首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
General relationships of the fully off-shell T-matrix element for the central forces are derived. The problem of finding the fully off-shell T-matrix element can be reduced to finding a real two-parameter function φ(p, k). It can be shown in the case of no bound state that if φ(p, k) is separable, the whole problem becomes equivalent to the inverse scattering problem. An approximate method to include inelastic effects is proposed and the πN off-shell T-matrix element is calculated.  相似文献   

2.
The advanced adiabatic approach previously proposed for describing collision problems in atomic physics is extended to the specific case of mesic-atom collisions in the excited states n≥2. The method and the algorithm of the calculations are described. The calculations of the charge-exchange and Coulomb deexcitation rates in collisions of ()n, ()n, and ()n muonic atoms in the excited states n=3, 4, 5 with the hydrogen isotopes p, d, t are presented in comparison with the conventional adiabatic approach.  相似文献   

3.
Recently, a polynomial-based (k, n) steganography and authenticated image sharing (SAIS) scheme was proposed to share a secret image into n stego-images. At the same time, one can reconstruct a secret image with any k or more than k stego-images, but one cannot obtain any information about the secret from fewer than k stego-images. The beauty of a (k, n)-SAIS scheme is that it provides the threshold property (i.e., k is the threshold value), the steganography (i.e., stego-images look like cover images), and authentication (i.e., detection of manipulated stego-images). All existing SAIS schemes require parity bits for authentication. In this paper, we present a novel approach without needing parity bits. In addition, our (k, n)-SAIS scheme provides better visual quality and has higher detection ratio with respect to all previous (k, n)-SAIS schemes.  相似文献   

4.
With the aid of symbolic computation, a generalized auxiliary equation method is proposed to construct more general exact solutions to two types of NLPDEs. First, we present new family of solutions to a nonlinear Klein-Gordon equation, by using this auxiliary equation method including a new first-order nonlinear ODE with six-degree nonlinear term proposed by Sirendaoreji. Then, we apply an indirect F-function method very close to the F-expansion method to solve the generalized Camassa-Holm equation with fully nonlinear dispersion and fully nonlinear convection C(l,n,p). Taking advantage of the new first-order nonlinear ODE with six degree nonlinear term, this indirect F-function method is used to map the solutions of C(l,n,p) equations to those of that nonlinear ODE. As a result, we can successfully obtain in a unified way, many exact solutions.  相似文献   

5.
In recent years, the operation efficiency of chaos-based image cryptosystems has drawn much more concerns. However, the workload arised from floating point arithmetic in chaotic map iteration prevents the efficiency promotion of these cryptosystems. In this paper, we present a novel image encryption scheme using Gray code based permutation approach. The new permutation strategy takes full advantage of (n, p, k)-Gray-code achievements, and is performed with high efficiency. A plain pixel-related image diffusion scheme is introduced to compose a complete cryptosystem. Simulations and extensive security analyses have been carried out and the results demonstrate the high security and operation efficiency of the proposed scheme.  相似文献   

6.
Maskless lithography (ML) provides a fast and low-cost method for projecting the images of IC or micro features onto photoresist. However, it needs an efficient simulation method to evaluate the performance of lithography process. In this paper, a pixel-based partially coherent image method for digital micro-mirror device (DMD) based ML is proposed based on the linear invariant theory. In our method, the mask is sampled by DMD pixel (each pixel corresponding to each micro-mirror) and expressed by rect function. Using the shift theory of Fourier transform and the stacked pupil operator approach, we build a matrix Φ for system response function of rect function. If the DMD pixel state matrix is S, then the aerial image can be calculated with two matrix multiplication I(x,y) = .  相似文献   

7.
The adiabatic hyperspherical approach developed previously is used to describe the asymmetric mesic-atom scattering +b+b, a+ (a, b=p, d, t) in the collision-energy range 10?3?≤102 eV. Boundary conditions for J≠0 scattering states are formulated, and partial cross sections for J=0–3 are calculated. Effective numerical codes are developed, and a fast convergence of the adiabatic hyperspherical approach is demonstrated: to achieve a precision of about 1% in the calculated cross sections, it is sufficient to use a basis of not more than ten adiabatic hyperspherical functions. The results that we obtained are compared with the previous ones.  相似文献   

8.
《Physics letters. A》2019,383(27):125855
The nonlinear beam-core evolution equation approach is proposed as a powerful tool to estimate the acceptable beam current in a given circular accelerator. The approach is justified by the macroparticle simulation over a wide beam current parameter region. Space-charge effects on the beam-core evolution are discussed by Poincaré mapping on the beam-core phase space (σ, /ds). The instability seen in the beam-core evolution is rigorously analyzed as an eigenvalue problem in the coupled linear system derived from the linearized beam-core evolution equations. A threshold current resulting in the instability is given by both the nonlinear beam-core evolution equation approach and the coupled linear system approach. As an example, a fast cycling induction synchrotron is evaluated in which the space-charge effects are significant because it is injector-free.  相似文献   

9.
A general multi-secret visual cryptography scheme   总被引:1,自引:0,他引:1  
In a (k, n) visual cryptography scheme (VCS), a secret image is encoded into n shadow images that are distributed to n participants. Any k participants can reveal the secret image by stacking their shadow images, and less than k participants have no information about the secret image. In this paper we consider the case when the secret image is more than one, and this is a so-called multi-secret VCS (MVCS). The previous works on MVCS are all the simple 2-out-of-2 cases. In this paper, we discuss a general (k, n)-MVCS for any k and n. This paper has three main contributions: (1) our scheme is the first general (k, n)-MVCS, which can be applied on any k and n, (2) we give the formal security and contrast conditions of (k, n)-MVCS and (3) we theoretically prove that the proposed (k, n)-MVCS satisfies the security and contrast conditions.  相似文献   

10.
With the aid of the ordinary differential equation (ODE) involving an arbitrary positive power of dependent variable proposed by Li and Wang and an indirect F-function method very close to the F-expansion method, we solve the generalized Camassa-Holm equation with fully nonlinear dispersion and fully nonlinear convection C(l,n,p) and the generalized nonlinear Schrödinger equation with nonlinear dispersion GNLS(l,n,p,q). Taking advantage of the new subsidiary ODE, this F-function method is used to map the solutions of C(l,n,p) and GNLS(l,n,p,q) equations to those of that nonlinear ODE. As result, we can successfully obtain in a unified way, many exact solutions.  相似文献   

11.
Yi-Kuei Lin 《Physica A》2010,389(6):1253-1258
This paper constructs a revised stochastic flow network to model a realistic computer network in which each arc has a lead time and a stochastic capacity. The minimum time to send a specified amount of data through the network is thus uncertain. Hence, this paper mainly proposes an approach for evaluating the system reliability that d units of data can be transmitted through k minimal paths simultaneously within the time threshold T. The idea of lower boundary points for (d,T), the minimal system states satisfying the demand d within the time threshold T, is proposed firstly. All system states meeting the time and demand requirements can be represented as the union of subsets generated from all lower boundary points for (d,T), and thus the system reliability is computed quickly.  相似文献   

12.
Arguments against the traditional Yukawa-type approach to NN intermediate-and shortrange interaction due to scalar-isoscalar and heavy-meson exchanges are presented. Instead of the Yukawa mechanism for intermediate-range attraction, some new approach based on the formation of a symmetric six-quark bag in the state |(0s)6[6]X, L=0〉 dressed owing to strong coupling to π, σ, and ρ fields is suggested. This new mechanism offers a strong intermediate-range attraction, which replaces effective σ exchange (or excitation of two isobars in the intermediate state) in traditional force models. A similar mechanism with the production of a vector ρ meson in the intermediate six-quark state is expected to lead to a strong short-range spin-orbit nonlocal interaction in the NN system, which may resolve the long-standing puzzle of the spin-orbit force in baryons and in two-baryon systems. The effective interaction in the NN channel provided by the new mechanism will be enhanced significantly if the partial restoration of chiral symmetry is assumed to occur inside the six-quark symmetric bag. A simple illustrative model is developed that demonstrates clearly how well the suggested new mechanism can reproduce NN data. Strong interrelations have been shown to exist between the proposed microscopic model and one-component Moscow NN potential developed by the authors previously and also with some hybrid models and the one-term separable Tabakin potential. The new implications of the proposed model for nuclear physics are discussed.  相似文献   

13.
赵振兴 《中国物理C(英文版)》2018,42(9):093101-093101
In this work, we analyse semi-leptonic and non-leptonic weak decays of the heavy baryons: Λ_b,Ξ_b,?_b and Λ_c,Ξ_c,?_c. For non-leptonic decay modes, we study only the factorizable channels induced by the external Wemission. The two spectator quarks in the baryonic transitions are treated as a diquark and form factors are calculated in the light-front approach. Using the results for form factors, we also calculate some corresponding semi-leptonic and non-leptonic decay widths. We find that our results are comparable with the available experimental data and other theoretical predictions. Decay branching fractions for many channels are found to reach the level 10~(-3)~10~(-2),which is promising for discovery in future measurements at BESIII, LHCb and Belle II. The SU(3) symmetry in semi-leptonic decays is examined and sources of symmetry breaking are discussed.  相似文献   

14.
A new approach to the solution of problems of electrostatics, some of them with mixed boundary conditions, is presented. The proposed scheme can be used in cases were we have a formal solution in the form of a series in Legendre polynomials and the boundary or matching conditions are given not on the whole interval (0, π) of the polar variable, θ, but only over the interval (0, π/2) or (π/2, π). Truncation of the series after the Nth term and the projection on the subspace generated by the set of the first N even (or odd) Legendre polynomials allows us to determine the unknown coefficients of the approximate solution. The results show rapid convergence toward the exact values as we increase the number of terms, N, included in the approximate solutions. The procedure allows to solve approximately some problems whose exact solutions, we believe, are not yet known.  相似文献   

15.
Different from the previous methods of obtaining optical tomography of quantum states, in this paper we use the Radon transform between the single- (two-)mode Wigner operator and the pure-state density operator |q f,g f,g q| (|η,τ 1,τ 2〉〈η,τ 1,τ 2|) to analytically obtain optical tomograms for single- (two-)mode squeezed chaotic fields, where the states |q f,g (|η,τ 1,τ 2〉) refer to the newly introduced intermediate coordinate-momentum (entangled) states. More interestingly, we find that the tomograms of squeezed chaotic fields and those of coherent states are related by a integration. Thus, we establish a new convenient approach of obtaining tomograms for quantum states.  相似文献   

16.
In measurement of activated processes, such as diffusion, ionic conduction, creep and sintering, it is common to use Arrhenius plots of the measured quantity, A(T), to give the logarithm of the pre-exponential factor, logA0, and the experimental activation enthalpy, h. It is shown that, in the cases of conduction and diffusion in ionic crystals, well-defined relationships can exist between the values of logA0, logA and h, measured on similar samples with differing doping or impurity levels. These relationships are derived for ionic crystals showing either Frenkel, Schottky, or interstitial disorder. In the resulting plots of logA0 versus h, approximately linear regions are shown to exist, similar to those described by the compensation law for glasses and by the Meyer-Neldel rule for semiconductors.  相似文献   

17.
The peripheral-model approach proposed previously for binary and quasi-binary direct reactions is extended to quasi-elastic (α, 2α) reactions. The calculated angular correlations functions are compared with the experimental ones for (α, 2α) reactions on 6Li, 9Be and 12C and the values of the A → B + α vertex constants are extracted from the analyses. On the whole, the peripheral-model calculations agree with experiment much better than do calculations based on the pure pole knock-out Feynman graph.  相似文献   

18.
We show from a field-theoretical approach that, if we admit that the additive renormalization function of the specific heat C is singular at the fixed point, we obtain a coherent formulation of the critical behaviour of C. Especially we show that the α<0 case, which corresponds to a cusp for C, is dominated by a critical constant Bcr generated by the long-range correlations of the fluctuations. We derive a universal combination between the leading and first correction amplitudes and Bcr, which will have a great importance in the analysis of experimental data.  相似文献   

19.
We calculate the shear viscosity η in the quark–gluon plasma (QGP) phase within a virial expansion approach with particular interest in the ratio of η to the entropy density s, i.e. η/s. The virial expansion approach allows us to include the interactions between the partons in the deconfined phase and to evaluate the corrections to a single-particle partition function. In the latter approach we start with an effective interaction with parameters fixed to reproduce thermodynamical quantities of QCD such as energy and/or entropy density. We also directly extract the effective coupling α V for the determination of η. Our numerical results give a ratio η/s≈0.097 at the critical temperature T c, which is very close to the theoretical bound of 1/(4π). Furthermore, for temperatures T≤1.8T c the ratio η/s is in the range of the present experimental estimates 0.1–0.3 at RHIC. When combining our results for η/s in the deconfined phase with those from chiral perturbation theory or the resonance-gas model in the confined phase we observe a pronounced minimum of η/s close to the critical temperature T c.  相似文献   

20.
Empirical relationships connecting equilibrium internuclear distances, harmonic force constants and atomic numbers for diatomic molecules which were presented in a recent communication by Anderson and Parr (Chem. Phys. Lett.10, 293 (1971)) are discussed in detail for 4b-6b and 1a-7b molecules as sample cases. It is shown how to estimate cubic and quartic force constants for these diatomic molecules using these relationships. Methods for estimating stretching force constants in polyatomic and excited state diatomic molecules are presented; sample cases CO2, CS2, OCS and the states of CO are treated.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号