To solve the fairness problem in user access of mobile communication systems, we proposed an access control scheme based on price and customer satisfaction (PSAC) in this paper. In the scheme, we borrow Cobb-Douglas o...
详细信息
An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the...
详细信息
An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging(CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously,it has a higher security. When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key.
We present an efficient entanglement concentration protocol(ECP) for the less-entangled W state with some identical conventional polarized single *** the protocol,two of the parties say Alice and Charlie should perf...
详细信息
We present an efficient entanglement concentration protocol(ECP) for the less-entangled W state with some identical conventional polarized single *** the protocol,two of the parties say Alice and Charlie should perform the parity check measurements and they can ultimately obtain the maximally entangled W state with a certain success ***,they can obtain another less-entangled W state,which can be reconcentrated into the maximally entangled W *** iterating this ECP,a high success probability can be *** ECP may be an optimal one and it is useful in current quantum information processing.
Continuous-variable quantum key distribution(CVQKD)[1-7]allows two remote parties(Alice and Bob)to share a secret key,even in the presence of an eavesdropper(Eve)with unlimited computational power[8-17].While,a ...
详细信息
Continuous-variable quantum key distribution(CVQKD)[1-7]allows two remote parties(Alice and Bob)to share a secret key,even in the presence of an eavesdropper(Eve)with unlimited computational power[8-17].While,a highly efficient reconciliation protocol[18-21]is crucial in a CVQKDsystem, which can not only extract the errorless secret keys, but also provide a promising way to achieve a long distance CVQKD at a low signal-to-noise ratio (SNR).
Cloud computing is experiencing a rapid development since a large amount of data need to be addressed. How to carry on the reasonable task scheduling plays a vital role in the operating efficiency of cloud computing. ...
详细信息
With the increasingly fierce market competition,manufacturing enterprises have to continuously improve their competitiveness through their collaboration and labor division with each other,*** manufacturing enterprise ...
详细信息
With the increasingly fierce market competition,manufacturing enterprises have to continuously improve their competitiveness through their collaboration and labor division with each other,*** manufacturing enterprise collaborative network(MECN)through their collaboration and labor division is an effective guarantee for obtaining competitive *** explore the topology and evolutionary process of MECN,in this paper we investigate an empirical MECN from the viewpoint of complex network theory,and construct an evolutionary model to reproduce the topological properties found in the empirical ***,large-size empirical data related to the automotive industry are collected to construct an *** analysis indicates that the MECN is not a scale-free network,but a small-world network with ***-world property indicates that the enterprises can respond quickly to the market,but disassortativity shows the risk spreading is fast and the coordinated operation is ***,an evolutionary model based on fitness preferential attachment and entropy-TOPSIS is proposed to capture the features of ***,the evolutionary model is compared with a degree-based model in which only node degree is taken into *** simulation results show the proposed evolutionary model can reproduce a number of critical topological properties of empirical MECN,while the degree-based model does not,which validates the effectiveness of the proposed evolutionary model.
Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wirelesssensornetwork(W...
详细信息
Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wirelesssensornetwork(WSN). The reputation time-varying(RTV) attacks are internal attacks. In the reputation timevarying attacks, the reputation value of nodes is manipulated to adjust dynamically by the compromised nodes or malicious attackers. Hence, these attacks have greater covert and invasive. In this paper, we propose a Timewindow-based Resilient Trust Management Scheme(TRTMS) to defend against the reputation time-varying attacks in wirelesssensornetwork. In this scheme, based on BETA distribution, the behaviors of compromised nodes are analyzed for a period of time, and then the difference judgment and the trend analysis are utilized to identify the abnormality of nodes’ reputation value, meanwhile, the control factor Fc and the time window are introduced to verify and remove the compromised modes from the suspected malicious nodes, which refer to those nodes’ reputation value changes are caused by the wireless channel changes. The result of simulation shows that our proposed scheme can defend reputation time-varying attacks effectively and it is convenient to implement.
We propose a compressed ghost imaging scheme based on differential speckle patterns,named *** the scheme,a series of bucket detector signals are acquired when a series of random speckle patterns are employed to illumi...
详细信息
We propose a compressed ghost imaging scheme based on differential speckle patterns,named *** the scheme,a series of bucket detector signals are acquired when a series of random speckle patterns are employed to illuminate an unknown *** the differential speckle patterns(differential bucket detector signals)are obtained by taking the difference between present random speckle patterns(present bucket detector signals)and previous random speckle patterns(previous bucket detector signals).Finally,the image of object can be obtained directly by performing the compressed sensing algorithm on the differential speckle patterns and differential bucket detector *** experimental and simulated results reveal that CGI-DSP can improve the imaging quality and reduce the number of measurements comparing with the traditional compressed ghost imaging schemes because our scheme can remove the environmental illuminations efficiently.
The high-purity single-photon source plays an important role in the field of quantum ***,it is generated through spontaneous parametric down-conversion *** this paper,we investigate and summarize a few approaches on o...
详细信息
The high-purity single-photon source plays an important role in the field of quantum ***,it is generated through spontaneous parametric down-conversion *** this paper,we investigate and summarize a few approaches on obtaining single-photon sources with a high purity using either PPKTP or PPLN nonlinear ***,we present improved schemes to increase the purity based on existing work,corresponding applicable conditions and procedures are discussed and ***,we carry out numerical simulations and show that nearly perfect purity can be reached even without using any ***,this work might provide valuable references for the generation and application of high purity single-photon sources.
This paper considers the problem of transmitting correlated information from multiple sources to multiple receivers, where every receiver seeks to recover all of the original sources. In order to improve the efficienc...
详细信息
暂无评论