共查询到20条相似文献,搜索用时 9 毫秒
1.
对当今主流数字通信系统中的差错控制技术进行了分析,并针对其不足提出了一种
新型差错控制方案。利用两条信道同时传输数字信息,传送的信息相位相反,信息中无监督
码元,在接收端利用差分技术对这两个信号进行处理。分析表明,该方案在信号的传信率、
误码率和编码效率指标上优于传统差错控制技术,且实现更为简单。 相似文献
2.
3.
固定无线接入系统中语音业务的接入方法进行了研究,介绍了固定无线接入系统的结构,分析了当前广泛采用的V5接口的优缺点,提出了一种基于ISDN一次群速率接口的接入方案并给出了其具体实现方法。 相似文献
4.
5.
6.
Md. Enamul Kabir Hua Wang Elisa Bertino 《Journal of Organizational Computing & Electronic Commerce》2013,23(1):71-91
This paper presents a conditional role-involved purpose-based access control (CPAC) model, where users dynamically activate conditional roles in accordance with the context attributes. Based on conditional role, access permissions are assigned that represent what can be accessed for what purpose to roles under certain conditions. On the other hand, conditional purpose is applied along with allowed purpose and prohibited purpose in the model. It allows users using some data for certain purpose with conditions (for instance, Tony agrees that his income information can be used for marketing purposes by removing his name). The structure of a CPAC model is defined and investigated. Access purpose is verified in a dynamic behavior, based on user attributes, context attributes, and authorization policies. Intended purposes are dynamically associated with the requested data object during the access decision. An algorithm is developed to achieve the compliance computation between access purposes and intended purposes and is illustrated with role-based access control (RBAC). Access purpose authorization and authentication in the model are studied with the hierarchical purpose structure. The model separates authorization of access purpose from access decision that improves the flexibility of private data control. 相似文献
7.
Despite the increasing academic interest and financial support for the Physical Internet (PI), surprisingly little is known about its operationalization and implementation. In this paper, we suggest studying the PI on the basis of the Digital Internet (DI), which is a well‐established entity. We propose a conceptual framework for the PI network using the DI as a starting point, and find that the PI network not only needs to solve the reachability problem, that is, how to route an item from A to B, but also must confront a more complicated optimality problem, that is, how to dynamically optimize a set of additional logistics‐related metrics such as cost, emissions and time for a shipment. These last issues are less critical for the DI and handled using relatively simpler procedures. Based on our conceptual framework, we then propose a simple network model using graph theory to support the operationalization of the PI. The model covers the characteristics of the PI raised in the current literature and suggests future directions for further quantitative analyses. 相似文献
8.
9.
提出了一种基于CDMA/TDMA混合多址的GSM与CDMA扩容方法。在发送端,通过扩频码对GSM信号进行直接序列扩频,使其多址方式由TDMA变换为CDMA/TDMA,然后与CDMA信号在空间同频传输,这样就可以解决两个系统在Um接口的兼容问题;在接收端,使用相同的扩频码对CDMA/TDMA信号进行解扩,使其多址方式由CDMA/TDMA还原为TDMA,由此可以将GSM与CDMA两种信号进行分离。文章提出了用互补码集作为多址接入码,并给出了一个时隙内GSM用户被扩频调制的具体过程。理论分析和仿真结果表明,该方法可使系统总容量扩大2倍。 相似文献
10.
11.
Stevan Gostojić Branko Milosavljević Zora Konjović 《Journal of Organizational Computing & Electronic Commerce》2013,23(2):184-213
During the past two decades, e-government information systems have become less paper-based and more computer-based. Those information systems usually take the form of workflow systems. Due to the large social impact of e-government systems, computer security plays a pivotal role in ensuring its efficiency and effectiveness. Access control is one of the key aspects of computer security. Current access control models do not take into account the context of the system and its environment. In this article, we argue that a formal context-sensitive access control model can improve the development of e-government workflow systems and present a particular context-sensitive access control model. The subject of the article is a specification of the context-sensitive access control model for business processes (COBAC). By using a context-sensitive access control, it is possible to define more sophisticated access control policies that cannot be implemented by existing access control models. The COBAC's context is modeled using Web Ontology Language (OWL) in order to provide formal representation of context, rich representation of diverse contextual information, semantic interoperability between various context-aware systems, and a high degree of inference making. The presented model is applicable in different e-government systems, and supports the definition of access control policies for both simple and complex business processes. The model's prototype is verified by a case study on a real e-government business process—the national petty offense trial proceedings. 相似文献
12.
Even as the Internet continues to grow as a global platform for communication and commerce, the success of new value offerings on the Internet hinges on acquisition of new customers and retention of existing customers. Central to the flow of customers in and out of trial and repeat behavior in this burgeoning and dynamic environment, characterized by diversity among both producers and consumers of value offerings, is the process of social contagion—active word of mouth that flows among customers or passive observation of others. To estimate contagion on the Internet, the authors develop a trial-repeat purchase diffusion model for successive innovations in value offerings on the Internet. The model extends the state-of-the-art diffusion modeling by incorporating (i) dynamic market potential, (ii) heterogeneity among first-time triers, (iii) heterogeneity in word of mouth due to repeat buyers and non-repeaters (i.e., positive and negative word of mouth), and (iv) dynamic repeat purchase rate. The model also incorporates the influence of product characteristics, specifically source of innovation (i.e., whether the innovation is driven by environmental needs or competitive pressures) and product bundling, and competition. The authors test the model with weekly adoption data for 11 computer software products available on the shareware system, involving over 100 new versions in the period 1991–1994, and in a market whose size grows by a factor of fifty from early 1991 to late 1994. The findings clarify the role of word of mouth effects, competition, and product characteristics in fostering the diffusion process for digital information goods. 相似文献
13.
针对全球导航卫星系统(Global Navigation Satellite System,GNSS)高精度相对定位的无人机编队飞行应用中的信息交互与通信时延问题,首先优化设计了编队飞行网络拓扑,实现所有成员的信息交互且通信代价最小;其次,基于优化设计的网络,提出一种新的通信信道接入机制;最后对16机编队飞行场景进行了仿真分析,评估通信网络及相对定位性能。结果表明,编队成员端到端通信时延小于20 ms,且当通信与载波相位差分处理的总时延小于相对位置感知时间间隔时,相对位置感知精度可达到亚分米级,且感知误差与时延和载体运动状态相关。 相似文献
14.
15.
The Hierarchy of Internet Communication Effects: A New Paradigm for Understanding Internet Promotion
《Journal of Internet Commerce》2013,12(4):165-181
ABSTRACT The applicability of the traditional marketing models to online marketplaces has been of great interest since the advent of the Internet. This study examines the applicability of the Hierarchy of Communication Effects model to the online auction environment through the use of proprietary archival data. The results provide support for a new model, which we call the Hierarchy of Internet Communications Effects, which is applicable to online environments. The Hierarchy of Internet Communications Effects is analogous to other hierarchical effects models from consumer behavior literature known as the learning hierarchies. We provide suggestions to promote products or services at different stages in the Hierarchy of Internet Communications Effects; several implications and limitations are discussed, and future research is suggested. 相似文献
16.
《Journal of Internet Commerce》2013,12(3):87-98
ABSTRACT This paper presents a methodology for designing and deploying electronic enterprises–a step beyond intuitive or rule-based approaches. As a starting point, the paper presents a cyclical-model consisting of three e-business development phases: conceptualization, simulation, and implementation. Since an e-business “idea” rarely springs forth complete and ready to go, realizing the idea–that is, turning it into a commercial product, system, process, or profitable enterprise–requires business development. Business development requires analysis of the potential organizational structures, IT architectures, HR policies and procedures, strategies, market niche, partnership agreements, and so on, until a satisfactory enterprise design is found. Such consideration and experimentation can be done mentally (intuitively), or by drawing on a napkin (informally), or more logically using strategic and marketing analysis, revenue/cost/asset/operational business models, computer simulations, and other quantitative and qualitative management practices and techniques. In any case, only rarely is the result of the first development effort completely satisfactory, perhaps the business system or process will be too difficult to develop, too complex, or too costly to implement, maintain, or sell. So, once again the business idea goes into the cycle of developing, testing, redeveloping, implementing, and re-testing. Succinctly, the methodology advocated in this paper provides a framework for guiding the e-business development process. 相似文献
17.
《Journal of Internet Commerce》2013,12(1):35-60
ABSTRACT The objective of this study was to analyze the effectiveness of various aspects relating to execution of a Website: Presentation format, quantity and type of content. We developed experimental Websites and we found that in high-involvement context this effectiveness is not influenced as much by the format of presentation of the Website as by the quantity and type of content offered. The extension of the Website content generates more favorable, affective and behavioral responses only when such extension has an informative nature. Moreover, we found evidence of the moderating role of the individual's Web experience in the advertising persuasion process. Therefore, the results of this investigation can provide recommendations to the organizations on how to create effective Websites. 相似文献
18.
Experts and Amateurs: The Role of Experience in Internet Auctions 总被引:11,自引:1,他引:10
The use of auctions as a pricing mechanism has grown dramatically over the last few years. The introduction of electronic auctions has significantly widened the pool of consumers who participate in auctions and increased the number of companies attempting to sell their products in an auction format. Previous empirical research on auctions has focused almost exclusively on the behavior of professional bidders in high stakes common value auctions or the behavior of students in laboratory experiments. We collect data on a large number of electronic auctions, across four product categories, to explore the behavior of consumers bidding in a real marketplace. In particular, we focus on the role experience plays in their bidding behavior to uncover whether consumer learning drives the bidding process towards outcomes described in the theoretical literature on auctions. We find that experience does indeed lead to behavior which is more consistent with theory although the proportion of experienced bidders who behave in a manner inconsistent with theory remains quite large. 相似文献
19.
本文提出了一种简单而实用的利用短时DFT(ST-DFT)分析实现全数字2DPSK接收机的解调算法。该算法对由多谱勒效应引起的时变频率漂移具有鲁棒性。由于该算法是通过检测在载频处的瞬时能量谱的跳变来实现2DPSK信号的解调,所以该算法不需要进行专门的载波相位恢复、符号定时,且具有较好的抗噪性能,实现起来简单。 相似文献