oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 6 )

2019 ( 287 )

2018 ( 1844 )

2017 ( 1756 )

Custom range...

Search Results: 1 - 10 of 126347 matches for " CHEN Dan-wei "
All listed articles are free for downloading (OA Articles)
Page 1 /126347
Display every page Item
Simulating dynamical quantum Hall effect with superconducting qubits
Xu-Chen Yang,Dan-Wei Zhang,Peng Xu,Yang Yu,Shi-Liang Zhu
Physics , 2014, DOI: 10.1103/PhysRevA.91.022303
Abstract: We propose an experimental scheme to simulate the dynamical quantum Hall effect and the related interaction-induced topological transition with a superconducting-qubit array. We show that a one-dimensional Heisenberg model with tunable parameters can be realized in an array of superconducting qubits. The quantized plateaus, which is a feature of the dynamical quantum Hall effect, will emerge in the Berry curvature of the superconducting qubits as a function of the coupling strength between nearest neighbor qubits. We numerically calculate the Berry curvatures of two-, four- and six-qubit arrays, and find that the interaction-induced topological transition can be easily observed with the simplest two-qubit array. Furthermore, we analyze some practical conditions in typical experiments for observing such dynamical quantum Hall effect.
Research on Logic Consistency of Junk Code Transformation within Sub-function
子程序花指令模糊变换逻辑一致性研究

SUN Guo-zi,CHEN Dan-wei,CAI Qiang,
孙国梓
,陈丹伟,蔡强

计算机科学 , 2009,
Abstract: Junk code transformation is an effective approach for the code obfuscation.Based on the analysis of current junk code strategies,the paper proposed a novel junk code encryption algorithm within sub-function and described the algorithm using formal language.With formalization method,the paper researched how to prove the logic consistency of junk code transformation within sub-function.We deduced some important lemmas after researching the formal definition of junk code transformation within sub-function.With...
Novel Cloud Computing Intrusion Detection Model Based on Improved Manifold Learning
一种基于改进流形学习方法的云计算入侵检测模型

CHEN Dan-wei,HOU Nan,SUN Guo-zi,
陈丹伟
,侯楠,孙国梓

计算机科学 , 2010,
Abstract: The cloud computing technology which is a new Internet based super-computing model has aroused great concern,facing an increasing number of security threats at the same time. This paper built a intrusion detection system framework which is adapt to the cloud computing environment proposed in this paper. The nonlinear manifold learning algorithm was introduced to the model proposed in this thesis to be the core algorithm of the data pre-processing module, and the improved I_I_E algorithm was given in order to improve the classification performance. I}he simulation result shows that the algorithm is effective and efficient.
Novel Detection Scheme Based on IBE in WSNs Selective Forwarding Attacks
一种基于IBE的WSNs选择转发攻击检测方案

CHEN Dan-wei,HOU Nan,SUN Guo-zi,
陈丹伟
,侯楠,孙国梓

计算机科学 , 2010,
Abstract: Since nodes in wireless sensor networks have limited capabilities,messages are generally transmitted between nodes through multi-hop.The multi-hop routing protocols provide a lot of convenience for the selective forwarding attack.As a result,a random checkpoint-based multi-hop acknowledge scheme to detect selective forwarding attacks in WSNs was brought out.At the same time,IBE and LEACH were adopted to improve the formal detecting scheme.Firstly,the overall framework of defense scheme and its working metho...
Superfluid and magnetic states of an ultracold Bose gas with synthetic three-dimensional spin-orbit coupling in an optical lattice
Dan-Wei Zhang,Ji-Pei Chen,Chuan-Jia Shan,Z. D. Wang,Shi-Liang Zhu
Physics , 2013, DOI: 10.1103/PhysRevA.88.013612
Abstract: We study ultracold bosonic atoms with the synthetic three-dimensional spin-orbit (SO) coupling in a cubic optical lattice. In the superfluidity phase, the lowest energy band exhibits one, two or four pairs of degenerate single-particle ground states depending on the SO-coupling strengths, which can give rise to the condensate states with spin-stripes for the weak atomic interactions. In the deep Mott-insulator regime, the effective spin Hamiltonian of the system combines three-dimensional Heisenberg exchange interactions, anisotropy interactions and Dzyaloshinskii-Moriya interactions. Based on Monte Carlo simulations, we numerically demonstrate that the resulting Hamiltonian with an additional Zeeman field has a rich phase diagram with spiral, stripe, vortex crystal, and especially Skyrmion crystal spin-textures in each xy-plane layer. The obtained Skyrmion crystals can be tunable with square and hexagonal symmetries in a columnar manner along the z axis, and moreover are stable against the inter-layer spin-spin interactions in a large parameter region.
One virus detection model based on probability training
一种基于概率训练的病毒检测模型*

CHEN Dan-wei,LIU Jie,SUN Guo-zi,HAN Junb,
陈丹伟
,刘杰,孙国梓,韩俊b

计算机应用研究 , 2010,
Abstract: Characteristic code anti-virus system can no longer meet current computer virus detection demand and will be replaced by the behavior detection method. With a brief analysis of virus abnormal behavior and an application of the state transition method to the virus behavior detection, this paper proposed the probability training based virus detection model. Implemented the virus judgment algorithm with a concrete virus probability training procedure of both single and continuous abnormal behavior, and a training procedure of virus probability threshold. The probability training based virus detection model proves to be effective with reliable case analysis and detection result verification.
P2P Networks Proactive Immune Mechanism Based on Multi-mobile Agent
一种基于多移动Agent的P2P网络主动免疫机制

XU Xiao-long,WANg Ru-chuan,XIAO Pu,CHEN Dan-wei,
徐小龙
,王汝传,肖甫,陈丹伟

计算机科学 , 2009,
Abstract: Peer-to-Peer (P2P) computing environment is suffering increasingly serious propagation and attack of malicious codes. This paper adopted the Multi-Mobile Agent to construct a novel proactive immune mechanism suitable for P2P network systems. The biological immune principle was referred in this paper,and Multi Agent technology was utilined to realize Agents with different functions, which build cooperation relationship among the Central Immune Peer and ordinary Peers to defend malicious codes jointly. Mobile Agent can roam throughout P2P network to detect malicious codes actively or to carry and set long distance immune modules like vaccines. It is convenient to achieve rapid responding, analyzing and dealing malicious codes. In order to distribute immune modules efficiently, the paper also proposed a new Exponential Tree Plus (E7+)and vaccine distribution algorithm based on E7+.This paper first analyzed the propagation of malicious code in P2P networks, and then introduced the architecture and components of P2P networks proactive immune mechanism based on Multi Mobile Agent, as well as the ETA-based vaccine distribution algorithm, which performance was described at the end of this paper.
Study of stochastic junk code encryption algorithm
随机花指令加密算法研究

WANG Hai-ping,CAO Lin,SUN Guo-zi,CHEN Dan-wei,
王海平
,曹林,孙国梓,陈丹伟

计算机应用 , 2006,
Abstract: 在对已有的花指令加密策略及其存在的问题进行分析的基础上,提出了随机花指令加密算法。给出了该算法的JMP扩展和JMC变换两种基本策略,研究了随机花指令的算法的工作流程和算法描述,并采用自编写的JCEE软件对上述算法进行了具体实践。
Observation of coherent oscillation in single-passage Landau-Zener transitions
Guozhu Sun,Xueda Wen,Ming Gong,Dan-Wei Zhang,Yang Yu,Shi-Liang Zhu,Jian Chen,Peiheng Wu,Siyuan Han
Physics , 2015, DOI: 10.1038/srep08463
Abstract: Landau-Zener transition (LZT) has been explored in a variety of physical systems for coherent population transfer between different quantum states. In recent years, there have been various proposals for applying LZT to quantum information processing because when compared to the methods using ac pulse for coherent population transfer, protocols based on LZT are less sensitive to timing errors. However, the effect of finite range of qubit energy available to LZT based state control operations has not been thoroughly examined. In this work, we show that using the well-known Landau-Zener formula in the vicinity of an avoided energy-level crossing will cause considerable errors due to coherent oscillation of the transition probability in a single-passage LZT experiment. The data agree well with the numerical simulations which take the transient dynamics of LZT into account. These results not only provide a closer view on the issue of finite-time LZT but also shed light on its effects on the quantum state manipulation.
The allelopathy of different development stages of Amaranthus retroflexus L. on root border cells of cucumber
不同发育期反枝苋对黄瓜根缘细胞的化感作用

Ma Dan-Wei,
刘爽
,马丹炜

生态学报 , 2009,
Abstract: 以黄瓜为实验材料,采用悬空气培养法研究了不同发育期反枝苋水浸提液对根缘细胞的化感效应.结果表明:在反枝苋水浸提液作用下,黄瓜根果胶甲基酯酶(PME)活性升高,但随着水浸提液浓度的升高,这种促进效应逐渐降低;而黄瓜根缘细胞存活率随着水浸提液浓度的升高而下降.相同发育期反枝苋不同部位的化感作用差异不显著,不同发育时期反枝苋化感作用差异较为明显,其化感作用以幼苗期最强,现蕾期次之,成熟期最弱.推测化感作用是反枝苋发育初期取得竞争优势,迅速占领生态位的原因之一.
Page 1 /126347
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.