共查询到20条相似文献,搜索用时 0 毫秒
1.
Vishav Jyoti 《Optik》2011,122(9):787-791
In this paper, the security enhanced OCDMA system based on spectral encoding using code-switching scheme is analyzed. The security issues are investigated by measuring eye diagrams and received signals for various cases. It has been observed; an eavesdropper based on a simple energy detector can easily read the information being transmitted by a single user using on-off keying. In order to increase the security a code-switching scheme is implemented on OCDMA. It is shown that the eye diagram at the eavesdropper becomes true noise waveform due to code-switching scheme and at the receiver end a clear eye diagram is observed. Hence, it is concluded that the code-switching scheme shows an immunity of the OCDMA system against eavesdropping and like conventional OCDMA schemes an authorized user clearly decodes an original data when a single user is active in the network. 相似文献
2.
该文首先简要介绍了软件无线电的基本原理和基于软件无线电的射频接收系统的3种结构形式:射频全宽开低通采样结构,射频直接带通采样结构和宽带中频带通采样结构;并介绍了磁共振成像(MRI)回波信号接收的基本原理和将软件无线电方法应用于MRI回波信号接收的意义. 然后该文重点介绍了采用3种软件无线电结构实现MRI回波信号接收系统的具体设计方案,包括接收系统方框图、工作原理、设计参数的选择和分析、部分功能模块的实现方法、设计和实现中需要注意的问题. 最后以一个低场通用MRI回波接收系统为实例,分析比较了3种设计方案并给出了实际系统的测试结果. 相似文献
3.
4.
C. Reichhardt C.J. Olson Reichhardt 《Physica C: Superconductivity and its Applications》2010,470(19):722-725
We examine jamming and ratchet effects for vortex matter in superconductors with asymmetric funnel geometries. We show that the vortex–vortex interactions can induce a clogging or jamming effect where it becomes increasingly difficult for the vortices to move through the system. We also find that commensurability effects can arise when certain vortex configurations form highly symmetrical structures in the funnel plaquettes. Due to the asymmetry, the critical currents are different for driving in different directions, leading to a diode effect. We also discuss other possible geometries and approaches that could be used to explore jamming in vortex matter, such as an analog to a granular hopper and a single driven vortex probe moving through an array of other vortices. 相似文献
5.
We report experimental studies of jamming phenomenon of monodisperse metal disks falling through a two-dimensional hopper
when the hopper opening is larger than three times the size of the disks. For each jamming event, the configuration of the
arch formed at the hopper opening is studied. The cumulative distribution functionsf
d
(X) for hoppers of opening sized are measured. (HereX is the horizontal component of the arch vector, which is defined as the displacement vector from the center of the first
disk to the center of the last disk in the arch.) We found that the distribution off
d
(X) can be collasped into a master curveG(X) = f
d
(X)μ(d) that decays exponentially forX > 4. The scaling factorμ(d) is a decreasing function ofd and is approximately proportional to the jamming probability. 相似文献
6.
As a new approach the heterodyne frequency offset locking system which is applicable to a broad range of pulsed lasers is described. A 100 MHz wide-band and all-digital frequency discriminating technique is presented and an offset locking loop in which the frequency discriminator works accordingly is designed. The result of the experiment on offset locking between a CW CO2 laser and an electro-optically Q-switched CO2 laser with an optical pulse width 300 ns and its repetition rate 20 kHz showed that the beat frequency stability was kept within ±2 MHz. 相似文献
7.
Amorphous materials as diverse as foams, emulsions, colloidal suspensions and granular media can jam into a rigid, disordered state where they withstand finite shear stresses before yielding. Here we give a simple introduction to the surprising physics displayed by a very simple model system for the jamming transition: frictionless, soft spheres at zero temperature and zero shear that act through purely repulsive contact forces. This system starts to become rigid, i.e. goes through the jamming transition, whenever the confining pressure becomes positive. We highlight some of the remarkable geometrical features of the zero pressure jamming point and discuss the peculiar mechanical properties of these systems for small pressures. 相似文献
8.
We consider an experimental setup of three Universal Software Radio Peripherals (USRPs) that implement a wiretap channel, two USRPs are the legitimate players Alice and Bob, while the third USRP is the eavesdropper, whose position we vary to evaluate information leakage. The experimented channels are close to slow fading channels, and coset coding of lattice constellations is used for transmission, allowing to introduce controlled randomness at the transmitter. Simulation and measurement results show to which extent coset coding can provide confidentiality, as a function of Eve’s position, and the amount of randomness used. 相似文献
9.
设计了一个取样位置能在射频辉光放电等离子体电极间自由移动的取样装置,用质谱计测量了SiCl4等离子体的离子信号。提出了一种线性拟合的方法用于计算SiCl4等离子体的消耗率,利用测量的离子信号,计算出了SiCl4等离子体中SiCln(n=0~2)中性基团的空间分布。实验结果表明,可移动质谱取样装置的设计是合理的;用线性拟合方法得到的等离子体消耗率和中性基团的相对密度,比以前的方法得到的更精确。 相似文献
10.
Spoofing relay is an effective way for legitimate agencies to monitor suspicious communication links and prevent malicious behaviors. The unmanned aerial vehicles(UAVs)-assisted wireless information surveillance system can virtually improve proactive eavesdropping efficiency thanks to the high maneuverability of UAVs. This paper aims to maximize the eavesdropping rate of the surveillance system where the UAV is exploited to actively eavesdrop by spoofing relay technology. We formulate the problem to jointly optimize the amplification coefficient, splitting ratio, and UAV’s trajectory while considering successful monitoring. To make the nonconvex problem tractable, we decompose the problem into three sub-problems and propose a successive convex approximation based alternate iterative algorithm to quickly obtain the near-optimal solution. The final simulation results show that the UAV as an active eavesdropper can effectively increase the information eavesdropping rate than a passive eavesdropper. 相似文献
11.
可控量子秘密共享协议窃听检测虚警概率分析 总被引:2,自引:2,他引:0
对孙莹等提出的利用Greenberger-Horne-Zeilinger态实现的可控量子秘密共享协议Alice-Bob信道和Alice-Charlie信道窃听检测的虚警概率进行分析,指出该协议窃听检测虚警概率不为0的原因在于窃听检测测量基选择的随机性.然后,提出一种改进的利用Greenberger-HorneZeilinger态实现的可控量子秘密共享协议,以确定性的方式选择窃听检测的测量基.理论分析表明,改进的利用Greenberger-Horne-Zeilinger态实现的可控量子秘密共享协议不仅能够以原协议2倍的概率发现任何一个内部不可信方,从而具有更高的安全性,而且窃听检测虚警概率达到0. 相似文献
12.
13.
对孙莹等提出的利用Greenberger-Horne-Zeilinger态实现的可控量子秘密共享协议Alice-Bob信道和Alice-Charlie信道窃听检测的虚警概率进行分析,指出该协议窃听检测虚警概率不为0的原因在于窃听检测测量基选择的随机性.然后,提出一种改进的利用Greenberger-Horne-Zeilinger态实现的可控量子秘密共享协议,以确定性的方式选择窃听检测的测量基.理论分析表明,改进的利用Greenberger-Horne-Zeilinger态实现的可控量子秘密共享协议不仅能够以原协议2倍的概率发现任何一个内部不可信方,从而具有更高的安全性,而且窃听检测虚警概率达到0. 相似文献
14.
《中国物理 B》2021,30(6):66101-066101
Enormous progresses to understand the jamming transition have been driven via simulating purely repulsive particles which were somehow idealized in the past two decades. While the attractive systems are both theoretical and practical compared with repulsive systems. By studying the statistics of rigid clusters, we find that the critical packing fraction φ_c varies linearly with attraction μ for different system sizes when the range of attraction is short. While for systems with long-range attractions, however, the slope of φ_c appears significantly different, which means that there are two distinct jamming scenarios. In this paper, we focus our main attention on short-range attractions scenario and define a new quantity named \"short-range attraction susceptibility\" χ_p, which describes the degree of response of the probability of finding jammed states pjto short-range attraction strength μ. Our central results are that χ_p diverges in the thermodynamic limit as χ_p ∝|φ-φ_c~∞|~(-γ_p), where φ_c~∞ is the packing fraction at the jamming transition for the infinite system in the absence of attraction. χ_p obeys scaling collapse with a scaling function in both two and three dimensions, illuminating that the jamming transition can be considered as a phase transition as proposed in previous work. 相似文献
15.
黄氏傅里叶计算全息图的数字再现及零级像的消除 总被引:8,自引:3,他引:5
将数字再现技术应用于黄氏(T.S. Huang)傅里叶计算全息图的再现过程, 制作计算全息图,利用数字再现直接在计算机上完成全息图的再现.直接利用数字图像处理的方法对所得计算全息图进行滤波处理,消除了零级像和原始像,使得数字再现时得到了清晰的再现像,并给出了所制作的计算全息图以及数字再现的结果. 相似文献
16.
We investigate kinetically constrained models of glassy transitions, and determine which model characteristics are crucial
in allowing a rigorous proof that such models have discontinuous transitions with faster than power law diverging length and
time scales. The models we investigate have constraints similar to that of the knights model, introduced by Toninelli, Biroli,
and Fisher (TBF), but differing neighbor relations. We find that such knights-like models, otherwise known as models of jamming
percolation, need a “No Parallel Crossing” rule for the TBF proof of a glassy transition to be valid. Furthermore, most knights-like
models fail a “No Perpendicular Crossing” requirement, and thus need modification to be made rigorous. We also show how the
“No Parallel Crossing” requirement can be used to evaluate the provable glassiness of other correlated percolation models,
by looking at models with more stable directions than the knights model. Finally, we show that the TBF proof does not generalize
in any straightforward fashion for three-dimensional versions of the knights-like models. 相似文献
17.
�����NBI ��Ƶ����Դ����������Ʒ��� 总被引:1,自引:0,他引:1
为探究射频离子源驱动器线圈电气参数对射频放电的影响,主要进行了射频离子源等离子体激发的物理分析,并计算了射频电源的频率选择与线圈放电电流、线圈匝间电压以及放电气压之间的关系,设计了射频离子源驱动器的主要参数。研制的射频离子源驱动器装置,成功获得氢等离子体射频放电。实验结果和理论计算结果符合很好。 相似文献
18.
RF脉冲展宽器用来把高功率窄脉冲变换为较低功率的长脉冲,CLIC实验装置CTFⅡ中的功率提取结构已经可以提供功率达280MW,脉宽16ns的30GHz RF脉冲,为了用它来研究加速结构的最高表面场强和脉宽的关系,设计了30GHz RF脉冲展宽器,完成了系统设计,微波部件的设计及加工,系统的调试,最后安装在CTFⅡ上,并成功进行了高功率实验. 相似文献
19.
20.
为探究射频离子源驱动器线圈电气参数对射频放电的影响,主要进行了射频离子源等离子体激发的物理分析,并计算了射频电源的频率选择与线圈放电电流、线圈匝间电压以及放电气压之间的关系,设计了射频离子源驱动器的主要参数。研制的射频离子源驱动器装置,成功获得氢等离子体射频放电。实验结果和理论计算结果符合很好。 相似文献