-
1Academic Journal
المصدر: Gong-kuang zidonghua, Vol 48, Iss 12, Pp 68-78 (2022)
-
2Academic Journal
المصدر: Gong-kuang zidonghua, Vol 48, Iss 12, Pp 49-56 (2022)
مصطلحات موضوعية: 煤矿巷道, 移动机器人, 激光雷达, 惯性测量单元, 融合定位与建图, 因子图优化, 关键帧因子, slam, Mining engineering. Metallurgy, TN1-997
-
3Report
Relation: 自动化学报; http://ir.ia.ac.cn/handle/173211/56340
-
4Academic Journal
المؤلفون: LIWei-qing(李伟青)
المصدر: Zhejiang Daxue xuebao. Lixue ban, Vol 32, Iss 4, Pp 392-398 (2005)
مصطلحات موضوعية: 建筑图纸, 图纸识别, 电子图纸, 纸质图纸, Electronic computers. Computer science, QA75.5-76.95, Physics, QC1-999
وصف الملف: electronic resource
Relation: https://doaj.org/toc/1008-9497
-
5Academic Journal
المصدر: Guangtongxin yanjiu, Vol , Pp 7-9 (2010)
مصطلحات موضوعية: 波分复用, 波长转换器, 子图, 代数决策图算法, Applied optics. Photonics, TA1501-1820
وصف الملف: electronic resource
-
6Academic Journal
المصدر: Guangtongxin yanjiu, Vol , Pp 15-17 (2009)
مصطلحات موضوعية: 波分复用, 波长转换器, 子图, 代数决策图, Applied optics. Photonics, TA1501-1820
وصف الملف: electronic resource
-
7
مصطلحات موضوعية: 层析粒子图像测速技术, 三维重构, 卷积MART算法
Relation: 第十三届全国流体力学学术会议摘要集(下); http://dspace.imech.ac.cn/handle/311007/97876
-
8Dissertation/ Thesis
المؤلفون: 曾基臺, Tseng, Chi-Tai
المساهمون: 左瑞麟, Tso, Ray-lin
مصطلحات موضوعية: 量子安全直接通訊, 量子圖態, 一次性分發, 不受信任的第三方, Quantum Secure Direct Communication, Graph State, One-way Distribution, Untrusted Third-party
وصف الملف: 2039578 bytes; application/pdf
Relation: [1] "Bennett, C., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. IEEE (1984)." [2] H.-K. Lo and H. F. Chau, "Unconditional Security of Quantum Key Distribution Over Arbitrarily Long Distances," Science (American Association for the Advancement of Science), vol. 283, no. 5410, pp. 2050-2056, 1999, doi:10.1126/science.283.5410.2050. [3] P. W. Shor and J. Preskill, "Simple proof of security of the BB84 quantum key distribution protocol," Physical review letters, vol. 85, no. 2, pp. 441-444, 2000, doi:10.1103/PhysRevLett.85.441. [4] D. Mayers, "Unconditional security in quantum cryptography," Journal of the ACM, vol. 48, no. 3, pp. 351-406, 2001, doi:10.1145/382780.382781. [5] E. Biham, M. Boyer, P. O. Boykin, T. Mor, and V. Roychowdhury, "A proof of the security of quantum key distribution," Journal of cryptology, vol. 19, no. 4, pp. 381-439, 2006, doi:10.1007/s00145-005-0011-3. [6] G. Long and X. Liu, "Theoretically efficient high-capacity quantum-key- distribution scheme," Phys. Rev. A, vol. 65, 2002// 2002, doi:10.1103/PhysRevA.65.032302. [7] F. Deng, G. Long, and X. Liu, "Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block," Phys. Rev. A, vol. 68, 2003// 2003, doi:10.1103/PhysRevA.68.042317. [8] F. Deng and G. Long, "Secure direct communication with a quantum one-time pad," Phys. Rev. A, vol. 69, 2004// 2004, doi:10.1103/PhysRevA.69.052319. [9] X. Jin, X. Ji, and Y. Zhang, "Three-party quantum secure direct communication based on GHZ states," Phys. Lett. A, vol. 354, 2006// 2006, doi:10.1016/j.physleta.2006.01.035. [10] M. Wang and F. Yan, "Three-party simultaneous quantum secure direct communication scheme with EPR pairs," Chin. Phys. Lett., vol. 24, 2007// 2007, doi:10.1088/0256-307X/24/9/007. [11] Y. Xia and Z. Man, "Controlled quantum N-party simultaneous direct communication," Commun. Theor. Phys., vol. 48, 2007// 2007, doi:10.1088/0253-6102/48/1/017. [12] S. Chong and T. Hwang, "The enhancement of three-party simultaneous quantum secure direct communication scheme with EPR pairs," Opt. Commun., vol. 284, 2011// 2011, doi:10.1016/j.optcom.2010.08.037. [13] Y. He and W. Ma, "Three-party quantum secure direct communication against collective noise," Quantum Inf. Process., vol. 16, 2017// 2017, doi:10.1007/s11128-017-1703-y. [14] S. S. Chen, L. Zhou, W. Zhong, and Y. B. Sheng, "Three-step three-party quantum secure direct communication," Sci. China Phys. Mech. Astron., vol. 61, 2018// 2018, doi:10.1007/s11433-018-9224-5. [15] M. Boyer, R. Gelles, and D. Kenigsberg, "Semiquantum key distribution," Phys. Rev. A, vol. 79, 2009// 2009, doi:10.1103/PhysRevA.79.032341. [16] W. e. i. Zhang, D. a. o. w. e. n. Qiu, and P. a. u. l. o. Mateus, "Security of a single-state semi-quantum key distribution protocol," Quantum Inf. Process., vol. 17, 2018// 2018, doi:10.1007/s11128-018-1904-z. [17] X. Zou and D. Qiu, "Three-step semiquantum secure direct communication protocol," Sci. China Phys. Mech. Astron., vol. 57, 2014// 2014, doi:10.1007/s11433-014-5542-x. [18] C. Xie, L. Li, and H. Situ, "Semi-quantum secure direct communication scheme based on bell states," Int. J. Theor. Phys., vol. 57, 2018// 2018, doi:10.1007/s10773-018-3713-7. [19] C. Yang and C. Tsai, "Advanced semi-quantum secure direct communication protocol based on bell states against flip attack," Quantum Inf. Process., vol. 19, 2020// 2020, doi:10.1007/s11128-020-02623-7. [20] M. Zhang, H. Li, and Z. Xia, "Semiquantum secure direct communication using EPR pairs," Quantum Inf. Process., vol. 16, 2017// 2017, doi:10.1007/s11128-017-1573-3. [21] W. Krawec, "Mediated semiquantum key distribution," Phys. Rev. A, vol. 91, 2015// 2015, doi:10.1103/PhysRevA.91.032323. [22] Z. Rong, D. Qiu, P. Mateus, and X. Zou, "Mediated semi-quantum secure direct communication," Quantum information processing, vol. 20, no. 2, 2021, doi:10.1007/s11128-020-02965-2. [23] M. Hein, J. Eisert, and H. J. Briegel, "Multiparty entanglement in graph states," Physical review. A, Atomic, molecular, and optical physics, vol. 69, no. 6, pp. 1-62311, 2004, doi:10.1103/PhysRevA.69.062311. [24] M. Nielsen and I. Chuang, Quantum Computation and Quantum Information. Cambridge University Press: Cambridge, 2000. [25] N. Ananth and M. Senthilvelan, "Identifying non-k-separability of a class of N-qubit complete graph states using correlation tensors," The European physical journal. D, Atomic, molecular, and optical physics, vol. 70, no. 7, 2016, doi:10.1140/epjd/e2016-70056-2. [26] D. Pan et al., "The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet," IEEE Communications Surveys & Tutorials, pp. 1- 1, 2024, doi:10.1109/COMST.2024.3367535. [27] A. Farouk, M. Zakaria, A. Megahed, and F. A. Omara, "A generalized architecture of quantum secure direct communication for N disjointed users with authentication," Sci. Rep., vol. 5, 2015// 2015, doi:10.1038/srep16080. [28] C. h. e. n. Xie, L. v. z. h. o. u. Li, H. a. o. z. h. e. n. Situ, and J. i. a. n. h. a. o. He, "Semi-quantum secure direct communication scheme based on Bell states," Int. J. Theor. Phys., vol. 57, 2018// 2018, doi:10.1007/s10773-018- 3713-7. [29] Z. Rong, D. Qiu, and X. Zou, "Semi-quantum secure direct communication with entanglement," Int. J. Theor. Phys., vol. 59, 2020// 2020, doi:10.1007/s10773-020-04447-8. [30] M. Boyer, D. Kenigsberg, and T. Mor, "Quantum key distribution with classical bob," Phys. Rev. Lett., vol. 99, 2007// 2007, doi:10.1103/PhysRevLett.99.140501. [31] M. Z. A. Bhuiyan and J. Wu, "Collusion Attack Detection in Networked Systems," in 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 8-12 Aug. 2016 2016, pp. 286-293, doi:10.1109/DASC-PICom-DataCom- CyberSciTec.2016.67. [32] Q. Y. Cai, "Eavesdropping on the two-way quantum communication protocols with invisible photons," Phys. Lett. A, vol. 351, 2006// 2006, doi:10.1016/j.physleta.2005.10.050. [33] F. G. Deng, X. H. Li, H. Y. Zhou, and Z. J. Zhang, "Improving the security of multiparty quantum secret sharing against Trojan horse attack," Physical review. A, Atomic, molecular, and optical physics, vol. 72, no. 4, 2005, doi:10.1103/PhysRevA.72.044302. [34] A. Cabello, "Quantum key distribution in the Holevo limit," Phys. Rev. Lett., vol. 85, 2000// 2000, doi:10.1103/PhysRevLett.85.5635. [35] C. W. Yang and T. Hwang, "Efficient key construction on semi-quantum secret sharing protocols," Int. J. Quantum Info., vol. 11, 2013// 2013, doi:10.1142/S0219749913500524. [36] C. W. Yang and T. Hwang, "Trojan horse attack free fault-tolerant quantum key distribution protocols," Quantum Inf. Process., vol. 13, 2014// 2014, doi:10.1007/s11128-013-0689-3. [37] Y. F. Yang, L. Z. Duan, T. R. Qiu, X. M. Xie, and W. Y. Duan, "Multi-party semi-quantum secure direct communication using Greenberger–Horne– Zeilinger states," Quant. Inform. Process., vol. 21, 2022// 2022, doi:10.1007/s11128-022-03671-x. [38] L.-C. Xu, H.-Y. Chen, N.-R. Zhou, and L.-H. Gong, "Multi-party semi- quantum secure direct communication protocol with cluster states," International journal of theoretical physics, vol. 59, no. 7, pp. 2175-2186, 2020, doi:10.1007/s10773-020-04491-4.; G0109971027; https://nccur.lib.nccu.edu.tw//handle/140.119/152766; https://nccur.lib.nccu.edu.tw/bitstream/140.119/152766/1/102701.pdf
-
9Academic Journal
المؤلفون: XUKang-hua(许康华), HUANGQing-xue(黄庆学)
المصدر: Zhejiang Daxue xuebao. Lixue ban, Vol 29, Iss 6, Pp 607-609 (2002)
مصطلحات موضوعية: 完全图, 导出子图, ramsey定理, Electronic computers. Computer science, QA75.5-76.95, Physics, QC1-999
وصف الملف: electronic resource
Relation: https://doaj.org/toc/1008-9497
-
10Conference
المؤلفون: 陈娟
-
11Report
Relation: 实验流体力学; http://dspace.imech.ac.cn/handle/311007/87119
-
12Academic Journal
مصطلحات موضوعية: 开缝圆柱, 粒子图像测速(PIV), 吹吸效应, 脱落涡
Relation: 上海交通大学学报,2019,53(10):1238-1248; https://dspace.xmu.edu.cn/handle/2288/177033
-
13Academic Journal
Relation: 中国数字医学,2018,13(10):39-41; https://dspace.xmu.edu.cn/handle/2288/173728
-
14Academic Journal
Relation: 推进技术,2018,(04):768-779; https://dspace.xmu.edu.cn/handle/2288/172244
-
15Academic Journal
Relation: 厦门大学学报(自然科学版),2018,57(04):558-564; https://dspace.xmu.edu.cn/handle/2288/172175
-
16Report
المؤلفون: 陳維美
المساهمون: 國立臺灣科技大學電子工程系
مصطلحات موضوعية: 完全子圖, 回朔演算法, 分支與限制演算法, GPU計算, clique, backtracking, branch and bound, GPU computing
وصف الملف: 117 bytes; text/html
Relation: http://ir.lib.ntust.edu.tw/handle/987654321/80674; http://ir.lib.ntust.edu.tw/bitstream/987654321/80674/1/index.html
-
17Report
Relation: 兵工学报; http://ir.opt.ac.cn/handle/181661/31569
-
18Academic Journal
مصطلحات موضوعية: 飞机尾涡, Rayleigh-Ludwieg不稳定性, 襟翼, 粒子图像测速, 水槽, aircraft wake vortex, Rayleigh-Ludwieg instability, flap, particle image, velocimetry, water channel
Relation: 航空学报,2017,(4):120250-; https://dspace.xmu.edu.cn/handle/2288/162723
-
19Conference
المساهمون: 北京大学湍流与复杂系统国家重点实验室, 弗吉利亚州立大学力学与核工程系
المصدر: 知网
Relation: 第八届全国高超声速科技学术会议.中国黑龙江哈尔滨.; 1412219; http://hdl.handle.net/20.500.11897/446110
-
20Report
Relation: 振动与冲击; http://dspace.imech.ac.cn/handle/311007/77779