Network Seepage Flow Research Based on Complex Network

Article Preview

Abstract:

Quantum communication is the information network communication cross technology developed in recent years. And it is a new communication technology by using network effects of quantum to carry out information transmission. Quantum communication is closely relative with quantum cryptography, quantum teleportation and quantum transport protocol. Quantum communication belongs to the complex network communication. Quantum bit is the basic unit of the network transmission. The wide range of application of quantum complex network is mainly the preparation of remote distance network seepage flow. In the process of quantum complex network information transmission, it is easily susceptible to environmental disturbances, so that it decreases the signal. This paper puts forward a scheme of solving quantum complex network transmission - network seepage flow. Traditional network seepage flow protocol scheme is the CEP network seepage flow agreement, but this solution has a certain limitation. The paper carries out the "target-swap" operation to CEP network seepage flow protocol, and obtains the QEP seepage flow protocol, and the superiority of this kind network seepage flow is proved through experimental network.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

392-396

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Changxi Niu, Lemin Li, Du Xu. A design of immune method of comprehensively utilizing network topology and communication parameters applying in e-mail network [J]. Research on application of computer, 2012, 29 (1): 270-271.

Google Scholar

[2] Niu Changxi, Li Lemin, Xu Du. Comparison of EGP network immunization method and HDF network immunization method [J]. Research on application of computer, 2011, 28 (2): 696-697.

DOI: 10.1109/iccomta.2009.5349084

Google Scholar

[3] Aili Fang, Qisheng Gao, Siying Zhang. Analysis of aggregation and correlation of industrial networks [J]. System engineering theory and practice, 2011, 29 (6): 178-183.

Google Scholar

[4] Wubin Guo, Xiangpei Hu, Shiqi Tong, Weiguo Liu. Network decomposition method based on the connectivity index [J]. Journal of Dalian Maritime University, 2011, 34 (2): 105-109.

Google Scholar

[5] Gang Liu, Min Guo, Jun Chen. Research on the network efficiency of industrial structure [J]. Contemporary economic research, 2011(12): 49-53.

Google Scholar

[6] Guizhen Liu. Graph and network - Graph theory method of optimization decision [M]. Shanghai: Shanghai Science and Technology Press, 2011: 221-230.

Google Scholar

[7] Jun Liu. The whole network analysis notes - UCINET software practical guide [M]. Shanghai: Shanghai people's publishing house, 2010: 116-140.

Google Scholar

[8] Jun Wu, Yuejin Tan, Hongzhong Deng, Yan Chi. Considering the complex load network node importance evaluation of cascading failure [J]. Mini-micro computer system, 2011, 28 (4): 627-630.

Google Scholar

[9] Hongzhong Deng, Jun Wu, Yong Li. A cascade failure model and analysis in the two-layer small world network [J]. Computer simulation, 2011, 25 (10): 150-152.

Google Scholar

[10] Yong Li, Hongzhong Deng, Jun Wu, Xin Lu, Bin Liu, Yuejin Tan. Simulation analysis of complex security network invulnerability based on cascading failure [J]. Research on application of computer, 2011, 25 (11): 3451-3454.

Google Scholar

[11] Jianhua Huang, Yanzhong Dang. Research on the evaluation index and caculation method of complex network two-dimensional invulnerability [J]. Computer Engineering, 2011, 37(16): 89-90.

Google Scholar

[12] Daren He, Zonghua Liu, Binghong Wang. Complex systems and complex networks [M]. Beijing: Higher Education Press, 2011: 126-138.

Google Scholar

[13] Yunqin Wang. Research on the reliability of city rail transit network connectivity based on complex network theory [D]. Beijing: Beijing Jiaotong University, 2011: 1-11.

Google Scholar