期刊文献+
共找到25篇文章
< 1 2 >
每页显示 20 50 100
遏制“伪机”祸害移动电话网
1
作者 沙新 《瞭望》 北大核心 1996年第14期10-11,共2页
近几年,随着我国移动通信事业的发展,盗取移动电话(俗称“大哥大”)号码,非法复制、倒买、使用移动电话“伪机”的案件在全国各地呈逐年上升趋势,部分地区已经到了十分猖獗的地步。为此,邮电部门和移动电话用户蒙受了重大的经济损失。... 近几年,随着我国移动通信事业的发展,盗取移动电话(俗称“大哥大”)号码,非法复制、倒买、使用移动电话“伪机”的案件在全国各地呈逐年上升趋势,部分地区已经到了十分猖獗的地步。为此,邮电部门和移动电话用户蒙受了重大的经济损失。据悉。 展开更多
关键词 “伪机” 移动电话 移动通信 非法复制 移动电话用户 大哥大 武汉市 电话手 犯罪行为
原文传递
严打盗码并机贼
2
作者 薛兴华 《邮电商情》 1996年第21期24-26,共3页
近几年,盗取移动电话号码,非法复制、倒买、使用的“烧机”案在全国各地呈逐年上升趋势,部分地区已经到了十分猖獗的地步。浙江省长、广东惠州市政协副主席的移动电话曾被多次“烧”,深圳市一位副市长的手机竟被6部“烧机”盗用,一个月... 近几年,盗取移动电话号码,非法复制、倒买、使用的“烧机”案在全国各地呈逐年上升趋势,部分地区已经到了十分猖獗的地步。浙江省长、广东惠州市政协副主席的移动电话曾被多次“烧”,深圳市一位副市长的手机竟被6部“烧机”盗用,一个月的通话费多达十几万。由于众多移动电话被并机,造成用户投诉多、怨言多、拒交电话费多,仅深圳市用户拒交的移动电话费就达1000多万元。 展开更多
关键词 移动电话 “伪机” 行政法律责任 合法用户 电话号码 通话费 电话费 大哥大 用户投诉
下载PDF
10 Gbit/s PRBS tester implemented in FPGA 被引量:1
3
作者 苗澎 王志功 《Journal of Southeast University(English Edition)》 EI CAS 2007年第4期516-519,共4页
The design of an FPGA( field programmable gate array) based programmable SONET (synchronous optical network) OC-192 10 Gbit/s PRBS (pseudo-random binary sequence) generator and a bit interleaved polarity 8 (BI... The design of an FPGA( field programmable gate array) based programmable SONET (synchronous optical network) OC-192 10 Gbit/s PRBS (pseudo-random binary sequence) generator and a bit interleaved polarity 8 (BIP-8) error detector is presented. Implemented in a parallel feedback configuration, this tester features PRBS generation of sequences with bit lengths of 2^7 - 1,2^10- 1,2^15 - 1,2^23 - land 2^31 - 1 for up to 10 Gbit/s applications with a 10 Gbit/s optical transceiver, via the SFI-4 (OC-192 serdes-framer interface). In the OC-192 frame alignment circuit, a dichotomy search algorithm logic which performs the functions of word alignment and STM-64/OC192 de-frame speeds up the frame sync logic and reduces circuit complexity greatly. The system can be used as a low cost tester to evaluate the performance of OC-192 devices and components, taking the replacement of precious commercial PRBS testers. 展开更多
关键词 bit interleaved polarity 8 BIP-8 synchronous digital hierarchy SDH FRAMER field programmable gate array (FPGA) pseudo-random binary sequence (PRBS)
下载PDF
门铃兼作电话防盗报警器
4
作者 张义方 《企业科技与发展》 1998年第4期20-20,共1页
本文介绍的电话防盗报警器是由普通电子门铃改制而成的。它既不损坏原来门铃的功效,又可对其功能进行扩展。该报警器具有电路简单、取材方便、易装易调、实用安全等特点。有兴趣的读者不妨撷而试之,定会取得意想不到的实际效果。
关键词 防盗报警器 “伪机” 电话线路 具有电路简单 门铃开关 电压检测器 实际效果 印刷线路板 高电平 晶体三极管
下载PDF
PERFECT PUNCTURED BINARY SEQUENCE PAIRS 被引量:15
5
作者 JiangTing ZhaoXiaoqun HouLantian 《Journal of Electronics(China)》 2003年第4期285-288,共4页
This paper presents the definition of perfect punctured binary sequence pair and the combinatorial admissible conditions for searching the perfect punctured binary sequence pairs and proves that all of the pseudo-rand... This paper presents the definition of perfect punctured binary sequence pair and the combinatorial admissible conditions for searching the perfect punctured binary sequence pairs and proves that all of the pseudo-random binary sequences satisfy these conditions. Computer calculation verifies that the pseudo-random binary sequences with length up to N=127 can be easily turned into perfect punctured binary sequence pairs. 展开更多
关键词 Information theory Perfect sequences CODES Pseudo-random binary sequence
下载PDF
Energy distribution and effective components analysis of 2^(n) sequence pseudo-random signal 被引量:5
6
作者 Yang YANG Ji-shan HE Di-quan LI 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2021年第7期2102-2115,共14页
In order to extract usable harmonics from real 2^(n) sequence pseudo-random data,a technical method is proposed.An equation for predicting the average amplitude of the main frequencies is proposed to guide the choice ... In order to extract usable harmonics from real 2^(n) sequence pseudo-random data,a technical method is proposed.An equation for predicting the average amplitude of the main frequencies is proposed to guide the choice of signal type for different exploration tasks.By the threshold of the amplitude of the transmitted signal,a set of candidate frequencies are first selected.Then,by operating a spectrum envelope method at these candidate frequencies on received data,effective components in data are extracted.A frequency density calculation method is proposed based on a logical number summation method,to reasonably characterize the frequency density in different frequency bands.By applying this method to real data in Sichuan,China,with signal Type 13,75 effective components are extracted,including both main frequencies and harmonics.The result suggests that the number of effective frequencies in the 2^(n) sequence pseudo-random signal can be increased by extracting usable harmonics,without any additional fieldwork. 展开更多
关键词 electromagnetic prospecting 2^(n) pseudo-random signal energy conservation harmonic extraction frequency density
下载PDF
Distributed wide field electromagnetic method based on high-order 2^(n) sequence pseudo random signal 被引量:3
7
作者 Yang YANG Ji-shan HE +1 位作者 Fan LING Yu-zhen ZHU 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2022年第5期1609-1622,共14页
To make three-dimensional electromagnetic exploration achievable,the distributed wide field electromagnetic method(WFEM)based on the high-order 2^(n) sequence pseudo-random signal is proposed and realized.In this meth... To make three-dimensional electromagnetic exploration achievable,the distributed wide field electromagnetic method(WFEM)based on the high-order 2^(n) sequence pseudo-random signal is proposed and realized.In this method,only one set of high-order pseudo-random waveforms,which contains all target frequencies,is needed.Based on high-order sequence pseudo-random signal construction algorithm,the waveform can be customized according to different exploration tasks.And the receivers are independent with each other and dynamically adjust the acquisition parameters according to different requirements.A field test in the deep iron ore of Qihe−Yucheng showed that the distributed WFEM based on high-order pseudo-random signal realizes the high-efficiency acquisition of massive electromagnetic data in quite a short time.Compared with traditional controlled-source electromagnetic methods,the distributed WFEM is much more efficient.Distributed WFEM can be applied to the large scale and high-resolution exploration for deep resources and minerals. 展开更多
关键词 distributed wide field electromagnetic method(WFEM) high-order pseudo-random signal MULTIFREQUENCY massive data
下载PDF
Design of intelligent distinguishing system for slot machine based on PLC
8
作者 王春常 顾强 安晓红 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2015年第4期368-372,共5页
Due to the emergence of a large number of counterfeit notes and incomplete coins in the slot machine of self-service bus, to improve the automization of intelligent slot machine, based on multi-sensor testing technolo... Due to the emergence of a large number of counterfeit notes and incomplete coins in the slot machine of self-service bus, to improve the automization of intelligent slot machine, based on multi-sensor testing technology, using programming log- ic controller (PLC) as the core of the whole system, the PLC hardware design and software design are accomplished for the first time to detect the counterfeit notes and coins. The system was tested by many groups of experiments. The results show that the system has reliable recognition rate, good flexibility and stability, reaching the accuracy of 97%. 展开更多
关键词 intelligent slot machine distinguishing system programming logic controller (PLC)
下载PDF
Application of pseudo-random frequency domain electromagnetic method in mining areas with strong interferences 被引量:5
9
作者 Yan-fang HU Di-quan LI +2 位作者 Bo YUAN Guang-yun SUO Zi-jie LIU 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2020年第3期774-788,共15页
Due to the strong electromagnetic interferences and human interference,traditional electromagnetic methods cannot obtain high quality resistivity data of mineral deposits in Chinese mines.The wide field electromagneti... Due to the strong electromagnetic interferences and human interference,traditional electromagnetic methods cannot obtain high quality resistivity data of mineral deposits in Chinese mines.The wide field electromagnetic method(WFEM),in which the pseudo-random signal is taken as the transmitter source,can extract high quality resistivity data in areas with sever interference by only measuring the electric field component.We use the WFEM to extract the resistivity information of the Dongguashan mine in southeast China.Compared with the audio magnetotelluric(AMT)method,and the controlled source audio-frequency magnetotelluric(CSAMT) method,the WFEM can obtain data with higher quality and simpler operations.The inversion results indicate that the WFEM can accurately identify the location of the main ore-body,which can be used for deep mine exploration in areas with strong interference. 展开更多
关键词 pseudo-random signal frequency domain electromagnetic method wide field electromagnetic method(WFEM) strong interference anti-interference capability Dongguashan copper deposit
下载PDF
Pseudo Random Number Generator Based on Back Propagation Neural Network 被引量:3
10
作者 WANG Bang-ju WANG Yu-hua +1 位作者 NIU Li-ping ZHANG Huan-guo 《Semiconductor Photonics and Technology》 CAS 2007年第2期164-168,共5页
Random numbers play an increasingly important role in secure wire and wireless communication. Thus the design quality of random number generator(RNG) is significant in information security. A novel pseudo RNG is propo... Random numbers play an increasingly important role in secure wire and wireless communication. Thus the design quality of random number generator(RNG) is significant in information security. A novel pseudo RNG is proposed for improving the security of network communication. The back propagation neural network(BPNN) is nonlinear, which can be used to improve the traditional RNG. The novel pseudo RNG is based on BPNN techniques. The result of test suites standardized by the U.S shows that the RNG can satisfy the security of communication. 展开更多
关键词 pseudo random number generator(PRNN) random number generator(RNG) back propagation neural network(BPNN)
下载PDF
A Novel Complexity Metric of Frequency Hopping Sequences
11
作者 蔡觉平 宋文涛 罗汉文 《Journal of Shanghai Jiaotong university(Science)》 EI 2004年第1期63-67,共5页
This paper made use of approximate entropy (ApEn) to evaluate the complexities of frequency-hopping (FH) sequences. By defining the maximal randomness of sequences with arbitrary lengths, ApEn can classify different c... This paper made use of approximate entropy (ApEn) to evaluate the complexities of frequency-hopping (FH) sequences. By defining the maximal randomness of sequences with arbitrary lengths, ApEn can classify different complex systems including stochastic processes, deterministic random process and random processes. It modified the conventional ApEn, which is used for continuous data sequence, for the discrete FH sequences. Two important theorems were given and the related main parameters were discussed. The algorithm was tested with several families of FH sequences. The simulation results show that ApEn is able to discern the changing complexities of FH sequences with a relatively small amount of samples of sequences. 展开更多
关键词 frequency hopping (FH) ENTROPY RANDOMNESS CRYPTOGRAPHY
下载PDF
JOINT EARLY DETECTION AND EARLY STOPPING SCHEME FOR COMPLEXITY REDUCTION OF TURBO DECODING
12
作者 Ma Zheng Fan Pingzhi Wai Ho Mow 《Journal of Electronics(China)》 2007年第3期316-320,共5页
In this paper,a Joint Early Detection and Early Stopping (JEDES) approach for effectively reducing the complexity of turbo decoding with negligible performance loss is proposed. It combines the effectiveness of both e... In this paper,a Joint Early Detection and Early Stopping (JEDES) approach for effectively reducing the complexity of turbo decoding with negligible performance loss is proposed. It combines the effectiveness of both early detection and early stopping techniques. Our simulation results demon-strated that the proposed JEDES scheme based on cyclic redundancy check and trellis splicing can achieve a complexity saving of 15% to 20% at practical bit error rates over the idealized GENIE stopping scheme,which is widely accepted as the theoretically best possible early stopping scheme. 展开更多
关键词 Stopping criterion Turbo codes Early detection THRESHOLD Trellis splicing
下载PDF
AUTOCORRELATIONS OF l-SEQUENCES WITH CERTAIN SHIFTS
13
作者 Xu Hong Qi Wenfeng 《Journal of Electronics(China)》 2007年第4期439-442,共4页
In this paper, the autocorrelations of maximal period Feedback with Carry Shift Register sequences (l-sequences) are discussed. For an l-sequence a with connection integer q = p^e(e ≥ 2) and period T = p^t-1(p- ... In this paper, the autocorrelations of maximal period Feedback with Carry Shift Register sequences (l-sequences) are discussed. For an l-sequence a with connection integer q = p^e(e ≥ 2) and period T = p^t-1(p- 1), and for any integer i, 1 ≤ i ≤ e/2, by calculating the number of certain sets, it is shown that the autocorrelation of a with shift τ= kT/2p^i is Ca(τ) =(-1)^k-1 T/p^2i-1, where 1 ≤ k ≤ 2p^i - 1, and gcd(k,2p^i) = 1. This result shows there do exist some shifts such that the autocorrelations of l-sequences are high although most autocorrelations are low. Such result also holds for the decimations of l-sequences. 展开更多
关键词 Pseudorandom sequences l-sequences Feedback with Carry Shift Register (FCSR) sequences AUTOCORRELATIONS
下载PDF
Bi-directional Secure Communication Based on Discrete Chaotic Synchronization
14
作者 LONG Min QIU Shui-Sheng PENG Fei 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第6期1076-1080,共5页
Discrete chaotic systems are used for bi-directlonal secure communication. Both sides of communication keep sending signals to achieve their synchronization, and then recover the messages. However, the third side with... Discrete chaotic systems are used for bi-directlonal secure communication. Both sides of communication keep sending signals to achieve their synchronization, and then recover the messages. However, the third side without keys cannot get useful information. Known-plaintext attack is also engaged to analyze this method, and the simulation results show that the proposed method can reach high security performance. 展开更多
关键词 bi-directional secure communication discrete chaotic synchronization
下载PDF
Adding Pseudo-Random Test Sequence Generator in the Test Simulator for DFT Approach
15
作者 Afaq Ahmad Dawood Al-Abri Sayyid Samir AI-Busaidi 《Computer Technology and Application》 2012年第7期463-470,共8页
This paper presents modified version of a realistic test tool suitable to Design For Testability (DFT) and Built-ln Self Test (BIST) environments. A comprehensive tool is developed in the form of a test simulator.... This paper presents modified version of a realistic test tool suitable to Design For Testability (DFT) and Built-ln Self Test (BIST) environments. A comprehensive tool is developed in the form of a test simulator. The simulator is capable of providing a required goal of test for the Circuit Under Test (CUT). The simulator uses the approach of fault diagnostics with fault grading procedures to provide the optimum tests. The current version of the simulator embeds features of exhaustive and pseudo-random test generation schemes along with the search solutions of cost effective test goals. The simulator provides facilities of realizing all possible pseudo-random sequence generators with all possible combinations of seeds. The tool is developed on a common Personal Computer (PC) platform and hence no special software is required. Thereby, it is a low cost tool hence economical. The tool is very much suitable for determining realistic test sequences for a targeted goal of testing for any CUT. The developed tool incorporates flexible Graphical User Interface (GUI) procedures and can be operated without any special programming skill. The tool is debugged and tested with the results of many bench mark circuits. Further, this developed tool can be utilized for educational purposes for many courses such as fault-tolerant computing, fault diagnosis, digital electronics, and safe-reliable-testable digital logic designs. 展开更多
关键词 Digital system testing built-in self test design for testability test vector pseudo-random test sequence linear feedbackshift registers fault diagnosis fault collapsing realistic test fault cover iteration.
下载PDF
Angle-Threshold Random Beamforming Scheme for Multi-Antenna System
16
作者 HU Hao LIU Xiaomin YANG Hongwen 《China Communications》 SCIE CSCD 2015年第1期1-10,共10页
Codebook-based multiple input multiple output(MIMO) beamforming can significantly improve the system spectral efficiency with limited feedback and gets widely adopted.However,this scheme has a drawback of heavy feedba... Codebook-based multiple input multiple output(MIMO) beamforming can significantly improve the system spectral efficiency with limited feedback and gets widely adopted.However,this scheme has a drawback of heavy feedback load that the sum feedback rate can be a bottleneck for the communication system,especially when the number of users is large.In this paper,a new scheme using pseudo-random beamforming vectors and angle based threshold in the feedback process is proposed.In the proposed scheme,both the base-station and the users have no need to store a codebook.In each access procedure,the base-station generates a pseudo-random beamforming vector,and each user calculates the angle between the beamforming vectors and its channel state information(CSI) vector.If the angle is less than a predefined angle-threshold,the user feeds back its channel quality indicators(CQI),otherwise it keep silence.Compared with the codebook based scheme,the proposed scheme can largely reduce the sum feedback rate with negligible throughput loss.In particular,when the system has a constraint on the total sum feedback rate in uplink channel,the proposed scheme can increase the system throughput significantly. 展开更多
关键词 BEAMFORMING feedback load system throughput random code anglethreshold.
下载PDF
An improved method of generating the self-balanced chaotic spread-spectrum code
17
作者 安勇 Mu Rongzeng Cao Xiaolin Yan Yuepeng 《High Technology Letters》 EI CAS 2011年第1期46-51,共6页
An improved method of generating the self-balanced chaotic spread-spectrum code is presented. The chaotic-map pseudorandom sequence is used as the generated source. After a series of processing two-valued quantization... An improved method of generating the self-balanced chaotic spread-spectrum code is presented. The chaotic-map pseudorandom sequence is used as the generated source. After a series of processing two-valued quantization, inversion, all upside down, radix-S block upside down and shift combination, the proposed code is achieved. Theory analysis and simulation performance of the improved code are illustrated. And the results indicate that the suggested method gains a better performance than the traditional one by reasonable choices of the initial value and the S parameter in the im- proved method. Meanwhile the chaotic sequence' s characteristic of large addresses is inherited when the chaotic-map is used as the source. This advantage makes this improved code very suitable for the multiple access application in communication system. 展开更多
关键词 spread-spectnun communication chaotic map spread-spectrum code self-balanced
下载PDF
A Pseudo Random Number Generator under Windows Using Refined Descriptive Sampling
18
作者 Latifa Ourbih-Baghdali Megdouda Ourbih-Tari Abdenasser Dahmani 《Computer Technology and Application》 2013年第2期85-92,共8页
In this paper, we propose a software component under Windows that generates pseudo random numbers using RDS (Refined Descriptive Sampling) as required by the simulation. RDS is regarded as the best sampling method a... In this paper, we propose a software component under Windows that generates pseudo random numbers using RDS (Refined Descriptive Sampling) as required by the simulation. RDS is regarded as the best sampling method as shown in the literature. In order to validate the proposed component, its implementation is proposed on approximating integrals. The simulation results from RDS using "RDSRnd" generator were compared to those obtained using the generator "Rnd" included in the Pascal programming language under Windows. The best results are given by the proposed software component. 展开更多
关键词 Random sampling refined descriptive sampling software component SIMULATION integral.
下载PDF
New Pseudorandom Number Generator Artin-Sc hreier Tower for p = 5
19
作者 Song Huiling 《China Communications》 SCIE CSCD 2012年第10期60-67,共8页
The standard method to construct a finite field requires a primitive irreducible polynomial of a given degree. Therefore, it is difficult to apply for the construction of huge finite fields. To avoid this problem, we ... The standard method to construct a finite field requires a primitive irreducible polynomial of a given degree. Therefore, it is difficult to apply for the construction of huge finite fields. To avoid this problem, we propose a new method to construct huge finite fields with the characteristic p = 5 by using an Artin-Schreier tower. Utilizing the recursive basis of the Artin-Schreier tower, we define a nmltiplication algorithm The algorithm can explicitly calculate the multiplication of two elements on the top finite field of this tower, without any primitive element. We also define a linear recurrence equation as an application, which produces a sequence of numbers, and call the new pseudorandom number generator Abstract Syntax Tree (AST) for p = 5. The experircental results show that our new pseudorandom number generator can produce a sequence of numbers with a long period. 展开更多
关键词 finite field pseudorandom number generator AST long period
下载PDF
A NOVEL RESEARCH OF CONFIDENTIAL COMMUNICATION BASED ON THE ELLIPTIC CURVE AND THE COMBINED CHAOTIC MAPPING
20
作者 Gao Chao Liang Dongying Zhou Shanxue 《Journal of Electronics(China)》 2009年第5期706-710,共5页
This letter presents a new type of chaotic encryption system based on combined chaotic mapping pseudo-random number generator, Hash table, and elliptic curve. In this program, the elliptic curve algorithm is used for ... This letter presents a new type of chaotic encryption system based on combined chaotic mapping pseudo-random number generator, Hash table, and elliptic curve. In this program, the elliptic curve algorithm is used for the key distribution. After the linear transformation, the original chaotic sequence generated by drive system will be combined to chaotic mapping, converted to an encryption key sequence and constructed as Hash table for message authentication. The communication experiment used in the letter proves that the combination of combined chaotic encryption and conventional encryption is safe, feasible, and easy to implement by software. 展开更多
关键词 CHAOS Hash algorithm Elliptic curve Chaotic map
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部