期刊文献+
共找到65篇文章
< 1 2 4 >
每页显示 20 50 100
Teleportation of an Arbitrary Two-Particle State by Two Partial Entangled Three-Particle GHZ States 被引量:6
1
作者 DAIHong-Yi CHENPing-Xing LICheng-Zu 《Communications in Theoretical Physics》 SCIE CAS CSCD 2005年第5期799-802,共4页
We present a scheme for teleporting an unknown arbitrary two-particle state from a sender to either one of two receivers. The quantum channel is composed of two partial entangled three-particle GHZ states. An unknown ... We present a scheme for teleporting an unknown arbitrary two-particle state from a sender to either one of two receivers. The quantum channel is composed of two partial entangled three-particle GHZ states. An unknown arbitrary two-particle state can be perfectly teleported probabilistically if the sender performs two generalized Bell-state measurements and each receiver introduces an appropriate unitary transformation with the help of the other receiver's Hadamard operations and simple measurements. 展开更多
关键词 probabilistic teleportation arbitrary two-particle state unitary transformation Hadamard operation
下载PDF
ARRAY PULSED EDDY CURRENT IMAGING SYSTEM USED TO DETECT CORROSION 被引量:4
2
作者 YangBinfeng LuoFeilu CaoXiongheng XuXiaojie 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2005年第2期196-198,共3页
A theory model is established to describe the voltage-current responsefunction. The peak amplitude and the zero-crossing time of the transient signal is extracted as theimaging features, array pulsed eddy current (PEC... A theory model is established to describe the voltage-current responsefunction. The peak amplitude and the zero-crossing time of the transient signal is extracted as theimaging features, array pulsed eddy current (PEC) imaging is proposed to detect corrosion. The testresults show that this system has the advantage of fast scanning speed, different imaging mode andquantitative detection, it has a broad application in the aviation nondestructive testing. 展开更多
关键词 Array probe Pulsed eddy current Aircraft structure Corrosion imaging
下载PDF
Extension of Subjective Logic for Time-Related Trust 被引量:3
3
作者 HUANGChen-lin HUHua-ping 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期56-60,共5页
To describe the dynamic propcrty of trust relationship, wt propose atime-related trust model and extend Joang's subjective logic to fit for time-related trust model.The extension includes prepositional conjunction... To describe the dynamic propcrty of trust relationship, wt propose atime-related trust model and extend Joang's subjective logic to fit for time-related trust model.The extension includes prepositional conjunction, disjunction and negation for traditional logic anddiscounting and consensus operators that are evidential operators specially designed for thepropagation and computation of trust relationships. With the extension of subjective logic fortime-related trust, our time-related trust modelis suitable to model the dynamic trust relationshipin practice. Finally an example of reputation assessment is offered to demonstrate the usage of ourtrust model. 展开更多
关键词 trust model lime-related trust relationship time-related trust model subjective logic
下载PDF
Study on the detection of the multiple unresloved targets 被引量:3
4
作者 LiChaowei WangHongqiang LiXiang ZhuangZhaowen 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期295-300,共6页
When the returns come from two or more unresolved targets (the signals are not resolved in the frequency or time domains) in a monopulse radar system, the direction-of-arrival (DOA)estimate indicated by the monopulse ... When the returns come from two or more unresolved targets (the signals are not resolved in the frequency or time domains) in a monopulse radar system, the direction-of-arrival (DOA)estimate indicated by the monopulse ratio is not the true information of the tracked target.Then the tracking systems is influenced. An approach has been proposed to detect whether the returns come from a single target or two unresolved targets. The above approach is extended from two to three unresolved targets. The simulation indicates that the detection probability under the three unresolved targets is not sure to exceed the detection probability under the two unresolved targets. 展开更多
关键词 monopulse radar unresolved targets DOA detection probability.
下载PDF
Modeling of Rocks with Spatial Distributed Fractures by Random Medium Theory 被引量:3
5
作者 ZengXinwu ZhangGuangying WangXiuming 《Applied Geophysics》 SCIE CSCD 2004年第1期50-55,共6页
By using the spectrum expanding theory of random processes and Hudson's crack model,we developed a random medium model for rocks with spatial random distributed number density of cracks. This model could connect t... By using the spectrum expanding theory of random processes and Hudson's crack model,we developed a random medium model for rocks with spatial random distributed number density of cracks. This model could connect the micro-parameters of the cracks with the macro- mechanical properties, and can be effectively applied to model the real inhomogeneous medium. Numerical example indicates that the random distribution characters could be different for different elastic constants under the same random distribution of number density of cracks. By changing the value of the autocorrelation length pair, it is possible to model the difference of the distribution in the two coordinate directions. Numerical modeling results for seismic wave propagating in rocks with random distributed fractures using a staggered high-order finite-difference (SHOFD) are also presented. 展开更多
关键词 random medium autocorrelation function ROCK and fracture
下载PDF
A Method of Eliminating Noises in Web Pages by Style Tree Model and Its Applications 被引量:2
6
作者 ZHAOCheng-li YIDong-yun 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期611-616,共6页
A Web page typically contains many information blocks. Apart from the main content blocks, it usually has such blocks as navigation panels, copyright and privacy notices, and advertisements. We call these blocks the n... A Web page typically contains many information blocks. Apart from the main content blocks, it usually has such blocks as navigation panels, copyright and privacy notices, and advertisements. We call these blocks the noisy blocks. The noises in Web pages can seriously harm Web data mining. To the question of climinating these noises, we intro duce a new tree structure, called Style Tree, and study an algorithm how to construct a site style tree. The Style Tree Model is employed to detect and climinate noises in any Web pages of the site. An information based measure to determine which element node is noisy is also constructed. In addition, the applications of this method are discussed in detail. Experimental results show that our noises climination technique is able to improve the mining results significantly. Key words noises climination - DOM tree - style tree - Web mining CLC number TP 339 Foundation item: Supported by the National Natural Science Foundation of China (60003013)Biography: ZHAN Cheng-li (1979-), male, Master candidate, research direction: Intelligent Information System. 展开更多
关键词 noises climination DOM tree style tree Web mining
下载PDF
Image processing algorithm acceleration using reconfigurable macro processor model 被引量:2
7
作者 SunGuanKfu ChenHuaming LuHuanzhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第2期110-114,共5页
The concept and advantage of reconfigurable technology is introduced. A kind of processor architecture of re configurable macro processor (RMP) model based on FPGA array and DSP is put forward and has been implemented... The concept and advantage of reconfigurable technology is introduced. A kind of processor architecture of re configurable macro processor (RMP) model based on FPGA array and DSP is put forward and has been implemented. Two image algorithms are developed: template-based automatic target recognition and zone labeling. One is estimating for motion direction in the infrared image background, another is line picking-up algorithm based on image zone labeling and phase grouping technique. It is a kind of 'hardware' function that can be called by the DSP in high-level algorithm. It is also a kind of hardware algorithm of the DSP. The results of experiments show the reconfigurable computing technology based on RMP is an ideal accelerating means to deal with the high-speed image processing tasks. High real time performance is obtained in our two applications on RMP. 展开更多
关键词 real-time image processing reconfigurable computing technology reconfigurable macro processor model template matching image zone labeling.
下载PDF
GEARBOX FAULTDIAGNOSIS BASED ON EMPIRICAL MODE DECOMPOSITION 被引量:2
8
作者 ShenGuoji TaoLimin ChenZhongsheng 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2004年第3期454-456,共3页
Time synchronous averaging of vibration data is a fundament technique forgearbox diagnosis. Currently, this technique relies on hardware tachometer to give phase synchronousinformation. Empirical mode decomposition (E... Time synchronous averaging of vibration data is a fundament technique forgearbox diagnosis. Currently, this technique relies on hardware tachometer to give phase synchronousinformation. Empirical mode decomposition (EMD) is introduced to replace time synchronous averagingof gearbox vibration signal. With it, any complicated dataset can be decomposed into a finite andoften small number of intrinsic mode functions (IMF). The key problem is how to assure thatvibration signals deduced by gear defects could be sifted out by EMD. The characteristic vibrationsignals of gear defects are proved IMFs, which makes it possible to utilize EMD for the diagnosis ofgearbox faults. The method is validated by data from recordings of the vibration of a single-stagespiral bevel gearbox with fatigue pitting. The results show EMD is powerful to extractcharacteristic information from noisy vibration signals. 展开更多
关键词 Empirical mode decomposition Intrinsic mode functions Gearbox diagnosis
下载PDF
SLID: A Secure Lowest-ID Clustering Algorithm 被引量:2
9
作者 HUGuang-ming HUANGZun-guo HUHua-ping GONGZheng-hu 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期39-42,共4页
In order to solve security problem of clustering algorithm, we proposed amethod to enhance the security of the well-known lowest-ID clustering algorithm. This method isbased on the idea of the secret sharing and the (... In order to solve security problem of clustering algorithm, we proposed amethod to enhance the security of the well-known lowest-ID clustering algorithm. This method isbased on the idea of the secret sharing and the (k, n) threshold cryptography, Each node, whetherclusterhead or ordinary member, holds a share of the global certificate, and any k nodes cancommunicate securely. There is no need for any clusterhead to execute extra functions more thanrouting. Our scheme needs some prior configuration before deployment, and can be used in criticalenvironment with small scale. The security-enhancement for Lowest-ID algorithm can also be appliedinto other clustering approaches with minor modification. The feasibility of this method wasverified bythe simulation results. 展开更多
关键词 clustering algorithm secret sharing threshold cryptography
下载PDF
Quasi-Optical Cavity Virtual Cathode Oscillator for Microwave Generation 被引量:1
10
作者 凌根深 陈波 周津娟 《Chinese Physics Letters》 SCIE CAS CSCD 2003年第11期1977-1980,共4页
A new configuration of a virtual cathode oscillator (VCO), i.e., a quasi-optical cavity VCO, is proposed for high-power microwave generation. The analysis and simulation are carried out to investigate the characterist... A new configuration of a virtual cathode oscillator (VCO), i.e., a quasi-optical cavity VCO, is proposed for high-power microwave generation. The analysis and simulation are carried out to investigate the characteristics of thisconfiguration. In the numerical simulation, the microwave output power of 2.93 GW is obtained with an electronbeam of 610 keV in electron energy and 26.7kA in the beam current. The beam-to-microwave power efficiency is18%. The frequency is 17.5 GHz, and the output microwave mode is TEM10. 展开更多
关键词 虚拟阴极振荡器 VCO 结构 准光学腔 微波产生 数值模拟 电子能量
下载PDF
NEW FEATURE SELECTION METHOD IN MACHINE FAULT DIAGNOSIS 被引量:1
11
作者 WangXinfeng QiuJing LiuGuanjun 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2005年第2期251-254,共4页
Aiming to deficiency of the filter and wrapper feature selection methods, anew method based on composite method of filter and wrapper method is proposed. First the methodfilters original features to form a feature sub... Aiming to deficiency of the filter and wrapper feature selection methods, anew method based on composite method of filter and wrapper method is proposed. First the methodfilters original features to form a feature subset which can meet classification correctness rate,then applies wrapper feature selection method select optimal feature subset. A successful techniquefor solving optimization problems is given by genetic algorithm (GA). GA is applied to the problemof optimal feature selection. The composite method saves computing time several times of the wrappermethod with holding the classification accuracy in data simulation and experiment on bearing faultfeature selection. So this method possesses excellent optimization property, can save more selectiontime, and has the characteristics of high accuracy and high efficiency. 展开更多
关键词 Feature selection Filter method Wrapper method Composite method Mutualinformation Genetic algorithm (GA)
下载PDF
Fingerprint Matching Based on Local Relative Orientation Field 被引量:1
12
作者 ZHUEn YINJian-ping ZHANGGuo-min 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第4期435-438,共4页
A fingerprint matching method based on local relative orientation field is proposed. It extracts local relative orientation field around each minutia for minutiae matching. Local orientation features are also used to ... A fingerprint matching method based on local relative orientation field is proposed. It extracts local relative orientation field around each minutia for minutiae matching. Local orientation features are also used to sorting minutiae in order to speed up searching a minutia when pairing minutiae. The experimental result reveals that this method achieves improved recognition accuracy. Key words fingerprint matching - ridge-based minutiae matching - local relative orientation field - sorting minutiae CLC number TP 391 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: ZHU En (1976-), male, Ph. D candidate, research direction: pattern recognition, image processing and information security. 展开更多
关键词 fingerprint matching ridge-based minutiae matching local relative orientation field sorting minutiae
下载PDF
Probabilistic Teleportation of an Arbitrary Three-Level Two-Particle State and Classical Communication Cost 被引量:1
13
作者 DAIHong-Yi KUANGLe-Man LICheng-Zu 《Communications in Theoretical Physics》 SCIE CAS CSCD 2005年第1X期40-44,共5页
We propose a scheme to probabilistically teleport an unknown arbitrary three-level two-particle state by using two partial entangled two-particle states of three-level as the quantum channel. The classical communicati... We propose a scheme to probabilistically teleport an unknown arbitrary three-level two-particle state by using two partial entangled two-particle states of three-level as the quantum channel. The classical communication cost required in the ideal probabilistic teleportation process is also calculated. This scheme can be directly generalized to teleport an unknown and arbitrary three-level K-particle state by using K partial entangled two-particle states of three-level as the quantum channel. 展开更多
关键词 概率论 随机离子 通讯成本 量子论
下载PDF
DETECTION OF EARLY RUB-IMPACT IN ROTORS VIA HIGHER-ORDER TIME-FREQUENCY ENTROPY 被引量:1
14
作者 ChenZhongsheng YangYongmin HuZheng ShenGuoji 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2004年第4期614-617,共4页
Due to the calculation problem of classical methods (such as Lyapunovexponent) for chaotic behavior, a new method of identifying nonlinear dynamics with higher-ordertime-frequency entropy (HOTFE) based on time-frequen... Due to the calculation problem of classical methods (such as Lyapunovexponent) for chaotic behavior, a new method of identifying nonlinear dynamics with higher-ordertime-frequency entropy (HOTFE) based on time-frequency analysis and information theorem is proposed.Firstly, the meaning of HOTFE is defined, and then its validity is testified by numericalsimulation. In the end vibration data from rotors are analyzed by HOTFE. The results demonstratethat it can indeed identify the early rub-impact chaotic behavior in rotors and also is simpler tocalculate than previous methods. 展开更多
关键词 Higher-order time-frequeney entropy(HOTFE) Chaotic behavior Early faults RUB-IMPACT
下载PDF
Access Request Trustworthiness in Weighted Access Control Framework 被引量:1
15
作者 WANGLun-wei LIAOXiang-ke WANGHuai-min 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期65-69,共5页
Weighted factor is given to access eontrol policies to express the importanceof policy and its effect on access control decision. According to this weighted access controlframework, a trustworthiness model for aceess ... Weighted factor is given to access eontrol policies to express the importanceof policy and its effect on access control decision. According to this weighted access controlframework, a trustworthiness model for aceess request is also given. In this model, we give themeasure of trustworthiness factor to access request- by using some idea of uncertainty reasoning ofexpert system, present and prove the parallel propagation formula of request trustworthiness factoramong multiple policies, and get thefinal trustworthiness factor to decide whether authorizing. Inthis model, authorization decision is given according to the calculation of request trustworthinessfactor, which is more understandable, more suitable for real requirement and more powerfulforsecurity enhancement than traditional methods. Meanwhile the finer access control granularity isanother advantage. 展开更多
关键词 weighted factor access control framework access request trustworthiness
下载PDF
The Distributed Network Monitoring Model with Bounded Delay Constraints 被引量:1
16
作者 LIUXiang-hui YINJian-ping +2 位作者 LUXi-cheng CAIZhi-ping ZHAOJian-min 《Wuhan University Journal of Natural Sciences》 CAS 2004年第4期429-434,共6页
We address the problem of optimizing a distributed monitoring system and the goal of the optimization is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subje... We address the problem of optimizing a distributed monitoring system and the goal of the optimization is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subject to delay constraint on the aggregating path. We show that this problem is NP-hard and propose approximation algorithm proving the approximation ratio with lnm+1, where is the number of monitoring nodes. At last we extend our modal with more constraint of bounded delay variation. Key words network - distributed monitoring - delay constraint - NP-hard CLC number TP 393 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: LIU Xiang-hui(1973-), male, Ph. D. candidate, research direction: algorithm complexity analysis, QoS in Internet. 展开更多
关键词 NETWORK distributed monitoring delay constraint NP-HARD
下载PDF
OPTIMAL DESIGN OF SMART ANTENNA ARRAY 被引量:1
17
作者 GaoFeng LiuQizhong +1 位作者 ShanRunhong ZhangHou 《Journal of Electronics(China)》 2004年第4期342-345,共4页
This letter investigates an efficient design procedure integrating the Genetic Algorithm (GA) with the Finite Difference Time Domain (FDTD) for the fast optimal design of Smart Antenna Arrays (SAA). The FDTD is used t... This letter investigates an efficient design procedure integrating the Genetic Algorithm (GA) with the Finite Difference Time Domain (FDTD) for the fast optimal design of Smart Antenna Arrays (SAA). The FDTD is used to analyze SAA with mutual coupling. Then,on the basis of the Maximal Signal to Noise Ratio (MSNR) criteria, the GA is applied to the optimization of weighting elements and structure of SAA. Finally, the effectiveness of the analysis is evaluated by experimental antenna arrays. 展开更多
关键词 Genetic Algorithm(GA) Finite Difference Time Domain (FDTD) Mutual coupling Weighting element BEAM-FORMING
下载PDF
Probabilistic teleportation of an arbitrary three-particle state via a partial entangled four-particle state and a partial entangled pair 被引量:14
18
作者 戴宏毅 李承祖 陈平行 《Chinese Physics B》 SCIE EI CAS CSCD 2003年第12期1354-1359,共6页
下载PDF
A Compact Vircator with Feedback Annulus Operated in Quasi—Single TM01 Mode Within the C Band 被引量:6
19
作者 舒挺 王勇 《Chinese Physics Letters》 SCIE CAS CSCD 2002年第11期1646-1648,共3页
下载PDF
Experimental and Theoretical Research on the Vibrational Gaps in Two-Dimensional Three-Component Composite Thin Plates 被引量:2
20
作者 郁殿龙 刘耀宗 +2 位作者 丘静 赵宏刚 刘志明 《Chinese Physics Letters》 SCIE CAS CSCD 2005年第8期1958-1960,共3页
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部