期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
An Analysis of Magnetic Field Environment Near High-Voltage Power Lines and Contact Wires of Electric Railways 被引量:2
1
作者 LILi GAOYou-gang 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2000年第1期78-81,共4页
Image method is used in this paper to calculate the value of magnetic field near high-voltage transmission lines and electric railways. Areas in which the magnetic field is less than 0.002 Gauss are given and the magn... Image method is used in this paper to calculate the value of magnetic field near high-voltage transmission lines and electric railways. Areas in which the magnetic field is less than 0.002 Gauss are given and the magnetic pollution of high-voltage power transmission lines and electric railways is discussed 展开更多
关键词 High-voltage power transmission line electric railway electromagnetic calculation magnetic field
原文传递
Impact of Reflection Induced Noise on AM-VSB CATV Lightwave Systems 被引量:1
2
作者 HANYu-guo GUWan-yi 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2000年第1期7-12,共6页
关键词 CATV lightwave systems double Rayleigh backscattering AM-VSB
原文传递
Analysis of Crosstalk Induced by Optical Cross-Connection in Multiwavelength Networks
3
作者 ShenXiao YePeida 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 1997年第1期28-33,44,共7页
AnalysisofCrostalkInducedbyOpticalCros-ConnectioninMultiwavelengthNetworksShenXiaoandYePeida(BeijingUniversi... AnalysisofCrostalkInducedbyOpticalCros-ConnectioninMultiwavelengthNetworksShenXiaoandYePeida(BeijingUniversityofPostsandTelec... 展开更多
关键词 光交叉连接器 光网络 光交换 通信网
原文传递
A Solution to Optimizing Access Networks
4
作者 GUOZhi-gang ZHONGYu-wei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2000年第3期60-63,共4页
This article describes the present situation of Access Networks( AN ), enumerates a few problems in the development of AN , and brings forward an optimizing solution to AN ; then describes its architecture, in... This article describes the present situation of Access Networks( AN ), enumerates a few problems in the development of AN , and brings forward an optimizing solution to AN ; then describes its architecture, indicates the applied the characteristics and prospect of the concentrated monitoring and managing systems in the AN based on the CORBA architecture. 展开更多
关键词 AN network management CORBA V5 interface
原文传递
The Effect of Fiber Non-Linearity on Two Dispersion Compensation Schemes
5
作者 YANGDa-Kai CHENXue 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 1999年第2期33-35,共3页
The combined effects of chromatic dispersion, self-phase modulation and laser chirp are numericallyinvestigated for a 10 Gb/s IM-DD system over 100 km of standard single-mode (SSM)fiber. Pre-compensation and
关键词 fiber grating dispersion compensation fiber non-linearityCLC number: ##5TN929. 11
原文传递
Shape Skeletonization via Mathematical Morphology
6
作者 CuiYi ZhouNan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 1999年第1期7-11,共5页
Skeleton is an important topological descriptor of an image and is widely used in the fields of image analysis. In this paper we present an algorithm based on morphological operations for extracting skeleton from a bi... Skeleton is an important topological descriptor of an image and is widely used in the fields of image analysis. In this paper we present an algorithm based on morphological operations for extracting skeleton from a binary image. Since the original image can be partially or completely reconstructed from the skeleton, this algorithm which works in both analogUe and digital space is useful in image coding and feature description. A fast algorithm for skeletonizing and reconstrUcting digital images and the results of the fast algorithm are also given. 展开更多
关键词 mathematical morphology SKELETON shape skeletonization
原文传递
User Authentication Schemes Based on Smart Cards
7
作者 LiZhongxian ZhanBanghua 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 1998年第2期57-59,82,共4页
Three user authentication schemes are proposed. The security of these new schemes is due to the used secure hash functions and the physically secure smart cards.
关键词 smart cards network security hash function user authentication
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部