Recently Jiang et al.[Chin.Phys.Lett.24 (2007) 1144] gave a scheme for probabilistic controlled tele-portation of a triplet W state from the sender Alice to the distant receiver Bob.The m controlled qubits are sharedb...Recently Jiang et al.[Chin.Phys.Lett.24 (2007) 1144] gave a scheme for probabilistic controlled tele-portation of a triplet W state from the sender Alice to the distant receiver Bob.The m controlled qubits are sharedby m(s_1,s_2,...,s_m) spatially-separated supervisors.Based on transformation operator,we can extend to teleporting anarbitrary three-qubit state.The relation between the transformation operators and the Bob's unitary transformation isalso obtained.展开更多
In this paper, using the Hirota's bilineax method, we consider the N = 1 supersymmetric Sawada-Kotera- Ramani equation and obtain the Bazcklund transformation of it. Its one- and two-supersoliton solutions axe obtain...In this paper, using the Hirota's bilineax method, we consider the N = 1 supersymmetric Sawada-Kotera- Ramani equation and obtain the Bazcklund transformation of it. Its one- and two-supersoliton solutions axe obtained and N-supersoliton solutions for N ≥ 3 are given under the condition kiξj = kjξi.展开更多
To solve the homogeneous transformation equation of the form AX=XB in hand-eye calibration, where X represents an unknown transformation from the camera to the robot hand, and A and B denote the known movement transfo...To solve the homogeneous transformation equation of the form AX=XB in hand-eye calibration, where X represents an unknown transformation from the camera to the robot hand, and A and B denote the known movement transformations associated with the robot hand and the camera, respectively, this paper introduces a new linear decomposition algorithm which consists of singular value decomposition followed by the estimation of the optimal rotation matrix and the least squares equation to solve the rotation matrix of X. Without the requirements of traditional methods that A and B be rigid transformations with the same rotation angle, it enables the extension to non-rigid transformations for A and B. The details of our method are given, together with a short discussion of experimental results, showing that more precision and robustness can be achieved.展开更多
In this paper,the growth of analytic function defined by L-S transforms convergent in the right half plane is studied and some properties on the L-S transform F(s)and its relative transforms f(s)are obtained.
Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed s...Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed systems. Meanwhile, data perturbation techniques are comparatively efficient but are mainly used in centralized privacy-preserving data mining (PPDM). In this paper, we propose a light-weight anonymous data perturbation method for efficient privacy preserving in distributed data mining. We first define the privacy constraints for data perturbation based PPDM in a semi-honest distributed environment. Two protocols are proposed to address these constraints and protect data statistics and the randomization process against collusion attacks: the adaptive privacy-preserving summary protocol and the anonymous exchange protocol. Finally, a distributed data perturbation framework based on these protocols is proposed to realize distributed PPDM. Experiment results show that our approach achieves a high security level and is very efficient in a large scale distributed environment.展开更多
The author considers a thermal convection problem with infinite Prandtl number in two or three dimensions. The mathematical model of such problem is described as an initial boundary value problem made up of three part...The author considers a thermal convection problem with infinite Prandtl number in two or three dimensions. The mathematical model of such problem is described as an initial boundary value problem made up of three partial differential equations. One equation of the convection-dominated diffusion type for the temperature, and another two of the Stokes type for the normalized velocity and pressure. The approximate solution is obtained by a penalty finite volume method for the Stokes equation and a multistep upwind finite volume method for the convection-diffusion equation. Under suitable smoothness of the exact solution, error estimates in some discrete norms are derived.展开更多
基金Natural Science Foundation of Shaanxi Province under Grant No.2004A15the Science Plan Foundation of the Education Department of Shaanxi Province under Grant No.05JK288
文摘Recently Jiang et al.[Chin.Phys.Lett.24 (2007) 1144] gave a scheme for probabilistic controlled tele-portation of a triplet W state from the sender Alice to the distant receiver Bob.The m controlled qubits are sharedby m(s_1,s_2,...,s_m) spatially-separated supervisors.Based on transformation operator,we can extend to teleporting anarbitrary three-qubit state.The relation between the transformation operators and the Bob's unitary transformation isalso obtained.
文摘In this paper, using the Hirota's bilineax method, we consider the N = 1 supersymmetric Sawada-Kotera- Ramani equation and obtain the Bazcklund transformation of it. Its one- and two-supersoliton solutions axe obtained and N-supersoliton solutions for N ≥ 3 are given under the condition kiξj = kjξi.
基金Project (No. 60703002) supported by the National Natural Science Foundation of China
文摘To solve the homogeneous transformation equation of the form AX=XB in hand-eye calibration, where X represents an unknown transformation from the camera to the robot hand, and A and B denote the known movement transformations associated with the robot hand and the camera, respectively, this paper introduces a new linear decomposition algorithm which consists of singular value decomposition followed by the estimation of the optimal rotation matrix and the least squares equation to solve the rotation matrix of X. Without the requirements of traditional methods that A and B be rigid transformations with the same rotation angle, it enables the extension to non-rigid transformations for A and B. The details of our method are given, together with a short discussion of experimental results, showing that more precision and robustness can be achieved.
基金Foundation item: the National Natural Science Foundation of China (No. 10471048) Specialized Research Fund for the Doctoral Program of Higher Education (No. 20050574002).
文摘In this paper,the growth of analytic function defined by L-S transforms convergent in the right half plane is studied and some properties on the L-S transform F(s)and its relative transforms f(s)are obtained.
基金Project supported by the National Natural Science Foundation of China (Nos. 60772098 and 60672068)the New Century Excel-lent Talents in University of China (No. NCET-06-0393)
文摘Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed systems. Meanwhile, data perturbation techniques are comparatively efficient but are mainly used in centralized privacy-preserving data mining (PPDM). In this paper, we propose a light-weight anonymous data perturbation method for efficient privacy preserving in distributed data mining. We first define the privacy constraints for data perturbation based PPDM in a semi-honest distributed environment. Two protocols are proposed to address these constraints and protect data statistics and the randomization process against collusion attacks: the adaptive privacy-preserving summary protocol and the anonymous exchange protocol. Finally, a distributed data perturbation framework based on these protocols is proposed to realize distributed PPDM. Experiment results show that our approach achieves a high security level and is very efficient in a large scale distributed environment.
文摘The author considers a thermal convection problem with infinite Prandtl number in two or three dimensions. The mathematical model of such problem is described as an initial boundary value problem made up of three partial differential equations. One equation of the convection-dominated diffusion type for the temperature, and another two of the Stokes type for the normalized velocity and pressure. The approximate solution is obtained by a penalty finite volume method for the Stokes equation and a multistep upwind finite volume method for the convection-diffusion equation. Under suitable smoothness of the exact solution, error estimates in some discrete norms are derived.