期刊文献+
共找到107篇文章
< 1 2 6 >
每页显示 20 50 100
美国网信技术军民融合创新系统主体研究 被引量:2
1
作者 徐婧 吴浩 +1 位作者 唐川 王立娜 《世界科技研究与发展》 CSCD 2019年第5期496-505,共10页
军民融合发展能够实现军事效益和经济效益的双赢,而创新系统的建设是实现这一目标的基础。本文对网信技术这一典型的军民两用型技术所涉及的相关机构进行梳理,从科技供需角度出发对这些机构的功能定位和运行机制进行了进一步的分析。在... 军民融合发展能够实现军事效益和经济效益的双赢,而创新系统的建设是实现这一目标的基础。本文对网信技术这一典型的军民两用型技术所涉及的相关机构进行梳理,从科技供需角度出发对这些机构的功能定位和运行机制进行了进一步的分析。在此基础上,总结出美国军民融合创新体系中的7大主体和这些主体分别对应的三个层次,最后对每个层次中的典型机构代表进行了案例分析,以期对我国军民融合建设提供参考。 展开更多
关键词 军民融合 创新系统 网信技术 美国
下载PDF
网信前沿技术在边境作战中的应用
2
作者 薛磊 《中国宽带》 2023年第10期100-102,共3页
当前,网络信息前沿技术在军事行动中的作用愈加凸显,将深刻影响军事领域战略格局和未来作战模式。基于此,本文首先介绍5G/6G、大数据和人工智能等网信前沿技术发展现状,随后分析其在边境作战中的应用,最后提出应用建议,以期为军队相关... 当前,网络信息前沿技术在军事行动中的作用愈加凸显,将深刻影响军事领域战略格局和未来作战模式。基于此,本文首先介绍5G/6G、大数据和人工智能等网信前沿技术发展现状,随后分析其在边境作战中的应用,最后提出应用建议,以期为军队相关技术发展和作战应用提供参考。 展开更多
关键词 前沿技术 边境作战 大数据 5G/6G
下载PDF
固网短信技术及其系统实现 被引量:4
3
作者 吴章兴 陈健慧 冯忠斌 《广东通信技术》 2003年第4期34-38,共5页
固网短信作为一种新的电信增值业务 ,具有广阔的市场前景。在介绍固定电话网传送短信的基本原理的基础上 ,对固网短信的系统结构、外部协议与接口。
关键词 技术 增值业务 CTSI协议 接口 系统结构 息内容提供商 物理层 链路层 消息层
下载PDF
An Overview of Internet of Vehicles 被引量:56
4
作者 YANGFangchun WANG Shangguang LI Jinglin LIU Zhihan SUN Qibo 《China Communications》 SCIE CSCD 2014年第10期1-15,共15页
The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, l... The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, loV promises huge commercial interest and research value, thereby attracting a large number of companies and researchers. This paper proposes an abstract network model of the IoV, discusses the technologies required to create the IoV, presents different applications based on certain currently existing technologies, provides several open research challenges and describes essential future research in the area of loV. 展开更多
关键词 internet of vehicles VANET vehicle telematics network model
下载PDF
FINGERPRINT-BASED KEY BINDING/RECOVERING SCHEME BASED ON FUZZY VAULT 被引量:4
5
作者 Feng Quan Su Fei Cai Anni 《Journal of Electronics(China)》 2008年第3期415-421,共7页
This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are ... This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key de- rived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key. 展开更多
关键词 BINDING Key recovering Fingerprint minutiae Fuzzy vault Multivariable linear function
下载PDF
New Optimal Power Allocation for Bidirectional Communications in Cognitive Relay Network Using Analog Network Coding 被引量:2
6
作者 LU Luxi JIANG Wei XIANG Haige LUO Wu 《China Communications》 SCIE CSCD 2010年第4期144-148,共5页
Cognitive radio and cooperative communication can greatly improve the spectrum efficiency in wireless communications.We study a cognitive radio network where two secondary source terminals exchange their information w... Cognitive radio and cooperative communication can greatly improve the spectrum efficiency in wireless communications.We study a cognitive radio network where two secondary source terminals exchange their information with the assistance of a relay node under interference power constraints.In order to enhance the transmit rate and maintain fairness between two source terminals,a practical 2-phase analog network coding protocol is adopted and its optimal power allocation algorithm is proposed.Numerical results verify the superiority of the proposed algorithm over the conventional direct transmission protocol and 4-phase amplify-and-forward relay protocol. 展开更多
关键词 Cognitive Radio Cooperative Communication Analog Network Coding Bidirectional Communications Interference power constraint
下载PDF
Network Security Incidents Frequency Prediction Based on Improved Genetic Algorithm and LSSVM 被引量:2
7
作者 ZHAO Guangyao ZOU Peng HAN Weihong 《China Communications》 SCIE CSCD 2010年第4期126-131,共6页
Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artifici... Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artificial neural network may not reach a high degree of preciseness.Least Squares Support Vector Machines (LSSVM) is a kind of machine learning methods based on the statistics learning theory,it can be applied to solve small sample and non-linear problems very well.This paper applied LSSVM to predict the occur frequency of network security incidents.To improve the accuracy,it used an improved genetic algorithm to optimize the parameters of LSSVM.Verified by real data sets,the improved genetic algorithm (IGA) converges faster than the simple genetic algorithm (SGA),and has a higher efficiency in the optimization procedure.Specially,the optimized LSSVM model worked very well on the prediction of frequency of network security incidents. 展开更多
关键词 Genetic Algorithm LSSVM Network Security Incidents Time Series PREDICTION
下载PDF
Asymptotic Analysis of Transmission Capacities for Overlaid Spread-Spectrum Wireless Networks 被引量:1
8
作者 Huarui Wu Di Li Changchuan Yin 《China Communications》 SCIE CSCD 2010年第3期81-90,共10页
We study the transmission capacities of two coexisting spread-spectrum wireless networks (a primary network vs. a secondary network) that operate in the same geographic region and share the same spectrum. We defi ne t... We study the transmission capacities of two coexisting spread-spectrum wireless networks (a primary network vs. a secondary network) that operate in the same geographic region and share the same spectrum. We defi ne transmission capacity as the product among the density of transmissions, the transmission rate, and the successful transmission probability. The primary (PR) network has a higher priority to access the spectrum without particular considerations for the secondary (SR) network, while the SR network limits its interference to the PR network by carefully controlling the density ofits transmitters. Considering two types of spread-spectrum transmission schemes (FH-CDMA and DS-CDMA) and the channel inversion power control mechanism, we quantify the transmission capacities for these two networks based on asymptotic analysis. Our results show that if the PR network permits a small increase ofits outage probability, the sum transmission capacities of the two networks (i.e., the overall spectrumefficiency per unit area) will be boosted significantly over that of a single network. 展开更多
关键词 transmission capacity ad hoc network spread spectrum stochastic geometry
下载PDF
GPSA:A Greedy Pull-based Scheduling Approach for P2P Live Streaming under Heterogeneous Environments 被引量:2
9
作者 Chen Wei Su Sen Yang Fangchun Shuang Kai 《China Communications》 SCIE CSCD 2010年第2期42-52,共11页
Pull-based P2P live streaming is a promising solution for the large scale streaming systems, like PPStream, PPlive, due to its high scalability, low cost and high resilience. However, they usually suffer from bad dela... Pull-based P2P live streaming is a promising solution for the large scale streaming systems, like PPStream, PPlive, due to its high scalability, low cost and high resilience. However, they usually suffer from bad delay performance. In this paper, we seek to improve the delay performance under ensuring video display quality stemming from chunk scheduling. And so we model Pull-based chunk scheduling problem as a multi-objective optimization problem to minimize the video delay and maximize video display quality in the environment of heterogeneous upload bandwidths, heterogeneous and dynamic propagation delays. Finally we put up with a greedy Pull-based scheduling approach(GPSA) to solve the optimization problem. The evaluation shows GPSA can outperform two classical chunk scheduling approaches and adapt to dynamic variance of propagation delays. 展开更多
关键词 P2P live streaming pull-based scheduling heterogeneous environments delay performaDce
下载PDF
Partially Overlapped Channels- and Flow-Based End-to-End Channel Assignment for Multi-Radio Multi-Channel Wireless Mesh Networks 被引量:3
10
作者 WANG Jihong SHI Wenxiao 《China Communications》 SCIE CSCD 2016年第4期1-13,共13页
Capacity reduction is a major problem faced by wireless mesh networks. An efficient way to alleviate this problem is proper channel assignment. Current end-toend channel assignment schemes usually focus on the case wh... Capacity reduction is a major problem faced by wireless mesh networks. An efficient way to alleviate this problem is proper channel assignment. Current end-toend channel assignment schemes usually focus on the case where channels in distinct frequency bands are assigned to mesh access and backbone, but actually backbone network and access network can use the same IEEE 802.11 technology. Besides, these channel assignment schemes only utilize orthogonal channels to perform channel assignment, and the resulting network interference dramatically degrades network performance. Moreover, Internet-oriented traffic is considered only, and peerto-peer traffic is omitted, or vice versa. The traffic type does not match the practical network. In this paper, we explore how to exploit partially overlapped channels to perform endto-end channel assignment in order to achieve effective end-to-end flow transmissions. The proposed flow-based end-to-end channel assignment schemes can conquer the limitations aforementioned. Simulations reveal that loadaware channel assignment can be applied to networks with stable traffic load, and it can achieve near-optimal performance; Traffic-irrelevant channel assignment is suitable for networks with frequent change of traffic load,and it can achieve good balance between performance and overhead. Also, partially overlapped channels' capability of improving network performance is situation-dependent, they should be used carefully. 展开更多
关键词 channel assignment: end-to-end partially overlapped channels load-aware traffic-irrelevant
下载PDF
A Novel Direct Anonymous Attestation Protocol Based on Zero Knowledge Proof for Different Trusted Domains 被引量:3
11
作者 YANG Yatao CAO Lulin LI Zichen 《China Communications》 SCIE CSCD 2010年第4期172-175,共4页
In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used ... In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field. 展开更多
关键词 Network Security Trusted Computing Direct Anonymous Attestation Trusted Domain.
下载PDF
An Overview of the Smart Grid in Great Britain 被引量:3
12
作者 Nick Jenkins Chao Long Jianzhong Wu 《Engineering》 SCIE EI 2015年第4期413-421,共9页
This paper presents an overview of the current status of the development of the smart grid in Great Britain(GB).The definition,policy and technical drivers,incentive mechanisms,technological focus,and the industry'... This paper presents an overview of the current status of the development of the smart grid in Great Britain(GB).The definition,policy and technical drivers,incentive mechanisms,technological focus,and the industry's progress in developing the smart grid are described.In particular,the Low Carbon Networks Fund and Electricity Network Innovation Competition projects,together with the rollout of smart metering,are detailed.A more observable,controllable,automated,and integrated electricity network will be supported by these investments in conjunction with smart meter installation.It is found that the focus has mainly been on distribution networks as well as on real-time flows of information and interaction between suppliers and consumers facilitated by improved information and communications technology,active power flow management,demand management,and energy storage.The learning from the GB smart grid initiatives will provide valuable guidelines for future smart grid development in GB and other countries. 展开更多
关键词 smart grid power system renewable energy Low Carbon Networks Fund smart metering
下载PDF
Performance of beacon safety message dissemination in Vehicular Ad hoc NETworks (VANETs) 被引量:4
13
作者 YOUSEFI Saleh FATHY Mahmood BENSLIMANE Abderrahim 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第12期1990-2004,共15页
Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applicatio... Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications. 展开更多
关键词 Safety applications Inter-vehicle communications Vehicular Ad hoc NETworks (VANETs) Application level QoS Effective range
下载PDF
AN IMPROVED OPTIMAL CHANNEL SHORTENING ALGORITHM FOR DMT MODULATION SYSTEMS 被引量:1
14
作者 Liu Shuisheng Shen Yuanlong 《Journal of Electronics(China)》 2007年第6期748-752,共5页
In Discrete Multi-Tone (DMT) modulation systems, the well-known technique to overcome the Inter-Carrier Interference (ICI)/Inter-Symbol Interference (ISI) caused by the inadequate Cyclic Prefix (CP) length is to use a... In Discrete Multi-Tone (DMT) modulation systems, the well-known technique to overcome the Inter-Carrier Interference (ICI)/Inter-Symbol Interference (ISI) caused by the inadequate Cyclic Prefix (CP) length is to use a Time-Domain Equalizer (TDE) at the receiver front-end. An algorithm used to calculate the coefficients of the optimal shortening Time Domain Equalizer (TDE) was given by Melsa. However, this algorithm requires that the length of the TDE must be smaller than or equal to the memory length of the target impulse response. This paper modifies this algorithm and makes it not only fit for calculating the coefficients of the TDE with arbitrary length, but also have a much less computational time. 展开更多
关键词 Discrete Multi-Tone (DMT) Time Domain Equalization (TDE) Cyclic Prefix (CP) Channel shortening
下载PDF
Applications of IoT in Smart Grid 被引量:1
15
作者 Chen Xi Liu Min Li Xiangzhen Liu Jianming Zhen Yan 《Electricity》 2012年第2期15-19,共5页
In this paper,the basic requirements of the smart grid in China are studied.By applying Internet of Things(IoT) technologies,various intelligent services can be created.The development of the smart grid would rely hea... In this paper,the basic requirements of the smart grid in China are studied.By applying Internet of Things(IoT) technologies,various intelligent services can be created.The development of the smart grid would rely heavily on the application of IoT.The three-layer architecture of IoT for the smart grid in China is introduced.Various information and communication technologies of IoT applied to smart grid are discussed.Particularly,several typical IoT application solutions such as power transmission line monitoring,smart patrol,smart home and electric vehicle management,are provided. 展开更多
关键词 Internet of Things smart grid information and communication technology WSN RFID
下载PDF
Application of GML and SVG in the development of WebGIS 被引量:3
16
作者 XI Yan-tao WU Jiang-guo 《Journal of China University of Mining and Technology》 EI 2008年第1期140-143,共4页
Our study deals with two major issues impacting current WebGIS development: interoperability of heterogeneous data and visualization of vector data on the Web. By using the combination of Geography Markup Language (... Our study deals with two major issues impacting current WebGIS development: interoperability of heterogeneous data and visualization of vector data on the Web. By using the combination of Geography Markup Language (GML), Scalable Vector Graphics (SVG) and Web Feature Service (WFS) Implementation Specifications developed by the OpenGIS Consortium (OGC), a strategy of WebGIS is proposed. The GML is used as a coding and data transportation mechanism to realize interoperability, the SVG to display GML data on the Web and the WFS as a data query mechanism to access and retrieve data at the feature level in real time on the Web. A case study shows that the combination mentioned above has enormous potential to achieve interoperability while not requiring considerable changes to existing legacy data. Original data formats need not be changed and could still be retrieved using WFS and transformed into GML in real time. SVG can oroduce suoerior ouality vector maps on a Web browser. 展开更多
关键词 GML SVG WFS INTEROPERABILITY WEBGIS
下载PDF
The integrated monitoring system for running parameters of key mining equipment based on condition monitoring technology 被引量:1
17
作者 BIN Guang-fu LI Xue-jun +2 位作者 BALBIR S Dhillon HUANG Zhen-yu GUO Deng-ta 《Journal of Coal Science & Engineering(China)》 2010年第1期108-112,共5页
An integrated monitoring system for running parameters of key mining equipmenton the basis of condition monitoring technology and modern communication networktechnology was developed.The system consists of a client co... An integrated monitoring system for running parameters of key mining equipmenton the basis of condition monitoring technology and modern communication networktechnology was developed.The system consists of a client computer with functions ofsignal acquisition and processing, and a host computer in the central control room.Thesignal acquisition module of the client computer can collect the running parameters fromvarious monitoring terminals in real-time.The DSP high-speed data processing system ofthe main control module can quickly achieve the numerical calculation for the collectedsignal.The signal modulation and signal demodulation are completed by the frequencyshift keying circuit and phase-locked loop frequency circuit, respectively.Finally, the signalis sent to the host computer for logic estimation and diagnostic analysis using the networkcommunication technology, which is helpful for technicians and managers to control therunning state of equipment. 展开更多
关键词 mining key equipment running parameters condition monitoring signal acquisition and processing integrated monitoring
下载PDF
Neural Network Based Algorithm and Simulation of Information Fusion in the Coal Mine 被引量:4
18
作者 ZHANG Xiao-qiang WANG Hui-bing YU Hong-zhen 《Journal of China University of Mining and Technology》 EI 2007年第4期595-598,共4页
The concepts of information fusion and the basic principles of neural networks are introduced. Neural net-works were introduced as a way of building an information fusion model in a coal mine monitoring system. This a... The concepts of information fusion and the basic principles of neural networks are introduced. Neural net-works were introduced as a way of building an information fusion model in a coal mine monitoring system. This assures the accurate transmission of the multi-sensor information that comes from the coal mine monitoring systems. The in-formation fusion mode was analyzed. An algorithm was designed based on this analysis and some simulation results were given. Finally,conclusions that could provide auxiliary decision making information to the coal mine dispatching officers were presented. 展开更多
关键词 neural network information fusion algorithm and simulation SENSORS
下载PDF
Based on Laboratory Management of the Intemet of Things Technology Progress And Research 被引量:1
19
作者 Chunxia JIA 《International Journal of Technology Management》 2015年第3期85-87,共3页
Laboratory information management based on the technology of Interact of things technology is the development trend of digital and information technology education in our country and the inevitable choice. Through the... Laboratory information management based on the technology of Interact of things technology is the development trend of digital and information technology education in our country and the inevitable choice. Through the fiLnher study of the current situation of laboratory management in colleges and universities and the characteristics of the Internet of things technology, this paper introduces the concept of Interact of things tec^mology, history and current situation of the development. With the most representative IOT architecture and Ubiquitous ID IOT system as an example, analyzes the RFID technology, sensor network and detection technology, intelligent technology and characteristics of Nanometer technology. Analysis the technical foundation for the development of the campus Interact of things, and give the Internet of things technology in the application of the laboratory management technology. 展开更多
关键词 Internet of things technologies Laboratory management technology Things Architecture
下载PDF
Middleware technologies for cloud of things: a survey 被引量:1
20
作者 Amirhossein Farahzadi Pooyan Shams +1 位作者 Javad Rezazadeh Reza Farahbakhsh 《Digital Communications and Networks》 SCIE 2018年第3期176-188,共13页
The next wave of communication and applications will rely on new services provided by the Internet of Things which is becoming an important aspect in human and machines future. IoT services are a key solution for prov... The next wave of communication and applications will rely on new services provided by the Internet of Things which is becoming an important aspect in human and machines future. IoT services are a key solution for providing smart environments in homes, buildings, and cities. In the era of massive number of connected things and objects with high growth rate, several challenges have been raised, such as management, aggregation, and storage for big produced data. To address some of these issues, cloud computing emerged to the IoT as Cloud of Things (COT), which provides virtually unlimited cloud services to enhance the large-scale IoT platforms. There are several factors to be considered in the design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying a suitable "middleware" which sits between things and applications as a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next, we study different architecture styles and service domains. Then, we present several middlewares that are suitable for CoT-based platforms and finally, a list of current challenges and issues in the design of CoT-based middlewares is discussed. 展开更多
关键词 COT Middleware Fog computing Cloud
下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部