Journal of China Universities of Posts and Telecommunications最新文献

筛选
英文 中文
Efficient methods for choosing quantum channel in teleportation and bidirectional teleportation 隐形传态和双向隐形传态中量子通道的有效选择方法
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60212-5
Yang HU, Hong-zi FU, Xiu-lao TIAN
{"title":"Efficient methods for choosing quantum channel in teleportation and bidirectional teleportation","authors":"Yang HU,&nbsp;Hong-zi FU,&nbsp;Xiu-lao TIAN","doi":"10.1016/S1005-8885(13)60212-5","DOIUrl":"10.1016/S1005-8885(13)60212-5","url":null,"abstract":"<div><p>The tensor representation of quantum teleportation shows the internal connection between Bell basis measurement matrix <em>T<sup>α</sup></em> and channel parameter matrix (CPM) <strong><em>R</em></strong>. An explicit CPM criterion based on the tensor representation is derived. This criterion can be used to judge whether a quantum state can be employed as the quantum channel or not in teleportation and bidirectional teleportation, and it provides us more flexible choices to construct the quantum channel.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 101-104"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60212-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81292289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security and privacy mechanism for health internet of things 健康物联网的安全与隐私机制
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60219-8
Kai KANG , Zhi-bo PANG , Cong WANG
{"title":"Security and privacy mechanism for health internet of things","authors":"Kai KANG ,&nbsp;Zhi-bo PANG ,&nbsp;Cong WANG","doi":"10.1016/S1005-8885(13)60219-8","DOIUrl":"10.1016/S1005-8885(13)60219-8","url":null,"abstract":"<div><p>The rapid development of technologies towards Internet of Things (IoT), has led to new circumstances at all levels of the social environment. In healthcare in particular, the use of IoT concepts and technologies make diagnose and monitor more convenient for the physicians and patients. As mobile applications solutions are widely accepted because the easy to use, secure healthcare service is a new demand for mobile solutions. To protect the privacy and security for patients in the domain of healthcare towards IoT, a systematic mechanism is needed. This article proposes a novel security and privacy mechanism for Health Internet of Things (Health-IoT) to solve above problems. Health-IoT is promising for both traditional healthcare industry and the information and communication technologies (ICTs) industry. From the view of trustworthiness, interactive vector was proposed to communicate the end-devices and application brokers. The aim is to establish a trust IoT application market (IAM), feature of application in marketplace and behavior of applications on end-devices can be exchanged in mathematical value to establish the connection between market and users.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 64-68"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60219-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87025185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Multi-cell cooperation based on time reversal in heterogeneous wireless networks 异构无线网络中基于时间反转的多小区合作
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60216-2
Li WANG , Jing-wei MO , Yue MA , Peng LU
{"title":"Multi-cell cooperation based on time reversal in heterogeneous wireless networks","authors":"Li WANG ,&nbsp;Jing-wei MO ,&nbsp;Yue MA ,&nbsp;Peng LU","doi":"10.1016/S1005-8885(13)60216-2","DOIUrl":"10.1016/S1005-8885(13)60216-2","url":null,"abstract":"<div><p>Cooperation among heterogeneous base stations can improve spectrum efficiency through interference avoidance. This paper introduces a time reversal (TR) technique in multi-cell cooperation to mitigate interference and efficiently allocate spectrum resources. Exploiting its inherent power concentration feature, TR can effectively tackle the problem of edge effect. We present analysis and simulation results to demonstrate that proper use of TR significantly improves the spectrum efficiency of heterogeneous networks.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 80-85"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60216-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85374872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protocol reverse engineering through dynamic and static binary analysis 协议逆向工程通过动态和静态二进制分析
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60217-4
Ying WANG , Li-ze GU , Zhong-xian LI , Yi-xian YANG
{"title":"Protocol reverse engineering through dynamic and static binary analysis","authors":"Ying WANG ,&nbsp;Li-ze GU ,&nbsp;Zhong-xian LI ,&nbsp;Yi-xian YANG","doi":"10.1016/S1005-8885(13)60217-4","DOIUrl":"10.1016/S1005-8885(13)60217-4","url":null,"abstract":"<div><p>This paper presents a new method for protocol reverse engineering, which combines both the dynamic and static binary analysis. Our work not only does precise positioning on the field and its length, but also gives the field attributes accurately. According to different instructions and the current program structure, we can infer the message format validly. To prove the method is sound and effective, we build a prototype tool – NetProtocolFinder, and select some documented protocol and undocumented protocol messages as the test instances respectively. Results of our experiments show that the tool can not only extract the message format from protocols effectively, but also speculate the state machine model through relevant field attributes conveniently.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 75-79"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60217-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84189253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Critical phenomenon of two coupled phase oscillators 两个耦合相位振荡器的临界现象
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60208-3
Bo LI, Zi-chen CHEN, Hai-bo QIU, Xiao-qiang XI
{"title":"Critical phenomenon of two coupled phase oscillators","authors":"Bo LI,&nbsp;Zi-chen CHEN,&nbsp;Hai-bo QIU,&nbsp;Xiao-qiang XI","doi":"10.1016/S1005-8885(13)60208-3","DOIUrl":"10.1016/S1005-8885(13)60208-3","url":null,"abstract":"<div><p>Measure synchronization (MS) is a novel phenomenon which can be found in some coupled Hamiltonian systems (HS). In this paper, we built a new model called two coupled phase oscillators system (CPOS), and found that, under the appropriate initial conditions, it will meet a critical phenomenon in the phase space as the coupling strength increases. We also found the critical state by introducing the Poincaré section technique. We established a new formula for the critical coupling strength by analyzing the HS model, and extended this formula to the CPOS. The numerically analytical results show the reason why the measure synchronization of CPOS does not exist.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 121-127"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60208-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82937785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On a novel method of designing distributed LDoS attack based on network behavior features 基于网络行为特征的分布式ddos攻击设计新方法
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60221-6
Xiao-ming LIU , Qi LI
{"title":"On a novel method of designing distributed LDoS attack based on network behavior features","authors":"Xiao-ming LIU ,&nbsp;Qi LI","doi":"10.1016/S1005-8885(13)60221-6","DOIUrl":"10.1016/S1005-8885(13)60221-6","url":null,"abstract":"<div><p>This paper designs a distributed low-rate denial of service (LDoS) attack using one-dimensional random walk algorithm. One-dimensional random walk algorithm can be used in generating power-law distribution which complies with normal network behavior feature. In this attack pattern, the behavior of each distributed attack flows are normal and nonperiodic, while the aggregated effect has the same damage degree as traditional square wave LDoS attacks. As the distributed attack flow satisfies the network traffic behavior feature, it is even more difficult to detect and trace back attack sources. The study on the feature of this attack provides reference for distributed low-rate DoS attack countermeasures.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 54-59"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60221-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83191698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knowledge-based information security risk assessment method 基于知识的信息安全风险评估方法
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60220-4
Ji-zheng GUAN , Ming-tao LEI , Xiao-lu ZHU , Jian-yi LIU
{"title":"Knowledge-based information security risk assessment method","authors":"Ji-zheng GUAN ,&nbsp;Ming-tao LEI ,&nbsp;Xiao-lu ZHU ,&nbsp;Jian-yi LIU","doi":"10.1016/S1005-8885(13)60220-4","DOIUrl":"10.1016/S1005-8885(13)60220-4","url":null,"abstract":"<div><p>It is an important function for managers to keep away from information security risks. With the increasing complex and scale of information systems, information system security risks may be more difficult to assess and strategies for risk reduction may be lack of objectivity. To solve this problem, this paper proposes a knowledge-based information security risk assessment method in which basic rules and specific rules are defined to match every asset, threat and vulnerability. Basic rules are defined as the rules without influence of external relationships. Specific rules are defined as the rules by user group. Performance analysis shows this method could increase efficiency and ensure accuracy of risk assessment.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 60-63"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60220-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90473109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Access control for rural medical and health collaborative working platform 农村医疗卫生协同工作平台的访问控制
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60229-0
Yan-feng JIANG , Si-yue ZHANG , Zhen HUANG , Mu-qing LIU , Ling YIN , Jing-ping NIU
{"title":"Access control for rural medical and health collaborative working platform","authors":"Yan-feng JIANG ,&nbsp;Si-yue ZHANG ,&nbsp;Zhen HUANG ,&nbsp;Mu-qing LIU ,&nbsp;Ling YIN ,&nbsp;Jing-ping NIU","doi":"10.1016/S1005-8885(13)60229-0","DOIUrl":"10.1016/S1005-8885(13)60229-0","url":null,"abstract":"<div><p>Rural medical and health collaborative working platform is a collaborative platform which combines information processing system, office management, and telemedicine and computer aided diagnosis system. The personal health records, expert information, fund management information, and any others on the rural medical and health collaborative working platform are user's privacy data, which need strong security protection. In order to achieve efficient data sharing between doctors and patients and ensure the data security, there must be strict access control policy to be applied on the rural medical and health collaborative working platform. In this paper, the access control and its application on the rural medical and health collaborative working platform are discussed from the perspective of user role management.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 7-10"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60229-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84955088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Interference alignment and spatially-normalized degrees of freedom of cellular networks with two cells and three users per cell 两个小区、每个小区有三个用户的蜂窝网络的干扰对准和空间归一化自由度
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60215-0
Xiao-shi SONG, Chang-chuan YIN, Dan-pu LIU, Jian-feng LI
{"title":"Interference alignment and spatially-normalized degrees of freedom of cellular networks with two cells and three users per cell","authors":"Xiao-shi SONG,&nbsp;Chang-chuan YIN,&nbsp;Dan-pu LIU,&nbsp;Jian-feng LI","doi":"10.1016/S1005-8885(13)60215-0","DOIUrl":"10.1016/S1005-8885(13)60215-0","url":null,"abstract":"<div><p>This paper characterizes the spatially-normalized degrees of freedom (DoF) of a 2-cell, 3-user per cell multiple input multiple output (MIMO) cellular networks with <em>M</em> antennas at each user and <em>N</em> antennas at each base station. We show that the spatially-normalized DoF is a piecewise linear function, with either <em>M</em> or <em>N</em> being the bottleneck. Given γ = M / N, we shown that for <figure><img></figure> there is redundancy in both <em>M</em> and <em>N</em>, i.e., either can be reduced without losing spatially-normalized DoF. On the other hand, for <figure><img></figure> it is shown that there is no redundancy in either <em>M</em> or <em>N</em>, i.e, neither can be reduced without losing spatially-normalized DoF. Our results also settle the issue of feasibility of linear interference alignment for all values of <em>M</em> and <em>N</em>. Specifically, it is shown that except for <figure><img></figure> for every other γ, the proper systems are actually not feasible.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 86-91"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60215-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86381834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gain-flattened tellurite-based fiber Raman amplifiers 增益平坦化碲基光纤拉曼放大器
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-12-01 DOI: 10.1016/S1005-8885(13)60206-X
Jia-min GONG , Yun ZHAO , Xu ZUO
{"title":"Gain-flattened tellurite-based fiber Raman amplifiers","authors":"Jia-min GONG ,&nbsp;Yun ZHAO ,&nbsp;Xu ZUO","doi":"10.1016/S1005-8885(13)60206-X","DOIUrl":"10.1016/S1005-8885(13)60206-X","url":null,"abstract":"<div><p>A gain-flattened tellurite-based fiber Raman amplifiers (T-FRA) is proposed and numerically demonstrated. By solving the steady equation of a T-FRA, the characteristics including the gain and gain flatness of T-FRA is investigated. The results show that a T-FRA pumped by dual wavelengths can provide gain-flattened band with widths of 48 nm. Moreover, the average gain and gain flatness is 17.72 dB and 0.68 dB, respectively. The newly designed T-FRA is very promising in future optical fiber communication systems.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 143-146"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60206-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83861002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信