首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   22篇
  免费   15篇
物理学   37篇
  2021年   1篇
  2020年   2篇
  2019年   2篇
  2018年   3篇
  2016年   3篇
  2015年   1篇
  2014年   3篇
  2013年   3篇
  2012年   4篇
  2011年   2篇
  2010年   3篇
  2009年   1篇
  2008年   4篇
  2007年   3篇
  2005年   2篇
排序方式: 共有37条查询结果,搜索用时 125 毫秒
1.
International Journal of Theoretical Physics - A new quantum watermark algorithm is presented by combining maximum pixel difference partitioning with the least significant bit substitution...  相似文献   
2.
International Journal of Theoretical Physics - A semi-quantum key agreement protocol is proposed to allow one quantum participant and two classical ones to negotiate the final shared secret key...  相似文献   
3.
International Journal of Theoretical Physics - A semi-quantum bi-signature scheme based on W states is designed, in which two signers sign the same message. The unconditional security of the new...  相似文献   
4.
朱莉  邓娟  吴建华  周南润 《物理学报》2015,64(18):184302-184302
锁相是指系统的响应与周期性刺激的特定相位同步的物理现象. 听觉神经的锁相对揭示人的听觉认知基本的神经机理及改善听觉感知有重要意义. 然而, 现有研究主要集中于心理物理方法和幅度谱分析, 不能有效区分包络响应和时域细节结构响应, 不能直观反映神经锁相. 本文主要利用拔靴法和离散傅里叶变换, 提出了基于样本熵的时域细节结构频率跟随响应(temporal-fine-structure-related frequency following response, FFRT)的神经锁相值(phase locking value, PLV)计算方法, 用于分析神经物理实验数据. 两个脑电实验结果表明: FFRT的PLV样本熵显著大于包络相关频率跟随响应(envelope-related frequency following response, FFRE)的PLV, 且二者正交独立, 新方法能有效地分别反映听觉系统对包络和时间细节结构的锁相机理; 基频处的响应主要来源于FFRE的锁相; 基频处, 不可分辨谐波成分包络的锁相能力优于对可分辨谐波; 基频缺失时, 畸变产物是不同的听觉神经通路的FFRE的混合; 谐波处, FFRE 集中于低频, FFRT则集中于中、高频; 听觉神经元锁相能力与声源的频率可分辨性相关. FFRT的PLV方法克服了现有FFR分析的局限性, 可用于深入研究听觉神经机理.  相似文献   
5.
We explore how a two-mode squeezed vacuum state sechθ ea+b+ tanh θ |00> evolves when it undergoes a singlemode amplitude dissipative channel with rate of decay κ. We find that in this process not only the squeezing parameter decreases, tanh θ → e-κt tanh θ, but also the second-mode vacuum state evolves into a chaotic state exp{b+bln[1 - e-2κt tanh2 θ]}. The outcome state is no more a pure state, but an entangled mixed state.  相似文献   
6.
A rotational parameter Rθ has been introduced to complex wavelet transform (CWT). The rotational CWT (RCWT) corresponds to a matrix element 〈φ|U2(θ;μ;κ)[F〉 in the context of quantum mechanics, where U2(θ;μ;κ) is a two-mode rotational displacing-squeezing operator in the 〈η| representation. Based on this, the Parseval theorem and the inversion formula of RCWT have been proved. The concise proof not only manifestly shows the merit of Dirac's representation theory but also leads to a new orthogonal property of complex mother wavelets in parameter space.  相似文献   
7.
吴贵铜  周南润  龚黎华  刘三秋 《物理学报》2014,63(6):60302-060302
在集体噪声条件下提出三个带身份认证的量子对话协议,两个量子对话协议分别用于抵抗集体消相干噪声和集体旋转噪声,另一个用于同时抵抗这两种集体噪声.通信双方通过广义幺正变换将自己的秘密信息编码到量子态中;并根据自己的秘密信息和携带秘密信息的粒子的初末两量子态,便可推知对方的秘密信息实现量子对话.协议的效率、安全性和无信息泄露等性能分析表明了协议的有效性.  相似文献   
8.
Two quantum secure direct communication (QSDC) protocols with quantum identification (QI) based on passive optical network (PON) architecture are proposed. One QSDC protocol can be implemented between two different optical network units just with simple configurations of PON by optical line terminal when they are in the same virtual private network after optical line terminal performing QI to the optical network units in the given PON architecture. The other QSDC protocol is also implemented between any two legitimated users in the virtual private network but with considerable reduction of workload of the optical line terminal. The security analysis shows that the proposed QSDC schemes with quantum identification are unconditionally secure and allow the legitimate users to exchange their secret information efficiently and to realize a quantum virtual private network in the PON networks ultimately.  相似文献   
9.
A realizable quantum encryption algorithm for qubits   总被引:3,自引:0,他引:3       下载免费PDF全文
周南润  曾贵华 《中国物理》2005,14(11):2164-2169
A realizable quantum encryption algorithm for qubits is presented by employing bit-wise quantum computation. System extension and bit-swapping are introduced into the encryption process, which makes the ciphertext space expanded greatly. The security of the proposed algorithm is analysed in detail and the schematic physical implementation is also provided. It is shown that the algorithm, which can prevent quantum attack strategy as well as classical attack strategy, is effective to protect qubits. Finally, we extend our algorithm to encrypt classical binary bits and quantum entanglements.  相似文献   
10.
分析经典选择重传自动请求重传(automatic repeat-request,ARQ)协议之后,利用量子力学中纠缠态的非定域关联性,提出了数据链路层的选择重传ARQ量子同步通信协议.该协议把链路分为准备阶段和发送阶段.在线路准备阶段完成EPR (Einstein-Podolsky-Rosen)关联对的分发,建立量子信道;在发送阶段完成数据帧和量子确认帧的传送.从吞吐量和信道利用率等方面比较分析了几种常见的数据链路层通信协议的性能.研究表明,该协议可以有效地提高数据链路层的最大吞吐量和信道利用率,改善选择重传ARQ协议的性能,在受时间瓶颈限制的通信中有着重要的应用价值.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号