In recent years,with the development of the social Internet of Things(IoT),all kinds of data accumulated on the network.These data,which contain a lot of social information and opinions.However,these data are rarely f...In recent years,with the development of the social Internet of Things(IoT),all kinds of data accumulated on the network.These data,which contain a lot of social information and opinions.However,these data are rarely fully analyzed,which is a major obstacle to the intelligent development of the social IoT.In this paper,we propose a sentence similarity analysis model to analyze the similarity in people’s opinions on hot topics in social media and news pages.Most of these data are unstructured or semi-structured sentences,so the accuracy of sentence similarity analysis largely determines the model’s performance.For the purpose of improving accuracy,we propose a novel method of sentence similarity computation to extract the syntactic and semantic information of the semi-structured and unstructured sentences.We mainly consider the subjects,predicates and objects of sentence pairs and use Stanford Parser to classify the dependency relation triples to calculate the syntactic and semantic similarity between two sentences.Finally,we verify the performance of the model with the Microsoft Research Paraphrase Corpus(MRPC),which consists of 4076 pairs of training sentences and 1725 pairs of test sentences,and most of the data came from the news of social data.Extensive simulations demonstrate that our method outperforms other state-of-the-art methods regarding the correlation coefficient and the mean deviation.展开更多
The growing number of mobile users, as well as the diversification in types of services have resulted in increasing demands for wireless network bandwidth in recent years. Although evolving transmission techniques are...The growing number of mobile users, as well as the diversification in types of services have resulted in increasing demands for wireless network bandwidth in recent years. Although evolving transmission techniques are able to enlarge the network capacity to some degree, they still cannot satisfy the requirements of mobile users. Meanwhile, following Moore's Law, the data processing capabilities of mobile user terminals are continuously improving. In this paper, we explore possible methods of trading strong computational power at wireless terminals for transmission efficiency of communications. Taking the specific scenario of wireless video conversation, we propose a model-based video coding scheme by learning the structures in multimedia contents. Benefiting from both strong computing capability and pre-learned model priors, only low-dimensional parameters need to be transmitted; and the intact multimedia contents can also be reconstructed at the receivers in real-time. Experiment results indicate that, compared to conventional video codecs, the proposed scheme significantly reduces the data rate with the aid of computational capability at wireless terminals.展开更多
Recently, the cryptosystem based on chaos has attracted much attention. Wang and Yu (Commun. Nonlin. Sci. Numer. Simulat. 14(2009)574) proposed a block encryption algorithm based on dynamic sequences of multiple c...Recently, the cryptosystem based on chaos has attracted much attention. Wang and Yu (Commun. Nonlin. Sci. Numer. Simulat. 14(2009)574) proposed a block encryption algorithm based on dynamic sequences of multiple chaotic systems. We analyze the potential flaws in the algorithm. Then, a chosen-plaintext attack is presented. Some remedial measures are suggested to avoid the flaws effectively. Furthermore, an improved encryption algorithm is proposed to resist the attacks" and to keep all the merits of the original cryptosystem.展开更多
Due to the recent explosion of big data, our society has been rapidly going through digital transformation and entering a new world with numerous eye-opening developments. These new trends impact the society and futur...Due to the recent explosion of big data, our society has been rapidly going through digital transformation and entering a new world with numerous eye-opening developments. These new trends impact the society and future jobs, and thus student careers. At the heart of this digital transformation is data science, the discipline that makes sense of big data. With many rapidly emerging digital challenges ahead of us, this article discusses perspectives on iSchools' opportunities and suggestions in data science education. We argue that iSchools should empower their students with "information computing" disciplines, which we define as the ability to solve problems and create values, information, and knowledge using tools in application domains. As specific approaches to enforcing information computing disciplines in data science education, we suggest the three foci of user-based, tool-based, and application- based. These three loci will serve to differentiate the data science education of iSchools from that of computer science or business schools. We present a layered Data Science Education Framework (DSEF) with building blocks that include the three pillars of data science (people, technology, and data), computational thinking, data-driven paradigms, and data science lifecycles. Data science courses built on the top of this framework should thus be executed with user-based, tool-based, and application-based approaches. This framework will help our students think about data science problems from the big picture perspective and foster appropriate problem-solving skills in conjunction with broad perspectives of data science lifecycles. We hope the DSEF discussed in this article will help fellow iSchools in their design of new data science curricula.展开更多
Using the method presented recently [Phys.Rev.A 77(2008)014306; Phys.Lett.A 369(2007)377], the transformation operator (TO) is explicitly given for teleporting an arbitrary three-qubit state with a six-qubit cha...Using the method presented recently [Phys.Rev.A 77(2008)014306; Phys.Lett.A 369(2007)377], the transformation operator (TO) is explicitly given for teleporting an arbitrary three-qubit state with a six-qubit channel and Bell-state measurements. A criterion on whether such quantum teleportation can be perfectly realized is educed in terms of TO. Moreover, six instantiations on TO and criterion are concisely shown.展开更多
We propose a scheme for the probabilistic teleportation of an unknown two-particle state of general formation in ion trap. It is shown that one can realize experimentally this teleportation protocol of two-particle st...We propose a scheme for the probabilistic teleportation of an unknown two-particle state of general formation in ion trap. It is shown that one can realize experimentally this teleportation protocol of two-particle state with presently available techniques.展开更多
Based on superconducting charge qubits (SCCQs) coupled to a single-mode microwave cavity, we propose a scheme for generating charge cluster states. For all SCCQs, the controlled gate voltages are all in their degene...Based on superconducting charge qubits (SCCQs) coupled to a single-mode microwave cavity, we propose a scheme for generating charge cluster states. For all SCCQs, the controlled gate voltages are all in their degeneracy points, the quantum information is encoded in two logic states of charge basis. The generation of the multi-qubit cluster state can be achieved step by step on a pair of nearest-neighbor qubits. Considering effective long-rang coupling, we provide an efficient way to one-step generating of a highly entangled cluster state, in which the qubit-qubit coupling is mediated by the cavity mode. Our quantum operations are insensitive to the initial state of the cavity mode by removing the influence of the cavity mode via the periodical evolution of the system. Thus, our operation may be against the decoherence from the cavity.展开更多
Without the geometry of light and logic of photon,observer-observability forms a paradox in modern science,truthequilibrium finds no unification,and mind-light-matter unity is unreachable in spacetime.Subsequently,qua...Without the geometry of light and logic of photon,observer-observability forms a paradox in modern science,truthequilibrium finds no unification,and mind-light-matter unity is unreachable in spacetime.Subsequently,quantum mechanics has been shrouded with mysteries preventing itself from reaching definable causality for a general purpose analytical quantum computing paradigm.Ground-0 Axioms are introduced as an equilibrium-based,dynamic,bipolar set-theoretic unification of the first principles of science and the second law of thermodynamics.Related literatures are critically reviewed to justify the self-evident nature of Ground-0 Axioms.A historical misinterpretation by the founding fathers of quantum mechanics is identified and corrected.That disproves spacetime geometries(including but not limited to Euclidean and Hilbert spaces)as the geometries of light and truth-based logics(including but not limited to bra-ket quantum logic)as the logics of photon.Backed with logically definable causality and Dirac 3-polarizer experiment,bipolar quantum geometry(BQG)and bipolar dynamic logic(BDL)are identified as the geometry of light and the logic of photon,respectively,and wave-particle complementarity is shown less fundamental than bipolar complementarity.As a result,Ground-0 Axioms lead to a geometrical and logical illumination of the quantum and classical worlds as well as the physical and mental worlds.With logical resolutions to the EPR and Schr?dinger’s cat paradoxes,an analytical quantum computing paradigm named quantum intelligence(QI)is introduced.It is shown that QI makes mind-light-matter unity and quantum-digital compatibility logically reachable for quantumneuro-fuzzy AI-machinery with groundbreaking applications.It is contended that Ground-0 Axioms open a new era of science and philosophy—the era of mind-light-matter unity in which humanlevel white-box AI&QI is logically prompted to join Einstein’s grand unification to foster major scientific advances.展开更多
Analytic results of the relationship between local noncommutativity and non-violations of Svetlichny inequalities for three-qubit separable states are obtained. It is shown that the converse trade-off relations presen...Analytic results of the relationship between local noncommutativity and non-violations of Svetlichny inequalities for three-qubit separable states are obtained. It is shown that the converse trade-off relations presented by Seevinck and Uffinck [Phys. Rev. A 2007 76 042105] do not always hold for three-qubit states, and that there exists some correlation even though the state is the simple product state.展开更多
A cloud of laser-cooled ^40Ca^+ is successfully trapped and manipulated under well control in our home-built linear ion trap, which is designed and constructed solely for studying quantum information processing. By e...A cloud of laser-cooled ^40Ca^+ is successfully trapped and manipulated under well control in our home-built linear ion trap, which is designed and constructed solely for studying quantum information processing. By exploring the variation of the ion cloud with respect to the trap parameters, we have optimized the trapping condition and obtained very good fluorescence spectra. We observe the dynamics of the ion cloud, and estimate the temperature of the ion cloud to be of the order of milli-Kelvin.展开更多
We recently proposed a flexible quantum secure direct communication protocol [Chin. Phys. Lett. 23 (2006) 3152]. By analyzing its security in the perfect channel from the aspect of quantum information theory, we fin...We recently proposed a flexible quantum secure direct communication protocol [Chin. Phys. Lett. 23 (2006) 3152]. By analyzing its security in the perfect channel from the aspect of quantum information theory, we find that an eavesdropper is capable of stealing all the information without being detected. Two typical attacks are presented to illustrate this point. A solution to this loophole is also suggested and we show its powerfulness against the most general individual attack in the ideal case. We also discuss the security in the imperfect case when there is noise and loss.展开更多
The Journal of Computational Mathematics is an international journal on numerical methods, analysis and applications. It publishs original research papers in English, French or German, but preferably in English. From ...The Journal of Computational Mathematics is an international journal on numerical methods, analysis and applications. It publishs original research papers in English, French or German, but preferably in English. From 1998, it has appeared bimonthly (instead of quarterly).展开更多
The Journal of Computational Mathematics is an international journal on numerical methods, analysis and applications. It publishs original research papers in English, French or German, but preferably in English. From ...The Journal of Computational Mathematics is an international journal on numerical methods, analysis and applications. It publishs original research papers in English, French or German, but preferably in English. From 1998, it has appeared bimonthly (instead of quarterly).展开更多
The Journal of Computational Mathematics is an international journal on numerical methods, analysis and applications. It publishs original research papers in English, French or German, but preferably in English. From ...The Journal of Computational Mathematics is an international journal on numerical methods, analysis and applications. It publishs original research papers in English, French or German, but preferably in English. From 1998, it has appeared bimonthly (instead of quarterly).展开更多
In 2023,the Nobel Prize in Chemistry was awarded to Bawendi,Brus,and Ekimov,three scientists who have made great contributions to the discovery and synthesis of quantum dots(QDs),heralding a new era for these nanomate...In 2023,the Nobel Prize in Chemistry was awarded to Bawendi,Brus,and Ekimov,three scientists who have made great contributions to the discovery and synthesis of quantum dots(QDs),heralding a new era for these nanomaterials.The inception of QDs dates back more than 40 years,during which the theory of QDs has been continuously refined,the manufacturing techniques have significantly flourished,and the applications have largely expanded.Recently,QDs have become important optical devices,playing key roles in numerous fields such as display,energy,and biomedical applications.To celebrate the outstanding achievements of QDs over the years,we dedicate this paper to QDs.In the information field,QDs have been extensively utilized to design devices related to domains like transmission and storage,achieving many breakthroughs in performance.This paper proposes a comprehensive set of methodologies and paradigms for designing information systems using QDs.The proposed approach embodies two characteristics of QDs:1)QDs play a central role in every aspect of the system and possess the capability to construct an all-quantum-dot(All-QD)information system.2)QDs possess tunability and wavelength flexibility,which can significantly enhance the information density.Finally,we construct a prototype model of an All-QD information system and validate its feasibility through simulation.We believe that with the continued development of quantum dot(QD)technology,the realization of an All-QD information system is on the horizon.展开更多
基金supported by the Major Scientific and Technological Projects of CNPC under Grant ZD2019-183-006partially supported by the Shandong Provincial Natural Science Foundation,China under Grant ZR2020MF006partially supported by“the Fundamental Research Funds for the Central Universities”of China University of Petroleum(East China)under Grant 20CX05017A,18CX02139A.
文摘In recent years,with the development of the social Internet of Things(IoT),all kinds of data accumulated on the network.These data,which contain a lot of social information and opinions.However,these data are rarely fully analyzed,which is a major obstacle to the intelligent development of the social IoT.In this paper,we propose a sentence similarity analysis model to analyze the similarity in people’s opinions on hot topics in social media and news pages.Most of these data are unstructured or semi-structured sentences,so the accuracy of sentence similarity analysis largely determines the model’s performance.For the purpose of improving accuracy,we propose a novel method of sentence similarity computation to extract the syntactic and semantic information of the semi-structured and unstructured sentences.We mainly consider the subjects,predicates and objects of sentence pairs and use Stanford Parser to classify the dependency relation triples to calculate the syntactic and semantic similarity between two sentences.Finally,we verify the performance of the model with the Microsoft Research Paraphrase Corpus(MRPC),which consists of 4076 pairs of training sentences and 1725 pairs of test sentences,and most of the data came from the news of social data.Extensive simulations demonstrate that our method outperforms other state-of-the-art methods regarding the correlation coefficient and the mean deviation.
基金supported by the National Basic Research Project of China (973) (2013CB329006)National Natural Science Foundation of China (NSFC, 61101071,61471220, 61021001)Tsinghua University Initiative Scientific Research Program
文摘The growing number of mobile users, as well as the diversification in types of services have resulted in increasing demands for wireless network bandwidth in recent years. Although evolving transmission techniques are able to enlarge the network capacity to some degree, they still cannot satisfy the requirements of mobile users. Meanwhile, following Moore's Law, the data processing capabilities of mobile user terminals are continuously improving. In this paper, we explore possible methods of trading strong computational power at wireless terminals for transmission efficiency of communications. Taking the specific scenario of wireless video conversation, we propose a model-based video coding scheme by learning the structures in multimedia contents. Benefiting from both strong computing capability and pre-learned model priors, only low-dimensional parameters need to be transmitted; and the intact multimedia contents can also be reconstructed at the receivers in real-time. Experiment results indicate that, compared to conventional video codecs, the proposed scheme significantly reduces the data rate with the aid of computational capability at wireless terminals.
基金Supported by the National Natural Science Foundation of China under Grant No 61003256, the Natural Science Foundation of CQ CSTC (Nos 2009BB2282 and 2008BB2193), the Doctor Foundation of Chongqing University of Posts and Telecommunications (A2009-01), and the Foundation of Chongqing Key Laboratory of Electronic Commerce and Logistics (Nos ECML1003 and ECML1010).
文摘Recently, the cryptosystem based on chaos has attracted much attention. Wang and Yu (Commun. Nonlin. Sci. Numer. Simulat. 14(2009)574) proposed a block encryption algorithm based on dynamic sequences of multiple chaotic systems. We analyze the potential flaws in the algorithm. Then, a chosen-plaintext attack is presented. Some remedial measures are suggested to avoid the flaws effectively. Furthermore, an improved encryption algorithm is proposed to resist the attacks" and to keep all the merits of the original cryptosystem.
文摘Due to the recent explosion of big data, our society has been rapidly going through digital transformation and entering a new world with numerous eye-opening developments. These new trends impact the society and future jobs, and thus student careers. At the heart of this digital transformation is data science, the discipline that makes sense of big data. With many rapidly emerging digital challenges ahead of us, this article discusses perspectives on iSchools' opportunities and suggestions in data science education. We argue that iSchools should empower their students with "information computing" disciplines, which we define as the ability to solve problems and create values, information, and knowledge using tools in application domains. As specific approaches to enforcing information computing disciplines in data science education, we suggest the three foci of user-based, tool-based, and application- based. These three loci will serve to differentiate the data science education of iSchools from that of computer science or business schools. We present a layered Data Science Education Framework (DSEF) with building blocks that include the three pillars of data science (people, technology, and data), computational thinking, data-driven paradigms, and data science lifecycles. Data science courses built on the top of this framework should thus be executed with user-based, tool-based, and application-based approaches. This framework will help our students think about data science problems from the big picture perspective and foster appropriate problem-solving skills in conjunction with broad perspectives of data science lifecycles. We hope the DSEF discussed in this article will help fellow iSchools in their design of new data science curricula.
基金Supported by the New Century Excellent Talent Project (NCET) of the Ministry of Education of China under Grant No NCET-06-0554, the National Natural Science Foundation of China under Grant Nos 10975001, 60677001, 10747146 and 10874122, the Science-Technology Fund of Anhui Province for Outstanding Youth under Grant No 06042087, the Key Fund of the Ministry of Education of China under Grant No 206063, the General Fund of the Educational Committee of Anhui Province under Grant No 2006KJ260B, the Natural Science Foundation of Guangdong Province under Grant Nos 06300345 and 7007806, and the Talent Foundation of High Education of Anhui Province for Outstanding Youth under Grant No 2009SQRZ018.
文摘Using the method presented recently [Phys.Rev.A 77(2008)014306; Phys.Lett.A 369(2007)377], the transformation operator (TO) is explicitly given for teleporting an arbitrary three-qubit state with a six-qubit channel and Bell-state measurements. A criterion on whether such quantum teleportation can be perfectly realized is educed in terms of TO. Moreover, six instantiations on TO and criterion are concisely shown.
基金Supported by the National Natural Science Foundation of China under Grant No 10971247, and the Hebei Natural Science Foundation of China under Grant No F2009000311.
文摘We propose a scheme for the probabilistic teleportation of an unknown two-particle state of general formation in ion trap. It is shown that one can realize experimentally this teleportation protocol of two-particle state with presently available techniques.
基金Supported by the National Natural Science Foundation of China under Grant No 10574126, the Hunan Provincial Natural Science Foundation under Grant No 06jj50014 and Key Foundation of the Education Commission of Hunan Province under Grant No 06A055.
文摘Based on superconducting charge qubits (SCCQs) coupled to a single-mode microwave cavity, we propose a scheme for generating charge cluster states. For all SCCQs, the controlled gate voltages are all in their degeneracy points, the quantum information is encoded in two logic states of charge basis. The generation of the multi-qubit cluster state can be achieved step by step on a pair of nearest-neighbor qubits. Considering effective long-rang coupling, we provide an efficient way to one-step generating of a highly entangled cluster state, in which the qubit-qubit coupling is mediated by the cavity mode. Our quantum operations are insensitive to the initial state of the cavity mode by removing the influence of the cavity mode via the periodical evolution of the system. Thus, our operation may be against the decoherence from the cavity.
文摘Without the geometry of light and logic of photon,observer-observability forms a paradox in modern science,truthequilibrium finds no unification,and mind-light-matter unity is unreachable in spacetime.Subsequently,quantum mechanics has been shrouded with mysteries preventing itself from reaching definable causality for a general purpose analytical quantum computing paradigm.Ground-0 Axioms are introduced as an equilibrium-based,dynamic,bipolar set-theoretic unification of the first principles of science and the second law of thermodynamics.Related literatures are critically reviewed to justify the self-evident nature of Ground-0 Axioms.A historical misinterpretation by the founding fathers of quantum mechanics is identified and corrected.That disproves spacetime geometries(including but not limited to Euclidean and Hilbert spaces)as the geometries of light and truth-based logics(including but not limited to bra-ket quantum logic)as the logics of photon.Backed with logically definable causality and Dirac 3-polarizer experiment,bipolar quantum geometry(BQG)and bipolar dynamic logic(BDL)are identified as the geometry of light and the logic of photon,respectively,and wave-particle complementarity is shown less fundamental than bipolar complementarity.As a result,Ground-0 Axioms lead to a geometrical and logical illumination of the quantum and classical worlds as well as the physical and mental worlds.With logical resolutions to the EPR and Schr?dinger’s cat paradoxes,an analytical quantum computing paradigm named quantum intelligence(QI)is introduced.It is shown that QI makes mind-light-matter unity and quantum-digital compatibility logically reachable for quantumneuro-fuzzy AI-machinery with groundbreaking applications.It is contended that Ground-0 Axioms open a new era of science and philosophy—the era of mind-light-matter unity in which humanlevel white-box AI&QI is logically prompted to join Einstein’s grand unification to foster major scientific advances.
文摘Analytic results of the relationship between local noncommutativity and non-violations of Svetlichny inequalities for three-qubit separable states are obtained. It is shown that the converse trade-off relations presented by Seevinck and Uffinck [Phys. Rev. A 2007 76 042105] do not always hold for three-qubit states, and that there exists some correlation even though the state is the simple product state.
基金Supported by the National Natural Science Foundation of China under the Grant Nos 10774163, 10774161 and 10974225, and the National Fundamental Research Program of China under Grant No 2006CB921203. We acknowledge thankfully Professor C. Wunderlich, and Professor D. Suter for help and/or discussion, and we are grateful to Professor Zhan Mingsheng and Professor Gao Kelin for support and encouragement.
文摘A cloud of laser-cooled ^40Ca^+ is successfully trapped and manipulated under well control in our home-built linear ion trap, which is designed and constructed solely for studying quantum information processing. By exploring the variation of the ion cloud with respect to the trap parameters, we have optimized the trapping condition and obtained very good fluorescence spectra. We observe the dynamics of the ion cloud, and estimate the temperature of the ion cloud to be of the order of milli-Kelvin.
文摘We recently proposed a flexible quantum secure direct communication protocol [Chin. Phys. Lett. 23 (2006) 3152]. By analyzing its security in the perfect channel from the aspect of quantum information theory, we find that an eavesdropper is capable of stealing all the information without being detected. Two typical attacks are presented to illustrate this point. A solution to this loophole is also suggested and we show its powerfulness against the most general individual attack in the ideal case. We also discuss the security in the imperfect case when there is noise and loss.
文摘The Journal of Computational Mathematics is an international journal on numerical methods, analysis and applications. It publishs original research papers in English, French or German, but preferably in English. From 1998, it has appeared bimonthly (instead of quarterly).
文摘The Journal of Computational Mathematics is an international journal on numerical methods, analysis and applications. It publishs original research papers in English, French or German, but preferably in English. From 1998, it has appeared bimonthly (instead of quarterly).
文摘The Journal of Computational Mathematics is an international journal on numerical methods, analysis and applications. It publishs original research papers in English, French or German, but preferably in English. From 1998, it has appeared bimonthly (instead of quarterly).
文摘In 2023,the Nobel Prize in Chemistry was awarded to Bawendi,Brus,and Ekimov,three scientists who have made great contributions to the discovery and synthesis of quantum dots(QDs),heralding a new era for these nanomaterials.The inception of QDs dates back more than 40 years,during which the theory of QDs has been continuously refined,the manufacturing techniques have significantly flourished,and the applications have largely expanded.Recently,QDs have become important optical devices,playing key roles in numerous fields such as display,energy,and biomedical applications.To celebrate the outstanding achievements of QDs over the years,we dedicate this paper to QDs.In the information field,QDs have been extensively utilized to design devices related to domains like transmission and storage,achieving many breakthroughs in performance.This paper proposes a comprehensive set of methodologies and paradigms for designing information systems using QDs.The proposed approach embodies two characteristics of QDs:1)QDs play a central role in every aspect of the system and possess the capability to construct an all-quantum-dot(All-QD)information system.2)QDs possess tunability and wavelength flexibility,which can significantly enhance the information density.Finally,we construct a prototype model of an All-QD information system and validate its feasibility through simulation.We believe that with the continued development of quantum dot(QD)technology,the realization of an All-QD information system is on the horizon.