We propose a three-party quantum secure direct communication (QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of *** secret message can be encoded independently with desired unitary...
详细信息
We propose a three-party quantum secure direct communication (QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of *** secret message can be encoded independently with desired unitary operations in two degrees of *** this protocol,a party can synchronously obtain the other two parties' *** with previous three-party QSDC protocols,our protocol has several ***,the single photons in our protocol are only required to transmit for three *** advantage makes this protocol simple and ***,Alice and Bob can send different secret messages to Charlie,***,with hyperentanglement,this protocol has a higher information capacity than other protocols.
With the popularity of network, P2P-based Video on Demand (VoD) has become one of the main services in Internet. However, due to the huge amount of videos, how to access the video quickly is important since it affects...
详细信息
ISBN:
(纸本)9781509028610
With the popularity of network, P2P-based Video on Demand (VoD) has become one of the main services in Internet. However, due to the huge amount of videos, how to access the video quickly is important since it affects the subscriber's experience. In this paper, a popularity-driven storing model is proposed to fasten the video discovery for a centralized P2P-VoD system. All videos are stored in a binary tree in the server according to their popularities. Experimental results show that this scheme works well in terms of discovery delay and resource utilization.
Device-to-device (D2D) communicationtechnology can significantly improve energy efficiency and offload base station traffic. It has become a new research focus in next generation mobile communications. In this paper,...
详细信息
ISBN:
(纸本)9781467376884
Device-to-device (D2D) communicationtechnology can significantly improve energy efficiency and offload base station traffic. It has become a new research focus in next generation mobile communications. In this paper, a file-sharing mechanism based on social networks is proposed for the D2D communication system underlaying cellular networks aiming at improving the users' quality of experience (QoE). In the proposed mechanism, all users are divided into several groups according to the documentation requirements. Then the D2D communication links are built within each group by fully considering the social relationships and trust degrees of users. The target files give priority to be shared through the D2D mode. Theoretical analysis and extensive simulation results show clearly that the social relationships can affect the whole wirelessnetworks significantly. Selecting a user with the largest social degree as a central user can greatly reduce the transmission delay, relieve the heavy burden of base stations and then optimize the overall performance of cellular communication systems.
The subspace pursuit algorithm in compressed sensing cannot achieve desirable reconstruction performance in the presence of impulsive noise based on the fact that the support detection and least squares are not robust...
详细信息
The Delay/Disruption Tolerant network(DTN) is characterized with long delay,high bit-error rate,intermittent connectivity and frequent *** to this,network coding is introduced to improve its transmission performance...
详细信息
The Delay/Disruption Tolerant network(DTN) is characterized with long delay,high bit-error rate,intermittent connectivity and frequent *** to this,network coding is introduced to improve its transmission performance *** DTN routing algorithms based on network coding have been ***,they are susceptible to various malicious *** this paper,we propose a new kind of networking scheme suitable to the DTN,which can resist the eavesdropping attacks to a certain ***,we establish a DTN network model based on the packet path optimization allocation algorithm and redefine the packet format to meet the algorithm ***,to resist the dropping attacks,the source node dynamically adds redundancy factors at the certain *** the pollution attacks and the data tampering attacks can almost be resisted by means of mutual authentication between intermediate *** approach avoids the traditional anti-tampering attack algorithm over-reliant on the source *** security analysis and simulation results show that our scheme can effectively resist the joint attacks and optimize the network performance.
In this paper, we investigate a power allocation scheme in downlink multi-carrier non-orthogonal multiple access (MC-NOMA) systems for maximizing weighted sum-rate. Taking user-priority into account, we add the weight...
详细信息
A user terminal with multi-mode wireless interface is always located its position in the covered area of heterogeneous wirelessnetwork (HWN), there are too many algorithms about vertical handover (VHO) of multiple at...
详细信息
A user terminal with multi-mode wireless interface is always located its position in the covered area of heterogeneous wirelessnetwork (HWN), there are too many algorithms about vertical handover (VHO) of multiple attributes decision making (MADM) network selections about HWN. According the analysis of current applications of wireless service, regular service has been classified into four kinds, including voice, video, small data and big data, and the proportions of wireless video and big data service may acquire an unavailable bandwidth for each individual wireless station, which will lead to a heavy load and a lower satisfaction rate. A multiple properties load balance (MPLB) scheme is proposed to solve this joint resource scheduling(JRS) problem properly, MPLB scheme first gave an enhanced architecture including the JSR sub-layer, then model of MPLB is established from the candidate wirelessnetwork, five aggregated network performance properties have been defined mathematically, the candidate of best grey relational coefficients (GRC) of grey relational analysis(GRA) algorithm is optimally selected as the final executable scheme, after the description of a general flowchart of MPLB scheme. The simulation results proved the MPLB scheme has a more stable load balance effects than those of VHO, so did most users of MPLB gain higher satisfaction rate, slightly different with the four kinds of service. It can be concluded theoretically that the MPLB scheduling scheme could achieve both the load balance on the service providers side and the increased quality of experience of satisfaction rate on the wireless user side, which would bring out some new thoughts in the future user centric network.
To solve the problem of rapid QoS declining under network situation as well as improve the judging and dynamical adjusting ability that network system towards user QoS, in this paper, we proposed a dynamical self-conf...
详细信息
This paper focused on the study of cognitive networks (CNs) oriented multi-parameter constraint Quality of Service (QoS) routing optimization. With the foundation of CNs multi-parameter QoS routing requirement, referr...
详细信息
This paper proposes a beamforming (BF) scheme based on multi-objective optimization (MOO) for a cognitive satellite-terrestrial network (CSTN), where the eavesdroppers (Eves) attempt to intercept the private message c...
详细信息
暂无评论