期刊文献+
共找到1,664篇文章
< 1 2 84 >
每页显示 20 50 100
Multi-Strategy Dynamic Spectrum Access in Cognitive Radio Networks: Modeling, Analysis and Optimization 被引量:9
1
作者 Yi Yang Qinyu Zhang +3 位作者 Ye Wang Takahiro Emoto Masatake Akutagawa Shinsuke Konaka 《China Communications》 SCIE CSCD 2019年第3期103-121,共19页
Dynamic spectrum access(DSA) based on cognitive radios(CR) technique is an effective approach to address the "spectrum scarcity" issue. However, traditional CR-enabled DSA system employs only single DSA stra... Dynamic spectrum access(DSA) based on cognitive radios(CR) technique is an effective approach to address the "spectrum scarcity" issue. However, traditional CR-enabled DSA system employs only single DSA strategy, which might not be suited to the dynamic network environment. In this paper, we propose a multi-strategy DSA(MS-DSA) system, where the primary and the secondary system share spectrum resources with multiple DSA strategies simultaneously. To analyze the performance of the proposed MS-DSA system, we model it as a continuous-time Markov chain(CTMC) and derive the expressions to compute the corresponding performance metrics. Based on this, we define a utility function involving the concerns of effective throughput, interference quantity on primary users, and spectrum leasing cost. Two optimization schemes, named as spectrum allocation and false alarm probability selection, are proposed to maximize the utility function. Finally, numerical simulations are provided to validate our analysis and demonstrate that the performance can be significantly improved caused by virtues of the proposed MS-DSA system. 展开更多
关键词 COGNITIVE RADIO networks dynamic SPECTRUM access multi-strategy performance analysis optimization
在线阅读 下载PDF
A Review in the Core Technologies of 5G: Device-to-Device Communication, Multi-Access Edge Computing and Network Function Virtualization 被引量:2
2
作者 Ruixuan Tu Ruxun Xiang +1 位作者 Yang Xu Yihan Mei 《International Journal of Communications, Network and System Sciences》 2019年第9期125-150,共26页
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ... 5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances. 展开更多
关键词 5th Generation Network VIRTUALIZATION Device-To-Device COMMUNICATION Base STATION Direct COMMUNICATION INTERFERENCE multi-access EDGE COMPUTING Mobile EDGE COMPUTING
在线阅读 下载PDF
A distributed role-based access control model for multi-domain environments 被引量:1
3
作者 洪帆 朱贤 邢光林 《Journal of Shanghai University(English Edition)》 CAS 2006年第2期134-141,共8页
Access control in multi-domain environments is an important question in building coalition between domains. Based on the RBAC access control model and the concepts of secure domain, the role delegation and role mappin... Access control in multi-domain environments is an important question in building coalition between domains. Based on the RBAC access control model and the concepts of secure domain, the role delegation and role mapping are proposed, which support the third-party authorization. A distributed RBAC model is then presented. Finally implementation issues are discussed. 展开更多
关键词 role access control multi-DOMAIN DELEGATION mapping.
在线阅读 下载PDF
A Random Multi-Access Method for Data Services in CDMA Cellular System
4
作者 李振 尤肖虎 《Journal of Southeast University(English Edition)》 EI CAS 1997年第2期8-12,共5页
ARandomMultiAccessMethodforDataServicesinCDMACelularSystemLiZhen(李振)YouXiaohu(尤肖虎)(NationalMobileCommunicat... ARandomMultiAccessMethodforDataServicesinCDMACelularSystemLiZhen(李振)YouXiaohu(尤肖虎)(NationalMobileCommunicationsResearchLabor... 展开更多
关键词 multiple access CODE DIVISION multi access mobile communication
在线阅读 下载PDF
New strategies for collision resolution of multi-access channel
5
作者 凌永发 孟德宇 张继洁 《Journal of Pharmaceutical Analysis》 SCIE CAS 2007年第1期56-59,共4页
The truncated binary exponential back-off algorithm is one of the most effective methods applied in collision resolution process of random multi-access channel.In this study,two new strategies are presented to improve... The truncated binary exponential back-off algorithm is one of the most effective methods applied in collision resolution process of random multi-access channel.In this study,two new strategies are presented to improve the capability of the truncated binary exponential back-off algorithm.In the new strategies,the sizes of the initial window size or the operating window sizes are adjusted dynamically,which always bring a significant improvement for the self-adaptability of the original algorithm.A series of experiments are simulated and the results verify that the new strategies can make the implementation more stable and effective than the original algorithm. 展开更多
关键词 back-off algorithm collision resolution multi-access channel
在线阅读 下载PDF
Accessing Multi-Source Geological Data through Network in MORPAS Software System 被引量:3
6
作者 MeiHongbo HuGuangdao +1 位作者 ChinJian~o LiZhenhua 《Journal of China University of Geosciences》 SCIE CSCD 2003年第3期265-268,共4页
MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical,... MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system. 展开更多
关键词 multi-source geological data SQL Server accessing data through network
在线阅读 下载PDF
Centralized Role-Based Access Control for Federated Multi-Domain Environments
7
作者 YU Guangcan LU Zhengding +1 位作者 LI Ruixuan MUDAR Sarem 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1688-1692,共5页
The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Bas... The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Based Access Control (RBAC) model. We propose a model called CRBAC that easily establishes a global policy for roles mapping among multiple security domains. Our model is based on an extension of the RBAC model. Also, multiple security domains were composed to one abstract security domain. Also roles in the multiple domains are translated to permissions of roles in the abstract security domain. These permissions keep theirs hierarchies. The roles in the abstract security domain implement roles mapping among the multiple security domains. Then, authorized users of any security domain can transparently access resources in the multiple domains. 展开更多
关键词 RBAC(role based access control) federated multi-DOMAIN
在线阅读 下载PDF
基于多类型宏的Access数据库用户多角色登录验证系统设计 被引量:5
8
作者 郭静 《自动化技术与应用》 2020年第12期150-153,共4页
本文通过Access提供的多类型宏,尤其是数据宏,设计Access数据库用户多角色登录验证系统。首先设计系统功能模块,其次设计并连接数据库,再次进行程序安全性设计,最后完成系统实现。实现结果表明,使用宏有助于非计算机专业人员不需编写复... 本文通过Access提供的多类型宏,尤其是数据宏,设计Access数据库用户多角色登录验证系统。首先设计系统功能模块,其次设计并连接数据库,再次进行程序安全性设计,最后完成系统实现。实现结果表明,使用宏有助于非计算机专业人员不需编写复杂代码,便可开发具备逻辑性功能的Access数据库应用系统,以此降低了设计开发难度,且此系统可在很大程度上保证用户登录与信息的安全性,值得大力推广与应用。 展开更多
关键词 多类型宏 access数据库 多角色 登录验证系统
在线阅读 下载PDF
ACCESS中利用宏实现系统的多用户分角色登录 被引量:1
9
作者 姚一红 《办公自动化(综合月刊)》 2009年第5期52-53,共2页
用户标识与鉴别(Identification&Authentication)是系统为数据库提供的最外层的安全保护措施。一般来讲,用户标识与鉴别(系统登录)的实现需要计算机专业人员用编程语言来实现,考虑到ACCESS可以直接面向数据库的最终用户,而数据库最... 用户标识与鉴别(Identification&Authentication)是系统为数据库提供的最外层的安全保护措施。一般来讲,用户标识与鉴别(系统登录)的实现需要计算机专业人员用编程语言来实现,考虑到ACCESS可以直接面向数据库的最终用户,而数据库最终用户往往并非计算机的专业人员,本文介绍了一种在ACCESS数据库中不用编码而用宏对象实现的系统多用户分角色登录方法。 展开更多
关键词 access 多用户 分角色 登录
在线阅读 下载PDF
ASP访问多个Access数据库的简单方法 被引量:1
10
作者 白健 《电脑知识与技术》 2018年第9X期12-13,共2页
指出基于ASP+Access架构的网站项目中,采用多数据库设计,能有效弥补Access数据库的一些局限性。给出了在同一ASP页面中访问多个Access数据库的三种简单方法:利用ASP+Cookie技术访问不同数据库;利用FOR循环结构+Cookie技术同时访问多个... 指出基于ASP+Access架构的网站项目中,采用多数据库设计,能有效弥补Access数据库的一些局限性。给出了在同一ASP页面中访问多个Access数据库的三种简单方法:利用ASP+Cookie技术访问不同数据库;利用FOR循环结构+Cookie技术同时访问多个数据库;利用FOR循环结构+FSO组件同时访问多个数据库。给出了以上方法的ASP代码。 展开更多
关键词 ASP access 多数据库 网站建设
在线阅读 下载PDF
储能协同下光伏多源接入功率波动GSA控制算法
11
作者 张俨 苏华英 +2 位作者 王融融 姜有泉 李润 《电子设计工程》 2026年第1期97-100,105,共5页
光伏电源的输出功率受到光照、温度等自然因素的影响,呈现出间歇性和随机性的特点,导致功率波动较大。较大的功率波动会对电网的频率和电压稳定性产生严重影响,甚至可能引发电网崩溃等严重事故。为减少光伏接入带来的功率波动,提出储能... 光伏电源的输出功率受到光照、温度等自然因素的影响,呈现出间歇性和随机性的特点,导致功率波动较大。较大的功率波动会对电网的频率和电压稳定性产生严重影响,甚至可能引发电网崩溃等严重事故。为减少光伏接入带来的功率波动,提出储能协同下光伏多源接入功率波动的引力搜索算法(Gravitational Search Algorithm,GSA)。定义光伏与储能协同标准,并按照多源节点设置原则,构建储能协同下的光伏多源接入电网。根据多源接入电网中的功率波动特性,确定GSA参数的取值范围,完成光伏多源接入功率波动GSA控制算法的设计。实验结果表明,所提方法可将功率极值差控制在200 kW以内,且不会对光伏电网的发电能力造成影响,可以提高电网的供电质量。 展开更多
关键词 储能协同 光伏多源接入 功率波动 GSA参数 电能质量
在线阅读 下载PDF
万兆同轴宽带接入网HIMAC 3.0的拆帧重排序方法
12
作者 黄一明 潘伟涛 邱智亮 《电子科技》 2026年第1期25-31,共7页
高性能同轴电缆网络(High Performance Network Over Coax,HINOC)技术是一种光纤同轴混合接入技术,已发展至第3代。为了实现万兆以太网的接入速率,第3代HINOC引入了多信道绑定机制。但该机制在有效扩展HINOC网络信道带宽的同时易导致HIM... 高性能同轴电缆网络(High Performance Network Over Coax,HINOC)技术是一种光纤同轴混合接入技术,已发展至第3代。为了实现万兆以太网的接入速率,第3代HINOC引入了多信道绑定机制。但该机制在有效扩展HINOC网络信道带宽的同时易导致HIMAC(HINOC Medium Access Control)拆帧端接收的数据流失序。针对该问题,文中提出了一种拆帧重排序方法。通过重排序队列缓存管理、入队逻辑地址计算、超时判断及清空以及出队判断等关键技术的设计和实现来解决多信道绑定机制引起的拆帧乱序问题,并对其关键功能点进行仿真验证和板级验证。实验结果表明,所提方法能够有效处理多信道绑定导致的乱序问题,并且能够确保系统在遇到错误情况时稳定运行,具有较强的鲁棒性,满足万兆同轴宽带接入HIMAC 3.0的功能和性能要求。 展开更多
关键词 万兆同轴宽带接入 HIMAC 3.0 多信道绑定 数据帧乱序 拆帧 重排序 超时清空 队列缓存
在线阅读 下载PDF
一种通用的Beyond 3G Multi-Radio接入架构 被引量:3
13
作者 李军 宋梅 宋俊德 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2005年第S2期95-98,共4页
下一代移动通信网(Beyond 3G)是多种无线接入(Multi-Radio)共存的融合网络.如何有效集成异构无线网络,优化使用全部的无线资源是B3G研究领域内关键课题之一.在分析目前多种异构无线网络整合方案的基础上,借鉴欧洲IST 6th框架中Multi-Ra... 下一代移动通信网(Beyond 3G)是多种无线接入(Multi-Radio)共存的融合网络.如何有效集成异构无线网络,优化使用全部的无线资源是B3G研究领域内关键课题之一.在分析目前多种异构无线网络整合方案的基础上,借鉴欧洲IST 6th框架中Multi-Radio接入架构的基本思想,考虑在链路层实现异构无线网络之间的整合,从而提出一种通用B3G Multi-Radio接入架构模型,该模型可以无缝融合多种无线接入技术、有效利用全网无线资源. 展开更多
关键词 BEYOND3G 异构网络 multi-radio接入 联合无线资源管理
在线阅读 下载PDF
基于Mi-Fi的多终端Access VPN接入研究与实现 被引量:1
14
作者 李在浩 《科技广场》 2012年第10期75-78,共4页
为了解决多个Wi-Fi终端同时接入Access VPN的问题,采用运营商提供的专用APN技术,利用Mi-Fi和专用APN相结合设计了一种新型实现方案。通过双向NAT转换技术,不改变原网络结构和数据配置。实验结果表明,网络组建快捷,系统运行稳定,通过Mi-F... 为了解决多个Wi-Fi终端同时接入Access VPN的问题,采用运营商提供的专用APN技术,利用Mi-Fi和专用APN相结合设计了一种新型实现方案。通过双向NAT转换技术,不改变原网络结构和数据配置。实验结果表明,网络组建快捷,系统运行稳定,通过Mi-Fi实现的多终端接入与单机APN接入效果完全一致。 展开更多
关键词 多终端 accessVPN APN NAT
在线阅读 下载PDF
BLIND DIFFERENTIAL ADAPTIVE MULTIUSER DETECTION
15
作者 潘且鲁 席裕庚 《Journal of Shanghai Jiaotong university(Science)》 EI 2000年第2期52-56,共5页
In this paper, a new blind equalization cost function, termed differential mean output energy (DMOE), was presented, and a new multiuser detection algorithm with variable step size was designed. It is shown through si... In this paper, a new blind equalization cost function, termed differential mean output energy (DMOE), was presented, and a new multiuser detection algorithm with variable step size was designed. It is shown through simulation results for a co channel system involving severe MAI that the DMOE algorithm gives significantly enhanced signal to interference ratio (SIR) performance and converges rapidly to the optimum MMSE detector, together with a low computational complexity requirement relative to the recursive least squares (RLS) algorithm. Thus, it is not necessary to switch to the decision directed mode. Moreover, it also exhibits global convergence, and can be used in different interference environment without the requirement of estimating and restricting the surplus energy. 展开更多
关键词 multiUSER detection CDMA systems multi access INTERFERENCE BLIND EQUALIZATION INTERFERENCE CANCELLATION Document code:A
在线阅读 下载PDF
Recovery of single event upset in advanced complementary metal-oxide semiconductor static random access memory cells 被引量:4
16
作者 Qin Jun-Rui Chen Shu-Ming +1 位作者 Liang Bin Liu Bi-Wei 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第2期624-628,共5页
Using computer-aided design three-dimensional (3D) simulation technology, the recovery mechanism of single event upset and the effects of spacing and hit angle on the recovery are studied. It is found that the multi... Using computer-aided design three-dimensional (3D) simulation technology, the recovery mechanism of single event upset and the effects of spacing and hit angle on the recovery are studied. It is found that the multi-node charge collection plays a key role in recovery and shielding the charge sharing by adding guard rings. It cannot exhibit the recovery effect. It is also indicated that the upset linear energy transfer (LET) threshold is kept constant while the recovery LET threshold increases as the spacing increases. Additionally, the effect of incident angle on recovery is analysed and it is shown that a larger angle can bring about a stronger charge sharing effect, thus strengthening the recovery ability. 展开更多
关键词 single event upset multi-node charge collection static random access memory angulardependence
原文传递
巨星座跨域多尺度安全传输与接入 被引量:2
17
作者 司江勃 李赞 +3 位作者 王丹洋 刘朋朋 赵浩钦 黄睿 《航天技术与工程学报》 2025年第1期77-85,共9页
针对巨星座通联面临频轨资源稀缺、节点高动态、传输距离跨尺度等挑战,传统无线空口技术较难满足高安全、高可靠、低时延通联的通信需求,研究巨星座跨域多尺度安全传输与接入技术,遵循“感知环境-利用环境-适应环境”的研究思路,提出了... 针对巨星座通联面临频轨资源稀缺、节点高动态、传输距离跨尺度等挑战,传统无线空口技术较难满足高安全、高可靠、低时延通联的通信需求,研究巨星座跨域多尺度安全传输与接入技术,遵循“感知环境-利用环境-适应环境”的研究思路,提出了电磁环境认知驱动传输与接入机制,采用电磁地图知识构建立体电磁态势图,深度挖掘不同维域可用通联资源,在此基础上通过统计预先规划与实时动态操控双驱动,利用自主决策接入方式,实现高动态、多尺度、复杂通联环境下的时/空/频/能等碎片化通信资源高效利用,确保信息高安全传输,进而保障巨星座网络的安全可靠连接,推动天基信息系统支援能力建设。 展开更多
关键词 巨星座通联 电磁安全 多址接入 安全传输
在线阅读 下载PDF
Static Optimization of a Compliant Vertical Access Riser
18
作者 LOU Min ZHANG Yuansheng WU Wugang 《Journal of Ocean University of China》 SCIE CAS CSCD 2019年第5期1070-1078,共9页
The compliant vertical access riser (CVAR) is a new riser concept with good compliance;it can significantly reduce operating costs by eliminating the need for additional machines to operate wells directly on the platf... The compliant vertical access riser (CVAR) is a new riser concept with good compliance;it can significantly reduce operating costs by eliminating the need for additional machines to operate wells directly on the platform.In this study,we determined the optimal riser parameters in terms of the stress and riser weight by optimizing the CVAR,and we compared the optimization resuits.A two-dimensional nonlinear static CVAR model was deduced according to the principles of virtual work and variation,and the model was verified using MATLAB.Design of experiments and Kriging method were used to reduce the number of sample calculations and improve the modeling accuracy.An appropriate selection of the multi-objective optimization problem (MOP) and the non-dominated sorting genetic algorithm helped to optimize the CVAR design.The non-dominated sorting genetic algorithm Ⅱ was used to solve the Pareto frontier of the optimization model in order to provide decision makers with more choices for the optimization results.After optimizing the riser parameters,the geometry of the riser was smoother,and the stress and stress differences were greatly reduced;the maximum equivalent stresses at the top and bottom were reduced by 36.6% and 44%,respectively.In addition,the stress difference in the buoyancy block area was reduced by 20.9%,and the weight of the riser was increased significantly by 28.1%. 展开更多
关键词 compliant VERTICAL access RISER multi-objective OPTIMIZATION two-dimensional nonlinear STATIC CVAR model
在线阅读 下载PDF
基于多权威属性基加密的智能电网数据安全共享模型 被引量:1
19
作者 张新有 刘庆夫 +1 位作者 冯力 邢焕来 《信息网络安全》 北大核心 2025年第1期98-109,共12页
智能电网通过共享把数据的潜在价值转化为实际利益,因此保障数据共享的安全至关重要。文章面向智能电网场景中数据的细粒度访问控制,提出一种基于多权威属性基加密(MA-ABE)的数据安全共享模型。文章使用线性整数秘密共享方案(LSSS)构建M... 智能电网通过共享把数据的潜在价值转化为实际利益,因此保障数据共享的安全至关重要。文章面向智能电网场景中数据的细粒度访问控制,提出一种基于多权威属性基加密(MA-ABE)的数据安全共享模型。文章使用线性整数秘密共享方案(LSSS)构建MA-ABE方案,实现一个属性可被多个权威监控,多个权威可联合生成用户私钥,使得方案可抵抗针对属性权威机构(AA)的合谋攻击。将每个权威与一条区块链关联,并利用中继技术实现多链协同,保障数据跨域共享灵活性。通过安全规约证明了所提MA-ABE方案在基于判定性双线Diffie-Hellman假设的前提下满足选择明文攻击下的不可区分性(IND-CPA)安全性。文章通过理论分析和对比实验说明了MA-ABE方案在存储、计算以及功能性方面均有一定的优势。仿真结果表明,模型的吞吐量和时延满足了智能电网数据共享的需求,能够在保证智能电网数据共享性能的情况下,适用于智能电网的细粒度访问控制。 展开更多
关键词 智能电网 多权威属性基加密 多链协同 访问控制 数据共享
在线阅读 下载PDF
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment 被引量:1
20
作者 Amir Mohamed Talib 《Journal of Information Security》 2015年第2期118-130,共13页
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a... With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC. 展开更多
关键词 CLOUD Computing CLOUD DATA STORAGE CLOUD Service PROVIDER Formula-Based CLOUD DATA access Control multi-Agent System and Secure Java Agent Development Framework
在线阅读 下载PDF
上一页 1 2 84 下一页 到第
使用帮助 返回顶部