In the context of the "Internet +"paradigm and the prevalence of big data, the issue of security pertaining to Internet information is becoming conspicuous. Conventional data analysis technology exhibits lim...
详细信息
When an aircraft or a hypersonic vehicle re-enters the atmosphere,the plasma sheath generated can severely attenuate electromagnetic wave signals,causing the problem of communication blackout.A new method based on tim...
详细信息
When an aircraft or a hypersonic vehicle re-enters the atmosphere,the plasma sheath generated can severely attenuate electromagnetic wave signals,causing the problem of communication blackout.A new method based on time-varying E×B fields is proposed to improve on the existing static E×B fields and mitigate the radio blackout *** use of the existing method is limited by the invalid electron density reduction resulting from current density j=0 A m^(-2)in plasma beyond the Debye *** most remarkable feature is the introduction of a time-varying electric field to increase the current density in the plasma to overcome the Debye shielding effect on static electric ***,a magnetic field with the same frequency and phase as the electric field is applied to ensure that the electromagnetic force is always acting on the plasma in one *** order to investigate the effect of time-varying E×B fields on the plasma electron density distribution,two directions of voltage application are considered in numerical *** simulation results indicate that different voltage application methods generate electromagnetic forces in different directions in the plasma,resulting in repulsion and vortex effects in the plasma.A comparison of the vortex effect and repulsion effect reveals that the vortex effect is better at reducing the electron *** local plasma electron density can be reduced by more than 80%through the vortex effect,and the dimensions of the area of reduced electron density reach approximately 6 cm×4 cm,meeting the requirements of electromagnetic wave ***,the vortex effect of reducing the electron density in RAM-C(radio attenuation measurements for the study of communication blackout)reentry at an altitude of 40 km is *** the basis of the simulation results,an experiment based on a rectangular-window discharge device is proposed to demonstrate the effectiveness of the vortex *** results show t
In order to satisfy the security management requirements of combat data, such as availability, verifiability, and non-repudiation, it's necessary to establish a unified and standardized framework for identity auth...
详细信息
At the intersection of network science, communication models, and military command and control, this study explores the critical impact of network structure on the efficiency of information dissemination. We discuss h...
详细信息
To utilize the limited acoustic spectrum while combating the harsh underwater propagation, we incorporate partial spectrum sharing into an underwater acoustic sensor network and aim to maximize the minimum data collec...
详细信息
The fire assignment problem is a multi-parameter, multi-constraint NP (non-deterministic polynomial)-complete problem, the swarm intelligence algorithm has an inherent advantage in the solution, especially in the gene...
详细信息
The sending-or-not-sending(SNS) protocol is one of the most major variants of the twin-field(TF)quantum key distribution(QKD) protocol and has been realized in a 511-km field fiber, the farthest field experiment to da...
详细信息
The sending-or-not-sending(SNS) protocol is one of the most major variants of the twin-field(TF)quantum key distribution(QKD) protocol and has been realized in a 511-km field fiber, the farthest field experiment to date. In practice, however, all decoy-state methods have unavoidable source errors, and the source errors may be non-random, which compromises the security condition of the existing TF-QKD protocols. In this study, we present a general approach for efficiently calculating the SNS protocol's secure key rate with source errors, by establishing the equivalent protocols through virtual atenuation and the tagged model. This makes the first result for TF QKD in practice where source intensity cannot be controlled exactly. Our method can be combined with the two-way classical communication method such as active odd-parity pairing to further improve the key rate. The numerical results show that if the intensity error is within a few percent, the key rate and secure distance only decrease marginally. The key rate of the recent SNS experiment in the 511-km field fiber is still positive using our method presented here, even if there is a ±9.5% intensity fluctuation. This shows that the SNS protocol is robust against source errors.
作者:
Gabr, MohamedKorayem, YousefChen, Yen-LinYee, Por LipKu, Chin SoonAlexan, Wassim
Faculty of Media Engineering and Technology Computer Science Department Cairo11835 Egypt National Taipei University of Technology
Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Malaya
Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Universiti Tunku Abdul Rahman
Department of Computer Science Kampar31900 Malaysia
Faculty of Information Engineering and Technology Communications Department Cairo11835 Egypt
New Administrative Capital Mathematics Department Cairo13507 Egypt
This work proposes a novel image encryption algorithm that integrates unique image transformation techniques with the principles of chaotic and hyper-chaotic systems. By harnessing the unpredictable behavior of the Ch...
详细信息
Node classification is an important task in graph neural networks (GNNs), aiming to predict the category of nodes in the graph according to their neighbours and their own characteristics. Current methods mainly focus ...
详细信息
Gait is unique to individuals and can be acquired from a distance, making it difficult to disguise. Gait videos also contain many elements unrelated to gait, which make gait recognition challenging. Departing from com...
详细信息
暂无评论