首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
We propose a quantum walk model to investigate the propagation of ideas in a network and the formation of agreement in group decision making. In more detail, we consider two different graphs describing the connections of agents in the network: the line graph and the ring graph. Our main interest is to deduce the dynamics for such propagation, and to investigate the influence of compliance of the agents and graph structure on the decision time and the final decision. The methodology is based on the use of control-U gates in quantum computing. The original state of the network is used as controller and its mirrored state is used as target. The state of the quantum walk is the tensor product of the original state and the mirror state. In this way, the proposed quantum walk model is able to describe asymmetric influence between agents.  相似文献   

2.
3.
Spherical hesitant fuzzy sets have recently become more popular in various fields. It was proposed as a generalization of picture hesitant fuzzy sets and Pythagorean hesitant fuzzy sets in order to deal with uncertainty and fuzziness information. Technique of Aggregation is one of the beneficial tools to aggregate the information. It has many crucial application areas such as decision-making, data mining, medical diagnosis, and pattern recognition. Keeping in view the importance of logarithmic function and aggregation operators, we proposed a novel algorithm to tackle the multi-attribute decision-making (MADM) problems. First, novel logarithmic operational laws are developed based on the logarithmic, t-norm, and t-conorm functions. Using these operational laws, we developed a list of logarithmic spherical hesitant fuzzy weighted averaging/geometric aggregation operators to aggregate the spherical hesitant fuzzy information. Furthermore, we developed the spherical hesitant fuzzy entropy to determine the unknown attribute weight information. Finally, the design principles for the spherical hesitant fuzzy decision-making have been developed, and a practical case study of hotel recommendation based on the online consumer reviews has been taken to illustrate the validity and superiority of presented approach. Besides this, a validity test is conducted to reveal the advantages and effectiveness of developed approach. Results indicate that the proposed method is suitable and effective for the decision process to evaluate their best alternative.  相似文献   

4.
With the development of artificial intelligence, intelligent communication jamming decision making is an important research direction of cognitive electronic warfare. In this paper, we consider a complex intelligent jamming decision scenario in which both communication parties choose to adjust physical layer parameters to avoid jamming in a non-cooperative scenario and the jammer achieves accurate jamming by interacting with the environment. However, when the situation becomes complex and large in number, traditional reinforcement learning suffers from the problems of failure to converge and a high number of interactions, which are fatal and unrealistic in a real warfare environment. To solve this problem, we propose a deep reinforcement learning based and maximum-entropy-based soft actor-critic (SAC) algorithm. In the proposed algorithm, we add an improved Wolpertinger architecture to the original SAC algorithm in order to reduce the number of interactions and improve the accuracy of the algorithm. The results show that the proposed algorithm shows excellent performance in various scenarios of jamming and achieves accurate, fast, and continuous jamming for both sides of the communication.  相似文献   

5.
The problems of using functional electronics in radio communication and radio-signal processing systems are considered. Different methods of radio access are compared from the viewpoint of throughput and efficiency of frequency resource usage. The prospects for applying systems with code division of channels using matched filters on surface acoustic waves are shown. The results of research and development of various acousto-optical devices, including radio-signal spectrum analyzers, direction finders – frequency meters, and demodulators of phase-shift keyed signals are presented.  相似文献   

6.
An information theoretical model for quantum secret sharing was introduced by H. Imai et al. (Quantum Inf. Comput. 5(1), 69–80 2005), which was analyzed by quantum information theory. In this paper, we analyze this information theoretical model using the properties of the quantum access structure. By the analysis we propose a generalized model definition for the quantum secret sharing schemes. In our model, there are more quantum access structures which can be realized by our generalized quantum secret sharing schemes than those of the previous one. In addition, we also analyse two kinds of important quantum access structures to illustrate the existence and rationality for the generalized quantum secret sharing schemes and consider the security of the scheme by simple examples.  相似文献   

7.
We provide a method for constructing a set of four-photon states suitable for quantum communication applications. Among these states is a set of concatenated quantum code states that span a decoherence-free subspace that is robust under collective-local as well as global dephasing noise. This method requires only the use of spontaneous parametric down-conversion, quantum state post-selection, and linear optics. In particular, we show how this method can be used to produce all sixteen elements of the second-order Bell gem , which includes these codes states and is an orthonormal basis for the Hilbert space of four qubits composed entirely of states that are fully entangled under the four-tangle measure.  相似文献   

8.
Digital communication receivers extract information about the transmitted data from the received signal in subsequent processing steps, such as synchronization, demodulation and channel decoding. Technically, the receiver-side signal processing for conducting these tasks is complex and hence causes bottleneck situations in terms of power, delay and chip area. Typically, many bits per sample are required to represent and process the received signal in the digital receiver hardware accurately. In addition, demanding arithmetical operations are required in the signal processing algorithms. A popular recent trend is designing entire receiver chains or some of their crucial building blocks from an information theoretical perspective. Signal processing blocks with very simple mathematical operations can be designed to directly maximize the relevant information that flows through them. At the same time, a strong quantization reduces the number of bits processed in the receiver to further lower the complexity. The described system design approach follows the principle of the information bottleneck method. Different authors proposed various ideas to design and implement mutual information-maximizing signal processing units. The first important aim of this article is to explain the fundamental similarities between the information bottleneck method and the functionalities of communication receivers. Based on that, we present and investigate new results on an entire receiver chain that is designed following the information bottleneck design principle. Afterwards, we give an overview of different techniques following the information bottleneck design paradigm from the literature, mainly dealing with channel decoding applications. We analyze the similarities of the different approaches for information bottleneck signal processing. This comparison leads to a general view on information bottleneck signal processing which goes back to the learning of parameters of trainable functions that maximize the relevant mutual information under compression.  相似文献   

9.
10.
Much attention has been paid to construct an applicable knowledge measure or uncertainty measure for Atanassov’s intuitionistic fuzzy set (AIFS). However, many of these measures were developed from intuitionistic fuzzy entropy, which cannot really reflect the knowledge amount associated with an AIFS well. Some knowledge measures were constructed based on the distinction between an AIFS and its complementary set, which may lead to information loss in decision making. In this paper, knowledge amount of an AIFS is quantified by calculating the distance from an AIFS to the AIFS with maximum uncertainty. Axiomatic properties for the definition of knowledge measure are extended to a more general level. Then the new knowledge measure is developed based on an intuitionistic fuzzy distance measure. The properties of the proposed distance-based knowledge measure are investigated based on mathematical analysis and numerical examples. The proposed knowledge measure is finally applied to solve the multi-attribute group decision-making (MAGDM) problem with intuitionistic fuzzy information. The new MAGDM method is used to evaluate the threat level of malicious code. Experimental results in malicious code threat evaluation demonstrate the effectiveness and validity of proposed method.  相似文献   

11.
In the past decades several theoretical Maxwell's demon models have been proposed to exhibit effects such as refrigerating,doing work at the cost of information,and some experiments have been carried out to realize these effects.We propose a model with a two-level demon,information represented by a sequence of bits,and two heat reservoirs.The reservoir that the demon is interacting with depends on the bit.When the temperature difference between the two heat reservoirs is large enough,the information can be erased.On the other hand,when the information is pure enough,heat transfer from one reservoir to the other can happen,resulting in the effect of refrigeration.Genuine examples of such a system are discussed.  相似文献   

12.
将光谱相似性制图(SSM)用于成像光谱图像的处理,通过对真假叶片以及混合在一起的藻类的成像光谱图像的SSM处理,证明了SSM方法在甄别光学伪装和藻类鉴别及计数两方面具有很高的有效性,从而证明了SSM方法用于处理成像光谱图像上的优越性。同时,该方法还可用于其他方面成像光谱数据的处理,对扩展成像光谱的应用范围具有重要的意义。  相似文献   

13.
A generalized form of Landauer’s bound on the dissipative cost of classical information processing in quantum-mechanical systems is proved using a new approach. This approach sidesteps some prominent objections to standard proofs of Landauer’s bound—broadly interpreted here as a nonzero lower bound on the amount of energy that is irreversibly transferred from a physical system to its environment for each bit of information that is lost from the system—while establishing a far more general result. Specializations of our generalized Landauer bound for ideal and non-ideal information processing operations, including but not limited to the simplified forms for erasure and logical operations most familiar from the literature, are presented and discussed. These bounds, taken together, enable reconsideration of the links between logical reversibility, physical reversibility, and conditioning of operations in contexts that include but are far more general than the thermodynamic model systems that are most widely invoked in discussions of Landauer’s Principle. Because of the strategy used to prove the generalized bounds and these specializations, this work may help to illuminate and resolve some longstanding controversies related to dissipation in computation.  相似文献   

14.
We present a new experiment demonstrating destructive interference in customers’ estimates of conditional probabilities of product failure. We take the perspective of a manufacturer of consumer products and consider two situations of cause and effect. Whereas, individually, the effect of the causes is similar, it is observed that when combined, the two causes produce the opposite effect. Such negative interference of two or more product features may be exploited for better modeling of the cognitive processes taking place in customers’ minds. Doing so can enhance the likelihood that a manufacturer will be able to design a better product, or a feature within it. Quantum probability has been used to explain some commonly observed “non-classical” effects, such as the disjunction effect, question order effect, violation of the sure-thing principle, and the Machina and Ellsberg paradoxes. In this work, we present results from a survey on the impact of multiple observed symptoms on the drivability of a vehicle. The symptoms are assumed to be conditionally independent. We demonstrate that the response statistics cannot be directly explained using classical probability, but quantum formulation easily models it, as it allows for both positive and negative “interference” between events. Since quantum formalism also accounts for classical probability’s predictions, it serves as a richer paradigm for modeling decision making behavior in engineering design and behavioral economics.  相似文献   

15.
16.
分布式视频编码中边信息的质量决定了系统的率失真性能,边信息质量越高,则率失真性能越好。针对视频序列中对象运动的不均匀特性,结合MCTI技术,本文提出了一种新的边信息生成算法。其基本思想是在编码端利用多块模式算法对帧中宏块进行划分,将宏块分为运动缓慢块和运动剧烈块;在解码端,对运动缓慢块直接由MCTI算法生成边信息,而运动剧烈块的边信息要经过后处理进行优化得到。仿真实验表明与直接由MCTI生成边信息方法相比,本文算法可以使生成边信息的峰值信噪比(PSNR)比原有的算法提高0.8dB-1.2dB左右,有效提高了边信息的质量。  相似文献   

17.
The uncertainty of information is an important issue that must be faced when dealing with decision-making problems. Randomness and fuzziness are the two most common types of uncertainty. In this paper, we propose a multicriteria group decision-making method based on intuitionistic normal cloud and cloud distance entropy. First, the backward cloud generation algorithm for intuitionistic normal clouds is designed to transform the intuitionistic fuzzy decision information given by all experts into an intuitionistic normal cloud matrix to avoid the loss and distortion of information. Second, the distance measurement of the cloud model is introduced into the information entropy theory, and the concept of cloud distance entropy is proposed. Then, the distance measurement for intuitionistic normal clouds based on numerical features is defined and its properties are discussed, based on which the criterion weight determination method under intuitionistic normal cloud information is proposed. In addition, the VIKOR method, which integrates group utility and individual regret, is extended to the intuitionistic normal cloud environment, and thus the ranking results of the alternatives are obtained. Finally, the effectiveness and practicality of the proposed method are demonstrated by two numerical examples.  相似文献   

18.
对水位报警器进行了简化和改进.实验中我们把杠杆模型、电路模型和物联系统相结合,采用单WiFi模块来接收电路发出的信号并向移动设备发出报警信息从而达到现场和移动设备都能发出水位警报的目的.本次实验产品是可受移动设备控制的简易水位报警装置.  相似文献   

19.
体视全息图的实时拍摄方法   总被引:1,自引:1,他引:0  
唐继跃  王辉 《光学学报》1994,14(12):258-1262
在现有体视全息图制作方法的基础上,提出一种新的方法,利用液晶光阀作为像的转换元件,使得体视全息图的制作由原来的三次曝光简化为一次曝光,从而实现了实时拍摄的目的,文中给出了用这种方法设计的实时摄像系统和实验结果。  相似文献   

20.
Entanglement swapping for four-qubit cluster-class states is studied. It is shown that a four-qubit cluster state (maximally entangled) can be obtained with a certain probability from two four-qubit cluster-class states by entanglement swapping. The probability is related to the smallest superposition coefficient of the cluster-class states (when all the moduli of amplitudes are equivalent, they are the usual cluster states and the probability hits to one). Two examples for the applications of the entanglement swapping are also presented. One is quantum teleportation of an arbitrary two-qubit state via a quantum repeater, in which the success probability can be improved by the entanglement swapping when the quantum channels are general cluster-class states (partially entangled). The other is quantum key distribution, in which a secret random sequence of bits (a “key”) can be efficiently established between two distant parties by the entanglement swapping of two groups of cluster states.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号