期刊文献+
共找到727篇文章
< 1 2 37 >
每页显示 20 50 100
100 Gb/s coherent chaotic optical communication over 800 km fiber transmission via advanced digital signal processing 被引量:7
1
作者 Yunhao Xie Zhao Yang +3 位作者 Mengyue Shi Qunbi Zhuge Weisheng Hu Lilin Yi 《Advanced Photonics Nexus》 2024年第1期20-25,共6页
Chaotic optical communication has shown large potential as a hardware encryption method in the physical layer.As an important figure of merit,the bit rate–distance product of chaotic optical communication has been co... Chaotic optical communication has shown large potential as a hardware encryption method in the physical layer.As an important figure of merit,the bit rate–distance product of chaotic optical communication has been continually improved to 30 Gb/s×340 km,but it is still far from the requirement for a deployed optical fiber communication system,which is beyond 100 Gb/s×1000 km.A chaotic carrier can be considered as an analog signal and suffers from fiber channel impairments,limiting the transmission distance of high-speed chaotic optical communications.To break the limit,we propose and experimentally demonstrate a pilot-based digital signal processing scheme for coherent chaotic optical communication combined with deep-learning-based chaotic synchronization.Both transmission impairment recovery and chaotic synchronization are realized in the digital domain.The frequency offset of the lasers is accurately estimated and compensated by determining the location of the pilot tone in the frequency domain,and the equalization and phase noise compensation are jointly performed by the least mean square algorithm through the time domain pilot symbols.Using the proposed method,100 Gb∕s chaotically encrypted quadrature phase-shift keying(QPSK)signal over 800 km single-mode fiber(SMF)transmission is experimentally demonstrated.In order to enhance security,40 Gb∕s real-time chaotically encrypted QPSK signal over 800 km SMF transmission is realized by inserting pilot symbols and tone in a field-programmable gate array.This method provides a feasible approach to promote the practical application of chaotic optical communications and guarantees the high security of chaotic encryption. 展开更多
关键词 chaotic optical communication physical layer security deep learning digital signal processing
在线阅读 下载PDF
Pulse duration tunable ultra-narrow bandwidth mode-locked lasers
2
作者 Weixi Li Lilong Dai +8 位作者 Qianqian Huang Meng Zou Xiangpeng Xiao Siyu Luo Siyu Chen Yingxiong Song Yunqi Liu Zhijun Yan Chengbo Mou 《Advanced Photonics Nexus》 2025年第3期168-175,共8页
Ultra-narrow bandwidth mode-locked lasers with tunable pulse duration can be versatile light sources for diverse applications.However,the spectral-temporal control of a narrow bandwidth mode-locked laser is challengin... Ultra-narrow bandwidth mode-locked lasers with tunable pulse duration can be versatile light sources for diverse applications.However,the spectral-temporal control of a narrow bandwidth mode-locked laser is challenging due to limited gain and nonlinearity,hindering practical applications of such lasers.We demonstrate a pulse duration widely tunable mode-locked ultra-narrow bandwidth laser using a composite filtering mechanism and a single-wall carbon nanotube.The laser pulse duration can be adjusted from 481 ps to 1.38 ns,which is the widest tuning range achieved in narrow-bandwidth passively mode-locked lasers.When the pulse duration is 1.38 ns,the corresponding spectral width reaches 4 pm(502 MHz).Numerical simulations support the experimental results and show that the evolution of long pulses in the laser cavity behaves similarly to a quasi-continuous wave with a low breathing ratio.We have not only designed a simple and flexible tunable scheme for the dilemma of spectral-temporal control in narrow-bandwidth mode-locked fiber lasers but also provided a unique and idealized light source for various applications that takes into account robust output. 展开更多
关键词 mode-locked fiber laser ultra-narrow bandwidth nanosecond pulse single-walled carbon nanotube spectral-temporal control
在线阅读 下载PDF
DRL-AMIR: Intelligent Flow Scheduling for Software-Defined Zero Trust Networks
3
作者 Wenlong Ke Zilong Li +5 位作者 Peiyu Chen Benfeng Chen Jinglin Lv Qiang Wang Ziyi Jia Shigen Shen 《Computers, Materials & Continua》 2025年第8期3305-3319,共15页
Zero Trust Network(ZTN)enhances network security through strict authentication and access control.However,in the ZTN,optimizing flow control to improve the quality of service is still facing challenges.Software Define... Zero Trust Network(ZTN)enhances network security through strict authentication and access control.However,in the ZTN,optimizing flow control to improve the quality of service is still facing challenges.Software Defined Network(SDN)provides solutions through centralized control and dynamic resource allocation,but the existing scheduling methods based on Deep Reinforcement Learning(DRL)are insufficient in terms of convergence speed and dynamic optimization capability.To solve these problems,this paper proposes DRL-AMIR,which is an efficient flow scheduling method for software defined ZTN.This method constructs a flow scheduling optimization model that comprehensively considers service delay,bandwidth occupation,and path hops.Additionally,it balances the differentiated requirements of delay-critical K-flows,bandwidth-intensive D-flows,and background B-flows through adaptiveweighting.Theproposed framework employs a customized state space comprising node labels,link bandwidth,delaymetrics,and path length.It incorporates an action space derived fromnode weights and a hybrid reward function that integrates both single-step and multi-step excitation mechanisms.Based on these components,a hierarchical architecture is designed,effectively integrating the data plane,control plane,and knowledge plane.In particular,the adaptive expert mechanism is introduced,which triggers the shortest path algorithm in the training process to accelerate convergence,reduce trial and error costs,and maintain stability.Experiments across diverse real-world network topologies demonstrate that DRL-AMIR achieves a 15–20%reduction in K-flow transmission delays,a 10–15%improvement in link bandwidth utilization compared to SPR,QoSR,and DRSIR,and a 30%faster convergence speed via adaptive expert mechanisms. 展开更多
关键词 Zero trust network software-defined networking deep reinforcement learning flow scheduling
在线阅读 下载PDF
An Effective Adversarial Defense Framework:From Robust Feature Perspective
4
作者 Baolin Li Tao Hu +2 位作者 Xinlei Liu Jichao Xie Peng Yi 《Computers, Materials & Continua》 2025年第10期2141-2155,共15页
Deep neural networks are known to be vulnerable to adversarial attacks.Unfortunately,the underlying mechanisms remain insufficiently understood,leading to empirical defenses that often fail against new attacks.In this... Deep neural networks are known to be vulnerable to adversarial attacks.Unfortunately,the underlying mechanisms remain insufficiently understood,leading to empirical defenses that often fail against new attacks.In this paper,we explain adversarial attacks from the perspective of robust features,and propose a novel Generative Adversarial Network(GAN)-based Robust Feature Disentanglement framework(GRFD)for adversarial defense.The core of GRFD is an adversarial disentanglement structure comprising a generator and a discriminator.For the generator,we introduce a novel Latent Variable Constrained Variational Auto-Encoder(LVCVAE),which enhances the typical beta-VAE with a constrained rectification module to enforce explicit clustering of latent variables.To supervise the disentanglement of robust features,we design a Robust Supervisory Model(RSM)as the discriminator,sharing architectural alignment with the target model.The key innovation of RSM is our proposed Feature Robustness Metric(FRM),which serves as part of the training loss and synthesizes the classification ability of features as well as their resistance to perturbations.Extensive experiments on three benchmark datasets demonstrate the superiority of GRFD:it achieves 93.69%adversarial accuracy on MNIST,77.21%on CIFAR10,and 58.91%on CIFAR100 with minimal degradation in clean accuracy.Codes are available at:(accessed on 23 July 2025). 展开更多
关键词 Adversarial defense robust features DISENTANGLEMENT VAE GAN
在线阅读 下载PDF
Channel-Adaptive Interleaving Pattern Design for LDPC Considering Burst-Errors in PON Systems
5
作者 Zhang Lei Yang Chuanchuan Zhang Fan 《China Communications》 2025年第10期161-169,共9页
Recently,the NGPON2 standards organization has decided to deploy LDPC code in upstream and downstream channels in next-generation Ethernet passive optical network(NG-EPON)systems.However,PON upstream channels operate ... Recently,the NGPON2 standards organization has decided to deploy LDPC code in upstream and downstream channels in next-generation Ethernet passive optical network(NG-EPON)systems.However,PON upstream channels operate in burst-mode,hence the turn-on effects in optical network units(ONUs)may introduce burst errors,which are difficult for LDPC to deal with.One of the solutions is introducing an interleaver to convert consecutive burst errors into separate random errors.The traditional interleavers such as the block interleaver and the random interleaver,only consider dispersing the consecutive errors.In this paper,we present a design methodology for channel-adaptive interleaving pattern by joint optimizing of interleaving and LDPC decoding in PON systems deploying LDPC codes.After determining the interleaving pattern where the bits can be recovered with more reliable messages during LDPC iterative decoding,we map the bits from the potential locations of burst errors to the interleaving positions.By doing so,we can not only disperse the burst errors but also make full use of the LDPC code to improve its decoding performance.The numerical results show that the proposed interleaving scheme has a better performance under any burst-error length. 展开更多
关键词 burst error channel-adaptive low-density parity-check(LDPC) passive optical network(PON)
在线阅读 下载PDF
Wavelength- and structure-insensitive on-chip mode manipulation based on the Thouless pumping mechanism
6
作者 Yingdi Pan Lu Sun +8 位作者 Jingchi Li Qiyao Sun Pan Hu Songyue Liu Qi Lu Xiong Ni Xintao He Jianwen Dong Yikai Su 《Advanced Photonics Nexus》 2025年第3期131-140,共10页
Coupled-waveguide devices are essential in photonic integrated circuits for coupling,polarization handling,and mode manipulation.However,the performance of these devices usually suffers from high wavelength and struct... Coupled-waveguide devices are essential in photonic integrated circuits for coupling,polarization handling,and mode manipulation.However,the performance of these devices usually suffers from high wavelength and structure sensitivity,which makes it challenging to realize broadband and reliable on-chip optical functions.Recently,topological pumping of edge states has emerged as a promising solution for implementing robust optical couplings.In this paper,we propose and experimentally demonstrate broadband on-chip mode manipulation with very large fabrication tolerance based on the Rice–Mele modeled silicon waveguide arrays.The Thouless pumping mechanism is employed in the design to implement broadband and robust mode conversion and multiplexing.The experimental results prove that various mode-order conversions with low insertion losses and intermodal crosstalk can be achieved over a broad bandwidth of 80 nm ranging from 1500 to 1580 nm.Thanks to such a topological design,the device has a remarkable fabrication tolerance of±70 nm for the structural deviations in waveguide width and gap distance,which is,to the best of our knowledge,the highest among the coupled-waveguide mode-handling devices reported so far.As a proof-of-concept experiment,we cascade the topological mode-order converters to form a four-channel mode-division multiplexer and demonstrate the transmission of a 200-Gb/s 16-quadrature amplitude modulation signal for each mode channel,with the bit error rates below the 7%forward error correction threshold of 3.8×10^(-3).We reveal the possibility of developing new classes of broadband and fabrication-tolerant coupled-waveguide devices with topological photonic approaches,which may find applications in many fields,including optical interconnects,quantum communications,and optical computing. 展开更多
关键词 topological photonics Thouless pumping coupled-waveguide device on-chip mode manipulation
在线阅读 下载PDF
Artificial-gauge-field-based inverse design for wideband-flat power splitter and microring resonator
7
作者 Zhaonian Wang Jiangbing Du +3 位作者 Yixuan Huang Xi Wang Ke Xu Zuyuan Hea 《Advanced Photonics Nexus》 2025年第1期1-8,共8页
A power splitter with a wideband arbitrary splitting ratio,which provides flexibility and adaptability in forming photonic devices such as microring resonators and Mach–Zehnder interferometers,proves to be essential ... A power splitter with a wideband arbitrary splitting ratio,which provides flexibility and adaptability in forming photonic devices such as microring resonators and Mach–Zehnder interferometers,proves to be essential in photonic integrated circuits(PICs).We designed and fabricated a directional coupler-based power splitter with a wideband arbitrary splitting ratio and a microring resonator with a wideband uniform extinction ratio(ER)based on artificial gauge field(AGF)optimization.The neural network-aided inverse design method is applied to complete the target.Less than 0.9 dB power splitting variation and 1.6 dB ER variation have been achieved experimentally over a 100-nm bandwidth.Wideband performance,design efficiency,and device compactness are obtained by utilizing this optimization,which indicates great potential and universality in PIC applications. 展开更多
关键词 power splitter artificial gauge field inverse design.
在线阅读 下载PDF
Direct detection with an optimal transfer function:toward the electrical spectral efficiency of coherent homodyne detection
8
作者 Xingfeng Li Jingchi Li +5 位作者 Xiong Ni Hudi Liu Qunbi Zhuge Haoshuo Chen William Shieh Yikai Su 《Opto-Electronic Science》 2025年第2期1-15,共15页
Complex-valued double-sideband direct detection(DD)can reconstruct the optical field and achieve a high electrical spectral efficiency(ESE)comparable to that of a coherent homodyne receiver,and DD does not require a c... Complex-valued double-sideband direct detection(DD)can reconstruct the optical field and achieve a high electrical spectral efficiency(ESE)comparable to that of a coherent homodyne receiver,and DD does not require a costly local oscillator laser.However,a fundamental question remains if there is an optimal DD receiver structure with the simplest design to approach the performance of the coherent homodyne detection.This study derives the optimal DD receiver structure with an optimal transfer function to recover a quadrature amplitude modulation(QAM)signal with a near-zero guard band at the central frequency of the signal.We derive the theoretical ESE limit for various detection schemes by invoking Shannon’s formula.Our proposed scheme is closest to coherent homodyne detection in terms of the theoretical ESE limit.By leveraging a WaveShaper to construct the optimal transfer function,we conduct a proof-of-concept experiment to transmit a net 228.85-Gb/s 64-QAM signal over an 80-km single-mode fiber with a net ESE of 8.76 b/s/Hz.To the best of our knowledge,this study reports the highest net ESE per polarization per wavelength for DD transmission beyond 40-km single-mode fiber.For a comprehensive metric,denoted as 2ESE×Reach,we achieve the highest 2ESE×Reach per polarization per wavelength for DD transmission. 展开更多
关键词 optical communication direct detection optical field recovery electrical spectral efficiency
在线阅读 下载PDF
An adjustment-free laser resonator based on micron-scale corner cube array
9
作者 Pengyuan Chang Xinrong Huang +4 位作者 Caolei Fu Aiping Liu Duo Pan Zhiyang Wang Jingbiao Chen 《Chinese Physics B》 2025年第3期382-387,共6页
The topic of improving the mechanical stability of external cavity diode lasers(ECDLs)has recently attracted widespread attention and interest.The use of corner-cube-array(CCA)-based resonators provides a potential so... The topic of improving the mechanical stability of external cavity diode lasers(ECDLs)has recently attracted widespread attention and interest.The use of corner-cube-array(CCA)-based resonators provides a potential solution for this purpose,although continuous oscillation at super large incident angle remains challenging.In this work,we employ the CCA resonator to generate continuous oscillation within±20°angular misalignment of cavity mirror in experiment.On the basis of retroreflection theory,the retroreflectivity of a CCA is analyzed by using optical simulation software.Notably,the experiment verifies the advantage of using a CCA over a plane mirror in laser resonator,thereby providing a promising approach for ECDLs.The threshold characteristic curves measured at different incident angles in the experiment verify that the CCA possesses an obvious anti-angle misalignment performance.This research introduces an alternative solution of using CCA resonator instead of parallel plane cavity,thereby realizing an adjustment-free ECDL with enhanced mechanical stability. 展开更多
关键词 laser resonant cavity corner cube array external cavity diode laser threshold curve
原文传递
Edges Metric Constrained PEG Algorithm for Designing LDPC Codes
10
作者 Qin Xin Yang Chuanchuan +3 位作者 Jiang Xiaotian Hu Jiazhe Wang Xinyue Wang Ziyu 《China Communications》 2025年第10期179-185,共7页
The progressive edge-growth(PEG)al-gorithm is a general method to construct short low-density parity-check(LDPC)codes and it is a greedy method to place each edge with large girths.In order to improve the performance ... The progressive edge-growth(PEG)al-gorithm is a general method to construct short low-density parity-check(LDPC)codes and it is a greedy method to place each edge with large girths.In order to improve the performance of LDPC codes,many im-proved PEG(IPEG)algorithms employ multi metrics to select surviving edges in turn.In this paper,the pro-posed edges metric(EM)based on message-passing algorithm(MPA)is introduced to PEG algorithm and the proposed EM constrained PEG(EM-PEG)algo-rithm mainly considers the independence of message passing from different nodes in Tanner graph.The numerical results show that our EM-PEG algorithm brings better bit error rate(BER)performance gains to LDPC codes than the traditional PEG algorithm and the powerful multi-edge multi-metric constrained PEG algorithm(MM-PEGA)proposed recently.In ad-dition,the multi-edge EM constrained PEG(M-EM-PEG)algorithm which adopts multi-edge EM may fur-ther improve the BER performance. 展开更多
关键词 low-density parity-check(LDPC)codes message-passing algorithm(MPA) progressive edge-growth(PEG)algorithm
在线阅读 下载PDF
Physical Layer Security for UAV Communications:A Comprehensive Survey 被引量:9
11
作者 Jue Wang Xuanxuan Wang +5 位作者 Ruifeng Gao Chengleyang Lei Wei Feng Ning Ge Shi Jin Tony Q.S.Quek 《China Communications》 SCIE CSCD 2022年第9期77-115,共39页
Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an... Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an open environment,UAV communications benefit from dominant line-of-sight links;however,this on the other hand renders the communications more vulnerable to malicious attacks.Recently,physical layer security(PLS)has been introduced to UAV systems as an important complement to the conventional cryptography-based approaches.In this paper,a comprehensive survey on the current achievements of UAV-PLS is conducted.We first introduce the basic concepts including typical static/-mobile UAV deployment scenarios,the unique air-toground channel and aerial nodes distribution models,as well as various roles that a UAV may act when PLS is concerned.Then,we start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems,and extend the discussion to the more general scenario where the UAVs’mobility is further exploited.For both cases,respectively,we summarize the commonly adopted methodologies,then describe important works in the litera ture in detail.Finally,potential research directions and challenges are discussed to provide an outlook for future works in the area of UAV-PLS. 展开更多
关键词 physical layer security UAV communications static/mobile UAV deployment air-to-ground channel trajectory optimization
在线阅读 下载PDF
M3SC:A Generic Dataset for Mixed Multi-Modal(MMM)Sensing and Communication Integration 被引量:5
12
作者 Xiang Cheng Ziwei Huang +6 位作者 Lu Bai Haotian Zhang Mingran Sun Boxun Liu Sijiang Li Jianan Zhang Minson Lee 《China Communications》 SCIE CSCD 2023年第11期13-29,共17页
The sixth generation(6G)of mobile communication system is witnessing a new paradigm shift,i.e.,integrated sensing-communication system.A comprehensive dataset is a prerequisite for 6G integrated sensing-communication ... The sixth generation(6G)of mobile communication system is witnessing a new paradigm shift,i.e.,integrated sensing-communication system.A comprehensive dataset is a prerequisite for 6G integrated sensing-communication research.This paper develops a novel simulation dataset,named M3SC,for mixed multi-modal(MMM)sensing-communication integration,and the generation framework of the M3SC dataset is further given.To obtain multimodal sensory data in physical space and communication data in electromagnetic space,we utilize Air-Sim and WaveFarer to collect multi-modal sensory data and exploit Wireless InSite to collect communication data.Furthermore,the in-depth integration and precise alignment of AirSim,WaveFarer,andWireless InSite are achieved.The M3SC dataset covers various weather conditions,multiplex frequency bands,and different times of the day.Currently,the M3SC dataset contains 1500 snapshots,including 80 RGB images,160 depth maps,80 LiDAR point clouds,256 sets of mmWave waveforms with 8 radar point clouds,and 72 channel impulse response(CIR)matrices per snapshot,thus totaling 120,000 RGB images,240,000 depth maps,120,000 LiDAR point clouds,384,000 sets of mmWave waveforms with 12,000 radar point clouds,and 108,000 CIR matrices.The data processing result presents the multi-modal sensory information and communication channel statistical properties.Finally,the MMM sensing-communication application,which can be supported by the M3SC dataset,is discussed. 展开更多
关键词 multi-modal sensing RAY-TRACING sensing-communication integration simulation dataset
在线阅读 下载PDF
New Optimal Power Allocation for Bidirectional Communications in Cognitive Relay Network Using Analog Network Coding 被引量:2
13
作者 LU Luxi JIANG Wei XIANG Haige LUO Wu 《China Communications》 SCIE CSCD 2010年第4期144-148,共5页
Cognitive radio and cooperative communication can greatly improve the spectrum efficiency in wireless communications.We study a cognitive radio network where two secondary source terminals exchange their information w... Cognitive radio and cooperative communication can greatly improve the spectrum efficiency in wireless communications.We study a cognitive radio network where two secondary source terminals exchange their information with the assistance of a relay node under interference power constraints.In order to enhance the transmit rate and maintain fairness between two source terminals,a practical 2-phase analog network coding protocol is adopted and its optimal power allocation algorithm is proposed.Numerical results verify the superiority of the proposed algorithm over the conventional direct transmission protocol and 4-phase amplify-and-forward relay protocol. 展开更多
关键词 Cognitive Radio Cooperative Communication Analog Network Coding Bidirectional Communications Interference power constraint
在线阅读 下载PDF
Capacity Analysis and Sum Rate Maximization for the SCMA Cellular Network Coexisting with D2D Communications 被引量:1
14
作者 Yukai Liu Wen Chen 《China Communications》 SCIE CSCD 2022年第10期55-68,共14页
Sparse code multiple access (SCMA) is the most concerning scheme among non-orthogonal multiple access (NOMA) technologies for 5G wireless communication new interface. Another efficient technique in 5G aimed to improve... Sparse code multiple access (SCMA) is the most concerning scheme among non-orthogonal multiple access (NOMA) technologies for 5G wireless communication new interface. Another efficient technique in 5G aimed to improve spectral efficiency for local communications is device-to-device (D2D) communications. Therefore, we utilize the SCMA cellular network coexisting with D2D communications for the connection demand of the Internet of things (IOT), and improve the system sum rate performance of the hybrid network. We first derive the information-theoretic expression of the capacity for all users and find the capacity bound of cellular users based on the mutual interference between cellular users and D2D users. Then we consider the power optimization problem for the cellular users and D2D users jointly to maximize the system sum rate. To tackle the non-convex optimization problem, we propose a geometric programming (GP) based iterative power allocation algorithm. Simulation results demonstrate that the proposed algorithm converges fast and well improves the sum rate performance. 展开更多
关键词 SCMA D2D cellular capacity geometric programming
在线阅读 下载PDF
A Survey on Heliumspeech Communications in Saturation Diving 被引量:1
15
作者 Shibing Zhang Lili Guo +3 位作者 Hongjun Li Zhihua Bao Xiaoge Zhang Yonghong Chen 《China Communications》 SCIE CSCD 2020年第6期68-79,共12页
With the development of society and the progress of technology,more and more ocean activities are carried out.It results in booming of deep-sea diving.The use of helium-oxygen mixture(as a kind of breathing gas)solves... With the development of society and the progress of technology,more and more ocean activities are carried out.It results in booming of deep-sea diving.The use of helium-oxygen mixture(as a kind of breathing gas)solves the physiological problems of divers in saturated diving,but it brings about the Heliumspeech voice communication problem,the drop of speech intelligibility.There is no doubt that the effective speech communication must be provided for supporting the life and work of divers in deep-sea.This paper describes the mechanism of forming heliumspeech,discusses the effects of pressure and helium environment on the speech spectrum,compares the pros and cons of the time-domain and frequency-domain unscrambling techniques,shows the challenges in heliumspeech communications.Finally,it briefly introduces the deep learning,and points out that deep learning/machine learning may be a perfectly unscrambling technique. 展开更多
关键词 maritime communications saturation diving heliumspeech unscrambling challenging deep learning
在线阅读 下载PDF
A Novel Deterministic Quantum Communication Scheme Using Stabilizer Quantum Code 被引量:3
16
作者 GUO Ying CHEN Zhi-Gang +1 位作者 HUANG Da-Zu ZENG Gui-Hua 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第1期93-99,共7页
Exploiting the encoding process of the stabilizer quantum code [[n, k, d]], a deterministic quantum communication scheme, in which n - 1 photons are distributed forward and backward in two-way channel, is proposed to ... Exploiting the encoding process of the stabilizer quantum code [[n, k, d]], a deterministic quantum communication scheme, in which n - 1 photons are distributed forward and backward in two-way channel, is proposed to transmit the secret messages with unconditional security. The present scheme can be implemented to distribute the secret quantum (or classical) messages with great capacity in imperfect quantum channel since the utilized code encodes k-qubit messages for each scheme run. 展开更多
关键词 quantum key distribution quantum error-correction code quantum information
在线阅读 下载PDF
Trajectory Design for UAV-Enabled Maritime Secure Communications:A Reinforcement Learning Approach 被引量:1
17
作者 Jintao Liu Feng Zeng +3 位作者 Wei Wang Zhichao Sheng Xinchen Wei Kanapathippillai Cumanan 《China Communications》 SCIE CSCD 2022年第9期26-36,共11页
This paper investigates an unmanned aerial vehicle(UAV)-enabled maritime secure communication network,where the UAV aims to provide the communication service to a legitimate mobile vessel in the presence of multiple e... This paper investigates an unmanned aerial vehicle(UAV)-enabled maritime secure communication network,where the UAV aims to provide the communication service to a legitimate mobile vessel in the presence of multiple eavesdroppers.In this maritime communication networks(MCNs),it is challenging for the UAV to determine its trajectory on the ocean,since it cannot land or replenish energy on the sea surface,the trajectory should be pre-designed before the UAV takes off.Furthermore,the take-off location of the UAV and the sea lane of the vessel may be random,which leads to a highly dynamic environment.To address these issues,we propose two reinforcement learning schemes,Q-learning and deep deterministic policy gradient(DDPG)algorithms,to solve the discrete and continuous UAV trajectory design problem,respectively.Simulation results are provided to validate the effectiveness and superior performance of the proposed reinforcement learning schemes versus the existing schemes in the literature.Additionally,the proposed DDPG algorithm converges faster and achieves higher utilities for the UAV,compared to the Q-learning algorithm. 展开更多
关键词 maritime communication networks(MCNs) unmanned aerial vehicles(UAV) reinforcement learning physical layer security trajectory design
在线阅读 下载PDF
Quantum Secure Direct Intercommunication with Superdense Coding and Entanglement Swapping 被引量:1
18
作者 HUANG Da-Zu GUO Ying ZENG Gui-Hua 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第12期1290-1294,共5页
A quantum secure direct intercommunication scheme is proposed to exchange directly the communicators' secret messages by making ase of swapping entanglement of Bell states. It has great capacity to distribute the sec... A quantum secure direct intercommunication scheme is proposed to exchange directly the communicators' secret messages by making ase of swapping entanglement of Bell states. It has great capacity to distribute the secret messages since these messages have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. The security is ensured by the secure transmission of the travel sequences and the application of entanglement swapping. 展开更多
关键词 quantum secure direct intercommunication entanglement swapping quantum cryptography
在线阅读 下载PDF
The Acquisition of Sand Vibration Information in Hinterland of Desert Based on Advanced Remote Sensing System and Network Technologies
19
作者 马鑫 邓顺戈 李新碗 《Journal of Shanghai Jiaotong university(Science)》 EI 2018年第1期28-32,共5页
The deep understanding on sand and sand dunes scale can be useful to reveal the formation mechanism of the sandstorm for early sandstorm forecast. The current sandstorm observation methods are mainly based on conventi... The deep understanding on sand and sand dunes scale can be useful to reveal the formation mechanism of the sandstorm for early sandstorm forecast. The current sandstorm observation methods are mainly based on conventional meteorological station and satellites remote sensing, which are difficult to acquire sand scale information. A wireless sensing network is implemented in the hinterland of desert, which includes ad hoc network,sensor, global positioning system(GPS) and system integration technology. The wireless network is a three-layer architecture and daisy chain topology network, which consists of control station, master robots and slave robots.Every three robots including one master robot and its two slave robots forms an ad hoc network. Master robots directly communicate with radio base station. Information will be sent to remote information center. Data sensing system including different kinds of sensors and desert robots is developed. A desert robot is designed and implemented as unmanned probing movable nodes and sensors' carrier. A new optical fiber sensor is exploited to measure vibration of sand in particular. The whole system, which is delivered to the testing field in hinterland of desert(25 km far from base station), has been proved efficient for data acquisition. 展开更多
关键词 SANDSTORM sand-scale information optical fiber sensor desert robot wireless sensor network
原文传递
Packet Transport for Maritime Communications:A Streaming Coded UDP Approach
20
作者 Ye Li Jianhao Yu +3 位作者 Liang Chen Yingdong Hu Xiaomin Chen Jue Wang 《China Communications》 SCIE CSCD 2022年第9期10-25,共16页
The maritime communication network(MCN)plays an important role in the 6th generation(6G)system development.In MCNs,packet transport over long-distance lossy links will be ubiquitous.Transmission control protocol(TCP),... The maritime communication network(MCN)plays an important role in the 6th generation(6G)system development.In MCNs,packet transport over long-distance lossy links will be ubiquitous.Transmission control protocol(TCP),the dominant transport protocol in the past decades,have had performance issues in such links.In this paper,we propose a novel transport approach which uses user datagram protocol(UDP)along with a simple yet effective bandwidth estimator for congestion control,and with a proactive packet-level forward erasure correction(FEC)code called streaming code to provide low-delay loss recovery without data retransmissions at all.We show that the approach can effectively address two issues of the state-of-the-art TCP variants in the long-distance lossy links,namely 1)the low bandwidth utilization caused by the slow increase of the congestion window(CWND)due to long roundtrip time(RTT)and the frequent CWND drop due to random and congestion losses,and 2)the high endto-end in-order delivery delay when re-transmissions are incurred to recover lost packets.In addition,we show that the scheme’s goodput has good smoothness and short-term intra-protocol fairness properties,which are beneficial for multimedia streaming and interactive applications that are prominent parts of today’s wireless traffic. 展开更多
关键词 maritime communication network forward-erasure correction congestion control
在线阅读 下载PDF
上一页 1 2 37 下一页 到第
使用帮助 返回顶部