期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
隐态信息传播论 被引量:3
1
作者 刘学义 《学术交流》 CSSCI 北大核心 1999年第6期141-144,共4页
关键词 信息 隐态信息 传播理论
下载PDF
潜意识与广告的隐态信息 被引量:4
2
作者 应厚非 《商场现代化》 北大核心 2006年第09S期73-74,共2页
作为精神分析学说基础的潜意识理论不光在心理学上有着重要的价值,将其引入广告的研究中将有助于我们理解广告隐态信息的重要作用,同时也为我们进一步利用受众潜意识取得更好的广告营销效果创造了条件。
关键词 潜意识 电视广告 隐态信息
下载PDF
隐态信息与新闻图片力度
3
作者 周立新 《新闻前哨》 2003年第11期54-55,共2页
当前,新闻摄影报道的时效性得到了提高,摄影记者的发稿量增多了,但“告之以事”的新闻照片也充斥了报纸版面。比如,在我们的报纸上,车祸、火灾的新闻照片日复一日,年复一年,都是一些大同小异的、简单死板的表现手法,只能告诉读者发生了... 当前,新闻摄影报道的时效性得到了提高,摄影记者的发稿量增多了,但“告之以事”的新闻照片也充斥了报纸版面。比如,在我们的报纸上,车祸、火灾的新闻照片日复一日,年复一年,都是一些大同小异的、简单死板的表现手法,只能告诉读者发生了什么事件,而它所反映的新闻事件的内在特征和意义显得单薄、无力。 展开更多
关键词 新闻摄影 新闻图片 新闻信息 隐态信息
下载PDF
Resource Allocation for Physical Layer Security in Heterogeneous Network with Hidden Eavesdropper 被引量:5
4
作者 GONG Shiqi XING Chengwen +1 位作者 FEI Zesong KUANG Jingming 《China Communications》 SCIE CSCD 2016年第3期82-95,共14页
The tremendous performance gain of heterogeneous networks(Het Nets) is at the cost of complicated resource allocation. Considering information security, the resource allocation for Het Nets becomes much more challengi... The tremendous performance gain of heterogeneous networks(Het Nets) is at the cost of complicated resource allocation. Considering information security, the resource allocation for Het Nets becomes much more challenging and this is the focus of this paper. In this paper, the eavesdropper is hidden from the macro base stations. To relax the unpractical assumption on the channel state information on eavesdropper, a localization based algorithm is first given. Then a joint resource allocation algorithm is proposed in our work, which simultaneously considers physical layer security, cross-tier interference and joint optimization of power and subcarriers under fairness requirements. It is revealed in our work that the considered optimization problem can be efficiently solved relying on convex optimization theory and the Lagrangian dual decomposition method is exploited to solve the considered problem effectively. Moreover, in each iteration the closed-form optimal resource allocation solutions can be obtained based on the Karush-Kuhn-Tucker(KKT) conditions. Finally, the simulation results are given to show the performance advantages of the proposed algorithm. 展开更多
关键词 resource allocation physical layer security heterogeneous networks RSS-based location estimation lagrangian dual decomposition
下载PDF
Controlled Quantum Teleportation Through Noisy GHZ Channel
5
作者 苗纯 杨名 曹卓良 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第3期489-495,共7页
In this paper, we propose two physical schemes for teleporting an unknown atomic state through noisy channel in cavity QED. The quantum channel is a noisy one -- a mixed GHZ state, which is more realistic in quantum i... In this paper, we propose two physical schemes for teleporting an unknown atomic state through noisy channel in cavity QED. The quantum channel is a noisy one -- a mixed GHZ state, which is more realistic in quantum information processing. We solve analytically a master equation in the Lindblad form with (L2,z, L3,z, L4,z)-type of noise in cavity Q, ED. A comparison between the two protocols are discussed. 展开更多
关键词 TELEPORTATION cavity QED noise channel GHZ state
下载PDF
A potential application in quantum networks-Deterministic quantum operation sharing schemes with Bell states 被引量:1
6
作者 Ke Jia Zhang Long Zhang +1 位作者 Ting Ting Song Ying Hui Yang 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2016年第6期41-48,共8页
In this paper, we propose certain different design ideas on a novel topic in quantum cryptography — quantum operation sharing(QOS). Following these unique ideas, three QOS schemes, the "HIEC"(The scheme who... In this paper, we propose certain different design ideas on a novel topic in quantum cryptography — quantum operation sharing(QOS). Following these unique ideas, three QOS schemes, the "HIEC"(The scheme whose messages are hidden in the entanglement correlation), "HIAO"(The scheme whose messages are hidden with the assistant operations) and "HIMB"(The scheme whose messages are hidden in the selected measurement basis), have been presented to share the single-qubit operations determinately on target states in a remote node. These schemes only require Bell states as quantum resources. Therefore, they can be directly applied in quantum networks, since Bell states are considered the basic quantum channels in quantum networks. Furthermore, after analyse on the security and resource consumptions, the task of QOS can be achieved securely and effectively in these schemes. 展开更多
关键词 quantum operation sharing quantum secret sharing quantum secure direct communication quantum networks
原文传递
An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States
7
作者 徐淑奖 陈秀波 +2 位作者 王连海 丁青艳 张淑慧 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第6期705-710,共6页
In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good sym... In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry,the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line(column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. 展开更多
关键词 quantum communication quantum information hiding χ-type quantum state entanglement swapping
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部