Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections...Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation.展开更多
We systematically investigate the motion of slowly moving matter wave gap solitons in a nonlinear potential, produced by the weak random spatial variation of the atomic scattering length. With the weak randomness, we ...We systematically investigate the motion of slowly moving matter wave gap solitons in a nonlinear potential, produced by the weak random spatial variation of the atomic scattering length. With the weak randomness, we construct an effective-particle theory to study the motion of gap solitons. Based on the effective-particle theory, the effect of the randomness on gap solitons is obtained, and the motion of gap solitons is finally solved. Moreover, the analytic results for the general behaviours of gap soliton motion, such as the ensemble-average speed and the reflection probability depending on the weak randomness are obtained. We find that with the increase of the random strength the ensemble-average speed of gap solitons decreases slowly where the reduction is proportional to the variance of the weak randomness, and the reflection probability becomes larger. The theoretical results are in good agreement with the numerical simulations based on the Cross-Pitaevskii equation.展开更多
1 Introduction and preliminaries The aim of this note is to prove the following basic theorem: Let (Ω, σ, u) be a probability space, (B, ‖·‖) a weakly compactly generated Banach space, and a mapping V from Ω...1 Introduction and preliminaries The aim of this note is to prove the following basic theorem: Let (Ω, σ, u) be a probability space, (B, ‖·‖) a weakly compactly generated Banach space, and a mapping V from Ω to B be a weak random element, then there exists a unique strongly measurable random element V from Ω to B under the sense of almost sure equality such that (?) is weakly equivalent to the weak random dement V. This theorem itself not only removes the limitation that the weak random element considered in a theorem due to Lewis is bounded, but also has many applications to probability theory in Banach spacest. As an example of applications, we give a theorem of properties of the reproducing kernel Hilbert spaces for weak twofold weak random elements.展开更多
In this paper, the complete convergence and weak law of large numbers are established for ρ-mixing sequences of random variables. Our results extend and improve the Baum and Katz complete convergence theorem and the ...In this paper, the complete convergence and weak law of large numbers are established for ρ-mixing sequences of random variables. Our results extend and improve the Baum and Katz complete convergence theorem and the classical weak law of large numbers, etc. from independent sequences of random variables to ρ-mixing sequences of random variables without necessarily adding any extra conditions.展开更多
In this paper, a Darbao type random fixed point theorem for a system of weak continuous random operators with random domain is first proved. When, by using the theorem, some existence criteria of random solutions for ...In this paper, a Darbao type random fixed point theorem for a system of weak continuous random operators with random domain is first proved. When, by using the theorem, some existence criteria of random solutions for a systems of nonlinear random Volterra integral equations relative to the weak topology in Banach spaces are given. As applications, some existence theorems of weak random solutions for the random Cauchy problem of a system of nonlinear random differential equations are obtained, as well as the existence of extremal random solutions and random comparison results for these systems of random equations relative to weak topology in Banach spaces. The corresponding results of Szep, Mitchell-Smith, Cramer-Lakshmikantham, Lakshmikantham-Leela and Ding are improved and generalized by these theorems.展开更多
Evolutionary computation is a kind of adaptive non--numerical computation method which is designed tosimulate evolution of nature. In this paper, evolutionary algorithm behavior is described in terms of theconstructio...Evolutionary computation is a kind of adaptive non--numerical computation method which is designed tosimulate evolution of nature. In this paper, evolutionary algorithm behavior is described in terms of theconstruction and evolution of the sampling distributions over the space of candidate solutions. Iterativeconstruction of the sampling distributions is based on the idea of the global random search of generationalmethods. Under this frame, propontional selection is characterized as a gobal search operator, and recombination is characerized as the search process that exploits similarities. It is shown-that by properly constraining the search breadth of recombination operators, weak convergence of evolutionary algorithms to aglobal optimum can be ensured.展开更多
In this paper the authors study the complete, weak and almost sure convergence for weighted sums of NOD random variables and obtain some new limit theorems for weighted sums of NOD random variables, which extend the c...In this paper the authors study the complete, weak and almost sure convergence for weighted sums of NOD random variables and obtain some new limit theorems for weighted sums of NOD random variables, which extend the corresponding theorems of Stout [1], Thrum [2] and Hu et al. [3].展开更多
随着深度学习的快速发展,基于多视图的三维场景恢复研究和应用越来越广泛。许多研究者关注通过优化深度学习网络提高三维场景恢复效果,深度学习使用的训练数据集的相机位姿分布具有规范度高的内在特点。然而在实际应用中,普通用户拍摄...随着深度学习的快速发展,基于多视图的三维场景恢复研究和应用越来越广泛。许多研究者关注通过优化深度学习网络提高三维场景恢复效果,深度学习使用的训练数据集的相机位姿分布具有规范度高的内在特点。然而在实际应用中,普通用户拍摄目标场景时,相机位姿分布具有较大的随机性,难以保证获取到和训练数据集质量等同或接近的目标场景图像数据,从而影响恢复效果。为了缓解这一问题,该文提出了基于弱随机相机位姿图像的三维场景恢复方法,通过给用户提供目标场景拍摄建议,降低所获取目标场景图像相机位姿分布的随机性,提高场景的三维恢复效果。首先,用户在目标场景拍摄指导下,获得同一场景下不同视角的二维图像数据,然后通过SFM(Structure From Motion)恢复场景的三维稀疏点云和相机位姿,最后在MVS(Multi-View Stereo)网络模型中进行三维点云的稠密重建。实验结果表明,相比拍摄建议前,该方法有效降低了所获取目标场景图像相机位姿分布的随机性,三维场景恢复成功率提高了52.95%。展开更多
基金the National Key Research and Development Program of China(Grant No.2020YFA0309702)NSAF(Grant No.U2130205)+3 种基金the National Natural Science Foundation of China(Grant Nos.62101597,61605248,and 61505261)the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies。
文摘Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation.
基金Project supported by the National Basic Research Program of China (Grant No 2006CB921701-6)Pujiang Talent Project (Grant No PJ2005(00593))the Hundred Tarent Project of the Chinese Academy of Sciences, China
文摘We systematically investigate the motion of slowly moving matter wave gap solitons in a nonlinear potential, produced by the weak random spatial variation of the atomic scattering length. With the weak randomness, we construct an effective-particle theory to study the motion of gap solitons. Based on the effective-particle theory, the effect of the randomness on gap solitons is obtained, and the motion of gap solitons is finally solved. Moreover, the analytic results for the general behaviours of gap soliton motion, such as the ensemble-average speed and the reflection probability depending on the weak randomness are obtained. We find that with the increase of the random strength the ensemble-average speed of gap solitons decreases slowly where the reduction is proportional to the variance of the weak randomness, and the reflection probability becomes larger. The theoretical results are in good agreement with the numerical simulations based on the Cross-Pitaevskii equation.
文摘1 Introduction and preliminaries The aim of this note is to prove the following basic theorem: Let (Ω, σ, u) be a probability space, (B, ‖·‖) a weakly compactly generated Banach space, and a mapping V from Ω to B be a weak random element, then there exists a unique strongly measurable random element V from Ω to B under the sense of almost sure equality such that (?) is weakly equivalent to the weak random dement V. This theorem itself not only removes the limitation that the weak random element considered in a theorem due to Lewis is bounded, but also has many applications to probability theory in Banach spacest. As an example of applications, we give a theorem of properties of the reproducing kernel Hilbert spaces for weak twofold weak random elements.
文摘In this paper, the complete convergence and weak law of large numbers are established for ρ-mixing sequences of random variables. Our results extend and improve the Baum and Katz complete convergence theorem and the classical weak law of large numbers, etc. from independent sequences of random variables to ρ-mixing sequences of random variables without necessarily adding any extra conditions.
文摘In this paper, a Darbao type random fixed point theorem for a system of weak continuous random operators with random domain is first proved. When, by using the theorem, some existence criteria of random solutions for a systems of nonlinear random Volterra integral equations relative to the weak topology in Banach spaces are given. As applications, some existence theorems of weak random solutions for the random Cauchy problem of a system of nonlinear random differential equations are obtained, as well as the existence of extremal random solutions and random comparison results for these systems of random equations relative to weak topology in Banach spaces. The corresponding results of Szep, Mitchell-Smith, Cramer-Lakshmikantham, Lakshmikantham-Leela and Ding are improved and generalized by these theorems.
文摘Evolutionary computation is a kind of adaptive non--numerical computation method which is designed tosimulate evolution of nature. In this paper, evolutionary algorithm behavior is described in terms of theconstruction and evolution of the sampling distributions over the space of candidate solutions. Iterativeconstruction of the sampling distributions is based on the idea of the global random search of generationalmethods. Under this frame, propontional selection is characterized as a gobal search operator, and recombination is characerized as the search process that exploits similarities. It is shown-that by properly constraining the search breadth of recombination operators, weak convergence of evolutionary algorithms to aglobal optimum can be ensured.
文摘In this paper the authors study the complete, weak and almost sure convergence for weighted sums of NOD random variables and obtain some new limit theorems for weighted sums of NOD random variables, which extend the corresponding theorems of Stout [1], Thrum [2] and Hu et al. [3].
文摘随着深度学习的快速发展,基于多视图的三维场景恢复研究和应用越来越广泛。许多研究者关注通过优化深度学习网络提高三维场景恢复效果,深度学习使用的训练数据集的相机位姿分布具有规范度高的内在特点。然而在实际应用中,普通用户拍摄目标场景时,相机位姿分布具有较大的随机性,难以保证获取到和训练数据集质量等同或接近的目标场景图像数据,从而影响恢复效果。为了缓解这一问题,该文提出了基于弱随机相机位姿图像的三维场景恢复方法,通过给用户提供目标场景拍摄建议,降低所获取目标场景图像相机位姿分布的随机性,提高场景的三维恢复效果。首先,用户在目标场景拍摄指导下,获得同一场景下不同视角的二维图像数据,然后通过SFM(Structure From Motion)恢复场景的三维稀疏点云和相机位姿,最后在MVS(Multi-View Stereo)网络模型中进行三维点云的稠密重建。实验结果表明,相比拍摄建议前,该方法有效降低了所获取目标场景图像相机位姿分布的随机性,三维场景恢复成功率提高了52.95%。