首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Cybercriminals use malicious URLs as distribution channels to propagate malware over the web. Attackers exploit vulnerabilities in browsers to install malware to have access to the victim’s computer remotely. The purpose of most malware is to gain access to a network, ex-filtrate sensitive information, and secretly monitor targeted computer systems. In this paper, a data mining approach known as classification based on association (CBA) to detect malicious URLs using URL and webpage content features is presented. The CBA algorithm uses a training dataset of URLs as historical data to discover association rules to build an accurate classifier. The experimental results show that CBA gives comparable performance against benchmark classification algorithms, achieving 95.8% accuracy with low false positive and negative rates.  相似文献   

2.
We present a new post-processing method for Quantum Key Distribution (QKD) that raises cubically the secret key rate in the number of double matching detection events. In Shannon’s communication model, information is prepared at Alice’s side, and it is then intended to pass it over a noisy channel. In our approach, secret bits do not rely in Alice’s transmitted quantum bits but in Bob’s basis measurement choices. Therefore, measured bits are publicly revealed, while bases selections remain secret. Our method implements sifting, reconciliation, and amplification in a unique process, and it just requires a round iteration; no redundancy bits are sent, and there is no limit in the correctable error percentage. Moreover, this method can be implemented as a post-processing software into QKD technologies already in use.  相似文献   

3.
We study Arrow’s Impossibility Theorem in the quantum setting. Our work is based on the work of Bao and Halpern, in which it is proved that the quantum analogue of Arrow’s Impossibility Theorem is not valid. However, we feel unsatisfied about the proof presented in Bao and Halpern’s work. Moreover, the definition of Quantum Independence of Irrelevant Alternatives (QIIA) in Bao and Halpern’s work seems not appropriate to us. We give a better definition of QIIA, which properly captures the idea of the independence of irrelevant alternatives, and a detailed proof of the violation of Arrow’s Impossibility Theorem in the quantum setting with the modified definition.  相似文献   

4.
A study of the energy spectrum of exoemission electrons (EEE) is of considerable importance in order to elucidate the physical nature of the emission centers and to understand the mechanisms involved in this phenomenon. It is well known that the energy spectrum changes with time [1] and depends in a complex way on temperature [2–4]. In spite of the fact that there has recently been a marked tendency to extend the study of the EEE-energy spectrum [2–6] we are unaware of any paper dealing with the simultaneous study of the changes in the electron energy and intensity of the EEE.This article presents the results of a simultaneous study of the intensity and energy spectrum of the EEE over a wide range of temperatures (from –196 to +450°C).Translated from Izvestiya Vysshikh Uchebnykh Zavedenii, Fizika, No. 12, pp. 109–113, December, 1972.  相似文献   

5.
Wigner’s friend scenarios involve an Observer, or Observers, measuring a Friend, or Friends, who themselves make quantum measurements. In recent discussions, it has been suggested that quantum mechanics may not always be able to provide a consistent account of a situation involving two Observers and two Friends. We investigate this problem by invoking the basic rules of quantum mechanics as outlined by Feynman in the well-known “Feynman Lectures on Physics”. We show here that these “Feynman rules” constrain the a priori assumptions which can be made in generalised Wigner’s friend scenarios, because the existence of the probabilities of interest ultimately depends on the availability of physical evidence (material records) of the system’s past. With these constraints obeyed, a non-ambiguous and consistent account of all measurement outcomes is obtained for all agents, taking part in various Wigner’s Friend scenarios.  相似文献   

6.
TeV-scale gravity theories allow the possibility of producing small black holes at energies that soon will be explored at the CERN LHC or at the Auger observatory. One of the expected signatures is the detection of Hawking radiation that might eventually terminate if the black hole, once perturbed, leaves the brane. Here, we study how the "black hole plus brane" system evolves once the black hole is given an initial velocity that mimics, for instance, the recoil due to the emission of a graviton. The results of our dynamical analysis show that the brane bends around the black hole, suggesting that the black hole eventually escapes into the extra dimensions once two portions of the brane come in contact and reconnect. This gives a dynamical mechanism for the creation of baby branes.  相似文献   

7.
We provide a new formulation of the Local Friendliness no-go theorem of Bong et al. [Nat. Phys. 16, 1199 (2020)] from fundamental causal principles, providing another perspective on how it puts strictly stronger bounds on quantum reality than Bell’s theorem. In particular, quantum causal models have been proposed as a way to maintain a peaceful coexistence between quantum mechanics and relativistic causality while respecting Leibniz’s methodological principle. This works for Bell’s theorem but does not work for the Local Friendliness no-go theorem, which considers an extended Wigner’s Friend scenario. More radical conceptual renewal is required; we suggest that cleaving to Leibniz’s principle requires extending relativity to events themselves.  相似文献   

8.
We introduce a quantum key distribution protocol using mean multi-kings’ problem. Using this protocol, a sender can share a bit sequence as a secret key with receivers. We consider a relation between information gain by an eavesdropper and disturbance contained in legitimate users’ information. In BB84 protocol, such relation is known as the so-called information disturbance theorem. We focus on a setting that the sender and two receivers try to share bit sequences and the eavesdropper tries to extract information by interacting legitimate users’ systems and an ancilla system. We derive trade-off inequalities between distinguishability of quantum states corresponding to the bit sequence for the eavesdropper and error probability of the bit sequence shared with the legitimate users. Our inequalities show that eavesdropper’s extracting information regarding the secret keys inevitably induces disturbing the states and increasing the error probability.  相似文献   

9.
We present a novel theoretical approach to the problem of light energy conversion in thermostated semiconductor junctions. Using the classical model of a two-level atom, we deduced formulas for the spectral response and the quantum efficiency in terms of the input photons’ non-zero chemical potential. We also calculated the spectral entropy production and the global efficiency parameter in the thermodynamic limit. The heat transferred to the thermostat results in a dissipative loss that appreciably controls the spectral quantities’ behavior and, therefore, the cell’s performance. The application of the obtained formulas to data extracted from photovoltaic cells enabled us to accurately interpolate experimental data for the spectral response and the quantum efficiency of cells based on Si-, GaAs, and CdTe, among others.  相似文献   

10.
We analytically derived and confirmed by empirical data the following three relations from the quasi-time-reversal symmetry, Gibrat’s law, and the non-Gibrat’s property observed in the urban population data of France. The first is the relation between the time variation of the power law and the quasi-time-reversal symmetry in the large-scale range of a system that changes quasi-statically. The second is the relation between the time variation of the log-normal distribution and the quasi-time-reversal symmetry in the mid-scale range. The third is the relation among the parameters of log-normal distribution, non-Gibrat’s property, and quasi-time-reversal symmetry.  相似文献   

11.
12.
During the physical foundation of his radiation formula in his December 1900 talk and subsequent 1901 article, Planck refers to Boltzmann’s 1877 combinatorial-probabilistic treatment and obtains his quantum distribution function, while Boltzmann did not. For this, Boltzmann’s memoirs are usually ascribed to classical statistical mechanics. Agreeing with Bach, it is shown that Boltzmann’s 1868 and 1877 calculations can lead to a Planckian distribution function, where those of 1868 are even closer to Planck than that of 1877. Boltzmann’s and Planck’s calculations are compared based on Bach’s three-level scheme ‘configuration–occupation–occupancy’. Special attention is paid to the concepts of interchangeability and the indistinguishability of particles and states. In contrast to Bach, the level of exposition is most elementary. I hope to make Boltzmann’s work better known in English and to remove misunderstandings in the literature.  相似文献   

13.
We numerically investigate the transport of a Brownian colloidal particle in a square array of planar counter-rotating convection rolls at high Péclet numbers. We show that an external force produces huge excess peaks of the particle’s diffusion constant with a height that depends on the force orientation and intensity. In sharp contrast, the particle’s mobility is isotropic and force independent. We relate such a nonlinear response of the system to the advection properties of the laminar flow in the suspension fluid.  相似文献   

14.
In this work we present the statistical and criticality analysis of the very low frequency (VLF) sub-ionospheric propagation data recorded by a VLF/LF radio receiver which has recently been established at the University of West Attica in Athens (Greece). We investigate a very recent, strong (M6.9), and shallow earthquake (EQ) that occurred on 30 October 2020, very close to the northern coast of the island of Samos (Greece). We focus on the reception data from two VLF transmitters, located in Turkey and Israel, on the basis that the EQ’s epicenter was located within or very close to the 5th Fresnel zone, respectively, of the corresponding sub-ionospheric propagation path. Firstly, we employed in our study the conventional analyses known as the nighttime fluctuation method (NFM) and the terminator time method (TTM), aiming to reveal any statistical anomalies prior to the EQ’s occurrence. These analyses revealed statistical anomalies in the studied sub-ionospheric propagation paths within ~2 weeks and a few days before the EQ’s occurrence. Secondly, we performed criticality analysis using two well-established complex systems’ time series analysis methods—the natural time (NT) analysis method, and the method of critical fluctuations (MCF). The NT analysis method was applied to the VLF propagation quantities of the NFM, revealing criticality indications over a period of ~2 weeks prior to the Samos EQ, whereas MCF was applied to the raw receiver amplitude data, uncovering the time excerpts of the analyzed time series that present criticality which were closest before the Samos EQ. Interestingly, power-law indications were also found shortly after the EQ’s occurrence. However, it is shown that these do not correspond to criticality related to EQ preparation processes. Finally, it is noted that no other complex space-sourced or geophysical phenomenon that could disturb the lower ionosphere did occur during the studied time period or close after, corroborating the view that our results prior to the Samos EQ are likely related to this mainshock.  相似文献   

15.
We investigate possible signatures of long-lived (or stable) charged black holes at the Large Hadron Collider. In particular, we find that black hole remnants are characterised by quite low speed. Due to this fact, the charged remnants could, in some cases, be very clearly distinguished from the background events, exploiting dE/dX measurements. We also compare the estimate energy released by such remnants with that of typical Standard Model particles, using the Bethe–Bloch formula.  相似文献   

16.
Despite the remarkable success of Carnot’s heat engine cycle in founding the discipline of thermodynamics two centuries ago, false viewpoints of his use of the caloric theory in the cycle linger, limiting his legacy. An action revision of the Carnot cycle can correct this, showing that the heat flow powering external mechanical work is compensated internally with configurational changes in the thermodynamic or Gibbs potential of the working fluid, differing in each stage of the cycle quantified by Carnot as caloric. Action (@) is a property of state having the same physical dimensions as angular momentum (mrv = mr2ω). However, this property is scalar rather than vectorial, including a dimensionless phase angle (@ = mr2ωδφ). We have recently confirmed with atmospheric gases that their entropy is a logarithmic function of the relative vibrational, rotational, and translational action ratios with Planck’s quantum of action ħ. The Carnot principle shows that the maximum rate of work (puissance motrice) possible from the reversible cycle is controlled by the difference in temperature of the hot source and the cold sink: the colder the better. This temperature difference between the source and the sink also controls the isothermal variations of the Gibbs potential of the working fluid, which Carnot identified as reversible temperature-dependent but unequal caloric exchanges. Importantly, the engine’s inertia ensures that heat from work performed adiabatically in the expansion phase is all restored to the working fluid during the adiabatic recompression, less the net work performed. This allows both the energy and the thermodynamic potential to return to the same values at the beginning of each cycle, which is a point strongly emphasized by Carnot. Our action revision equates Carnot’s calorique, or the non-sensible heat later described by Clausius as ‘work-heat’, exclusively to negative Gibbs energy (−G) or quantum field energy. This action field complements the sensible energy or vis-viva heat as molecular kinetic motion, and its recognition should have significance for designing more efficient heat engines or better understanding of the heat engine powering the Earth’s climates.  相似文献   

17.
This study investigates the conformity to Benford’s Law of the information disclosed in financial statements. Using the first digit test of Benford’s Law, the study analyses the reliability of financial information provided by listed companies on an emerging capital market before and after the implementation of International Financial Reporting Standards (IFRS). The results of the study confirm the increase of reliability on the information disclosed in the financial statements after IFRS implementation. The study contributes to the existing literature by bringing new insights into the types of financial information that do not comply with Benford’s Law such as the amounts determined by estimates or by applying professional judgment.  相似文献   

18.
We consider the negotiation problem, in which an agent negotiates on behalf of a principal. Our considerations are focused on the Inspire negotiation support system in which the principal’s preferences are visualised by circles. In this way, the principal describes the importance of each negotiation issue and the relative utility of each considered option. The paper proposes how this preference information may be implemented by the agent for determining a scoring function used to support decisions throughout the negotiation process. The starting point of our considerations is a discussion regarding the visualisation of the principal’s preferences. We assume here that the importance of each issue and the utility of each option increases with the size of the circle representing them. The imprecise meaning of the notion of “circle size” implies that in a considered case, the utility of an option should be evaluated by a fuzzy number. The proposed utility fuzzification is justified by a simple analysis of results obtained from the empirical prenegotiation experiment. A novel method is proposed to determine trapezoidal fuzzy numbers, which evaluates an option’s utility using a series of answers given by the participants of the experiment. The utilities obtained this way are applied to determine the fuzzy scoring function for an agent. By determining such a common generalised fuzzy scoring system, our approach helps agents handle the differences in human cognitive processes associated with understanding the principal’s preferences. This work is the first approach to fuzzification of the preferences in the Inspire negotiation support system.  相似文献   

19.
In this study we extend a model, proposed by Dendrinos, which describes dynamics of change of influence in a social system containing a public sector and a private sector. The novelty is that we reconfigure the system and consider a system consisting of a public sector, a private sector, and a non-governmental organizations (NGO) sector. The additional sector changes the model’s system of equations with an additional equation, and additional interactions must be taken into account. We show that for selected values of the parameters of the model’s system of equations, chaos of Shilnikov kind can exist. We illustrate the arising of the corresponding chaotic attractor and discuss the obtained results from the point of view of interaction between the three sectors.  相似文献   

20.
Politically-themed stocks mainly refer to stocks that benefit from the policies of politicians. This study gave the empirical analysis of the politically-themed stocks in the Republic of Korea and constructed politically-themed stock networks based on the Republic of Korea’s politically-themed stocks, derived mainly from politicians. To select politically-themed stocks, we calculated the daily politician sentiment index (PSI), which means politicians’ daily reputation using politicians’ search volume data and sentiment analysis results from politician-related text data. Additionally, we selected politically-themed stock candidates from politician-related search volume data. To measure causal relationships, we adopted entropy-based measures. We determined politically-themed stocks based on causal relationships from the rates of change of the PSI to their abnormal returns. To illustrate causal relationships between politically-themed stocks, we constructed politically-themed stock networks based on causal relationships using entropy-based approaches. Moreover, we experimented using politically-themed stocks in real-world situations from the schematized networks, focusing on politically-themed stock networks’ dynamic changes. We verified that the investment strategy using the PSI and politically-themed stocks that we selected could benchmark the main stock market indices such as the KOSPI and KOSDAQ around political events.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号