A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation gradient.The MHNN is simulated and d...A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation gradient.The MHNN is simulated and dynamically analyzed,and implemented on FPGA.Then,a new pseudo-random number generator(PRNG)based on MHNN is proposed.The post-processing unit of the PRNG is composed of nonlinear post-processor and XOR calculator,which effectively ensures the randomness of PRNG.The experiments in this paper comply with the IEEE 754-1985 high precision32-bit floating point standard and are done on the Vivado design tool using a Xilinx XC7 Z020 CLG400-2 FPGA chip and the Verilog-HDL hardware programming language.The random sequence generated by the PRNG proposed in this paper has passed the NIST SP800-22 test suite and security analysis,proving its randomness and high performance.Finally,an image encryption system based on PRNG is proposed and implemented on FPGA,which proves the value of the image encryption system in the field of data encryption connected to the Internet of Things(Io T).展开更多
Two-phaseγ-TiAl/α_(2)-Ti_(3)Al lamellar intermetallics have attracted considerable attention because of their excellent strength and plasticity.However,the exact deformation mechanisms remain to be investigated.In t...Two-phaseγ-TiAl/α_(2)-Ti_(3)Al lamellar intermetallics have attracted considerable attention because of their excellent strength and plasticity.However,the exact deformation mechanisms remain to be investigated.In this paper,a solidified lamellar Ti-Al alloy with lamellar orientation at 0°,17°,and 73°with respect to the loading direction was stretched by utilizing molecular dynamics(MD)simulations.The results show that the mechanical properties of the sample are considerably influenced by solidified defects and tensile directions.The structure deformation and fracture were primarily attributed to an intrinsic stacking fault(ISF)accompanied by the nucleated Shockley dislocation,and the adjacent extrinsic stacking fault(ESF)and ISF formed by solidification tend to form large HCP structures during the tensile process loading at 73°.Moreover,cleavage cracking easily occurs on theγ/α_(2)interface under tensile deformation.The fracture loading mechanism at 17°is grain boundary slide whereas,at 73°and 0°,the dislocation piles up to form a dislocation junction.展开更多
A scheme to improve the quality in ghost imaging(GI)by controlling the bandwidth of light source(BCGI)is proposed.The theoretical and numerical results show that the reconstruction result with high quality can be obta...A scheme to improve the quality in ghost imaging(GI)by controlling the bandwidth of light source(BCGI)is proposed.The theoretical and numerical results show that the reconstruction result with high quality can be obtained by adjusting the bandwidth range of the light source appropriately,and the selection criterion of the bandwidth is analyzed by the power distribution of the imaging target.A proof-of-principle experiment is implemented to verify the theoretical and numerical results.In addition,the BCGI also presents better anti-noise performance when compared with some popular GI methods.展开更多
In this paper, we consider the problems of data sharing between multiple distrusted authorities. Prior solutions rely on trusted third parties such as CAs, or are susceptible to collusion between malicious authorities...In this paper, we consider the problems of data sharing between multiple distrusted authorities. Prior solutions rely on trusted third parties such as CAs, or are susceptible to collusion between malicious authorities, which can comprise the security of honest ones. In this paper, we propose a new multi-authority data sharing scheme - Decen- tralized Multi-Authority ABE (DMA), which is derived from CP-ABE that is resilient to these types of misbehavior. Our system distin- guishes between a data owner (DO) principal and attribute authorities (AAs): the DO owns the data but allows AAs to arbitrate access by providing attribute labels to users. The data is protected by policy encryption over these attributes. Unlike prior systems, attributes generated by AAs are not user-specific, and neither is the system susceptible to collusion between users who try to escalate their access by sharing keys. We prove our scherne correct under the Decisional Bilinear Diffie-Hellman (DBDH) assumption; we also include a com- plete end-to-end implementation that demon- strates the practical efficacy of our technique.展开更多
Wireless Body Area Networks(WBANs)refer to small sensor network that consists of sensor devices mounted on the surface of the body or implanted in the body,as such networks are employed to harvest physiological data o...Wireless Body Area Networks(WBANs)refer to small sensor network that consists of sensor devices mounted on the surface of the body or implanted in the body,as such networks are employed to harvest physiological data of the human body or to act as an assistant regulator of several specific physiological indicators of the human body.The sensor devices transmit the harvested human physiological data to the local node via a public channel.Before transmitting data,the sensor device and the local node should perform mutual authentication and key agreement.It is proposed in this paper a secure mutual authentication scheme of blockchain-based in WBANs.To analyze the security of this scheme,formal security analysis,and informal security analysis are used,then the computation and communication costs are compared with those of the relevant schemes.Relevant experimental results reveal that the proposed scheme exhibit more effective control over energy consumption and promising.展开更多
In head mounted display(HMD),in order to cancel pincushion distortion,the images displayed on the mobile should be prewarped with barrel distortion.The copyright of the mobile video should be verified on both the orig...In head mounted display(HMD),in order to cancel pincushion distortion,the images displayed on the mobile should be prewarped with barrel distortion.The copyright of the mobile video should be verified on both the original view and the pre-warped virtual view.A robust watermarking resistant against barrel distortion for HMDs is proposed in this paper.Watermark mask is embedded into image in consideration of imperceptibility and robustness of watermarking.In order to detect watermark from the pre-warped image with barrel distortion,an estimation method of the barrel distortion is proposed for HMDs.Then,the same warp is enforced on the embedded watermark mask with the estimated parameters of barrel distortion.The correlation between the warped watermark and the pre-warped image is computed to predicate the existence of watermark.As shown in experimental results,watermark of mobile video can be detected not only from the original views,but also from the pre-warped virtual view.It also shows that the proposed scheme is resistant against combined barrel distortion and common post-processing,such as JPEG compression.展开更多
The exploration of the memristor model in the discrete domain is a fascinating hotspot.The electromagnetic induction on neurons has also begun to be simulated by some discrete memristors.However,most of the current in...The exploration of the memristor model in the discrete domain is a fascinating hotspot.The electromagnetic induction on neurons has also begun to be simulated by some discrete memristors.However,most of the current investigations are based on the integer-order discrete memristor,and there are relatively few studies on the form of fractional order.In this paper,a new fractional-order discrete memristor model with prominent nonlinearity is constructed based on the Caputo fractional-order difference operator.Furthermore,the dynamical behaviors of the Rulkov neuron under electromagnetic radiation are simulated by introducing the proposed discrete memristor.The integer-order and fractional-order peculiarities of the system are analyzed through the bifurcation graph,the Lyapunov exponential spectrum,and the iterative graph.The results demonstrate that the fractional-order system has more abundant dynamics than the integer one,such as hyper-chaos,multi-stable and transient chaos.In addition,the complexity of the system in the fractional form is evaluated by the means of the spectral entropy complexity algorithm and consequences show that it is affected by the order of the fractional system.The feature of fractional difference lays the foundation for further research and application of the discrete memristor and the neuron map in the future.展开更多
A new four-dimensional(4D)memristive chaotic system is obtained by introducing a memristor into the Rucklidge chaotic system,and a detailed dynamic analysis of the system is performed.The sensitivity of the system to ...A new four-dimensional(4D)memristive chaotic system is obtained by introducing a memristor into the Rucklidge chaotic system,and a detailed dynamic analysis of the system is performed.The sensitivity of the system to parameters allows it obtains 16 different attractors by changing only one parameter.The various transient behaviors and excellent spectral entropy and C0 complexity values of the system can also reflect the high complexity of the system.A circuit is designed and verified the feasibility of the system from the physical level.Finally,the system is applied to image encryption,and the security of the encryption system is analyzed from multiple aspects,providing a reference for the application of such memristive chaotic systems.展开更多
The packet generator (pktgen) is a fundamental module of the majority of soft- ware testers used to benchmark network pro- tocols and functions. The high performance of the pktgen is an important feature of Future I...The packet generator (pktgen) is a fundamental module of the majority of soft- ware testers used to benchmark network pro- tocols and functions. The high performance of the pktgen is an important feature of Future Internet Testbeds, and DPDK is a network packet accelerated platform, so we can use DPDK to improve performance. Meanwhile, green computing is advocated for in the fu- ture of the internet. Most existing efforts have contributed to improving either performance or accuracy. We, however, shifted the focus to energy-efficiency. We find that high per- formance comes at the cost of high energy consumption. Therefore, we started from a widely used high performance schema, deeply studying the multi-core platform, especially in terms of parallelism, core allocation, and fre- quency controlling. On this basis, we proposed an AFfinity-oriented Fine-grained CONtrolling (AFFCON) mechanism in order to improve energy efficiency with desirable performance. As clearly demonstrated through a series of evaluative experiments, our proposal can reduce CPU power consumption by up to 11% while maintaining throughput at the line rate.展开更多
A circular photonic crystal fiber(C-PCF)based on As2 Se3 is designed,which has three zero dispersion wavelengths and flat dispersion.Using this fiber,a wide mid-infrared supercontinuum(MIR-SC)can be generated by launc...A circular photonic crystal fiber(C-PCF)based on As2 Se3 is designed,which has three zero dispersion wavelengths and flat dispersion.Using this fiber,a wide mid-infrared supercontinuum(MIR-SC)can be generated by launching a femtosecond pulse in the first anomalous dispersion region.The simulation results show that the MIR-SC is formed by soliton self-frequency shift and direct soliton spectrum tunneling on the long wavelength side and self-phase modulation,soliton fission on the short wavelength side.Further,optical shocking and four-wave mixing(FWM)are not conducive to the long-wavelength extension of MIR-SC,while the number and intensity of fundamental solitons have a greater effect on the short-wavelength extension of MIR-SC.The generation of optical shocking waves,FWM waves and fundamental solitons can be obviously affected by changing the fiber length and input pulse parameters,so that the spectrum range and flatness can be adjusted with great freedom.Finally,under the conditions of 4000 W pulse peak power,30 fs pulse width,47 mm fiber length,and 0 initial chirp,a wide MIR-SC with a coverage range of 2.535μm-16.6μm is obtained.These numerical results are encouraging because they demonstrate that the spread of MIR-SC towards the red and blue ends can be manipulated by choosing the appropriate incident pulse and designing optimized fiber parameters,which contributes to applications in such diverse areas as spectroscopy,metrology and tomography.展开更多
Scattering medium in light path will cause distortion of the light field,resulting in poor signal-to-noise ratio(SNR)of ghost imaging.The disturbance is usually eliminated by the method of pre-compensation.We deduce t...Scattering medium in light path will cause distortion of the light field,resulting in poor signal-to-noise ratio(SNR)of ghost imaging.The disturbance is usually eliminated by the method of pre-compensation.We deduce the intensity fluctuation correlation function of the ghost imaging with the disturbance of the scattering medium,which proves that the ghost image consists of two correlated results:the image of scattering medium and the target object.The effect of the scattering medium can be eliminated by subtracting the correlated result between the light field after the scattering medium and the reference light from ghost image,which verifies the theoretical results.Our research may provide a new idea of ghost imaging in harsh environment.展开更多
Efficient response speed and information processing speed are among the characteristics of mobile edge computing(MEC).However,MEC easily causes information leakage and loss problems because it requires frequent data e...Efficient response speed and information processing speed are among the characteristics of mobile edge computing(MEC).However,MEC easily causes information leakage and loss problems because it requires frequent data exchange.This work proposes an anonymous privacy data protection and access control scheme based on elliptic curve cryptography(ECC)and bilinear pairing to protect the communication security of the MEC.In the proposed scheme,the information sender encrypts private information through the ECC algorithm,and the information receiver uses its own key information and bilinear pairing to extract and verify the identity of the information sender.During each round of communication,the proposed scheme uses timestamps and random numbers to ensure the freshness of each round of conversation.Experimental results show that the proposed scheme has good security performance and can provide data privacy protection,integrity verification,and traceability for the communication process of MEC.The proposed scheme has a lower cost than other related schemes.The communication and computational cost of the proposed scheme are reduced by 31.08% and 22.31% on average compared with those of the other related schemes.展开更多
Traffic matrix is an abstract representation of the traffic volume flowing between sets of source and destination pairs.It is a key input parameter of network operations management,planning,provisioning and traffic en...Traffic matrix is an abstract representation of the traffic volume flowing between sets of source and destination pairs.It is a key input parameter of network operations management,planning,provisioning and traffic engineering.Traffic matrix is also important in the context of OpenFlow-based networks.Because even good measurement systems can suffer from errors and data collection systems can fail,missing values are common.Existing matrix completion methods do not consider traffic exhibit characteristics and only provide a finite precision.To address this problem,this paper proposes a novel approach based on compressive sensing and traffic self-similarity to reconstruct the missing traffic flow data.Firstly,we analyze the realworld traffic matrix,which all exhibit lowrank structure,temporal smoothness feature and spatial self-similarity.Then,we propose Self-Similarity and Temporal Compressive Sensing(SSTCS) algorithm to reconstruct the missing traffic data.The extensive experiments with the real-world traffic matrix show that our proposed SSTCS can significantly reduce data reconstruction errors and achieve satisfactory accuracy comparing with the existing solutions.Typically SSTCS can successfully reconstruct the traffic matrix with less than 32%errors when as much as98%of the data is missing.展开更多
Energy efficiency is an important criterion for routing algorithms in the wireless sensor network. Cooperative routing can reduce energy consumption effectively stemming from its diversity gain advantage. To solve the...Energy efficiency is an important criterion for routing algorithms in the wireless sensor network. Cooperative routing can reduce energy consumption effectively stemming from its diversity gain advantage. To solve the energy consumption problem and maximize the network lifetime, this paper proposes a Virtual Multiple Input Multiple Output based Cooperative Routing algorithm(VMIMOCR). VMIMOCR chooses cooperative relay nodes based on Virtual Multiple Input Multiple Output Model, and balances energy consumption by reasonable power allocation among transmitters, and decides the forwarding path finally. The experimental results show that VMIMOCR can improve network lifetime from 37% to 348% in the medium node density, compared with existing routing algorithms.展开更多
The vibration is one of the important factors affecting imaging quality of conventional remote sensing imaging because the relative motion between the imaging system and the target can result in the degradation of ima...The vibration is one of the important factors affecting imaging quality of conventional remote sensing imaging because the relative motion between the imaging system and the target can result in the degradation of imaging quality. The influence of the vibration of the detector in the test path on reflective ghost imaging (RGI) is investigated theoretically and experimentally. We analyze the effects of the vibrating amplitude and velocity. The results demonstrate that the microvibrations of the bucket detector have almost no impact on the imaging resolution and signal-to-noise ratio (SNR) of RGI, i.e., the degradation of imaging quality caused by the vibration of the detector can be overcome to some extent. Our results can be helpful for remote sensing imaging.展开更多
The trans-media transmission of quantum pulse is one of means of free-space transmission which can be applied in continuous-variable quantum key distribution(CVQKD)system.In traditional implementations for atmospheric...The trans-media transmission of quantum pulse is one of means of free-space transmission which can be applied in continuous-variable quantum key distribution(CVQKD)system.In traditional implementations for atmospheric channels,the 1500-to-1600-nm pulse is regarded as an ideal quantum pulse carrier.However,the underwater transmission of this pulses tends to suffer from severe attenuation,which inevitably deteriorates the security of the whole CVQKD system.In this paper,we propose an alternative scheme for implementations of CVQKD over satellite-to-submarine channels.We estimate the parameters of the trans-media channels,involving atmosphere,sea surface and seawater and find that the shortwave infrared performs well in the above channels.The 450-nm pulse is used for generations of quantum signal carriers to accomplish quantum communications through atmosphere,sea surface and seawater channels.Numerical simulations show that the proposed scheme can achieve the transmission distance of 600 km.In addition,we demonstrate that non-Gaussian operations can further lengthen its maximal transmission distance,which contributes to the establishment of practical global quantum networks.展开更多
With the massive increase of wirelessly connected devices and the rapid development of the Internet, information is transmitted more and more frequently. Since the information transmissions over these networks are gre...With the massive increase of wirelessly connected devices and the rapid development of the Internet, information is transmitted more and more frequently. Since the information transmissions over these networks are greatly threatened not only by the imperfection of channels but also by the potential attackers or eavesdroppers, security and reliability become some of the crucial requirements for our future networks. Due to the complex dynamic behavior, ergodicity, wide spectrum and sensitivity to initial values, chaos signals show most required attributes of good cryptosystems and great potentials in optical fiber communications for desirable spatial accuracy and distance. In this context, it has become imperative to investigate and apply chaos theories to solve emerging secure communication problems in various networks. This includes leveraging chaos systems and signals to address a wide range of secure communication challenges in optical fiber communications, chaos cipher, image encryption, etc.展开更多
基金supported by the Scientific Research Fund of Hunan Provincial Education Department(Grant No.21B0345)the Postgraduate Scientific Research Innovation Project of Changsha University of Science and Technology(Grant Nos.CX2021SS69 and CX2021SS72)+3 种基金the Postgraduate Scientific Research Innovation Project of Hunan Province,China(Grant No.CX20200884)the Natural Science Foundation of Hunan Province,China(Grant Nos.2019JJ50648,2020JJ4622,and 2020JJ4221)the National Natural Science Foundation of China(Grant No.62172058)the Special Funds for the Construction of Innovative Provinces of Hunan Province,China(Grant Nos.2020JK4046 and 2022SK2007)。
文摘A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation gradient.The MHNN is simulated and dynamically analyzed,and implemented on FPGA.Then,a new pseudo-random number generator(PRNG)based on MHNN is proposed.The post-processing unit of the PRNG is composed of nonlinear post-processor and XOR calculator,which effectively ensures the randomness of PRNG.The experiments in this paper comply with the IEEE 754-1985 high precision32-bit floating point standard and are done on the Vivado design tool using a Xilinx XC7 Z020 CLG400-2 FPGA chip and the Verilog-HDL hardware programming language.The random sequence generated by the PRNG proposed in this paper has passed the NIST SP800-22 test suite and security analysis,proving its randomness and high performance.Finally,an image encryption system based on PRNG is proposed and implemented on FPGA,which proves the value of the image encryption system in the field of data encryption connected to the Internet of Things(Io T).
基金Project supported by the National Natural Science Foundation of China(Grant Nos.51761004,51661005,and 11964005)Industry and Education Combination Innovation Platform of Intelligent Manufacturing and Graduate Joint Training Base at Guizhou University(Grant No.2020520000-83-01-324061)+2 种基金the Guizhou Province Science and Technology Fund,China(Grant Nos.ZK[2021]051,[2017]5788,and J[2015]2050)High Level Creative Talent in Guizhou Education Department of Chinathe Cooperation Project of Science and Technology of Guizhou Province,China(Grant No.LH[2016]7430)。
文摘Two-phaseγ-TiAl/α_(2)-Ti_(3)Al lamellar intermetallics have attracted considerable attention because of their excellent strength and plasticity.However,the exact deformation mechanisms remain to be investigated.In this paper,a solidified lamellar Ti-Al alloy with lamellar orientation at 0°,17°,and 73°with respect to the loading direction was stretched by utilizing molecular dynamics(MD)simulations.The results show that the mechanical properties of the sample are considerably influenced by solidified defects and tensile directions.The structure deformation and fracture were primarily attributed to an intrinsic stacking fault(ISF)accompanied by the nucleated Shockley dislocation,and the adjacent extrinsic stacking fault(ESF)and ISF formed by solidification tend to form large HCP structures during the tensile process loading at 73°.Moreover,cleavage cracking easily occurs on theγ/α_(2)interface under tensile deformation.The fracture loading mechanism at 17°is grain boundary slide whereas,at 73°and 0°,the dislocation piles up to form a dislocation junction.
基金the National Natural Science Foundation of China(Grant Nos.61871431,61971184,and 62001162).
文摘A scheme to improve the quality in ghost imaging(GI)by controlling the bandwidth of light source(BCGI)is proposed.The theoretical and numerical results show that the reconstruction result with high quality can be obtained by adjusting the bandwidth range of the light source appropriately,and the selection criterion of the bandwidth is analyzed by the power distribution of the imaging target.A proof-of-principle experiment is implemented to verify the theoretical and numerical results.In addition,the BCGI also presents better anti-noise performance when compared with some popular GI methods.
基金supported by the National Natural Science Foundation of China under grant 61402160Hunan Provincial Natural Science Foundation of China under grant 2016JJ3043Open Funding for Universities in Hunan Province under grant 14K023
文摘In this paper, we consider the problems of data sharing between multiple distrusted authorities. Prior solutions rely on trusted third parties such as CAs, or are susceptible to collusion between malicious authorities, which can comprise the security of honest ones. In this paper, we propose a new multi-authority data sharing scheme - Decen- tralized Multi-Authority ABE (DMA), which is derived from CP-ABE that is resilient to these types of misbehavior. Our system distin- guishes between a data owner (DO) principal and attribute authorities (AAs): the DO owns the data but allows AAs to arbitrate access by providing attribute labels to users. The data is protected by policy encryption over these attributes. Unlike prior systems, attributes generated by AAs are not user-specific, and neither is the system susceptible to collusion between users who try to escalate their access by sharing keys. We prove our scherne correct under the Decisional Bilinear Diffie-Hellman (DBDH) assumption; we also include a com- plete end-to-end implementation that demon- strates the practical efficacy of our technique.
基金supported by the National Natural Science Foundation of China(Grant Nos.61872138&61572188)。
文摘Wireless Body Area Networks(WBANs)refer to small sensor network that consists of sensor devices mounted on the surface of the body or implanted in the body,as such networks are employed to harvest physiological data of the human body or to act as an assistant regulator of several specific physiological indicators of the human body.The sensor devices transmit the harvested human physiological data to the local node via a public channel.Before transmitting data,the sensor device and the local node should perform mutual authentication and key agreement.It is proposed in this paper a secure mutual authentication scheme of blockchain-based in WBANs.To analyze the security of this scheme,formal security analysis,and informal security analysis are used,then the computation and communication costs are compared with those of the relevant schemes.Relevant experimental results reveal that the proposed scheme exhibit more effective control over energy consumption and promising.
基金partially supported by Fundamental Research Funds for the Central Universities of China(2016JKF01203)National Natural Science Foundation of China(61401408,61402484,and 61502160)
文摘In head mounted display(HMD),in order to cancel pincushion distortion,the images displayed on the mobile should be prewarped with barrel distortion.The copyright of the mobile video should be verified on both the original view and the pre-warped virtual view.A robust watermarking resistant against barrel distortion for HMDs is proposed in this paper.Watermark mask is embedded into image in consideration of imperceptibility and robustness of watermarking.In order to detect watermark from the pre-warped image with barrel distortion,an estimation method of the barrel distortion is proposed for HMDs.Then,the same warp is enforced on the embedded watermark mask with the estimated parameters of barrel distortion.The correlation between the warped watermark and the pre-warped image is computed to predicate the existence of watermark.As shown in experimental results,watermark of mobile video can be detected not only from the original views,but also from the pre-warped virtual view.It also shows that the proposed scheme is resistant against combined barrel distortion and common post-processing,such as JPEG compression.
基金supported by the Major Research Plan of the National Natural Science Foundation of China(Grant No.91964108)the National Natural Science Foundation of China(Grant No.61971185)the Natural Science Foundation of Hunan Province,China(Grant No.2020JJ4218).
文摘The exploration of the memristor model in the discrete domain is a fascinating hotspot.The electromagnetic induction on neurons has also begun to be simulated by some discrete memristors.However,most of the current investigations are based on the integer-order discrete memristor,and there are relatively few studies on the form of fractional order.In this paper,a new fractional-order discrete memristor model with prominent nonlinearity is constructed based on the Caputo fractional-order difference operator.Furthermore,the dynamical behaviors of the Rulkov neuron under electromagnetic radiation are simulated by introducing the proposed discrete memristor.The integer-order and fractional-order peculiarities of the system are analyzed through the bifurcation graph,the Lyapunov exponential spectrum,and the iterative graph.The results demonstrate that the fractional-order system has more abundant dynamics than the integer one,such as hyper-chaos,multi-stable and transient chaos.In addition,the complexity of the system in the fractional form is evaluated by the means of the spectral entropy complexity algorithm and consequences show that it is affected by the order of the fractional system.The feature of fractional difference lays the foundation for further research and application of the discrete memristor and the neuron map in the future.
基金Project supported by the National Natural Science Foundation of China(Grant No.U1612442)Science and Technology Special Foundation Project of Guizhou Water Resources Department(Grant No.KT202236)。
文摘A new four-dimensional(4D)memristive chaotic system is obtained by introducing a memristor into the Rucklidge chaotic system,and a detailed dynamic analysis of the system is performed.The sensitivity of the system to parameters allows it obtains 16 different attractors by changing only one parameter.The various transient behaviors and excellent spectral entropy and C0 complexity values of the system can also reflect the high complexity of the system.A circuit is designed and verified the feasibility of the system from the physical level.Finally,the system is applied to image encryption,and the security of the encryption system is analyzed from multiple aspects,providing a reference for the application of such memristive chaotic systems.
基金supported by the National Science Foundation of China (No. 61472130, Research on Graphic Processing Units-based High-performance Packet Processing)the China Postdoctoral Science Foundation funded project (No. 61702174)
文摘The packet generator (pktgen) is a fundamental module of the majority of soft- ware testers used to benchmark network pro- tocols and functions. The high performance of the pktgen is an important feature of Future Internet Testbeds, and DPDK is a network packet accelerated platform, so we can use DPDK to improve performance. Meanwhile, green computing is advocated for in the fu- ture of the internet. Most existing efforts have contributed to improving either performance or accuracy. We, however, shifted the focus to energy-efficiency. We find that high per- formance comes at the cost of high energy consumption. Therefore, we started from a widely used high performance schema, deeply studying the multi-core platform, especially in terms of parallelism, core allocation, and fre- quency controlling. On this basis, we proposed an AFfinity-oriented Fine-grained CONtrolling (AFFCON) mechanism in order to improve energy efficiency with desirable performance. As clearly demonstrated through a series of evaluative experiments, our proposal can reduce CPU power consumption by up to 11% while maintaining throughput at the line rate.
基金Project supported by the National Natural Science Foundation of China(Grant No.61275137)the Opened Fund of the State Key Laboratory of Integrated Optoelectronics(Grant No.IOSKL2020KF20)。
文摘A circular photonic crystal fiber(C-PCF)based on As2 Se3 is designed,which has three zero dispersion wavelengths and flat dispersion.Using this fiber,a wide mid-infrared supercontinuum(MIR-SC)can be generated by launching a femtosecond pulse in the first anomalous dispersion region.The simulation results show that the MIR-SC is formed by soliton self-frequency shift and direct soliton spectrum tunneling on the long wavelength side and self-phase modulation,soliton fission on the short wavelength side.Further,optical shocking and four-wave mixing(FWM)are not conducive to the long-wavelength extension of MIR-SC,while the number and intensity of fundamental solitons have a greater effect on the short-wavelength extension of MIR-SC.The generation of optical shocking waves,FWM waves and fundamental solitons can be obviously affected by changing the fiber length and input pulse parameters,so that the spectrum range and flatness can be adjusted with great freedom.Finally,under the conditions of 4000 W pulse peak power,30 fs pulse width,47 mm fiber length,and 0 initial chirp,a wide MIR-SC with a coverage range of 2.535μm-16.6μm is obtained.These numerical results are encouraging because they demonstrate that the spread of MIR-SC towards the red and blue ends can be manipulated by choosing the appropriate incident pulse and designing optimized fiber parameters,which contributes to applications in such diverse areas as spectroscopy,metrology and tomography.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61871431,61971184,and 62001162)。
文摘Scattering medium in light path will cause distortion of the light field,resulting in poor signal-to-noise ratio(SNR)of ghost imaging.The disturbance is usually eliminated by the method of pre-compensation.We deduce the intensity fluctuation correlation function of the ghost imaging with the disturbance of the scattering medium,which proves that the ghost image consists of two correlated results:the image of scattering medium and the target object.The effect of the scattering medium can be eliminated by subtracting the correlated result between the light field after the scattering medium and the reference light from ghost image,which verifies the theoretical results.Our research may provide a new idea of ghost imaging in harsh environment.
基金partially supported by the National Natural Science Foundation of China under Grant 62072170 and Grant 62177047the Fundamental Research Funds for the Central Universities under Grant 531118010527+1 种基金the Science and Technology Key Projects of Hunan Province under Grant 2022GK2015the Hunan Provincial Natural Science Foundation of China under Grant 2021JJ30141.
文摘Efficient response speed and information processing speed are among the characteristics of mobile edge computing(MEC).However,MEC easily causes information leakage and loss problems because it requires frequent data exchange.This work proposes an anonymous privacy data protection and access control scheme based on elliptic curve cryptography(ECC)and bilinear pairing to protect the communication security of the MEC.In the proposed scheme,the information sender encrypts private information through the ECC algorithm,and the information receiver uses its own key information and bilinear pairing to extract and verify the identity of the information sender.During each round of communication,the proposed scheme uses timestamps and random numbers to ensure the freshness of each round of conversation.Experimental results show that the proposed scheme has good security performance and can provide data privacy protection,integrity verification,and traceability for the communication process of MEC.The proposed scheme has a lower cost than other related schemes.The communication and computational cost of the proposed scheme are reduced by 31.08% and 22.31% on average compared with those of the other related schemes.
基金This work is supported by the Prospcctive Research Project on Future Networks of Jiangsu Future Networks Innovation Institute under Grant No.BY2013095-1-05, the National Ba- sic Research Program of China (973) under Grant No. 2012CB315805 and the National Natural Science Foundation of China under Grants No. 61173167.
文摘Traffic matrix is an abstract representation of the traffic volume flowing between sets of source and destination pairs.It is a key input parameter of network operations management,planning,provisioning and traffic engineering.Traffic matrix is also important in the context of OpenFlow-based networks.Because even good measurement systems can suffer from errors and data collection systems can fail,missing values are common.Existing matrix completion methods do not consider traffic exhibit characteristics and only provide a finite precision.To address this problem,this paper proposes a novel approach based on compressive sensing and traffic self-similarity to reconstruct the missing traffic flow data.Firstly,we analyze the realworld traffic matrix,which all exhibit lowrank structure,temporal smoothness feature and spatial self-similarity.Then,we propose Self-Similarity and Temporal Compressive Sensing(SSTCS) algorithm to reconstruct the missing traffic data.The extensive experiments with the real-world traffic matrix show that our proposed SSTCS can significantly reduce data reconstruction errors and achieve satisfactory accuracy comparing with the existing solutions.Typically SSTCS can successfully reconstruct the traffic matrix with less than 32%errors when as much as98%of the data is missing.
基金supported by the National Basic Research Program of China (973 program) (Grant No.2012CB315805)the National Natural Science Foundation of China (Grant No.61472130 and 61572184)
文摘Energy efficiency is an important criterion for routing algorithms in the wireless sensor network. Cooperative routing can reduce energy consumption effectively stemming from its diversity gain advantage. To solve the energy consumption problem and maximize the network lifetime, this paper proposes a Virtual Multiple Input Multiple Output based Cooperative Routing algorithm(VMIMOCR). VMIMOCR chooses cooperative relay nodes based on Virtual Multiple Input Multiple Output Model, and balances energy consumption by reasonable power allocation among transmitters, and decides the forwarding path finally. The experimental results show that VMIMOCR can improve network lifetime from 37% to 348% in the medium node density, compared with existing routing algorithms.
基金supported by the National Natural Science Foundation of China(Grant Nos.61372102 and 61571183)
文摘The vibration is one of the important factors affecting imaging quality of conventional remote sensing imaging because the relative motion between the imaging system and the target can result in the degradation of imaging quality. The influence of the vibration of the detector in the test path on reflective ghost imaging (RGI) is investigated theoretically and experimentally. We analyze the effects of the vibrating amplitude and velocity. The results demonstrate that the microvibrations of the bucket detector have almost no impact on the imaging resolution and signal-to-noise ratio (SNR) of RGI, i.e., the degradation of imaging quality caused by the vibration of the detector can be overcome to some extent. Our results can be helpful for remote sensing imaging.
基金supported by the National Natural Science Foundation of China(Grant Nos.62101180 and 61871407)the Key R&D Program of Hunan Province(Grant No.2022GK2016)+1 种基金the State Key Laboratory of High Performance Computing,National University of Defense Technology(Grant No.202101-25)the Fundamental Research Funds for the Central Universities(Grant No.531118010371)。
文摘The trans-media transmission of quantum pulse is one of means of free-space transmission which can be applied in continuous-variable quantum key distribution(CVQKD)system.In traditional implementations for atmospheric channels,the 1500-to-1600-nm pulse is regarded as an ideal quantum pulse carrier.However,the underwater transmission of this pulses tends to suffer from severe attenuation,which inevitably deteriorates the security of the whole CVQKD system.In this paper,we propose an alternative scheme for implementations of CVQKD over satellite-to-submarine channels.We estimate the parameters of the trans-media channels,involving atmosphere,sea surface and seawater and find that the shortwave infrared performs well in the above channels.The 450-nm pulse is used for generations of quantum signal carriers to accomplish quantum communications through atmosphere,sea surface and seawater channels.Numerical simulations show that the proposed scheme can achieve the transmission distance of 600 km.In addition,we demonstrate that non-Gaussian operations can further lengthen its maximal transmission distance,which contributes to the establishment of practical global quantum networks.
文摘With the massive increase of wirelessly connected devices and the rapid development of the Internet, information is transmitted more and more frequently. Since the information transmissions over these networks are greatly threatened not only by the imperfection of channels but also by the potential attackers or eavesdroppers, security and reliability become some of the crucial requirements for our future networks. Due to the complex dynamic behavior, ergodicity, wide spectrum and sensitivity to initial values, chaos signals show most required attributes of good cryptosystems and great potentials in optical fiber communications for desirable spatial accuracy and distance. In this context, it has become imperative to investigate and apply chaos theories to solve emerging secure communication problems in various networks. This includes leveraging chaos systems and signals to address a wide range of secure communication challenges in optical fiber communications, chaos cipher, image encryption, etc.