期刊文献+
共找到1,600篇文章
< 1 2 80 >
每页显示 20 50 100
Early proactive monitoring of DNA-thioguanine in patients with Crohn’s disease predicts thiopurine-induced late leucopenia in NUDT15/TPMT normal metabolizers
1
作者 Ting Yang Kang Chao +9 位作者 Xia Zhu Xue-Ding Wang Sumyuet Chan Yan-Ping Guan Jing Mao Pan Li Shao-Xing Guan Wen Xie Xiang Gao Min Huang 《World Journal of Gastroenterology》 SCIE CAS 2024年第12期1751-1763,共13页
BACKGROUND Thiopurine-induced leucopenia significantly hinders the wide application of thiopurines.Dose optimization guided by nudix hydrolase 15(NUDT15)has significantly reduced the early leucopenia rate,but there ar... BACKGROUND Thiopurine-induced leucopenia significantly hinders the wide application of thiopurines.Dose optimization guided by nudix hydrolase 15(NUDT15)has significantly reduced the early leucopenia rate,but there are no definitive biomarkers for late risk leucopenia prediction.AIM To determine the predictive value of early monitoring of DNA-thioguanine(DNATG)or 6-thioguanine nucleotides(6TGN)for late leucopenia under a NUDT15-guided thiopurine dosing strategy in patients with Crohn’s disease(CD).METHODS Blood samples were collected within two months after thiopurine initiation for detection of metabolite concentrations.Late leucopenia was defined as a leukocyte count<3.5×10^(9)/L over two months.RESULTS Of 148 patients studied,late leucopenia was observed in 15.6%(17/109)of NUDT15/thiopurine methyltransferase(TPMT)normal and 64.1%(25/39)of intermediate metabolizers.In patients suffering late leucopenia,early DNATG levels were significantly higher than in those who did not develop late leucopenia(P=4.9×10^(-13)).The DNATG threshold of 319.43 fmol/μg DNA could predict late leucopenia in the entire sample with an area under the curve(AUC)of 0.855(sensitivity 83%,specificity 81%),and in NUDT15/TPMT normal metabolizers,the predictive performance of a threshold of 315.72 fmol/μg DNA was much more remarkable with an AUC of 0.902(sensitivity 88%,specificity 85%).6TGN had a relatively poor correlation with late leucopenia whether in the entire sample(P=0.021)or NUDT15/TPMT normal or intermediate metabolizers(P=0.018,P=0.55,respectively).CONCLUSION Proactive therapeutic drug monitoring of DNATG could be an effective strategy to prevent late leucopenia in both NUDT15/TPMT normal and intermediate metabolizers with CD,especially the former. 展开更多
关键词 Thiopurine-induced late leucopenia DNA-thioguanine 6-thioguanine nucleotide proactive therapeutic drug monitoring Crohn’s disease
下载PDF
China’s Proactive Fiscal Policy
2
作者 Xing Li Chen Long 《China Economist》 2024年第1期58-74,共17页
In contrast to the traditional Western approach to macro-fiscal management,China’s proactive fiscal policy is founded on a people-centered development philosophy and,with distinctive Chinese characteristics,is a sign... In contrast to the traditional Western approach to macro-fiscal management,China’s proactive fiscal policy is founded on a people-centered development philosophy and,with distinctive Chinese characteristics,is a significant policy innovation of macroeconomic management in the Chinese modernization.Although there are notable distinctions between the Western“Keynesian”and the“nonKeynesian”schools of thought,both of these approaches’core policy goals and methodological roots are the same,composing the traditional Western macro-fiscal approach.This approach faces increasing real dilemmas.China’s proactive fiscal policy,however,places greater emphasis on future potential growth rates in addition to equilibrium between supply and demand,achieving a fiscal policy transformation with a new approach.In this paper we argue that with such a new approach,China should reconsider the nature and reasonable level of the fiscal deficit,the function and risk assessment criteria of government debt,the scope and effects of reductions in taxes and fees,its approach and focus of demand management,and the costs and resulting efficiencies of policies in order to develop a new fiscal policy paradigm that is more in line with its stated goals. 展开更多
关键词 proactive fiscal policy fiscal approach potential growth rate
下载PDF
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
3
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期106-133,共28页
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo... As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm. 展开更多
关键词 Advanced Persistent Threats (APT) Attack Phases Attack Surface DEFENSE-IN-DEPTH Disaster Recovery (DR) Incident Response Plan (IRP) Intrusion Detection Systems (IDS) Intrusion Prevention System (IPS) Key Risk Indicator (KRI) Layered Defense Lockheed Martin Kill Chain proactive Defense Redundancy Risk Management Threat Intelligence
下载PDF
How Do Mind-Body Practices Benefit Employees? A Daily Diary Study of Mind–Body Practices after Work and Employees’ Next-Day Proactive Behavior
4
作者 Puwen Shang Jinfan Zhou Guanglei Zhang 《International Journal of Mental Health Promotion》 2023年第1期45-62,共18页
Although it is becoming increasingly popular for organizations to offer programs of mind–body practices to their employees to improve their physical and mental health,the effects that after-work sessions of mind–bod... Although it is becoming increasingly popular for organizations to offer programs of mind–body practices to their employees to improve their physical and mental health,the effects that after-work sessions of mind–body prac-tices have on employees’work behavior remain unclear.Using the model of proactive motivation and experience sampling,this study explored the relationship between employees’mind–body practices after work and their proactive behavior in the workplace on the following day.A multilevel path analysis of data from 82 employees over seven consecutive workdays showed that employees’mind–body practices after work had a positive effect on their proactive behavior in the workplace on the following day.The relationship was mediated by next-day high-activated positive affect and problem-solving confidence.Furthermore,job control positively moderated the rela-tionship between high-activated positive affect and proactive behavior but not that between problem-solving con-fidence and proactive behavior.We discuss the theoretical and practical implications of thesefindings,and propose future research directions. 展开更多
关键词 Mind-body practices proactive motivation proactive behavior non-work experiences
下载PDF
A novel proactive soft load balancing framework for ultra dense network
5
作者 Miaona Huang Jun Chen 《Digital Communications and Networks》 SCIE CSCD 2023年第3期788-796,共9页
A major challenge for the future wireless network is to design the self-organizing architecture.The reactive self-organizing model of traditional networks needs to be transformed into an active self-organizing network... A major challenge for the future wireless network is to design the self-organizing architecture.The reactive self-organizing model of traditional networks needs to be transformed into an active self-organizing network.Due to the user mobility and the coverage of small cells,the network load often becomes unbalanced,resulting in poor network performance.Mobility management has become an important issue to ensure seamless communication when users move between cells,and proactive mobility management is one of the important functions of the active Self-Organizing Network(SON).This paper proposes a proactive mobility management framework for active SON,which transforms the original reactive load balancing into a forward-aware and proactive load balancing.The proposed framework firstly uses the BART model to predict the users’temporal and spatial mobility based on a weekly cycle and then formulate the MLB optimization problem based on the soft load.Two solutions are proposed to solve the above MLB problem.The simulation results show that the proposed method can better optimize the network performance and realize intelligent mobile management for the future network. 展开更多
关键词 5G and beyond proactive load balancing Heterogeneous network Soft load Location prediction
下载PDF
基于ProActive的网格应用程序开发方法 被引量:5
6
作者 梁正友 张凌 董守斌 《计算机应用》 CSCD 北大核心 2005年第6期1414-1416,共3页
介绍了基于Java的并行分布中间件工具ProActive,结合网格任务调度器,讨论和给出了用ProActive开发网格和网络应用的方法和过程。实践表明使用ProActive可以方便的开发网格网络应用程序。
关键词 网格 网络 proactive 应用程序开发
下载PDF
Windows下基于ProActive并行计算的关键技术 被引量:8
7
作者 董明刚 梁正友 《计算机工程》 EI CAS CSCD 北大核心 2006年第19期105-107,共3页
针对现有并行计算技术的不足,提出了基于ProActive的Windows平台下的并行计算方法,对Windows平台下并行计算的结构、节点的动态部署、并行程序设计方法、并行任务调度等关键技术进行了研究,并初步实现了一个系统原型。实验证明该方案是... 针对现有并行计算技术的不足,提出了基于ProActive的Windows平台下的并行计算方法,对Windows平台下并行计算的结构、节点的动态部署、并行程序设计方法、并行任务调度等关键技术进行了研究,并初步实现了一个系统原型。实验证明该方案是可行的和有效的。 展开更多
关键词 proactive 并行程序设计 SSH 动态部署
下载PDF
ProSPer:一个支持proactive特性的通用型事件监控系统 被引量:2
8
作者 刘家红 吴泉源 《计算机学报》 EI CSCD 北大核心 2009年第4期773-783,共11页
大规模网络安全监控应用中需要对网络安全态势进行动态评估,在网络出现重大安全风险前进行proac-tive特性的有效防范.把网络安全监控系统建模为事件监控系统,对满足复合时序和属性值逻辑关系的多个事件进行关联,把多个原子事件复合为语... 大规模网络安全监控应用中需要对网络安全态势进行动态评估,在网络出现重大安全风险前进行proac-tive特性的有效防范.把网络安全监控系统建模为事件监控系统,对满足复合时序和属性值逻辑关系的多个事件进行关联,把多个原子事件复合为语义更丰富、更抽象的复合安全事件.已有研究提出了不同的复合事件检测模型,但缺乏proactive的事件监控能力.基于时序关系并不能提高事件监控的预测能力的假设,设计了基于top-k复合事件检测模型的事件监控系统ProSPer,为网络安全监控等应用系统提供proactive特性的事件监控能力.与已有的复合事件检测系统相比,ProSPer检测复合事件时无需读取全部成分事件,这种proactive特性是非常有意义的设计. 展开更多
关键词 网络安全 事件监控 事件流处理 复合事件 proactive特性
下载PDF
基于ProActive的并行计算任务调度器的研究 被引量:1
9
作者 董明刚 梁正友 《计算机工程》 CAS CSCD 北大核心 2007年第7期73-74,91,共3页
ProActive在开发并行计算及网格应用中很受欢迎,但目前还没有可用于基于ProActive的并行计算的任务调度器,在对相关技术进行研究后,给出了一个简单有效的任务调度器的实现方案,介绍了其技术细节。将其应用于开发的基于ProActive的并行... ProActive在开发并行计算及网格应用中很受欢迎,但目前还没有可用于基于ProActive的并行计算的任务调度器,在对相关技术进行研究后,给出了一个简单有效的任务调度器的实现方案,介绍了其技术细节。将其应用于开发的基于ProActive的并行计算支持平台中进行了实验,实验结果表明该调度器是可行和有效的。 展开更多
关键词 活动对象 调度器 负载平衡 proactive
下载PDF
基于ProActive的P-Spider1.0改进
10
作者 张林才 梁正友 王红霞 《计算机工程》 CAS CSCD 北大核心 2010年第17期288-290,共3页
针对带中心节点结构的分布式并行Web Spider的中心节点负担过重、通信负载不均衡、可扩展性差的问题,提出基于Rabin指纹算法的URL去重改进算法和节点对等结构的改进方案,利用ProActive中间件设计开发改进的分布式并行Web Spider。对比... 针对带中心节点结构的分布式并行Web Spider的中心节点负担过重、通信负载不均衡、可扩展性差的问题,提出基于Rabin指纹算法的URL去重改进算法和节点对等结构的改进方案,利用ProActive中间件设计开发改进的分布式并行Web Spider。对比实验表明,改进后的Web Spider采集效率更高,通信负载均衡,无节点瓶颈问题,具有良好的可扩展性。 展开更多
关键词 网络蜘蛛 proactive中间件 节点对等 分布式 中心节点
下载PDF
Ontology-based proactive knowledge system
11
作者 夏士雄 张磊 +2 位作者 周勇 牛强 丁秋林 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期377-380,共4页
With the aim to address the problems presented in knowledge utilization in knowledge-intensive enterprises, the ontology-based proactive knowledge system (OPKS) is put forward to improve knowledge utilization. Proac... With the aim to address the problems presented in knowledge utilization in knowledge-intensive enterprises, the ontology-based proactive knowledge system (OPKS) is put forward to improve knowledge utilization. Proactive knowledge service is taken as the basic idea in the OPKS. The user knowledge requirement is taken as the driving factor and described by the user knowledge requirement. Ontologies are used to present the semantic of heterogeneous knowledge sources and ontology mapping is used to realize the interoperation of heterogeneous knowledge sources. The required knowledge is found by matching the user knowledge requirement with knowledge sources and is provided to the user proactively. System analysis and design of OPKS is carded on by adopting UML. The OPKS is implemented in Java language. Application in a certain institute shows that the OPKS can raise efficiency of knowledge utilization in knowledge-intensive enterprises. 展开更多
关键词 ONTOLOGY KNOWLEDGE proactive
下载PDF
基于ProActive的容错调度器设计与实现
12
作者 梁正友 孙宇 《计算机应用》 CSCD 北大核心 2008年第2期371-373,共3页
在分布式计算系统中保证并行应用计算的正确性及提高计算系统中动态资源的利用率是一个重要的研究问题。在原有的基于ProActive的并行计算平台上,引入呼吸通信机制、故障节点发现机制和子任务重新调度机制,设计和实现了一个容错调度系... 在分布式计算系统中保证并行应用计算的正确性及提高计算系统中动态资源的利用率是一个重要的研究问题。在原有的基于ProActive的并行计算平台上,引入呼吸通信机制、故障节点发现机制和子任务重新调度机制,设计和实现了一个容错调度系统。实验表明该调度器在部分节点出现故障的情况下,能保证并行计算的正确性,并具有较好的性能。 展开更多
关键词 并行计算 调度 容错 proactive
下载PDF
基于ProActive的分布式并行WebSpider设计
13
作者 张林才 梁正友 《计算机工程》 CAS CSCD 北大核心 2008年第19期47-48,52,共3页
单机Web Spider的数据采集速度较慢,采用MPI技术或直接用Java开发分布式Web Spider代价较高。该文利用ProActive中间件提供的主动对象技术、网络并行计算技术、自动部署机制设计实现了P-Spider分布式并行Web Spider。实验结果表明,该P-S... 单机Web Spider的数据采集速度较慢,采用MPI技术或直接用Java开发分布式Web Spider代价较高。该文利用ProActive中间件提供的主动对象技术、网络并行计算技术、自动部署机制设计实现了P-Spider分布式并行Web Spider。实验结果表明,该P-Spider采集速率是单机多线程Web Spider的2.2倍。 展开更多
关键词 WEB Spider程序 proactive中间件 并行 分布式
下载PDF
一种基于ProActive同步性实现读者/写者问题的方法
14
作者 李金忠 夏洁武 胡运全 《井冈山大学学报(自然科学版)》 2008年第4期18-20,共2页
基于主动对象模式的ProActive,是一个具有并行、分布式、多线程和并发计算的java网格中间件类库,同时是以容错、负载平衡、移动性和安全性等为特征的统一框架。ProActive有着较高层次的并发特征,它提供一个高级的同步机制,易于安全地实... 基于主动对象模式的ProActive,是一个具有并行、分布式、多线程和并发计算的java网格中间件类库,同时是以容错、负载平衡、移动性和安全性等为特征的统一框架。ProActive有着较高层次的并发特征,它提供一个高级的同步机制,易于安全地实现潜在复杂的同步策略。本文基于ProActive的同步性解决读者/写者这个经典同步问题,实现了三种不同的同步策略:"读者优先"、"写者优先"、"公平竞争,"且能在不停顿正读或写的情况下为读者或写者指派不同的同步策略。 展开更多
关键词 proactive 读者/写者问题 同步
下载PDF
The Impact of Self-Efficacy and Work Engagement on Healthcare Professionals’ Proactive Behavior 被引量:2
15
作者 Chrysovalantis Karagkounis Georgios Manomenidis +2 位作者 Charalampos G. Platis Evgenia Minasidou Thalia Bellali 《Health》 2020年第4期305-316,共12页
Job crafting (JC) is a form of proactive behavior and refers to the initiatives employees that could take to change their tasks or other job characteristics to achieve the best person-job fit. JC consists of six dimen... Job crafting (JC) is a form of proactive behavior and refers to the initiatives employees that could take to change their tasks or other job characteristics to achieve the best person-job fit. JC consists of six dimensions: seeking structural and social job resources, as well as challenges, hindering job demands, optimizing job demands, and delegating tasks. The aim of the present study was to explore the impact of self-efficacy and work engagement on healthcare professionals’ (HP) proactive behavior. A convenience sample of 295 HP working in Primary and Secondary healthcare structures of Northern Greece completed a questionnaire that included: 1) demographic/occupational characteristics, 2) the Job Crafting Scale, 3) the Generalized Self-Efficacy Scale (GSE) and 4) the Utrecht Work Engagement Scale (UWES). Increased age was found to be associated with decreased levels of seeking social job resources (p < 0.01). Education level was positively associated with increased levels of seeking structural job resources (p < 0.01), seeking challenges (p < 0.05), and optimizing job demands (p < 0.05), while job position was found to be negatively related to delegating tasks (p < 0.01). Self-efficacy was positively associated with increased levels of seeking structural resources (p < 0.001), challenges (p < 0.001), and increased levels of optimizing job demands (p < 0.001), while it was positively associated with decreased levels of delegating tasks (p < 0.05). In addition, increased work engagement was found to be associated with increased levels of seeking social job resources (p < 0.05), challenges (p < 0.01), and optimizing job demands (p < 0.01). Findings highlight the importance of self-efficacy, work engagement and individual characteristics in the realization of a resourceful work environment and HP’ adjustment in the organization. Thus, interventions that promote HP’ JC proactive behaviors should be encouraged. 展开更多
关键词 JOB Crafting Healthcare PROFESSIONALS proactive BEHAVIOR SELF-EFFICACY Work ENGAGEMENT
下载PDF
An efficient proactive RSA scheme for large-scale ad hoc networks 被引量:1
16
作者 张瑞山 陈克非 《Journal of Shanghai University(English Edition)》 CAS 2007年第1期64-67,共4页
A previous proactive RSA scheme for large-scale ad hoc network has been shown to be faulty. In this paper, we present a new proactive RSA scheme for ad hoc networks, which includes four protocols: the initial key dis... A previous proactive RSA scheme for large-scale ad hoc network has been shown to be faulty. In this paper, we present a new proactive RSA scheme for ad hoc networks, which includes four protocols: the initial key distribution protocol, the share refreshing protocol, the share distribution protocol, and the signature generation protocol. This scheme has two advantages: the building blocks are secure, and the system is efficient. 展开更多
关键词 ad hoc networks threshold signature proactive secret sharing RSA
下载PDF
Verifiable Secret Redistribution for Proactive Secret Sharing Schemes 被引量:4
17
作者 于佳 孔凡玉 李大兴 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期236-241,共6页
A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures a... A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures and between different threshold schemes. A point worth mentioning is that this verifiable secret redistribution (VSR) scheme can identify dishonest old shareholders during redistribution without any assumption. A certain technique is adopted to verify the correctness of the old shares of the secret. As a result, the scheme is very efficient. It can be applied to proactive secret sharing (PSS) schemes to construct more flexible and practical proactive secret sharing schemes. 展开更多
关键词 secret sharing verifiable secret redistribution proactive secret sharing
下载PDF
Establishment and application of service mapping model for proactive remanufacturing impeller 被引量:2
18
作者 宋守许 邰莹莹 柯庆镝 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第12期3143-3152,共10页
Since the complex impeller structure and the difficult remanufacturing process may easily cause advance remanufacturing or excessive use,an optimized design method of impeller and service mapping model was presented f... Since the complex impeller structure and the difficult remanufacturing process may easily cause advance remanufacturing or excessive use,an optimized design method of impeller and service mapping model was presented for its proactive remanufacturing with setting up to explore the best remanufacturing time point in this work.Considering a certain model of long distance pipeline compressor impeller with the Basquin equation and the design method of impeller,the mathematical relationship between the changes of structure and life of the impeller was established.And the service mapping model between the structure and life was set up and simulated by ANSYS software.Thus,the service mapping model was applied to feedback the original design for proactive remanufacturing.In this work,the best proactive remanufacturing time point of impeller was analyzed with the service mapping model,and the structural parameter values could be optimized at this time point.Meanwhile,in the results of this simulation,it proves that the impeller under this optimization performance could satisfy the impeller operating demands.Therefore,comparing with the traditional optimization design method,the remanufacturing optimized design based on the service mapping model is feasible in proactive remanufacturing for sustainable development. 展开更多
关键词 IMPELLER proactive remanufacturing remanufacturing time point service mapping model
下载PDF
Tencent WeChat’s Micro-Innovation of Integration and Iteration under Technical Paradigm Transformation 被引量:4
19
作者 罗仲伟 焦豪 许扬帆 《China Economist》 2015年第5期106-122,共17页
This paper attempts to broaden the theory of dynamic competences, defining them as the abilities of firms to integrate and reconstruct in a chaotic and complex environment of technical paradigm transformation (TP tra... This paper attempts to broaden the theory of dynamic competences, defining them as the abilities of firms to integrate and reconstruct in a chaotic and complex environment of technical paradigm transformation (TP transformation). We have created a semi-interactive theoretical framework based on dynamic competences, technical paradigms and innovation strategies to investigate how corporate dynamic competences support innovation during TP transformation. Under this theoretical framework, this paper attempts to open the popular question of mobile Internet industry - the black box of "micro innovation" - to conduct an in-depth case study of WeChat's micro-innovation featuring "integration" and "iteration ". The authors have discovered that the success of WeChat can be attributed to the following factors: seizure of strategic opportunities during TP transformation, effective organizational learning and knowledge management, and powerful virtual integration competences across regions, sectors and firms. These factors have led to the rapid, repetitive and precise iteration of innovation based on technical knowledge and user information. Open and coordinated innovation was carried out ahead of competitors, partners and lead customers, and effective quality control of micro-innovation was conducted to mitigate the uncertainties and risks of innovation failures. These factors have enabled WeChat to become a third-party service platform of disruptive innovation and value creation in the mobile lnternet era. The theoretical contributions of this paper are as follows:it has enriche'd the theory of dynamic competences, conducted a groundbreaking analysis on the intrinsic mechanism of micro-innovation strategy for Internet firms from the height of technical paradigms, and elaborated how dynamic competences support innovation strategies during TP transformation. This paper offers theoretical support and practical guidance for Internet firms to innovate in the context of TP transformation. 展开更多
关键词 technical paradigm dynamic competences micro-innovation innovation strategy case study
下载PDF
Proactive Spectrum Monitoring for Suspicious Wireless Powered Communications in Dynamic Spectrum Sharing Networks 被引量:1
20
作者 Yu Zhang Guojie Hu Yueming Cai 《China Communications》 SCIE CSCD 2021年第12期119-138,共20页
This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamm... This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamming-assisted spec-trum monitoring scheme via spectrum monitoring data(SMD)transmission is proposed to maximize the sum ergodic monitoring rate at SM.In SWPC,the suspi-cious communications of each data block occupy mul-tiple independent blocks,with a block dedicated to the wireless energy transfer by the energy-constrained suspicious nodes with locations in a same cluster(symmetric scene)or randomly distributed(asymmet-ric scene)and the remaining blocks used for the in-formation transmission from suspicious transmitters(STs)to suspicious destination(SD).For the sym-metric scene,with a given number of blocks for SMD transmission,namely the jamming operation,we first reveal that SM should transmit SMD signal(jam the SD)with tolerable maximum power in the given blocks.The perceived suspicious signal power at SM could be maximized,and thus so does the correspond-ing sum ergodic monitoring rate.Then,we further reveal one fundamental trade-off in deciding the op-timal number of given blocks for SMD transmission.For the asymmetric scene,a low-complexity greedy block selection scheme is proposed to guarantee the optimal performance.Simulation results show that the jamming-assisted spectrum monitoring schemes via SMD transmission achieve much better perfor-mance than conventional passive spectrum monitor-ing,since the proposed schemes can obtain more accu-rate and effective spectrum characteristic parameters,which provide basic support for fine-grained spectrum management and a solution for spectrum security in dynamic spectrum sharing network. 展开更多
关键词 proactive spectrum monitoring sum er-godic monitoring rate jamming-assisted proactive spectrum monitoring HALF-DUPLEX fundamental trade-off dynamic spectrum sharing network
下载PDF
上一页 1 2 80 下一页 到第
使用帮助 返回顶部