期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
针对智能IC卡SM4算法软实现的侧信道分析
1
作者 席小林 王昭鑫 +1 位作者 陈万钢 饶金涛 《通信技术》 2023年第10期1197-1203,共7页
侧信道攻击技术的出现给SM4算法的实现带来了新的安全挑战。但现有的侧信道攻击对象主要是密码算法由硬件实现的芯片或模块,对软件实现密码算法的软件密码模块进行攻击的分析较少。通过相关性功耗分析,对SM4算法的S-BOX输入、S-BOX输出... 侧信道攻击技术的出现给SM4算法的实现带来了新的安全挑战。但现有的侧信道攻击对象主要是密码算法由硬件实现的芯片或模块,对软件实现密码算法的软件密码模块进行攻击的分析较少。通过相关性功耗分析,对SM4算法的S-BOX输入、S-BOX输出和轮输出的脆弱点进行分析,并使用采集设备捕获了智能IC卡上软件实现SM4密码算法泄露的侧信息,实现了对智能IC卡软实现SM4算法的侧信道分析。实验结果表明,攻击者可以推断出加密算法中的关键信息,从而恢复出SM4算法的加密密钥,实现了针对软件密码模块的侧信道攻击分析,进一步拓展了侧信道攻击分析的方向。 展开更多
关键词 SM4算法 相关性功耗分析 软实现 侧信道分析
下载PDF
几个特殊键、组合键的软实现 被引量:3
2
作者 杨连贺 《微型机与应用》 1991年第7期43-44,共2页
IBM PC/XT/AT机的键盘上有各种特殊键,单独使用或组合使用时,可实现多种功能,如屏幕打印,中西文状态转换(在CCDOS支持下),以及各种锁定功能等。不妨把按某个键完成相应的功能称作“硬实现”,那么,对应的另一个概念-“软实现”当然是指... IBM PC/XT/AT机的键盘上有各种特殊键,单独使用或组合使用时,可实现多种功能,如屏幕打印,中西文状态转换(在CCDOS支持下),以及各种锁定功能等。不妨把按某个键完成相应的功能称作“硬实现”,那么,对应的另一个概念-“软实现”当然是指不按任何键,而用程序来实现同样的功能。软实现有时颇为有用。例如,在中文状态下运行编译BASIC程序时,运行完毕后回到西文状态,对于某些兼容机,按CTRL+F7也只能转换成低分辨率图形方式,因而给用户带来诸多不便,尤其是在编译BASIC与其他高级语言混合编程的场合。但是,如果用户借助于下面将要介绍的小程序CTRLF7. 展开更多
关键词 PC机 特殊建 组合键 软实现
下载PDF
几个组合键的软实现程序
3
作者 郭明华 郭明兰 李青 《电脑学习》 1997年第1期45-46,共2页
关键词 微机 软实现程序 汇编程序 组合键
下载PDF
基于内藏T6963C控制器的液晶模块的DSP软硬件实现 被引量:1
4
作者 刘慧英 景芳 宁飞 《机械与电子》 2006年第1期19-21,共3页
介绍了一种DSP控制器的设计方法,用于对内藏T6963C控制器液晶模块进行汉字图形显示控制。给出了硬件接口的设计实现以及软件汉字库与图形库的制作方法。
关键词 DSP控制 液晶图形显示 、硬件实现 T6963C控制器
下载PDF
循环冗余校验软件在无线检测系统中的应用 被引量:2
5
作者 黄继战 肖兴明 王鹏 《机械与电子》 2004年第12期46-48,共3页
采用循环冗余校验(CRC)技术,设计了CRC在上、下位机无线串行通信中的软件及数据处理流程,以解决数据无线传输过程中的误码检测问题。结果表明,系统检错能力强、耗时少,节省硬件。
关键词 循环冗余校验 软实现 无线检测 串行通信
下载PDF
Responses of Filtration Rate of Freshwater Mussel Anodonta woodiana to Ambient Ammonia Concentration
6
作者 葛长字 秦耿 彭小经 《Agricultural Science & Technology》 CAS 2010年第2期179-182,共4页
By using one static water system,the filtration rates of one kind of freshwater mussel Anodonta woodiana with different body weight(accounted by dry weight of soft tissue)were studied under semi-field conditions.Durin... By using one static water system,the filtration rates of one kind of freshwater mussel Anodonta woodiana with different body weight(accounted by dry weight of soft tissue)were studied under semi-field conditions.During the experiments,the water temperature and the suspended particulate matters concentration were kept relative invariable and there were four ambient ammonia concentration levels.The ambient water ammonia concentration was obtained by the excretion of the freshwater mussel and the accession of ... 展开更多
关键词 Semi-field experiment Ammonia concentration Dry weight of soft tissue Anodonta woodiana Filtration rate
下载PDF
Evaluation and improvement of wastewater treatment plant performance using BioWin 被引量:1
7
作者 OLEYIBLO Oloche James 操家顺 +3 位作者 冯骞 王淦 薛朝霞 方芳 《Chinese Journal of Oceanology and Limnology》 SCIE CAS CSCD 2015年第2期468-476,共9页
In this study,the activated sludge model implemented in the BioWin software was validated against full-scale wastewater treatment plant data. Only two stoichiometric parameters(Y p /acetic and the heterotrophic yield(... In this study,the activated sludge model implemented in the BioWin software was validated against full-scale wastewater treatment plant data. Only two stoichiometric parameters(Y p /acetic and the heterotrophic yield(Y H)) required calibration. The value 0.42 was used for Yp /acetic in this study,while the default value of the BioWin software is 0.49,making it comparable with the default values of the corresponding parameter(yield of phosphorus release to substrate uptake(YPO4)) used in ASM2,ASM2 d,and ASM3 P,respectively. Three scenarios were evaluated to improve the performance of the wastewater treatment plant,the possibility of wasting sludge from either the aeration tank or the secondary clarifier,the construction of a new oxidation ditch,and the construction of an equalization tank. The results suggest that construction of a new oxidation ditch or an equalization tank for the wastewater treatment plant is not necessary. However,sludge should be wasted from the aeration tank during wet weather to reduce the solids loading of the clarifiers and avoid effluent violations. Therefore,it is recommended that the design of wastewater treatment plants(WWTPs) should include flexibility to operate the plants in various modes. This is helpful in selection of the appropriate operating mode when necessary,resulting in substantial reductions in operating costs. 展开更多
关键词 activated sludge aeration tank equalization tank secondary clarifier wet weather
下载PDF
Thermo Tank Temperature Control System Based On STM32
8
作者 邱彪 李世光 +2 位作者 高正中 张旭 芮昱 《Journal of Measurement Science and Instrumentation》 CAS 2011年第1期64-66,共3页
This paper introduced a thermo tank temperature control system based on STM32. Firstly, the temperature acquisition is real- ized by the high-lxecision electrical bridge based on constant current source. Then the augm... This paper introduced a thermo tank temperature control system based on STM32. Firstly, the temperature acquisition is real- ized by the high-lxecision electrical bridge based on constant current source. Then the augmented PID algorithm realized by software is adopteff But-terworth filter is used to convert the o.aput PWM of STM32 to current signal which is used to control the seniconductor control rectifier to adjust the temrature. Calibration check and practical application both indicated that the system was reliable, high-precision, practicable and could meet reality needs. 展开更多
关键词 SRM32 thermo tank tanperamre acquisition PID
下载PDF
THE DESIGN AND IMPLEMENTATION OF THE IEEE 802.11 MAC BASED ON SOFT-CORE PROCESSOR AND RTOS 被引量:1
9
作者 Xiao Wan'ang Fang Zhi Shi Yin 《Journal of Electronics(China)》 2007年第2期232-237,共6页
The implementation method of the IEEE 802.11 Medium Access Control (MAC) protocol is mainly based on DSP (Digital Signal Processor)/ ARM (Advanced Reduced instruction set computer Machine) processor or DSP/ARM IP (Int... The implementation method of the IEEE 802.11 Medium Access Control (MAC) protocol is mainly based on DSP (Digital Signal Processor)/ ARM (Advanced Reduced instruction set computer Machine) processor or DSP/ARM IP (Intellectual Property) core. This paper presents a method based on Nios II soft-core processor embedded in Altera’s Cyclone FPGA (Field Programmable Gate Array) and MicroC/OS-II RTOS (Real-Time Operation System). The benefits and drawbacks of above methods are compared, and then the method presented in this paper is described. The hardware and software partitioning are discussed; the hardware architecture is also illustrated and the MAC software programming is described in detail. The presented method has some advantages, such as low cost, easy-implementation and very suitable for the implementation of IEEE 802.11 MAC in research stage. 展开更多
关键词 IEEE 802.11 Medium Access Control (MAC) Design and implementation Real-Time Operation System (RTOS) Soft-core processor
下载PDF
Android Malware Detection with Contrasting Permission Patterns 被引量:2
10
作者 XIONG Ping WANG Xiaofeng +2 位作者 NIU Wenjia ZHU Tianqing LI Gang 《China Communications》 SCIE CSCD 2014年第8期1-14,共14页
As the risk of malware is sharply increasing in Android platform,Android malware detection has become an important research topic.Existing works have demonstrated that required permissions of Android applications are ... As the risk of malware is sharply increasing in Android platform,Android malware detection has become an important research topic.Existing works have demonstrated that required permissions of Android applications are valuable for malware analysis,but how to exploit those permission patterns for malware detection remains an open issue.In this paper,we introduce the contrasting permission patterns to characterize the essential differences between malwares and clean applications from the permission aspect Then a framework based on contrasting permission patterns is presented for Android malware detection.According to the proposed framework,an ensemble classifier,Enclamald,is further developed to detect whether an application is potentially malicious.Every contrasting permission pattern is acting as a weak classifier in Enclamald,and the weighted predictions of involved weak classifiers are aggregated to the final result.Experiments on real-world applications validate that the proposed Enclamald classifier outperforms commonly used classifiers for Android Malware Detection. 展开更多
关键词 malware detection permissionpattern classification contrast set ANDROID
下载PDF
Automatic Migration of a Software Task to Hardware Component in MPSoC Systems
11
作者 Kamel Smiri Abdelhafidh Ben Fadhel +1 位作者 Abderrazak Jemai Ahmed Chiheb Ammari 《Computer Technology and Application》 2011年第12期931-938,共8页
The authors will focus on the study of the design of Multiprocessor Systems on Chip (MPSoC), specifically in the context of improving the performance of applications located on the MPSoC architecture. The objective ... The authors will focus on the study of the design of Multiprocessor Systems on Chip (MPSoC), specifically in the context of improving the performance of applications located on the MPSoC architecture. The objective of this research is to study the problems of transition from a pure software implementation for an embodiment admitting one or more hardware components and to develop a methodology for automatic generation of migration of a software task into a hardware component in MPSoC. The transformation of a software task into a hardware task led to many changes, hardware part (connection, the requirement of an interrupt controller...), software part (at least one task, I/O (I/O), synchronization...) and an architectural point of view, the remarkable aspects of data storage. The experiment is done on the MJPEG decoder to illustrate the effectiveness of the authors' tool for automatic generation of migration. 展开更多
关键词 CO-DESIGN decoder motion-JPEG transaction accurate automatic generation material component.
下载PDF
Internet-Oriented Optimization Schemes for Joint Compression and Encryption
12
作者 WANG Yilei CHANG Xiaotao +2 位作者 Amit Golander Hubertus Franke CHEN Beijing 《China Communications》 SCIE CSCD 2015年第10期158-168,共11页
Compression and encryption are widely used in network traffic in order to improve efficiency and security of some systems.We propose a scheme to concatenate both functions and run them in a paralle pipelined fashion,d... Compression and encryption are widely used in network traffic in order to improve efficiency and security of some systems.We propose a scheme to concatenate both functions and run them in a paralle pipelined fashion,demonstrating both a hardware and a software implementation.With minor modifications to the hardware accelerators,latency can be reduced to half.Furthermore,we also propose a seminal and more efficient scheme,where we integrate the technology of encryption into the compression algorithm.Our new integrated optimization scheme reaches an increase of 1.6X by using parallel software scheme However,the security level of our new scheme is not desirable compare with previous ones.Fortunately,we prove that this does not affect the application of our schemes. 展开更多
关键词 compression and encryption 3DES Lempel-Ziv algorithm.
下载PDF
Virtual Reality and Its Application to Slide Annimation of Landslide
13
作者 PANJianping YEHuanzhou 《Geo-Spatial Information Science》 2004年第2期153-156,共4页
A few researches adopt virtual reality in landslide. So it is significant to combine the physics\|based deformable method with the process simulation of a sliding landslide, this way the dynamic process of a going lan... A few researches adopt virtual reality in landslide. So it is significant to combine the physics\|based deformable method with the process simulation of a sliding landslide, this way the dynamic process of a going landslide can be simulated. The analysis of the dynamic law of landslide provides a foundation to forecast and make it realiable to foretell disasters. After recounting the condition of VR and landsliding body simulation, this paper puts forward simulating landslide by the physics\|based deformable method. The method divides landsliding into deformable body and rigid one. The deformation of deformable body can be compute by DDA and FEM, and DDA fits the great deformation and FEM is good for the tiny deformation. This paper shows it is feasible to simulate the landslide animation by this method. 展开更多
关键词 virtual reality ANIMATION LANDSLIDE
下载PDF
Low Complexity SOVA for Turbo Codes
14
作者 Ruilin Pei Zulin Wang +1 位作者 Qin Huang Jiaqing Wang 《China Communications》 SCIE CSCD 2017年第8期33-40,共8页
Recently, trimming Soft-output Viterbi algorithm(T-SOVA) has been proposed to reduce the complexity of SOVA for Turbo codes. In its fi rst stage, a dynamic algorithm, lazy Viterbi algorithm, is used to indicate the mi... Recently, trimming Soft-output Viterbi algorithm(T-SOVA) has been proposed to reduce the complexity of SOVA for Turbo codes. In its fi rst stage, a dynamic algorithm, lazy Viterbi algorithm, is used to indicate the minimal metric differences which brings obstacle on hardware implementation. This paper proposes a Viterbi algorithm(VA) based T-SOVA to facilitate hardware implementation. In the first stage of our scheme, a modified VA with regular structure is used to fi nd the maximum likelihood(ML) path and calculate the metric differences. Further, local sorting is introduced to trim the metric differences, which reduces the complexity of trimming operation. Simulation results and complexity analysis show that VA based T-SOVA performs as well as lazy VA based T-SOVA and is easier to be applied to hardware implementation. 展开更多
关键词 VA SOVA local sorting hardware implementation
下载PDF
法律社会化视角下的软法责任 被引量:15
15
作者 毕雁英 《行政法学研究》 CSSCI 北大核心 2018年第4期61-72,共12页
法律规则的发展是人的社会化的结果和载体,人的不断社会化的历史进程在制度层面必然引致法律的社会化发展,软法律正是法律社会化的一种表现形式,反映了法律意涵的演进以及由此带来的法律责任形式的变化。国家强制力观念在法律规则层面... 法律规则的发展是人的社会化的结果和载体,人的不断社会化的历史进程在制度层面必然引致法律的社会化发展,软法律正是法律社会化的一种表现形式,反映了法律意涵的演进以及由此带来的法律责任形式的变化。国家强制力观念在法律规则层面的弱化意味着一场法学理论本体论的变革,高度分工社会中人们的相互依赖,使软法责任成为社会运转的润滑剂,同时硬法规则中的大部分责任实际是通过软法责任机制实现的,或者内化为自我实现的责任,又或者外化为社会压力下的责任,但是,在缺乏普遍信任的社会,如果没有国家强制力的保障,软法责任机制也将很难实现。 展开更多
关键词 法责任 法律的社会化 国家强制力的弱化 法责任的实现机制 权力的社会化
原文传递
Information schema constructs for instantiation and composition of system manifestation features
16
作者 Shahab POURTALEBI Imre HORVATH 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第9期1396-1415,共20页
Complementing our previous publications, this paper presents the information schema constructs (ISCs) that underpin the programming of specific system manifestation feature (SMF) orientated information management ... Complementing our previous publications, this paper presents the information schema constructs (ISCs) that underpin the programming of specific system manifestation feature (SMF) orientated information management and composing system models. First, we briefly present (1) the general process of pre-embodiment design with SMFs, (2) the procedures of creating genotypes and phenotypes of SMFs, (3) the specific procedure of instantiation of phenotypes of SMFs, and (4) the procedure of system model management and processing. Then, the chunks of information needed for instantiation of phenotypes of SMFs are discussed, and the ISCs designed for instantiation presented. Afterwards, the information management aspects of system modeling are addressed. Methodologically, system modeling involves (1) placement of phenotypes of SMF in the modeling space, (2) combining them towards the desired architecture and operation, (3) assigning values to the parameters and checking the satisfac- tion of constraints, and (4) storing the system model in the SMFs-based warehouse database. The final objective of the reported research is to develop an SMFs-based toolbox to support modeling of cyber-physical systems (CPSs). 展开更多
关键词 System manifestation features (SMFs) Information schema constructs Database schemata SMF genotypes SMFphenotypes SMF instances Soft'ware tool box System-level design Cyber-physieal systems
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部