A three-party scheme for splitting an arbitrary unknown two-qutrit state is proposed,where two non-maximally-entangled three-qutrit states are taken as the quantum channel among three parties.With the sender'shelp...A three-party scheme for splitting an arbitrary unknown two-qutrit state is proposed,where two non-maximally-entangled three-qutrit states are taken as the quantum channel among three parties.With the sender'shelp,if and only if both receivers collaborate together,they can securely share the quantum state in a probabilisticway by introducing an ancilla qutrit and performing appropriate unitary operations.The relation between the successprobability and coefficients characterizing the quantum channel is revealed.The security of the present scheme is analyzedand confirmed.Moreover,the generalization of the three-party scheme to more-party case is also sketched.展开更多
Mass transfer enhancement of gas absorption by adding a dispersed organic phase has been studied in this work. Various dispersed organic phases (heptanol, octanol, isoamyl alcohol, heptane, octane, and isooctane) we...Mass transfer enhancement of gas absorption by adding a dispersed organic phase has been studied in this work. Various dispersed organic phases (heptanol, octanol, isoamyl alcohol, heptane, octane, and isooctane) were tested respectively in the experiment. According to the theoretical model and experimental data, the overall volumetric mass transfer coefficient and enhancement factor were obtained under different dispersed organic phase volume fraction and stirring speed. The experimental results indicate that gas-liquid mass transfer is enhanced at different level by adding a dispersed organic phase. The best performance of enhancement were achieved with the dispersed organic phase volumetric fraction of 5% and under an intermediate stirring speed of 670 r·min^-1. Among the organic phases tested in the experiment, alcohols show better performance, which gave 20% higher enhance-ment of overall volumetric mass transfer coefficient than adding alkanes.展开更多
The relation between the critical radius and the particle size distribution for generalized Ostwald type ripening processes whereby the mass transfer coefficient is modelled by a power law was derived. The critical ra...The relation between the critical radius and the particle size distribution for generalized Ostwald type ripening processes whereby the mass transfer coefficient is modelled by a power law was derived. The critical radius is determined by the growth rate, the mass transfer coefficient and the mass balance, and is independent of whether the limiting stationary growth regime has been obtained.展开更多
In this paper a practical but sufficiently accurate method of calculating transient components in short circuit currents and voltages is proposed. It enables to find the roots of the chara...In this paper a practical but sufficiently accurate method of calculating transient components in short circuit currents and voltages is proposed. It enables to find the roots of the characteristic equation of high order without forming and solving it. This method is convenient to use especially in case of complicated expansionary power systems.展开更多
A semi-quantum model for energy transport in collagen molecules is presented. Soliton-like dynamics of this model is investigated numerically without and with the temperature effect taking into account. It is found th...A semi-quantum model for energy transport in collagen molecules is presented. Soliton-like dynamics of this model is investigated numerically without and with the temperature effect taking into account. It is found that in both the cases energy can transport for a long distance along the collagen chain. This indicates that collagen molecules can be taken as a candidate for the acupuncture channel.展开更多
The performance of interfered cooperative ad-hoc networks is analyzed by stochastic geometry analysis and a selection region of relay is presented. First, assuming that the distribution of nodes in the random network ...The performance of interfered cooperative ad-hoc networks is analyzed by stochastic geometry analysis and a selection region of relay is presented. First, assuming that the distribution of nodes in the random network follows the Poisson point process (PPP), a closed-form expression of the outage probability is derived for the best relay selection (BRS) scheme. Secondly, the capacity of the network is presented for this scheme. Finally, a performance factor is defined to evaluate the performance gain obtained from the BRS. By using this factor, a relay selection region is found to guarantee the performance gain from the BRS. The analysis and simulation results show that the performance of the BRS not only depends on the densities of source nodes and relay nodes but also on the factors of networks such as the path loss factor and the decoding threshold. And the BRS has a greater advantage than direct transmission (DT) in hush environments such as the long transmission distances, much interference and the high decoding thresholds.展开更多
The technique of phase measuring profilometry using a single phase step method is proposed.This method can automatically obtain phase value at each pixel by using a discret cosine transform algorithm.The method is abl...The technique of phase measuring profilometry using a single phase step method is proposed.This method can automatically obtain phase value at each pixel by using a discret cosine transform algorithm.The method is able to automatically recognize any position between depression and elevation on an object surface.Theoretical analysis and experimental verification are presented.展开更多
Energy efficiency(EE) is a key requirement for the design of short-range communication network.In order to alleviate energy consumption(EC) constraint,a novel layered heterogeneous mobile cloud architecture is propose...Energy efficiency(EE) is a key requirement for the design of short-range communication network.In order to alleviate energy consumption(EC) constraint,a novel layered heterogeneous mobile cloud architecture is proposed in this paper.Based on the proposed layered heterogeneous mobile cloud architecture,we establish an appropriate energy consumption model,and design an energy efficiency scheme based on joint data packet fragmentation and cooperative transmission and analyze the energy efficiency corresponding to different packet sizes and the cloud size.Simulation results show that,when all nodes of the cloud are accessing the same size of data packet fragmentation,the proposed layered heterogeneous mobile cloud architecture can provide significant energy savings.The results provide useful insights into the possible operation of the strategies and show that significant energy consumption reductions are possible.展开更多
A continuous variable ping-pong scheme, which is utilized to generate deterministic private key, is proposed. The proposed scheme is implemented physically by using Ganssian-modulated squeezed states. The deterministi...A continuous variable ping-pong scheme, which is utilized to generate deterministic private key, is proposed. The proposed scheme is implemented physically by using Ganssian-modulated squeezed states. The deterministic char- acteristic, i.e., no basis reconciliation between two parties, leads a nearly two-time efficiency comparing to the standard quantum key distribution schemes. Especially, the separate control mode does not need in the proposed scheme so that it is simpler and more available than previous ping-pong schemes. The attacker may be detected easily through the fidelity of the transmitted signal, and may not be successful in the beam splitter attack strategy.展开更多
In order to realize mass transfer analysis for microwave hot in-place recycling of asphalt pavements, a volume element is established including asphalt mixtures, liquid water and vapor. A mass transfer control model i...In order to realize mass transfer analysis for microwave hot in-place recycling of asphalt pavements, a volume element is established including asphalt mixtures, liquid water and vapor. A mass transfer control model is built by the theory of multiphysics, phase transformation and diffusion. The model contains continuity equation, energy conservation equation, movement equation and vapor diffusion equation. To gain the solution of the mass transfer model, the formulas are simplified to one-dimensional differential equations. And then a mathematical model of boundary conditions is established. The mass transfer velocity and dissipative energy are obtained in different moisture contents through simulation of asphalt pavements recycling. The result indicates that when initial moisture content is certain, mass transfer velocity is almost uniform in depth direction at the same heating time and enertrv absorbed by water i,~ descendino with denletion of moisture.展开更多
The present investigation addresses the simultaneous effects of heat and mass transfer in the mixed convection peristaltic flow of viscous fluid in an asymmetric channel. The channel walls exhibit the convective bound...The present investigation addresses the simultaneous effects of heat and mass transfer in the mixed convection peristaltic flow of viscous fluid in an asymmetric channel. The channel walls exhibit the convective boundary conditions. In addition, the effects due to Soret and Dufour are taken into consideration. Resulting problems are solved for the series solutions. Numerical values of heat and mass transfer rates are displayed and studied. Results indicate that the concentration and temperature of the fluid increase whereas the mass transfer rate at the wall decreases with increase of the mass transfer Biot number. Furthermore, it is observed that the temperature decreases with the increase of the heat transfer Biot number.展开更多
In this study, the transmission capacity of VANETs in a highway scenario is analysed on the basis of a 1D line model and the carrier sense multiple access with collision avoidance(CSMA/CA) protocol. We describe the CS...In this study, the transmission capacity of VANETs in a highway scenario is analysed on the basis of a 1D line model and the carrier sense multiple access with collision avoidance(CSMA/CA) protocol. We describe the CSMA/CA protocol used in IEEE802.11 p from the perspective of the geometric relationship amongst simultaneous transmitters. The desired channel and interfering channels are assumed to experience the same amount of path-loss and Rayleigh fading. On the basis of the proposed model, we analyse the attempted transmission probability of each road segment and the maximum intensity of active transmitters, including their theoretical values. Then, we employ the physical model to obtain the outage probability and derive the upper bound of the transmission capacity of a VANET, which is defined as the average spatial density of successful transmissions in the network. Simulation results indicate that the theoretical value offers a good bound on network capacity.展开更多
To evaluate transmission rate of highly dynamic space networks,a new method for studying space network capacity is proposed in this paper. Using graph theory,network capacity is defined as the maximum amount of flows ...To evaluate transmission rate of highly dynamic space networks,a new method for studying space network capacity is proposed in this paper. Using graph theory,network capacity is defined as the maximum amount of flows ground stations can receive per unit time. Combined with a hybrid constellation model,network capacity is calculated and further analyzed for practical cases. Simulation results show that network capacity will increase to different extents as link capacity,minimum ground elevation constraint and satellite onboard processing capability change. Considering the efficiency and reliability of communication networks,how to scientifically design satellite networks is also discussed.展开更多
A new effective and reliabl e channel-timeslot allocation algorithm has been proposed, which is applied in WD M optical networks using fiber as their media to allocate the operational reques t. This new algorithm can ...A new effective and reliabl e channel-timeslot allocation algorithm has been proposed, which is applied in WD M optical networks using fiber as their media to allocate the operational reques t. This new algorithm can differentiate the priority of all requests and avoid c onflict and collision in the process of distributing channel and timeslot for th e data waiting for transmission. The method in calculating the best wavelength c hannel and the best timeslot number is simply given. The algorithm is carried o ut in a math language. On the basis of the experiment results, the performance a nd feasibility of the algorithm are analyzed, which prove that the allocation me thod can reach the requirements of an algorithm both in space complexity and tim e complexity .展开更多
It has been shown that a quantum state could be perfectly transferred via a spin chain with engineered'always-on interaction'.In this paper,we study a more realistic problem for such a quantum state transfer (...It has been shown that a quantum state could be perfectly transferred via a spin chain with engineered'always-on interaction'.In this paper,we study a more realistic problem for such a quantum state transfer (QST)protocol,how the efficacy of QST is reduced by the quantum decoherence induced by a spatially distributed environment.Here,the environment is universally modeled as a bath of fermions located in different positions.By making use of theirreducible tensor method in angular momentum theory,we investigate the effect of environment on the efficiency of QSTfor both cases at zero and finite temperatures.We not only show the generic exponential decay of QST efficiency as thenumber of sites increase,but also find some counterintuitive effect,the QST can be enhanced as temperature increasesin some cases.展开更多
The security of quantum key distribution(QKD)is severely threatened by discrepancies between realistic devices and theoretical assumptions.Recently,a significant framework called the reference technique was proposed t...The security of quantum key distribution(QKD)is severely threatened by discrepancies between realistic devices and theoretical assumptions.Recently,a significant framework called the reference technique was proposed to provide security against arbitrary source flaws under current technology such as state preparation flaws,side channels caused by mode dependencies,the Trojan horse attacks and pulse correlations.Here,we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.We present a characterization of source flaws and connect them to experiments,together with a finite-key analysis against coherent attacks.In addition,we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 d B channel loss.Compared with previous QKD protocols with imperfect devices,our study considerably improves both the secure key rate and the transmission distance,and shows application potential in the practical deployment of secure QKD with device imperfections.展开更多
To meet the requirement of high-quality transmission of videos captured by unmanned aerial vehicles (UAV) with low bandwidth, a novel rate control (RC) scheme based on region-of-interest (ROI) is proposed. First...To meet the requirement of high-quality transmission of videos captured by unmanned aerial vehicles (UAV) with low bandwidth, a novel rate control (RC) scheme based on region-of-interest (ROI) is proposed. First, the ROI information is sent to the encoder with the latest high efficient video coding (HEVC) standard to generate an ROI map. Then, by using the ROI map, bit allocation methods are developed at frame level and large coding unit (LCU) level, to avoid inaccurate bit allocation produced by camera movement. At last, by using a better robustness R-2 model, the quantization parameter (QP) for each LCU is calculated. The experimental results show that the proposed RC method can get a lower bitrate error and a higher quality for reconstructed video by choosing appropriate pixel weight on the HEVC platform.展开更多
Considering the air-water interface and ocean water’s optical attenuation,the performance of quantum key distribution(QKD)based on air-water channel is studied.The effects of photons’various incident angles to air-w...Considering the air-water interface and ocean water’s optical attenuation,the performance of quantum key distribution(QKD)based on air-water channel is studied.The effects of photons’various incident angles to air-water interface on quantum bit error rate(QBER)and the maximum secure transmission distance are analyzed.Taking the optical attenuation of ocean water into account,the performance bounds of QKD in different types of ocean water are discussed.The simulation results show that the maximum secure transmission distance of QKD gradually reduces as the incident angle from air to ocean water increases.In the clearest ocean water with the lowest attenuation,the maximum secure transmission distance of photons far exceeds the the working depth of underwater vehicles.In intermediate and murky ocean waters with higher attenuation,the secure transmission distance shortens,but the underwater vehicle can deploy other accessorial methods for QKD with perfect security.So the implementation of OKD between the satellite and the underwater vehicle is feasible.展开更多
基金the Program for New Century Excellent Talents at Universities of China under Grant No.NCET-06-0554National Natural Science Foundation of China under Grant Nos.60677001 and 10747146+2 种基金the Science-Technology Fund of Anhui Province for Outstanding Youth under Grant No.06042087the Key Fund of the Ministry of Education of China under Grant No.206063the Natural Science Foundation of Guangdong Province under Grant Nos.06300345 and 7007806
文摘A three-party scheme for splitting an arbitrary unknown two-qutrit state is proposed,where two non-maximally-entangled three-qutrit states are taken as the quantum channel among three parties.With the sender'shelp,if and only if both receivers collaborate together,they can securely share the quantum state in a probabilisticway by introducing an ancilla qutrit and performing appropriate unitary operations.The relation between the successprobability and coefficients characterizing the quantum channel is revealed.The security of the present scheme is analyzedand confirmed.Moreover,the generalization of the three-party scheme to more-party case is also sketched.
基金Supported by the National Natural Science Foundation of China (20776086)
文摘Mass transfer enhancement of gas absorption by adding a dispersed organic phase has been studied in this work. Various dispersed organic phases (heptanol, octanol, isoamyl alcohol, heptane, octane, and isooctane) were tested respectively in the experiment. According to the theoretical model and experimental data, the overall volumetric mass transfer coefficient and enhancement factor were obtained under different dispersed organic phase volume fraction and stirring speed. The experimental results indicate that gas-liquid mass transfer is enhanced at different level by adding a dispersed organic phase. The best performance of enhancement were achieved with the dispersed organic phase volumetric fraction of 5% and under an intermediate stirring speed of 670 r·min^-1. Among the organic phases tested in the experiment, alcohols show better performance, which gave 20% higher enhance-ment of overall volumetric mass transfer coefficient than adding alkanes.
基金Project (No. 20076039) supported by the National Science Founda-tion of China
文摘The relation between the critical radius and the particle size distribution for generalized Ostwald type ripening processes whereby the mass transfer coefficient is modelled by a power law was derived. The critical radius is determined by the growth rate, the mass transfer coefficient and the mass balance, and is independent of whether the limiting stationary growth regime has been obtained.
文摘In this paper a practical but sufficiently accurate method of calculating transient components in short circuit currents and voltages is proposed. It enables to find the roots of the characteristic equation of high order without forming and solving it. This method is convenient to use especially in case of complicated expansionary power systems.
文摘A semi-quantum model for energy transport in collagen molecules is presented. Soliton-like dynamics of this model is investigated numerically without and with the temperature effect taking into account. It is found that in both the cases energy can transport for a long distance along the collagen chain. This indicates that collagen molecules can be taken as a candidate for the acupuncture channel.
基金The National Science and Technology Major Project(No. 2011ZX03005-004-03 )the National Natural Science Foundation of China (No. 61171081)the Science and Technology Support Program of Jiangsu Province (No. BE2011187)
文摘The performance of interfered cooperative ad-hoc networks is analyzed by stochastic geometry analysis and a selection region of relay is presented. First, assuming that the distribution of nodes in the random network follows the Poisson point process (PPP), a closed-form expression of the outage probability is derived for the best relay selection (BRS) scheme. Secondly, the capacity of the network is presented for this scheme. Finally, a performance factor is defined to evaluate the performance gain obtained from the BRS. By using this factor, a relay selection region is found to guarantee the performance gain from the BRS. The analysis and simulation results show that the performance of the BRS not only depends on the densities of source nodes and relay nodes but also on the factors of networks such as the path loss factor and the decoding threshold. And the BRS has a greater advantage than direct transmission (DT) in hush environments such as the long transmission distances, much interference and the high decoding thresholds.
文摘The technique of phase measuring profilometry using a single phase step method is proposed.This method can automatically obtain phase value at each pixel by using a discret cosine transform algorithm.The method is able to automatically recognize any position between depression and elevation on an object surface.Theoretical analysis and experimental verification are presented.
基金jointly supported by the Chongqing Municipal Natural Science Foundation under Grant No.CSTC2013jjB40001)the National High Technology Research and Development Program of China(863Program)under Grant No.20140908the Program for Changjiang Scholars and Innovative Research Team in University under Grant No.IRT1299
文摘Energy efficiency(EE) is a key requirement for the design of short-range communication network.In order to alleviate energy consumption(EC) constraint,a novel layered heterogeneous mobile cloud architecture is proposed in this paper.Based on the proposed layered heterogeneous mobile cloud architecture,we establish an appropriate energy consumption model,and design an energy efficiency scheme based on joint data packet fragmentation and cooperative transmission and analyze the energy efficiency corresponding to different packet sizes and the cloud size.Simulation results show that,when all nodes of the cloud are accessing the same size of data packet fragmentation,the proposed layered heterogeneous mobile cloud architecture can provide significant energy savings.The results provide useful insights into the possible operation of the strategies and show that significant energy consumption reductions are possible.
基金Supported by the National Natural Science Foundation of China under Grant Nos.61102053,61170228,60970109,and 60801051 Shanghai Jiaotong University Participate in Research Projects under Grant Nos.T030PRP18001 and T030PRP19035
文摘A continuous variable ping-pong scheme, which is utilized to generate deterministic private key, is proposed. The proposed scheme is implemented physically by using Ganssian-modulated squeezed states. The deterministic char- acteristic, i.e., no basis reconciliation between two parties, leads a nearly two-time efficiency comparing to the standard quantum key distribution schemes. Especially, the separate control mode does not need in the proposed scheme so that it is simpler and more available than previous ping-pong schemes. The attacker may be detected easily through the fidelity of the transmitted signal, and may not be successful in the beam splitter attack strategy.
基金Supported by the National Natural Science Foundation of China (51106001) Anhui College Provincial Natural Science Research Project (No. KJ2011B018)
文摘In order to realize mass transfer analysis for microwave hot in-place recycling of asphalt pavements, a volume element is established including asphalt mixtures, liquid water and vapor. A mass transfer control model is built by the theory of multiphysics, phase transformation and diffusion. The model contains continuity equation, energy conservation equation, movement equation and vapor diffusion equation. To gain the solution of the mass transfer model, the formulas are simplified to one-dimensional differential equations. And then a mathematical model of boundary conditions is established. The mass transfer velocity and dissipative energy are obtained in different moisture contents through simulation of asphalt pavements recycling. The result indicates that when initial moisture content is certain, mass transfer velocity is almost uniform in depth direction at the same heating time and enertrv absorbed by water i,~ descendino with denletion of moisture.
基金the Higher Education Commission of Pakistan (HEC) for the financial support through Indigenous program
文摘The present investigation addresses the simultaneous effects of heat and mass transfer in the mixed convection peristaltic flow of viscous fluid in an asymmetric channel. The channel walls exhibit the convective boundary conditions. In addition, the effects due to Soret and Dufour are taken into consideration. Resulting problems are solved for the series solutions. Numerical values of heat and mass transfer rates are displayed and studied. Results indicate that the concentration and temperature of the fluid increase whereas the mass transfer rate at the wall decreases with increase of the mass transfer Biot number. Furthermore, it is observed that the temperature decreases with the increase of the heat transfer Biot number.
基金supported in part by the National Natural Science Foundation of China under Grant No.61271184 and 61571065
文摘In this study, the transmission capacity of VANETs in a highway scenario is analysed on the basis of a 1D line model and the carrier sense multiple access with collision avoidance(CSMA/CA) protocol. We describe the CSMA/CA protocol used in IEEE802.11 p from the perspective of the geometric relationship amongst simultaneous transmitters. The desired channel and interfering channels are assumed to experience the same amount of path-loss and Rayleigh fading. On the basis of the proposed model, we analyse the attempted transmission probability of each road segment and the maximum intensity of active transmitters, including their theoretical values. Then, we employ the physical model to obtain the outage probability and derive the upper bound of the transmission capacity of a VANET, which is defined as the average spatial density of successful transmissions in the network. Simulation results indicate that the theoretical value offers a good bound on network capacity.
基金Sponsored by the National Natural Science Foundation of China(Grant No.6137110061001093+6 种基金61401118)the Natural Science Foundation of Shandong Province(Grant No.ZR2014FP016)the Natural Scientific Research Innovation Foundation in Harbin Institute of Technology(Grant No.HIT.NSRIF.2011114HIT.NSRIF.2013136HIT.NSRIF.2016100)the Scientific Research Foundation of Harbin Institute of Technology at Weihai(Grant No.HIT(WH)201409HIT(WH)201410)
文摘To evaluate transmission rate of highly dynamic space networks,a new method for studying space network capacity is proposed in this paper. Using graph theory,network capacity is defined as the maximum amount of flows ground stations can receive per unit time. Combined with a hybrid constellation model,network capacity is calculated and further analyzed for practical cases. Simulation results show that network capacity will increase to different extents as link capacity,minimum ground elevation constraint and satellite onboard processing capability change. Considering the efficiency and reliability of communication networks,how to scientifically design satellite networks is also discussed.
基金Key Projects of Enterprise Foundation from Guangdong Province(D8 -123 -145)
文摘A new effective and reliabl e channel-timeslot allocation algorithm has been proposed, which is applied in WD M optical networks using fiber as their media to allocate the operational reques t. This new algorithm can differentiate the priority of all requests and avoid c onflict and collision in the process of distributing channel and timeslot for th e data waiting for transmission. The method in calculating the best wavelength c hannel and the best timeslot number is simply given. The algorithm is carried o ut in a math language. On the basis of the experiment results, the performance a nd feasibility of the algorithm are analyzed, which prove that the allocation me thod can reach the requirements of an algorithm both in space complexity and tim e complexity .
基金Supported by the NSFC under Grant Nos.10775048,10704023NFRPC under Grant No.2007CB925204+1 种基金New Century Excellent Talents in University under Grant No.NCET-08-0682the Scientific Research Fund of Hunan Provincial Education Department of China under Grant No.07C579
文摘It has been shown that a quantum state could be perfectly transferred via a spin chain with engineered'always-on interaction'.In this paper,we study a more realistic problem for such a quantum state transfer (QST)protocol,how the efficacy of QST is reduced by the quantum decoherence induced by a spatially distributed environment.Here,the environment is universally modeled as a bath of fermions located in different positions.By making use of theirreducible tensor method in angular momentum theory,we investigate the effect of environment on the efficiency of QSTfor both cases at zero and finite temperatures.We not only show the generic exponential decay of QST efficiency as thenumber of sites increase,but also find some counterintuitive effect,the QST can be enhanced as temperature increasesin some cases.
基金supported by the Natural Science Foundation of Jiangsu Province(BK20211145)the Fundamental Research Funds for the Central Universities(020414380182)+1 种基金the Key Research and Development Program of Nanjing Jiangbei New Aera(ZDYD20210101)the Program for Innovative Talents and Entrepreneurs in Jiangsu(JSSCRC2021484)。
文摘The security of quantum key distribution(QKD)is severely threatened by discrepancies between realistic devices and theoretical assumptions.Recently,a significant framework called the reference technique was proposed to provide security against arbitrary source flaws under current technology such as state preparation flaws,side channels caused by mode dependencies,the Trojan horse attacks and pulse correlations.Here,we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.We present a characterization of source flaws and connect them to experiments,together with a finite-key analysis against coherent attacks.In addition,we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 d B channel loss.Compared with previous QKD protocols with imperfect devices,our study considerably improves both the secure key rate and the transmission distance,and shows application potential in the practical deployment of secure QKD with device imperfections.
文摘To meet the requirement of high-quality transmission of videos captured by unmanned aerial vehicles (UAV) with low bandwidth, a novel rate control (RC) scheme based on region-of-interest (ROI) is proposed. First, the ROI information is sent to the encoder with the latest high efficient video coding (HEVC) standard to generate an ROI map. Then, by using the ROI map, bit allocation methods are developed at frame level and large coding unit (LCU) level, to avoid inaccurate bit allocation produced by camera movement. At last, by using a better robustness R-2 model, the quantization parameter (QP) for each LCU is calculated. The experimental results show that the proposed RC method can get a lower bitrate error and a higher quality for reconstructed video by choosing appropriate pixel weight on the HEVC platform.
基金supported by the National High Technology Research and Development Program of China(No.2011AA7014061)
文摘Considering the air-water interface and ocean water’s optical attenuation,the performance of quantum key distribution(QKD)based on air-water channel is studied.The effects of photons’various incident angles to air-water interface on quantum bit error rate(QBER)and the maximum secure transmission distance are analyzed.Taking the optical attenuation of ocean water into account,the performance bounds of QKD in different types of ocean water are discussed.The simulation results show that the maximum secure transmission distance of QKD gradually reduces as the incident angle from air to ocean water increases.In the clearest ocean water with the lowest attenuation,the maximum secure transmission distance of photons far exceeds the the working depth of underwater vehicles.In intermediate and murky ocean waters with higher attenuation,the secure transmission distance shortens,but the underwater vehicle can deploy other accessorial methods for QKD with perfect security.So the implementation of OKD between the satellite and the underwater vehicle is feasible.