As conventional communication systems based on classic information theory have closely approached Shannon capacity,semantic communication is emerging as a key enabling technology for the further improvement of communi...As conventional communication systems based on classic information theory have closely approached Shannon capacity,semantic communication is emerging as a key enabling technology for the further improvement of communication performance.However,it is still unsettled on how to represent semantic information and characterise the theoretical limits of semantic-oriented compression and transmission.In this paper,we consider a semantic source which is characterised by a set of correlated random variables whose joint probabilistic distribution can be described by a Bayesian network.We give the information-theoretic limit on the lossless compression of the semantic source and introduce a low complexity encoding method by exploiting the conditional independence.We further characterise the limits on lossy compression of the semantic source and the upper and lower bounds of the rate-distortion function.We also investigate the lossy compression of the semantic source with two-sided information at the encoder and decoder,and obtain the corresponding rate distortion function.We prove that the optimal code of the semantic source is the combination of the optimal codes of each conditional independent set given the side information.展开更多
We introduce a novel model for robustness of complex with a tunable attack information parameter. The random failure and intentional attack known are the two extreme cases of our model. Based on the model, we study th...We introduce a novel model for robustness of complex with a tunable attack information parameter. The random failure and intentional attack known are the two extreme cases of our model. Based on the model, we study the robustness of complex networks under random information and preferential information, respectively. Using the generating function method, we derive the exact value of the critical removal fraction of nodes for the disintegration of networks and the size of the giant component. We show that hiding just a small fraction of nodes randomly can prevent a scale-free network from collapsing and detecting just a small fraction of nodes preferentially can destroy a scale-free network.展开更多
We introduce an attack robustness model of scale-free networks based on grey information,which means that one can obtain the information of al1 nodes,but the attack information may be imprecise.The known random failur...We introduce an attack robustness model of scale-free networks based on grey information,which means that one can obtain the information of al1 nodes,but the attack information may be imprecise.The known random failure and the intentional attack are two extreme cases of our investigation.Using the generating function method,we derive the analytical value of the critical removal fraction of nodes for the disintegration of networks,which agree with the simulation results well.We also investigate the effect of grey information on the attack robustness of scale-free networks and find that decreasing the precision of attack information can remarkably enhance the attack robustness of scale-free networks.展开更多
Evacuation assistants are expected to spread the escape route information and lead evacuees toward the exit as quickly as possible. Their leading behavior influences the evacuees' movement directly, which is confirme...Evacuation assistants are expected to spread the escape route information and lead evacuees toward the exit as quickly as possible. Their leading behavior influences the evacuees' movement directly, which is confirmed to be a decisive factor of the evacuation efficiency. The transmission process of escape information and its function on the evacuees' movement are accurately presented by the proposed extended dynamic communication field model. For evacuation assistants and eevacuees, their sensitivity parameter of static floor field(SFF), kL S, and kS, are fully discussed. The simulation results e indicate that the appropriate kL Sis associated with the maximum kSof evacuees. The optimal combinations of kL Sand e kSwere found to reach the highest evacuation efficiency. There also exists an optimal value for evacuation assistants' information transmission radius.展开更多
The method of singular coefficient of water inrush to achieve safety mining has limitation and one sidedness. Aiming at the problem above, large amounts of data about water inrush were collected. Then the data, includ...The method of singular coefficient of water inrush to achieve safety mining has limitation and one sidedness. Aiming at the problem above, large amounts of data about water inrush were collected. Then the data, including the maximum water inrush, water inrush coefficient and water abundance in aquifers of working face, were processed by the statistical analysis. The analysis results indicate that both water inrush coefficient and water abundance in aquifers should be taken into consideration when evaluating the danger of water inrush from coal seam floor. The prediction model of safe-mining evaluation grade was built by using the support vector machine, and the result shows that this model has high classification accuracy. A feasible classification system of water-inrush safety evaluation can be got by using the data visualization method which makes the implicit support vector machine models explicit.展开更多
The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides incre...The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides increased power interconnection functionality and meaning,helps condense forces,and accelerates the integration of global infrastructure.Correspondingly,it is envisaged that it will become the trend of industrial technological development in the future.In consideration of the current trend of integrated development,this study evaluates a possible plan of coordinated development of fiber-optic and power networks in the Pan-Arctic region.Firstly,the backbone network architecture of Global Energy Interconnection is introduced and the importance of the Arctic energy backbone network is confirmed.The energy consumption and developmental trend of global data centers are then analyzed.Subsequently,the global network traffic is predicted and analyzed by means of a polynomial regression model.Finally,in combination with the current construction of fiber-optic networks in the Pan-Arctic region,the advantages of the integration of the fiber-optic and power networks in this region are clarified in justification of the decision for the development of a Global Energy Interconnection scheme.展开更多
In order to improve the comprehensive defense capability of data security in digital twins(DTs),an information security interaction architecture is proposed in this paper to solve the inadequacy of data protection and...In order to improve the comprehensive defense capability of data security in digital twins(DTs),an information security interaction architecture is proposed in this paper to solve the inadequacy of data protection and transmission mechanism at present.Firstly,based on the advanced encryption standard(AES)encryption,we use the keystore to expand the traditional key,and use the digital pointer to avoid the key transmission in a wireless channel.Secondly,the identity authentication technology is adopted to ensure the data integrity,and an automatic retransmission mechanism is added for the endogenous properties of the wireless channel.Finally,the software defined radio(SDR)platform composed of universal software radio peripheral(USRP)and GNU radio is used to simulate the data interaction between the physical entity and the virtual entity.The numerical results show that the DTs architecture can guarantee the encrypted data transmitted completely and decrypted accurately with high efficiency and reliability,thus providing a basis for intelligent and secure information interaction for DTs in the future.展开更多
In a network described by a graph, only topological structure information is considered to determine how the nodes are connected by edges. Non-topological information denotes that which cannot be determined directly f...In a network described by a graph, only topological structure information is considered to determine how the nodes are connected by edges. Non-topological information denotes that which cannot be determined directly from topological information. This paper shows, by a simple example where scientists in three research groups and one external group form four communities, that in some real world networks non-topological information (in this example, the research group affiliation) dominates community division. If the information has some influence on the network topological structure, the question arises as to how to find a suitable algorithm to identify the communities based only on the network topology. We show that weighted Newman algorithm may be the best choice for this example. We believe that this idea is general for real-world complex networks.展开更多
A model of autonomous positioning through associating environment memory information is presented for unmanned combat aerial vehicle(UCAV).The representation strategy of environment by constructing place cells is used...A model of autonomous positioning through associating environment memory information is presented for unmanned combat aerial vehicle(UCAV).The representation strategy of environment by constructing place cells is used to produce the memory information,and the landmarks in memory are retrieved through perceiving and processing the environment.During UCAV′s flight,the landmarks are obtained in real-time and are matched with the landmarks in memory.Then,the idea of ranging positioning is adopted to calculate UCAV′s location based on the corresponding relationship between current obtained landmarks and the memorized landmarks.Simulation shows that the proposed model can realize autonomous positioning in the memorized environment,and the positioning performance is well when the sensor has a high precision.展开更多
Exploiting the source-to-relay channel phase information at the relays can increase the rate upper-bound of distributed orthogonal space-time block codes(STBC)from 2/K to 1/2,where Kis the number of relays.This techni...Exploiting the source-to-relay channel phase information at the relays can increase the rate upper-bound of distributed orthogonal space-time block codes(STBC)from 2/K to 1/2,where Kis the number of relays.This technique is known as distributed orthogonal space-time block codes with channel phase information(DOSTBC-CPI).However,the decoding delay of existing DOSTBC-CPIs is not optimal.Therefore,based on the rate of 1/2 balanced complex orthogonal design(COD),an algorithm is provided to construct a maximal rate DOSTBC-CPI with only half the decoding delay of existing DOSTBC-CPI.Simulation results show that the proposed method exhibits lower symbol error rate than the existing DOSTBC-CPIs.展开更多
We investigate the information exclusion principle for multiple measurements with assistance of multiple quantum memories that are well bounded by the upper and lower bounds.The lower bound depends on the observables&...We investigate the information exclusion principle for multiple measurements with assistance of multiple quantum memories that are well bounded by the upper and lower bounds.The lower bound depends on the observables'complementarity and the complementarity of uncertainty whilst the upper bound includes the complementarity of the observables,quantum discord,and quantum condition entropy.In quantum measurement processing,there exists a relationship between the complementarity of uncertainty and the complementarity of information.In addition,based on the information exclusion principle the complementarity of uncertainty and the shareability of quantum discord can exist as an essential factor to enhance the bounds of each other in the presence of quantum memory.展开更多
The study on the entanglement polygon inequality of multipartite systems has attracted much attention.However,most of the results are on pure states.Here we consider the property for a class of mixed states,which are ...The study on the entanglement polygon inequality of multipartite systems has attracted much attention.However,most of the results are on pure states.Here we consider the property for a class of mixed states,which are the reduced density matrices of generalizedW-class states in multipartite higher dimensional systems.First we show the class of mixed states satisfies the entanglement polygon inequalities in terms of Tsallis-q entanglement,then we propose a class of tighter inequalities for mixed states in terms of Tsallis-q entanglement.At last,we get an inequality for the mixed states,which can be regarded as a relation for bipartite entanglement.展开更多
Purpose: This paper aims to compare and rank the allocative efficiency of information resources in rural areas by taking 13 rural areas in Jiangsu Province, China as the research sample.Design/methodology/approach: We...Purpose: This paper aims to compare and rank the allocative efficiency of information resources in rural areas by taking 13 rural areas in Jiangsu Province, China as the research sample.Design/methodology/approach: We designed input and output indicators for allocation of rural information resources and conducted the quantitative evaluation of allocative efficiency of rural information resources based on cross-efficiency model in combination with the classical CCR model in data envelopment analysis(DEA).Findings: Cross-efficiency DEA model can be used for our research with the objective to evaluate quantitatively and objectively whether the allocation of information resources in various rural areas is reasonable and whether the output is commensurate with the input.Research limitations: We have to give up using some indicators because of limited data availability. There is a need to further improve the cross-efficiency DEA model because it cannot identify the specific factors influencing the efficiency of decision-making units(DMUs).Practical implications: The evaluation results will help us understand the present allocative efficiency levels of information resources in various rural areas so as to provide a decisionmaking basis for formulation of the policies aimed at promoting the circulation of information resources in rural areas.Originality/value: Little or no research has been published about the allocative efficiency of rural information resources. The value of this research lies in its focus on studying rural informatization from the perspective of allocative efficiency of rural information resources and in the application of cross-efficiency DEA model to evaluate allocative efficiency of rural information resources as well.展开更多
We study a generalized higher-order nonlinear Schr¨odinger equation in an optical fiber or a planar waveguide.We obtain the Lax pair and N-fold Darboux transformation(DT)with N being a positive integer.Based on L...We study a generalized higher-order nonlinear Schr¨odinger equation in an optical fiber or a planar waveguide.We obtain the Lax pair and N-fold Darboux transformation(DT)with N being a positive integer.Based on Lax pair obtained by us,we derive the infinitely-many conservation laws.We give the bright one-,two-,and N-soliton solutions,and the first-,second-,and Nth-order breather solutions based on the N-fold DT.We conclude that the velocities of the bright solitons are influenced by the distributed gain function,g(z),and variable coefficients in equation,h_(1)(z),p_(1)(z),r_(1)(z),and s_(1)(z)via the asymptotic analysis,where z represents the propagation variable or spatial coordinate.We also graphically observe that:the velocities of the first-and second-order breathers will be affected by h_(1)(z),p_(1)(z),r_(1)(z),and s_(1)(z),and the background wave depends on g(z).展开更多
The chimera states underlying many realistic dynamical processes have attracted ample attention in the area of dynamical systems.Here, we generalize the Kuramoto model with nonlocal coupling incorporating higher-order...The chimera states underlying many realistic dynamical processes have attracted ample attention in the area of dynamical systems.Here, we generalize the Kuramoto model with nonlocal coupling incorporating higher-order interactions encoded with simplicial complexes.Previous works have shown that higher-order interactions promote coherent states.However, we uncover the fact that the introduced higher-order couplings can significantly enhance the emergence of the incoherent state.Remarkably, we identify that the chimera states arise as a result of multi-attractors in dynamic states.Importantly, we review that the increasing higher-order interactions can significantly shape the emergent probability of chimera states.All the observed results can be well described in terms of the dimension reduction method.This study is a step forward in highlighting the importance of nonlocal higher-order couplings, which might provide control strategies for the occurrence of spatial-temporal patterns in networked systems.展开更多
Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error performance.In CIM, at least two different IM ope...Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error performance.In CIM, at least two different IM operations construct a super IM operation or achieve new functionality. First, we propose a OFDM with generalized CIM(OFDM-GCIM) scheme to achieve a joint IM of subcarrier selection and multiple-mode(MM)permutations by using a multilevel digital algorithm.Then, two schemes, called double CIM(D-CIM) and multiple-layer CIM(M-CIM), are proposed for secure communication, which combine new IM operation for disrupting the original order of bits and symbols with conventional OFDM-IM, to protect the legitimate users from eavesdropping in the wireless communications. A subcarrier-wise maximum likelihood(ML) detector and a low complexity log-likelihood ratio(LLR) detector are proposed for the legitimate users. A tight upper bound on the bit error rate(BER) of the proposed OFDM-GCIM, D-CIM and MCIM at the legitimate users are derived in closed form by employing the ML criteria detection. Computer simulations and numerical results show that the proposed OFDM-GCIM achieves superior error performance than OFDM-IM, and the error performance at the eavesdroppers demonstrates the security of D-CIM and M-CIM.展开更多
Let B^(H) be a fractional Brownian motion with Hurst index 1/2≤H<1.In this paper,we consider the equation(called the Ornstein-Uhlenbeck process with a linear self-repelling drift)dX_(t)^(H)=dB_(t)^(H)+σ X_(t)^(H)...Let B^(H) be a fractional Brownian motion with Hurst index 1/2≤H<1.In this paper,we consider the equation(called the Ornstein-Uhlenbeck process with a linear self-repelling drift)dX_(t)^(H)=dB_(t)^(H)+σ X_(t)^(H)dt+vdt-θ(∫_(0)^(t)(X_(t)^(H)-X_(s)^(H))ds)dt,whereθ<0,σ,v∈ℝ.The process is an analogue of self-attracting diffusion(Cranston,Le Jan.Math Ann,1995,303:87–93).Our main aim is to study the large time behaviors of the process.We show that the solution X^(H)diverges to infinity as t tends to infinity,and obtain the speed at which the process X^(H)diverges to infinity.展开更多
As a part of quantum image processing,quantum image filtering is a crucial technology in the development of quantum computing.Low-pass filtering can effectively achieve anti-aliasing effects on images.Currently,most q...As a part of quantum image processing,quantum image filtering is a crucial technology in the development of quantum computing.Low-pass filtering can effectively achieve anti-aliasing effects on images.Currently,most quantum image filterings are based on classical domains and grayscale images,and there are relatively fewer studies on anti-aliasing in the quantum domain.This paper proposes a scheme for anti-aliasing filtering based on quantum grayscale and color image scaling in the spatial domain.It achieves the effect of anti-aliasing filtering on quantum images during the scaling process.First,we use the novel enhanced quantum representation(NEQR)and the improved quantum representation of color images(INCQI)to represent classical images.Since aliasing phenomena are more pronounced when images are scaled down,this paper focuses only on the anti-aliasing effects in the case of reduction.Subsequently,we perform anti-aliasing filtering on the quantum representation of the original image and then use bilinear interpolation to scale down the image,achieving the anti-aliasing effect.The constructed pyramid model is then used to select an appropriate image for upscaling to the original image size.Finally,the complexity of the circuit is analyzed.Compared to the images experiencing aliasing effects solely due to scaling,applying anti-aliasing filtering to the images results in smoother and clearer outputs.Additionally,the anti-aliasing filtering allows for manual intervention to select the desired level of image smoothness.展开更多
Conservative chaotic systems have unique advantages over dissipative chaotic systems in the fields of secure communication and pseudo-random number generator because they do not have attractors but possess good traver...Conservative chaotic systems have unique advantages over dissipative chaotic systems in the fields of secure communication and pseudo-random number generator because they do not have attractors but possess good traversal and pseudorandomness. In this work, a novel five-dimensional(5D) Hamiltonian conservative hyperchaotic system is proposed based on the 5D Euler equation. The proposed system can have different types of coordinate transformations and time reversal symmetries. In this work, Hamilton energy and Casimir energy are analyzed firstly, and it is proved that the new system satisfies Hamilton energy conservation and can generate chaos. Then, the complex dynamic characteristics of the system are demonstrated and the conservatism and chaos characteristics of the system are verified through the correlation analysis methods such as phase diagram, equilibrium point, Lyapunov exponent, bifurcation diagram, and SE complexity. In addition, a detailed analysis of the multistable characteristics of the system reveals that many energy-related coexisting orbits exist. Based on the infinite number of center-type and saddle-type equilibrium points, the dynamic characteristics of the hidden multistability of the system are revealed. Then, the National Institute of Standards and Technology(NIST)test of the new system shows that the chaotic sequence generated by the system has strong pseudo-random. Finally, the circuit simulation and hardware circuit experiment of the system are carried out with Multisim simulation software and digital signal processor(DSP) respectively. The experimental results confirm that the new system has good ergodicity and realizability.展开更多
Orbital angular momentum(OAM)conversion is critical in understanding interactions between a structural sound field and a planar lattice.Herein,we explore the evolution of a monochromatic acoustic vortex beam(AVB)that ...Orbital angular momentum(OAM)conversion is critical in understanding interactions between a structural sound field and a planar lattice.Herein,we explore the evolution of a monochromatic acoustic vortex beam(AVB)that is scattered by a phononic crystal(PnC)or a correlated random lattice.The phenomenon is ascribed to the enhanced orbit–orbit angular momentum coupling induced by the band structure.By modifying the coupling condition,accurate and continuous micromanipulation of AVBs can be achieved,including the transverse/lateral gravity shift,the dynamics of the phase singularities,and the spatial distribution of acoustic pressure,etc.This research provides insight to the inhomogeneous coupling of AVBs with both propagating Bloch waves and localized Anderson modes,and may facilitate development of novel OAM-based acoustic devices for active sound field manipulation.展开更多
基金partly supported by NSFC under grant No.62293481,No.62201505partly by the SUTDZJU IDEA Grant(SUTD-ZJU(VP)202102)。
文摘As conventional communication systems based on classic information theory have closely approached Shannon capacity,semantic communication is emerging as a key enabling technology for the further improvement of communication performance.However,it is still unsettled on how to represent semantic information and characterise the theoretical limits of semantic-oriented compression and transmission.In this paper,we consider a semantic source which is characterised by a set of correlated random variables whose joint probabilistic distribution can be described by a Bayesian network.We give the information-theoretic limit on the lossless compression of the semantic source and introduce a low complexity encoding method by exploiting the conditional independence.We further characterise the limits on lossy compression of the semantic source and the upper and lower bounds of the rate-distortion function.We also investigate the lossy compression of the semantic source with two-sided information at the encoder and decoder,and obtain the corresponding rate distortion function.We prove that the optimal code of the semantic source is the combination of the optimal codes of each conditional independent set given the side information.
基金Supported by the National Natural Science Foundation of China under Grant No 70501032.
文摘We introduce a novel model for robustness of complex with a tunable attack information parameter. The random failure and intentional attack known are the two extreme cases of our model. Based on the model, we study the robustness of complex networks under random information and preferential information, respectively. Using the generating function method, we derive the exact value of the critical removal fraction of nodes for the disintegration of networks and the size of the giant component. We show that hiding just a small fraction of nodes randomly can prevent a scale-free network from collapsing and detecting just a small fraction of nodes preferentially can destroy a scale-free network.
基金Supported by the National Natural Science Foundation of China under Grant Nos 70771111,60904065 and 71031007the Specialized Research Fund for the Doctoral Program of Higher Education under Grant No 20094307120001.
文摘We introduce an attack robustness model of scale-free networks based on grey information,which means that one can obtain the information of al1 nodes,but the attack information may be imprecise.The known random failure and the intentional attack are two extreme cases of our investigation.Using the generating function method,we derive the analytical value of the critical removal fraction of nodes for the disintegration of networks,which agree with the simulation results well.We also investigate the effect of grey information on the attack robustness of scale-free networks and find that decreasing the precision of attack information can remarkably enhance the attack robustness of scale-free networks.
基金Project supported by the National Basic Research Program of China(Grant No.2011CB706900)the National Natural Science Foundation of China(Grant Nos.71225007 and 71203006)+2 种基金the National Key Technology Research and Development Program of the Ministry of Science and Technology of China(Grant No.2012BAK13B06)the Humanities and Social Sciences Project of the Ministry of Education of China(Grant Nos.10YJA630221 and 12YJCZH023)the Beijing Philosophy and Social Sciences Planning Project of the Twelfth Five-Year Plan,China(Grant Nos.12JGC090 and 12JGC098)
文摘Evacuation assistants are expected to spread the escape route information and lead evacuees toward the exit as quickly as possible. Their leading behavior influences the evacuees' movement directly, which is confirmed to be a decisive factor of the evacuation efficiency. The transmission process of escape information and its function on the evacuees' movement are accurately presented by the proposed extended dynamic communication field model. For evacuation assistants and eevacuees, their sensitivity parameter of static floor field(SFF), kL S, and kS, are fully discussed. The simulation results e indicate that the appropriate kL Sis associated with the maximum kSof evacuees. The optimal combinations of kL Sand e kSwere found to reach the highest evacuation efficiency. There also exists an optimal value for evacuation assistants' information transmission radius.
基金Financial supports for this work, provided by National Natural Key Science Foundation of China (No. 50539080)Ministry of Education Research Fund for the doctoral program of China (No. 20133718110004)+2 种基金the Natural Science Key Foundation of Shandong Province of China (No. ZR2011EEZ002)the Technology Project Development Plan of Qingdao Economic and Technological Development Zone of China (No. 2013-1-62)SDUST Research Fund of China (No. 2012KYTD101)
文摘The method of singular coefficient of water inrush to achieve safety mining has limitation and one sidedness. Aiming at the problem above, large amounts of data about water inrush were collected. Then the data, including the maximum water inrush, water inrush coefficient and water abundance in aquifers of working face, were processed by the statistical analysis. The analysis results indicate that both water inrush coefficient and water abundance in aquifers should be taken into consideration when evaluating the danger of water inrush from coal seam floor. The prediction model of safe-mining evaluation grade was built by using the support vector machine, and the result shows that this model has high classification accuracy. A feasible classification system of water-inrush safety evaluation can be got by using the data visualization method which makes the implicit support vector machine models explicit.
基金supported by the Corporation Science and Technology Program of Global Energy Interconnection Group Ltd. (GEIGC-D-[2018]024)by the National Natural Science Foundation of China (61472042, 61772079)
文摘The Global Energy Interconnection is an important strategic approach used to achieve efficient worldwide energy allocation.The idea of developing integrated power,information,and transportation networks provides increased power interconnection functionality and meaning,helps condense forces,and accelerates the integration of global infrastructure.Correspondingly,it is envisaged that it will become the trend of industrial technological development in the future.In consideration of the current trend of integrated development,this study evaluates a possible plan of coordinated development of fiber-optic and power networks in the Pan-Arctic region.Firstly,the backbone network architecture of Global Energy Interconnection is introduced and the importance of the Arctic energy backbone network is confirmed.The energy consumption and developmental trend of global data centers are then analyzed.Subsequently,the global network traffic is predicted and analyzed by means of a polynomial regression model.Finally,in combination with the current construction of fiber-optic networks in the Pan-Arctic region,the advantages of the integration of the fiber-optic and power networks in this region are clarified in justification of the decision for the development of a Global Energy Interconnection scheme.
基金supported in part by the Intergovernmental International Cooperation in Science and Technology Innovation Program under Grants 2019YFE0111600in part by National Natural Science Foundation of China under Grants 62122069,62072490,62201507,and 62071431+2 种基金in part by Science and Technology Development Fund of Macao SAR under Grants 0060/2019/A1 and 0162/2019/A3in part by FDCT-MOST Joint Project under Grant 0066/2019/AMJin part by Research Grant of University of Macao under Grant MYRG2020-00107IOTSC。
文摘In order to improve the comprehensive defense capability of data security in digital twins(DTs),an information security interaction architecture is proposed in this paper to solve the inadequacy of data protection and transmission mechanism at present.Firstly,based on the advanced encryption standard(AES)encryption,we use the keystore to expand the traditional key,and use the digital pointer to avoid the key transmission in a wireless channel.Secondly,the identity authentication technology is adopted to ensure the data integrity,and an automatic retransmission mechanism is added for the endogenous properties of the wireless channel.Finally,the software defined radio(SDR)platform composed of universal software radio peripheral(USRP)and GNU radio is used to simulate the data interaction between the physical entity and the virtual entity.The numerical results show that the DTs architecture can guarantee the encrypted data transmitted completely and decrypted accurately with high efficiency and reliability,thus providing a basis for intelligent and secure information interaction for DTs in the future.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.70671089 and 10635040)
文摘In a network described by a graph, only topological structure information is considered to determine how the nodes are connected by edges. Non-topological information denotes that which cannot be determined directly from topological information. This paper shows, by a simple example where scientists in three research groups and one external group form four communities, that in some real world networks non-topological information (in this example, the research group affiliation) dominates community division. If the information has some influence on the network topological structure, the question arises as to how to find a suitable algorithm to identify the communities based only on the network topology. We show that weighted Newman algorithm may be the best choice for this example. We believe that this idea is general for real-world complex networks.
基金supported by the National Natural Science Foundation of China(No.61273048)
文摘A model of autonomous positioning through associating environment memory information is presented for unmanned combat aerial vehicle(UCAV).The representation strategy of environment by constructing place cells is used to produce the memory information,and the landmarks in memory are retrieved through perceiving and processing the environment.During UCAV′s flight,the landmarks are obtained in real-time and are matched with the landmarks in memory.Then,the idea of ranging positioning is adopted to calculate UCAV′s location based on the corresponding relationship between current obtained landmarks and the memorized landmarks.Simulation shows that the proposed model can realize autonomous positioning in the memorized environment,and the positioning performance is well when the sensor has a high precision.
基金supported in part by the National Natural Science Foundation of China(Nos.61271230,61472190)the National Mobile Communications Research Laboratory,Southeast University(No.2013D02)
文摘Exploiting the source-to-relay channel phase information at the relays can increase the rate upper-bound of distributed orthogonal space-time block codes(STBC)from 2/K to 1/2,where Kis the number of relays.This technique is known as distributed orthogonal space-time block codes with channel phase information(DOSTBC-CPI).However,the decoding delay of existing DOSTBC-CPIs is not optimal.Therefore,based on the rate of 1/2 balanced complex orthogonal design(COD),an algorithm is provided to construct a maximal rate DOSTBC-CPI with only half the decoding delay of existing DOSTBC-CPI.Simulation results show that the proposed method exhibits lower symbol error rate than the existing DOSTBC-CPIs.
基金the National Natural Science Foundation of China(Grant Nos.12271394,11775040,12011530014)the Natural Science Foundation of Shanxi Province+3 种基金China(Grant Nos.201801D221032 and 201801D121016)the Scientific and Technological Innovation Programs of Higher Education Institutions in Shanxi(Grant No.2019L0178)the Key Research and Development Program of Shanxi Province(Grant No.202102010101004)the China Scholarship Council。
文摘We investigate the information exclusion principle for multiple measurements with assistance of multiple quantum memories that are well bounded by the upper and lower bounds.The lower bound depends on the observables'complementarity and the complementarity of uncertainty whilst the upper bound includes the complementarity of the observables,quantum discord,and quantum condition entropy.In quantum measurement processing,there exists a relationship between the complementarity of uncertainty and the complementarity of information.In addition,based on the information exclusion principle the complementarity of uncertainty and the shareability of quantum discord can exist as an essential factor to enhance the bounds of each other in the presence of quantum memory.
基金Project supported by the National Natural Science Foundation of China(Grant No.12301580).
文摘The study on the entanglement polygon inequality of multipartite systems has attracted much attention.However,most of the results are on pure states.Here we consider the property for a class of mixed states,which are the reduced density matrices of generalizedW-class states in multipartite higher dimensional systems.First we show the class of mixed states satisfies the entanglement polygon inequalities in terms of Tsallis-q entanglement,then we propose a class of tighter inequalities for mixed states in terms of Tsallis-q entanglement.At last,we get an inequality for the mixed states,which can be regarded as a relation for bipartite entanglement.
基金jointly supported by National Soft Science Research Program(Grant No.:2011GXQ4D048)the Fundamental Research Foundation for the Central Universities(Grant No.:KYZ201133)the Foundation for Humanities and Social Sciences of Jiangsu Province(Grant No.:11TQB005)
文摘Purpose: This paper aims to compare and rank the allocative efficiency of information resources in rural areas by taking 13 rural areas in Jiangsu Province, China as the research sample.Design/methodology/approach: We designed input and output indicators for allocation of rural information resources and conducted the quantitative evaluation of allocative efficiency of rural information resources based on cross-efficiency model in combination with the classical CCR model in data envelopment analysis(DEA).Findings: Cross-efficiency DEA model can be used for our research with the objective to evaluate quantitatively and objectively whether the allocation of information resources in various rural areas is reasonable and whether the output is commensurate with the input.Research limitations: We have to give up using some indicators because of limited data availability. There is a need to further improve the cross-efficiency DEA model because it cannot identify the specific factors influencing the efficiency of decision-making units(DMUs).Practical implications: The evaluation results will help us understand the present allocative efficiency levels of information resources in various rural areas so as to provide a decisionmaking basis for formulation of the policies aimed at promoting the circulation of information resources in rural areas.Originality/value: Little or no research has been published about the allocative efficiency of rural information resources. The value of this research lies in its focus on studying rural informatization from the perspective of allocative efficiency of rural information resources and in the application of cross-efficiency DEA model to evaluate allocative efficiency of rural information resources as well.
基金Project supported by the the Fundamental Research Funds for the Central Universities(Grant No.2023MS163).
文摘We study a generalized higher-order nonlinear Schr¨odinger equation in an optical fiber or a planar waveguide.We obtain the Lax pair and N-fold Darboux transformation(DT)with N being a positive integer.Based on Lax pair obtained by us,we derive the infinitely-many conservation laws.We give the bright one-,two-,and N-soliton solutions,and the first-,second-,and Nth-order breather solutions based on the N-fold DT.We conclude that the velocities of the bright solitons are influenced by the distributed gain function,g(z),and variable coefficients in equation,h_(1)(z),p_(1)(z),r_(1)(z),and s_(1)(z)via the asymptotic analysis,where z represents the propagation variable or spatial coordinate.We also graphically observe that:the velocities of the first-and second-order breathers will be affected by h_(1)(z),p_(1)(z),r_(1)(z),and s_(1)(z),and the background wave depends on g(z).
基金Project supported by the National Natural Science Foundation of China (Grants Nos.12375031 and 11905068)the Natural Science Foundation of Fujian Province, China (Grant No.2023J01113)the Scientific Research Funds of Huaqiao University (Grant No.ZQN-810)。
文摘The chimera states underlying many realistic dynamical processes have attracted ample attention in the area of dynamical systems.Here, we generalize the Kuramoto model with nonlocal coupling incorporating higher-order interactions encoded with simplicial complexes.Previous works have shown that higher-order interactions promote coherent states.However, we uncover the fact that the introduced higher-order couplings can significantly enhance the emergence of the incoherent state.Remarkably, we identify that the chimera states arise as a result of multi-attractors in dynamic states.Importantly, we review that the increasing higher-order interactions can significantly shape the emergent probability of chimera states.All the observed results can be well described in terms of the dimension reduction method.This study is a step forward in highlighting the importance of nonlocal higher-order couplings, which might provide control strategies for the occurrence of spatial-temporal patterns in networked systems.
基金supported by National Natural Science Foundation of China (No. 61971149, 62071504, 62271208)in part by the Special Projects in Key Fields for General Universities of Guangdong Province (No. 2020ZDZX3025, 2021ZDZX056)+1 种基金in part by the Guangdong Basic and Applied Basic Research Foundation (No. 2021A1515011657)in part by the Featured Innovation Projects of Guangdong Province of China (No. 2021KTSCX049)。
文摘Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error performance.In CIM, at least two different IM operations construct a super IM operation or achieve new functionality. First, we propose a OFDM with generalized CIM(OFDM-GCIM) scheme to achieve a joint IM of subcarrier selection and multiple-mode(MM)permutations by using a multilevel digital algorithm.Then, two schemes, called double CIM(D-CIM) and multiple-layer CIM(M-CIM), are proposed for secure communication, which combine new IM operation for disrupting the original order of bits and symbols with conventional OFDM-IM, to protect the legitimate users from eavesdropping in the wireless communications. A subcarrier-wise maximum likelihood(ML) detector and a low complexity log-likelihood ratio(LLR) detector are proposed for the legitimate users. A tight upper bound on the bit error rate(BER) of the proposed OFDM-GCIM, D-CIM and MCIM at the legitimate users are derived in closed form by employing the ML criteria detection. Computer simulations and numerical results show that the proposed OFDM-GCIM achieves superior error performance than OFDM-IM, and the error performance at the eavesdroppers demonstrates the security of D-CIM and M-CIM.
文摘Let B^(H) be a fractional Brownian motion with Hurst index 1/2≤H<1.In this paper,we consider the equation(called the Ornstein-Uhlenbeck process with a linear self-repelling drift)dX_(t)^(H)=dB_(t)^(H)+σ X_(t)^(H)dt+vdt-θ(∫_(0)^(t)(X_(t)^(H)-X_(s)^(H))ds)dt,whereθ<0,σ,v∈ℝ.The process is an analogue of self-attracting diffusion(Cranston,Le Jan.Math Ann,1995,303:87–93).Our main aim is to study the large time behaviors of the process.We show that the solution X^(H)diverges to infinity as t tends to infinity,and obtain the speed at which the process X^(H)diverges to infinity.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62172268 and 62302289)the Shanghai Science and Technology Project(Grant Nos.21JC1402800 and 23YF1416200)。
文摘As a part of quantum image processing,quantum image filtering is a crucial technology in the development of quantum computing.Low-pass filtering can effectively achieve anti-aliasing effects on images.Currently,most quantum image filterings are based on classical domains and grayscale images,and there are relatively fewer studies on anti-aliasing in the quantum domain.This paper proposes a scheme for anti-aliasing filtering based on quantum grayscale and color image scaling in the spatial domain.It achieves the effect of anti-aliasing filtering on quantum images during the scaling process.First,we use the novel enhanced quantum representation(NEQR)and the improved quantum representation of color images(INCQI)to represent classical images.Since aliasing phenomena are more pronounced when images are scaled down,this paper focuses only on the anti-aliasing effects in the case of reduction.Subsequently,we perform anti-aliasing filtering on the quantum representation of the original image and then use bilinear interpolation to scale down the image,achieving the anti-aliasing effect.The constructed pyramid model is then used to select an appropriate image for upscaling to the original image size.Finally,the complexity of the circuit is analyzed.Compared to the images experiencing aliasing effects solely due to scaling,applying anti-aliasing filtering to the images results in smoother and clearer outputs.Additionally,the anti-aliasing filtering allows for manual intervention to select the desired level of image smoothness.
基金Project supported by the Heilongjiang Province Natural Science Foundation Joint Guidance Project,China (Grant No.LH2020F022)the Fundamental Research Funds for the Central Universities,China (Grant No.3072022CF0801)。
文摘Conservative chaotic systems have unique advantages over dissipative chaotic systems in the fields of secure communication and pseudo-random number generator because they do not have attractors but possess good traversal and pseudorandomness. In this work, a novel five-dimensional(5D) Hamiltonian conservative hyperchaotic system is proposed based on the 5D Euler equation. The proposed system can have different types of coordinate transformations and time reversal symmetries. In this work, Hamilton energy and Casimir energy are analyzed firstly, and it is proved that the new system satisfies Hamilton energy conservation and can generate chaos. Then, the complex dynamic characteristics of the system are demonstrated and the conservatism and chaos characteristics of the system are verified through the correlation analysis methods such as phase diagram, equilibrium point, Lyapunov exponent, bifurcation diagram, and SE complexity. In addition, a detailed analysis of the multistable characteristics of the system reveals that many energy-related coexisting orbits exist. Based on the infinite number of center-type and saddle-type equilibrium points, the dynamic characteristics of the hidden multistability of the system are revealed. Then, the National Institute of Standards and Technology(NIST)test of the new system shows that the chaotic sequence generated by the system has strong pseudo-random. Finally, the circuit simulation and hardware circuit experiment of the system are carried out with Multisim simulation software and digital signal processor(DSP) respectively. The experimental results confirm that the new system has good ergodicity and realizability.
基金the National Natural Sciencefoundation of China (Grant No. 12174085)the FundamentalResearch Funds for the Central Universities (GrantNo. B220202018)+1 种基金the Basic Science (Natural Science) ResearchProject for the Universities of Jiangsu Province (GrantNo. 23KJD140002)Natural Science Foundation of Nantong(Grant No. JC2023081).
文摘Orbital angular momentum(OAM)conversion is critical in understanding interactions between a structural sound field and a planar lattice.Herein,we explore the evolution of a monochromatic acoustic vortex beam(AVB)that is scattered by a phononic crystal(PnC)or a correlated random lattice.The phenomenon is ascribed to the enhanced orbit–orbit angular momentum coupling induced by the band structure.By modifying the coupling condition,accurate and continuous micromanipulation of AVBs can be achieved,including the transverse/lateral gravity shift,the dynamics of the phase singularities,and the spatial distribution of acoustic pressure,etc.This research provides insight to the inhomogeneous coupling of AVBs with both propagating Bloch waves and localized Anderson modes,and may facilitate development of novel OAM-based acoustic devices for active sound field manipulation.