期刊文献+
共找到28篇文章
< 1 2 >
每页显示 20 50 100
MODIFIED LANDWEBER ITERATIVE METHOD FOR A BACKWARD PROBLEM IN TIME OF THE DIFFUSION EQUATION WITH LOCAL AND NONLOCAL OPERATORS
1
作者 Hongwu ZHANG Yanhui LI 《Acta Mathematica Scientia》 2025年第3期1205-1222,共18页
In this article, we consider a backward problem in time of the diffusion equation with local and nonlocal operators. This inverse problem is ill-posed because the solution does not depend continuously on the measured ... In this article, we consider a backward problem in time of the diffusion equation with local and nonlocal operators. This inverse problem is ill-posed because the solution does not depend continuously on the measured data. Inspired by the classical Landweber iterative method and Fourier truncation technique, we develops a modified Landweber iterative regularization method to restore the continuous dependence of solution on the measurement data. Under the a-priori and a-posteriori choice rules for the regularized parameter, the convergence estimates for the regularization method are derived. Some results of numerical simulation are provided to verify the stability and feasibility of our method in dealing with the considered problem. 展开更多
关键词 backward problem in time diffusion equation with local and nonlocal operators modified Landweber regularization convergence estimate numerical simulation
在线阅读 下载PDF
Locally Defined Operators and Locally Lipschitz Composition Operators in the Space WBVp(·)([a, b])
2
作者 José Atilio Guerrero Odalis Mejía Nelson Merentes 《Advances in Pure Mathematics》 2016年第10期727-744,共18页
We give a neccesary and sufficient condition on a function such that the composition operator (Nemytskij Operator) H defined by acts in the space and satisfies a local Lipschitz condition. And, we prove that ever... We give a neccesary and sufficient condition on a function such that the composition operator (Nemytskij Operator) H defined by acts in the space and satisfies a local Lipschitz condition. And, we prove that every locally defined operator mapping the space of continuous and bounded Wiener p(&#183;)-variation with variable exponent functions into itself is a Nemytskij com-position operator. 展开更多
关键词 Generalized Variation p(·)-Variation in Wiener’s Sense Variable Exponent CONVERGENCE Helly’s Theorem local operator
在线阅读 下载PDF
LOCALIZATION OPERATORS ASSOCIATED WITH THE SPHERICAL MEAN OPERATOR
3
作者 Jiman Zhao 《Analysis in Theory and Applications》 2005年第4期317-325,共9页
In this paper, we define the localization operator associated with the spherical mean operator, and show that the localization operator is not only bounded, but also in Schatten-Von Neumann class. We also give a trace... In this paper, we define the localization operator associated with the spherical mean operator, and show that the localization operator is not only bounded, but also in Schatten-Von Neumann class. We also give a trace formula when the symbol function is a nonnegative function. 展开更多
关键词 Wigner transform localization operator trace formula
在线阅读 下载PDF
TWO WEIGHT CHARACTERIZATIONS FOR THE MULTILINEAR LOCAL MAXIMAL OPERATORS
4
作者 Yali PAN Qingying XUE 《Acta Mathematica Scientia》 SCIE CSCD 2021年第2期596-608,共13页
Let 0<β<1 andΩbe a proper open and non-empty subset of R^(n).In this paper,the object of our investigation is the multilinear local maximal operator Mβ,defined by M_(β)((f))(x)=sup_(Q(∈)xQ∈Fβ)Π_(i=1)^m1/... Let 0<β<1 andΩbe a proper open and non-empty subset of R^(n).In this paper,the object of our investigation is the multilinear local maximal operator Mβ,defined by M_(β)((f))(x)=sup_(Q(∈)xQ∈Fβ)Π_(i=1)^m1/|Q|∫_(Q)|f_(i)(y_(i))|dy_(i),where F_(β)={Q(x,l):x∈Ω,l<βd(x,Ω^(c))},Q=Q(x,l)is denoted as a cube with sides parallel to the axes,and x and l denote its center and half its side length.Two-weight characterizations for the multilinear local maximal operator M_(β)are obtained.A formulation of the Carleson embedding theorem in the multilinear setting is proved. 展开更多
关键词 Multilinear local maximal operators A_((p q))^(β)weights two-weight inequalities
在线阅读 下载PDF
ON THE LOCAL NIKOLSKII CONSTANTS FOR BASKAKOV OPERATORS
5
作者 徐吉华 《Analysis in Theory and Applications》 1992年第4期89-96,共8页
In this paper we obtain all other local Nikolskii constants for Baskakov operators by ap- plying a method of asymptotic expansions,give a complete and satisfactory solution of Lehnhoff s open problems[1].
关键词 ON THE local NIKOLSKII CONSTANTS FOR BASKAKOV operatorS
在线阅读 下载PDF
Noiseless Linear Amplification with General Local Unitary Operations
6
作者 杨颂 阮宁娟 +2 位作者 苏云 林栩凌 邬志强 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第7期10-13,共4页
Noiseless linear amplification (NLA), first proposed by Ralpha et al., is a nondeterministic amplification process which gives gain to the Fock state |n) → gn|n), with g being the amplification gain. We here gi... Noiseless linear amplification (NLA), first proposed by Ralpha et al., is a nondeterministic amplification process which gives gain to the Fock state |n) → gn|n), with g being the amplification gain. We here give a general frame- work for improving the NLA scheme with arbitrary general local unitary operations. We derive the improvement in the amplification gain in 0 1 photon subspace. In particular, we study if the local unitary is composed of sin- gle mode squeezing and coherent displacement operation. Finally, numerical simulations show that local unitary operation could give a further enhancement in the amplification gain as well as the success probability, making the NLA more feasible in future optic quantum communications. 展开更多
关键词 NLA on MODE in Noiseless Linear Amplification with General local Unitary Operations of IS with
原文传递
Improving entanglement of assistance by local parity–time symmetric operation
7
作者 Zhi He Zun-Yan Nie Qiong Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第12期92-98,共7页
We investigate entanglement of assistance without and with decoherence using a local non-Hermitian operation, i.e.,parity–time(PT) symmetric operation. First we give the explicit expressions of entanglement of assist... We investigate entanglement of assistance without and with decoherence using a local non-Hermitian operation, i.e.,parity–time(PT) symmetric operation. First we give the explicit expressions of entanglement of assistance for a general W-like state of a three-qubit system under a local parity–time symmetric operation. Then for a famous W state without decoherence, we find that entanglement of assistance shared by two parties can be obviously enhanced with the assistance of the third party by a local parity–time symmetric operation. For the decoherence case, we provide two schemes to show the effects of local parity–time symmetric operation on improvement of entanglement of assistance against amplitude damping noise. We find that for the larger amplitude damping case the scheme of PT symmetric operation performed on one of two parties with the influence of noise is superior to that of PT symmetric operation performed on the third party without the influence of noise in suppressing amplitude damping noise. However, for the smaller amplitude damping case the opposite result is given. The obtained results imply that the local PT symmetric operation method may have potential applications in quantum decoherence control. 展开更多
关键词 entanglement of assistance local parity–time symmetric operation amplitude damping noise
原文传递
On Optimal Local Discrimination Algorithm of Two-Qubit Unitary Operations
8
作者 Peng-Hui Yao Ze-Kun Ye 《Journal of Computer Science & Technology》 2025年第4期1172-1180,共9页
It has been known that two different bipartite unitary operations are perfectly distinguishable by local operations and classical communication(LOCC)when a finite number of queries is allowed.However,it has been a lon... It has been known that two different bipartite unitary operations are perfectly distinguishable by local operations and classical communication(LOCC)when a finite number of queries is allowed.However,it has been a longstanding open problem to determine the optimal number of queries needed to distinguish bipartite unitary operations perfectly by LOCC since 2007.In this paper,we show that if two two-qubit unitary operations are perfectly distinguishable using queries,they are also perfectly distinguishable in the LOCC scenario using queries.As a result,LOCC operations are as powerful as global operations when using constant times the number of queries for the perfect discrimination of two-qubit unitary operations. 展开更多
关键词 quantum computing local operations and classical communication(LOCC) unitary operation discrimination
原文传递
Quantum Secure Direct Communication Network with Two-Step Protocol 被引量:20
9
作者 李熙涵 周萍 +3 位作者 梁玉洁 李春燕 周宏余 邓富国 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第5期1080-1083,共4页
An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein-Podolsky-Rosen (EPR) pair block as the quantum information carrier. The server, say Alice,... An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein-Podolsky-Rosen (EPR) pair block as the quantum information carrier. The server, say Alice, prepares and measures the EPR pairs in the quantum communication and the users perform the four local unitary operations to encode their message. Anyone of the legitimate users can communicate another one on the network securely. Since almost all of the instances in this scheme are useful and each EPR pair can carry two bits of information, the efficiency for qubits and the source capacity both approach the maximal values. 展开更多
关键词 local UNITARY OPERATIONS KEY DISTRIBUTION EPR PAIRS BELL THEOREM GHZSTATE CRYPTOGRAPHY ENTANGLEMENT SCHEME TELEPORTATION DIALOGUE
原文传递
Efficient Multiparty Quantum Secret Sharing with Greenberger-Horne-Zeilinger States 被引量:4
10
作者 邓富国 周萍 +2 位作者 李熙涵 李春燕 周宏余 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第5期1084-1087,共4页
An effcient multiparty quantum secret sharing scheme is proposed with Greenberger-Horne-Zeilinger (GHZ) states following some ideas in quantum dense coding. The agents take the single-photon measurements on the phot... An effcient multiparty quantum secret sharing scheme is proposed with Greenberger-Horne-Zeilinger (GHZ) states following some ideas in quantum dense coding. The agents take the single-photon measurements on the photons received for eavesdropping check and exploit the four local unitary operations Ⅰ, σx, σx and iσy to code their message. This scheme has the advantage of high capacity as each GHZ state can carry two bits of information. The parties do not need to announce the measuring bases for almost all the photons, which will reduce the classical information exchanged largely. The intrinsic efficiency for qubits and the total effciency both approach the maximal values. 展开更多
关键词 SECURE DIRECT COMMUNICATION local UNITARY OPERATIONS KEY DISTRIBUTION NOISY CHANNELS ENTANGLEMENT SCHEME TELEPORTATION CRYPTOGRAPHY PAIRS
原文传递
Classical Communication and Entanglement Cost in Preparing a Class of Multi-qubit States 被引量:2
11
作者 PAN Gui-Xia LIU Yi-Min ZHANG Zhan-Jun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第3期631-634,共4页
Recently, several similar protocols [J. Opt. B 4 (2002) 380; Phys. Lett. A 316 (2003) 159; Phys. Lett. A 355 (2006) 285; Phys. Lett. A 336 (2005) 317] for remotely preparing a class of multi-qubit states (i.... Recently, several similar protocols [J. Opt. B 4 (2002) 380; Phys. Lett. A 316 (2003) 159; Phys. Lett. A 355 (2006) 285; Phys. Lett. A 336 (2005) 317] for remotely preparing a class of multi-qubit states (i.e, α[0...0〉 +β[1... 1〉) were proposed, respectively. In this paper, by applying the controlled-not (CNOT) gate, a new simple protocol is proposed for remotely preparing such class of states. Compared to the previous protocols, both classical communication cost and required quantum entanglement in our protocol are remarkably reduced. Moreover, the difficulty of identifying some quantum states in our protocol is also degraded. Hence our protocol is more economical and feasible. 展开更多
关键词 remote state preparation quantum entanglement classical communication cost projective measurement local unitary operation
在线阅读 下载PDF
Entanglement Distillation for Mixed States Using Particle Statistics 被引量:1
12
作者 黄晓理 程丽红 衣学喜 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第4期772-774,共3页
We extend the idea of entanglement concentration protocol for pure states (Phys. Rev. Lett. 88, 187903) to the case of entanglement distillation for mixed states. The scheme works only with particle statistics and l... We extend the idea of entanglement concentration protocol for pure states (Phys. Rev. Lett. 88, 187903) to the case of entanglement distillation for mixed states. The scheme works only with particle statistics and local operations, without the need of any other interactions. We show that the maximally entangled state can be distilled out when the initial state is pure, otherwise the entanglement distilled depends on the off-diagonal element of density matrix of the initial state. Because of the requirement for density matrix, the entanglement distilled is always less than one, and this result is the same for both fermionic and bosonic particles. The distillation efficiency is a product of the diagonal elements of the initial state, it takes the maximum 50%, the same as that in the case for pure states.We extend the idea of entanglement concentration protocol for pure states (Phys. Rev. Lett. 88, 187903) to the case of entanglement distillation for mixed states. The scheme works only with particle statistics and local operations, without the need of any other interactions. We show that the maximally entangled state can be distilled out when the initial state is pure, otherwise the entanglement distilled depends on the off-dlagonal element of density matrix of the initial state. Because of the requirement for density matrix, the entanglement distilled is always less than one, and this result is the same for both fermionic and bosonic particles. The distillation effciency is a product of the diagonal elements of the initial state, it takes the maximum 50%, the same as that in the case for pure states. 展开更多
关键词 QUANTUM COMPUTATION local OPERATIONS PURIFICATION NONlocalITY
原文传递
Classification of Bipartite and Tripartite Qutrit Entanglement Under SLOCC 被引量:1
13
作者 YANG Xin-Gang WANG Zhi-Xi +1 位作者 WANG Xiao-Hong FEI Shao-Ming 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第9期651-654,共4页
We classify biqutrit and triqutrit pure states under stochastic local operations and classical communication. By investigating the right singular vector spaces of the coefticient matrices of the states, we obtain expl... We classify biqutrit and triqutrit pure states under stochastic local operations and classical communication. By investigating the right singular vector spaces of the coefticient matrices of the states, we obtain explicitly two equivalent classes of biqutrit states and twelve equivalent classes of triqutrit states respectively. 展开更多
关键词 biqutrit triqutrit stochastic local operations and classical communication
在线阅读 下载PDF
IRKO:An Improved Runge-Kutta Optimization Algorithm for Global Optimization Problems 被引量:1
14
作者 R.Manjula Devi M.Premkumar +3 位作者 Pradeep Jangir Mohamed Abdelghany Elkotb Rajvikram Madurai Elavarasan Kottakkaran Sooppy Nisar 《Computers, Materials & Continua》 SCIE EI 2022年第3期4803-4827,共25页
Optimization is a key technique for maximizing or minimizing functions and achieving optimal cost,gains,energy,mass,and so on.In order to solve optimization problems,metaheuristic algorithms are essential.Most of thes... Optimization is a key technique for maximizing or minimizing functions and achieving optimal cost,gains,energy,mass,and so on.In order to solve optimization problems,metaheuristic algorithms are essential.Most of these techniques are influenced by collective knowledge and natural foraging.There is no such thing as the best or worst algorithm;instead,there are more effective algorithms for certain problems.Therefore,in this paper,a new improved variant of a recently proposed metaphorless Runge-Kutta Optimization(RKO)algorithm,called Improved Runge-Kutta Optimization(IRKO)algorithm,is suggested for solving optimization problems.The IRKO is formulated using the basic RKO and local escaping operator to enhance the diversification and intensification capability of the basic RKO version.The performance of the proposed IRKO algorithm is validated on 23 standard benchmark functions and three engineering constrained optimization problems.The outcomes of IRKO are compared with seven state-of-the-art algorithms,including the basic RKO algorithm.Compared to other algorithms,the recommended IRKO algorithm is superior in discovering the optimal results for all selected optimization problems.The runtime of IRKO is less than 0.5 s for most of the 23 benchmark problems and stands first for most of the selected problems,including real-world optimization problems. 展开更多
关键词 Engineering design global optimization local escaping operator metaheuristics Runge-Kutta optimization algorithm
在线阅读 下载PDF
Face Recognition on Partial and Holistic LBP Features 被引量:2
15
作者 Xiao-Rong Pu,Yi Zhou,and Rui-Yi Zhou the School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 611731,China 《Journal of Electronic Science and Technology》 CAS 2012年第1期56-60,共5页
An algorithm for face description and recognition based on multi-resolution with multi-scale local binary pattern (multi-LBP) features is proposed. The facial image pyramid is constructed and each facial image is di... An algorithm for face description and recognition based on multi-resolution with multi-scale local binary pattern (multi-LBP) features is proposed. The facial image pyramid is constructed and each facial image is divided into various regions from which partial and holistic local binary patter (LBP) histograms are extracted. All LBP features of each image are concatenated to a single LBP eigenvector with different resolutions. The dimensionaUty of LBP features is then reduced by a local margin alignment (LMA) algorithm based on manifold, which can preserve the between-class variance. Support vector machine (SVM) is applied to classify facial images. Extensive experiments on ORL and CMU face databases clearly show the superiority of the proposed scheme over some existed algorithms, especially on the robustness of the method against different facial expressions and postures of the subjects. 展开更多
关键词 Face recognition local binary pattern operator multi-resolution with multi-scale local binary pattern ocal margin alignment dimensionality reduction.
在线阅读 下载PDF
Quantum Dialogue by Using Non-Symmetric Quantum Channel 被引量:1
16
作者 詹佑邦 张伶伶 +1 位作者 王郁武 张群永 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第4期648-652,共5页
A protocol for quantum dialogue is proposed to exchange directly the communicator's secret messages by using a three-dimensional Bell state and a two-dimensional Bell state as quantum channel with quantum superdence ... A protocol for quantum dialogue is proposed to exchange directly the communicator's secret messages by using a three-dimensional Bell state and a two-dimensional Bell state as quantum channel with quantum superdence coding, local collective unitary operations, and entanglement swapping. In this protocol, during the process of trans- mission of particles, the transmitted particles do not carry any secret messages and are transmitted only one time. The protocol has higher source capacity than protocols using symmetric two-dimensional states. The security is ensured by the unitary operations randomly performed on all checking groups before the particle sequence is transmitted and the application of entanglement swapping. 展开更多
关键词 quantum dialogue non-symmetric quantum channel local collective unitary operation entanglement swapping
在线阅读 下载PDF
Tracking topological entity changes in 3D collaborative modeling systems 被引量:2
17
作者 Cheng Yuan He Fazhi +2 位作者 Huang Zhiyong Cai Xiantao Zhang Dejun 《Computer Aided Drafting,Design and Manufacturing》 2012年第1期89-98,共10页
One of the key problems in collaborative geometric modeling systems is topological entity correspondence when topolog- ical structure of geometry models on collaborative sites changes, ha this article, we propose a so... One of the key problems in collaborative geometric modeling systems is topological entity correspondence when topolog- ical structure of geometry models on collaborative sites changes, ha this article, we propose a solution for tracking topological entity alterations in 3D collaborative modeling environment. We firstly make a thorough analysis and detailed categorization on the altera- tion properties and causations for each type of topological entity, namely topological face and topological edge. Based on collabora- tive topological entity naming mechanism, a data structure called TEST (Topological Entity Structure Tree) is introduced to track the changing history and current state of each topological entity, to embody the relationship among topological entities. Rules and algo- rithms are presented for identification of topological entities referenced by operations for correct execution and model consistency. The algorithm has been verified within the prototype we have implemented with ACIS. 展开更多
关键词 TEST textual modeling command local operation topological entity changes
在线阅读 下载PDF
Reproducing Spaces and Localization Operators
18
作者 ShuJunDANG LiZhongPENG 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2004年第2期255-260,共6页
This paper, by using of windowed Fourier transform (WFT), gives a family of embedding operators , s.t. are reproducing subspaces (n = 0, Bargmann Space); and gives a reproducing kernel and an orthonormal basis (ONB)... This paper, by using of windowed Fourier transform (WFT), gives a family of embedding operators , s.t. are reproducing subspaces (n = 0, Bargmann Space); and gives a reproducing kernel and an orthonormal basis (ONB) of T n L 2(R). Furthermore, it shows the orthogonal spaces decomposition of . Finally, by using the preceding results, it shows the eigenvalues and eigenfunctions of a class of localization operators associated with WFT, which extends the result of Daubechies in [1] and [6]. 展开更多
关键词 Reproducing space localization operator Bargmann space Windowed Fourier transform
原文传递
Simplified Four-Qubit Cluster State for Splitting Arbitrary Single-Qubit Information
19
作者 尹晓峰 刘益民 +1 位作者 章文 张战军 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第1期49-53,共5页
The simplified four-qubit cluster state (i.e., (|0000〉 + |0011〉 + |1100〉 -|1111〉)/2) is explored for splitting an arbitrary single-qubit quantum information (QI). Various feasible distributions of the ... The simplified four-qubit cluster state (i.e., (|0000〉 + |0011〉 + |1100〉 -|1111〉)/2) is explored for splitting an arbitrary single-qubit quantum information (QI). Various feasible distributions of the four qubits among the Q,I sender and receivers for tri-splitting or hi-splitting are found out. For the distribution representations the corresponding splitting schemes and their LOCCs (local operation and classical communication) are presented amply while others are mentioned concisely. 展开更多
关键词 simplified cluster state quantum information splitting single-qubit quantum information local operation and classical communication
在线阅读 下载PDF
Multiparty Quantum Secret Report
20
作者 邓富国 李熙涵 +3 位作者 李春燕 周萍 梁玉洁 周宏余 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第7期1676-1679,共4页
A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M + 1)-particle Greenberger-Horne-Zeilinger (GHZ) states that only Alice k... A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M + 1)-particle Greenberger-Horne-Zeilinger (GHZ) states that only Alice knows which state each (M + 1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a aσ∞ operation on her particle in the GHZ state or not. After the GHZ states (the quantum key) are used up, the parties check whether there is a vicious eavesdropper, say Eve, monitoring the quantum line, by picking out some samples from the GHZ states shared and measuring them with two measuring bases. After confirming the security of the quantum key, they use the remaining GHZ states repeatedly for the next round of quantum communication. This scheme has the advantage of high intrinsic efficiency for the qubits and total efficiency. 展开更多
关键词 SECURE DIRECT COMMUNICATION local UNITARY OPERATIONS KEY DISTRIBUTION BELLTHEOREM GHZ STATES ENTANGLEMENT CRYPTOGRAPHY SCHEME PROTOCOL NETWORK
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部