The ground states of some many-body quantum systems can serve as resource states for the one-way quantum computing model, achieving the full power of quantum computation. Such resource states are found, for example, i...
详细信息
The ground states of some many-body quantum systems can serve as resource states for the one-way quantum computing model, achieving the full power of quantum computation. Such resource states are found, for example, in spin-52 and spin-32 systems. It is, of course, desirable to have a natural resource state in a spin-12, that is, qubit system. Here, we give a negative answer to this question for frustration-free systems with two-body interactions. In fact, it is shown to be impossible for any genuinely entangled qubit state to be a nondegenerate ground state of any two-body frustration-free Hamiltonian. What is more, we also prove that every spin-12 frustration-free Hamiltonian with two-body interaction always has a ground state that is a product of single- or two-qubit states. In other words, there cannot be any interesting entanglement features in the ground state of such a qubit Hamiltonian.
The contour analysis and identification are the important aspects in visual surveillance *** paper proposes a fuzzy identification method of ***,according to the description of a contour based on the chain-code method...
详细信息
ISBN:
(纸本)9781457718342
The contour analysis and identification are the important aspects in visual surveillance *** paper proposes a fuzzy identification method of ***,according to the description of a contour based on the chain-code method,the proposed method utilizes the statistical features of contours including the chain-code entropy and chain-code space distribution entropies,from which the feature vector of a contour is ***,the method generates the contour pattern from some contour samples and uses the approaching principle to identify a *** our method integrates effectively multiple statistical feathers of its chain-code and employs a fuzzy pattern recognition technique,the experiments show quantitatively that it can achieve good results from various metrics.
The contour analysis and identification are the important aspects in visual surveillance research. The paper proposes a fuzzy identification method of contours. First, according to the description of a contour based o...
详细信息
Based on the susceptible-infective-removed (SIR) compartmental model and real conditions of computer virus outbreaks, we present a new epidemic model with cleared or repair state to investigate epidemic spreading beha...
详细信息
Assessment of employee performance lays the foundation for enterprises to motivate their employees and work out compensation allocation schemes, so how to evaluate employee performance objectively and scientifically b...
详细信息
Due to the features of the multi-spectral images, the result with the usual methods based on the support vector machine (SVM) and binary tree is not satisfactory. In this paper, a fuzzy SVM multi-class classifier with...
详细信息
Due to the features of the multi-spectral images, the result with the usual methods based on the support vector machine (SVM) and binary tree is not satisfactory. In this paper, a fuzzy SVM multi-class classifier with the binary tree is proposed for the classification of multi-spectral images. The experiment is conducted on a multi-spectral image with 6 bands which contains three classes of terrains. The experimental results show that this method can improve the segmentation accuracy.
An adaptive strategy was proposed for EH system. Modules of attack detection, feedback transmission and adaptive control were added to original EH system. They could help to make threats analysis and adjust hopping st...
详细信息
An adaptive strategy was proposed for EH system. Modules of attack detection, feedback transmission and adaptive control were added to original EH system. They could help to make threats analysis and adjust hopping strategy in real time, so as to reduce the probability of the system stepping into the attackers' target area. With the experiments proving the anti-attack ability of the prototype system, the feasibility and effectiveness of adaptive strategy were demonstrated for EH system.
Spike sorting is the essential step in analyzing recording spike signals for studying information processing mechanisms within the nervous system. Overlapping is one of the serious problems in the spike sorting of mul...
详细信息
Botnet is one of the major security threats to Internet. In this paper, botnet communication and attack patterns were introduced, and the discovery method of botnet based on abnormal behavior was studied. For the curr...
详细信息
A new clustering classification approach based on fuzzy closeness relationship (FCR) is studied in this paper. As we know, fuzzy clustering classification is one of important and valid methods to knowledge discovery. ...
详细信息
暂无评论