In this paper, we investigate and propose a new transmission scheme for integrated satellite-terrestrial relay network, where a terrestrial relay equipped with multiple antennas either keeps silent or forwards message...
详细信息
Terahertz (THz) communication has become one of the high-profile technologies in the sixth generation (6G) mobile communicationnetworks due to its huge bandwidth and ultra-high data transmission rate. In this paper, ...
详细信息
To resolve the problem of assessing the effect of a network attack, this paper combines cross entropy with network character entropy method and proposes scheme to evaluate the malicious code attack effect. It captures...
详细信息
To resolve the problem of assessing the effect of a network attack, this paper combines cross entropy with network character entropy method and proposes scheme to evaluate the malicious code attack effect. It captures the related indicators in real time and normalizes the data so as to evaluate it at the same level. It adopts cross entropy method to pretreat the indicators adaptively. We calculate the weight coefficient and exploit network character entropy method to evaluate the attack with accuracy according to the importance of the indicators in the evaluation system. Experimental results and corresponding comparisons reveal that the proposed method can quantitatively determine the exact effect of the malicious code attack.
Embedding customized virtual networks (VNs) onto the underlying physical network (PN) is a key issue in virtualization research. This issue is virtual network embedding (VNE). Since the issue inception, multiple mappi...
详细信息
ISBN:
(数字)9781728109626
ISBN:
(纸本)9781728109633
Embedding customized virtual networks (VNs) onto the underlying physical network (PN) is a key issue in virtualization research. This issue is virtual network embedding (VNE). Since the issue inception, multiple mapping algorithms have been studied. However, prior mapping algorithms are mostly static. Existing dynamic mapping algorithms just focus on accepting as many VNs as possible. No existing dynamic algorithm considers optimizing the quality of service (QoS) performance of each accepted VN. On these backgrounds, we jointly investigate the dynamic VN embedding and optimize the QoS performance of each accepted VN. A dynamic heuristic algorithm is proposed. When one VN service is requested, the VN will be mapped by the dynamic heuristic algorithm. If the QoS demand of the VN is not guaranteed, the re-embedding scheme of the heuristic algorithm will be driven. Certain virtual elements of the VN will be re-embedded. The dynamic embedding algorithm ensures flexible VN assignment and improves the PN resource utilization. Finally, simulation results are illustrated in order to highlight our proposed dynamic algorithm. For instance, VN acceptance ratio of our dynamic heuristic algorithm improves at least 13%.
We propose new schemes on implementing the single-photon-added coherent source in the quantum key *** apply the source in either the standard BB84 protocol or the new proposed measurement-device-independent quantum ke...
详细信息
We propose new schemes on implementing the single-photon-added coherent source in the quantum key *** apply the source in either the standard BB84 protocol or the new proposed measurement-device-independent quantum key *** compare its performance with the case of using other existing sources,e.g.,the
The Delay/Disruption Tolerant network(DTN) is characterized with long delay,high bit-error rate,intermittent connectivity and frequent *** to this,network coding is introduced to improve its transmission performance...
详细信息
The Delay/Disruption Tolerant network(DTN) is characterized with long delay,high bit-error rate,intermittent connectivity and frequent *** to this,network coding is introduced to improve its transmission performance *** DTN routing algorithms based on network coding have been ***,they are susceptible to various malicious *** this paper,we propose a new kind of networking scheme suitable to the DTN,which can resist the eavesdropping attacks to a certain ***,we establish a DTN network model based on the packet path optimization allocation algorithm and redefine the packet format to meet the algorithm ***,to resist the dropping attacks,the source node dynamically adds redundancy factors at the certain *** the pollution attacks and the data tampering attacks can almost be resisted by means of mutual authentication between intermediate *** approach avoids the traditional anti-tampering attack algorithm over-reliant on the source *** security analysis and simulation results show that our scheme can effectively resist the joint attacks and optimize the network performance.
Compressed sensing,a new area of signal processing rising in recent years,seeks to minimize the number of samples that is necessary to be taken from a signal for precise *** precondition of compressed sensing theory i...
详细信息
Compressed sensing,a new area of signal processing rising in recent years,seeks to minimize the number of samples that is necessary to be taken from a signal for precise *** precondition of compressed sensing theory is the sparsity of *** this paper,two methods to estimate the sparsity level of the signal are *** then an approach to estimate the sparsity level directly from the noisy signal is ***,a scheme based on distributed compressed sensing for speech signal denoising is described in this work which exploits multiple measurements of the noisy speech signal to construct the block-sparse data and then reconstruct the original speech signal using block-sparse model-based Compressive Sampling Matching Pursuit(CoSaMP) *** simulation results demonstrate the accuracy of the estimated sparsity level and that this de-noising system for noisy speech signals can achieve favorable performance especially when speech signals suffer severe noise.
A desirable time synchronization protocol based on flooding in wirelesssensornetworks (WSNs) should neither demand fast propagation of latest time information nor keep track of the neighboring nodes. Moreover, such ...
详细信息
作者:
Shao, XingWang, RuchuanXu, HeHuang, HaipingSun, LijuanCollege of Computer
Nanjing University of Posts and Telecommunications Nanjing 210003 China College of Computer
Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing 210003 China
network coding has been confirmed as a potential technology to improve performance of wireless mesh networks (WMNs) and a few network coding aware routings have been proposed. However, these mechanisms detect coding o...
详细信息
network coding has been confirmed as a potential technology to improve performance of wireless mesh networks (WMNs) and a few network coding aware routings have been proposed. However, these mechanisms detect coding opportunities through local traffic pattern checking, which hardly obtains optimal routes. This paper proposes a Genetic algorithm based Coding Aware Routing (GCAR) for wireless mesh networks, which employs genetic algorithm to optimize routes and coding opportunities. In addition, the key ingredients in GCAR, e.g., chromosome representation, genetic operation of crossover and mutation, fitness function considering coding opportunity and interference, are carefully designed. Through simulations on a randomly generated wireless mesh network, GCAR is shown to find optimal routes within a short time, and achieve more improvements than the previously proposed methods on route setup time, throughput and load balancing.
We propose a three-party quantum secure direct communication (QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of *** secret message can be encoded independently with desired unitary...
详细信息
We propose a three-party quantum secure direct communication (QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of *** secret message can be encoded independently with desired unitary operations in two degrees of *** this protocol,a party can synchronously obtain the other two parties' *** with previous three-party QSDC protocols,our protocol has several ***,the single photons in our protocol are only required to transmit for three *** advantage makes this protocol simple and ***,Alice and Bob can send different secret messages to Charlie,***,with hyperentanglement,this protocol has a higher information capacity than other protocols.
暂无评论