期刊文献+
共找到73篇文章
< 1 2 4 >
每页显示 20 50 100
Optimization of RDF link traversal based query execution 被引量:2
1
作者 朱艳琴 花岭 《Journal of Southeast University(English Edition)》 EI CAS 2013年第1期27-32,共6页
Aiming at the problem that only some types of SPARQL ( simple protocal and resource description framework query language) queries can be answered by using the current resource description framework link traversal ba... Aiming at the problem that only some types of SPARQL ( simple protocal and resource description framework query language) queries can be answered by using the current resource description framework link traversal based query execution (RDF-LTE) approach, this paper discusses how the execution order of the triple pattern affects the query results and cost based on concrete SPARQL queries, and analyzes two properties of the web of linked data, missing backward links and missing contingency solution. Then three heuristic principles for logic query plan optimization, namely, the filtered basic graph pattern (FBGP) principle, the triple pattern chain principle and the seed URIs principle, are proposed. The three principles contribute to decrease the intermediate solutions and increase the types of queries that can be answered. The effectiveness and feasibility of the proposed approach is evaluated. The experimental results show that more query results can be returned with less cost, thus enabling users to develop the full potential of the web of linked data. 展开更多
关键词 web of linked data resource description framework link traversal based query execution (RDF-LTE) SPARQL query query optimization
在线阅读 下载PDF
An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree 被引量:1
2
作者 Yining Su Xingyuan Wang Shujuan Lin 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第11期262-271,共10页
This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree.Firstly,other programming software is used to perform the middle order traversal,and the plai... This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree.Firstly,other programming software is used to perform the middle order traversal,and the plaintext image is sorted according to the middle order traversal sequence on the permutation.Secondly,the chaotic sequence is generated using the coupled map lattice to set the chaotic interference value.Finally,the XOR operation between the adjacent pixel values of the replacement image is completed to generate the ciphertext matrix.The simulation and experimental results show that the proposed algorithm can resist typical attacks and has good robustness. 展开更多
关键词 spatiotemporal chaos image encryption middle order traversal coupled map lattice
原文传递
Network address translation traversal based on Bernoulli laws of large number in P2P streaming system
3
作者 Ren Hao Wang Jinlin 《High Technology Letters》 EI CAS 2011年第4期401-406,共6页
P2P streaming application must realize network address translation (NAT) traversal. To handle low success ratio of the existing NAT traversal algorithm, UPnP-STUN (UPUN) and port-mapping sample estimation (PMSE)... P2P streaming application must realize network address translation (NAT) traversal. To handle low success ratio of the existing NAT traversal algorithm, UPnP-STUN (UPUN) and port-mapping sample estimation (PMSE) algorithm are recommended in this paper. UPUN is the combination of UPnP and STUN, and PMSE utilizes port mapping samples added by symmetric NAT for different sessions to estimate regularity of port mapping of symmetric NAT, which takes advantage of the Bernoulli law of large numbers. Besides, for the situation that both peers are behind NAT, and to handle heavy relay server load when many inner peers want to communicate with each other, a peer auxiliary-relay (PAR) algorithm is presented. PAR lets outer peers with sufficient bandwidth act as relay servers to alleviate pressure of real server, which could avoid NAT traversal failure caused by single point failure of relay server. Finally, experiments show that the proposed algorithms could improve the success ratio significantly for NAT traversal in P2P streaming application as well as improve P2P streaming application applicability. 展开更多
关键词 network address translation(NAT) traversal sample estimation auxiliary-relay P2P streaming
在线阅读 下载PDF
Recursive and Nonrecursive Traversal Algorithms for Dynamically Created Binary Trees
4
作者 Robert Logozar 《Computer Technology and Application》 2012年第5期374-382,共9页
The modeling of dynamical systems from a time series implemented by our DSA program introduces binary trees of height D with all leaves on the same level, and the related subtrees of height L 〈 D. These are called e-... The modeling of dynamical systems from a time series implemented by our DSA program introduces binary trees of height D with all leaves on the same level, and the related subtrees of height L 〈 D. These are called e-trees and e-subtrees. The recursive and nonrecursive versions of the traversal algorithms for the trees with dynamically created nodes are discussed. The original nonrecursive algorithms that return the pointer to the next node in preorder, inorder and postorder traversals are presented. The space-time complexity analysis shows and the execution time measurements confirm that for these O(2D) algorithms, the recursive versions have approximately 10-25% better time constants. Still, the use of nonrecursive algorithms may be more appropriate in several occasions. 展开更多
关键词 Binary e-trees algorithms tree traversal PREORDER inorder postorder RECURSIVE nonrecursive space-time complexity.
在线阅读 下载PDF
An Improved Approach for Generating Test Cases during Model-Based Testing Using Tree Traversal Algorithm
5
作者 Oluwatolani Achimugu Philip Achimugu +3 位作者 Chinonyelum Nwufoh Sseggujja Husssein Ridwan Kolapo Tolulope Olufemi 《Journal of Software Engineering and Applications》 2021年第6期257-265,共9页
<p align="left"> <span style="font-family:Verdana;">During the model-based software testing process, test cases are generated from modeled requirements to conduct acceptance testing. Ho... <p align="left"> <span style="font-family:Verdana;">During the model-based software testing process, test cases are generated from modeled requirements to conduct acceptance testing. However, existing approaches generate erroneous test cases, lack full coverage criteria and prototype tools. Therefore, the aim of this research is to develop an approach capable of reducing erroneous test case generation based on full coverage criteria and a prototype tool. The method employed was to develop a parser to extract information from the XMI file of a modeling diagram where a tree is constructed and a traversal operation executed on the nodes and edges to generate test cases. The results obtained from the proposed approach showed that 97.35% of the generated test cases were precise and comprehensive enough to conduct testing because 99.01% of all the nodes and edges were fully covered during the traversal operations.</span> </p> 展开更多
关键词 Requirements MODEL TESTING TREE traversal
在线阅读 下载PDF
Binary Tree’s Recursion Traversal Algorithm and Its Improvement
6
作者 Hua Li 《Journal of Computer and Communications》 2016年第7期42-47,共6页
Binary tree is a very important data structure in computer science. Some major properties are discussed. Both recursive and non-recursive traversal methods of binary tree are discussed in detail. Some improvement... Binary tree is a very important data structure in computer science. Some major properties are discussed. Both recursive and non-recursive traversal methods of binary tree are discussed in detail. Some improvements in programming are proposed. 展开更多
关键词 Binary Tree traversal STACK
在线阅读 下载PDF
DYNAMIC TRAVERSAL CRITERION FOR GEOMETRIC FRACTALS
7
作者 Zhang Qian Lu Zhenrong Xiao Zhonghui 《Computer Aided Drafting,Design and Manufacturing》 1996年第1期25-31,共2页
This paper presents a new generating criterion for self-similar geometric fractalsDynamic Traversal Criterion (DTC) and the principle to practice it. According to the principle,symbol shifting technique is put forward... This paper presents a new generating criterion for self-similar geometric fractalsDynamic Traversal Criterion (DTC) and the principle to practice it. According to the principle,symbol shifting technique is put forward which can control the traversal symbols dynamically in recursive procession. The Dynamic Traversal Criterion inherits the mechanism for generating self-similar fractals from traditional way and creates more fractal images from one initiator and generator than Static traversal strategy. 展开更多
关键词 ss: geometric fractal SELF-SIMILAR dynamic traversal criterion symbol shifting
全文增补中
Deformation characteristics and instability mechanism of transportation hub under downward traversal conditions of the double-track super-large diameter shield tunnel
8
作者 Xiangzhi Gao Aijun Yao 《Geohazard Mechanics》 2024年第2期131-142,共12页
To investigate the deformation characteristics and instability mechanism of the transportation hub underdownward traversal conditions of the double-track super-large diameter shield tunnel, take the example of Beijing... To investigate the deformation characteristics and instability mechanism of the transportation hub underdownward traversal conditions of the double-track super-large diameter shield tunnel, take the example of BeijingEast Sixth Ring Road into the ground reconstruction project. Using the field experimental monitoring method andnumerical simulation method, after verifying the accuracy of the model, this manuscript begins to unfold theanalysis. The results show that, without any deformation prevention and control measures, The basement raft ofthe underground structure of the transportation hub will produce a deformation difference of 18 mm, and thetensile stress is more than 1.43 MPa, the inhomogeneous deformation and structural cracking will lead tostructural instability and groundwater surges, which seriously affects the safe operation of the transportation hubstation. When control measures are taken, the deformation and stress of the base raft slab of the undergroundstructure of the transportation hub are within the prescribed limits, which can ensure the safe operation of thestation. The displacement of the base slab of the underground structure in the horizontal direction of the crosssection is all pointing to the east, and the overall trend is to shift from the first tunnel to the backward tunnel. Thehorizontal displacement of the base slab in the direction of the tunnel axis all points to the beginning of thecrossing, and the displacement of the slab in the vertical direction is distributed as "rising in the middle andsinking in the surroundings". For a two-lane super-large diameter shield tunnel penetrating an undergroundstructure, there are two mechanical effects: unloading rebound and perimeter rock pressure. The above deformation characteristics are the superposition effect produced by the two, and this fine assessment of the deformation of the raft foundation provides a scientific basis for formulating the deformation control countermeasuresof the crossing project. At the same time, it makes up for the blank of the double-track super-large diameter shieldtunnel down through the transportation hub project. 展开更多
关键词 Super-large diameter shield Transportation hub Deformation characteristics Mechanical mechanism Downward traverse
在线阅读 下载PDF
A novel approach to visual image encryption:2D hyperchaos,variable Josephus,and 3D diffusion
9
作者 Yan Hong Xinyan Duan +2 位作者 Jingming Su Zhaopan Wang Shihui Fang 《Chinese Physics B》 2025年第4期335-352,共18页
With the development of the Internet,image encryption technology has become critical for network security.Traditional methods often suffer from issues such as insufficient chaos,low randomness in key generation,and po... With the development of the Internet,image encryption technology has become critical for network security.Traditional methods often suffer from issues such as insufficient chaos,low randomness in key generation,and poor encryption efficiency.To enhance performance,this paper proposes a new encryption algorithm designed to optimize parallel processing and adapt to images of varying sizes and colors.The method begins by using SHA-384 to extract the hash value of the plaintext image,which is then processed to determine the chaotic system’s initial value and block size.The image is padded and divided into blocks for further processing.A novel two-dimensional infinite collapses hyperchaotic map(2DICHM)is employed to generate the intra-block scrambling sequence,while an improved variable Joseph traversal sequence is used for inter-block scrambling.After removing the padding,3D forward and backward shift diffusions,controlled by the 2D-ICHM sequences,are applied to the scrambled image,producing the ciphertext.Simulation results demonstrate that the proposed algorithm outperforms others in terms of entropy,anti-noise resilience,correlation coefficient,robustness,and encryption efficiency. 展开更多
关键词 SHA-384 two-dimensional infinite collapses hyperchaotic map(2D-ICHM) variable Joseph traversal 3D forward shift diffusion
原文传递
Fast Single-phase Fault Location Method Based on Community Graph Depth-first Traversal for Distribution Network 被引量:1
10
作者 Jian Dang Yunjiang Yan +2 位作者 Rong Jia Xiaowei Wang Hui Wei 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2023年第2期612-622,共11页
With the increasing complexity of distribution network structures originating from the high penetration of renewable energy and responsive loads,fast and accurate fault location technology for distribution networks is... With the increasing complexity of distribution network structures originating from the high penetration of renewable energy and responsive loads,fast and accurate fault location technology for distribution networks is a prerequisite for rapid isolation of faults and restoration of the power supply.In this paper,a fault location method based on community graph depth-first traversal is proposed for fast location of single-phase ground faults in distribution networks.First,this paper defines the fault graph weight of the vertices in the distribution network graph model,which can be used to reflect the topology of the vertices and fault points as well as the fluctuation of the vertices’currents.Then,the vertices on the graph model are clustered by using an improved parallel louvain method(IPLM).Finally,the community formed by IPLM is used as the smallest unit for depth-first traversal to achieve fast and accurate location of the fault section.The paper develops a distribution network graph model of IEEE 33-bus system on the graph database for testing.And three other methods are selected for comparison with IPLMDF.The test results show that IPLMDF can achieve fast and accurate fault location when half of the nodes in the distribution network are equipped with D-PMUs.When some of the D-PMUs lose time synchronization,it is still possible to locate the fault section,and at the same time,the locating results can be avoided by falling into local optimal solutions. 展开更多
关键词 Depth-first traversal fault location graph computation single-phase fault
原文传递
On the graph traversal method for evaluating linear binary-chain programs
11
作者 陈阳军 《Science China(Technological Sciences)》 SCIE EI CAS 1999年第3期225-243,共19页
Grahne et al. have presented a graph algorithm for evaluating a subset of recursive queries. This method consists of two phases. In the first phase, the method transforms a linear binary-chain program into a set of eq... Grahne et al. have presented a graph algorithm for evaluating a subset of recursive queries. This method consists of two phases. In the first phase, the method transforms a linear binary-chain program into a set of equations over expressions containing predicate symbols. In the second phase, a graph is constructed from the equations and the answers are produced by traversing the relevant paths. A new algorithm is described which requires less time than Grahne’ s. The key idea of the improvement is to reduce the search space that will be traversed when a query is invoked. Further, the evaluation of cyclic data is speeded up by generating most answers directly in terms of the answers already found and the associated 'path information' instead of traversing the corresponding paths as usual. In this way, this algorithm achieves a linear time complexity for both acyclic and most of cyclic data. 展开更多
关键词 GRAPH traversal method LINEAR binary-chain programs.
原文传递
Graph Traversal and Top-Down Evaluation of Logic Queries
12
作者 陈阳军 《Journal of Computer Science & Technology》 SCIE EI CSCD 1998年第4期300-316,共17页
In this paper, an optimal method to handle cyclic and acyclic data relations in the linear recursive queries is proposed. High efficiency is achieved by integrating graph traversal mechanisms into a top-down evaluatio... In this paper, an optimal method to handle cyclic and acyclic data relations in the linear recursive queries is proposed. High efficiency is achieved by integrating graph traversal mechanisms into a top-down evaluation. In such a way the subsumption checks and the identification of cyclic data can be done very efficielltly First, based on the subsumption checks, the search space can be reduced drastically by avoiding any redundant expansion operation. In fact, in the case of non-cyclic data, the proposed algorithm requires only linear time for evaluating a linear recursive query. On the other hand, in the case of cyclic data, by using the technique for isolating strongly connected components a lot of answers can be generated directly in terms of the intermediate results and the relevant path information instead of evaluating them by performing algebraic operations. Since the cost of generating an answer is much less than that of evaluating an answer by algebraic operations, the time consumption for cyclic data can be reduced by an order of magnitude or more. 展开更多
关键词 recursive query top-down evaluation RQA/FQI strategy logic query graph traversal
原文传递
Z^2 traversal order: An interleaving approach for VR stereo rendering on tile-based GPUs
13
作者 Jae-Ho Nah Yeongkyu Lim +1 位作者 Sunho Ki Chulho Shin 《Computational Visual Media》 CSCD 2017年第4期349-357,共9页
With increasing demands of virtual reality(VR) applications, efficient VR rendering techniques are becoming essential. Because VR stereo rendering has increased computational costs to separately render views for the l... With increasing demands of virtual reality(VR) applications, efficient VR rendering techniques are becoming essential. Because VR stereo rendering has increased computational costs to separately render views for the left and right eyes, to reduce the rendering cost in VR applications, we present a novel traversal order for tile-based mobile GPU architectures: Z^2 traversal order. In tile-based mobile GPU architectures,a tile traversal order that maximizes spatial locality can increase GPU cache efficiency. For VR applications, our approach improves upon the traditional Z order curve.We render corresponding screen tiles in left and right views in turn, or simultaneously, and as a result, we can exploit spatial adjacency of the two tiles. To evaluate our approach, we conducted a trace-driven hardware simulation using Mesa and a hardware simulator. Our experimental results show that Z^2 traversal order can reduce external memory bandwidth requirements and increase rendering performance. 展开更多
关键词 virtual reality(VR) tile traversal order tile-based GPU mobile GPU graphics hardware
原文传递
Design and Finite Element Analysis of a New Type of Skeleton-Free,Traversing Secondary Lining Trolley
14
作者 Liang He 《Journal of Architectural Research and Development》 2025年第3期150-158,共9页
To effectively address the challenge where the speed of tunnel lining construction struggles to match that of tunnel face and inverted arch construction,and to enhance the quality of secondary lining,a new type of ske... To effectively address the challenge where the speed of tunnel lining construction struggles to match that of tunnel face and inverted arch construction,and to enhance the quality of secondary lining,a new type of skeleton-free,traversing secondary lining trolley has been developed.This trolley features a set of gantries paired with two sets of formwork.The formwork adopts a multi-segment hinged and strengthened design,ensuring its own strength can meet the requirements of secondary lining concrete pouring without relying on the support of the gantries.When retracted,the formwork can be transported by the gantries through another set of formwork in the supporting state,enabling early formwork support,effectively accelerating the construction progress of the tunnel’s secondary lining,and extending the maintenance time of the secondary lining with the formwork.Finite element software modeling was used for simulation calculations,and the results indicate that the structural strength,stiffness,and other performance parameters of the new secondary lining trolley meet the design requirements,verifying the rationality of the design. 展开更多
关键词 TUNNEL Secondary lining trolley Skeleton-free Traversing Finite element analysis
在线阅读 下载PDF
Computation graph pruning based on critical path retention in evolvable networks
15
作者 XIE Xiaoyan YANG Tianjiao +4 位作者 ZHU Yun LUO Xing JIN Luochen YU Jinhao REN Xun 《High Technology Letters》 2025年第3期266-272,共7页
The dynamic routing mechanism in evolvable networks enables adaptive reconfiguration of topol-ogical structures and transmission pathways based on real-time task requirements and data character-istics.However,the heig... The dynamic routing mechanism in evolvable networks enables adaptive reconfiguration of topol-ogical structures and transmission pathways based on real-time task requirements and data character-istics.However,the heightened architectural complexity and expanded parameter dimensionality in evolvable networks present significant implementation challenges when deployed in resource-con-strained environments.Due to the critical paths ignored,traditional pruning strategies cannot get a desired trade-off between accuracy and efficiency.For this reason,a critical path retention pruning(CPRP)method is proposed.By deeply traversing the computational graph,the dependency rela-tionship among nodes is derived.Then the nodes are grouped and sorted according to their contribu-tion value.The redundant operations are removed as much as possible while ensuring that the criti-cal path is not affected.As a result,computational efficiency is improved while a higher accuracy is maintained.On the CIFAR benchmark,the experimental results demonstrate that CPRP-induced pruning incurs accuracy degradation below 4.00%,while outperforming traditional feature-agnostic grouping methods by an average 8.98%accuracy improvement.Simultaneously,the pruned model attains a 2.41 times inference acceleration while achieving 48.92%parameter compression and 53.40%floating-point operations(FLOPs)reduction. 展开更多
关键词 evolvable network computation graph traversing dynamic routing critical path retention pruning
在线阅读 下载PDF
Medical Image Encryption Based on Josephus Traversing and Hyperchaotic Lorenz System 被引量:2
16
作者 杨娜 张淑霞 +1 位作者 白牡丹 李珊珊 《Journal of Shanghai Jiaotong university(Science)》 EI 2024年第1期91-108,共18页
This study proposes a new medical image encryption scheme based on Josephus traversing and hyper-chaotic Lorenz system.First,a chaotic sequence is generated through hyperchaotic system.This hyperchaotic sequence is us... This study proposes a new medical image encryption scheme based on Josephus traversing and hyper-chaotic Lorenz system.First,a chaotic sequence is generated through hyperchaotic system.This hyperchaotic sequence is used in the scrambling and diffusion stages of the algorithm.Second,in the scrambling process,the image is initially confused by Josephus scrambling,and then the image is further confused by Arnold map.Finally,generated hyperchaos sequence and exclusive OR operation is used for the image to carry on the positive and reverse diffusion to change the pixel value of the image and further hide the effective information of the image.In addition,the information of the plaintext image is used to generate keys used in the algorithm,which increases the ability of resisting plaintext attack.Experimental results and security analysis show that the scheme can effectively hide plaintext image information according to the characteristics of medical images,and is resistant to common types of attacks.In addition,this scheme performs well in the experiments of robustness,which shows that the scheme can solve the problem of image damage in telemedicine.It has a positive significance for the future research. 展开更多
关键词 medical image image encryption Josephus traversing hyperchaotic Lorenz system
原文传递
Conformally symmetric wormhole solutions supported by non-commutative geometry in f(Q,T)gravity
17
作者 Chaitra Chooda Chalavadi V Venkatesha +1 位作者 N S Kavya S V Divya Rashmi 《Communications in Theoretical Physics》 SCIE CAS CSCD 2024年第2期111-124,共14页
This paper investigates wormhole solutions within the framework of extended symmetric teleparallel gravity,incorporating non-commutative geometry,and conformal symmetries.To achieve this,we examine the linear wormhole... This paper investigates wormhole solutions within the framework of extended symmetric teleparallel gravity,incorporating non-commutative geometry,and conformal symmetries.To achieve this,we examine the linear wormhole model with anisotropic fluid under Gaussian and Lorentzian distributions.The primary objective is to derive wormhole solutions while considering the influence of the shape function on model parameters under Gaussian and Lorentzian distributions.The resulting shape function satisfies all the necessary conditions for a traversable wormhole.Furthermore,we analyze the characteristics of the energy conditions and provide a detailed graphical discussion of the matter contents via energy conditions.Additionally,we explore the effect of anisotropy under Gaussian and Lorentzian distributions.Finally,we present our conclusions based on the obtained results. 展开更多
关键词 traversable wormhole f(Q T)gravity energy conditions non-commutative geometry conformal motion
原文传递
Macroscopic Traversable Wormholes: Minimum Requirements
18
作者 Peter K. F. Kuhfittig 《International Journal of Astronomy and Astrophysics》 2024年第3期230-243,共14页
While wormholes are just as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. To allow for the possibility of interstellar travel, a macroscopic... While wormholes are just as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. To allow for the possibility of interstellar travel, a macroscopic wormhole would need to maintain sufficiently low radial tidal forces. It is proposed in this paper that the assumption of zero tidal forces, i.e., the limiting case, is sufficient for overcoming the restrictions from quantum field theory. The feasibility of this approach is subsequently discussed by 1) introducing the additional conditions needed to ensure that the radial tidal forces can indeed be sufficiently low and 2) by viewing traversable wormholes as emergent phenomena, thereby increasing the likelihood of their existence. 展开更多
关键词 Morris-Thorne Wormholes Traversability Minimum Requirements STABILITY Compatibility with Quantum Field Theory
在线阅读 下载PDF
Volumetric extraction of porous materials based on octree algorithm
19
作者 罗守华 李光 顾宁 《Journal of Southeast University(English Edition)》 EI CAS 2010年第4期537-540,共4页
Through the octree data structure analysis,a volumetric dataset of closed-cell porous materials is converted into a dataset of hierarchical octree nodes,and then the specific traversal search algorithm on the octree n... Through the octree data structure analysis,a volumetric dataset of closed-cell porous materials is converted into a dataset of hierarchical octree nodes,and then the specific traversal search algorithm on the octree nodes is depicted in details,which is involved in six steps of the volume growth model and one step of the volume decomposition model.Moreover,the conditions of both the proceeding traversal and three possibilities of terminating are given,and the traversal algorithm of completeness is proved from a theoretical perspective.Finally,using a simulated volumetric dataset of columnar pores,the extracting effectiveness of the octree traversal algorithm is verified.The results show that the volume and the distribution information of pores can be successfully extracted by the proposed algorithm,which builds a solid foundation for a more effective performance analysis of porous materials. 展开更多
关键词 OCTREE closed-cell porous materials volume of pores traversal algorithm
在线阅读 下载PDF
A Study on Reflection Phase Time of Particles Passing through a Potential Well 被引量:2
20
作者 张玉武 李春芳 《Advances in Manufacturing》 SCIE CAS 2000年第S1期38-41,共4页
To understand the physical meaning of phase time further more, we discuss the reflection phase time of quantum-particles passing though a potential well It is shown that the reflection phase time is equal to the trans... To understand the physical meaning of phase time further more, we discuss the reflection phase time of quantum-particles passing though a potential well It is shown that the reflection phase time is equal to the transmission phase time in value and negative under certain conditions for a square potential well by analyzing While quantum-particles passing through the potential well, we think that this course can be described only with the velocity of energy of quantum mechanics whether or not they are reflected or transmitted eventually 展开更多
关键词 reflection phase time potential well velocity of energy the traversal time
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部