In this paper, we present a scheme for teleporting multi-qudit quantum state, from the sender Alice to the receiver Charlie via many controllers Bobs, whose control parameters are obtained using entanglement swapping ...In this paper, we present a scheme for teleporting multi-qudit quantum state, from the sender Alice to the receiver Charlie via many controllers Bobs, whose control parameters are obtained using entanglement swapping of maximally d-dimensional EPR pair. In our scheme, Yang's qutrit controlled teleportation protocol [Commun. Theor. Phys. 49 (2008) 338] based on Bell-state entanglement swapping is generalized to the qudit case. The scheme of multi-qudit owns the advantage of having higher code capacity and better security than that of multi-qutrit.展开更多
It is difficult to collect the prior information for small-sample machinery products when their reliability is assessed by using Bayes method. In this study, an improved Bayes method with gradient reliability(GR) resu...It is difficult to collect the prior information for small-sample machinery products when their reliability is assessed by using Bayes method. In this study, an improved Bayes method with gradient reliability(GR) results as prior information was proposed to solve the problem. A certain type of heavy NC boring and milling machine was considered as the research subject, and its reliability model was established on the basis of its functional and structural characteristics and working principle. According to the stress-intensity interference theory and the reliability model theory, the GR results of the host machine and its key components were obtained. Then the GR results were deemed as prior information to estimate the probabilistic reliability(PR) of the spindle box, the column and the host machine in the present method. The comparative studies demonstrated that the improved Bayes method was applicable in the reliability assessment of heavy NC machine tools.展开更多
The Main Optical Telescope (MOT) is an important payload of the Space Solar Telescope (SST) with various instruments and observation modes. Its real-time data handling and management and control tasks are arduous. Bas...The Main Optical Telescope (MOT) is an important payload of the Space Solar Telescope (SST) with various instruments and observation modes. Its real-time data handling and management and control tasks are arduous. Based on the advanced techniques of foreign countries, an improved structure of onboard data handling systems feasible for SST, is proposed. This article concentrated on the development of a Central Management & Control Unit (MCU) based on FPGA and DSP. Through reconfigurating the FPGA and DSP programs, the prototype could perform different tasks. Thus the inheritability of the whole system is improved. The completed dual-channel prototype proves that the system meets all requirements of the MOT. Its high reliability and safety features also meet the requirements under harsh conditions such as mine detection.展开更多
We consider the problem of data flow fuzzy control of discrete queuing systems with three different service-rate servers. The objective is to dynamically assign customers to idle severs based on the state of the syste...We consider the problem of data flow fuzzy control of discrete queuing systems with three different service-rate servers. The objective is to dynamically assign customers to idle severs based on the state of the system so as to minimize the mean sojourn time of customers. Simulation shows the validity of the fuzzy controller.展开更多
Affected by the climatic fluctuation and human activities, significant changes of the flood control situation are taking place in China. In the new century, the flood control systems have to face a series of challenge...Affected by the climatic fluctuation and human activities, significant changes of the flood control situation are taking place in China. In the new century, the flood control systems have to face a series of challenges. In this paper, we design fa decision support system (DSS) for flood control based on its requirements. The DSS has been applied to decision-making for flood control in Jiangxi province, and play an important role in the flood control in the recent two years. Finally, we plot the further improvement on the DSS so that it will make more contribution in the flood control.展开更多
The NPP (nuclear power plant) being vital objects of an energy infrastructure must be protected against malicious actions affecting their safety, and cyber security plays a key part in attaining this goal. The paper...The NPP (nuclear power plant) being vital objects of an energy infrastructure must be protected against malicious actions affecting their safety, and cyber security plays a key part in attaining this goal. The paper considers, implemented by the authors within the project of advanced digital control system for NPP with the reactor VVER-1000, a system of unauthorized access protection, partially built up on the technology of AA (active audit) and expert system. The AA technology is based on response of the system on deviation of current signature of the automated process control system from stable state rather than on a certain signature of attack and relies on the estimation of the behavioral models of the particular digital control system. The advent of active audit reflects the current situation in the digital control systems where complex distributed platforms are used to construct automated process control system. The active audit allows one to make the digital control system functionally closed, provided that it is determinate. The methodology of the active audit does not give u external (barrier) and traditional (password, antivirus) methods of unauthorized access protection. These methods can be used when it is appropriate to achieve a required protection level.展开更多
We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can u...We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can use his private key to control all the watermarking parameters freely.Neither original data cube nor the watermark is required in watermark detection.Detailed analysis and extensive experiments are conducted for the proposed schemes in terms of watermark detectability,robustness and efficiency.Our results show that the scheme performs well in actual applications.展开更多
基金supported by Tianjin Natural Science Fund under Grant No.06YFJMJC00800
文摘In this paper, we present a scheme for teleporting multi-qudit quantum state, from the sender Alice to the receiver Charlie via many controllers Bobs, whose control parameters are obtained using entanglement swapping of maximally d-dimensional EPR pair. In our scheme, Yang's qutrit controlled teleportation protocol [Commun. Theor. Phys. 49 (2008) 338] based on Bell-state entanglement swapping is generalized to the qudit case. The scheme of multi-qudit owns the advantage of having higher code capacity and better security than that of multi-qutrit.
基金Supported by the National Science and Technology Major Project of China(No.2009ZX04002-061)the National Science and Technology Support Program(No.2013BAF06B00)the Natural Science Foundation of Tianjin(No.13JCZDJC34000)
文摘It is difficult to collect the prior information for small-sample machinery products when their reliability is assessed by using Bayes method. In this study, an improved Bayes method with gradient reliability(GR) results as prior information was proposed to solve the problem. A certain type of heavy NC boring and milling machine was considered as the research subject, and its reliability model was established on the basis of its functional and structural characteristics and working principle. According to the stress-intensity interference theory and the reliability model theory, the GR results of the host machine and its key components were obtained. Then the GR results were deemed as prior information to estimate the probabilistic reliability(PR) of the spindle box, the column and the host machine in the present method. The comparative studies demonstrated that the improved Bayes method was applicable in the reliability assessment of heavy NC machine tools.
基金Project 863-2.5.2.25 supported by the National High Technology Research & Development (863) Program of China
文摘The Main Optical Telescope (MOT) is an important payload of the Space Solar Telescope (SST) with various instruments and observation modes. Its real-time data handling and management and control tasks are arduous. Based on the advanced techniques of foreign countries, an improved structure of onboard data handling systems feasible for SST, is proposed. This article concentrated on the development of a Central Management & Control Unit (MCU) based on FPGA and DSP. Through reconfigurating the FPGA and DSP programs, the prototype could perform different tasks. Thus the inheritability of the whole system is improved. The completed dual-channel prototype proves that the system meets all requirements of the MOT. Its high reliability and safety features also meet the requirements under harsh conditions such as mine detection.
文摘We consider the problem of data flow fuzzy control of discrete queuing systems with three different service-rate servers. The objective is to dynamically assign customers to idle severs based on the state of the system so as to minimize the mean sojourn time of customers. Simulation shows the validity of the fuzzy controller.
文摘Affected by the climatic fluctuation and human activities, significant changes of the flood control situation are taking place in China. In the new century, the flood control systems have to face a series of challenges. In this paper, we design fa decision support system (DSS) for flood control based on its requirements. The DSS has been applied to decision-making for flood control in Jiangxi province, and play an important role in the flood control in the recent two years. Finally, we plot the further improvement on the DSS so that it will make more contribution in the flood control.
文摘The NPP (nuclear power plant) being vital objects of an energy infrastructure must be protected against malicious actions affecting their safety, and cyber security plays a key part in attaining this goal. The paper considers, implemented by the authors within the project of advanced digital control system for NPP with the reactor VVER-1000, a system of unauthorized access protection, partially built up on the technology of AA (active audit) and expert system. The AA technology is based on response of the system on deviation of current signature of the automated process control system from stable state rather than on a certain signature of attack and relies on the estimation of the behavioral models of the particular digital control system. The advent of active audit reflects the current situation in the digital control systems where complex distributed platforms are used to construct automated process control system. The active audit allows one to make the digital control system functionally closed, provided that it is determinate. The methodology of the active audit does not give u external (barrier) and traditional (password, antivirus) methods of unauthorized access protection. These methods can be used when it is appropriate to achieve a required protection level.
基金the National Natural Science Foundation of China(No.60703032)the National High Technology Research and Development Program(863)of China(No.2007AA01Z456)
文摘We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can use his private key to control all the watermarking parameters freely.Neither original data cube nor the watermark is required in watermark detection.Detailed analysis and extensive experiments are conducted for the proposed schemes in terms of watermark detectability,robustness and efficiency.Our results show that the scheme performs well in actual applications.