Based on the safety coefficient method,which assigns rock failure criteria to calculate the rock mass unit,the safety coefficient contour of surrounding rock is plotted to judge the distribution form of the fractured ...Based on the safety coefficient method,which assigns rock failure criteria to calculate the rock mass unit,the safety coefficient contour of surrounding rock is plotted to judge the distribution form of the fractured zone in the roadway.This will provide the basis numerical simulation to calculate the surrounding rock fractured zone in a roadway.Using the single factor and multi-factor orthogonal test method,the evolution law of roadway surrounding rock displacements,plastic zone and stress distribution under different conditions is studied.It reveals the roadway surrounding rock burst evolution process,and obtains five kinds of failure modes in deep soft rock roadway.Using the fuzzy mathematics clustering analysis method,the deep soft surrounding rock failure model in Zhujixi mine can be classified and patterns recognized.Compared to the identification results and the results detected by geological radar of surrounding rock loose circle,the reliability of the results of the pattern recognition is verified and lays the foundations for the support design of deep soft rock roadways.展开更多
In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised...In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely.展开更多
基金provided by the National Natural Science Foundation of China(Nos.51322401,51309222,51323004,51579239 and 51574223)the Opening Project Fund of Shandong Provincial Key Laboratory of Civil Engineering Disaster Prevention and Mitigation(No.CDPM2014KF03)+2 种基金the State Key Laboratory for GeoMechanics Opening Project Fund of Shandong Provincial Key Laboratory of Civil Engineering Disaster Prevention and MitigationDeep Underground Engineering,China University of Mining&Technology(No.SKLGDUEK1305)China Postdoctoral Science Foundation(Nos.2014M551700and 2013M531424)
文摘Based on the safety coefficient method,which assigns rock failure criteria to calculate the rock mass unit,the safety coefficient contour of surrounding rock is plotted to judge the distribution form of the fractured zone in the roadway.This will provide the basis numerical simulation to calculate the surrounding rock fractured zone in a roadway.Using the single factor and multi-factor orthogonal test method,the evolution law of roadway surrounding rock displacements,plastic zone and stress distribution under different conditions is studied.It reveals the roadway surrounding rock burst evolution process,and obtains five kinds of failure modes in deep soft rock roadway.Using the fuzzy mathematics clustering analysis method,the deep soft surrounding rock failure model in Zhujixi mine can be classified and patterns recognized.Compared to the identification results and the results detected by geological radar of surrounding rock loose circle,the reliability of the results of the pattern recognition is verified and lays the foundations for the support design of deep soft rock roadways.
基金Supported in part by an International Macquarie University Research Excellence Scholarship(i MQRES),Australian Research Council Grant DP0987734also supported by the National Basic Research Program of China(973 Program)under Grant No.2010CB923200+2 种基金the National Natural Science Foundation of China under No.61377067Fund of State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications,China,National Natural Science Foundation of China under Grant Nos.61202362,61262057,61472433China Postdoctora Science Foundation under Grant No.2013M542560
文摘In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely.