期刊文献+
共找到1,007篇文章
< 1 2 51 >
每页显示 20 50 100
Adaptive Antenna-Activation Based Beamforming for Large-Scale MIMO Communication Systems of High Speed Railway 被引量:3
1
作者 Meng Cheng Shaoshi Yang Xuming Fang 《China Communications》 SCIE CSCD 2016年第9期12-23,共12页
Large-scale array aided beamforming improves the spectral efficiency(SE) as a benefit of high angular resolution.When dual-beam downlink beamforming is applied to the train moving towards cell edge,the inter-beam ambi... Large-scale array aided beamforming improves the spectral efficiency(SE) as a benefit of high angular resolution.When dual-beam downlink beamforming is applied to the train moving towards cell edge,the inter-beam ambiguity(IBA) increases as the directional difference between beams becomes smaller.An adaptive antenna activation based beamforming scheme was proposed to mitigate IBA.In the district near the base station(BS),all antenna elements(AEs) were activated to generate two beams.As the distance from the train to the BS increased,only the minimum number of AEs satisfying the resolution criterion would be activated.At the cell edge,one beam was switched off due to intolerable IBA.The proposed scheme can achieve SE gain to the non-adaptive scheme and show more robustness against the direction-of-arrival(DOA) estimation error. 展开更多
关键词 wireless communications adap- tive antenna activation large-scale antenna array downlink beamforming high speed railway
下载PDF
IMPLEMENTING SECURITY FOR ACTIVE NETWORKS IN INTERNET
2
作者 Tang Yin Wang Weiran (College of Electronic Engineering, UEST of China, Chengdu 610054) 《Journal of Electronics(China)》 2003年第4期305-308,共4页
Active networks is primarily a Defense Advanced Research Projects Agency(DARPA)-funded project focusing on the research of mechanisms, applications, and operating systems to develop a reconfigurable network infrastruc... Active networks is primarily a Defense Advanced Research Projects Agency(DARPA)-funded project focusing on the research of mechanisms, applications, and operating systems to develop a reconfigurable network infrastructure. This letter proposes an Secure Active Tracing System (SATS) to implementing security for active networking in Internet. Unlike currently existing schemes, SATS reduces the computational overloads by executing the filtering operation on selected packet streams only when needed. 展开更多
关键词 active networks security Distributed Denial of Service (DDoS) active network Backbone(ABone) active Network Transport System(ANTS) active Signaling Protocol (ASP)
下载PDF
Public Security Risk m Large Scale Activities and the Standardization Prospects
3
作者 Xiong Fei,Ma Na Yan Shaoqing research center or Shanghai Institute of Standardization. senior engineer,director or research center of standardization,Shanghai Institute of Standardization,secretary general of SAC/TC 269/SC 3 on third party logistics service,secretary general of SAC/TC 234/SC 1 on project management maturity assessment, 《China Standardization》 2010年第5期31-38,共8页
This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying ... This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying out relevant standardization works after discussions about the actuality and prospect of social security on large scale activities in China. 展开更多
关键词 Large Scale activities Public security STANDARDIZATION
下载PDF
’97 Large-Scale Cultural Activities in Liaoning Province
4
《China & The World Cultural Exchange》 1997年第1期68-68,共1页
关键词 large-scale Cultural activities in Liaoning Province
下载PDF
Large-scale Cultural Activities in Inner Mongolia in 1997
5
《China & The World Cultural Exchange》 1997年第1期66-67,共2页
关键词 large-scale Cultural activities in Inner Mongolia in 1997
下载PDF
Review of dynamics and active control of large-scale space membrane antenna
6
作者 Xiang Liu Guoping Cai 《Astrodynamics》 EI CSCD 2024年第1期1-26,共26页
Large-scale space membrane antennas have significant potential in satellite communication,space-based early warning,and Earth observation.Because of their large size and high flexibility,the dynamic analysis and contr... Large-scale space membrane antennas have significant potential in satellite communication,space-based early warning,and Earth observation.Because of their large size and high flexibility,the dynamic analysis and control of membrane antenna are challenging.To maintain the working performance of the antenna,the pointing and surface accuracies must be strictly maintained.Therefore,the accurate dynamic modeling and effective active control of large-scale space membrane antennas have great theoretical significance and practical value,and have attracted considerable interest in recent years.This paper reviews the dynamics and active control of large-scale space membrane antennas.First,the development and status of large-scale space membrane antennas are summarized.Subsequently,the key problems in the dynamics and active control of large membrane antennas,including the dynamics of wrinkled membranes,large-amplitude nonlinear vibration,nonlinear model reduction,rigid-flexible-thermal coupling dynamic modeling,on-orbit modal parameter identification,active vibration control,and wave-based vibration control,are discussed in detail.Finally,the research outlook and future trends are presented. 展开更多
关键词 large-scale space membrane ANTENNA dynamicmodeling active control
原文传递
Large-scale circulation features associated with the heat wave over Northeast China in summer 2018 被引量:9
7
作者 TAO Panhong ZHANG Yaocun 《Atmospheric and Oceanic Science Letters》 CSCD 2019年第4期254-260,共7页
In late July and early August 2018,Northeast China suffered from extremely high temperatures,with the maxium temperature anomaly exceeding 6°C.In this study,the large-scale circulation features associated with th... In late July and early August 2018,Northeast China suffered from extremely high temperatures,with the maxium temperature anomaly exceeding 6°C.In this study,the large-scale circulation features associated with this heat wave over Northeast China are analyzed using station temperature data and NCEP–NCAR reanalysis data.The results indicate that strong anomalous positive geopotential height centers existed from the lower to upper levels over Northeast China,and the related downward motions were directly responsible for the extreme high-temperature anomalies.The northwestward shift of the western Pacific subtropical high(WPSH)and the northeastward shift of the South Asian high concurrently reinforced the geopotential height anomalies and descending flow over Northeast China.In addition,an anomalous Pacific–Japan pattern in the lower troposphere led to the northwestward shift of the WPSH,jointly favoring the anomalous geopotential height over Northeast China.Two wave trains emanating from the Atlantic region propagated eastwards along high latitudes and midlatitudes,respectively,and converged over Northeast China,leading to the enhancement of the geopotential height anomalies. 展开更多
关键词 large-scale circulation anomalies heat wave in2018 summer Northeast China wave activity flux
下载PDF
Ensuring water security by utilizing roof-harvested rainwater and lake water treated with a low-cost integrated adsorption-filtration system 被引量:2
8
作者 Riffat Shaheed Wan Hanna Melini Wan Mohtar Ahmed El-Shafie 《Water Science and Engineering》 EI CAS CSCD 2017年第2期115-124,共10页
Drinking water is supplied through a centralized water supply system and may not be accessed by communities in rural areas of Malaysia.This study investigated the performance of a low-cost, self-prepared combined acti... Drinking water is supplied through a centralized water supply system and may not be accessed by communities in rural areas of Malaysia.This study investigated the performance of a low-cost, self-prepared combined activated carbon and sand filtration(CACSF) system for roofharvested rainwater and lake water for potable use. Activated carbon was self-prepared using locally sourced coconut shell and was activated using commonly available salt rather than a high-tech procedure that requires a chemical reagent. The filtration chamber was comprised of local,readily available sand. The experiments were conducted with varying antecedent dry intervals(ADIs) of up to 15 d and lake water with varying initial chemical oxygen demand(COD) concentration. The CACSF system managed to produce effluents complying with the drinking water standards for the parameters p H, dissolved oxygen(DO), biochemical oxygen demand(BOD5), COD, total suspended solids(TSS), and ammonia nitrogen(NH_3-N). The CACSF system successfully decreased the population of Escherichia coli(E. coli) in the influents to less than 30 CFU/m L. Samples with a higher population of E. coli(that is, greater than 30 CFU/m L) did not show 100% removal. The system also showed high potential as an alternative for treated drinking water for roof-harvested rainwater and class II lake water. 展开更多
关键词 LOW-COST activated carbon INTEGRATED adsorption-sand filtration Roof-harvested RAINWATER Lake WATER WATER security
下载PDF
Joint Trajectory and Power Optimization for Securing UAV Communications Against Active Eavesdropping 被引量:4
9
作者 Bin Duo Junsong Luo +2 位作者 Yilian Li Hao Hu Zibin Wang 《China Communications》 SCIE CSCD 2021年第1期88-99,共12页
Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system incl... Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system including both the downlink(DL)and uplink(UL)transmissions,where the confidential information is transmitted between a UAV and a ground node in the presence of an active eavesdropper.We aim to maximize the average secrecy rates of the DL and UL communications,respectively,by jointly optimizing the UAV trajectory and the UAV/ground node’s transmit power control over a given flight period.Due to the non-convexity of the formulated problems,it is difficult to obtain globally optimal solutions.However,we propose efficient iterative algorithms to obtain high-quality suboptimal solutions by applying the block coordinate descent and successive convex optimization methods.Simulation results show that the joint optimization algorithms can effectively improve the secrecy rate performance for both the DL and UL communications,as compared with other baseline schemes.The proposed schemes can be considered as special cases of UAV-assisted non-orthogonal multiple access(NOMA)networks. 展开更多
关键词 UAV communications active eavesdropping physical-layer security secrecy rate maximization power control trajectory design
下载PDF
A Survey of Security Issues in Cognitive Radio Networks 被引量:9
10
作者 LI Jianwu FENG Zebing +1 位作者 FENG Zhiyong ZHANG Ping 《China Communications》 SCIE CSCD 2015年第3期132-150,共19页
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili... In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs. 展开更多
关键词 CRNs security physical layer security security capacity active attacks passive attacks
下载PDF
A Cluster-Based Secure Active Network Environment
11
作者 CHENXiao-lin ZHOUJing-yang +2 位作者 DAIHan LUSang-lu CHENGui-hai 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期142-146,共5页
We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or tru... We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or trusted by privileged users is executed in the secure execution environment (EE) of the active router, while others are executed in the secure EE of the nodes in the distributed shared memory (DSM) cluster. With the supports of a multi-process Java virtual machine and KeyNote, untrusted active packets are controlled to securely consume resource. The DSM consistency management makes that active packets can be parallely processed in the DSM cluster as if they were processed one by one in ANTS (Active Network Transport System). We demonstrate that CSANE has good security and scalability, but imposing little changes on traditional routers. 展开更多
关键词 active networks security DSM
下载PDF
Assessment of Nutrient Composition and Antioxidant Activity of Some Popular Underutilized Edible Crops of Nagaland, India
12
作者 Chitta Ranjan Deb Neilazonuo Khruomo 《Natural Resources》 2021年第2期44-58,共15页
<span style="font-family:""><span style="font-family:Verdana;">In Nagaland ~70% of population lives in rural areas and depends on forest products for livelihood. Being part of the ... <span style="font-family:""><span style="font-family:Verdana;">In Nagaland ~70% of population lives in rural areas and depends on forest products for livelihood. Being part of the biodiversity hotspot, state is rich in biodiversity. The present study was an attempt made to understand the nutritional properties of 22 popular underutilized edible plants (UEP) Kohima, Phek, Tuensang districts. Results revealed moisture content of 22 studied plants ranged between 4.8 to 88.15 g/100g, while protein content varied be</span><span style="font-family:Verdana;">tween 0.00269</span></span><span style="font-family:Verdana;"> - </span><span style="font-family:""><span style="font-family:Verdana;">0.773 g/100g with highest in </span><i><span style="font-family:Verdana;">Terminalia chebula</span></i><span style="font-family:Verdana;"> (0.773</span></span><span style="font-family:""><span style="font-family:Verdana;"> g/100g) fruit while lowest protein content was in </span><i><span style="font-family:Verdana;">Setaria italica</span></i><span style="font-family:Verdana;"> (0.00269 g/100g). To</span><span style="font-family:Verdana;">tal carbohydrate content was between 0.198</span></span><span style="font-family:Verdana;"> - </span><span style="font-family:Verdana;">5.212 g/100g with highest in</span><span style="font-family:""> <i><span style="font-family:Verdana;">Setaria italica</span></i><span style="font-family:Verdana;"> (5.212 g/100g) and lowest in </span><i><span style="font-family:Verdana;">Juglans regia</span></i><span style="font-family:Verdana;"> (0.198 g/100g). Of </span><span><span style="font-family:Verdana;">the 22 samples, maximum antioxidant activity was in </span><i><span style="font-family:Verdana;">Terminalia chebula</span></i></span><span style="font-family:Verdana;"> fruits (37.49 μg/ml) followed by </span><i><span style="font-family:Verdana;">Clerodendrum glandulosum</span></i><span style="font-family:Verdana;"> (65.29 μg/ml) leaves, </span><i><span style="font-family:Verdana;">Phyllanthus emblica </span></i><span style="font-family:Verdana;">(79.08 μg/ml) fruits against Trolox (96.89 μg/ml). Highest total phenol content (TPC) was recorded in </span><i><span style="font-family:Verdana;">Terminalia</span></i> <i><span style="font-family:Verdana;">chebula</span></i><span style="font-family:Verdana;"> (53.11 mg GAE/g) and </span><i><span style="font-family:Verdana;">Rhus chinensis</span></i><span style="font-family:Verdana;"> (43.99 mg</span></span><span style="font-family:""> </span><span style="font-family:Verdana;">GAE/g) while in other 20 crops the values varied from 0.09</span><span style="font-family:Verdana;"> - </span><span style="font-family:Verdana;">8.44 mg</span><span style="font-family:""> </span><span style="font-family:Verdana;">GAE/g. Total flavonoid content (TFC) varied between 0.004</span><span style="font-family:""> </span><span style="font-family:Verdana;">-</span><span style="font-family:""> </span><span style="font-family:Verdana;">43.67 mg</span><span style="font-family:""> </span><span style="font-family:""><span style="font-family:Verdana;">QE/g with c</span><i><span style="font-family:Verdana;">lerodendrum glandulosum</span></i><span style="font-family:Verdana;"> (43.67 mg</span></span><span style="font-family:""> </span><span style="font-family:""><span style="font-family:Verdana;">QE/g) and </span><i><span style="font-family:Verdana;">Terminalia chebula</span></i><span style="font-family:Verdana;"> (27.78 mg</span></span><span style="font-family:""> </span><span style="font-family:""><span style="font-family:Verdana;">QE/g) were found to be highest among the 22 plant samples. Findings suggest that these underutilized edible plants should be popularized as they can contribute to nutritional support to </span><span style="font-family:Verdana;">different region of the state for health improvement and cultivated them</span><span style="font-family:Verdana;"> commercially to help and develop various value added local product to improve the livelihood status of the rural population and also add to the economy of the state and region. 展开更多
关键词 Antioxidant activity Food security Nagaland NUTRIENT Rural Health Underutilized Edible Plants
下载PDF
Cyberspace Security Using Adversarial Learning and Conformal Prediction
13
作者 Harry Wechsler 《Intelligent Information Management》 2015年第4期195-222,共28页
This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactic... This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactical offensive threats. Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted?self-managing defensive shield to detect, disrupt, and deny intrusive attacks, hostile and malicious behavior, and subterfuge. Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns and messages as friend or foe and to respond to them accordingly. The solutions proffered throughout are built around active learning, meta-reasoning, randomness, distributed semantics and stratification, and most important and above all around adaptive Oracles. The motivation for using conformal prediction and its immediate off-spring, those of semi-supervised learning and transduction, comes from them first and foremost supporting discriminative and non-parametric methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence indices that assist meta-reasoning and information fusion. 展开更多
关键词 active LEARNING Adversarial LEARNING Anomaly DETECTION Change DETECTION CONFORMAL PREDICTION Cyber security Data Mining DENIAL and Deception Human Factors INSIDER Threats Intrusion DETECTION Meta-Reasoning Moving Target Defense Performance Evaluation Randomness Semi-Supervised LEARNING Sequence Analysis Statistical LEARNING Transduction
下载PDF
基于主动探测的Web容器探测识别方法
14
作者 张帆 王振宇 +3 位作者 王红梅 万月亮 宁焕生 李莎 《工程科学学报》 EI CSCD 北大核心 2024年第8期1446-1457,共12页
随着工业互联网的飞速发展,各类Web容器的广泛使用呈现不断增长的趋势,然而,这也使得Web容器资产管理的问题变得更加复杂.随之而来的是诸多网络安全风险和潜在隐患,对于这些挑战,提升网络安全防御水平显得尤为迫切.为了解决这一问题,本... 随着工业互联网的飞速发展,各类Web容器的广泛使用呈现不断增长的趋势,然而,这也使得Web容器资产管理的问题变得更加复杂.随之而来的是诸多网络安全风险和潜在隐患,对于这些挑战,提升网络安全防御水平显得尤为迫切.为了解决这一问题,本文引入了一种新的基于主动探测的Web容器探测识别方法.在探测阶段,采用了一种先进的Web容器探针构建方法,通过此方法构建了Web容器探针.这个探针在识别阶段发挥关键作用,借助一种基于负载内容的Web容器识别方法,通过协议解码技术,实现了对Web容器的高度准确的识别.通过结合这两种先进的识别方法,成功识别了4种不同类型的Web容器,并且提升了精度,能够精确地区分这些Web容器的各个版本,总计实现了10个版本的准确识别.通过这种先进的主动探测方法,企业可以更好地了解和管理其Web容器资产,降低网络安全风险,并确保网络系统的稳定性和安全性. 展开更多
关键词 主动探测 设备识别 Web容器识别 容器探针 安全
下载PDF
攻防对抗视角下的网络安全主动防御体系研究
15
作者 李庆华 郭晓黎 +3 位作者 张锋军 张小军 石凯 许杰 《信息安全与通信保密》 2024年第1期77-85,共9页
为了解决纵深防御体系中防御能力固化、灵活性不足等问题,从攻防对抗视角出发,提出一种网络安全主动防御体系。首先,基于情报收集、监测预警、防御指挥和防御行动等要素的详细描述,设计了用于规划主动防御系统的能力组成框架;其次,选择... 为了解决纵深防御体系中防御能力固化、灵活性不足等问题,从攻防对抗视角出发,提出一种网络安全主动防御体系。首先,基于情报收集、监测预警、防御指挥和防御行动等要素的详细描述,设计了用于规划主动防御系统的能力组成框架;其次,选择网络杀伤链、ATT&CK知识库和OODA循环法则,设计了一个以攻助防的防御模型,并分析了引入博弈论进行防御算法设计的优势;最后,以实现为目标,构想了一个典型应用场景,以期为安全能力的体系化设计提供有益借鉴。 展开更多
关键词 网络安全 攻防对抗 主动防御 ATT&CK OODA
下载PDF
外空安全与环境治理:进展、挑战与机遇
16
作者 龚自正 陈川 张品亮 《空间科学与试验学报》 CSCD 2024年第1期120-131,共12页
随着人类航天活动的迅猛发展,外空环境日益复杂无序,外空安全的威胁显著上升,外层空间长期可持续性面临严重挑战。本文全面介绍了外空安全面临的最新态势,系统分析了空间碎片数量逐年增多、低轨大规模星座迅猛部署、新型航天活动快速喷... 随着人类航天活动的迅猛发展,外空环境日益复杂无序,外空安全的威胁显著上升,外层空间长期可持续性面临严重挑战。本文全面介绍了外空安全面临的最新态势,系统分析了空间碎片数量逐年增多、低轨大规模星座迅猛部署、新型航天活动快速喷发、外空资源争夺日趋激烈、外空军事化愈演愈烈等对外空安全和外空长期可持续的冲击。本文指出,从外空命运共同体、国家空间资产安全、航天强国建设出发,外空环境治理是大势所趋和唯一出路,孕育着航天技术创新、产业革命、法规建制等重大机遇。基于国情提出了我国对策和发展建议。 展开更多
关键词 外空环境 外空安全 空间活动长期可持续 外空环境治理 挑战与机遇 对策与发展建议
下载PDF
网络恐怖活动的刑事规制及多元打防机制
17
作者 高志明 佟艳爽 《信息安全与通信保密》 2024年第8期100-111,共12页
当前,我国虽然对恐怖活动进行了法律规制,但尚有完善空间。不同于传统型恐怖活动,网络恐怖活动具有犯罪主体新型化、犯罪工具现代化、实施手段隐蔽化等诸多特征,呈现出肆虐全球的严峻态势。在总体国家安全观下,应当充分发挥法治在反网... 当前,我国虽然对恐怖活动进行了法律规制,但尚有完善空间。不同于传统型恐怖活动,网络恐怖活动具有犯罪主体新型化、犯罪工具现代化、实施手段隐蔽化等诸多特征,呈现出肆虐全球的严峻态势。在总体国家安全观下,应当充分发挥法治在反网络恐怖主义犯罪领域的基础性作用,从立法、执法、司法等领域多维度切入,逐步解除治理网络恐怖活动所面临的现实难题。在现有犯罪治理法律体系下,采取更加积极有效的管控措施,将网络恐怖活动纳入刑法规制范畴之内,实现对网络恐怖活动的有效刑事规制。另外,还要建立起打击网络恐怖活动的多元机制,包括信息共享、全球联动、群防群控等。 展开更多
关键词 网络恐怖活动 国家安全 犯罪治理 刑事规制 多元打击机制
下载PDF
混合可重构智能表面和人工噪声辅助的物理层安全通信
18
作者 邓志祥 戴陈庆 张志威 《电子与信息学报》 EI CAS CSCD 北大核心 2024年第8期3155-3164,共10页
针对可重构智能表面(Reconfigurable Intelligent Reflecting Surface,RIS)辅助的物理层安全通信,该文设计了基于混合有源-无源RIS和人工噪声(Artificial Noise,AN)辅助的安全传输方案。考虑基站和RIS的功率约束以及RIS无源反射元件的... 针对可重构智能表面(Reconfigurable Intelligent Reflecting Surface,RIS)辅助的物理层安全通信,该文设计了基于混合有源-无源RIS和人工噪声(Artificial Noise,AN)辅助的安全传输方案。考虑基站和RIS的功率约束以及RIS无源反射元件的反射系数恒模约束,以最大化系统安全传输速率为目标,构建基站发射波束成形、AN波束向量、RIS反射系数矩阵联合优化问题。使用交替优化(Alternating Optimization,AO)、权值最小均方误差(Weighted Minimum Mean Square Error,WMMSE)和半定松弛(Semi-definite Relaxation,SDR)算法,求解所构建的变量高度耦合的非凸优化问题。仿真结果表明,混合RIS辅助安全传输方案,能够有效提高系统的安全速率,与无源RIS相比,能够有效克服“双衰落”效应导致的安全速率降低,与有源RIS相比,具有更高的能量效率。 展开更多
关键词 可重构智能表面 混合有源-无源RIS 物理层安全 人工噪声 交替优化 半定松弛
下载PDF
基于KAP理论的大学生网络安全教育研究
19
作者 李媛媛 袁玉林 随力瑞 《中国安全科学学报》 CAS CSCD 北大核心 2024年第5期1-8,共8页
为改善大学生网络安全教育现状,提高大学生网络安全教育水平,结合知识-态度-行为(KAP)理论,构建大学生安全教育KAP模型;通过问卷发放和筛选,获取659份有效问卷;采用结构方程模型(SEM)检验网络安全教育对网络安全认知、网络安全态度、网... 为改善大学生网络安全教育现状,提高大学生网络安全教育水平,结合知识-态度-行为(KAP)理论,构建大学生安全教育KAP模型;通过问卷发放和筛选,获取659份有效问卷;采用结构方程模型(SEM)检验网络安全教育对网络安全认知、网络安全态度、网络安全行为的影响,以及可能存在的中介作用影响路径。结果表明:网络安全教育显著影响网络安全认知、网络安全态度、网络安全行为,其中,网络安全认知、网络安全态度起到独立中介及链式中介作用;法律道德教育、知识教育、实践活动、榜样引领均能直接影响网络安全行为,其中,法律道德教育对网络安全行为的影响最强,知识教育次之,实践活动和榜样引领最弱。在具体作用路径方面,法律道德教育主要通过直接效应来影响网络安全行为,知识教育、实践活动、榜样引领主要通过安全认知间接影响网络安全行为。 展开更多
关键词 知识-态度-行为(KAP) 网络安全教育 法律道德教育 实践活动 榜样引领 结构方程模型(SEM)
下载PDF
论生物安全风险刑法规制之保护法益
20
作者 刘建利 黄诗雯 《河北法律职业教育》 2024年第1期73-85,共13页
风险视域下《中华人民共和国刑法修正案(十一)》针对部分生物安全犯罪行为进行了回应,扩大了刑法对生物安全的保护范围。然而,刑事立法将生物安全犯罪的主要保护法益归结为传统公共卫生法益并不合适。传统公共卫生法益的“低政治”技术... 风险视域下《中华人民共和国刑法修正案(十一)》针对部分生物安全犯罪行为进行了回应,扩大了刑法对生物安全的保护范围。然而,刑事立法将生物安全犯罪的主要保护法益归结为传统公共卫生法益并不合适。传统公共卫生法益的“低政治”技术指标属性和“人类中心主义”规范视角导致刑法在规制生物安全风险方面存在位阶失衡、射程失准和功能失范的问题。法益理论的落后带来的是罪与非罪、此罪与彼罪的混乱。因此生物安全的法益认定应坚持积极预防主义,积极预防主义具有正当性、可操作性、协调性。同时基于法益保护早期化、抽象化的积极预防主义理念,在法益内涵上应当确立生物安全法益乃是一种新型复合法益,不仅包括通常的生命、健康法益,还包括集防范自然生物风险的生物安保价值和防范人为生物风险的生物防御价值于一体的“总体国家安全”以及包括人之自主性、目的性、平等性的“人类尊严”等抽象法益。 展开更多
关键词 生物安全法益 积极预防主义 总体国家安全 人类尊严
下载PDF
上一页 1 2 51 下一页 到第
使用帮助 返回顶部