Molecular structure, vibrational frequency and infrared intensity of UF6 are investigated by using the revised Perdew Burke-Enzerhof function with the triple-zeta polarized basis set. The calculation results are in go...Molecular structure, vibrational frequency and infrared intensity of UF6 are investigated by using the revised Perdew Burke-Enzerhof function with the triple-zeta polarized basis set. The calculation results are in good agreement with the experimental values and indicate the existence of a stable U2F6 molecule with a multiple bonded U2 unit. The calculation results also predict that the D3d symmetry of U2F6 is more stable than D3h. The optimized geometries, vibrational frequencies, and infrared intensities are also reported for U2F6 molecules in D3d symmetry. In addition, the isotopic shift of vibrational frequencies of the two molecules under isotopic substitution of uranium atom are also investigated with the same method. The U2F6 molecule is predicted to be better than UF6 for laser uranic isotope separation.展开更多
The equilibrium structures and the electronic, spectroscopic and thermodynamic properties of small Pun (n = 2- 5) molecules are systematically investigated using the methods of general gradient approximation (GGA)...The equilibrium structures and the electronic, spectroscopic and thermodynamic properties of small Pun (n = 2- 5) molecules are systematically investigated using the methods of general gradient approximation (GGA) of density functional theory (DFT). The results show that the bond length of the lowest-energy structure of Pu2 is 2.578 A. The ground state structure of Pu3 is a triangle with D3h symmetry, whereas for Pu4, the ground state structure is a square (D4h) and the spin polarization of 16 for molecule Pu5 with square geometry (D_4h) is the most stable structure. For the ground state structures, the vibrational spectra as well as thermodynamic parameters are worked out. In addition, the values for the highest occupied molecular orbital (HOMO) and the lowest unoccupied molecular orbital (LUMO) along with the energy gap of all the Pu_2-5 structures are presented. The relevant structural and chemical stabilities are predicted.展开更多
Based on the calculation of all the pairwise entanglements in the n (n ≤ 6)-qubit Heisenberg XX open chain with system impurity, we find an important result: pairwise entanglement can only be transferred by an ent...Based on the calculation of all the pairwise entanglements in the n (n ≤ 6)-qubit Heisenberg XX open chain with system impurity, we find an important result: pairwise entanglement can only be transferred by an entangled pair. The non-nearest pairwise entanglements will have the possibility to exist as long as there has been even number of qubits in their middle. This point indicates that we can obtain longer distance entanglement in a solid system.展开更多
Recently, Xiu et al. [Commun. Theor. Phys. 49 (2008) 905] proposed two schemes of teleporting an N particle arbitrary and unknown state when N groups of three particle general W states are utilized a.s quantum chann...Recently, Xiu et al. [Commun. Theor. Phys. 49 (2008) 905] proposed two schemes of teleporting an N particle arbitrary and unknown state when N groups of three particle general W states are utilized a.s quantum channels. They gave the maximal probability of successful teleportation. Here we find that their operation is not the optimal and the successful probability of the teleportation is not maximum. Moreover, we give the optimal schemes operation and obtain maximal successful probability for teleportation.展开更多
We propose two schemes to produce long-distance entanglement in a spin chain. The first is based on a controllable interaction system, one starts from an entangled kernel and adds weaken interaction spins to the bound...We propose two schemes to produce long-distance entanglement in a spin chain. The first is based on a controllable interaction system, one starts from an entangled kernel and adds weaken interaction spins to the boundary sites step by step, then the entanglement will be extended longer and longer and its value is equal to that of its kernel. The second is based on a uniform interaction (J) system with a bulk magnetic field (B) that is absent for the boundary qubits, as long as B/J 〉 5, one can obtain near perfect long distance entanglement. Ultra-low temperature is needed in both schemes.展开更多
We parameterize the Green–Schwarz IIB superstring in the AdS_(3)×S^(3) background under the light cone gauge by the method of Metsaev and Tseytlin in AdS3 and by the method of Rahmfeld and Rajaraman in S3.After ...We parameterize the Green–Schwarz IIB superstring in the AdS_(3)×S^(3) background under the light cone gauge by the method of Metsaev and Tseytlin in AdS3 and by the method of Rahmfeld and Rajaraman in S3.After some calculation,we obtain the corresponding Maurer–Cartan 1−forms and the action.Then we fix two bosonic variables x+=τand y^(5)=σ,perform the partial Legendre transformation of the remaining bosonic variables,and find a Lagrangian that is linear in velocity after eliminating the metric of the world sheet.We also give the Hamiltonian and prove that the system is local and the Poisson bracket of the theory can be well defined.Using these results,one can further study the properties of solution space,solution transformation and the structure of the flat current algebra of the superstring in the AdS_(3)×S^(3) background.展开更多
In this paper,we show how to use the dual techniques in the subgroups to give a secure identity-based broadcast encryption(IBBE) scheme with constant-size ciphertexts. Our scheme achieves the full security(adaptive se...In this paper,we show how to use the dual techniques in the subgroups to give a secure identity-based broadcast encryption(IBBE) scheme with constant-size ciphertexts. Our scheme achieves the full security(adaptive security) under three static(i.e. non q-based) assumptions. It is worth noting that only recently Waters gives a short ciphertext broadcast encryption system that is even adaptively secure under the simple assumptions. One feature of our methodology is that it is relatively simple to leverage our techniques to get adaptive security.展开更多
The carboxyl-functionalized graphene oxide(GO-COOH)is a kind of unique two-dimensional(2 D)material and possesses excellent nonlinear saturable absorption property and high water-solubility.In this paper,we prepare sa...The carboxyl-functionalized graphene oxide(GO-COOH)is a kind of unique two-dimensional(2 D)material and possesses excellent nonlinear saturable absorption property and high water-solubility.In this paper,we prepare saturable absorber(SA)device by depositing GO-COOH nanosheets aqueous solution on a D-shaped fiber.The modulation depth(MD)and saturable intensity of the SA are measured to be 9.6%and 19 MW/cm^(2),respectively.By inserting the SA into the erbium-doped fiber(EDF)laser,a passively mode-locked EDF laser has been achieved with the spectrum center wavelength of 1562.76 nm.The pulse duration,repetition rate,and the signal-to-noise ratio(SNR)are 500 fs,14.79 MHz,and 80 dB,respectively.The maximum average output power is measured to be 3.85 mW.These results indicate that the GO-COOH nanosheets SA can be used as a promising mode locker for the generation of ultrashort pulses.展开更多
We demonstrate a nanosecond mode-locked erbium-doped fiber laser (EDFL) based on a reduced graphene oxide (RGO) saturable absorber (SA). The RGO SA is prepared by depositing the graphene oxide (GO) on fluorine...We demonstrate a nanosecond mode-locked erbium-doped fiber laser (EDFL) based on a reduced graphene oxide (RGO) saturable absorber (SA). The RGO SA is prepared by depositing the graphene oxide (GO) on fluorine mica through thermal reduction of GO. A scanning electron microscope (SEM), Raman spectrometer, and x-ray photoelectron spec- troscopy (XPS) are adopted to analyze the RGO characteristics. The results show that the reduction degree of graphene oxide is very high. By embedding the RGO SA into the EDFL cavity, a stable mode-locked fiber laser is achieved with a central wavelength of 1567.29 nm and repetition rate of 12.66 MHz. The maximum output power and the minimum pulse duration are measured to be 18.22 mW and 1.38 ns respectively. As far as we know, the maximum output power of 18.22 mW is higher than those of other nanosecond mode-locked oscillators reported. Such a nanosecond pulse duration and megahertz repetition rate make this mode-locked erbium-doped fiber laser a suitable seed oscillator for high-power applications and chirped pulse amplifications.展开更多
A new type of double function optical circulator for double fibers is proposed in this paper. Two fiber tips and lens twice are employed in this kind of device as the coupling system for what is believed to be the fir...A new type of double function optical circulator for double fibers is proposed in this paper. Two fiber tips and lens twice are employed in this kind of device as the coupling system for what is believed to be the first time. Because two fiber tips and lens twice are used, the function of optical circulator is duplicated in comparison with conventional optical circulator with single fiber tip. Thus the optical circulator has a low cost and a small volume comparatively. Excess loss of the coupling system and the misalignment of the lens twice in angular error and the position error to the developed circulator are analyzed and discussed by using Gauss wave and double integral in theory. The analysis results show that the excess loss is zero when each distance is equal to f between every adjacent: fraction and without misalignment error in the coupling system. In addition, the excess loss is increasing with increment of the distance error and the angular error. The errors of the angular of the optical axis to lens and the distance between the SL to lens are the main source of the excess loss. The higher the errors are, the higher the excess loss is. It's very important for reducing the misalignment errors in the coupling system with high ratio of coupling to achieve low excess loss. Details of design and excess loss in the coupling system of this circulator are presented.展开更多
The equilibrium geometries, potential energy curves, spectroscopic dissociation energies of the ground and low-lying electronic states of He2, He2^+ and He2^++ are calculated using symmetry adapted cluster/symmetry...The equilibrium geometries, potential energy curves, spectroscopic dissociation energies of the ground and low-lying electronic states of He2, He2^+ and He2^++ are calculated using symmetry adapted cluster/symmetry adapted cluster-configuration interaction (SAC/SAC-CI) method with the basis sets CC-PV5Z. The corresponding dissociation limits for all states are derived based on atomic and molecular reaction statics. The analytical potential energy functions of these states are fitted with Murrell-Sorbie potential energy function from our calculation results. The spectroscopic constants Be, αe, ωe, and ωeχe of these states are calculated through the relationship between spectroscopic data and analytical energy function, which are in well agreement with the experimental data. In addition, the origin of the energy barrier in the ground state X^I∑9^+ of He2^++ energy curve are explained using the avoided crossing rules of valence bond model.展开更多
In order to improve performance and security of image encryption algorithm effectively based on chaotic sequences, an extended chaotic sequence generating method is presented based on logistic chaotic system using Ber...In order to improve performance and security of image encryption algorithm effectively based on chaotic sequences, an extended chaotic sequence generating method is presented based on logistic chaotic system using Bernstein form Bézier curve generating algorithm. In order to test the pseudorandom performance of the extended chaotic sequence, we also analyze random performance, autocorrelation performance, and balance performance of the extended chaotic sequence. Simulation results show that the extended chaotic sequence generated using our method is pseudorandom and its correlation performance and balance performance are good. As an application, we apply the extended chaotic sequence in image encryption algorithm, the simulation results show that the performance of the encrypted image using our method is better than that using logistic chaotic sequence.展开更多
Being characteristic of non-teacher learning, self-organization, memory, and noise resistance, the artificial immune system is a research focus in the field of intelligent information processing. Based on the basic pr...Being characteristic of non-teacher learning, self-organization, memory, and noise resistance, the artificial immune system is a research focus in the field of intelligent information processing. Based on the basic principles of organism immune and clonal selection, this article presents a polyclonal clustering algorithm characteristic of self-adaptation. According to the core idea of the algorithm, various immune operators in the artificial immune system are employed in the clustering process; moreover, clustering numbers are adjusted in accordance with the affinity function. Introduction of the recombination operator can effectively enhance the diversity of the individual antibody in a generation population, so that the searching scope for solutions is enlarged and the premature phenomenon of the algorithm is avoided. Besides, introduction of the inconsistent mutation operator enhances the adaptability and optimizes the performance of local solution seeking. Meanwhile, the convergence of the algorithm is accelerated. In addition, the article also proves the convergence of the algorithm by employing the Markov chain. Results of the data simulation experiment show that the algorithm is capable of obtaining reasonable and effective cluster.展开更多
Hierarchical identity-based signature (HIBS) has wide applications in the large network. However,the existing works cannot solve the trade-off between the security and efficiency. The main challenge at present is to...Hierarchical identity-based signature (HIBS) has wide applications in the large network. However,the existing works cannot solve the trade-off between the security and efficiency. The main challenge at present is to construct a high efficient and strong secure HIBS with a low computation cost. In this paper,a new construction of HIBS scheme is proposed. The new scheme achieves the adaptive security which is a strong security in the identity-based cryptography. But our scheme has short public parameters and the private keys size shrinks as the hierarchy depth increases. The signature size is a constant and the cost of verification only requires four bilinear pairings,which are independent of hierarchy depth. Furthermore,under the q-strong computational diffie-Hellman problem (q-SDH) assumption,the scheme is provably secure against existential forgery for adaptive chosen message and identity attack in the standard model.展开更多
In this article, we report on an experimentally generated soliton and bound-state soliton passively mode-locked erbium-doped fiber laser by incorporating a saturable absorber(SA) made of MoS2∕fluorine mica(FM) that w...In this article, we report on an experimentally generated soliton and bound-state soliton passively mode-locked erbium-doped fiber laser by incorporating a saturable absorber(SA) made of MoS2∕fluorine mica(FM) that was fabricated with the Langmuir–Blodgett(LB) method. The FM substrate is 20 μm thick and easy to bend or cut,like a polymer. However, it has a higher damage threshold and a better thermal dissipation than polymers.In addition, the LB method can be used to fabricate a thin film with good uniformity. In this study, the modulation depth, saturable intensity, and unsaturated loss of the SA are measured as 5.9%, 57.69 MW∕cm2, and13.4%, respectively. Based on the SA, a soliton mode-locked laser is achieved. The pulse duration, repetition rate, and signal-to-noise ratio are 581 fs, 15.67 MHz, and 65 dB, respectively. By adjusting the polarization controller and pump power, we obtain a bound-state soliton mode-locked pulse. The temporal interval between the two solitons forming the bound-state pulse is 2.7 ps. The repetition rate of the bound-state pulses is proportional to the pump power. The maximum repetition rate is 517 MHz, corresponding to the 33 rd harmonic of the fundamental repetition rate. The results indicate that the MoS2∕FM LB film absorber is a promising photonic device in ultrafast fiber lasers.展开更多
Capacity of MIMO LAS-CDMA systems under multi-path fading channels with two different correlating models were studied in the paper. Influences of the two models parameters on capacity were analyzed. The numerical resu...Capacity of MIMO LAS-CDMA systems under multi-path fading channels with two different correlating models were studied in the paper. Influences of the two models parameters on capacity were analyzed. The numerical results present that : according to the Various Scattering Environments correlating model, when the inner-elements distance of antennas array is large than 0. 5λ, correlation almost does not take from the system capacity ; for the Salz-Winter correlating model, the spread angle at receiver is the other key factor, it also influence the system capacity greatly.展开更多
In teleportation, it can be seen that the probability of success is determined by Alice's measurement and quantum channel, ff the Alice's measurement is appropriate, the teleportation can be successfully realized wi...In teleportation, it can be seen that the probability of success is determined by Alice's measurement and quantum channel, ff the Alice's measurement is appropriate, the teleportation can be successfully realized with the maximal probability. In accordance with transformation operator, two schemes are proposed for teleportation of an unknown one-particle state via a general W state, through which the successful probability and the fidelity of both schemes reach 1. Furthermore, two optimal matches of orthogonal complete measurement bases are given for teleporting an unknown one-particle state.展开更多
Because there is a vague distinction respectively between the measurable components and mutual replacement, subjective comments and objective comments in the theories given by Maslow and Orldever, the author once offe...Because there is a vague distinction respectively between the measurable components and mutual replacement, subjective comments and objective comments in the theories given by Maslow and Orldever, the author once offered his point on the four-level classification of needs. In order to interpret the mutual relation of the four levels, this paper mainly aims at offering an appropriate support of mathematical model and technical explanation. It offers an economic analysis and explanation of human needs qualitatively and quantitatively.展开更多
A class of semi-bent functions with an even number of variables is constructed by using the values of Kloosterman sums.These semi-bent functions are Boolean functions with four trace terms.Moreover,it is shown that th...A class of semi-bent functions with an even number of variables is constructed by using the values of Kloosterman sums.These semi-bent functions are Boolean functions with four trace terms.Moreover,it is shown that the algebraic degrees of the new semi-bent functions attain the maximum values.展开更多
A scheme for controlled quantum state swapping is presented using maximally entangled five-qubit state,i.e.,Alice wants to transmit an entangled state of particle a to Bob and at the same time Bob wants to transmit an...A scheme for controlled quantum state swapping is presented using maximally entangled five-qubit state,i.e.,Alice wants to transmit an entangled state of particle a to Bob and at the same time Bob wants to transmit an entangled state of particle b to Alice via the control of the supervisor Charlie.The operations used in this swapping process including C-not operation and a series of single-qubit measurements performed by Alice,Bob,and Charlie.展开更多
基金Project supported by the Natural Science Foundation of Shaanxi Province, China (Grant No. 2009JM1007)
文摘Molecular structure, vibrational frequency and infrared intensity of UF6 are investigated by using the revised Perdew Burke-Enzerhof function with the triple-zeta polarized basis set. The calculation results are in good agreement with the experimental values and indicate the existence of a stable U2F6 molecule with a multiple bonded U2 unit. The calculation results also predict that the D3d symmetry of U2F6 is more stable than D3h. The optimized geometries, vibrational frequencies, and infrared intensities are also reported for U2F6 molecules in D3d symmetry. In addition, the isotopic shift of vibrational frequencies of the two molecules under isotopic substitution of uranium atom are also investigated with the same method. The U2F6 molecule is predicted to be better than UF6 for laser uranic isotope separation.
文摘The equilibrium structures and the electronic, spectroscopic and thermodynamic properties of small Pun (n = 2- 5) molecules are systematically investigated using the methods of general gradient approximation (GGA) of density functional theory (DFT). The results show that the bond length of the lowest-energy structure of Pu2 is 2.578 A. The ground state structure of Pu3 is a triangle with D3h symmetry, whereas for Pu4, the ground state structure is a square (D4h) and the spin polarization of 16 for molecule Pu5 with square geometry (D_4h) is the most stable structure. For the ground state structures, the vibrational spectra as well as thermodynamic parameters are worked out. In addition, the values for the highest occupied molecular orbital (HOMO) and the lowest unoccupied molecular orbital (LUMO) along with the energy gap of all the Pu_2-5 structures are presented. The relevant structural and chemical stabilities are predicted.
基金Project supported in part by the National Natural Science Foundation of China (Grant No 10547008), and the Foundation of Xi'an Institute of Posts and Telecommunications, China (Grant No 105-0414).
文摘Based on the calculation of all the pairwise entanglements in the n (n ≤ 6)-qubit Heisenberg XX open chain with system impurity, we find an important result: pairwise entanglement can only be transferred by an entangled pair. The non-nearest pairwise entanglements will have the possibility to exist as long as there has been even number of qubits in their middle. This point indicates that we can obtain longer distance entanglement in a solid system.
基金Supported by the National Natural Science Foundation of China under Grant No. 10902083the Natural Science Foundation of Shannxi Province under Grant No. 2009GM1007
文摘Recently, Xiu et al. [Commun. Theor. Phys. 49 (2008) 905] proposed two schemes of teleporting an N particle arbitrary and unknown state when N groups of three particle general W states are utilized a.s quantum channels. They gave the maximal probability of successful teleportation. Here we find that their operation is not the optimal and the successful probability of the teleportation is not maximum. Moreover, we give the optimal schemes operation and obtain maximal successful probability for teleportation.
基金Supported by the National Natural Science Foundation of China under Grant Nos 10547008 and 60525417.
文摘We propose two schemes to produce long-distance entanglement in a spin chain. The first is based on a controllable interaction system, one starts from an entangled kernel and adds weaken interaction spins to the boundary sites step by step, then the entanglement will be extended longer and longer and its value is equal to that of its kernel. The second is based on a uniform interaction (J) system with a bulk magnetic field (B) that is absent for the boundary qubits, as long as B/J 〉 5, one can obtain near perfect long distance entanglement. Ultra-low temperature is needed in both schemes.
基金by the National Natural Science Foundation of China under Grant Nos 11047179,11075126,11031005 and 10575080the Special Fund for Basic Scientific Research of Central Colleges,Chang’an University+4 种基金the Special Foundation for Basic Research Program of Chang’an Universitythe Open Fund of Key Laboratory for Special Area Highway Engineering(Chang’an University)the Ministry of Education under Grant No CHD2009JC030the Xi’an Shiyou University Science and Technology Foundation under Grant No 2010QN018the NWU Graduate Cross-Discipline Funds under Grant No 09YJC25.
文摘We parameterize the Green–Schwarz IIB superstring in the AdS_(3)×S^(3) background under the light cone gauge by the method of Metsaev and Tseytlin in AdS3 and by the method of Rahmfeld and Rajaraman in S3.After some calculation,we obtain the corresponding Maurer–Cartan 1−forms and the action.Then we fix two bosonic variables x+=τand y^(5)=σ,perform the partial Legendre transformation of the remaining bosonic variables,and find a Lagrangian that is linear in velocity after eliminating the metric of the world sheet.We also give the Hamiltonian and prove that the system is local and the Poisson bracket of the theory can be well defined.Using these results,one can further study the properties of solution space,solution transformation and the structure of the flat current algebra of the superstring in the AdS_(3)×S^(3) background.
基金supported by the Nature Science Foundation of China under grant 60970119, 60803149the National Basic Research Program of China(973) under grant 2007CB311201
文摘In this paper,we show how to use the dual techniques in the subgroups to give a secure identity-based broadcast encryption(IBBE) scheme with constant-size ciphertexts. Our scheme achieves the full security(adaptive security) under three static(i.e. non q-based) assumptions. It is worth noting that only recently Waters gives a short ciphertext broadcast encryption system that is even adaptively secure under the simple assumptions. One feature of our methodology is that it is relatively simple to leverage our techniques to get adaptive security.
基金Project supported by the Central University Special Fund Basic Research and Operating Expenses,China(Grant No.GK201702005)the Natural Science Foundation of Shaanxi Province,China(Grant No.2017JM6091)+1 种基金the National Natural Science Foundation of China(Grant No.61705183)the Fundamental Research Funds for the Central Universities,China(Grant No.2017TS011)
文摘The carboxyl-functionalized graphene oxide(GO-COOH)is a kind of unique two-dimensional(2 D)material and possesses excellent nonlinear saturable absorption property and high water-solubility.In this paper,we prepare saturable absorber(SA)device by depositing GO-COOH nanosheets aqueous solution on a D-shaped fiber.The modulation depth(MD)and saturable intensity of the SA are measured to be 9.6%and 19 MW/cm^(2),respectively.By inserting the SA into the erbium-doped fiber(EDF)laser,a passively mode-locked EDF laser has been achieved with the spectrum center wavelength of 1562.76 nm.The pulse duration,repetition rate,and the signal-to-noise ratio(SNR)are 500 fs,14.79 MHz,and 80 dB,respectively.The maximum average output power is measured to be 3.85 mW.These results indicate that the GO-COOH nanosheets SA can be used as a promising mode locker for the generation of ultrashort pulses.
基金Project supported by the Central University Special Fund for Basic Research and Operating Expenses,China(Grant No.GK201702005)the Natural Science Foundation of Shaanxi Province,China(Grant No.2017JM6091)+1 种基金the National Natural Science Foundation of China(Grant No.61705183)the Fundamental Research Funds for the Central Universities(Grant No.2017TS011)
文摘We demonstrate a nanosecond mode-locked erbium-doped fiber laser (EDFL) based on a reduced graphene oxide (RGO) saturable absorber (SA). The RGO SA is prepared by depositing the graphene oxide (GO) on fluorine mica through thermal reduction of GO. A scanning electron microscope (SEM), Raman spectrometer, and x-ray photoelectron spec- troscopy (XPS) are adopted to analyze the RGO characteristics. The results show that the reduction degree of graphene oxide is very high. By embedding the RGO SA into the EDFL cavity, a stable mode-locked fiber laser is achieved with a central wavelength of 1567.29 nm and repetition rate of 12.66 MHz. The maximum output power and the minimum pulse duration are measured to be 18.22 mW and 1.38 ns respectively. As far as we know, the maximum output power of 18.22 mW is higher than those of other nanosecond mode-locked oscillators reported. Such a nanosecond pulse duration and megahertz repetition rate make this mode-locked erbium-doped fiber laser a suitable seed oscillator for high-power applications and chirped pulse amplifications.
文摘A new type of double function optical circulator for double fibers is proposed in this paper. Two fiber tips and lens twice are employed in this kind of device as the coupling system for what is believed to be the first time. Because two fiber tips and lens twice are used, the function of optical circulator is duplicated in comparison with conventional optical circulator with single fiber tip. Thus the optical circulator has a low cost and a small volume comparatively. Excess loss of the coupling system and the misalignment of the lens twice in angular error and the position error to the developed circulator are analyzed and discussed by using Gauss wave and double integral in theory. The analysis results show that the excess loss is zero when each distance is equal to f between every adjacent: fraction and without misalignment error in the coupling system. In addition, the excess loss is increasing with increment of the distance error and the angular error. The errors of the angular of the optical axis to lens and the distance between the SL to lens are the main source of the excess loss. The higher the errors are, the higher the excess loss is. It's very important for reducing the misalignment errors in the coupling system with high ratio of coupling to achieve low excess loss. Details of design and excess loss in the coupling system of this circulator are presented.
基金Supported by the Natural Science Foundation of Shaanxi Province of China under Grant No. 2009JM1007
文摘The equilibrium geometries, potential energy curves, spectroscopic dissociation energies of the ground and low-lying electronic states of He2, He2^+ and He2^++ are calculated using symmetry adapted cluster/symmetry adapted cluster-configuration interaction (SAC/SAC-CI) method with the basis sets CC-PV5Z. The corresponding dissociation limits for all states are derived based on atomic and molecular reaction statics. The analytical potential energy functions of these states are fitted with Murrell-Sorbie potential energy function from our calculation results. The spectroscopic constants Be, αe, ωe, and ωeχe of these states are calculated through the relationship between spectroscopic data and analytical energy function, which are in well agreement with the experimental data. In addition, the origin of the energy barrier in the ground state X^I∑9^+ of He2^++ energy curve are explained using the avoided crossing rules of valence bond model.
基金the National Natural Science Foundation of China (No. 60572133)the Scientific Research Fund of Education Department of Shaanxi Province (No.06JK193)
文摘In order to improve performance and security of image encryption algorithm effectively based on chaotic sequences, an extended chaotic sequence generating method is presented based on logistic chaotic system using Bernstein form Bézier curve generating algorithm. In order to test the pseudorandom performance of the extended chaotic sequence, we also analyze random performance, autocorrelation performance, and balance performance of the extended chaotic sequence. Simulation results show that the extended chaotic sequence generated using our method is pseudorandom and its correlation performance and balance performance are good. As an application, we apply the extended chaotic sequence in image encryption algorithm, the simulation results show that the performance of the encrypted image using our method is better than that using logistic chaotic sequence.
基金National Natural Science Foundation of China (60372050, 60133010)the Hi-Tech Research and Development Program of China (2002AA135080)
文摘Being characteristic of non-teacher learning, self-organization, memory, and noise resistance, the artificial immune system is a research focus in the field of intelligent information processing. Based on the basic principles of organism immune and clonal selection, this article presents a polyclonal clustering algorithm characteristic of self-adaptation. According to the core idea of the algorithm, various immune operators in the artificial immune system are employed in the clustering process; moreover, clustering numbers are adjusted in accordance with the affinity function. Introduction of the recombination operator can effectively enhance the diversity of the individual antibody in a generation population, so that the searching scope for solutions is enlarged and the premature phenomenon of the algorithm is avoided. Besides, introduction of the inconsistent mutation operator enhances the adaptability and optimizes the performance of local solution seeking. Meanwhile, the convergence of the algorithm is accelerated. In addition, the article also proves the convergence of the algorithm by employing the Markov chain. Results of the data simulation experiment show that the algorithm is capable of obtaining reasonable and effective cluster.
基金supported by the National Natural Science Foundation of China (60970119, 60803149)the National Basic Research Program of China (2007CB311201)the Fundamental Research Funds for the Central Universities
文摘Hierarchical identity-based signature (HIBS) has wide applications in the large network. However,the existing works cannot solve the trade-off between the security and efficiency. The main challenge at present is to construct a high efficient and strong secure HIBS with a low computation cost. In this paper,a new construction of HIBS scheme is proposed. The new scheme achieves the adaptive security which is a strong security in the identity-based cryptography. But our scheme has short public parameters and the private keys size shrinks as the hierarchy depth increases. The signature size is a constant and the cost of verification only requires four bilinear pairings,which are independent of hierarchy depth. Furthermore,under the q-strong computational diffie-Hellman problem (q-SDH) assumption,the scheme is provably secure against existential forgery for adaptive chosen message and identity attack in the standard model.
基金Central University Special Fund Basic Research and Operating Expenses(GK201702005)Natural Science Foundation of Shaanxi Province(2017JM6091)+1 种基金National Natural Science Foundation of China(NSFC)(61705183)Fundamental Research Funds for the Central Universities(2017TS011)
文摘In this article, we report on an experimentally generated soliton and bound-state soliton passively mode-locked erbium-doped fiber laser by incorporating a saturable absorber(SA) made of MoS2∕fluorine mica(FM) that was fabricated with the Langmuir–Blodgett(LB) method. The FM substrate is 20 μm thick and easy to bend or cut,like a polymer. However, it has a higher damage threshold and a better thermal dissipation than polymers.In addition, the LB method can be used to fabricate a thin film with good uniformity. In this study, the modulation depth, saturable intensity, and unsaturated loss of the SA are measured as 5.9%, 57.69 MW∕cm2, and13.4%, respectively. Based on the SA, a soliton mode-locked laser is achieved. The pulse duration, repetition rate, and signal-to-noise ratio are 581 fs, 15.67 MHz, and 65 dB, respectively. By adjusting the polarization controller and pump power, we obtain a bound-state soliton mode-locked pulse. The temporal interval between the two solitons forming the bound-state pulse is 2.7 ps. The repetition rate of the bound-state pulses is proportional to the pump power. The maximum repetition rate is 517 MHz, corresponding to the 33 rd harmonic of the fundamental repetition rate. The results indicate that the MoS2∕FM LB film absorber is a promising photonic device in ultrafast fiber lasers.
文摘Capacity of MIMO LAS-CDMA systems under multi-path fading channels with two different correlating models were studied in the paper. Influences of the two models parameters on capacity were analyzed. The numerical results present that : according to the Various Scattering Environments correlating model, when the inner-elements distance of antennas array is large than 0. 5λ, correlation almost does not take from the system capacity ; for the Salz-Winter correlating model, the spread angle at receiver is the other key factor, it also influence the system capacity greatly.
基金Shaanxi Natural Science Foundation under Contract (2004A15)the Science Plan Foundation of office the Education Department of Shaanxi Province Contract (05JK288)
文摘In teleportation, it can be seen that the probability of success is determined by Alice's measurement and quantum channel, ff the Alice's measurement is appropriate, the teleportation can be successfully realized with the maximal probability. In accordance with transformation operator, two schemes are proposed for teleportation of an unknown one-particle state via a general W state, through which the successful probability and the fidelity of both schemes reach 1. Furthermore, two optimal matches of orthogonal complete measurement bases are given for teleporting an unknown one-particle state.
文摘Because there is a vague distinction respectively between the measurable components and mutual replacement, subjective comments and objective comments in the theories given by Maslow and Orldever, the author once offered his point on the four-level classification of needs. In order to interpret the mutual relation of the four levels, this paper mainly aims at offering an appropriate support of mathematical model and technical explanation. It offers an economic analysis and explanation of human needs qualitatively and quantitatively.
基金Supported by the National Natural Science Foundation of China (60773002)the National High Technology Research and Development Program of China (863 Program) (2007AA01Z472)
文摘A class of semi-bent functions with an even number of variables is constructed by using the values of Kloosterman sums.These semi-bent functions are Boolean functions with four trace terms.Moreover,it is shown that the algebraic degrees of the new semi-bent functions attain the maximum values.
基金Supported by the National Natural Science Foundation of China under Grant No. 10902083Shaanxi Natural Science Foundation under Grant No. 2009JM1007
文摘A scheme for controlled quantum state swapping is presented using maximally entangled five-qubit state,i.e.,Alice wants to transmit an entangled state of particle a to Bob and at the same time Bob wants to transmit an entangled state of particle b to Alice via the control of the supervisor Charlie.The operations used in this swapping process including C-not operation and a series of single-qubit measurements performed by Alice,Bob,and Charlie.