期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
STUDY OF MICRO PROCESSOR BASED DISTRIBUTED BUS PROTECTION
1
作者 罗姗姗 贺家李 +1 位作者 周孝信 周孝信 《Transactions of Tianjin University》 EI CAS 1999年第2期3-8,共6页
A new distribution principle of bus protection is presented.The protection system description,its design features,hardware structure,construction of data communication network are given.Dynamic simulation experiments ... A new distribution principle of bus protection is presented.The protection system description,its design features,hardware structure,construction of data communication network are given.Dynamic simulation experiments show its distinguishing advantages over traditional centralized principle. 展开更多
关键词 bus protection data communication digital relaying
下载PDF
读编
2
《中文信息(数字通讯)》 2011年第17期8-8,共1页
iPhone5十月驾临 据天音公司人士透漏,天音总部给各地分公司已下发命令,让各分公司不要把iPhone4给客户库存加太大(天音目前代理iPhone4运作).
关键词 《数字通讯》 电子 读者 编辑
下载PDF
读编
3
作者 黄磊 《中文信息(数字通讯)》 2011年第9期8-8,共1页
《数字通讯》的编辑们好,本人非常关注HTC的消息。期待已久的Incredible S和Desire S最近终于上市了。我非常喜欢,准备暑假时从中选一台入手。
关键词 《数字通讯》 读者 期刊 编辑工作
下载PDF
读编
4
《中文信息(数字通讯)》 2011年第20期8-8,共1页
编辑们好!我提个建议,在淘宝网购买贵刊《数字通讯》,看了一下价格是7元!蛮划算的。不过邮费却要12元!如果在书店买的话才10元.这不怎么好!希望你们能控制一下邮费。这样销量也会增加的!
关键词 读编 编辑 《数字通讯》 山寨机
下载PDF
最长的脐带
5
作者 往往 《中文信息(数字通讯)》 2011年第17期14-14,共1页
记得10岁那年,我是家里有名的乖娃娃。按时上课按时下课,成绩一流而且热爱课外活动,简直挑选不出毛病。
关键词 文学 优秀文章 电子产品 《数字通讯》
下载PDF
选机帮帮看
6
《中文信息(数字通讯)》 2011年第16期111-111,共1页
小编你好,我看“数通”两年多,也算是半个手机迷了。我想问:1苹果iPhone4有锁和无锁有什么差别,不是都能破解么?为什么价格差那么多?2.我是应该买iPhone4代还是再等两月买5代好一些?两者有什么差距?谢谢!谢谢!
关键词 手机 电子产品 《数字通讯》 选机帮帮看
下载PDF
问问吧 啦啦兔的周记
7
《中文信息(数字通讯)》 2011年第16期104-106,共3页
最近身体出了点毛病,只有在这个时候才知道健康的可贵,其实什么金钱、手机、权力啊,在健康面前,都是浮云嘛。在写这段文字的时候,我还在医院,真希望能早点出来!
关键词 啦啦兔 手机 电子产品 《数字通讯》
下载PDF
Bayesian networks modeling for thermal error of numerical control machine tools 被引量:7
8
作者 Xin-hua YAO Jian-zhong FU Zi-chen CHEN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第11期1524-1530,共7页
The interaction between the heat source location, its intensity, thermal expansion coefficient, the machine system configuration and the running environment creates complex thermal behavior of a machine tool, and also... The interaction between the heat source location, its intensity, thermal expansion coefficient, the machine system configuration and the running environment creates complex thermal behavior of a machine tool, and also makes thermal error prediction difficult. To address this issue, a novel prediction method for machine tool thermal error based on Bayesian networks (BNs) was presented. The method described causal relationships of factors inducing thermal deformation by graph theory and estimated the thermal error by Bayesian statistical techniques. Due to the effective combination of domain knowledge and sampled data, the BN method could adapt to the change of running state of machine, and obtain satisfactory prediction accuracy. Ex- periments on spindle thermal deformation were conducted to evaluate the modeling performance. Experimental results indicate that the BN method performs far better than the least squares (LS) analysis in terms of modeling estimation accuracy. 展开更多
关键词 Bayesian networks (BNs) Thermal error model Numerical control (NC) machine tool
下载PDF
To Construct High Level Secure Communication System: CTMI Is Not Enough
9
作者 Sen Xu Xiangjun Lu +6 位作者 Aidong Chen Haifeng Zhang Haihua Gu Dawu Gu Kaiyu Zhang Zheng Guo Junrong Liu 《China Communications》 SCIE CSCD 2018年第11期122-137,共16页
Public key cryptographic (PKC) algorithms, such as the RSA, elliptic curve digital signature algorithm (ECDSA) etc., are widely used in the secure communication sys- tems, such as OpenSSL, and a variety of in- for... Public key cryptographic (PKC) algorithms, such as the RSA, elliptic curve digital signature algorithm (ECDSA) etc., are widely used in the secure communication sys- tems, such as OpenSSL, and a variety of in- formation security systems. If designer do not securely implement them, the secret key will be easily extracted by side-channel attacks (SCAs) or combinational SCA thus mitigat- ing the security of the entire communication system. Previous countermeasures of PKC im- plementations focused on the core part of the algorithms and ignored the modular inversion which is widely used in various PKC schemes. Many researchers believe that instead of straightforward implementation, constant time modular inversion (CTMI) is enough to resist the attack of simple power analysis combined with lattice analysis. However, we find that the CTMI security can be reduced to a hidden t-bit multiplier problem. Based on this feature, we firstly obtain Hamming weight of interme- diate data through side-channel leakage. Then, we propose a heuristic algorithm to solve the problem by revealing the secret (partial and full) base of CTMI. Comparing previous nec-essary input message for masking filtering, our procedure need not any information about the secret base of the inversion. To our knowl- edge, this is the first time for evaluating the practical security of CTM! and experimental results show the fact that CTMI is not enough for high-level secure communication systems. 展开更多
关键词 information security side channelanalysis elliptic curve digital signature algo-rithm constant time modular inversion ham-ming weight leakage
下载PDF
Civic Engagement, Fake News and the Path Forward
10
作者 Jess Block Nerren 《Journalism and Mass Communication》 2018年第2期51-55,共5页
Media literacy and understanding the digital information around us are an area of communication that affects all of us. How people are represented in the media, social media and our civic participation affect our repr... Media literacy and understanding the digital information around us are an area of communication that affects all of us. How people are represented in the media, social media and our civic participation affect our representations and understanding of the truth. The author would argue through research and practical examples that civic engagement and associations with a peer group can counteract some of the issues facing digital media today. In an age of the so-called "fake news," there are tools we can provide for our teams, our employees, and our collaborators to make sure we are all on the same page and dealing with the same set of verifiable facts 展开更多
关键词 ETHICS LITERACY digital communications media literacy
下载PDF
Use of the Jiaolong manned submersible for accurate mapping of deep-sea topography and geomorphology 被引量:2
11
作者 Tongwei ZHANG Jialing TANG +2 位作者 Zhengguang LI Yubin ZHOU Xiangxin WANG 《Science China Earth Sciences》 SCIE EI CAS CSCD 2018年第8期1148-1156,共9页
High-resolution bathymetric side-scan sonar(BSSS) performs the functions of traditional side-scan sonar, while also providing a depth-sounding function that allows simultaneous measurement of seafloor topography and g... High-resolution bathymetric side-scan sonar(BSSS) performs the functions of traditional side-scan sonar, while also providing a depth-sounding function that allows simultaneous measurement of seafloor topography and geomorphology. Submarine microtopography and microgeomorphology detection ability and advanced underwater acoustic digital communication are important technical capabilities of the Jiaolong manned submersible. High resolution BSSS achieved accurate detection of seafloor topography and geomorphology at a depth of 7000 m, and successful mapping of local microtopography and microgeomorphology in the Mariana Trench. 展开更多
关键词 MICROTOPOGRAPHY Microgeomorphology Manned submersible Deep sea High-resolution bathymetric side scan sonar Jiaolong
原文传递
Chaotic digital cryptosystem using serial peripheral interface protocol and its ds PIC implementation 被引量:1
12
作者 Rodrigo MéNDEZ-RAMíREZ Adrian ARELLANO-DELGADO +2 位作者 César CRUZ-HERNáNDEZ Fausto ABUNDIZ-PéREZ Rigoberto MARTíNEZ-CLARK 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第2期165-179,共15页
The current massive use of digital communications demands a secure link by using an embedded system(ES) with data encryption at the protocol level. The serial peripheral interface(SPI) protocol is commonly used by... The current massive use of digital communications demands a secure link by using an embedded system(ES) with data encryption at the protocol level. The serial peripheral interface(SPI) protocol is commonly used by manufacturers of ESs and integrated circuits for applications in areas such as wired and wireless communications. We present the design and experimental implementation of a chaotic encryption and decryption algorithm applied to the SPI communication protocol. The design of the chaotic encryption algorithm along with its counterpart in the decryption is based on the chaotic Hénon map and two methods for blur and permute(in combination with DNA sequences). The SPI protocol is configured in 16 bits to synchronize a transmitter and a receiver considering a symmetric key. Results are experimentally proved using two low-cost dsPIC microcontrollers as ESs. The SPI digital-to-analog converter is used to process, acquire, and reconstruct confidential messages based on its properties for digital signal processing. Finally, security of the cryptogram is proved by a statistical test. The digital processing capacity of the algorithm is validated by dsPIC microcontrollers. 展开更多
关键词 Chaotic systems Statistical tests Embedded systems dsPIC microcontroller Serial peripheral interface (SPI)protocol
原文传递
Stochastic Channel Allocation for Nonlinear Systems with Markovian Packet Dropout 被引量:1
13
作者 LONG Yushen LIU Shuai +1 位作者 XIE Lihua CHEN Jie 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2018年第1期22-37,共16页
This paper addresses a channel scheduling problem for group of dynamically decoupled nonlinear subsystems with actuators connected through digital communication channels and controlled by a centralized controller. Due... This paper addresses a channel scheduling problem for group of dynamically decoupled nonlinear subsystems with actuators connected through digital communication channels and controlled by a centralized controller. Due to the limited communication capacity, only one channel can be activated and hence there is only one pair of sensor and actuator can communicate with the controller at each time instant. In addition, the communication channels are not reliable so Markovian packed dropout is introduced. A predictive control framework is adopted for controller/scheduler co-design to alleviate the performance loss caused by the limited communication capacity. Instead of sending a single control value, the controller sends a sequence of predicted control values to a selected actuator so that there are control input candidates which can be fed to the subsystem when the actuator does not communicate with the controller. A stochastic algorithm is proposed to schedule the usage of the communication medium and sufficient conditions on stochastic stability are given under some mild assumptions. 展开更多
关键词 Markovian packet dropout model predictive control networked control systems nonlinear systems
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部