首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   23篇
  免费   4篇
化学工业   1篇
机械仪表   1篇
无线电   18篇
一般工业技术   1篇
自动化技术   6篇
  2021年   3篇
  2020年   2篇
  2018年   4篇
  2017年   3篇
  2016年   6篇
  2015年   2篇
  2014年   4篇
  2013年   1篇
  2012年   1篇
  2010年   1篇
排序方式: 共有27条查询结果,搜索用时 250 毫秒
1.

As recent cyber-attacks have been increasing exponentially, the importance of security training for employees also has become growing ever than before. In addition, it is suggested that security training and education be an effective method for discerning cyber-attacks within academia and industries. Despite the importance and the necessity of the training, prior study did not investigate the quantitative utility of security training in an organizational level. Due to the absence of referential studies, many firms are having troubles in making decisions with respect to arranging optimal security training programs with limited security budgets. The main objective of this study is to find out a relationship between cybersecurity training and the number of incidents of organizations. Thus, this study quantified the effectiveness of security training on security incidents as the first study. This research examined the relationship among three main factors; education time, education participants, and outsourcing with numbers of cybersecurity incidents. 7089 firm level data is analyzed through Poisson regression method. Based on analysis results, we found that the negative relationship between security trainings and the occurrence of cybersecurity incidents. This study sheds light on the role of security training and education by suggesting its positive association with reducing the number of incidents in organizations from the quantitative perspective. The result of this study can be used as a referential guide for information security training decision-making procedure in organizations.

  相似文献   
2.
3.
Malik  Saransh  Moon  Sangmi  Kim  Bora  You  Cheolwoo  Liu  Huaping  Kim  Jeong-Ho  Kim  Jihyung  Hwang  Intae 《Wireless Personal Communications》2017,95(4):4425-4440

Massive MIMO (also known as the “Large-Scale Antenna System”) enables a significant reduction of latency on the air interface with the use of a large excess of service-antennas over active terminals and time division duplex operation. For large-scale MIMO, several technical issues need to be addressed (e.g., pilot pattern design and low-antenna power transmission design) and theoretically addressed (e.g., channel estimation and power allocation schemes). In this paper, we analyze the ergodic spectral efficiency upper bound of a large-scale MIMO, and the key technologies including channel uplink detection. We also present new approaches for detection and power allocation. Assuming arbitrary antenna correlation and user distributions, we derive approximations of achievable rates with linear detection techniques, namely zero forcing, maximum ratio combining, minimum mean squared error (MMSE) and eigen-value decomposition power allocation (EVD-PA). While the approximations are tight in the large system limit with an infinitely large number of antennas and user terminals, they also match our simulations for realistic system dimensions. We further show that a simple EVD-PA detection scheme can achieve the same performance as MMSE with one order of magnitude fewer antennas in both uncorrelated and correlated fading channels. Our simulation results show that our proposal is a better detection scheme than the conventional scheme for LSAS. Also, we used two channel environment channels for further analysis of our algorithm: the Long Term Evolution Advanced channel and the Millimeter wave Mobile Broadband channel.

  相似文献   
4.
The analysis and design of relay protocols is a hot issue in 3GPP Long Term Evolution—Advanced. In this paper, we discuss interference cancellation in a multiuser MIMO environment using Amplify-and-Forward (AF), Decode-and-Forward (DF) and De-Modulate-and-Forward (DMF) as relay protocols, and using Thomilson Harashima Precoding and Dirty Paper Coding as precoding techniques, with Zero-Forcing, Minimum Mean Square Error, Successive Interference Cancellation and Ordered Successive Interference Cancellation detection techniques. By using a combination of classical precoding schemes and detection techniques with weighted matrix, we propose a new interference cancellation technique that is capable of cancelling interference. The interference cancellation is managed by AF, DF and DMF relay node protocols and the interference free codeword is transmitted to the selected User Equipment. The proposed algorithm when used with DMF protocol shows best performance, compared to the conventional system or the no-relay system case, it gives best performance. The observation results shows that DMF protocol gives the best results for BER and Throughput performance in a high interference environment.  相似文献   
5.
Kwon  Soonho  Choi  Yongtae  Moon  Sangmi  You  Cheolwoo  Liu  Huaping  Kim  Jeong-Ho  Kim  Dae Jin  Park  Hosung  Kim  Jin Young  Hwang  Intae 《Wireless Personal Communications》2020,114(3):2551-2568
Wireless Personal Communications - Wireless solar blind ultraviolet (UV) scattering communication is a new type of atmosphere optics communication technology with the important and potential...  相似文献   
6.
Kwon  Soonho  Kim  Daeoh  Lee  Jihye  Moon  Sangmi  Chu  Myeonghun  Bae  Sara  You  Cheolwoo  Liu  Huaping  Kim  Jeong-Ho  Kim  Dae Jin  Park  Hosung  Kim  Jin Young  Kim  Cheol-Sung  Hwang  Intae 《Wireless Personal Communications》2018,102(1):507-526
Wireless Personal Communications - Generally, a ground telemetry station for a launch vehicle (LV) includes a tracking function only; therefore, position measurements for LV depend on received...  相似文献   
7.
Kwon  Soonho  Kim  Daeoh  Lee  Jihye  Moon  Sangmi  Chu  Myeonghun  Bae  Sara  You  Cheolwoo  Liu  Huaping  Kim  Jeong-Ho  Kim  Dae Jin  Park  Hosung  Kim  Jin Young  Kim  Cheol-Sung  Hwang  Intae 《Wireless Personal Communications》2018,103(2):1443-1464
Wireless Personal Communications - In general, a ground telemetry station for a launch vehicle (LV) includes a tracking function only; therefore, position measurements for LV depend on received...  相似文献   
8.
Although cybersecurity is considered a critical area of information technology, women continue to be underrepresented among its ranks. This study, which is the first of female cybersecurity professionals, examines the skills women need to succeed in the industry, as well as the nature of the barriers and challenges they face at all points in their careers. Using face-to-face interviews and paper-based questionnaires, the study explored the views of high-ranking female cybersecurity officers and gained insights into how the needs of women might better be addressed, whether they're starting out in the educational system or advancing to the board rooms of major corporations. As cybersecurity provides an increasing number of IT jobs and becomes central to managerial operations within companies, women's advancement to executive and managerial positions will be important both for gender equity and to meet the needs of the market.  相似文献   
9.
10.
Discovering the correct dataset in an efficient fashion is critical for effective simulations in the atmospheric sciences. Unlike text-based web documents, many of the large scientific datasets often contain binary encoded data that is hard to discover using popular search engines. In the atmospheric sciences, there has been a significant growth in public data hosting services. However, the ability to index and search has been limited by the metadata provided by the data host. We have developed an infrastructure-Atmospheric Data Discovery System (ADDS)-that provides an efficient data discovery environment for observational datasets in the atmospheric sciences. To support complex querying capabilities, we automatically extract and index fine-grained metadata. Datasets are indexed based on periodic crawling of popular sites and also of files requested by the users. Users are allowed to access subsets of a large dataset through our data customization feature. Our focus is the overall architecture, data subsetting scheme, and a performance evaluation of our system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号