首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
潘兴博  陈秀波  徐刚  窦钊  李宗鹏  杨义先 《中国物理 B》2022,31(1):10305-010305
We propose a scheme where one can exploit auxiliary resources to achieve quantum multicast communication with network coding over the butterfly network.In this paper,we propose the quantum 2-pair multicast communication scheme,and extend it to k-pair multicast communication over the extended butterfly network.Firstly,an EPR pair is shared between each adjacent node on the butterfly network,and make use of local operation and classical communication to generate entangled relationship between non-adjacent nodes.Secondly,each sender adds auxiliary particles according to the multicast number k,in which the CNOT operations are applied to form the multi-particle entangled state.Finally,combined with network coding and free classical communication,quantum multicast communication based on quantum measurements is completed over the extended butterfly network.Not only the bottleneck problem is solved,but also quantum multicast communication can be completed in our scheme.At the same time,regardless of multicast number k,the maximum capacity of classical channel is 2 bits,and quantum channel is used only once.  相似文献   

2.
Abstract

A data bus consists of the interconnection of N terminals, each of which is connected to every other terminal. There are three fundamental approaches to the topology of the network: (1) the tee network, for which the connecting nodes coincide with the communicating nodes; (2) the star network, for which there is only one connection node, which may not coincide with a communication node; and (3) the Steiner minimal tree network, for which there can be many nodes, each of which is difficult to locate in the x-y plane. The tee and star approaches are receiving most attention but the third is the only one that economizes on the use of cable (glass fiber waveguide). After a discussion of the tee and star networks, we turn to the Steiner minimal tree network and a method of locating the connecting nodes so that the total amount of cable is minimized.  相似文献   

3.
Random walks on complex networks, especially scale-free networks, have attracted considerable interest in the past few years. A lot of previous work showed that the average receiving time (ART), i.e., the average of mean first-passage time (MFPT) for random walks to a given hub node (node with maximum degree) averaged over all starting points in scale-free small-world networks exhibits a sublinear or linear dependence on network order N (number of nodes), which indicates that hub nodes are very efficient in receiving information if one looks upon the random walker as an information messenger. Thus far, the efficiency of a hub node sending information on scale-free small-world networks has not been addressed yet. In this paper, we study random walks on the class of Koch networks with scale-free behavior and small-world effect. We derive some basic properties for random walks on the Koch network family, based on which we calculate analytically the average sending time (AST) defined as the average of MFPTs from a hub node to all other nodes, excluding the hub itself. The obtained closed-form expression displays that in large networks the AST grows with network order as N ln N, which is larger than the linear scaling of ART to the hub from other nodes. On the other hand, we also address the case with the information sender distributed uniformly among the Koch networks, and derive analytically the global mean first-passage time, namely, the average of MFPTs between all couples of nodes, the leading scaling of which is identical to that of AST. From the obtained results, we present that although hub nodes are more efficient for receiving information than other nodes, they display a qualitatively similar speed for sending information as non-hub nodes. Moreover, we show that that AST from a starting point (sender) to all possible targets is not sensitively affected by the sender’s location. The present findings are helpful for better understanding random walks performed on scale-free small-world networks.  相似文献   

4.
《Physical Communication》2008,1(2):134-145
Applications for wireless sensor networks require widespread, highly reliable communications even in the face of adversarial influences. Maintaining connectivity and secure communications between entities are vital networking properties towards ensuring the successful and accurate completion of desired sensing tasks. We examine the required communication range for nodes in a wireless sensor network with respect to several parameters. Network properties such as key predistribution schemes and node compromise attacks are modelled with several network parameters and studied in terms of how they influence global network connectivity. These networks are physically vulnerable to malicious behavior by way of node compromise attacks that may affect global connectivity. We introduce a metric that determines the resilience of a network employing a key predistribution scheme with respect to node compromise attacks. In this work,we provide the first study of global network connectivity and its relationship to node compromise attacks. Existing work considers the relationship between the probability of node compromise and the probability of link compromise and the relationship of the probability of secure link establishment and overall network connectivity for the Erdős network model. Here, we present novel work which combines these two relationships to study the relationship between node compromise attacks and global network connectivity. Our analysis is performed with regard to large-scale networks; however, we provide simulation results for both large-scale and small-scale networks. First, we derive a single expression to determine the required communication radius for wireless sensor networks to include the effects of key predistribution schemes. From this, we derive an expression for determining required communication range after an adversary has compromised a fraction of the nodes in the network. The required communication range represents the resource usage of nodes in a network to cope with key distribution schemes and node compromise attacks. We introduce the Resiliency-Connectivity metric, which measures the resilience of a network in expending its resources to provide global connectivity in adverse situations.  相似文献   

5.
When network and graph theory are used in the study of complex systems, a typically finite set of nodes of the network under consideration is frequently either explicitly or implicitly considered representative of a much larger finite or infinite region or set of objects of interest. The selection procedure, e.g., formation of a subset or some kind of discretization or aggregation, typically results in individual nodes of the studied network representing quite differently sized parts of the domain of interest. This heterogeneity may induce substantial bias and artifacts in derived network statistics. To avoid this bias, we propose an axiomatic scheme based on the idea of node splitting invariance to derive consistently weighted variants of various commonly used statistical network measures. The practical relevance and applicability of our approach is demonstrated for a number of example networks from different fields of research, and is shown to be of fundamental importance in particular in the study of spatially embedded functional networks derived from time series as studied in, e.g., neuroscience and climatology.  相似文献   

6.

Quantum teleportation is an important method for transmitting quantum states between two quantum communication nodes. In this paper, we propose a low-latency quantum communication scheme based on Greenberger-Horne-Zeilinger (GHZ) state. To implement two-qubit transmission, the source and all intermediate nodes perform quantum measurements simultaneously and the measurement results are transmitted to the destination node through classical channel independently. The destination node performs appropriate unitary operation on its particles to recover the original two-qubit state based on received measurement results. Our scheme effectively reduces the end-to-end quantum communication delay.

  相似文献   

7.
In this paper, we propose a mesh-topology-based multi-hop teleportation scheme for a quantum network. By using the proposed scheme, quantum communication can be realized between two arbitrary nodes, even when they do not share a direct quantum channel. Einstein–Podolsky–Rosen pairs are used as quantum channels. The source node (initial sender) and all intermediate nodes make Bell measurements independently. They send the results to the destination node (final receiver) by classical channels. The quantum state can be determined from the Bell measurement result, and only the destination node is required for simple unitary transformation. This method of simultaneous measurement contributes significantly to quantum network by reducing the hop-by-hop transmission delay.  相似文献   

8.
刘慧  张军 《物理学报》2007,56(4):1952-1957
现代复杂的通信网络内部存在着广泛的幂律现象,网络节点之间存在相关特性. 根据这种相关特性,提出了网络不动点理论. 将Banach不动点理论引入网络模型,证明了网络不动点理论的正确有效性. 证明过程是把通信网络看作由路径预测算法产生的似马尔可夫链的路由节点迭代序列形成的网络空间. 由节点相关性可知,此空间中的节点序列相对越长就越能折射出搜索的目标所在,预测准确率也会逐步增加,可以更好地进行目标定位、数据挖掘等. 通过某种路由准则的算子从源节点最终映射到的目的节点与Banach空间的不动点相对应,即为网络空间的不动点. 当网络发展到能为用户提供真正的无处不在的连接时,网络不动点理论的物理特性将非常明显. 因为网络规模越大,节点间的群体作用越显著,就越能显现网络不动点理论的物理特性. 关键词: 计算机网络 长程相关 不动点 幂律  相似文献   

9.
We study a generalization of the voter model on complex networks, focusing on the scaling of mean exit time. Previous work has defined the voter model in terms of an initially chosen node and a randomly chosen neighbor, which makes it difficult to disentangle the effects of the stochastic process itself relative to the network structure. We introduce a process with two steps, one that selects a pair of interacting nodes and one that determines the direction of interaction as a function of the degrees of the two nodes and a parameter α which sets the likelihood of the higher degree node giving its state to the other node. Traditional voter model behaviors can be recovered within the model, as well as the invasion process. We find that on a complete bipartite network, the voter model is the fastest process. On a random network with power law degree distribution, we observe two regimes. For modest values of α, exit time is dominated by diffusive drift of the system state, but as the high-degree nodes become more influential, the exit time becomes dominated by frustration effects dependent on the exact topology of the network.  相似文献   

10.
We present a new decentralized classification system based on a distributed architecture. This system consists of distributed nodes, each possessing their own datasets and computing modules, along with a centralized server, which provides probes to classification and aggregates the responses of nodes for a final decision. Each node, with access to its own training dataset of a given class, is trained based on an auto-encoder system consisting of a fixed data-independent encoder, a pre-trained quantizer and a class-dependent decoder. Hence, these auto-encoders are highly dependent on the class probability distribution for which the reconstruction distortion is minimized. Alternatively, when an encoding–quantizing–decoding node observes data from different distributions, unseen at training, there is a mismatch, and such a decoding is not optimal, leading to a significant increase of the reconstruction distortion. The final classification is performed at the centralized classifier that votes for the class with the minimum reconstruction distortion. In addition to the system applicability for applications facing big-data communication problems and or requiring private classification, the above distributed scheme creates a theoretical bridge to the information bottleneck principle. The proposed system demonstrates a very promising performance on basic datasets such as MNIST and FasionMNIST.  相似文献   

11.
刘伟彦  刘斌 《物理学报》2014,63(24):248901-248901
提出一种复杂网络上的局部路由策略,算法采用节点收缩法评估节点的重要度,发送节点根据邻居节点的重要度及网络的状态自适应地调整向邻居节点转发数据包的概率.在网络处于自由流通状态时充分发挥关键节点的优势,保证数据包快速到达目的地;在网络处于即将拥塞时分散业务,根据节点重要度准确识别网络中的关键节点,通过有效分流予以保护.仿真结果表明:在网络处于自由流通状态时,该局部路由策略能充分发挥网络中关键节点的枢纽作用,保持较低的传输时延;在网络部分关键节点出现拥塞时,该局部路由策略能有效避开拥挤严重的节点,将数据包均匀地分布在各个节点上,有效抑制网络拥塞,提高网络的容量.  相似文献   

12.
基于质心迭代估计的无线传感器网络节点定位算法   总被引:3,自引:0,他引:3       下载免费PDF全文
蒋锐  杨震 《物理学报》2016,65(3):30101-030101
针对无线传感器网络非测距定位方法的应用,提出了基于质心迭代估计的节点定位算法.该算法首先计算当前连通信标节点所围成的平面质心的坐标及其与未知节点间的接收信号强度,然后用计算所得质心节点替代距离未知节点最远的连通信标节点,缩小连通信标节点所围成的平面,并通过多次迭代的方法提高节点定位精度.仿真实验结果表明,该算法的各项指标均为良好,适用于无线传感器网络的节点定位.  相似文献   

13.
李华姣  安海忠  黄家宸  高湘昀  石艳丽 《物理学报》2014,63(4):48901-048901
选取2003—2012年期间半年度中国基金公司持上市公司股票份额面板数据为样本数据,以基金公司为节点,以同一时刻共持同一家上市公司股票关系为边,以同一时刻共持的上市公司数量为权重,构建中国基金公司共持关系结构等价加权网络(简称共持网络).结合统计物理学等方法,分析了共持网络的拓扑结构稳定性及具有不同拓扑特征值的节点随时间演变过程中与共持网络中三类节点集合持股行为波动相关性.三类节点集合分别为t-1时刻基于某一股票形成的共持关系完全连通子图节点集合(第一类节点集合)、t-1时刻共持网络中非完全连通子图的节点集合(第二类节点集合)、t时刻新进入共持网络的节点集合(第三类节点集合).分析结果显示:1)节点与第二类节点集合持股行为波动呈正相关,且相关系数随着节点集聚系数的增强而增大;2)只有当节点的度和点强度值较高时,节点与第一类和第二类节点集合的持股行为呈正相关;3)不同拓扑特征条件下的节点与第三类节点集合的持股行为均不存在波动相关性.本文提供了一个研究持股行为相关性的新思路,并为进一步研究股票市场结构等价网络及节点重要性差异提供了基础.  相似文献   

14.
王开  周思源  张毅锋  裴文江  刘茜 《物理学报》2011,60(11):118903-118903
在对随机行走过程的研究中发现:单个粒子通过某条特定路径的时间正比于该路径上所有节点度的连乘积.据此,文章提出基于随机行走机理的优化路由改进策略.该策略以节点度连乘积最小化为原则,通过调节可变参数,建立节点处理能力均匀分布的情况下最佳路由策略.通过分析比较不同路由策略条件下平均路由介数中心度,网络的临界负载量,平均路径长度以及平均搜索信息量等性能指标,研究结果表明,此改进路由策略在保证网络平均路径长度较少增加的前提下,使网络的传输能力获得最大幅度的提升. 关键词: 复杂网络 路由策略 负载传输  相似文献   

15.
Reinert Korsnes 《Physica A》2010,389(14):2841-2848
This work shows potentials for rapid self-organisation of sensor networks where nodes collaborate to relay messages to a common data collecting unit (sink node). The study problem is, in the sense of graph theory, to find a shortest path tree spanning a weighted graph. This is a well-studied problem where for example Dijkstra’s algorithm provides a solution for non-negative edge weights. The present contribution shows by simulation examples that simple modifications of known distributed approaches here can provide significant improvements in performance. Phase transition phenomena, which are known to take place in networks close to percolation thresholds, may explain these observations. An initial method, which here serves as reference, assumes the sink node starts organisation of the network (tree) by transmitting a control message advertising its availability for its neighbours. These neighbours then advertise their current cost estimate for routing a message to the sink. A node which in this way receives a message implying an improved route to the sink, advertises its new finding and remembers which neighbouring node the message came from. This activity proceeds until there are no more improvements to advertise to neighbours. The result is a tree network for cost effective transmission of messages to the sink (root). This distributed approach has potential for simple improvements which are of interest when minimisation of storage and communication of network information are a concern. Fast organisation of the network takes place when the number k of connections for each node (degree) is close above its critical value for global network percolation and at the same time there is a threshold for the nodes to decide to advertise network route updates.  相似文献   

16.
There has been a considerable amount of interest in recent years on the robustness of networks to failures. Many previous studies have concentrated on the effects of node and edge removals on the connectivity structure of a static network; the networks are considered to be static in the sense that no compensatory measures are allowed for recovery of the original structure. Real world networks such as the world wide web, however, are not static and experience a considerable amount of turnover, where nodes and edges are both added and deleted. Considering degree-based node removals, we examine the possibility of preserving networks from these types of disruptions. We recover the original degree distribution by allowing the network to react to the attack by introducing new nodes and attaching their edges via specially tailored schemes. We focus particularly on the case of non-uniform failures, a subject that has received little attention in the context of evolving networks. Using a combination of analytical techniques and numerical simulations, we demonstrate how to preserve the exact degree distribution of the studied networks from various forms of attack.  相似文献   

17.
Along with the fast development of the marine economy and ever-increasing human activities, handy and reliable marine networking services are increasingly required in recent years. The ocean faces challenges to support cost-effective communication due to its special environments. Opportunistic networks with easy deployment and self-curing capability are expected to play an important role to adapt to such dynamic networking environments. In the literature, routing schemes for opportunistic networks mainly exploit node mobility and local relaying technologies. They did not take into account the impact of node behaviors on encountering opportunities and in case of no further relaying, network performance would be greatly degraded. To solve the problem, we propose an efficient routing scheme based on node attributes for opportunistic networks. We first construct delivery competency to predict the further relay nodes. Then a forwarding willingness mechanism is introduced to evaluate the relaying probability combining device capacity and movement behaviors of nodes. Finally, the utility metric is used to make decisions on message forwarding. The results show that the proposed scheme improves network performance in terms of delivery ratio, average latency, and overhead ratio as compared to other schemes.  相似文献   

18.
龚小刚  叶卫  方舟  王云烨 《应用声学》2017,25(12):263-266
针对复杂网络节点受攻击而出现的安全性问题,提出在模拟复杂网络基础上结合Feistel算法的子网络节点抵抗攻击方法。该方法通过子网络节点定位参数集,建立恶意节点位置模型,并确定定位真实精度;而后利用Feistel算法对节点密文进行加密处理,进而使加密信息恢复成明文信息,完成模拟复杂网络下子网络节点的抗攻击方法改进。结果证明,该方法不仅能够准确的对恶意节点进行定位,而且增强了节点抗攻击性能,提升了网络安全性。  相似文献   

19.
As smart home networks become increasingly complex and dynamic, maintaining trust between the various devices and services is crucial. Existing trust management approaches face challenges such as high computational overhead and difficulty in selecting optimal parameters. To address these challenges, we propose a new method for trust management in smart home networks based on swarm optimization, a principle of swarm intelligence. Our proposed approach is based on swarm optimization, which is a principle of swarm intelligence that optimizes communication patterns and manages trust values within the network. In SwarmTrust, the nodes in the smart home network are represented by particles, and the positions and velocities of these particles are adjusted to optimize communication patterns and reduce the computational burden on nodes. This optimization is achieved by evaluating the trust values of each node and adjusting the communication patterns accordingly. The proposed method integrates trust management with several distinct parameters and selects the parameters optimally to maintain efficiency. The proposed approach also addresses optimization challenges by monitoring communication patterns and managing trust values in a distributed manner, which reduces the computational burden on nodes and maintains efficiency. To evaluate the effectiveness of our proposed approach, we conducted simulation experiments and compared the performance of our approach with existing methods. Our results showed notable improvements in terms of computational efficiency and optimized computation.  相似文献   

20.
吕翎  商锦玉  朱佳博  沈娜  柳爽  张新 《物理学报》2012,61(14):140504-140504
研究了激光Maxwell-Bloch 方程时空混沌网络的同步问题.对单模激光Maxwell-Bloch方程进行了修正. 以N个修正后具有时空混沌特性的单模激光Maxwell-Bloch方程作为网络节点构成复杂网络. 在考虑到网络连接过程中,节点时空混沌系统中的参量可能受到某种干扰而与实际值产生微小偏差的情况下,采用网络第一个节点的时空混沌系统同时并行驱动其余N-1个时空混沌系统达到同步. 进一步通过仿真模拟验证了同步方案的有效性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号