期刊文献+
共找到10,914篇文章
< 1 2 250 >
每页显示 20 50 100
Message from Editors
1
作者 Shiqi Ji 《CES Transactions on Electrical Machines and Systems》 EI CSCD 2024年第1期1-2,共2页
IN recent years,the electrical machines and systems have grown so rapidly with more and more applications in emerging civilian industries as well as cutting-edge areas.A group of novel and exciting technologies have b... IN recent years,the electrical machines and systems have grown so rapidly with more and more applications in emerging civilian industries as well as cutting-edge areas.A group of novel and exciting technologies have been developed every year.First,the research of motors in new and extreme fields have constantly brought amazing progress to achieve better performance through new technologies such as digitalization,etc.Meanwhile,the fast development of power electronics in recent decades has also changed the overall system to be more flexible,and widely extent our boundary of research area.What is more. 展开更多
关键词 EXTREME message constantly
下载PDF
BDSec:Security Authentication Protocol for BeiDou-Ⅱ Civil Navigation Message
2
作者 Wu Zhijun Zhang Yuan +2 位作者 Yang Yiming Wang Peng Yue Meng 《China Communications》 SCIE CSCD 2024年第6期206-218,共13页
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s... Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV. 展开更多
关键词 BDII civil navigation messages(BDIICNAV) BeiDou navigation satellite system(BDS) identity-based cryptography mechanism navigation message authentication protocol(BDSec)
下载PDF
Anti-Spoofing:Integrated Information Authentication of BeiDou-ⅡCivil Navigation Message
3
作者 Wu Zhijun Liang Cheng +2 位作者 Zhang Yun Liu Rusen Yue Meng 《China Communications》 SCIE CSCD 2024年第9期242-261,共20页
The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can le... The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication. 展开更多
关键词 anti-spoofing AUTHENTICATION BeiDou-II civil navigation message(BDII-CNAV) SIGNATURE spoofing attack
下载PDF
Effectiveness of Short Message Service Support on Adherence to Chemotherapy Treatment among Patients Attending Cancer Treatment Facilities in Kenya
4
作者 Nebert Kiguhe Mchidi John P. Oyore Gordon Ogweno 《Open Journal of Nursing》 2024年第3期93-113,共21页
Introduction: Cancer is a chronic debilitating disease that unnerves patients, communities, and nations. At some point in cancer patient’s disease experience, chemotherapy is used, and the patient is expected to adhe... Introduction: Cancer is a chronic debilitating disease that unnerves patients, communities, and nations. At some point in cancer patient’s disease experience, chemotherapy is used, and the patient is expected to adhere to treatment to improve survival and quality of life. Methods: This multisite Cluster Randomized Trial (CRT) evaluated the effectiveness of mobile phone Short Message Service (SMS) support on the adherence to treatment schedules among adult cancer patients in Kenya. Data was collected using questionnaires. Ethical approvals were obtained from relevant Ethical Review Boards (ERBs). Results: The mean adherence was 83%. There was a significant difference between treatment arms in relation to the adherence. The intervention arm had a higher mean adherence difference, M = 3.913, 95% CI 2.632-5.193, t (402) = 6.006, p ≤ 0.001), with Cohen’s d = 0.60. Although not significant, (χ<sup>2</sup>dd = 0.151, df = 1, p = 2.064), more women were perfect adheres than males. Perfect adherers were satisfied with SMS support (χ<sup>2</sup>dd = 7.620, df = 1, p = 0.06), were in the intervention arm (χ<sup>2</sup>dd = 22.942, df = 1, p ≤ 0.001), and had trust in the care provider (χ<sup>2</sup>dd = 10.591 p ≤ 0.001). SMS support was not significant in the multivariate analysis but had an estimated effect size of 0.958 (z = 1.424, p = 0.154, CI = 0.242-3.781), indicating that mean adherence was slightly better in the presence of the intervention. Conclusions: SMS-support intervention has demonstrated superiority in influencing adherence. Further, health system-related factors have a significant influence on the adherence to chemotherapy treatment. Interventions to re-design health systems that are responsive to unmet care needs of cancer patients must be explored. . 展开更多
关键词 ADHERENCE Cancer Symptom Distress Quality of Life Medication Posses-sion Ratio Short message Service SURVIVORSHIP
下载PDF
Artificial Intelligence-Based Sentiment Analysis of Dynamic Message Signs that Report Fatality Numbers Using Connected Vehicle Data
5
作者 Dorcas O. Okaidjah Jonathan Wood Christopher M. Day 《Journal of Transportation Technologies》 2024年第4期590-606,共17页
This study presents results from sentiment analysis of Dynamic message sign (DMS) message content, focusing on messages that include numbers of road fatalities. As a traffic management tool, DMS plays a role in influe... This study presents results from sentiment analysis of Dynamic message sign (DMS) message content, focusing on messages that include numbers of road fatalities. As a traffic management tool, DMS plays a role in influencing driver behavior and assisting transportation agencies in achieving safe and efficient traffic movement. However, the psychological and behavioral effects of displaying fatality numbers on DMS remain poorly understood;hence, it is important to know the potential impacts of displaying such messages. The Iowa Department of Transportation displays the number of fatalities on a first screen, followed by a supplemental message hoping to promote safe driving;an example is “19 TRAFFIC DEATHS THIS YEAR IF YOU HAVE A SUPER BOWL DON’T DRIVE HIGH.” We employ natural language processing to decode the sentiment and undertone of the supplementary message and investigate how they influence driving speeds. According to the results of a mixed effect model, drivers reduced speeds marginally upon encountering DMS fatality text with a positive sentiment with a neutral undertone. This category had the largest associated amount of speed reduction, while messages with negative sentiment with a negative undertone had the second largest amount of speed reduction, greater than other combinations, including positive sentiment with a positive undertone. 展开更多
关键词 Intelligent Transportation System Sentiment Analysis Dynamic message Signs Large Language Models Traffic Safety Artificial Intelligence
下载PDF
Blockchain-Based Message Authentication Scheme for Internet of Vehicles in an Edge Computing Environment
6
作者 Qiping Zou Zhong Ruan Huaning Song 《Computer Systems Science & Engineering》 2024年第5期1301-1328,共28页
As an important application of intelligent transportation system,Internet of Vehicles(IoV)provides great convenience for users.Users can obtain real-time traffic conditions through the IoV’s services,plan users’trav... As an important application of intelligent transportation system,Internet of Vehicles(IoV)provides great convenience for users.Users can obtain real-time traffic conditions through the IoV’s services,plan users’travel routes,and improve travel efficiency.However,in the IoV system,there are always malicious vehicle nodes publishing false information.Therefore,it is essential to ensure the legitimacy of the source.In addition,during the peak period of vehicle travel,the vehicle releases a large number of messages,and IoV authentication efficiency is prone to performance bottlenecks.Most existing authentication schemes have the problem of low authentication efficiency in the scenario.To address the above problems,this paper designs a novel reliable anonymous authentication scheme in IoV for Rush-hour Traffic.Here,our scheme uses blockchain and elliptic curve cryptography(ECC)to design authentication algorithms for message authentication between vehicles and roadside units(RSU).Additionally,we introduce the idea of edge computing into the scheme,RSU will select themost suitable vehicle as the edge computing node for message authentication.In addition,we used the ProVerif tool for Internet security protocols and applications to test its security,ensuring that it is secure under different network attacks.In the simulation experiment,we compare our scheme with other existing works.Our scheme has a significant improvement in computational overhead,authentication efficiency and packet loss rate,and is suitable for traffic scenarios with large message volume. 展开更多
关键词 Internet of Vehicles messages authentication edge computing blockchain elliptic curve cryptography
下载PDF
Turbo Message Passing Based Burst Interference Cancellation for Data Detection in Massive MIMO-OFDM Systems
7
作者 Wenjun Jiang Zhihao Ou +1 位作者 Xiaojun Yuan Li Wang 《China Communications》 SCIE CSCD 2024年第2期143-154,共12页
This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst inte... This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst interference may occur only on data symbols but not on pilot symbols, which means that interference information cannot be premeasured. To cancel the burst interference, we first revisit the uplink multi-user system and develop a matrixform system model, where the covariance pattern and the low-rank property of the interference matrix is discussed. Then, we propose a turbo message passing based burst interference cancellation(TMP-BIC) algorithm to solve the data detection problem, where the constellation information of target data is fully exploited to refine its estimate. Furthermore, in the TMP-BIC algorithm, we design one module to cope with the interference matrix by exploiting its lowrank property. Numerical results demonstrate that the proposed algorithm can effectively mitigate the adverse effects of burst interference and approach the interference-free bound. 展开更多
关键词 burst interference cancellation data detection massive multiple-input multiple-output(MIMO) message passing orthogonal frequency division multiplexing(OFDM)
下载PDF
On the security of warning message dissemina-tion in vehicular Ad hoc networks 被引量:2
8
作者 Jieqiong Chen Guoqiang Mao 《Journal of Communications and Information Networks》 2017年第2期46-58,共13页
Information security is an important issue in vehicular networks as the accuracy and integrity of information is a prerequisite to the satisfactory performance of virtually all vehicular network applications.We study ... Information security is an important issue in vehicular networks as the accuracy and integrity of information is a prerequisite to the satisfactory performance of virtually all vehicular network applications.We study the information security of a vehicular Ad hoc network whose message could be tampered by malicious vehicles.An analytical framework is developed to analyze the process of message dissemination in a vehicular network with malicious vehicles randomly distributed in the network.The probability that a destination vehicle at a xed distance can receive the message correctly from the source vehicle is obtained.Simulations are conducted to validate the accuracy of the theoretical analysis.Our results demonstrate the impact of network topology and the distribution of malicious vehicles on the correct delivery of a message in vehicular Ad hoc networks,and provides insight on the design of security mechanisms to improve the security of message dissemination in vehicular networks. 展开更多
关键词 vehicular Ad hoc networks Internet-of-Vehicles technology message dissemination malicious vehicles SECURITY
原文传递
Vector Approximate Message Passing with Sparse Bayesian Learning for Gaussian Mixture Prior 被引量:2
9
作者 Chengyao Ruan Zaichen Zhang +3 位作者 Hao Jiang Jian Dang Liang Wu Hongming Zhang 《China Communications》 SCIE CSCD 2023年第5期57-69,共13页
Compressed sensing(CS)aims for seeking appropriate algorithms to recover a sparse vector from noisy linear observations.Currently,various Bayesian-based algorithms such as sparse Bayesian learning(SBL)and approximate ... Compressed sensing(CS)aims for seeking appropriate algorithms to recover a sparse vector from noisy linear observations.Currently,various Bayesian-based algorithms such as sparse Bayesian learning(SBL)and approximate message passing(AMP)based algorithms have been proposed.For SBL,it has accurate performance with robustness while its computational complexity is high due to matrix inversion.For AMP,its performance is guaranteed by the severe restriction of the measurement matrix,which limits its application in solving CS problem.To overcome the drawbacks of the above algorithms,in this paper,we present a low complexity algorithm for the single linear model that incorporates the vector AMP(VAMP)into the SBL structure with expectation maximization(EM).Specifically,we apply the variance auto-tuning into the VAMP to implement the E step in SBL,which decrease the iterations that require to converge compared with VAMP-EM algorithm when using a Gaussian mixture(GM)prior.Simulation results show that the proposed algorithm has better performance with high robustness under various cases of difficult measurement matrices. 展开更多
关键词 sparse Bayesian learning approximate message passing compressed sensing expectation propagation
下载PDF
Adaptive Coding Design of Automatic Weather Station Message for"Cloud+End"Networking
10
作者 Fei GUO Lihong LUO +1 位作者 Qinqiang ZHOU Binghuai CHEN 《Meteorological and Environmental Research》 CAS 2023年第1期35-40,共6页
A large number of automatic weather stations with different observation elements and gradient configurations are connected for operation,in order to meet the meteorological service needs of different scenes.The statio... A large number of automatic weather stations with different observation elements and gradient configurations are connected for operation,in order to meet the meteorological service needs of different scenes.The station density and observation frequency are encrypted to obtain observation data with higher spatial and temporal resolution.The original message with fixed element data location is the data combination of all observation elements and the maximum observation gradient of each element,which not only has higher invalid data redundancy,but also restricts the efficiency of data collection and processing,and also increases communication costs.An adaptive coding design method for the original message of automatic weather station is proposed.The embedded software coding algorithm of the weather station collector is optimized according to"plug and output"to realize intelligent networking,intelligent identification of observation elements and gradients,and dynamic flexible output of messages with variable length.The intelligent networking and business application of nearly 4000 automatic weather stations across the province show that the networking data acquisition and processing are efficient and stable. 展开更多
关键词 Automatic weather station Higher spatial and temporal resolution message CODING DESIGN
下载PDF
基于Message Queue技术的医疗信息交换与共享集成平台研究 被引量:4
11
作者 覃永胜 林崇健 《中国数字医学》 2010年第8期105-107,共3页
对目前医院信息系统集成方式进行了分析,简单介绍了IBM Message Queue的技术特点,通过介绍重症监护系统(ICU系统)和HIS系统之间的集成方案,阐述了基于消息机制构建医疗信息交换与共享集成平台的思路和方法。
关键词 message QUEUE 医院信息系统 集成平台
下载PDF
Gaussian mixture model clustering with completed likelihood minimum message length criterion 被引量:1
12
作者 曾洪 卢伟 宋爱国 《Journal of Southeast University(English Edition)》 EI CAS 2013年第1期43-47,共5页
An improved Gaussian mixture model (GMM)- based clustering method is proposed for the difficult case where the true distribution of data is against the assumed GMM. First, an improved model selection criterion, the ... An improved Gaussian mixture model (GMM)- based clustering method is proposed for the difficult case where the true distribution of data is against the assumed GMM. First, an improved model selection criterion, the completed likelihood minimum message length criterion, is derived. It can measure both the goodness-of-fit of the candidate GMM to the data and the goodness-of-partition of the data. Secondly, by utilizing the proposed criterion as the clustering objective function, an improved expectation- maximization (EM) algorithm is developed, which can avoid poor local optimal solutions compared to the standard EM algorithm for estimating the model parameters. The experimental results demonstrate that the proposed method can rectify the over-fitting tendency of representative GMM-based clustering approaches and can robustly provide more accurate clustering results. 展开更多
关键词 Gaussian mixture model non-Gaussian distribution model selection expectation-maximization algorithm completed likelihood minimum message length criterion
下载PDF
Stylistic features of cell-phone short messages in English and their translation 被引量:2
13
作者 吕文澎 张军历 《Sino-US English Teaching》 2007年第11期60-65,共6页
Cell-phone short messages in English possess special styles. Some are in a literary style, and others in a non-literary one. In the present paper, the stylistic features of English short messages are illustrated by ap... Cell-phone short messages in English possess special styles. Some are in a literary style, and others in a non-literary one. In the present paper, the stylistic features of English short messages are illustrated by applying the stylistic theory and employing the "Model of Analyzing Textual Function". The features of the two styles of messages are described and analyzed from the perspectives of their pronunciation, graphology, vocabulary, grammar, discourse, rhetoric, etc., and the stylistic features serve as the basis for discussing the translation principles and methods of English short messages. 展开更多
关键词 cell-phone short messages in English stylistic features TRANSLATION
下载PDF
Development and Application of the Edition System of Agricultural Meteorology Short Message in Liaoning Province
14
作者 李岚 明惠青 +4 位作者 唐亚平 孙婧 王艳丽 孙丽 赵淼 《Meteorological and Environmental Research》 CAS 2010年第5期92-96,共5页
In order to meet the needs of Agricultural Meteorology business and research,an edition system of agricultural meteorology short message was established based on the Microsoft Access 2000 database and visualization de... In order to meet the needs of Agricultural Meteorology business and research,an edition system of agricultural meteorology short message was established based on the Microsoft Access 2000 database and visualization developing software Visual Basic 6.0 in Liaoning Province.The basic principles of agro-meteorological text editing and system optimization ideas were pointed out.The meteorological conditions of the main crops growth needed in material library were introduced. 展开更多
关键词 Agricultural meteorology Short message System development APPLICATION China
下载PDF
不同电子病历系统间的数据交换—通过HL7messages交换MML(MedicalMarkup Language)3.0医疗文档 被引量:7
15
作者 郭锦秋 高田彰 +6 位作者 田中亨治 佐藤纯三 铃木斋王 铃木利明 中岛裕生 荒木贤二 吉原博幸 《医学信息(医学与计算机应用)》 2004年第6期313-319,共7页
MML (Medical Markup L anguage) ,作为一套不同医疗信息系统之间的交换规格于 1995年在日本被开发。 1999年正式公布版本 2 .2 1,使用 XML作为标记语言。之后随着大规模的实证实验 ,版本 2 .2 1被进一步修改 ,2 0 0 1年升级为包含 12... MML (Medical Markup L anguage) ,作为一套不同医疗信息系统之间的交换规格于 1995年在日本被开发。 1999年正式公布版本 2 .2 1,使用 XML作为标记语言。之后随着大规模的实证实验 ,版本 2 .2 1被进一步修改 ,2 0 0 1年升级为包含 12个模块的版本 2 .3。而最新版本 3.0是在 HL 7Clinical Docum ent Architecture (CDA)基础上开发而成 ,它将版本 2 .3的结构分割并重新定义 ,以便于用 MML记述的信息能在 HL 7CDAL evel One中表达。开发的结果表明 ,采用 MML版本 3.0形式记述的医疗文档可以通过 HL 7m essages来进行信息交换。 MML完整的规格及有关数据由日本非营利组织 Med XML委员会公开和管理 ,具体可参照 http:/ / www.m edxm l.net/。目前 ,我们正在进行 MML 3.0的中国本地化作业 ,主要包括 MML中所参照的表格的追加和修改以及医疗保险模块等的制作。 展开更多
关键词 电子病历系统 数据交换 HL7messages MML 医疗文档 CDA HL7 XML
下载PDF
一种基于Message Passing的并行程序设计技术 被引量:1
16
作者 温钰洪 王鼎兴 +1 位作者 沈美明 郑纬民 《小型微型计算机系统》 CSCD 北大核心 1995年第5期7-13,共7页
本文首先分析介绍构造并行计算机系统的两种方法:Multiprocessors和Multicomputers,然后介绍一种Multicomputers并行计算机系统中基于messagepassing的并行程序设计环境以... 本文首先分析介绍构造并行计算机系统的两种方法:Multiprocessors和Multicomputers,然后介绍一种Multicomputers并行计算机系统中基于messagepassing的并行程序设计环境以及并行程序设计方法,它具有程序设计简单、直观等特点,易于构造程序模型,并能获得较好的加速比。 展开更多
关键词 程序设计 并行程序 并行计算机
下载PDF
基于RPC风格与Message风格SOAP消息的Web服务性能比较 被引量:2
17
作者 李海峰 杨小虎 《计算机应用与软件》 CSCD 北大核心 2007年第1期79-80,117,共3页
SOAP是一个轻量级的、无状态的通信协议。它构成了目前正受到广泛关注的W eb服务体系结构的通信基础。基于一个实际应用的商业应用中的数据比较了基于RPC风格与M essage风络SOAP消息的W eb服务的性能。我们发现SOAP消息类型的选择对于... SOAP是一个轻量级的、无状态的通信协议。它构成了目前正受到广泛关注的W eb服务体系结构的通信基础。基于一个实际应用的商业应用中的数据比较了基于RPC风格与M essage风络SOAP消息的W eb服务的性能。我们发现SOAP消息类型的选择对于系统的扩展性和稳定性等都会有明显的影响。 展开更多
关键词 Web service SOAP APACHE AXIS RPC-style message-style
下载PDF
基于Message Passing的并行编程环境 被引量:2
18
作者 刘欣然 胡铭曾 《计算机工程》 EI CAS CSCD 北大核心 1997年第5期17-20,共4页
在分布式并行计算机系统中,由于处理机间无共事内存,因此采用了MessagePassins方式实现处理机间的通信.文中讨论了基于MessagePassing把的并行编程环境所应具备的特点,然后介绍几种被人们普遍接受的并行编程环境.
关键词 消息传递 并行编程 并行计算机
下载PDF
Remote Control of Unitary Air Conditioner Based on Manufacturing Message Specification
19
作者 黄伟红 陈圣权 吴介一 《Journal of Southeast University(English Edition)》 EI CAS 1999年第2期43-48,共6页
Traditional air conditioner used to be in local control mode. However, with the development of modern information technology, the control of air conditioner will have to support many more functions. As a first step ... Traditional air conditioner used to be in local control mode. However, with the development of modern information technology, the control of air conditioner will have to support many more functions. As a first step in such a development, we have implemented a remote monitoring system of unitary air conditioners, using the manufacturing message specification (MMS). MMS is an OSI application protocol designed for the remote control and monitoring of real devices. The functions supported are those that an operator would do normally at the console of the unitary air conditioner. Due to the accomplishment of UMCS (Unitary air conditioner MMS Control System), there will be a leap of the application of MMS and the control technology of unitary air conditioner. 展开更多
关键词 remote control manufacturing message specification unitary air conditioner
下载PDF
Windows 2000下Netscape Message Server 4.15对邮件转发的限制方法
20
作者 张翔 李军怀 +1 位作者 张景 吕林涛 《计算机系统应用》 北大核心 2003年第5期36-38,共3页
本文介绍了垃圾邮件的危害,详细分析Netscape Message Server4.15对付邮件转发的原理,结合工程实践阐述了利用UBEplug-in filter限制转发的设置。
关键词 Windows 2000 邮件服务器 NETSCAPE message Server 4.15 垃圾邮件 邮件转发 UBE PLUG-IN filter
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部