期刊文献+
共找到1,134篇文章
< 1 2 57 >
每页显示 20 50 100
OpenGL在Vega Prime开发环境中的应用研究 被引量:12
1
作者 方琦峰 康凤举 +1 位作者 张楚鑫 宋志明 《计算机仿真》 CSCD 2008年第6期191-194,共4页
分析了Vega Prime在视景仿真中相对于Vega的改进之处,讨论了基于Vega Prime的视景仿真框架,针对Vega Prime在视景仿真系统开发中对某些特效表达存在的困难,提出将OpenGL引入到VegaPrime中的方法,通过分析VegaPrime中的事件发布订阅机制... 分析了Vega Prime在视景仿真中相对于Vega的改进之处,讨论了基于Vega Prime的视景仿真框架,针对Vega Prime在视景仿真系统开发中对某些特效表达存在的困难,提出将OpenGL引入到VegaPrime中的方法,通过分析VegaPrime中的事件发布订阅机制,阐述了Vega Prime开发平台与OpenGL相结合的关键技术及开发方法,并将其应用于水下武器对抗视景仿真系统中的鱼雷自导声波显示和武器实体间通信链路可视化过程中,应用结果表明视觉效果逼真,弥补了Vega Prime在基本图形显示上的缺点,取得了良好的应用效果。 展开更多
关键词 事件 订阅 可视化仿真
下载PDF
出资人股权诉讼与企业国有资产保护——兼评我国《企业国有资产法》的实施 被引量:5
2
作者 蒋建湘 《法律科学(西北政法大学学报)》 CSSCI 北大核心 2009年第6期151-156,共6页
在公司制国家出资企业中,国有资产出资人的地位与普通股东的地位无异,并同样享有股东权利和诉权。我国《企业国有资产法》的颁布使得出资人的股权代表地位得以明确,这为通过出资人股权诉讼克服国家所有权"虚置"和代理人的&qu... 在公司制国家出资企业中,国有资产出资人的地位与普通股东的地位无异,并同样享有股东权利和诉权。我国《企业国有资产法》的颁布使得出资人的股权代表地位得以明确,这为通过出资人股权诉讼克服国家所有权"虚置"和代理人的"道德风险",保障出资人权益和防止国有资产损失奠定了基础。出资人股权诉讼程序基本上遵循普通民事诉讼程序,但也涉及一些特殊的程序法问题,其中,出资人股权直接诉讼和间接诉讼又各有自身的特殊性。 展开更多
关键词 企业国有资产 出资人 股权诉讼 企业国有资产法
下载PDF
基于SQL_DMO和ActiveX的数据分发监控系统的设计与实现 被引量:3
3
作者 高云君 章方铭 张学杰 《计算机应用研究》 CSCD 北大核心 2004年第6期120-122,170,共4页
随着信息时代的到来和信息化技术的快速发展 ,各信息系统及应用系统间的数据交互变得越来越重要。论述了一个基于SQLDMO和ActiveX技术的数据分发监控系统DDS(DataDistributionSystem)的开发原理。
关键词 SQL分布式管理对象(SQL—DMO) ACTIVEX 发布服务器 分发服务器 订阅服务器
下载PDF
User Churn Prediction Hierarchical Model Based on Graph Attention Convolutional Neural Networks
4
作者 Mei Miao Tang Miao Zhou Long 《China Communications》 SCIE CSCD 2024年第7期169-185,共17页
The telecommunications industry is becoming increasingly aware of potential subscriber churn as a result of the growing popularity of smartphones in the mobile Internet era,the quick development of telecommunications ... The telecommunications industry is becoming increasingly aware of potential subscriber churn as a result of the growing popularity of smartphones in the mobile Internet era,the quick development of telecommunications services,the implementation of the number portability policy,and the intensifying competition among operators.At the same time,users'consumption preferences and choices are evolving.Excellent churn prediction models must be created in order to accurately predict the churn tendency,since keeping existing customers is far less expensive than acquiring new ones.But conventional or learning-based algorithms can only go so far into a single subscriber's data;they cannot take into consideration changes in a subscriber's subscription and ignore the coupling and correlation between various features.Additionally,the current churn prediction models have a high computational burden,a fuzzy weight distribution,and significant resource economic costs.The prediction algorithms involving network models currently in use primarily take into account the private information shared between users with text and pictures,ignoring the reference value supplied by other users with the same package.This work suggests a user churn prediction model based on Graph Attention Convolutional Neural Network(GAT-CNN)to address the aforementioned issues.The main contributions of this paper are as follows:Firstly,we present a three-tiered hierarchical cloud-edge cooperative framework that increases the volume of user feature input by means of two aggregations at the device,edge,and cloud layers.Second,we extend the use of users'own data by introducing self-attention and graph convolution models to track the relative changes of both users and packages simultaneously.Lastly,we build an integrated offline-online system for churn prediction based on the strengths of the two models,and we experimentally validate the efficacy of cloudside collaborative training and inference.In summary,the churn prediction model based on Graph Attention Convol 展开更多
关键词 cloud-edge cooperative framework GAT-CNN self-attention and graph convolution models subscriber churn prediction
下载PDF
Enhancing Telco Service Quality with Big Data Enabled Churn Analysis: Infrastructure, Model, and Deployment 被引量:1
5
作者 李慧 吴迪 +4 位作者 李高翔 柯毅豪 刘文杰 郑元欢 林小拉 《Journal of Computer Science & Technology》 SCIE EI CSCD 2015年第6期1201-1214,共14页
The penetration of mobile phones is nearly saturated in both developing and developed regions. In such a circumstance, how to prevent subscriber churn has become an important issue for today's telecom operators, as t... The penetration of mobile phones is nearly saturated in both developing and developed regions. In such a circumstance, how to prevent subscriber churn has become an important issue for today's telecom operators, as the cost to acquire a new subscriber is much higher than that to retain an existing subscriber. In this paper, we propose to leverage the power of big data to mitigate the problem of subscriber churn and enhance the service quality of telecom operators. As the information hub, telecom operators have accumulated a huge volume of valuable data on subscriber behaviors, service usage, and network operations. To enable efficient big data processing, we first build a dedicated distributed cloud infrastructure that integrates both online and offline processing capabilities. Second, we develop a complete churn analysis model based on deep data mining techniques, and utilize inter-subscriber influence to improve prediction accuracy. Finally, we use real datasets obtained from a large telecom operator in China to verify the accuracy of our churn analysis models. The dataset contains the information of over 3.5 million subscribers, which generate over 600 million call detail records (CDRs) per month. The empirical results demonstrate that our proposed method can achieve around 90% accuracy for T + 1 testing periods and identify subscribers with high negative influence successfully. 展开更多
关键词 subscriber churn big data cloud infrastructure telco service quality
原文传递
A Secure Short Message Communication Protocol 被引量:1
6
作者 Chao-Wen Chang Heng Pan Hong-Yong Jia 《International Journal of Automation and computing》 EI 2008年第2期202-207,共6页
According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the stan... According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway axe realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application. 展开更多
关键词 Short messaging service security protocol subscriber identity module (SIM) tool kit (STK) AUTHENTICATION mobile
下载PDF
Margin optimization algorithm for digital subscriber lines based on particle swarm optimization 被引量:1
7
作者 Tang Meiqin Guan Xinping 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第6期1316-1323,共8页
The margin maximization problem in digital subscriber line(DSL) systems is investigated.The particle swarm optimization(PSO) theory is applied to the nonconvex margin optimization problem with the target power and... The margin maximization problem in digital subscriber line(DSL) systems is investigated.The particle swarm optimization(PSO) theory is applied to the nonconvex margin optimization problem with the target power and rate constraints.PSO is a new evolution algorithm based on the social behavior of swarms, which can solve discontinuous, nonconvex and nonlinear problems efficiently.The proposed algorithm can converge to the global optimal solution, and numerical example demonstrates that the proposed algorithm can guarantee the fast convergence within a few iterations. 展开更多
关键词 digital subscriber line MARGIN NONCONVEX particle swarm optimization.
下载PDF
Radio map updated method based on subscriber locations in indoor WLAN localization 被引量:1
8
作者 Ying Xia Zhongzhao Zhang Lin Ma 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第6期1202-1209,共8页
With the rapid development of wireless local area network (WLAN) technology, an important target of indoor positioning systems is to improve the positioning accuracy while reducing the online calibration effort to o... With the rapid development of wireless local area network (WLAN) technology, an important target of indoor positioning systems is to improve the positioning accuracy while reducing the online calibration effort to overcome signal time-varying. A novel fingerprint positioning algorithm, known as the adaptive radio map with updated method based on hidden Markov model (HMM), is proposed. It is shown that by using a collection of user traces that can be cheaply obtained, the proposed algorithm can take advantage of these data to update the labeled calibration data to further improve the position estimation accuracy. This algorithm is a combination of machine learning, information gain theory and fingerprinting. By collecting data and testing the algorithm in a realistic indoor WLAN environment, the experiment results indicate that, compared with the widely used K nearest neighbor algorithm, the proposed algorithm can improve the positioning accuracy while greatly reduce the calibration effort. 展开更多
关键词 subscriber location wireless local area network(WLAN) positioning accuracy calibration effort hidden Markovmodel (HMM).
下载PDF
互连网中电子商务的应用
9
作者 王启明 王兴亮 《现代电子技术》 2002年第11期24-25,28-29,共4页
介绍了电子商务中用户、配送及支付的问题 ,并指出了网上理财应掌握的技术问题 。
关键词 电子商务 用户 网上理财 风险 安全 互联网
下载PDF
非并网自备电源用户的安全管理 被引量:3
10
作者 庄敬清 《自动化应用》 2011年第10期77-78,共2页
介绍非并网自备电源的管理要求及事故防范措施。
关键词 客户 自备电源 管理 事故
下载PDF
Broadband & Digital Content-Couple Subscriber Cooperative Relaying Networks for Uplink Transmission using Hierarchical Game Approach 被引量:3
11
作者 Song Meil Teng Yinglei Niu Fang Zhang Yong Wang Li 《China Communications》 SCIE CSCD 2010年第2期16-31,共16页
Cooperation allows wireless network users to benefit from various gains such as an in- crease in the achieved rate or an improvement in the bit error rate. In the paper, we propose a distributed Hierarchical Game (HG... Cooperation allows wireless network users to benefit from various gains such as an in- crease in the achieved rate or an improvement in the bit error rate. In the paper, we propose a distributed Hierarchical Game (HG) theoretic framework over multi-user cooperative communication networks to stimulate cooperation and improve the network performance. First, we study a two- user decision making game in the OFDMA based subscriber cooperative relaying network, in which subscribers transmit their own data in the first phase, while helping to retransmit their partner's or choosing to freeride in the second phase. Instead of consulting to a global optimal solution, we decouple the cooperation resource allocation into two level subproblems: a user level Nash game for distributed cooperation decision and a Base Station (BS) level coalition game for centralized resource allocation. In the proposed HG algorithm, where mutual cooperation is preferred and total payoff is transferable, we prove it converges to a unique optimal equilibrium and resolve the subcarrier as-signment and power allocation among the couples. Besides, we discuss the existence of the publishing and rewarding coefficients in order to encourage cooperation. Then, we extend the HG to multi-user cases by coupling among subscribers according to the location information. The simulation results show that the proposed scheme with the distributed HG game achieves a well tradeoff between fairness and efficiency by improving the transmission efficiency of adverse users and outperforms those employing centralized schemes. 展开更多
关键词 cooperative relay hierachical game infrastructure relay subscriber relay Nash Equilibrium
下载PDF
全球Ka波段宽带卫星业务的现状和发展(一) 被引量:3
12
作者 陈强 赵庆锁 李涛 《数字通信世界》 2014年第9期30-34,共5页
本文简要回顾了全球卫星通信从C/Ku波段到Ka波段,从话音、广播电视到互联网应用的轨迹;对目前Ka波段HTS卫星网络的架构、地面系统情况以及采用的新技术进行了概述;列出了目前全球Ka波段在轨HTS卫星、建造的HTS卫星的容量、运营公司、使... 本文简要回顾了全球卫星通信从C/Ku波段到Ka波段,从话音、广播电视到互联网应用的轨迹;对目前Ka波段HTS卫星网络的架构、地面系统情况以及采用的新技术进行了概述;列出了目前全球Ka波段在轨HTS卫星、建造的HTS卫星的容量、运营公司、使用的地面系统等;介绍了美国Ka波段宽带卫星业务的发展情况。 展开更多
关键词 KA频段 HTS卫星 关口站 在线小站用户
下载PDF
一种CLF芯片与SIM卡芯片连接的方法 被引量:3
13
作者 王琪 王东辉 李云岗 《微计算机应用》 2010年第4期73-76,共4页
在NFC技术中,CLF芯片与SIM卡的连接是一个重要问题,本文提出了一种具有自主知识产权的CLF与SIM卡的通信方法,采用新的调制解调方式,使得S2信号在S1信号高低电平时都能传输,实现单线连接NFC与SIM卡,以及它们之间的全双工通信。通过对该... 在NFC技术中,CLF芯片与SIM卡的连接是一个重要问题,本文提出了一种具有自主知识产权的CLF与SIM卡的通信方法,采用新的调制解调方式,使得S2信号在S1信号高低电平时都能传输,实现单线连接NFC与SIM卡,以及它们之间的全双工通信。通过对该方法进行电路级的设计和仿真,验证了该方法的正确性和稳定性。 展开更多
关键词 NFC ( Near Field Communication ) SIM ( subscriber IDENTITY Module) SWP( single wire protocol) CLF ( Contact-Less FRONT - end)
下载PDF
Investigation of Upstream Near-Far Problem in VDSL Systems via Complete Adaptive Iterative Water Filling Algorithm
14
作者 Mohammad Sadeghi Vahid T. Vakili Mansour J. Nejati 《Communications and Network》 2011年第4期210-219,共10页
Crosstalk is the main degrading factor in Digital Subscriber Line (DSL) systems which are the result of electromagnetic coupling between two adjacent twisted pairs in a cable. Very-high bit-rate Digital Subscriber Lin... Crosstalk is the main degrading factor in Digital Subscriber Line (DSL) systems which are the result of electromagnetic coupling between two adjacent twisted pairs in a cable. Very-high bit-rate Digital Subscriber Line (VDSL) systems which use higher frequencies for data transmission than the other DSL systems, this effect is more considerable in Bit Error Rate (BER) degradation. This paper considers a complete adaptive iterative water-filling (IWF) algorithm for Resolving Upstream Near-Far Problem in VDSL Systems. The new distributed dynamic spectrum management algorithm is proposed, which improve achievable bit rate of iterative water-filling algorithm. The paper proffers a new power back-off strategy of the spectral mask at the near-end users, in order to protect the far-end users. Simulation of the proposed algorithm indicates that the bit rate is increased considerably rather the IWF and adaptive water-filling (AIWF) algorithms by keeping their low complexity. Furthermore, by adding the number of users in network, the new algorithm achieves performance gains over the AIWF, completely adaptive. 展开更多
关键词 Dynamic Spectrum Management Very-High Bit-Rate Digital subscriber Line (VDSL) Near-Far PROBLEM ITERATIVE WATER-FILLING
下载PDF
Tracing Precept against Self-Protective Tortious Decoder
15
作者 Jie Tian Xin-Fang Zhang +1 位作者 Yi-Lin Song Wei Xiang 《Journal of Electronic Science and Technology of China》 2007年第2期115-119,共5页
Traceability precept is a broadcast encryption technique that content suppliers can trace malicious authorized users who leak the decryption key to an unauthorized user. To protect the data from eavesdropping, the con... Traceability precept is a broadcast encryption technique that content suppliers can trace malicious authorized users who leak the decryption key to an unauthorized user. To protect the data from eavesdropping, the content supplier encrypts the data and broadcast the cryptograph that only its subscribers can decrypt. However, a traitor may clone his decoder and sell the pirate decoders for profits. The traitor can modify the private key and the decryption program inside the pirate decoder to avoid divulging his identity. Furthermore, some traitors may fabricate a new legal private key together that cannot be traced to the creators. So in this paper, a renewed precept is proposed to achieve both revocation at a different level of capacity in each distribution and black-box tracing against self-protective pirate decoders. The rigorous mathematical deduction shows that our algorithm possess security property. 展开更多
关键词 Attack prevention broadcast encryption Diffie-Hellman problem malicious subscriber tracing algorithm.
下载PDF
The Effect of Windings on ADSL Transformer Insertion Losses
16
作者 蒋晓娜 兰中文 +2 位作者 陈盛明 张怀武 苏桦 《Journal of Electronic Science and Technology of China》 2007年第1期58-61,共4页
Insertion loss (IL) is one of the important parameters of asymmetrical digital subscriber loop (ADSL) transformers. In different frequency bands, the factors that affect insertion loss are different. Windings main... Insertion loss (IL) is one of the important parameters of asymmetrical digital subscriber loop (ADSL) transformers. In different frequency bands, the factors that affect insertion loss are different. Windings mainly affect insertion loss in mid and high frequency bands. The effects of winding ways, winding wire diameter and winding turns on insertion loss were discussed. The presented experiment shows that the insertion loss of an ADSL transformer could be under 0.4 dB in mid frequency band when the winding is 30 turns, in which the ADSL transformer satisfies the requirement of total harmonic distortion (THD). Our experiments also show that the sandwich winding structure is better than the side by side winding structure and the twisted-pair winding structure, and the increase of winding diameter is one means to reduce insertion losses of an ADSL transformer in mid frequency band. 展开更多
关键词 asymmetrical digital subscriber loop insertion loss TRANSFORMER WINDING
下载PDF
电信市话业务计算机管理中的客户定单调度 被引量:2
17
作者 魏志刚 《重庆邮电学院学报(自然科学版)》 2000年第1期55-58,共4页
在简单介绍电信市话业务计算机综合管理系统的基础上 ,针对其中的客户订单调度模块 ,从其所处的地位、功能的描述出发 ,通过对有关业务及数据流的分析 。
关键词 信息管理系统 客户定单调度 市话业务 计算机
下载PDF
Locating Global System for Mobile Communication(GSM)Base Stations Using Geographic Information System(GIS)
18
作者 Bamidele Moses Kuboye Victor Gbenga Abiodun 《Journal of Geographical Research》 2023年第4期1-10,共10页
The global system for mobile communication(GSM)is planned to meet the needs of the whole subscribers.The number of subscribers increased as the population increased due to the acceptance of GSM services by the subscri... The global system for mobile communication(GSM)is planned to meet the needs of the whole subscribers.The number of subscribers increased as the population increased due to the acceptance of GSM services by the subscribers.Thus,there should be a way to monitor base stations that will meet the increasing demand of subscribers in any area as a population surge will lead to more subscriptions.This will allow GSM network operators to serve their subscribers better and ease network congestion.This work presents a review of mobile evolution from the first generation to the fifth generation.A review of global positioning system(GPS)technology and its applications to geographic information systems(GIS)was done.The coordinates of these base stations were taken using a GPS device.These base station coordinates were then exported to QGIS for the design of the map.Thereafter,the output map was then integrated into the website.The discussions on the results followed and some useful suggestions given will go a long way to help the operators of GSM in Nigeria and in general.If the propositions given are adhered to,it will go a long way to help the operators reduce congestion on their network and thereby increase the satisfaction of the subscribers. 展开更多
关键词 Global system for mobile communication(GSM) Global positioning system(GPS) Geographic information system(GIS) subscriber MAP IMAGES
下载PDF
乡镇有线电视分支网光纤化改造 被引量:1
19
作者 杜前 《中国有线电视》 2010年第1期41-43,共3页
经过对比,论证了村分支网光纤化改造采用1550nm光波全程传输模式,是网络发展的必由之路,既符合网络"光进铜退"的发展规律,又能保证改造后的网络质量。
关键词 乡镇有线电视 分支网 FTTH
下载PDF
基于DDS的软件系统架构设计 被引量:1
20
作者 王浩 张洁 +2 位作者 陈威 魏启 张健 《物探装备》 2015年第3期174-177,182,共5页
DDS是一个分布式系统数据交换的网络编程公开标准,DDS中间件是建立在该标准上的高性能通信中间件,它提供了一套系统整合技术,一个支持发布/订阅设计思想的API接口。DDS专为实时分发系统设计,它定义了数据在网络中传输的通信模型和交互... DDS是一个分布式系统数据交换的网络编程公开标准,DDS中间件是建立在该标准上的高性能通信中间件,它提供了一套系统整合技术,一个支持发布/订阅设计思想的API接口。DDS专为实时分发系统设计,它定义了数据在网络中传输的通信模型和交互机制。基于DDS中间件技术,建立地震仪器主机软件系统的分布式架构,实现分布式计算和数据存储,以适应未来地震仪器更大带道能力和数据实时处理能力的迫切需求。 展开更多
关键词 DDS 中间件 实时数据分发 发布者 订阅者 主题 服务质量
下载PDF
上一页 1 2 57 下一页 到第
使用帮助 返回顶部