期刊文献+
共找到45篇文章
< 1 2 3 >
每页显示 20 50 100
QBIoT:A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature
1
作者 Ang Liu Qing Zhang +3 位作者 Shengwei Xu Huamin Feng Xiu-bo Chen Wen Liu 《Computers, Materials & Continua》 SCIE EI 2024年第7期1727-1751,共25页
The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functio... The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functionality.However,the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats,such as device vulnerabilities,data privacy concerns,and network susceptibilities.Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security.Nevertheless,the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used in blockchain,potentially exposing it to quantum cyber-attacks.To support the growth of the IoT industry,mitigate quantum threats,and safeguard IoT data,this study proposes a robust blockchain solution for IoT that incorporates both classical and post-quantum security measures.Firstly,we present the Quantum-Enhanced Blockchain Architecture for IoT(QBIoT)to ensure secure data sharing and integrity protection.Secondly,we propose an improved Proof of Authority consensus algorithm called“Proof of Authority with Random Election”(PoARE),implemented within QBIoT for leader selection and new block creation.Thirdly,we develop a publickey quantum signature protocol for transaction verification in the blockchain.Finally,a comprehensive security analysis of QBIoT demonstrates its resilience against cyber threats from both classical and quantum adversaries.In summary,this research introduces an innovative quantum-enhanced blockchain solution to address quantum security concernswithin the realmof IoT.The proposedQBIoT framework contributes to the ongoing development of quantum blockchain technology and offers valuable insights for future research on IoT security. 展开更多
关键词 IOT quantum blockchain public-key quantum signature quantum hash function
下载PDF
Quantum-Enhanced Blockchain: A Secure and Practical Blockchain Scheme 被引量:1
2
作者 Ang Liu Xiu-Bo Chen +3 位作者 Gang Xu Zhuo Wang Xuefen Feng Huamin Feng 《Computers, Materials & Continua》 SCIE EI 2023年第7期259-277,共19页
The rapid advancement of quantum technology poses significant security risks to blockchain systems.However,quantum technology can also provide solutions for enhancing blockchain security.In this paper,we propose a qua... The rapid advancement of quantum technology poses significant security risks to blockchain systems.However,quantum technology can also provide solutions for enhancing blockchain security.In this paper,we propose a quantum-enhanced blockchain scheme to achieve a high level of security against quantum computing attacks.We first discuss quantum computing attacks on classic blockchains,including attacks on hash functions,digital signatures,and consensus mechanisms.We then introduce quantum technologies,such as a quantum hash function(QHF),a quantum digital signature(QDS),and proof of authority(PoA)consensus mechanism,into our scheme to improve the security of the blockchain system.Our security analysis demonstrates that our scheme offers superior security against quantum and classic attacks.Finally,we compare our scheme with previous works,showing that our scheme has achieved a perfect balance in terms of practicality,reliability,scalability,and efficiency.Overall,this work contributes to the ongoing research on quantum blockchain in the quantum era. 展开更多
关键词 Quantum blockchain quantum hash function quantum digital signature
下载PDF
Research and Implementation of Credit Investigation Sharing Platform Based on Double Blockchain
3
作者 Han Yanyan Wei Wanqi +1 位作者 Dou Kaili Li Peng 《Computers, Materials & Continua》 SCIE EI 2023年第6期5193-5211,共19页
As the development of the modern economy is increasingly insep-arable from credit support,the traditional credit investigation mode has yet to meet this demand.Because of the difficulties in conventional credit data s... As the development of the modern economy is increasingly insep-arable from credit support,the traditional credit investigation mode has yet to meet this demand.Because of the difficulties in conventional credit data sharing among credit investigation agencies,poor data portability,and centralized supervision,this paper proposes a data-sharing scheme for credit investigation agencies based on a double blockchain.Given the problems such as difficult data sharing,difficult recovery of damaged data,and accessible data leakage between institutions and users with non-traditional credit inves-tigation data other than credit,this paper proposes a data-sharing scheme for credit investigation subjects based on the digital envelope.Based on the above two solutions,this paper designs a double blockchain credit data-sharing plat-form based on the“public chain+alliance chain”from credit investigation agencies’and visiting subjects’perspectives.The sharing platform uses the alliance chain as the management chain to solve the problem of complex data sharing between credit bureaus and centralized supervision,uses the public chain as the use chain to solve the problem of complex data sharing between the access subject and the credit bureaus,uses the interplanetary file system and digital envelope and other technologies to solve the problem of difficult recovery of damaged data,data leakage,and other issues.After the upload test,the average upload speed reaches 80.6 M/s.The average download speed of the system is 88.7 M/s after the download test.The multi-thread stress test tests the linkage port on the system package,and the average response time for the hypertext transfer protocol(HTTP)is 0.6 ms.The system performance and security analysis show that the sharing platform can provide safe and reliable credit-sharing services for organizations and users and high working efficiency. 展开更多
关键词 Dual blockchain credit data sharing truffle framework digital envelope ipfs
下载PDF
EduASAC:A Blockchain-Based Education Archive Sharing and Access Control System
4
作者 Ronglei Hu Chuce He +4 位作者 Yaping Chi Xiaoyi Duan Xiaohong Fan Ping Xu Wenbin Gao 《Computers, Materials & Continua》 SCIE EI 2023年第12期3387-3422,共36页
In the education archive sharing system,when performing homomorphic ciphertext retrieval on the storage server,there are problems such as low security of shared data,confusing parameter management,and weak access cont... In the education archive sharing system,when performing homomorphic ciphertext retrieval on the storage server,there are problems such as low security of shared data,confusing parameter management,and weak access control.This paper proposes an Education Archives Sharing and Access Control(EduASAC)system to solve these problems.The system research goal is to realize the sharing of security parameters,the execution of access control,and the recording of system behaviors based on the blockchain network,ensuring the legitimacy of shared membership and the security of education archives.At the same time,the system can be combined with most homomorphic ciphertext retrieval schemes running on the storage server,making the homomorphic ciphertext retrieval mechanism controllable.This paper focuses on the blockchain access control framework and specifically designs smart contracts that conform to the business logic of the EduASAC system.The former adopts a dual-mode access control mechanism combining Discretionary Access Control(DAC)and Mandatory Access Control(MAC)and improves the tagging mode after user permission verification based on the Authentication and Authorization for Constrained Environments(ACE)authorization framework of Open Authorization(OAuth)2.0;the latter is used in the system to vote on nodes to join requests,define access control policies,execute permission verification processes,store,and share system parameters,and standardize the behavior of member nodes.Finally,the EduASAC system realizes the encryption,storage,retrieval,sharing,and access control processes of education archives.To verify the performance of the system,simulation experiments were conducted.The results show that the EduASAC system can meet the high security needs of education archive sharing and ensure the system’s high throughput,low latency,fast decision-making,and fine-grained access control ability. 展开更多
关键词 Blockchain data security access control smart contract
下载PDF
Blockchain-Based Certificateless Cross-Domain Authentication Scheme in the Industrial Internet of Things
5
作者 Zhaobin Li Xiantao Liu +1 位作者 Nan Zhang Zhanzhen Wei 《Computers, Materials & Continua》 SCIE EI 2024年第9期3835-3854,共20页
The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during informati... The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during information exchange.To address the above challenges,a viable solution that combines Certificateless Public Key Cryptography(CL-PKC)with blockchain technology can be utilized.However,as many existing schemes rely on a single Key Generation Center(KGC),they are prone to problems such as single points of failure and high computational overhead.In this case,this paper proposes a novel blockchain-based certificateless cross-domain authentication scheme,that integrates the threshold secret sharing mechanism without a trusted center,meanwhile,adopts blockchain technology to enable cross-domain entities to authenticate with each other and to negotiate session keys securely.This scheme also supports the dynamic joining and removing of multiple KGCs,ensuring secure and efficient cross-domain authentication and key negotiation.Comparative analysiswith other protocols demonstrates that the proposed cross-domain authentication protocol can achieve high security with relatively lowcomputational overhead.Moreover,this paper evaluates the scheme based on Hyperledger Fabric blockchain environment and simulates the performance of the certificateless scheme under different threshold parameters,and the simulation results show that the scheme has high performance. 展开更多
关键词 IIoT blockchain CERTIFICATELESS cross-domain authentication
下载PDF
A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT
6
作者 Xiao Feng Zheng Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第2期1881-1895,共15页
First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism... First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism based on the time decay factor is proposed,taking into account the influence of historical interaction records.We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data.We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record.Then we propose an autoencoder-based trust clustering algorithm.We perform feature extraction based on autoencoders.Kullback leibler(KL)divergence is used to calculate the reconstruction error.When constructing a convolutional autoencoder,we introduce convolutional neural networks to improve training efficiency and introduce sparse constraints into the hidden layer of the autoencoder.The sparse penalty term in the loss function measures the difference through the KL divergence.Trust clustering is performed based on the density based spatial clustering of applications with noise(DBSCAN)clustering algorithm.During the clustering process,edge nodes have a variety of trustworthy attribute characteristics.We assign different attribute weights according to the relative importance of each attribute in the clustering process,and a larger weight means that the attribute occupies a greater weight in the calculation of distance.Finally,we introduced adaptive weights to calculate comprehensive trust evaluation.Simulation experiments prove that our trust evaluation mechanism has excellent reliability and accuracy. 展开更多
关键词 Cross-domain authentication trust evaluation autoencoder
下载PDF
Assessment of and Countermeasures against International Political Risk for Chinese Oil Companies 被引量:1
7
作者 Ma Hong Sun Zhu 《Petroleum Science》 SCIE CAS CSCD 2006年第4期78-81,共4页
Considering the circumstances of Chinese oil companies and the latest development of international politics and world oil situation, this paper analyzes the implication and main factors of international political risk... Considering the circumstances of Chinese oil companies and the latest development of international politics and world oil situation, this paper analyzes the implication and main factors of international political risk for Chinese oil companies, and presents the principles, mode and scoring method for the assessment of international political risk. Strategies and suggestions to manage international political risk in their overseas business are provided for Chinese oil companies. 展开更多
关键词 Chinese oil company international political risk political risk assessment STRATEGY
下载PDF
A Safe and Reliable Routing Mechanism of LEO Satellite Based on SDN 被引量:1
8
作者 Chao Guo Juan Guo +3 位作者 Chanjuan Yu Zhaobin Li Cheng Gong Abdul Waheed 《Computers, Materials & Continua》 SCIE EI 2020年第7期439-454,共16页
Satellite networks have high requirements for security and data processing speed.In order to improve the reliability of the network,software-defined network(SDN)technology is introduced and a central controller is set... Satellite networks have high requirements for security and data processing speed.In order to improve the reliability of the network,software-defined network(SDN)technology is introduced and a central controller is set in the network.Due to the characteristics of global perspective,control data separation,and centralized control of SDN,the idea of SDN is introduced to the design of the satellite network model.As a result,satellite nodes are only responsible for data transmission,while the maintenance of the links and the calculation of routes are implemented by the controller.For the massive LEO satellite network based on SDN,a state evaluation decision routing mechanism is proposed.The designed mechanism monitors the status of the entire network effectively and reduces the on-board load on the satellite network.The best routing decision is made under the comprehensive consideration of the current and historical status of each inter-satellite link between Low Earth Orbit(LEO)satellite network nodes.The calculation and storage requirements are controlled within a reasonable range.Based on the curve parameter transmission fuzzy encryption algorithm,a safe and reliable condition assessment decision routing mechanism(CADRM)is designed.It ensures that the personal information of the LEO satellite network can be transmitted safely and effectively.The experimental simulation results show the improvement of network throughput,the reduction of packet loss rate and the enhancing of network reliability. 展开更多
关键词 ROUTE LEO satellite SDN state assessment inter-satellite link
下载PDF
A DIGITAL SIGNATURE-BASED VISUAL CRYPTOGRAPHY SCHEME FOR IMAGE DISCRIMINATION AND MANAGEMENT 被引量:1
9
作者 Han Yanyan Hu Yupu He Wencai 《Journal of Electronics(China)》 2009年第5期631-636,共6页
Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no informat... Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no information on the original key. But a mass of sub-keys have to be saved actually, which faces the problem of inconvenient discrimination and management. This paper presents a visual cryptography scheme based on the digital signature for image discrimination and management, applying the digital signature and the time-stamp technology to the visual cryptography scheme. The scheme both solves the problem on the storage and management of the sharing sub-keys, increases the verification of image contents, thus enhances the validity of storage and management without security effect. 展开更多
关键词 Visual cryptography Digital signature Time-stamp
下载PDF
Analysis and Improvement of the Real-Time Segmented Pulse Compression-Detection Algorithm
10
作者 YANG Jian-xi 《Journal of Donghua University(English Edition)》 EI CAS 2016年第6期928-932,共5页
Real-Time segmented pulse compression-detection is one of the key technologies of space-borne tracking receiver. Its implementation requires an optimized and dedicated hardware. The real-time processing places several... Real-Time segmented pulse compression-detection is one of the key technologies of space-borne tracking receiver. Its implementation requires an optimized and dedicated hardware. The real-time processing places several constraints such as area occupied, power comumption, and speed. A number of segmented compression techniques have been proposed to overcome these limitations and decrease the processing latency. However, relatively high power loss in the partial field could limit their implementation in many current real-time systems. A good theoretical model was designed with intersection signal accumulation to enhance signal- noise-ratio (SNR) gain of detecting signal in the paper. From the experimental results it is known that this approach works well for pulse compression-detection, which is better suited for implementation in the high performance of current field programmable gate array (FPGA) with dedicated hardware multipliers. 展开更多
关键词 linear frequency modulation(LFM) segmented pulse compression signal-noise-ratio(SNR) gain target detection
下载PDF
ChatGPT:The New Trend of Smart Education
11
作者 Jianxin Wang Hongke Xu +4 位作者 Yuzheng Zheng Chaoen Xiao Lei Zhang Hanlin Chen Xin Chen 《Journal of Contemporary Educational Research》 2023年第12期35-46,共12页
In response to the limitations of the traditional education and teaching model,this article proposes a smart education model based on ChatGPT.The model actively breaks the constraint of time and space and the design p... In response to the limitations of the traditional education and teaching model,this article proposes a smart education model based on ChatGPT.The model actively breaks the constraint of time and space and the design patterns of traditional education,providing smart education services including personalized learning,smart tutoring and evaluation,educational content creation support,and education big data analysis.Through constructing an open and inclusive learning space and creating flexible and diverse educational models,ChatGPT can help to meet students’individuality and overall development,as well as assist teachers in keeping up with the students’learning performance and developmental requirements in real-time.This provides an important basis for optimizing teaching content,offering personalized and accurate cultivation,and planning the development path of students. 展开更多
关键词 ChatGPT Smart education Personalized learning Education big data analysis
下载PDF
Design and Implementation of USB Key System Based on Dual-Factor Identity Authentication Protocol
12
作者 Jianxin Wang Zifan Xu +2 位作者 Xiangze Chang Chaoen Xiao Lei Zhang 《Journal of Electronic Research and Application》 2024年第5期161-167,共7页
With the increasing demand for information security,traditional single-factor authentication technology can no longer meet security requirements.To this end,this paper proposes a Universal Serial Bus(USB)Key hardware ... With the increasing demand for information security,traditional single-factor authentication technology can no longer meet security requirements.To this end,this paper proposes a Universal Serial Bus(USB)Key hardware and software system based on a two-factor authentication protocol,aiming to improve the security and reliability of authentication.This paper first analyzes the current status and technical principles of USB Key-related research domestically and internationally and designs a two-factor authentication protocol that combines impact/response authentication and static password authentication.The system consists of a host computer and a USB Key device.The host computer interacts with the USB Key through a graphical user interface.The Secure Hash Algorithm 1(SHA-1)and MySQL database are used to implement the authentication function.Experimental results show that the designed two-factor authentication protocol can effectively prevent replay attacks and information tampering,and improve the security of authentication.If the corresponding USB Key is not inserted,the system will prompt that the device is not found.Once the USB Key is inserted,user identity is confirmed through two-factor verification,which includes impact/response authentication and static password authentication. 展开更多
关键词 Information security USB Key Impact/response authentication Static password authentication
下载PDF
生成对抗网络在医学图像生成中的应用 被引量:2
13
作者 黄玄曦 张健毅 +1 位作者 杨涛 ZHANG Fangjiao 《北京电子科技学院学报》 2020年第4期36-48,共13页
生成对抗网络由于其强大的数据生成能力而在计算机视觉领域很受重视.生成对抗网络的对抗性损失可以用一种巧妙的方式将未标记的样本纳入训练,这在数据增强、图像翻译等方面十分有用.因此,生成对抗网络也引来了医学图像生成领域的关注,... 生成对抗网络由于其强大的数据生成能力而在计算机视觉领域很受重视.生成对抗网络的对抗性损失可以用一种巧妙的方式将未标记的样本纳入训练,这在数据增强、图像翻译等方面十分有用.因此,生成对抗网络也引来了医学图像生成领域的关注,并已经出现了很多应用,例如医学图像的重建、合成、降噪等.本文总结了IEEE、Springer、知网等数据库近年来的相关研究,将其按所使用的生成对抗网络架构类别划分,并就医学图像生成方面如何选择合适的生成对抗网络架构,生成对抗网络遇到的问题以及未来的发展方向做了讨论. 展开更多
关键词 生成对抗网络 医学图像生成 深度学习 数据增强
下载PDF
Digital Signature Based on ISRSAC 被引量:7
14
作者 Teng Yang Yanshuo Zhang +1 位作者 Song Xiao Yimin Zhao 《China Communications》 SCIE CSCD 2021年第1期161-168,共8页
Digital signature has recently played an increasingly important role in cyberspace security.Most of them are based on the public key cryptography.Public key cryptography is a mainstream cryptographic algorithm system ... Digital signature has recently played an increasingly important role in cyberspace security.Most of them are based on the public key cryptography.Public key cryptography is a mainstream cryptographic algorithm system that has been widely used in cyberspace security in recent years.The most classic public key cryptography algorithm is RSA and its difficulty is based on the large integer decomposition problem.In 2017,ISRSAC was proposed by M.Thangaval.ISRSAC has made security improvements to the RSA algorithm by increasing the complexity in factoring the value of modulus‘n’.A digital signature algorithm based on ISRSAC algorithm was completed in this paper,and furthermore,a proxy signature algorithm based on ISRSAC and two kinds of multi-signature algorithms were presented,which include sequential multi-signature and broadcasting multi-signature. 展开更多
关键词 ISRSAC digital signature proxy signature sequential multi-signature broadcasting multisignature
下载PDF
A Multivariate Public Key Cryptographic Scheme 被引量:5
15
作者 YUAN Feng SUN Ying +2 位作者 JIANG Jijun ZHAO Shangwei XU Shengwei 《China Communications》 SCIE CSCD 2014年第12期120-124,共5页
This paper presents a multivariate public key cryptographic scheme over a finite field with odd prime characteristic.The idea of embedding and layering is manifested in its construction.The security of the scheme is a... This paper presents a multivariate public key cryptographic scheme over a finite field with odd prime characteristic.The idea of embedding and layering is manifested in its construction.The security of the scheme is analyzed in detail,and this paper indicates that the scheme can withstand the up to date differential cryptanalysis.We give heuristic arguments to show that this scheme resists all known attacks. 展开更多
关键词 public key cryptography polynomials multivariate finite field
下载PDF
A Hardware Trojan Detection Method Based on the Electromagnetic Leakage 被引量:1
16
作者 Lei Zhang Youheng Dong +2 位作者 Jianxin Wang Chaoen Xiao Ding Ding 《China Communications》 SCIE CSCD 2019年第12期100-110,共11页
Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficu... Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficult to detecte due to its minimal resource occupation. In order to achieve an accurate detection with high efficiency, a HT detection method based on the electromagnetic leakage of the chip is proposed in this paper. At first, the dimensionality reduction and the feature extraction of the electromagnetic leakage signals in each group(template chip, Trojan-free chip and target chip) were realized by principal component analysis(PCA). Then, the Mahalanobis distances between the template group and the other groups were calculated. Finally, the differences between the Mahalanobis distances and the threshold were compared to determine whether the HT had been implanted into the target chip. In addition, the concept of the HT Detection Quality(HTDQ) was proposed to analyze and compare the performance of different detection methods. Our experiment results indicate that the accuracy of this detection method is 91.93%, and the time consumption is 0.042s in average, which shows a high HTDQ compared with three other methods. 展开更多
关键词 hardware trojan detection side channel analysis electromagnetic leakage principal component analysis Mahalanobis distance detection quality
下载PDF
Efficient Security Multimedia System on Embedded Platform 被引量:1
17
作者 WANG Lifeng MENG Qinglei +3 位作者 XIAO Chen MA Jian DU Yaogang WANG Wendong 《China Communications》 SCIE CSCD 2010年第4期120-125,共6页
Security video communication is a challenging task,especially for wireless video applications.An efficient security multimedia system on embedded platform is designed.By analyzing the hardware architecture and resourc... Security video communication is a challenging task,especially for wireless video applications.An efficient security multimedia system on embedded platform is designed.By analyzing the hardware architecture and resource,the efficient DSP-based H.264/AVC coding is studied by efficient video coding techniques and system optimizing implementation.To protect the confidentiality and integrity of media information,a novel security mechanism is presented,which includes user identify authentication and a perceptual video encryption algorithm based on exploiting the special feature of entropy coding in H.264.Experimental results show that the proposed hardware framework has high performance and achieves a better balance between security and efficiency.The proposed security mechanism can achieve high security and low complexity cost,and has a little effect on the compression ratio and transmission bandwidth.What’s more,encoding and encryption at the same time,the performance of data process can meet real-time application. 展开更多
关键词 H.264/AVC Encode Optimizing ENCRYPTION Identify Authentication
下载PDF
Weakness in Projected C*- Scheme 被引量:1
18
作者 YUAN Feng YANG Yang +1 位作者 HU Yupu OU Haiwen 《China Communications》 SCIE CSCD 2010年第4期29-34,共6页
This paper presents an algebraic method to attack the projected C*? cryptographic scheme.The attack applies the affine parts of the private keys and the weakness caused by the structures of the private keys to find a ... This paper presents an algebraic method to attack the projected C*? cryptographic scheme.The attack applies the affine parts of the private keys and the weakness caused by the structures of the private keys to find a large number of linear equations.The attack can recover the private keys efficiently when the parameters are small enough.Meanwhile,the weak keys of the scheme are found and the private keys can be recovered efficiently once the weak keys are used.The paper also proposes a new modification of C*? cryptographic scheme,which is not only as efficient as original projected C*? scheme,but also resistant to the differential attack and the attack proposed in this paper. 展开更多
关键词 Information Security Public Key Cryptography ATTACK WEAKNESS
下载PDF
Software-Defined Space-Air-Ground Integrated Network Architecture with the Multi-Layer Satellite Backbone Network 被引量:1
19
作者 Chao Guo Cheng Gong +3 位作者 Juan Guo Zhanzhen Wei Yanyan Han Sher Zaman Khan 《Computers, Materials & Continua》 SCIE EI 2020年第7期527-540,共14页
Under the background of the rapid development of ground mobile communication,the advantages of high coverage,survivability,and flexibility of satellite communication provide air support to the construction of space in... Under the background of the rapid development of ground mobile communication,the advantages of high coverage,survivability,and flexibility of satellite communication provide air support to the construction of space information network.According to the requirements of the future space information communication,a software-defined Space-Air-Ground Integrated network architecture was proposed.It consisted of layered structure satellite backbone network,deep space communication network,the stratosphere communication network and the ground network.The Space-Air-Ground Integrated network was supported by the satellite backbone network.It provided data relay for the missions such as deep space exploration and controlled the deep-space spacecraft when needed.In addition,it safeguarded the anti-destructibility of stratospheric communication and assisted the stratosphere to supplement ground network communication.In this paper,algorithm requirements of the congestion control and routing of satellite backbone protocols for heterogeneous users’services were proposed.The algorithm requirements of distinguishing different service objects for the deep space communication and stratospheric communication network protocols were described.Considering the realistic demand for the dynamic coverage of the satellite backbone network and node cost,the multi-layer satellite backbone network architecture was constructed.On this basis,the proposed Software-defined Space-Air-Ground Integrated network architecture could be built as a large,scalable and efficient communication network that could be integrated into space,air,and ground. 展开更多
关键词 Space-Air-Ground integrated network network architecture software-defined network multi-layer satellite backbone network
下载PDF
Directional Modulation Based on a Quantum Genetic Algorithm for a Multiple-Reflection Model 被引量:1
20
作者 Yuwei Huang Xiubo Chen +2 位作者 Kaiguo Yuan Jianyi Zhang Biao Liu 《Computers, Materials & Continua》 SCIE EI 2020年第9期1771-1783,共13页
Directional modulation is one of the hot topics in data security researches.To fulfill the requirements of communication security in wireless environment with multiple paths,this study takes into account the factors o... Directional modulation is one of the hot topics in data security researches.To fulfill the requirements of communication security in wireless environment with multiple paths,this study takes into account the factors of reflections and antenna radiation pattern for directional modulation.Unlike other previous works,a novel multiple-reflection model,which is more realistic and complex than simplified two-ray reflection models,is proposed based on two reflectors.Another focus is a quantum genetic algorithm applied to optimize antenna excitation in a phased directional modulation antenna array.The quantum approach has strengths in convergence speed and the globe searching ability for the complicated model with the large-size antenna array and multiple paths.From this,a phased directional modulation transmission system can be optimized as regards communication safety and improve performance based on the constraint of the pattern of the antenna array.Our work can spur applications of the quantum evolutionary algorithm in directional modulation technology,which is also studied. 展开更多
关键词 Directional modulation quantum genetic algorithm phased antenna array multiple reflection
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部