首页 > 最新文献

Journal of China Universities of Posts and Telecommunications最新文献

英文 中文
Efficient methods for choosing quantum channel in teleportation and bidirectional teleportation 隐形传态和双向隐形传态中量子通道的有效选择方法
Q4 Computer Science Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60212-5
Yang HU, Hong-zi FU, Xiu-lao TIAN

The tensor representation of quantum teleportation shows the internal connection between Bell basis measurement matrix Tα and channel parameter matrix (CPM) R. An explicit CPM criterion based on the tensor representation is derived. This criterion can be used to judge whether a quantum state can be employed as the quantum channel or not in teleportation and bidirectional teleportation, and it provides us more flexible choices to construct the quantum channel.

量子隐形传态的张量表示显示了贝尔基测量矩阵Tα与信道参数矩阵(CPM) r之间的内在联系。该准则可用于判断量子态在隐形传态和双向隐形传态中是否可以作为量子信道,为我们构建量子信道提供了更灵活的选择。
{"title":"Efficient methods for choosing quantum channel in teleportation and bidirectional teleportation","authors":"Yang HU,&nbsp;Hong-zi FU,&nbsp;Xiu-lao TIAN","doi":"10.1016/S1005-8885(13)60212-5","DOIUrl":"10.1016/S1005-8885(13)60212-5","url":null,"abstract":"<div><p>The tensor representation of quantum teleportation shows the internal connection between Bell basis measurement matrix <em>T<sup>α</sup></em> and channel parameter matrix (CPM) <strong><em>R</em></strong>. An explicit CPM criterion based on the tensor representation is derived. This criterion can be used to judge whether a quantum state can be employed as the quantum channel or not in teleportation and bidirectional teleportation, and it provides us more flexible choices to construct the quantum channel.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 101-104"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60212-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81292289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security and privacy mechanism for health internet of things 健康物联网的安全与隐私机制
Q4 Computer Science Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60219-8
Kai KANG , Zhi-bo PANG , Cong WANG

The rapid development of technologies towards Internet of Things (IoT), has led to new circumstances at all levels of the social environment. In healthcare in particular, the use of IoT concepts and technologies make diagnose and monitor more convenient for the physicians and patients. As mobile applications solutions are widely accepted because the easy to use, secure healthcare service is a new demand for mobile solutions. To protect the privacy and security for patients in the domain of healthcare towards IoT, a systematic mechanism is needed. This article proposes a novel security and privacy mechanism for Health Internet of Things (Health-IoT) to solve above problems. Health-IoT is promising for both traditional healthcare industry and the information and communication technologies (ICTs) industry. From the view of trustworthiness, interactive vector was proposed to communicate the end-devices and application brokers. The aim is to establish a trust IoT application market (IAM), feature of application in marketplace and behavior of applications on end-devices can be exchanged in mathematical value to establish the connection between market and users.

物联网(IoT)技术的快速发展,导致了社会环境各个层面的新情况。特别是在医疗保健领域,物联网概念和技术的使用使医生和患者更方便地进行诊断和监测。由于移动应用程序解决方案易于使用而被广泛接受,安全的医疗保健服务是对移动解决方案的新需求。为了在物联网医疗领域保护患者的隐私和安全,需要一个系统的机制。针对上述问题,本文提出了一种新的健康物联网(Health- iot)安全与隐私机制。健康物联网(Health-IoT)对传统医疗行业和信息通信技术(ict)行业都很有前景。从可信任的角度出发,提出了交互向量来实现终端设备和应用代理之间的通信。目的是建立一个可信的物联网应用市场(IAM),市场中应用的特征和终端设备上应用的行为可以用数学值交换,建立市场和用户之间的联系。
{"title":"Security and privacy mechanism for health internet of things","authors":"Kai KANG ,&nbsp;Zhi-bo PANG ,&nbsp;Cong WANG","doi":"10.1016/S1005-8885(13)60219-8","DOIUrl":"10.1016/S1005-8885(13)60219-8","url":null,"abstract":"<div><p>The rapid development of technologies towards Internet of Things (IoT), has led to new circumstances at all levels of the social environment. In healthcare in particular, the use of IoT concepts and technologies make diagnose and monitor more convenient for the physicians and patients. As mobile applications solutions are widely accepted because the easy to use, secure healthcare service is a new demand for mobile solutions. To protect the privacy and security for patients in the domain of healthcare towards IoT, a systematic mechanism is needed. This article proposes a novel security and privacy mechanism for Health Internet of Things (Health-IoT) to solve above problems. Health-IoT is promising for both traditional healthcare industry and the information and communication technologies (ICTs) industry. From the view of trustworthiness, interactive vector was proposed to communicate the end-devices and application brokers. The aim is to establish a trust IoT application market (IAM), feature of application in marketplace and behavior of applications on end-devices can be exchanged in mathematical value to establish the connection between market and users.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 64-68"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60219-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87025185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Multi-cell cooperation based on time reversal in heterogeneous wireless networks 异构无线网络中基于时间反转的多小区合作
Q4 Computer Science Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60216-2
Li WANG , Jing-wei MO , Yue MA , Peng LU

Cooperation among heterogeneous base stations can improve spectrum efficiency through interference avoidance. This paper introduces a time reversal (TR) technique in multi-cell cooperation to mitigate interference and efficiently allocate spectrum resources. Exploiting its inherent power concentration feature, TR can effectively tackle the problem of edge effect. We present analysis and simulation results to demonstrate that proper use of TR significantly improves the spectrum efficiency of heterogeneous networks.

异构基站间的合作可以通过避免干扰来提高频谱效率。本文介绍了一种多小区合作中的时间反转技术,以减少干扰,有效地分配频谱资源。利用其固有的功率集中特性,TR可以有效地解决边缘效应问题。分析和仿真结果表明,适当使用TR可以显著提高异构网络的频谱效率。
{"title":"Multi-cell cooperation based on time reversal in heterogeneous wireless networks","authors":"Li WANG ,&nbsp;Jing-wei MO ,&nbsp;Yue MA ,&nbsp;Peng LU","doi":"10.1016/S1005-8885(13)60216-2","DOIUrl":"10.1016/S1005-8885(13)60216-2","url":null,"abstract":"<div><p>Cooperation among heterogeneous base stations can improve spectrum efficiency through interference avoidance. This paper introduces a time reversal (TR) technique in multi-cell cooperation to mitigate interference and efficiently allocate spectrum resources. Exploiting its inherent power concentration feature, TR can effectively tackle the problem of edge effect. We present analysis and simulation results to demonstrate that proper use of TR significantly improves the spectrum efficiency of heterogeneous networks.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 80-85"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60216-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85374872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protocol reverse engineering through dynamic and static binary analysis 协议逆向工程通过动态和静态二进制分析
Q4 Computer Science Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60217-4
Ying WANG , Li-ze GU , Zhong-xian LI , Yi-xian YANG

This paper presents a new method for protocol reverse engineering, which combines both the dynamic and static binary analysis. Our work not only does precise positioning on the field and its length, but also gives the field attributes accurately. According to different instructions and the current program structure, we can infer the message format validly. To prove the method is sound and effective, we build a prototype tool – NetProtocolFinder, and select some documented protocol and undocumented protocol messages as the test instances respectively. Results of our experiments show that the tool can not only extract the message format from protocols effectively, but also speculate the state machine model through relevant field attributes conveniently.

本文提出了一种将动态和静态二进制分析相结合的协议逆向工程新方法。我们的工作不仅对场及其长度进行了精确定位,而且准确地给出了场的属性。根据不同的指令和当前的程序结构,我们可以有效地推断出消息的格式。为了证明该方法的合理性和有效性,我们构建了一个原型工具——NetProtocolFinder,并分别选取了一些已记录的协议和未记录的协议消息作为测试实例。实验结果表明,该工具不仅可以有效地从协议中提取消息格式,而且可以方便地通过相关字段属性推测状态机模型。
{"title":"Protocol reverse engineering through dynamic and static binary analysis","authors":"Ying WANG ,&nbsp;Li-ze GU ,&nbsp;Zhong-xian LI ,&nbsp;Yi-xian YANG","doi":"10.1016/S1005-8885(13)60217-4","DOIUrl":"10.1016/S1005-8885(13)60217-4","url":null,"abstract":"<div><p>This paper presents a new method for protocol reverse engineering, which combines both the dynamic and static binary analysis. Our work not only does precise positioning on the field and its length, but also gives the field attributes accurately. According to different instructions and the current program structure, we can infer the message format validly. To prove the method is sound and effective, we build a prototype tool – NetProtocolFinder, and select some documented protocol and undocumented protocol messages as the test instances respectively. Results of our experiments show that the tool can not only extract the message format from protocols effectively, but also speculate the state machine model through relevant field attributes conveniently.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 75-79"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60217-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84189253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Critical phenomenon of two coupled phase oscillators 两个耦合相位振荡器的临界现象
Q4 Computer Science Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60208-3
Bo LI, Zi-chen CHEN, Hai-bo QIU, Xiao-qiang XI

Measure synchronization (MS) is a novel phenomenon which can be found in some coupled Hamiltonian systems (HS). In this paper, we built a new model called two coupled phase oscillators system (CPOS), and found that, under the appropriate initial conditions, it will meet a critical phenomenon in the phase space as the coupling strength increases. We also found the critical state by introducing the Poincaré section technique. We established a new formula for the critical coupling strength by analyzing the HS model, and extended this formula to the CPOS. The numerically analytical results show the reason why the measure synchronization of CPOS does not exist.

测量同步(MS)是一些耦合哈密顿系统(HS)中出现的一种新现象。本文建立了双耦合相位振荡器系统(CPOS)的新模型,发现在适当的初始条件下,随着耦合强度的增加,它在相空间中会遇到一个临界现象。引入庞卡罗切片技术,找到了临界状态。通过对HS模型的分析,建立了新的临界耦合强度公式,并将该公式推广到CPOS中。数值分析结果揭示了CPOS测量同步不存在的原因。
{"title":"Critical phenomenon of two coupled phase oscillators","authors":"Bo LI,&nbsp;Zi-chen CHEN,&nbsp;Hai-bo QIU,&nbsp;Xiao-qiang XI","doi":"10.1016/S1005-8885(13)60208-3","DOIUrl":"10.1016/S1005-8885(13)60208-3","url":null,"abstract":"<div><p>Measure synchronization (MS) is a novel phenomenon which can be found in some coupled Hamiltonian systems (HS). In this paper, we built a new model called two coupled phase oscillators system (CPOS), and found that, under the appropriate initial conditions, it will meet a critical phenomenon in the phase space as the coupling strength increases. We also found the critical state by introducing the Poincaré section technique. We established a new formula for the critical coupling strength by analyzing the HS model, and extended this formula to the CPOS. The numerically analytical results show the reason why the measure synchronization of CPOS does not exist.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 121-127"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60208-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82937785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On a novel method of designing distributed LDoS attack based on network behavior features 基于网络行为特征的分布式ddos攻击设计新方法
Q4 Computer Science Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60221-6
Xiao-ming LIU , Qi LI

This paper designs a distributed low-rate denial of service (LDoS) attack using one-dimensional random walk algorithm. One-dimensional random walk algorithm can be used in generating power-law distribution which complies with normal network behavior feature. In this attack pattern, the behavior of each distributed attack flows are normal and nonperiodic, while the aggregated effect has the same damage degree as traditional square wave LDoS attacks. As the distributed attack flow satisfies the network traffic behavior feature, it is even more difficult to detect and trace back attack sources. The study on the feature of this attack provides reference for distributed low-rate DoS attack countermeasures.

本文利用一维随机游走算法设计了一种分布式低速率拒绝服务攻击。一维随机游走算法可以生成符合正常网络行为特征的幂律分布。在这种攻击模式下,每个分布式攻击流的行为都是正常的、非周期性的,而聚合效应的破坏程度与传统的方波LDoS攻击相同。由于分布式攻击流满足网络流量行为特征,使得攻击源的检测和溯源更加困难。通过对该攻击特征的研究,为分布式低速率DoS攻击对策提供参考。
{"title":"On a novel method of designing distributed LDoS attack based on network behavior features","authors":"Xiao-ming LIU ,&nbsp;Qi LI","doi":"10.1016/S1005-8885(13)60221-6","DOIUrl":"10.1016/S1005-8885(13)60221-6","url":null,"abstract":"<div><p>This paper designs a distributed low-rate denial of service (LDoS) attack using one-dimensional random walk algorithm. One-dimensional random walk algorithm can be used in generating power-law distribution which complies with normal network behavior feature. In this attack pattern, the behavior of each distributed attack flows are normal and nonperiodic, while the aggregated effect has the same damage degree as traditional square wave LDoS attacks. As the distributed attack flow satisfies the network traffic behavior feature, it is even more difficult to detect and trace back attack sources. The study on the feature of this attack provides reference for distributed low-rate DoS attack countermeasures.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 54-59"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60221-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83191698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knowledge-based information security risk assessment method 基于知识的信息安全风险评估方法
Q4 Computer Science Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60220-4
Ji-zheng GUAN , Ming-tao LEI , Xiao-lu ZHU , Jian-yi LIU

It is an important function for managers to keep away from information security risks. With the increasing complex and scale of information systems, information system security risks may be more difficult to assess and strategies for risk reduction may be lack of objectivity. To solve this problem, this paper proposes a knowledge-based information security risk assessment method in which basic rules and specific rules are defined to match every asset, threat and vulnerability. Basic rules are defined as the rules without influence of external relationships. Specific rules are defined as the rules by user group. Performance analysis shows this method could increase efficiency and ensure accuracy of risk assessment.

防范信息安全风险是管理者的一项重要职能。随着信息系统的复杂性和规模的增加,信息系统安全风险的评估难度加大,降低风险的策略缺乏客观性。针对这一问题,本文提出了一种基于知识的信息安全风险评估方法,该方法通过定义基本规则和具体规则来匹配各种资产、威胁和漏洞。基本规则是指不受外部关系影响的规则。具体规则是按用户组定义的规则。性能分析表明,该方法可以提高效率,保证风险评估的准确性。
{"title":"Knowledge-based information security risk assessment method","authors":"Ji-zheng GUAN ,&nbsp;Ming-tao LEI ,&nbsp;Xiao-lu ZHU ,&nbsp;Jian-yi LIU","doi":"10.1016/S1005-8885(13)60220-4","DOIUrl":"10.1016/S1005-8885(13)60220-4","url":null,"abstract":"<div><p>It is an important function for managers to keep away from information security risks. With the increasing complex and scale of information systems, information system security risks may be more difficult to assess and strategies for risk reduction may be lack of objectivity. To solve this problem, this paper proposes a knowledge-based information security risk assessment method in which basic rules and specific rules are defined to match every asset, threat and vulnerability. Basic rules are defined as the rules without influence of external relationships. Specific rules are defined as the rules by user group. Performance analysis shows this method could increase efficiency and ensure accuracy of risk assessment.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 60-63"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60220-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90473109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Access control for rural medical and health collaborative working platform 农村医疗卫生协同工作平台的访问控制
Q4 Computer Science Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60229-0
Yan-feng JIANG , Si-yue ZHANG , Zhen HUANG , Mu-qing LIU , Ling YIN , Jing-ping NIU

Rural medical and health collaborative working platform is a collaborative platform which combines information processing system, office management, and telemedicine and computer aided diagnosis system. The personal health records, expert information, fund management information, and any others on the rural medical and health collaborative working platform are user's privacy data, which need strong security protection. In order to achieve efficient data sharing between doctors and patients and ensure the data security, there must be strict access control policy to be applied on the rural medical and health collaborative working platform. In this paper, the access control and its application on the rural medical and health collaborative working platform are discussed from the perspective of user role management.

农村医疗卫生协同工作平台是集信息处理系统、办公管理、远程医疗和计算机辅助诊断系统于一体的协同平台。农村医疗卫生协同工作平台上的个人健康记录、专家信息、基金管理信息等都是用户的隐私数据,需要强有力的安全保护。为了实现医患之间高效的数据共享,保证数据安全,必须对农村医疗卫生协同工作平台实施严格的访问控制策略。本文从用户角色管理的角度探讨了农村医疗卫生协同工作平台的访问控制及其应用。
{"title":"Access control for rural medical and health collaborative working platform","authors":"Yan-feng JIANG ,&nbsp;Si-yue ZHANG ,&nbsp;Zhen HUANG ,&nbsp;Mu-qing LIU ,&nbsp;Ling YIN ,&nbsp;Jing-ping NIU","doi":"10.1016/S1005-8885(13)60229-0","DOIUrl":"10.1016/S1005-8885(13)60229-0","url":null,"abstract":"<div><p>Rural medical and health collaborative working platform is a collaborative platform which combines information processing system, office management, and telemedicine and computer aided diagnosis system. The personal health records, expert information, fund management information, and any others on the rural medical and health collaborative working platform are user's privacy data, which need strong security protection. In order to achieve efficient data sharing between doctors and patients and ensure the data security, there must be strict access control policy to be applied on the rural medical and health collaborative working platform. In this paper, the access control and its application on the rural medical and health collaborative working platform are discussed from the perspective of user role management.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 7-10"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60229-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84955088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Interference alignment and spatially-normalized degrees of freedom of cellular networks with two cells and three users per cell 两个小区、每个小区有三个用户的蜂窝网络的干扰对准和空间归一化自由度
Q4 Computer Science Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60215-0
Xiao-shi SONG, Chang-chuan YIN, Dan-pu LIU, Jian-feng LI

This paper characterizes the spatially-normalized degrees of freedom (DoF) of a 2-cell, 3-user per cell multiple input multiple output (MIMO) cellular networks with M antennas at each user and N antennas at each base station. We show that the spatially-normalized DoF is a piecewise linear function, with either M or N being the bottleneck. Given γ = M / N, we shown that for

there is redundancy in both M and N, i.e., either can be reduced without losing spatially-normalized DoF. On the other hand, for
it is shown that there is no redundancy in either M or N, i.e, neither can be reduced without losing spatially-normalized DoF. Our results also settle the issue of feasibility of linear interference alignment for all values of M and N. Specifically, it is shown that except for
for every other γ, the proper systems are actually not feasible.

本文描述了一个2小区,每小区3个用户的多输入多输出(MIMO)蜂窝网络的空间归一化自由度(DoF),每个用户有M个天线,每个基站有N个天线。我们证明了空间归一化自由度是一个分段线性函数,其中M或N是瓶颈。在给定γ = M / N的情况下,我们证明了在M和N中都存在冗余,即可以在不丢失空间归一化自由度的情况下减小任意一个。另一方面,由于M和N都不存在冗余,即在不损失空间归一化自由度的情况下,都不能进行约简。我们的结果也解决了所有M和n值的线性干涉对准的可行性问题。具体来说,它表明,除了每一个其他γ,适当的系统实际上是不可行的。
{"title":"Interference alignment and spatially-normalized degrees of freedom of cellular networks with two cells and three users per cell","authors":"Xiao-shi SONG,&nbsp;Chang-chuan YIN,&nbsp;Dan-pu LIU,&nbsp;Jian-feng LI","doi":"10.1016/S1005-8885(13)60215-0","DOIUrl":"10.1016/S1005-8885(13)60215-0","url":null,"abstract":"<div><p>This paper characterizes the spatially-normalized degrees of freedom (DoF) of a 2-cell, 3-user per cell multiple input multiple output (MIMO) cellular networks with <em>M</em> antennas at each user and <em>N</em> antennas at each base station. We show that the spatially-normalized DoF is a piecewise linear function, with either <em>M</em> or <em>N</em> being the bottleneck. Given γ = M / N, we shown that for <figure><img></figure> there is redundancy in both <em>M</em> and <em>N</em>, i.e., either can be reduced without losing spatially-normalized DoF. On the other hand, for <figure><img></figure> it is shown that there is no redundancy in either <em>M</em> or <em>N</em>, i.e, neither can be reduced without losing spatially-normalized DoF. Our results also settle the issue of feasibility of linear interference alignment for all values of <em>M</em> and <em>N</em>. Specifically, it is shown that except for <figure><img></figure> for every other γ, the proper systems are actually not feasible.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 86-91"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60215-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86381834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gain-flattened tellurite-based fiber Raman amplifiers 增益平坦化碲基光纤拉曼放大器
Q4 Computer Science Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60206-X
Jia-min GONG , Yun ZHAO , Xu ZUO

A gain-flattened tellurite-based fiber Raman amplifiers (T-FRA) is proposed and numerically demonstrated. By solving the steady equation of a T-FRA, the characteristics including the gain and gain flatness of T-FRA is investigated. The results show that a T-FRA pumped by dual wavelengths can provide gain-flattened band with widths of 48 nm. Moreover, the average gain and gain flatness is 17.72 dB and 0.68 dB, respectively. The newly designed T-FRA is very promising in future optical fiber communication systems.

提出了一种增益平坦型碲基光纤拉曼放大器(T-FRA),并进行了数值验证。通过求解T-FRA的稳态方程,研究了T-FRA的增益和增益平坦度等特性。结果表明,双波长泵浦的T-FRA可以提供宽度为48 nm的增益平坦带。平均增益为17.72 dB,增益平坦度为0.68 dB。新设计的T-FRA在未来的光纤通信系统中具有广阔的应用前景。
{"title":"Gain-flattened tellurite-based fiber Raman amplifiers","authors":"Jia-min GONG ,&nbsp;Yun ZHAO ,&nbsp;Xu ZUO","doi":"10.1016/S1005-8885(13)60206-X","DOIUrl":"10.1016/S1005-8885(13)60206-X","url":null,"abstract":"<div><p>A gain-flattened tellurite-based fiber Raman amplifiers (T-FRA) is proposed and numerically demonstrated. By solving the steady equation of a T-FRA, the characteristics including the gain and gain flatness of T-FRA is investigated. The results show that a T-FRA pumped by dual wavelengths can provide gain-flattened band with widths of 48 nm. Moreover, the average gain and gain flatness is 17.72 dB and 0.68 dB, respectively. The newly designed T-FRA is very promising in future optical fiber communication systems.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 143-146"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60206-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83861002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of China Universities of Posts and Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1