How to establish a secure and efficient quantum network coding algorithm isone of important research topics of quantum secure communications. Based on thebutterfly network model and the characteristics of easy prepara...How to establish a secure and efficient quantum network coding algorithm isone of important research topics of quantum secure communications. Based on thebutterfly network model and the characteristics of easy preparation of Bell states, a novelanti-noise quantum network coding protocol is proposed in this paper. The new protocolencodes and transmits classical information by virtue of Bell states. It can guarantee thetransparency of the intermediate nodes during information, so that the eavesdropper Evedisables to get any information even if he intercepts the transmitted quantum states. Inview of the inevitability of quantum noise in quantum channel used, this paper analyzesthe influence of four kinds of noises on the new protocol in detail further, and verifies theefficiency of the protocol under different noise by mathematical calculation and analysis.In addition, based on the detailed mathematical analysis, the protocol has functioned wellnot only on improving the efficiency of information transmission, throughput and linkutilization in the quantum network, but also on enhancing reliability and antieavesdroppingattacks.展开更多
We study the magnetic effect of the checkerboard superconducting wire network. Based on the de Gennes- Alexader theory, we obtain difference equations for superconducting order parameter in the wire network. Through s...We study the magnetic effect of the checkerboard superconducting wire network. Based on the de Gennes- Alexader theory, we obtain difference equations for superconducting order parameter in the wire network. Through solving these difference equations, we obtain the eigenvalues, linked to the coherence length, as a function of magnetic field. The diagram of eigenvalues shows a fractal structure, being so-called Hofstadter's butterfly. We also calculate and discuss the dependence of the transition temperature of the checkerboard superconducting wire network on the applied magnetic field, which is related to up-edge of the Hofstadter's butterfly spectrum.展开更多
Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly desirable.Despite this,with its distributed and dynamic nature and shortcomings in virtualiz...Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly desirable.Despite this,with its distributed and dynamic nature and shortcomings in virtualization deployment,the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties.The Intrusion Detection System(IDS)is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources.DDoS attacks are becoming more frequent and powerful,and their attack pathways are continually changing,which requiring the development of new detection methods.Here the purpose of the study is to improve detection accuracy.Feature Selection(FS)is critical.At the same time,the IDS’s computational problem is limited by focusing on the most relevant elements,and its performance and accuracy increase.In this research work,the suggested Adaptive butterfly optimization algorithm(ABOA)framework is used to assess the effectiveness of a reduced feature subset during the feature selection phase,that was motivated by this motive Candidates.Accurate classification is not compromised by using an ABOA technique.The design of Deep Neural Networks(DNN)has simplified the categorization of network traffic into normal and DDoS threat traffic.DNN’s parameters can be finetuned to detect DDoS attacks better using specially built algorithms.Reduced reconstruction error,no exploding or vanishing gradients,and reduced network are all benefits of the changes outlined in this paper.When it comes to performance criteria like accuracy,precision,recall,and F1-Score are the performance measures that show the suggested architecture outperforms the other existing approaches.Hence the proposed ABOA+DNN is an excellent method for obtaining accurate predictions,with an improved accuracy rate of 99.05%compared to other existing approaches.展开更多
Since the introduction of the Internet of Things(IoT),several researchers have been exploring its productivity to utilize and organize the spectrum assets.Cognitive radio(CR)technology is characterized as the best asp...Since the introduction of the Internet of Things(IoT),several researchers have been exploring its productivity to utilize and organize the spectrum assets.Cognitive radio(CR)technology is characterized as the best aspirant for wireless communications to augment IoT competencies.In the CR networks,secondary users(SUs)opportunistically get access to the primary users(PUs)spectrum through spectrum sensing.The multipath issues in the wireless channel can fluster the sensing ability of the individual SUs.Therefore,several cooperative SUs are engaged in cooperative spectrum sensing(CSS)to ensure reliable sensing results.In CSS,security is still a major concern for the researchers to safeguard the fusion center(FC)against abnormal sensing reports initiated by the malicious users(MUs).In this paper,butterfly optimization algorithm(BOA)-based soft decision method is proposed to find an optimized weighting coefficient vector correlated to the SUs sensing notifications.The coefficient vector is utilized in the soft decision rule at the FC before making any global decision.The effectiveness of the proposed scheme is compared for a variety of parameters with existing schemes through simulation results.The results confirmed the supremacy of the proposed BOA scheme in both the normal SUs’environment and when lower and higher SNRs information is carried by the different categories of MUs.展开更多
We propose a reeonfigurable control-bit generation algorithm for rotation and sub-word rotation operations. The algorithm uses a self-routing characteristic to configure an inverse butterfly network. In addition to be...We propose a reeonfigurable control-bit generation algorithm for rotation and sub-word rotation operations. The algorithm uses a self-routing characteristic to configure an inverse butterfly network. In addition to being highly parallelized and inexpensive, the algorithm integrates the rotation-shift, bi-directional rotation-shift, and sub-word rotation-shift operations. To our best knowledge, this is the first scheme to accommodate a variety of rotation operations into the same architecture. We have developed the highly efficient reconfigurable rotation unit (HERRU) and synthesized it into the Semiconductor Manufacturing International Corporation (SMIC)'s 65-nm process. The results show that the overall efficiency (relative areaxrelative latency) of our HERRU is higher by at least 23% than that of other designs with similar functions. When executing the bi-directional rotation operations alone, HERRU occupies a significantly smaller area with a lower latency than previously proposed designs.展开更多
One of the most recent developments in the field of graph theory is the analysis of networks such as Butterfly networks,Benes networks,Interconnection networks,and David-derived networks using graph theoretic paramete...One of the most recent developments in the field of graph theory is the analysis of networks such as Butterfly networks,Benes networks,Interconnection networks,and David-derived networks using graph theoretic parameters.The topological indices(TIs)have been widely used as graph invariants among various graph theoretic tools.Quantitative structure activity relationships(QSAR)and quantitative structure property relationships(QSPR)need the use of TIs.Different structure-based parameters,such as the degree and distance of vertices in graphs,contribute to the determination of the values of TIs.Among other recently introduced novelties,the classes of ev-degree and ve-degree dependent TIs have been extensively explored for various graph families.The current research focuses on the development of formulae for different ev-degree and ve-degree dependent TIs for s−dimensional Benes network and certain networks derived from it.In the end,a comparison between the values of the TIs for these networks has been presented through graphical tools.展开更多
Nowadays,commercial transactions and customer reviews are part of human life and various business applications.The technologies create a great impact on online user reviews and activities,affecting the business proces...Nowadays,commercial transactions and customer reviews are part of human life and various business applications.The technologies create a great impact on online user reviews and activities,affecting the business process.Customer reviews and ratings are more helpful to the new customer to purchase the product,but the fake reviews completely affect the business.The traditional systems consume maximum time and create complexity while analyzing a large volume of customer information.Therefore,in this work optimized recommendation system is developed for analyzing customer reviews with minimum complexity.Here,Amazon Product Kaggle dataset information is utilized for investigating the customer review.The collected information is analyzed and processed by batch normalized capsule networks(NCN).The network explores the user reviews according to product details,time,price purchasing factors,etc.,ensuring product quality and ratings.Then effective recommendation system is developed using a butterfly optimized matrix factorizationfiltering approach.Then the system’s efficiency is evaluated using the Rand Index,Dunn index,accuracy,and error rate.展开更多
文摘How to establish a secure and efficient quantum network coding algorithm isone of important research topics of quantum secure communications. Based on thebutterfly network model and the characteristics of easy preparation of Bell states, a novelanti-noise quantum network coding protocol is proposed in this paper. The new protocolencodes and transmits classical information by virtue of Bell states. It can guarantee thetransparency of the intermediate nodes during information, so that the eavesdropper Evedisables to get any information even if he intercepts the transmitted quantum states. Inview of the inevitability of quantum noise in quantum channel used, this paper analyzesthe influence of four kinds of noises on the new protocol in detail further, and verifies theefficiency of the protocol under different noise by mathematical calculation and analysis.In addition, based on the detailed mathematical analysis, the protocol has functioned wellnot only on improving the efficiency of information transmission, throughput and linkutilization in the quantum network, but also on enhancing reliability and antieavesdroppingattacks.
基金Supported by the Teaching and Research Foundation for the Outstanding Young Faculty of Southeast University
文摘We study the magnetic effect of the checkerboard superconducting wire network. Based on the de Gennes- Alexader theory, we obtain difference equations for superconducting order parameter in the wire network. Through solving these difference equations, we obtain the eigenvalues, linked to the coherence length, as a function of magnetic field. The diagram of eigenvalues shows a fractal structure, being so-called Hofstadter's butterfly. We also calculate and discuss the dependence of the transition temperature of the checkerboard superconducting wire network on the applied magnetic field, which is related to up-edge of the Hofstadter's butterfly spectrum.
文摘Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly desirable.Despite this,with its distributed and dynamic nature and shortcomings in virtualization deployment,the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties.The Intrusion Detection System(IDS)is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources.DDoS attacks are becoming more frequent and powerful,and their attack pathways are continually changing,which requiring the development of new detection methods.Here the purpose of the study is to improve detection accuracy.Feature Selection(FS)is critical.At the same time,the IDS’s computational problem is limited by focusing on the most relevant elements,and its performance and accuracy increase.In this research work,the suggested Adaptive butterfly optimization algorithm(ABOA)framework is used to assess the effectiveness of a reduced feature subset during the feature selection phase,that was motivated by this motive Candidates.Accurate classification is not compromised by using an ABOA technique.The design of Deep Neural Networks(DNN)has simplified the categorization of network traffic into normal and DDoS threat traffic.DNN’s parameters can be finetuned to detect DDoS attacks better using specially built algorithms.Reduced reconstruction error,no exploding or vanishing gradients,and reduced network are all benefits of the changes outlined in this paper.When it comes to performance criteria like accuracy,precision,recall,and F1-Score are the performance measures that show the suggested architecture outperforms the other existing approaches.Hence the proposed ABOA+DNN is an excellent method for obtaining accurate predictions,with an improved accuracy rate of 99.05%compared to other existing approaches.
基金This work was supported in part by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(No.2016R1C1B1014069)in part by the National Research Foundation of Korea(NRF)funded by the Korea government(MIST)(No.2021R1A2C1013150).
文摘Since the introduction of the Internet of Things(IoT),several researchers have been exploring its productivity to utilize and organize the spectrum assets.Cognitive radio(CR)technology is characterized as the best aspirant for wireless communications to augment IoT competencies.In the CR networks,secondary users(SUs)opportunistically get access to the primary users(PUs)spectrum through spectrum sensing.The multipath issues in the wireless channel can fluster the sensing ability of the individual SUs.Therefore,several cooperative SUs are engaged in cooperative spectrum sensing(CSS)to ensure reliable sensing results.In CSS,security is still a major concern for the researchers to safeguard the fusion center(FC)against abnormal sensing reports initiated by the malicious users(MUs).In this paper,butterfly optimization algorithm(BOA)-based soft decision method is proposed to find an optimized weighting coefficient vector correlated to the SUs sensing notifications.The coefficient vector is utilized in the soft decision rule at the FC before making any global decision.The effectiveness of the proposed scheme is compared for a variety of parameters with existing schemes through simulation results.The results confirmed the supremacy of the proposed BOA scheme in both the normal SUs’environment and when lower and higher SNRs information is carried by the different categories of MUs.
基金Project supported by the National Natural Science Foundation of China (No. 61404175)
文摘We propose a reeonfigurable control-bit generation algorithm for rotation and sub-word rotation operations. The algorithm uses a self-routing characteristic to configure an inverse butterfly network. In addition to being highly parallelized and inexpensive, the algorithm integrates the rotation-shift, bi-directional rotation-shift, and sub-word rotation-shift operations. To our best knowledge, this is the first scheme to accommodate a variety of rotation operations into the same architecture. We have developed the highly efficient reconfigurable rotation unit (HERRU) and synthesized it into the Semiconductor Manufacturing International Corporation (SMIC)'s 65-nm process. The results show that the overall efficiency (relative areaxrelative latency) of our HERRU is higher by at least 23% than that of other designs with similar functions. When executing the bi-directional rotation operations alone, HERRU occupies a significantly smaller area with a lower latency than previously proposed designs.
基金supported by the National Natural Science Foundation of China (Grant No.61702291)China Henan International Joint Laboratory for Multidimensional Topology and Carcinogenic Characteristics Analysis of Atmospheric Particulate Matter PM2.5.
文摘One of the most recent developments in the field of graph theory is the analysis of networks such as Butterfly networks,Benes networks,Interconnection networks,and David-derived networks using graph theoretic parameters.The topological indices(TIs)have been widely used as graph invariants among various graph theoretic tools.Quantitative structure activity relationships(QSAR)and quantitative structure property relationships(QSPR)need the use of TIs.Different structure-based parameters,such as the degree and distance of vertices in graphs,contribute to the determination of the values of TIs.Among other recently introduced novelties,the classes of ev-degree and ve-degree dependent TIs have been extensively explored for various graph families.The current research focuses on the development of formulae for different ev-degree and ve-degree dependent TIs for s−dimensional Benes network and certain networks derived from it.In the end,a comparison between the values of the TIs for these networks has been presented through graphical tools.
文摘Nowadays,commercial transactions and customer reviews are part of human life and various business applications.The technologies create a great impact on online user reviews and activities,affecting the business process.Customer reviews and ratings are more helpful to the new customer to purchase the product,but the fake reviews completely affect the business.The traditional systems consume maximum time and create complexity while analyzing a large volume of customer information.Therefore,in this work optimized recommendation system is developed for analyzing customer reviews with minimum complexity.Here,Amazon Product Kaggle dataset information is utilized for investigating the customer review.The collected information is analyzed and processed by batch normalized capsule networks(NCN).The network explores the user reviews according to product details,time,price purchasing factors,etc.,ensuring product quality and ratings.Then effective recommendation system is developed using a butterfly optimized matrix factorizationfiltering approach.Then the system’s efficiency is evaluated using the Rand Index,Dunn index,accuracy,and error rate.