期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
关于量子BCH码及子系统码二元构造的研究
1
作者 许亚杰 马智 张春元 《信息工程大学学报》 2008年第1期5-8,共4页
根据已有的关于二元本原经典BCH码的自同构群的结论,给出了一类特殊的量子BCH码自同构群的描述和量子CSS码码算子的描述。基于GF(4)上迹Hermitian内积和GF(2)上的辛内积之间的关系,给出了量子子系统码的一种二元构造方法,丰富了子系统... 根据已有的关于二元本原经典BCH码的自同构群的结论,给出了一类特殊的量子BCH码自同构群的描述和量子CSS码码算子的描述。基于GF(4)上迹Hermitian内积和GF(2)上的辛内积之间的关系,给出了量子子系统码的一种二元构造方法,丰富了子系统码的构造方法。 展开更多
关键词 量子BCH 自同构群 CSS 码算子 子系统
下载PDF
RESEARCH OF FAST MODULAR MULTIPLIER FOR A CLASS OF FINITE FIELDS 被引量:1
2
作者 Jin Yi'er Shen Haibin Chen Huafeng Yan Xiaolang 《Journal of Electronics(China)》 2008年第4期482-487,共6页
A new structure of bit-parallel Polynomial Basis(PB)multiplier is proposed,which isbased on a fast modular reduction method.The method was recommended by the National Instituteof Standards and Technology(NIST).It take... A new structure of bit-parallel Polynomial Basis(PB)multiplier is proposed,which isbased on a fast modular reduction method.The method was recommended by the National Instituteof Standards and Technology(NIST).It takes advantage of the characteristics of irreducible polyno-mial,i.e.,the degree of the second item of irreducible polynomial is far less than the degree of thepolynomial in the finite fields GF(2m).Deductions are made for a class of finite field in which trino-mials are chosen as irreducible polynomials.Let the trinomial bex m +x k+1,where 1 ≤k≤?m/2?.??The proposed structure has shorter critical path than the best known one up to date,whilethe space requirement keeps the same.The structure is practical,especially in real time crypto-graphic applications. 展开更多
关键词 Fast modular multiplication Bit-parallel multiplier Trinomials
下载PDF
Numerical investigation on permeability evolution behavior of rock by an improved flow-coupling algorithm in particle flow code 被引量:9
3
作者 ZENG Wei YANG Sheng-qi +1 位作者 TIAN Wen-ling WEN Kai 《Journal of Central South University》 SCIE EI CAS CSCD 2018年第6期1367-1385,共19页
Permeability is a vital property of rock mass, which is highly affected by tectonic stress and human engineering activities. A comprehensive monitoring of pore pressure and flow rate distributions inside the rock mass... Permeability is a vital property of rock mass, which is highly affected by tectonic stress and human engineering activities. A comprehensive monitoring of pore pressure and flow rate distributions inside the rock mass is very important to elucidate the permeability evolution mechanisms, which is difficult to realize in laboratory, but easy to be achieved in numerical simulations. Therefore, the particle flow code (PFC), a discrete element method, is used to simulate permeability behaviors of rock materials in this study. Owe to the limitation of the existed solid-fluid coupling algorithm in PFC, an improved flow-coupling algorithm is presented to better reflect the preferential flow in rock fractures. The comparative analysis is conducted between original and improved algorithm when simulating rock permeability evolution during triaxial compression, showing that the improved algorithm can better describe the experimental phenomenon. Furthermore, the evolution of pore pressure and flow rate distribution during the flow process are analyzed by using the improved algorithm. It is concluded that during the steady flow process in the fractured specimen, the pore pressure and flow rate both prefer transmitting through the fractures rather than rock matrix. Based on the results, fractures are divided into the following three types: I) fractures link to both the inlet and outlet, II) fractures only link to the inlet, and III) fractures only link to the outlet. The type I fracture is always the preferential propagating path for both the pore pressure and flow rate. For type II fractures, the pore pressure increases and then becomes steady. However, the flow rate increases first and begins to decrease after the flow reaches the stop end of the fracture and finally vanishes. There is no obvious pore pressure or flow rate concentration within type III fractures. 展开更多
关键词 rock mechanics fluid-solid coupling particle flow code (PFC) PERMEABILITY triaxial compression
下载PDF
Three-Particle Einstein-Podolsky-Rose Eigenstate and Its Application in QuantumDense Coding
4
作者 SONGTong-Qiang LIHui-Jun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2004年第6期867-870,共4页
We study the properties of the three-mode Einstein-Podolsky-Rose (EPR) eigenstate and its application in quantum dense coding. Our result shows that the three-mode EPR eigenstate provides a convenient way to realize q... We study the properties of the three-mode Einstein-Podolsky-Rose (EPR) eigenstate and its application in quantum dense coding. Our result shows that the three-mode EPR eigenstate provides a convenient way to realize quantum dense coding when the quantum channel is a three-mode squeezed state. 展开更多
关键词 three-particle EPR eigenstate quantum dense coding entagling operator
下载PDF
Evolutionary Computation for Realizing Distillation Separation Sequence Optimization Synthesis 被引量:2
5
作者 Dong Hongguang Qin Limin Wang Kefeng Yao Pingjing 《China Petroleum Processing & Petrochemical Technology》 SCIE CAS 2005年第4期52-59,共8页
Evolutionary algorithm is applied for distillation separation sequence optimization synthesis problems with combination explosion. The binary tree data structure is used to describe the distillation separation sequenc... Evolutionary algorithm is applied for distillation separation sequence optimization synthesis problems with combination explosion. The binary tree data structure is used to describe the distillation separation sequence, and it is directly applied as the coding method. Genetic operators, which ensure to prohibit illegal filial generations completely, are designed by using the method of graph theory. The crossover operator based on a single parent or two parents is designed successfully. The example shows that the average ratio of search space from evolutionary algorithm with two-parent genetic operation is lower, whereas the rate of successful minimizations from evolutionary algorithm with single parent genetic operation is higher. 展开更多
关键词 evolutionary algorithm coding method based on the binary tree crossover operator mutation operator distillation separation sequence optimization synthesis
下载PDF
Real-Code Genetic Algorithm for Ground State Energies of Hydrogenic Donors in GaAs-(Ga,Al)As Quantum Dots
6
作者 YAN Hai-Qing TANG Chen +1 位作者 LIU Ming ZHANG Hao 《Communications in Theoretical Physics》 SCIE CAS CSCD 2005年第4X期727-730,共4页
We present a global optimization method, called the real-code genetic algorithm (RGA), to the ground state energies. The proposed method does not require partial derivatives with respect to each variational parameter ... We present a global optimization method, called the real-code genetic algorithm (RGA), to the ground state energies. The proposed method does not require partial derivatives with respect to each variational parameter or solving an eigenequation, so the present method overcomes the major difficulties of the variational method. RGAs also do not require coding and encoding procedures, so the computation time and complexity are reduced. The ground state energies of hydrogenic donors in GaAs-(Ga,Al)As quantum dots have been calculated for a range of the radius of the quantum dot radii of practical interest. They are compared with those obtained by the variational method. The results obtained demonstrate the proposed method is simple, accurate, and easy implement. 展开更多
关键词 ground state energy quantum dots real-code genetic algorithms
下载PDF
An FPGA-based LDPC decoder with optimized scale factor of NMS decoding algorithm
7
作者 LI Jinming ZHAGN Pingping +1 位作者 WANG Lanzhu WANG Guodong 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2022年第4期398-406,共9页
Considering that the hardware implementation of the normalized minimum sum(NMS)decoding algorithm for low-density parity-check(LDPC)code is difficult due to the uncertainty of scale factor,an NMS decoding algorithm wi... Considering that the hardware implementation of the normalized minimum sum(NMS)decoding algorithm for low-density parity-check(LDPC)code is difficult due to the uncertainty of scale factor,an NMS decoding algorithm with variable scale factor is proposed for the near-earth space LDPC codes(8177,7154)in the consultative committee for space data systems(CCSDS)standard.The shift characteristics of field programmable gate array(FPGA)is used to optimize the quantization data of check nodes,and finally the function of LDPC decoder is realized.The simulation and experimental results show that the designed FPGA-based LDPC decoder adopts the scaling factor in the NMS decoding algorithm to improve the decoding performance,simplify the hardware structure,accelerate the convergence speed and improve the error correction ability. 展开更多
关键词 LDPC code NMS decoding algorithm variable scale factor QUANTIZATION
下载PDF
A chaos-based quantum group signature scheme in quantum cryptosystem
8
作者 娄小平 陈志刚 Moon Ho Lee 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第7期2604-2611,共8页
A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum comp... A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum computation network in three phases, i.e. initializing phase, signing phase and verifying phase. In the scheme, a member of the group signs the message on behalf of the group while the receiver verifies the signature's validity with the aid of the trusty group manager who plays a crucial role when a possible dispute arises. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers. 展开更多
关键词 group signature chaotic encryption quantum entanglement quantum cryptography
下载PDF
A high fidelity VQ coding algorithm with region adaptive subbanding
9
作者 杨仲琦 白直灿 +1 位作者 李冬梅 杨长生 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第1期43-48,共6页
Image subbands can be obtained by using filterbank. Traditional compression method uses direct entropy coding for each subband. After studying the energy distribution in image subbands, we proposed a vector quantizati... Image subbands can be obtained by using filterbank. Traditional compression method uses direct entropy coding for each subband. After studying the energy distribution in image subbands, we proposed a vector quantization (VQ) coding algorithm to image subband. In the algorithm, vector quantizers were adaptively designed for high-frequency bands in an image. In particular, the edges of the image were examined and fewer bits were assigned to high-energy regions. The experimental result showed that the algorithm had higher SNR and higher compression ratio than possible by traditional subband coding, JPEG and JPEG 2000. 展开更多
关键词 Image compression SUBBAND Vector quantization (VQ)
下载PDF
Quantum Probabilistic Encryption Scheme Based on Conjugate Coding 被引量:2
10
作者 杨理 向憧 李宝 《China Communications》 SCIE CSCD 2013年第2期19-26,共8页
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryp... We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack. 展开更多
关键词 quantum cryptography probabil-istic encryption information-theoretic in-distinguishability
下载PDF
Constructing Non-binary Asymmetric Quantum Codes via Graphs 被引量:2
11
作者 马智 冷日光 +1 位作者 魏正超 钟淑琴 《China Communications》 SCIE CSCD 2013年第2期33-41,共9页
The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes ... The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes has developed rapidly and been extended to protect quantum information over asymmetric quantum channels, in which phase-shift and qubit-flip errors occur with different probabilities. In this paper, we generalize the construction of symmetric quantum codes via graphs (or matrices) to the asymmetric case, converting the construction of asymmetric quantum codes to finding matrices with some special properties. We also propose some asymmetric quantum Maximal Distance Separable (MDS) codes as examples constructed in this way. 展开更多
关键词 asymmetric quantum codes quantum MDS codes graph construction
下载PDF
Measurement of the Energy Spectrum of the Neutrons inside the Neutron Flux Trap Assembled in the Center of the Reactor Core IPEN/MB-01
12
作者 Ulysses d'Utra Bitelli Luiz Ernesto Credidio Mura Diogo Feliciano dos Santos Rogério Jerez 《Journal of Energy and Power Engineering》 2014年第11期1817-1823,共7页
This paper presents the neutron energy spectrum in the central position of a neutron flux trap assembled in the core center of the research nuclear reactor IPEN/MB-01, obtained by an unfolding method. To this end, we ... This paper presents the neutron energy spectrum in the central position of a neutron flux trap assembled in the core center of the research nuclear reactor IPEN/MB-01, obtained by an unfolding method. To this end, we have used several different types of activation foils (Au, Sc, Ti, Ni, and plates) which have been irradiated in the central position of the reactor core (setting number 203) at a reactor power level (64.57±2.91 watts). The activation foils were counted by solid-state detector HPGe (high pure germanium detector) (gamma spectrometry). The experimental data of nuclear reaction rates (saturated activity per target nucleus) and a neutron spectrum estimated by a reactor physics computer code are the main input data to get the most suitable neutron spectrum in the irradiation position obtained through SANDBP (spectrum analysis neutron detection code-version Budapest University) code: a neutron spectra unfolding code that uses an iterative adjustment method. the integral neutron flux, (2.41 ± 0.01) × 10^9 n·cm^-2·s^-1 for the thermal The adjustment resulted in (3.85 ± 0.14) × 10^9 n·cm^-2·s^-1 for neutron flux, (1.09 ±0.02) × 10^9n·cm^-2·s^-1 for intermediate neutron flux and (3.41 ± 0.02) × 10^8 n·cm^-2·s^-1 for the fast neutrons flux. These results can be used to verify and validate the nuclear reactor codes and its associated nuclear data libraries, besides, show how much effective it can be that the use of a neutron flux trap in the nuclear reactor core to increase the thermal neutron flux without increase the operation reactor power level. The thermal neutral flux increased 4.04 ± 0.21 times compared with the standard configuration of the reactor core. 展开更多
关键词 Thermal neutron flux flux trap activation detectors neutron spectrum zero power reactor.
下载PDF
Decoding algorithms of single photon counting imager based on two-dimensional Vernier anodes 被引量:2
13
作者 YANG Hao ZHAO BaoSheng +2 位作者 YAN QiuRong LIU YongAn HU HuiJun 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第11期1943-1947,共5页
The decoding algorithms of two-dimensional Vernier anodes are deduced theoretically.The precision of decoding and uniqueness of encoding are proved.The influencing factors of detection sensitivity and spatial resoluti... The decoding algorithms of two-dimensional Vernier anodes are deduced theoretically.The precision of decoding and uniqueness of encoding are proved.The influencing factors of detection sensitivity and spatial resolution are discussed.The single photon imaging system is constructed,and the two-dimensional Vernier collector is fabricated.The image of the ultra-weak emission source is reconstructed.The spatial resolution of the system is about 100μm. 展开更多
关键词 decoding algorithms photon counting imaging Vernier collector influencing factors
原文传递
An approach to explore the eddy currents of the new type divertor for EAST device using ANSYS code
14
作者 LIU ChangLe YAO DaMao +6 位作者 DOODY Jeffrey LIPSCHULTZ Bruce ZHOU LiHua LIANG Chao ZHOU ZiBo CAO Lei XU TieJun 《Science China(Technological Sciences)》 SCIE EI CAS 2014年第1期9-13,共5页
An effective method for eddy current calculation has been developed for EAST’s new divertor by using ANSYS.A 3D model of a double null divertor for the EAST device was built to evaluate eddy currents and electromagne... An effective method for eddy current calculation has been developed for EAST’s new divertor by using ANSYS.A 3D model of a double null divertor for the EAST device was built to evaluate eddy currents and electromagnetic(EM)forces on these components.The main input to the model is the plasma current and poloidal field coil currents,which are loaded into the model using experimental data measured from the EAST discharges.These currents generate magnetic fields that match those producing an EAST discharge,and the time variation of these fields produces the eddy currents in the divertors,along with from the resulting EM forces.In addition,the first 10 time steps were discussed for the eddy current generation and changing trend.It indicates that a static analysis before a transient mode start can solve the eddy current origination in the initial time steps.With this method,the EM transient response of EAST’s new divertor can be predicted based on ANSYS simulations.Furthermore,the method is also an effective approach to estimate the EM results for the in-vessel components of a fusion reactor during a disruption. 展开更多
关键词 eddy current DIVERTOR plasma disruption EAST (Experimental Advanced Superconducting Tokamak) device ANSYS
原文传递
Testing a quantum error-correcting code on various platforms 被引量:1
15
作者 Qihao Guo Yuan-Yuan Zhao +5 位作者 Markus Grassl Xinfang Nie Guo-Yong Xiang Tao Xing Zhang-Qi Yin Bei Zeng 《Science Bulletin》 SCIE EI CSCD 2021年第1期29-35,M0003,共8页
Quantum error correction plays an important role in fault-tolerant quantum information processing.It is usually difficult to experimentally realize quantum error correction,as it requires multiple qubits and quantum g... Quantum error correction plays an important role in fault-tolerant quantum information processing.It is usually difficult to experimentally realize quantum error correction,as it requires multiple qubits and quantum gates with high fidelity.Here we propose a simple quantum error-correcting code for the detected amplitude damping channel.The code requires only two qubits.We implement the encoding,the channel,and the recovery on an optical platform,the IBM Q System,and a nuclear magnetic resonance system.For all of these systems,the error correction advantage appears when the damping rate exceeds some threshold.We compare the features of these quantum information processing systems used and demonstrate the advantage of quantum error correction on current quantum computing platforms. 展开更多
关键词 Quantum error correction Quantum computation Superconducting circuit NMR system Optical platform
原文传递
Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack
16
作者 王卫龙 高明 马智 《Communications in Theoretical Physics》 SCIE CAS CSCD 2015年第3期296-302,共7页
Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important rol... Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup. 展开更多
关键词 Faraday mirrors passive Faraday mirror attack POVM linear optics
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部