期刊文献+
共找到27篇文章
< 1 2 >
每页显示 20 50 100
探索实施入境报检无纸化管理 被引量:1
1
作者 任喆 《中国管理信息化》 2012年第22期54-55,共2页
当前,我国的对外开放正进一步向全方位、深层次、宽领域的方向发展,进出口贸易持续增长,科学技术日新月异,经济全球化和信息化浪潮势不可当,在这样的社会经济大浪潮下,对于把守国门的检验检疫工作来说,越来越需要新的监管模式来更新原... 当前,我国的对外开放正进一步向全方位、深层次、宽领域的方向发展,进出口贸易持续增长,科学技术日新月异,经济全球化和信息化浪潮势不可当,在这样的社会经济大浪潮下,对于把守国门的检验检疫工作来说,越来越需要新的监管模式来更新原有的监管模式,来适应我国外贸经济的迅猛增长趋势,而"无纸化"监管模式正是在这样的经济大环境下孕育而生的。 展开更多
关键词 无纸化 通关效率 检信通
下载PDF
探索实施入境报检无纸化管理
2
作者 任喆 《中国管理信息化》 2012年第23期87-88,共2页
当前,我国的对外开放正进一步向全方位、深层次、宽领域的方向发展,进出口贸易持续增长;科学技术发展日新月异,经济全球化和信息化浪潮势不可当。在这样的社会经济背景下,对于把守国门的检验检疫工作来说,需要创新监管模式,以适应我国... 当前,我国的对外开放正进一步向全方位、深层次、宽领域的方向发展,进出口贸易持续增长;科学技术发展日新月异,经济全球化和信息化浪潮势不可当。在这样的社会经济背景下,对于把守国门的检验检疫工作来说,需要创新监管模式,以适应我国外贸经济的迅猛增长,于是"无纸化"监管模式应运而生。 展开更多
关键词 无纸化 通关效率 检信通
下载PDF
An innovative detection method of high frequency BPSK signal with low signal-to-noise ratio 被引量:2
3
作者 石硕 徐立振 +1 位作者 顾学迈 张宏莉 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第6期93-99,共7页
Based on chaotic oscillator system, this paper proposes a novel method on high frequency low signal- to-noise ratio BPSK( Binary Phase Shift Keying) signal detection. Chaotic oscillator system is a typical non-lin- ... Based on chaotic oscillator system, this paper proposes a novel method on high frequency low signal- to-noise ratio BPSK( Binary Phase Shift Keying) signal detection. Chaotic oscillator system is a typical non-lin- ear system which is sensitive to periodic signals and immune to noise at the same time. Those properties make it possible to detect low signal-to-noise ratio signals. The BPSK signal is a common signal type which is widely used in modern communication. Starting from the analysis of advantages of chaotic, os~.illator system and signal features of the BPSK signal, we put forward a unique method that can detect low signar-to-noise ratio BPSK sig- nals with high frequency. The simulation results show that the novel method can dclct.t low signal-to-noise ratio BPSK signals with frequency in an order of magnitude of l0s Hz, and the input Signal-to-Noise Ratio threshold can be -20 dB. 展开更多
关键词 low signal-to-noise ratio signal detection chaotic oscillator system Binary Phase Shift Keying high frequency
下载PDF
COMBINED TRANSMIT ANTENNA SELECTION AND DETECTION OVER SPATIAL CORRELATED MIMO SYSTEMS 被引量:2
4
作者 Meng Qingmin Hua Jingyu +1 位作者 You Xiaohu Zhuang Xiangyang 《Journal of Electronics(China)》 2007年第6期732-739,共8页
In this paper a method that combines transmit antenna selection and reduced-constellation detection in spatially correlated Multi-Input Multi-Output (MIMO) fading channels is presented. To mitigate the performance d... In this paper a method that combines transmit antenna selection and reduced-constellation detection in spatially correlated Multi-Input Multi-Output (MIMO) fading channels is presented. To mitigate the performance degradation caused by the use of antenna selection that is based on correlation among columns, an iterative receiver scheme that uses only a subset of the constellation points close to the expected symbol vahle estimated in the previous iteration is proposed. The size of the subset can adapt to the maximum correlation of the sub-matrix after the simple antenna selection. Furthermore, the error rate performance of the scheme under linear Miniinutn Mean Square Error (MMSE) or Ordered Successive Interference Cancellation (OSIC) for the first run detection and different interleaver lengths is investigated while the transnlit antenna selection is considered. The simulation results show a significant advantage both for implementation complexity and for error rate performance under a fixed data rate. 展开更多
关键词 Multi-Input Multi-Output (MIMO) Antenna selection CORRELATION Reduced-complexity detection method Iterative receiver
下载PDF
A BLIND SNR ESTIMATOR FOR DIGITAL BANDPASS SIGNALS 被引量:4
5
作者 Sui Dan Ge Lindong 《Journal of Electronics(China)》 2008年第1期7-13,共7页
A subspace-based blind Signal-to-Noise Ratio (SNR) estimation algorithm for digital bandpass signals in Additive White Gaussian Noise (AWGN) channel is discussed. The lower bounds of the mean and variance of the estim... A subspace-based blind Signal-to-Noise Ratio (SNR) estimation algorithm for digital bandpass signals in Additive White Gaussian Noise (AWGN) channel is discussed. The lower bounds of the mean and variance of the estimation are derived, and simulations are performed for the commonly used digital bandpass signals, such as MPSK (M=2, 4, 8), MFSK (M=2, 4) and MQAM (M=16, 64, 128, 256) signals. Theoretical analyses and simulation results indicate that the proposed algorithm is ef- fective even when the SNR is below 0dB. Furthermore, the algorithm can provide a blind estimator in that it needs neither the parameters of the received signals, such as the carrier frequency, symbol rate and modulation scheme, nor the synchronization of the system. 展开更多
关键词 Signal-to-Noise Ratio (SNR) estimation Blind algorithm Performance analysis Bandpass signals Subspace projection
下载PDF
Improved Quantum " Ping-Pong" Protocol Based on Extended Three-Particle GHZ State 被引量:5
6
作者 Li Jian Guo Xiaojing +2 位作者 Song Danjie Xie Feng Peng Yong 《China Communications》 SCIE CSCD 2012年第1期111-116,共6页
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro... In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. 展开更多
关键词 quantum key distffoution "Ping-pong" protocol extended three-particle GHZ state eavesdropping detection
下载PDF
ANALYSIS AND SIMULATION OF QSP BEAMFORMER
7
作者 Shi Shuangning Shang Yong +1 位作者 Liang Qinglin Liang Bin 《Journal of Electronics(China)》 2007年第6期812-814,共3页
The real Direction Of Arrival (DOA) varies with time in mobile communication system. In such situation, the performance of conventional beamformers will be degraded obviously. Quantum Signal Processing (QSP) beamforme... The real Direction Of Arrival (DOA) varies with time in mobile communication system. In such situation, the performance of conventional beamformers will be degraded obviously. Quantum Signal Processing (QSP) beamformer is insensitive to DOA errors, thus it can achieve stable output performance in such circumstance. This letter verified the effectiveness and feasibility of the QSP beamformer by simulation results. 展开更多
关键词 BEAMFORMING DOA error Quantum Signal Processing (QSP) Impact factor
下载PDF
Cooperative Spectrum Sensing Exploiting a Certain Number of CR Users Based on Multi- Antennas in Cognitive Radio Networks 被引量:2
8
作者 WANG Xiaoxiang WANG Jing +1 位作者 WANG Yulong MA Bo 《China Communications》 SCIE CSCD 2010年第4期149-155,共7页
In this paper,a cooperative spectrum sensing scheme,which is based on cooperation of a certain number of secondary users and cooperative diversity under multi-antenna scenario,is proposed.Under multi-antenna scenario,... In this paper,a cooperative spectrum sensing scheme,which is based on cooperation of a certain number of secondary users and cooperative diversity under multi-antenna scenario,is proposed.Under multi-antenna scenario,we set a targeted detection probability and optimize the false alarm probability of the network by choosing a certain number of secondary users with the highest primary user’s signal to noise ratio.The detection performance of the network is also evaluated when all the secondary users are cooperating to illustrate the benefits of the proposed scheme as a contrast.In addition,how to choose the detection threshold of the secondary user is analyzed for the purpose of decreasing the average risk.Theory analysis and simulation results show that the optimum false alarm probability can be derived by cooperating a certain number of secondary users rather than all the secondary users and the detection performance of the network can be further improved if secondary users are equipped with multiple antennas.Also,a minimum average risk can be obtained by optimizing the detection threshold. 展开更多
关键词 Cognitive Radio Cooperative Spectrum Sensing Multiple Antennas Detection Threshold.
下载PDF
BLIND ADAPTIVE MULTIUSER DETECTOR FOR NONLINEARLY MODULATED SATELLITE MOBILE CDMA SYSTEMS 被引量:2
9
作者 Shao Shixiang Yang Longxiang Kyungsup Kwak 《Journal of Electronics(China)》 2006年第3期338-340,共3页
This paper presents a novel blind adaptive noncoherent decorrelative multiuser detector for nonlinearly modulated satellite mobile Code Division Multiple Access (CDMA) systems. By using the known signature waveforms o... This paper presents a novel blind adaptive noncoherent decorrelative multiuser detector for nonlinearly modulated satellite mobile Code Division Multiple Access (CDMA) systems. By using the known signature waveforms of the counterpart earth station in the blind adaptive multiuser detector, the system performance has been improved obviously. The computation results about the convergence properties of the new detector and the previous detectors demonstrate that the proposed multiuser detector has better performance than previous multiuser detectors for nonlinearly modulated CDMA systems. 展开更多
关键词 Mobile satellite communication Nonlinear Code Division Multiple Access (CDMA) system Noncoherent detection Multiuser detection
下载PDF
Fast recognition algorithm of underwater micro-terrain based on ultrasonic detection
10
作者 罗柏文 周知进 +1 位作者 卜英勇 赵海鸣 《Journal of Central South University of Technology》 EI 2008年第5期738-741,共4页
An algorithm was proposed to fast recognize three types of underwater micro-terrain, i.e. the level, the gradient and the uneven. With pendulum single beam bathymeter, the hard level concrete floor, the random uneven ... An algorithm was proposed to fast recognize three types of underwater micro-terrain, i.e. the level, the gradient and the uneven. With pendulum single beam bathymeter, the hard level concrete floor, the random uneven floor and the gradient wood panel (8-) were ultrasonically detected 20 times, respectively. The results show that the algorithm is right from fact that the first clustering values of the uneven are all less than the threshold value of 60.0% that is obtained by the level and gradient samples. The algorithm based on the dynamic clustering theory can effectively eliminate the influences of the exceptional elevation values produced by the disturbances resulted from the grazing angle, the characteristic of bottom material and environmental noises, and its real-time capability is good. Thus, the algorithm provides a foundation for the next restructuring of the micro-terrain. 展开更多
关键词 underwater micro-terrain ultrasonic detection single beam exceptional elevation values threshold value dynamic clustering
下载PDF
SVM multiuser detection based on heuristic kernel
11
作者 杨涛 Hu Bo 《High Technology Letters》 EI CAS 2007年第2期189-193,共5页
A support vector machine (SVM) based multiuser detection (MUD) scheme in code-division multi- ple-access (CDMA) system is proposed. In this scheme, the equivalent support vector (SV) is obtained through a kern... A support vector machine (SVM) based multiuser detection (MUD) scheme in code-division multi- ple-access (CDMA) system is proposed. In this scheme, the equivalent support vector (SV) is obtained through a kernel sparsity approximation algorithm, which avoids the conventional costly quadratic pro-gramming (QP) procedure in SVM. Besides, the coefficient of the SV is attained through the solution to a generalized eigenproblem. Simulation results show that the proposed scheme has almost the same bit er-ror rate (BER) as the standard SVM and is better than minimum mean square error (MMSE) scheme. Meanwhile, it has a low comoutation complexity. 展开更多
关键词 kernel function support vector machine muhiuser detection code-division multiple-access
下载PDF
BLIND MULTIUSER DETECTION FOR V-BLAST CODED MULTICARRIER CDMA SYSTEM
12
作者 Deng Ke Yin Qinye Zhang Hong 《Journal of Electronics(China)》 2006年第1期14-19,共6页
Focusing on the space-time coded multiuser mobile communication systems in the frequency-selective fading environment, this paper proposes a Vertical Bell labs LAyered Space-Time (V-BLAST) coded Multicarrier Code-Divi... Focusing on the space-time coded multiuser mobile communication systems in the frequency-selective fading environment, this paper proposes a Vertical Bell labs LAyered Space-Time (V-BLAST) coded Multicarrier Code-Division Multiple-Access (MC-CDMA) scheme and its blind channel identification algorithm. This algorithm employs an ESPRIT-like method and the singular value decomposition, and the channels between every transmit antenna of every user and every receive antenna of the base station are blindly estimated with a closed-form solution. Based on it, an equivalent Minimum Mean-Squared Error (MMSE) time-domain multiuser detector is derived. Moreover, the proposed scheme exploits the precoding in the transmitter in order to eliminate the constraint of more receive antennas than transmit ones, required by most conventional V-BLAST codec schemes. Computer simulation results demonstrate the validity of this proposed scheme. 展开更多
关键词 MULTICARRIER Code-division multiple-access Vertical Bell labs layered space-time code Multiuser detection
下载PDF
AN IMMUNITY-BASED SECURITY ARCHITECTURE FOR MOBILE AD HOC NETWORKS 被引量:2
13
作者 Yi Ping Zhong Yiping Zhang Shiyong 《Journal of Electronics(China)》 2006年第3期417-422,共6页
This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in mobile ad hoc networks. In this approach, the immunity-based agents... This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in mobile ad hoc networks. In this approach, the immunity-based agents monitor the situation in the network. These agents can take appropriate actions according to the underlying security policies. Specifically, their activities are coordinated in a hierarchical fashion while sensing, communicating, decision and generating responses. Such an agent can learn and adapt to its environment dynamically and can detect both known and unknown intrusions. The proposed intrusion detection architecture is designed to be flexible, extendible, and adaptable that can perform real-time monitoring. This paper provides the conceptual view and a general framework of the proposed system. In the end, the architecture is illustrated by an example to show it can prevent the attack efficiently. 展开更多
关键词 Immune system Intrusion detection Mobile agent Mobile ad hoc network Network security
下载PDF
ROLS-AWS algorithm used in RBF neural network for multi-user detection
14
作者 王永建 赵洪林 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第4期553-557,共5页
To improve the computational speed, the ROLS-AWS algorithm was employed in the RBF based MUD receiver. The radial basis function was introduced into the multi-user detection (MUD) firstly. Then a three-layer neural ... To improve the computational speed, the ROLS-AWS algorithm was employed in the RBF based MUD receiver. The radial basis function was introduced into the multi-user detection (MUD) firstly. Then a three-layer neural network demodulation spread-spectrum signal model in the synchronous Gauss channel was given and the multi-user detection receiver was analyzed intensively. Simulations by computer illustrate that the proposed RBF based MUD receiver employing the ROKS-AWS algorithm is better than conventional detectors and common BP neural network based MUD receivers on suppressing multiple access interference and near-far resistance. 展开更多
关键词 multi-user detection (MUD) RBF neural network ROLS-AWS algorithm
下载PDF
Quantum Dialogue Protocol Using a Class of Three-Photon W States 被引量:5
15
作者 DONG Li XIU Xiao-Ming GAO Ya-Jun CHI Feng 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第11期853-856,共4页
A theoretical protocol of quantum dialogue is proposed,which uses a class of three-photon W states asquantum channel.After two-step security check,four-bit secret message can be transmitted to each other by transmitti... A theoretical protocol of quantum dialogue is proposed,which uses a class of three-photon W states asquantum channel.After two-step security check,four-bit secret message can be transmitted to each other by transmittingof single photon with the aid of two-bit classical information. 展开更多
关键词 quantum communication quantum dialogue W state
下载PDF
FLBS: Fuzzy lion Bayes system for intrusion detection in wireless communication network
16
作者 NARENDRASINH B Gohil VDEVYAS Dwivedi 《Journal of Central South University》 SCIE EI CAS CSCD 2019年第11期3017-3033,共17页
An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detecti... An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detection system (IDS). In this paper, the fuzzy lion Bayes system (FLBS) is proposed for intrusion detection mechanism. Initially, the data set is grouped into a number of clusters by the fuzzy clustering algorithm. Here, the Naive Bayes classifier is integrated with the lion optimization algorithm and the new lion naive Bayes (LNB) is created for optimally generating the probability measures. Then, the LNB model is applied to each data group, and the aggregated data is generated. After generating the aggregated data, the LNB model is applied to the aggregated data, and the abnormal nodes are identified based on the posterior probability function. The performance of the proposed FLBS system is evaluated using the KDD Cup 99 data and the comparative analysis is performed by the existing methods for the evaluation metrics accuracy and false acceptance rate (FAR). From the experimental results, it can be shown that the proposed system has the maximum performance, which shows the effectiveness of the proposed system in the intrusion detection. 展开更多
关键词 intrusion detection wireless communication network fuzzy clustering naive Bayes classifier lion naive Bayes system
下载PDF
Two-Phased Method for Detecting Evasive Network Attack Channels 被引量:2
17
作者 CAO Zigang XIONG Gang +2 位作者 ZHAO Yong GUO Li FANG Binxing 《China Communications》 SCIE CSCD 2014年第8期47-58,共12页
With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontation... With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontations,evasive network attacks on information infrastructures with high-tech,high concealment and longterm sustainability become severe threats to national security.In this paper,we propose a novel two-phased method for the detection of evasive network attacks which exploit or pretend to be common legal encryption services in order to escape security inspection.Malicious communications which camouflage themselves as legal encryption application are identified in the SSL'session structure verification phase firstly,and then by serverside X.509 certificate based anomaly detection,suspicious attack behaviors are further distinguished effectively.Experiment results show that our method is very useful for detecting the network activities of certain unknown threats or new malwares.Besides,the proposed method can be applied to other similar services easily. 展开更多
关键词 evasiveencryption SSL X.509detectionnetwork attacks CERTIFICATE ANOMALY
下载PDF
Deterministic Quantum Key Distribution with Pulsed Homodyne Detection
18
作者 王川 王婉莹 +1 位作者 艾清 龙桂鲁 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第1期67-70,共4页
In this paper, we propose a deterministic quantum communication protocol using weak coherent states and pulsed homodyne detection. In this protocol, the communication parties exchange their secret information determin... In this paper, we propose a deterministic quantum communication protocol using weak coherent states and pulsed homodyne detection. In this protocol, the communication parties exchange their secret information deterministicaJly in two rounds. The devices and efficiency of the protocol are discussed respectively. We also show the security of the protocol against intercept-resend and Trojan-Horse eavesdropping attacks. 展开更多
关键词 deterministic quantum key distribution pulsed homodyne detection
下载PDF
Joint Dirty Paper Coding and Linear Receiver Design for Multiuser MIMO Broadcast Channels
19
作者 车小林 何晨 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期30-34,共5页
A multiuser multiple input multiple output (MIMO) broadcast scheme was proposed through applying dirty paper coding (DPC) at the transmitter and linear equalization at the receiver. Assuming single data stream communi... A multiuser multiple input multiple output (MIMO) broadcast scheme was proposed through applying dirty paper coding (DPC) at the transmitter and linear equalization at the receiver. Assuming single data stream communication for each user, joint transmitter and linear receiver design were done to enhance the system performance. Furthermore, a multiuser scheduling algorithm was presented to exploit multiuser diversity when the number of the users is larger than that of transmit antennas. The proposed system achieves the sum rate close to the Sato bound and is superior to some of the existing schemes. 展开更多
关键词 multiuser multiple input multiple output broadcast channels multiuser scheduling
下载PDF
Real-time Data Communication in Photoelectric Image Detection System
20
作者 CHEN Wen-tao LIU Yong-gui HUANG Min 《Semiconductor Photonics and Technology》 CAS 2006年第3期200-204,共5页
High speed data communication between digital signal processor and the host is required to meet the demand of most real-time systems. PCI bus technology is a solution of this problem. The principle of data communicati... High speed data communication between digital signal processor and the host is required to meet the demand of most real-time systems. PCI bus technology is a solution of this problem. The principle of data communication based on PCI has been explained. Meanwhile, the technology of data transfer between synchronous dynamic RAM(SDRAM) and an mapping space of on-chip memory(L2) by expansion direct memory access(EDMA) has also been realized. 展开更多
关键词 Data communication PCI Expansion direct memory access DM642
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部