A new scheme of information encryption is presented in this paper, which employs Chen's chaos to construct the random mask of the virtual optical imaging system instead of randomly generated by computer. The gener...
详细信息
An i-vector is a fixed-length and low-rank representation of a speech utterance. It has been used extensively in text-independent speaker verification. Ideally, speech utterances from the same speaker would map to an ...
详细信息
The unmanned nature of wirelesssensornetworks make them very vulnerable to the malicious attacks. Therefore, how to complete secure data collection under different conditions is the crucial issue to wirelesssensor ...
详细信息
In recent years, several new TCP congestion control algorithms have been proposed to improve TCP performance for networks of high bandwidth delay products. Satellite-HAP networks providing high-speed data transmission...
详细信息
B+ Tree is a special balanced multiway tree with flexible structure and node pages linking to each other. It supports not only rapid random query, but also range query. But B+ Tree index cannot be directly migrated si...
详细信息
Resource-constrained is a critical issue in wirelesssensornetworks (WSN) applications. Data aggregation (or data fusion) is one of the key techniques to solve the problem. Data aggregation can effectively reduce the...
详细信息
DTN is developed as an emerging networktechnology which is mainly used in network with long waiting time, intermittent connectivity, and other extreme environments network. It has be favored in the military, transpor...
详细信息
The entangled coherent states(ECSs)have been widely used to realize quantum information processing ***,the ECSs may suffer from photon loss and decoherence due to the inherent noise in quantum channel,which may degrad...
详细信息
The entangled coherent states(ECSs)have been widely used to realize quantum information processing ***,the ECSs may suffer from photon loss and decoherence due to the inherent noise in quantum channel,which may degrade the fidelity of *** overcome these obstacles,we present a measurement-based entanglement purification protocol(MBEPP)for ECSs to distill some highquality ECSs from a large number of low-quality *** first show the principle of this MBEPP without considering the photon *** that,we prove that this MBEPP is feasible to correct the error resulted from the photon ***,this MBEPP only requires to operate the Bell state measurement without performing local two-qubit gates on the noisy pairs and the purified high-quality ECSs can be preserved for other *** MBEPP may have application potential in the implementation of long-distance quantum communication.
Based on the frequency division multiplexing principle of the multi-beam antenna, this paper proposes a new method for locating interference sources by only one single satellite. According to the antenna pattern funct...
详细信息
Online/offline signature schemes allow one to quickly compute a digital signature from a precomputed coupon. In this paper, we present an ID-based online/offline signature for wirelesssensornetworks (WSNs), which is...
详细信息
暂无评论