We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes th...
详细信息
In order to probe the secret of our brain, it is necessary to design large scale dynamical neural circuits( more than 106 neurons) to simulate complex process of our brain. But such kind task is not easy to achieve on...
详细信息
Vladimir N. Vapnik. (1998) pointed out that maxlikelihood functions in EM algorithms are just a special risk function. Based on this opinion, a novel EM algorithm uses a risk function differ with maxlikelihood functio...
详细信息
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, d...
详细信息
This article covers a problem that often arises in real life situations-the maximum flow problem. This problem is a classical combinatorial optimization problem, which arises in many engineering and scientific applica...
详细信息
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to...
详细信息
Contourlet transform is the combination of the multi-scale analysis and multi-directional analysis in processing high-dimensional signals and has better approximation precision and better sparse description. Firstly, ...
详细信息
Digital steganography is a kind of data security technique. In this paper, a new information hiding scheme was proposed. In this scheme, we embed secret message into still digital images based on (7, 4) Hamming Code a...
详细信息
This paper presents a method for monitoring the particle swarm optimization process that accounts for the random nature of the system's external environment and the fuzzy character of the particles' decision-m...
详细信息
暂无评论