Having criticized the current architecture of Advanced Traveler Information Systems (ATISs), this work discusses a new base of requirements to develop a new paradigm for traffic information systems. It mainly integr...Having criticized the current architecture of Advanced Traveler Information Systems (ATISs), this work discusses a new base of requirements to develop a new paradigm for traffic information systems. It mainly integrates three dimensions within a traffic system: drivers' pattern of behavior and preferences, urban traffic desires, and capabilities of traffic information service providers. Based on the above, functional segments from several related backgrounds are brought together to structure a new architecture, called Interactive Traveler Information System (ITIS). The main interactive feature of this new architecture is a two-way communication track between drivers and the traffic information system provider-in fact, a decision on choosing a road at a particular time for an individual will be made based on the utility of both sides. This new configuration consists of driver-side smartphone application, centric traffic prediction, and decision-maker units, which will shape a new approach of decision-making processes. These all work together to satisfy the designated goal of ITIS, which is preserving the Wardrop equilibrium condition in the traffic network level. Finally, we concentrate on a comparison study, which shows a differentiation between performance of the proposed ITIS and the current ATIS model in a real situation. This has been done with simulations of analogical scenarios. The most noticeable advantage of the proposed architecture is not being limited to a saturation limit, and the positive effect of increasing system penetration in the performance of the newly introduced information system. In conclusion, new research subjects are suggested to be carried out.展开更多
Smart Grid (SG) is an emerging paradigm of the modern world to upgrade and enhance the existing conventional electrical power infrastructure from generation to distribution to the consumers in a two-way communication ...Smart Grid (SG) is an emerging paradigm of the modern world to upgrade and enhance the existing conventional electrical power infrastructure from generation to distribution to the consumers in a two-way communication fashion to automate the electrical power demand and supply and make this a cyber-physical system. SG infrastructure key elements, such as smart meters, circuit breakers, transformers, feeders, substations, control centers, grid stations, are required well-formed communication network architectures. SG infrastructure is divided into three main communication networks architectures, such as HAH, NAN, and WAN. Each of these communication network architectures requires reliable, stable, secure, high data rate at real-time with the help of different wireline and wireless communication technologies from HAN to WAN networks. To understand the complete concepts about SG, a concise review is presented and it will help the readers to get foundations of communication network architectures and technologies of SG.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
This paper relates to an advanced open mobile communication system and method of integrating the mobile communications, wireless access systems and wired communications into one common platform architecture for China&...This paper relates to an advanced open mobile communication system and method of integrating the mobile communications, wireless access systems and wired communications into one common platform architecture for China's 4th generation mobile communications, supporting costeffective broadband voice, data and video services in wireless, mobile and wired environment with one single integrated mobile terminal device. The paper includes new architecture in the integrated mobile device and converged network access, and minimum modifi cation in the existing mobile telecommunication infrastructures. This paper introduces the long-term evolution strategy for China's TDD system platform towards China's future 4G mobile communications.展开更多
Network information communication technology in power systems is the key to ensuring the safe and efficient operation of power grids.The network information communication technology itself has advantages in automation...Network information communication technology in power systems is the key to ensuring the safe and efficient operation of power grids.The network information communication technology itself has advantages in automation operation and information transmission,thus is widely applied to the power system.In the case of ensuring that the power system is compatible with the network information communication technology,the control of the power system can be strengthened,and the operational efficiency of the power system can be improved.This paper mainly analyzes the specific application of network information communication technology in power system.展开更多
On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 20...On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 2001 has been incorporated a new subject matter under the copyright protection: the right of communication through information network, that is, the right to make a work available to the public by wire or by wireless means, so that people may have access to the work from a place and at a time individu...展开更多
Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication throug...Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially.展开更多
In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The...In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation.展开更多
The integrated information network is a large capacity information network that integrates various communication platforms on the ground, at sea, in the air and in the deep air through the inter-satellite and satellit...The integrated information network is a large capacity information network that integrates various communication platforms on the ground, at sea, in the air and in the deep air through the inter-satellite and satellite-ground links to acquire information accurately, process it quickly, and transmit it efficiently. The satellite communication, as an important part of integrated information networks, is one of main approaches to acquire, process and distribute communication information and resources. In this paper, based on current researches of the satellite communication network, we put forward a 3-layer satellite communication network model based on the Software Defined Network (SDN). Meanwhile, to improve current routing policies of the Low Earth Orbit (LEO) satellite communication network, we put forward an Adaptive Routing Algorithm (ARA) to sustain the shortest satellite communication link. Experiment results show that the proposed method can effectively reduce link distance and communication delay, and realize adaptive path planning.展开更多
This paper presents an original probabilistic model of a hybrid underwater wireless sensor network(UWSN),which includes a network of stationary sensors placed on the seabed and a mobile gateway.The mobile gateway is a...This paper presents an original probabilistic model of a hybrid underwater wireless sensor network(UWSN),which includes a network of stationary sensors placed on the seabed and a mobile gateway.The mobile gateway is a wave glider that collects data from the underwater network segment and retransmits it to the processing center.The authors consider the joint problem of optimal localization of stationary network nodes and the corresponding model for bypassing reference nodes by a wave glider.The optimality of the network is evaluated according to the criteria of energy efficiency and reliability.The influence of various physical and technical parameters of the network on its energy efficiency and on the lifespan of sensor nodes is analyzed.The analysis is carried out for networks of various scales,depending on the localization of stationary nodes and the model of bypassing the network with a wave glider.As a model example,the simulation of the functional characteristics of the network for a given size of the water area is carried out.It is shown that in the case of a medium-sized water area,the model of“bypassing the perimeter”by a wave glider is practically feasible,energy efficient and reliable for hourly data measurements.In the case of a large water area,the cluster bypass model becomes more efficient.展开更多
Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new m...Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new models to ensure the safe transmission of information through such systems.Recently,quantum systems have drawn much attention since they are expected to have a significant impact on the research in information security.This paper proposes a quantum teleportation scheme based on controlled multi-users to ensure the secure information transmission among users.Quantum teleportation is an original key element in a variety of quantum information tasks as well as quantum-based technologies,which plays a pivotal role in the current progress of quantum computing and communication.In the proposed scheme,the sender transmits the information to the receiver under the control of a third user or controller.Here,we show that the efficiency of the proposed scheme depends on the properties of the transmission channel and the honesty of the controller.Compared with various teleportation scheme presented recently in the literature,the most important difference in the proposed scheme is the possibility of suspicion about the honesty of the controller and,consequently,taking proper precautions.展开更多
The human brain is built to process complex visual impressions within milliseconds. In comparison with sequentially coded spoken language and written texts, we are capable of consuming graphical information at a high ...The human brain is built to process complex visual impressions within milliseconds. In comparison with sequentially coded spoken language and written texts, we are capable of consuming graphical information at a high bandwidth in a parallel fashion, producing a picture worth more than a thousand words. Effective information visualization can be a powerful tool to capture people's attention and quickly communicate large amounts of data and complex information. This is particularly important in the context of communication data, which often describes entities (people, organizations) and their connections through communication. Visual analytics approaches can optimize the user-computer interaction to gain insights into communication networks and learn about their structures. Network visualization is a perfect instrument to better communicate the results of analysis. The precondition for effective information visualization and successful visual reasoning is the capability to draw "good" pictures. Even though communication networks are often large, including thousands or even millions of people, underlying visualization principles are identical to those used for visualizing smaller networks. In this article, you will learn about these principles, giving you the ability to assess the quality of network visualizations and to draw better network pictures by yourself.展开更多
The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find ...The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find it useful to have a tool that enables them to associate the faces in fiont of them with the account names they know. This paper proposes a method that enables a person to identify the account name of the person ("target") in front of him/her using a smartphone. The attendees to a meeting exchange their identifiers (i.e., the account name) and GPS information using smartphones. When the user points his/her smartphone towards a target, the target's identifier is displayed near the target's head on the camera screen using AR (augmented reality). The position where the identifier is displayed is calculated from the differences in longitude and latitude between the user and the target and the azimuth direction of the target from the user. The target is identified based on this information, the face detection coordinates, and the distance between the two. The proposed method has been implemented using Android terminals, and identification accuracy has been examined through experiments.展开更多
Space information network is used for real time acquiring, transmitting and processing the space information on the space platform, which provides significant communication services for communication, navigation posit...Space information network is used for real time acquiring, transmitting and processing the space information on the space platform, which provides significant communication services for communication, navigation positioning and science exploration. In this paper, the architecture of Software Defined Space Optical Network (SDSON) based on cloud platform is designed by means of Software Defined Optical Network (SDON) and cloud services. The new architecture combining centralized and distributed management-control mechanism is a multi-layer and multi-domain architecture with powerful computing and storage ability. Moreover, reliable service and unreliable service communication models employed in the space information network are proposed considering the characteristic of Disruption/Delay Tolerant Network (DTN). Finally, the functional verification and demonstration are performed on our optical experimental network platform.展开更多
Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethe...Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems.展开更多
SIN(Space Information Network)has recently emerged as a promising approach to solving the collaboration difficulty among current space programs.However,because of the SIN’s large scale,high component complexity,and d...SIN(Space Information Network)has recently emerged as a promising approach to solving the collaboration difficulty among current space programs.However,because of the SIN’s large scale,high component complexity,and dynamic characteristics,designing a proper SIN architecture is challenging.Firstly,we propose a novel SIN architecture,which is composed of GEO(Geostationary Earth Orbit)satellites as backbone network nodes,LEO(Low Earth Orbit)or other types of satellites as enhanced coverage nodes,and high-altitude platforms to meet the service requirements of emergency or hot-spot applications.Unlike most existing studies,the proposed architecture is AS(Autonomous-System)based.We decouple the complex SIN into simpler sub-networks using a hierarchical AS model.Then,we propose a topology control algorithm to minimize the time delay among sub-AS networks.We prove that the proposed algorithm achieves logical k-connectivity provided that the original physical topology has k-connectivity.Simulation results validate the theoretic analysis and effectiveness of the algorithm.展开更多
Focusing on its main requirements and challenges and by analyzing the characteristics of different space platforms,an overall architecture for space information networks is proposed based on national strategic plannin...Focusing on its main requirements and challenges and by analyzing the characteristics of different space platforms,an overall architecture for space information networks is proposed based on national strategic planning and the present development status of associated technologies.Furthermore,the core scientific problems that need to be solved are expounded.In addition,the primary considerations and a preliminary integrated demonstration environment for verification of key technologies are presented.展开更多
There is growing interest in the integrated sensing and communication(ISAC)to extend the 5G+/6G network capabilities by introducing sensing capability.While the solutions for mono-static or bi-static ISAC have shown f...There is growing interest in the integrated sensing and communication(ISAC)to extend the 5G+/6G network capabilities by introducing sensing capability.While the solutions for mono-static or bi-static ISAC have shown feasibility and benefits based on existing 5G physical layer design,whether and how to coordinate multiple ISAC devices to better exert networking performance are rarely discussed.3 rd Partnership Project(3GPP)has initiated the ISAC use cases study,and the follow-up studies for network architecture could be anticipated.In this article,we focus on gNB-based sensing mode and propose ISAC functional framework with given of highlevel service procedures to enable cellular based ISAC services.In the proposed ISAC framework,three types of network functions for sensing service as Sensing Function(SF),lightweight-Edge Sensing Function(ESF)and full-version-ESF are designed with interaction with network nodes to fulfill the latency requirements of ISAC use cases.Finally,with simulation evaluations and hardware testbed results,we further verify the performance benefit and feasibility to enable ISAC in 5G for the gNB-based sensing mode with new design on SF and related signaling protocols.展开更多
Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and mo...Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and model detection performance is degraded due to the complex imaging environment,we proposed a more effective and robust target detection framework based on deep learning,which can make full use of the acoustic shadow information in the forward-looking sonar images to assist underwater target detection.Firstly,the weighted box fusion method is adopted to generate a fusion box by weighted fusion of prediction boxes with high confidence,so as to obtain accurate acoustic shadow boxes.Further,the acoustic shadow box is cut down to get the feature map containing the acoustic shadow information,and then the acoustic shadow feature map and the target information feature map are adaptively fused to make full use of the acoustic shadow feature information.In addition,we introduce a threshold processing module to improve the attention of the model to important feature information.Through the underwater sonar dataset provided by Pengcheng Laboratory,the proposed method improved the average accuracy by 3.14%at the IoU threshold of 0.7,which is better than the current traditional target detection model.展开更多
文摘Having criticized the current architecture of Advanced Traveler Information Systems (ATISs), this work discusses a new base of requirements to develop a new paradigm for traffic information systems. It mainly integrates three dimensions within a traffic system: drivers' pattern of behavior and preferences, urban traffic desires, and capabilities of traffic information service providers. Based on the above, functional segments from several related backgrounds are brought together to structure a new architecture, called Interactive Traveler Information System (ITIS). The main interactive feature of this new architecture is a two-way communication track between drivers and the traffic information system provider-in fact, a decision on choosing a road at a particular time for an individual will be made based on the utility of both sides. This new configuration consists of driver-side smartphone application, centric traffic prediction, and decision-maker units, which will shape a new approach of decision-making processes. These all work together to satisfy the designated goal of ITIS, which is preserving the Wardrop equilibrium condition in the traffic network level. Finally, we concentrate on a comparison study, which shows a differentiation between performance of the proposed ITIS and the current ATIS model in a real situation. This has been done with simulations of analogical scenarios. The most noticeable advantage of the proposed architecture is not being limited to a saturation limit, and the positive effect of increasing system penetration in the performance of the newly introduced information system. In conclusion, new research subjects are suggested to be carried out.
文摘Smart Grid (SG) is an emerging paradigm of the modern world to upgrade and enhance the existing conventional electrical power infrastructure from generation to distribution to the consumers in a two-way communication fashion to automate the electrical power demand and supply and make this a cyber-physical system. SG infrastructure key elements, such as smart meters, circuit breakers, transformers, feeders, substations, control centers, grid stations, are required well-formed communication network architectures. SG infrastructure is divided into three main communication networks architectures, such as HAH, NAN, and WAN. Each of these communication network architectures requires reliable, stable, secure, high data rate at real-time with the help of different wireline and wireless communication technologies from HAN to WAN networks. To understand the complete concepts about SG, a concise review is presented and it will help the readers to get foundations of communication network architectures and technologies of SG.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘This paper relates to an advanced open mobile communication system and method of integrating the mobile communications, wireless access systems and wired communications into one common platform architecture for China's 4th generation mobile communications, supporting costeffective broadband voice, data and video services in wireless, mobile and wired environment with one single integrated mobile terminal device. The paper includes new architecture in the integrated mobile device and converged network access, and minimum modifi cation in the existing mobile telecommunication infrastructures. This paper introduces the long-term evolution strategy for China's TDD system platform towards China's future 4G mobile communications.
文摘Network information communication technology in power systems is the key to ensuring the safe and efficient operation of power grids.The network information communication technology itself has advantages in automation operation and information transmission,thus is widely applied to the power system.In the case of ensuring that the power system is compatible with the network information communication technology,the control of the power system can be strengthened,and the operational efficiency of the power system can be improved.This paper mainly analyzes the specific application of network information communication technology in power system.
文摘On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 2001 has been incorporated a new subject matter under the copyright protection: the right of communication through information network, that is, the right to make a work available to the public by wire or by wireless means, so that people may have access to the work from a place and at a time individu...
文摘Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially.
基金financial support of National Natural Science Foundation of China(NSFC),No.U1705263 and 61971102GF Innovative Research Programthe Sichuan Science and Technology Program,No.2019YJ0194。
文摘In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation.
基金supported in part by the National Natural Science Foundation of China (No. 61571104)the Sichuan Science and Technology Program (No. 2018JY0539)+2 种基金the Key projects of the Sichuan Provincial Education Department (No. 18ZA0219)the Fundamental Research Funds for the Central Universities (No. ZYGX2017KYQD170)the Innovation Funding (No. 2018510007000134)
文摘The integrated information network is a large capacity information network that integrates various communication platforms on the ground, at sea, in the air and in the deep air through the inter-satellite and satellite-ground links to acquire information accurately, process it quickly, and transmit it efficiently. The satellite communication, as an important part of integrated information networks, is one of main approaches to acquire, process and distribute communication information and resources. In this paper, based on current researches of the satellite communication network, we put forward a 3-layer satellite communication network model based on the Software Defined Network (SDN). Meanwhile, to improve current routing policies of the Low Earth Orbit (LEO) satellite communication network, we put forward an Adaptive Routing Algorithm (ARA) to sustain the shortest satellite communication link. Experiment results show that the proposed method can effectively reduce link distance and communication delay, and realize adaptive path planning.
基金The research was partially funded by the Ministry of Science and Higher Education of the Russian Federation as part of World-class Research Center program:Advanced Digital Technologies(Contract No.075-15-2020-903 dated 16.11.2020).
文摘This paper presents an original probabilistic model of a hybrid underwater wireless sensor network(UWSN),which includes a network of stationary sensors placed on the seabed and a mobile gateway.The mobile gateway is a wave glider that collects data from the underwater network segment and retransmits it to the processing center.The authors consider the joint problem of optimal localization of stationary network nodes and the corresponding model for bypassing reference nodes by a wave glider.The optimality of the network is evaluated according to the criteria of energy efficiency and reliability.The influence of various physical and technical parameters of the network on its energy efficiency and on the lifespan of sensor nodes is analyzed.The analysis is carried out for networks of various scales,depending on the localization of stationary nodes and the model of bypassing the network with a wave glider.As a model example,the simulation of the functional characteristics of the network for a given size of the water area is carried out.It is shown that in the case of a medium-sized water area,the model of“bypassing the perimeter”by a wave glider is practically feasible,energy efficient and reliable for hourly data measurements.In the case of a large water area,the cluster bypass model becomes more efficient.
文摘Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new models to ensure the safe transmission of information through such systems.Recently,quantum systems have drawn much attention since they are expected to have a significant impact on the research in information security.This paper proposes a quantum teleportation scheme based on controlled multi-users to ensure the secure information transmission among users.Quantum teleportation is an original key element in a variety of quantum information tasks as well as quantum-based technologies,which plays a pivotal role in the current progress of quantum computing and communication.In the proposed scheme,the sender transmits the information to the receiver under the control of a third user or controller.Here,we show that the efficiency of the proposed scheme depends on the properties of the transmission channel and the honesty of the controller.Compared with various teleportation scheme presented recently in the literature,the most important difference in the proposed scheme is the possibility of suspicion about the honesty of the controller and,consequently,taking proper precautions.
文摘The human brain is built to process complex visual impressions within milliseconds. In comparison with sequentially coded spoken language and written texts, we are capable of consuming graphical information at a high bandwidth in a parallel fashion, producing a picture worth more than a thousand words. Effective information visualization can be a powerful tool to capture people's attention and quickly communicate large amounts of data and complex information. This is particularly important in the context of communication data, which often describes entities (people, organizations) and their connections through communication. Visual analytics approaches can optimize the user-computer interaction to gain insights into communication networks and learn about their structures. Network visualization is a perfect instrument to better communicate the results of analysis. The precondition for effective information visualization and successful visual reasoning is the capability to draw "good" pictures. Even though communication networks are often large, including thousands or even millions of people, underlying visualization principles are identical to those used for visualizing smaller networks. In this article, you will learn about these principles, giving you the ability to assess the quality of network visualizations and to draw better network pictures by yourself.
文摘The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find it useful to have a tool that enables them to associate the faces in fiont of them with the account names they know. This paper proposes a method that enables a person to identify the account name of the person ("target") in front of him/her using a smartphone. The attendees to a meeting exchange their identifiers (i.e., the account name) and GPS information using smartphones. When the user points his/her smartphone towards a target, the target's identifier is displayed near the target's head on the camera screen using AR (augmented reality). The position where the identifier is displayed is calculated from the differences in longitude and latitude between the user and the target and the azimuth direction of the target from the user. The target is identified based on this information, the face detection coordinates, and the distance between the two. The proposed method has been implemented using Android terminals, and identification accuracy has been examined through experiments.
文摘Space information network is used for real time acquiring, transmitting and processing the space information on the space platform, which provides significant communication services for communication, navigation positioning and science exploration. In this paper, the architecture of Software Defined Space Optical Network (SDSON) based on cloud platform is designed by means of Software Defined Optical Network (SDON) and cloud services. The new architecture combining centralized and distributed management-control mechanism is a multi-layer and multi-domain architecture with powerful computing and storage ability. Moreover, reliable service and unreliable service communication models employed in the space information network are proposed considering the characteristic of Disruption/Delay Tolerant Network (DTN). Finally, the functional verification and demonstration are performed on our optical experimental network platform.
文摘Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems.
基金supported by the National Natural Science Foundation of China(Nos.91338201,91438109,61401507).
文摘SIN(Space Information Network)has recently emerged as a promising approach to solving the collaboration difficulty among current space programs.However,because of the SIN’s large scale,high component complexity,and dynamic characteristics,designing a proper SIN architecture is challenging.Firstly,we propose a novel SIN architecture,which is composed of GEO(Geostationary Earth Orbit)satellites as backbone network nodes,LEO(Low Earth Orbit)or other types of satellites as enhanced coverage nodes,and high-altitude platforms to meet the service requirements of emergency or hot-spot applications.Unlike most existing studies,the proposed architecture is AS(Autonomous-System)based.We decouple the complex SIN into simpler sub-networks using a hierarchical AS model.Then,we propose a topology control algorithm to minimize the time delay among sub-AS networks.We prove that the proposed algorithm achieves logical k-connectivity provided that the original physical topology has k-connectivity.Simulation results validate the theoretic analysis and effectiveness of the algorithm.
基金supported by the National Natural Science Foundation of China(Nos.61231011,61671478)。
文摘Focusing on its main requirements and challenges and by analyzing the characteristics of different space platforms,an overall architecture for space information networks is proposed based on national strategic planning and the present development status of associated technologies.Furthermore,the core scientific problems that need to be solved are expounded.In addition,the primary considerations and a preliminary integrated demonstration environment for verification of key technologies are presented.
文摘There is growing interest in the integrated sensing and communication(ISAC)to extend the 5G+/6G network capabilities by introducing sensing capability.While the solutions for mono-static or bi-static ISAC have shown feasibility and benefits based on existing 5G physical layer design,whether and how to coordinate multiple ISAC devices to better exert networking performance are rarely discussed.3 rd Partnership Project(3GPP)has initiated the ISAC use cases study,and the follow-up studies for network architecture could be anticipated.In this article,we focus on gNB-based sensing mode and propose ISAC functional framework with given of highlevel service procedures to enable cellular based ISAC services.In the proposed ISAC framework,three types of network functions for sensing service as Sensing Function(SF),lightweight-Edge Sensing Function(ESF)and full-version-ESF are designed with interaction with network nodes to fulfill the latency requirements of ISAC use cases.Finally,with simulation evaluations and hardware testbed results,we further verify the performance benefit and feasibility to enable ISAC in 5G for the gNB-based sensing mode with new design on SF and related signaling protocols.
基金This work is supported by National Natural Science Foundation of China(Grant:62272109).
文摘Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and model detection performance is degraded due to the complex imaging environment,we proposed a more effective and robust target detection framework based on deep learning,which can make full use of the acoustic shadow information in the forward-looking sonar images to assist underwater target detection.Firstly,the weighted box fusion method is adopted to generate a fusion box by weighted fusion of prediction boxes with high confidence,so as to obtain accurate acoustic shadow boxes.Further,the acoustic shadow box is cut down to get the feature map containing the acoustic shadow information,and then the acoustic shadow feature map and the target information feature map are adaptively fused to make full use of the acoustic shadow feature information.In addition,we introduce a threshold processing module to improve the attention of the model to important feature information.Through the underwater sonar dataset provided by Pengcheng Laboratory,the proposed method improved the average accuracy by 3.14%at the IoU threshold of 0.7,which is better than the current traditional target detection model.