Cloud computing is experiencing a rapid development since a large amount of data need to be addressed. How to carry on the reasonable task scheduling plays a vital role in the operating efficiency of cloud computing. ...
详细信息
We present an efficient scheme for the complete analysis of hyperentangled Greenberger–Horne–Zeilinger(GHZ)state in polarization and time-bin degrees of freedom with two steps. Firstly, the polarization GHZ state is...
详细信息
We present an efficient scheme for the complete analysis of hyperentangled Greenberger–Horne–Zeilinger(GHZ)state in polarization and time-bin degrees of freedom with two steps. Firstly, the polarization GHZ state is distinguished completely and nondestructively, resorting to the controlled phase flip(CPF) gate constructed by the cavity-assisted interaction. Subsequently, the time-bin GHZ state is analyzed by using the preserved polarization entanglement. With the help of CPF gate and self-assisted mechanism, our scheme can be directly generalized to the complete N-photon hyperentangled GHZ state analysis, and it may have potential applications in the hyperentanglement-based quantum communication.
Rate control is one of the key factors influencing the multi-view video ***,there is not a rate control algorithm in the existing Joint Multi-view Video Coding *** this paper,an efficient rate control algorithm and a ...
详细信息
Rate control is one of the key factors influencing the multi-view video ***,there is not a rate control algorithm in the existing Joint Multi-view Video Coding *** this paper,an efficient rate control algorithm and a bit allocation strategy for multi-view video coding are *** order to obtain the consistent view quality,a bit allocation model based on the Lagrange optimum algorithm is firstly ***,considering the encoding statistical characteristics of different view types,a view weighting factor is introduced,and it will help improve the precision of bit allocation among *** with the fixed QP control strategy,experiment results show that the proposed algorithm can efficiently control the bit rate and obtain more consistent views,with video visual quality improved.
We present a simple method on the generation of any bi-photon superposition state using only linear *** this scheme, the input states, a two-mode squeezed state and a bi-photon state, meet on a beam-splitter and the o...
详细信息
We present a simple method on the generation of any bi-photon superposition state using only linear *** this scheme, the input states, a two-mode squeezed state and a bi-photon state, meet on a beam-splitter and the output states are post-selected with two threshold single-photon detectors. We carry out corresponding numerical simulations by accounting for practical experimental conditions, calculating both the Wigner function and the state fidelity of those generated bi-photon superposition states. Our simulation results demonstrate that not only distinct nonclassical characteristics but also very high state fidelities can be achieved even under imperfect experimental conditions.
wirelesssensornetworks (WSN) are mainly characterized by a potentially large number of distributed sensor nodes which collectively transmit information about sensed events to the sink. In this paper, we present a ce...
详细信息
We present an efficient entanglement purification protocol (EPP) with controlled-not (CNOT) gates and linear optics. With the CNOT gates, our EPP can reach a higher fidelity than the conventional one. Moreover, it...
详细信息
We present an efficient entanglement purification protocol (EPP) with controlled-not (CNOT) gates and linear optics. With the CNOT gates, our EPP can reach a higher fidelity than the conventional one. Moreover, it does not require the fidelity of the initial mixed state to satisfy 1 2. If the initial state is not entangled, it still can be purified. With the linear optics, this protocol can get pure maximally entangled pairs with some probabilities. Meanwhile, it can be used to purify the entanglement between the atomic ensembles in distant locations. This protocol may be useful in long-distance quantum communication.
The proposed trusted network is respond to the increasingly prominent internal network security threats. At present, research on trusted networks focuses on two aspects: pre-network access check and dynamic evaluation...
详细信息
It is known that there exist two kinds of methods for direction-of-arrival (DOA) estimation in the literature: the subspace-based method and the sparsity-based method. However, pervious works reveal that the former me...
详细信息
A novel trust transmission method which is based on the similarities of nodes in trust models is proposed in this paper. Trust transmission is evaluated by calculating the similarity between recommenders when trustor ...
详细信息
wireless multimedia sensornetworks consist of unattended multimedia nodes with limited storage, energy and computation and communication capabilities. And energy is the most crucial resource for nodes. Clustering tec...
详细信息
暂无评论