Underwater vehicles operating in close proximity suffer from significant hydrodynamic interactions, especially when there is a prominent vehicle size disparity. To gain profound insights into the physical mechanisms o...
详细信息
Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important rol...
详细信息
Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this *** this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography *** the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by *** on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is *** last,the complete setup for realizing the PFM attack is presented with all ***,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.
Based on the dual mixed variational formulation with three variants (stress, displacement, displacement on contact boundary) and the unilateral beaming problem of finite element discretization, an Uzawa type iterative...
详细信息
Based on the dual mixed variational formulation with three variants (stress, displacement, displacement on contact boundary) and the unilateral beaming problem of finite element discretization, an Uzawa type iterative algorithm is presented. The convergence of this iterative algorithm is proved, and then the efficiency of the algorithm is tested by a numerical example.
Trust region (TR) algorithms are a class of recently developed algorithms for nonlinear optimization. A new family of TR algorithms for unconstrained optimization, which is the extension of the usual TR method, is pre...
详细信息
Trust region (TR) algorithms are a class of recently developed algorithms for nonlinear optimization. A new family of TR algorithms for unconstrained optimization, which is the extension of the usual TR method, is presented in this paper. When the objective function is bounded below and continuously, differentiable, and the norm of the Hesse approximations increases at most linearly with the iteration number, we prove the global convergence of the algorithms. Limited numerical results are reported, which indicate that our new TR algorithm is competitive.
Weakly supervised 3D semantic segmentation has successfully mitigated the labor-intensive and time-consuming task of annotating 3D point clouds. However, reliably utilizing the minimal point-wise annotations for unlab...
详细信息
Linear systems associated with numerical methods for constrained optimization are discussed in this paper. It is shown that the corresponding subproblems arise in most well-known methods, no matter line search methods...
详细信息
Linear systems associated with numerical methods for constrained optimization are discussed in this paper. It is shown that the corresponding subproblems arise in most well-known methods, no matter line search methods or trust region methods for constrained optimization can be expressed as similar systems of linear equations. All these linear systems can be viewed as some kinds of approximation to the linear system derived by the Lagrange-Newton method. Some properties of these linear systems are analyzed.
The Beale\|Powell restart algorithm is highly useful for large\|scale unconstrained optimization. An example is taken to show that the algorithm may fail to converge. The global convergence of a slightly modified algo...
详细信息
The Beale\|Powell restart algorithm is highly useful for large\|scale unconstrained optimization. An example is taken to show that the algorithm may fail to converge. The global convergence of a slightly modified algorithm is proved.
Existing visual saliency prediction methods mainly focus on single-modal visual saliency prediction, while ignoring the significant impact of text on visual saliency. To more comprehensively explore the influence of t...
详细信息
With the rapid proliferation of crowd mobility data produced by ubiquitous mobile devices equipped with spatial positioning modules, deep neural networks (DNNs) have become widely applied in spatio-temporal trajectory...
详细信息
Tightly focused optical fields are essential in nano-optics, but their applications have been limited by the challenges of accurate yet efficient characterization. In this article, we develop an in situ method for rec...
暂无评论