Based on chaotic oscillator system, this paper proposes a novel method on high frequency low signal- to-noise ratio BPSK( Binary Phase Shift Keying) signal detection. Chaotic oscillator system is a typical non-lin- ...Based on chaotic oscillator system, this paper proposes a novel method on high frequency low signal- to-noise ratio BPSK( Binary Phase Shift Keying) signal detection. Chaotic oscillator system is a typical non-lin- ear system which is sensitive to periodic signals and immune to noise at the same time. Those properties make it possible to detect low signal-to-noise ratio signals. The BPSK signal is a common signal type which is widely used in modern communication. Starting from the analysis of advantages of chaotic, os~.illator system and signal features of the BPSK signal, we put forward a unique method that can detect low signar-to-noise ratio BPSK sig- nals with high frequency. The simulation results show that the novel method can dclct.t low signal-to-noise ratio BPSK signals with frequency in an order of magnitude of l0s Hz, and the input Signal-to-Noise Ratio threshold can be -20 dB.展开更多
In this paper a method that combines transmit antenna selection and reduced-constellation detection in spatially correlated Multi-Input Multi-Output (MIMO) fading channels is presented. To mitigate the performance d...In this paper a method that combines transmit antenna selection and reduced-constellation detection in spatially correlated Multi-Input Multi-Output (MIMO) fading channels is presented. To mitigate the performance degradation caused by the use of antenna selection that is based on correlation among columns, an iterative receiver scheme that uses only a subset of the constellation points close to the expected symbol vahle estimated in the previous iteration is proposed. The size of the subset can adapt to the maximum correlation of the sub-matrix after the simple antenna selection. Furthermore, the error rate performance of the scheme under linear Miniinutn Mean Square Error (MMSE) or Ordered Successive Interference Cancellation (OSIC) for the first run detection and different interleaver lengths is investigated while the transnlit antenna selection is considered. The simulation results show a significant advantage both for implementation complexity and for error rate performance under a fixed data rate.展开更多
A subspace-based blind Signal-to-Noise Ratio (SNR) estimation algorithm for digital bandpass signals in Additive White Gaussian Noise (AWGN) channel is discussed. The lower bounds of the mean and variance of the estim...A subspace-based blind Signal-to-Noise Ratio (SNR) estimation algorithm for digital bandpass signals in Additive White Gaussian Noise (AWGN) channel is discussed. The lower bounds of the mean and variance of the estimation are derived, and simulations are performed for the commonly used digital bandpass signals, such as MPSK (M=2, 4, 8), MFSK (M=2, 4) and MQAM (M=16, 64, 128, 256) signals. Theoretical analyses and simulation results indicate that the proposed algorithm is ef- fective even when the SNR is below 0dB. Furthermore, the algorithm can provide a blind estimator in that it needs neither the parameters of the received signals, such as the carrier frequency, symbol rate and modulation scheme, nor the synchronization of the system.展开更多
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro...In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.展开更多
The real Direction Of Arrival (DOA) varies with time in mobile communication system. In such situation, the performance of conventional beamformers will be degraded obviously. Quantum Signal Processing (QSP) beamforme...The real Direction Of Arrival (DOA) varies with time in mobile communication system. In such situation, the performance of conventional beamformers will be degraded obviously. Quantum Signal Processing (QSP) beamformer is insensitive to DOA errors, thus it can achieve stable output performance in such circumstance. This letter verified the effectiveness and feasibility of the QSP beamformer by simulation results.展开更多
In this paper,a cooperative spectrum sensing scheme,which is based on cooperation of a certain number of secondary users and cooperative diversity under multi-antenna scenario,is proposed.Under multi-antenna scenario,...In this paper,a cooperative spectrum sensing scheme,which is based on cooperation of a certain number of secondary users and cooperative diversity under multi-antenna scenario,is proposed.Under multi-antenna scenario,we set a targeted detection probability and optimize the false alarm probability of the network by choosing a certain number of secondary users with the highest primary user’s signal to noise ratio.The detection performance of the network is also evaluated when all the secondary users are cooperating to illustrate the benefits of the proposed scheme as a contrast.In addition,how to choose the detection threshold of the secondary user is analyzed for the purpose of decreasing the average risk.Theory analysis and simulation results show that the optimum false alarm probability can be derived by cooperating a certain number of secondary users rather than all the secondary users and the detection performance of the network can be further improved if secondary users are equipped with multiple antennas.Also,a minimum average risk can be obtained by optimizing the detection threshold.展开更多
This paper presents a novel blind adaptive noncoherent decorrelative multiuser detector for nonlinearly modulated satellite mobile Code Division Multiple Access (CDMA) systems. By using the known signature waveforms o...This paper presents a novel blind adaptive noncoherent decorrelative multiuser detector for nonlinearly modulated satellite mobile Code Division Multiple Access (CDMA) systems. By using the known signature waveforms of the counterpart earth station in the blind adaptive multiuser detector, the system performance has been improved obviously. The computation results about the convergence properties of the new detector and the previous detectors demonstrate that the proposed multiuser detector has better performance than previous multiuser detectors for nonlinearly modulated CDMA systems.展开更多
An algorithm was proposed to fast recognize three types of underwater micro-terrain, i.e. the level, the gradient and the uneven. With pendulum single beam bathymeter, the hard level concrete floor, the random uneven ...An algorithm was proposed to fast recognize three types of underwater micro-terrain, i.e. the level, the gradient and the uneven. With pendulum single beam bathymeter, the hard level concrete floor, the random uneven floor and the gradient wood panel (8-) were ultrasonically detected 20 times, respectively. The results show that the algorithm is right from fact that the first clustering values of the uneven are all less than the threshold value of 60.0% that is obtained by the level and gradient samples. The algorithm based on the dynamic clustering theory can effectively eliminate the influences of the exceptional elevation values produced by the disturbances resulted from the grazing angle, the characteristic of bottom material and environmental noises, and its real-time capability is good. Thus, the algorithm provides a foundation for the next restructuring of the micro-terrain.展开更多
A support vector machine (SVM) based multiuser detection (MUD) scheme in code-division multi- ple-access (CDMA) system is proposed. In this scheme, the equivalent support vector (SV) is obtained through a kern...A support vector machine (SVM) based multiuser detection (MUD) scheme in code-division multi- ple-access (CDMA) system is proposed. In this scheme, the equivalent support vector (SV) is obtained through a kernel sparsity approximation algorithm, which avoids the conventional costly quadratic pro-gramming (QP) procedure in SVM. Besides, the coefficient of the SV is attained through the solution to a generalized eigenproblem. Simulation results show that the proposed scheme has almost the same bit er-ror rate (BER) as the standard SVM and is better than minimum mean square error (MMSE) scheme. Meanwhile, it has a low comoutation complexity.展开更多
Focusing on the space-time coded multiuser mobile communication systems in the frequency-selective fading environment, this paper proposes a Vertical Bell labs LAyered Space-Time (V-BLAST) coded Multicarrier Code-Divi...Focusing on the space-time coded multiuser mobile communication systems in the frequency-selective fading environment, this paper proposes a Vertical Bell labs LAyered Space-Time (V-BLAST) coded Multicarrier Code-Division Multiple-Access (MC-CDMA) scheme and its blind channel identification algorithm. This algorithm employs an ESPRIT-like method and the singular value decomposition, and the channels between every transmit antenna of every user and every receive antenna of the base station are blindly estimated with a closed-form solution. Based on it, an equivalent Minimum Mean-Squared Error (MMSE) time-domain multiuser detector is derived. Moreover, the proposed scheme exploits the precoding in the transmitter in order to eliminate the constraint of more receive antennas than transmit ones, required by most conventional V-BLAST codec schemes. Computer simulation results demonstrate the validity of this proposed scheme.展开更多
This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in mobile ad hoc networks. In this approach, the immunity-based agents...This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in mobile ad hoc networks. In this approach, the immunity-based agents monitor the situation in the network. These agents can take appropriate actions according to the underlying security policies. Specifically, their activities are coordinated in a hierarchical fashion while sensing, communicating, decision and generating responses. Such an agent can learn and adapt to its environment dynamically and can detect both known and unknown intrusions. The proposed intrusion detection architecture is designed to be flexible, extendible, and adaptable that can perform real-time monitoring. This paper provides the conceptual view and a general framework of the proposed system. In the end, the architecture is illustrated by an example to show it can prevent the attack efficiently.展开更多
To improve the computational speed, the ROLS-AWS algorithm was employed in the RBF based MUD receiver. The radial basis function was introduced into the multi-user detection (MUD) firstly. Then a three-layer neural ...To improve the computational speed, the ROLS-AWS algorithm was employed in the RBF based MUD receiver. The radial basis function was introduced into the multi-user detection (MUD) firstly. Then a three-layer neural network demodulation spread-spectrum signal model in the synchronous Gauss channel was given and the multi-user detection receiver was analyzed intensively. Simulations by computer illustrate that the proposed RBF based MUD receiver employing the ROKS-AWS algorithm is better than conventional detectors and common BP neural network based MUD receivers on suppressing multiple access interference and near-far resistance.展开更多
A theoretical protocol of quantum dialogue is proposed,which uses a class of three-photon W states asquantum channel.After two-step security check,four-bit secret message can be transmitted to each other by transmitti...A theoretical protocol of quantum dialogue is proposed,which uses a class of three-photon W states asquantum channel.After two-step security check,four-bit secret message can be transmitted to each other by transmittingof single photon with the aid of two-bit classical information.展开更多
An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detecti...An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detection system (IDS). In this paper, the fuzzy lion Bayes system (FLBS) is proposed for intrusion detection mechanism. Initially, the data set is grouped into a number of clusters by the fuzzy clustering algorithm. Here, the Naive Bayes classifier is integrated with the lion optimization algorithm and the new lion naive Bayes (LNB) is created for optimally generating the probability measures. Then, the LNB model is applied to each data group, and the aggregated data is generated. After generating the aggregated data, the LNB model is applied to the aggregated data, and the abnormal nodes are identified based on the posterior probability function. The performance of the proposed FLBS system is evaluated using the KDD Cup 99 data and the comparative analysis is performed by the existing methods for the evaluation metrics accuracy and false acceptance rate (FAR). From the experimental results, it can be shown that the proposed system has the maximum performance, which shows the effectiveness of the proposed system in the intrusion detection.展开更多
With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontation...With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontations,evasive network attacks on information infrastructures with high-tech,high concealment and longterm sustainability become severe threats to national security.In this paper,we propose a novel two-phased method for the detection of evasive network attacks which exploit or pretend to be common legal encryption services in order to escape security inspection.Malicious communications which camouflage themselves as legal encryption application are identified in the SSL'session structure verification phase firstly,and then by serverside X.509 certificate based anomaly detection,suspicious attack behaviors are further distinguished effectively.Experiment results show that our method is very useful for detecting the network activities of certain unknown threats or new malwares.Besides,the proposed method can be applied to other similar services easily.展开更多
In this paper, we propose a deterministic quantum communication protocol using weak coherent states and pulsed homodyne detection. In this protocol, the communication parties exchange their secret information determin...In this paper, we propose a deterministic quantum communication protocol using weak coherent states and pulsed homodyne detection. In this protocol, the communication parties exchange their secret information deterministicaJly in two rounds. The devices and efficiency of the protocol are discussed respectively. We also show the security of the protocol against intercept-resend and Trojan-Horse eavesdropping attacks.展开更多
A multiuser multiple input multiple output (MIMO) broadcast scheme was proposed through applying dirty paper coding (DPC) at the transmitter and linear equalization at the receiver. Assuming single data stream communi...A multiuser multiple input multiple output (MIMO) broadcast scheme was proposed through applying dirty paper coding (DPC) at the transmitter and linear equalization at the receiver. Assuming single data stream communication for each user, joint transmitter and linear receiver design were done to enhance the system performance. Furthermore, a multiuser scheduling algorithm was presented to exploit multiuser diversity when the number of the users is larger than that of transmit antennas. The proposed system achieves the sum rate close to the Sato bound and is superior to some of the existing schemes.展开更多
High speed data communication between digital signal processor and the host is required to meet the demand of most real-time systems. PCI bus technology is a solution of this problem. The principle of data communicati...High speed data communication between digital signal processor and the host is required to meet the demand of most real-time systems. PCI bus technology is a solution of this problem. The principle of data communication based on PCI has been explained. Meanwhile, the technology of data transfer between synchronous dynamic RAM(SDRAM) and an mapping space of on-chip memory(L2) by expansion direct memory access(EDMA) has also been realized.展开更多
文摘Based on chaotic oscillator system, this paper proposes a novel method on high frequency low signal- to-noise ratio BPSK( Binary Phase Shift Keying) signal detection. Chaotic oscillator system is a typical non-lin- ear system which is sensitive to periodic signals and immune to noise at the same time. Those properties make it possible to detect low signal-to-noise ratio signals. The BPSK signal is a common signal type which is widely used in modern communication. Starting from the analysis of advantages of chaotic, os~.illator system and signal features of the BPSK signal, we put forward a unique method that can detect low signar-to-noise ratio BPSK sig- nals with high frequency. The simulation results show that the novel method can dclct.t low signal-to-noise ratio BPSK signals with frequency in an order of magnitude of l0s Hz, and the input Signal-to-Noise Ratio threshold can be -20 dB.
基金Supported by the National Natural Science Foundation of China (No.60496311)China High-Tech 863 Plan (No.2006AA01Z264).
文摘In this paper a method that combines transmit antenna selection and reduced-constellation detection in spatially correlated Multi-Input Multi-Output (MIMO) fading channels is presented. To mitigate the performance degradation caused by the use of antenna selection that is based on correlation among columns, an iterative receiver scheme that uses only a subset of the constellation points close to the expected symbol vahle estimated in the previous iteration is proposed. The size of the subset can adapt to the maximum correlation of the sub-matrix after the simple antenna selection. Furthermore, the error rate performance of the scheme under linear Miniinutn Mean Square Error (MMSE) or Ordered Successive Interference Cancellation (OSIC) for the first run detection and different interleaver lengths is investigated while the transnlit antenna selection is considered. The simulation results show a significant advantage both for implementation complexity and for error rate performance under a fixed data rate.
文摘A subspace-based blind Signal-to-Noise Ratio (SNR) estimation algorithm for digital bandpass signals in Additive White Gaussian Noise (AWGN) channel is discussed. The lower bounds of the mean and variance of the estimation are derived, and simulations are performed for the commonly used digital bandpass signals, such as MPSK (M=2, 4, 8), MFSK (M=2, 4) and MQAM (M=16, 64, 128, 256) signals. Theoretical analyses and simulation results indicate that the proposed algorithm is ef- fective even when the SNR is below 0dB. Furthermore, the algorithm can provide a blind estimator in that it needs neither the parameters of the received signals, such as the carrier frequency, symbol rate and modulation scheme, nor the synchronization of the system.
基金Acknowledgements The project was supported by the Specialized Research Found for the Doctoral Program of Higher Education of China under Grant No. 20060013007 the National Natural Science Foundation of Beijing under Caant No. 4092029 and the National Natural Science Foundation of China under Grant No. 61100205, No. 60873001.
文摘In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.
基金Sponsored by the National Natural Science Foundation of China (No.60302006 and No.60462002).
文摘The real Direction Of Arrival (DOA) varies with time in mobile communication system. In such situation, the performance of conventional beamformers will be degraded obviously. Quantum Signal Processing (QSP) beamformer is insensitive to DOA errors, thus it can achieve stable output performance in such circumstance. This letter verified the effectiveness and feasibility of the QSP beamformer by simulation results.
基金Acknowledgments The authors are supported by The National 863 Program under Grants 2009AA01Z247 and by National Nature Science Foundation of China (NSFC) under Grants 60972076, 61072052.
文摘In this paper,a cooperative spectrum sensing scheme,which is based on cooperation of a certain number of secondary users and cooperative diversity under multi-antenna scenario,is proposed.Under multi-antenna scenario,we set a targeted detection probability and optimize the false alarm probability of the network by choosing a certain number of secondary users with the highest primary user’s signal to noise ratio.The detection performance of the network is also evaluated when all the secondary users are cooperating to illustrate the benefits of the proposed scheme as a contrast.In addition,how to choose the detection threshold of the secondary user is analyzed for the purpose of decreasing the average risk.Theory analysis and simulation results show that the optimum false alarm probability can be derived by cooperating a certain number of secondary users rather than all the secondary users and the detection performance of the network can be further improved if secondary users are equipped with multiple antennas.Also,a minimum average risk can be obtained by optimizing the detection threshold.
文摘This paper presents a novel blind adaptive noncoherent decorrelative multiuser detector for nonlinearly modulated satellite mobile Code Division Multiple Access (CDMA) systems. By using the known signature waveforms of the counterpart earth station in the blind adaptive multiuser detector, the system performance has been improved obviously. The computation results about the convergence properties of the new detector and the previous detectors demonstrate that the proposed multiuser detector has better performance than previous multiuser detectors for nonlinearly modulated CDMA systems.
基金Project(50474052) supported by the National Natural Foundation of China
文摘An algorithm was proposed to fast recognize three types of underwater micro-terrain, i.e. the level, the gradient and the uneven. With pendulum single beam bathymeter, the hard level concrete floor, the random uneven floor and the gradient wood panel (8-) were ultrasonically detected 20 times, respectively. The results show that the algorithm is right from fact that the first clustering values of the uneven are all less than the threshold value of 60.0% that is obtained by the level and gradient samples. The algorithm based on the dynamic clustering theory can effectively eliminate the influences of the exceptional elevation values produced by the disturbances resulted from the grazing angle, the characteristic of bottom material and environmental noises, and its real-time capability is good. Thus, the algorithm provides a foundation for the next restructuring of the micro-terrain.
文摘A support vector machine (SVM) based multiuser detection (MUD) scheme in code-division multi- ple-access (CDMA) system is proposed. In this scheme, the equivalent support vector (SV) is obtained through a kernel sparsity approximation algorithm, which avoids the conventional costly quadratic pro-gramming (QP) procedure in SVM. Besides, the coefficient of the SV is attained through the solution to a generalized eigenproblem. Simulation results show that the proposed scheme has almost the same bit er-ror rate (BER) as the standard SVM and is better than minimum mean square error (MMSE) scheme. Meanwhile, it has a low comoutation complexity.
基金Partially supported by the National Natural Science Foundation of China (No.60502022)the Research Fund for Doctoral Program of Higher Education of China (No. 20020698024, No.20030698027)
文摘Focusing on the space-time coded multiuser mobile communication systems in the frequency-selective fading environment, this paper proposes a Vertical Bell labs LAyered Space-Time (V-BLAST) coded Multicarrier Code-Division Multiple-Access (MC-CDMA) scheme and its blind channel identification algorithm. This algorithm employs an ESPRIT-like method and the singular value decomposition, and the channels between every transmit antenna of every user and every receive antenna of the base station are blindly estimated with a closed-form solution. Based on it, an equivalent Minimum Mean-Squared Error (MMSE) time-domain multiuser detector is derived. Moreover, the proposed scheme exploits the precoding in the transmitter in order to eliminate the constraint of more receive antennas than transmit ones, required by most conventional V-BLAST codec schemes. Computer simulation results demonstrate the validity of this proposed scheme.
基金Supported by the National High Technology Develop ment 863 Program of China (No.2003AA148010)Key Technologies R&D Program of China (No.2002DA103A03-07).
文摘This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in mobile ad hoc networks. In this approach, the immunity-based agents monitor the situation in the network. These agents can take appropriate actions according to the underlying security policies. Specifically, their activities are coordinated in a hierarchical fashion while sensing, communicating, decision and generating responses. Such an agent can learn and adapt to its environment dynamically and can detect both known and unknown intrusions. The proposed intrusion detection architecture is designed to be flexible, extendible, and adaptable that can perform real-time monitoring. This paper provides the conceptual view and a general framework of the proposed system. In the end, the architecture is illustrated by an example to show it can prevent the attack efficiently.
文摘To improve the computational speed, the ROLS-AWS algorithm was employed in the RBF based MUD receiver. The radial basis function was introduced into the multi-user detection (MUD) firstly. Then a three-layer neural network demodulation spread-spectrum signal model in the synchronous Gauss channel was given and the multi-user detection receiver was analyzed intensively. Simulations by computer illustrate that the proposed RBF based MUD receiver employing the ROKS-AWS algorithm is better than conventional detectors and common BP neural network based MUD receivers on suppressing multiple access interference and near-far resistance.
基金Supported by the National Natural Science Foundation of China under Grant No.10704011the Research Programs of the Educational Office of Liaoning Province under Grant No.2008006
文摘A theoretical protocol of quantum dialogue is proposed,which uses a class of three-photon W states asquantum channel.After two-step security check,four-bit secret message can be transmitted to each other by transmittingof single photon with the aid of two-bit classical information.
文摘An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detection system (IDS). In this paper, the fuzzy lion Bayes system (FLBS) is proposed for intrusion detection mechanism. Initially, the data set is grouped into a number of clusters by the fuzzy clustering algorithm. Here, the Naive Bayes classifier is integrated with the lion optimization algorithm and the new lion naive Bayes (LNB) is created for optimally generating the probability measures. Then, the LNB model is applied to each data group, and the aggregated data is generated. After generating the aggregated data, the LNB model is applied to the aggregated data, and the abnormal nodes are identified based on the posterior probability function. The performance of the proposed FLBS system is evaluated using the KDD Cup 99 data and the comparative analysis is performed by the existing methods for the evaluation metrics accuracy and false acceptance rate (FAR). From the experimental results, it can be shown that the proposed system has the maximum performance, which shows the effectiveness of the proposed system in the intrusion detection.
基金supported by the National Science and Technology Support Program under Grant No.2012BAH46B02 and 2012BAH45B01the National High Technology Research and Development Program(863 Program) of China under Grant No.2011AA010703the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant No.XDA06030200
文摘With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontations,evasive network attacks on information infrastructures with high-tech,high concealment and longterm sustainability become severe threats to national security.In this paper,we propose a novel two-phased method for the detection of evasive network attacks which exploit or pretend to be common legal encryption services in order to escape security inspection.Malicious communications which camouflage themselves as legal encryption application are identified in the SSL'session structure verification phase firstly,and then by serverside X.509 certificate based anomaly detection,suspicious attack behaviors are further distinguished effectively.Experiment results show that our method is very useful for detecting the network activities of certain unknown threats or new malwares.Besides,the proposed method can be applied to other similar services easily.
基金Supported by the National Fundamental Research Program under Grant No.2006CB921106National Natural Science Foundation of China under Grant Nos.10874098 and 10775076
文摘In this paper, we propose a deterministic quantum communication protocol using weak coherent states and pulsed homodyne detection. In this protocol, the communication parties exchange their secret information deterministicaJly in two rounds. The devices and efficiency of the protocol are discussed respectively. We also show the security of the protocol against intercept-resend and Trojan-Horse eavesdropping attacks.
基金The National Nature Science foundation of China (No. 60772100, 60372076)The Science and Technology Committee of Shanghai Municipality (No. 06DZ15013)
文摘A multiuser multiple input multiple output (MIMO) broadcast scheme was proposed through applying dirty paper coding (DPC) at the transmitter and linear equalization at the receiver. Assuming single data stream communication for each user, joint transmitter and linear receiver design were done to enhance the system performance. Furthermore, a multiuser scheduling algorithm was presented to exploit multiuser diversity when the number of the users is larger than that of transmit antennas. The proposed system achieves the sum rate close to the Sato bound and is superior to some of the existing schemes.
文摘High speed data communication between digital signal processor and the host is required to meet the demand of most real-time systems. PCI bus technology is a solution of this problem. The principle of data communication based on PCI has been explained. Meanwhile, the technology of data transfer between synchronous dynamic RAM(SDRAM) and an mapping space of on-chip memory(L2) by expansion direct memory access(EDMA) has also been realized.