期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Direction of Arrivals Estimation for Correlated Broadband Radio Signals by MVDR Algorithm Using Wavelet 被引量:3
1
作者 Ying Liu Chi Xie Yourun Zhang 《China Communications》 SCIE CSCD 2017年第3期190-197,共8页
A theoretical relationship between the wavelet transform and the fast fourier transformation(FFT) methods in broadband wireless signal is proposed for solving the direction of arrivals(DOAs) estimation problem. This l... A theoretical relationship between the wavelet transform and the fast fourier transformation(FFT) methods in broadband wireless signal is proposed for solving the direction of arrivals(DOAs) estimation problem. This leads naturally to the derivation of minimum variance distortionless response(MVDR) algorithm, which combines the benefits of subspace methods with those of wavelet, and spatially smoothed versions are utilized which exhibits good performance against correlated signals. We test the method's performance by simulating and comparing the performance of proposed algorithm, FFT MVDR and MVDR with correlated signals, and an improved performance is obtained. 展开更多
关键词 array antenna broadband radio signal direction of arrival MVDR algorithm wavelet
下载PDF
A Probe into the Problems of Science English Teaching and Learning
2
作者 Feng Yun 《International Journal of Technology Management》 2016年第12期30-31,共2页
Under the background of economic globalization and information globalization, China’s higher education has also reformed correspondingly, namely, the internationalization of higher education. In this process, the tea... Under the background of economic globalization and information globalization, China’s higher education has also reformed correspondingly, namely, the internationalization of higher education. In this process, the teaching of professional courses in English (ie, professional English teaching) as many universities of international teaching methods. However, the research on the implementation of English teaching has not yet been fully carried out. In order to fill this vacancy, this article mainly takes the students who participated in the English course of Jiangsu University as the research object, through the questionnaire survey and individual interview way reveals the problems, difficulties and challenges in professional English teaching, and tries to propose the corresponding solution Teaching methods, so as to provide constructive suggestions for teaching management departments, teachers and students to implement professional English teaching and improve the efficiency of English teaching. In this case. 展开更多
关键词 internationalization of higher education professional English teaching student demand analysis
下载PDF
Attack Behavior Extraction Based on Heterogeneous Cyberthreat Intelligence and Graph Convolutional Networks 被引量:1
3
作者 Binhui Tang Junfeng Wang +3 位作者 Huanran Qiu Jian Yu Zhongkun Yu Shijia Liu 《Computers, Materials & Continua》 SCIE EI 2023年第1期235-252,共18页
The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats(APT).Extracting attack behaviors,i.e.,Tactics,Techniques,Procedures(TTP)from Cy... The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats(APT).Extracting attack behaviors,i.e.,Tactics,Techniques,Procedures(TTP)from Cyber Threat Intelligence(CTI)can facilitate APT actors’profiling for an immediate response.However,it is difficult for traditional manual methods to analyze attack behaviors from cyber threat intelligence due to its heterogeneous nature.Based on the Adversarial Tactics,Techniques and Common Knowledge(ATT&CK)of threat behavior description,this paper proposes a threat behavioral knowledge extraction framework that integrates Heterogeneous Text Network(HTN)and Graph Convolutional Network(GCN)to solve this issue.It leverages the hierarchical correlation relationships of attack techniques and tactics in the ATT&CK to construct a text network of heterogeneous cyber threat intelligence.With the help of the Bidirectional EncoderRepresentation fromTransformers(BERT)pretraining model to analyze the contextual semantics of cyber threat intelligence,the task of threat behavior identification is transformed into a text classification task,which automatically extracts attack behavior in CTI,then identifies the malware and advanced threat actors.The experimental results show that F1 achieve 94.86%and 92.15%for the multi-label classification tasks of tactics and techniques.Extend the experiment to verify the method’s effectiveness in identifying the malware and threat actors in APT attacks.The F1 for malware and advanced threat actors identification task reached 98.45%and 99.48%,which are better than the benchmark model in the experiment and achieve state of the art.The model can effectivelymodel threat intelligence text data and acquire knowledge and experience migration by correlating implied features with a priori knowledge to compensate for insufficient sample data and improve the classification performance and recognition ability of threat behavior in text. 展开更多
关键词 Attack behavior extraction cyber threat intelligence(CTI) graph convolutional network(GCN) heterogeneous textual network(HTN)
下载PDF
A KAD Network Evolution Model Based on Node Behavior
4
作者 WANG Jian FENG Weisen 《China Communications》 SCIE CSCD 2014年第10期67-73,共7页
An evolution model of KAD Dynamic Model Network(KDMN) is proposed to study the reason of hot node and simulate the process of network evolution based on node behavior from a holistic perspective.First,some symbols and... An evolution model of KAD Dynamic Model Network(KDMN) is proposed to study the reason of hot node and simulate the process of network evolution based on node behavior from a holistic perspective.First,some symbols and meanings are introduced to describe nodes relationship and network states at a time step.Second,some evolution rules for network are formulated when node behaviors of join,exit,routing table update,data retrieval and content index distribution happen with different contextual scene in KAD network.In addition,a lightweight simulator is designed to implement the KDMN model.Moreover,an example of how to use the simulator to simulate the network changes in order to observe the result is described in detail.Finally,the KDMN is applied to analyze the reason for the formation of hot nodes in the BT and eMule network in the experiment.The different evolution principles of local priority,global priority and hybrid random are adopted based on the provision of network protocol of BT and eMule.The result of this experiment demonstrates that there are some hot nodes exist in the KAD network.However,the principle of hybrid random can effectively alleviate the phenomenon that a node is widely linked with others compared with global and local priority. 展开更多
关键词 KAD evolution model nodebehavior SIMULATOR
下载PDF
Study on the Self-supporting Logistics Mode based on B2C E-commerce Enterprises
5
作者 Ting LI 《International Journal of Technology Management》 2015年第2期87-89,共3页
Taking B2C E-commerce enterprises as the center, it can be divided into a set of logistics activities upstream supply chain logistics producer to B2C e-commerce enterprises, and the B2C e-commerce enterprise logistics... Taking B2C E-commerce enterprises as the center, it can be divided into a set of logistics activities upstream supply chain logistics producer to B2C e-commerce enterprises, and the B2C e-commerce enterprise logistics to client consumer, and the paper focuses on the study of self-supporting logistics for the E-commerce enterprise. According to the development status of current B2C electronic commerce enterprise in our country and logistics, the paper study B2C electric business enterprise how to correctly choose the logistics mode and how to promote the business logistics operation level. 展开更多
关键词 B2C E-commerce Logistics distribution Self-supporting Logistics Mode Operating mechanism
下载PDF
An Investigation into Longitudinal CET Washback from Teachers’ Perspective
6
作者 PengYingying 《International Journal of Technology Management》 2016年第12期80-82,共3页
Washback refers to the influence of testing on teaching and learning. The College English Test (CET) is an educational, standardized, criterion-related norm-referenced test. Since 2005, CET has undergone tremendous ... Washback refers to the influence of testing on teaching and learning. The College English Test (CET) is an educational, standardized, criterion-related norm-referenced test. Since 2005, CET has undergone tremendous innovations and the test innovation has been implemented nationwide since 2007. The present study attempts to investigate the longitudinal CET washback from teachers’ perspective, aiming to address: Does CET washback change over time? Questionnaire surveys were employed as the main research instrument in the present study, complemented by classroom observations and interviews. The research findings show that CET exerts more positive washback than negative one on CE teaching. 展开更多
关键词 CET the CET innovation washback CE teaching
下载PDF
Rectifying Names Is a Must——Xun Zi's Linguistic Ideas in Zhengming
7
作者 易兰 《海外英语》 2012年第2X期251-252,共2页
In China, Warring States Period was imbued with chaos of wars and the whole society was in a state of ferment. The disordered phase in ideological area, as the most direct reflection of the change, was characterized b... In China, Warring States Period was imbued with chaos of wars and the whole society was in a state of ferment. The disordered phase in ideological area, as the most direct reflection of the change, was characterized by that all the old ethical standard had been badly weaken, even failed to explain the moral facts. In terms of common people, they were confused and puzzled by the questions as "what is language?" and "what is the standard of speaking and behavior?" Some ancient scholars pinned these problems upon the reversal of "ming" (名) and "shi" (实). As a result, to rectify names and to clarify the name of ethics became a must for reconstructing the old proprieties and system. Among those scholars and thinkers, Xun Zi firstly proposed Zhengming to state the relationship between a name and the thing it represents in a systematical way. This essay only sheds light upon the reason of rectifying names: to distinguish the rank and differentiate the similarities and differences("明贵贱,辨同异")which is the must of "rectifying names". 展开更多
关键词 LINGUISTIC ideas Xun Zi Zhengming "ming" (名) and "
下载PDF
High Sensitivity Gas Sensor Based on IR Spectroscopy Technology and Application 被引量:1
8
作者 Hengyi LI 《Photonic Sensors》 SCIE EI CAS CSCD 2016年第2期127-131,共5页
Due to extremely effective advantages of the quantum cascade laser spectroscopy and technology for trace gas detection, this paper presents spectroscopy scanning, the characteristics of temperature tuning, system reso... Due to extremely effective advantages of the quantum cascade laser spectroscopy and technology for trace gas detection, this paper presents spectroscopy scanning, the characteristics of temperature tuning, system resolution, sensitivity, and system stability with the application of the presented gas sensor. Experimental results showed that the sensor resolution was 〈0.01cm-1 (equivalent to 0.06nm), and the sensor sensitivity was at the level of 194 ppb with the application of HzCO measurement. 展开更多
关键词 Quantum cascade laser IR spectroscopy high sensitivity FORMALDEHYDE
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部