期刊文献+
共找到28篇文章
< 1 2 >
每页显示 20 50 100
改进的量子安全直传Ping-Pong协议
1
作者 梁彦霞 牛静 聂敏 《西安邮电大学学报》 2015年第2期32-35,共4页
为了提高Ping-Pong协议的传输效率,对其加以改进。改进的协议增加了随机数序列。相对于原协议,将传输的经典消息与控制信息从1∶1的比例改变为N∶(M-N)。按照量子通信效率评价公式,相对于原协议0.333的通信效率,改进协议的Matlab仿真和... 为了提高Ping-Pong协议的传输效率,对其加以改进。改进的协议增加了随机数序列。相对于原协议,将传输的经典消息与控制信息从1∶1的比例改变为N∶(M-N)。按照量子通信效率评价公式,相对于原协议0.333的通信效率,改进协议的Matlab仿真和数值推导结果均显示,只需满足条件N<M<2 N,其效率即可提高至N/(2 M-N);在最少控制模式的情况下,只要N>1,极限通信效率可达N/(N+2),故改进后的效率均大于原协议。 展开更多
关键词 量子安全直接通信 ping-pong协议 传输效率
下载PDF
依据“ping-pong”循环机制预测piRNA靶基因的搜索方法 被引量:1
2
作者 许甘霖 齐绪峰 蔡冬青 《基础医学与临床》 CSCD 2017年第3期399-401,共3页
piRNA是指能与PIWI家族蛋白结合的小RNAs,其功能主要是稳定生殖细胞正常发育,在其他体细胞内也参与生理功能的调控[1]。相当一部分的piRNA通过被称作"pingpong"循环机制去识别与切割其靶基因的转录本mRNA(图1),并通过该机制去实现初... piRNA是指能与PIWI家族蛋白结合的小RNAs,其功能主要是稳定生殖细胞正常发育,在其他体细胞内也参与生理功能的调控[1]。相当一部分的piRNA通过被称作"pingpong"循环机制去识别与切割其靶基因的转录本mRNA(图1),并通过该机制去实现初级piRNA(primary piRNA)和次级piRNA(secondary piRNA)循环利用,piwil4或piwil2与相应的piRNA结合,通过piRNA的5'端前10~11个碱基作为介导序列,依照碱基互补原则,对与之互补的靶mRNA进行切割, 展开更多
关键词 循环机制 PIRNA ping-pong 碱基互补 转录本 蛋白结合 起始位点 结果符合率 循环利用 大鼠
下载PDF
基于DMA控制的数据Ping-Pong传输 被引量:1
3
作者 汪智 严洪 李春生 《电子元器件应用》 2006年第4期78-80,共3页
介绍了TI公司TMS320C54xx系列DSP的DMA工作原理,提出了利用TMS320VC5409芯片的DMA方式来实现数据Ping-Pong传输的方法,同时给出了详细的软件设计流程。
关键词 DSP TMS320C54xx DMA ping-pong传输
下载PDF
Eavesdropping on the'ping-pong' quantum communication protocol freely in a noise channel 被引量:10
4
作者 邓富国 李熙涵 +2 位作者 李春燕 周萍 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第2期277-281,共5页
We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdroppe... We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol. 展开更多
关键词 quantum communication ping-pong protocol EAVESDROPPING
下载PDF
Improved Quantum " Ping-Pong" Protocol Based on Extended Three-Particle GHZ State 被引量:5
5
作者 Li Jian Guo Xiaojing +2 位作者 Song Danjie Xie Feng Peng Yong 《China Communications》 SCIE CSCD 2012年第1期111-116,共6页
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro... In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. 展开更多
关键词 quantum key distffoution ping-pong protocol extended three-particle GHZ state eavesdropping detection
下载PDF
Improved Security Detection Strategy for Quantum "Ping-Pong" Protocol and Its Security Analysis 被引量:5
6
作者 李剑 金海菲 景博 《China Communications》 SCIE CSCD 2011年第3期170-179,共10页
In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But ... In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But the protocol was proved to have many vulnerabilities,and can be attacked by eavesdroppers.To overcome the problem,an improved security detection strategy which inserts the | 0〉,| 1〉,|+〉and |-〉particles into the messages as the decoy particles randomly in the"Ping-pong"protocol is presented.During the security analysis,the method of the entropy theory is introduced,and three detection strategies are compared quantitatively by using the constraint between the information which eavesdroppers can obtain and the interference introduced.Because of the presence of the trap particles |+〉and |-〉,the detection rate will be no less than 25% when Eve attacks the communication.The security analysis result shows that the efficiency of eavesdropping detection in the presented protocol is higher than the other two,so the detection strategy in the protocol can ensure that the "Ping-pong"protocol is more secure. 展开更多
关键词 secure quantum direct communication "ping-pong " protocol protocol security eavesdropping detection
下载PDF
A FAST SEAMLESS HANDOVER SCHEME AND ITS CDT OPTIMIZATION FOR PING-PONG TYPE OF MOVEMENT 被引量:3
7
作者 Wang Yumlng Yang Zongkai +2 位作者 Zhao Dasheng He Jianhua Fu Xiaoming 《Journal of Electronics(China)》 2006年第2期298-303,共6页
In mobile IPv6 networks, the ping-pong type of movement brings about frequent handovers and thus increases signaling burden. This letter proposes a fast seamless handover scheme where the access router keeps the mobil... In mobile IPv6 networks, the ping-pong type of movement brings about frequent handovers and thus increases signaling burden. This letter proposes a fast seamless handover scheme where the access router keeps the mobile node's old reservation till the offline Count Down Timer (CDT) expires in order to reduce handover signaling and delay while the mobile node returns in a very short period of time. Based upon a pois son mobility model, an simple expression for CDT optimization is given out for the scheme to achieve the best cost performance of resource reservation. 展开更多
关键词 Mobile IPv6 ping-pong type of movement QoS signaling Handover delay Cost performance.
下载PDF
一种高带宽Ping-pong自调零运算放大器 被引量:3
8
作者 肖宇 《集成电路应用》 2019年第4期41-42,共2页
基于传统的多级运放结构设计了一款低失调,高速高精度的运算放大器。在传统运算放大器的基础上引入Ping-Pong自调零技术结合多级密勒补偿技术,实现了低失调,低噪声以及高精度。采用SMIC 0.18μm CMOS工艺,5 V电压下进行仿真验证。通过Sp... 基于传统的多级运放结构设计了一款低失调,高速高精度的运算放大器。在传统运算放大器的基础上引入Ping-Pong自调零技术结合多级密勒补偿技术,实现了低失调,低噪声以及高精度。采用SMIC 0.18μm CMOS工艺,5 V电压下进行仿真验证。通过Spectre仿真,电路单位增益带宽为9MHz,输出精度达到0.5%。 展开更多
关键词 多级运算放大器 多级密勒补偿 ping-pong自调零
下载PDF
Ping-pong effects study in PIC turbo joint detection for TDD CDMA
9
作者 Song Changjian Zhong Zifa Zhang Shuo 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期260-265,共6页
A kind of turbo joint detection scheme based on parallel interference cancellation (PIC) is studied; then, the eigenvalues of iteration matrix is deeply analyzed for studying the ping-pong effects in PIC JD and the ... A kind of turbo joint detection scheme based on parallel interference cancellation (PIC) is studied; then, the eigenvalues of iteration matrix is deeply analyzed for studying the ping-pong effects in PIC JD and the corresponding compensation approach is introduced. Finally, the proposed algorithm is validated through computer simulation in TDD CDMA uplink transmission. The result shows that the ping-pong effects are almost avoided completely in the presence of the compensation scheme, and system performance is greatly improved. 展开更多
关键词 parallel interference cancellation joint detection CDMA ping-pong TURBO
下载PDF
On the Security of Quantum Key Distribution Ping-Pong Protocol
10
作者 Masakazu Yoshida Takayuki Miyadera Hideki Imai 《Journal of Quantum Information Science》 2013年第1期16-19,共4页
Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security att... Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but also a different information disturbance theorem, which denotes a trade-off relationship between information gain for an eavesdropper and error rate, from the related works for an attack model. 展开更多
关键词 Two-Way QUANTUM KEY Distribution ping-pong Protocol ROBUSTNESS Information DISTURBANCE THEOREM
下载PDF
Analysis on the Current Situation of China's Ping-pong Referee Team above the National Level and Countermeasure Study
11
作者 Qi XIAO 《International Journal of Technology Management》 2013年第9期73-76,共4页
In this paper, the current situation of China' s Ping-pong referees team is studied using the methods such as document literatures and investigation, and the basic situation of the team is analyzed, and also the leve... In this paper, the current situation of China' s Ping-pong referees team is studied using the methods such as document literatures and investigation, and the basic situation of the team is analyzed, and also the level of law enforcement and the existing main problems are summarized, so as to explore the new ideas for the construction of the Ping-pong referees team and also provide a basis for China to train excellent Ping-pong referees. Through investigation, it is found that the problems such as the aging structure, poor English, insufficient training, and less judgment chances of the Ping-pong referee team should be practically solved, and also the artistic judgment quality should be improved. 展开更多
关键词 Above the National Level ping-pong Referees Team Team Construction
下载PDF
Dancing Ping-Pong Promotes Global Collaboration——At the Sports Economy and International Regional Cooperation Forum for the Belt and Road Initiative in 2018
12
作者 Li Houqiang Chen Youbin 《Contemporary Social Sciences》 2018年第5期1-8,共8页
Sichuan is the strongest province in western China, and Chengdu is the first stop of the Silk Road and the Yangtze River Economic Zone. Qingbaijiang,the inception point of the Chengdu-Europe express railway, is an imp... Sichuan is the strongest province in western China, and Chengdu is the first stop of the Silk Road and the Yangtze River Economic Zone. Qingbaijiang,the inception point of the Chengdu-Europe express railway, is an important source of artifacts from the ancient Sichuan civilization, and Sichuan province, the land of abundance, is the cradle and base of ping-pong. Chengdu has been connected to 展开更多
关键词 In At the Sports Economy and International Regional Cooperation Forum for the Belt and Road Initiative in 2018 Dancing ping-pong Promotes Global Collaboration
下载PDF
EDMA在图像数据快速传输中的应用 被引量:8
13
作者 但永平 彭红涛 +1 位作者 王东云 刘芳华 《液晶与显示》 CAS CSCD 北大核心 2013年第1期99-104,共6页
在图像处理中图像数据交换量大,图像数据传输是图像采集处理系统的关键环节。EDMA是DSP中用于实现数据快速交换的重要技术,具有独立于CPU的后台批量数据传输的能力。文章基于TI公司TMS320DM642芯片的图像采集处理系统,利用EDMA的数据传... 在图像处理中图像数据交换量大,图像数据传输是图像采集处理系统的关键环节。EDMA是DSP中用于实现数据快速交换的重要技术,具有独立于CPU的后台批量数据传输的能力。文章基于TI公司TMS320DM642芯片的图像采集处理系统,利用EDMA的数据传输方式实现视频数据信号高速实时传输。介绍了DSP的外部存储器接口与FPGA的FIFO存储器有机结合进行数据传输,分析了其设计的整体结构与逻辑控制的功能,并着重分析了基于EDMA Ping-Pong数据传输方式的原理及其应用。另外,EDMA中断服务程序调用CPU对已搬移完成的图像数据块进行处理,不仅提高了数据的传输效率,而且节约了CPU资源,使DSP的高性能得到了充分发挥,从而为视频信号处理的实时性奠定了基础。 展开更多
关键词 EDMA DSP FIFO 数据传输 ping-pong
下载PDF
外场高速数据采集系统的研制 被引量:6
14
作者 罗勇 何玉珠 《电子测量技术》 2006年第2期88-89,共2页
使用PCI-9820高速A/D卡和LabVIEW图形化编程语言研制出用于外场的高速数据采集系统,实现了对窄脉冲(纳秒级)的数据采集、海量存储和实验室波形回放。应用该系统已完成对外场高频设备的数据采集和信号的事后分析。
关键词 高速数据采集 海量数据 DMA ping-pong 模式
下载PDF
一种基于TMS320C6713的语音信号频域盲分离算法 被引量:1
15
作者 刘朝晨 吴强 +3 位作者 殷超 李清石 许宏吉 李玉军 《数据采集与处理》 CSCD 北大核心 2012年第6期646-651,共6页
提出了一种真实环境中语音信号频域盲分离算法的实现方案。基于TMS320C6713 DSK平台,充分利用硬件资源,完成了语音盲分离处理算法的平台移植,并进行了编译环境、算法和程序3个级别上的软件优化,最终结果显示本系统具有较好的性能,在离... 提出了一种真实环境中语音信号频域盲分离算法的实现方案。基于TMS320C6713 DSK平台,充分利用硬件资源,完成了语音盲分离处理算法的平台移植,并进行了编译环境、算法和程序3个级别上的软件优化,最终结果显示本系统具有较好的性能,在离线和在线情况下均取得了对真实环境中两说话人混合语音的有效分离。 展开更多
关键词 频域盲分离 非平稳信号 ping-pong缓存 软件优化
下载PDF
量子安全通信开发回顾
16
作者 李文骞 《电脑编程技巧与维护》 2012年第2期101-104,共4页
回顾了量子通信协议的发展历程和各个研究方向,重点是量子直接安全通信(QSDC)问题。量子直接安全通信(QSDC)的安全性要求比量子密钥分配(QKD)要高,能够在密文信息泄漏之前察觉到窃听者。基于认证的量子直接安全通信(QSDC)的提出使得量... 回顾了量子通信协议的发展历程和各个研究方向,重点是量子直接安全通信(QSDC)问题。量子直接安全通信(QSDC)的安全性要求比量子密钥分配(QKD)要高,能够在密文信息泄漏之前察觉到窃听者。基于认证的量子直接安全通信(QSDC)的提出使得量子通信安全性达到了新的高度。 展开更多
关键词 量子直接安全通信 量子通信 ping-pong协议 Two-Step协议 基于验证的量子直接安全通信
下载PDF
病毒的杀伤能力
17
作者 张汉亭 《微计算机应用》 1997年第2期83-87,共5页
病毒的破坏行为体现了病毒的杀伤能力。病毒的杀伤能力有很大差异。其激烈程度取决于病毒作者的主观愿望及其具备的技术能量。本文将结合病毒实例,分析病毒的破坏行为,以加深对病毒杀伤能力的认识。
关键词 计算机病毒 ping-pong病毒 感染性
下载PDF
一种带有新型纹波抑制环路的电容耦合生物医学仪表放大器 被引量:2
18
作者 秦政 董阳涛 +1 位作者 赵梦恋 吴晓波 《微电子学与计算机》 CSCD 北大核心 2018年第8期31-35,共5页
设计了一种用于扩增生物电信号的低功耗高精度电容耦合斩波仪表放大器.通过斩波来减少失调和1/f噪声,并且利用带有斩波型Ping-Pong结构自调零拓扑的纹波抑制环路来减小由于调制失调电压和1/f噪声而产生的纹波.利用上述结构,斩波纹波在... 设计了一种用于扩增生物电信号的低功耗高精度电容耦合斩波仪表放大器.通过斩波来减少失调和1/f噪声,并且利用带有斩波型Ping-Pong结构自调零拓扑的纹波抑制环路来减小由于调制失调电压和1/f噪声而产生的纹波.利用上述结构,斩波纹波在放大器的输出级可衰减约40dB.采用带有较大时间常数的直流伺服环路可以有效抑制电极失调,同时采用正反馈环路来提高输入阻抗.该仪表放大器采用SMIC 0.18μm CMOS工艺进行设计.针对EEG或ECG等信号的特点,将放大器-3dB带宽设置为1kHz.仿真结果表明,它的等效输入噪声功率谱密度为32nV/,噪声效率因数为2.1,共模抑制比为105dB,并且在1V电压供电下,供电电流达到2.8μA. 展开更多
关键词 电容耦合斩波仪表放大器 纹波抑制环路 斩波型ping-pong结构自调零拓扑 噪声效率因数
下载PDF
基于GPU的实时群体仿真算法实现 被引量:1
19
作者 范晓晔 田丰林 陈戈 《计算机技术与发展》 2014年第11期17-22,共6页
群体仿真在虚拟现实、影视动画、计算机游戏等领域有着广泛的应用。大规模的群体仿真中每个个体都要同其感知范围内的其他个体相互作用,当实时更新所有个体的状态时,就会导致O(N2)计算量的问题。针对这一问题,实现了一种基于GPU(图形处... 群体仿真在虚拟现实、影视动画、计算机游戏等领域有着广泛的应用。大规模的群体仿真中每个个体都要同其感知范围内的其他个体相互作用,当实时更新所有个体的状态时,就会导致O(N2)计算量的问题。针对这一问题,实现了一种基于GPU(图形处理器)的BOIDS群体行为模拟算法,充分利用GPU并行计算的能力处理大规模群体运动的巨大计算量。该方法利用GPU的快速光栅化计算每个个体同其感知范围内的其他个体的相互作用力,通过像素颜色混合功能实现作用力的累加,利用GPU自动生成Mip Map的能力计算所有个体的平均速度和平均位置。实验结果表明,该方法能够有效提高大规模群体运动的渲染速度。 展开更多
关键词 群体仿真 BOIDS算法 ping-pong技术 实时模拟 GPU
下载PDF
Revisiting Quantum Secure Direct Communication with W State 被引量:5
20
作者 刘俊 刘益民 +2 位作者 曹海静 史守华 张战军 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第10期2652-2655,共4页
The quantum secure direct communication protocol recently proposed by Cao and Song [Chin. Phys. Left. 23 (2006)290] (i.e., the C-S QSDC protocol) is revisited. A security leak is pointed out. Taking advantage of t... The quantum secure direct communication protocol recently proposed by Cao and Song [Chin. Phys. Left. 23 (2006)290] (i.e., the C-S QSDC protocol) is revisited. A security leak is pointed out. Taking advantage of this leak, an eavesdropper may adopt the intercept-measure-resend strategy to attack the quantum channel such that in the C-S QSDC protocol the secret message can be completely eavesdropped. To fix the leak, the original version of the C-S QSDC protocol is revised. As a consequence, the security is improved and assured at least in the case of an ideal quantum channel. 展开更多
关键词 WOJCIKS EAVESDROPPING ATTACK ping-pong PROTOCOL ENTANGLEMENT
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部