We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes th...
详细信息
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes the generalized Bell states in d-dimensional Hilbert space as the quantum channels and the second scheme takes the generalized multi-particle GHZ maximally entangled states as quantum resources. In addition, Alice shares n generalized Bell states with the receiver Bob in two schemes. In order to avoid performing three-particle or multi-particle joint measurements and consuming more qudits of the multi-particle maximally entangled states, Alice introduces the generalized CNOT gate operations and then obtains higher communication efficiency than the previous schemes based on entanglement swapping.
Standard backprojection technique is used in typical through-wall synthetic aperture radar (TWSAR) image, it implicitly assumes infinite beamwidth, whereby the entire target area is illuminated and returns are collect...
详细信息
Standard backprojection technique is used in typical through-wall synthetic aperture radar (TWSAR) image, it implicitly assumes infinite beamwidth, whereby the entire target area is illuminated and returns are collected from all points in the imaging grid, and this decreases the efficiency of the algorithm by summing over unnecessary grid points. In order to eliminate the disadvantage, the time-domain backprojection method based on finite beamwidth processing is proposed in the paper. The processing method is designed to be more physically realistic by accounting for the actual antenna pattern. Simulation results show that depending on the width of the effective beam, the number of processing loops can be reduced by up to 50%, while still maintaining good image quality in terms of the reconstructed target response.
Content-aware music adaption, i.e. music resizing, in temporal constraints starts drawing attention from multimedia communities because of the need of real-world scenarios, e.g. animation production and radio advertis...
详细信息
To meet the increasing capacity and mobility as well as decrease the costs in next-generation optical access networks, RoF technology is a promising technique in the emerging optical and wireless convergence network, ...
详细信息
ISBN:
(纸本)9781849195058
To meet the increasing capacity and mobility as well as decrease the costs in next-generation optical access networks, RoF technology is a promising technique in the emerging optical and wireless convergence network, mm-wave generation is a key technique to realize the convergence network. In this paper, existing optical mm-wave generation technologies are introduced, including direct modulation, optical heterodyning and external modulation. Associated with Shanghai University, a scheme based on Optical Frequency Multiplication employing a dual drive Mach-Zehnder Modulator (DD-MZM) is presented. The novel efficient technique does not require expensive high-frequency electrical equipment. Moreover, no optical filtering is used, which significantly reduces the cost.
This papa- reports the optical signal transmission characteristic in the G.652 fiber based on the software *** simulation results are in agreement with theoretical analysis. Without taking into account the non-lin...
详细信息
This papa- reports the optical signal transmission characteristic in the G.652 fiber based on the software *** simulation results are in agreement with theoretical analysis. Without taking into account the non-linear effect and in the same condition, the longer the transmission distance, the signal distortion caused by the group velocity dispersion is clearer while the bit rate increasing,. Through reducing the initial chirp of optical signal, the distortion can be reduced at fiber-optic transmission, and the transmission quality is improved.
Support vector machines (SVMs) and related kernel-based algorithms have become one of the most popular approaches for many machine learning problems. but little is known about the structure of their reproducing kernel...
详细信息
Support vector machines (SVMs) and related kernel-based algorithms have become one of the most popular approaches for many machine learning problems. but little is known about the structure of their reproducing kernel Hilbert spaces (RKHS). In this work, based on Mercer's Theorem, the relation among reproducing kernel (RK) and Mercer kernel, and their roles in SVMs are discussed, corresponding to some important theorems and consequences are given. Furthermore, a novel framework of reproducing kernel support vector machines (RKSVM) is proposed. The simulation results are presented to illustrate the feasibility of the proposed method. Choosing a proper Mercer kernel for different tasks is an important factor for studying the result of the SVMs.
How to make use of limited memory space and processing speeds of computer for rapid and accurate data mining has become an important research topic on the stream data cluster analysis. A stream data clustering algorit...
详细信息
How to make use of limited memory space and processing speeds of computer for rapid and accurate data mining has become an important research topic on the stream data cluster analysis. A stream data clustering algorithm based on the minimum spanning tree (MSTSC) is described. MSTSC is divided into online processing and offline clustering. Stream data are analyzed online by using two groups of processing unit respectively. In offline process clusters is taken as representative objects, and the minimum spanning tree algorithm is used in offline clustering. MSTSC can improve the clustering quality on non-spherical clusters. Some experiments are carried out in both real data sets and synthetic data sets. Results show that MSTSC algorithm not only can deal with non-spherical clusters effectively, but also has better efficiency and clustering quality. In addition, MSTSC is insensitive to order of input data, and has a good effect for skewed class distributions.
In this paper, group velocity dispersion (GVD) and second-order GVD effects are shortly discussed and then the limitations on the bit rate induced by dispersion or second-order GVD are estimated. For relative higher p...
详细信息
In this paper, group velocity dispersion (GVD) and second-order GVD effects are shortly discussed and then the limitations on the bit rate induced by dispersion or second-order GVD are estimated. For relative higher pulse energy and shorter pulse width in 40Gbit/s systems, self-phase modulation(SPM) is significant. The combined effect of GVD and SPM on the propagation pulses are analyzed through Nonlinear Schrödinger Equation(NLSE).
A novel scheme is developed to compute correctly the induced current based on the Electric field integral equation (EFIE) by the Method of moments (MOM) at resonant frequencies. As a First step, the inaccurate induced...
详细信息
A novel scheme is developed to compute correctly the induced current based on the Electric field integral equation (EFIE) by the Method of moments (MOM) at resonant frequencies. As a First step, the inaccurate induced current is obtained by solving the EFIE. Then, the scattered magnetic field due to the inaccurate induced current is calculated at any given point on the surface of the object. Finally, the accurate induced current at any given point is determined through the total magnetic field. The proposed approach is applied to the case of the infinitely Perfectly electric conducting (PEC) cylinder and PEC sphere to check its accuracy and efficiency. It is found that the numerical results match the analytical solution or the Combined field integral equation (CFIE) solution.
China is the largest food consumption country in the world. With the social and economic development, China's food security has become a global attention. Grain security research involves many uncertain factors: a...
详细信息
China is the largest food consumption country in the world. With the social and economic development, China's food security has become a global attention. Grain security research involves many uncertain factors: as well as quantitative and qualitative information. In order to get the grain security status comprehensively, we proposed a method to evaluate risk in grain security based on multifactor information fusion. In the method, the quantitative and qualitative information were used to construct the basic probability assignment, and the attribute weights was got based on the Analytic Hierarchy Process method. After that, the multifactor fusion results were got based on the Dempster combination rule. The effectiveness of the method was verified with a numeric example that the data comes from the yearbook of China in 2007. The Results show that the method is effective and can correctly reflect the grain safety warning degrees.
暂无评论