ZHANG Sen-qiang, ZHANG Quan, TANG Chao-jing
2003, 1(2).
Abstract:The influence of organized network attack is analyzed by mathematical means. Firstly, the definitions of attacker, attack target, attack behavior and attack result are introduced. Then, based on three assumptions, models of individual attack results and o
2003, 1(2).
Abstract:The arithmetic rationale of ANSI X9.62 Elliptic Curve Digital Signature Algorithm (ECDSA) is presented and its security is discussed preliminary. Through its program implementation and relative analysis it can be found that this program realizes the basic
2003, 1(2).
Abstract:s: On the platform of Lotus Domino/Notes, combining with field object of form and Workflow Architect , the joint sign of document transfer is implemented. The test proves that this joint sign is flexible and its implementation method can apply to other of
2003, 1(2).
Abstract:Based on the comprehensive analysis of junk mail and defense techniques, an active defense way with which multi email addresses are classified for different people or group is proposed because of the passive defense and insufficient ability of traditional
RU Guo-bao, YANG Rui, ZHANG Yong-qing, XIA Shuang-kui, SUN Hong
2003, 1(2).
Abstract:An improved digital watermarking algorithm in DCT domain is put forward. It utilizes the visual masking in DCT domain to embed pseudo-randomly coded watermarks in different image parts with different intensity, which enhances the robustness of watermarkin
XIONG Jing-hua, YANG Zhan-ping
2003, 1(2).
Abstract:The concept of Unique Signal is introduced concisely. Its necessary characteristics are presented and demonstrated. Based on these, a coding method of UQS is proposed and verified with an instance.
2003, 1(2).
Abstract:A variable selection method based on PLS Component is proposed for multiple linear regression model. The two dominating components of the multivariate system are extracted according to the partial least-square regression principle, then the variable which
2003, 1(2).
Abstract:Aiming at the digital implementation of the synchronous receiver of digital signal transmission, a new carrier synchronization algorithm, namely a carrier recovery algorithm with phase processing is proposed. It directly processes the phase angle of the r
LIU Jian-xin, LIN Hua, CHEN Hui-lian, XIANG Jing-cheng
2003, 1(2).
Abstract:A kind of waveform based on inter-pulse bi-phase-coded pulse radar signal are presented. A general inter-pulse bi-phase-coded Range-Doppler signal processing model and its equivalent are provided through signal analysis. Simulation results of the equivale
2003, 1(2).
Abstract:利用法向模螺旋的基本原理,推导出获得圆极化法向模螺旋应满足的条件,并对多臂法向模螺旋的波束调控进行了理论分析,获得了从法向到轴向方向之间任意辐射波束的多臂法向模螺旋的设计方法,利用此方法设计了波束倾斜15о的四臂螺旋天线,实测结果达到设计要求。
ZHANG Song, WANG Zheng-yong, WU Xiao-hong, QING Lin-bo, HE Xiao-hai
2003, 1(2).
Abstract:Instead of traditional power control system which is unreliable, a soft-switch power control system based on DSP(TMS320VC5402) is designed and realized using digital control method. Experiments show that the system can satisfy the requirements of reliabil
2003, 1(2).
Abstract:A virtual test system of power supply based on LabVIEW and DAQ-2010 data acquisition card is introduced in this paper as well as its structure, design of software and characteristics of its functions.
CHENG Yun, DU Xing-shao, SHEN Xu-ming, LIU Jie
2003, 1(2).
Abstract:The far infrared FEL requires a microwave source with extremely high pulse amplitude stability. So a resistance-capacity oscillation De-Qing circuit is chosen as the control circuit to stabilize the regulation amplitude of high-voltage pulses of microwave
YANG Yun-bin, WANG Shou-qian, ZHANG Jian-wei
2003, 1(2).
Abstract:A brief introduction of the Air Space Management and Evaluation System is given. The design of this system is illustrated and analyzed ,including its functional modules and software structure. On the basis of the middleware technology, the implementation
2003, 1(2).
Abstract:The architecture of information dissemination methods can be divided into two parts: Information Exchangeable Architecture and Information Broadcasting Architecture. The Active Information Services (AIS) is becoming a potent way for information disseminat
2003, 1(2).
Abstract:New developments of Turbo decoding algorithm and the latest applications of Turbo code technology in recent two years are introduced.
2003, 1(2).
Abstract:Based on the analysis of the advantages of the Over-the-Horizon Radar(OTHR) in dealing with stealth target, low and very low-lever target, anti-radiation missile and electronic jamming, the OTHRs unique application in the modern air-defense system and its
Mobile website