期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
月称《明句论》中的自他共比量 被引量:2
1
作者 王俊淇 《世界哲学》 CSSCI 北大核心 2020年第3期78-88,160,共12页
活跃于六七世纪的印度中观派论师月称,在《明句论》一书中,批评了清辨论师所采用的自立比量。其中,月称所用技巧与汉传因明自他共三比量之说非常接近。对比此二者,可以为我们理解月称思想与汉传因明的起源提供有益的视角与材料。本文在... 活跃于六七世纪的印度中观派论师月称,在《明句论》一书中,批评了清辨论师所采用的自立比量。其中,月称所用技巧与汉传因明自他共三比量之说非常接近。对比此二者,可以为我们理解月称思想与汉传因明的起源提供有益的视角与材料。本文在分析月称《明句论》梵文本的基础上,着重考察自他共三比量视角下月称思想的样态,进而得出如下结论:月称归谬论法的核心是“他比量”;他认为清辨的自立比量只是一种“自比量”,不具备能破的功能;月称所用技巧更为质朴、简洁,与汉传因明中的三比量说的复杂形成了鲜明对比。因此,月称之说可能代表了三比量发展的较早阶段,为我们了解三比量说乃至汉传因明的起源和发展提供了珍贵的原始资料。 展开更多
关键词 月称 明句论 自他共比量 因明
原文传递
《明句论》中的归谬、归谬翻转与他比量
2
作者 王俊淇 《逻辑学研究》 CSSCI 2021年第4期77-88,共12页
归谬法与归谬翻转法是佛教知识论中一组重要的论证方法。一直以来关于它们的研究,多以陈那、法称及其后学为关注点,时而会关注到中观派的清辨论师。众所周知,归谬法是中观派,特别是被后世称为“中观应成派”的学者月称所倚重的论证手段... 归谬法与归谬翻转法是佛教知识论中一组重要的论证方法。一直以来关于它们的研究,多以陈那、法称及其后学为关注点,时而会关注到中观派的清辨论师。众所周知,归谬法是中观派,特别是被后世称为“中观应成派”的学者月称所倚重的论证手段。然而,令人意外的是,先行研究在对归谬法与归谬翻转法的考察中,都普遍忽略了月称,特别是没有意识到月称以自他共比量理论重塑了归谬翻转法的意义这一点。本文在分析月称《明句论》文本的基础上指出,清辨与月称二人都承袭了陈那的做法,以归谬翻转法来为归谬法的合法性做辩护;不过,二者不同之处在于,前者与陈那一样将归谬翻转式视为共比量,而后者将其视为对论者自许的他比量。这是月称既不同于其思想来源的陈那、清辨,也不同于法称及其后学的最关键之处。 展开更多
关键词 《明句论》 归谬 归谬翻转 比量 共比量
下载PDF
Quantum Secret Sharing Using GHZ-Like State 被引量:2
3
作者 谢朝任 蔡家纬 黄宗立 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第12期1019-1022,共4页
This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GH... This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GHZ-based QSS protocols with the same assumptions, the proposed protocol provides the best quantum bit efficiency. 展开更多
关键词 quantum cryptography quantum secret sharing GHZ-like state
下载PDF
Copper partitioning between granitic silicate melt and coexisting aqueous fluid at 850°C and 100 MPa 被引量:3
4
作者 Shuilong Wang Hui Li +3 位作者 Linbo Shang Xianwu Bi Xinsong Wang Wenlin Fan 《Acta Geochimica》 EI CAS CSCD 2016年第4期381-390,共10页
Experiments on the partitioning of Cu between different granitic silicate melts and the respective coexisting aqueous fluids have been performed under conditions of 850 ℃, 100 MPa and oxygen fugacity (fO2) buffered... Experiments on the partitioning of Cu between different granitic silicate melts and the respective coexisting aqueous fluids have been performed under conditions of 850 ℃, 100 MPa and oxygen fugacity (fO2) buffered at approaching Ni-NiO (NNO). Partition coefficients of Cu (Dcu = Cfluid/Cmelt) were varied with different alumina/alkali mole ratios [Al2O3/(Na2O + K2O), abbreviated as Al/ Alk], Na/K mole ratios, and SiO2 mole contents. The DCu increased from 1.28 ± 0.01 to 22.18 ±0.22 with the increase of Al/Alk mole ratios (ranging from 0.64 to 1.20) and Na/K mole ratios (ranging from 0.58 to 2.56). The experimental results also showed that Dcu was positively correlated with the HCl concentration of the starting fluid. The Dcu was independent of the SiO2 mole content in the range of SiO2 content considered. No Dcu value was less than 1 in our experiments at 850 ℃ and 100 MPa, indicating that Cu preferred to enter the fluid phase rather than the coexisting melt phase under most conditions in the melt-fluid system, and thus a significant amount of Cu could be transported in the fluid phase in the magmatichydrothermal environment. The results indicated that Cu favored partitioning into the aqueous fluid rather than the melt phase if there was a high Na/K ratio, Na-rich, peraluminous granitic melt coexisting with the high Cl^- fluid. 展开更多
关键词 CU Experimental study Partition coefficient Granitic silicate melt - Aqueous fluid
下载PDF
Quantum Probabilistic Encryption Scheme Based on Conjugate Coding 被引量:2
5
作者 杨理 向憧 李宝 《China Communications》 SCIE CSCD 2013年第2期19-26,共8页
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryp... We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack. 展开更多
关键词 quantum cryptography probabil-istic encryption information-theoretic in-distinguishability
下载PDF
An Efficient Scheme for Multiparty Multi-particle State Sharing
6
作者 石润华 黄刘生 +1 位作者 杨威 仲红 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第7期93-97,共5页
We present an efficient scheme for sharing an arbitrary m-qubit state with n agents.In our scheme,the sender Alice first shares m Bell states with the agent Bob,who is designated to recover the original m-qubit state.... We present an efficient scheme for sharing an arbitrary m-qubit state with n agents.In our scheme,the sender Alice first shares m Bell states with the agent Bob,who is designated to recover the original m-qubit state.Furthermore,Alice introduces n-1 auxiliary particles in the initial state |0>,applies Hadamard (H) gate and Controlled-Not(CNOT) gate operations on the particles,which make them entangled with one of m particle pairs in Bell states,and then sends them to the controllers (i.e.,other n-1 agents),where each controller only holds one particle in hand.After Alice performing m Bell-basis measurements and each controller a single-particle measurement,the recover Bobcan obtain the original unknown quantum state by applying the corresponding local unitary operations on his particles.Its intrinsic efficiency for qubits approaches 100%,and the total efficiency really approaches the maximal value. 展开更多
关键词 quantum information quantum cryptography quantum secret sharing quantum state sharing
下载PDF
文轨《因明入正理论疏》评介
7
作者 郑伟宏 《法音》 北大核心 2000年第10期14-19,共6页
关键词 《庄严疏》 《理门论》 因明思想 陈那 窥基 文轨 《因明入正理论疏》 宗同品 世亲 因同品 共比量 支那内学院 九句因 能别 唐疏
原文传递
Single-Qubit Operation Sharing with Bell and W Product States 被引量:2
8
作者 季启彬 刘益民 +2 位作者 刘先松 尹晓峰 张战军 《Communications in Theoretical Physics》 SCIE CAS CSCD 2013年第8期165-170,共6页
Two tripartite schemes are put forward with shared entanglements and Local Operation and Classical Communication (LOCC) for sharing an operation on a remote target sate.The first scheme uses a Bell and a symmetric W s... Two tripartite schemes are put forward with shared entanglements and Local Operation and Classical Communication (LOCC) for sharing an operation on a remote target sate.The first scheme uses a Bell and a symmetric W states as quantum channels,while the second replaces the symmetric W state by an asymmetric one.Both schemes are treated and compared from the aspects of quantum resource consumption,operation complexity,classical resource consumption,success probability and efficiency.It is found that the latter scheme is better than the former one.Particularly,the sharing can be achieved only probabilistically with the first scheme deterministically with the second one. 展开更多
关键词 single-qubit operation sharing Bell state symmetric W state asymmetric W state
原文传递
Quantum Secret Sharing with Error Correction 被引量:2
9
作者 Aziz Mouzali Fatiha Merazka Damian Markham 《Communications in Theoretical Physics》 SCIE CAS CSCD 2012年第11期661-671,共11页
We investigate in this work a quantum error correction on a five-qubits graph state used for secret sharing through five noisy channels. We describe the procedure for the five, seven and nine qubits codes. It is known... We investigate in this work a quantum error correction on a five-qubits graph state used for secret sharing through five noisy channels. We describe the procedure for the five, seven and nine qubits codes. It is known that the three codes always allow error recovery if only one among the sent qubits is disturbed in the transmitting channel. However, if two qubits and more are disturbed, then the correction will depend on the used code. We compare in this paper the three codes by computing the average fidelity between the sent secret and that measured by the receivers. We will treat the case where, at most, two qubits are affected in each one of five depolarizing channels. 展开更多
关键词 quantum correction graph state quantum secret sharing Feynman program
原文传递
A novel and efficient multiparty quantum secret sharing scheme using entangled states 被引量:4
10
作者 MASSOUD Hadian Dehkordi ELHAM Fattahi 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2012年第10期1828-1831,共4页
We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our ... We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our scheme simple and safe.The operations which are needed to recover secret message,are only exclusive-or addition and complement operation.Moreover it is shown that this scheme is secure against eavesdropping.Also this scheme provides the best quantum bit efficiency compared with some famous quantum secret sharing schemes. 展开更多
关键词 quantum secret sharing entangled state MULTIPARTY quantum cryptography
原文传递
Colourimetric redox-polyaniline nanoindicator for in situ vesicular trafficking of intracellular transport 被引量:2
11
作者 Eun Bi Choi Jihye Choi +9 位作者 Seo Ryung Bae Hyun-Ouk Kim EunjiJang Byunghoon Kang Myeong-Hoon Kim Byeongyoon Kim Jin-Suck Suh Kwangyeol Lee Yong-Min Huh Seungjoo Haam 《Nano Research》 SCIE EI CAS CSCD 2015年第4期1169-1179,共11页
Vesicular pH modulates the function of many organelles and plays a pivotal role in cell metabolism processes such as proliferation and apoptosis. Here, we introduce a simple colorimetric redox-polyaniline nanoindicato... Vesicular pH modulates the function of many organelles and plays a pivotal role in cell metabolism processes such as proliferation and apoptosis. Here, we introduce a simple colorimetric redox-polyaniline nanoindicator, which can detect and quantify a broader biogenic pH range with superior sensitivity compared to pre-established trafficking agents employing one-dimensional turn-on of the fluorescence resonance-energy-transfer (FRET) signal. We fabricated polyaniline- based nanoprobes, which exhibited convertible transition states according to the proton levels, as an in situ indicator of vesicular transport pH. Silica-coated Fe304-MnO heterometal nanoparticles were synthesised and utilised as a metal oxidant to polymerise the aniline monomer. Finally, silica-coated polyaniline nanoparticles with adsorbed cyanine dye fluorophores Cy3 and Cy7 (FPSNIcyB and FPSNIcy7) were fabricated as proton-sensitive nanoindicators. Owing to the selective quenching induced by the local pH variations of vesicular transport, FPSNIcy3 and FPSNIcy7 demonstrated excellent intracellular trafficking and provided sensitive optical indication of minute proton levels. 展开更多
关键词 redox PH intraceUular compartments organic quencher conducting polymer nanoindicator
原文传递
Experimental realization of single-shot nonadiabatic holonomic gates in nuclear spins 被引量:5
12
作者 Hang Li Yang Liu GuiLu Long 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2017年第8期1-7,共7页
Nonadiabatic holonomic quantum computation has received increasing attention due to its robustness against control errors. However, all the previous schemes have to use at least two sequentially implemented gates to r... Nonadiabatic holonomic quantum computation has received increasing attention due to its robustness against control errors. However, all the previous schemes have to use at least two sequentially implemented gates to realize a general one-qubit gate. Based on two recent reports, we construct two Hamiltonians and experimentally realized nonadiabatic holonomic gates by a single-shot implementation in a two-qubit nuclear magnetic resonance (NMR) system. Two noncommuting one-qubit holonomic gates, rotating along .~ and ~ axes respectively, are implemented by evolving a work qubit and an ancillary qubit nonadiabatically following a quantum circuit designed. Using a sequence compiler developed for NMR quantum information processor, we optimize the whole pulse sequence, minimizing the total error of the implementation. Finally, all the nonadiabatic holonomic gates reach high unattenuated experimental fidelities over 98%. 展开更多
关键词 nonadiabatic holonomic quantum computation nuclear magnetic resonance quantum process tomography
原文传递
Multiple Multi-Qubit Quantum States Sharing
13
作者 秦华旺 戴跃伟 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第4期460-464,共5页
A multiple multi-qubit quantum states sharing scheme is proposed,in which the dealer can share multiple multi-qubit quantum states among the participants through only one distribution and one recovery.The dealer encod... A multiple multi-qubit quantum states sharing scheme is proposed,in which the dealer can share multiple multi-qubit quantum states among the participants through only one distribution and one recovery.The dealer encodes the secret quantum states into a special entangled state,and then distributes the particles of the entangled state to the participants.The participants perform the single-particle measurements on their particles,and can cooperate to recover the multiple multi-qubit quantum states.Compared to the existing schemes,our scheme is more efficient and more flexible in practice. 展开更多
关键词 quantum secret sharing multiple quantum states sharing multi-qubit quantum state sharing quantum cryptography
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部