We demonstrate a 32×32 optical switch on a dual-layer Si3N4-on-SOI platform with low fiber-to-fiber insertion loss (9.61~14.51 dB), low crosstalk (~-35 dB), broad 3-dB bandwidth (~57 nm) and low power consumption...
We demonstrate a multi-beam optical phased array based on a 4×4 Butler matrix. The device shows the capability of two-dimensional multi-beam steering with a pm 30^{circ}×8^{circ} field-of-view through a shar...
详细信息
Based on a resistance-capacitance equalizer, we demonstrated a silicon thermo-optic phase shifter with a rise time of 2.3 µs and a modulation bandwidth of 250 kHz, offering 10 times enhancement over the original ...
详细信息
We demonstrated a LiDAR transmitter incorporating both a hybrid-integrated tunable external cavity laser and a high-resolution 2-D optical phased array beam-steerer on a tri-layer silicon-nitride-on-silicon photonic p...
Finding a subset of users to statistically represent the original social network in terms of attributes has received a lot of attention recently. The existing literature had proved that the problem is NP-Hard and prop...
ISBN:
(数字)9781728195582
ISBN:
(纸本)9781728195599
Finding a subset of users to statistically represent the original social network in terms of attributes has received a lot of attention recently. The existing literature had proved that the problem is NP-Hard and proposed some sampling models, but representative degrees aren't systematically studied. Taking node degree and edge weight into account, we present a topic sampling model for the whole social network in this paper. Firstly, by statistically calculating node degrees for one real dataset, we find that one node is more likely to be a representative user if its degree is high. We then give some definitions about representative degrees. Based on statistical stratified sample, we finally give a sampling model of topic representative users who are from most or all attribute groups in the network. Experimental results show that our algorithm significantly outperforms other six baseline methods and is also effective in terms of time complexity.
Information entropy and its extension, which are important generalization of entropy, have been applied in many research domains today. In this paper, a novel generalized relative entropy is constructed to avoid some ...
详细信息
Research Purpose: The distributed, traceable and security of blockchain technology are applicable to the construction of new government information resource models, which could eliminate the barn effect and trust in g...
详细信息
Research Purpose: The distributed, traceable and security of blockchain technology are applicable to the construction of new government information resource models, which could eliminate the barn effect and trust in government information sharing, as well as promoting the transformation of government affairs from management to service, it is also of great significance to the sharing of government information and construction of service-oriented e-government. Propose Methods: By analyzing the current problems of government information sharing, combined with literature research, this paper proposes the theoretical framework and advantages of blockchain technology applied to government information management and sharing, expounds the blockchain-based solution, it also constructs a government information sharing model based on blockchain, and gives implementation strategies at the technical and management levels. Results and Conclusion: The government information sharing model based on the blockchain solution and the transparency of government information can be used as a research framework for information interaction analysis between the government and users. It can also promote the construction and development of information sharing for Chinese government, as well as providing unified information sharing solution at the departmental and regional levels for e-government.
As an important resource for machine translation and cross-language information retrieval, collecting large-scale parallel corpus has been paid wide attention. With the development of the Internet, researchers begin t...
详细信息
In scenarios where multiple parties such as the Internet of Things and Supply Chains participate in data sharing and computing, when accessing data, users not only need to accept the forward access control of the data...
详细信息
In scenarios where multiple parties such as the Internet of Things and Supply Chains participate in data sharing and computing, when accessing data, users not only need to accept the forward access control of the data owner, but also needs to perform reverse access control on the data, so as to realize two-way access control. In the traditional blockchain, all users can participate in accounting and view transaction data, and only protect user privacy through “pseudo-anonymity”. The access rights of different users cannot be distinguished, which cannot meet the user's two-way access control needs. However, most of the existing blockchain-based access control schemes are one-way access control, which cannot meet the needs of users for two-way access control in scenarios such as the Internet of Things and Supply Chains. Therefore, it is particularly important to design a two-way access control mechanism suitable for application in the blockchain. On this basis, this paper proposes a dual strategy attribute-based encryption (ABE) scheme for distributed outsourcing. This scheme combines two existing schemes, ciphertext-policy ABE and key-policy ABE, and proposes two access structures and a structure of attribute sets. The primary access structure and the secondary attributes are stored in the ciphertext, and the secondary access structure and the primary attributes are stored in the user's private key. Only when the primary attribute set satisfies the primary access structure and the secondary attribute set satisfies the secondary access structure can the user unlock the ciphertext. This scheme has no single authorization center; instead, blockchain nodes jointly participate in authorization. In addition, the proposed scheme outsources the encryption and decryption of the ciphertext to blockchain nodes to reduce the computing pressure on users and can adapt to the decentralized environment of the blockchain and provide users with two-way access control services. Finally
暂无评论