首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
手机短信息传播过程和短信息寿命研究   总被引:2,自引:0,他引:2       下载免费PDF全文
李明杰  吴晔  刘维清  肖井华 《物理学报》2009,58(8):5251-5258
比较了短信息在无标度网络、小世界网络和实际的短信息网络三种网络中的传播过程,寻找影响短信息传播的因素.研究发现,网络拓扑结构和手机用户的转发短信行为均会影响短信息传播过程.在无标度网络中短信息传播速率快于小世界网络和实际的短信息网络,而无标度网络的短信息寿命较小世界网络和实际的短信息网络短;网络中手机用户的转发短信息行为明显影响短信息的传播过程.同时还发现短信息寿命与网络直径有关. 关键词: 复杂网络 短信息 信息传播 人类行为  相似文献   

2.
A scheme for implementing secure communication based on chaotic maps and strong tracking filter (STF) is presented, and a modified STF algorithm with message estimation is developed for the special requirement of chaotic secure communication. At the emitter, the message symbol is modulated by chaotic mapping and is output through a nonlinear function. At the receiver, the driving signal is received and the message symbol is recovered dynamically by the STF with estimation of message symbol. Simulation results of Holmes map demonstrate that when message symbols are binary codes, STF can effectively recover the codes of the message from the noisy chaotic signals. Compared with the extended Kalman filter (EKF), STF has a lower bit error rate.  相似文献   

3.
杨威  张晓红 《应用声学》2015,23(10):55-55
NATO STANAG 4626 ASAAC已广泛应用于综合化模块化航空电子系统,在STANAG 4626中,分布式通用系统管理划分为四个功能组件(健康管理、故障管理、配置管理和安全管理),通过对四个功能组件间的消息通信过程进行分析,提出一种基于分布式通用系统管理的消息交互机制,具体包括消息类型划分、消息封装机制、消息收发派遣机制、消息底层传输机制,满足通用系统管理消息通信中多节点、多数据流通信需求,减少系统设计冗余。  相似文献   

4.
数值研究了基于半导体激光器的混沌通信系统中构成混沌同步的接收半导体激光器对高频信号的滤波特性.分析了闭环结构的接收机对不同频率、不同幅度的加载信号的提取能力.研究发现,混沌保密通信系统对传输信号的提取能力与信号的频率有关.当信号频率较低时,闭环结构的接收机对信号的滤波效果较好;当信号频率接近半导体激光器的弛豫振荡频率时,接收机的滤波效果较差.分析结果同时表明,混沌保密通信系统中接收机对传输信号的提取质量不仅与实现混沌同步的两激光器的同步质量有关,而且依赖于传输信号的幅度. 关键词: 混沌 混沌同步 半导体激光器 滤波  相似文献   

5.
Sivaprakasam S  Shore KA 《Optics letters》1999,24(17):1200-1202
Amplitude modulation is used to encode a message into the output of a chaotic laser-diode optical transmitter, and decoding of the message by use of a synchronized chaotic laser-diode receiver is demonstrated experimentally. The chaotic carrier is shown to effectively mask the transmitted message.  相似文献   

6.
罗玉玲  杜明辉 《中国物理 B》2012,21(6):60503-060503
Based on the spatiotemporal chaotic system,a novel algorithm for constructing a one-way hash function is proposed and analysed.The message is divided into fixed length blocks.Each message block is processed by the hash compression function in parallel.The hash compression is constructed based on the spatiotemporal chaos.In each message block,the ASCII code and its position in the whole message block chain constitute the initial conditions and the key of the hash compression function.The final hash value is generated by further compressing the mixed result of all the hash compression values.Theoretic analyses and numerical simulations show that the proposed algorithm presents high sensitivity to the message and key,good statistical properties,and strong collision resistance.  相似文献   

7.
Kusumoto K  Ohtsubo J 《Optics letters》2002,27(12):989-991
Sinusoidal message transmission up to 1.5 GHz is performed based on synchronization of chaos in experimental nonlinear systems of semiconductor lasers with optical feedback. In the chaotic systems the message is almost entirely suppressed in the receiver output, even if the message has nonnegligible power in the transmitter.  相似文献   

8.
《Physics letters. A》1999,251(3):169-176
We present a new chaotic masking scheme by using synchronized chaotic systems. In this method, synchronization and message transmission phases are separated, and while synchronization is achieved in the synchronization phases, the message is only sent in message transmission phases. We show that if synchronization is achieved exponentially fast, then under certain conditions any message of any length could be transmitted and successfully recovered provided that the synchronization length is sufficiently long. We also show that the proposed scheme is robust with respect to noise and parameter mismatch under some mild conditions.  相似文献   

9.
A quantum secret sharing scheme is proposed by making use of quantum registers. In the proposed scheme, secret message state is encoded into multipartite entangled states. Several identical multi-particle entanglement states are generated and each particle of the entanglement state is filled in different quantum registers which act as shares of the secret message. Two modes, i.e. the detecting mode and the message mode, are employed so that the eavesdropping can be detected easily and the secret message may be recovered. The security analysis shows that the proposed scheme is secure against eavesdropping of eavesdropper and cheating of participants.  相似文献   

10.
针对分布式调度监控系统的客户服务器处理效率不高的问题,利用发布订阅消息通信技术,结合公共信息模型,提出了一种分布式监控主动消息交互的新方法。对量测类信息流和控制类信息流进行了实时交互接口设计,融入JMS消息服务器消息主题和发布订阅传输交互模式。该方法在工程中进行了应用,以石德线为算例,进行模拟量和状态量信息的交互实验,完成了单点和多点信息的交互传输,实现了实时变位信息向监控画面的主动即时传输,为分布式调度监控处理提供了一种新的高效实现方法。  相似文献   

11.
We propose and demonstrate a new AC-light emitting diode based visible light communication system, in which the message signal is up-converted to 400 kHz frequency band and combine with the 60 Hz AC-power from the outlet. A special design bias-tee circuit is first implemented to combine the message signal and the AC-power for minimizing the signal distortion. Thus, the spectra of both signals are well separated. A special design clock recovery is used to synchronize the AC-power with the message signal; hence the message signal can be correctly applied to the rectified AC-power cycle.  相似文献   

12.
光学双稳系统混沌驱动保密通讯原理研究   总被引:4,自引:0,他引:4  
刘金刚  沈柯 《光学学报》1997,17(11):473-1479
根据声光双稳系统混沌驱动下的动力学行为,提出利用系统的相位特性实现信息的混沌加密,并且由接收端混沌驱动产生的混沌信号完成信息提取的原理。发现在较大的噪声覆盖下仍然可以实现信息的安全传送,由于信息解密不需要与载波安全同步的混信号而只利用传输信号与接收端被驱动系统输出信号的相位关系,因此这种方法具有实际应用价值。  相似文献   

13.
Multipartite quantum secure direct communication (MQSDC) enables multiple message senders to simultaneously and independently transmit secret messages to a message receiver through quantum channels without sharing keys. Existing MQSDC protocols all assume that all the communication parties are legal, which is difficult to guarantee in practical applications. In this study, a single-photon based three-party QSDC protocol with identity authentication is proposed. In the protocol, the message receiver first authenticates the identity of two practical message senders. Only when the identity authentication is passed, the legal message senders can encode their messages by the hyper-encoding technology. In theory, two bits of messages can be transmitted to the message receiver in a communication round. The protocol can resist the external attack and internal attack, and guarantee the security of the transmitted messages and the identity codes of each legal message sender. The secret message capacity of the protocol is simulated with two-decoy-state method. The maximal communication distance between any two communication parties can reach $\approx$ 31.75 km with weak signal and decoy state pulses. The three-party QSDC protocol can be extended to a general MQSDC protocol and has important application in the further practical MQSDC field.  相似文献   

14.
Lee MW  Paul J  Sivaprakasam S  Shore KA 《Optics letters》2003,28(22):2168-2170
An experimental study of a chaotic optical communication scheme using an external cavity laser diode to encode a message is reported. The message is decoded in closed- and open-loop receiver schemes. Both schemes show effective decoding of a 1-GHz message. The synchronization and effectiveness of encoding are compared in both schemes.  相似文献   

15.
LI Wei  GU Jiao  CAI Xu 《中国物理快报》2008,25(6):2303-2306
We study message spreading on a scale-free network, by introducing a novel forget-remember mechanism. Message, a general term which can refer to email, news, rumor or disease, etc, can be forgotten and remembered by its holder. The way the message is forgotten and remembered is governed by the forget and remember function, F and R, respectively. Both F and R are functions of history time t concerning individual's previous states, namely being active (with message) or inactive (without message). Our systematicsimulations show at the low transmission rate whether or not the spreading can be efficient is primarily determined by the corresponding parameters for F and R.  相似文献   

16.
Very recently, an arbitrated quantum signature (AQS) scheme of classical message with an untrusted arbitrator was presented (Yang et al. in Eur. Phys. J., D, At. Mol. Opt. Plasma Phys. 61(3):773–778, 2011). In this paper, the security of the AQS scheme with an untrusted arbitrator is analyzed. An AQS scheme with an untrusted arbitrator should satisfy the unforgeable property and undeniable property. In particular, the malicious verifier can not modify a message and its signature to produce a new message with a valid signature, and the dishonest signer who really has sent the message to the verifier which the verifier accepted as an authentic one cannot later deny having sent this message. However, we show that, in the AQS scheme with an untrusted arbitrator, the dishonest signer can successfully disavow his/her signature and the malicious verifier can counterfeit a valued signature for any message by known message attack when he has received a message-signature pair. Then, we suggest an improved AQS scheme of classical message with an untrusted arbitrator which can solve effectively the two problems raised above. Furthermore, we prove the security of the improved scheme.  相似文献   

17.
系统增益对光混沌通信系统性能影响的研究   总被引:3,自引:0,他引:3       下载免费PDF全文
刘慧杰  冯久超 《物理学报》2009,58(3):1484-1490
针对强注入开环结构的外腔反馈半导体激光器混沌通信系统,数值计算得到系统增益与注入系数的定量关系曲线.对比是否使用系统增益对接收系统输出进行校正两种情况下系统的解调性能,表明使用增益校正的相减解调法获得的信息更接近原始信息.通过采用不同频率的正弦信号进行调制,表明信息频率对系统增益没有影响;用不同调制方法对0.2?Gbit/s数字信号加密,结果表明系统增益与信号类型及调制方法无关. 关键词: 光混沌通信 强注入 系统增益 同步  相似文献   

18.
In this paper, during the masking process the encrypted message is convolved and embedded into a Qi hyper-chaotic system characterizing a high disorder degree. The masking scheme was tested using both Qi hyper-chaos and Lorenz chaos and indicated that Qi hyper-chaos based masking can resist attacks of the filtering and power spectrum analysis, while the Lorenz based scheme fails for high amplitude data. To unmask the message at the receiving end, two methods are proposed. In the first method, a model-free synchronizer, i.e. a multivariable higher-order differential feedback controller between the transmitter and receiver is employed to de-convolve the message embedded in the receiving signal. In the second method, no synchronization is required since the message is de-convolved using the information of the estimated derivative.  相似文献   

19.
We present an efficient scheme for secure authentication of classical messages with decoherence-free states and hash functions. We also analyze the security of this scheme and show it is not possible to forge valid message authentication codes. In addition, the lengths of the authentication key and message authentication codes are invariant no mater how long the length of the message to be authenticated is. Moreover, although this scheme uses entangled states for encoding, only single-particle product measurements are required.  相似文献   

20.
The message filtering characteristics of the receiver in closed-loop chaotic optical communication system are numerically studied based on laser rate equations. A pair of external cavity semiconductor lasers was employed as the chaotic carrier transmitter and the synchronized chaos receiver. We examined the filtering properties of the semiconductor laser receiver for message encoded with chaos masking. Our results demonstrate that, the lower the message frequency, the more easily the receiver filters out the message from chaotic carrier. We also analyzed the effects of each parameter mismatches between the transmitter and the receiver on the quality of the recovered message. Comparing the synchronization quality with the signal-to-noise ratio affected by parameter mismatches, we find that the quality of the recovered message depends not only on the synchronization quality but also on the filtering characteristics of the receiver. The filtering characteristics of receiver will be playing an important role on the quality of the recovered message in the case of large mismatches.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号