We propose a discrete-modulated continuous-variable measurement-device-independent quantum key distribution protocol over a fiber-to-water channel.Different from optical fibers,the underwater channel has more severe o...We propose a discrete-modulated continuous-variable measurement-device-independent quantum key distribution protocol over a fiber-to-water channel.Different from optical fibers,the underwater channel has more severe optical attenuation because of optical absorption and scattering,which reduces the maximum communication distance.To enhance the performance of the protocol,the photon subtraction operation is implemented at the modulator side.We carry out a performance simulation in two different kinds of seawater channel,and the result shows that the scheme with photon subtraction has a longer secure communication distance under certain conditions.展开更多
In a quantum key distribution system, it is crucial to keep the extinction ratio of the coherent pulses stable. This means that the direct current bias point of the electro-optic modulator (EOM) used for generating ...In a quantum key distribution system, it is crucial to keep the extinction ratio of the coherent pulses stable. This means that the direct current bias point of the electro-optic modulator (EOM) used for generating coherent pulses must be locked. In this paper, an autobias control system based on a lock-in-amplifier for the EOM is introduced. Its drift information extracting theory and control method are analyzed comprehensively. The long term drift of the extinction ratio of the coherent pulses is measured by a single photon detector, which indicates that the autobias control system is effective for stabilizing the bias point of the EOM.展开更多
This paper proposes a deterministic quantum key distribution scheme based on Gaussian-modulated continuous variable EPR correlations. This scheme can implement fast and efficient key distribution. The security is guar...This paper proposes a deterministic quantum key distribution scheme based on Gaussian-modulated continuous variable EPR correlations. This scheme can implement fast and efficient key distribution. The security is guaranteed by continuous variable EPR entanglement correlations produced by nondegenerate optical parametric amplifier. For general beam splitter eavesdropping strategy, the secret information rate ΔI = I(α, β)-I(α, ε) is calculated in view of Shannon information theory. Finally the security analysis is presented.展开更多
Passive decoy-state quantum key distribution is more desirable than the active one in some scenarios. It is also affected by the imperfections of the devices. In this paper, the influence of modulator attenuation on t...Passive decoy-state quantum key distribution is more desirable than the active one in some scenarios. It is also affected by the imperfections of the devices. In this paper, the influence of modulator attenuation on the passive decoy-state method is considered. We introduce and analyze the unbalanced Mach-Zehnder interferometer, briefly, and combining with the virtual source and imaginary unitary transformation, we characterize the passive decoy-state method using a weak coherent photon source with modulator attenuation. According to the attenuation parameter 6, the pass efficiencies are given. Then, the key generation rate can be acquired. From numerical simulations, it can be seen that modulator attenuation has a non- negligible influence on the performance of passive-state QKD protocol. Based on the research, the analysis method of virtual source and imaginary unitary transformation are preferred in analyzing passive decoy state protocol, and the passive decoy-state method is better than the active one and is close to the active vacuum + weak decoy state under the condition of having the same modulator attenuation.展开更多
Natural properties of high speed on-off valves can be described through their on-off behavior and spool movement (static and oscillating) characteristics. High speed on-off valves can be combined with actuators in sys...Natural properties of high speed on-off valves can be described through their on-off behavior and spool movement (static and oscillating) characteristics. High speed on-off valves can be combined with actuators in systems into four typical types of composite valves whose static characteristics are related not only to the structures of the single valves and the composite ones, but also to the PWM control modes. It is proved that the composite valves have similar features as those of servo valves. The nonlinear specific properties of single valves composited can be completely compensated by the suitable PWM control modes.展开更多
Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cry...Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system.展开更多
This paper presents work on modulated signal recognition using an artificial neural network (ANN) developed using the Python programme language. The study is basically on the analysis of analog modulated signals. Fo...This paper presents work on modulated signal recognition using an artificial neural network (ANN) developed using the Python programme language. The study is basically on the analysis of analog modulated signals. Four of the best-known analog modulation types are considered namely: amplitude modulation (AM), double sideband (DSB) modulation, single sideband (SSB) modulation and frequency modulation (FM). Computer simulations of the four modulated signals are carried out using MATLAB. MATLAB code is used in simulating the analog signals as well as the power spectral density of each of the analog modulated signals. In achieving an accurate classification of each of the modulated signals, extensive simulations are performed for the training of the artificial neural network. The results of the study show accurate and correct performance of the developed automatic modulation recognition with average success rate above 99.5%.展开更多
This paper proposes a lightweight traffic sign detection system based on you only look once(YOLO).Firstly,the classification to fusion(C2f)structure is integrated into the backbone network,employing deformable convolu...This paper proposes a lightweight traffic sign detection system based on you only look once(YOLO).Firstly,the classification to fusion(C2f)structure is integrated into the backbone network,employing deformable convolution and bi-directional feature pyramid network(BiFPN)_Concat to improve the adaptability of the network.Secondly,the simple attention module(SimAm)is embedded to prioritize key features and reduce the complexity of the model after the C2f layer at the end of the backbone network.Next,the focal efficient intersection over union(EloU)is introduced to adjust the weights of challenging samples.Finally,we accomplish the design and deployment for the mobile app.The results demonstrate improvements,with the F1 score of 0.8987,mean average precision(mAP)@0.5 of 98.8%,mAP@0.5:0.95 of 75.6%,and the detection speed of 50 frames per second(FPS).展开更多
Establishing secure data communication necessitates secure key exchange over a public channel.Quantum key distribution(QKD),which leverages the principles of quantum physics,can achieve this with information-theoretic...Establishing secure data communication necessitates secure key exchange over a public channel.Quantum key distribution(QKD),which leverages the principles of quantum physics,can achieve this with information-theoretic security.The discrete modulated(DM)continuous variable(CV)QKD protocol,in particular,is a suitable candidate for large-scale deployment of quantum-safe communication due to its simplicity and compatibility with standard high-speed telecommunication technology.Here,we present the first experimental demonstration of a four-state DM CVQKD system,successfully generating composable finite-size keys,secure against collective attacks over a 20 km fiber channel with 2.3×10^(9) coherent quantum states,achieving a positive composable key rate of 11.04×10^(-3) bits/symbol.This accomplishment is enabled by using an advanced security proof,meticulously selecting its parameters,and the fast,stable operation of the system.Our results mark a significant step toward the large-scale deployment of practical,high-performance,cost-effective,and highly secure quantum key distribution networks using standard telecommunication components.展开更多
A novel Lyapunov-based three-axis attitude intelligent control approach via allocation scheme is considered in the proposed research to deal with kinematics and dynamics regarding the unmanned aerial vehicle systems.T...A novel Lyapunov-based three-axis attitude intelligent control approach via allocation scheme is considered in the proposed research to deal with kinematics and dynamics regarding the unmanned aerial vehicle systems.There is a consensus among experts of this field that the new outcomes in the present complicated systems modeling and control are highly appreciated with respect to state-of-the-art.The control scheme presented here is organized in line with a new integration of the linear-nonlinear control approaches,as long as the angular velocities in the three axes of the system are accurately dealt with in the inner closed loop control.And the corresponding rotation angles are dealt with in the outer closed loop control.It should be noted that the linear control in the present outer loop is first designed through proportional based linear quadratic regulator(PD based LQR)approach under optimum coefficients,while the nonlinear control in the corresponding inner loop is then realized through Lyapunov-based approach in the presence of uncertainties and disturbances.In order to complete the inner closed loop control,there is a pulse-width pulse-frequency(PWPF)modulator to be able to handle on-off thrusters.Furthermore,the number of these on-off thrusters may be increased with respect to the investigated control efforts to provide the overall accurate performance of the system,where the control allocation scheme is realized in the proposed strategy.It may be shown that the dynamics and kinematics of the unmanned aerial vehicle systems have to be investigated through the quaternion matrix and its corresponding vector to avoid presenting singularity of the results.At the end,the investigated outcomes are presented in comparison with a number of potential benchmarks to verify the approach performance.展开更多
Although Successive Interference Cancellation(SIC)decoding is widely adopted in Nonorthogonal Multiple Access(NOMA)schemes for the recovery of user data at acceptable complexity,the imperfect SIC would cause Error Pro...Although Successive Interference Cancellation(SIC)decoding is widely adopted in Nonorthogonal Multiple Access(NOMA)schemes for the recovery of user data at acceptable complexity,the imperfect SIC would cause Error Propagation(EP),which can severely degrade system performance.In this work,we propose an SIC-free NOMA scheme in pulse modulation based Visible Light Communication(VLC)downlinks,including two types of users with different data rate requirements.Low bit-rate users adopt on-off keying,whereas high bit-rate ones use Multiple Pulse Position Modulation(MPPM).The soft decision decoding scheme is exploited by high bit-rate users to decode MPPM signals,which could fundamentally eliminate the detrimental effect of EP;the scheme is also easier and faster to execute compared with the conventional SIC decoding scheme.Expressions of the symbol error rate and achievable data rate for two types of users are derived.Results of the Monte Carlo simulation are provided to confirm the correctness of theoretical results.展开更多
A new scheme is offered for minimizing carrier Rayleigh backscattering(CRB) in single feeder fiber based wavelength division multiplexed passive optical network(WDM-PON). The proposed scheme is based on single side ba...A new scheme is offered for minimizing carrier Rayleigh backscattering(CRB) in single feeder fiber based wavelength division multiplexed passive optical network(WDM-PON). The proposed scheme is based on single side band carrier suppressed(SSBCS) signal, both at network and receiver sides, used for the first time at optical line terminal(OLT) and optical network unit(ONU) sides. We use dual-drive Mach-zehnder modulator(DD-MZM) for generating SSB-CS signals, which decreases the expense per bit in full transmission. SSB-CS mitigates CRB, both at OLT and ONU sides, because of having no chance of reflections from the carrier. Since no extra dedicated RF or laser source is used at ONU side, we thus achieve cost effective colorless WDM-PON system. Suppressed signals from four channels, each of 10 Gbps, are multiplexed before injecting into the fiber span of 25 km at OLT. At ONU side, half of the downlink power is used for re-modulating the data signal. The simulation results show an errorfree transmission. Moreover, the detailed power budget calculations show that the proposed scheme can be sought out for splitting ratio up to 128. Hence it offers enough system's margin for unseen losses.展开更多
In this paper, the performance evaluation of Frequency Modulated Chaotic On-Off Keying (FM-COOK) in AWGN, Rayleigh and Rician fading channels is given. The simulation results show that an improvement in BER can be gai...In this paper, the performance evaluation of Frequency Modulated Chaotic On-Off Keying (FM-COOK) in AWGN, Rayleigh and Rician fading channels is given. The simulation results show that an improvement in BER can be gained by incorporating the FM modulation with COOK for SNR values less than 10dB in AWGN case and less than 6dB for Rayleigh and Rician fading channels.展开更多
Quantum key distribution (QKD) is a technology with the potential capability to achieve information-theoretic security. Phase- coding is an important approach to develop practical QKD systems in fiber channel. In or...Quantum key distribution (QKD) is a technology with the potential capability to achieve information-theoretic security. Phase- coding is an important approach to develop practical QKD systems in fiber channel. In order to improve the phase-coding modulation rate, we proposed a new digital-modulation method in this paper and constructed a compact and robust prototype of QKD system using currently available components in our lab to demonstrate the effectiveness of the method. The system was deployed in laboratory environment over a 50 km fiber and continuously operated during 87 h without manual interaction. The quantum bit error rate (QBER) of the system was stable with an average value of 3.22% and the secure key generation rate is 8.91 kbps. Although the modulation rate of the photon in the derno system was only 200 MHz, which was limited by the Faraday- Michelson interferometer (FMI) structure, the proposed method and the field programmable gate array (FPGA) based electronics scheme have a great potential for high speed QKD systems with Giga-bits/second modulation rate.展开更多
In today's globalized digital world, networkbased, mobile, and interactive collaborations have enabled work platforms of personal computers to cross multiple geographical boundaries. The new requirements of privacy-p...In today's globalized digital world, networkbased, mobile, and interactive collaborations have enabled work platforms of personal computers to cross multiple geographical boundaries. The new requirements of privacy-preservation, sensitive information sharing, portability, remote attestation, and robust security create new problems in system design and implementation. There are critical demands for highly secure work platforms and security enhancing mechanisms for ensuring privacy protection, component integrity, sealed storage, and remote attestation of platforms. Trusted computing is a promising technology for enhancing the security of a platform using a trusted platform module (TPM). TPM is a tamper-resistant microcontroller designed to provide robust security capabilities for computing platforms. It typically is affixed to the motherboard with a low pin count (LPC) bus. However, it limited in that TPM cannot be used directly in current common personal computers (PCs), and TPM is not flexible and portable enough to be used in different platforms because of its interface with the PC and its certificate and key structure. For these reasons, we propose a portable trusted platform module (PTPM) scheme to build a trusted platform for the common PC based on a single cryptographic chip with a universal serial bus (USB) interface and extensible firmware interface (EFI), by which platforms can get a similar degree of security protection in general-purpose systems. We show the structure of certificates and keys, which can bind to platforms via a PTPM and provide users with portability and flexibility in different platforms while still allowing the user and platform to be protected and attested. The implementation of prototype system is described in detail and the performance of the PTPM on cryptographic operations and time-costs of the system bootstrap are evaluated and analyzed. The results of experiments show that PTPM has high performances for supporting trusted computing and it can be used flexibly and portably by the user.展开更多
Hyperlipidemia, type 2 diabetes mellitus, nonalcoholic fatty liver and many other metabolic disorder are frequently co-existing in patients. In addition, these diseases are closely related in pathophysiological settin...Hyperlipidemia, type 2 diabetes mellitus, nonalcoholic fatty liver and many other metabolic disorder are frequently co-existing in patients. In addition, these diseases are closely related in pathophysiological settings. However, increasing of the disease incidence, lacking of comprehensive prevention and control measurements against the key pathology point concomitant occurrence with the pattem of the single disease, single target therapy, that is leading therapeutic strategy for these metabolic disorders in the setting of Western medicine (WM). On the basis of the combination of the advantages of integrated Chinese medicine (CM) and WM, with unified understanding of such diseases, the new concept of glucolipid metabolic disease (GLMD) is introduced. In this new concept, disorders in glucose and lipid metabolism are recognized as the key trigger and major driving force for the progress of GLMD. The key points of pathology included dysfunction of neuronal-endocrine-immune system,insulin resistance, oxidative stress, inflammation and intestinal flora imbalance. In the core pathogenic perspective of CM, it can be explained as "Gan (Liver) Shi Shu Xie" (dysfunction of Gan in metabolism and emotion regulation) that will lead to the occurence/production of endogenous dampness and phlegm, blood stasis and turbid. This leads to the new concept of "Liver-based regulatory system for metabolic homeostasis" to be introduced further. The comprehensive prevention and control strategy "Tiao Gan Qi Shu Hua Zhuo" (modulating Gan, trigging key metabolic system to resolve pathogenic factors such as phlegm retention and dampness). Its representative formula Fufang Zhenzhu Tiaozhi Capsule (复方贞术调脂胶囊) is innovated under such rationales. Comment for some commonly-used CM GLMD therapeutic drugs was presented. High-level evidence-based and epidemiological and mechanism studies should be carded out to further interpret and explain of the scientific connotation of GLMD.展开更多
Let w be a permutation of{1,2,...,n},and let D(w)be the Rothe diagram of w.The Schubert polynomial■w_(x)can be realized as the dual character of the flagged Weyl module associated with D(w).This implies the following...Let w be a permutation of{1,2,...,n},and let D(w)be the Rothe diagram of w.The Schubert polynomial■w_(x)can be realized as the dual character of the flagged Weyl module associated with D(w).This implies the following coefficient-wise inequality:Min_(x)≤■_(w)(x)≤Max_(w)xwhere both Min_(w)(x)and Max_(w)(x)are polynomials determined by D(w).Fink et al.(2018)found that■w_(x)equals the lower bound Min_(w)(x)if and only if w avoids twelve permutation patterns.In this paper,we show that■w_(x)reaches the upper bound Max_(w)(x)if and only if w avoids two permutation patterns 1432 and 1423.Similarly,for any given compositionα∈Z^(n)≥0,one can define a lower bound Min_(α)(x)and an upper bound Max_(α)(x)for the key polynomialκ_(α)(x).Hodges and Yong(2020)established thatκ_(α)(x)equals Min_(α)(x)if and only ifαavoids five composition patterns.We show thatκ_(α)(x)equals Max_(α)(x)if and only ifαavoids a single composition pattern(0,2).As an application,we obtain that whenαavoids(0,2),the key polynomialκ_(α)(x)is Lorentzian,partially verifying a conjecture of Huh et al.(2019).展开更多
文摘We propose a discrete-modulated continuous-variable measurement-device-independent quantum key distribution protocol over a fiber-to-water channel.Different from optical fibers,the underwater channel has more severe optical attenuation because of optical absorption and scattering,which reduces the maximum communication distance.To enhance the performance of the protocol,the photon subtraction operation is implemented at the modulator side.We carry out a performance simulation in two different kinds of seawater channel,and the result shows that the scheme with photon subtraction has a longer secure communication distance under certain conditions.
基金Project supported by the National Natural Science Foundation of China(Grant No.61108039)the Major Research Plan of the National Natural Science Foundation of China(Grant No.91121023)the Scientific Research Foundation of Graduate School of South China Normal University(Grant No.2012kyjj224)
文摘In a quantum key distribution system, it is crucial to keep the extinction ratio of the coherent pulses stable. This means that the direct current bias point of the electro-optic modulator (EOM) used for generating coherent pulses must be locked. In this paper, an autobias control system based on a lock-in-amplifier for the EOM is introduced. Its drift information extracting theory and control method are analyzed comprehensively. The long term drift of the extinction ratio of the coherent pulses is measured by a single photon detector, which indicates that the autobias control system is effective for stabilizing the bias point of the EOM.
基金Project supported by the National Natural Science Foundation of China (Grant No 60472018).
文摘This paper proposes a deterministic quantum key distribution scheme based on Gaussian-modulated continuous variable EPR correlations. This scheme can implement fast and efficient key distribution. The security is guaranteed by continuous variable EPR entanglement correlations produced by nondegenerate optical parametric amplifier. For general beam splitter eavesdropping strategy, the secret information rate ΔI = I(α, β)-I(α, ε) is calculated in view of Shannon information theory. Finally the security analysis is presented.
基金supported by the National Natural Science Foundation of China(Grant No.11304397)
文摘Passive decoy-state quantum key distribution is more desirable than the active one in some scenarios. It is also affected by the imperfections of the devices. In this paper, the influence of modulator attenuation on the passive decoy-state method is considered. We introduce and analyze the unbalanced Mach-Zehnder interferometer, briefly, and combining with the virtual source and imaginary unitary transformation, we characterize the passive decoy-state method using a weak coherent photon source with modulator attenuation. According to the attenuation parameter 6, the pass efficiencies are given. Then, the key generation rate can be acquired. From numerical simulations, it can be seen that modulator attenuation has a non- negligible influence on the performance of passive-state QKD protocol. Based on the research, the analysis method of virtual source and imaginary unitary transformation are preferred in analyzing passive decoy state protocol, and the passive decoy-state method is better than the active one and is close to the active vacuum + weak decoy state under the condition of having the same modulator attenuation.
文摘Natural properties of high speed on-off valves can be described through their on-off behavior and spool movement (static and oscillating) characteristics. High speed on-off valves can be combined with actuators in systems into four typical types of composite valves whose static characteristics are related not only to the structures of the single valves and the composite ones, but also to the PWM control modes. It is proved that the composite valves have similar features as those of servo valves. The nonlinear specific properties of single valves composited can be completely compensated by the suitable PWM control modes.
基金Supported by the National Natural Science Foun-dation of China (60373087 ,60473023 ,90104005) HP Laborato-ry of China
文摘Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system.
文摘This paper presents work on modulated signal recognition using an artificial neural network (ANN) developed using the Python programme language. The study is basically on the analysis of analog modulated signals. Four of the best-known analog modulation types are considered namely: amplitude modulation (AM), double sideband (DSB) modulation, single sideband (SSB) modulation and frequency modulation (FM). Computer simulations of the four modulated signals are carried out using MATLAB. MATLAB code is used in simulating the analog signals as well as the power spectral density of each of the analog modulated signals. In achieving an accurate classification of each of the modulated signals, extensive simulations are performed for the training of the artificial neural network. The results of the study show accurate and correct performance of the developed automatic modulation recognition with average success rate above 99.5%.
基金supported by the Shanxi Agricultural University Science and Technology Innovation Enhancement Project。
文摘This paper proposes a lightweight traffic sign detection system based on you only look once(YOLO).Firstly,the classification to fusion(C2f)structure is integrated into the backbone network,employing deformable convolution and bi-directional feature pyramid network(BiFPN)_Concat to improve the adaptability of the network.Secondly,the simple attention module(SimAm)is embedded to prioritize key features and reduce the complexity of the model after the C2f layer at the end of the backbone network.Next,the focal efficient intersection over union(EloU)is introduced to adjust the weights of challenging samples.Finally,we accomplish the design and deployment for the mobile app.The results demonstrate improvements,with the F1 score of 0.8987,mean average precision(mAP)@0.5 of 98.8%,mAP@0.5:0.95 of 75.6%,and the detection speed of 50 frames per second(FPS).
基金funded within the QuantERA II Programme(project CVSTAR)that has received funding from the European Union’s Horizon 2020 research and innovation program under Grant Agreement No 101017733Innovation Fund Denmark(IFD)under Grant Agreement No 731473+5 种基金the Austrian Research Promotion Agency(FFG),project number FO999891361from the European Union’s Digital Europe programme under Grant Agreement No 101091659(QCI.DK)from the European Union’s Horizon Europe research and innovation programme under the project“Quantum Security Networks Partnership”(QSNP,grant agreement no.101114043)A.A.E.H.,U.L.A.and T.G.acknowledge support from Innovation Fund Denmark(CryptQ,0175-00018A)the Danish National Research Foundation,Center for Macroscopic Quantum States(bigQ,DNRF142)A.A.E.H.,R.Z.and T.G.acknowledge funding from the Carlsberg Foundation,project CF21-0466.
文摘Establishing secure data communication necessitates secure key exchange over a public channel.Quantum key distribution(QKD),which leverages the principles of quantum physics,can achieve this with information-theoretic security.The discrete modulated(DM)continuous variable(CV)QKD protocol,in particular,is a suitable candidate for large-scale deployment of quantum-safe communication due to its simplicity and compatibility with standard high-speed telecommunication technology.Here,we present the first experimental demonstration of a four-state DM CVQKD system,successfully generating composable finite-size keys,secure against collective attacks over a 20 km fiber channel with 2.3×10^(9) coherent quantum states,achieving a positive composable key rate of 11.04×10^(-3) bits/symbol.This accomplishment is enabled by using an advanced security proof,meticulously selecting its parameters,and the fast,stable operation of the system.Our results mark a significant step toward the large-scale deployment of practical,high-performance,cost-effective,and highly secure quantum key distribution networks using standard telecommunication components.
基金the Islamic Azad University(IAU),South Tehran Branch,Tehran,Iran in support of the present research
文摘A novel Lyapunov-based three-axis attitude intelligent control approach via allocation scheme is considered in the proposed research to deal with kinematics and dynamics regarding the unmanned aerial vehicle systems.There is a consensus among experts of this field that the new outcomes in the present complicated systems modeling and control are highly appreciated with respect to state-of-the-art.The control scheme presented here is organized in line with a new integration of the linear-nonlinear control approaches,as long as the angular velocities in the three axes of the system are accurately dealt with in the inner closed loop control.And the corresponding rotation angles are dealt with in the outer closed loop control.It should be noted that the linear control in the present outer loop is first designed through proportional based linear quadratic regulator(PD based LQR)approach under optimum coefficients,while the nonlinear control in the corresponding inner loop is then realized through Lyapunov-based approach in the presence of uncertainties and disturbances.In order to complete the inner closed loop control,there is a pulse-width pulse-frequency(PWPF)modulator to be able to handle on-off thrusters.Furthermore,the number of these on-off thrusters may be increased with respect to the investigated control efforts to provide the overall accurate performance of the system,where the control allocation scheme is realized in the proposed strategy.It may be shown that the dynamics and kinematics of the unmanned aerial vehicle systems have to be investigated through the quaternion matrix and its corresponding vector to avoid presenting singularity of the results.At the end,the investigated outcomes are presented in comparison with a number of potential benchmarks to verify the approach performance.
基金supported by the National Key Research and Development Program of China(No.2017YFB0403403)the Natural Science Foundation of Guangdong Province(No.2015A030312006).
文摘Although Successive Interference Cancellation(SIC)decoding is widely adopted in Nonorthogonal Multiple Access(NOMA)schemes for the recovery of user data at acceptable complexity,the imperfect SIC would cause Error Propagation(EP),which can severely degrade system performance.In this work,we propose an SIC-free NOMA scheme in pulse modulation based Visible Light Communication(VLC)downlinks,including two types of users with different data rate requirements.Low bit-rate users adopt on-off keying,whereas high bit-rate ones use Multiple Pulse Position Modulation(MPPM).The soft decision decoding scheme is exploited by high bit-rate users to decode MPPM signals,which could fundamentally eliminate the detrimental effect of EP;the scheme is also easier and faster to execute compared with the conventional SIC decoding scheme.Expressions of the symbol error rate and achievable data rate for two types of users are derived.Results of the Monte Carlo simulation are provided to confirm the correctness of theoretical results.
基金financial supports from National High Technology 863 Program of China(No. 2013AA013403,2013AA013301/02,20 15AA015501/02)National NSFC(No. 61425022/61307086/ 61475024/6127515 8/61201151/61275074/61205066)+4 种基金NITC (No.2012DFG12110)Beijing Nova Program(No.Z141101001814048)Beijing Excellent Ph.D.Thesis Guidance Foundation (No.20121001302) are gratefully acknowledgedsupported by the Universities Ph.D.Special Research Funds (No.20120005110003/ 20120005120007)Fund of State Key Laboratory of IPOC (BUPT)
文摘A new scheme is offered for minimizing carrier Rayleigh backscattering(CRB) in single feeder fiber based wavelength division multiplexed passive optical network(WDM-PON). The proposed scheme is based on single side band carrier suppressed(SSBCS) signal, both at network and receiver sides, used for the first time at optical line terminal(OLT) and optical network unit(ONU) sides. We use dual-drive Mach-zehnder modulator(DD-MZM) for generating SSB-CS signals, which decreases the expense per bit in full transmission. SSB-CS mitigates CRB, both at OLT and ONU sides, because of having no chance of reflections from the carrier. Since no extra dedicated RF or laser source is used at ONU side, we thus achieve cost effective colorless WDM-PON system. Suppressed signals from four channels, each of 10 Gbps, are multiplexed before injecting into the fiber span of 25 km at OLT. At ONU side, half of the downlink power is used for re-modulating the data signal. The simulation results show an errorfree transmission. Moreover, the detailed power budget calculations show that the proposed scheme can be sought out for splitting ratio up to 128. Hence it offers enough system's margin for unseen losses.
文摘In this paper, the performance evaluation of Frequency Modulated Chaotic On-Off Keying (FM-COOK) in AWGN, Rayleigh and Rician fading channels is given. The simulation results show that an improvement in BER can be gained by incorporating the FM modulation with COOK for SNR values less than 10dB in AWGN case and less than 6dB for Rayleigh and Rician fading channels.
基金supported by the National Key Basic Research Program of China(Grant Nos.2011CBA00200 and 2011CB921200)the National Natural Science Foundation of China(Grant Nos.61201239,6120511811304397 and 61475148)the Strategic Priority Research Program(B)of the Chinese Academy of Sciences(Grant Nos.XDB01030100 and XDB01030300)
文摘Quantum key distribution (QKD) is a technology with the potential capability to achieve information-theoretic security. Phase- coding is an important approach to develop practical QKD systems in fiber channel. In order to improve the phase-coding modulation rate, we proposed a new digital-modulation method in this paper and constructed a compact and robust prototype of QKD system using currently available components in our lab to demonstrate the effectiveness of the method. The system was deployed in laboratory environment over a 50 km fiber and continuously operated during 87 h without manual interaction. The quantum bit error rate (QBER) of the system was stable with an average value of 3.22% and the secure key generation rate is 8.91 kbps. Although the modulation rate of the photon in the derno system was only 200 MHz, which was limited by the Faraday- Michelson interferometer (FMI) structure, the proposed method and the field programmable gate array (FPGA) based electronics scheme have a great potential for high speed QKD systems with Giga-bits/second modulation rate.
文摘In today's globalized digital world, networkbased, mobile, and interactive collaborations have enabled work platforms of personal computers to cross multiple geographical boundaries. The new requirements of privacy-preservation, sensitive information sharing, portability, remote attestation, and robust security create new problems in system design and implementation. There are critical demands for highly secure work platforms and security enhancing mechanisms for ensuring privacy protection, component integrity, sealed storage, and remote attestation of platforms. Trusted computing is a promising technology for enhancing the security of a platform using a trusted platform module (TPM). TPM is a tamper-resistant microcontroller designed to provide robust security capabilities for computing platforms. It typically is affixed to the motherboard with a low pin count (LPC) bus. However, it limited in that TPM cannot be used directly in current common personal computers (PCs), and TPM is not flexible and portable enough to be used in different platforms because of its interface with the PC and its certificate and key structure. For these reasons, we propose a portable trusted platform module (PTPM) scheme to build a trusted platform for the common PC based on a single cryptographic chip with a universal serial bus (USB) interface and extensible firmware interface (EFI), by which platforms can get a similar degree of security protection in general-purpose systems. We show the structure of certificates and keys, which can bind to platforms via a PTPM and provide users with portability and flexibility in different platforms while still allowing the user and platform to be protected and attested. The implementation of prototype system is described in detail and the performance of the PTPM on cryptographic operations and time-costs of the system bootstrap are evaluated and analyzed. The results of experiments show that PTPM has high performances for supporting trusted computing and it can be used flexibly and portably by the user.
基金Supported by the National Natural Science Foundation of China(No.81173626,81530102,and 30973913)
文摘Hyperlipidemia, type 2 diabetes mellitus, nonalcoholic fatty liver and many other metabolic disorder are frequently co-existing in patients. In addition, these diseases are closely related in pathophysiological settings. However, increasing of the disease incidence, lacking of comprehensive prevention and control measurements against the key pathology point concomitant occurrence with the pattem of the single disease, single target therapy, that is leading therapeutic strategy for these metabolic disorders in the setting of Western medicine (WM). On the basis of the combination of the advantages of integrated Chinese medicine (CM) and WM, with unified understanding of such diseases, the new concept of glucolipid metabolic disease (GLMD) is introduced. In this new concept, disorders in glucose and lipid metabolism are recognized as the key trigger and major driving force for the progress of GLMD. The key points of pathology included dysfunction of neuronal-endocrine-immune system,insulin resistance, oxidative stress, inflammation and intestinal flora imbalance. In the core pathogenic perspective of CM, it can be explained as "Gan (Liver) Shi Shu Xie" (dysfunction of Gan in metabolism and emotion regulation) that will lead to the occurence/production of endogenous dampness and phlegm, blood stasis and turbid. This leads to the new concept of "Liver-based regulatory system for metabolic homeostasis" to be introduced further. The comprehensive prevention and control strategy "Tiao Gan Qi Shu Hua Zhuo" (modulating Gan, trigging key metabolic system to resolve pathogenic factors such as phlegm retention and dampness). Its representative formula Fufang Zhenzhu Tiaozhi Capsule (复方贞术调脂胶囊) is innovated under such rationales. Comment for some commonly-used CM GLMD therapeutic drugs was presented. High-level evidence-based and epidemiological and mechanism studies should be carded out to further interpret and explain of the scientific connotation of GLMD.
基金supported by National Natural Science Foundation of China(Grant Nos.11971250 and 12071320)Sichuan Science and Technology Program(Grant No.2020YJ0006)。
文摘Let w be a permutation of{1,2,...,n},and let D(w)be the Rothe diagram of w.The Schubert polynomial■w_(x)can be realized as the dual character of the flagged Weyl module associated with D(w).This implies the following coefficient-wise inequality:Min_(x)≤■_(w)(x)≤Max_(w)xwhere both Min_(w)(x)and Max_(w)(x)are polynomials determined by D(w).Fink et al.(2018)found that■w_(x)equals the lower bound Min_(w)(x)if and only if w avoids twelve permutation patterns.In this paper,we show that■w_(x)reaches the upper bound Max_(w)(x)if and only if w avoids two permutation patterns 1432 and 1423.Similarly,for any given compositionα∈Z^(n)≥0,one can define a lower bound Min_(α)(x)and an upper bound Max_(α)(x)for the key polynomialκ_(α)(x).Hodges and Yong(2020)established thatκ_(α)(x)equals Min_(α)(x)if and only ifαavoids five composition patterns.We show thatκ_(α)(x)equals Max_(α)(x)if and only ifαavoids a single composition pattern(0,2).As an application,we obtain that whenαavoids(0,2),the key polynomialκ_(α)(x)is Lorentzian,partially verifying a conjecture of Huh et al.(2019).