首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
On the basis of various firewall-penetrated technologies, a novel firewall-penetrated technology based on trusted host, which can realize the communication between penetrating host and protected host, is proposed in this paper. Meanwhile, the firewall-penetrated evaluating model and its formalized statement is also proposed by quantizing penetrated level, penetrated quality, and penetrated hiding. Finally, the firewall-penetrated technology based on trusted host is analyzed under the firewall-penetrated evaluating model, and the experimental results show that this technology has obvious penetrating effect and high penetrating quality.  相似文献   

2.
1 Introduction Electromagnetic radiation will be generated when an electric device, especially video display unit, works, and can give rise to electromagnetic leakage. When the electromagnetic leakage is recognized, the available information can be recove…  相似文献   

3.
滕峰成 《光电子快报》2010,6(5):388-391
A novel fiber grating vibration demodulation system, based on 2×2 and 3×3 couplers, is designed. Based on the phase unwrapping algorithm, the three-way asymmetrical output of the 3×3 coupler and demodulation state characteristics of the system when the vibration signal includes high harmonic waves are analyzed in simulations. The result shows that when the three-way output is asymmetrical, the maximum deviation of demodulation signal is 1.625%, and when the vibration signal includes high harmonic waves, the maximum deviation of demodulation signal is 0.9%. The corresponding experiment is conducted. The experimental result shows that the dynamic resolution of the system is 25.22 / $ \sqrt {Hz} $ \sqrt {Hz} when the vibration pitch is 5.5 Hz.  相似文献   

4.
Several routing structures have been proposed for data gathering in a wireless sensor network. They are considered to be near-optimal with respect to energy efficiency or delivery delay, but they overlook the construction cost of a routing tree which may make trouble in implementation. Our primary goal in this work is to construct a routing tree with negligible cost, which performs as well as those near-optimal schemes. First, we propose a distributed and localized framework for tree construction called Local Parent Designation (LPD), where the node status information is exchanged locally and decision based on the local information leads us to construct a routing tree. Secondly, we extend LPD to so called LPD-Local Fix (LPD-LF) to reduce further the construction cost with less local information exchange. Simulation results validate that our goal is achieved.  相似文献   

5.
A gain enhancement technique for a pseudo differential OTA based on voltage combiner, suitable for sub-1 V supply is presented in this letter. The proposed technique uses a G m boosted voltage combiner. Unlike the typical voltage combiner which has an approximated gain of \(2\,\frac{{\text{V}}}{{\text{V}}}\), this voltage combiner can produce gain more than \(5\,\frac{{\text{V}}}{{\text{V}}}\). So it help us achieve nearly 60 dB DC gain with 250 kHz UGB for the pseudo differential OTA at a capacitive load of 10 pF. Power dissipation is very low i.e. 716 nW at supply of 0.5 V. So as to facilitate maximum swing at 0.5 V supply and lower the power consumption, MOS transistors are biased in weak/moderate inversion. The OTA is designed in standard 45 nm CMOS process. Phase margin of is more than \(55^{\circ }\) for a typical load of 10 pF. The input referred noise is \(150\,\upmu {\text{V}}{/}\sqrt{{\text{Hz}}}\) at 10 Hz and slew rate \(0.02\,{\text{V}}{/}\upmu{\text{s}}\) for 10 pF load.  相似文献   

6.
In this paper, we propose a photovoltaic power supply for a stand-alone system that provides electrical generation and voltage boost functions on a single silicon chip. This power supply consists of solar cells, an oscillator, and a bootstrap charge pump, which are all designed in a 0.18 μm standard complementary metal-oxide semiconductor technology. Two types of solar cells are embedded in the system to improve its power efficiency. One type is used for the power supply and the other type is used to provide the voltage bias. Three different solar cells structures were designed. A pn structure and an np structure are used for the power supply cells and an npn series-connected structure is used for the oscillator circuit to operate the DC–DC converter The voltage-current characteristics of the solar cell under microscopic illumination have been measured and the performance of bootstrap charge pump circuits was confirmed. We remodeled our solar cell equivalent circuit to reflect these measurement results.  相似文献   

7.
This work focuses on techno-business analysis of service platforms and service portfolios. Service platform (SP) hosts services and enabling service functionality. Service providers deliver two main products: end-user services to their customers and enablers to other business actors. 3rd party service providers combine enablers with their own functionality, wrap them in end-user services and deliver them to their customers.  相似文献   

8.
The design and the numerical simulation of the 95 GHz, 2 MW gyrotron for various kinds of communication, sensing and security applications is presented. The gyrotron is designed for the TE24,8 operating mode. Various in-house developed and commercially available computer codes are used for the design purpose. A 4.25 MW electron gun is designed for the 2 MW of output power. The mode selection, cold cavity and the beam–wave interaction analysis are discussed for the design of weakly tapered open resonator type of interaction cavity. The parametric analysis of the interaction cavity and the electron gun is also presented.  相似文献   

9.
~~Modeling and analysis of self-similar traffic source based on fractal-binomial-noise-driven Poisson process1. Will E L, Murad S T, Walter W, et al. On the self-similarity nature of Ethernet traffic (extended version). IEEE/ACM Transactions on Networking…  相似文献   

10.
In this paper, a robust non-linear controller based on the uncertainty and disturbance estimator (UDE) scheme is successfully developed and implemented for the output voltage regulation of the DC–DC boost converter. System uncertainties, external disturbances and unknown non-linear dynamics are lumped as a signal that is accurately estimated using a low-pass filter and their effects are cancelled by the controller. This methodology forms the basis of the UDE-based controller. A simple procedure is also developed that systematically determines the parameters of the controller to meet certain specifications. Using simulation, the effectiveness of the proposed controller is compared against the sliding-mode control (SMC). Experimental tests also show that the proposed controller is robust to system uncertainties, large input and load perturbations.  相似文献   

11.
Wire-rate packet processing and its energy saving for over 100 Gbps speed of line are major issues to be resolved in optical packet switching (OPS) networks. For that purpose, we newly develop a high-speed, deterministic-latency electronic header processor based on longest prefix matching (LPM) for searching optical packet destination addresses (OP-DAs). This paper reports the successful experimental results of electronic header processing based on LPM search of up to 48 bits and optical switching of 100 Gbps optical packets by the use of the header processor. We demonstrate 48-bit LPM-capable optical packet switching. We also demonstrate IP packet transfer and 32-bit LPM-capable optical packet switching. In the latter demonstration, the 32-bit OP-DA of optical packets is directly copied from the 32-bit destination address of Internet Protocol version 4 (IPv4) packets. This result indicates that OPS networks can be deployed with electronic IP networks by the use of integrated network operation between OPS and IP networks.  相似文献   

12.
This paper describes the design and analysis of a low‐power medium access control (MAC) protocol for wireless/mobile ATM networks. The protocol – denoted EC‐MAC (energy conserving medium access control) – is designed to support different traffic types with quality‐of‐service (QoS) provisions. The network is based on the infrastructure model where a base station (BS) serves all the mobiles currently in its cell. A reservation‐based approach is proposed, with appropriate scheduling of the requests from the mobiles. This strategy is utilized to accomplish the dual goals of reduced energy consumption and quality of service provision over wireless links. A priority round robin with dynamic reservation update and error compensation scheduling algorithm is used to schedule the transmission requests of the mobiles. Discrete‐event simulation has been used to study the performance of the protocol. A comparison of energy consumption of the EC‐MAC to a number of other protocols is provided. This comparison indicates the EC‐MAC has, in general, better energy consumption characteristics. Performance analysis of the proposed protocol with respect to different quality‐of‐service parameters using video, audio and data traffic models is provided. This revised version was published online in August 2006 with corrections to the Cover Date.  相似文献   

13.
Thebeamsplitters(BS)havedemonstratedwideap plicationinmanyopticalsystemsandplayakeyrolein interferometryandholography[1].ThemechanismofBScanbedividedintotwocategories:oneutilizesthereflec tionandrefractionontheinterfacebetweentwodielec tricmedia;theotheru…  相似文献   

14.
Hybrid DC–DC converters for space applications should be designed for operation at full rated power within the military specification for temperature range of −55 to +125 °C. Hence, the thermal design is a crucial step in the design process of converter, ensuring that no component of the converter exceeds its rated maximum operating temperature. One of the objectives of this work is to guarantee that all electronic components operate below their maximum allowable temperature. For this purpose, a three dimensional model of a converter based on the finite element method was developed. Results based on numerical simulation were validated by experimental data from infrared camera. The total amount of dissipated power in every component was determined experimentally based on a prototype converter. In the case of a component with high power consumption, such as the field effect transistor, the increase in temperature was minimized by applying designed heat sink with a high-thermal-conductivity material.  相似文献   

15.
The binary coded form of minterms for both minterms and reduced minterms is used in a very simple method for searching for prime implicants of logic functions. It only requires XOR and comparison operations.  相似文献   

16.

In this paper, a 1?×?2 optical switch based on two TE/TM polarization converters, one 1?×?2-polarization beam splitter and a hybrid 2?×?2-polarization beam splitter/combiner is designed and discussed. The novelty of this work resides in the design of a 2?×?2-hybrid polarization beam combiner/splitter, operating as a 2?×?2 polarization optical switch through the combining and the splitting of polarized signals issued from two TE/TM polarization controllers. The novel hybrid splitter/combiner can route an optical signal either to a bar or a cross port with an extinction ratio higher than 90 dB, thanks to the feature of polarization splitting used in this device to suppress undesired polarization states and minimize the polarization-dependent loss. We have used polarization beam converters to switch between two orthogonal modes in order to facilitate the routing of these signals through the 2?×?2-hybrid polarization splitter/combiner. We changed the polarization states of signals, in our simulation via OptiSystem, through polarization controllers, by modifying only their phase shifts between 0 rad and π rad. The proposed 1?×?2 optical switch presents an average insertion loss of 3.5 dB.

  相似文献   

17.
Ad hoc networks can be used for quickly set up small spontaneous networks, such as in emergency situations or during sessions of cooperative works as in conferences, teaching rooms or meetings. Real-life tests of such networks are invaluable in order to assess models used in simulation. However, the number of factors affecting the performance of an ad hoc network is high, theoretically infinite. There are, for example, system factors, such as routing protocols, MAC and physical layer protocols and their cross-layer interaction, as well as environment factors, such as the presence of walls, foliage and surrounding moving objects. In order to optimize protocols, it is important both to design repeatable experiments of the network and to identify the parameters which really affect the system behavior. We accomplish the former demand by building a simple network by means of off-the-shelf hardware and software. For the latter point, we propose to use methods of statistical testing theory to identify these parameters in a compact manner. In particular, we use OLSR as a routing protocol. Results from real experiments in outdoor and indoor scenarios confirm the horizon effect of ad hoc multi-hop networks and show that there is a treatment effect caused by the window size of OLSR.  相似文献   

18.
DDP-64, based on various controlled operations, is a 64-bit Feistel-like block cipher consisting of 10 rounds with a 128-bit key. It was designed to attempt to have a high security level and a high speed performance in hardware on ubiquitous computing systems and multimedia. In this paper, however, we show that DDP-64 doesn’t have a high security level, more precisely, we show that it is vulnerable to related-key differential attack. This attack, which is much faster than the key exhaustive search, requires about 254 data and 254 time complexities. This work is the first known cryptanalytic result on DDP-64 so far.  相似文献   

19.
In this paper we empirically investigate and compare to what extent Northern and Southern European firms view cloud computing (CC) as a means of: (a) ICT investment reduction; (b) supporting and facilitating product/service innovation and process innovation; (c) experimenting with and exploiting new ICT; and (d) supporting and facilitating electronic innovation collaboration. This is done by estimating econometrically a model of CC adoption propensity containing measures of the four main adoption motives mentioned above besides further variables that are associated with technology adoption and a series of controls for firm size, sector and country affiliation. Our study is based on a dataset collected through the e-Business W@tch Survey of the European Commission from 556 European firms from the glass, ceramic and cement sectors. These findings indicate that Southern European firms are mainly oriented towards ‘first-level’ cost (and especially investment) reduction related benefits from CC as well as from new emerging ICT, while on the contrary Northern European firms are mainly oriented towards ‘second-level’ transformation related benefits from CC, which are associated with support and facilitation of innovation and external collaboration.  相似文献   

20.
1IntroductionWith the development of network,security of net-work is more and more serious[1]flooding-based Dis-tributed Denial-of-Service(DDoS)attack presents avery serious threat to the stability of the internet[2~3].The detection of DoS/DDoS attack mai…  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号