Search scope:
排序: Display mode:
Saeed KHORASHADIZADEH, Mohammad-Hassan MAJIDI
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 9, Pages 1180-1190 doi: 10.1631/FITEE.1601814
Keywords: Observer-based synchronization Chaotic systems Legendre polynomials Secure communications
Correlated channelmodel-based securecommunications in dual-hopwireless communication networks Article
Zhen-hua YUAN, Chen CHEN, Xiang CHENG, Guo-cheng LV, Liu-qing YANG, Ye JIN
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 6, Pages 796-807 doi: 10.1631/FITEE.1700023
Keywords: Physical layer security Relay beamforming Correlated channels Ergodic secrecy rate
Managing obsolescence of embedded hardware and software in secure and trusted systems
Zachary A. COLLIER, James H. LAMBERT
Frontiers of Engineering Management 2020, Volume 7, Issue 2, Pages 172-181 doi: 10.1007/s42524-019-0032-5
Keywords: enterprise risk management diminishing manufacturing sources and material shortages scenario-based preferences systems engineering deep uncertainty product life cycle
Distinct mononuclear diploid cardiac subpopulation with minimal cell–cell communications persists in
Frontiers of Medicine Pages 939-956 doi: 10.1007/s11684-023-0987-9
Keywords: mononuclear diploid cardiomyocytes cell–cell communication cardiac fibroblast single-cell RNA sequencing cardiac regeneration
From Terahertz Imaging to Terahertz Wireless Communications Review
Yi Huang,Yaochun Shen,Jiayou Wang
Engineering 2023, Volume 22, Issue 3, Pages 106-124 doi: 10.1016/j.eng.2022.06.023
Keywords: Communications Imaging Terahertz technology Wireless communications
A Security Middleware for Web Applications Based on JavaBeans and Secure Cookie
Cai Zhun,Kong Fanyu,Li Daxing
Strategic Study of CAE 2005, Volume 7, Issue 3, Pages 74-77
This paper discusses the secure operations in the web applications, and designs a framework of middlewareThe paper implements the security middleware based on the “JavaBeans” and “Secure Cookie
Keywords: JavaBeans Secure Cookie middleware PMI RBAC
Situ Mengtian
Strategic Study of CAE 2001, Volume 3, Issue 7, Pages 64-69
Two difficult tedhnical problems in underground radio communications, i.e. weak signal reception and
Keywords: underground radio communications weak signal reception counter lightning interference
Secure connectivity analysis in unmanned aerial vehicle networks None
Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 3, Pages 409-422 doi: 10.1631/FITEE.1700032
Keywords: Unmanned aerial vehicle networks (UAVNs) Trust model Secure connectivity Doppler shift
Convergence to real-time decision making
James M. TIEN
Frontiers of Engineering Management 2020, Volume 7, Issue 2, Pages 204-222 doi: 10.1007/s42524-019-0040-5
Keywords: decision making services goods ServGoods Big Data Internet of Things artificial intelligence wireless communications
An Internet-of-Things Initiative for One Belt One Road (OBOR)
Li Da Xu
Frontiers of Engineering Management 2016, Volume 3, Issue 3, Pages 206-223 doi: 10.15302/J-FEM-2016039
Keywords: Internet of Things (IoT) RFID Wireless Sensor Networks Near Field Communications ICT
Cao Yaofeng
Strategic Study of CAE 2013, Volume 15, Issue 11, Pages 49-52
To solve the multi-types of technical problem concerning with the development technology of Puguang Gas Field which is deeply reserved and abounds with hydrogen sulfide, we have organized a scientific innovation team of industry- teaching- research integration. So that, we have formed a technology innovation system,realized the general interaction of key science and technology program and site-testing,promoted the research and development of gas field with super- deep and high-sulfur, localization of key equipment,the construction of standard system and its industrial application, pushed China to be one of the few countries of holding the core technology for high-sulfur gas field development,and made important contribution to superdeep and high-sulfur gas field development of China and even the whole world.
Keywords: Puguang Gas Field super-deep and high-sulfur technology innovation industrial application
Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data Research Articles
S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7, Pages 940-956 doi: 10.1631/FITEE.2000071
Keywords: 医学图像加密;DNA;混沌吸引子;交叉;突变;电子医疗
China Needs High-speed Magnetically Levitated Train
Yan Luguang
Strategic Study of CAE 2000, Volume 2, Issue 5, Pages 8-13
The development, main features and advantages of the high-speed magnetically levitated train are shortly described. It is particularly suitable for the development of the future high-speed passenger transportation network in China. Some suggestions to develop high-speed magnetically levitated train technology in China are presented.
Keywords: magnetically levitated train high-speed passenger transportation communications and transportation
An Adaptive Demodulation Method for BPSK Signals
Li Yanxin,Hu Aiqun,Song Yubo
Strategic Study of CAE 2006, Volume 8, Issue 5, Pages 49-51
The paper presents a novel method for demodulating the binary phase shift keying (BPSK) signals basing on adaptive filtering. The commonly used least mean square (LMS) error adaptive filtering algorithm is employed for studying the demodulating procedure and the performance of the novel adaptive BPSK demodulation. The novel adaptive BPSK demodulation does not need the adaptive filter completing convergence. The performance of the method in theory is compared with computer simulating results. It shows that the error rates in simulation agree well with that in theory. Also, it is indicated that the demodulation method has many advantages over conventional ones, such as the powerful anti-noise ability, the small transfer delay, and the convenient implementation with DSP technology, and has lower error rates than correlation modulation at the same sample rate.
Keywords: digital communications adaptive signal processing demodulation BPSK
An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication Research Articles
Masoud Kaveh, Abolfazl Falahati,afalahati@iust.ac.ir
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7, Pages 1010-1019 doi: 10.1631/FITEE.2000043
Keywords: 海豚哨音;改进Merkle哈希树;安全水声通信(UWAC)
Title Author Date Type Operation
Synchronization of two different chaotic systems using Legendre polynomials with applications in securecommunications
Saeed KHORASHADIZADEH, Mohammad-Hassan MAJIDI
Journal Article
Correlated channelmodel-based securecommunications in dual-hopwireless communication networks
Zhen-hua YUAN, Chen CHEN, Xiang CHENG, Guo-cheng LV, Liu-qing YANG, Ye JIN
Journal Article
Managing obsolescence of embedded hardware and software in secure and trusted systems
Zachary A. COLLIER, James H. LAMBERT
Journal Article
Distinct mononuclear diploid cardiac subpopulation with minimal cell–cell communications persists in
Journal Article
From Terahertz Imaging to Terahertz Wireless Communications
Yi Huang,Yaochun Shen,Jiayou Wang
Journal Article
A Security Middleware for Web Applications Based on JavaBeans and Secure Cookie
Cai Zhun,Kong Fanyu,Li Daxing
Journal Article
Technical Scheme and Key Equipment for Solving the Difficult Technical Problems of Underground Radio Communications
Situ Mengtian
Journal Article
Secure connectivity analysis in unmanned aerial vehicle networks
Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU
Journal Article
The secure and highly efficient development technology for Puguang Gas Field and its industrial application
Cao Yaofeng
Journal Article
Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data
S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu
Journal Article