesized using Design Complier software under the premise of ensuring the correctness of the simulation result. The synthesis results show that, compared to several current S-box implementation schemes, the proposed implementation of the S-box significantly reduces the area overhead and critical path delay, then gets higher hardware efficiency. This provides strong support for realizing efficient and compact S-box ASIC designs. 展开更多
关键词 Advanced Encryption Standard (AES) S-BOX Tower Field hardware Implementation Application Specific Integration Circuit (ASIC)
下载PDF
Realization of nonlinear PID with feed-forward controller for 3-DOF flight simulator and hardware-in-the-loop simulation 被引量:3
5
作者 Duan Haibin Wang Daobo Yu Xiufen 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期342-345,共4页
As friction, intrinsic steady-state nonlinearity poses a challenging dilemma to the control system of 3-DOF (three degree of freedom) flight simulator, a novel hybrid control strategy of nonlinear PID (proportional... As friction, intrinsic steady-state nonlinearity poses a challenging dilemma to the control system of 3-DOF (three degree of freedom) flight simulator, a novel hybrid control strategy of nonlinear PID (proportionalintegral-derivative) with additional FFC (feed-forward controller) is proposed, and the hardware-in-the-loop simulation results are also given. Based on the description of 3-DOF flight simulator, a novel nonlinear PID theory is well introduced. Then a nonlinear PID controller with additional FFC is designed. Subsequently, the loop structure of 3-DOF flight simulator is also designed. Finally, a series of hardware-in-the-loop simulation experiments are undertaken to verify the feasibility and effectiveness of the proposed nonlinear PID controller with additional FFC for 3-DOF flight simulator. 展开更多
关键词 flight simulator nonlinear PID FFC hardware-in-the-loop.
下载PDF
Wavelet Denoising Applied to Hardware Redundant Systems for Rolling Element Bearing Fault Detection 被引量:1
6
作者 Dustin Helm Markus Timusk 《Journal of Dynamics, Monitoring and Diagnostics》 2023年第2期133-143,共11页
This work presents a novel wavelet-based denoising technique for improving the signal-to-noise ratio(SNR)of nonsteady vibration signals in hardware redundant systems.The proposed method utilizes the relationship betwe... This work presents a novel wavelet-based denoising technique for improving the signal-to-noise ratio(SNR)of nonsteady vibration signals in hardware redundant systems.The proposed method utilizes the relationship between redundant hardware components to effectively separate fault-related components from the vibration signature,thus enhancing fault detection accuracy.The study evaluates the proposed technique on two mechanically identical subsystems that are simultaneously controlled under the same speed and load inputs,with and without the proposed denoising step.The results demonstrate an increase in detection accuracy when incorporating the proposed denoising method into a fault detection system designed for hardware redundant machinery.This work is original in its application of a new method for improving performance when using residual analysis for fault detection in hardware redundant machinery configurations.Moreover,the proposed methodology is applicable to nonstationary equipment that experiences changes in both speed and load. 展开更多
关键词 fault detection hardware redundancy VIBRATION wavelet denoising
下载PDF
Treatment and Hardware Removal after Lisfranc Injury: A Narrative Review
7
作者 Prasenjit Saha Matthew Smith Khalid Hasan 《Open Journal of Orthopedics》 2023年第12期501-508,共8页
Lisfranc injuries can be difficult injuries to identify and treat, while also being the subject of significant debate on proper surgical management. A narrative literature review was performed using Pubmed and Google ... Lisfranc injuries can be difficult injuries to identify and treat, while also being the subject of significant debate on proper surgical management. A narrative literature review was performed using Pubmed and Google Scholar databases to identify recent studies evaluating open reduction internal fixation vs primary arthrodesis for Lisfranc injuries to further elucidate optimal surgical management. Additional focus was placed removal of hardware after ORIF to identify the need for routine hardware removal as an additional surgery may guide surgeon decision-making. This review showed inconclusive data on the superiority of ORIF vs arthrodesis, as multiple conflicting results exist, though established that functional results are similar between these options. Though both are generally accepted treatment options, there are no well-designed randomized controlled trials directly comparing the two. Retention of hardware after ORIF has been shown to be tolerated, though there is a significant risk of the need for unplanned removal due to pain and hardware breakage. 展开更多
关键词 LISFRANC Fixation Type hardware Removal hardware Retention
下载PDF
FPGA based hardware platform for trapped-ion-based multi-level quantum systems
8
作者 朱明东 闫林 +3 位作者 秦熙 张闻哲 林毅恒 杜江峰 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第9期42-50,共9页
We report a design and implementation of a field-programmable-gate-arrays(FPGA)based hardware platform,which is used to realize control and signal readout of trapped-ion-based multi-level quantum systems.This platform... We report a design and implementation of a field-programmable-gate-arrays(FPGA)based hardware platform,which is used to realize control and signal readout of trapped-ion-based multi-level quantum systems.This platform integrates a four-channel 2.8 Gsps@14 bits arbitrary waveform generator,a 16-channel 1 Gsps@14 bits direct-digital-synthesisbased radio-frequency generator,a 16-channel 8 ns resolution pulse generator,a 10-channel 16 bits digital-to-analogconverter module,and a 2-channel proportion integration differentiation controller.The hardware platform can be applied in the trapped-ion-based multi-level quantum systems,enabling quantum control of multi-level quantum system and highdimensional quantum simulation.The platform is scalable and more channels for control and signal readout can be implemented by utilizing more parallel duplications of the hardware.The hardware platform also has a bright future to be applied in scaled trapped-ion-based quantum systems. 展开更多
关键词 FPGA hardware platform trapped-ion multi-level quantum system
下载PDF
List-Serial Pipelined Hardware Architecture for SCL Decoding of Polar Codes
9
作者 Zhongxiu Feng Cong Niu +3 位作者 Zhengyu Zhang Jiaxi Zhou Daiming Qu Tao Jiang 《China Communications》 SCIE CSCD 2023年第3期175-184,共10页
For polar codes,the performance of successive cancellation list(SCL)decoding is capable of approaching that of maximum likelihood decoding.However,the existing hardware architectures for the SCL decoding suffer from h... For polar codes,the performance of successive cancellation list(SCL)decoding is capable of approaching that of maximum likelihood decoding.However,the existing hardware architectures for the SCL decoding suffer from high hardware complexity due to calculating L decoding paths simultaneously,which are unfriendly to the devices with limited logical resources,such as field programmable gate arrays(FPGAs).In this paper,we propose a list-serial pipelined hardware architecture with low complexity for the SCL decoding,where the serial calculation and the pipelined operation are elegantly combined to strike a balance between the complexity and the latency.Moreover,we employ only one successive cancellation(SC)decoder core without L×L crossbars,and reduce the number of inputs of the metric sorter from 2L to L+2.Finally,the FPGA implementations show that the hardware resource consumption is significantly reduced with negligible decoding performance loss. 展开更多
关键词 successive cancellation list decoding po-lar codes hardware implementation pipelined archi-tecture
下载PDF
School Culture Educating People: Realization Path and Action Mechanism
10
作者 Chuanxing Liu 《Open Journal of Applied Sciences》 CAS 2023年第3期321-326,共6页
Culture is the core of education and the proper meaning of education. Exploring the realization path and function mechanism of school culture education is a major task for educators at present and in the future. Then,... Culture is the core of education and the proper meaning of education. Exploring the realization path and function mechanism of school culture education is a major task for educators at present and in the future. Then, the current academic research started late, had few achievements and was relatively broad and weak. The article believes that the mechanism of school culture educating people includes three fields: “cultural field”, “cultivation field” and “education field”. School teachers and students should be guided to make cultural choices, consciously transform school culture into personal culture, and achieve the purpose of school culture educating people. 展开更多
关键词 Document Education realization Path Action Mechanism
下载PDF
Exploiting the Direct Link in IRS Assisted NOMA Networks with Hardware Impairments
11
作者 Ziwei Liu Xinwei Yue +3 位作者 Shuo Chen Xuliang Liu Yafei Wang Wanwei Tang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期767-785,共19页
Hardware impairments(HI)are always present in low-cost wireless devices.This paper investigates the outage behaviors of intelligent reflecting surface(IRS)assisted non-orthogonal multiple access(NOMA)networks by takin... Hardware impairments(HI)are always present in low-cost wireless devices.This paper investigates the outage behaviors of intelligent reflecting surface(IRS)assisted non-orthogonal multiple access(NOMA)networks by taking into account the impact of HI.Specifically,we derive the approximate and asymptotic expressions of the outage probability for the IRS-NOMA-HI networks.Based on the asymptotic results,the diversity orders under perfect self-interference cancellation and imperfect self-interference cancellation scenarios are obtained to evaluate the performance of the considered network.In addition,the system throughput of IRS-NOMA-HI is discussed in delay-limited mode.The obtained results are provided to verify the accuracy of the theoretical analyses and reveal that:1)The outage performance and system throughput for IRS-NOMA-HI outperforms that of the IRS-assisted orthogonal multiple access-HI(IRS-OMA-HI)networks;2)The number of IRS elements,the pass loss factors,the Rician factors,and the value of HI are pivotal to enhancing the performance of IRS-NOMAHI networks;and 3)It is recommended that effective methods of reducing HI should be used to ensure system performance,in addition to self-interference cancellation techniques. 展开更多
关键词 hardware impairments imperfect SIC intelligent reflecting surface non-orthogonal multiple access outage probability
下载PDF
System Outage Probability and Diversity Analysis of a SWIPT Based Two-Way DF Relay Network Under Transceiver Hardware Impairments
12
作者 Guangyue Lu Zhipeng Liu +1 位作者 Yinghui Ye Xiaoli Chu 《China Communications》 SCIE CSCD 2023年第10期120-135,共16页
This paper investigates the system outage performance of a simultaneous wireless information and power transfer(SWIPT)based two-way decodeand-forward(DF)relay network,where potential hardware impairments(HIs)in all tr... This paper investigates the system outage performance of a simultaneous wireless information and power transfer(SWIPT)based two-way decodeand-forward(DF)relay network,where potential hardware impairments(HIs)in all transceivers are considered.After harvesting energy and decoding messages simultaneously via a power splitting scheme,the energy-limited relay node forwards the decoded information to both terminals.Each terminal combines the signals from the direct and relaying links via selection combining.We derive the system outage probability under independent but non-identically distributed Nakagami-m fading channels.It reveals an overall system ceiling(OSC)effect,i.e.,the system falls in outage if the target rate exceeds an OSC threshold that is determined by the levels of HIs.Furthermore,we derive the diversity gain of the considered network.The result reveals that when the transmission rate is below the OSC threshold,the achieved diversity gain equals the sum of the shape parameter of the direct link and the smaller shape parameter of the terminalto-relay links;otherwise,the diversity gain is zero.This is different from the amplify-and-forward(AF)strategy,under which the relaying links have no contribution to the diversity gain.Simulation results validate the analytical results and reveal that compared with the AF strategy,the SWIPT based two-way relaying links under the DF strategy are more robust to HIs and achieve a lower system outage probability. 展开更多
关键词 decode-and-forward relay diversity gain hardware impairments simultaneous wireless information and power transfer system outage probability
下载PDF
Temperature-Triggered Hardware Trojan Based Algebraic Fault Analysis of SKINNY-64-64 Lightweight Block Cipher
13
作者 Lei Zhu Jinyue Gong +1 位作者 Liang Dong Cong Zhang 《Computers, Materials & Continua》 SCIE EI 2023年第6期5521-5537,共17页
SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a v... SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a variety of ways,but it is still difficult to achieve a precisely located fault attacks at a low cost,whereas a Hardware Trojan(HT)can realize this.Temperature,as a physical quantity incidental to the operation of a cryptographic device,is easily overlooked.In this paper,a temperature-triggered HT(THT)is designed,which,when activated,causes a specific bit of the intermediate state of the SKINNY-64-64 to be flipped.Further,in this paper,a THT-based algebraic fault analysis(THT-AFA)method is proposed.To demonstrate the effectiveness of the method,experiments on algebraic fault analysis(AFA)and THT-AFA have been carried out on SKINNY-64-64.In the THT-AFA for SKINNY-64-64,it is only required to activate the THT 3 times to obtain the master key with a 100%success rate,and the average time for the attack is 64.57 s.However,when performing AFA on this cipher,we provide a relation-ship between the number of different faults and the residual entropy of the key.In comparison,our proposed THT-AFA method has better performance in terms of attack efficiency.To the best of our knowledge,this is the first HT attack on SKINNY-64-64. 展开更多
关键词 SKINNY-64-64 lightweight block cipher algebraic fault analysis hardware Trojan residual entropy
下载PDF
Moderate scale and realization potential of new citrus-planting business entities in hilly and mountainous areas in China
14
作者 ZHANG Xuan-yun ZHANG Shi-chao +3 位作者 LIU Jing-yu RAN Na ZHANG Xiang NING Qi-wen 《Journal of Mountain Science》 SCIE CSCD 2023年第8期2315-2343,共29页
The natural and economic conditions of agricultural resources vary greatly in China,especially in hilly and mountainous areas.The phenomenon of land fragmentation has become increasingly prominent,so that large-scale ... The natural and economic conditions of agricultural resources vary greatly in China,especially in hilly and mountainous areas.The phenomenon of land fragmentation has become increasingly prominent,so that large-scale operations cannot be fully achieved in a short period of time,and the centralized and continuous scale of operations cannot be realized in China.In addition,with increasingly strict farmland protection and agricultural land use control systems,the issues of nongrain production and nonagricultural cultivated land use have become increasingly restricted.Thus,it is quite necessary to determine the appropriate scale of operations and the means to achieve moderately scaled operations for the new business entities.On the basis of microsurvey data for 108 new citrus-planting business entities in the modern agricultural park in the Chongqing's Jiangjin District,an area with long citrus-planting history,we measured the moderate scale of new citrus-planting business entities to maximize profit using a translog growth model.According to the projection pursuit model,we evaluated the suitability conditions of citrus planting in garden land,woodland,grassland,and general cultivated land in the study area.We then explored the potential for new moderate-scale business entities within different farming radii.The results showed that large-scale planting conditions of citrus in garden land,forest land,grassland,and general cultivated land in the study area were suitable,and the proportion of high-suitable and mediumsuitable land was 73.42%.Under the existing social and economic conditions,the moderate scale of new citrus-planting business entities in the study area was 1.8–2.7 hm^(2).In particular,its rankings from large to small were agricultural enterprises(17.19–25.78 hm^(2)),farmer cooperatives(16.88–25.33 hm^(2)),big growers and breeders(6.39–9.59 hm^(2)),and family farms(5.02–7.53 hm^(2)).In the sample of 108 households,only 47.22%of the entities achieved moderate-scale operation,of which 25%of the entities achieved a scale greater than moderate operation.However,52.78%of the entities achieved a scale of less than moderate operation.These entities would have to transfer the surrounding adjacent garden land,forest land,grassland,or general cultivated land to achieve largescale land management.The land area of the adjacent gardens in a 1000 m farming radius could meet the moderate-scale operation demand of the vast majority of new business entities.For the vast majority of new business entities,the land area of the adjacent woodland,grassland,and general cultivated land could supplement the garden land to achieve moderate-scale operation in a 500 m farming radius.If the land area with moderate suitability and high suitability is prioritized,the land area in the adjacent gardens in the 1000 m farming radius could meet the moderate-scale operation demand for the vast majority of new business entities.Within the 500 m farming radius,the vast majority of new business entities have achieved moderate-scale operations if the land area adjacent to forest land,grassland,and general arable land was supplemented by gardens;however,a few entities could not achieve moderate-scale operations.From the village perspective,gardens were prioritized.Sixteen villages had planting areas and planting suitability that exceeded the average level of the study area,accounting for 23.53%.If combined with the reserve potential of the garden land,eight villages could improve their potential,accounting for 11.76%.Therefore,the conditions of large-scale citrus planting in the study area should be further improved,and the scale expansion of new citrus-planting business entities should receive additional scientific guidance. 展开更多
关键词 Land management Hilly and mountainous areas Agricultural business entities Moderate operation scale Agricultural land resources Realizing potential
下载PDF
Landscape Aesthetic Characteristics of Wulingyuan World Natural Heritage Property and Realization Path of Aesthetic Education Value
15
作者 LUO Shui XIAO Hua XIAO Shizhen 《Journal of Landscape Research》 2023年第5期79-84,88,共7页
Wulingyuan is a world natural heritage property mainly dominated by rare quartz sandstone peak forest landscape at home and abroad and supplemented by karst landscapes,with a large number of geological and historical ... Wulingyuan is a world natural heritage property mainly dominated by rare quartz sandstone peak forest landscape at home and abroad and supplemented by karst landscapes,with a large number of geological and historical sites,biological and ecological landscape and unique cultural landscapes.Preserving the secluded and beautiful scenery environment,biological environment and ecosystem of subtropical zone,Wulingyuan presents a splendid and magnificent landscape,with high aesthetic value,and becomes an important practice base of aesthetic education.The aesthetic education value of Wulingyuan World Natural Heritage Property can be realized by systematically studying and presenting the aesthetic education value of Wulingyuan World Natural Heritage Property,developing a series of aesthetic education courses to lead tourists into the world of Wulingyuan aesthetic education,carrying out a series of popular science activities of“Wulingyuan World Natural Heritage Property Entering Campus”,and incorporating into the aesthetic education curriculum system of schools,etc.This paper analyzes the landscape aesthetic characteristics of Wulingyuan World Natural Heritage Property thoroughly,which indicates the direction for realizing the aesthetic education value of the property,and also provides a reference for realizing the aesthetic education value of similar world natural heritage property. 展开更多
关键词 World natural heritage property Landscape aesthetic characteristics Aesthetic education value realization path Wulingyuan
下载PDF
Hardware Security for IoT in the Quantum Era: Survey and Challenges
16
作者 Doudou Dione Boly Seck +3 位作者 Idy Diop Pierre-Louis Cayrel Demba Faye Ibrahima Gueye 《Journal of Information Security》 2023年第4期227-249,共23页
The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera security systems, etc. are developing s... The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera security systems, etc. are developing services that rely on an IoT infrastructure. Thus, ensuring the security of devices during operation and information exchange becomes a fundamental requirement inherent in providing safe and reliable IoT services. NIST requires hardware implementations that are protected against SCAs for the lightweight cryptography standardization process. These attacks are powerful and non-invasive and rely on observing the physical properties of IoT hardware devices to obtain secret information. In this paper, we present a survey of research on hardware security for the IoT. In addition, the challenges of IoT in the quantum era with the first results of the NIST standardization process for post-quantum cryptography are discussed. 展开更多
关键词 IOT hardware Security Side-Channel Attacks Post-Quantum Cryptography NIST
下载PDF
Secrecy Outage Probability for Two-Way Integrated Satellite Unmanned Aerial Vehicle Relay Networks with Hardware Impairments
17
作者 Xiaoting Ren Kefeng Guo 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第6期2515-2530,共16页
In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy... In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis. 展开更多
关键词 Integrated satellite unmanned aerial vehicle relay networks two-way unmanned aerial vehicle relay hardware impairments secrecy outage probability(SOP) asymptotic SOP
下载PDF
中国式现代化背景下县域城镇化的困境、实现逻辑与路径选择 被引量:5
18
作者 周加来 张晓凡 周慧 《区域经济评论》 北大核心 2024年第1期99-110,共12页
城镇化是现代化的必由之路。深入剖析县域城镇化与中国式现代化的内在逻辑,探究中国式现代化背景下县域城镇化的困境、实现逻辑和路径选择是探索城镇化道路、推进中国式现代化建设的工作重点。研究显示:第一,县域城镇化在中国式现代化... 城镇化是现代化的必由之路。深入剖析县域城镇化与中国式现代化的内在逻辑,探究中国式现代化背景下县域城镇化的困境、实现逻辑和路径选择是探索城镇化道路、推进中国式现代化建设的工作重点。研究显示:第一,县域城镇化在中国式现代化历程中演进,其演进过程与我国经济发展战略密切相关。第二,新时期推进县域城镇化发展需要认清理论误区、破除现实困境。认清理论误区在于既要更新县域城镇化概念,辨析城市化、农村城市化、城镇化和县域城镇化的区别与联系,也要坚持县域工业化发展,避免县域工业化与发展特色经济混淆。破除现实困境在于,一是破除县域城镇化区域发展不平衡困境,收敛区域差异;二是破除中西部县域产业承接能力不强,产业结构趋同困境;三是破除县域人口结构失衡、教育养老资源供需失衡困境。第三,中国式现代化特征决定了县域城镇化的实现逻辑,体现在人口规模巨大化意味着县域城镇化面临人口优势和结构失衡,全体人民共同富裕要求县域城镇化以人为核心,物质文明和精神文明相协调要求县域城镇化重视物质和精神建设,人与自然和谐共生要求县域城镇化坚持绿色发展。第四,县域城镇化的实现路径包括制度保障、新型工业化发展、人口和服务供需均衡、文化传承和绿色发展五个方面。 展开更多
关键词 县域城镇化 中国式现代化 县域经济 实现逻辑
下载PDF
水价值的系统发现和全面实现 被引量:3
19
作者 谷树忠 《中国水利》 2024年第3期8-12,56,共6页
水在经济社会发展和生态文明建设中具有极其重要的作用和价值。目前,全社会对水价值的认识尚不充分,水价值实现亦不充分,迫切需要系统发现和全面实现水的价值。分析了水价值的内涵,刻画了水价值的多元性、空间差异性、时间变异性、可测... 水在经济社会发展和生态文明建设中具有极其重要的作用和价值。目前,全社会对水价值的认识尚不充分,水价值实现亦不充分,迫切需要系统发现和全面实现水的价值。分析了水价值的内涵,刻画了水价值的多元性、空间差异性、时间变异性、可测性与可控性等基本特征,从资源安全、生态安全、经济安全、粮食安全、能源安全等方面解析了系统发现水价值的多个维度,并提出全面实现水价值的建议。 展开更多
关键词 价值 水价值实现 水价值发现 生态产品价值实现
下载PDF
基于地质和自然环境背景的国家公园生态产品价值实现路径研究 被引量:1
20
作者 马俊杰 程捷 +1 位作者 刘晓鸿 孙洪艳 《地学前缘》 EI CAS CSCD 北大核心 2024年第3期458-469,共12页
中国设立国家公园是在生物多样保护方面做出的重要举措。如何使国家公园高质量、稳步发展,其中重要的途径是充分发挥国家公园内的生态产品价值,服务社会,促进自然资源保护利用的良性循环,因此对生态产品价值实现路径的研究具有重要意义... 中国设立国家公园是在生物多样保护方面做出的重要举措。如何使国家公园高质量、稳步发展,其中重要的途径是充分发挥国家公园内的生态产品价值,服务社会,促进自然资源保护利用的良性循环,因此对生态产品价值实现路径的研究具有重要意义。本文通过分析第一批5个国家公园(三江源国家公园、大熊猫国家公园、东北虎豹国家公园、武夷山国家公园和海南热带雨林国家公园)地质和自然背景的特征以及自然资源的构成,探讨自然资源与生态产品的密切关系。根据人工的干扰程度,本文把生态产品分为自然生态产品、半自然生态产品和人工生态产品。以陆地水资源为例,分析了影响生态产品价值的主要因素以及自然资源转换为不同的生态产品类型。依据生态产品的特性,提出了其价值实现的三级路径和方式,分析了具有不同地质和自然背景的国家公园的生态产品价值实现路径的差异。 展开更多
关键词 国家公园 地质背景 生态产品价值 实现路径 影响因素
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部