首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 484 毫秒
1.
As an extension of Gabor signal processing, the covariant Weyl-Heisenberg integral quantization is implemented to transform functions on the eight-dimensional phase space x,k into Hilbertian operators. The x=xμ values are space-time variables, and the k=kμ values are their conjugate frequency-wave vector variables. The procedure is first applied to the variables x,k and produces essentially canonically conjugate self-adjoint operators. It is next applied to the metric field gμν(x) of general relativity and yields regularized semi-classical phase space portraits gˇμν(x). The latter give rise to modified tensor energy density. Examples are given with the uniformly accelerated reference system and the Schwarzschild metric. Interesting probabilistic aspects are discussed.  相似文献   

2.
Authentication is a critical issue in wireless communication due to the impersonation and substitution attacks from the vulnerable air interface launched by the malicious node. There are currently two kinds of authentication research in wireless communication. One is based on cryptography and relies on computational complexity, the other is based on physical layer fingerprint and can not protect data integrity well. Both of these approaches will become insecure when facing attackers with infinite computing power. In this paper, we develop a wireless unconditional authentication framework based on one-time keys generated from wireless channel. The proposed unconditional authentication framework provides a new perspective to resist infinite computing power attackers. We study the performance of the unconditional authentication framework in this paper. First, a physical layer offered chain key (PHYLOCK) structure is proposed, which can provide one-time keys for unconditional authentication. The physical layer offered chain keys are generated by XORing the physical layer updated keys extracted from the current channel state information (CSI) and the previous chain keys. The security of PHYLOCK is analyzed from the perspective of information theory. Then, the boundary of the deception probability is conducted. It is shown that unconditional authentication can achieve a probability of deception 212Hk, where Hk is the entropy of the one-time key used for one message. Finally, the conditions for unconditional authentication are listed. Our analysis shows that the length of the key and the authentication code need to be twice the length of the message and the encoding rules of the authentication code need to satisfy the restrictions we listed.  相似文献   

3.
We introduce a new entangled quantum state generated by applying single-mode coherent superposition of photon subtraction and addition (a cos θ + a sin θ)m to the entangled coherent state |Ψ±(α,0)〉|Ψ±α,0, and then investigate the entanglement properties affected by coherent superposition operation. It is shown that this operation can be applied to enhance the entanglement of the state |Ψ+(α,0)〉|Ψ+α,0. In addition, the effects of the coherent operation is better to improve the entanglement than that of the creation operation (am) for |Ψ+(α,0)〉|Ψ+α,0 in a small-amplitude regime and for |Ψ(α,0)〉|Ψα,0 in any regime.  相似文献   

4.
5.
The equation yxx=f(x)y2+g(x)y3 is the charged generalization of the Emden-Fowler equation that is crucial in the study of spherically symmetric shear-free spacetimes. This version arises from the Einstein–Maxwell system for a charged shear-free matter distribution. We integrate this equation and find a new first integral. For this solution to exist, two integral equations arise as integrability conditions. The integrability conditions can be transformed to nonlinear differential equations, which give explicit forms for f(x) and g(x) in terms of elementary and special functions. The explicit forms f(x)1x511x11/5 and g(x)1x611x12/5 arise as repeated roots of a fourth order polynomial. This is a new solution to the Einstein-Maxwell equations. Our result complements earlier work in neutral and charged matter showing that the complexity of a charged self-gravitating fluid is connected to the existence of a first integral.  相似文献   

6.
7.
We consider a discrete-time random walk (xt) which, at random times, is reset to the starting position and performs a deterministic motion between them. We show that the quantity Prxt+1=n+1|xt=n,n determines if the system is averse, neutral or inclined towards resetting. It also classifies the stationary distribution. Double barrier probabilities, first passage times and the distribution of the escape time from intervals are determined.  相似文献   

8.
9.
A single master equation governs the behaviour of shear-free neutral perfect fluid distributions arising in gravity theories. In this paper, we study the integrability of yxx=f(x)y2, find new solutions, and generate a new first integral. The first integral is subject to an integrability condition which is an integral equation which restricts the function f(x). We find that the integrability condition can be written as a third order differential equation whose solution can be expressed in terms of elementary functions and elliptic integrals. The solution of the integrability condition is generally given parametrically. A particular form of f(x)1x511x15/7 which corresponds to repeated roots of a cubic equation is given explicitly, which is a new result. Our investigation demonstrates that complexity of a self-gravitating shear-free fluid is related to the existence of a first integral, and this may be extendable to general matter distributions.  相似文献   

10.
This paper focuses on K-receiver discrete-time memoryless broadcast channels (DM-BCs) with private messages, where the transmitter wishes to convey K private messages to K receivers. A general inner bound on the capacity region is proposed based on an exhaustive message splitting and a K-level modified Marton’s coding. The key idea is to split every message into j=1KKj1 submessages each corresponding to a set of users who are assigned to recover them, and then send these submessages via codewords chosen from a K-level structure codebooks. To guarantee the joint typicality among all transmitted codewords, a sufficient condition on the subcodebooks’ sizes is derived through a newly establishing hierarchical covering lemma, which extends the 2-level multivariate covering lemma to the K-level case with more intricate dependences. As the number of auxiliary random variables and rate conditions both increase exponentially with K, the standard Fourier–Motzkin elimination procedure becomes infeasible when K is large. To tackle this problem, we obtain a closed form of achievable rate region with a special observation of disjoint unions of sets that constitute the power set of {1,,K}. The proposed achievable rate region allows arbitrary input probability mass functions and improves over previously known achievable (closed form) rate regions for K-receiver (K3) BCs.  相似文献   

11.
12.
The quantum search algorithm is one of the milestones of quantum algorithms. Compared with classical algorithms, it shows quadratic speed-up when searching marked states in an unsorted database. However, the success rates of quantum search algorithms are sensitive to the number of marked states. In this paper, we study the relation between the success rate and the number of iterations in a quantum search algorithm of given λ=M/N, where M is the number of marked state and N is the number of items in the dataset. We develop a robust quantum search algorithm based on Grover–Long algorithm with some uncertainty in the number of marked states. The proposed algorithm has the same query complexity ON as the Grover’s algorithm, and shows high tolerance of the uncertainty in the ratio M/N. In particular, for a database with an uncertainty in the ratio M±MN, our algorithm will find the target states with a success rate no less than 96%.  相似文献   

13.
This paper provides conditions for the existence of a solution to the second-order nonlinear boundary value problem on the half-line of the form Δa(n)Δx(n)=f(n+1,x(n+1),Δx(n+1)),nN{0}, with αx(0)+βa(0)Δx(0)=0,x()=d, where d,α,βR, α2+β2>0. To achieve our goal, we use Schauder’s fixed-point theorem and the perturbation technique for a Fredholm operator of index 0. Moreover, we construct the necessary condition for the existence of a solution to the considered problem.  相似文献   

14.
15.
16.
17.
18.
In [L. Lebtahi, Lie algebra on the transverse bundle of a decreasing family of foliations, J. Geom. Phys. 60 (2010), 122–133], we defined the transverse bundle VkVk to a decreasing family of kk foliations FiFi on a manifold MM. We have shown that there exists a (1,1)(1,1) tensor JJ of VkVk such that Jk≠0Jk0, Jk+1=0Jk+1=0 and we defined by LJ(Vk)LJ(Vk) the Lie Algebra of vector fields XX on VkVk such that, for each vector field YY on VkVk, [X,JY]=J[X,Y][X,JY]=J[X,Y].  相似文献   

19.
20.
A complex fuzzy set is a vigorous framework to characterize novel machine learning algorithms. This set is more suitable and flexible compared to fuzzy sets, intuitionistic fuzzy sets, and bipolar fuzzy sets. On the aspects of complex fuzzy sets, we initiate the abstraction of (α,β)-complex fuzzy sets and then define α,β-complex fuzzy subgroups. Furthermore, we prove that every complex fuzzy subgroup is an (α,β)-complex fuzzy subgroup and define (α,β)-complex fuzzy normal subgroups of given group. We extend this ideology to define (α,β)-complex fuzzy cosets and analyze some of their algebraic characteristics. Furthermore, we prove that (α,β)-complex fuzzy normal subgroup is constant in the conjugate classes of group. We present an alternative conceptualization of (α,β)-complex fuzzy normal subgroup in the sense of the commutator of groups. We establish the (α,β)-complex fuzzy subgroup of the classical quotient group and show that the set of all (α,β)-complex fuzzy cosets of this specific complex fuzzy normal subgroup form a group. Additionally, we expound the index of α,β-complex fuzzy subgroups and investigate the (α,β)-complex fuzzification of Lagrange’s theorem analog to Lagrange’ theorem of classical group theory.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号