期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
Anti-Spoofing:Integrated Information Authentication of BeiDou-ⅡCivil Navigation Message
1
作者 Wu Zhijun Liang Cheng +2 位作者 Zhang Yun Liu Rusen Yue Meng 《China Communications》 SCIE CSCD 2024年第9期242-261,共20页
The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can le... The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication. 展开更多
关键词 anti-spoofing AUTHENTICATION BeiDou-II civil navigation message(BDII-CNAV) SIGNATURE spoofing attack
在线阅读 下载PDF
Analysis and Optimization on Factors Affecting Forming Quality of Half Axle Gears Warm Precision Forging 被引量:2
2
作者 WANG Menghan CHEN Xihou ZHOU Jie 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2010年第1期110-114,共5页
Half axle gears is produced by precision forging popularly because of the advantages in minimum machining allowances, lower material consumption and good service properties. But the forming quality of precision forgin... Half axle gears is produced by precision forging popularly because of the advantages in minimum machining allowances, lower material consumption and good service properties. But the forming quality of precision forging is difficult to control. Many simulations and analysis of precision forging process were taken by previous researchers. But no concrete method is proposed to evaluate and optimize the forming quality of half axel gears. The primary purpose of this work is improving the forming quality of half axel gears by analyzing and optimizing the affected factors of forming quality. The enclosed-die warm forging process of half axle gears was developed, and a new type of die-set used on double action hydraulic press was brought forward. The main influential factors of precision forming quality were analyzed after the forming process had been simulated by using finite element method(FEM). These factors include die structure, web thickness and web position. A method used to evaluate the forming quality was established, which investigated the maximal forming load, the metal filling rate and the material damage factor. The FEM simulations of half axle gears precision forging were evaluated by this method. The results show that the best forming quality can be achieved when the punches were added with bosses, the web located at the middle plant of the gear, and the web thickness was 30 percent of the inner hole diameter. Verification experiments taking the above optimized parameters were performed on a 7.8 MN double action hydraulic press. The trial products were formed well. And their geometric precision meets the demand. The verification result shows that the optimization of the influential factors, according to the simulations and the evaluation method, can improve the forming quality. The new structure of precision forging die-set and the new evaluation method guarantee a high forming quality ofhalfaxel gears. 展开更多
关键词 warm precision forging half axle gears forming quality die structure WEB
在线阅读 下载PDF
NEW DEMODULATION TECHNOLOGY OF OPTIMIZING ENERGY OPERATOR AND APPLICATION TO GEAR FAULT DIAGNOSIS 被引量:2
3
作者 Zhang Chaohui Zhu Ge +2 位作者 Peng Donglin Zhang Xinghong Wang Xianquan 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2005年第4期627-630,共4页
Although many methods have been applied to diagnose the gear thult currently, the sensitivity of them is not very good. In order to make the diagnosis methods have more excellent integrated ability in such aspects as ... Although many methods have been applied to diagnose the gear thult currently, the sensitivity of them is not very good. In order to make the diagnosis methods have more excellent integrated ability in such aspects as precision, sensitivity, reliability and compact algorithm, and so on, and enlightened by the energy operator separation algorithm (EOSA), a new demodulation method which is optimizing energy operator separation algorithm (OEOSA) is presented. In the algorithm, the non-linear differential operator is utilized to its differential equation: Choosing the unit impulse response length of filter and fixing the weighting coefficient for inportant points. The method has been applied in diagnosing tooth broden and fatiguing crack of gear faults successfully. It provides demodulation analysis of machine signal with a new approach. 展开更多
关键词 Energy operator Optimizing arithmetic Gear Fault diagnosis
在线阅读 下载PDF
A Hybrid Intrusion Detection Method Based on Convolutional Neural Network and AdaBoost 被引量:1
4
作者 Wu Zhijun Li Yuqi Yue Meng 《China Communications》 SCIE CSCD 2024年第11期180-189,共10页
To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection... To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection method.Hence,we proposed an intrusion detection algorithm based on convolutional neural network(CNN)and AdaBoost algorithm.This algorithm uses CNN to extract the characteristics of network traffic data,which is particularly suitable for the analysis of continuous and classified attack data.The AdaBoost algorithm is used to classify network attack data that improved the detection effect of unbalanced data classification.We adopt the UNSW-NB15 dataset to test of this algorithm in the PyCharm environment.The results show that the detection rate of algorithm is99.27%and the false positive rate is lower than 0.98%.Comparative analysis shows that this algorithm has advantages over existing methods in terms of detection rate and false positive rate for small proportion of attack data. 展开更多
关键词 ADABOOST CNN detection rate false positive rate feature extraction intrusion detection
在线阅读 下载PDF
Detection of Turbulence Anomalies Using a Symbolic Classifier Algorithm in Airborne Quick Access Record(QAR)Data Analysis 被引量:1
5
作者 Zibo ZHUANG Kunyun LIN +1 位作者 Hongying ZHANG Pak-Wai CHAN 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第7期1438-1449,共12页
As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ... As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards. 展开更多
关键词 turbulence detection symbolic classifier quick access recorder data
在线阅读 下载PDF
Radar-Based Multi-Target Localization and Vital Sign Monitoring
6
作者 Yuping Shi Qinwei Li +1 位作者 Hang Wu Ming Yu 《Journal of Computer and Communications》 2024年第11期263-278,共16页
The frequency-modulated continuous wave (FMCW) radar, known for its high range resolution, has garnered significant attention in the field of non-contact vital sign monitoring. However, accurately locating multiple ta... The frequency-modulated continuous wave (FMCW) radar, known for its high range resolution, has garnered significant attention in the field of non-contact vital sign monitoring. However, accurately locating multiple targets and separating their vital sign signals remains a challenging research topic. This paper proposes a scene-differentiated method for multi-target localization and vital sign monitoring. The approach identifies the relative positions of multiple targets using Range FFT and determines the directions of targets via the multiple signal classification (MUSIC) algorithm. Phase signals within the range bins corresponding to the targets are separated using bandpass filtering. If multiple targets reside in the same range bin, the variational mode decomposition (VMD) algorithm is employed to decompose their breathing or heartbeat signals. Experimental results demonstrate that the proposed method accurately localizes targets. When multiple targets occupy the same range bin, the mean absolute error (MAE) for respiratory signals is 3 bpm, and the MAE for heartbeat signals is 5 bpm. 展开更多
关键词 Frequency-Modulated Continuous Wave (FMCW) Radar MULTI-TARGET Multiple Signal Classification (MUSIC) Variational Mode Decomposition (VMD)
在线阅读 下载PDF
Stability Analysis of PI TCP/AQM Networks: A Parameter Space Approach 被引量:3
7
作者 WANG De-Jin 《自动化学报》 EI CSCD 北大核心 2007年第7期756-760,共5页
这个工作集中于导出传播控制的必要、足够的稳定性条件协议(TCP ) 网络与一比例积分(PI ) 经由一条参数空格途径的活跃队列管理(AQM ) 计划。首先,液体流动 TCP s 非线性的模型被变换成中立类型的一个线性时间延期系统。第二,靠近环... 这个工作集中于导出传播控制的必要、足够的稳定性条件协议(TCP ) 网络与一比例积分(PI ) 经由一条参数空格途径的活跃队列管理(AQM ) 计划。首先,液体流动 TCP s 非线性的模型被变换成中立类型的一个线性时间延期系统。第二,靠近环的系统的稳定性以网络的家被描绘并且控制器 s 参数。由模拟研究,我们在参数空格调查这些二种参数的边界 s 关系并且说明 PI 控制器 s 参数怎么影响稳定性。最后,不同稳定性条件与表演相比我们的 necessary-condition-based 和 sufficient-condition-based 方法的更少保守主义,和由 Matlab 和 NS-2 的模拟实验被进行证明我们的主张。 展开更多
关键词 稳定性 拥塞控制 传输控制协议 PI控制 空间参数 对列管理
在线阅读 下载PDF
High-PSRR High-Order Curvature-Compensated CMOS Bandgap Voltage Reference 被引量:3
8
作者 Qianneng Zhou Yunsong Li +3 位作者 Jinzhao Lin Hongjuan Li Yu Pang Wei Luo 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2015年第5期116-124,共9页
A high-PSRR high-order curvature-compensated CMOS bandgap voltage reference( BGR),which has the performances of high power supply rejection ratio( PSRR) and low temperature coefficient,is designed in SMIC 0. 18 μm CM... A high-PSRR high-order curvature-compensated CMOS bandgap voltage reference( BGR),which has the performances of high power supply rejection ratio( PSRR) and low temperature coefficient,is designed in SMIC 0. 18 μm CMOS process. Compared to the conventional curvature-compensated BGR which adopted a piecewise-linear current,the temperature characterize of the proposed BGR is effectively improved by adopting two kinds of current including a piecewise-linear current and a current proportional 1. 5 party to the absolute temperature T. By adopting a low dropout( LDO) regulator whose output voltage is the operating supply voltage of the proposed BGR core circuit instead of power supply voltage VDD,the proposed BGR with LDO regulator achieves a well PSRR performance than the BGR without LDO regulator. Simulation results show that the proposed BGR with LDO regulator achieves a temperature coefficient of 2. 1 × 10-6/ ℃ with a 1. 8 V power supply voltage and a line regulation of 4. 9 μV / V at 27 ℃. The proposed BGR with LDO regulator at 10 Hz,100 Hz,1 k Hz,10 k Hz and 100 k Hz have the PSRR of- 106. 388,- 106. 388,- 106. 38,- 105. 93 and-88. 67 d B respectively. 展开更多
关键词 bandgap voltage reference low DROPOUT REGULATOR temperature coefficient power supply REJECTION ratio
在线阅读 下载PDF
Application of local polynomial estimation in suppressing strong chaotic noise 被引量:3
9
作者 Su Li-Yun Ma Yan-Ju Li Jiao-Jun 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第2期181-186,共6页
In this paper, we propose a new method that combines chaotic series phase space reconstruction and local polynomial estimation to solve the problem of suppressing strong chaotic noise. First, chaotic noise time series... In this paper, we propose a new method that combines chaotic series phase space reconstruction and local polynomial estimation to solve the problem of suppressing strong chaotic noise. First, chaotic noise time series are reconstructed to obtain multivariate time series according to Takens delay embedding theorem. Then the chaotic noise is estimated accurately using local polynomial estimation method. After chaotic noise is separated from observation signal, we can get the estimation of the useful signal. This local polynomial estimation method can combine the advantages of local and global law. Finally, it makes the estimation more exactly and we can calculate the formula of mean square error theoretically. The simulation results show that the method is effective for the suppression of strong chaotic noise when the signal to interference ratio is low. 展开更多
关键词 strong chaotic noise local polynomial estimation weak signal detection
在线阅读 下载PDF
Pulse-Pair Interference Automatic Detection and Mitigation for L-Band Aeronautical Communication System
10
作者 Douzhe Li Zhijun Wu 《Transactions of Tianjin University》 EI CAS 2017年第6期591-600,共10页
Pulse-pairs (PP) generated by distance measuring equipment (DME) cause severe interference to the L-band digital aeronautical communication systems. Unlike previous works that mainly improved receiver structure for mi... Pulse-pairs (PP) generated by distance measuring equipment (DME) cause severe interference to the L-band digital aeronautical communication systems. Unlike previous works that mainly improved receiver structure for mitigating the DME interference, this paper proposes a novel and practical time domain PP mitigation method without changing the existing receiver structure. Our method is composed of three parts and utilizes a specific property, i.e., a relatively fixed waveform of DME PP. First, the complex-valued waveform of PP is automatically detected through an iterative weighted average method. Then, on the basis of the detected PP waveform, each PP is reconstructed according to its amplitude, position, and initial phase, which are estimated through a sparse representation algorithm. Finally, the reconstructed PPs are subtracted from the contaminated signal. Numerical experiments show that compared with recently published methods the bit error rate obtained by our method is approximately 5 dB better, while the complexity is maintained at the same level. © 2017 Tianjin University and Springer-Verlag GmbH Germany 展开更多
关键词 Bit error rate Iterative methods Numerical methods Orthogonal frequency division multiplexing Statistical methods
在线阅读 下载PDF
BDSec:Security Authentication Protocol for BeiDou-Ⅱ Civil Navigation Message
11
作者 Wu Zhijun Zhang Yuan +2 位作者 Yang Yiming Wang Peng Yue Meng 《China Communications》 SCIE CSCD 2024年第6期206-218,共13页
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s... Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV. 展开更多
关键词 BDII civil navigation messages(BDIICNAV) BeiDou navigation satellite system(BDS) identity-based cryptography mechanism navigation message authentication protocol(BDSec)
在线阅读 下载PDF
Non-Invasive Cerebral Hemorrhage Size Determination by Microwave Signal Based on RSSD
12
作者 Dequan Ding Qinwei Li +2 位作者 Jingyao Liu Ming Yu Hang Wu 《Journal of Computer and Communications》 2024年第11期224-240,共17页
Aiming at the prediction of the size of human cerebral hemorrhage point, a signal processing method based on Resonance Sparse Decomposition (RSSD) algorithm is proposed to decompose and analyze the microwave echo sign... Aiming at the prediction of the size of human cerebral hemorrhage point, a signal processing method based on Resonance Sparse Decomposition (RSSD) algorithm is proposed to decompose and analyze the microwave echo signal. According to the organizational structure of the human brain, a complete human brain model was established, and bleeding points of different sizes were placed at the same position, and 5 antennas were placed around the model (front, back, left, right, and top). RSSD is performed on the obtained echo signal, and Hilbert envelope analysis is performed on the low resonance component obtained by the decomposition, and then the size of the bleeding point is judged. Using CST and MATLAB to conduct simulation analysis and experiments, it is verified that the proposed method can successfully determine the size of the bleeding point, and the effectiveness and feasibility of the method are proved. 展开更多
关键词 Human Brain Bleeding Point MICROWAVE Resonance Sparse Decomposition
在线阅读 下载PDF
A Novel Fuzzy Direct Torque Control System for Three-level Inverter-fed Induction Machine 被引量:2
13
作者 Shu-Xi Liu Ming-Yu Wang +1 位作者 Yu-Guang Chert Shan Li 《International Journal of Automation and computing》 EI 2010年第1期78-85,共8页
Diode clamped multi-level inverter (DCMLI) has a wide application prospect in high-voltage and adjustable speed drive systems due to its low stress on switching devices, low harmonic output, and simple structure. Ho... Diode clamped multi-level inverter (DCMLI) has a wide application prospect in high-voltage and adjustable speed drive systems due to its low stress on switching devices, low harmonic output, and simple structure. However, the problem of complexity of selecting vectors and capacitor voltage unbalance needs to be solved when the algorithm of direct torque control (DTC) is implemented on DCMLI. In this paper, a fuzzy DTC system of an induction machine fed by a three-level neutral-point-clamped (NPC) inverter is proposed. After introducing fuzzy logic, optimal selecting switching state is realized by applying various strategies which can distinguish the grade of the errors of stator flux linkage, torque, the neutral-point potential, and the position of stator flux linkage. Consequently, the neutral-point potential unbalance, the dr/dr of output voltage and the switching loss are restrained effectively, and desirable dynamic and steady-state performances of induction machines can be obtained for the DTC scheme. A design method of the fuzzy controller is introduced in detail, and the relevant simulation and experimental results have verified the feasibility of the proposed control algorithm. 展开更多
关键词 Multi-level inverter direct torque control (DTC) fuzzy controller space voltage vector induction machine
在线阅读 下载PDF
A Novel Airborne 3D Laser Point Cloud Hole Repair Algorithm Considering Topographic Features 被引量:5
14
作者 Zan ZHU Shu GAN +1 位作者 Jianqi WANG Nijia QIAN 《Journal of Geodesy and Geoinformation Science》 2020年第3期29-38,共10页
Hole repair processing is an important part of point cloud data processing in airborne 3-dimensional(3D)laser scanning technology.Due to the fragmentation and irregularity of the surface morphology,when applying the 3... Hole repair processing is an important part of point cloud data processing in airborne 3-dimensional(3D)laser scanning technology.Due to the fragmentation and irregularity of the surface morphology,when applying the 3D laser scanning technology to mountain mapping,the conventional mathematical cloud-based point cloud hole repair method is not ideal in practical applications.In order to solve this problem,we propose to repair the valley and ridge line first,and then repair the point cloud hole.The main technical steps of the method include the following points:First,the valley and ridge feature lines are extracted by the GIS slope analysis method;Then,the valley and ridge line missing from the hole are repaired by the mathematical interpolation method,and the repaired results are edited and inserted to the original point cloud;Finally,the traditional repair method is used to repair the point cloud hole whose valley line and ridge line have been repaired.Three experiments were designed and implemented in the east bank of the Xiaobaini River to test the performance of the proposed method.The results showed that compared with the direct point cloud hole repair method in Geomagic Studio software,the average repair accuracy of the proposed method,in the 16 m buffer zone of valley line and ridge line,is increased from 56.31 cm to 31.49 cm.The repair performance is significantly improved. 展开更多
关键词 airborne 3D laser scanning point cloud hole repair topographic feature line extraction mountain mapping
在线阅读 下载PDF
Novel high PSRR high-order temperature-compensated subthreshold MOS bandgap reference 被引量:3
15
作者 Zhou Qianneng Zhu Ling +3 位作者 Li Hongjuan Lin Jinzhao Wang Liangcai Luo Wei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2017年第6期74-82,共9页
Novel high power supply rejection ratio (PSRR) high-order temperature-compensated subthreshold metal-oxidesemiconductor (MOS) bandgap reference (BGR) is proposed in Semiconductor Manufacturing International Corp... Novel high power supply rejection ratio (PSRR) high-order temperature-compensated subthreshold metal-oxidesemiconductor (MOS) bandgap reference (BGR) is proposed in Semiconductor Manufacturing International Corporation (SMIC) 0.13 gm complementary MOS (CMOS) process. By adopting subthreshold MOS field-effect transistors (MOSFETs) and the piecewise-curvature temperature-compensated technique, the output reference voltage's temperature performance of the subthreshold MOS BGR is effectively improved. The subthreshold MOS BGR achieves high PSRR performance by adopting the technique of pre-regulator. Simulation results show that the temperature coefficient (TC) of the subthreshold MOS BGR is 1.38× 10^-6/℃ when temperature is changed from -40 ℃ to 125 ℃ with a power supply voltage of 1.2 V. The subthreshold MOS BGR achieves the PSRR of - 104.54 dB, - 104.54 dB,- 104.5 dB, - 101.82 dB and - 79.92 dB at 10 Hz, 100 Hz, 1 kHz, 10 kHz and 100 kHz respectively. 展开更多
关键词 subthreshold MOS bandgap reference pre-regulator temperature coefficient power supply rejection ratio
原文传递
A graphical tuning of PI~λ controllers for fractional-delay systems 被引量:2
16
作者 Dejin WANG Jianghui ZHANG 《控制理论与应用(英文版)》 EI 2011年第4期599-603,共5页
This article provides a graphical parameter tuning method of PI^λ controllers for fractional-order time-delay systems. First, the complete stabilizing region of PI^λ controller in proportional-integral plane, for a ... This article provides a graphical parameter tuning method of PI^λ controllers for fractional-order time-delay systems. First, the complete stabilizing region of PI^λ controller in proportional-integral plane, for a fixed A, is determined in terms of a graphical stability criterion applicable to fractional-delay systems. Then, the stabilizing region is maximized analytically with respect to parameter ), to expect the most various behaviors of the closed-loop systems. Finally, by defining appropriate functions relative to the requirements of gain and phase margins, the curves in the maximized stabilizing region satisfying the pre-specified gain and phase margins are drawn, which releases a flexible parameter tuning procedure. Numerical examples are given to illustrate the design steps. 展开更多
关键词 Fractional order systems PI^λ controllers Time-delay systems Graphical stability criterion
原文传递
Novel high-PSRR high-order curvature-compensated bandgap voltage reference 被引量:1
17
作者 Zhou Qianneng Yan Kai +3 位作者 Lin Jinzhao Pang Yu Li Guoquan Luo Wei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2016年第2期66-72,96,共8页
This paper proposes a novel high-power supply rejection ratio(high-PSRR) high-order curvature-compensated CMOS bandgap voltage reference(BGR) in SMIC 0.18 μm CMOS process. Three kinds of current are added to a co... This paper proposes a novel high-power supply rejection ratio(high-PSRR) high-order curvature-compensated CMOS bandgap voltage reference(BGR) in SMIC 0.18 μm CMOS process. Three kinds of current are added to a conventional BGR in order to improve the temperature drift within wider temperature range, which include a piecewise-curvaturecorrected current in high temperature range, a piecewise-curvature-corrected current in low temperature range and a proportional-to-absolute-temperature T^(1.5) current. The high-PSRR characteristic of the proposed BGR is achieved by adopting the technique of pre-regulator. Simulation results shows that the temperature coefficient of the proposed BGR with pre-regulator is 8.42x10^(-6)′ /℃ from - 55 ℃ to 125 ℃ with a 1.8 V power supply voltage. The proposed BGR with pre-regulator achieves PSRR of - 123.51 dB, - 123.52 dB, - 88.5 dB and - 50.23 dB at 1 Hz, 100 Hz, 100 kHz and 1 MHz respectively. 展开更多
关键词 bandgap voltage reference pre-regulator temperature coefficient power supply rejection ratio
原文传递
LDDoS attack detection method based on wavelet decomposition and sliding windows
18
作者 Liu Liang Feng Wenzhi +1 位作者 Wu Zhijun Yue Meng 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2020年第1期51-61,共11页
As a special type of distributed denial of service(DDoS) attacks, the low-rate DDoS(LDDoS) attacks have characteristics of low average rate and strong concealment, thus, it is hard to detect such attacks by traditiona... As a special type of distributed denial of service(DDoS) attacks, the low-rate DDoS(LDDoS) attacks have characteristics of low average rate and strong concealment, thus, it is hard to detect such attacks by traditional approaches. Through signal analysis, a new identification approach based on wavelet decomposition and sliding detecting window is proposed. Wavelet decomposition extracted from the traffic are used for multifractal analysis of traffic over different time scale. The sliding window from flow control technology is designed to identify the normal and abnormal traffic in real-time. Experiment results show that the proposed approach has advantages on detection accuracy and timeliness. 展开更多
关键词 low-rate distributed DENIAL of SERVICE ATTACKS WAVELET analysis SLIDING windows detection
原文传递
Manifold Constrained Transfer of Facial Geometric Knowledge for 3D Caricature Reconstruction
19
作者 刘军发 何文静 +1 位作者 陈涛 陈益强 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第3期479-489,共11页
3D caricatures are important attractive elements of the interface in virtual environment such as online game. However, very limited 3D caricatures exist in the real world. Meanwhile, creating 3D caricatures manually i... 3D caricatures are important attractive elements of the interface in virtual environment such as online game. However, very limited 3D caricatures exist in the real world. Meanwhile, creating 3D caricatures manually is rather costly, and even professional skills are needed. This paper proposes a novel and effective manifold transfer algorithm to reconstruct 3D caricatures according to their original 2D caricatures. We first manually create a small dataset with only 100 3D caricature models and use them to initialize the whole 3D dataset. After that, manifold transfer algorithm is carried out to refine the dataset. The algorithm comprises of two steps. The first is to perform manifold alignment between 2D and 3D caricatures to get a "standard" manifold map; the second is to reconstruct all the 3D caricatures based on the manifold map. The proposed approach utilizes and transfers knowledge of 2D caricatures to the target 3D caricatures well. Comparative experiments show that the approach reconstructs 3D caricatures more effectively and the results conform more to the styles of the original 2D caricatures than the Principal Components Analysis (PCA) based method. 展开更多
关键词 3D reconstruction caricature machine learning manifold transfer
原文传递
Access control scheme with attribute revocation for SWIM 被引量:1
20
作者 Wu Zhijun Cui Zihan +1 位作者 Wang Caiyun Lei Jin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2017年第6期49-54,共6页
Access control scheme is proposed for System Wide Information Management (SWIM) to address the problem of attribute revocation in practical applications. Based on the attribute based encryption (ABE), this scheme ... Access control scheme is proposed for System Wide Information Management (SWIM) to address the problem of attribute revocation in practical applications. Based on the attribute based encryption (ABE), this scheme introduces the proxy re-encryption mechanism and key encrypting key (KEK) tree to realize fine-grained access control with attribute revocation. This paper defines the attributes according to the status quo of civil aviation. Compared with some other schemes proposed before, this scheme not only shortens the length of ciphertext (CT) and private key but also improves the efficiency of encryption and decryption. The scheme can resist collusion attacks and ensure the security of data in SWIM. 展开更多
关键词 SWIM access control proxy re-encryption attribute revocation
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部