This article proposes and demonstrates a retrodirective array(RDA)for two-way wireless communication with automatic beam tracking.The proposed RDA is enabled by specifically designed chips made using a domestic comple...This article proposes and demonstrates a retrodirective array(RDA)for two-way wireless communication with automatic beam tracking.The proposed RDA is enabled by specifically designed chips made using a domestic complementary metal-oxide semiconductor(CMOS)process.The highly integrated CMOS chip includes a receiving(Rx)chain,a transmitting(Tx)chain,and a unique tracking phaselocked loop(PLL)for the crucial conjugated phase recovery in the RDA.This article also proposes a method to reduce the beam pointing error(BPE)in a conventional RDA.To validate the above ideas simply yet without loss of generality,a 2.4 GHz RDA is demonstrated through two-way communication links between the Rx and Tx chains,and an on-chip quadrature coupler is designed to achieve a nonretrodirective signal suppression of 23 dBc.The experimental results demonstrate that the proposed RDA,which incorporates domestically manufactured low-cost 0.18 lm CMOS chips,is capable of automatically tracking beams covering±40with a reduced BPE.Each CMOS chip in the RDA has a compact size of 4.62 mm^(2) and a low power consumption of 0.15 W.To the best of the authors’knowledge,this is the first research to demonstrate an RDA with a fully customized CMOS chip for wireless communication with automatic beam tracking。展开更多
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In...The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.展开更多
In air traffic control communications (ATCC), misunderstandings between pilots and controllers could result in fatal aviation accidents. Fortunately, advanced automatic speech recognition technology has emerged as a p...In air traffic control communications (ATCC), misunderstandings between pilots and controllers could result in fatal aviation accidents. Fortunately, advanced automatic speech recognition technology has emerged as a promising means of preventing miscommunications and enhancing aviation safety. However, most existing speech recognition methods merely incorporate external language models on the decoder side, leading to insufficient semantic alignment between speech and text modalities during the encoding phase. Furthermore, it is challenging to model acoustic context dependencies over long distances due to the longer speech sequences than text, especially for the extended ATCC data. To address these issues, we propose a speech-text multimodal dual-tower architecture for speech recognition. It employs cross-modal interactions to achieve close semantic alignment during the encoding stage and strengthen its capabilities in modeling auditory long-distance context dependencies. In addition, a two-stage training strategy is elaborately devised to derive semantics-aware acoustic representations effectively. The first stage focuses on pre-training the speech-text multimodal encoding module to enhance inter-modal semantic alignment and aural long-distance context dependencies. The second stage fine-tunes the entire network to bridge the input modality variation gap between the training and inference phases and boost generalization performance. Extensive experiments demonstrate the effectiveness of the proposed speech-text multimodal speech recognition method on the ATCC and AISHELL-1 datasets. It reduces the character error rate to 6.54% and 8.73%, respectively, and exhibits substantial performance gains of 28.76% and 23.82% compared with the best baseline model. The case studies indicate that the obtained semantics-aware acoustic representations aid in accurately recognizing terms with similar pronunciations but distinctive semantics. The research provides a novel modeling paradigm for semantics-aware speech recognition in air traffic control communications, which could contribute to the advancement of intelligent and efficient aviation safety management.展开更多
Measurement-device-independent quantum key distribution (MDI-QKD) is proven to be immune to all the de- tector side channel attacks. With two symmetric quantum channels, the maximal transmission distance can be doub...Measurement-device-independent quantum key distribution (MDI-QKD) is proven to be immune to all the de- tector side channel attacks. With two symmetric quantum channels, the maximal transmission distance can be doubled when compared with the prepare-and-measure QKD. An interesting question is whether the transmission distance can be extended further. In this work, we consider the contributions of the two-way local operations and classical communications to the key generation rate and transmission distance of the MDI-QKD. Our numerical results show that the secure transmission distances are increased by about 12kin and 8 km when the 1 13 and the 2 B steps are implemented, respectively.展开更多
To promote reliable and secure communications in the cognitive radio network,the automatic modulation classification algorithms have been mainly proposed to estimate a single modulation.In this paper,we address the cl...To promote reliable and secure communications in the cognitive radio network,the automatic modulation classification algorithms have been mainly proposed to estimate a single modulation.In this paper,we address the classification of superimposed modulations dedicated to 5G multipleinput multiple-output(MIMO)two-way cognitive relay network in realistic channels modeled with Nakagami-m distribution.Our purpose consists of classifying pairs of users modulations from superimposed signals.To achieve this goal,we apply the higher-order statistics in conjunction with the Multi-BoostAB classifier.We use several efficiency metrics including the true positive(TP)rate,false positive(FP)rate,precision,recall,F-Measure and receiver operating characteristic(ROC)area in order to evaluate the performance of the proposed algorithm in terms of correct superimposed modulations classification.Computer simulations prove that our proposal allows obtaining a good probability of classification for ten superimposed modulations at a low signal-to-noise ratio,including the worst case(i.e.,m=0.5),where the fading distribution follows a one-sided Gaussian distribution.We also carry out a comparative study between our proposal usingMultiBoostAB classifier with the decision tree(J48)classifier.Simulation results show that the performance of MultiBoostAB on the superimposed modulations classifications outperforms the one of J48 classifier.In addition,we study the impact of the symbols number,path loss exponent and relay position on the performance of the proposed automatic classification superimposed modulations in terms of probability of correct classification.展开更多
The decoy-state quantum key distribution protocol suggested by Adachi et al. (Phys. Rev. Lett 99 180503 (2007)) is proven to be secure and feasible with current techniques. It owns two attractive merits, i.e., its...The decoy-state quantum key distribution protocol suggested by Adachi et al. (Phys. Rev. Lett 99 180503 (2007)) is proven to be secure and feasible with current techniques. It owns two attractive merits, i.e., its longer secure transmission distance and more convenient operation design. In this paper, we first improve the protocol with the aid of local operation and two-way classical communication (2-LOCC). After our modifications, the secure transmission distance is increased by about 20 km, which will make the protocol more practicable.展开更多
In this paper, we describe an improved cooperative two-way quantum communication scheme that works in a forward-and-backward fashion. In this scheme, partial entanglement analysis based on five-qubit entangled Brown s...In this paper, we describe an improved cooperative two-way quantum communication scheme that works in a forward-and-backward fashion. In this scheme, partial entanglement analysis based on five-qubit entangled Brown state allows for the simultaneous exchange of arbitrary unknown states between Alice and Bob (with the help of trusted Charlie). Security is guaranteed because opposing unknown states are transmitted by performing the suitable recovery operations in a deterministic way or, in the case of irregularities, no results are generated. The current two-way quantum communication scheme can also be extended to transmit arbitrary unknown states. This is done in a probabilistic way by using two-way quantum teleportation based on the generalized Brown-like state.展开更多
Aiming at the energy consumption of long-distance device-to-device(D2D) devices for two-way communications in a cellular network,this paper proposes a strategy that combines two-way relay technology(TWRT) and simultan...Aiming at the energy consumption of long-distance device-to-device(D2D) devices for two-way communications in a cellular network,this paper proposes a strategy that combines two-way relay technology(TWRT) and simultaneous wireless information and power transfer(SWIPT) technology to achieve high energy efficiency(EE) communication.The scheme first establishes a fractional programming problem to maximize EE of D2D,and transforms it into a non-fractional optimization problem that can be solved easily.Then the problem is divided into three sub-problems:power control,power splitting ratios optimization,and relay selection.In order to maximize EE of the D2D pair,the Dinkelbach iterative algorithm is used to optimize the transmitted power of two D2D devices simultaneously;the one-dimensional search algorithm is proposed to optimize power splitting ratios;an improved optimal relay selection scheme based on EE is proposed to select relay.Finally,experiments are carried out on the Matlab simulation platform.The simulation results show that the proposed algorithm has faster convergence.Compared with the one-way relay transmission and fixed relay algorithms,the proposed scheme has higher EE.展开更多
Data acquisition, analysis and calibrating system affiliated with the vehicle is developed for the research on the automatic shift system (ASS). Considering the vehicle’s hard environment such as vibration, high and ...Data acquisition, analysis and calibrating system affiliated with the vehicle is developed for the research on the automatic shift system (ASS). Considering the vehicle’s hard environment such as vibration, high and low temperature, electromagnetic disturbance and so on, the most suitable project is selected. PC104 transfers data with ECU by serial communication and a solid state disk is used as a FLASH ROM. Some techniques including frequency division of data is adopted in the software design in order to ensure the sampling frequency. The analysis and debug software is also contrived according to the characteristic of the ASS. The system plays an important role in the development of the ASS because of the good reliability and practicability in the application.展开更多
In this paper, we investigate the energy efficiency and spectrum efficiency, including one-hop device-to-device(D2D) communications mode and two-way amplify-and-forward(AF) relaying D2D communications mode in underlay...In this paper, we investigate the energy efficiency and spectrum efficiency, including one-hop device-to-device(D2D) communications mode and two-way amplify-and-forward(AF) relaying D2D communications mode in underlay D2D communications enabled cellular networks. An analysis of average energy efficiency and spectrum efficiency are developed and closed-form expressions are obtained for two types of D2D communications modes under the effect of Rayleigh fading channel, path loss, and co-channel interference. Analytical results are validated through numerical simulations. Based on the simulation, the effects of the interference, the distance between D2D pair and the position of relay node on the energy efficiency and spectrum efficiency of D2D communications are investigated. The optimal D2D transmission powers of these two modes to maximize the energy efficiency are also investigated.展开更多
A device-to-device (D2D) communication mode underlaying cellular network in a single- cell environment is introduced. A practical method based on link adaptation with automatic repeat request (ARQ) is presented. L...A device-to-device (D2D) communication mode underlaying cellular network in a single- cell environment is introduced. A practical method based on link adaptation with automatic repeat request (ARQ) is presented. Link adaptation technique, which combines adaptive modulation and coding ( AMC ) with truncated ARQ, can maximize the cellular UEs' data rate under prescribed delay and performance constraints. The proposed method can maximize the total transmission rate when an outage probability is determined. Numerical results show that with proper power control, the in- terference between the two links can be coordinated to increase the sum rate without overwhelming the cellular service.展开更多
A large part of our daily lives is spent with audio information. Massive obstacles are frequently presented by the colossal amounts of acoustic information and the incredibly quick processing times. This results in th...A large part of our daily lives is spent with audio information. Massive obstacles are frequently presented by the colossal amounts of acoustic information and the incredibly quick processing times. This results in the need for applications and methodologies that are capable of automatically analyzing these contents. These technologies can be applied in automatic contentanalysis and emergency response systems. Breaks in manual communication usually occur in emergencies leading to accidents and equipment damage. The audio signal does a good job by sending a signal underground, which warrants action from an emergency management team at the surface. This paper, therefore, seeks to design and simulate an audio signal alerting and automatic control system using Unity Pro XL to substitute manual communication of emergencies and manual control of equipment. Sound data were trained using the neural network technique of machine learning. The metrics used are Fast Fourier transform magnitude, zero crossing rate, root mean square, and percentage error. Sounds were detected with an error of approximately 17%;thus, the system can detect sounds with an accuracy of 83%. With more data training, the system can detect sounds with minimal or no error. The paper, therefore, has critical policy implications about communication, safety, and health for underground mine.展开更多
Software is a crucial component in the communication systems,and its security is of paramount importance.However,it is susceptible to different types of attacks due to potential vulnerabilities.Meanwhile,significant t...Software is a crucial component in the communication systems,and its security is of paramount importance.However,it is susceptible to different types of attacks due to potential vulnerabilities.Meanwhile,significant time and effort is required to fix such vulnerabilities.We propose an automated program repair method based on controlled text generation techniques.Specifically,we utilize a fine-tuned language model for patch generation and introduce a discriminator to evaluate the generation process,selecting results that contribute most to vulnerability fixes.Additionally,we perform static syntax analysis to expedite the patch verification process.The effectiveness of the proposed approach is validated using QuixBugs and Defects4J datasets,demonstrating significant improvements in generating correct patches compared to other existing methods.展开更多
An estimate-and-forward(EF) scheme for single-input single-output(SISO) and multiple-input multiple-output(MIMO) full-duplex two-way relay networks is proposed and analyzed. The relay estimates the received signal fro...An estimate-and-forward(EF) scheme for single-input single-output(SISO) and multiple-input multiple-output(MIMO) full-duplex two-way relay networks is proposed and analyzed. The relay estimates the received signal from two terminal nodes by a minimum mean squared error(MMSE) estimation and forwards a scaled version of the MMSE estimate to the destination. The proposed EF outperforms conventional amplify-and-forward(AF) and decode-and-forward(DF) across all signal-to-noise ratio(SNR) region. Because its computational complexity is high for relays with a large number of antennas(large MIMO) and/or high order constellations, an approximate EF scheme, called list EF, are thus proposed to reduce the computational complexity. The proposed list EF computes a candidate list for the MMSE estimate by using a sphere decoder, and it approaches the performance of the exact EF relay at a negligible performance loss. The proposed forwarding approach also could be used to other relay networks, such as half-duplex, one-way or massive MIMO relay networks.展开更多
Interference alignment(IA) is one of the promising measures for the multi-user network to manage interference. The rank constraints rank minimization means that interference spans the lowest dimensional subspace and t...Interference alignment(IA) is one of the promising measures for the multi-user network to manage interference. The rank constraints rank minimization means that interference spans the lowest dimensional subspace and the useful signal spans all available spatial dimensions. In order to improve the performance of two-way relay network, we can use rank constrained rank minimization(RCRM) to solve the IA problem. This paper proposes left reweighted nuclear norm minimization-γalgorithm and selective coupling reweighted nuclear norm minimization algorithm to implement interference alignment in two-way relay networks. The left reweighted nuclear norm minimization-γ algorithm is based on reweighted nuclear norm minimization algorithm and has a novel γ choosing rule. The selective coupling reweighted nuclear norm minimization algorithm weighting methods choose according to singular value of interference matrixes. Simulation results show that the proposed algorithms considerably improve the sum rate performance and achieve the higher average achievable multiplexing gain in two-way relay interference networks.展开更多
An experiment of two-stage adaptive compensation for polarization mode dispersion (PMD) iu a 40-Gb/s optical time-division multiplexed communication system is reported. The PMD monitoring technique based on degree of ...An experiment of two-stage adaptive compensation for polarization mode dispersion (PMD) iu a 40-Gb/s optical time-division multiplexed communication system is reported. The PMD monitoring technique based on degree of polarization was adopted. The particle swarm optimization (PSO) algorithm was introduced in adaptive PMD compensation. The comparison was made to estimate the effectiveness between PSO algorithms with global neighborhood structure (GPSO) and with local neighborhood structure (LPSO). The LPSO algorithm is shown to be more effective to search global optimum for PMD compensation than GPSO algorithm. The two-stage PMD compensator is shown to be effective for both first- and second-order PMD, and he compensator is shown to be bit rate independent. The optimum searching time is within one huudred milliseconds.展开更多
In this paper, we present a two-way quantum dense key distribution protocol. With double check modes, our scheme is secure regardless of the presence of noises. And with a quantum teleportation process, secret message...In this paper, we present a two-way quantum dense key distribution protocol. With double check modes, our scheme is secure regardless of the presence of noises. And with a quantum teleportation process, secret message can be encoded deterministically even if the quantum channel is highly lossy. Therefore, our scheme can be used in a realistic quantum channel regardless of the presence of noises and channel losses.展开更多
This paper investigates the achievable secrecy rate region of the Gaussian two-way wiretap channel,which describes the simultaneous secure two-way transmission of a confidential message. Through adjusting the time-sha...This paper investigates the achievable secrecy rate region of the Gaussian two-way wiretap channel,which describes the simultaneous secure two-way transmission of a confidential message. Through adjusting the time-sharing factor and the rate at which the random secret key is fed back, the allocation and optimization for the secrecy rates of two-way communication are achieved. Under peak and average power constraints, the achievable secrecy rate regions of the two-way communication are derived respectively.展开更多
Abstract In this thesis, multiagent system specifications, multiagent system architectures, agent communication languages and agent communication protocols, automatic abstracting based on multiagent technologies are ...Abstract In this thesis, multiagent system specifications, multiagent system architectures, agent communication languages and agent communication protocols, automatic abstracting based on multiagent technologies are studied. Some concerned problems of designs and realization of automatic abstracting systems based on multiagent technologies are studied, too. Chapter 1 shows the significance and objectives of the thesis, its main contents are summarized, and innovations of the thesis are showed. Some basic concepts of agents and multiagent systems are studied in Chapter 2. The definitions of agents and multiagent systems are given, and the theory, technologies and applications of multiagent systems are summarized. Furthermore, some important studying trends of multiagent systems are set forward. Multiagent system specifications are studied in Chapter 3. MAS/KIB—a multiagent system specification is built using mental states such as K (Know), B (Belief), and I (Intention), its grammar and semanteme are discussed, axioms and inference rules are given, and some properties are researched. We also compare MAS/KIB with other existing specifications. MAS/KIB has the following characteristics: (1) each agent has its own world outlook; (2) no global data in the system; (3) processes of state changes are used as indexes to systems; (4) it has the characteristics of not only time series logic but also dynamic logic; and (5) interactive actions are included. The architectures of multiagent systems are studied in Chapter 4. First, we review some typical architecture of multiagent systems, agent network architecture, agent federated architecture, agent blackboard architecture, and Foundation of Intelligent Physical Agent(FIPA) architecture. For the first time, we set forward and study the layering and partitioning models of the architectures of multiagent systems, organizing architecture models, and interoperability architecture model of multiagent systems. Chapter 5 studies agent communication languages. We study FIPA Agent Communication Language(ACL) message grammar, Communicative Act(CA) types, ACL semantics and Agent Communication Protocols. The string grammar of ACL messages and SL grammar represented by EBNF are given, and a new ACL semantic model is set forward. We study automatic abstracting based on multiagent technologies in Chapter 6. For the first time, the idea of constructing automatic abstracting systems based on multiagent technologies is set forward, and the necessity and feasibility of constructing such systems are set forth. The architecture of automatic abstracting systems based on multiagent technologies is provided, and the basic elements and mutual relations are studied. We set forth the working principle of the automatic abstracting systems based on multiagent technologies and how the contradiction of domain currency and abstract quality of automatic abstracting systems is resolved. Studies, simulation analysis and design of the automatic abstracting experimental system based on multiagent technologies(ABES/MAT) are made in Chapter 7. We study the architecture of ABES/MAT, and set forth its basic elements and mutual relations. The user model and mathematics descriptions of ABES/MAT in the Internet environment are provided. Three coordination algorithms that synthetically use environment information, system information and history information are set forward. Then, we analyze the performance of ABES/MAT based on the simulations, and get suitable number fo abstracting agents for each domain in a given load. Finally, we compare the three coordination algorithms. The realization of ABES/MAT is introduced in Chapter 8. Firstly, we study the problem of the agentification of legacy systems, and show how to realize the agentification of glanc, ladies and news. Then, the architectures and functions of Coordination Management Agent(CMA) and Information Agent(IA) are set forth. The agent naming grammar represented by EBNF is given., In the following, we explain the designed agent communicative acts and management展开更多
In this paper a new automatic frequency control (AFC) scheme was proposed, which could be used for the receiver of low earth orbit (LEO) satellite communication system in continuous transmitting scenario. By emplo...In this paper a new automatic frequency control (AFC) scheme was proposed, which could be used for the receiver of low earth orbit (LEO) satellite communication system in continuous transmitting scenario. By employing the time varying characteristic of particle filter technique, the new scheme combined the preamble based estimating step and data based estimating step to provide initial probability density recursively. Theoretical analysis proved that the proposed AFC scheme could provide better performance than the two-step scheme. The same conclusion was achieved by computer simulations with the criteria of root-mean square (RMS) frequency estimating performance and bit error rate performance.展开更多
基金supported in part by the National Key Research and Development Program of China(2019YFB2204701)in part by the National Natural Science Foundation of China(61831006,62022023,and 62250610223)in part by the Big Data Computing Center at Southeast University for numerical calculation.
文摘This article proposes and demonstrates a retrodirective array(RDA)for two-way wireless communication with automatic beam tracking.The proposed RDA is enabled by specifically designed chips made using a domestic complementary metal-oxide semiconductor(CMOS)process.The highly integrated CMOS chip includes a receiving(Rx)chain,a transmitting(Tx)chain,and a unique tracking phaselocked loop(PLL)for the crucial conjugated phase recovery in the RDA.This article also proposes a method to reduce the beam pointing error(BPE)in a conventional RDA.To validate the above ideas simply yet without loss of generality,a 2.4 GHz RDA is demonstrated through two-way communication links between the Rx and Tx chains,and an on-chip quadrature coupler is designed to achieve a nonretrodirective signal suppression of 23 dBc.The experimental results demonstrate that the proposed RDA,which incorporates domestically manufactured low-cost 0.18 lm CMOS chips,is capable of automatically tracking beams covering±40with a reduced BPE.Each CMOS chip in the RDA has a compact size of 4.62 mm^(2) and a low power consumption of 0.15 W.To the best of the authors’knowledge,this is the first research to demonstrate an RDA with a fully customized CMOS chip for wireless communication with automatic beam tracking。
基金supported by the National Natural Science Foundation of China(Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China(Grant No.2020YFA0309702)+2 种基金the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan Province(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies.
文摘The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.
基金This research was funded by Shenzhen Science and Technology Program(Grant No.RCBS20221008093121051)the General Higher Education Project of Guangdong Provincial Education Department(Grant No.2020ZDZX3085)+1 种基金China Postdoctoral Science Foundation(Grant No.2021M703371)the Post-Doctoral Foundation Project of Shenzhen Polytechnic(Grant No.6021330002K).
文摘In air traffic control communications (ATCC), misunderstandings between pilots and controllers could result in fatal aviation accidents. Fortunately, advanced automatic speech recognition technology has emerged as a promising means of preventing miscommunications and enhancing aviation safety. However, most existing speech recognition methods merely incorporate external language models on the decoder side, leading to insufficient semantic alignment between speech and text modalities during the encoding phase. Furthermore, it is challenging to model acoustic context dependencies over long distances due to the longer speech sequences than text, especially for the extended ATCC data. To address these issues, we propose a speech-text multimodal dual-tower architecture for speech recognition. It employs cross-modal interactions to achieve close semantic alignment during the encoding stage and strengthen its capabilities in modeling auditory long-distance context dependencies. In addition, a two-stage training strategy is elaborately devised to derive semantics-aware acoustic representations effectively. The first stage focuses on pre-training the speech-text multimodal encoding module to enhance inter-modal semantic alignment and aural long-distance context dependencies. The second stage fine-tunes the entire network to bridge the input modality variation gap between the training and inference phases and boost generalization performance. Extensive experiments demonstrate the effectiveness of the proposed speech-text multimodal speech recognition method on the ATCC and AISHELL-1 datasets. It reduces the character error rate to 6.54% and 8.73%, respectively, and exhibits substantial performance gains of 28.76% and 23.82% compared with the best baseline model. The case studies indicate that the obtained semantics-aware acoustic representations aid in accurately recognizing terms with similar pronunciations but distinctive semantics. The research provides a novel modeling paradigm for semantics-aware speech recognition in air traffic control communications, which could contribute to the advancement of intelligent and efficient aviation safety management.
基金Supported by the National Natural Science Foundation of China under Grant No 61378011the Program for Science and Technology Innovation Research Team in University of Henan Province under Grant No 13IRTSTHN020
文摘Measurement-device-independent quantum key distribution (MDI-QKD) is proven to be immune to all the de- tector side channel attacks. With two symmetric quantum channels, the maximal transmission distance can be doubled when compared with the prepare-and-measure QKD. An interesting question is whether the transmission distance can be extended further. In this work, we consider the contributions of the two-way local operations and classical communications to the key generation rate and transmission distance of the MDI-QKD. Our numerical results show that the secure transmission distances are increased by about 12kin and 8 km when the 1 13 and the 2 B steps are implemented, respectively.
文摘To promote reliable and secure communications in the cognitive radio network,the automatic modulation classification algorithms have been mainly proposed to estimate a single modulation.In this paper,we address the classification of superimposed modulations dedicated to 5G multipleinput multiple-output(MIMO)two-way cognitive relay network in realistic channels modeled with Nakagami-m distribution.Our purpose consists of classifying pairs of users modulations from superimposed signals.To achieve this goal,we apply the higher-order statistics in conjunction with the Multi-BoostAB classifier.We use several efficiency metrics including the true positive(TP)rate,false positive(FP)rate,precision,recall,F-Measure and receiver operating characteristic(ROC)area in order to evaluate the performance of the proposed algorithm in terms of correct superimposed modulations classification.Computer simulations prove that our proposal allows obtaining a good probability of classification for ten superimposed modulations at a low signal-to-noise ratio,including the worst case(i.e.,m=0.5),where the fading distribution follows a one-sided Gaussian distribution.We also carry out a comparative study between our proposal usingMultiBoostAB classifier with the decision tree(J48)classifier.Simulation results show that the performance of MultiBoostAB on the superimposed modulations classifications outperforms the one of J48 classifier.In addition,we study the impact of the symbols number,path loss exponent and relay position on the performance of the proposed automatic classification superimposed modulations in terms of probability of correct classification.
基金supported by the Young Scientists Fund of the National Natural Science Foundation of China (Grant No. 10905028/A050104)the Natural Science Foundation of Henan Province,China (Grant No. 092300410188)+1 种基金the Science Foundation of Hennan Provincial Education Department (Grant No. 2010A140010)Youth Fund of Luoyang Normal College
文摘The decoy-state quantum key distribution protocol suggested by Adachi et al. (Phys. Rev. Lett 99 180503 (2007)) is proven to be secure and feasible with current techniques. It owns two attractive merits, i.e., its longer secure transmission distance and more convenient operation design. In this paper, we first improve the protocol with the aid of local operation and two-way classical communication (2-LOCC). After our modifications, the secure transmission distance is increased by about 20 km, which will make the protocol more practicable.
基金supported by the National Natural Science Foundation of China(60902044,61172184)the New Century Excellent Talents in University(NCET-11-0510)+1 种基金partly by the World Class University R32-2010-000-20014-0NRFFundamental Research 2010-0020942 NRF,Korea
文摘In this paper, we describe an improved cooperative two-way quantum communication scheme that works in a forward-and-backward fashion. In this scheme, partial entanglement analysis based on five-qubit entangled Brown state allows for the simultaneous exchange of arbitrary unknown states between Alice and Bob (with the help of trusted Charlie). Security is guaranteed because opposing unknown states are transmitted by performing the suitable recovery operations in a deterministic way or, in the case of irregularities, no results are generated. The current two-way quantum communication scheme can also be extended to transmit arbitrary unknown states. This is done in a probabilistic way by using two-way quantum teleportation based on the generalized Brown-like state.
基金Supported by the National Natural Science Foundation of China (No.61561031)。
文摘Aiming at the energy consumption of long-distance device-to-device(D2D) devices for two-way communications in a cellular network,this paper proposes a strategy that combines two-way relay technology(TWRT) and simultaneous wireless information and power transfer(SWIPT) technology to achieve high energy efficiency(EE) communication.The scheme first establishes a fractional programming problem to maximize EE of D2D,and transforms it into a non-fractional optimization problem that can be solved easily.Then the problem is divided into three sub-problems:power control,power splitting ratios optimization,and relay selection.In order to maximize EE of the D2D pair,the Dinkelbach iterative algorithm is used to optimize the transmitted power of two D2D devices simultaneously;the one-dimensional search algorithm is proposed to optimize power splitting ratios;an improved optimal relay selection scheme based on EE is proposed to select relay.Finally,experiments are carried out on the Matlab simulation platform.The simulation results show that the proposed algorithm has faster convergence.Compared with the one-way relay transmission and fixed relay algorithms,the proposed scheme has higher EE.
文摘Data acquisition, analysis and calibrating system affiliated with the vehicle is developed for the research on the automatic shift system (ASS). Considering the vehicle’s hard environment such as vibration, high and low temperature, electromagnetic disturbance and so on, the most suitable project is selected. PC104 transfers data with ECU by serial communication and a solid state disk is used as a FLASH ROM. Some techniques including frequency division of data is adopted in the software design in order to ensure the sampling frequency. The analysis and debug software is also contrived according to the characteristic of the ASS. The system plays an important role in the development of the ASS because of the good reliability and practicability in the application.
基金supported by the National Natural Science Foundation of China under Grant U1805262, 61871446, 61671251 and 61701201the Natural Science Foundation of Jiangsu Province under Grant No.BK20170758+2 种基金the Natural Science Foundation for colleges and universities of Jiangsu Province under Grant No.17KJB510011the open research fund of National Mobile Communications Research Laboratory,Southeast University under Grant No.2015D10Project of Key Laboratory of Wireless Communications of Jiangsu Province under Grant No.NK214001
文摘In this paper, we investigate the energy efficiency and spectrum efficiency, including one-hop device-to-device(D2D) communications mode and two-way amplify-and-forward(AF) relaying D2D communications mode in underlay D2D communications enabled cellular networks. An analysis of average energy efficiency and spectrum efficiency are developed and closed-form expressions are obtained for two types of D2D communications modes under the effect of Rayleigh fading channel, path loss, and co-channel interference. Analytical results are validated through numerical simulations. Based on the simulation, the effects of the interference, the distance between D2D pair and the position of relay node on the energy efficiency and spectrum efficiency of D2D communications are investigated. The optimal D2D transmission powers of these two modes to maximize the energy efficiency are also investigated.
基金Supported by the China Major National S&T Program(2010ZX03003-003)China-EU International Scientific and Technological Cooperation Program(0902)+1 种基金the Sino-Swedish IMT-Advanced and Beyond Cooperative Program(2008DFA11780)the Open Project Program of Guangdong Provincial Key Laboratory of Short-Range Wireless Detection and Communication and PCSIRT-IRT(1005)
文摘A device-to-device (D2D) communication mode underlaying cellular network in a single- cell environment is introduced. A practical method based on link adaptation with automatic repeat request (ARQ) is presented. Link adaptation technique, which combines adaptive modulation and coding ( AMC ) with truncated ARQ, can maximize the cellular UEs' data rate under prescribed delay and performance constraints. The proposed method can maximize the total transmission rate when an outage probability is determined. Numerical results show that with proper power control, the in- terference between the two links can be coordinated to increase the sum rate without overwhelming the cellular service.
文摘A large part of our daily lives is spent with audio information. Massive obstacles are frequently presented by the colossal amounts of acoustic information and the incredibly quick processing times. This results in the need for applications and methodologies that are capable of automatically analyzing these contents. These technologies can be applied in automatic contentanalysis and emergency response systems. Breaks in manual communication usually occur in emergencies leading to accidents and equipment damage. The audio signal does a good job by sending a signal underground, which warrants action from an emergency management team at the surface. This paper, therefore, seeks to design and simulate an audio signal alerting and automatic control system using Unity Pro XL to substitute manual communication of emergencies and manual control of equipment. Sound data were trained using the neural network technique of machine learning. The metrics used are Fast Fourier transform magnitude, zero crossing rate, root mean square, and percentage error. Sounds were detected with an error of approximately 17%;thus, the system can detect sounds with an accuracy of 83%. With more data training, the system can detect sounds with minimal or no error. The paper, therefore, has critical policy implications about communication, safety, and health for underground mine.
基金This work was supported by the National Natural Science Foundation of China(No.62372173).
文摘Software is a crucial component in the communication systems,and its security is of paramount importance.However,it is susceptible to different types of attacks due to potential vulnerabilities.Meanwhile,significant time and effort is required to fix such vulnerabilities.We propose an automated program repair method based on controlled text generation techniques.Specifically,we utilize a fine-tuned language model for patch generation and introduce a discriminator to evaluate the generation process,selecting results that contribute most to vulnerability fixes.Additionally,we perform static syntax analysis to expedite the patch verification process.The effectiveness of the proposed approach is validated using QuixBugs and Defects4J datasets,demonstrating significant improvements in generating correct patches compared to other existing methods.
基金supported in part by the National Natural Science Foundation of China 61501461, 61471269, 61622101 and 61571020the National 973 Project under grant 2013CB336700+2 种基金the National 863 Project under grant SS2015AA011306the National Science Foundation under grant number CNS-1343189 and ECCS-1232305the Early Career Development Award of SKLMCCS (Y3S9021F34)
文摘An estimate-and-forward(EF) scheme for single-input single-output(SISO) and multiple-input multiple-output(MIMO) full-duplex two-way relay networks is proposed and analyzed. The relay estimates the received signal from two terminal nodes by a minimum mean squared error(MMSE) estimation and forwards a scaled version of the MMSE estimate to the destination. The proposed EF outperforms conventional amplify-and-forward(AF) and decode-and-forward(DF) across all signal-to-noise ratio(SNR) region. Because its computational complexity is high for relays with a large number of antennas(large MIMO) and/or high order constellations, an approximate EF scheme, called list EF, are thus proposed to reduce the computational complexity. The proposed list EF computes a candidate list for the MMSE estimate by using a sphere decoder, and it approaches the performance of the exact EF relay at a negligible performance loss. The proposed forwarding approach also could be used to other relay networks, such as half-duplex, one-way or massive MIMO relay networks.
基金supported by the National Science Foundation of China (NO.61271240, 61671253)
文摘Interference alignment(IA) is one of the promising measures for the multi-user network to manage interference. The rank constraints rank minimization means that interference spans the lowest dimensional subspace and the useful signal spans all available spatial dimensions. In order to improve the performance of two-way relay network, we can use rank constrained rank minimization(RCRM) to solve the IA problem. This paper proposes left reweighted nuclear norm minimization-γalgorithm and selective coupling reweighted nuclear norm minimization algorithm to implement interference alignment in two-way relay networks. The left reweighted nuclear norm minimization-γ algorithm is based on reweighted nuclear norm minimization algorithm and has a novel γ choosing rule. The selective coupling reweighted nuclear norm minimization algorithm weighting methods choose according to singular value of interference matrixes. Simulation results show that the proposed algorithms considerably improve the sum rate performance and achieve the higher average achievable multiplexing gain in two-way relay interference networks.
文摘An experiment of two-stage adaptive compensation for polarization mode dispersion (PMD) iu a 40-Gb/s optical time-division multiplexed communication system is reported. The PMD monitoring technique based on degree of polarization was adopted. The particle swarm optimization (PSO) algorithm was introduced in adaptive PMD compensation. The comparison was made to estimate the effectiveness between PSO algorithms with global neighborhood structure (GPSO) and with local neighborhood structure (LPSO). The LPSO algorithm is shown to be more effective to search global optimum for PMD compensation than GPSO algorithm. The two-stage PMD compensator is shown to be effective for both first- and second-order PMD, and he compensator is shown to be bit rate independent. The optimum searching time is within one huudred milliseconds.
基金Project supported by the National Natural Science Foundation of China (Grant No 10504039).Acknowledgment We thank Qing-yu Cai for useful discussion.
文摘In this paper, we present a two-way quantum dense key distribution protocol. With double check modes, our scheme is secure regardless of the presence of noises. And with a quantum teleportation process, secret message can be encoded deterministically even if the quantum channel is highly lossy. Therefore, our scheme can be used in a realistic quantum channel regardless of the presence of noises and channel losses.
基金supported in part by the National HighTech Research and Development (863) Program (No. ss2015AA011306)the National key Basic Research and Development (973) Program of China (No. 2012CB316000)+1 种基金the Science Fund for Creative Research Groups of NSFC (No. 61321061)Tsinghua University Initiative Scientific Research (No. 2015Z02-3)
文摘This paper investigates the achievable secrecy rate region of the Gaussian two-way wiretap channel,which describes the simultaneous secure two-way transmission of a confidential message. Through adjusting the time-sharing factor and the rate at which the random secret key is fed back, the allocation and optimization for the secrecy rates of two-way communication are achieved. Under peak and average power constraints, the achievable secrecy rate regions of the two-way communication are derived respectively.
文摘Abstract In this thesis, multiagent system specifications, multiagent system architectures, agent communication languages and agent communication protocols, automatic abstracting based on multiagent technologies are studied. Some concerned problems of designs and realization of automatic abstracting systems based on multiagent technologies are studied, too. Chapter 1 shows the significance and objectives of the thesis, its main contents are summarized, and innovations of the thesis are showed. Some basic concepts of agents and multiagent systems are studied in Chapter 2. The definitions of agents and multiagent systems are given, and the theory, technologies and applications of multiagent systems are summarized. Furthermore, some important studying trends of multiagent systems are set forward. Multiagent system specifications are studied in Chapter 3. MAS/KIB—a multiagent system specification is built using mental states such as K (Know), B (Belief), and I (Intention), its grammar and semanteme are discussed, axioms and inference rules are given, and some properties are researched. We also compare MAS/KIB with other existing specifications. MAS/KIB has the following characteristics: (1) each agent has its own world outlook; (2) no global data in the system; (3) processes of state changes are used as indexes to systems; (4) it has the characteristics of not only time series logic but also dynamic logic; and (5) interactive actions are included. The architectures of multiagent systems are studied in Chapter 4. First, we review some typical architecture of multiagent systems, agent network architecture, agent federated architecture, agent blackboard architecture, and Foundation of Intelligent Physical Agent(FIPA) architecture. For the first time, we set forward and study the layering and partitioning models of the architectures of multiagent systems, organizing architecture models, and interoperability architecture model of multiagent systems. Chapter 5 studies agent communication languages. We study FIPA Agent Communication Language(ACL) message grammar, Communicative Act(CA) types, ACL semantics and Agent Communication Protocols. The string grammar of ACL messages and SL grammar represented by EBNF are given, and a new ACL semantic model is set forward. We study automatic abstracting based on multiagent technologies in Chapter 6. For the first time, the idea of constructing automatic abstracting systems based on multiagent technologies is set forward, and the necessity and feasibility of constructing such systems are set forth. The architecture of automatic abstracting systems based on multiagent technologies is provided, and the basic elements and mutual relations are studied. We set forth the working principle of the automatic abstracting systems based on multiagent technologies and how the contradiction of domain currency and abstract quality of automatic abstracting systems is resolved. Studies, simulation analysis and design of the automatic abstracting experimental system based on multiagent technologies(ABES/MAT) are made in Chapter 7. We study the architecture of ABES/MAT, and set forth its basic elements and mutual relations. The user model and mathematics descriptions of ABES/MAT in the Internet environment are provided. Three coordination algorithms that synthetically use environment information, system information and history information are set forward. Then, we analyze the performance of ABES/MAT based on the simulations, and get suitable number fo abstracting agents for each domain in a given load. Finally, we compare the three coordination algorithms. The realization of ABES/MAT is introduced in Chapter 8. Firstly, we study the problem of the agentification of legacy systems, and show how to realize the agentification of glanc, ladies and news. Then, the architectures and functions of Coordination Management Agent(CMA) and Information Agent(IA) are set forth. The agent naming grammar represented by EBNF is given., In the following, we explain the designed agent communicative acts and management
基金supported by the National Basic Research Program of China (2009CB320401)the National Science and Technology Major Project of China (2012ZX03004005-002)+1 种基金the New Generation Broadband Wireless Mobile Communication Network of Major Special Projects (2010ZX03003-001)the Fundamental Research Funds for the Central Universities (2010PTB-03-04 G470220)
文摘In this paper a new automatic frequency control (AFC) scheme was proposed, which could be used for the receiver of low earth orbit (LEO) satellite communication system in continuous transmitting scenario. By employing the time varying characteristic of particle filter technique, the new scheme combined the preamble based estimating step and data based estimating step to provide initial probability density recursively. Theoretical analysis proved that the proposed AFC scheme could provide better performance than the two-step scheme. The same conclusion was achieved by computer simulations with the criteria of root-mean square (RMS) frequency estimating performance and bit error rate performance.