With the development of mathematical morphology theory, the application of mathematical morphology in image processing has been very extensive, in recent years, with in-depth study of mathematical morphology and its applications in signal processing development is receiving more and more attention. As a kind of nonlinear signal processing method, its signal feature extraction is performed in time domain, compared with some other nonlinear and non-stationary signal processing method, which has no phase offset and amplitude attenuation etc. many advantages, so this method is applied to the signal processing in various industries. This paper mainly expounds the basic theory of mathematical morphology, and puts forward the method of mathematical morphology denoising pretreatment. Finally, the paper summarizes the application of mathematical morphology in speech signal processing and the combination of neural network.
In order to improve the communication efficiency and security of Quantum Secure Direct Communication, a new Quantum Secure Direct Communication scheme based on d-dimension Bell entangled state is proposed. In the scheme, the receiver and the sender transport the d-dimensional Bell particles as secure test particles to ensure the security of communication. The receiver can calculate the security of the channel according to the measurement of d-dimensional Bell state particles, which is based on the entanglement properties of the d-dimensional Bell state. Secret information is transmitted through the other d-dimensional Bell state particles by dense coding technique. Then, the receiver can determine the security of the channel by comparing the measurements of the particles and makes a joint measurement of the transmitted particles to obtain secret information. Finally, the entropy theory is used to analyze the security of the protocol. Under the four dimensional Bell state, the transmission efficiency of the protocol is 90.90% and the efficiency of the quantum bit is 45.45%. The results show that the proposed scheme is safe and reliable and has high transmission efficiency.
KEYWORDS: Internet, Information technology, Warfare, Mobile communications, Signal processing, Device simulation, Data transmission, Head, Data modeling, Performance modeling
In today's world, science and technology make a spurt of progress, so society has entered the era of information technology, network. Only the comprehensive use of electronic warfare and network warfare means can we maximize their access to information and maintain the information superiority. Combined with the specific combat mission and operational requirements, the research design and construction in accordance with the actual military which are Suitable for the future of information technology needs of the tactical Adhoc network, tactical internet, will greatly improve the operational efficiency of the command of the army. Through the study of the network of the U.S. military SINCGARS network, it can explore the routing protocol and mobile model, to provide a reference for the research of our army network.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.