人工智人-家居设计-城市智能交通系统网络安全技术研究与设计.pdf
2022-07-04 16:03:14 10.85MB 人工智人-家居
蓉遵高速成仁段收费系统网络安全防护.pdf
2022-06-03 09:02:53 814KB web安全 文档资料 安全 资料
本文档主要是针对国网新出的网络安全检测装置技术规范。
2022-06-02 16:15:55 2.58MB 规范 电力
1
第四章 基于决策理论的调制样式识别 23 首先计算修正相位序列  C i :                 1 2 , 1 1 2 , 1 1 , C i i i C i C i i i C i                              如果 如果 其他 (4-22) 则无折叠相位  t 为      i i C i   = (4-23) 所以非线性相位由下式计算     2 c NL s f i i i f     = (4-24) 由此可见,计算非线性相位分量  NL i 必须确知载频 cf (3)非弱信号段判决门限 t a 的选取 在前面讨论的特征提取算法中,为了避免弱信号段信噪比差对特 征值提取的影响,都采用了在非弱信号段提取(瞬时相位或频率)特 征参数以及进行载频估计的特殊处理。如何选取非弱信号段,判决门 限 t a 的确定就成为问题的关键。显然 t a 选得太低,其作用就不大,而选 得太高则会丢失有用的相位信息而导致错误识别。一种比较直观的选 取 是以  na i 的平均值作为判决门限 ta ,即:       1 n t n a E a i a E a i m    (4-25) t a 值的这种直观分析判断与理论分析是相符合的。因为理论分析表明, 对模拟调制信号 t a 的最佳值 topt a 的变化范围为 0.858~1,而对数字调制 信号 topta 的变化范围为 0.9~1.05, 所以非弱信号段判决门限 ta 取为 1 是比较合适的。 4.4 仿真及结果分析 4.4.1 数字调制信号的产生 软件无线电中各种调制信号都是通过正交调制实现的,在 2.2 节 中已对 2 , 2 , 2ASK PSK FSK 和 QAM 信号的正交调制产生进行了具体说明。 下 面 将 叙 述 本 论 文 中 数 字 调 制 信 号 的 产 生 , 即 2 , 4 , 2 , 4 , 2 , 4ASK ASK PSK PSK FSK FSK 六种数字调制信号的产生。
2022-05-11 22:53:23 1.31MB matlab代码 数字信号调制 仿真
1
2.1 研究背景 调制方式识别是介于能量检测和信号完全解调之间的过程。对于 能量检测只要知道接收信号粗略的中心频率和带宽。而信号解调不仅 需要知道精确的中心频率和带宽,还必须知道该信号采用的调制方式 以及对应的调制参数。而调制方式识别的成功率则依赖于待识别调制 方式集合的情况,以及各种先验信息。当集合中待识别的调制方式较 多,尤其包含复杂调制方式时,就要求几乎精确的中心频率和带宽, 对于相对简单的识别集合,则可以适当放宽上述条件。 调制方式识别系统一般包括三个部分,即接收机前端、调制识别 器和输出部分。接收机前端完成信号检测和频率变换。调制识别器识 别信号的调制方式,并提取调制参数。输出部分实现信号解调的信息 处理。 调制方式识别是基于软件无线电的通信系统或者通信对抗应用的 重要环节。首先,只有正确地估计信号调制方式和参数,才能正确地 解调。其次,了解调制方式和参数有助于信号证实和确定合适的干扰 波形。 2.2 发展概况 早期的调制识别方法是采用一系列不同调制方式的解调器,接收 的高频信号经下变频为中频后,输入各解调器,获得可观察或可听的 信号,再由操作人员用耳机、示波器 或频谱仪分析解调结果,人为地 判定调制方式。操作员一般通过中频时域波形、信号频 谱、瞬时幅度、 瞬时频率和信号的声音等等信息进行判断。人工参与的识别需要有经 验的操作人员,一般可以成功识别持续较长时间、码元速率较低的幅 度键控(ASK)信号 和调制指数较大的频移键控(FSK)信号,但不 能识别需要相干处理的相移键控(PSK)信号。这种人工参与的识别 方法,判决结果包含人的主观因素在内,会因人而异,所能识别的调 制类型也很有限。而自动调制识别技术不仅可以克服人工参与识别时 遇到的各种困难,而且对中心频率和带宽的估计误差、相邻信道串音、 噪声和衰落效应等干扰因素也具有很强的鲁棒性。
2022-05-11 22:48:23 1.31MB matlab代码 数字信号调制 仿真
1
第八届国际智能计算学术会议 ICIC2012 http://www.ic-ic.org/2012/index.htm 日期:2012年7月25日至29日 地点:中国安徽省黄山市 网站:http://www.ic-ic.org/2012/index.htm 在线投稿系统:http://www.ic-ic.org/icg/ 国际智能计算学术会议(ICIC)自2005年始,由IEEE计算智能协会和国际神经网络委员会技术支持、国家自然科学基金委员会资助,已于中国合肥、昆明、青岛、上海、韩国蔚山、中国长沙、郑州成功举办七届。ICIC是面向国内外工作在人工智能、模式识别、进化计算、软计算、计算神经学、生物信息学等领域同行而举办的每年一次的盛会。ICIC系列会议每篇投稿文章至少将得到3个国际同行专家的审稿意见,已经被业界认为是重要的高质量的学术会议。 ICIC2012的论文集将由斯普林格(Springer)的计算机科学讲义(LNCS)、人工智能讲义(LNAI)、生物信息学讲义(LNBI)及计算机与信息科学通讯(CCIS)正式出版(全部将由 EI / ISTP等全文检索),部分高质量的论文将推荐到Neurocomputing和BMC Binformatics等国际SCI杂志发表。 更多会议详情请参阅ICIC2012官方网站:http://www.ic-ic.org/2012/index.htm 联系人:王丰翼 18918952345 E-mail:icic2012@163.com Apologies if you get multiple announcements Call for Papers 2012 International Conference on Intelligent Computing (ICIC’12) July 25-29, 2012 Huangshan, China (http://www.ic-ic.org/2012/index.htm) Internet based paper submission opens October 15, 2011 http://www.ic-ic.org/icg/ Paper Submission Deadline: January 1, 2012 This is the Eighth International Conference on Intelligent Computing, which is built upon the success of ICIC’05, ICIC’06, ICIC’07, ICIC’08, ICIC’09, ICIC’10, and ICIC’11 held in Hefei, Kunming, Qingdao, Shanghai/China Ulsan/Korea, Changsha, and Zhengzhou/China, respectively. The intelligent computing annual conference primarily aims to promote the research, development and application of advanced intelligent computing techniques by providing a vibrant and effective forum across a variety of disciplines. This conference has a further aim of increasing the awareness of industry of advanced intelligent computing techniques and the economic benefits that can be gained by implementing them. The intelligent computing technology includes a range of techniques such as Artificial Intelligence, Pattern Recognition, Evolutionary Computing, Informatics Theories and Applications, Computational Neuroscience & Bioscience, Soft Computing, Human Computer Interface Issues, etc. ICIC theme unifies the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference is Advanced Intelligent Computing Methodologies and Applications. Papers related to this theme are especially solicited, including theories, methodologies, and applications in science and technology. Topics covering industrial issues/applications and academic research into intelligent computing will be included, but not limited to: CONFERENCE TOPICS A. THEORIES AND METHODOLOGIES A1 Neural Networks A2 Evolutionary Learning & Genetic Algorithms A3 Granular Computing & Rough Sets A4 Fuzzy Theory and Models A5 Fuzzy Systems and Soft Computing A6 Particle Swarm Optimization and Niche Technology A7 Swarm Intelligence and Optimization A8 Supervised & Semi-supervised Learning A9 Unsupervised & Reinforcement Learning A10 Kernel Methods and Supporting Vector Machines A11 Independent Component Analysis and Blind Source Separation A12 Biology Inspired Computing and Optimization A13 Nature Inspired Computing and Optimization A14 Systems Biology and Computational Biology A15 Computational Genomics and Proteomics A16 Cognitive Science & Computational Neuroscience A17 Knowledge Discovery and Data Mining A18 Artificial Life and Artificial Immune Systems A19 Graph Theory and Algorithms A20 Quantum Computing A21 Ensemble Methods and Multiple Classifiers A22 Machine Learning Theory and Methods A23 Healthcare Informatics Theory and Methods A24 Biomedical Informatics Theory and Methods A25 Complex Systems Theory and Methods A26 Pervasive/Ubiquitous Computing Theory and Methods A27 Natural Language Processing and Computational Linguistics A28 Compressed Sensing and Sparse Coding B. EMERGING APPLICATIONS B1 Intelligent Computing in Bioinformatics B2 Intelligent Computing in Neuroinformatics & Cheminformatics B3 Intelligent Computing in Computational Biology and Drug Design B4 Intelligent Computing in Signal Processing B5 Intelligent Computing in Pattern Recognition B6 Intelligent Computing in Biometrics Recognition B7 Intelligent Computing in Image Processing B8 Intelligent Computing in Robotics B9 Intelligent Computing in Computer Vision B10 Intelligent Computing in Brain Imaging and Bio-medical Engineering B11 Intelligent Computing in Management B12 Intelligent Computing in Finance/Banking B13 Intelligent Computing in Communication Networks B14 Intelligent Computing in Petri Nets/Transportation Systems B15 Intelligent Computing in Social Networking B16 Intelligent Computing in Network Software/Hardware B17 Intelligent Control and Automation B18 Intelligent Image/Document Retrievals B19 Intelligent Data Fusion and Information Security B20 Intelligent Prediction & Time Series Analysis B21 Intelligent Agent and Web Applications B22 Intelligent Sensor Networks B23 Intelligent Fault Diagnosis B24 Knowledge Representation/Reasoning and Expert Systems B25 Virtual Reality and Human-Computer Interaction B26 Optical Networks/Processing B27 Business Intelligence and Multimedia Technology B28 Intelligent E-services/Smart Homes The conference proceedings will be published by Springer Verlag, including Lecture Notes in Computer Sciences (LNCS)/Lecture Notes in Artificial Intelligence (LNAI)/Lecture Notes in Bioinformatics (LNBI)/ Communications in Computer and Information Science (CCIS). And a small number of selected high-quality papers will be extended for possible inclusion in several main-stream international journals. Fees, if any, for subsequent journal publication, will have to be borne by the authors. Exhibition An exhibition will be held during the conference at the same venue. Research institutes, instruments companies, publication companies and industrial enterprises are welcome to participate. Exhibitors are encouraged to contact the secretariat for details Working Language English is the official language of the conference Important Dates Paper submission: January 1, 2012 Decision notification: April 10, 2012 Workshop/Special session proposal: December 20, 2011 Tutorial proposal: May 1, 2012 Camera-ready submission: April 25, 2012 Registration: April 25, 2012 Conference: July 25-29, 2012 For more information, please visit the conference website http://www.ic-ic.org/2012/index.htm. ICIC2012-Shanghai Secretariat wang fengyi 18918952345 icic2012@163.com
2022-05-01 18:06:27 432KB 计算机科学技术 智能系统 网络安全
1
某城市轨道交通信号系统网络安全案例解决方案
2022-02-17 16:01:57 12.3MB web安全 安全 轨道交通
BS IEC 62645-2019英文版全文
2022-02-07 20:00:18 18.66MB 信息安全
1
在电厂、并网变电站电力监控系统的安全Ⅱ区(或Ⅰ区)部署Ⅱ型网络安全监测装置,实现对网络安全事件的监视与管理。目前Ⅱ型网络安全监测装置可以实现对变电站及电厂涉网部分主机设备、网络设备、通用及专用安防设备的监视与告警,能够实时掌握变电站及电厂内部涉网主机的外设接入、网络设备接入、人员登录等安全事件。经过长期测试运行,设备状态稳定,满足了“内部介入有效遏制、安全风险有效管控”的安全防控目标。
2021-12-20 11:29:36 460KB 安全监测装置实施方案
1
系统开发安全要素检查完整汇总收录 包含:用户注册(注册用户遍历、任意用户注册、SQL注入)、XSS攻击、暴力破解、权限控制、表单提交、数据库控制、文件下载、数据传输、数据存储等
1