首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
王培杰  吴国祯 《物理学报》2005,54(7):3034-3043
一个不可积混沌体系,由于扰动而遭到破坏时,存活的周期轨迹体现了体系的本质特征,是 体系的运动骨架.在一定程度上, 可以由周期轨迹来量子化不可积体系,这充分说明了 周期轨迹的重要性.而寻找周期轨迹,也就成为研究混沌体系动力学特性以及对混沌体系进 行量子化的关键问题.结合具体实例,给出了3种常用的寻找周期轨迹方法,并详细探讨了各 种方法的优缺点和适用范围. 关键词: 周期轨迹 数值方法 混沌  相似文献   

2.
基于集员估计的混沌通信窄带干扰抑制技术   总被引:1,自引:0,他引:1       下载免费PDF全文
范永全  张家树 《物理学报》2008,57(5):2714-2721
基于混沌载波的有界性和最优定界椭球(OBE)准则,推导出了已知干扰信号模型参数的状态估计和未知干扰信号模型参数的自适应状态估计的干扰对消算法.与基于最小相空间体积(MPSV)的Kalman滤波和传统的递归最小二乘(RLS)算法相比,本算法具有选择更新特性,能在仅有少量数据参与更新的情况下达到与前者接近的性能,降低了计算量.该方法的性能通过在混沌参数调制(CPM)和差分混沌相移键控(DCSK)两种通信方式下对自回归(AR)型和单音两种窄带干扰的有效抑制得到了验证. 关键词: 最优定界椭球 混沌通信 干扰抑制 集员估计  相似文献   

3.
利用SU(2)相干态的表示,我们构造了二维矩形弹子球中与经典周期轨道对应的波函数.经典周期轨道和量子波函数之间的关系可以通过物理图像清晰的表示出来.另外,利用周期轨道理论,我们计算了二维矩形弹子球体系的量子谱的傅立叶变换ρ(L).变换谱|ρN(L)|2对L图像中的峰可以和粒子在二维矩形腔中运动的经典轨迹的长度相比较.量子谱中的每一条峰正好对应一条经典周期轨道的长度,表明量子力学和经典力学的对应关系.  相似文献   

4.
Quantum secure direct communication provides a direct means of conveying secret information via quantum states among legitimate users. The past two decades have witnessed its great strides both theoretically and experimentally. However, the security analysis of it still stays in its infant. Some practical problems in this field to be solved urgently, such as detector efficiency mismatch, side-channel effect and source imperfection, are propelling the birth of a more impeccable solution. In this paper, we establish a new framework of the security analysis driven by numerics where all the practical problems may be taken into account naturally. We apply this framework to several variations of the DL04 protocol considering real-world experimental conditions. Also, we propose two optimizing methods to process the numerical part of the framework so as to meet different requirements in practice. With these properties considered, we predict the robust framework would open up a broad avenue of the development in the field.  相似文献   

5.
秦素娟  温巧燕 《中国物理 B》2010,19(2):20310-020310
The security of the quantum secure deterministic communication scheme [{\it Chin. Phys.} {\bf16} (2007) 2549] is reexamined. A security loophole is pointed out. Taking advantage of this loophole, an eavesdropper can steal all the secret messages without being detected by an intercept-and-resend attack strategy. Furthermore, a possible improvement on this protocol is presented. It makes the modified protocol secure against this kind of attack.  相似文献   

6.
介绍了北京邮电大学物理实验中心在教学内容改革中开发的混沌专题系列实验.通过简单的、易于实现的力学和电路系统介绍混沌,将复杂的学术问题转化成了可以为不同层次学生所接受的研究性实验课题,激发了学生的实验兴趣,将科研成果直接转化为了教学实践.  相似文献   

7.
The periodic behavior ofN-mode truncations of the Navier-Stokes equations on a two-dimensional torus is studied forN=44, 60, 80, and 98. Significant common features are found, particularly for not too high Reynolds numbers. In all models periodicity ends, giving rise, though at quite different parameter values, to quasiperiodicity.  相似文献   

8.
In recent years a number of new techniques have become available in nonequilibrium statistical mechanics, all derived from dynamical system theory, especially from the thermodynamic formalism of Ruelle. We focus here on periodic orbit theory, and we compare it with a novel approach proposed by Evans, Cohen, and Morriss, and developed further by Gallavotti and Cohen. We argue that the two approaches based on such theories are equivalent for systems of many particles if the underlying dynamics is similar to that of Anosov systems, and that such equivalence should remain in more general situations. We extend our previous explanation of irreversibility in the thermostatted Lorentz gas toN-particle diffusion and shearing systems.  相似文献   

9.
李代军  周博  胡正峰  李师群 《中国物理》2003,12(10):1087-1095
We have analysed the transport effciency of an atomic waveguide constructed from a periodic axially magnetized hollow tube.We took into consideration the quantized motion of the atom inside the magnetic hollow cylinder tube,which is significant for the transportation of cold atoms.We deduced the quantized motion modes of the atomic waves in the tube by the approximation of infinite potential,which is valid for cold atoms and strong magnetization.For the atomic waveguide with weak magnetization,we have calculated the tunnelling effect of the atomic wave.The adiabatic condition for the motion of cold atoms is discussed.A time orbit potential method for solving the “zero magnetic field problem” is proposed.  相似文献   

10.
Recently, an engineering report on chaos-based security solution has been proposed for fingerprint data during communication and transmission (IEEE Trans. Instrum. Meas. 61 (April (4)) (2012) 876–887). It has been claimed that experimental results and security analysis demonstrate the efficiency of the security solution in this report. However, from a scientific perspective, we give a validity analysis. Firstly, we demonstrate that the reversibility of integer reversible hidden transform (RHT) cannot be guaranteed under the current constraint condition in the original paper and then counterexamples are given to verify demonstration. In addition, in its experiment and performance analysis parts, there also exist several problems. Finally, we put forward some suggestive remarks on the designing of security solution for fingerprint data.  相似文献   

11.
王培杰  吴国祯 《物理学报》2005,54(6):2545-2551
研究了两个振子耦合的Henon-Heiles体系的周期轨迹与量子化问题.结果表明,周期轨迹的 作用量积分与体系的能量有着简单的线性关系.可以利用那些是整数值的周期轨迹的作用量 积分对不可积体系进行半经典量子化.由周期轨迹的物理内涵出发,揭示混沌体系的残余周 期轨迹具有与量子化有关的性质.这对于认识和理解经典力学与量子体系的联系关系及其物 理内涵有着深刻而重要的意义. 关键词: 周期轨迹 半经典量子化 混沌  相似文献   

12.
The effects of Gaussian white noise and Gaussian colored noise on the periodic orbits of period-5(P-5) and period-6(P-6) in their coexisting domain of a piecewise linear map are investigated numerically.The probability densities of some orbits are calculated.When the noise intensity is D = 0.0001,only the orbits of P-5 exist,and the coexisting phenomenon is destroyed.On the other hand,the self-correlation time τ of the colored noise also affects the coexisting phenomenon.When τcττc,only the orbits of P-5 appear,and the stability of the orbits of P-5 is enhanced.However,when ττc(τc and τc are critical values),only the orbits of P-6 exist,and the stability of the P-6 orbits is enhanced greatly.When ττc,the orbits of P-5 and P-6 coexist,but the stability of the P-5 orbits is enhanced and that of P-6 is weakened with τ increasing.  相似文献   

13.
王参军  杨科利  屈世显 《中国物理 B》2013,22(3):30502-030502
The effects of the Gaussian white noise and the Gaussian colored noise on the periodic orbits of period-5 (P-5) and period-6 (P-6) in their coexisting domain of a piecewise linear map are investigated numerically. The probability densities of some orbits are calculated. When the noise intensity is D=0.0001, only the orbits of P-5 exist, and the coexisting phenomenon is destroyed. On the other hand, the self-correlation time τ of the colored noise also affects the coexisting phenomenon. When τc<τ<τc', only the orbits of P-5 appear, and the stability of the orbits of P-5 is enhanced. However, when τ>τc' (τc and τc' are critical values), only the orbits of P-6 exist, and the stability of the orbits of P-6 is enhanced greatly. When τ<τc, the orbits of P-5 and P-6 coexist, but the stability of the orbits of P-5 is enhanced and that of P-6 is weakened with τ increasing.  相似文献   

14.
王佳  俞信  赵磊 《光学技术》2005,31(6):935-938
利用Mie散射理论分析论证了自由空间光通信传输的光信号在信道外被截获的可能性。提出了两种适于自由空间光通信图像保密通信的方法,并对这两种方法的性能进行了比较。设计并研制了实验系统。利用所提出的方法实现了自由空间光通信的图像保密传输。  相似文献   

15.
In a globalised world where risks spread through contagion, the decision of an entity to invest in securing its premises from stochastic risks no longer depends solely on its own actions but also on the actions of other interacting entities in the system. This phenomenon is commonly seen in many domains including airline, logistics and computer security and is referred to as Interdependent Security (IDS). An IDS game models this decision problem from a game-theoretic perspective and deals with the behavioural dynamics of risk-reduction investments in such settings. This paper enhances this model and investigates the spatio-temporal aspects of the IDS games. The spatio-temporal dynamics are studied using simple replicator dynamics on a variety of network structures and for various security cost tradeoffs that lead to different Nash equilibria in an IDS game. The simulation results show that the neighbourhood configuration has a greater effect on the IDS game dynamics than network structure. An in-depth empirical analysis of game dynamics is carried out on regular graphs, which leads to the articulation of necessary and sufficient conditions for dominance in IDS games under spatial constraints.  相似文献   

16.
韩莹  阮存军 《中国物理 B》2012,21(5):54103-054103
The focusing and the stable transport of an intense elliptic sheet electron beam in a uniform magnetic field are investigated thoroughly by using the macroscopic cold-fluid model and the single-particle orbit theory.The results indicate that the envelopes and the tilted angles of the sheet electron beam obtained by the two theories are consistent.The single-particle orbit theory is more accurate due to its treatment of the space-charge fields in a rectangular drift tube.The macroscopic cold-fluid model describes the collective transport process in order to provide detailed information about the beam dynamics,such as beam shape,density,and velocity profile.The tilt of the elliptic sheet beam in a uniform magnetic field is carefully studied and demonstrated.The results presented in this paper provide two complete theories for systemically discussing the transport of the sheet beam and are useful for understanding and guiding the practical engineering design of electron optics systems in high power vacuum electronic devices.  相似文献   

17.
This paper presents a novel approach to extract the periodic signals masked by a chaotic carrier. It verifies that the driven Duffing oscillator is immune to the chaotic carrier and sensitive to certain periodic signals. A preliminary detection scenario illustrates that the frequency and amplitude of the hidden sine wave signal can be extracted from the chaotic carrier by numerical simulation. The obtained results indicate that the hidden messages in chaotic secure communication can be eavesdropped utilizing Duffing oscillators.  相似文献   

18.
19.
Electron transport properties of an ideal one-dimensional (1D) quantum wire are studied including spatially periodic Rashba spin–orbit coupling (SOC) and Dresselhaus SOC. By comparing with the previous work [S.J. Gong, Z.Q. Yang, J. Phys. Condens. Matter 19 (2007) 446209], two transmission gaps appear in the transmission probability of electrons and their widths are also broadened dramatically. Moreover, it is found that their widths are sensitive not only to the strength of SOCs but also to the length ratio of SOCs segment and non-SOCs segment. In addition, a ‘circle-type’ transmission behavior has been found by tuning the strength of SOCs continuously. Our results may extend the previous work and provide an more effective method to manipulate the current in nanoelectric devices.  相似文献   

20.
本文分析了由两束贝塞尔(Bessel)光相干产生的周期性局域空心光束(Bottlebeam)遇到障碍物后的自重建特性.由汉克尔波理论分析了自重建的原理,利用衍射积分理论数值模拟了轴上圆形障碍物对光束传输的影响.结果表明,周期性Bottlebeam遇到障碍物遮挡时具有自重建特性,重建后的光束依然保持着障碍物前的光强分布特性.研究结果对于利用周期性Bottlebeam实现微粒的多层面操控具有特殊意义.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号