首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 406 毫秒
1.
As the Internet of Things (IoT) becomes increasingly popular, the amount of information transmitted through the IoT network has increased significantly. Therefore, the privacy and security problem of the transmitted information has become a major area of focus. Motivated by this, this paper considers the covert communication based on non-orthogonal multiple access (NOMA), which consists of a transmitter, a legal user, a warden with power detection function and a multi-antenna jammer. To realize the covert communication between the transmitter and the legitimate user, the detection error probability of the warden is firstly derived, and then the optimal detection threshold and the minimum detection error probability (MDEP) are obtained. In addition, with the aim of designing this system, the average MDEP of the warden is calculated, and the closed form solution for the outage probability (OP) of the communication link is obtained. Then, a scheme is proposed to optimize the covertness of this system under the covertness constraint and interruption constraint, through which the maximum covert throughput of the system can be obtained. The simulated numerical results validate the theoretical analysis, and testify that: (i) the detection performance of the warden can be reduced by increasing the maximum jamming power of the jammer or reducing the transmitting power of the transmitter; (ii) by optimizing the power allocation factor, the maximum covert throughput of the system can be obtained under the premise of satisfying the covertness constraint and interruption condition; (iii) the proposed optimization scheme can enhance the covertness performance of this system.  相似文献   

2.
Acousto-electro-optic scanners are introduced as time-division demultiplexing devices in optical fibre communication systems. These devices can time-demultiplex digital signals with multiple Gb s−1 data rates into a large number of channels. Acousto-electro-optic scanners combine the advantages of the large throughputs of acousto-optic scanners and the wide bandwidth of electro-optic scanners. Two-cell scanners are also introduced as a mean of increasing the time resolution by a factor of two compared with one-cell scanners.  相似文献   

3.
An opportunistic routing problem in a cognitive radio ad hoc network is investigated with an aim to minimize the interference to primary users (PUs) and under the constraint of a minimum end-to-end data rate for secondary users (SUs). Both amplify-and-forward (AF) and decode-and-forward (DF) relaying techniques are considered for message forwarding by SU nodes in the network. Unlike popular transmit power control based solutions for interference management in cognitive radio networks, we adopt a cross layer approach. The optimization problem is formulated as a joint power control, channel assignment and route selection problem. Next, closed form expression for transmission power is derived and corresponding channel selection scheme and routing metric are designed based on this solution. The proposed route selection schemes are shown to depend not only on gains of the interference channels between SUs and PUs but also on the values of the spectrum sensing parameters at the SU nodes in the network. Two distributed routing schemes are proposed based on our analysis; (i) optimal_DF and (ii) suboptimal_AF. The routing schemes could be implemented using existing table driven as well as on demand routing protocols. Extensive simulation results are provided to evaluate performance of our proposed schemes in random multihop networks. Results show significant reduction in PUs’ average interference experience and impressive performance as opportunistic routing schemes can be achieved by our schemes compared to traditional shortest path based routing schemes. Performance improvement is also reported over prominent recent schemes.  相似文献   

4.
This paper addresses the problem of distributed dynamic spectrum access in a cognitive radio (CR) environment utilizing deep recurrent reinforcement learning. Specifically, the network consists of multiple primary users (PU) transmitting intermittently in their respective channels, while the secondary users (SU) attempt to access the channels when PUs are not transmitting. The problem is challenging considering the decentralized nature of CR network where each SU attempts to access a vacant channel, without coordination with other SUs, which result in collision and throughput loss. To address this issue, a multi-agent environment is considered where each of the SUs perform independent reinforcement learning to learn the appropriate policy to transmit opportunistically so as to minimize collisions with other users. In this article, we propose two long short-term memory (LSTM) based deep recurrent Q-network (DRQN) architectures for exploiting the temporal correlation in the transmissions by various nodes in the network. Furthermore, we investigate the effect of the architecture on success rate with varying number of users in the network and partial channel observations. Simulation results are compared with other existing reinforcement learning based techniques to establish the superiority of the proposed method.  相似文献   

5.
6.
We present a review of new results which suggest the existence of fully stable spinning solitons (self-supporting localised objects with an internal vorticity) in optical fibres with self-focusing Kerr (cubic) nonlinearity, and in bulk media featuring a combination of the cubic self-defocusing and quadratic nonlinearities. Their distinctive difference from other optical solitons with an internal vorticity, which were recently studied in various optical media, theoretically and also experimentally, is that all the spinning solitons considered thus far have been found to be unstable against azimuthal perturbations. In the first part of the paper, we consider solitons in a nonlinear optical fibre in a region of parameters where the fibre carries exactly two distinct modes, viz., the fundamental one and the first-order helical mode. From the viewpoint of application to communication systems, this opens the way to doubling the number of channels carried by a fibre. Besides that, these solitons are objects of fundamental interest. To fully examine their stability, it is crucially important to consider collisions between them, and their collisions with fundamental solitons, in (ordinary or hollow) optical fibres. We introduce a system of coupled nonlinear Schrödinger equations for the fundamental and helical modes with nonstandard values of the cross-phase-modulation coupling constants, and show, in analytical and numerical forms, results of collisions between solitons carried by the two modes. In the second part of the paper, we demonstrate that the interaction of the fundamental beam with its second harmonic in bulk media, in the presence of self-defocusing Kerr nonlinearity, gives rise to the first ever example of completely stable spatial ring-shaped solitons with intrinsic vorticity. The stability is demonstrated both by direct simulations and by analysis of linearized equations.  相似文献   

7.
Packet-level observations are representative of the high sensitivity of TCP/RED computer network behavior with respect to network/RED parameter variations. That is, while we do not have any control on network parameters, mis-choosing of the RED parameters results in complex non-periodic oscillations in the router queue length that may damage the Quality of Service requirements. Characterizing the nature of such behaviors, however, helps the network designers to modify the RED design method in order to achieve better overall performance. In this paper, we first investigate the effect of variations in different RED parameters on the network behavior and then seek for the origin of such complex behaviors. For this purpose, different linear and nonlinear time series analysis methods have been applied to long-duration ns-2 packet-level data traces of a homogeneous TCP/RED network. The results of the analysis confirm that the complex behavior of the network can be represented by a nonlinear stochastic second-order process and it is not due to a deterministic chaos or a non-stationarity in the network.  相似文献   

8.
In order to explore further the underlying mechanism of scale-free networks, we study stochastic secession as a mechanism for the creation of complex networks. In this evolution the network growth incorporates the addition of new nodes, the addition of new links between existing nodes, the deleting and rewiring of some existing links, and the stochastic secession of nodes. To random growing networks with preferential attachment, the model yields scale-free behavior for the degree distribution. Furthermore, we obtain an analytical expression of the power-law degree distribution with scaling exponent γ ranging from 1.1 to 9. The analytical expressions are in good agreement with the numerical simulation results.  相似文献   

9.
As information technology has advanced, people are turning to electronic media more frequently for communication, and social relationships are increasingly found on online channels. However, there is very limited knowledge about the actual evolution of the online social networks. In this paper, we propose and study a novel evolution network model with the new concept of “last updating time”, which exists in many real-life online social networks. The last updating evolution network model can maintain the robustness of scale-free networks and can improve the network reliance against intentional attacks. What is more, we also found that it has the “small-world effect”, which is the inherent property of most social networks. Simulation experiment based on this model show that the results and the real-life data are consistent, which means that our model is valid.  相似文献   

10.
This paper deals with estimation of parameters for motion blurred images. The objectives are to estimate the length (L) and the blur angle (θ) of the given degraded image as accurately as possible so that the restoration performance can be optimised. Gabor filter is utilized to estimate the blur angle whereas a trained radial basis function neural network (RBFNN) estimates the blur length. Once these parameters are estimated the conventional restoration is performed. To validate the proposed scheme, simulation has been carried out on standard images as well as in real images subjected to different blur angles and lengths. The robustness of the scheme is also validated in noise situations of different strengths. In all situations, the results have been compared with standard schemes. It is in general observed that the proposed scheme outperforms its counterparts in terms of restoration parameters and visual quality.  相似文献   

11.
刘文斌  丁建锋  寇云峰  王梦寒  宋滔 《强激光与粒子束》2019,31(10):103215-1-103215-5
物理隔离网络的电磁攻击手段, 其主要目标是建立与外部互联网的隐蔽连接通道。近年来跨越物理隔离网络的方法和工具被陆续公开, 相应的分析方法和检测手段也逐步被国内外安全团队提出。掌握漏洞才能掌握网络安全的主动权, 对比网络安全漏洞, 电磁漏洞定义为能对设备或系统造成损害的电磁因素。以物理隔离网络为例, 电磁漏洞主要指的是网络的硬件和系统缺陷, 利用这些缺陷可以直接建立或通过植入恶意软件建立能突破物理隔离的电磁信号的信息收、发隐蔽通道。通过广泛的漏洞挖掘与验证, 从物理信号类型、信息传递方向、信号生成与作用机理、漏洞利用方式以及漏洞检测方法上提出物理隔离网络电磁漏洞分类方法; 通过综合借鉴网络安全漏洞、电磁信息安全检测、物理隔离隐蔽通道等领域的研究方法, 提出电磁漏洞的研究方法; 从深化主动检测、群智漏洞挖掘、网络电磁安全融合、大数据监测等角度, 提出了物理隔离网络电磁漏洞库的建立方法。  相似文献   

12.
Utilizing three non-maximally entangled qutrit pairs as quantum channels, we first propose a generalized tripartite scheme for sharing an arbitrary two-qutrit state with generalized Bell-state measurements. In the scheme if and only if the two recipients collaborate together, they can recover the split qutrit state with the probability determined uniquely by the smallest coefficients of the non-maximally entangled pairs. Afterwards, we further extend the scheme for sharing an arbitrary 2n-qudit state by taking 3n non-maximally entangled qudit pairs as quantum channels. Moreover, the scheme success probability relative to the inherent entanglement in quantum channels and its structure is simply discussed.  相似文献   

13.
In order to meet the requirements of communication security and concealment, as well as to protect marine life, bionic covert communication has become a hot research topic for underwater acoustic communication (UAC). In this paper, we propose a bionic covert UAC (BC-UAC) method based on the time–frequency contour (TFC) of the bottlenose dolphin whistle, which can overcome the safety problem of traditional low signal–noise ratio (SNR) covert communication and make the detected communication signal be excluded as marine biological noise. In the proposed BC-UAC method, the TFC of the bottlenose dolphin whistle is segmented to improve the transmission rate. Two BC-UAC schemes based on the segmented TFC of the whistle, the BC-UAC scheme using the whistle signal with time-delay (BC-UAC-TD) and the BC-UAC scheme using the whistle signal with frequency-shift (BC-UAC-FS), are addressed. The original whistle signal is used as a synchronization signal. Moreover, the virtual time reversal mirror (VTRM) technique is adopted to equalize the channel for mitigating the multipath effect. The performance of the proposed BC-UAC method, in terms of the Pearson correlation coefficient (PCC) and bit error rate (BER), is evaluated under simulated and measured underwater channels. Numerical results show that the proposed BC-UAC method performs well on covertness and reliability. Furthermore, the covertness of the bionic modulated signal in BC-UAC-TD is better than that of BC-UAC-FS, although the reliability of BC-UAC-FS is better than that of BC-UAC-TD.  相似文献   

14.
This article examines a multiuser intelligent reflecting surface (RIS) aided mobile edge computing (MEC) system, where multiple edge nodes (ENs) with powerful calculating resources at the network can help compute the calculating tasks from the users through wireless channels. We evaluate the system performance by using the performance metric of communication and computing delay. To enhance the system performance by reducing the network delay, we jointly optimize the unpacking design and wireless bandwidth allocation, whereas the task unpacking optimization is solved by using the deep deterministic policy gradient (DDPG) algorithm. As to the bandwidth allocation, we propose three analytical solutions, where criterion I performs an equal bandwidth allocation, criterion II performs the allocation based on the transmission data rate, while criterion III performs the allocation based on the transmission delay. We finally provide simulation results to show that the proposed optimization on the task unpacking and bandwidth allocation is effective in decreasing the network delay.  相似文献   

15.
Bandwidth Allocation Method by Service for WDM EPON   总被引:2,自引:0,他引:2  
A WDM(Wavelength Division Multiplexing) EPON(Ethernet Passive Optical Network) is an economical and efficient access network that has attracted significant research attention in recent years. A MAC(Media Access Control) Protocol of PON is based on TDMA(Time Division Multiple Access) basically, we can classify this protocol into a fixed length slot assignment method suitable for leased line supporting Qos(Quality of Service) and a variable length slot assignment method suitable for LAN/MAN with the best efforts. In this paper, we present bandwidth allocation method by service for WDM EPON and verify this method by simulation results.  相似文献   

16.
In this paper, we propose a well targeted algorithm (GAS algorithm) for detecting communities in high clustered networks by presenting group action technology on community division. During the processing of this algorithm, the underlying community structure of a clustered network emerges simultaneously as the corresponding partition of orbits by the permutation groups acting on the node set are achieved. As the derivation of the orbit partition, an algebraic structure r-cycle can be considered as the origin of the community. To be a priori estimation for the community structure of the algorithm, the community separability is introduced to indicate whether a network has distinct community structure. By executing the algorithm on several typical networks and the LFR benchmark, it shows that this GAS algorithm can detect communities accurately and effectively in high clustered networks. Furthermore, we compare the GAS algorithm and the clique percolation algorithm on the LFR benchmark. It is shown that the GAS algorithm is more accurate at detecting non-overlapping communities in clustered networks. It is suggested that algebraic techniques can uncover fresh light on detecting communities in complex networks.  相似文献   

17.
A multichannel S-matrix framework for singular quantum mechanics (SQM) subsumes the renormalization and self-adjoint extension methods and resolves its boundary-condition ambiguities. In addition to the standard channel accessible to a distant (“asymptotic”) observer, one supplementary channel opens up at each coordinate singularity, where local outgoing and ingoing singularity waves coexist. The channels are linked by a fully unitary S-matrix, which governs all possible scenarios, including cases with an apparent nonunitary behavior as viewed from asymptotic distances.  相似文献   

18.
Magnetic resonance imaging (MRI) provides a powerful tool for the investigation of chemical structures in optically opaque porous media, in which chemical concentration gradients can be visualized, and diffusion and flow properties are simultaneously determined. In this paper we give an overview of the MRI technique and review theory and experiments on the formation of chemical waves in a tubular packed bed reactor upon the addition of a nonlinear chemical reaction. MR images are presented of reaction-diffusion waves propagating in the three-dimensional (3D) network of channels in the reactor, and the 3D structure of stationary concentration patterns formed via the flow-distributed oscillation mechanism is demonstrated to reflect the local hydrodynamics in the packed bed. Possible future directions regarding the influence of heterogeneities on transport and reaction are discussed.  相似文献   

19.
Conventional Cooperative spectrum sensing techniques either suffer from single point of failure attack or lack in providing incentives to users which makes them incompatible for Wireless Service Provider (WSP). We propose a dynamic spectrum access framework for WSP which gives prominence to automated sensing and sharing with the use of blockchain. In this system, the opportunity of spectrum access is first examined by sensor nodes and the access right is then allocated to the users when their transactions to WSP are authenticated in a decentralized manner. Apart from using blockchain as a reliable platform for automatic enforcement of spectrum sensing, we propose a novel mechanism for securing our network from the threats designed primarily for Cognitive Radio Networks. In addition to this, our proposed approach enhances the scalability of blockchain networks by using the sidechains for storing data and checkpointing it onto main chain after periodic intervals of time. Extensive simulations in Octave indicate superior performance offered by our proposed model.  相似文献   

20.
Low probability of detection (LPD) communications are conducted at a low received signal-to-noise ratio (SNR) to deter eavesdroppers to sense the presence of the transmitted signal. Successful detection at intended receiver heavily relies on the processing gain achieved by employing the direct-sequence spread-spectrum (DSSS) technique. For scenarios that lack a sufficiently low SNR to maintain LPD, another metric, referred to as low probability of interception (LPI), is of interest to protect the privacy of the transmitted information. If covert communications take place in underwater acoustic (UWA) environments, then additional challenges are present. The time-varying nature of the UWA channel prevents the employment of a long spreading waveform. Furthermore, UWA environments are frequency-selective channels with long memory, which imposes challenges to the design of the spreading waveform. In this paper, a covert UWA communication system that adopts the DSSS technique and a coherent RAKE receiver is investigated. Emphasis is placed on the design of a spreading waveform that not only accounts for the transceiver structure and frequency-selective nature of the UWA channel, but also possesses a superior LPI. The proposed techniques are evaluated using both simulated and SPACE'08 in-water experimental data.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号