Multipath TCP (MPTCP) enables terminals utilizing multiple interfaces for data transmission simultaneously, which provides better performance and brings many benefits. However, using multiple paths brings some new cha...
详细信息
We report a 42Ohm external cavity diode laser with an interference filter (IF) of 0.5am narrow-bandwidth and 79% high transmission, which is first used for Rb optical frequency standard. The IF and the cat-eye refle...
详细信息
We report a 42Ohm external cavity diode laser with an interference filter (IF) of 0.5am narrow-bandwidth and 79% high transmission, which is first used for Rb optical frequency standard. The IF and the cat-eye reflector are used for selecting wavelength and light feedback, respectively. The measured laser linewidth is 24 kHz when the diode laser is free running. Using this narrow-linewidth IF blue diode laser, we realize a compact Rb optical frequency standard without a complicated PDH system. The preliminary stability of the Rb optical frequency standard is 2 × 10^-13 at I s and decreases to 1.9 ×10^-14 at 1000s. The narrow-linewidth characteristic makes the IF blue diode laser a well suited candidate for the compact Rb optical frequency standard.
Ant Colony Optimization (AGO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly bas...
详细信息
Ant Colony Optimization (AGO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly based on pure mathematical methods which have complicated theories and algorithm. It seems that there is no relationship between cryptography and ACO. Actually, some problems in cryptography are due to optimization grouping problems that could be improved using an evolutionary algorithm. Therefore, this paper presents a new method of solving secure curve selection problems using ACO. We improved Complex Multiplication (CM) by combining Evolutionary Cryptography Theory with Weber polynomial solutions. We found that ACO makes full use of valid information generated from factorization and allocates computing resource reasonably. It greatly increases the performance of Weber polynomial solutions. Compared with traditional CM, which can only search one root once time, our new method searches all roots of the polynomial once, and the average time needed to search for one root reduces rapidly. The more roots are searched, the more ECs are obtained.
The Pan-sharpening method,which is used to address the fusion problem of multispectral(MS) images and panchromatic(PAN) images,has continuously been a hot spot in image fusion *** order to improve the quality and accu...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
The Pan-sharpening method,which is used to address the fusion problem of multispectral(MS) images and panchromatic(PAN) images,has continuously been a hot spot in image fusion *** order to improve the quality and accuracy of the fused image,this paper proposes a Pansharpening method for MS image based on Back Propagation(BP)neural network,and further uses the Spark platform and the TensorFlowOnSpark(TFOS) framework to optimize the BP neural *** experimental results show that the proposed method effectively enhances the quality of the fused image,and the parallel optimization method for BP neural network based on Spark improves the computational efficiency while ensuring the fusion accuracy.
How to quickly compute the number of points on an Elliptic Curve (EC) has been a longstanding challenge. The computational complexity of the algorithm usually employed makes it highly inefficient. Unlike the general...
详细信息
How to quickly compute the number of points on an Elliptic Curve (EC) has been a longstanding challenge. The computational complexity of the algorithm usually employed makes it highly inefficient. Unlike the general EC, a simple method called the Weil theorem can be used to compute the order of an EC characterized by a small prime number, such as the Kobltiz EC characterized by two. The fifteen secure ECs recommended by the National Institute of Standards and Technology (NIST) Digital Signature Standard contain five Koblitz ECs whose maximum base domain reaches 571 bits. Experimental results show that the computation speed decreases for base domains exceeding 600 bits. In this paper, we propose a simple method that combines the Weil theorem with Pascals triangle, which greatly reduces the computational complexity. We have validated the performance of this method for base fields ranging from 2l^100 to 2^1000. Furthermore, this new method can be generalized to any ECs characterized by any small prime number.
In this paper, we introduce energy harvesting into a cognitive radio sensor network to power the network with renewable energy sources so as to achieve self-sustainability of energy-limited sensors. In our work, the c...
详细信息
In this paper, we introduce energy harvesting into a cognitive radio sensor network to power the network with renewable energy sources so as to achieve self-sustainability of energy-limited sensors. In our work, the cognitive radio technology enable sensors access to the underutilized spectrum for the purpose of coping with the spectrum-scarcity problem in the unlicensed band. Using centralized cooperative spectrum sensing, a set of cognitive sensors is chosen from candidate sensors with different received primary users’ signal powers and energy-arrival rates. After detecting the state of a primary channel, we also need to determine which cognitive sensor can get to access the primary channel as well as the power level to be used upon the transmission. The above sensing-access design problem is formulated as an infinite-horizon partially observable Markov decision process, in which the primary goal is to maximize the long-term expected throughput. Through using a value iteration approach, we propose an optimal sensing-access policy. At last, numerical results are presented to verify the superiority of our proposed policy to the existing policy.
Electromagnetic waves exhibiting vortex properties from orbital angular momentum (OAM) modes that are inherently orthogonal show promising potential for a wide range of applications. However, classic OAM-wave generato...
详细信息
Electromagnetic waves exhibiting vortex properties from orbital angular momentum (OAM) modes that are inherently orthogonal show promising potential for a wide range of applications. However, classic OAM-wave generators in the radio-frequency band are generally limited by a narrow operation bandwidth, complicated feeding structures, or high losses. In this work, we propose a method for OAM-wave generation using the concept of spatial transformation at microwave frequencies. A reflection-type vortex-beam generator is designed and simulated. Then an all-dielectric proof-of-concept prototype for a +1 topological charge is physically implemented and the complete characterization of the device is reported. Both full-wave simulations and experimental measurements successfully validate the spiral-shaped phase fronts of the vortex wave. Furthermore, the all-dielectric implementation of the device enables operation over a broad frequency bandwidth. The proposed method provides an efficient approach to generate vortex waves carrying OAM modes and illustrates the practicality of using spatial transformations to achieve an alternative class of optical devices at microwave frequencies.
Non-speech sound-awareness is important to improve the quality of life for the deaf and hard-of-hearing (DHH) people. DHH people, especially the young, are not always satisfied with their hearing aids. According to th...
详细信息
In this paper, we propose a terrestrial-satellite network (TSN) architecture to integrate the ultradense low earth orbit (LEO) networks and the terrestrial networks to achieve efficient data offloading. In TSN, each g...
详细信息
暂无评论