首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 66 毫秒
1.
传统的单谱脉冲响应信号畸变检测方法无法对DoS网络攻击信号实现有效检测,提出一种采用幅度和频率对应关系双线性变换的信号检测算法准确检测DoS网络攻击信号。利用格型陷波器线性预测特性,使DoS信号发出有效攻击前产生频谱混迭状态下的预畸变效应,及早发现攻击信号,达到有效准确检测的目的。仿真结果表明,采用该检测算法检测DoS网络攻击信号,检测性能很好,检测概率大幅提高,虚警概率为0,能有效应用到网络安全和信息对抗等领域。  相似文献   

2.
在移动云计算中,通过无线通信方式实现数据调度和传输,移动云计算通信信道具有时变特性,对其有效的信道均衡和相位估计是保证云计算质量的基础。传统的时变通信信道估计算法采用多模盲均衡算法,出现码间干扰和相位失衡。提出一种基于二次调频双稳态检测的移动云计算中的时变通信信道估计算法。首先进行移动云计算的通信信道模型构建,基于协议信道邻居构建的通信功率增益模型,进行信道划分协议设计,设计二次调频双稳态检测算法,采用同步算法减少系统子载波间的正交性抑制,得到移动云计算通信系统信道均衡系统,检测移动云计算信道的时变特征,实现准确估计,通过仿真实验进行性能验证。仿真结果表明,该算法具有较大的信道估计性能,抗干扰能力提高,信息增益提高,在云计算通信中具有较好的稳健性。  相似文献   

3.
对电磁脉冲信号相位特征的准确挖掘和参量估计可以有效准确地确定信号源的方位,实现对识别目标的准确定位。传统的相位特征挖掘算法采用贝叶斯估计算法,算法在受到脉冲干扰时估计性能不好。提出一种基于机器学习的电磁脉冲信号相位特征挖掘算法,实现对相位估计精度的改进提高。首先构建电磁脉冲信号的模型,得到相位特征挖掘模型原始模型,求解相位模糊数搜索结合解得到两个阵列输出数据的相位差。计算电磁脉冲信号参数相位补偿项,采用机器学习算法进行电磁脉冲信号相位特征挖掘,构建调频信号作为估计目标方位角的载波信号,采用最小二乘拟合求斜率最终实现相位特征等相关信息的挖掘。仿真实验表明,该算法能准确估计出电磁脉冲信号辐射源的相位等参数信息,相位特征挖掘性能较好,展示了优越的数据挖掘和目标检测定位性能。  相似文献   

4.
吕慎敏 《科技通报》2015,(4):106-108
异步传输网络间通信信道组成复杂,对异步传输网络间通信信道的频谱的准确估计可以避免不占用多余的频带,能够实现高数据率通信。提出一种基于频域分块和脉冲响应的异步传输网络频谱估计算法。构建异步传输网络通信信道模型为缓慢时变、空变的相干多途信道,采用正交频率复用OFDM训练序列得到确定的起始帧概率分布,采用同步算法能有效减少系统子载波间的正交性抑制,得到系统函数的基本特征传递函数,实现对频域分块频谱估计。仿真结果表明,该算法能有效提高对频谱的估计精度,提高异步传输网络的通信性能,网络异步数据传输的吞吐量大幅提高。  相似文献   

5.
针对传统方法中利用Hilbert变换进行无线网络信道均衡设计时,对网络拓扑结构中跨链路层邻阶边向量通信信道不能消除码间干扰的问题。对传统的基于Hilbert变换的无线网络信道盲均衡算法进行改进,引入经验模态分解技术,结合Hilbert谱分析方法,提出一种改进的Hilbert变换无线网络信道邻阶均衡算法。构建无线网络信道盲均衡系统,采用EMD分解和Hilbert谱分析相结合的方法对信道幅值、时间和频率之间关系进行估计,实现信道邻阶盲均衡。仿真实验表明,采用改进的Hilbert变换无线网络信道邻阶均衡算法进行无线网络通信,收敛速度较快,能有效消除跨链路层邻阶边向量码间干扰,稳态均方误差大幅降低。  相似文献   

6.
结合Hough变换的类似形状特征,提出一种考虑类似形状匹配的改进的WVD网络隐性攻击信号检测算法WVD-Hough检测算法,算法实质上基于类形状匹配的检测技术,把图像空间中的直线检测问题转换为参数点的检测问题,实现在参数空间中的检测任务。对两类典型的隐性网络攻击信号进行滤波提纯分析和检测实验,仿真实验表明,新的WVD-Hough网络攻击信号检测方法能有效提纯待检测信号,滤波效果良好,得到谱分析中间脊线清晰,信号成分时频聚集性很高,能有效去除合法信号的干扰,挖掘出隐性攻击信号。  相似文献   

7.
根据无线传感网络中簇头点生成过程中的多径能量特性,提出一种基于自适应均衡抵消的相位检波能量检测算法。建立无线传感器网络信号与信道系统模型,设计无线传感器网络信道自适应均衡算法,采用横行型自适应FIR滤波器进行自适应降噪滤波处理。使用相位检波方法对UWB无线传感器网络通信信道进行能量检测和优化设计。实验结果表明通过自适应相位检波能量检测方法,能最大程度上削弱无线传感网络信道慢衰落影响,降低网络功耗,提高能量检测性能和信道传输效率,实现了无线传感器网络信道优化设计。  相似文献   

8.
为便于硬件实现,选择了一种块状结构的Block-LDPC码。编码算法采用与Block-LDPC码结构相对应的基于近似下三角矩阵的编码算法,这种算法无须改变矩阵结构,便可实现编码。高速移动下的信道模型是一类频率选择性信道现有的信道仿真模型,为便于硬件仿真采用频率选择性确定性信道模型中的多径瑞利衰落信道仿真模型。实验证明了该模型基本符合当前仿真需求。译码算法采用UMP BP_Based算法,不需要信道估计、复杂度较低,特别适合硬件实现。采用上述算法并通过Matlab编程实现了整个编译码平台的搭建。  相似文献   

9.
针对经典CS信道估计算法在低信噪比情况下对信道状态信息估计不够精准的问题,结合基于透镜的毫米波大规模MIMO可以显著减少所需RF链的数量。本文考虑了3D波束空间信道模型并提出了一种基于自适应支持检测信道估计方案。该方案的基本思想是将3D波束空间信道估计问题分解成几个子问题,每个子问题只处理稀疏信道分量。对于每个信道分量,利用3D波束空间信道的水平和垂直稀疏度,先以高精度自适应地检测其支持,然后消除这个信道分量的干扰影响,作为检测下一个子信道分量的支持。在所有信道分量支持检测之后,可以用LS低导频开销估计波束空间信道的非零元素。仿真结果验证了所提出的方案即使在低SNR情况下也比经典OMP算法和CoSaMP算法获得更优的系统性能。  相似文献   

10.
尚建贞  张咪 《科技通报》2015,(4):118-120
对网络攻击信号的线性调频建模和虚警门限预估计,是实现网络攻击信号检测的基础。传统方法采用路由数据交换的阵列信号聚类方法进行信号建模和虚警门限估计,由于攻击信号具有多波束自相似特征,导致虚警门限的预测精度不高。提出一种基于污点数据双模聚类的攻击调频信号虚警预估计算法,采用频率调制规律设计网络攻击信号模型,对攻击信号进行双线性核相位加权,得到脉冲压缩后的攻击信号二次调频信号输出。在双模聚类的时频平面内实现对信号检测能量的聚集,以改善信号分量聚集的尖峰,实现了对攻击调频信号的时间点与频率点的重组排列和特征分布估计,达到对虚警门限准确估计的目的。实验结果表明,该算法能有效估计攻击调频信号的虚警门限,对网络攻击信号的虚警门限的预估计精度达到98.5%,提高了对攻击信号的参数估计和信号检测能力,提高检测概率,优越性明显。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

13.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

14.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

15.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

16.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

17.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号