WiFi signals have attracted extensive attention for context-aware due to its ubiquity. Traditional WiFi sensing methods mainly adopt Received Signal Strength Indication (RSSI), however the coarse features hamper its e...
详细信息
With the development of computer technology and Biomedical Engineering, the image registering technology is widely used in healthcare and the disease diagnosis and clinical care demand higher registering precision and...
详细信息
In this paper, we proposed a hybrid encryption algorithm in order to solve the security problems on lightweight data on the cloud storage service. This paper first improves the RSA algorithm in the cloud environment b...
详细信息
In this paper, we proposed a hybrid encryption algorithm in order to solve the security problems on lightweight data on the cloud storage service. This paper first improves the RSA algorithm in the cloud environment by increasing the length of the RSA key to an extent that it can quickly generate big primes. Then, we merge AES and RSA algorithms on the basis of the improved RSA algorithm. This is called a hybrid encryption algorithm which is suitable for security of the lightweight data in cloud storage environment in order to further enhance the confidentiality of data in the cloud. The experimental result shows that the hybrid encryption algorithm has advantages of fast encryption and decryption, more secure, and it is also able to settle the security problems of users' lightweight data in a certain extent.
This paper reports the design and analysis of a novel pyramidal horn antenna based on Micro Electro Mechanical Systems(MEMS) technology,which is used in terahertz(THz) *** structure of the antenna includes two parts,p...
详细信息
ISBN:
(纸本)9781510823808
This paper reports the design and analysis of a novel pyramidal horn antenna based on Micro Electro Mechanical Systems(MEMS) technology,which is used in terahertz(THz) *** structure of the antenna includes two parts,pyramidal horn structure and rectangle waveguide for feed,the fabrication of the structure needs only one wafer,and the antenna can be easily integrated with other parts of on-chip *** are many tunable parameters of the horn,so that high performance THz antenna can be achieved by optimizing these *** proposed antenna can be manufactured by MEMS processing with low fabrication cost,suitable for many terahertz systems.
Dear editor,The Central Force Optimization(CFO)[1]is a new heuristic *** contrast with the stochastic algorithms such as Particle Swarm Optimization(PSO)[2],Ant Colony Optimization[3]and other such algorithms[4–6],CF...
详细信息
Dear editor,The Central Force Optimization(CFO)[1]is a new heuristic *** contrast with the stochastic algorithms such as Particle Swarm Optimization(PSO)[2],Ant Colony Optimization[3]and other such algorithms[4–6],CFO is an entirely deterministic algorithm.
This article gives a general introduction to some common algorithms of redundant reader elimination in Radio Frequency Identification Devices (RFID) systems, such as Redundant Reader Elimination (RRE), Layered Elimina...
详细信息
In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protoc...
详细信息
In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol,the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie's successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover,the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence(AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source.
The node replica attack is known to be dangerous to wirelesssensornetworks (WSNs) because it enables the adversary to extend the damage throughout the network with very low cost. To stop such attack, we propose a si...
详细信息
ISBN:
(纸本)9781509035595
The node replica attack is known to be dangerous to wirelesssensornetworks (WSNs) because it enables the adversary to extend the damage throughout the network with very low cost. To stop such attack, we propose a similarity estimation based scheme with group deployment knowledge. Compared with prior works, our proposal provides extra functionality that prevent replica from generating false location claims. Through simulation experiment, we evaluate the performance of the proposed scheme and demonstrate that our scheme achieves effectiveness and efficiency under different situations and attack strategies.
We present a scheme for realizing passive quantum key distribution with heralded single-photon sources. In this scheme, the idler light from the parametric down-conversion process is split into two parts and sent into...
详细信息
We present a scheme for realizing passive quantum key distribution with heralded single-photon sources. In this scheme, the idler light from the parametric down-conversion process is split into two parts and sent into two local detectors individually. Then all the clicking and nonclicking events are used to herald the arrival and nonarrival of the signal light. As a result, a precise estimation of the behavior of the single-photon pulses can be achieved without changing the light intensity. Furthermore, we compare our scheme with other existing methods with the Bennett-Brassard 1984 (BB84) protocol through numerical simulations. Our simulations demonstrate that the performance of our scheme can greatly overcome other existing practical methods and approach very close to the asymptotic case of using infinite-decoy-state methods.
In order to make cloud users get credible, high-quality composition of services, the trust quality of service aware(TQoS-aware) based parallel ant colony algorithm is proposed. Our approach takes the service credibili...
详细信息
In order to make cloud users get credible, high-quality composition of services, the trust quality of service aware(TQoS-aware) based parallel ant colony algorithm is proposed. Our approach takes the service credibility as the weight of the quality of service, then calculates the trust service quality T-QoS for each service, making the service composition situated in a credible environment. Through the establishment on a per-service T-QoS initialization pheromone matrix, we can reduce the colony's initial search time. By modifying the pheromone updating rules and introducing two ant colonies to search from different angles in parallel,we can avoid falling into the local optimal solution, and quickly find the optimal combination of global solutions. Experiments show that our approach can combine high-quality services and the improvement of the operational success rate. Also, the convergence rate and the accuracy of optimal combination are improved.
暂无评论