Modern battlefield communications environment is very complex, the sensor network is extremely prone to splitting, in this situation the traditional routing protocols will fail, and opportunistic routing is regarded a...
详细信息
Modern battlefield communications environment is very complex, the sensor network is extremely prone to splitting, in this situation the traditional routing protocols will fail, and opportunistic routing is regarded as the most promising *** people have proposed three kinds of routing mechanism to handle the routing problem what the splitting network *** are: "Receive-Carry-Transmit" mechanism;"Multiple Forwarding" mechanism;"Nodes Exchanging Information in Pairs" mechanism, and there have been some routing protocols such as Epidemic, Prophet Router, First Contact Router to use, there is also *** example, the existing routing algorithm only allows a node to set up one single sending connection at a time,which greatly limits the diffusion rate of data in opportunistic *** this paper, we study the potential benefits of the multiple sending connections between any two nodes which move into each other's communication *** develop a new protocol named MSC which is based on Epidemic *** using "one", which is a dedicated simulation software for opportunistic, the results show that MSC may improve packets diffusion rate in the network and has benefits in terms of the transmission delay and the delivery success rate compared to Epidemic, Prophet Router, and First Contact Router.
In this manuscript, a novel and economical scheme for quantum information splitting of an arbitrary N-qubit state (N≥ 1) is *** of multi-qubit entangled states, the maximally entangled states, which are made up of a ...
详细信息
In this manuscript, a novel and economical scheme for quantum information splitting of an arbitrary N-qubit state (N≥ 1) is *** of multi-qubit entangled states, the maximally entangled states, which are made up of a three-qubit GHZ-like entangled state and (N-1) sets of Bell states, are used as quantum information *** is shown that the proposed quantum information splitting scheme can be faithfully realized by performing appropriate Bell state measurements (BSMs), single qubit measurements (SMs)and local unitary operations (LUOs), rather than multi-qubit entanglement or multi-particle joint measurements,which make it more convenient in the practical application than some previous ***, its intrinsic efficiency for qubits approaches 100%, and the total efficiency really approaches the maximal value, which is higher than those of some previous quantum information splitting ***, for the security of this quantum information splitting scheme, it depends on the process of the secure quantum channel by means of the decoy photons technique, we analyse the security from the views of participant attack and outside attack in *** method of security analysis can be also utilized for security analysis of other quantum communication *** our presented scheme is economical, feasible and secure.
暂无评论