期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
Photon subtraction-based continuous-variable measurement-device-independent quantum key distribution with discrete modulation over a fiber-to-water channel
1
作者 Chao Yu Yin Li +2 位作者 Jianzhi Ding Yun Mao Ying Guo 《Communications in Theoretical Physics》 SCIE CAS CSCD 2022年第3期36-43,共8页
We propose a discrete-modulated continuous-variable measurement-device-independent quantum key distribution protocol over a fiber-to-water channel.Different from optical fibers,the underwater channel has more severe o... We propose a discrete-modulated continuous-variable measurement-device-independent quantum key distribution protocol over a fiber-to-water channel.Different from optical fibers,the underwater channel has more severe optical attenuation because of optical absorption and scattering,which reduces the maximum communication distance.To enhance the performance of the protocol,the photon subtraction operation is implemented at the modulator side.We carry out a performance simulation in two different kinds of seawater channel,and the result shows that the scheme with photon subtraction has a longer secure communication distance under certain conditions. 展开更多
关键词 measurement-device-independent discrete modulation fiber-to-water channel continuous variable quantum key distribution
原文传递
An autobias control system for the electro optic modulator used in a quantum key distribution system 被引量:1
2
作者 陈文芬 魏正军 +6 位作者 郭莉 侯丽燕 王赓 王金东 张智明 郭建平 刘颂豪 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第8期261-268,共8页
In a quantum key distribution system, it is crucial to keep the extinction ratio of the coherent pulses stable. This means that the direct current bias point of the electro-optic modulator (EOM) used for generating ... In a quantum key distribution system, it is crucial to keep the extinction ratio of the coherent pulses stable. This means that the direct current bias point of the electro-optic modulator (EOM) used for generating coherent pulses must be locked. In this paper, an autobias control system based on a lock-in-amplifier for the EOM is introduced. Its drift information extracting theory and control method are analyzed comprehensively. The long term drift of the extinction ratio of the coherent pulses is measured by a single photon detector, which indicates that the autobias control system is effective for stabilizing the bias point of the EOM. 展开更多
关键词 quantum key distribution electro-optic modulator autobias control lock-in-amplifier
原文传递
Deterministic quantum key distribution based on Gaussian-modulated EPR correlations 被引量:1
3
作者 何广强 曾贵华 《Chinese Physics B》 SCIE EI CAS CSCD 2006年第6期1284-1289,共6页
This paper proposes a deterministic quantum key distribution scheme based on Gaussian-modulated continuous variable EPR correlations. This scheme can implement fast and efficient key distribution. The security is guar... This paper proposes a deterministic quantum key distribution scheme based on Gaussian-modulated continuous variable EPR correlations. This scheme can implement fast and efficient key distribution. The security is guaranteed by continuous variable EPR entanglement correlations produced by nondegenerate optical parametric amplifier. For general beam splitter eavesdropping strategy, the secret information rate ΔI = I(α, β)-I(α, ε) is calculated in view of Shannon information theory. Finally the security analysis is presented. 展开更多
关键词 quantum key distribution continuous variable EPR correlation Gaussian modulation
原文传递
Passive decoy-state quantum key distribution using weak coherent pulses with modulator attenuation
4
作者 李源 鲍皖苏 +2 位作者 李宏伟 周淳 汪洋 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第11期118-124,共7页
Passive decoy-state quantum key distribution is more desirable than the active one in some scenarios. It is also affected by the imperfections of the devices. In this paper, the influence of modulator attenuation on t... Passive decoy-state quantum key distribution is more desirable than the active one in some scenarios. It is also affected by the imperfections of the devices. In this paper, the influence of modulator attenuation on the passive decoy-state method is considered. We introduce and analyze the unbalanced Mach-Zehnder interferometer, briefly, and combining with the virtual source and imaginary unitary transformation, we characterize the passive decoy-state method using a weak coherent photon source with modulator attenuation. According to the attenuation parameter 6, the pass efficiencies are given. Then, the key generation rate can be acquired. From numerical simulations, it can be seen that modulator attenuation has a non- negligible influence on the performance of passive-state QKD protocol. Based on the research, the analysis method of virtual source and imaginary unitary transformation are preferred in analyzing passive decoy state protocol, and the passive decoy-state method is better than the active one and is close to the active vacuum + weak decoy state under the condition of having the same modulator attenuation. 展开更多
关键词 quantum key distribution passive decoy state modulator attenuation weak coherent pulses
原文传递
A Study on the Static Characteristics of Typical Composite High Speed On-Off Valves
5
作者 陈宝江 曹泛 《Journal of Beijing Institute of Technology》 EI CAS 1994年第1期81+75-81,共8页
Natural properties of high speed on-off valves can be described through their on-off behavior and spool movement (static and oscillating) characteristics. High speed on-off valves can be combined with actuators in sys... Natural properties of high speed on-off valves can be described through their on-off behavior and spool movement (static and oscillating) characteristics. High speed on-off valves can be combined with actuators in systems into four typical types of composite valves whose static characteristics are related not only to the structures of the single valves and the composite ones, but also to the PWM control modes. It is proved that the composite valves have similar features as those of servo valves. The nonlinear specific properties of single valves composited can be completely compensated by the suitable PWM control modes. 展开更多
关键词 electrohydraulic servo systems pulse width modulation static characteristics /high speed on-off valves
在线阅读 下载PDF
The Mechanism about Key and Credential on Trusted Computing Platform and the Application Study 被引量:2
6
作者 SHEN Zhidong ZHANG Huanguo ZHANG Miao YAN Fei ZHANG Liqiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1641-1644,共4页
Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cry... Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system. 展开更多
关键词 trusted computing trusted platform module (TPM) key management CREDENTIAL
在线阅读 下载PDF
Automatic Recognition of Analog Modulated Signals Using Artificial Neural Networks
7
作者 Jide Julius Popoola Rex Van Olst 《Computer Technology and Application》 2011年第1期29-35,共7页
This paper presents work on modulated signal recognition using an artificial neural network (ANN) developed using the Python programme language. The study is basically on the analysis of analog modulated signals. Fo... This paper presents work on modulated signal recognition using an artificial neural network (ANN) developed using the Python programme language. The study is basically on the analysis of analog modulated signals. Four of the best-known analog modulation types are considered namely: amplitude modulation (AM), double sideband (DSB) modulation, single sideband (SSB) modulation and frequency modulation (FM). Computer simulations of the four modulated signals are carried out using MATLAB. MATLAB code is used in simulating the analog signals as well as the power spectral density of each of the analog modulated signals. In achieving an accurate classification of each of the modulated signals, extensive simulations are performed for the training of the artificial neural network. The results of the study show accurate and correct performance of the developed automatic modulation recognition with average success rate above 99.5%. 展开更多
关键词 Automatic modulation recognition modulation schemes features extraction key artificial neural network (ANN).
在线阅读 下载PDF
YOLO-based lightweight traffic sign detection algorithm and mobile deployment 被引量:1
8
作者 WU Yaqin ZHANG Tao +2 位作者 NIU Jianjun CHANG Yan LIU Ganjun 《Optoelectronics Letters》 2025年第4期249-256,共8页
This paper proposes a lightweight traffic sign detection system based on you only look once(YOLO).Firstly,the classification to fusion(C2f)structure is integrated into the backbone network,employing deformable convolu... This paper proposes a lightweight traffic sign detection system based on you only look once(YOLO).Firstly,the classification to fusion(C2f)structure is integrated into the backbone network,employing deformable convolution and bi-directional feature pyramid network(BiFPN)_Concat to improve the adaptability of the network.Secondly,the simple attention module(SimAm)is embedded to prioritize key features and reduce the complexity of the model after the C2f layer at the end of the backbone network.Next,the focal efficient intersection over union(EloU)is introduced to adjust the weights of challenging samples.Finally,we accomplish the design and deployment for the mobile app.The results demonstrate improvements,with the F1 score of 0.8987,mean average precision(mAP)@0.5 of 98.8%,mAP@0.5:0.95 of 75.6%,and the detection speed of 50 frames per second(FPS). 展开更多
关键词 c f layer simple attention module simam reduce complexity traffic sign detection prioritize key features backbone networkemploying classification backbone networknextthe
原文传递
Experimental composable key distribution using discrete-modulated continuous variable quantum cryptography
9
作者 Adnan A.E.Hajomer Florian Kanitschar +6 位作者 Nitin Jain Michael Hentschel Runjia Zhang Norbert Lütkenhaus Ulrik L.Andersen Christoph Pacher Tobias Gehring 《Light: Science & Applications》 2025年第9期2696-2708,共13页
Establishing secure data communication necessitates secure key exchange over a public channel.Quantum key distribution(QKD),which leverages the principles of quantum physics,can achieve this with information-theoretic... Establishing secure data communication necessitates secure key exchange over a public channel.Quantum key distribution(QKD),which leverages the principles of quantum physics,can achieve this with information-theoretic security.The discrete modulated(DM)continuous variable(CV)QKD protocol,in particular,is a suitable candidate for large-scale deployment of quantum-safe communication due to its simplicity and compatibility with standard high-speed telecommunication technology.Here,we present the first experimental demonstration of a four-state DM CVQKD system,successfully generating composable finite-size keys,secure against collective attacks over a 20 km fiber channel with 2.3×10^(9) coherent quantum states,achieving a positive composable key rate of 11.04×10^(-3) bits/symbol.This accomplishment is enabled by using an advanced security proof,meticulously selecting its parameters,and the fast,stable operation of the system.Our results mark a significant step toward the large-scale deployment of practical,high-performance,cost-effective,and highly secure quantum key distribution networks using standard telecommunication components. 展开更多
关键词 security proof key distribution qkd which establishing secure data communication collective attacks quantum key distribution composable key rate discrete modulated continuous variable secure key exchange
原文传递
A Lyapunov-based three-axis attitude intelligent control approach for unmanned aerial vehicle 被引量:2
10
作者 A.H.Mazinan 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第12期4669-4678,共10页
A novel Lyapunov-based three-axis attitude intelligent control approach via allocation scheme is considered in the proposed research to deal with kinematics and dynamics regarding the unmanned aerial vehicle systems.T... A novel Lyapunov-based three-axis attitude intelligent control approach via allocation scheme is considered in the proposed research to deal with kinematics and dynamics regarding the unmanned aerial vehicle systems.There is a consensus among experts of this field that the new outcomes in the present complicated systems modeling and control are highly appreciated with respect to state-of-the-art.The control scheme presented here is organized in line with a new integration of the linear-nonlinear control approaches,as long as the angular velocities in the three axes of the system are accurately dealt with in the inner closed loop control.And the corresponding rotation angles are dealt with in the outer closed loop control.It should be noted that the linear control in the present outer loop is first designed through proportional based linear quadratic regulator(PD based LQR)approach under optimum coefficients,while the nonlinear control in the corresponding inner loop is then realized through Lyapunov-based approach in the presence of uncertainties and disturbances.In order to complete the inner closed loop control,there is a pulse-width pulse-frequency(PWPF)modulator to be able to handle on-off thrusters.Furthermore,the number of these on-off thrusters may be increased with respect to the investigated control efforts to provide the overall accurate performance of the system,where the control allocation scheme is realized in the proposed strategy.It may be shown that the dynamics and kinematics of the unmanned aerial vehicle systems have to be investigated through the quaternion matrix and its corresponding vector to avoid presenting singularity of the results.At the end,the investigated outcomes are presented in comparison with a number of potential benchmarks to verify the approach performance. 展开更多
关键词 Lyapunov based control approach PD based LQR approach control allocation scheme kinematics and dynamics unmanned aerial vehicle system on-off thrusters PWPF modulator
在线阅读 下载PDF
Performance analysis of a low-complexity nonorthogonal multiple access scheme in visible light communication downlinks using pulse modulations 被引量:1
11
作者 Jian Song Tian Cao Hongming Zhang 《Intelligent and Converged Networks》 2021年第1期50-65,共16页
Although Successive Interference Cancellation(SIC)decoding is widely adopted in Nonorthogonal Multiple Access(NOMA)schemes for the recovery of user data at acceptable complexity,the imperfect SIC would cause Error Pro... Although Successive Interference Cancellation(SIC)decoding is widely adopted in Nonorthogonal Multiple Access(NOMA)schemes for the recovery of user data at acceptable complexity,the imperfect SIC would cause Error Propagation(EP),which can severely degrade system performance.In this work,we propose an SIC-free NOMA scheme in pulse modulation based Visible Light Communication(VLC)downlinks,including two types of users with different data rate requirements.Low bit-rate users adopt on-off keying,whereas high bit-rate ones use Multiple Pulse Position Modulation(MPPM).The soft decision decoding scheme is exploited by high bit-rate users to decode MPPM signals,which could fundamentally eliminate the detrimental effect of EP;the scheme is also easier and faster to execute compared with the conventional SIC decoding scheme.Expressions of the symbol error rate and achievable data rate for two types of users are derived.Results of the Monte Carlo simulation are provided to confirm the correctness of theoretical results. 展开更多
关键词 visible light communication nonorthogonal multiple access error propagation on-off keying multiple pulse position modulation symbol error rate achievable data rate
原文传递
Colorless WDM-PON Using Single Side Band Carrier Suppressed Signals Mitigating Carrier Rayleigh Backscattering
12
作者 Rahat Ullah Bo Liu +9 位作者 Qi Zhang Yousaf Khan Amjad Ali Qinghua Tian Feng Tian M.Saad Khan Tabinda Salam Sibghat Ullah Lijia Zhang Xiangjun Xin 《China Communications》 SCIE CSCD 2016年第12期150-161,共12页
A new scheme is offered for minimizing carrier Rayleigh backscattering(CRB) in single feeder fiber based wavelength division multiplexed passive optical network(WDM-PON). The proposed scheme is based on single side ba... A new scheme is offered for minimizing carrier Rayleigh backscattering(CRB) in single feeder fiber based wavelength division multiplexed passive optical network(WDM-PON). The proposed scheme is based on single side band carrier suppressed(SSBCS) signal, both at network and receiver sides, used for the first time at optical line terminal(OLT) and optical network unit(ONU) sides. We use dual-drive Mach-zehnder modulator(DD-MZM) for generating SSB-CS signals, which decreases the expense per bit in full transmission. SSB-CS mitigates CRB, both at OLT and ONU sides, because of having no chance of reflections from the carrier. Since no extra dedicated RF or laser source is used at ONU side, we thus achieve cost effective colorless WDM-PON system. Suppressed signals from four channels, each of 10 Gbps, are multiplexed before injecting into the fiber span of 25 km at OLT. At ONU side, half of the downlink power is used for re-modulating the data signal. The simulation results show an errorfree transmission. Moreover, the detailed power budget calculations show that the proposed scheme can be sought out for splitting ratio up to 128. Hence it offers enough system's margin for unseen losses. 展开更多
关键词 Carrier Rayleigh backscattering dual drive Mach-zehnder modulator single side band suppress carrier on-off keying
在线阅读 下载PDF
Performance Evaluation of FM-COOK Chaotic Communication System
13
作者 Hikmat N. Abdullah Alejandro A. Valenzuela 《Journal of Signal and Information Processing》 2011年第3期175-177,共3页
In this paper, the performance evaluation of Frequency Modulated Chaotic On-Off Keying (FM-COOK) in AWGN, Rayleigh and Rician fading channels is given. The simulation results show that an improvement in BER can be gai... In this paper, the performance evaluation of Frequency Modulated Chaotic On-Off Keying (FM-COOK) in AWGN, Rayleigh and Rician fading channels is given. The simulation results show that an improvement in BER can be gained by incorporating the FM modulation with COOK for SNR values less than 10dB in AWGN case and less than 6dB for Rayleigh and Rician fading channels. 展开更多
关键词 CHAOTIC TRANSCEIVER on-off keying FM modulation
在线阅读 下载PDF
A Study of the Key Techniques of High-Speed Optical Time Division Multiplexing Systems 被引量:1
14
作者 LIU Xian bing directed by YE Pei da, ZHAO Zi sen 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2001年第4期81-81,共1页
关键词 optical time division multiplexing optical signal processing all optical switch electroabsorption modulator Several key techniques in high speed optical time division multiplexing (OTDM) systems including the generation and compression
原文传递
FPGA based digital phase-coding quantum key distribution system
15
作者 LU XiaoMing Zhang LiJun +9 位作者 WANG YongGang CHEN Wei HUANG DaJun LI Deng WANG Shuang HE DeYong YIN ZhenQiang ZHOU Yu HUI Cong HAN ZhengFu 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2015年第12期153-159,共7页
Quantum key distribution (QKD) is a technology with the potential capability to achieve information-theoretic security. Phase- coding is an important approach to develop practical QKD systems in fiber channel. In or... Quantum key distribution (QKD) is a technology with the potential capability to achieve information-theoretic security. Phase- coding is an important approach to develop practical QKD systems in fiber channel. In order to improve the phase-coding modulation rate, we proposed a new digital-modulation method in this paper and constructed a compact and robust prototype of QKD system using currently available components in our lab to demonstrate the effectiveness of the method. The system was deployed in laboratory environment over a 50 km fiber and continuously operated during 87 h without manual interaction. The quantum bit error rate (QBER) of the system was stable with an average value of 3.22% and the secure key generation rate is 8.91 kbps. Although the modulation rate of the photon in the derno system was only 200 MHz, which was limited by the Faraday- Michelson interferometer (FMI) structure, the proposed method and the field programmable gate array (FPGA) based electronics scheme have a great potential for high speed QKD systems with Giga-bits/second modulation rate. 展开更多
关键词 quantum key distribution phase-coding digital phase modulation field programmable gate array Faraday-Michelsoninterferometer
原文传递
Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI 被引量:4
16
作者 Lei HAN Jiqiang LIU +1 位作者 Zhen HAN Xueye WEI 《Frontiers of Computer Science》 SCIE EI CSCD 2011年第2期169-180,共12页
In today's globalized digital world, networkbased, mobile, and interactive collaborations have enabled work platforms of personal computers to cross multiple geographical boundaries. The new requirements of privacy-p... In today's globalized digital world, networkbased, mobile, and interactive collaborations have enabled work platforms of personal computers to cross multiple geographical boundaries. The new requirements of privacy-preservation, sensitive information sharing, portability, remote attestation, and robust security create new problems in system design and implementation. There are critical demands for highly secure work platforms and security enhancing mechanisms for ensuring privacy protection, component integrity, sealed storage, and remote attestation of platforms. Trusted computing is a promising technology for enhancing the security of a platform using a trusted platform module (TPM). TPM is a tamper-resistant microcontroller designed to provide robust security capabilities for computing platforms. It typically is affixed to the motherboard with a low pin count (LPC) bus. However, it limited in that TPM cannot be used directly in current common personal computers (PCs), and TPM is not flexible and portable enough to be used in different platforms because of its interface with the PC and its certificate and key structure. For these reasons, we propose a portable trusted platform module (PTPM) scheme to build a trusted platform for the common PC based on a single cryptographic chip with a universal serial bus (USB) interface and extensible firmware interface (EFI), by which platforms can get a similar degree of security protection in general-purpose systems. We show the structure of certificates and keys, which can bind to platforms via a PTPM and provide users with portability and flexibility in different platforms while still allowing the user and platform to be protected and attested. The implementation of prototype system is described in detail and the performance of the PTPM on cryptographic operations and time-costs of the system bootstrap are evaluated and analyzed. The results of experiments show that PTPM has high performances for supporting trusted computing and it can be used flexibly and portably by the user. 展开更多
关键词 trusted computing portable trusted platform module (PTPM) extensible firmware interface (EFI) keyS CERTIFICATES
原文传递
Research Progress on Prevention and Treatment of Glucolipid Metabolic Disease with Integrated Traditional Chinese and Western Medicine 被引量:24
17
作者 GUO Jiao 《Chinese Journal of Integrative Medicine》 SCIE CAS CSCD 2017年第6期403-409,共7页
Hyperlipidemia, type 2 diabetes mellitus, nonalcoholic fatty liver and many other metabolic disorder are frequently co-existing in patients. In addition, these diseases are closely related in pathophysiological settin... Hyperlipidemia, type 2 diabetes mellitus, nonalcoholic fatty liver and many other metabolic disorder are frequently co-existing in patients. In addition, these diseases are closely related in pathophysiological settings. However, increasing of the disease incidence, lacking of comprehensive prevention and control measurements against the key pathology point concomitant occurrence with the pattem of the single disease, single target therapy, that is leading therapeutic strategy for these metabolic disorders in the setting of Western medicine (WM). On the basis of the combination of the advantages of integrated Chinese medicine (CM) and WM, with unified understanding of such diseases, the new concept of glucolipid metabolic disease (GLMD) is introduced. In this new concept, disorders in glucose and lipid metabolism are recognized as the key trigger and major driving force for the progress of GLMD. The key points of pathology included dysfunction of neuronal-endocrine-immune system,insulin resistance, oxidative stress, inflammation and intestinal flora imbalance. In the core pathogenic perspective of CM, it can be explained as "Gan (Liver) Shi Shu Xie" (dysfunction of Gan in metabolism and emotion regulation) that will lead to the occurence/production of endogenous dampness and phlegm, blood stasis and turbid. This leads to the new concept of "Liver-based regulatory system for metabolic homeostasis" to be introduced further. The comprehensive prevention and control strategy "Tiao Gan Qi Shu Hua Zhuo" (modulating Gan, trigging key metabolic system to resolve pathogenic factors such as phlegm retention and dampness). Its representative formula Fufang Zhenzhu Tiaozhi Capsule (复方贞术调脂胶囊) is innovated under such rationales. Comment for some commonly-used CM GLMD therapeutic drugs was presented. High-level evidence-based and epidemiological and mechanism studies should be carded out to further interpret and explain of the scientific connotation of GLMD. 展开更多
关键词 glucolipid metabolic disease liver-based regulatory system for metabolic homeostasis Tiao Gan (Liver) Qi Shu Hua Zhuo modulating Gan trigging key metabolic system to resolve pathogenic factors such as phlegm retention and dampness) Chinese medicine
原文传递
Upper bounds of Schubert polynomials
18
作者 Neil Jiuyu Fan Peter Long Guo 《Science China Mathematics》 SCIE CSCD 2022年第6期1319-1330,共12页
Let w be a permutation of{1,2,...,n},and let D(w)be the Rothe diagram of w.The Schubert polynomial■w_(x)can be realized as the dual character of the flagged Weyl module associated with D(w).This implies the following... Let w be a permutation of{1,2,...,n},and let D(w)be the Rothe diagram of w.The Schubert polynomial■w_(x)can be realized as the dual character of the flagged Weyl module associated with D(w).This implies the following coefficient-wise inequality:Min_(x)≤■_(w)(x)≤Max_(w)xwhere both Min_(w)(x)and Max_(w)(x)are polynomials determined by D(w).Fink et al.(2018)found that■w_(x)equals the lower bound Min_(w)(x)if and only if w avoids twelve permutation patterns.In this paper,we show that■w_(x)reaches the upper bound Max_(w)(x)if and only if w avoids two permutation patterns 1432 and 1423.Similarly,for any given compositionα∈Z^(n)≥0,one can define a lower bound Min_(α)(x)and an upper bound Max_(α)(x)for the key polynomialκ_(α)(x).Hodges and Yong(2020)established thatκ_(α)(x)equals Min_(α)(x)if and only ifαavoids five composition patterns.We show thatκ_(α)(x)equals Max_(α)(x)if and only ifαavoids a single composition pattern(0,2).As an application,we obtain that whenαavoids(0,2),the key polynomialκ_(α)(x)is Lorentzian,partially verifying a conjecture of Huh et al.(2019). 展开更多
关键词 Schubert polynomial key polynomial flagged Weyl module upper bound Lorentzian polynomial
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部