Visual question answering(VQA)is a multimodal task,involving a deep understanding of the image scene and the question’s meaning and capturing the relevant correlations between both modalities to infer the appropriate...Visual question answering(VQA)is a multimodal task,involving a deep understanding of the image scene and the question’s meaning and capturing the relevant correlations between both modalities to infer the appropriate answer.In this paper,we propose a VQA system intended to answer yes/no questions about real-world images,in Arabic.To support a robust VQA system,we work in two directions:(1)Using deep neural networks to semantically represent the given image and question in a fine-grainedmanner,namely ResNet-152 and Gated Recurrent Units(GRU).(2)Studying the role of the utilizedmultimodal bilinear pooling fusion technique in the trade-o.between the model complexity and the overall model performance.Some fusion techniques could significantly increase the model complexity,which seriously limits their applicability for VQA models.So far,there is no evidence of how efficient these multimodal bilinear pooling fusion techniques are for VQA systems dedicated to yes/no questions.Hence,a comparative analysis is conducted between eight bilinear pooling fusion techniques,in terms of their ability to reduce themodel complexity and improve themodel performance in this case of VQA systems.Experiments indicate that these multimodal bilinear pooling fusion techniques have improved the VQA model’s performance,until reaching the best performance of 89.25%.Further,experiments have proven that the number of answers in the developed VQA system is a critical factor that a.ects the effectiveness of these multimodal bilinear pooling techniques in achieving their main objective of reducing the model complexity.The Multimodal Local Perception Bilinear Pooling(MLPB)technique has shown the best balance between the model complexity and its performance,for VQA systems designed to answer yes/no questions.展开更多
A quantum secure direct intercommunication scheme is proposed to exchange directly the communicators' secret messages by making ase of swapping entanglement of Bell states. It has great capacity to distribute the sec...A quantum secure direct intercommunication scheme is proposed to exchange directly the communicators' secret messages by making ase of swapping entanglement of Bell states. It has great capacity to distribute the secret messages since these messages have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. The security is ensured by the secure transmission of the travel sequences and the application of entanglement swapping.展开更多
For the beam splitter attack strategy against quantum key distribution using two-mode squeezed states, the analytical expression of the optimal beam splitter parameter is provided in this paper by applying the Shannon...For the beam splitter attack strategy against quantum key distribution using two-mode squeezed states, the analytical expression of the optimal beam splitter parameter is provided in this paper by applying the Shannon information theory. The theoretical secret information rate after error correction and privacy amplification is given in terms of the squeezed parameter and channel parameters. The results show that the two-mode squeezed state quantum key distribution is secure against an optimal beam splitter attack.展开更多
The?convergence of the Internet, sensor networks, and Radio Frequency Identification (RFID) systems has ushered to the concept of Internet of Things (IoT) which is capable of connecting daily things, making them smart...The?convergence of the Internet, sensor networks, and Radio Frequency Identification (RFID) systems has ushered to the concept of Internet of Things (IoT) which is capable of connecting daily things, making them smart through sensing, reasoning, and cooperating with other things. Further, RFID technology enables tracking of an object and assigning it a unique ID. IoT has the potential for a wide range of applications relating to healthcare, environment, transportation, cities… Moreover, the middleware is a basic component in the IoT architecture. It handles heterogeneity issues among IoT devices and provides a common framework for communication. More recently, the interest has focusing on developing publish/subscribe middleware systems for the IoT to allow asynchronous communication between the IoT devices. The scope of our paper is to study routing protocols for publish/subscribe schemes that include content and context-based routing. We propose an Energy-Efficient Content-Based Routing (EECBR) protocol for the IoT that minimizes the energy consumption. The proposed algorithm makes use of a virtual topology that is constructed in a centralized manner and then routes the events from the publishers to the intended interested subscribers in a distributed manner. EECBR has been simulated using Omnet++. The simulation results show that EECBR has a significant performance in term of the energy variance compared to the other schemes.展开更多
In the last few years,cyber security has been an essential prerequisite for almost every organization to handle the massive number of emerging cyber attacks worldwide.A critical factor in reducing the possibility of b...In the last few years,cyber security has been an essential prerequisite for almost every organization to handle the massive number of emerging cyber attacks worldwide.A critical factor in reducing the possibility of being exploited is cyber security awareness.Not only having the adequate knowledge but how to utilize this knowledge to prevent cyber attacks.In this paper we conducted a survey that focuses on three vital security parameters,which are trust,passwords and defensive attitude respectively.The survey mainly aimed at assessing cyber security knowledge of 200 students and 100 faculty members in a Sudanese college and how secure these participants think they are according to their current cyber behaviour.56%of the participants are males and 44%are females.The results revealed that all participants were having fairly-low level of security awareness and their defensive attitude is considerably weak and doesn’t protect them either individually or at institutional-level.Nevertheless,faculty member showed better cyber security knowledge and skills by 8%higher than students.This study can be used to develop training approaches that bridge the security gaps depicted by the respondents of the survey questions manipulated in this study.展开更多
This paper investigates an analytical expression of teleportation fidelity in the teleportation scheme of a single mode of electromagnetic field. The fidelity between the original squeezed coherent state and the telep...This paper investigates an analytical expression of teleportation fidelity in the teleportation scheme of a single mode of electromagnetic field. The fidelity between the original squeezed coherent state and the teleported one is expressed in terms of the squeezing parameter r and the quantum channel parameter (two-mode squeezed state) p. The results of analysis show that the fidelity increases with the increase of the quantum channel parameter p, while the fidelity decreases with the increase of the squeezing parameter r of the squeezed state. Thus the coherent state (r= O) is the best quantum signal for continuous variable quantum teleportation once the quantum channel is built.展开更多
A Novel segmentation and feedback model (SFM) applied to resolve collision has been proposed. The SFM is featured with Burst Segmentation and Prioritized Feedback (BSPF) that are used to provide quality of service (Qo...A Novel segmentation and feedback model (SFM) applied to resolve collision has been proposed. The SFM is featured with Burst Segmentation and Prioritized Feedback (BSPF) that are used to provide quality of service (QoS) and realize high throughput and faster switching in the optical burst switched networks. Simulation and performance analyses show that the SFM effectively avoid collision in optical burst switching (OBS). Long delay time of deflection routing and immature technology of wavelength converter and optical buffer are not employed in the SFM. The SFM not only realizes quick switching but also allows preemption for higher priority bursts.展开更多
IP over WDM is being envisioned as one of the most attractive architectures for the next generation Internet. This paper introduces two novel backbone node structures for IP over WDM networks. These node structures ca...IP over WDM is being envisioned as one of the most attractive architectures for the next generation Internet. This paper introduces two novel backbone node structures for IP over WDM networks. These node structures can be used as improvement approaches to DPDP (default path and dedicated path) method. The flow classifiers, which are the main components of these node structures, and the performance metrics of these structures, are also discussed.展开更多
We utilized "direct illumination-type" LED backlight project, made white-light LED array in rectangle, designed a sheet of reflective film, a sheet of diffuser and two sheets of brightness enhancement film, ...We utilized "direct illumination-type" LED backlight project, made white-light LED array in rectangle, designed a sheet of reflective film, a sheet of diffuser and two sheets of brightness enhancement film, then analyzed illuminance chart which was the result of simulation in several distance between reflective film and optical film. It showed the best matching between illuminance and uniformity while in 25mm distance. Finally, we discussed some problems with thermal dispersion.展开更多
A new integer linear program (ILP) formulation was developed to solve the problem of shared cycles design for optical networks with and without wavelength conversion. Numerical studies show that the shared cycles de...A new integer linear program (ILP) formulation was developed to solve the problem of shared cycles design for optical networks with and without wavelength conversion. Numerical studies show that the shared cycles design requires much lower redundancy compared with p-cycle design when the maximum number of spans allowed in the cycles is relatively small, but the difference in the redundancy between the two designs becomes smaller or disappears as the maximum number of spans allowed in the cycles increases.展开更多
A multi-sender-controlled quantum teleportation scheme is proposed to teleport several secret quan- tum states from different senders to a distance receiver based on only one Einstein-Podolsky-Rosen (EPR) pair with co...A multi-sender-controlled quantum teleportation scheme is proposed to teleport several secret quan- tum states from different senders to a distance receiver based on only one Einstein-Podolsky-Rosen (EPR) pair with controlled-NOT (CNOT) gates.In the present scheme,several secret single-qubit quantum states are encoded into a multi-qubit entangled quantum state.Two communication modes,i.e.,the detecting mode and the message mode,are employed so that the eavesdropping can be detected easily and the teleported message may be recovered efficiently.It has an advantage over teleporting several different quantum states for one scheme run with more efficiency than the previous quantum teleportation schemes.展开更多
We find that second-order coherence as well as a Hanbury-Brown-Twiss intensity interferometer may provide an optimal approach for eavesdropping detection in the quantum key distribution based on two-mode squeezed vacu...We find that second-order coherence as well as a Hanbury-Brown-Twiss intensity interferometer may provide an optimal approach for eavesdropping detection in the quantum key distribution based on two-mode squeezed vacuum states. With this approach, eavesdropping can be easily detected without sacrificing extra secret bits as the test key. In addition, the efficiency of the quantum key distribution protocol is enhanced greatly.展开更多
Ransomware attacks have been spreading broadly in the last few years,where attackers deny users’access to their systems and encrypt their files until they pay a ransom,usually in Bitcoin.Of course,that is the worst t...Ransomware attacks have been spreading broadly in the last few years,where attackers deny users’access to their systems and encrypt their files until they pay a ransom,usually in Bitcoin.Of course,that is the worst thing that can happen;especially for organizations having sensitive information.In this paper we proposed a cyber security awareness program intended to provide end-users with a rescue checklist in case of being attacked with a ransomware as well as preventing the attack and ways to recover from it.The program aimed at providing cyber security knowledge to 15 employees in a Sudanese trading and investment company.According to their cyber behaviour before the program,the participants showed a low level cyber security awareness that with 72%they are likely of being attacked by a ransomware from a phishing email,which is well known for spreading ransomware attacks.The results revealed that the cyber security awareness program greatly diminished the probability of being attacked by a ransomware with an average of 28%.This study can be used as a real-life ransomware attack rescue plan.展开更多
In designing an optical waveguide with metallic films on a nanometer scale, the random scattering by the natural roughness of the thin film is always ignored. In this paper, we demonstrate that for the ultrahigh-order...In designing an optical waveguide with metallic films on a nanometer scale, the random scattering by the natural roughness of the thin film is always ignored. In this paper, we demonstrate that for the ultrahigh-order modes(UOMs) in the symmetric metal cladding waveguide, such a scattering leads to drastic variations in their spatial distribution at different incident angles. Owing to the high mode density of the UOMs, the random scattering induced coupling can be easily related to different modes with different propagation directions or wavenumbers. At small incident angles, the intra-mode coupling dominates, which results in a spatial distribution in the form of concentric rings. At large incident angles, the inter-mode coupling plays the most important role and leads to an array-like pattern. Experimental evidence via optically trapped nanoparticles support the theoretical hypothesis.展开更多
As cyber threats and attacks are immensely increasing and broadly spreading catastrophically worldwide,cyber security professionals need to cope up with such a highly demanding environment.Security teams,such as Secur...As cyber threats and attacks are immensely increasing and broadly spreading catastrophically worldwide,cyber security professionals need to cope up with such a highly demanding environment.Security teams,such as Security operation Centre(SOC),Incident Response(IR)and Threat management teams are the people responsible for dealing with cyber security threats and attacks from detection to containment and preventing future incidents;which encompasses some significant challenges that might impose some limitations to the efficiency and effectiveness of activities cyber security professionals conduct,as these processes are time-consuming.In this paper we propose an integrated platform to help cyber security professionals to proactively manage cyber security threats and emerging incidents by providing an automated functionality that can optimize the workflow.The proposed security platform is supposed to diminish the average time taken by cyber security professionals to respond to cyber incidents with an average of 42%.This study can be used as a preliminary design for such an integrated platform.展开更多
A method is proposed to recover the refractive index profile of graded waveguide from the effective indices by a cubic spline interpolation function. Numerical analysis of several typical index distributions show that...A method is proposed to recover the refractive index profile of graded waveguide from the effective indices by a cubic spline interpolation function. Numerical analysis of several typical index distributions show that the refractive index profile can be reconstructed closely to its exact profile by the presented interpolation model.展开更多
The advent of the sixth generation(6G)wireless networks envisions an Artificial Intelligence(AI)-native Radio Access Network(AI-RAN),where Deep Reinforcement Learning(DRL)emerges as a key enabler for intelligent and a...The advent of the sixth generation(6G)wireless networks envisions an Artificial Intelligence(AI)-native Radio Access Network(AI-RAN),where Deep Reinforcement Learning(DRL)emerges as a key enabler for intelligent and autonomous network slicing.Despite the demonstrated performance gains of DRL-based solutions in dynamic resource allocation and slice orchestration,their opaque decision-making nature raises critical concerns regarding trust,accountability,and operational deployment.To bridge this gap,Explainable Deep Reinforcement Learning(XDRL)has recently attracted significant attention as a means to enhance transparency,interpretability,and controllability of AI-RAN slicing policies.This survey provides a comprehensive overview of the state of the art in explainable DRL for intelligent network slicing.We first review the fundamental principles of DRL in the context of RAN slicing and identify the unique explainability challenges posed by high-dimensional,multi-slice environments.We then categorize existing XDRL approaches into post-hoc explanation,symbolic abstraction,and human-in-the-loop steering,analyzing their methodologies,strengths,and limitations.Furthermore,we highlight benchmark environments and experimental testbeds that have been employed to evaluate XDRL in realistic network scenarios.Finally,we outline key open challenges,including scalability,generalization across traffic patterns,integration with Large Language Models(LLMs),and alignment with intent-based networking,and discuss promising research directions toward achieving transparent,trustworthy,and human-centric AI-RAN in 6G.展开更多
In this paper, we first present a full numerical simulation for the trapping and retrieval procedure of eight continuing '1' Guassian pulses (i.e., '11111111') in the electromagnetically induced transp...In this paper, we first present a full numerical simulation for the trapping and retrieval procedure of eight continuing '1' Guassian pulses (i.e., '11111111') in the electromagnetically induced transparency (BIT) medium. This simulation shows that an BIT medium has the ability to store multiple light pulses in a shape-preserving way. And we also, for the first time, give the formula evaluating the maximum number of pulses that can be stored by an EIT medium at one time. This work reveals a new possible way to the reversible storage of the photonic information.展开更多
We propose AND, NOR, and XNOR logic gates realized simultaneously for 40-Gb/s networks, in which the realization of NOR and XNOR logic gates using only MgO-doped periodically poled lithium niobate (MgO: PPLN) is re...We propose AND, NOR, and XNOR logic gates realized simultaneously for 40-Gb/s networks, in which the realization of NOR and XNOR logic gates using only MgO-doped periodically poled lithium niobate (MgO: PPLN) is reported. In our configuration, we exploit broadband quasi-phase matching (QPM) cascaded sec- ond harmonic and difference-frequency generation (cSHG/DFG), cascaded sum-frequency and difference- frequency generation (cSFG/DFG) in one MgO:PPLN, and the narrow band QPM sum-frequency genera- tion (SFG) in another MgO:PPLN. The performance, including the quality-factor (Q-factor) and extinction ratio (ER), of the proposed multifunctional logic device is also simulated.展开更多
We report experimental realization of Raman spectra enhancement of copper phthalocyanine, using an on-chip metallic planar waveguide of the sub-millimeter scale. The oscillating ultrahigh order modes excited by the di...We report experimental realization of Raman spectra enhancement of copper phthalocyanine, using an on-chip metallic planar waveguide of the sub-millimeter scale. The oscillating ultrahigh order modes excited by the direct coupling method yield high optical intensity at resonance, which is different from the conventional strategy to create localized "hot spots." The observed excitation efficiency of the Raman signal is significantly enhanced,owing to the high Q factor of the resonant cavity. Furthermore, effective modulation of the Raman intensity is available by adjusting the polymethyl methacrylate(PMMA) thickness in the guiding layer, i.e., by tuning the light–matter interaction length. A large modulation depth is verified through the fact that 10 times variation in the enhancement factor is observed in the experiment as the PMMA thickness varies from 7 to 23 μm.展开更多
文摘Visual question answering(VQA)is a multimodal task,involving a deep understanding of the image scene and the question’s meaning and capturing the relevant correlations between both modalities to infer the appropriate answer.In this paper,we propose a VQA system intended to answer yes/no questions about real-world images,in Arabic.To support a robust VQA system,we work in two directions:(1)Using deep neural networks to semantically represent the given image and question in a fine-grainedmanner,namely ResNet-152 and Gated Recurrent Units(GRU).(2)Studying the role of the utilizedmultimodal bilinear pooling fusion technique in the trade-o.between the model complexity and the overall model performance.Some fusion techniques could significantly increase the model complexity,which seriously limits their applicability for VQA models.So far,there is no evidence of how efficient these multimodal bilinear pooling fusion techniques are for VQA systems dedicated to yes/no questions.Hence,a comparative analysis is conducted between eight bilinear pooling fusion techniques,in terms of their ability to reduce themodel complexity and improve themodel performance in this case of VQA systems.Experiments indicate that these multimodal bilinear pooling fusion techniques have improved the VQA model’s performance,until reaching the best performance of 89.25%.Further,experiments have proven that the number of answers in the developed VQA system is a critical factor that a.ects the effectiveness of these multimodal bilinear pooling techniques in achieving their main objective of reducing the model complexity.The Multimodal Local Perception Bilinear Pooling(MLPB)technique has shown the best balance between the model complexity and its performance,for VQA systems designed to answer yes/no questions.
基金National Natural Science Foundation of China under Grant Nos.60472018,60773085,and 60773012National 863 Project under Grant No.2006AA01Z255+2 种基金the Natural Science Foundation of Hunan Province under Grant No.07JJ3128the Postdoctoral Science Foundation of China under Grant No.20070420184Science and Technology Project of Hunan Province under Grant No.2008RS4016
文摘A quantum secure direct intercommunication scheme is proposed to exchange directly the communicators' secret messages by making ase of swapping entanglement of Bell states. It has great capacity to distribute the secret messages since these messages have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. The security is ensured by the secure transmission of the travel sequences and the application of entanglement swapping.
基金Project supported by the Shanghai Jiaotong University (SJTU) Young Teacher Foundation,China (Grant No A2831B)the SJTU Participating in Research Projects (PRPs),China (Grant No T03011030)the National Natural Science Foundation of China(Grant No 60472018)
文摘For the beam splitter attack strategy against quantum key distribution using two-mode squeezed states, the analytical expression of the optimal beam splitter parameter is provided in this paper by applying the Shannon information theory. The theoretical secret information rate after error correction and privacy amplification is given in terms of the squeezed parameter and channel parameters. The results show that the two-mode squeezed state quantum key distribution is secure against an optimal beam splitter attack.
文摘The?convergence of the Internet, sensor networks, and Radio Frequency Identification (RFID) systems has ushered to the concept of Internet of Things (IoT) which is capable of connecting daily things, making them smart through sensing, reasoning, and cooperating with other things. Further, RFID technology enables tracking of an object and assigning it a unique ID. IoT has the potential for a wide range of applications relating to healthcare, environment, transportation, cities… Moreover, the middleware is a basic component in the IoT architecture. It handles heterogeneity issues among IoT devices and provides a common framework for communication. More recently, the interest has focusing on developing publish/subscribe middleware systems for the IoT to allow asynchronous communication between the IoT devices. The scope of our paper is to study routing protocols for publish/subscribe schemes that include content and context-based routing. We propose an Energy-Efficient Content-Based Routing (EECBR) protocol for the IoT that minimizes the energy consumption. The proposed algorithm makes use of a virtual topology that is constructed in a centralized manner and then routes the events from the publishers to the intended interested subscribers in a distributed manner. EECBR has been simulated using Omnet++. The simulation results show that EECBR has a significant performance in term of the energy variance compared to the other schemes.
文摘In the last few years,cyber security has been an essential prerequisite for almost every organization to handle the massive number of emerging cyber attacks worldwide.A critical factor in reducing the possibility of being exploited is cyber security awareness.Not only having the adequate knowledge but how to utilize this knowledge to prevent cyber attacks.In this paper we conducted a survey that focuses on three vital security parameters,which are trust,passwords and defensive attitude respectively.The survey mainly aimed at assessing cyber security knowledge of 200 students and 100 faculty members in a Sudanese college and how secure these participants think they are according to their current cyber behaviour.56%of the participants are males and 44%are females.The results revealed that all participants were having fairly-low level of security awareness and their defensive attitude is considerably weak and doesn’t protect them either individually or at institutional-level.Nevertheless,faculty member showed better cyber security knowledge and skills by 8%higher than students.This study can be used to develop training approaches that bridge the security gaps depicted by the respondents of the survey questions manipulated in this study.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.60773085,60801051,and 60970109)the National Natural Science Foundation of China-Korea Science and Engineering Foundation International Collaborative Research Funds(Grant Nos.60811140346 and F01-2008-000-10021-0)Shanghai Jiao Tong University Participation in Research Program,China(Grant Nos.T030PRP18001 and T03013002)
文摘This paper investigates an analytical expression of teleportation fidelity in the teleportation scheme of a single mode of electromagnetic field. The fidelity between the original squeezed coherent state and the teleported one is expressed in terms of the squeezing parameter r and the quantum channel parameter (two-mode squeezed state) p. The results of analysis show that the fidelity increases with the increase of the quantum channel parameter p, while the fidelity decreases with the increase of the squeezing parameter r of the squeezed state. Thus the coherent state (r= O) is the best quantum signal for continuous variable quantum teleportation once the quantum channel is built.
文摘A Novel segmentation and feedback model (SFM) applied to resolve collision has been proposed. The SFM is featured with Burst Segmentation and Prioritized Feedback (BSPF) that are used to provide quality of service (QoS) and realize high throughput and faster switching in the optical burst switched networks. Simulation and performance analyses show that the SFM effectively avoid collision in optical burst switching (OBS). Long delay time of deflection routing and immature technology of wavelength converter and optical buffer are not employed in the SFM. The SFM not only realizes quick switching but also allows preemption for higher priority bursts.
文摘IP over WDM is being envisioned as one of the most attractive architectures for the next generation Internet. This paper introduces two novel backbone node structures for IP over WDM networks. These node structures can be used as improvement approaches to DPDP (default path and dedicated path) method. The flow classifiers, which are the main components of these node structures, and the performance metrics of these structures, are also discussed.
文摘We utilized "direct illumination-type" LED backlight project, made white-light LED array in rectangle, designed a sheet of reflective film, a sheet of diffuser and two sheets of brightness enhancement film, then analyzed illuminance chart which was the result of simulation in several distance between reflective film and optical film. It showed the best matching between illuminance and uniformity while in 25mm distance. Finally, we discussed some problems with thermal dispersion.
基金Supported by the National Natural Science Foundation of China ( No. 60772001 )the China Postdoctoral Science Foundation Funded Project ( No.20070420013)Open Fund of National Laboratory on Local Fiber Optic Communication Networks & Advanced Optical Communication Systems of Peking University
文摘A new integer linear program (ILP) formulation was developed to solve the problem of shared cycles design for optical networks with and without wavelength conversion. Numerical studies show that the shared cycles design requires much lower redundancy compared with p-cycle design when the maximum number of spans allowed in the cycles is relatively small, but the difference in the redundancy between the two designs becomes smaller or disappears as the maximum number of spans allowed in the cycles increases.
基金supported by National Natural Science Foundation of China under Grant Nos.60472018,60773085,and 60773012Natural Science Foundation of Hunan Province under Grant No.07JJ3128+1 种基金Postdoctoral Science Foundation of China under Grant No.20070420184in part by Ministry of Information and Communication (MIC) under the IT Foreign Specialist Inviting Program (ITFSIP) supervised by IIFA and ITIC supervised by IITA,Korea Research Foundation KRF-2007-521-D00300,and C1012-0001
文摘A multi-sender-controlled quantum teleportation scheme is proposed to teleport several secret quan- tum states from different senders to a distance receiver based on only one Einstein-Podolsky-Rosen (EPR) pair with controlled-NOT (CNOT) gates.In the present scheme,several secret single-qubit quantum states are encoded into a multi-qubit entangled quantum state.Two communication modes,i.e.,the detecting mode and the message mode,are employed so that the eavesdropping can be detected easily and the teleported message may be recovered efficiently.It has an advantage over teleporting several different quantum states for one scheme run with more efficiency than the previous quantum teleportation schemes.
基金Supported by the National Natural Science Foundation of China under Grant No 60472018.
文摘We find that second-order coherence as well as a Hanbury-Brown-Twiss intensity interferometer may provide an optimal approach for eavesdropping detection in the quantum key distribution based on two-mode squeezed vacuum states. With this approach, eavesdropping can be easily detected without sacrificing extra secret bits as the test key. In addition, the efficiency of the quantum key distribution protocol is enhanced greatly.
文摘Ransomware attacks have been spreading broadly in the last few years,where attackers deny users’access to their systems and encrypt their files until they pay a ransom,usually in Bitcoin.Of course,that is the worst thing that can happen;especially for organizations having sensitive information.In this paper we proposed a cyber security awareness program intended to provide end-users with a rescue checklist in case of being attacked with a ransomware as well as preventing the attack and ways to recover from it.The program aimed at providing cyber security knowledge to 15 employees in a Sudanese trading and investment company.According to their cyber behaviour before the program,the participants showed a low level cyber security awareness that with 72%they are likely of being attacked by a ransomware from a phishing email,which is well known for spreading ransomware attacks.The results revealed that the cyber security awareness program greatly diminished the probability of being attacked by a ransomware with an average of 28%.This study can be used as a real-life ransomware attack rescue plan.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.11404092 and 11574072)the Natural Science Foundation of Jiangsu Province,China(Grant Nos.BK20140246 and BK20160417)
文摘In designing an optical waveguide with metallic films on a nanometer scale, the random scattering by the natural roughness of the thin film is always ignored. In this paper, we demonstrate that for the ultrahigh-order modes(UOMs) in the symmetric metal cladding waveguide, such a scattering leads to drastic variations in their spatial distribution at different incident angles. Owing to the high mode density of the UOMs, the random scattering induced coupling can be easily related to different modes with different propagation directions or wavenumbers. At small incident angles, the intra-mode coupling dominates, which results in a spatial distribution in the form of concentric rings. At large incident angles, the inter-mode coupling plays the most important role and leads to an array-like pattern. Experimental evidence via optically trapped nanoparticles support the theoretical hypothesis.
文摘As cyber threats and attacks are immensely increasing and broadly spreading catastrophically worldwide,cyber security professionals need to cope up with such a highly demanding environment.Security teams,such as Security operation Centre(SOC),Incident Response(IR)and Threat management teams are the people responsible for dealing with cyber security threats and attacks from detection to containment and preventing future incidents;which encompasses some significant challenges that might impose some limitations to the efficiency and effectiveness of activities cyber security professionals conduct,as these processes are time-consuming.In this paper we propose an integrated platform to help cyber security professionals to proactively manage cyber security threats and emerging incidents by providing an automated functionality that can optimize the workflow.The proposed security platform is supposed to diminish the average time taken by cyber security professionals to respond to cyber incidents with an average of 42%.This study can be used as a preliminary design for such an integrated platform.
基金Supported by the National Natural Science Foundation of China under Grant No 60477016, the Foundation for Development of Science and Technology of Shanghai (04DZ14001), and the Excellent Young Teachers Programme of the Ministry of Education of China.
文摘A method is proposed to recover the refractive index profile of graded waveguide from the effective indices by a cubic spline interpolation function. Numerical analysis of several typical index distributions show that the refractive index profile can be reconstructed closely to its exact profile by the presented interpolation model.
基金supported by Start-up Funding for the 2025 National High-level Talent Frontier Project(01)(70012501A01).
文摘The advent of the sixth generation(6G)wireless networks envisions an Artificial Intelligence(AI)-native Radio Access Network(AI-RAN),where Deep Reinforcement Learning(DRL)emerges as a key enabler for intelligent and autonomous network slicing.Despite the demonstrated performance gains of DRL-based solutions in dynamic resource allocation and slice orchestration,their opaque decision-making nature raises critical concerns regarding trust,accountability,and operational deployment.To bridge this gap,Explainable Deep Reinforcement Learning(XDRL)has recently attracted significant attention as a means to enhance transparency,interpretability,and controllability of AI-RAN slicing policies.This survey provides a comprehensive overview of the state of the art in explainable DRL for intelligent network slicing.We first review the fundamental principles of DRL in the context of RAN slicing and identify the unique explainability challenges posed by high-dimensional,multi-slice environments.We then categorize existing XDRL approaches into post-hoc explanation,symbolic abstraction,and human-in-the-loop steering,analyzing their methodologies,strengths,and limitations.Furthermore,we highlight benchmark environments and experimental testbeds that have been employed to evaluate XDRL in realistic network scenarios.Finally,we outline key open challenges,including scalability,generalization across traffic patterns,integration with Large Language Models(LLMs),and alignment with intent-based networking,and discuss promising research directions toward achieving transparent,trustworthy,and human-centric AI-RAN in 6G.
基金This work was supported by the National Natural Science Foundation of China under Grants No.90104003,69990540-2,60272023 and 10074003also supported by the National Hi-Tech 863 Plan of China under Contracts No.2001AA122012,2003AA103410,and 2003AA122540.
文摘In this paper, we first present a full numerical simulation for the trapping and retrieval procedure of eight continuing '1' Guassian pulses (i.e., '11111111') in the electromagnetically induced transparency (BIT) medium. This simulation shows that an BIT medium has the ability to store multiple light pulses in a shape-preserving way. And we also, for the first time, give the formula evaluating the maximum number of pulses that can be stored by an EIT medium at one time. This work reveals a new possible way to the reversible storage of the photonic information.
基金supported by the National Natural Science Foundation of China (No. 11174204)the Shanghai Jiaotong University Innovative Practical Program
文摘We propose AND, NOR, and XNOR logic gates realized simultaneously for 40-Gb/s networks, in which the realization of NOR and XNOR logic gates using only MgO-doped periodically poled lithium niobate (MgO: PPLN) is reported. In our configuration, we exploit broadband quasi-phase matching (QPM) cascaded sec- ond harmonic and difference-frequency generation (cSHG/DFG), cascaded sum-frequency and difference- frequency generation (cSFG/DFG) in one MgO:PPLN, and the narrow band QPM sum-frequency genera- tion (SFG) in another MgO:PPLN. The performance, including the quality-factor (Q-factor) and extinction ratio (ER), of the proposed multifunctional logic device is also simulated.
基金supported by the Natural Science Foundation of Jiangsu Province(Nos.BK20140246 and BK20160417)the National Natural Science Foundation of China(No.61371057,61601251,11404092,and61701261)+1 种基金the China Postdoctoral Science Foundation Funded Project(No.2016M601586)the Fundamental Research Funds for the Central Universities(No.2017B14914)
文摘We report experimental realization of Raman spectra enhancement of copper phthalocyanine, using an on-chip metallic planar waveguide of the sub-millimeter scale. The oscillating ultrahigh order modes excited by the direct coupling method yield high optical intensity at resonance, which is different from the conventional strategy to create localized "hot spots." The observed excitation efficiency of the Raman signal is significantly enhanced,owing to the high Q factor of the resonant cavity. Furthermore, effective modulation of the Raman intensity is available by adjusting the polymethyl methacrylate(PMMA) thickness in the guiding layer, i.e., by tuning the light–matter interaction length. A large modulation depth is verified through the fact that 10 times variation in the enhancement factor is observed in the experiment as the PMMA thickness varies from 7 to 23 μm.