DNS completes the resolution of domain names to IP addresses, which is an effective means to realize various In-ternet applications, and is also an indispensable part of Internet infrastructure, playing an important r...
DNS completes the resolution of domain names to IP addresses, which is an effective means to realize various In-ternet applications, and is also an indispensable part of Internet infrastructure, playing an important role. However, the resolution efficiency and security of DNS have always been a hot spot in the industry. This study deeply discusses the principle of Blockchain-based DNS resolution and conducts extensive re-search on Blockchain-based DNS resolution schemes. Based on compatibility with traditional DNS, these schemes are divided into two categories: compatible and incompatible. For different scenarios, we conduct a detailed analysis and comparison, focusing on the technical characteristics and performance of each so-lution. Finally, the future research direction is looked forward to, and the full text is summarized.
We present an efficient scheme for the complete analysis of hyperentangled Greenberger-Horne-Zeilinger (GHZ) state in polarization and time-bin degrees of freedom with two steps. First, the polarization GHZ state is d...
详细信息
Humanoid robots are easily accepted by people because they have a body shape and appearance close to human. Humanoid robots have many application scenarios and great application potentials. Nevertheless, it is not eas...
详细信息
Non-Hermitian topological phases can produce some remarkable properties, compared with their Hermitian counterpart, such as the breakdown of conventional bulk-boundary correspondence and the non-Hermitian topological ...
详细信息
The concept of photonic modes is the cornerstone in optics and photonics, which can describe the propagation of the light. The Maxwell's equations play the role in calculating the mode field based on the structure...
详细信息
Although deep learning has dominated the ship detection domain, it still has two challenges: arbitrary-oriented densely arranged ships cause detection omissions and large scale image contains redundant areas. This pap...
详细信息
This paper proposes a new method for wideband directionof-arrival (DOA) estimation. The main idea of the proposed method is focusing the array output on frequency point to the reference frequency point. But different ...
详细信息
ISBN:
(数字)9781728119465
ISBN:
(纸本)9781728119472
This paper proposes a new method for wideband directionof-arrival (DOA) estimation. The main idea of the proposed method is focusing the array output on frequency point to the reference frequency point. But different from coherent signalsubspace method (CSSM), it has no requirement of an initial DOA estimation. Atomic norm minimization (ANM) is then applied after the focusing step. Our proposed method is able to achieve better estimation performance than other wideband DOA estimators. Numerical simulations are carried out to demonstrate the performance of the proposed method compared to existing ones.
This paper addresses the issue of direction-of-arrival (DOA) estimation under the coexistence of mutual coupling and nonuniform noise. We first construct a selection matrix based on the structural characteristics of t...
详细信息
ISBN:
(数字)9781728119465
ISBN:
(纸本)9781728119472
This paper addresses the issue of direction-of-arrival (DOA) estimation under the coexistence of mutual coupling and nonuniform noise. We first construct a selection matrix based on the structural characteristics of the mutual coupling matrix (MCM) to form a new manifold matrix which is not affected by the mutual coupling effect. Then, we employ the covariance fitting criteria to form a semidefinite programming for DOA estimation. Compared to most of existing sparse methods, our method does not require discretization of the angle space, hence is able to achieve super-resolution. Simulations are carried out to verify the effectiveness of the propose method.
wirelesscommunications have to face to several different security issues in practice due to the nature of *** information theory is well known to provide efficient approaches to address security issues in wireless co...
详细信息
wirelesscommunications have to face to several different security issues in practice due to the nature of *** information theory is well known to provide efficient approaches to address security issues in wirelesscommunications,which attracts much attention in both industry and academia in recent *** this paper,inspired by information theory,we study the outage probability of the opportunistic relay selection based on cognitive decode-and-forward relaying with the secrecy ***,the closed-form expression of the outage probability is ***,the asymptotic performance evaluation on the basis of the analytical results is *** simulation results show that the relay selection can reduce the outage probability in accordance with our theoretical analysis.
We carry out a proof-of-principle demonstration of three-state uncharacterized measurement-device-independent quantum key distribution over 170 km, achieving the longest transmission distance under the same security l...
详细信息
暂无评论