4,617 research outputs found

    Quantum walks on two kinds of two-dimensional models

    Full text link
    In this paper, we numerically study quantum walks on two kinds of two-dimensional graphs: cylindrical strip and Mobius strip. The two kinds of graphs are typical two-dimensional topological graph. We study the crossing property of quantum walks on these two models. Also, we study its dependence on the initial state, size of the model. At the same time, we compare the quantum walk and classical walk on these two models to discuss the difference of quantum walk and classical walk

    Selection of Therapeutic Strategies after Preoperative Neoadjuvant Chemoradiotherapy for Rectal Cancer

    Get PDF
    Rectal cancer is one of the most common malignant tumors in China, which is mainly middle and low rectal cancer. Due to the particularity of the physiological and anatomical location of the rectum and the neglect of the relevant clinical symptoms, patients with rectal cancer in real life often have the local progression stage. A large number of studies have shown that neoadjuvant chemoradiotherapy should be performed in such patients, to achieve tumor downstaging before rectal cancer surgery. In this study, different treatment measures for rectal cancer patients after neoadjuvant chemoradiotherapy are presented

    The Realizations of Steganography in Encrypted Domain

    Full text link
    With the popularization and application of privacy protection technologies in cloud service and social network, ciphertext has been gradually becoming a common platform for public to exchange data. Under the cover of such a plat-form, we propose steganography in encrypted domain (SIED) in this paper to re-alize a novel method to realize secret communication Based on Simmons' model of prisoners' problems, we discuss the application scenarios of SIED. According to the different accesses to the encryption key and decryption key for secret mes-sage sender or receiver, the application modes of SIED are classified into four modes. To analyze the security requirments of SIED, four levels of steganalysis attacks are introduced based on the prior knowledge about the steganography system that the attacker is assumed to obtain in advance. Four levels of security standards of SIED are defined correspondingly. Based on the existing reversible data hiding techniques, we give four schemes of SIED as practical instances with different security levels. By analyzing the embedding and extraction characteris-tics of each instance, their SIED modes, application frameworks and security lev-els are discussed in detail
    • …
    corecore