期刊文献+
共找到50篇文章
< 1 2 3 >
每页显示 20 50 100
Ant Colony Algorithm for Solving QoS Routing Problem 被引量:3
1
作者 SUNLi-iuan WANGLiang-jun WANGRu-chuan 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第4期449-453,共5页
Based on the state transition rule, the local updating rule and the global updating rule of ant colony algorithm, we propose an improved ant colony algorithm of the least\|cost quality of service (QoS) unicast rou... Based on the state transition rule, the local updating rule and the global updating rule of ant colony algorithm, we propose an improved ant colony algorithm of the least\|cost quality of service (QoS) unicast routing. The algorithm is used for solving the routing problem with delay, delay jitter, bandwidth, and packet loss\|constrained. In the simulation, about 52.33% ants find the successful QoS routing , and converge to the best. It is proved that the algorithm is efficient and effective. 展开更多
关键词 ant colony algorithm QOS unicast routing
在线阅读 下载PDF
Verifiable (t, n) Threshold Signature Scheme Based on Elliptic Curve 被引量:1
2
作者 WANGHua-qun ZHAOJun-xi ZHANGLi-jun 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期165-168,共4页
Based on tht difficulty of solving the ECDLP (elliptic curve discretelogarithm problem) on the finite field, we present a (t, n) threshold signature scheme and averifiable key agreement scheme without trusted party. A... Based on tht difficulty of solving the ECDLP (elliptic curve discretelogarithm problem) on the finite field, we present a (t, n) threshold signature scheme and averifiable key agreement scheme without trusted party. Applying a modified elliptic curve signatureequation, we gel a more efficient signature scheme than the existing ECDSA (elliptic curve digitalsignature algorithm) from the computability and security view. Our scheme has a shorter key, fastercomputation, and better security. 展开更多
关键词 threshold signature secret sharing elliptic curve elliptic curve discretelogarithm
在线阅读 下载PDF
COMPRESSED SPEECH SIGNAL SENSING BASED ON THE STRUCTURED BLOCK SPARSITY WITH PARTIAL KNOWLEDGE OF SUPPORT 被引量:1
3
作者 JiYunyun YangZhen XuQian 《Journal of Electronics(China)》 2012年第1期62-71,共10页
Structural and statistical characteristics of signals can improve the performance of Compressed Sensing (CS). Two kinds of features of Discrete Cosine Transform (DCT) coefficients of voiced speech signals are discusse... Structural and statistical characteristics of signals can improve the performance of Compressed Sensing (CS). Two kinds of features of Discrete Cosine Transform (DCT) coefficients of voiced speech signals are discussed in this paper. The first one is the block sparsity of DCT coefficients of voiced speech formulated from two different aspects which are the distribution of the DCT coefficients of voiced speech and the comparison of reconstruction performance between the mixed program and Basis Pursuit (BP). The block sparsity of DCT coefficients of voiced speech means that some algorithms of block-sparse CS can be used to improve the recovery performance of speech signals. It is proved by the simulation results of the mixed program which is an improved version of the mixed program. The second one is the well known large DCT coefficients of voiced speech focus on low frequency. In line with this feature, a special Gaussian and Partial Identity Joint (GPIJ) matrix is constructed as the sensing matrix for voiced speech signals. Simulation results show that the GPIJ matrix outperforms the classical Gaussian matrix for speech signals of male and female adults. 展开更多
关键词 Compressed Sensing (CS) Speech signals Sensing matrix Block sparsity
在线阅读 下载PDF
Scale-Free Statistics of Bulletin-Board-System Server Visiting 被引量:3
4
作者 王文鼐 李载用 糜正琨 《Chinese Physics Letters》 SCIE CAS CSCD 2004年第2期243-245,共3页
原文传递
Blind adaptive identification of FIR channel in chaotic communication systems 被引量:1
5
作者 王保云 TommyW.S.Chow +3 位作者 K.T.Nb 王保云 TommyW.S.Chow K.T.Nb 《Chinese Physics B》 SCIE EI CAS CSCD 2004年第3期329-334,共6页
原文传递
A NOVEL CONSTRUCTION OF QUANTUM LDPC CODES BASED ON CYCLIC CLASSES OF LINES IN EUCLIDEAN GEOMETRIES
6
作者 CaoDong SongYaoliang ZhaoShengmei 《Journal of Electronics(China)》 2012年第1期1-8,共8页
The dual-containing (or self-orthogonal) formalism of Calderbank-Shor-Steane (CSS) codes provides a universal connection between a classical linear code and a Quantum Error-Correcting Code (QECC). We propose a novel c... The dual-containing (or self-orthogonal) formalism of Calderbank-Shor-Steane (CSS) codes provides a universal connection between a classical linear code and a Quantum Error-Correcting Code (QECC). We propose a novel class of quantum Low Density Parity Check (LDPC) codes constructed from cyclic classes of lines in Euclidean Geometry (EG). The corresponding constructed parity check matrix has quasi-cyclic structure that can be encoded flexibility, and satisfies the requirement of dual-containing quantum code. Taking the advantage of quasi-cyclic structure, we use a structured approach to construct Generalized Parity Check Matrix (GPCM). This new class of quantum codes has higher code rate, more sparse check matrix, and exactly one four-cycle in each pair of two rows. Ex-perimental results show that the proposed quantum codes, such as EG(2,q)II-QECC, EG(3,q)II-QECC, have better performance than that of other methods based on EG, over the depolarizing channel and decoded with iterative decoding based on the sum-product decoding algorithm. 展开更多
关键词 Quantum Error-Correcting Codes (QECC) Low Density Parity Check (LDPC) codes Finite geometry Euclidean Geometry (EG) Stabilizer codes Quasi-cyclic codes
在线阅读 下载PDF
Securing Patient-Centric Personal Health Records Sharing System in Cloud Computing
7
作者 CHEN Danwei CHEN Linling +3 位作者 FAN Xiaowei HE Liwen PAN Su Hu Ruoxiang 《China Communications》 SCIE CSCD 2014年第A01期121-127,共7页
Personal health record (PHR) enables patients to manage their own electronic medical records (EMR) in a centralized way, and it is oRen outsourced to be stored in a third-party server. In this paper we propose a n... Personal health record (PHR) enables patients to manage their own electronic medical records (EMR) in a centralized way, and it is oRen outsourced to be stored in a third-party server. In this paper we propose a novel secure and scalable system for sharing PHRs. We focus on the multiple data owner scenario, and divide the users in the system into multiple security domains that greatly reduce the key management complexity for owners and users. A high degree of patient privacy is guaranteed by exploiting hierarchical and multi- authority attribute-sets based encryption (HM- ASBE). Our system not only supports compound attributes due to flexible attribute sets combinations, but also achieves fine-grained access control. Our scheme supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. 展开更多
关键词 personal health records attribute- based encryption data privacy fine-grained access control
在线阅读 下载PDF
CRYPTANALYSIS OF AN IMAGE ENCRYPTION SCHEME WITH A PSEUDORANDOM PERMUTATION AND ITS IMPROVED VERSION
8
作者 WangJing JiangGuoping LinBing 《Journal of Electronics(China)》 2012年第1期82-93,共12页
Under Kerckhoff principle,this paper discusses the security property of an image encryp-tion scheme with a pseudorandom permutation.Some findings on the security problems of the algo-rithm are reported in the followin... Under Kerckhoff principle,this paper discusses the security property of an image encryp-tion scheme with a pseudorandom permutation.Some findings on the security problems of the algo-rithm are reported in the following:(1) If each row or column of the plain-image matrix is the same,the receiver cannot decrypt correctly.(2) Each plain-text word is correlated with single cipher-text word,but independent of other cipher-text word,which cannot meet the principles of algorithm design-diffusion and confusion.(3) If the cycle numbers are relatively small,statistics attack can be used to reveal some visual information of any other plain-images encrypted with the same secret key.Con-sidering the above problems,we propose an improved algorithm and then analyze its performance.Theoretical analysis and simulation results show that the improved algorithm can obtain better cryptographic properties,such as statistical characteristics,difference characteristics,and so on. 展开更多
关键词 Pseudorandom permutation DIFFUSION CONFUSION Theoretical analysis
在线阅读 下载PDF
HYBRID INTERFERENCE CANCELLATION SCHEME FOR BLIND MULTIUSER DETECTION IN MULTIPATH FADING CHANNELS
9
作者 FuHaiyang ZhaoChunming 《Journal of Electronics(China)》 2002年第1期43-49,共7页
This paper introduces and analyzes a detection scheme for adaptive suppression of Multiuser Access Interference (MAI) and MultiPath Distortion (MPD) for mobile station of DS/CDMA system. The proposed detection scheme ... This paper introduces and analyzes a detection scheme for adaptive suppression of Multiuser Access Interference (MAI) and MultiPath Distortion (MPD) for mobile station of DS/CDMA system. The proposed detection scheme may amount to a RAKE receiver structure,wherein each branch is considered as a linear multiuser filter designed under a Linear Constrained Minimum Variance (LCMV) optimization strategy to suppress MAI, followed by a proper combining rule to suppress MPD. The adaptive blind multiuser detecting and optimum combining of the proposed receiver are realized, based on the Least-Mean-Square (LMS) algorithm and an adaptive vector tracking algorithm respectively. Finally, the feasibility of the above two algorithms is proved by the numerical results provided by computer simulation. 展开更多
关键词 Blind adaptive multiuser detection RAKE receiver Matrix projection Adaptive vector tracking
在线阅读 下载PDF
MODEL-BASED PERFORMANCE EVALUATION APPROACH FOR MOBILE AGENT SYSTEMS
10
作者 LiXin MiZhengkun MengXudong 《Journal of Electronics(China)》 2004年第2期145-151,共7页
Claimed as the next generation programming paradigm, mobile agent technology has attracted extensive interests in recent years. However, up to now, limited research efforts have been devoted to the performance study o... Claimed as the next generation programming paradigm, mobile agent technology has attracted extensive interests in recent years. However, up to now, limited research efforts have been devoted to the performance study of mobile agent system and most of these researches focus on agent behavior analysis resulting in that models are hard to apply to mobile agent systems. To bridge the gap, a new performance evaluation model derived from operation mechanisms of mobile agent platforms is proposed. Details are discussed for the design of companion simulation software, which can provide the system performance such as response time of platform to mobile agent. Further investigation is followed on the determination of model parameters. Finally comparison is made between the model-based simulation results and measurement-based real performance of mobile agent systems. The results show that the proposed model and designed software are effective in evaluating performance characteristics of mobile agent systems. The proposed approach can also be considered as the basis of performance analysis for large systems composed of multiple mobile agent platforms. 展开更多
关键词 Mobile agent technology Performance evaluation System modeling Software simulation
在线阅读 下载PDF
Second—Harmonic and Third—Harmonic Generations in the Thue—Morse Dielectric Superlattice
11
作者 蔡祥宝 《Chinese Physics Letters》 SCIE CAS CSCD 2002年第5期682-684,共3页
原文传递
Research on a didtributed simulation based on unified interface
12
作者 SunZhixin WangRuchua WangShaodi ZhangQin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第4期696-701,共6页
With the scale of simulation system increasing rapidly, the distributed interactive simulation (DIS) faces the problem fo system scalability. One of main factors, which influence the DIS scalability, is that the lacks... With the scale of simulation system increasing rapidly, the distributed interactive simulation (DIS) faces the problem fo system scalability. One of main factors, which influence the DIS scalability, is that the lacks of standard defining interface methods, as the number of the system modules increased. This paper presents a method of defining an unified interface among different models. Then a DIS development platform based on it is established after thorough studies of the reasons that cause the DIS scalability problems. Finally we demonstrate the method by realization of an experiment DIS system in LAN environment. It validates that a practical system development can be carried out rapidly and efectively on this DIS development plaform. The experimental results show that the unified interface has general purpose for the design and implementation of DIS systems. 展开更多
在线阅读 下载PDF
Blind MIMO Channel Estimation Based on Modulation-Induced Two-Cycle Cyclostationarity 被引量:8
13
作者 CAOShi-ke ZHANGLi-jun 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2002年第4期38-46,共9页
In this paper, a novel approach is presented to the multiuser channelidentification . The approach makes use of the modulation-induced Cyclostationarity, capable ofidentifying individual channels of different users. B... In this paper, a novel approach is presented to the multiuser channelidentification . The approach makes use of the modulation-induced Cyclostationarity, capable ofidentifying individual channels of different users. By means of the decomposition of the cyclicspectrum method, the blind estimation of the channel can be achieved . The approach is rathersimple, with considerable advantages over existing techniques, and suitable for the multiuser uplink. The identifiabilily condition and its proof are also concluded in the paper. And finally the.simulation of identification algorithm is given. 展开更多
关键词 MIMO blind channel identification CYCLOSTATIONARITY
原文传递
The Application of WSFL in the Parlay X Based Services Creation 被引量:5
14
作者 SUNLi-juan DUXiao-gang TANGXin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2005年第1期81-85,共5页
Parlay X is a set of simple and easy-understanding Application ProgrammingInterfaces (APIs), which abstract the fundamental functions of the telecommunication networks on thehigher layer than Parlay. Parlay X Web Serv... Parlay X is a set of simple and easy-understanding Application ProgrammingInterfaces (APIs), which abstract the fundamental functions of the telecommunication networks on thehigher layer than Parlay. Parlay X Web Service adopts Web Service technology to open services forIT developers to use in the applications they develop. In this paper, Web Service Flow Language(WSFL) is introduced to describe the services based on Parlay X Web Service, and an applicationinstance is presented. 展开更多
关键词 parlay X API web service XML WSFL
原文传递
An Intrusion Detection System Model Based on Immune Principle and Performance Analysis 被引量:8
15
作者 CHENZhi-xian WANGRu-chuan +1 位作者 WANGShao-di SUNZhi-xin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2005年第1期31-35,共5页
The study of security in computer networks is a key issue, which is a rapidlygrowing area of interest because of its importance. Main network security problems are analyzed inthis paper above all, which currently are ... The study of security in computer networks is a key issue, which is a rapidlygrowing area of interest because of its importance. Main network security problems are analyzed inthis paper above all, which currently are confronted with network systems and existing works inintrusion detection. And then an intrusion detection system model based on Immune Principle (IPIDS)is presented. Meanwhile, it expatiates detailed implementation of the methods how to reduce the highfalse positive and negative alarms of the traditional Intrusion Detection System (IDS). At last asimple simulation is performed on this model just using string match algorithm as binding mechanism.The simulation results indicate that the model can detect malicious activity effectively, andconsequently the security and steadiness of the whole network system are improved also. 展开更多
关键词 human immune system intrusion detection DETECTOR
原文传递
Application and Development of Mobile Agent in AN 被引量:6
16
作者 XULi ZHENGBao-yu 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第1期73-78,共6页
Active Networks represent a significant step in the evolution of packet-switched networks. It aims to move dynamic computation within the network. Mobile agent technology is a novel paradigm for distributed computatio... Active Networks represent a significant step in the evolution of packet-switched networks. It aims to move dynamic computation within the network. Mobile agent technology is a novel paradigm for distributed computation. This paper discusses the applicability of mobile agent technology for the development of active networks, both security policy and resource management, and other expected application as well. Based on the discussion, it describes a general mobile agent based Active Network (AN) architecture at last. 展开更多
关键词 active network mobile agent SECURITY MANAGEMENT ARCHITECTURE
原文传递
A Specially Designed Modulation-Induced Cyclostationarity Scheme for Blind SISO Channel Identification and Equalization 被引量:4
17
作者 CAOShi-ke ZHANGShi-bing ZHANGLi-jun 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第4期100-103,共4页
A special Modulation-Induced Cyclostationarity(MIC)scheme is designed for the identification and equaliza-tion of FIR Single-Input-Single-Output(SISO)channel,with the property that the transmit power is constant and t... A special Modulation-Induced Cyclostationarity(MIC)scheme is designed for the identification and equaliza-tion of FIR Single-Input-Single-Output(SISO)channel,with the property that the transmit power is constant and the re-ceiver needs only one antenna.The cyclic Wiener equalizer is presented based on the estimated channel. 展开更多
关键词 blind channel identification blind equalization CYCLOSTATIONARITY MIC
原文传递
Joint Semi-Blind Channel Estimation and Data Sequence Detection of OFDM Systems 被引量:3
18
作者 QIANXue-rong ZHANGLi-jun 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2002年第4期51-56,63,共7页
In this paper, a joint semi blind channel estimation and data sequence detection of OFDM systems over the multipath frequency selective fading channels is proposed and investigated. The basic idea of the algorithm is... In this paper, a joint semi blind channel estimation and data sequence detection of OFDM systems over the multipath frequency selective fading channels is proposed and investigated. The basic idea of the algorithm is to first use the correlation among adjacent subchannels in the frequency domain to estimate the channel's parameters with an AutoRegressive (AR) process based on the decision directed estimation principle, and then to search the ML solution using the Viterbi algorithm. The algorithm realizes on line channel estimation and data detection of OFDM signals without any periodic pilot signal and statistic information about the channels, so it is suited to high data rate transmission over slow fading channels in the coming generation mobile communication systems. 展开更多
关键词 OFDM channel estimation blind estimation maximum likelihood detection
原文传递
Research on Mixed Encryption Authentication 被引量:5
19
作者 SUNZhi-xin WANGRu-chuan WANGShao-di 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2003年第4期90-94,共5页
With the development of network techniques, the problem of network securityis also arising as we enjoy its open convenience. There are many developed methods to overcome thisproblem. Identity authentication is one of ... With the development of network techniques, the problem of network securityis also arising as we enjoy its open convenience. There are many developed methods to overcome thisproblem. Identity authentication is one of these important measures. The authentication methods oftraditional symmetric cryptogram systems and asymmetric cryptogram systems have both advantages anddefects. This paper brings forward a Mixed Encryption Model for Authentication ( MEMA), which hasobvious advantages compared to the two traditional methods. MEMA model can be used widely in openingnetwork environment such as mobile agent systems, multi-agents security safeguard systems and othersituations in which identity authentication of users are needed. At last, the paper also presentsthe MEMA model's structure and implementation of an experimental system. 展开更多
关键词 network security encryption authentication mixed encryption system
原文传递
Space-Time Coded Beamforming for DS CDMA Downlink 被引量:2
20
作者 WANGShi-lu XUChang-jiang FENGGuang-zeng 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2005年第1期86-90,共5页
In this paper, we analyze the scheme of Space-Time Coded BeamForming (STC-BF)for the downlink of DS-CDMA system over frequency-selective fading channels and give the numericalsimulations on the scheme. The blind multi... In this paper, we analyze the scheme of Space-Time Coded BeamForming (STC-BF)for the downlink of DS-CDMA system over frequency-selective fading channels and give the numericalsimulations on the scheme. The blind multiuser detection is employed at receiver to suppress theMulti-Access Interference (MAI). The Space-Time Coding (STC) and BF are combined to mitigate theperformance degradation due to multipath fading and various interferences. The numerical simulationsshow that the BF can compensate the performance loss of STC due to the channel correlation and thenthe STC-BF can greatly improve the performance of CDMA system. 展开更多
关键词 CDMA space-time coding beam forming multiuser detection transmitdiversity
原文传递
上一页 1 2 3 下一页 到第
使用帮助 返回顶部