Advertisement

Photonic Network Communications

, Volume 37, Issue 2, pp 139–140 | Cite as

Special issue on intelligent signal processing methods and applications for photonic networks communications

  • Zheng XuEmail author
  • Lei Guo
  • Yunhuai Liu
Editorial
  • 204 Downloads

The global communication revolution that has been enabled through massive data transmission within photonic networks has had a tremendous impact on people’s lifestyle and modern industry. Over the past two decades, high-speed optical links have been successfully applied to various systems ranging from long-haul transmission lines to short-haul communications within buildings. The tremendous growth in the demand for high data rates in photonic networks encourages exploiting the available resources in this medium more efficiently. Much effort has been devoted to quantifying fundamental limits of fiber-optic channels. One of the key devices to establish a high-bit-rate photonic signal processing system is a photonic switch which functions with an ultrashort delay time. The idea of using photonic networks to replace present-day electronic switching fabrics was initially driven by the power hungry nature of the optical to electronic and electronic to optical conversion. Additionally, there is a speed limitation for the electronic interconnection which typically employs millions of closely spaced metal wires in the state-of-the-art computer systems. A photonic switch that controls optical signals directly by another light beam with potential recovery times in the pico- or femto-second regimes has the capability for terahertz switching speed. The availability of such a component, combined with the use of low-loss optical waveguides and fibers, would provide a promising step toward high-speed and low-cost photonic networks at short distances. Indeed, the more severe signal-dependent nonlinear effect in photonic channels, compared to wireline and wireless channels, makes the channel modeling and capacity analysis of these channels cumbersome. The recent progress in channel modeling and capacity analysis of photonic channels have opened a new horizon in the design of data transmission schemes operating with higher spectral efficiencies than current systems.

The submitted manuscripts were reviewed by experts from both academia and industry. After two rounds of reviewing, the highest quality manuscripts were accepted for this special issue. This special issue will be published by Photonic Network Communications as special issues. Totally, 12 papers are suggested to EiC for acceptance from 27 manuscript submissions. The selected papers are summarized as follows:

Fang [1] presents a master–slave wireless network monitoring system by integrating ZigBee and GSM technologies. The detected gas status from the remote detection unit can be transmitted to master monitoring station via self-organizing ZigBee network. Sun et al. [2] propose several pneumatic control schemes implemented with proportional and PWM-solenoid valves to achieve optimal control for pneumatic soft actuators adapted to different soft robots, such as soft gripper and soft humanoid hand. The block-sparse structure is shared by many types of signals, including audio, image, and radar-emitted signals. This structure can considerably improve compressive sensing (CS) performance and has attracted much attention in recent years. However, when fitting this model in practical applications, the nonzero blocks are always separated by one or more zero blocks to avoid interference between active emitters. (Generally, a block is occupied by an emitter.) Tian and Wang [3] coin a new phrase, ‘nonadjacent block sparse,’ or NBS, to describe this new structure. Wang and Zhao [4] study the HWSN reliability evaluation based on IoV perception layer and utilize the object-oriented colored Petri net as the modeling tool for HWSN. On the basis of this model, this paper further explores the definition of HWSN reliability evaluation quantification and proposes a new approach to HWSN reliability evaluation quantification. Li [5] use the lexicographic product method to construct a larger digraph from several specified small digraphs. The digraph constructed by this way can contain the factor digraphs as subgraphs and preserve many desirable properties of the factor digraphs. Wang et al. [6] present a SEMG segmentation algorithm based on signal envelope and integral electromyography. Compared with manual segmentation, the coincidence rate is more than 90%. The one-way Hash is used by Xu and Yuan [7] to realize the mutual authentication between RFID tags, readers, and application servers. Meanwhile, to solve the tracking attacks of tags, the ID update ability is proposed. The IDs of the RFID tags used in this protocol are variable and traceable. A new hybrid intrusion detection model which combines the distributed and centralized strategies is proposed by Shang et al. [8]. Song et al. [9] present a novel node deployment scheme, which is based on evidence theory approach and caters for 3D USWNs. This scheme implements sonar probability perception and an enhanced data fusion model to improve prior probability deployment algorithm of D–S evidence theory. Considering the intermittent characteristics of distributed energy, for reducing network loss, the effective option is to control error and response speed directly through the upper control, when distributed energy accesses on dc distribution network, which is no need to change grid topologies, run cumbersome power flow algorithms, nor add additional equipment. A reducing network loss method is proposed by Han and Li [10] based on this idea. Chen et al. [11] proposed the nonlinear masking method to apply to the traditional items and used the iterative learning control algorithm to decrypt. The algorithm reconstructed the information signal completely and analyzed the robustness and convergence of learning algorithm about the initial error and output error. The convergence conditions were given, and the simulations show that the algorithm can reconstruct the signal in communication secure. Based on the partition scheduling model, we introduced the loss packet period of the time-triggered (TT) data flow and the correction parameter of rate-constrained (RC) data flow and then optimized the model of service curve and arrival curve of a certain RC data flow. The delay performance of RC data flow is analyzed proposed by Wang et al. [12].

Notes

Acknowledgements

The guest editors would like to thank Prof. Byrav Ramamurthy who is the editor in chief of Photonic Network Communications. His help and trust is the most important thing for the success of this SI. The guest editors would like to thank the reviewers for their high-quality reviews, which provided insightful and constructive feedback to the authors of the papers.

References

  1. 1.
    Fang, J.: Development of master–slave monitoring systems for automobile exhaust using integration of ZigBee and GSM networks. Photon. Netw. Commun. (2019).  https://doi.org/10.1007/s11107-018-0817 Google Scholar
  2. 2.
    Huang, H., Lin, J., Wu, L., et al.: Optimal control scheme for pneumatic soft actuator under comparison of proportional and PWM-solenoid valves. Photon. Netw. Commun. (2019).  https://doi.org/10.1007/s11107-018-0815-3 Google Scholar
  3. 3.
    Tian, Y., Wang, X.: Compressively sensing nonadjacent block-sparse spectra via a block discrete chirp matrix. Photon. Netw. Commun. (2018).  https://doi.org/10.1007/s11107-018-0813-5 Google Scholar
  4. 4.
    Wang, D., Zhao, J.: A new approach to heterogeneous wireless sensor networks reliability evaluation based on perception layer in internet of vehicles. Photon. Netw. Commun. (2018).  https://doi.org/10.1007/s11107-018-0814-4 Google Scholar
  5. 5.
    Li, F.: On the information transmission delay of the lexicographic product of digraphs. Photon. Netw. Commun. (2018).  https://doi.org/10.1007/s11107-018-0806-4 Google Scholar
  6. 6.
    Wang, M., Wang, X., Peng, C., et al.: Research on EMG segmentation algorithm and walking analysis based on signal envelope and integral electrical signal. Photon. Netw. Commun. (2018).  https://doi.org/10.1007/s11107-018-0809-1 Google Scholar
  7. 7.
    Xu, Y., Yuan, J.: Design and analysis of an ID-updated mutual authentication protocol for mobile RFID system. Photon. Netw. Commun. (2018).  https://doi.org/10.1007/s11107-018-0812-6 Google Scholar
  8. 8.
    Shang, F., Zhou, D., Li, C., et al.: Research on the intrusion detection model based on improved cumulative summation and evidence theory for wireless sensor network. Photon. Netw. Commun. (2018).  https://doi.org/10.1007/s11107-018-0810-8 Google Scholar
  9. 9.
    Song, X., Gong, Y., Jin, D., et al.: Nodes deployment optimization algorithm based on improved evidence theory of underwater wireless sensor networks. Photon. Netw. Commun. (2018).  https://doi.org/10.1007/s11107-018-0807-3 Google Scholar
  10. 10.
    Han, B., Li, Y.: Optimization method for reducing network loss of dc distribution system with distributed resource. Photon. Netw. Commun. (2018).  https://doi.org/10.1007/s11107-018-0805-5 Google Scholar
  11. 11.
    Su, J., Zhang, Y., Chen, M., et al.: Cover and iterative learning control for and decryption in communication secure. Photon. Netw. Commun. (2019).  https://doi.org/10.1007/s11107-019-0832-4 Google Scholar
  12. 12.
    Wang, H., Hu, J., Niu, W., et al.: RC performance analysis based on model optimization with aid of network calculus. Photon. Netw. Commun. (2019).  https://doi.org/10.1007/s11107-018-0827-7 Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.The Third Research Institute of the Ministry of Public SecurityShanghaiChina
  2. 2.Chongqing University of Posts and TelecommunicationsChongqingChina
  3. 3.Peking UniversityBeijingChina

Personalised recommendations