期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
FPGA implementation and image encryption application of a new PRNG based on a memristive Hopfield neural network with a special activation gradient
1
作者 Fei Yu Zinan Zhang +3 位作者 Hui Shen Yuanyuan Huang Shuo Cai Sichun Du 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第2期109-118,共10页
A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation gradient.The MHNN is simulated and d... A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation gradient.The MHNN is simulated and dynamically analyzed,and implemented on FPGA.Then,a new pseudo-random number generator(PRNG)based on MHNN is proposed.The post-processing unit of the PRNG is composed of nonlinear post-processor and XOR calculator,which effectively ensures the randomness of PRNG.The experiments in this paper comply with the IEEE 754-1985 high precision32-bit floating point standard and are done on the Vivado design tool using a Xilinx XC7 Z020 CLG400-2 FPGA chip and the Verilog-HDL hardware programming language.The random sequence generated by the PRNG proposed in this paper has passed the NIST SP800-22 test suite and security analysis,proving its randomness and high performance.Finally,an image encryption system based on PRNG is proposed and implemented on FPGA,which proves the value of the image encryption system in the field of data encryption connected to the Internet of Things(Io T). 展开更多
关键词 memristive Hopfield neural network(MHNN) pseudo-random number generator(PRNG) FPGA image encryption decryption system
在线阅读 下载PDF
Evolution of defects and deformation mechanisms in different tensile directions of solidified lamellar Ti-Al alloy
2
作者 Yutao Liu Tinghong Gao +7 位作者 Yue Gao Lianxin Li Min Tan Quan Xie Qian Chen Zean Tian Yongchao Liang Bei Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第4期518-524,共7页
Two-phaseγ-TiAl/α_(2)-Ti_(3)Al lamellar intermetallics have attracted considerable attention because of their excellent strength and plasticity.However,the exact deformation mechanisms remain to be investigated.In t... Two-phaseγ-TiAl/α_(2)-Ti_(3)Al lamellar intermetallics have attracted considerable attention because of their excellent strength and plasticity.However,the exact deformation mechanisms remain to be investigated.In this paper,a solidified lamellar Ti-Al alloy with lamellar orientation at 0°,17°,and 73°with respect to the loading direction was stretched by utilizing molecular dynamics(MD)simulations.The results show that the mechanical properties of the sample are considerably influenced by solidified defects and tensile directions.The structure deformation and fracture were primarily attributed to an intrinsic stacking fault(ISF)accompanied by the nucleated Shockley dislocation,and the adjacent extrinsic stacking fault(ESF)and ISF formed by solidification tend to form large HCP structures during the tensile process loading at 73°.Moreover,cleavage cracking easily occurs on theγ/α_(2)interface under tensile deformation.The fracture loading mechanism at 17°is grain boundary slide whereas,at 73°and 0°,the dislocation piles up to form a dislocation junction. 展开更多
关键词 molecular dynamics simulation solidified lamellar Ti-Al alloy tensile directions γ/α_(2)interface
在线阅读 下载PDF
Ghost imaging based on the control of light source bandwidth
3
作者 刘兆骐 白艳锋 +3 位作者 邹璇彭凡 周立宇 付芹 傅喜泉 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第3期276-279,共4页
A scheme to improve the quality in ghost imaging(GI)by controlling the bandwidth of light source(BCGI)is proposed.The theoretical and numerical results show that the reconstruction result with high quality can be obta... A scheme to improve the quality in ghost imaging(GI)by controlling the bandwidth of light source(BCGI)is proposed.The theoretical and numerical results show that the reconstruction result with high quality can be obtained by adjusting the bandwidth range of the light source appropriately,and the selection criterion of the bandwidth is analyzed by the power distribution of the imaging target.A proof-of-principle experiment is implemented to verify the theoretical and numerical results.In addition,the BCGI also presents better anti-noise performance when compared with some popular GI methods. 展开更多
关键词 ghost imaging light source property spatial frequency domain
在线阅读 下载PDF
Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage 被引量:4
4
作者 Xiehua Li Yanlong Wang +1 位作者 Ming Xu Yaping Cui 《China Communications》 SCIE CSCD 2018年第2期138-152,共15页
In this paper, we consider the problems of data sharing between multiple distrusted authorities. Prior solutions rely on trusted third parties such as CAs, or are susceptible to collusion between malicious authorities... In this paper, we consider the problems of data sharing between multiple distrusted authorities. Prior solutions rely on trusted third parties such as CAs, or are susceptible to collusion between malicious authorities, which can comprise the security of honest ones. In this paper, we propose a new multi-authority data sharing scheme - Decen- tralized Multi-Authority ABE (DMA), which is derived from CP-ABE that is resilient to these types of misbehavior. Our system distin- guishes between a data owner (DO) principal and attribute authorities (AAs): the DO owns the data but allows AAs to arbitrate access by providing attribute labels to users. The data is protected by policy encryption over these attributes. Unlike prior systems, attributes generated by AAs are not user-specific, and neither is the system susceptible to collusion between users who try to escalate their access by sharing keys. We prove our scherne correct under the Decisional Bilinear Diffie-Hellman (DBDH) assumption; we also include a com- plete end-to-end implementation that demon- strates the practical efficacy of our technique. 展开更多
关键词 multi-authority ABE cloud stor-age access policy
在线阅读 下载PDF
A Secure Mutual Authentication Scheme of Blockchain-Based in WBANs 被引量:2
5
作者 Jianbo Xu Xiangwei Meng +2 位作者 Wei Liang Hongbo Zhou Kuan-Ching Li 《China Communications》 SCIE CSCD 2020年第9期34-49,共16页
Wireless Body Area Networks(WBANs)refer to small sensor network that consists of sensor devices mounted on the surface of the body or implanted in the body,as such networks are employed to harvest physiological data o... Wireless Body Area Networks(WBANs)refer to small sensor network that consists of sensor devices mounted on the surface of the body or implanted in the body,as such networks are employed to harvest physiological data of the human body or to act as an assistant regulator of several specific physiological indicators of the human body.The sensor devices transmit the harvested human physiological data to the local node via a public channel.Before transmitting data,the sensor device and the local node should perform mutual authentication and key agreement.It is proposed in this paper a secure mutual authentication scheme of blockchain-based in WBANs.To analyze the security of this scheme,formal security analysis,and informal security analysis are used,then the computation and communication costs are compared with those of the relevant schemes.Relevant experimental results reveal that the proposed scheme exhibit more effective control over energy consumption and promising. 展开更多
关键词 information security AUTHENTICATION blockchain WBANs Real-or-Random model
在线阅读 下载PDF
Robust Watermarking of Mobile Video Resistant against Barrel Distortion 被引量:2
6
作者 Huawei Tian Yanhui Xiao +2 位作者 Gang Cao Jianwei Ding Bo Ou 《China Communications》 SCIE CSCD 2016年第9期131-138,共8页
In head mounted display(HMD),in order to cancel pincushion distortion,the images displayed on the mobile should be prewarped with barrel distortion.The copyright of the mobile video should be verified on both the orig... In head mounted display(HMD),in order to cancel pincushion distortion,the images displayed on the mobile should be prewarped with barrel distortion.The copyright of the mobile video should be verified on both the original view and the pre-warped virtual view.A robust watermarking resistant against barrel distortion for HMDs is proposed in this paper.Watermark mask is embedded into image in consideration of imperceptibility and robustness of watermarking.In order to detect watermark from the pre-warped image with barrel distortion,an estimation method of the barrel distortion is proposed for HMDs.Then,the same warp is enforced on the embedded watermark mask with the estimated parameters of barrel distortion.The correlation between the warped watermark and the pre-warped image is computed to predicate the existence of watermark.As shown in experimental results,watermark of mobile video can be detected not only from the original views,but also from the pre-warped virtual view.It also shows that the proposed scheme is resistant against combined barrel distortion and common post-processing,such as JPEG compression. 展开更多
关键词 mobile video HMD with mobile robust watermarking
在线阅读 下载PDF
The dynamics of a memristor-based Rulkov neuron with fractional-order difference 被引量:1
7
作者 Yan-Mei Lu Chun-Hua Wang +1 位作者 Quan-Li Deng Cong Xu 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第6期30-38,共9页
The exploration of the memristor model in the discrete domain is a fascinating hotspot.The electromagnetic induction on neurons has also begun to be simulated by some discrete memristors.However,most of the current in... The exploration of the memristor model in the discrete domain is a fascinating hotspot.The electromagnetic induction on neurons has also begun to be simulated by some discrete memristors.However,most of the current investigations are based on the integer-order discrete memristor,and there are relatively few studies on the form of fractional order.In this paper,a new fractional-order discrete memristor model with prominent nonlinearity is constructed based on the Caputo fractional-order difference operator.Furthermore,the dynamical behaviors of the Rulkov neuron under electromagnetic radiation are simulated by introducing the proposed discrete memristor.The integer-order and fractional-order peculiarities of the system are analyzed through the bifurcation graph,the Lyapunov exponential spectrum,and the iterative graph.The results demonstrate that the fractional-order system has more abundant dynamics than the integer one,such as hyper-chaos,multi-stable and transient chaos.In addition,the complexity of the system in the fractional form is evaluated by the means of the spectral entropy complexity algorithm and consequences show that it is affected by the order of the fractional system.The feature of fractional difference lays the foundation for further research and application of the discrete memristor and the neuron map in the future. 展开更多
关键词 discrete memristor Rulkov neuron fractional-order difference DYNAMICS
在线阅读 下载PDF
Rucklidge-based memristive chaotic system:Dynamic analysis and image encryption 被引量:1
8
作者 蹇璨岭 田泽安 +3 位作者 梁波 胡晨阳 王桥 陈靖翕 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第10期298-309,共12页
A new four-dimensional(4D)memristive chaotic system is obtained by introducing a memristor into the Rucklidge chaotic system,and a detailed dynamic analysis of the system is performed.The sensitivity of the system to ... A new four-dimensional(4D)memristive chaotic system is obtained by introducing a memristor into the Rucklidge chaotic system,and a detailed dynamic analysis of the system is performed.The sensitivity of the system to parameters allows it obtains 16 different attractors by changing only one parameter.The various transient behaviors and excellent spectral entropy and C0 complexity values of the system can also reflect the high complexity of the system.A circuit is designed and verified the feasibility of the system from the physical level.Finally,the system is applied to image encryption,and the security of the encryption system is analyzed from multiple aspects,providing a reference for the application of such memristive chaotic systems. 展开更多
关键词 chaotic system MEMRISTOR intermittent chaos multi-transient behavior image encryption
在线阅读 下载PDF
Toward Energy-Efficiency Optimization of Pktgen-DPDK for Green Network Testbeds 被引量:1
9
作者 Guo Li Dafang Zhang +1 位作者 Yanbiao Li Keqin Li 《China Communications》 SCIE CSCD 2018年第11期199-207,共9页
The packet generator (pktgen) is a fundamental module of the majority of soft- ware testers used to benchmark network pro- tocols and functions. The high performance of the pktgen is an important feature of Future I... The packet generator (pktgen) is a fundamental module of the majority of soft- ware testers used to benchmark network pro- tocols and functions. The high performance of the pktgen is an important feature of Future Internet Testbeds, and DPDK is a network packet accelerated platform, so we can use DPDK to improve performance. Meanwhile, green computing is advocated for in the fu- ture of the internet. Most existing efforts have contributed to improving either performance or accuracy. We, however, shifted the focus to energy-efficiency. We find that high per- formance comes at the cost of high energy consumption. Therefore, we started from a widely used high performance schema, deeply studying the multi-core platform, especially in terms of parallelism, core allocation, and fre- quency controlling. On this basis, we proposed an AFfinity-oriented Fine-grained CONtrolling (AFFCON) mechanism in order to improve energy efficiency with desirable performance. As clearly demonstrated through a series of evaluative experiments, our proposal can reduce CPU power consumption by up to 11% while maintaining throughput at the line rate. 展开更多
关键词 CPU affinity DPDK energy-effi-cient NUMA packet generator
在线阅读 下载PDF
Generation of mid-infrared supercontinuum by designing circular photonic crystal fiber
10
作者 Ying Huang Hua Yang Yucheng Mao 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第5期370-378,共9页
A circular photonic crystal fiber(C-PCF)based on As2 Se3 is designed,which has three zero dispersion wavelengths and flat dispersion.Using this fiber,a wide mid-infrared supercontinuum(MIR-SC)can be generated by launc... A circular photonic crystal fiber(C-PCF)based on As2 Se3 is designed,which has three zero dispersion wavelengths and flat dispersion.Using this fiber,a wide mid-infrared supercontinuum(MIR-SC)can be generated by launching a femtosecond pulse in the first anomalous dispersion region.The simulation results show that the MIR-SC is formed by soliton self-frequency shift and direct soliton spectrum tunneling on the long wavelength side and self-phase modulation,soliton fission on the short wavelength side.Further,optical shocking and four-wave mixing(FWM)are not conducive to the long-wavelength extension of MIR-SC,while the number and intensity of fundamental solitons have a greater effect on the short-wavelength extension of MIR-SC.The generation of optical shocking waves,FWM waves and fundamental solitons can be obviously affected by changing the fiber length and input pulse parameters,so that the spectrum range and flatness can be adjusted with great freedom.Finally,under the conditions of 4000 W pulse peak power,30 fs pulse width,47 mm fiber length,and 0 initial chirp,a wide MIR-SC with a coverage range of 2.535μm-16.6μm is obtained.These numerical results are encouraging because they demonstrate that the spread of MIR-SC towards the red and blue ends can be manipulated by choosing the appropriate incident pulse and designing optimized fiber parameters,which contributes to applications in such diverse areas as spectroscopy,metrology and tomography. 展开更多
关键词 circular photonic crystal fiber chalcogenide glass direct soliton spectrum tunneling nonlinearity
在线阅读 下载PDF
Principle of subtraction ghost imaging in scattering medium
11
作者 付芹 白艳锋 +3 位作者 谭威 黄贤伟 南苏琴 傅喜泉 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第6期250-254,共5页
Scattering medium in light path will cause distortion of the light field,resulting in poor signal-to-noise ratio(SNR)of ghost imaging.The disturbance is usually eliminated by the method of pre-compensation.We deduce t... Scattering medium in light path will cause distortion of the light field,resulting in poor signal-to-noise ratio(SNR)of ghost imaging.The disturbance is usually eliminated by the method of pre-compensation.We deduce the intensity fluctuation correlation function of the ghost imaging with the disturbance of the scattering medium,which proves that the ghost image consists of two correlated results:the image of scattering medium and the target object.The effect of the scattering medium can be eliminated by subtracting the correlated result between the light field after the scattering medium and the reference light from ghost image,which verifies the theoretical results.Our research may provide a new idea of ghost imaging in harsh environment. 展开更多
关键词 ghost imaging image reconstruction techniques scattering medium
在线阅读 下载PDF
Novel Private Data Access Control Scheme Suitable for Mobile Edge Computing 被引量:2
12
作者 Wei Liang Songyou Xie +3 位作者 Jiahong Cai Chong Wang Yujie Hong Xiaoyan Kui 《China Communications》 SCIE CSCD 2021年第11期92-103,共12页
Efficient response speed and information processing speed are among the characteristics of mobile edge computing(MEC).However,MEC easily causes information leakage and loss problems because it requires frequent data e... Efficient response speed and information processing speed are among the characteristics of mobile edge computing(MEC).However,MEC easily causes information leakage and loss problems because it requires frequent data exchange.This work proposes an anonymous privacy data protection and access control scheme based on elliptic curve cryptography(ECC)and bilinear pairing to protect the communication security of the MEC.In the proposed scheme,the information sender encrypts private information through the ECC algorithm,and the information receiver uses its own key information and bilinear pairing to extract and verify the identity of the information sender.During each round of communication,the proposed scheme uses timestamps and random numbers to ensure the freshness of each round of conversation.Experimental results show that the proposed scheme has good security performance and can provide data privacy protection,integrity verification,and traceability for the communication process of MEC.The proposed scheme has a lower cost than other related schemes.The communication and computational cost of the proposed scheme are reduced by 31.08% and 22.31% on average compared with those of the other related schemes. 展开更多
关键词 mobile edge computing(MEC) privacy protection access control anonymous authentication
在线阅读 下载PDF
Data Reconstruction in Internet Traffic Matrix 被引量:1
13
作者 ZHOU Huibin ZHANG Dafang XIE Kun WANG Xiaoyang 《China Communications》 SCIE CSCD 2014年第7期1-12,共12页
Traffic matrix is an abstract representation of the traffic volume flowing between sets of source and destination pairs.It is a key input parameter of network operations management,planning,provisioning and traffic en... Traffic matrix is an abstract representation of the traffic volume flowing between sets of source and destination pairs.It is a key input parameter of network operations management,planning,provisioning and traffic engineering.Traffic matrix is also important in the context of OpenFlow-based networks.Because even good measurement systems can suffer from errors and data collection systems can fail,missing values are common.Existing matrix completion methods do not consider traffic exhibit characteristics and only provide a finite precision.To address this problem,this paper proposes a novel approach based on compressive sensing and traffic self-similarity to reconstruct the missing traffic flow data.Firstly,we analyze the realworld traffic matrix,which all exhibit lowrank structure,temporal smoothness feature and spatial self-similarity.Then,we propose Self-Similarity and Temporal Compressive Sensing(SSTCS) algorithm to reconstruct the missing traffic data.The extensive experiments with the real-world traffic matrix show that our proposed SSTCS can significantly reduce data reconstruction errors and achieve satisfactory accuracy comparing with the existing solutions.Typically SSTCS can successfully reconstruct the traffic matrix with less than 32%errors when as much as98%of the data is missing. 展开更多
关键词 network measurement trafficmatrix compressive sensing matrixcompletion SELF-SIMILARITY
在线阅读 下载PDF
A VMIMO-Based Cooperative Routing Algorithm for Maximizing Network Lifetime 被引量:1
14
作者 Ji Zhang Dafang Zhang +2 位作者 Kun Xie Hong Qiao Shiming He 《China Communications》 SCIE CSCD 2017年第4期20-34,共15页
Energy efficiency is an important criterion for routing algorithms in the wireless sensor network. Cooperative routing can reduce energy consumption effectively stemming from its diversity gain advantage. To solve the... Energy efficiency is an important criterion for routing algorithms in the wireless sensor network. Cooperative routing can reduce energy consumption effectively stemming from its diversity gain advantage. To solve the energy consumption problem and maximize the network lifetime, this paper proposes a Virtual Multiple Input Multiple Output based Cooperative Routing algorithm(VMIMOCR). VMIMOCR chooses cooperative relay nodes based on Virtual Multiple Input Multiple Output Model, and balances energy consumption by reasonable power allocation among transmitters, and decides the forwarding path finally. The experimental results show that VMIMOCR can improve network lifetime from 37% to 348% in the medium node density, compared with existing routing algorithms. 展开更多
关键词 wireless sensor network(WSN) cooperative routing VMIMO maximizing network lifetime power allocation
在线阅读 下载PDF
Reflective ghost imaging free from vibrating detectors
15
作者 李恒星 白艳锋 +4 位作者 施晓辉 南苏琴 屈利杰 沈倩 傅喜泉 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第10期232-236,共5页
The vibration is one of the important factors affecting imaging quality of conventional remote sensing imaging because the relative motion between the imaging system and the target can result in the degradation of ima... The vibration is one of the important factors affecting imaging quality of conventional remote sensing imaging because the relative motion between the imaging system and the target can result in the degradation of imaging quality. The influence of the vibration of the detector in the test path on reflective ghost imaging (RGI) is investigated theoretically and experimentally. We analyze the effects of the vibrating amplitude and velocity. The results demonstrate that the microvibrations of the bucket detector have almost no impact on the imaging resolution and signal-to-noise ratio (SNR) of RGI, i.e., the degradation of imaging quality caused by the vibration of the detector can be overcome to some extent. Our results can be helpful for remote sensing imaging. 展开更多
关键词 reflective ghost imaging VIBRATION remote sensing
在线阅读 下载PDF
Short-wave infrared continuous-variable quantum key distribution over satellite-to-submarine channels
16
作者 Qingquan Peng Qin Liao +2 位作者 Hai Zhong Junkai Hu Ying Guo 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第6期211-220,共10页
The trans-media transmission of quantum pulse is one of means of free-space transmission which can be applied in continuous-variable quantum key distribution(CVQKD)system.In traditional implementations for atmospheric... The trans-media transmission of quantum pulse is one of means of free-space transmission which can be applied in continuous-variable quantum key distribution(CVQKD)system.In traditional implementations for atmospheric channels,the 1500-to-1600-nm pulse is regarded as an ideal quantum pulse carrier.However,the underwater transmission of this pulses tends to suffer from severe attenuation,which inevitably deteriorates the security of the whole CVQKD system.In this paper,we propose an alternative scheme for implementations of CVQKD over satellite-to-submarine channels.We estimate the parameters of the trans-media channels,involving atmosphere,sea surface and seawater and find that the shortwave infrared performs well in the above channels.The 450-nm pulse is used for generations of quantum signal carriers to accomplish quantum communications through atmosphere,sea surface and seawater channels.Numerical simulations show that the proposed scheme can achieve the transmission distance of 600 km.In addition,we demonstrate that non-Gaussian operations can further lengthen its maximal transmission distance,which contributes to the establishment of practical global quantum networks. 展开更多
关键词 continuous-variable quantum key distribution(CVQKD) short-wave infrared satellite-to-submarine
在线阅读 下载PDF
CHAOS-BASED SECURE COMMUNICATIONS
17
作者 Xiaofeng Liao Shutang Liu +1 位作者 Chengqing Li Yulong Zou 《China Communications》 SCIE CSCD 2020年第5期I0001-I0002,共2页
With the massive increase of wirelessly connected devices and the rapid development of the Internet, information is transmitted more and more frequently. Since the information transmissions over these networks are gre... With the massive increase of wirelessly connected devices and the rapid development of the Internet, information is transmitted more and more frequently. Since the information transmissions over these networks are greatly threatened not only by the imperfection of channels but also by the potential attackers or eavesdroppers, security and reliability become some of the crucial requirements for our future networks. Due to the complex dynamic behavior, ergodicity, wide spectrum and sensitivity to initial values, chaos signals show most required attributes of good cryptosystems and great potentials in optical fiber communications for desirable spatial accuracy and distance. In this context, it has become imperative to investigate and apply chaos theories to solve emerging secure communication problems in various networks. This includes leveraging chaos systems and signals to address a wide range of secure communication challenges in optical fiber communications, chaos cipher, image encryption, etc. 展开更多
关键词 IMAGE CHAOS-BASED SECURE COMMUNICATIONS
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部