According to the Collins’ formula and its inverse diffraction computation,this paper presents an algorithm for reconstructing the object wavefront of a numerical holograph.To improve the quality of wavefront reconstr...According to the Collins’ formula and its inverse diffraction computation,this paper presents an algorithm for reconstructing the object wavefront of a numerical holograph.To improve the quality of wavefront reconstruction,a technique of eliminating the zero-order diffraction light is introduced,which is achieved by subtraction of two intensities of the interference patterns.The computer simulation and image processing show that the method of eliminating the zero-order diffraction beam can be applied to the wavefront reconstruction of inverse diffraction computation.展开更多
Currently, most anomaly detection pattern learning algorithms require a set of purely normal data from which they train their model. If the data contain some intrusions buried within the training data, the algorithm m...Currently, most anomaly detection pattern learning algorithms require a set of purely normal data from which they train their model. If the data contain some intrusions buried within the training data, the algorithm may not detect these attacks because it will assume that they are normal. In reality, it is very hard to guarantee that there are no attack items in the collected training data. Focusing on this problem, in this paper, firstly a new anomaly detection measurement is proposed according to the probability characteristics of intrusion instances and normal instances. Secondly, on the basis of anomaly detection measure, we present a clustering-based unsupervised anomaly detection patterns learning algorithm, which can overcome the shortage above. Finally, some experiments are conducted to verify the proposed algorithm is valid.展开更多
We propose a three-party quantum secure direct communication(QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of freedom. The secret message can be encoded independently with desired...We propose a three-party quantum secure direct communication(QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of freedom. The secret message can be encoded independently with desired unitary operations in two degrees of freedom. In this protocol, a party can synchronously obtain the other two parties' messages. Compared with previous three-party QSDC protocols, our protocol has several advantages. First, the single photons in our protocol are only required to transmit for three times. This advantage makes this protocol simple and useful. Second, Alice and Bob can send different secret messages to Charlie, respectively. Finally, with hyperentanglement, this protocol has a higher information capacity than other protocols.展开更多
基金Supported bythe Natural Science Foundation of Yunnan Province(2004F0025 M)
文摘According to the Collins’ formula and its inverse diffraction computation,this paper presents an algorithm for reconstructing the object wavefront of a numerical holograph.To improve the quality of wavefront reconstruction,a technique of eliminating the zero-order diffraction light is introduced,which is achieved by subtraction of two intensities of the interference patterns.The computer simulation and image processing show that the method of eliminating the zero-order diffraction beam can be applied to the wavefront reconstruction of inverse diffraction computation.
文摘Currently, most anomaly detection pattern learning algorithms require a set of purely normal data from which they train their model. If the data contain some intrusions buried within the training data, the algorithm may not detect these attacks because it will assume that they are normal. In reality, it is very hard to guarantee that there are no attack items in the collected training data. Focusing on this problem, in this paper, firstly a new anomaly detection measurement is proposed according to the probability characteristics of intrusion instances and normal instances. Secondly, on the basis of anomaly detection measure, we present a clustering-based unsupervised anomaly detection patterns learning algorithm, which can overcome the shortage above. Finally, some experiments are conducted to verify the proposed algorithm is valid.
基金supported by the National Natural Science Foundation of China (Grant Nos. 11474168, and 11747161)the Natural Science Foundation of Jiangsu (Grant No. BK20151502)the Priority Academic Development Program of Jiangsu Higher Education Institutions, China
文摘We propose a three-party quantum secure direct communication(QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of freedom. The secret message can be encoded independently with desired unitary operations in two degrees of freedom. In this protocol, a party can synchronously obtain the other two parties' messages. Compared with previous three-party QSDC protocols, our protocol has several advantages. First, the single photons in our protocol are only required to transmit for three times. This advantage makes this protocol simple and useful. Second, Alice and Bob can send different secret messages to Charlie, respectively. Finally, with hyperentanglement, this protocol has a higher information capacity than other protocols.