this paper based on the food security, the food the macroeconomic regulation and control of the operation mechanism of the general theory, focus on the China's grain macroeconomic regulation and control mechanism, th...this paper based on the food security, the food the macroeconomic regulation and control of the operation mechanism of the general theory, focus on the China's grain macroeconomic regulation and control mechanism, the concept of grain macroeconomic regulation and control mechanism, the grain circulation macroeconomic regulation and control tool application, grain circulation macroeconomic regulation and control system, the problem of grain circulation system, food price formation mechanism. Through the research set up grain control of the operation mechanism of general theory.展开更多
A quantum secure direct communication protocol over a collective rotating channel is proposed. The protocol encodes logical bits in noiseless subspaces, and so it can function over a quantum channel subjected to an ar...A quantum secure direct communication protocol over a collective rotating channel is proposed. The protocol encodes logical bits in noiseless subspaces, and so it can function over a quantum channel subjected to an arbitrary degree of collective rotating noise. Although entangled states are used, both the sender and receiver are only required to perform single-particle product measurement or Pauli operations. The protocol is feasible with present-day technique.展开更多
The article is research on the traffic situations of freeways. Different rules make different traffic situations. It is meaningful to research on traffic situations under different conditions. The author analyzes fac...The article is research on the traffic situations of freeways. Different rules make different traffic situations. It is meaningful to research on traffic situations under different conditions. The author analyzes factors like traffic flow and safety, peflbrmance respectively, and proposes the theor3, basis for making more reasonable rules. The author first establishes evaluation system of traffic safety. Then, we compare the freeway network to power network to find a solution. and establish a traffic flow model based on power flow (TFPF). It calculates power flow. So it applies the formula mode back to the traffic network, chalking up the perforumnce of the traffic condition. We utilize cellular automata (CA) method to simulate traffic circulation, and verify the accuracy of above model with the obtained data.展开更多
This work is about the development of a super low noise amplifier with minimum power consumption and high gain for several wireless applications.The amplifier operates at frequency bands of 0.9-2.4 GHz and can be used...This work is about the development of a super low noise amplifier with minimum power consumption and high gain for several wireless applications.The amplifier operates at frequency bands of 0.9-2.4 GHz and can be used in many applications like Wireless local area network(WLAN),WiFi,Bluetooth,ZigBee and Global System for mobile communications(GSM).This new design can be employed for the IEEE 802.15.4 standard in industrial,scientific and medical(ISM) Band.The enhancement mode pseudomorphic high electron mobility transistor PHEMT is used here due to its high linearity,better performance and less noisy operation.The common source inductive degeneration method is employed here to enhance the gain of amplifier.The amplifier produces a gain of more than 17 dB and noise figure of about 0.5 dB.The lower values of S11 and S22 reflect the accuracy of impedance matching network placed at the input and output sides of amplifier.Agilent Advance Design System(ADS) is used for the design and simulation purpose.Further the layout of design is developed on the FR4 substrate.展开更多
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give...A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.展开更多
The delay and DVBMT problem is known to be NP-complete. In this paper,an efficient distributed dynamic multicast routing algorithm was proposed to produce routing trees with delay and delay variation constraints. The ...The delay and DVBMT problem is known to be NP-complete. In this paper,an efficient distributed dynamic multicast routing algorithm was proposed to produce routing trees with delay and delay variation constraints. The proposed algorithm is fully distributed,and supports the dynamic reorganizing of the multicast tree in response to changes for the destination. Simulations demonstrate that our algorithm is better in terms of tree delay and routing success ratio as compared with other existing algorithms,and performs excellently in delay variation performance under lower time complexity,which ensures it to support the requirements of real-time multimedia communications more effectively.展开更多
This work proposes two fault tolerant quantum secure direct communication (QSDC) protocols which are robust against two kinds of collective noises: the collective-dephasing noises and the collective-rotation noises...This work proposes two fault tolerant quantum secure direct communication (QSDC) protocols which are robust against two kinds of collective noises: the collective-dephasing noises and the collective-rotation noises, respectively. The two QSDC protocols are constructed from four-qubit DF states which consist of two logical qubits. The receiver simply performs two Bell state measurements (rather than four-qubit joint measurements) to obtain the secret message. The protocols have qubit efficiency twice that of the other corresponding fault tolerant QSDC protocols. Furthermore, the proposed protocols are free from Trojan horse attacks.展开更多
文摘this paper based on the food security, the food the macroeconomic regulation and control of the operation mechanism of the general theory, focus on the China's grain macroeconomic regulation and control mechanism, the concept of grain macroeconomic regulation and control mechanism, the grain circulation macroeconomic regulation and control tool application, grain circulation macroeconomic regulation and control system, the problem of grain circulation system, food price formation mechanism. Through the research set up grain control of the operation mechanism of general theory.
基金Supported by National Natural Science Foundation of China under Grant Nos. 60873191, 60903152, and 60821001SRFDP under Grant No. 200800131016+3 种基金Beijing Nova Program under Grant No. 2008B51Key Project of Chinese Ministry of Education under Grant No. 109014China Postdoctoral Science Foundation under Grant No. 20090450018the Beijing Natural Science Foundation under Grant No. 4072020
文摘A quantum secure direct communication protocol over a collective rotating channel is proposed. The protocol encodes logical bits in noiseless subspaces, and so it can function over a quantum channel subjected to an arbitrary degree of collective rotating noise. Although entangled states are used, both the sender and receiver are only required to perform single-particle product measurement or Pauli operations. The protocol is feasible with present-day technique.
文摘The article is research on the traffic situations of freeways. Different rules make different traffic situations. It is meaningful to research on traffic situations under different conditions. The author analyzes factors like traffic flow and safety, peflbrmance respectively, and proposes the theor3, basis for making more reasonable rules. The author first establishes evaluation system of traffic safety. Then, we compare the freeway network to power network to find a solution. and establish a traffic flow model based on power flow (TFPF). It calculates power flow. So it applies the formula mode back to the traffic network, chalking up the perforumnce of the traffic condition. We utilize cellular automata (CA) method to simulate traffic circulation, and verify the accuracy of above model with the obtained data.
基金supported by the National Natural Science Foundation of China(Grant no. 61202399,61571063)
文摘This work is about the development of a super low noise amplifier with minimum power consumption and high gain for several wireless applications.The amplifier operates at frequency bands of 0.9-2.4 GHz and can be used in many applications like Wireless local area network(WLAN),WiFi,Bluetooth,ZigBee and Global System for mobile communications(GSM).This new design can be employed for the IEEE 802.15.4 standard in industrial,scientific and medical(ISM) Band.The enhancement mode pseudomorphic high electron mobility transistor PHEMT is used here due to its high linearity,better performance and less noisy operation.The common source inductive degeneration method is employed here to enhance the gain of amplifier.The amplifier produces a gain of more than 17 dB and noise figure of about 0.5 dB.The lower values of S11 and S22 reflect the accuracy of impedance matching network placed at the input and output sides of amplifier.Agilent Advance Design System(ADS) is used for the design and simulation purpose.Further the layout of design is developed on the FR4 substrate.
基金Sponsored by the National Natural Science Foundation of China (No. 60973139, 61170065, 61171053, 61003039,61003236)the Natural Science Foundation of Jiangsu Province (BK2011755, BK2012436)+3 种基金Scientific & Technological Support Project of Jiangsu Province (BE2011844,BE2011189)Jiangsu Provincial Research Scheme of Natural Science for Higher Education Institutions(12KJB520009)Science & Technology Innovation Fundfor Higher Education Institutions of Jiangsu Province(CXZZ11-0405)the Peak of Six Major Talent inJiangsu Province (2010DZXX026)
文摘A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.
文摘The delay and DVBMT problem is known to be NP-complete. In this paper,an efficient distributed dynamic multicast routing algorithm was proposed to produce routing trees with delay and delay variation constraints. The proposed algorithm is fully distributed,and supports the dynamic reorganizing of the multicast tree in response to changes for the destination. Simulations demonstrate that our algorithm is better in terms of tree delay and routing success ratio as compared with other existing algorithms,and performs excellently in delay variation performance under lower time complexity,which ensures it to support the requirements of real-time multimedia communications more effectively.
基金supported by the National Science Council, Taiwan, China (Grant No. NSC98-2221-E-006-097-MY3)
文摘This work proposes two fault tolerant quantum secure direct communication (QSDC) protocols which are robust against two kinds of collective noises: the collective-dephasing noises and the collective-rotation noises, respectively. The two QSDC protocols are constructed from four-qubit DF states which consist of two logical qubits. The receiver simply performs two Bell state measurements (rather than four-qubit joint measurements) to obtain the secret message. The protocols have qubit efficiency twice that of the other corresponding fault tolerant QSDC protocols. Furthermore, the proposed protocols are free from Trojan horse attacks.