排序方式: 共有78条查询结果,搜索用时 15 毫秒
21.
22.
C. Posadas-Castillo R.M. Lpez-Gutirrez C. Cruz-Hernndez 《Communications in Nonlinear Science & Numerical Simulation》2008,13(8):1655-1667
In this paper, the synchronization problem of coupled chaotic lasers in master–slave configuration is numerically studied. The approach used allows to give a simple design procedure for the slave laser. In particular, we consider a complex system composed by two chaotic Nd:YAG lasers coupled through the first state variable of the master laser. Synchronization of chaotic Nd:YAG lasers is achieved by injecting the chaotic signal from the master Nd:YAG laser into the slave Nd:YAG laser. The robustness of synchronization is discussed when a mismatch of parameters occurs, and the effects of the channel noise on recovered information are showed. A potential application of chaotic synchronization of Nd:YAG lasers to transmit encrypted digital information is also given. 相似文献
23.
HU Qianqian & WANG Guojin Department of Mathematics Zhejiang University Hangzhou China State Key Laboratory of CAD&CG Zhejiang University Hangzhou China 《中国科学A辑(英文版)》2005,48(9):1209-1222
Using algebraic and geometric methods,functional relationships between a point on a conic segment and its corresponding parameter are derived when the conic segment is presented by a rational quadratic or cubic Bézier curve.That is,the inverse mappings of the mappings represented by the expressions of rational conic segments are given.These formulae relate some triangular areas or some angles,determined by the selected point on the curve and the control points of the curve,as well as by the weights of the rational Bézier curve.Also,the relationship can be expressed by the corresponding parametric angles of the selected point and two endpoints on the conic segment,as well as by the weights of the rational Bézier curve.These results are greatly useful for optimal parametrization,reparametrization,etc.,of rational Bézier curves and surfaces. 相似文献
24.
针对现有量子信息直传协议在有噪音量子信道下传输效率低及可靠性差的问题,提出了一种有效利用纠缠资源的量子安全直传通信方案.通过收发双方共享纠缠粒子作为辅助比特,采用纠缠辅助量子低密度校验码对量子态信息进行前向纠错保护,以提高系统在噪音环境下的传输可靠性.同时采用自动请求重传策略对量子态信息进行检错编码保护,当因窃听或强噪音导致译码获得的信息不正确时,则请求发端对该组信息进行编码重传操作.文中对所选用纠缠辅助量子低密度校验码在量子退极化噪音信道下的迭代译码性能进行了仿真,最后对方案的安全性进行了分析论证. 相似文献
25.
In the paper we propose a new method of constructing cryptosystems utilising a nonpredictability property of discrete chaotic systems. We formulate the requirements for such systems to assure their safety. We also give examples of practical realisation of chaotic cryptosystems, using a generalisation of the method presented in [7]. The proposed algorithm of encryption and decryption is based on multiple iteration of a certain dynamical chaotic system. We assume that some part of the initial condition is a plain message. As the secret key we assume the system parameter(s) and additionally another part of the initial condition. 相似文献
26.
双原子分子电子振动光谱的转动结构分析 总被引:6,自引:3,他引:3
本文分析了双原子分子电子振动光谱的转动结构规律,说明了如何对电子振转光谱进行标识,从而获得不同电子态的转动常数、转动惯量和核间距。 相似文献
27.
BOTDR (Brillouin optical-fiber time domain reflectometry) is a promising technique for measuring the strain distribution along an optical fiber which can be used for diagnosing civil structures. However, there is a trade-off between the spatial and the frequency resolutions, and its practical spatial resolution is limited to about 1 m; to date the application scope has been restricted. In order to enhance the spatial resolution without decreasing the measurement accuracy, we intentionally introduce two kinds of strain within the spatial resolution length determined by the optical pulse width, which results in Brillouin gain spectrum separation. In this paper, we describe the theoretical analysis of the spectrum separation method together with experimental verification, where a spatial resolution of 0.5 m is demonstrated. We further propose a new parabolic data fitting method especially effective in the spectrum separation method. 相似文献
28.
29.
Richard Pibernik Yingying Zhang Florian Kerschbaum Axel Schröpfer 《European Journal of Operational Research》2011
It is a well-acknowledged fact that collaboration between different members of a supply chain yields a significant potential to increase overall supply chain performance. Sharing private information has been identified as prerequisite for collaboration and, at the same time, as one of its major obstacles. One potential avenue for overcoming this obstacle is Secure Multi-Party Computation (SMC). SMC is a cryptographic technique that enables the computation of any (well-defined) mathematical function by a number of parties without any party having to disclose its input to another party. In this paper, we show how SMC can be successfully employed to enable joint decision-making and benefit sharing in a simple supply chain setting. We develop secure protocols for implementing the well-known “Joint Economic Lot Size (JELS) Model” with benefit sharing in such a way that none of the parties involved has to disclose any private (cost and capacity) data. Thereupon, we show that although computation of the model’s outputs can be performed securely, the approach still faces practical limitations. These limitations are caused by the potential of “inverse optimization”, i.e., a party can infer another party’s private data from the output of a collaborative planning scheme even if the computation is performed in a secure fashion. We provide a detailed analysis of “inverse optimization” potentials and introduce the notion of “stochastic security”, a novel approach to assess the additional information a party may learn from joint computation and benefit sharing. Based on our definition of “stochastic security” we propose a stochastic benefit sharing rule, develop a secure protocol for this benefit sharing rule, and assess under which conditions stochastic benefit sharing can guarantee secure collaboration. 相似文献
30.
In this paper, we investigate secure uplink and downlink communications between an unmanned aerial vehicle (UAV) and multiple user equipments (UEs) in the presence of multiple ground-based eavesdroppers (EVs) and unfriendly jammers. In order to guarantee the secure uplink and downlink transmissions, we consider a novel secure transmission scheme, which involves a power splitting based downlink transmission and scheduling of uplink and downlink transmission. Explicitly, we aim to maximize the average secrecy rate (ASR) by optimizing the UAV trajectory, the transmit power of the UAV and UEs, and scheduling of uplink and downlink transmission. Although the formulated problem is nonconvex, we propose an efficient solution by jointly applying the techniques of block coordinate descent and successive convex approximation. Numerical results show that the proposed scheme achieves a better ASR than the benchmark schemes. 相似文献