Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 90 papers published in subject: > since this site started. |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. The Study of an Impulsive Predator-prey System with Additional Food to Predators | |||
Yang yong,Pei yongzhen,Li changguo | |||
Mathematics 30 January 2008 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Based on a prey-predator system with some additional food, we suggest an impulsive differential equation to model the process of periodic harvesting prey at fixed time. For the model, by Floquent Theorem and small amplitude perturbation method, we have proved that there exists a locally asymptotically stable predator-eradication periodic solution. Permanence conditions are established via the method of comparison involving multiple Liapunav functions when some conditions are satisfied. Numerical results show that the impulsive system has the complex dynamical behaviors and is dominated by periodicity, quasi-periodicity, chaos, intermittency and crises. | |||
TO cite this article:Yang yong,Pei yongzhen,Li changguo. The Study of an Impulsive Predator-prey System with Additional Food to Predators[OL].[30 January 2008] http://en.paper.edu.cn/en_releasepaper/content/18485 |
2. Teleportation of two-particle entangled state via an asymmetric state | |||
Chen XiuBo,Wen QiaoYan,Zhu FuChen | |||
Mathematics 22 November 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:We propose a protocol for three-party quantum teleportation via a asymmetric triplet in an entangled state, which is much more valuable than GHZ and W state for some applications in quantum information processing. In the protocol, quantum information of an unknown two-particle entangled state, namely, the quantum state itself, is transmitted from the sender to the remote receiver with the aid of the co-sender. It is found that by means of optimal discrimination between two nonorthogonal quantum states, the protocol of teleportation can be realized probabilistically. In addition, all kinds of transformations performed by the sender and the receiver are given in detail. | |||
TO cite this article:Chen XiuBo,Wen QiaoYan,Zhu FuChen. Teleportation of two-particle entangled state via an asymmetric state [OL].[22 November 2007] http://en.paper.edu.cn/en_releasepaper/content/16510 |
3. A more effcient way to detect eavesdropping in“ping-pong”protocol and its application to quantum | |||
Gao Fei ,Guo FenZhuo ,Wen QiaoYan ,Zhu FuChen | |||
Mathematics 20 November 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:We present a different way to detect eavesdropping in “ping-pong”protocol [Phys. Rev. Lett. 89, 187902 (2002)], where we make full use of the Bell states so that the security, which can be described by the function I(d), is improved obviously. The method we use to compare the effciency among different detect strategies is instructive for scheme designers. Furthermore, a quantum sharing of classical secret protocol is proposed, in which two-particle entangled state is competent for multi-party secret sharing. | |||
TO cite this article:Gao Fei ,Guo FenZhuo ,Wen QiaoYan , et al. A more effcient way to detect eavesdropping in“ping-pong”protocol and its application to quantum[OL].[20 November 2007] http://en.paper.edu.cn/en_releasepaper/content/16434 |
4. Quantum key distribution with Bell states | |||
Gao Fei ,Wen QiaoYan ,Zhu FuChen | |||
Mathematics 20 November 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:A quantum key distribution (QKD) protocol based on Bell states is proposed. By transmitting the photons from Bell states in random order the sender constructs nonorthogonal states, which can prevent an eavesdropper from extracting key information. At the destination,the receiver performs Bell measurements and then obtains secure key. The property of entanglement swapping can improve the effciency of QKD. To show the security of this scheme, we present an explicit relation between the information that an eavesdropper can elicit and the corresponding error rate he/she would introduce. Furthermore, all the photons are still in Bell states finally and can be reused for new applications. | |||
TO cite this article:Gao Fei ,Wen QiaoYan ,Zhu FuChen . Quantum key distribution with Bell states[OL].[20 November 2007] http://en.paper.edu.cn/en_releasepaper/content/16430 |
5. High-efficient Quantum Secret Sharing with Identity Certification | |||
SUN Ying,WEN Qiao-Yan,ZHU Fu-Chen | |||
Mathematics 19 November 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:We present a high-efficient quantum secret sharing (QSS) scheme with identity certification using two-particle maximum entangled pairs. The identity sequences and one-way hash functions are shared beforehand for avoiding wasting particles while establishing the shared key. And all particles are transmitted for only one time in the quantum channels. We consider that the scheme is optimal as both the intrinsic efficiency for qubits and the total efficiency approach maximum. | |||
TO cite this article:SUN Ying,WEN Qiao-Yan,ZHU Fu-Chen. High-efficient Quantum Secret Sharing with Identity Certification[OL].[19 November 2007] http://en.paper.edu.cn/en_releasepaper/content/16428 |
6. Revisiting the security of bidirectional quantum secure communication | |||
GAO Fei ,GUO Fen-Zhuo,WEN Qiao-Yan,ZHU Fu-Chen | |||
Mathematics 19 November 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:From the perspective of information theory and cryptography, we analyze the security of three bidirectional quantum secure direct communication (QSDC) protocols and point out that the transmitted information would be partly leaked out in them. That is, any eavesdropper can elicit some information about the secrets from the public annunciations of the legal users. This phenomenon should have been strictly forbidden in a quantum secure communication. In fact, this problem exists in quite a few recent proposals and, therefore, it deserves more research attention in the following related study. | |||
TO cite this article:GAO Fei ,GUO Fen-Zhuo,WEN Qiao-Yan, et al. Revisiting the security of bidirectional quantum secure communication[OL].[19 November 2007] http://en.paper.edu.cn/en_releasepaper/content/16421 |
7. A mathematical model of a three species prey-predator system with impulsive control and Holling functional response | |||
Liu Shaoying,Pei Yongzhen,Li Changguo | |||
Mathematics 16 November 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper, we investigate a three species prey-predator system with impulsive prey harvest and Holling type II functional response. By using Floquet’s Theorem and the small amplitude perturbation method, we obtain that there exists an asymptotically stable preys-eradication periodic solution when the impulsive period is less than some critical minimum value (or the release amount of the predator is larger than some critical maximum value), and the system is permanent under the conditions that both the death rate and impulsive period are grater than some critical maximum values. The results indicate that the a large death rate and a long impulsive period will lead the system permanent. Numerical results show that the system we considered has more complex dynamics. | |||
TO cite this article:Liu Shaoying,Pei Yongzhen,Li Changguo. A mathematical model of a three species prey-predator system with impulsive control and Holling functional response[OL].[16 November 2007] http://en.paper.edu.cn/en_releasepaper/content/16391 |
8. Least squares problem of complex bisymmetric matrices on linear manifold | |||
Lijun Zhao,Xiyan Hu,Lei Zhang | |||
Mathematics 25 September 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:This paper considers the least squares problem of complex bisymmetric matrices on linear manifold and their optimal approximation problem. We obtain the expression of the least squares solutions based on the singular value decomposition. Furthermore, the uniqueness and representation of the optimal approximation solution are derived. | |||
TO cite this article:Lijun Zhao,Xiyan Hu,Lei Zhang. Least squares problem of complex bisymmetric matrices on linear manifold [OL].[25 September 2007] http://en.paper.edu.cn/en_releasepaper/content/15311 |
9. The Analysis and Forecast of Chinese Three Industrial Structures | |||
Jia Niannian,Chai Yanyou | |||
Mathematics 19 June 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:At present, China is at a crucial changing period from the second step strategic target to the third step strategic target. To forecast the future trend of the three industrial structures scientifically and to draw up the development target of industry rationally have great significance in optimizing the allocations of resources and achieving sustained economic growth. In this paper, we combine the spherical projection with the grey model and present a new method to forecast Chinese three industrial structures. Compared with the actual data, we attest to that the model presented by this paper can forecast Chinese three industrial structures quite accurately, reflect the Chinese three industrial structures’ mechanism, and have rational and effective functions of analyzing trend and forecasting. | |||
TO cite this article:Jia Niannian,Chai Yanyou. The Analysis and Forecast of Chinese Three Industrial Structures[OL].[19 June 2007] http://en.paper.edu.cn/en_releasepaper/content/13568 |
10. N-soliton-typed solution in terms of Wronskian determinant for a forced variable-coefficient Korteweg-de Vries equation | |||
Zhen-Zhi Yao,Chun-Yi Zhang,Hong-Wu Zhu,Xiang-Hua Meng,Tao Xu ,Bo Tian | |||
Mathematics 15 January 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper, we first derive the bilinear form and auto-Backlund transformation for a variable-coefficient Korteweg-de Vries-typed (vcKdV) equation with external-force term. Then, we obtain the N-soliton-typed solution in terms of Wronskian form, which is proved to be indeed an exact solution of this equation through Wronskian technique. In addition, we show that the (N-1)- and N-soliton-typed solutions satisfy the auto-Backlund transformation by using the same method. | |||
TO cite this article:Zhen-Zhi Yao,Chun-Yi Zhang,Hong-Wu Zhu, et al. N-soliton-typed solution in terms of Wronskian determinant for a forced variable-coefficient Korteweg-de Vries equation[OL].[15 January 2007] http://en.paper.edu.cn/en_releasepaper/content/10725 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated