您的位置: 专家智库 > >

国家自然科学基金(61271174)

作品数:10 被引量:15H指数:2
相关作者:刘洁更多>>
相关机构:西安科技大学更多>>
发文基金:国家自然科学基金更多>>
相关领域:电子电信自动化与计算机技术理学机械工程更多>>

文献类型

  • 9篇中文期刊文章

领域

  • 8篇电子电信
  • 2篇自动化与计算...
  • 1篇机械工程
  • 1篇理学

主题

  • 6篇NETWOR...
  • 2篇UPPER_...
  • 2篇DOWNST...
  • 1篇路由
  • 1篇路由方案
  • 1篇NETWOR...
  • 1篇NETWOR...
  • 1篇OVER
  • 1篇PROBAB...
  • 1篇SECURI...
  • 1篇SMALL
  • 1篇SUCCES...
  • 1篇WIRELE...
  • 1篇AL
  • 1篇ALGEBR...
  • 1篇BANDWI...
  • 1篇CODING
  • 1篇CONSTR...
  • 1篇EIGENS...
  • 1篇ENCODI...

机构

  • 1篇西安科技大学

作者

  • 1篇刘洁

传媒

  • 6篇Wuhan ...
  • 1篇Transa...
  • 1篇西安科技大学...
  • 1篇China ...

年份

  • 2篇2016
  • 4篇2015
  • 2篇2014
  • 1篇2013
10 条 记 录,以下是 1-9
排序方式:
A Method of Estimating the Eigenstates of Density Operator
2015年
We describe a mathematical structure which corresponds to the eigenstates of a density operator. For an unknown density operator, we propose an estimating procedure which uses successive "yes/no" measurements to scan the Bloch sphere and approximately yields the eigenstates. This result is based on the quantum method of types and implies a relationship between the typical subspace and the Young frame.
GAO Jingliang
关键词:EIGENSTATE
On Error Detection of Intermediate Nodes Offour-Node Network with Small Downstream Links被引量:1
2015年
We investigate the error detection ability of intermedi- ate nodes of zig-zag network with small downstream link. We show that the error detection capability of zig-zag networks in the presence of z malicious edges and 2z-1 limited links from node B to node u. Also, at last we analyze a family of networks, which shows that the upper bound of network is smaller than the bound we expected, indicating that Singleton bound is not the tightest bound in the particular condition of network. According to this result, we design corresponding encode and decode strategy to reach the bound we propose in this paper.
YANG YanboCAI FengGUO Wangmei
Exact Decoding Probability of Random Linear Network Coding for Combinatorial Networks
2015年
Combinatorial networks are widely applied in many practical scenarios. In this paper, we compute the closed-form probability expressions of successful decoding at a sink and at all sinks in the multicast scenario, in which one source sends messages to k destinations through m relays using random linear network coding over a Galois field. The formulation at a (all) sink(s) represents the impact of major parameters, i.e., the size of field, the number of relays (and sinks) and provides theoretical groundings to numerical results in the literature. Such condition maps to the receivers' capability to decode the original information and its mathematical characterization is helpful to design the coding. In addition, numerical results show that, under a fixed exact decoding probability, the required field size can be minimized.
LI Fang
Low-Complexity Secure Network Coding Against Wiretapping Using Intra/Inter-generation Coding被引量:9
2015年
Existing solutions against wiretapping attacks for network coding either bring significant bandwidth overhead or incur a high computational complexity.In order to reduce the security overhead of the existing solutions for securing network coding,a novel securing network coding paradigm is presented relying on two coding models:intra-generation coding and inter-generation coding.The basic idea to secure network coding using intra-generation coding is to limit the encryption operations for each generation,and then subject the scrambled and the remaining original source vectors to a linear transformation.This method is then generalized seamlessly using inter-generation coding by further exploiting the algebraic structure of network coding.We show that the proposed schemes have properties of low-complexity security,little bandwidth consumption,and high efficiency in integrating with the existing security techniques effectively.
LIU GuangjunLIU BinyueLIU XimengLI FangGUO Wangmei
关键词:ENCRYPTION
Security Analysis and Improvement of a Tag Encoding Authentication Scheme for Network Coding被引量:1
2016年
A tag encoding authentication scheme for network coding proposed by Wu et al was claimed to defend pollution attacks efficiently. However, we find that the scheme easily incurs multi-generation pollution attacks, where an adversary may be able to recover the main secret key of the source with high probability during multi-generation transmitting, and the scheme also cannot resist against inter-generation pollution attacks. Using a dynamic source secret key technology that the key can be updated with the change of generation identifier, an improved scheme is then presented, which can counteract these security defects without any efficiency compromise.
LIU Guangjun
基于GMPLS的波长交换光网络的路由方案被引量:2
2014年
波长交换光网络(WSONs)被认为是目前最有前途的下一代核心和城域网络技术,基于通用多协议标签交换(GMPLS)的分布式控制的WSONs,可以在光网络发生故障后尽快地将受故障影响的业务恢复,GMPLS协议提供路由,信令和链路管理职能,因此,基于GMPLS的WSONs端到端光路可以动态建立,维持和释放。为减少功率平坦度对网络的影响,提出了一种适用于大型网络的基于GMPLS的WSONs的感知式路由方案,称为功率平坦度感知的路由方案(POSR),在该方案中,每个网络节点处引入本地矩阵,该矩阵包括路由中所有现有光路的功率平坦度信息,并通过RSVP-TE和OSPF-TE协议存储和动态更新矩阵。利用该矩阵得出功率平坦度最小的路径,使单个波分复用链路在突发故障时功率平坦度对整个网络的影响达到最小。仿真结果表明,该方案可以减少功率平坦度对整个网络的影响。
刘洁
关键词:路由
Construction of Minimum Bandwidth Regenerating Codes with Combinatorial Design被引量:1
2016年
We study the construction of minimum bandwidth regenerating code with combinatorial design. At first, a method of constructing minimum storage regenerating (MBR) codes is presented, which can tolerate only one-node failure. Then, we give examples to explain the code. Finally, we discuss the case of repairing multiple nodes, and analyze the performance with an example.
CAI FengGUO Wangmei
Upper Bound for Unequal Zig-Zag Network with Small Downstream
2014年
We consider the problem of characterizing network capacity in the presence of adversarial errors on network links,focusing in particular on the effect of small downstream links,where the downstream link is the directed link of feedback links across the cut of network.In this paper,we present a family of zigzag networks where the inner bound and the outer bound coincide.We also establish tight condition for this family of zig-zag network,and develop encoding scheme and detection and decoding strategy.
YANG YanboGAO Jingliang
Algebraic Approach to Random Convolutional Network Coding over Wireless Packet Networks
2013年
To characterize the algebraic structure of wireless network coding, a hypergragh is utilized to model wireless packet networks from network layer. The algebraic description of random convolutional network coding is deduced, and the coding condition is also presented. Analyses and simulations show that random convolutional coding is capacity-achieving with probability approaching 1.
郭网媚刘斌越蒋馥蔚
关键词:HYPERGRAPH
共1页<1>
聚类工具0