期刊文献+
共找到60篇文章
< 1 2 3 >
每页显示 20 50 100
论我国刑事侦查中线人协议的构建
1
作者 王艺 《黑龙江省政法管理干部学院学报》 2018年第3期108-110,共3页
由于线人使用的隐秘性、保密性强等特点,线人的合法权益受到侵害时往往得不到有效的救济。当侦查机关决定让某人成为线人时,在双方之间就产生了某种类似"契约"的社会关系。这种特殊的社会关系,不仅是双方权利义务关系的体现,... 由于线人使用的隐秘性、保密性强等特点,线人的合法权益受到侵害时往往得不到有效的救济。当侦查机关决定让某人成为线人时,在双方之间就产生了某种类似"契约"的社会关系。这种特殊的社会关系,不仅是双方权利义务关系的体现,同时也被相关的法律所认可。实践中,侦查机关与线人之间几乎没有协议,缺少内在的约束机制,导致线人被滥用和侵害的现象很严重。线人协议的构建明确了侦查机关和线人的权利义务关系,规范了线人使用,对线人合法权益的保护具有重要的意义。 展开更多
关键词 刑事侦查 线协议 标的 侦查法治化
下载PDF
网络协议栈的用户层实现机制研究 被引量:2
2
作者 曾斌 黄道颖 +1 位作者 黄志军 吴敏 《计算机工程与应用》 CSCD 北大核心 2002年第13期166-168,共3页
过去,所有的协议栈一般运行在核心层或作为一个独立的用户服务进程,这种方式不便于协议代码的维护、调试和开发。为此,该文提出针对不同的协议,分别采用一个用户层协议库来实现其功能,重点介绍了传输层协议库的设计和实现。
关键词 网络协议线 用户层 协议 传输控制协议 通信协议
下载PDF
一种新的ATM专用协议栈的语义描述 被引量:1
3
作者 方震 叶小萌 王睿 《计算机科学》 CSCD 北大核心 1997年第4期60-63,29,共5页
一、引言 人TM(异步传输模式)提供了诸如高带宽、服务质量(QOS)约定等一系列优良特,可望成为未来B一IsDN的首选基础传输技术。要使ATM技术真正得到广泛应用。
关键词 ATM 专用协议线 语义描述 计算机网络
下载PDF
IPv6协议及其发展现状
4
作者 李滢 赵杨川 《本溪冶金高等专科学校学报》 2002年第1期4-6,共3页
介绍了新一代Internet协议─IPv6的技术背景和技术特点 ,讨论了IPv4过渡到IPv6的几种方案 。
关键词 IPV6协议 发展现状 邻居发现 QOS双协议线 计算机网络 隧道机制
下载PDF
蓝牙协议体会
5
作者 江涛 许明艳 《电信交换》 2001年第1期5-10,共6页
Bluetooth规范是一个短距离无线连接的标准,旨在替代便携或固定电子设备的连接线缆。这篇文章简要介绍了整个Bluetooth协议的体系、特点,以及各协议之间的关系。
关键词 线通信协议 协议线 蓝牙协议
下载PDF
FM24CL04在ZLT-S1型脱扣器动作一致测试仪中的应用 被引量:1
6
作者 吴鸿霞 皮大能 《黄石理工学院学报》 2008年第2期15-19,共5页
介绍了FM24CL04的性能、特点以及数据传输和结构,提出了一种用51系列单片机的C语言(C51)模拟与FM24CL04通信的软件方法,给出了在ZLT-S1型脱扣器动作一致测试仪中具体实现的C语言函数。
关键词 FM24CLD4 线协议 FRAM
下载PDF
如何做好县级勘界文档的立卷工作
7
作者 楼芳 《浙江档案》 北大核心 1998年第9期31-31,共1页
关键词 勘界 文档 如何做好 实施方案 边界线 线协议 界桩登记表 直接联系 工作总结 作用图
下载PDF
移动IP安全性分析与研究
8
作者 彭春江 沈金龙 《中国数据通信》 2002年第12期65-68,共4页
随着Internet的迅猛发展及便携终端的日益普及,要求网络具有移动计算支持能力;同时,Internet中的通信会受到各种攻击,移动IP的引入则使安全问题更为突出。本文侧重分析了移动IP中的安全问题并讨论了移动IP如何穿越防火墙技术。
关键词 安全性 移动IP IPSec协议线 穿越防火墙 INTERNET
下载PDF
档案,增强了军政团结
9
作者 白成山 《云南档案》 1998年第6期39-39,共1页
绿春县广播电视局与驻军某部从1978年始,20年来一直都和睦相处、互谅互让.然而由于铁打的军营,流水的兵,部队官兵不知换了多少茬.近年采,部队与地方在用地、用电方面,场地、设施方面生产了一些误会,提出要广播电视局每年交给部队7300元... 绿春县广播电视局与驻军某部从1978年始,20年来一直都和睦相处、互谅互让.然而由于铁打的军营,流水的兵,部队官兵不知换了多少茬.近年采,部队与地方在用地、用电方面,场地、设施方面生产了一些误会,提出要广播电视局每年交给部队7300元左右费用.为消除误会.增进军政团结.1998年7月1日,县委、县人民政府有关领导会同广播电视局和有关工作人员,到驻军某部办公室与部队领导一起共同协商解决问题.根据部队提出的问题,我们查阅了档案资料,并提供了1982年的土地使用书、合架高压输电专线协议书.1984年及其以后双方就用电问题协调会议纪要和建设电视差转台、中波转播台、微波中继站等有关协议的文件材料.在历史档案面前.部队现任领导解除了对地方上的误会.并作了道歉,使广播电视局避免了不必要的经济损失.档案消除了地方与部队的误解,使问题得到圆满解决,增进了军政团结.增强了军政情谊.通过这件事.使我们进一步认识到了保管利用好档案的重要性和必要性. 展开更多
关键词 广播电视局 档案资料 高压输电 部队官兵 绿春县 重要性和必要性 消除误会 线协议 县人民政府 土地使用
下载PDF
ISDN与LAN网关技术的研究
10
作者 程伟明 《现代电信科技》 1997年第11期6-10,16,共6页
ISDN-LAN网关是ISDN和LAN互通的关键设备.文章介绍了ISDN-PRI和LAN的10BASE-2接口所遵循的协议和标准,以及接口协议转换栈,讨论了通信过程中网关的通道管理策略,最后概述网关硬件和软件的功能及设计要点.
关键词 ISDN LAN 网关 协议转换线 通道管理
下载PDF
WAP技术分析及在移动Internet中的应用
11
作者 张震 《延安大学学报(自然科学版)》 2000年第4期32-36,共5页
WAP(Wireless Application Protocol)是随着 Internet和无线移动通信的发展而迅速发展起来的一种无线网络协议 .它定义了一个分层的 ,可伸缩的 ,可扩展的体系结构 .为移动 Internet提供全面解决方案 .使用 WAP协议 ,数字移动电话用户可... WAP(Wireless Application Protocol)是随着 Internet和无线移动通信的发展而迅速发展起来的一种无线网络协议 .它定义了一个分层的 ,可伸缩的 ,可扩展的体系结构 .为移动 Internet提供全面解决方案 .使用 WAP协议 ,数字移动电话用户可以在无线网络享受与普通 Internet所提供服务一样的大多数服务内容 .在基于分析 WAP协议栈的基础上 ,研究了它的应用模型 ,并探讨 WAP在 GSM系统中的应用方案及在移动 Internet中的接入方法 . 展开更多
关键词 线应用协议 手机上网 移动网络 WAP代理 移动INTERNET GSM移动通信系统 WAP协议线
下载PDF
Study on RFID Authentication Protocol Theory 被引量:3
12
作者 齐勇 姚青松 +1 位作者 陈滢 钟虓 《China Communications》 SCIE CSCD 2011年第1期65-71,共7页
Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws ... Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future. 展开更多
关键词 RFID security and privacy authentica- tion protocol THEORY
下载PDF
Traffic-Aware Channelization Medium Access Control for Wireless Ad Hoc Networks 被引量:2
13
作者 史春光 赵海涛 +2 位作者 张少杰 马东堂 魏急波 《China Communications》 SCIE CSCD 2013年第4期88-100,共13页
Existing multi-channel Medium Access Control (MAC) protocols have been demonstrated to significantly increase wireless network performance compared to single channel MAC protocols. Traditionally, the channelization st... Existing multi-channel Medium Access Control (MAC) protocols have been demonstrated to significantly increase wireless network performance compared to single channel MAC protocols. Traditionally, the channelization structure in IEEE 802.11 based wireless networks is pre-configured, and the entire available spectrum is divided into subchannels and equal channel widths. In contrast, this paper presents a Traffic-Aware Channelization MAC (TAC-MAC) protocol for wireless ad hoc networks, where each node is equipped with a single half duplex transceiver. TAC-MAC works in a distributed, fine-grai-ned manner, which dynamically divides variable-width subchannels and allocates subchannel width based on the Orthogonal Frequency Division Multiplexing (OFDM) technique according to the traffic demands of nodes. Simulations show that the TAC-MAC can significantly improve network throughput and reduce packet delay compared with both fixed-width multi-channel MAC and single channel 802.11 protocols, which illustrates a new paradigm for high-efficient multi-channel MAC design in wireless ad hoc networks. 展开更多
关键词 wireless ad hoc networks multi-channel MAC TAC IEEE 802.11
下载PDF
Development of a Calibration and Monitoring System for GD-1 High Pressure Common Rail Diesel Engine 被引量:2
14
作者 王俊席 杨林 +2 位作者 冯静 冒晓建 卓斌 《Journal of Shanghai Jiaotong university(Science)》 EI 2004年第2期45-49,共5页
Based on CAN calibration protocol, a new calibration and monitoring system was developed for the GD-1 high pressure common rail diesel engine. CAN driver block, monitoring program and calibration program for this syst... Based on CAN calibration protocol, a new calibration and monitoring system was developed for the GD-1 high pressure common rail diesel engine. CAN driver block, monitoring program and calibration program for this system were designed respectively. The inquiry mode was used in the monitoring program and the interrupt mode was used in calibration program. The calibration program was designed in structural programming model. This system provides a reliable, accurate and quick CAN bus between ECU and PC, with baud rate up to 500Kbit/s. The implementation of the compatible and universal CAN calibration protocol makes it easy to displace the system and its function modules. It also provides friendly, compatible and flexible calibration interface, and the functions of online calibration and real-time monitoring. This system was successfully used in a GD-1 high pressure common rail diesel engine and the engine performance and exhaust emissions were significantly improved. 展开更多
关键词 diesel engine calibrating and monitoring system CAN calibration protocol online calibration
下载PDF
Energy-efficient Medium Access Approach for Wireless Body Area Network Based on Body Posture 被引量:1
15
作者 WANG Feng HU Fengye +3 位作者 WANG Lu DU Yu LIU Xiaolan GUO Gang 《China Communications》 SCIE CSCD 2015年第12期122-132,共11页
Energy efficiency has become one of the most important issues in wireless body area network(WBAN).In this paper,an energy-efficient medium access control(MAC)protocol for WBAN is proposed based on human body posture u... Energy efficiency has become one of the most important issues in wireless body area network(WBAN).In this paper,an energy-efficient medium access control(MAC)protocol for WBAN is proposed based on human body posture under walking scenery.Due to person's movements,WBAN is a dynamic network,which means that traditional static protocols are no more suitable for it.For solving this problem,firstly,the feature of human walking at a constant speed is analyzed and we divide a spell of movements into a sequence of key frames just like a video constituted by numbers of continuous frames.As a result,the dynamic walking process is translated into several static postures,which the static MAC protocol could be used for.Secondly,concerning the performance of network lifetime,we design a posture-aware approach for lifetime maximization(PA-DPLM).With analytical and simulation results provided,we demonstrate that PA-DPLM protocol is energy-efficient and can be used under constant speed walking scenery. 展开更多
关键词 Medium lifetime aware frames maximization walking transmit topology gains beacon
下载PDF
Tree-Based Proactive Routing Protocol for Wireless Mesh Network 被引量:2
16
作者 Ji Wenjiang Ma Jianfeng +1 位作者 Ma Zhuo Ran Youliang 《China Communications》 SCIE CSCD 2012年第1期25-33,共9页
Wireless Mesh Network (WMN) is seen as an effective Intemet access solution for dynamic wireless applications. For the low mobility of mesh routers in WMN, the backbone topography can be effectively maintained by pr... Wireless Mesh Network (WMN) is seen as an effective Intemet access solution for dynamic wireless applications. For the low mobility of mesh routers in WMN, the backbone topography can be effectively maintained by proactive routing protocol. Pre-proposals like Tree Based Routing (TBR) protocol and Root Driven Routing (RDR) protocol are so centralized that they make the gateway becorre a bottleneck which severely restricts the network performance. We proposed an Optimized Tree-based Routing (OTR) protocol that logically separated the proactive tree into pieces. Route is partly computed by the branches instead of root. We also discussed the operation of multipie Intemet gateways which is a main issue in WMN. The new proposal lightens the load in root, reduces the overhead and improves the throughput. Numerical analysis and simulation results confirm that the perforrmnce of WMN is improved and OTR is more suitable for large scale WMN. 展开更多
关键词 wireless mesh network 802. lls routing protocol tree-based routing
下载PDF
A MAC PROTOCOL TO SUPPORT HYBRID ANTENNAS IN A WIRELESS LAN 被引量:1
17
作者 Zhao Liqiang Zhang Hailin Liu Yi 《Journal of Electronics(China)》 2007年第3期309-315,共7页
Hybrid Distributed Coordination Function (HDCF),a modified medium access control pro-tocol of IEEE 802.11 standard,is proposed in this paper to support both smart adaptive array anten-nas and normal omni-directional a... Hybrid Distributed Coordination Function (HDCF),a modified medium access control pro-tocol of IEEE 802.11 standard,is proposed in this paper to support both smart adaptive array anten-nas and normal omni-directional antennas simultaneously in one wireless LAN. Omni-directional an-tennas follow the standard Distributed Coordination Function (DCF) and smart antennas follow the Directional DCF (DDCF). The proposed DDCF is based on Hybrid Virtual Carrier Sense (HVCS) mechanism,which includes Omni-directional Request-To-Send/Clear-To-Send (ORTS/OCTS) hand-shake mechanism and directional data transmission. HDCF is compatible with DCF. When a node transmits in a directional beam,the other nodes can multiplex the physical channel. Hence,HDCF supports Space Division Multiple Access (SDMA). Simulation results show that HDCF can support hybrid antennas effectively and provide much higher network throughput and lower delay and jitter than DCF does. 展开更多
关键词 Wireless LAN Smart adaptive array antennas Medium Access Control (MAC) Space Division Multiple Access (SDMA)
下载PDF
ATTACKS AND IMPROVEMENTS ON THE RFID AUTHENTICATION PROTOCOLS BASED ON MATRIX 被引量:3
18
作者 Wang Shaohui Liu Sujuan 《Journal of Electronics(China)》 2013年第1期33-39,共7页
Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In... Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack. 展开更多
关键词 Radio Frequency IDentification (RFID) Mutual authentication Matrix-based Imper-sonation attack PRIVACY SCALABILITY
下载PDF
AN MAC PROTOCOL SUPPORTING MULTIPLE TRAFFIC OVER MOBILE AD HOC NETWORKS 被引量:2
19
作者 Tian Hui Li Yingyang Hu Jiandong Zhang Ping (College of Telecom. Eng., Beijing University of Posts & Telecommunications, Beijing 100876) 《Journal of Electronics(China)》 2003年第2期116-120,共5页
This letter presents the design and performance of a multi-channel MAC protocol that supports multiple traffics for IEEE 802.11 mobile ad-hoc networks. The dynamic channel selection scheme by receiver decision is impl... This letter presents the design and performance of a multi-channel MAC protocol that supports multiple traffics for IEEE 802.11 mobile ad-hoc networks. The dynamic channel selection scheme by receiver decision is implemented and the number of the data channel is independent of the network topology. The priority for real-time traffic is assured by the proposed adaptive back off algorithm and different IFS. The protocol is evaluated by simulation and the results have shown that it can support multiple traffics and the performance is better than the performance that IEEE 802.11 standard provides. 展开更多
关键词 Wireless networks Ad hoc wireless LAN Medium access control protocol
下载PDF
TD-SCDMA系统移动台侧信令结构
20
作者 邹小春 何先军 刘鸿雁 《电信快报》 2002年第7期29-32,共4页
文章主要介绍第三代移动通信TD-SCDMA系统空中接口移动台侧的信令结构,对协议栈的各层功能作简要说明,并以移动台主呼过程为例,介绍各层间接口的协调工作情况。
关键词 TD-SCDMA系统 移动台 信令结构 移动通信 接口 协议线
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部