期刊文献+
共找到492篇文章
< 1 2 25 >
每页显示 20 50 100
改进的量子安全直传Ping-Pong协议
1
作者 梁彦霞 牛静 聂敏 《西安邮电大学学报》 2015年第2期32-35,共4页
为了提高Ping-Pong协议的传输效率,对其加以改进。改进的协议增加了随机数序列。相对于原协议,将传输的经典消息与控制信息从1∶1的比例改变为N∶(M-N)。按照量子通信效率评价公式,相对于原协议0.333的通信效率,改进协议的Matlab仿真和... 为了提高Ping-Pong协议的传输效率,对其加以改进。改进的协议增加了随机数序列。相对于原协议,将传输的经典消息与控制信息从1∶1的比例改变为N∶(M-N)。按照量子通信效率评价公式,相对于原协议0.333的通信效率,改进协议的Matlab仿真和数值推导结果均显示,只需满足条件N<M<2 N,其效率即可提高至N/(2 M-N);在最少控制模式的情况下,只要N>1,极限通信效率可达N/(N+2),故改进后的效率均大于原协议。 展开更多
关键词 量子安全直接通信 ping-pong协议 传输效率
在线阅读 下载PDF
依据“ping-pong”循环机制预测piRNA靶基因的搜索方法 被引量:1
2
作者 许甘霖 齐绪峰 蔡冬青 《基础医学与临床》 CSCD 2017年第3期399-401,共3页
piRNA是指能与PIWI家族蛋白结合的小RNAs,其功能主要是稳定生殖细胞正常发育,在其他体细胞内也参与生理功能的调控[1]。相当一部分的piRNA通过被称作"pingpong"循环机制去识别与切割其靶基因的转录本mRNA(图1),并通过该机制去实现初... piRNA是指能与PIWI家族蛋白结合的小RNAs,其功能主要是稳定生殖细胞正常发育,在其他体细胞内也参与生理功能的调控[1]。相当一部分的piRNA通过被称作"pingpong"循环机制去识别与切割其靶基因的转录本mRNA(图1),并通过该机制去实现初级piRNA(primary piRNA)和次级piRNA(secondary piRNA)循环利用,piwil4或piwil2与相应的piRNA结合,通过piRNA的5'端前10~11个碱基作为介导序列,依照碱基互补原则,对与之互补的靶mRNA进行切割, 展开更多
关键词 循环机制 PIRNA ping-pong 碱基互补 转录本 蛋白结合 起始位点 结果符合率 循环利用 大鼠
在线阅读 下载PDF
基于DMA控制的数据Ping-Pong传输 被引量:1
3
作者 汪智 严洪 李春生 《电子元器件应用》 2006年第4期78-80,共3页
介绍了TI公司TMS320C54xx系列DSP的DMA工作原理,提出了利用TMS320VC5409芯片的DMA方式来实现数据Ping-Pong传输的方法,同时给出了详细的软件设计流程。
关键词 DSP TMS320C54xx DMA ping-pong传输
在线阅读 下载PDF
Eavesdropping on the'ping-pong' quantum communication protocol freely in a noise channel 被引量:11
4
作者 邓富国 李熙涵 +2 位作者 李春燕 周萍 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第2期277-281,共5页
We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdroppe... We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol. 展开更多
关键词 quantum communication ping-pong protocol EAVESDROPPING
原文传递
Improved Security Detection Strategy for Quantum "Ping-Pong" Protocol and Its Security Analysis 被引量:5
5
作者 李剑 金海菲 景博 《China Communications》 SCIE CSCD 2011年第3期170-179,共10页
In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But ... In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But the protocol was proved to have many vulnerabilities,and can be attacked by eavesdroppers.To overcome the problem,an improved security detection strategy which inserts the | 0〉,| 1〉,|+〉and |-〉particles into the messages as the decoy particles randomly in the"Ping-pong"protocol is presented.During the security analysis,the method of the entropy theory is introduced,and three detection strategies are compared quantitatively by using the constraint between the information which eavesdroppers can obtain and the interference introduced.Because of the presence of the trap particles |+〉and |-〉,the detection rate will be no less than 25% when Eve attacks the communication.The security analysis result shows that the efficiency of eavesdropping detection in the presented protocol is higher than the other two,so the detection strategy in the protocol can ensure that the "Ping-pong"protocol is more secure. 展开更多
关键词 secure quantum direct communication "ping-pong " protocol protocol security eavesdropping detection
在线阅读 下载PDF
Improved Quantum " Ping-Pong" Protocol Based on Extended Three-Particle GHZ State 被引量:5
6
作者 Li Jian Guo Xiaojing +2 位作者 Song Danjie Xie Feng Peng Yong 《China Communications》 SCIE CSCD 2012年第1期111-116,共6页
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro... In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. 展开更多
关键词 quantum key distffoution ping-pong protocol extended three-particle GHZ state eavesdropping detection
在线阅读 下载PDF
A FAST SEAMLESS HANDOVER SCHEME AND ITS CDT OPTIMIZATION FOR PING-PONG TYPE OF MOVEMENT 被引量:3
7
作者 Wang Yumlng Yang Zongkai +2 位作者 Zhao Dasheng He Jianhua Fu Xiaoming 《Journal of Electronics(China)》 2006年第2期298-303,共6页
In mobile IPv6 networks, the ping-pong type of movement brings about frequent handovers and thus increases signaling burden. This letter proposes a fast seamless handover scheme where the access router keeps the mobil... In mobile IPv6 networks, the ping-pong type of movement brings about frequent handovers and thus increases signaling burden. This letter proposes a fast seamless handover scheme where the access router keeps the mobile node's old reservation till the offline Count Down Timer (CDT) expires in order to reduce handover signaling and delay while the mobile node returns in a very short period of time. Based upon a pois son mobility model, an simple expression for CDT optimization is given out for the scheme to achieve the best cost performance of resource reservation. 展开更多
关键词 Mobile IPv6 ping-pong type of movement QoS signaling Handover delay Cost performance.
在线阅读 下载PDF
一种高带宽Ping-pong自调零运算放大器 被引量:4
8
作者 肖宇 《集成电路应用》 2019年第4期41-42,共2页
基于传统的多级运放结构设计了一款低失调,高速高精度的运算放大器。在传统运算放大器的基础上引入Ping-Pong自调零技术结合多级密勒补偿技术,实现了低失调,低噪声以及高精度。采用SMIC 0.18μm CMOS工艺,5 V电压下进行仿真验证。通过Sp... 基于传统的多级运放结构设计了一款低失调,高速高精度的运算放大器。在传统运算放大器的基础上引入Ping-Pong自调零技术结合多级密勒补偿技术,实现了低失调,低噪声以及高精度。采用SMIC 0.18μm CMOS工艺,5 V电压下进行仿真验证。通过Spectre仿真,电路单位增益带宽为9MHz,输出精度达到0.5%。 展开更多
关键词 多级运算放大器 多级密勒补偿 ping-pong自调零
在线阅读 下载PDF
Ping-pong effects study in PIC turbo joint detection for TDD CDMA
9
作者 Song Changjian Zhong Zifa Zhang Shuo 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期260-265,共6页
A kind of turbo joint detection scheme based on parallel interference cancellation (PIC) is studied; then, the eigenvalues of iteration matrix is deeply analyzed for studying the ping-pong effects in PIC JD and the ... A kind of turbo joint detection scheme based on parallel interference cancellation (PIC) is studied; then, the eigenvalues of iteration matrix is deeply analyzed for studying the ping-pong effects in PIC JD and the corresponding compensation approach is introduced. Finally, the proposed algorithm is validated through computer simulation in TDD CDMA uplink transmission. The result shows that the ping-pong effects are almost avoided completely in the presence of the compensation scheme, and system performance is greatly improved. 展开更多
关键词 parallel interference cancellation joint detection CDMA ping-pong TURBO
在线阅读 下载PDF
On the Security of Quantum Key Distribution Ping-Pong Protocol
10
作者 Masakazu Yoshida Takayuki Miyadera Hideki Imai 《Journal of Quantum Information Science》 2013年第1期16-19,共4页
Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security att... Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but also a different information disturbance theorem, which denotes a trade-off relationship between information gain for an eavesdropper and error rate, from the related works for an attack model. 展开更多
关键词 Two-Way QUANTUM KEY Distribution ping-pong Protocol ROBUSTNESS Information DISTURBANCE THEOREM
在线阅读 下载PDF
Analysis on the Current Situation of China's Ping-pong Referee Team above the National Level and Countermeasure Study
11
作者 Qi XIAO 《International Journal of Technology Management》 2013年第9期73-76,共4页
In this paper, the current situation of China' s Ping-pong referees team is studied using the methods such as document literatures and investigation, and the basic situation of the team is analyzed, and also the leve... In this paper, the current situation of China' s Ping-pong referees team is studied using the methods such as document literatures and investigation, and the basic situation of the team is analyzed, and also the level of law enforcement and the existing main problems are summarized, so as to explore the new ideas for the construction of the Ping-pong referees team and also provide a basis for China to train excellent Ping-pong referees. Through investigation, it is found that the problems such as the aging structure, poor English, insufficient training, and less judgment chances of the Ping-pong referee team should be practically solved, and also the artistic judgment quality should be improved. 展开更多
关键词 Above the National Level ping-pong Referees Team Team Construction
在线阅读 下载PDF
Dancing Ping-Pong Promotes Global Collaboration——At the Sports Economy and International Regional Cooperation Forum for the Belt and Road Initiative in 2018
12
作者 Li Houqiang Chen Youbin 《Contemporary Social Sciences》 2018年第5期1-8,共8页
Sichuan is the strongest province in western China, and Chengdu is the first stop of the Silk Road and the Yangtze River Economic Zone. Qingbaijiang,the inception point of the Chengdu-Europe express railway, is an imp... Sichuan is the strongest province in western China, and Chengdu is the first stop of the Silk Road and the Yangtze River Economic Zone. Qingbaijiang,the inception point of the Chengdu-Europe express railway, is an important source of artifacts from the ancient Sichuan civilization, and Sichuan province, the land of abundance, is the cradle and base of ping-pong. Chengdu has been connected to 展开更多
关键词 In At the Sports Economy and International Regional Cooperation Forum for the Belt and Road Initiative in 2018 Dancing ping-pong Promotes Global Collaboration
在线阅读 下载PDF
Improved quantum "Ping-pong" protocol based on GHZ state and classical XOR operation 被引量:13
13
作者 LI Jian JIN HaiFei JING Bo 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第9期1612-1618,共7页
In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 200... In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 2002, 89: 187902]. But the protocol was proved very vulnerable, and can be attacked by an eavesdropper. An improved "Ping-pong" protocol is presented to overcome the problem. The GHZ state particles are used to detect eavesdroppers, and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol. During the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information which an eavesdropper can obtain and the interference introduced. If the eavesdropper gets the full information, the detection rate of the original "Ping-pong" protocol is 50%; the detection rate of the second protocol which used two particles of EPR pair as detection particles is also 50%; and the detection rate of the presented protocol is 75%. In the end, the security of the pro-posed protocol is discussed. The analysis results show that the improved "Ping-pong" protocol in this paper is more secure than the other two. 展开更多
关键词 ping-pong protocol XOR operation GHZ state eavesdropping detection protocol security
原文传递
Kimiyo Matsuzaki, witness of ping-pong diplomacy between China and Japan
14
作者 He Yan 《Voice of Friendship》 2018年第1期8-11,共4页
If the resumption of diplomatic ties between China and the United States by way of ping-pong diplomacy is described as'earth-shattering and heaven-battering',then the process of forging a profound friendship b... If the resumption of diplomatic ties between China and the United States by way of ping-pong diplomacy is described as'earth-shattering and heaven-battering',then the process of forging a profound friendship between China and Japan through ping-pong can be said to be gentle and gradual.From Goto Koji to Koji Kimura,from Kimiyo Matsuzaki to Ai Fukuhara,the gentle stream of the friendship 展开更多
关键词 Kimiyo Matsuzaki witness of ping-pong diplomacy between China and Japan
原文传递
My Ping-Pong Family
15
作者 DENG YAPING CHEN SHANSHAN 《Women of China》 1998年第8期19-20,共2页
WHEN I was born, my father was 40 and my mother was 36. Father is a man of few words and an introverted nature. He belongs to that type of people who are very tough and strong-willed; he has worked hard all his life. ... WHEN I was born, my father was 40 and my mother was 36. Father is a man of few words and an introverted nature. He belongs to that type of people who are very tough and strong-willed; he has worked hard all his life. Mother, on the other hand, is extroverted and eager to excel. My personality is a combination of both of their characters. Father loves playing ping-pong ardently. He used to be a top player of the Henan provincial team and won the men’s singles championship in a contest of five provinces in central and southern China. Mother, a worker at the No. 4 National Textile Mill in Zhengzhou, also loved to play ping-pong when she was young. It was because of the sport that she and Father were brought together and got married. When the 展开更多
关键词 My ping-pong Family
原文传递
轨道检测里程测量误差补偿算法研究
16
作者 王琰 魏世斌 +3 位作者 吴奇永 陈仕明 杨飞 费继友 《中国铁道科学》 北大核心 2025年第2期29-36,共8页
高速铁路轨道检测基于轮轴编码器脉冲计数原理实现里程测量,测量误差随车辆运行里程增加而不断累积增大。为减小里程测量累积误差,首先分析轨道检测里程测量误差产生的原因,基于正负误差相消的思想提出误差补偿的乒乓算法;然后通过轨道... 高速铁路轨道检测基于轮轴编码器脉冲计数原理实现里程测量,测量误差随车辆运行里程增加而不断累积增大。为减小里程测量累积误差,首先分析轨道检测里程测量误差产生的原因,基于正负误差相消的思想提出误差补偿的乒乓算法;然后通过轨道检测综合试验标定台模拟试验,验证算法的有效性;最后在国家铁道试验中心环形铁道线采用实车试验,验证算法的实用性。结果表明:该算法在比较周期内最大里程测量累积误差为0.3 mm,完成1个比较周期,整体实现里程测量误差正负相消;该算法可适用于低分辨率的编码器,降低了轨道检测里程测量对编码器分辨率的要求;对于新造综合检测列车、现役轨道检查车和现役综合巡检车,车辆行驶100 km时,采用该算法轨道检测里程测量误差可分别减少约65,57和61 m。研究结果可为长大隧道、偏远山区特殊工况等无辅助定位条件下准确测量里程提供参考。 展开更多
关键词 高速铁路 轨道检测 里程误差 乒乓算法 轮轴编码器 辅助定位
在线阅读 下载PDF
基于FPGA的视频实时采集与显示实验设计
17
作者 胡可凡 朱泽齐 +2 位作者 朱宇宸 孙科学 邹辉 《实验室科学》 2025年第4期10-16,22,共8页
为了进一步加强学生对FPGA(Field-Programmable Gate Array)设计的理解,提高学生进行综合电子设计的能力,设计了一种基于FPGA的视频实时采集与显示实验。通过FPGA主控芯片驱动OV5640双目摄像头进行视频数据采集,将高清视频数据缓存进入D... 为了进一步加强学生对FPGA(Field-Programmable Gate Array)设计的理解,提高学生进行综合电子设计的能力,设计了一种基于FPGA的视频实时采集与显示实验。通过FPGA主控芯片驱动OV5640双目摄像头进行视频数据采集,将高清视频数据缓存进入DDR4芯片,对视频数据的读写进行乒乓操作,再进一步对视频数据进行TMDS(Transition Minimized Differential Signaling)编码,最终实现对1280×720分辨率下60帧高清视频的实时采集与显示。该实验项目应用性强,有利于加强学生面对综合性项目进行开发处理的能力,更好地帮助学生未来投身于电子信息行业。 展开更多
关键词 FPGA 视频处理 乒乓操作 实验案例
在线阅读 下载PDF
一种应用乒乓自归零的高精度放大器
18
作者 邓新伟 杨尚争 +2 位作者 毛佳烽 胡伟波 任立儒 《电子技术应用》 2025年第3期49-53,共5页
设计实现了一种低失调、高增益的运算放大器(运放)。整体电路包含带隙基准、振荡器、分频器、辅助运放和主运放等。该电路采用乒乓结构的自归零技术,实现了连续工作,同时显著缩减了放大器的输入失调偏移。此外,还提出了一种新颖、高效... 设计实现了一种低失调、高增益的运算放大器(运放)。整体电路包含带隙基准、振荡器、分频器、辅助运放和主运放等。该电路采用乒乓结构的自归零技术,实现了连续工作,同时显著缩减了放大器的输入失调偏移。此外,还提出了一种新颖、高效的控制时序,以较低的成本有效降低了放大器在乒乓切换过程中的稳定时间,进一步减小了放大器的输出毛刺。该放大器芯片基于350 nm CMOS工艺设计制造,实际测试结果表明,在5 V电源电压下,放大器消耗了0.65 mA的电流,实现了最大3µV的输入失调偏移,增益带宽积为8 MHz,噪声频谱密度降到了30 nV/√Hz。 展开更多
关键词 低失调 乒乓 自归零 放大器
在线阅读 下载PDF
EDMA在图像数据快速传输中的应用 被引量:8
19
作者 但永平 彭红涛 +1 位作者 王东云 刘芳华 《液晶与显示》 CAS CSCD 北大核心 2013年第1期99-104,共6页
在图像处理中图像数据交换量大,图像数据传输是图像采集处理系统的关键环节。EDMA是DSP中用于实现数据快速交换的重要技术,具有独立于CPU的后台批量数据传输的能力。文章基于TI公司TMS320DM642芯片的图像采集处理系统,利用EDMA的数据传... 在图像处理中图像数据交换量大,图像数据传输是图像采集处理系统的关键环节。EDMA是DSP中用于实现数据快速交换的重要技术,具有独立于CPU的后台批量数据传输的能力。文章基于TI公司TMS320DM642芯片的图像采集处理系统,利用EDMA的数据传输方式实现视频数据信号高速实时传输。介绍了DSP的外部存储器接口与FPGA的FIFO存储器有机结合进行数据传输,分析了其设计的整体结构与逻辑控制的功能,并着重分析了基于EDMA Ping-Pong数据传输方式的原理及其应用。另外,EDMA中断服务程序调用CPU对已搬移完成的图像数据块进行处理,不仅提高了数据的传输效率,而且节约了CPU资源,使DSP的高性能得到了充分发挥,从而为视频信号处理的实时性奠定了基础。 展开更多
关键词 EDMA DSP FIFO 数据传输 ping-pong
在线阅读 下载PDF
外场高速数据采集系统的研制 被引量:6
20
作者 罗勇 何玉珠 《电子测量技术》 2006年第2期88-89,共2页
使用PCI-9820高速A/D卡和LabVIEW图形化编程语言研制出用于外场的高速数据采集系统,实现了对窄脉冲(纳秒级)的数据采集、海量存储和实验室波形回放。应用该系统已完成对外场高频设备的数据采集和信号的事后分析。
关键词 高速数据采集 海量数据 DMA ping-pong 模式
在线阅读 下载PDF
上一页 1 2 25 下一页 到第
使用帮助 返回顶部