Phosphor-converted white light-emitting diode(LED) lighting has gained tremendous achievements since the invention of the InGaN blue LED by Nakamura et al., who won the Nobel Physics Prize in 2014.By far, a significan...Phosphor-converted white light-emitting diode(LED) lighting has gained tremendous achievements since the invention of the InGaN blue LED by Nakamura et al., who won the Nobel Physics Prize in 2014.By far, a significant challenge comes from the thermal quenching(TQ) behavior of the present LED phosphors during the high-power LED operation or the updated laser lighting. But systematic research or review on the luminescence quenching character and/or how to realize thermally stable luminescence are lacking. Since TQ is an inherent property of phosphors, it can be diminished by different approaches.This review proceeds from the mechanism of TQ, summarizes previous researches on improving the thermal stability of LED phosphors and also discusses future research opportunities in this field. The developments of the phosphors with properties of high luminance and thermal stability, as well as the improved strategies involved,will benefit the basic researches and applications in high power lighting or high-luminance laser lighting.展开更多
Deep Learning(DL)is such a powerful tool that we have seen tremendous success in areas such as Computer Vision,Speech Recognition,and Natural Language Processing.Since Automated Modulation Classification(AMC)is an imp...Deep Learning(DL)is such a powerful tool that we have seen tremendous success in areas such as Computer Vision,Speech Recognition,and Natural Language Processing.Since Automated Modulation Classification(AMC)is an important part in Cognitive Radio Networks,we try to explore its potential in solving signal modulation recognition problem.It cannot be overlooked that DL model is a complex model,thus making them prone to over-fitting.DL model requires many training data to combat with over-fitting,but adding high quality labels to training data manually is not always cheap and accessible,especially in real-time system,which may counter unprecedented data in dataset.Semi-supervised Learning is a way to exploit unlabeled data effectively to reduce over-fitting in DL.In this paper,we extend Generative Adversarial Networks(GANs)to the semi-supervised learning will show it is a method can be used to create a more dataefficient classifier.展开更多
For the joint time difference of arrival(TDOA) and angle of arrival(AOA) location scene,two methods are proposed based on the rectangular coordinates and the polar coordinates,respectively.The problem is solved pe...For the joint time difference of arrival(TDOA) and angle of arrival(AOA) location scene,two methods are proposed based on the rectangular coordinates and the polar coordinates,respectively.The problem is solved perfectly by calculating the target position with the joint TDOA and AOA location.On the condition of rectangular coordinates,first of all,it figures out the radial range between target and reference stations,then calculates the location of the target.In the case of polar coordinates,first of all,it figures out the azimuth between target and reference stations,then figures out the radial range between target and reference stations,finally obtains the location of the target.Simultaneously,simulation analyses show that the theoretical analysis is correct,and the proposed methods also provide the application of the joint TDOA and AOA location algorithm with the theoretical basis.展开更多
This paper proposes an open hierarchical network architecture for the Internet of Things (IoT), which can provide a unified network topology by using heterogeneous Wireless Sensor Networks (WSNs). With this proposed a...This paper proposes an open hierarchical network architecture for the Internet of Things (IoT), which can provide a unified network topology by using heterogeneous Wireless Sensor Networks (WSNs). With this proposed architecture, our research focuses on the optimal deployment strategy of the nodes on the convergence level. We aim at the maximization of the sub-network's lifetime while minimizing the deployment cost. Meanwhile, a novel metric named as the Ratio of Lifetime to Cost (RLC) is proposed to estimate the efficiency of convergence nodes deployment. Simulation results indicate that the proposed deployment algorithm can achieve the optimal number of convergence nodes. The proposed deployment strategy is able to achieve a balanced tradeoff between the network lifetime and the deployment cost.展开更多
In this paper, a substrate removing technique in a silicon Mach–Zehnder modulator(MZM) is proposed and demonstrated to improve modulation bandwidth. Based on the novel and optimized traveling wave electrodes,the elec...In this paper, a substrate removing technique in a silicon Mach–Zehnder modulator(MZM) is proposed and demonstrated to improve modulation bandwidth. Based on the novel and optimized traveling wave electrodes,the electrode transmission loss is reduced, and the electro-optical group index and 50 Ω impedance matching are improved, simultaneously. A 2 mm long substrate removed silicon MZM with the measured and extrapolated 3 dB electro-optical bandwidth of >50 GHz and 60 GHz at the-8 V bias voltage is designed and fabricated.Open optical eye diagrams of up to 90 GBaud∕s NRZ and 56 GBaud∕s four-level pulse amplitude modulation(PAM-4) are experimentally obtained without additional optical or digital compensations. Based on this silicon MZM, the performance in a short-reach transmission system is further investigated. Single-lane 112 Gb∕s and 128 Gb∕s transmissions over different distances of 1 km, 2 km, and 10 km are experimentally achieved based on this high-speed silicon MZM.展开更多
The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new ch...The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new chaotic secure communication scheme to address the security problem of data transmission is the main contribution of this paper.The scheme is proposed and studied based on the synchronization of different-structure fractional-order chaotic systems with different order.The Lyapunov stability theory is used to prove the synchronization between the fractional-order drive system and the response system.The encryption and decryption process of the main data signals is implemented by using the n-shift encryption principle.We calculate and analyze the key space of the scheme.Numerical simulations are introduced to show the effectiveness of theoretical approach we proposed.展开更多
In western China, the terrain and meteorological conditions are so complex that it is not suitable to construct new radar stations. Automatic dependent surveillance-broadcast (ADS-B) is a totally new surveillance me...In western China, the terrain and meteorological conditions are so complex that it is not suitable to construct new radar stations. Automatic dependent surveillance-broadcast (ADS-B) is a totally new surveillance method, so before practically applied and operated in China, abundant tests and evaluations are necessary to validate the performance of ADS-B and guarantee the operational security. During the flight tests, we collect the data of radar, ADS-B and high accuracy position and compare the performance of ADS-B with radar based on high accuracy position. To solve the asynchronous problem among radar data, ADS-B data and real-time kinematic (RTK) data caused by different update rates, this artic.le proposes the technique of synchronizing multi-surveil- lance data by extrapolating from the data of low update rate to high update rate according to velocity and heading. Meanwhile, because radar data, ADS-B data and RTK data are expressed in different coordinates and cannot be compared each other, this article provides a method to unifying the coordinates of multi-surveillance data. By the analysis and evaluation, we can conclude that the performance of ADS-B is better than radar.展开更多
With the proliferation of smart grid research, the Advanced Metering Infrastructure (AMI) has become the first ubiquitous and fixed computing platform. However, due to the unique characteristics of AMI, such as comp...With the proliferation of smart grid research, the Advanced Metering Infrastructure (AMI) has become the first ubiquitous and fixed computing platform. However, due to the unique characteristics of AMI, such as complex network structure, resource-constrained smart meter, and privacy-sensitive data, it is an especially challenging issue to make AMI secure. Energy theft is one of the most important concerns related to the smart grid implementation. It is estimated that utility companies lose more than S25 billion every year due to energy theft around the world. To address this challenge, in this paper, we discuss the background of AMI and identify major security requirements that AMI should meet. Specifically, an attack tree based threat model is first presented to illustrate the energy-theft behaviors in AMI. Then, we summarize the current AMI energy-theft detection schemes into three categories, i.e., classification-based, state estimation-based, and game theory-based ones, and make extensive comparisons and discussions on them. In order to provide a deep understanding of security vulnerabilities and solutions in AMI and shed light on future research directions, we also explore some open challenges and potential solutions for energy-theft detection.展开更多
By Mobile Edge Computing(MEC), computation-intensive tasks are offloaded from mobile devices to cloud servers, and thus the energy consumption of mobile devices can be notably reduced. In this paper, we study task off...By Mobile Edge Computing(MEC), computation-intensive tasks are offloaded from mobile devices to cloud servers, and thus the energy consumption of mobile devices can be notably reduced. In this paper, we study task offloading in multi-user MEC systems with heterogeneous clouds, including edge clouds and remote clouds. Tasks are forwarded from mobile devices to edge clouds via wireless channels, and they can be further forwarded to remote clouds via the Internet. Our objective is to minimize the total energy consumption of multiple mobile devices, subject to bounded-delay requirements of tasks. Based on dynamic programming, we propose an algorithm that minimizes the energy consumption, by jointly allocating bandwidth and computational resources to mobile devices. The algorithm is of pseudo-polynomial complexity. To further reduce the complexity, we propose an approximation algorithm with energy discretization, and its total energy consumption is proved to be within a bounded gap from the optimum. Simulation results show that, nearly 82.7% energy of mobile devices can be saved by task offloading compared with mobile device execution.展开更多
"Device-independent"not only represents a relaxation of the security assumptions about the internal working of the quantum devices,but also can enhance the security of the quantum communication.In the paper,..."Device-independent"not only represents a relaxation of the security assumptions about the internal working of the quantum devices,but also can enhance the security of the quantum communication.In the paper,we put forward the first device-independent quantum secure direct communication(DIQSDC)protocol and analyze its security and communication efficiency against collective attacks.Under practical noisy quantum channel condition,the photon transmission loss and photon state decoherence would reduce DI-QSDC’s communication quality and threaten its absolute security.For solving the photon transmission loss and decoherence problems,we adopt noiseless linear amplification(NLA)protocol and entanglement purification protocol(EPP)to modify the DI-QSDC protocol.With the help of the NLA and EPP,we can guarantee DI-QSDC’s absolute security and effectively improve its communication quality.展开更多
Security in communication is vital in modern life. At present, security is realized by an encryption process in cryptography. It is unbelievable if a secure communication is achievable without encryption. In quantum c...Security in communication is vital in modern life. At present, security is realized by an encryption process in cryptography. It is unbelievable if a secure communication is achievable without encryption. In quantum cryptography, there is a unique form of quantum communication, quantum secure direct communication, where secret information is transmitted directly over a quantum channel. Quantum secure direct communication is drastically distinct from our conventional concept of secure communication, because it does not require key distribution, key storage and ciphertext transmission, and eliminates the encryption procedure completely. Hence it avoids in principle all the security loopholes associated with key and ciphertext in traditional secure communications. For practical implementation, defects always exist in real devices and it may downgrade the security. Among the various device imperfections, those with the measurement devices are the most prominent and serious ones. Here we report a measurementdevice-independent quantum secure direct communication protocol using Einstein-Podolsky-Rosen pairs. This protocol eradicates the security vulnerabilities associated with the measurement device,and greatly enhances the practical security of quantum secure direct communication. In addition to the security advantage, this protocol has an extended communication distance, and a high communication capacity.展开更多
The sharp increase of the amount of Internet Chinese text data has significantly prolonged the processing time of classification on these data.In order to solve this problem,this paper proposes and implements a parall...The sharp increase of the amount of Internet Chinese text data has significantly prolonged the processing time of classification on these data.In order to solve this problem,this paper proposes and implements a parallel naive Bayes algorithm(PNBA)for Chinese text classification based on Spark,a parallel memory computing platform for big data.This algorithm has implemented parallel operation throughout the entire training and prediction process of naive Bayes classifier mainly by adopting the programming model of resilient distributed datasets(RDD).For comparison,a PNBA based on Hadoop is also implemented.The test results show that in the same computing environment and for the same text sets,the Spark PNBA is obviously superior to the Hadoop PNBA in terms of key indicators such as speedup ratio and scalability.Therefore,Spark-based parallel algorithms can better meet the requirement of large-scale Chinese text data mining.展开更多
Today's Internet architecture provides only "best effort" services,thus it cannot guarantee quality of service(QoS) for applications.Software Defined Network(SDN)is a new approach to computer networking ...Today's Internet architecture provides only "best effort" services,thus it cannot guarantee quality of service(QoS) for applications.Software Defined Network(SDN)is a new approach to computer networking that separates control plane and forwarding planes,and has the advantage of centralized control and programmability.In this paper,we propose HiQoS that provides QoS guarantees using SDN.Moreover,HiQoS makes use of multiple paths between source and destination and queuing mechanisms to guarantee QoS for different types of traffic.Experimental results show that our HiQoS scheme can reduce delay and increase throughput to guarantee QoS.Very importantly,HiQoS recovers from link failure very quickly by rerouting traffic from failed path to other available path.展开更多
A novel chaotic search method is proposed,and a hybrid algorithm combining particle swarm optimization(PSO) with this new method,called CLSPSO,is put forward to solve 14 integer and mixed integer programming problems....A novel chaotic search method is proposed,and a hybrid algorithm combining particle swarm optimization(PSO) with this new method,called CLSPSO,is put forward to solve 14 integer and mixed integer programming problems.The performances of CLSPSO are compared with those of other five hybrid algorithms combining PSO with chaotic search methods.Experimental results indicate that in terms of robustness and final convergence speed,CLSPSO is better than other five algorithms in solving many of these problems.Furthermore,CLSPSO exhibits good performance in solving two high-dimensional problems,and it finds better solutions than the known ones.A performance index(PI) is introduced to fairly compare the above six algorithms,and the obtained values of(PI) in three cases demonstrate that CLSPSO is superior to all the other five algorithms under the same conditions.展开更多
Flexible tactile sensors have broad applications in human physiological monitoring,robotic operation and human-machine interaction.However,the research of wearable and flexible tactile sensors with high sensitivity,wi...Flexible tactile sensors have broad applications in human physiological monitoring,robotic operation and human-machine interaction.However,the research of wearable and flexible tactile sensors with high sensitivity,wide sensing range and ability to detect three-dimensional(3D)force is still very challenging.Herein,a flexible tactile electronic skin sensor based on carbon nanotubes(CNTs)/polydimethylsiloxane(PDMS)nanocomposites is presented for 3D contact force detection.The 3D forces were acquired from combination of four specially designed cells in a sensing element.Contributed from the double-sided rough porous structure and specific surface morphology of nanocomposites,the piezoresistive sensor possesses high sensitivity of 12.1 kPa?1 within the range of 600 Pa and 0.68 kPa?1 in the regime exceeding 1 kPa for normal pressure,as well as 59.9 N?1 in the scope of<0.05 N and>2.3 N?1 in the region of<0.6 N for tangential force with ultra-low response time of 3.1 ms.In addition,multi-functional detection in human body monitoring was employed with single sensing cell and the sensor array was integrated into a robotic arm for objects grasping control,indicating the capacities in intelligent robot applications.展开更多
Tuned mass dampers (TMDs) have been widely used in recent years to mitigate structural vibration. However, the damping mechanisms employed in the TMDs are mostly based on viscous dampers, which have several well-kno...Tuned mass dampers (TMDs) have been widely used in recent years to mitigate structural vibration. However, the damping mechanisms employed in the TMDs are mostly based on viscous dampers, which have several well-known disadvantages, such as oil leakage and difficult adjustment of damping ratio for an operating TMD. Alternatively, eddy current damping (ECD) that does not require any contact with the main structure is a potential solution. This paper discusses the design, analysis, manufacture and testing of a large-scale horizontal TMD based on ECD. First, the theoretical model of ECD is formulated, then one large-scale horizontal TMD using ECD is constructed, and finally performance tests of the TMD are conducted. The test results show that the proposed TMD has a very low intrinsic damping ratio, while the damping ratio due to ECD is the dominant damping source, which can be as large as 15% in a proper configuration. In addition, the damping ratios estimated with the theoretical model are roughly consistent with those identified from the test results, and the source of this error is investigated. Moreover, it is demonstrated that the damping ratio in the proposed TMD can be easily adjusted by varying the air gap between permanent magnets and conductive plates. In view of practical applications, possible improvements and feasibility considerations for the proposed TMD are then discussed. It is confirmed that the proposed TMD with ECD is reliable and feasible for use in structural vibration control.展开更多
A panoptic driving perception system is an essential part of autonomous driving.A high-precision and real-time perception system can assist the vehicle in making reasonable decisions while driving.We present a panopti...A panoptic driving perception system is an essential part of autonomous driving.A high-precision and real-time perception system can assist the vehicle in making reasonable decisions while driving.We present a panoptic driving perception network(you only look once for panoptic(YOLOP))to perform traffic object detection,drivable area segmentation,and lane detection simultaneously.It is composed of one encoder for feature extraction and three decoders to handle the specific tasks.Our model performs extremely well on the challenging BDD100K dataset,achieving state-of-the-art on all three tasks in terms of accuracy and speed.Besides,we verify the effectiveness of our multi-task learning model for joint training via ablative studies.To our best knowledge,this is the first work that can process these three visual perception tasks simultaneously in real-time on an embedded device Jetson TX2(23 FPS),and maintain excellent accuracy.To facilitate further research,the source codes and pre-trained models are released at https://github.com/hustvl/YOLOP.展开更多
Transition metal phosphides (TMPs) are promising candidates for noble metal free electrocatalysts in water splitting applicati ons. In this work, we prese nt the facile syn thesis of nickel cobalt phosphide electrocat...Transition metal phosphides (TMPs) are promising candidates for noble metal free electrocatalysts in water splitting applicati ons. In this work, we prese nt the facile syn thesis of nickel cobalt phosphide electrocatalyst with three-dime nsional nano structure (3D-NiCoP) on the nickel foam, via hydrothermal reaction and phosphorization. The as-prepared electrocatalyst exhibits an excellent activity for hydrogen evolution reaction (HER) in both acidic and alkaline electrolytes, with small overpotentials to drive 10 mA/cm^2 (80 mV for 0.5 M H2SO4, 105 mV for 1 M KOH), small Tafel slopes (37 mV/dec for 0.5 M H2SO4, 79 mV/dec for 1 M KOH), and satisfying durability in long-term electrolysis. 3D-NiCoP also shows a superior HER activity compared to single metal phosphide, such as cobalt phosphide and nickel phosphide. The outstanding performa nee for HER suggests the great pote ntial of 3D-NiCoP as a highly efficient electrocatalyst for water splitting technology.展开更多
The lack of autonomous aerial refueling capabilities is one of the greatest limitations of unmanned aerial vehicles. This paper discusses the vision-based estimation of the relative pose of a tanker and unmanned aeria...The lack of autonomous aerial refueling capabilities is one of the greatest limitations of unmanned aerial vehicles. This paper discusses the vision-based estimation of the relative pose of a tanker and unmanned aerial vehicle, which is a key issue in autonomous aerial refueling. The main task of this paper is to study the relative pose estimation for a tanker and unmanned aerial vehicle in the phase of commencing refueling and during refueling. The employed algorithm includes the initialization of the orientation parameters and an orthogonal iteration algorithm to estimate the optimal solution of rotation matrix and translation vector. In simulation experiments, because of the small variation in the rotation angle in aerial refueling, the method in which the initial rotation matrix is the identity matrix is found to be the most stable and accurate among methods. Finally, the paper discusses the effects of the number and configuration of feature points on the accuracy of the estimation results when using this method.展开更多
The fifth generation(5G) network is expected to support significantly large amount of mobile data traffic and huge number of wireless connections,to achieve better spectrum- and energy-efficiency,as well as quality of...The fifth generation(5G) network is expected to support significantly large amount of mobile data traffic and huge number of wireless connections,to achieve better spectrum- and energy-efficiency,as well as quality of service(QoS) in terms of delay,reliability and security.Furthermore,the 5G network shall also incorporate high mobility requirements as an integral part,providing satisfactory service to users travelling at a speed up to 500 km/h.This paper provides a survey of potential high mobility wireless communication(HMWC) techniques for 5G network.After discussing the typical requirements and challenges of HMWC,key techniques to cope with the challenges are reviewed,including transmission techniques under the fast timevarying channels,network architecture with mobility support,and mobility management.Finally,future research directions on 5G high mobility communications are given.展开更多
基金Project supported by the National Natural Science Foundation of China(51722202,91622125,51572023)Natural Science Foundation of Beijing,China(2172036)
文摘Phosphor-converted white light-emitting diode(LED) lighting has gained tremendous achievements since the invention of the InGaN blue LED by Nakamura et al., who won the Nobel Physics Prize in 2014.By far, a significant challenge comes from the thermal quenching(TQ) behavior of the present LED phosphors during the high-power LED operation or the updated laser lighting. But systematic research or review on the luminescence quenching character and/or how to realize thermally stable luminescence are lacking. Since TQ is an inherent property of phosphors, it can be diminished by different approaches.This review proceeds from the mechanism of TQ, summarizes previous researches on improving the thermal stability of LED phosphors and also discusses future research opportunities in this field. The developments of the phosphors with properties of high luminance and thermal stability, as well as the improved strategies involved,will benefit the basic researches and applications in high power lighting or high-luminance laser lighting.
基金This work is supported by the National Natural Science Foundation of China(Nos.61771154,61603239,61772454,6171101570).
文摘Deep Learning(DL)is such a powerful tool that we have seen tremendous success in areas such as Computer Vision,Speech Recognition,and Natural Language Processing.Since Automated Modulation Classification(AMC)is an important part in Cognitive Radio Networks,we try to explore its potential in solving signal modulation recognition problem.It cannot be overlooked that DL model is a complex model,thus making them prone to over-fitting.DL model requires many training data to combat with over-fitting,but adding high quality labels to training data manually is not always cheap and accessible,especially in real-time system,which may counter unprecedented data in dataset.Semi-supervised Learning is a way to exploit unlabeled data effectively to reduce over-fitting in DL.In this paper,we extend Generative Adversarial Networks(GANs)to the semi-supervised learning will show it is a method can be used to create a more dataefficient classifier.
基金supported by the National Natural Science Foundation of China(6107210761271300)+4 种基金the Shaanxi Industry Surmount Foundation(2012K06-12)the Arm and Equipment Pre-research Foundationthe Fundamental Research Funds for the Central Universities of China(K0551302006K5051202045K50511020024)
文摘For the joint time difference of arrival(TDOA) and angle of arrival(AOA) location scene,two methods are proposed based on the rectangular coordinates and the polar coordinates,respectively.The problem is solved perfectly by calculating the target position with the joint TDOA and AOA location.On the condition of rectangular coordinates,first of all,it figures out the radial range between target and reference stations,then calculates the location of the target.In the case of polar coordinates,first of all,it figures out the azimuth between target and reference stations,then figures out the radial range between target and reference stations,finally obtains the location of the target.Simultaneously,simulation analyses show that the theoretical analysis is correct,and the proposed methods also provide the application of the joint TDOA and AOA location algorithm with the theoretical basis.
基金supported by National S&T Major Project of China under Grant No.2010 ZX03005-003National Key Technology Research and Develop ment Program of China under Grant No.2011BAK12B02Program for New Century Excellent Talents in University (NCET-10-0294),China
文摘This paper proposes an open hierarchical network architecture for the Internet of Things (IoT), which can provide a unified network topology by using heterogeneous Wireless Sensor Networks (WSNs). With this proposed architecture, our research focuses on the optimal deployment strategy of the nodes on the convergence level. We aim at the maximization of the sub-network's lifetime while minimizing the deployment cost. Meanwhile, a novel metric named as the Ratio of Lifetime to Cost (RLC) is proposed to estimate the efficiency of convergence nodes deployment. Simulation results indicate that the proposed deployment algorithm can achieve the optimal number of convergence nodes. The proposed deployment strategy is able to achieve a balanced tradeoff between the network lifetime and the deployment cost.
文摘In this paper, a substrate removing technique in a silicon Mach–Zehnder modulator(MZM) is proposed and demonstrated to improve modulation bandwidth. Based on the novel and optimized traveling wave electrodes,the electrode transmission loss is reduced, and the electro-optical group index and 50 Ω impedance matching are improved, simultaneously. A 2 mm long substrate removed silicon MZM with the measured and extrapolated 3 dB electro-optical bandwidth of >50 GHz and 60 GHz at the-8 V bias voltage is designed and fabricated.Open optical eye diagrams of up to 90 GBaud∕s NRZ and 56 GBaud∕s four-level pulse amplitude modulation(PAM-4) are experimentally obtained without additional optical or digital compensations. Based on this silicon MZM, the performance in a short-reach transmission system is further investigated. Single-lane 112 Gb∕s and 128 Gb∕s transmissions over different distances of 1 km, 2 km, and 10 km are experimentally achieved based on this high-speed silicon MZM.
基金supported in part by the National Science Foundation Project of China (61931001, 61873026)the National Key R&D Program of China (2017YFC0820700)
文摘The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new chaotic secure communication scheme to address the security problem of data transmission is the main contribution of this paper.The scheme is proposed and studied based on the synchronization of different-structure fractional-order chaotic systems with different order.The Lyapunov stability theory is used to prove the synchronization between the fractional-order drive system and the response system.The encryption and decryption process of the main data signals is implemented by using the n-shift encryption principle.We calculate and analyze the key space of the scheme.Numerical simulations are introduced to show the effectiveness of theoretical approach we proposed.
文摘In western China, the terrain and meteorological conditions are so complex that it is not suitable to construct new radar stations. Automatic dependent surveillance-broadcast (ADS-B) is a totally new surveillance method, so before practically applied and operated in China, abundant tests and evaluations are necessary to validate the performance of ADS-B and guarantee the operational security. During the flight tests, we collect the data of radar, ADS-B and high accuracy position and compare the performance of ADS-B with radar based on high accuracy position. To solve the asynchronous problem among radar data, ADS-B data and real-time kinematic (RTK) data caused by different update rates, this artic.le proposes the technique of synchronizing multi-surveil- lance data by extrapolating from the data of low update rate to high update rate according to velocity and heading. Meanwhile, because radar data, ADS-B data and RTK data are expressed in different coordinates and cannot be compared each other, this article provides a method to unifying the coordinates of multi-surveillance data. By the analysis and evaluation, we can conclude that the performance of ADS-B is better than radar.
基金supported by China Scholarship Councilthe National Natural Science Foundation of China (Nos. 61170261 and 61202369)NSERC,Canada
文摘With the proliferation of smart grid research, the Advanced Metering Infrastructure (AMI) has become the first ubiquitous and fixed computing platform. However, due to the unique characteristics of AMI, such as complex network structure, resource-constrained smart meter, and privacy-sensitive data, it is an especially challenging issue to make AMI secure. Energy theft is one of the most important concerns related to the smart grid implementation. It is estimated that utility companies lose more than S25 billion every year due to energy theft around the world. To address this challenge, in this paper, we discuss the background of AMI and identify major security requirements that AMI should meet. Specifically, an attack tree based threat model is first presented to illustrate the energy-theft behaviors in AMI. Then, we summarize the current AMI energy-theft detection schemes into three categories, i.e., classification-based, state estimation-based, and game theory-based ones, and make extensive comparisons and discussions on them. In order to provide a deep understanding of security vulnerabilities and solutions in AMI and shed light on future research directions, we also explore some open challenges and potential solutions for energy-theft detection.
基金the National Key R&D Program of China 2018YFB1800804the Nature Science Foundation of China (No. 61871254,No. 61861136003,No. 91638204)Hitachi Ltd.
文摘By Mobile Edge Computing(MEC), computation-intensive tasks are offloaded from mobile devices to cloud servers, and thus the energy consumption of mobile devices can be notably reduced. In this paper, we study task offloading in multi-user MEC systems with heterogeneous clouds, including edge clouds and remote clouds. Tasks are forwarded from mobile devices to edge clouds via wireless channels, and they can be further forwarded to remote clouds via the Internet. Our objective is to minimize the total energy consumption of multiple mobile devices, subject to bounded-delay requirements of tasks. Based on dynamic programming, we propose an algorithm that minimizes the energy consumption, by jointly allocating bandwidth and computational resources to mobile devices. The algorithm is of pseudo-polynomial complexity. To further reduce the complexity, we propose an approximation algorithm with energy discretization, and its total energy consumption is proved to be within a bounded gap from the optimum. Simulation results show that, nearly 82.7% energy of mobile devices can be saved by task offloading compared with mobile device execution.
基金supported by the National Natural Science Foundation of China (11974189 and 11974205)the China Postdoctoral Science Foundation (2018M642293)+1 种基金the Open Research Fund of the Key Lab of Broadband Wireless Communication and Sensor Network Technology,Nanjing University of Posts and Telecommunications, Ministry of Education (JZNY201908)a Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions
文摘"Device-independent"not only represents a relaxation of the security assumptions about the internal working of the quantum devices,but also can enhance the security of the quantum communication.In the paper,we put forward the first device-independent quantum secure direct communication(DIQSDC)protocol and analyze its security and communication efficiency against collective attacks.Under practical noisy quantum channel condition,the photon transmission loss and photon state decoherence would reduce DI-QSDC’s communication quality and threaten its absolute security.For solving the photon transmission loss and decoherence problems,we adopt noiseless linear amplification(NLA)protocol and entanglement purification protocol(EPP)to modify the DI-QSDC protocol.With the help of the NLA and EPP,we can guarantee DI-QSDC’s absolute security and effectively improve its communication quality.
基金supported by the National Basic Research Program of China(2017YFA0303700 and 2015CB921001)the National Natural Science Foundation of China(61726801,11474168 and 11474181)the Beijing Advanced Innovation Center for Future Chip(ICFC)
文摘Security in communication is vital in modern life. At present, security is realized by an encryption process in cryptography. It is unbelievable if a secure communication is achievable without encryption. In quantum cryptography, there is a unique form of quantum communication, quantum secure direct communication, where secret information is transmitted directly over a quantum channel. Quantum secure direct communication is drastically distinct from our conventional concept of secure communication, because it does not require key distribution, key storage and ciphertext transmission, and eliminates the encryption procedure completely. Hence it avoids in principle all the security loopholes associated with key and ciphertext in traditional secure communications. For practical implementation, defects always exist in real devices and it may downgrade the security. Among the various device imperfections, those with the measurement devices are the most prominent and serious ones. Here we report a measurementdevice-independent quantum secure direct communication protocol using Einstein-Podolsky-Rosen pairs. This protocol eradicates the security vulnerabilities associated with the measurement device,and greatly enhances the practical security of quantum secure direct communication. In addition to the security advantage, this protocol has an extended communication distance, and a high communication capacity.
基金Project(KC18071)supported by the Application Foundation Research Program of Xuzhou,ChinaProjects(2017YFC0804401,2017YFC0804409)supported by the National Key R&D Program of China
文摘The sharp increase of the amount of Internet Chinese text data has significantly prolonged the processing time of classification on these data.In order to solve this problem,this paper proposes and implements a parallel naive Bayes algorithm(PNBA)for Chinese text classification based on Spark,a parallel memory computing platform for big data.This algorithm has implemented parallel operation throughout the entire training and prediction process of naive Bayes classifier mainly by adopting the programming model of resilient distributed datasets(RDD).For comparison,a PNBA based on Hadoop is also implemented.The test results show that in the same computing environment and for the same text sets,the Spark PNBA is obviously superior to the Hadoop PNBA in terms of key indicators such as speedup ratio and scalability.Therefore,Spark-based parallel algorithms can better meet the requirement of large-scale Chinese text data mining.
基金supported partly by NSFC(National Natural Science Foundation of China)under grant No.61371191 and No.61472389
文摘Today's Internet architecture provides only "best effort" services,thus it cannot guarantee quality of service(QoS) for applications.Software Defined Network(SDN)is a new approach to computer networking that separates control plane and forwarding planes,and has the advantage of centralized control and programmability.In this paper,we propose HiQoS that provides QoS guarantees using SDN.Moreover,HiQoS makes use of multiple paths between source and destination and queuing mechanisms to guarantee QoS for different types of traffic.Experimental results show that our HiQoS scheme can reduce delay and increase throughput to guarantee QoS.Very importantly,HiQoS recovers from link failure very quickly by rerouting traffic from failed path to other available path.
基金Projects(50275150,61173052) supported by the National Natural Science Foundation of ChinaProject(14FJ3112) supported by the Planned Science and Technology of Hunan Province,ChinaProject(14B033) supported by Scientific Research Fund Education Department of Hunan Province,China
文摘A novel chaotic search method is proposed,and a hybrid algorithm combining particle swarm optimization(PSO) with this new method,called CLSPSO,is put forward to solve 14 integer and mixed integer programming problems.The performances of CLSPSO are compared with those of other five hybrid algorithms combining PSO with chaotic search methods.Experimental results indicate that in terms of robustness and final convergence speed,CLSPSO is better than other five algorithms in solving many of these problems.Furthermore,CLSPSO exhibits good performance in solving two high-dimensional problems,and it finds better solutions than the known ones.A performance index(PI) is introduced to fairly compare the above six algorithms,and the obtained values of(PI) in three cases demonstrate that CLSPSO is superior to all the other five algorithms under the same conditions.
基金funding from National Natural Science Foundation of China(NSFC Nos.61774157,81771388,61874121,and 61874012)Beijing Natural Science Foundation(No.4182075)the Capital Science and Technology Conditions Platform Project(Project ID:Z181100009518014).
文摘Flexible tactile sensors have broad applications in human physiological monitoring,robotic operation and human-machine interaction.However,the research of wearable and flexible tactile sensors with high sensitivity,wide sensing range and ability to detect three-dimensional(3D)force is still very challenging.Herein,a flexible tactile electronic skin sensor based on carbon nanotubes(CNTs)/polydimethylsiloxane(PDMS)nanocomposites is presented for 3D contact force detection.The 3D forces were acquired from combination of four specially designed cells in a sensing element.Contributed from the double-sided rough porous structure and specific surface morphology of nanocomposites,the piezoresistive sensor possesses high sensitivity of 12.1 kPa?1 within the range of 600 Pa and 0.68 kPa?1 in the regime exceeding 1 kPa for normal pressure,as well as 59.9 N?1 in the scope of<0.05 N and>2.3 N?1 in the region of<0.6 N for tangential force with ultra-low response time of 3.1 ms.In addition,multi-functional detection in human body monitoring was employed with single sensing cell and the sensor array was integrated into a robotic arm for objects grasping control,indicating the capacities in intelligent robot applications.
基金State Key Program of Natural Science Foundation of China Under Grant No.50738002
文摘Tuned mass dampers (TMDs) have been widely used in recent years to mitigate structural vibration. However, the damping mechanisms employed in the TMDs are mostly based on viscous dampers, which have several well-known disadvantages, such as oil leakage and difficult adjustment of damping ratio for an operating TMD. Alternatively, eddy current damping (ECD) that does not require any contact with the main structure is a potential solution. This paper discusses the design, analysis, manufacture and testing of a large-scale horizontal TMD based on ECD. First, the theoretical model of ECD is formulated, then one large-scale horizontal TMD using ECD is constructed, and finally performance tests of the TMD are conducted. The test results show that the proposed TMD has a very low intrinsic damping ratio, while the damping ratio due to ECD is the dominant damping source, which can be as large as 15% in a proper configuration. In addition, the damping ratios estimated with the theoretical model are roughly consistent with those identified from the test results, and the source of this error is investigated. Moreover, it is demonstrated that the damping ratio in the proposed TMD can be easily adjusted by varying the air gap between permanent magnets and conductive plates. In view of practical applications, possible improvements and feasibility considerations for the proposed TMD are then discussed. It is confirmed that the proposed TMD with ECD is reliable and feasible for use in structural vibration control.
基金supported by National Natural Science Foundation of China(Nos.61876212 and 1733007)Zhejiang Laboratory,China(No.2019NB0AB02)Hubei Province College Students Innovation and Entrepreneurship Training Program,China(No.S202010487058).
文摘A panoptic driving perception system is an essential part of autonomous driving.A high-precision and real-time perception system can assist the vehicle in making reasonable decisions while driving.We present a panoptic driving perception network(you only look once for panoptic(YOLOP))to perform traffic object detection,drivable area segmentation,and lane detection simultaneously.It is composed of one encoder for feature extraction and three decoders to handle the specific tasks.Our model performs extremely well on the challenging BDD100K dataset,achieving state-of-the-art on all three tasks in terms of accuracy and speed.Besides,we verify the effectiveness of our multi-task learning model for joint training via ablative studies.To our best knowledge,this is the first work that can process these three visual perception tasks simultaneously in real-time on an embedded device Jetson TX2(23 FPS),and maintain excellent accuracy.To facilitate further research,the source codes and pre-trained models are released at https://github.com/hustvl/YOLOP.
基金the National Natural Science Foundation of China (No. 51702234).
文摘Transition metal phosphides (TMPs) are promising candidates for noble metal free electrocatalysts in water splitting applicati ons. In this work, we prese nt the facile syn thesis of nickel cobalt phosphide electrocatalyst with three-dime nsional nano structure (3D-NiCoP) on the nickel foam, via hydrothermal reaction and phosphorization. The as-prepared electrocatalyst exhibits an excellent activity for hydrogen evolution reaction (HER) in both acidic and alkaline electrolytes, with small overpotentials to drive 10 mA/cm^2 (80 mV for 0.5 M H2SO4, 105 mV for 1 M KOH), small Tafel slopes (37 mV/dec for 0.5 M H2SO4, 79 mV/dec for 1 M KOH), and satisfying durability in long-term electrolysis. 3D-NiCoP also shows a superior HER activity compared to single metal phosphide, such as cobalt phosphide and nickel phosphide. The outstanding performa nee for HER suggests the great pote ntial of 3D-NiCoP as a highly efficient electrocatalyst for water splitting technology.
基金National Natural Science Foundation of China (51075207) Startup Foundation for Introduced Talents of Nanjing University of Aeronautics and Astronautics (1007-YAH10047)
文摘The lack of autonomous aerial refueling capabilities is one of the greatest limitations of unmanned aerial vehicles. This paper discusses the vision-based estimation of the relative pose of a tanker and unmanned aerial vehicle, which is a key issue in autonomous aerial refueling. The main task of this paper is to study the relative pose estimation for a tanker and unmanned aerial vehicle in the phase of commencing refueling and during refueling. The employed algorithm includes the initialization of the orientation parameters and an orthogonal iteration algorithm to estimate the optimal solution of rotation matrix and translation vector. In simulation experiments, because of the small variation in the rotation angle in aerial refueling, the method in which the initial rotation matrix is the identity matrix is found to be the most stable and accurate among methods. Finally, the paper discusses the effects of the number and configuration of feature points on the accuracy of the estimation results when using this method.
基金supported by the National Basic Research Program of China (973 Program No.2012CB316100)
文摘The fifth generation(5G) network is expected to support significantly large amount of mobile data traffic and huge number of wireless connections,to achieve better spectrum- and energy-efficiency,as well as quality of service(QoS) in terms of delay,reliability and security.Furthermore,the 5G network shall also incorporate high mobility requirements as an integral part,providing satisfactory service to users travelling at a speed up to 500 km/h.This paper provides a survey of potential high mobility wireless communication(HMWC) techniques for 5G network.After discussing the typical requirements and challenges of HMWC,key techniques to cope with the challenges are reviewed,including transmission techniques under the fast timevarying channels,network architecture with mobility support,and mobility management.Finally,future research directions on 5G high mobility communications are given.