期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
中央电视台儿童剧《送信》将在欧洲十二国播放
1
《广告大观(综合版)》 2008年第9期79-79,共1页
日前,亚广联节目部致信青少中心表示,在近日结束的欧广联儿童剧合拍会议上,青少中心拍摄的儿童剧《送信》受到好评,被选中作为欧亚儿童剧交换剧目,将在参加欧广联儿童剧合拍项目的德国、荷兰、捷克、冰岛、葡萄牙、斯洛文尼亚等12... 日前,亚广联节目部致信青少中心表示,在近日结束的欧广联儿童剧合拍会议上,青少中心拍摄的儿童剧《送信》受到好评,被选中作为欧亚儿童剧交换剧目,将在参加欧广联儿童剧合拍项目的德国、荷兰、捷克、冰岛、葡萄牙、斯洛文尼亚等12个国家的公共电视台播出。 展开更多
关键词 儿童剧 中央电视台 播放 欧洲 公共电视台 斯洛文尼亚 欧广联 葡萄牙 《送信》
原文传递
送信
2
作者 赵熙 《中国电信业》 2010年第9期87-87,共1页
我经常写文章,所以隔三差五就会有报社邮寄来的样刊和稿费单。那天,我一到家,妈妈就递给我一封信,对我说:“这不是我家的信,但地址写的是我家,你问问是不是对门的。如果不是,等下次邮递员来的时候再还给他。”
关键词 《送信》 杂文 赵熙 文学
下载PDF
Research on Mobile-Based Logistics Information System for Hainan Agricultural Products 被引量:1
3
作者 方纪华 王玲玲 +1 位作者 李玉萍 罗红霞 《Agricultural Science & Technology》 CAS 2014年第7期1235-1239,共5页
The current situation,information technology and problems of logistics for agricultural products were summarized.Some key technologies involved in mobilebased logistics information system for Hainan agricultural produ... The current situation,information technology and problems of logistics for agricultural products were summarized.Some key technologies involved in mobilebased logistics information system for Hainan agricultural products were analyzed,such as information classification and retrieval,user information authentication via QR code,and logistics information services based on WEB and mobile devices.Emphasis was given to study the design idea,content,method for the system. 展开更多
关键词 Agricultural product Logistics distribution Terminal services Information security
下载PDF
Flow characteristics and Shannon entropy analysis of dense-phase pneumatic conveying under high pressure
4
作者 赵长遂 梁财 +3 位作者 陈晓平 蒲文灏 鹿鹏 范春雷 《Journal of Southeast University(English Edition)》 EI CAS 2007年第4期609-614,共6页
Experiments of dense-phase pneumatic conveying of pulverized coal using nitrogen are carded out in an experimental test facility with the conveying pressure up to 4. 0 MPa and the gas-solid ratio up to 450 kg/m^3. The... Experiments of dense-phase pneumatic conveying of pulverized coal using nitrogen are carded out in an experimental test facility with the conveying pressure up to 4. 0 MPa and the gas-solid ratio up to 450 kg/m^3. The influences of different conveying differential pressures, coal moisture contents, gas volume flow rates and superficial velocities on the solid-gas ratios are investigated. Shannon entropy analysis of pressure fluctuation time series is developed to reveal the flow characteristics. Through investigation of the distribution of the Shannon entropy under different conditions, the flow stability and the evolutional tendency of the Shannon entropy in different regimes and regime transition processes are discovered, and the relationship between the Shannon entropy and the flow regimes is also established. The results indicate that the solid-gas ratio and the Shannon entropy rise with the increase in conveying differential pressure. The solid-gas ratio and the Shannon entropy reveal preferable regularity with gas volume flow rates. The Shannon entropy is different for different flow regimes, and can be used to identify the flow regimes. Both mass flow rate and the Shannon entropy decrease with the increase in moisture contents. The Shannon entropy analysis is a feasible approach for researching the characteristics of flow regimes, flow stability and flow regime transitions in dense-phase pneumatic conveying under high pressure. 展开更多
关键词 pneumatic conveying high pressure dense-phase solid-gas ratio Shannon entropy
下载PDF
Method of combining space-time block coding with adaptive beamforming
5
作者 沈克勤 《Journal of Southeast University(English Edition)》 EI CAS 2005年第3期254-259,共6页
A method of space-time block coding (STBC) system based on adaptive beamforming of cyclostationarity signal algorithm is proposed.The method uses cyclostationarity of signals to achieve adaptive beamforming,then con... A method of space-time block coding (STBC) system based on adaptive beamforming of cyclostationarity signal algorithm is proposed.The method uses cyclostationarity of signals to achieve adaptive beamforming,then constructs a pair of low correlated transmit beams based on beamform estimation of multiple component signals of uplink.Using these two selected transmit beams,signals encoded by STBC are transmitted to achieve diversity gain and beamforming gain at the same time,and increase the signal to noise ratio (SNR) of downlink.With simple computation and fast convergence performance,the proposed scheme is applicable for time division multiple access (TDMA) wireless communication operated in a complex interference environment.Simulation results show that the proposed scheme has better performance than conventional STBC,and can obtain a gain of about 5 dB when the bit error ratio (BER) is 10-4. 展开更多
关键词 space-time coding GAIN adaptive beamforming cyclostationary signal transmit diversity
下载PDF
New multicast scheme based on Dynamic mobility prediction in mobile IPv6 environment 被引量:2
6
作者 黄国盛 陈志刚 +3 位作者 赵明 王路露 霍英 刘安丰 《Journal of Central South University of Technology》 EI 2007年第3期386-392,共7页
A new mobile multicast scheme called mobility prediction based mobile multicast(MPBMM) was proposed. In MPBMM, when a mobile node (MN) roams among subnets during a multicast session, MN predicts the next subnet, to wh... A new mobile multicast scheme called mobility prediction based mobile multicast(MPBMM) was proposed. In MPBMM, when a mobile node (MN) roams among subnets during a multicast session, MN predicts the next subnet, to which MN will attach, by the information of its position and mobility speed, consequently speeds up the handoff procedure. Simulation results show that the proposed scheme can minimize the loss of multicast packets, reduce the delay of subnet handoff, decrease the frequency of multicast tree reconfiguration, and optimize the delivery path of multicast packets. When MN moves among subnets at different speeds (from 5 to 25 ms), the maximum loss ratio of multicast packets is less than0.2%, the maximum inter-arrival time of multicast packets is 117 ms, so the proposed scheme can meet the QoS requirements of real-time services. In addition, MPBMM can support the mobility of multicast source. 展开更多
关键词 mobile multicast mobile IPv6 hierarchical structure dynamic mobility prediction
下载PDF
Robust THP Design with the Presence of Errors in CSIT Acquisition
7
作者 Wang Xuzhen Niu Kai +2 位作者 He Zhiqiang Yu Guangwei Li Hui 《China Communications》 SCIE CSCD 2010年第2期78-86,共9页
In this paper, a robust THP is proposed for broadcast channel in multi-user multi-input multi-output (MU-MIMO) system, in which the channel uncertainty caused by feedback delay and mobile speed is taken into account. ... In this paper, a robust THP is proposed for broadcast channel in multi-user multi-input multi-output (MU-MIMO) system, in which the channel uncertainty caused by feedback delay and mobile speed is taken into account. In order to acquire the imperfect channel state information at transmitter (CSIT), a dynamic CSIT model is introduced where the channel temporal and spatial correlations are considered. By utilizing the unchanged channel statistics and accurate outdated feedback channel information jointly, the imperfect CSIT is obtained as the channel estimate and error covariance. Based on the obtained imperfect CSIT, a Minimum Mean-Square Error (MMSE) Tomlinsion-Harashima precoding (THP) is designed and the closed-form solution is derived by the Lagrangian multiplier approach under total power constraint. Simulation results are provided to indicate the preferable performances of the robust THP. Performance analysis with respect to feedback delay and mobile speed is also given. 展开更多
关键词 MU-MIMO channel estimate imperfect channel state
下载PDF
Offloading Mobile Data from Cellular Networks Through Peer-to-Peer WiFi Communication:A Subscribe-and-Send Architecture 被引量:1
8
作者 芦效峰 HUI Pan Pietro Lio 《China Communications》 SCIE CSCD 2013年第6期35-46,共12页
Currently cellular networks do not have sufficient capacity to accommodate the exponential growth of mobile data requirements.Data can be delivered between mobile terminals through peer-to-peer WiFi communications(e.g... Currently cellular networks do not have sufficient capacity to accommodate the exponential growth of mobile data requirements.Data can be delivered between mobile terminals through peer-to-peer WiFi communications(e.g.WiFi direct),but contacts between mobile terminals are frequently disrupted because of the user mobility.In this paper,we propose a Subscribe-and-Send architecture and an opportunistic forwarding protocol for it called HPRO.Under Subscribe-and-Send,a user subscribes contents on the Content Service Provider(CSP) but does not download the subscribed contents.Some users who have these contents deliver them to the subscribers through WiFi opportunistic peer-to-peer communications.Numerical simulations provide a robust evaluation of the forwarding performance and the traffic offloading performance of Subscribe-and-Send and HPRO. 展开更多
关键词 mobile Internet cellular networks offioad opportunistic routing delay tolerant networks peer-to-peer WiFi
下载PDF
Performance optimization for multicast packet authentication 被引量:1
9
作者 李保红 《Journal of Chongqing University》 CAS 2005年第3期154-157,共4页
In secure multicast, one of the challenging problems is the authentication of multicast packets. This paper presents a novel scheme to address this problem, which combines ideas in both the hash tree schemes and the h... In secure multicast, one of the challenging problems is the authentication of multicast packets. This paper presents a novel scheme to address this problem, which combines ideas in both the hash tree schemes and the hash chain schemes. In this scheme, a group of packets is partitioned into equal-sized subgroups. Then a Merkle hash tree is built for each subgroup of packets, and the hash value of every root is appended to preceding packets to form hash chains. Its performance is analyzed and simulated using Biased Coin Toss loss model and 2-state Markov Chain loss model, respectively. Compared with the original hash chain schemes, results show that this scheme is much more efficient in term of communication overhead. 展开更多
关键词 Multicast packet authentication hash chains burst loss authentication probability
下载PDF
Quantum Secure Direct Communication Using Six-Particle Maximally Entangled States and Teleportation 被引量:2
10
作者 XIU Xiao-Ming DONG Li GAO Ya-Jun CHI Feng 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第3期429-432,共4页
The sender shares six-particle maximally entangled states as quantum channel with the receiver. If the quantum channel is secure, the sender performs projective measurements and tells the measurement outcome to the re... The sender shares six-particle maximally entangled states as quantum channel with the receiver. If the quantum channel is secure, the sender performs projective measurements and tells the measurement outcome to the receiver. The receiver performs the unitary transformations and makes projective measurements on his particles to obtain the secret information. Using teleportation, the transmission of three-qubit secret information can be completed in each quantum channel 展开更多
关键词 quantum secret direct communication quantum teleportation six-particle maximally entangled state
下载PDF
ON THE PERFORMANCE OF ANALOG MULTIUSER DETECTION IN ULTRA-WIDEBAND TRANSMITTED-REFERENCE SYSTEM
11
作者 Ge Wei Zheng Lin Qiu Hongbing 《Journal of Electronics(China)》 2009年第6期798-803,共6页
The detection performance is evaluated for our proposed analog multiuser receiver in Ultra-WideBand (UWB) transmitted-reference system. In the presence of dense multipath and multi-access signals,the performance analy... The detection performance is evaluated for our proposed analog multiuser receiver in Ultra-WideBand (UWB) transmitted-reference system. In the presence of dense multipath and multi-access signals,the performance analysis is difficult due to the complicated waveform of received impulse. We develop an approach to analyze the steady-state Signal-to-Interference-plus-Noise (SINR) of the detector output. The multipath-spread impulse is fitted to an exponentially decaying profile in the analysis. A closed-form expression of steady-state SINR is further deduced for the proposed Least Minimum Square (LMS) detector. The analysis is validated by simulations in Line-Of-Sight (LOS) and Non-Line-Of-Sight (NLOS) channel respectively. Based on the theoretical results,the multipath delay spread is employed to determine the optimal width of the integration window of the detector. 展开更多
关键词 Multiuser detection Minimum Mean Square Error (MMSE) Transmitted reference Ultra-WideBand (UWB)
下载PDF
Deterministic Quantum Secure Direct Communication with Dense Coding and Continuous Variable Operations
12
作者 HAN Lian-Fang CHEN Yue-Ming YUAN Hao 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第4期648-652,共5页
We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receive... We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receiver. The continuous variable operations instead of the usual discrete unitary operations are performed on the travel photons so that the security of the present protocol can be enhanced. Therefore some specific attacks such as denial-of-service attack, intercept-measure-resend attack and invisible photon attack can be prevented in ideal quantum channel. In addition, the scheme is still secure in noise channel. Furthurmore, this protocol has the advantage of high capacity and can be realized in the experiment. 展开更多
关键词 ping-pong protocol continuous variable operations quantum secure direct communication SECURITY capacity
下载PDF
SECURE GROUP COMMUNICATIONS FOR LARGE DYNAMIC MULTICAST GROUP
13
作者 Liu Jing Zhou Mingtian (College of Computer Science and Engineering, UEST of China, Chengdu 610054) 《Journal of Electronics(China)》 2003年第4期265-273,共9页
As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dy... As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme. 展开更多
关键词 Multicast security Group communication Group key management Access control Secret key tree
下载PDF
Chained user cooperation scheme employing joint network-channel coding
14
作者 周婷 Xu Jing Wang Fang 《High Technology Letters》 EI CAS 2012年第2期167-172,共6页
This paper proposes a joint network-channel codingbased on turbo codes for user cooperation. The scenario under consideration is one in which two "partners"--UE1 and UE2---cooperate in transmitting information to th... This paper proposes a joint network-channel codingbased on turbo codes for user cooperation. The scenario under consideration is one in which two "partners"--UE1 and UE2---cooperate in transmitting information to the base station (BS). Each partner transmits both locally generated information and the relayed information that originated at the other partner. The local information and relayed information are jointly network-channel coded to form a superimposed codeword, and the adjacent codewords transmitted in turn by the two partners are tightly correlative like a chain. It is shown via simulation that the proposed scheme achieves full diversity gain compared with the other user cooperation schemes, including those based on coded cooperation and distributed space-time coded cooperation. 展开更多
关键词 network coding user cooperation RELAY iterative decoding
下载PDF
Research on the key technology of RFID and its application in modem logistics
15
作者 Lei Liu 《International Journal of Technology Management》 2015年第6期1-4,共4页
The paper study communication protocol, the structure of the circuit, antenna design of radio frequency identification technology (RFID), and puts forward a scheme based on IOT application: RFID logistics tracking ... The paper study communication protocol, the structure of the circuit, antenna design of radio frequency identification technology (RFID), and puts forward a scheme based on IOT application: RFID logistics tracking system. Finally, the paper study the logistics distribution center information management model from three aspects of the system design objectives, system function analysis and system architecture design based on RFID. 展开更多
关键词 RFID Logistics distribution center Information management system.
下载PDF
PIR-based data integrity verification method in sensor network
16
作者 Yong-Ki Kim Kwangnam Choi +1 位作者 Jaesoo Kim JungHo Seok 《Journal of Central South University》 SCIE EI CAS 2014年第10期3883-3888,共6页
Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, ... Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation. 展开更多
关键词 data integrity VERIFICATION private information retrieval sensor network
下载PDF
Extraction of Partial Discharge Acoustic Signal by Wavelet Transform with Teager′s Energy Operator
17
作者 杜伯学 欧阳明鉴 +1 位作者 武媛 魏国忠 《Transactions of Tianjin University》 EI CAS 2005年第4期289-294,共6页
To develop a measurement system for monitoring partial discharge (PD) without the effect of external interferences,an algorithm of PD signal extraction based on wavelet transform with Teager's energy operators was ... To develop a measurement system for monitoring partial discharge (PD) without the effect of external interferences,an algorithm of PD signal extraction based on wavelet transform with Teager's energy operators was presented. Acoustic signal generated by PD was selected to remove excessive interfering signals and electromagnetic interferences. Acoustic signals were collected and decomposed into I0 levels by wavelet transform into approximation and detail components. “Daubechies 25” was proved to be the most suitable mother wavelet for the extraction of PD acoustic signals. Compared with conventional wavelet denoising method, Teager's energy operators were adopted to the PD signal reconstruction and the signal to noise ratio was in creased by 20%-25% inthe experiment,without lost in energy and pulse amplitude. 展开更多
关键词 partial discharge extraction acoustic signal wavelet transform Teager's energy opera- tors DENOISE
下载PDF
FAIRNESS OF SHARING PROTECTION FOR MULTICAST IN WDM NETWORKS
18
作者 Li Yonggang Jin Yaohui Li Lemin 《Journal of Electronics(China)》 2008年第5期583-587,共5页
In this paper,the sharing schemes of multicast in survivable Wavelength-Division Multi-plexed(WDM) networks are studied and the concept of Shared Risk Link Group(SRLG) is considered.While the network resources are sha... In this paper,the sharing schemes of multicast in survivable Wavelength-Division Multi-plexed(WDM) networks are studied and the concept of Shared Risk Link Group(SRLG) is considered.While the network resources are shared by the backup paths,the sharing way is possible to make the backup paths selfish.This selfishness leads the redundant hops of the backup route and a large number of primary lightpaths to share one backup link.The sharing schemes,especially,the self-sharing and cross-sharing,are investigated to avoid the selfishness when computing the backup light-tree.In order to decrease the selfishness of the backup paths,it is important to make the sharing links fair to be used.There is a trade-off between the self-sharing and cross-sharing,which is adjusted through simulation to adapt the sharing degree of each sharing scheme and save the network resources. 展开更多
关键词 FAIRNESS SHARING MULTICAST PROTECTION Wavelength-Division Multiplexed (WDM) network
下载PDF
A STUDY ON PROBE-BASED MULTICAST ADMISSION CONTROL AND ENHANCEMENT
19
作者 Le Chunhui He Jianhua Yang Zongkai Liu Wei 《Journal of Electronics(China)》 2006年第1期69-75,共7页
To provide scalable and simple Quality of Service(QoS) mechanism for multicast services, Probe-Based Multicast Admission Control (PBMAC) scheme was proposed. In this paper, PBMAC is studicd and a so-called subsequ... To provide scalable and simple Quality of Service(QoS) mechanism for multicast services, Probe-Based Multicast Admission Control (PBMAC) scheme was proposed. In this paper, PBMAC is studicd and a so-called subsequent request problem is found in PBMAC, which degrades system performance significantly when the network traffic is heavily loaded. Based on the analysis on subsequent request problem, an Enhance PBMAC (EPBMAC) scheme is proposed, in which complementary probing is devised to solve the problem. Using a new metric of normalized requested equivalent link capacity, the pertbrmance of PBMAC and EPBMAC is analyzed and evaluated. Two implementations are proposed for incremental dcployment. The paper finally introduces evaluation with packet-based simulations. Both analytical and simulation results show the significant improvement in performance. 展开更多
关键词 MULTICAST Quality of Service (QoS) Admission control Traffic probing
下载PDF
Intelligent Transportation System and Night Delivery Schemes for City Logistics
20
作者 Ivana Cavar Zvonko Kavran Natalija Jolic 《Computer Technology and Application》 2011年第10期782-787,共6页
Intelligent Transportation System (ITS) integrates information and communication technologies with location based technologies into roads, vehicles, traffic and transport management systems. Application of ITS can i... Intelligent Transportation System (ITS) integrates information and communication technologies with location based technologies into roads, vehicles, traffic and transport management systems. Application of ITS can improve situation in major cities where due to the increasing number of residents and level of motorization traffic congestion represents important issue. Another problem arises from this facts and that is that cities have contradictory needs as grooving need for goods within urban areas as well as need for less vehicles in the same area. The urban logistics activities by private companies within urban areas represent an integral part of city logistics that aims to improve the efficiency of urban freight transportation, reduce traffic congestion, mitigate environmental impacts, reduce costs and fuel consumption. This research presents application of ITS technologies and vehicle routing problem for night delivery scheme planning as one of the core techniques for modelling city logistics. 展开更多
关键词 ITS (intelligent transportation system) city logistics night delivery scheme traffic system development.
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部