Cooperative spectrum sensing (CSS) is a keytechnology to improve the sensing performance. Fully distributed CSS has been applied in cognitive radio ad hoc networks with good detection performance. However, when the n...
详细信息
On the battlefield, the cooperative fighting and communication among combat vehicles require higher service level of real-time transmission. Combat vehicles' fast moving and the links' frequent disruption lead...
详细信息
To solve the increasing run-time complexity with the growth of population solutions in PESA, an evolutionary algorithm of multi-objective optimization, we present a comentropy- based PESA algorithm (C-PESA). With this...
详细信息
To solve the increasing run-time complexity with the growth of population solutions in PESA, an evolutionary algorithm of multi-objective optimization, we present a comentropy- based PESA algorithm (C-PESA). With this algorithm, the gradual development and maturity of the solution sets can be observed with the continuous calculation of entropy values to determine whether to stop the optimization process or not, which reduces the run-time complexity to some extent. Simulation results show that the computational effort of C-PESA increases at a linear order with the increasing number of solutions, and the efficiency of evolutionary algorithm shows improvement.
This paper addresses the secure transmission problem of an integrated satellite-terrestrial relay networks (ISTRN), where multiple malicious eavesdroppers attempt to overhear the confidential signals from the satellit...
详细信息
Overlay networks are used widely in the Internet, such as retrieval and share of files, multimedia games and so on. However, in distributed system, the retrieval and share of 2-dimension spatial data still have some d...
详细信息
To solve the fairness problem in user access of mobile communication systems, we proposed an access control scheme based on price and customer satisfaction (PSAC) in this paper. In the scheme, we borrow Cobb-Douglas o...
详细信息
Measurement device-independent quantum key distribution(MDI-QKD) protocols are immune to all possible attacks on the photon detectors during quantum communication, but their key generation rates are low compared with ...
详细信息
Measurement device-independent quantum key distribution(MDI-QKD) protocols are immune to all possible attacks on the photon detectors during quantum communication, but their key generation rates are low compared with those of other QKD *** each individual photon’s channel capacity is an efficient way to increase the key generation rate, and high-dimensional(HD) encoding is a powerful tool for increasing the channel capacity of photons. In this paper, we propose an HD MDI-QKD protocol with qudits hyper-encoded in spatial mode and polarization degrees of freedom(DOFs). In the proposed protocol, keys can be generated using the spatial mode and polarization DOFs simultaneously. The proposed protocol is unconditionally secure,even for weak coherent pulses with decoy states. The proposed MDI-QKD protocol may be useful for future quantum secure communication applications.
In this paper, a new method for two-dimensional (2-D) direction-of-arrival (DOA) estimation is proposed. We first reconstruct the covariance matrix of the coarray with block-Toeplitz structure and then retrieve the DO...
详细信息
ISBN:
(纸本)9781509041183
In this paper, a new method for two-dimensional (2-D) direction-of-arrival (DOA) estimation is proposed. We first reconstruct the covariance matrix of the coarray with block-Toeplitz structure and then retrieve the DOAs. Our method is computationally efficient as supported by the derived closed-form expression for the estimated covariance matrix. Unlike other methods, which require fully loaded arrays, the proposed method can be applied in the case of common rectangular arrays with arbitrary geometries. The estimated azimuth and elevation angles are automatically paired. Moreover, our method is of high estimation accuracy and immune to the angle ambiguity effect. Numerical simulations are carried out to verify the effectiveness of the proposed method.
Existing Ethernet Passive Optical network(EPON) Dynamic Bandwidth Allocation(DBA) algorithms suffer from the disadvantage of idle time loss,which lower the upstream bandwidth *** letter proposes an improved upstream t...
详细信息
Existing Ethernet Passive Optical network(EPON) Dynamic Bandwidth Allocation(DBA) algorithms suffer from the disadvantage of idle time loss,which lower the upstream bandwidth *** letter proposes an improved upstream transmission scheme with idle-time eliminating *** analysis and numerical calculation prove that the improved scheme can ef-fectively eliminate the idle time and enhance the efficiency of upstream link *** results have shown that the bandwidth utilization can be raised up to 15% in heavy-load scenarios while the time delay performance of Assured Forwarding(AF) and Best Effort(BE) services are improved simultaneously.
Ghost imaging could be used to make a quick identification of orthogonal objects by means of photocurrent correlation measurements. In this paper, we extend the method to identify nonorthogonal objects. In the method,...
详细信息
Ghost imaging could be used to make a quick identification of orthogonal objects by means of photocurrent correlation measurements. In this paper, we extend the method to identify nonorthogonal objects. In the method, an object is illuminated by one photon from an entangled pair, and the other one is diffracted into a particular direction by a pre-established multiple-exposure hologram in the idler arm. By the correlation measurements, the nonorthogonal object in the signal arm could be discriminated within a very short time. The constraints for the identification of nonorthogonal objects are presented, which show that the nonorthogonal objects can be discriminated when the overlapping portion between any two objects is less than half of all the objects in the set. The numerical simulations further verify the result.
暂无评论