首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Recurrence plots have been widely used for a variety of purposes such as analyzing dynamical systems, denoising, as well as detection of deterministic signals embedded in noise. Though it has been postulated previously that recurrence plots contain time correlation information here we make the relationship between unthresholded recurrence plots and the covariance of a random process more precise. Computations using examples from harmonic processes, autoregressive models, and outputs from nonlinear systems are shown to illustrate this relationship. Finally, the use of recurrence plots for detection of deterministic signals in the presence of noise is investigated and compared to traditional signal detection methods based on the likelihood ratio test. Results using simulated data show that detectors based on certain statistics derived from recurrence plots are sub-optimal when compared to well-known detectors based on the likelihood ratio.  相似文献   

2.
3.
4.
5.
6.
Shan Cheng  Quanjun Wu 《Physica A》2010,389(7):1489-1492
In this paper, we point out two problems in synchronization of dynamic networks based on linear feedback controllers presented by Wu and Jiao [J. Wu, L. Jiao, Synchronization in dynamic networks with nonsymmetrical time-delay coupling based on linear feedback controllers, Physica A 387 (2008) 2111-2119]. Furthermore, an amendatory version on global exponential synchronization is given and proved in this paper.  相似文献   

7.
8.
It can be shown that negative refraction cannot occur in one-dimensional photonic crystals oriented as in Srivastava et al. (2008) [1].  相似文献   

9.
This brief note corrects a minor error in the statement of the main result in Haller (2011) [1] on a variational approach to Lagrangian coherent structures. We also show that the corrected formulation leads to a substantial simplification of LCS criteria for two-dimensional flows.  相似文献   

10.
11.
Sebastian Wernicke 《Physica A》2011,390(1):143-145
Network motifs in a given network are small connected subnetworks that occur at significantly higher frequencies than would be expected for a random network. In their 2007 article “An optimal algorithm for counting network motifs”, Itzhack, Mogilevski, and Louzoun present an algorithm for detecting network motifs. Based on an experimental comparison with a motif detection software called FANMOD, they claim that their algorithm is “more than a thousand times faster” than any previous motif detection algorithm. We show that this claim is not correct and based on a significant flaw in the experimental setup. Once the experimental data of Itzhack et al. is corrected for this flaw, the implementation of their algorithm actually turns out to be a little slower than FANMOD for random Erd?s-Rényi graphs. For random scale-free networks, the implementation of Itzhack et al. is faster only by a factor of ∼1.5, not the orders of magnitude claimed by Itzhack et al.  相似文献   

12.
13.
14.
Iron monosilicides (FeSi) is an important material with very interesting properties that can be harnessed for technological applications. Our attention has been drawn to the so-called first principle study of the electronic and thermodynamic properties of B2-FeSi by Zhao et al. (Physica B 406 (2011) 363-367) using pseudopotential plane wave method. They reported that FeSi in B2 phase is a narrow band gap material with a band gap of 0.05 eV using a generalized gradient approximation (GGA) potential implemented within the density functional theory (DFT) approximation. This comment comes to address an important oversight by these authors in the interpretation of their results.  相似文献   

15.
In this comment, we analyze a recently proposed Baptista-like cryptosystem and show that it is not invertible. Others weaknesses are also reported. A modified version of this cryptosystem is proposed to show how to overcome the non-invertibility.  相似文献   

16.
In a recent Letter [F.G. Deng, X.H. Li, H.Y. Zhou, Phys. Lett. A 372 (2008) 1957], an efficient high-capacity quantum secret sharing scheme was proposed. However, in this comment, it is shown that the protocol does not complete the task of secret sharing well when the message sender uses the nonorthogonal entangled states as the quantum information carriers. Finally a feasible improvement of this quantum secret sharing protocol is proposed.  相似文献   

17.
A corresponding Comment, raised by Yang and Wen, claimed that (i) our scheme cannot complete the task of secret sharing well even if the agents obtain the information about their measuring bases; (ii) they give a feasible improvement of our protocol. In this Reply, we show that their first judgment is wrong and their improvement is insecure.  相似文献   

18.
Tao Zhou 《Physics letters. A》2008,372(10):1725-1726
In a recent Letter [R. Yang, B.H. Wang, J. Ren, W.J. Bai, Z.W. Shi, W.X. Wang, T. Zhou, Phys. Lett. A 364 (2007) 189], we proposed a modified susceptible-infected-recovered (SIR) model, in which each node is assigned with an identical capability of active contact, A, at each time step. We found a threshold value λc=1/A in uncorrelated and unlocalized networks. A corresponding Comment, raised by Alberto d'Onofrio, claimed that (i) our model is not biologically relevant; (ii) our model does not have a threshold behavior for recovered population; (iii) the analytical result λc=1/A is incorrect being considered as a threshold for epidemic outbreak, because of an improper approximation of the initial configuration. In this Reply, I show that, by debating from point to point, our analysis and conclusion are solid and reasonable.  相似文献   

19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号