Two methods based on a slight modification of the regular traffic assignmentalgorithms are proposed to directly compute turn flows instead of estimating them from link flows orobtaining them by expanding the networks....Two methods based on a slight modification of the regular traffic assignmentalgorithms are proposed to directly compute turn flows instead of estimating them from link flows orobtaining them by expanding the networks. The first one is designed on the path-turn incidencerelationship, and it is similar to the computational procedure of link flows. It applies to thetraffic assignment algorithms that can provide detailed path structures. The second utilizes thelink-turn incidence relationship and the conservation of flow on links, a law deriving from thisrelationship. It is actually an improved version of Dial's logit assignment algorithm. The proposedapproaches can avoid the shortcomings both of the estimation methods, e. g. Furness's model andFrator's model, and of the network-expanding method in precision, stability and computation scale.Finally, they are validated by numerical examples.展开更多
We suggest a method for transferring an unknown quantum state. In this method the sender Alice first applies a controlled-not operation on the particle in the unknown quantum state and an ancillary particle which she ...We suggest a method for transferring an unknown quantum state. In this method the sender Alice first applies a controlled-not operation on the particle in the unknown quantum state and an ancillary particle which she wants to send to the receiver Bob. Then she sends the ancillary particle to Bob. When Alice is informed by Bob that the ancillary particle is received, she performs a local measurement on her particle and sends Bob the outcome of the local measurement via a classical channel. Depending on the outcome Bob can restore the unknown quantum state, which Alice destroyed, on the ancillary particle successfully. As an application of this method we propose a quantum secure direct communication protocol. By introducing the decoy qubits the security of the scheme is guaranteed.展开更多
The communications industrial standard YD/T 1885-2009 provides the types of headset interfaces, the performance requirements and test methods. Since the release of this standard, more and more manufacturers have adopt...The communications industrial standard YD/T 1885-2009 provides the types of headset interfaces, the performance requirements and test methods. Since the release of this standard, more and more manufacturers have adopted the concentric connector, which gives more choices to consumers and also has benefits on the environmental protection and the healthy development of the mobile terminal industry. Now, the universal headset interface has been included in the draft ITU-T recommendation P.381. lts internationalization will further enhance the universality of the mobile phone headset interlace. It is China's another great contribution to the international standardization following the standard of universal power adapter for mobile phones.展开更多
In the research of elastic wave signal detection algorithm, a method based on adaptive wavelet analysis and segmentation threshold processing of the channel noise removal methods is suggested to overcome the effect of...In the research of elastic wave signal detection algorithm, a method based on adaptive wavelet analysis and segmentation threshold processing of the channel noise removal methods is suggested to overcome the effect of noise, which is prcduced by absorption loss, scattering loss, reflection loss and multi-path effect during the elastic wave in the transmission undelgroound. The method helps to realize extraction and recovery of weak signal of elastic wave from the multi-path channel, and simulation study is carded out about wavelet de-noising effects of the elastic wave and obtained satisfactory results.展开更多
文摘Two methods based on a slight modification of the regular traffic assignmentalgorithms are proposed to directly compute turn flows instead of estimating them from link flows orobtaining them by expanding the networks. The first one is designed on the path-turn incidencerelationship, and it is similar to the computational procedure of link flows. It applies to thetraffic assignment algorithms that can provide detailed path structures. The second utilizes thelink-turn incidence relationship and the conservation of flow on links, a law deriving from thisrelationship. It is actually an improved version of Dial's logit assignment algorithm. The proposedapproaches can avoid the shortcomings both of the estimation methods, e. g. Furness's model andFrator's model, and of the network-expanding method in precision, stability and computation scale.Finally, they are validated by numerical examples.
基金The project supported by the National Natural Science Foundation of China under Grant No. 10671054 and the Natural Science Foundation of Hebei Province under Grant Nos. A2004000141 and A2005000140
文摘We suggest a method for transferring an unknown quantum state. In this method the sender Alice first applies a controlled-not operation on the particle in the unknown quantum state and an ancillary particle which she wants to send to the receiver Bob. Then she sends the ancillary particle to Bob. When Alice is informed by Bob that the ancillary particle is received, she performs a local measurement on her particle and sends Bob the outcome of the local measurement via a classical channel. Depending on the outcome Bob can restore the unknown quantum state, which Alice destroyed, on the ancillary particle successfully. As an application of this method we propose a quantum secure direct communication protocol. By introducing the decoy qubits the security of the scheme is guaranteed.
文摘The communications industrial standard YD/T 1885-2009 provides the types of headset interfaces, the performance requirements and test methods. Since the release of this standard, more and more manufacturers have adopted the concentric connector, which gives more choices to consumers and also has benefits on the environmental protection and the healthy development of the mobile terminal industry. Now, the universal headset interface has been included in the draft ITU-T recommendation P.381. lts internationalization will further enhance the universality of the mobile phone headset interlace. It is China's another great contribution to the international standardization following the standard of universal power adapter for mobile phones.
文摘In the research of elastic wave signal detection algorithm, a method based on adaptive wavelet analysis and segmentation threshold processing of the channel noise removal methods is suggested to overcome the effect of noise, which is prcduced by absorption loss, scattering loss, reflection loss and multi-path effect during the elastic wave in the transmission undelgroound. The method helps to realize extraction and recovery of weak signal of elastic wave from the multi-path channel, and simulation study is carded out about wavelet de-noising effects of the elastic wave and obtained satisfactory results.