Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

131 results about "Unitary transformation" patented technology

In mathematics, a unitary transformation is a transformation that preserves the inner product: the inner product of two vectors before the transformation is equal to their inner product after the transformation.

Multi-target location method of bistatic common-address multi-input-multi-output radar

InactiveCN102213761AHigh precisionAvoid simultaneous application to the transmitterRadio wave reradiation/reflectionSingular value decompositionDomain name
The invention provides a multi-target location method of a bistatic common-address multi-input-multi-output radar. The method comprises the following steps of: transmitting mutual orthogonal phase coded signals by M transmitting array elements; receiving the phase coded signals by N receiving array elements; performing matching filtering on the received phase coded signals by a matching filter ofeach receiver which is used for receiving the array elements; reconfiguring covariance matrix of signal data subjected to matching filtering; performing unitary transformation on the reconfigured covariance matrix to obtain the covariance matrix of a real number field; performing singular value decomposition on the covariance matrix of the real number field; estimating emission angles and acceptance angles of a plurality of objects by utilizing actual value combination spinning invariant factor; and realizing multi-target location according to a cross point of the two angles to obtain the position of a space object. According to the method, the combination spinning invariant factor is adopted to reconfigure the receiving data so as to improve the estimation performance of an object; and the covariance matrix of the real number field is obtained through unitary transformation, and characteristic decomposition is performed on the covariance matrix of the real number field so as to be favorable for real-time processing and realization on hardware.
Owner:HARBIN ENG UNIV

Artificial noise assisted large-scale MIMO security statistical precoding method

The invention provides an artificial noise assisted large-scale MIMO security statistical precoding method. In the method, a cell base station is configured with a large-scale antenna array, and large-scale beam coverage is realized on the whole cell by utilizing a unified unitary transformation matrix. The base station uses beam domains of legal users and eavesdropping users in a cell to count channel information and injects artificial noise into the channel to reduce the decoding capability of the eavesdropping users, and performs statistical precoding design on the signals sent to each legal user and the artificial noise sent to the eavesdropping users according to the criterion of maximizing the system reachable traversal security and rate lower bound. In the moving process of each legal user and each eavesdropping user, the base station intermittently acquires statistical channel information and dynamically updates a statistical precoding result. According to the invention, the problem that the base station side only knows the design of the beam domain secure transmission signal of the statistical channel information is solved, the realization complexity is reduced, and meanwhile, the introduction of artificial noise improves the security of system transmission.
Owner:SOUTHEAST UNIV

Quantum key agreement protocol based on GHZ state

The invention discloses a quantum key agreement protocol based on GHZ state, comprising the following steps that: step 1, Alice and Bob randomly generate respective classical keys; step 2, Alice prepares the GHZ state and divides all particles into sequences, inserts decoy photons into one of the sequences and then transmits the sequence to Bob; step 3, Bob measures the decoy photons, Alice calculates an error rate, if the error rate is low, a step 4 is executed, otherwise, the step 2 is executed again; step 4, Alice and Bob respectively perform measurement and obtain the measurement result of each other; step 5, Alice executes unitary transformation and obtains a new sequence, and Alice transits the sequence with the inserted decoy photons to Bob; step 6, Bob measures the decoy photons, and Alice calculates the error rate, if the error rate is low, a step 7 is executed, and otherwise, the step 2 is executed again; step 7, Alice calculates a shared key of both sides; step 8, Bob generates the shared key. The quantum key agreement protocol based on GHZ state can resist participant attack, outside attack and Trojan horse attack. The quantum key agreement protocol based on GHZ state is safe in both a noiseless quantum channel and a quantum noisy channel. Moreover, quantum bit efficiency of the quantum key agreement protocol based on GHZ state is higher than the existing protocols.
Owner:XIAN UNIV OF POSTS & TELECOMM

Controlled quantum security direct communication method based on four particle cluster states

The invention discloses a controlled quantum security direct communication method based on four particle cluster states. Alice and Bob respectively serve as a legal information sender and a legal information receiver during a quantum communication process, and Charlie serves as a credible scheme control party; information security is achieved by randomly inserting a single photon to perform measurement-based comparison detection, and communication starts after security detection; Alice uniformly divides the prepared four particle cluster states into two groups, after being subjected to an XOR operation with a pseudorandom sequence, the sent information is encoded on the two particles reserved by Alice via unitary transformation. Alice performs Bell-based measurement on reserved particles, and sends measurement information to Bob, and Bob recovers the original sequence via an initial state sent by Charlie after the measurement information is compared. The four particle cluster states used by the method has good entanglement, connectivity and damage resistance, only the receiver Bob in the method gets the permission of the controller Charlie, Bob can recover the original information, so that the information can be effectively prevented from being attacked during a transmission process, and an implementation process is simple.
Owner:NORTHWEST UNIV

Target low elevation estimation method based on real number field generalized multiple-signal sorting algorithm

The invention discloses a target low elevation estimation method based on a real number field generalized multiple-signal sorting algorithm. The target low elevation estimation method includes the implementation steps of (1) sampling radar received back waves, (2) using sample data to calculate a sampling covariance matrix, (3) carrying out spatial smoothing and unitary transformation on the sampling covariance matrix to obtain a real number field covariance matrix (4) carrying out eigenvalue decomposition on the real number field covariance matrix to obtain a noise projection matrix, (5) constructing a real number field guiding vector manifold, (6) using the noise projection matrix and the real number field guiding vector manifold to constructing a spatial spectrum, conducting two-dimensional angle searching on the spatial spectrum and obtaining an initial angle estimated value, (7) using the initial angle estimated value to estimate a multi-path attenuation coefficient, constructing a secondary spatial spectrum and obtaining an angle estimated value through the two-dimensional angle searching, and (8) comparing the two angles in the estimated values, and considering the maximum angle as the target elevation value. According to the target low elevation estimation method, the algorithm complexity is reduced, and the angle estimation performance of a radar under the low signal-to-noise ratio is improved.
Owner:XIDIAN UNIV

Mutual coupling condition-oriented bistatic MIMO (multiple-input multiple-output) radar angle estimation method

The present invention discloses a mutual coupling condition-oriented bistatic MIMO (multiple-input multiple-output) radar angle estimation method. According to the method, radar data which have been subjected to matched filtering are expressed as a third-order tensor model by means of the multi-dimensional structure of array signals; since a uniform linear array mutual coupling matrix has a strip-shaped Toeplitz feature, the common scale conversion feature of a part of an array element directional matrix is utilized to eliminate the influence of mutual coupling; on the basis of a forward-backward smoothing technique and a unitary transformation technique, the augmented output trilinear model of decoupling-post data is constructed; and joint DOD (direction-of-departure) and DOA (direction-of-arrival) estimation is related with the trilinear model; and a target DOD and DOA are estimated through the least squares method. Compared with a traditional algorithm, the bistatic MIMO (multiple-input multiple-output) radar angle estimation method under the mutual coupling condition can effectively deal with situations where mutual coupling exists between a transmitting array and a receiving array, can automatically match the estimated DOD and DOA, and can reduce computational complexity by using a feature that trilinear decomposition only involves real number operation.
Owner:YANGTZE UNIVERSITY

Quantum voting system and method based on quantum teleportation

The invention discloses a quantum voting system and method based on quantum teleportation. The quantum voting system comprises a voter Alice, a voting management organization CA, a supervisor Charlie,a teller Bob and four OADMs, wherein the voter Alice comprises a first a quantum key server, a voting terminal and a first quantum state measurement device; the voting management organization CA comprises a second quantum key server, an authentication terminal, an entanglement source and a first Bell state measurement device; the supervisor Charlie comprises a third quantum key server, a displayterminal and a second Bell state measurement device; and the teller Bob comprises a fourth quantum key server, a computer terminal, a unitary transformation device and a second quantum state measurement device. The quantum voting system disclosed by the invention ensures the security of the whole voting process by the coherence of entangled particles, a QKD protocol, a one-time-one-encryption encryption algorithm and quantum channel eavesdropping detection. In addition, the quantum voting system disclosed by the invention transmits the classical and quantum information through different wavelengths in the same optical fiber, so that the cost of an application can be greatly reduced, and the practicability is improved
Owner:GUANGDONG INCUBATOR TECH DEV CO LTD

Four-particle GHZ state-based two-party quantum key agreement protocol

The invention discloses a four-particle GHZ state-based two-party quantum key agreement protocol. The protocol includes the following steps that: step 1, Alice and Bob randomly generate respective classic keys and negotiate on functions; step 2, Alice selects n four-particle GHZ combination and separation sequences, and randomly inserts decoy photons into three sequences and transmits the new sequences to Bob; step 3, Bob measures the decoy photons, and Alice calculates an error rate; step 4, Alice executes CNOT operation on every three corresponding particles with the same serial numbers in the sequences by twice; step 5, Alice executes unitary transformation so as to obtain new sequences, and selects out the decoy photons and inserts the decoy photons into the sequences and transmits the sequences to Bob; step 6, Bob measures the decoy photons; Alice compares measurement results and calculates an error rate, and step 7 is executed if the error rate is low, otherwise, the method returns to step 2; step 7, Alice generates a shared key; and step 8, Bob generates a shared key. With the four-particle GHZ state two-party quantum key agreement protocol of the invention adopted, existing participant attacks and the external attacks can be resisted. The quantum bit efficiency of the protocol is much higher than that of an existing protocol.
Owner:XIAN UNIV OF POSTS & TELECOMM

Multi-antenna spectrum sensing method and device suitable for broadband system

The invention discloses a multi-antenna spectrum sensing method and a device suitable for a broadband system. All component channels of the broadband system are detected simultaneously. First, unitary transformation treatment is conducted to the sampling covariance matrix of receiving signals, based on the galeazzi likelihood function and the Gerschgorin radii of noise, the number of occupied component channels is estimated, and then according the size of power of the component channels, the positions of the occupied component channels are judged, and free component channels and the occupied component channels are determined. Compared with a traditional broadband spectrum sensing method, the multi-antenna spectrum sensing method suitable for the broadband system is characterized in that a traditional subjective judgment threshold does not rely on, however, the orthogonality of channel subspace and noise subspace is used to judge; apriori information of noise power is of no need, and robustness is achieved to the uncertainty of the noise. By means of the multi-antenna spectrum sensing method suitable for the broadband system, the influence of the uncertainty of the noise on system performance can be effectively restrained, sensing time is shortened, and spectrum efficiency is improved.
Owner:BEIJING UNIV OF POSTS & TELECOMM

User activity and signal joint detection method for large-scale MIMO system

The invention discloses a user activity and signal joint detection method for a large-scale MIMO system. The method comprises the steps: enabling the number of IoT equipment to be greater than the number of antennas configured at a base station side, transmitting an M-ary quadrature amplitude modulation symbol at each time slot at each active IoT equipment of an uplink, and enabling the transmitting symbol of inactive IoT equipment to be 0 at each time slot, wherein each antenna on the base station side receives signals in each time slot; considering the condition that the noise power is unknown, estimating the noise power by utilizing unitary transformation approximate message passing, obtaining a posterior probability of transmitting symbols, and performing user activity detection according to the posterior probability and an expectation maximization algorithm, thereby finally obtaining a signal detection result, namely, estimating a matrix formed by symbols transmitted by all IoT equipment in all time slots. The method has the advantages that the noise power does not need to be known, the method better conforms to the actual situation, and the method can still have good detection performance under the condition that the number of active IoT devices is close to the number of base station side antennas.
Owner:NINGBO UNIV

Knowledge assisted space-time adaptive processing method integrating generalized symmetrical structure information

The invention provides a knowledge assisted space-time adaptive processing method integrating generalized symmetrical structure information. The knowledge assisted space-time adaptive processing method integrating the generalized symmetrical structure information comprises steps of (1) performing linear transformation through an unitary transformation matrix and transforming an original space-time adaptive processing problem to be in a form which is equivalent to the original space-time adaptive processing problem to enable a covariance matrix of the original space-time adaptive processing problem to be transferred into a real symmetric matrix in the same dimension from a generalized symmetric matrix; (2) obtaining an estimation of the transformed covariance matrix according to sample data; (3) solving an optimal real symmetric estimation of a prior covariance matrix under the minimum Euclidean distance; (4) solving a minimum mean square error estimation through a generalized linear combination and convex combination method in combination with training samples and the prior covariance matrix; (5) obtaining detector forms under part of uniform model and random non-uniform model assumption according to a two-step design and achieving target detection. The knowledge assisted space-time adaptive processing method integrating the generalized symmetrical structure information has the advantages of effectively reducing demanded quantity of the training samples during covariance matrix estimation in the space-time adaptive processing, remarkably improving the detector performances and being simple in achievement.
Owner:BEIHANG UNIV

Routing method for quantum Mesh network

The invention discloses a routing method for a quantum Mesh network. A source node originates a route request to a backbone network edge node connected with the source node and the backbone network edge node sends the route request to a backbone network; a backbone network edge node connected with a destination node performs routing and makes a route reply; each node receiving a reply message on the route performs Bell state measurement and transmits a route reply message carrying a measurement result to the source node; after the source node performs the Bell state measurement, all the measurement results are transmitted to the backbone network edge node connected with the destination node along the selected route; the edge node sends all the measurement results to the destination node; and the destination node processes all the measurement results and obtains a quantum state carrying information by virtue of unitary transformation. The routing method for the quantum Mesh network is capable of providing safer and more reliable quantum information transfer; in addition, the Bell state measurement is performed in the process of establishing a route, so that the time delay of information transmission can be reduced and the transmission efficiency can be improved.
Owner:SOUTHEAST UNIV

Anti-detection transmission method based on extended weighted fractional Fourier transform

ActiveCN111614590AParameter sensitivity is goodImproved anti-scan capabilityPhase-modulated carrier systemsSecurity arrangementCommunications systemComputation complexity
The invention discloses an anti-detection transmission method based on extended weighted fractional Fourier transform, and belongs to the technical field of communication. According to the invention,the problem of poor anti-eavesdropping end interception performance of the existing communication method is solved. According to the invention, M extended weighted fractional Fourier transforms are introduced into the signal processing process to realize the enhancement of the anti-interception performance of the signal transform domain. For a partner, due to unitary transformation, sending data can be recovered by correct inverse transformation according to a parameter key shared with a sending end; for an eavesdropping end, because the extended weighted transformation has a plurality of transformation parameters and the transformation parameters are mutually independent, the calculation complexity of decoding all the transformation parameters is greatly improved. Therefore, the anti-interception performance of the system is effectively improved, the possibility that the communication information is cracked illegally and violently is reduced, and the physical layer safety performanceof the communication system is improved. The method is suitable for the technical field of secret communication.
Owner:HARBIN INST OF TECH

Complete polarization synthetic aperture radar target decomposition method for adaptive selection unitary transformation

InactiveCN104698447ASuppressing Scatter Overestimation ProblemsLess freedomRadio wave reradiation/reflectionSynthetic aperture radarOmega
The invention provides a complete polarization synthetic aperture radar target decomposition method for adaptive selection unitary transformation. The method comprises the following steps: (1) performing two unitary transformations for singh for data coherence T matrix of the complete polarization synthetic aperture radar to obtain the matrix, (the formula is as shown in specification); (2) performing other two unitary transformations for the coherence T matrix to obtain the matrix T(omega), wherein the first unitary transformation is used for performing the spiral angle compensation and restraining the volume scattering excessive estimation of model decomposition, the second unitary transformation is used for further restraining the volume scattering excessive estimation and reducing one degree of freedom of the coherence T matrix; (3) comparing with element (the formula is as shown in specification) of the matrix (the formula is as shown in specification) with the element T33(omega) of the matrix T(omega); if (the formula is as shown in specification), and (the formula is as shown in specification), otherwise, T is equal to T(omega); (4) performing three-component model decomposition on coherence T matrix. The two unitary transformations for singh in the step (1) or the two unitary transformations in the step (2) can be selected for the coherence T matrix in a self-adaption mode by the method according to the real situation of the object, and the volume scattering excessive estimation problem of the model decomposition can be effectively restrained.
Owner:NAT SPACE SCI CENT CAS

Wireless channel characteristic stepwise quantification method based on unitary transformation preprocessing

The invention discloses a wireless channel characteristic stepwise quantification method based on unitary transformation preprocessing. The method comprises the following steps: making a party A and a party B in wireless communication perform unitary-transformation-based preprocessing on channel detection results; quantifying preprocessed signal vectors with different signal-to-noise ratios with different quantification levels; and finally, using generated quantification bit streams as inputs of subsequent wireless channel key generation steps such as an information reconciliation step. Through adoption of the method, the consistency of the channel detection results of the party A and the party B in the wireless communication can be improved effectively; the auto-correlation of the channel detection results is lowered; and the two parties of the communication can generate quantification bit streams with high rate, high consistency and low redundancy. The method is applied to the field of wireless channel key generation, can be specifically applied to the fields of secure communications, military communications and the like, and can be extended to a multi-node communication scene. Through adoption of the method, the security of a wireless communication system is enhanced.
Owner:SOUTHEAST UNIV

Quantum communication method and system for terminal delay selection

The invention discloses a quantum communication method and system for terminal delay selection, and the method comprises the steps: carrying out the measurement operation of particles of a sending terminal, and obtaining a first measurement result; performing unitary transformation corresponding to the first measurement result on the particles of the receiving edge node; sequentially performing Htransformation and measurement operation on the particles of the non-target receiving terminal to obtain a second measurement result; and carrying out unitary transformation corresponding to the second measurement result on the particles of the target receiving terminal, and recovering the to-be-transmitted information. Visibly, according to the scheme, under the condition that the receiving terminal is not completely determined, the particle state can start the transmission behavior, the receiving edge node can select the receiving terminal while the particle state is in channel transmission,and after the final receiving terminal is determined, the particles have transmitted most paths, so that the time delay is effectively reduced, and finally information receiving is completed. The quantum communication process of selecting the terminal is delayed under the condition that the terminal is uncertain, and the information transmission efficiency is improved.
Owner:SUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products