首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
We study space-time fluctuations around a characteristic line for a one-dimensional interacting system known as the random average process. The state of this system is a real-valued function on the integers. New values of the function are created by averaging previous values with random weights. The fluctuations analyzed occur on the scale n 1/4, where n is the ratio of macroscopic and microscopic scales in the system. The limits of the fluctuations are described by a family of Gaussian processes. In cases of known product-form invariant distributions, this limit is a two-parameter process whose time marginals are fractional Brownian motions with Hurst parameter 1/4. Along the way we study the limits of quenched mean processes for a random walk in a space-time random environment. These limits also happen at scale n 1/4 and are described by certain Gaussian processes that we identify. In particular, when we look at a backward quenched mean process, the limit process is the solution of a stochastic heat equation.  相似文献   

2.
Systems of fuzzy subsets fulfilling quantum logic axioms with respect to fuzzy connectives are studied. An integral representation of a state on a fuzzy logic is shown. Fuzzy observables and their real-valued mean values are introduced in the obvious way. Using the relationship between fuzzy observables and fuzzy real-valued random variables, a fuzzy real-valued mean value of a fuzzy observable is introduced. The relationship between both types of mean values is studied and an example is presented.  相似文献   

3.
We propose a practical image hiding method using phase wrapping and real-valued decoding key. A zero-padded original image, multiplied with a random-phase pattern, is Fourier transformed and its real-valued data denotes an encoded image in the embedding process. The encoded image is divided into two phase-encoded random patterns which are generated based on the phase wrapping rule. The imaginary part and the real part of these phase-encoded random patterns are used as a hidden image and a decoding key, respectively. A host image is then made from the linear superposition of the weighted hidden image and a cover image. The original image is simply obtained by the inverse-Fourier transform of the product of the host image and the decoding key in the reconstruction process. The embedding process and the reconstruction process are performed digitally and optically, respectively. Computer simulation and an optical experiment are shown in support of the proposed method.  相似文献   

4.
双随机相位图像加密的实值编码研究   总被引:7,自引:5,他引:2  
李榕  李萍 《光子学报》2005,34(6):952-955
提出了一种基于双随机相位的图像实值编码方法,该方法可应用于光学图像加密.要编码的纯相位图像分别在空间域和频域加入随机相位掩膜,其中在频域将编码范围扩大4倍,经过光学系统的变换,将生成的图像取实部作为编码图像.实值编码的图像利用与编码过程类似的方法进行解码,可以准确地重建原图像.该编译码方法简单,编码图像是一个近似随机噪声的实值图像,便于数字图像的传输与输出.  相似文献   

5.
We introduce the Jacobian elliptic Chebyshev rational maps with the the equidistributivity property (or briefly EDP) and the semi-group property like the Chebyshev polynomial maps. Simple methods are also discussed for generating sequences of i.i.d. p-ary random variables based on the Jacobian elliptic Chebyshev rational maps. Furthermore, we give conjectures on correlational properties of a real-valued trajectory generated by the Jacobian elliptic Chebyshev rational maps.  相似文献   

6.
Random populations represented by stochastically scattered collections of real-valued points are abundant across many fields of science. Fractality, in the context of random populations, is conventionally associated with a Paretian distribution of the population's values.Using a Poissonian approach to the modeling of random populations, we introduce a definition of “Poissonian fractality” based on the notion of scale-invariance. This definition leads to the characterization of four different classes of Fractal Poissonian Populations—three of which being non-Paretian objects. The Fractal Poissonian Populations characterized turn out to be the unique fixed points of natural renormalizations, and turn out to be intimately related to Extreme Value distributions and to Lévy Stable distributions.  相似文献   

7.
We consider a class of random lattice operators including Schrödinger operators of the formH=–+w+gv, wherew(x) is a real-valued periodic function,g is a positive constant, andv(x),x d , are independent, identically distributed real random variables. We prove that if the operator –+w has gaps in the spectrum andg is sufficiently small, then the operatorH develops pure point spectrum with exponentially decaying eigenfunctions in a vicinity of the gaps.  相似文献   

8.
Procedures are developed and tested for the numerical analytic continuation of the difference between two potential energy surfaces of the same symmetry in the vicinity of their complex-valued intersection. Rational fractions are used for curve-fitting ΔE as a function of either one or two independent, complex nuclear coordinates. The rational fractions are constructed from discrete values of ΔE(R, r) to exhibit the branch-point structure explicit in the complex square root function. For analytic continuation to values of the nuclear coordinates with small imaginary parts only real-valued input points are required. In order to analytically continue ΔE farther off the real-axis a few complex-valued input points must be used in addition to the real-valued data. The rational-fraction methods are tested for two systems : (a) the energy difference between the 3σ and 4σ states of HeH++ and (b) the energy difference between the two lowest singlet states of H3 + at collinear geometries. In both cases, the rational fractions accurately represent the actual potentials on the real axis and when analytically continued into the complex nuclear coordinate plane. In (b), the first derivatives of the rational fractions are calculated and found to be sufficiently accurate for semiclassical calculations on molecular collisions.  相似文献   

9.
We consider Schrödinger operators on [0, ∞) with compactly supported, possibly complex-valued potentials in L 1([0, ∞)). It is known (at least in the case of a real-valued potential) that the location of eigenvalues and resonances determines the potential uniquely. From the physical point of view one expects that large resonances are increasingly insignificant for the reconstruction of the potential from the data. In this paper we prove the validity of this statement, i.e., we show conditional stability for finite data. As a by-product we also obtain a uniqueness result for the inverse resonance problem for complex-valued potentials.  相似文献   

10.
We propose an optoelectronic image encryption and decryption technique based on coherent superposition principle and digital holography. With the help of a chaotic random phase mask (CRPM) that is generated by using logistic map, a real-valued primary image is encoded into a phase-only version and then recorded as an encoded hologram. As for multiple-image encryption, only one digital hologram is to be transmitted as the encrypted result by using the multiplexing technique changing the reference wave angle. The bifurcation parameters, the initial values for the logistic maps, the number of the removed elements and the reference wave parameters are kept and transmitted as private keys. Both the encryption and decryption processes can be implemented in opto-digital manner or fully digital manner. Simulation results are given for testing the feasibility of the proposed approach.  相似文献   

11.
Random walks have been created using the pseudo-random generators in different computer language compilers (BASIC, PASCAL, FORTRAN, C++) using a Pentium processor. All the obtained paths have apparently a random behavior for short walks (214 steps). From long random walks (233 steps) different periods have been found, the shortest being 218 for PASCAL and the longest 231 for FORTRAN and C++, while BASIC had a 224 steps period. The BASIC, PASCAL and FORTRAN long walks had even (2 or 4) symmetries. The C++ walk systematically roams away from the origin. Using deviations from the mean-distance rule for random walks, d2N, a more severe criterion is found, e.g. random walks generated by a PASCAL compiler fulfills this criterion to N < 10 000.  相似文献   

12.
A phase-only encryption scheme using phase-encoded exclusive-OR (XOR) rules in a Fourier plane and a single path decryption system are presented. To generate phase-only encrypted data, a zero-padded original image, multiplied by a random phase image, is Fourier transformed and its real-valued data is encrypted with key data by using phase-encoded XOR rules. Since the original information is encrypted on the Fourier plane, the proposed encryption is more tolerant to loss of key information by scratching or cutting than previous XOR encryption in a space domain. A decryption is simply performed based on 2-f setup with spatial filter by Fourier transform for multiplication phase-only encrypted data with phase-only key data. Due to single path architecture without a reference wave, the proposed system is resistant to mechanical vibrations and fluctuation. Numerical simulations have confirmed the validity of the proposed encryption scheme and simple decryption architecture.  相似文献   

13.
It is proved that the space of all bounded real-valued valuations with (0)=0 on a complemented lattice is isomorphic to the space of all real-valued totally additive measures on a suitable complete Boolean algebra.  相似文献   

14.
《Nuclear Physics B》1996,479(3):663-682
We obtain an effective potential of the O(N)-symmetric ø4 theory for large N starting with a finite lattice system and taking the thermodynamic limit with great care. In the thermodynamic limit, it is globally real-valued and convex in both the symmetric and the broken phases. In particular, it has a flat bottom in the broken phase. Taking the continuum limit, we discuss renormalization effects to the flat bottom and exhibit the effective potential of the continuum theory in three and four dimensions. On the other hand, the effective potential is nonconvex in a finite lattice system. Our numerical study shows that the barrier height of the effective potential flattens as a linear size of the system becomes large. It decreases obeying a power law and the exponent is about −2. The result is clearly understood from the dominance of configurations with a slowly-rotating field in one direction.  相似文献   

15.
In this two-part paper, a theory of non-equilibrium thermodynamic systems (with memory) is developed. The emphasis is laid upon the possibility of presenting the non-equilibrium thermodynamics deductively starting from the basic laws in a form which is capable of a direct experimental verification. This first part introduces the concept of a system with a vector-valued action which underlies the concept of a thermodynamic system (introduced in the second part). A special case of a vector-valued action is a real-valued action; the theory of real-valued actions with the Clausius property due to Coleman and Owen is briefly sketched. A subintegrating functional for a vector-valued action is a non-zero linear functional whose composition with the action gives a real-valued action with the Clausius property. For special, actions which have relevance to thermodynamics the existence of a subintegrating functional with some extra properties is equivalent to the existence of the absolute temperature scale or to the existence of the mechanical equivalent of a unit of heat. The main purpose of the first part of the paper is to give conditions for the existence of a subintegrating functional which is positive on a given set of vectors. These conditions will be shown in the second part to be the abstract analogues of the verbal statements of the laws of thermodynamics.I wish to express my deep thanks to Dr. V. Alda CSc for discussions concerning the problem of separation of sets in linear spaces, and to Dr. J. Kratochvíl CSc for discussions on foundations of thermodynamics.  相似文献   

16.
We consider random walks on Z d with transition ratesp(x, y) given by a random matrix. Ifp is a small random perturbation of the simple random walk, we show that the walk remains diffusive for almost all environmentsp ifd>2. The result also holds for a continuous time Markov process with a random drift. The corresponding path space measures converge weakly, in the scaling limit, to the Wiener process, for almost everyp.Dedicated to Joel Lebowitz on his 60th birthdaySupported by NSF-grant DMS-8903041  相似文献   

17.
It is well known that the real and complex numbers in the Scott-Solovay universeV (B) of ZFC based on a complete Boolean algebraB are represented by the real-valued and complex-valued Borel functions on the Stonean space ofB. The main purpose of this paper is to show that the separable complex Hilbert spaces and the von Neumann algebras acting on them inV (B) can be represented by reasonable classes of families of complex Hilbert spaces and of von Neumann algebras over. This could be regarded as the duality between Boolean-valued analysis developed by Ozawa, Takeuti, and others and the traditional reduction theory based not on measure spaces but on Stonean spaces. With due regard to Ozawa, this duality could pass for a sort of reduction theory forAW *-modules over commutativeAW *-algebras and embeddableAW *-algebras. Under the duality we establish several fundamental correspondence theorems, including the type correspondence theorems of factors.  相似文献   

18.
A novel optical image encryption scheme is proposed based on quick response code and high dimension chaotic system, where only the intensity distribution of encoded information is recorded as ciphertext. Initially, the quick response code is engendered from the plain image and placed in the input plane of the double random phase encoding architecture. Then, the code is encrypted to the ciphertext with noise-like distribution by using two cascaded gyrator transforms. In the process of encryption, the parameters such as rotation angles and random phase masks are generated as interim variables and functions based on Chen system. A new phase retrieval algorithm is designed to reconstruct the initial quick response code in the process of decryption, in which a priori information such as three position detection patterns is used as the support constraint. The original image can be obtained without any energy loss by scanning the decrypted code with mobile devices. The ciphertext image is the real-valued function which is more convenient for storing and transmitting. Meanwhile, the security of the proposed scheme is enhanced greatly due to high sensitivity of initial values of Chen system. Extensive cryptanalysis and simulation have performed to demonstrate the feasibility and effectiveness of the proposed scheme.  相似文献   

19.
A general expression for a recursion formula which describes a random walk with coupled modes is given. In this system, the random walker is specified by the jumping probabilities P+ and P which depend on the modes. The transition probability between the modes is expressed by a jumping probabilityR (ij) (orr ij). With the aid of this recursion formula, spatial structures of the steady state of a coupled random walk are studied. By introducing a Liapunov function and entropy, it is shown that the stability condition for the present system can be expressed as the principle of the extremum entropy production.On leave of absence from Tohoku University, Department of Applied Science, Faculty of Engineering, Sendai, 980 Japan.  相似文献   

20.
In many systems in condensed matter physics and quantum field theory, first order phase transitions are initiated by the nucleation of bubbles of the stable phase. In homogeneous nucleation theory the nucleation rate can be written in the form of the Arrhenius law: . Here is the energy of the critical bubble, and the prefactor can be expressed in terms of the determinant of the operator of fluctuations near the critical bubble state. In general it is not possible to find explicit expressions for and . If the difference between the energies of the stable and metastable vacua is small, the constant can be determined within the leading approximation in , which is an extension of the ”thin wall approximation”. We have done this calculation for the case of a model with a real-valued order parameter in two dimensions. Received: 11 September 2002 / Revised version: 30 October 2002 / Published online: 24 January 2003 RID="a" ID="a" e-mail: munsteg@uni-muenster.de RID="b" ID="b" e-mail: rut@ifttp.bas-net.by * Present address: Universit?t Essen, Fachbereich 7 - Physik, Universit?tsstr. 5, 45117 Essen, Germany  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号