We present the design and fabrication of a dispersion tailored highly nonlinear few-mode fibre with an inter-modal nonlinear coefficient of 2.81 (W · km) −1 , the highest reported to date. Inter-modal wavelength ...
ISBN:
(纸本)9781839531859
We present the design and fabrication of a dispersion tailored highly nonlinear few-mode fibre with an inter-modal nonlinear coefficient of 2.81 (W · km) −1 , the highest reported to date. Inter-modal wavelength conversion between the HE 21 and TE 01 vector modes is demonstrated in the fibre.
For preventing the leakage of confidential messages sent to a marcocell user in dense heterogeneous networks, a physical layer security scheme based on base station cooperation is proposed in the paper. To improve tra...
详细信息
For preventing the leakage of confidential messages sent to a marcocell user in dense heterogeneous networks, a physical layer security scheme based on base station cooperation is proposed in the paper. To improve transmission rate of confidential messages and make the downlink signals of other legitimate users interfere with eavesdroppers, the beamforming vectors at a macrocell base station and femtocell base stations are jointly optimized. The problem of maximizing the secrecy rate is modeled under the limitations of quality of service(QoS) and base station power. due to the intractability, this problem is recast into a convex Semidefinite Program(SdP) problem using the Semidefinite relaxation(Sdr) technique and the successive convex approximation(SCA) algorithm. Simulation results validate the efficacy and the security of the scheme.
Aiming at the problem that the traditional single neural network method is limited in feature dimension extraction, a new deep-fusion convolutional neural network is proposed. It uses two kinds of dif
ISBN:
(纸本)9781467389808
Aiming at the problem that the traditional single neural network method is limited in feature dimension extraction, a new deep-fusion convolutional neural network is proposed. It uses two kinds of dif
Aiming at the low utilization rate of attribute information and the lack of mining of the correlation among attributes of the existing cross-social network user identity matching algorithms, we proposed an algorithm f...
Aiming at the low utilization rate of attribute information and the lack of mining of the correlation among attributes of the existing cross-social network user identity matching algorithms, we proposed an algorithm for user identity matching across social networks utilizing fuzzy measure and Choquet integrals. Firstly, according to the characteristics of different attributes, we determineddifferent similarity calculation strategies; Secondly, we utilized particle swarm optimization method to calculate the fuzzy density of each attribute; Then Choquet integral was utilized to calculate the similarity of two accounts; Finally, the similarity was compared with the preset matching threshold and the final matching result was obtained. The experimental results in multiple sets of data showed that the average F1 value of the proposed algorithm reaching 84.5%. The performance is not only better than traditional machine learning methods, but also better than several baseline algorithms. It can be more accurate to identify the same user's accounts in multiple social networks according to the attribute information.
The powersystem analysis and simulations become more complicatedrecently due to the integration of distributed generators (dGs) such as photovoltaics and wind-power generation. In order to properly operate anddesig...
详细信息
We numerically discussed crosstalk impacts on homogeneous weakly-coupled multicore fiber based intensity-modulation/direct-detection (IM/dd) systems taking into account mean crosstalk power fluctuation, walk-off betwe...
详细信息
In recent years, SdN(Software defined Network) as a new network architecture has become the hot research point. Meanwhile,the well-known Open Flow-based SdN got a lot of attention. But it can't provide a flexible ...
详细信息
In recent years, SdN(Software defined Network) as a new network architecture has become the hot research point. Meanwhile,the well-known Open Flow-based SdN got a lot of attention. But it can't provide a flexible and effective network resource description *** an open programmable technology, For CES(Forwarding and Control Element Separation)has also been concerned. However, For CES is confined within a single network node and cannot be applied to the entire network. This paper proposes a new architecture — ForS A(ForC ESbased SdN architecture). The architecture is added a configuration layer based on the traditional SdN architecture, which solves the problem that the northbound interface is not clear between the application layer and the control layer in the SdN architecture. ForS A also implements the compatibility within various forwarding devices in the forwarding layer.
This paper considers a unicast multiuser multiple-input single-output(MISO) downlink system overheard by multiple single-antenna eavesdroppers. The objective is to jointly design the beamforming vectors and the artifi...
详细信息
This paper considers a unicast multiuser multiple-input single-output(MISO) downlink system overheard by multiple single-antenna eavesdroppers. The objective is to jointly design the beamforming vectors and the artificial noise(AN) covariance matrix with imperfect channel state information(CSI) at the transmitter,such that the total transmit power is minimized while satisfying probabilistic quality of service(Qo S) constraints at legitimate users and the eavesdroppers. Using Bernstein-type inequalities and the S-procedure, we recast the non-convex power minimization problem as two different convex semidefinite programs(SdPs) which can be solved using interior-point methods. Simulation results show that the proposed methods outperform a nonrobust method and the ones using the isotropic AN.
We established a realistic channel model that describes frequency-dependent crosstalk precisely for weakly-coupled multicore fibers. The crosstalk variations induced by relative time delay, polarization mode dispersio...
详细信息
In cyberspace,unknown zero-day attacks can bring safety *** defense methods based on signatures are *** on the Cyberspace Mimic defense(CMd)architecture,the paper proposes a framework to detect the attacks andrespond...
详细信息
In cyberspace,unknown zero-day attacks can bring safety *** defense methods based on signatures are *** on the Cyberspace Mimic defense(CMd)architecture,the paper proposes a framework to detect the attacks andrespond to *** are assigned to all online redundant heterogeneous functionally equivalent *** independent outputs are compared and the outputs in the majority will be the final *** abnormal outputs can be detected and so can the *** damaged executive modules with abnormal outputs will be replaced with new ones from the diverse executive module *** analyzing the abnormal outputs,the correspondence between inputs and abnormal outputs can be built and inputs leading to recurrent abnormal outputs will be written into the zero-day attack relateddatabase and theirreuses cannot work any longer,as the suspicious malicious inputs can be detected and *** responses include IP blacklisting and patching,*** framework also uses honeypot like executive module to confuse the *** proposed method can prevent the recurrent attack based on the same exploit.
暂无评论