期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
数控制码系统中的数据处理新方法 被引量:1
1
作者 周绍梅 乐小燕 +1 位作者 吴悦成 郑欣 《制造技术与机床》 CSCD 北大核心 2006年第10期47-50,共4页
分析了数控制码系统中数据处理的特点,讨论了数控系统中两种传统的数据处理方法和三种从不同方面对传统方法改进的数据处理方法。综合分析所有方法的优缺点,并结合制码系统中数据处理的特点,提出了一种更适用的数据处理新方法。该方法... 分析了数控制码系统中数据处理的特点,讨论了数控系统中两种传统的数据处理方法和三种从不同方面对传统方法改进的数据处理方法。综合分析所有方法的优缺点,并结合制码系统中数据处理的特点,提出了一种更适用的数据处理新方法。该方法既节约了系统资源,又提高了制码速度和工作效率。详细介绍了该方法在数控制码系统中的应用。 展开更多
关键词 数据处理 数控 制码系统
下载PDF
数控制码系统中的数据处理新方法
2
作者 周绍梅 乐小燕 +1 位作者 吴悦成 郑欣 《电子技术应用》 北大核心 2006年第5期6-8,共3页
分析了数控制码系统中数据处理的特点,讨论了数控系统中两种传统的数据处理方法及三种改进方法。综合分析各种方法的优缺点,结合制码系统中数据处理的特点,提出了一种更适用的数据处理新方法。该方法即节约了系统资源,又提高了制码速度... 分析了数控制码系统中数据处理的特点,讨论了数控系统中两种传统的数据处理方法及三种改进方法。综合分析各种方法的优缺点,结合制码系统中数据处理的特点,提出了一种更适用的数据处理新方法。该方法即节约了系统资源,又提高了制码速度和工作效率。 展开更多
关键词 数据处理 数控 制码系统
下载PDF
开放式数控制码系统中运动控制卡的设计
3
作者 乐小燕 代俊雅 +3 位作者 郑海滨 夏力前 张宇 肖茅 《科技传播》 2013年第20期210-211,共2页
本文分析了开放式数控制码系统的硬件结构,针对开放式数控制码系统的硬件特点及实际需求,提出了采用PCI7505光电隔离卡进行改造的设计方案,为开放式数控制码系统量身订做了控制制码机正常、稳定运作的运动控制卡,实现了一个经济型的开... 本文分析了开放式数控制码系统的硬件结构,针对开放式数控制码系统的硬件特点及实际需求,提出了采用PCI7505光电隔离卡进行改造的设计方案,为开放式数控制码系统量身订做了控制制码机正常、稳定运作的运动控制卡,实现了一个经济型的开放式数控制码系统。实验证明,采用经PCI7505改造设计的运动控制卡运作稳定、效果良好,具有较高的实用价值。 展开更多
关键词 开放式 数控系统 运动控 制码系统
下载PDF
基于PC的开放式数控制码系统的研究与设计
4
作者 乐小燕 李书涛 +3 位作者 张克军 夏力前 肖友清 章远 《福建电脑》 2008年第7期152-152,79,共2页
本文通过研究当前的技术发展和制码系统的实际需求,在基于PC的开放式数控技术的基础上,设计了一种以PC、运动控制卡、驱动器和制码机为硬件组成,以OMAC模型为基础的模块化软件结构的开放式数控制码系统。实现了一个具有较高实用性和复... 本文通过研究当前的技术发展和制码系统的实际需求,在基于PC的开放式数控技术的基础上,设计了一种以PC、运动控制卡、驱动器和制码机为硬件组成,以OMAC模型为基础的模块化软件结构的开放式数控制码系统。实现了一个具有较高实用性和复用性的经济型开放式数控制码系统。 展开更多
关键词 PC 开放式数控系统 制码系统 OMAC
下载PDF
垃圾分类二维码制码系统的研究与设计 被引量:2
5
作者 吴新华 《信息技术与信息化》 2019年第7期58-60,共3页
本文通过分析当前垃圾分类二维码制码系统的研究现状,设计并实现了一套基于彩色二维码的城市生活垃圾分类制码系统,可生成四种颜色的垃圾分类二维码,支持垃圾分类二维码的生成、打印与投放,并从性能上保证所生成垃圾分类二维码的“唯一... 本文通过分析当前垃圾分类二维码制码系统的研究现状,设计并实现了一套基于彩色二维码的城市生活垃圾分类制码系统,可生成四种颜色的垃圾分类二维码,支持垃圾分类二维码的生成、打印与投放,并从性能上保证所生成垃圾分类二维码的“唯一性”、“安全性”和“可识别性”,极大地方便了垃圾分类与处理。 展开更多
关键词 垃圾分类 二维 混沌密 制码系统
下载PDF
Steganography Algorithm to Hide Secret Message inside an Image 被引量:1
6
作者 Rosziati Ibrahim Teoh Suk Kuan 《Computer Technology and Application》 2011年第2期102-108,共7页
In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is con... In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called Steganography Imaging System (gig) is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the images and the Peak signal-to-noise ratio (PSNR) is also captured for each of the images tested. Based on the PSNR value of each images, the stego image has a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image. 展开更多
关键词 Steganography algorithm secret key image processing data retrieval.
下载PDF
Decomposition behavior of CaSO_4 during potassium extraction from a potash feldspar-CaSO_4 binary system by calcination 被引量:7
7
作者 Li Lü Chun Li +2 位作者 Guoquan Zhang Xiaowei Hu Bin Liang 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2018年第4期838-844,共7页
The extraction of potassium from a tablet mixture of K-feldspar ore and CaSO4by roasting was studied with a focus on the effects of the decomposition behavior of CaSO4on the potassium extraction process.The roasted sl... The extraction of potassium from a tablet mixture of K-feldspar ore and CaSO4by roasting was studied with a focus on the effects of the decomposition behavior of CaSO4on the potassium extraction process.The roasted slags were characterized by X-ray diffraction(XRD),scanning electron microscopy(SEM),energy-dispersive X-ray spectroscopy,and thermogravimetric(TG)analysis.The XRD analysis revealed that hydrosoluble mischcrystal K2Ca2(SO4)3was obtained by ion exchange of Ca^2+ in CaSO4 and K^+ in KAlSi3O8.Meanwhile,the intermediate product,SiO2,separated from KAl Si3O8and reacted with CaSO4to decompose CaSO4.The SEM results showed that some blowholes emerged on the surface of the CaSO4particles when they reacted with SiO2at 1200℃,which indicates that SO2and O2gases were released from CaSO4.The TG curves displayed that pure CaSO4could not be decomposed below 1200℃,while the mixture of K-feldspar ore and CaSO4began to lose weight at 1000℃.The extraction rate of potassium and decomposition rate of CaSO4were 62%and 44%,respectively,at a mass ratio of CaSO4to K-feldspar ore of 3:1,temperature of 1200℃,tablet-forming pressure of6 MPa,and roasting time of 2 h.The decomposition of CaSO4reduced the potassium extraction rate;therefore,the required amount of CaSO4was more than the theoretical amount.However,excess CaSO4was also undesirable for the potassium extraction reaction because a massive amount of SO2and O2gas were derived from the decomposition of CaSO4,which provided poor contact between the reactants.The SO2released from CaSO4decomposition can be effectively recycled. 展开更多
关键词 K-feldspar Calcium sulfate Potassium extraction Calcium sulfate decomposition Roasting
下载PDF
Low Complexity Minimum Mean Square Error Channel Estimation for Adaptive Coding and Modulation Systems 被引量:2
8
作者 GUO Shuxia SONG Yang +1 位作者 GAO Ying HAN Qianjin 《China Communications》 SCIE CSCD 2014年第1期126-137,共12页
Performance of the Adaptive Coding and Modulation(ACM) strongly depends on the retrieved Channel State Information(CSI),which can be obtained using the channel estimation techniques relying on pilot symbol transmissio... Performance of the Adaptive Coding and Modulation(ACM) strongly depends on the retrieved Channel State Information(CSI),which can be obtained using the channel estimation techniques relying on pilot symbol transmission.Earlier analysis of methods of pilot-aided channel estimation for ACM systems were relatively little.In this paper,we investigate the performance of CSI prediction using the Minimum Mean Square Error(MMSE)channel estimator for an ACM system.To solve the two problems of MMSE:high computational operations and oversimplified assumption,we then propose the Low-Complexity schemes(LC-MMSE and Recursion LC-MMSE(R-LC-MMSE)).Computational complexity and Mean Square Error(MSE) are presented to evaluate the efficiency of the proposed algorithm.Both analysis and numerical results show that LC-MMSE performs close to the wellknown MMSE estimator with much lower complexity and R-LC-MMSE improves the application of MMSE estimation to specific circumstances. 展开更多
关键词 adaptive coding and modulation channel estimation minimum mean square error low-complexity minimum mean square error
下载PDF
Research on Secure Authentication Mechanism of Grid
9
作者 张龙军 陈克非 赵怀勋 《Journal of Donghua University(English Edition)》 EI CAS 2005年第4期94-97,共4页
Based on the analysis on the security mechanism of grid, this paper discusses the advantages of latest techniques of grid security, and presents a secure authentication scheme of grid based on elliptic curve cryptosys... Based on the analysis on the security mechanism of grid, this paper discusses the advantages of latest techniques of grid security, and presents a secure authentication scheme of grid based on elliptic curve cryptosystem (ECC). The secure authentication scheme may provide reference value for the further application of grid. 展开更多
关键词 GRID GT3 ECC.
下载PDF
MULTIPLE TRELLIS CODED ORTHOGONAL TRANSMIT SCHEME FOR MULTIPLE ANTENNA SYSTEMS
10
作者 Lv Shujuan Wei Guo Zhu Jinkang 《Journal of Electronics(China)》 2006年第3期355-360,共6页
In this paper, a novel multiple trellis coded orthogonal transmit scheme is proposed to exploit transmit diversity in fading channels. In this scheme, a unique vector from a set of orthogonal vectors is assigned to ea... In this paper, a novel multiple trellis coded orthogonal transmit scheme is proposed to exploit transmit diversity in fading channels. In this scheme, a unique vector from a set of orthogonal vectors is assigned to each transmit antenna. Each of the output symbols from the multiple trellis encoder is multiplied with one of these orthogonal vectors and transmitted from corresponding transmit antennas. By correlating with corresponding orthogonal vectors, the receiver separates symbols transmitted from different transmit antennas. This scheme can be adopted in coherent/differential systems with any number of transmit antennas. It is shown that the proposed scheme encompasses the conventional trellis coded unitary space-time modulation based on the optimal cyclic group codes as a special case. We also propose two better designs over the conventional trellis coded unitary space-time modulation. The first design uses 8 Phase Shift Keying (8-PSK) constellations instead of 16 Phase Shift Keying (16-PSK) constellations in the conventional trellis coded unitary space-time modulation. As a result, the product distance of this new design is much larger than that of the conventional trellis coded unitary space-time modulation. The second design introduces constellations with multiple levels of amplitudes into the design of the multiple trellis coded orthogonal transmit scheme. For both designs, simulations show that multiple trellis coded orthogonal transmit schemes can achieve better performance than the conventional trellis coded unitarv space-time schemes. 展开更多
关键词 SPACE-TIME Trellis Code Modulation (TCM) Multiple TCM (MTCM) DIFFERENTIAL UNITARY
下载PDF
Medium Access Control: A Physical Layer Network- Coded Approach 被引量:2
11
作者 ZHANG Yu XIONG Ke DU Liping 《China Communications》 SCIE CSCD 2014年第A02期1-11,共11页
This paper investigates the medium access control (MAC) stratifies for communication systems. Since the signals are naturally superposed in public medium, we introduce physical layer network coding into MAC system a... This paper investigates the medium access control (MAC) stratifies for communication systems. Since the signals are naturally superposed in public medium, we introduce physical layer network coding into MAC system and propose the physical layer network coded MAC (PNC-MAC) to utilize the collisions occurring in the MAC process. The implicit expressions of the throughput and average delay of the system operated with the new algorithm are derived in an iterative way. To show the performance of the algorithm, we compare the throughput and average delay induced by the new algorithm with current schemes via simulations. The results show that when operated with our proposed PNC-MAC, MAC system can achieve a larger throughput while the frames bear shorter average delay. Moreover, in many users case, the throughput increases slightly while the average delay ascends drastically. 展开更多
关键词 medium access control physical layernetwork coding tree method
下载PDF
Multiple phase detector of M-ary phase shift keying symbols in code division multiple access systems 被引量:1
12
作者 QUAN Zhi 《Journal of Central South University》 SCIE EI CAS 2011年第4期1080-1086,共7页
A novel iterative technique, the phase descent search detection was proposed. This technique constrained the solution (PDS) algorithm, for M-ary phase shift keying (M-PSK) symbols to have a unit magnitude and it w... A novel iterative technique, the phase descent search detection was proposed. This technique constrained the solution (PDS) algorithm, for M-ary phase shift keying (M-PSK) symbols to have a unit magnitude and it was based on coordinate descent iterations where coordinates were the unknown symbol phases. The PDS algorithm, together with a descent local search (also implemented as a version of the PDS algorithm), was used multiple times with different initializations in a proposed multiple phase detector; the solution with the minimum cost was then chosen as the final solution. The simulation results show that for highly loaded multiuser scenarios, the proposed technique has a detection performance that is close to the single-user bound. The results also show that the multiple phase detector allows detection in highly overloaded scenarios and it exhibits near-far resistance. In particular, the detector has a performance that is significantly better, and complexity that is significantly lower, than that of the detector based on semi-definite relaxation. 展开更多
关键词 coordinate descent COMPLEXITY M-ary phase shift keying (M-PSK) multiuser detection quadratic optimization semi-definite relaxation
下载PDF
A Fair E-Cash Scheme Based on Elliptic Curve Cryptography
13
作者 WANGChangji WUJianping DUANHaixin 《Geo-Spatial Information Science》 2004年第3期231-234,共4页
A new fair off-line electronic cash scheme on elliptic curve cryptography was presented. The new scheme is more efficient than those by extending fair off-line electronic cash scheme from finite field into elliptic cu... A new fair off-line electronic cash scheme on elliptic curve cryptography was presented. The new scheme is more efficient than those by extending fair off-line electronic cash scheme from finite field into elliptic curve cryptography and introducing a new elliptic curve discrete logarithm assumption. The expiry date and denomination are embedded into the blindly signed coin by integrating partially blind signature with restrictive blind signature. A bank need not use different public keys for different coin values, shops and users need not carry a list of bank’s public keys to verify in their electronic wallet. At the same time, the bank just needs to keep undue electronic coins for double spending check in his database, thus bank’s database can be dramatically reduced. 展开更多
关键词 partially blind signature restrictive blind signature elliptic curvecryptography
下载PDF
A Distributed 2D-to-3D Video Conversion System 被引量:1
14
作者 张哲斌 张吉安 +2 位作者 张学西 王亦洲 高文 《China Communications》 SCIE CSCD 2013年第5期30-38,共9页
2D-to-3D video conversion is a feasible way to generate 3D programs for the current 3DTV industry. However, for large-scale 3D video production, current systems are no longer adequate in terms of the time and labor re... 2D-to-3D video conversion is a feasible way to generate 3D programs for the current 3DTV industry. However, for large-scale 3D video production, current systems are no longer adequate in terms of the time and labor required for conversion. In this paper, we introduce a distributed 2D-to-3D video conversion system that includes a 2D-to-3D video conversion module, architecture of the parallel computation on the cloud, and 3D video coding in the system. The system enables cooperation among multiple users in the simultaneous completion of their conversion tasks so that the conversion efficiency is greatly promoted. In the experiments, we evaluate the system based on criteria related to both time consumption and video coding performance. 展开更多
关键词 3D video 2D-to-3D conversion distributed system
下载PDF
Low-Density Parity-Check Codes for Noncoherent UWB Communication Systems 被引量:2
15
作者 Zhonghua Liang Junshan Zang +2 位作者 Xiaojun Yang Xiaodai Dong Huansheng Song 《China Communications》 SCIE CSCD 2017年第7期152-162,共11页
In order to guarantee reliable data transmission, powerful channel coding techniques are usually required in noncoherent ultra-wideband(UWB) communication systems. Accordingly, several forward error correction(FEC) co... In order to guarantee reliable data transmission, powerful channel coding techniques are usually required in noncoherent ultra-wideband(UWB) communication systems. Accordingly, several forward error correction(FEC) codes, such as Reed-Solomon and convolutional codes have been used in noncoherent UWB systems to improve the bit error rate(BER) performance. In this paper, low-density parity-check(LDPC) codes are further studied as more powerful FEC candidates for noncoherent UWB systems. Two LDPC codes and the corresponding decoding procedures are presented for noncoherent UWB systems. Moreover, performance comparison between the LDPC codes and other FEC codes are provided for three major noncoherent UWB communication systems, namely, noncoherent pulse position modulation(NC-PPM), transmitted reference(TR) and transmitted reference pulse cluster(TRPC). Both theoretical analysis and simulation results show that the two investigated LDPC codes outperform other existing FEC codes with limited penalty in terms of complexity and therefore they are promising FEC candidates for noncoherent UWB systems with low-cost and low-power consumption. 展开更多
关键词 UWB NONCOHERENT channel coding LDPC codes
下载PDF
Iterative Noncoherent Block Detection of Coded MPSK for Cooperative Relay Systems
16
作者 Yucheng He Jingjing Zhang +1 位作者 Rui Zhao Lin Zhou 《China Communications》 SCIE CSCD 2016年第7期1-6,共6页
Maximum likelihood(ML) noncoherent block detection techniques are investigated for block-coded MPSK modulation in cooperative decode-and-forward relay systems over slow fading channels.A decision-directed iterative Vi... Maximum likelihood(ML) noncoherent block detection techniques are investigated for block-coded MPSK modulation in cooperative decode-and-forward relay systems over slow fading channels.A decision-directed iterative Viterbi algorithm(IVA) is derived for a suboptimal ML noncoherent detection.Simulation results show that the IVA can approach the error performances of the exhaustive detection method but at a lower complexity. 展开更多
关键词 Coded modulation cooperative communication M-ray phase shift keying noncoherent detection
下载PDF
Reservation-based dynamic admission control scheme for wideband code division multiple access systems
17
作者 A.Y.Al-nahari S.A.El-Dolil +1 位作者 M.I.Dessouky F.E.Abd El-Samie 《Journal of Central South University》 SCIE EI CAS 2012年第2期393-401,共9页
Call admission control (CAC) and resource reservation (RR) for mobile communication are two important factors that guarantee system efficiency and quality of service (QoS) required for different services in a very sca... Call admission control (CAC) and resource reservation (RR) for mobile communication are two important factors that guarantee system efficiency and quality of service (QoS) required for different services in a very scarce resource as the radio spectrum. A new scheme was proposed which extends the concepts of resource sharing and reservations for wideband code division multiple access (WCDMA) systems with a unique feature of soft capacity. Voice and data traffic were considered. The traffic is further classified into handoff and new requests. The reservation thresholds were dynamically adjusted according to the traffic pattern and mobility prediction in order to achieve the maximum channel utilization, while guaranteeing different QoS constraints. The performance of proposed scheme was evaluated using Markov models. New call blocking probability, handoff call dropping probability, and channel utilization were used as benchmarks for the proposed scheme. 展开更多
关键词 admission control resource reservation wideband code division multiple access resource utilization
下载PDF
Error code analysis and selection principle of M-ary modulation in network-based control systems
18
作者 赵顺利 尹逊和 +1 位作者 魏学业 H. K. LAM 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第6期1372-1382,共11页
Error codes induced by M-ary modulation and modulation selection in network-based control systems are studied.It is the first time the issue of error codes induced by M-ary modulation is addressed in control field.In ... Error codes induced by M-ary modulation and modulation selection in network-based control systems are studied.It is the first time the issue of error codes induced by M-ary modulation is addressed in control field.In network-based control systems,error codes induced by noisy channel can significantly decrease the quality of control.To solve this problem,the network-based control system with delay and noisy channel is firstly modeled as an asynchronous dynamic system(ADS).Secondly,conditions of packet with error codes(PEC)loss rate by using M-ary modulation are obtained based on dynamic output feedback scheme.Thirdly,more importantly,the selection principle of M-ary modulation is proposed according to the measured signal-to-noise ratio(SNR)and conditions of PEC loss rate.Finally,system stability is analyzed and controller is designed through Lyapunov function and linear matrix inequality(LMI)scheme,and numerical simulations are made to demonstrate the effectiveness of the proposed scheme. 展开更多
关键词 network-based control system asynchronous dynamic system (ADS) M-ary modulation delay error code linear matrix inequality (LMI)
下载PDF
Information Security Protocol Based System Identification with Binary-Valued Observations 被引量:2
19
作者 XU Changbao ZHAO Yanlong ZHANG Ji-Feng 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2018年第4期946-963,共18页
Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input info... Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input information in a class of system identification problems with noise and binary-valued observations, presents a cryptography based security protocol, and improves it in the range of allowed errors. During solving the identification problem, the improved security protocol can ensure that the input information is not leaked, and thus, can deal with passive attacks effectively. Besides, a quantitative relationship among the input information, the public key in encryption and the number of partieipailts in the improved protocol is shown. Finally, the simulation results show that, the identification algorithm can still achieve the estimation accuracy by adding the improved security protocol. However, compared with the original identification algorithm, the time complexity of the algorithm with the improved security protocol increases. 展开更多
关键词 CRYPTOGRAPHY identification algorithm information security passive attacks security protocol time complexity
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部