To solve the increasing complexity with the growth of solution sets number in PESA, we present a comentropy-based PESA algorithm (C-PESA), which is an evolutionary algorithm of multi-objective optimization. In C-PESA,...
详细信息
We propose a three-party quantum secure direct communication(QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of freedom. The secret message can be encoded independently with desired...
详细信息
We propose a three-party quantum secure direct communication(QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of freedom. The secret message can be encoded independently with desired unitary operations in two degrees of freedom. In this protocol, a party can synchronously obtain the other two parties' messages. Compared with previous three-party QSDC protocols, our protocol has several advantages. First, the single photons in our protocol are only required to transmit for three times. This advantage makes this protocol simple and useful. Second, Alice and Bob can send different secret messages to Charlie, respectively. Finally, with hyperentanglement, this protocol has a higher information capacity than other protocols.
We theoretically study the phase sensitivities of two different phase-shift configurations in an SU(1,1)interferometer with coherent■squeezed vacuum *** to quantum Cramér-Rao theorem,we analytically obtain the u...
详细信息
We theoretically study the phase sensitivities of two different phase-shift configurations in an SU(1,1)interferometer with coherent■squeezed vacuum *** to quantum Cramér-Rao theorem,we analytically obtain the ultimate phase sensitivities for two types of phase shift accumulating in one-and *** with the case of one-arm phase shift,the model with phase shift encoding in both arms may provide a better sensitivity when the strength of squeezed vacuum state is large ***,we discuss the achievable sensitivities with the homodyne measurement by invoking of error-propagation *** addition,we study the effect of internal and outernal photon losses on the phase sensitivity of the SU(1,1)interferometer and find that the unbalanced interferometer is helpful to improve precision even with high external losses.
The main goal of data-aggregation algorithms in wirelesssensornetworks (WSNs) is to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. In this article, we focus on QoS-base...
详细信息
ISBN:
(纸本)9783037852903
The main goal of data-aggregation algorithms in wirelesssensornetworks (WSNs) is to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. In this article, we focus on QoS-based data-aggregation problems in WSNs. Firstly, we provide a definition of the different QoS parameters for data aggregation, such as energy efficiency, network lifetime, data latency and data quality. Then, we compare the different algorithms on each QoS parameter, describe the main features of each algorithm, and highlight the trade-offs between each parameter. Finally, we conclude with possible future research directions on QoS-based data aggregation in WSNs.
Cloud computing plays a significant role in big data era since it can provide dynamic, scalable virtual resource services via the Internet. However, how to enhance the security level of cloud computing is a challengin...
详细信息
ISBN:
(纸本)9781509045006
Cloud computing plays a significant role in big data era since it can provide dynamic, scalable virtual resource services via the Internet. However, how to enhance the security level of cloud computing is a challenging issue which is urgently to be tackled. In this paper, we center on the data security in cloud computing and present an attribute based proxy re-encryption scheme with keyword search (ABPRE-KS) to provide flexible and secure data sharing among users in the cloud. In our scheme, a user's access privileges are described by an access structure consisting of several attributes while ciphertexts are labeled by several target attributes. A delegator can transform the original ciphertexts into proxy ciphertexts encrypted by the delegatee's attributes without leaking any sensitive information to the cloud server. Besides, a search request on the ciphertexts is allowed by a delegatee if his credentials satisfy the delegatee's access policy. By security analysis, our ABPRE-KS is confidential and keyword semantic secure under BDBH assumption.
Dissemination and update of the code image plays an important role in application of the Internet of Things (IoT). As a part of the IoT, wirelesssensornetworks should provide the code dissemination. The commonly use...
详细信息
Non-independent networking of 5G NSA (Non-Standalone) is receiving wide attention. This paper considers an NSA architecture in which a 4G base station is used as the primary station and a newly deployed 5G base statio...
详细信息
In this paper, based on the feedback free distributed video coding system, a rate control algorithm was proposed for Wyner-Ziv frames. First, calculate the maximum correlation of coefficient band level between the sou...
详细信息
Non-deterministic polynomial (NP)-complete problems are collections of intractable problems for classical computers, but they may be easier to solve for quantum computers. Considering that practical quantum computers ...
详细信息
Neural networks can easily fall into a local extremum and have slow convergence rate. Quantum Genetic Algorithm (QGA) has features of small population size and fast convergence. Based on the investigation of QGA, we p...
详细信息
暂无评论