Resource Type

Journal Article 41

Year

2023 5

2022 4

2021 10

2020 6

2019 1

2018 3

2017 2

2016 2

2013 2

2006 1

2005 2

2001 1

2000 1

open ︾

Keywords

6G 2

Blockchain 2

Internet of Things 2

Physical layer security 2

Air-to-ground channel 1

Anonymity 1

Artificial noise 1

BPSK 1

Big Data 1

Chaotic systems 1

Communications 1

Conjugate mixing 1

Controller placement 1

Cooperative NOMA 1

Cooperative beamforming 1

Copyright protection 1

Correlated channels 1

Cyber-physical production systems 1

Data analytics 1

open ︾

Search scope:

排序: Display mode:

Synchronization of two different chaotic systems using Legendre polynomials with applications in securecommunications None

Saeed KHORASHADIZADEH, Mohammad-Hassan MAJIDI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 9,   Pages 1180-1190 doi: 10.1631/FITEE.1601814

Abstract: In secure communication systems, observer-based synchronization is required since only one state variableThe problem of secure communications is explained and the controller performance in secure communications

Keywords: Observer-based synchronization     Chaotic systems     Legendre polynomials     Secure communications    

Correlated channelmodel-based securecommunications in dual-hopwireless communication networks Article

Zhen-hua YUAN, Chen CHEN, Xiang CHENG, Guo-cheng LV, Liu-qing YANG, Ye JIN

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 6,   Pages 796-807 doi: 10.1631/FITEE.1700023

Abstract: This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropperIn this network, a single-antenna source-destination pair transmits secure information with the help

Keywords: Physical layer security     Relay beamforming     Correlated channels     Ergodic secrecy rate    

Managing obsolescence of embedded hardware and software in secure and trusted systems

Zachary A. COLLIER, James H. LAMBERT

Frontiers of Engineering Management 2020, Volume 7, Issue 2,   Pages 172-181 doi: 10.1007/s42524-019-0032-5

Abstract: Obsolescence of integrated systems which contain hardware and software is a problem that affects multiple industries and can occur for many reasons, including technological, economic, organizational, and social factors. It is especially acute in products and systems that have long life cycles, where a high rate of technological innovation of the subcomponents result in a mismatch in life cycles between the components and the systems. While several approaches for obsolescence forecasting exist, they often require data that may not be available. This paper describes an approach using non-probabilistic scenarios coupled with decision analysis to investigate how particular scenarios influence priority setting for products and systems. Scenarios are generated from a list of emergent and future conditions related to obsolescence. The key result is an identification of the most and least disruptive scenarios to the decision maker’s priorities. An example is presented related to the selection of technologies for energy islanding, which demonstrates the methodology using six obsolescence scenarios. The paper should be of broad interest to scholars and practitioners engaged with enterprise risk management and similar challenges of large-scale systems.

Keywords: enterprise risk management     diminishing manufacturing sources and material shortages     scenario-based preferences     systems engineering     deep uncertainty     product life cycle    

Distinct mononuclear diploid cardiac subpopulation with minimal cell–cell communications persists in

Frontiers of Medicine   Pages 939-956 doi: 10.1007/s11684-023-0987-9

Abstract: paths were identified: two switching to cardiomyocytes (CM) maturation with close CM–fibroblast (FB) communicationsand one maintaining MNDCM status with least CM–FB communications.having interactions with macrophages and non-proliferative MNDCMs (non-pMNDCMs) with minimal cell–cell communicationsIn conclusion, a novel non-pMNDCM subpopulation with minimal cell–cell communications was unveiled, highlighting

Keywords: mononuclear diploid cardiomyocytes     cell–cell communication     cardiac fibroblast     single-cell RNA sequencing     cardiac regeneration    

From Terahertz Imaging to Terahertz Wireless Communications Review

Yi Huang,Yaochun Shen,Jiayou Wang

Engineering 2023, Volume 22, Issue 3,   Pages 106-124 doi: 10.1016/j.eng.2022.06.023

Abstract: With the roll-out of 5G mobile networks, research into 6G wireless communications is heating up.It is envisioned that THz technology will be used for 6G and future wireless communications.In this paper, we review how THz technology has been employed for imaging and wireless communicationsThe possibility of integrating THz imaging/sensing and wireless communications is considered, and challengesIt is shown that THz technology is indeed a key enabling technology for both imaging and wireless communications

Keywords: Communications     Imaging     Terahertz technology     Wireless communications    

A Security Middleware for Web Applications Based on JavaBeans and Secure Cookie

Cai Zhun,Kong Fanyu,Li Daxing

Strategic Study of CAE 2005, Volume 7, Issue 3,   Pages 74-77

Abstract:

This paper discusses the secure operations in the web applications, and designs a framework of middlewareThe paper implements the security middleware based on the “JavaBeans” and “Secure Cookie

Keywords: JavaBeans     Secure Cookie     middleware     PMI     RBAC    

Technical Scheme and Key Equipment for Solving the Difficult Technical Problems of Underground Radio Communications

Situ Mengtian

Strategic Study of CAE 2001, Volume 3, Issue 7,   Pages 64-69

Abstract:

Two difficult tedhnical problems in underground radio communications, i.e. weak signal reception and

Keywords: underground radio communications     weak signal reception     counter lightning interference    

Secure connectivity analysis in unmanned aerial vehicle networks None

Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 3,   Pages 409-422 doi: 10.1631/FITEE.1700032

Abstract: Based on the trust model, the concept of a secure link in UAVNs is formulated that exists only when thereMoreover, the metrics of both the physical connectivity probability and the secure connectivity probabilityWe derive accurate and analytical expressions of both the physical connectivity probability and the securephysical connection probability with or without malicious attacks, the proposed trust model can guarantee secure

Keywords: Unmanned aerial vehicle networks (UAVNs)     Trust model     Secure connectivity     Doppler shift    

Convergence to real-time decision making

James M. TIEN

Frontiers of Engineering Management 2020, Volume 7, Issue 2,   Pages 204-222 doi: 10.1007/s42524-019-0040-5

Abstract: Real-time decision making reflects the convergence of several digital technologies, including those concerned with the promulgation of artificial intelligence and other advanced technologies that underpin real-time actions. More specifically, real-time decision making can be depicted in terms of three converging dimensions: Internet of Things, decision making, and real-time. The Internet of Things include tangible goods, intangible services, ServGoods, and connected ServGoods. Decision making includes model-based analytics (since before 1990), information-based Big Data (since 1990), and training-based artificial intelligence (since 2000), and it is bolstered by the evolving real-time technologies of sensing (i.e., capturing streaming data), processing (i.e., applying real-time analytics), reacting (i.e., making decisions in real-time), and learning (i.e., employing deep neural networks). Real-time includes mobile networks, autonomous vehicles, and artificial general intelligence. Central to decision making, especially real-time decision making, is the ServGood concept, which the author introduced in an earlier paper (2012). It is a physical product or good encased by a services layer that renders the good more adaptable and smarter for a specific purpose or use. Addition of another communication sensors layer could further enhance its smartness and adaptiveness. Such connected ServGoods constitute a solid foundation for the advanced products of tomorrow which can further display their growing intelligence through real-time decisions.

Keywords: decision making     services     goods     ServGoods     Big Data     Internet of Things     artificial intelligence     wireless communications    

An Internet-of-Things Initiative for One Belt One Road (OBOR)

Li Da Xu

Frontiers of Engineering Management 2016, Volume 3, Issue 3,   Pages 206-223 doi: 10.15302/J-FEM-2016039

Abstract: A wide range of industrial Internet of Things (IoT) applications have been developed and deployed in recent years. IoT has provided a promising opportunity to build powerful industrial systems and applications by leveraging the growing ubiquity of RFID, wireless, mobile and sensor devices. In an effort to understand the development of IoT in industries, this paper reviews the current research of IoT, key enabling technologies, major IoT applications in industries, and identifies research trends and challenges. As IoT has received support from governments and businesses across the globe, IoT will also greatly impact One Belt One Road (OBOR) in foreseeable future.

Keywords: Internet of Things (IoT)     RFID     Wireless Sensor Networks     Near Field Communications     ICT    

The secure and highly efficient development technology for Puguang Gas Field and its industrial application

Cao Yaofeng

Strategic Study of CAE 2013, Volume 15, Issue 11,   Pages 49-52

Abstract:

To solve the multi-types of technical problem concerning with the development technology of Puguang Gas Field which is deeply reserved and abounds with hydrogen sulfide, we have organized a scientific innovation team of industry- teaching- research integration. So that, we have formed a technology innovation system,realized the general interaction of key science and technology program and site-testing,promoted the research and development of gas field with super- deep and high-sulfur, localization of key equipment,the construction of standard system and its industrial application, pushed China to be one of the few countries of holding the core technology for high-sulfur gas field development,and made important contribution to superdeep and high-sulfur gas field development of China and even the whole world.

Keywords: Puguang Gas Field     super-deep and high-sulfur     technology innovation     industrial application    

Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data Research Articles

S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7,   Pages 940-956 doi: 10.1631/FITEE.2000071

Abstract: This necessitates protection of digital medical images and their secure transmission.

Keywords: 医学图像加密;DNA;混沌吸引子;交叉;突变;电子医疗    

China Needs High-speed Magnetically Levitated Train

Yan Luguang

Strategic Study of CAE 2000, Volume 2, Issue 5,   Pages 8-13

Abstract:

The development, main features and advantages of the high-speed magnetically levitated train are shortly described. It is particularly suitable for the development of the future high-speed passenger transportation network in China. Some suggestions to develop high-speed magnetically levitated train technology in China are presented.

Keywords: magnetically levitated train     high-speed passenger transportation     communications and transportation    

An Adaptive Demodulation Method for BPSK Signals

Li Yanxin,Hu Aiqun,Song Yubo

Strategic Study of CAE 2006, Volume 8, Issue 5,   Pages 49-51

Abstract:

The paper presents a novel method for demodulating the binary phase shift keying (BPSK) signals basing on adaptive filtering. The commonly used least mean square (LMS) error adaptive filtering algorithm is employed for studying the demodulating procedure and the performance of the novel adaptive BPSK demodulation. The novel adaptive BPSK demodulation does not need the adaptive filter completing convergence. The performance of the method in theory is compared with computer simulating results. It shows that the error rates in simulation agree well with that in theory. Also, it is indicated that the demodulation method has many advantages over conventional ones, such as the powerful anti-noise ability, the small transfer delay, and the convenient implementation with DSP technology, and has lower error rates than correlation modulation at the same sample rate.

Keywords: digital communications     adaptive signal processing     demodulation     BPSK    

An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication Research Articles

Masoud Kaveh, Abolfazl Falahati,afalahati@iust.ac.ir

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7,   Pages 1010-1019 doi: 10.1631/FITEE.2000043

Abstract: In this paper we propose an based secure scheme that can resist current underwater attacks, i.e., replay

Keywords: 海豚哨音;改进Merkle哈希树;安全水声通信(UWAC)    

Title Author Date Type Operation

Synchronization of two different chaotic systems using Legendre polynomials with applications in securecommunications

Saeed KHORASHADIZADEH, Mohammad-Hassan MAJIDI

Journal Article

Correlated channelmodel-based securecommunications in dual-hopwireless communication networks

Zhen-hua YUAN, Chen CHEN, Xiang CHENG, Guo-cheng LV, Liu-qing YANG, Ye JIN

Journal Article

Managing obsolescence of embedded hardware and software in secure and trusted systems

Zachary A. COLLIER, James H. LAMBERT

Journal Article

Distinct mononuclear diploid cardiac subpopulation with minimal cell–cell communications persists in

Journal Article

From Terahertz Imaging to Terahertz Wireless Communications

Yi Huang,Yaochun Shen,Jiayou Wang

Journal Article

A Security Middleware for Web Applications Based on JavaBeans and Secure Cookie

Cai Zhun,Kong Fanyu,Li Daxing

Journal Article

Technical Scheme and Key Equipment for Solving the Difficult Technical Problems of Underground Radio Communications

Situ Mengtian

Journal Article

Secure connectivity analysis in unmanned aerial vehicle networks

Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU

Journal Article

Convergence to real-time decision making

James M. TIEN

Journal Article

An Internet-of-Things Initiative for One Belt One Road (OBOR)

Li Da Xu

Journal Article

The secure and highly efficient development technology for Puguang Gas Field and its industrial application

Cao Yaofeng

Journal Article

Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data

S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu

Journal Article

China Needs High-speed Magnetically Levitated Train

Yan Luguang

Journal Article

An Adaptive Demodulation Method for BPSK Signals

Li Yanxin,Hu Aiqun,Song Yubo

Journal Article

An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication

Masoud Kaveh, Abolfazl Falahati,afalahati@iust.ac.ir

Journal Article