Using the asymptotic iteration method, we obtain the S-wave solution for a short-range three-parameter central potential with 1/r singularity and with a non-orbital barrier. To the best of our knowledge, this is the f...Using the asymptotic iteration method, we obtain the S-wave solution for a short-range three-parameter central potential with 1/r singularity and with a non-orbital barrier. To the best of our knowledge, this is the first attempt at calculating the energy spectrum for this potential, which was introduced by H. Bahlouli and A. D. Alhaidari and for which they obtained the “potential parameter spectrum”. Our results are also independently verified using a direct method of diagonalizing the Hamiltonian matrix in the J-matrix basis.展开更多
In order to increase the capacity of encrypted information and reduce the loss of information transmission, a three-dimensional(3 D) scene encryption algorithm based on the phase iteration of the angular spectrum doma...In order to increase the capacity of encrypted information and reduce the loss of information transmission, a three-dimensional(3 D) scene encryption algorithm based on the phase iteration of the angular spectrum domain is proposed in this paper. The algorithm, which adopts the layer-oriented method, generates the computer generated hologram by encoding the three-dimensional scene. Then the computer generated hologram is encoded into three pure phase functions by adopting the phase iterative algorithm based on angular spectrum domain,and the encryption process is completed. The three-dimensional scene encryption can improve the capacity of the information,and the three-phase iterative algorithm can guarantee the security of the encryption information. The numerical simulation results show that the algorithm proposed in this paper realized the encryption and decryption of three-dimensional scenes. At the same time, it can ensure the safety of the encrypted information and increase the capacity of the encrypted information.展开更多
We study a spectrum sharing problem where multiple systems coexist and interfere with each other. First, an analysis is proposed for distributed spectrum sharing based on Prisoners' Dilemma (PD) in Cognitive Radio...We study a spectrum sharing problem where multiple systems coexist and interfere with each other. First, an analysis is proposed for distributed spectrum sharing based on Prisoners' Dilemma (PD) in Cognitive Radios (CRs). In one-shot game, selfish and rational CRs greedily full spread their own spectrum space in order to maximize their own rates, which leads to Nash Equilibrium (N.E.). But with long term interaction, i.e., Iterated Prisoner's Dilemma (IPD), CRs can come to cooperate and acquire the social optimal point by using different evolutionary strategies such as Tit For Tat (TFT), Generous TFT (GTFT), etc. Also we compare the performances of the different evolutionary strategies in noise-free and noisy environments for two-player games. Finally, N-player IPD (N-IPD) is simulated to verify our conclusions that TFT is a good strategy for spectrum sharing in CRs.展开更多
Peer-to-peer(P2P)spectrum sharing and energy trading are promising solutions to locally satisfy spectrum and energy demands in power Internet of Things(IoT).However,implementation of largescale P2P spectrum sharing an...Peer-to-peer(P2P)spectrum sharing and energy trading are promising solutions to locally satisfy spectrum and energy demands in power Internet of Things(IoT).However,implementation of largescale P2P spectrum sharing and energy trading confronts security and privacy challenges.In this paper,we exploit consortium blockchain and Directed Acyclic Graph(DAG)to propose a new secure and distributed spectrum sharing and energy trading framework in power IoT,named spectrum-energy chain,where a set of local aggregators(LAGs)cooperatively confirm the identity of the power devices by utilizing consortium blockchain,so as to form a main chain.Then,the local power devices verify spectrum and energy micro-transactions simultaneously but asynchronously to form local spectrum tangle and local energy tangle,respectively.Moreover,an iterative double auction based micro transactions scheme is designed to solve the spectrum and energy pricing and the amount of shared spectrum and energy among power devices.Security analysis and numerical results illustrate that the developed spectrum-energy chain and the designed iterative double auction based microtransactions scheme are secure and efficient for spectrum sharing and energy trading in power IoT.展开更多
Aimed at the conventional serial communication system fails when the channel was frequency-selective,long delay and multi-paths effect,resulting in inter-symbol-interference( ISI),an iterative system for underwater ac...Aimed at the conventional serial communication system fails when the channel was frequency-selective,long delay and multi-paths effect,resulting in inter-symbol-interference( ISI),an iterative system for underwater acoustic communication( UWAC) was proposed,which employed iterative differential detection and spread spectrum technique. The proposed scheme adopts π /4-DQPSK soft demodulation to overcome the difficulty of phase ambiguity. For suppression of ISI in UWAC,joint demodulation and decoding iteration was used. The communication scheme has the characteristic of long communication range at low SNR,and the maximum range is up to 100 km. The theoretic analysis and simulation results show that the proposed scheme outperforms traditional serial one. When SNR is- 6 dB,after four joint iterations,compared with serial scheme,BER can decrease from 10- 2to 10- 5.展开更多
文摘Using the asymptotic iteration method, we obtain the S-wave solution for a short-range three-parameter central potential with 1/r singularity and with a non-orbital barrier. To the best of our knowledge, this is the first attempt at calculating the energy spectrum for this potential, which was introduced by H. Bahlouli and A. D. Alhaidari and for which they obtained the “potential parameter spectrum”. Our results are also independently verified using a direct method of diagonalizing the Hamiltonian matrix in the J-matrix basis.
基金supported by the Natural Science ResearchProject of the Colleges and Universities of Anhui Province(KJ2016A056)Natural Science Foundation of Anhui Province of China(1508085MF121)National Natural Science Foundation of China(61572032)。
文摘In order to increase the capacity of encrypted information and reduce the loss of information transmission, a three-dimensional(3 D) scene encryption algorithm based on the phase iteration of the angular spectrum domain is proposed in this paper. The algorithm, which adopts the layer-oriented method, generates the computer generated hologram by encoding the three-dimensional scene. Then the computer generated hologram is encoded into three pure phase functions by adopting the phase iterative algorithm based on angular spectrum domain,and the encryption process is completed. The three-dimensional scene encryption can improve the capacity of the information,and the three-phase iterative algorithm can guarantee the security of the encryption information. The numerical simulation results show that the algorithm proposed in this paper realized the encryption and decryption of three-dimensional scenes. At the same time, it can ensure the safety of the encrypted information and increase the capacity of the encrypted information.
基金Supported by the "863" Program (No.2009AA01Z241)the National Natural Science Foundation of China (No.60772062)+2 种基金Key Scientific Research Project of Office of Education in Jiangsu Province (No.06KJA51001)Scientific Research Project of Office of Education in Jiangsu Province (No.8KJB510015)Startup Funding (No.NY208048)
文摘We study a spectrum sharing problem where multiple systems coexist and interfere with each other. First, an analysis is proposed for distributed spectrum sharing based on Prisoners' Dilemma (PD) in Cognitive Radios (CRs). In one-shot game, selfish and rational CRs greedily full spread their own spectrum space in order to maximize their own rates, which leads to Nash Equilibrium (N.E.). But with long term interaction, i.e., Iterated Prisoner's Dilemma (IPD), CRs can come to cooperate and acquire the social optimal point by using different evolutionary strategies such as Tit For Tat (TFT), Generous TFT (GTFT), etc. Also we compare the performances of the different evolutionary strategies in noise-free and noisy environments for two-player games. Finally, N-player IPD (N-IPD) is simulated to verify our conclusions that TFT is a good strategy for spectrum sharing in CRs.
基金supported by the National Key R&D Program of China(2020YFB1807801,2020YFB1807800)in part by Project Supported by Engineering Research Center of Mobile Communications,Ministry of Education(cqupt-mct-202003)+2 种基金in part by Key Lab of Information Network Security,Ministry of Public Security under Grant C19603in part by National Natural Science Foundation of China(Grant No.61901067 and 61901013)in part by Chongqing Municipal Natural Science Foundation(Grant No.cstc2020jcyj-msxmX0339).
文摘Peer-to-peer(P2P)spectrum sharing and energy trading are promising solutions to locally satisfy spectrum and energy demands in power Internet of Things(IoT).However,implementation of largescale P2P spectrum sharing and energy trading confronts security and privacy challenges.In this paper,we exploit consortium blockchain and Directed Acyclic Graph(DAG)to propose a new secure and distributed spectrum sharing and energy trading framework in power IoT,named spectrum-energy chain,where a set of local aggregators(LAGs)cooperatively confirm the identity of the power devices by utilizing consortium blockchain,so as to form a main chain.Then,the local power devices verify spectrum and energy micro-transactions simultaneously but asynchronously to form local spectrum tangle and local energy tangle,respectively.Moreover,an iterative double auction based micro transactions scheme is designed to solve the spectrum and energy pricing and the amount of shared spectrum and energy among power devices.Security analysis and numerical results illustrate that the developed spectrum-energy chain and the designed iterative double auction based microtransactions scheme are secure and efficient for spectrum sharing and energy trading in power IoT.
基金Sponsored by the Advanced Research Project of"Twelve-Five-Year-Plan"of Weapon System(Grant No.4010201050201)the China Postdoctoral Science Foundation Founded Project(Grant No.2011M500640)+1 种基金the Postdoctoral Science Foundation of Heilongjiang Province(Grant No.LBHZ10206)the China Fundamental Research Funds for the Central Universities(Grant No.HEUCF130802)
文摘Aimed at the conventional serial communication system fails when the channel was frequency-selective,long delay and multi-paths effect,resulting in inter-symbol-interference( ISI),an iterative system for underwater acoustic communication( UWAC) was proposed,which employed iterative differential detection and spread spectrum technique. The proposed scheme adopts π /4-DQPSK soft demodulation to overcome the difficulty of phase ambiguity. For suppression of ISI in UWAC,joint demodulation and decoding iteration was used. The communication scheme has the characteristic of long communication range at low SNR,and the maximum range is up to 100 km. The theoretic analysis and simulation results show that the proposed scheme outperforms traditional serial one. When SNR is- 6 dB,after four joint iterations,compared with serial scheme,BER can decrease from 10- 2to 10- 5.