首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
The Feynman amplitudes are renormalized in the formalism of the CM representation. This Mellin-Barnes type integral representation, previously introduced for the study of asymptotic behaviours, is shown to have the following interesting property: in contrast with the usual subtraction procedures, the renormalization leaves the CM integrand unchanged, and only results into translations of the integration path. The explicit CM representation of the renormalized amplitudes is given. In addition, the dimensional regularization and the extension to spinor amplitudes are sketched.  相似文献   

3.
《Physics letters. [Part B]》1988,214(3):374-380
We give a lagrangian and supersymmetry transformation rules for the four-dimensional N=1 supergravity sector of superstring theories with their O(α′) corrections, obtained by the dimensional reduction á la Witten of the effective action of the ten-dimensional heterotic superstring. We also give general forms of O(α′ ″) corrections to supersymmetry transformation rules which arise through an axial vector superfield. Since our system is based on the ten-dimensional superstring without any auxiliary fields, our four-dimensional N=1 supergravity is free of auxiliary fields. Our point-field theory lagrangian is supposed to describe the mass-less fields in the untwisted sector of the ten-dimensional heterotic superstring propagating on orbifolds.  相似文献   

4.
5.
6.
We display the vertex operators for all states in the conformal supergravity sector of the twistor string, as outlined by Berkovits and Witten. These include ‘dipole’ states, which are pairs of supergravitons that do not diagonalize the translation generators. We use canonical quantization of the open string version of Berkovits, and compute N-point tree level scattering amplitudes for gravitons, gluons and scalars. We reproduce the Berkovits–Witten formula for maximal helicity violating (MHV) amplitudes (which they derived using path integrals), and extend their results to the dipole pairs. We compare these trees with those of Einstein gravity field theory.  相似文献   

7.
The matter part of the open string superstar is identified with the continuous Moyal product of functions of anti-commuting variables by diagonalizing the three-string vertex and using a special coordinate representation. We show that in this representation the identity and the sliver have a simple form.  相似文献   

8.
9.
Novel optical image encryption scheme based on fractional Mellin transform   总被引:3,自引:0,他引:3  
A novel nonlinear image encryption scheme is proposed by introducing the fractional Mellin transform (FrMT) into the field of image security. As a nonlinear transform, FrMT is employed to get rid of the potential insecurity of the optical image encryption system caused by the intrinsic object-image relationship between the plaintext and the ciphertext. Different annular domains of the original image are transformed by FrMTs of different orders, and then the outputs are further encrypted by comprehensively using fractional Fourier transform (FrFT), amplitude encoding and phase encoding. The keys of the encryption algorithm include the orders of the FrMTs, the radii of the FrMT domains, the order of the FrFT and the phases generated in the further encryption process, thus the key space is extremely large. An optoelectronic hybrid structure for the proposed scheme is also introduced. Numerical simulations demonstrate that the proposed algorithm is robust with noise immunity, sensitive to the keys, and outperforms the conventional linear encryption methods to counteract some attacks.  相似文献   

10.
Scale-invariant pattern classification using a hybrid system combining the optical Mellin transform and a digital signal processing technique is discussed. We accomplish the optical Mellin transform by a logarithmic coordinate transformation using a computer-generated hologram, followed by an optical Fourier transform. Mellin transform patterns are detected with a circular photodiode array, whose output signals are processed by a micro-computer. A new criterion is discussed, in which circular or periodic correlation is employed. Experimental examples are presented.  相似文献   

11.
A multi-order discrete fractional Mellin transform (MODFrMT) is constructed and directly used to encrypt the private images. The MODFrMT is a generalization of the fractional Mellin transform (FrMT) and is derived by transforming the image with multi-order discrete fractional Fourier transform (MODFrFT) in log-polar coordinates, where the MODFrFT is generalized from the closed-form expression of the discrete fractional Fourier transform (DFrFT) and can be calculated by fast Fourier transform (FFT) to reduce the computation burden. The fractional order vectors of the MODFrMT are sensitive enough to be the keys, and consequently key space of the encryption system is enlarged. The proposed image encryption algorithm has significant ability to resist some common attacks like known-plaintext attack, chosen-plaintext attack, etc. due to the nonlinear property of the MODFrMT. Additionally, Kaplan-Yorke map is employed in coordinate transformation process of the MODFrMT to further enhance the security of the encryption system. The computer simulation results show that the proposed encryption algorithm is feasible, secure and robust to noise attack and occlusion.  相似文献   

12.
In this paper, we recast the matter part of the open superstring star in the present ofa constant B field. Byusing a different coordinate representation the matter part of the open superstring star is identified with the continuousMoyal product of functions of anti-commuting variables. Fortunately we find it does not depend on the value of the Bfield.  相似文献   

13.
14.
A nonlinear color image encryption algorithm based on reality preserving fractional Mellin transform (RPFrMT) is proposed. So far as image encryption is concerned, RPFrMT has two fascinating advantages: (1) the real-valued output of the transform ensures that the ciphertext is real which is convenient for display, transmission and storage; (2) as a nonlinear transform, RPFrMT gets rid of the potential insecurity which exists in the conventional linear encryption schemes. The original color image is first transformed from RGB color space to R′G′B′ color space by rotating the color cube. The three components of the output are then transformed by RPFrMT of different fractional orders. To further enhance the security of the encryption system, the result of the former step is scrambled by three dimensional scrambling. Numerical simulations demonstrate that the proposed algorithm is feasible, secure, sensitive to keys and robust to noise attack and occlusion. The proposed color image encryption can also be applied to encrypt three gray images by transforming the gray images into three color components of a specially constructed color image.  相似文献   

15.
The necessity of translating a scaled input function in the logarithmic coordinates necessary to perform an optical Mellin transform is demonstrated. The implications of this requirement in the processing of two dimensional inputs for pattern recognition are discussed.  相似文献   

16.
17.
An image encryption scheme has been presented by using two structured phase masks in the fractional Mellin transform (FrMT) plane of a system, employing a phase retrieval technique. Since FrMT is a non-linear integral transform, its use enhances the system security. We also add further security features by carrying out spatial filtering in the frequency domain by using a combination of two phase masks: a toroidal zone plate (TZP) and a radial Hilbert mask (RHM). These masks together increase the key space making the system more secure. The phase key used in decryption has been obtained by applying an iterative phase retrieval algorithm based on the fractional Fourier transform. The algorithm uses amplitude constraints of secret target image and the ciphertext (encrypted image) obtained from multiplication of fractional Mellin transformed arbitrary input image and the two phase masks (TZP and RHM). The proposed encryption scheme has been validated for a few grayscale images, by numerical simulations. The efficacy of the scheme has been evaluated by computing mean-squared-error (MSE) between the secret target image and the decrypted image. The sensitivity analysis of the decryption process to variations in various encryption parameters has also been carried out.  相似文献   

18.
We present a locally superconformal invariant theory of supergravity which is gauge equivalent to the usual, Poincaré, supergravity. This is achieved by means of a compensating scalar supermultiplet. This shows that local superconformal symmetry can be made compatible with gravitational phenomenology.  相似文献   

19.
20.
It is shown that in asymptotically flat space the weakly vanishing Hamiltonian of supergravity theory has to be modified by adding to it certain surface integrals. The numerical value of the surface integrals yields the total energy-momentum, angular momentum and supercharge of the system. The surface integrals have well defined (Dirac) brackets only after the coordinates and supergauge are fixed. In that case they close according to the flat space supersymmetry algebra. If an internal symmetry is included, new surface integrals appear corresponding to the additional gauge charges.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号