4,617 research outputs found
Quantum walks on two kinds of two-dimensional models
In this paper, we numerically study quantum walks on two kinds of
two-dimensional graphs: cylindrical strip and Mobius strip. The two kinds of
graphs are typical two-dimensional topological graph. We study the crossing
property of quantum walks on these two models. Also, we study its dependence on
the initial state, size of the model. At the same time, we compare the quantum
walk and classical walk on these two models to discuss the difference of
quantum walk and classical walk
Selection of Therapeutic Strategies after Preoperative Neoadjuvant Chemoradiotherapy for Rectal Cancer
Rectal cancer is one of the most common malignant tumors in China, which is mainly middle and low rectal cancer. Due to the particularity of the physiological and anatomical location of the rectum and the neglect of the relevant clinical symptoms, patients with rectal cancer in real life often have the local progression stage. A large number of studies have shown that neoadjuvant chemoradiotherapy should be performed in such patients, to achieve tumor downstaging before rectal cancer surgery. In this study, different treatment measures for rectal cancer patients after neoadjuvant chemoradiotherapy are presented
The Realizations of Steganography in Encrypted Domain
With the popularization and application of privacy protection technologies in
cloud service and social network, ciphertext has been gradually becoming a
common platform for public to exchange data. Under the cover of such a
plat-form, we propose steganography in encrypted domain (SIED) in this paper to
re-alize a novel method to realize secret communication Based on Simmons' model
of prisoners' problems, we discuss the application scenarios of SIED. According
to the different accesses to the encryption key and decryption key for secret
mes-sage sender or receiver, the application modes of SIED are classified into
four modes. To analyze the security requirments of SIED, four levels of
steganalysis attacks are introduced based on the prior knowledge about the
steganography system that the attacker is assumed to obtain in advance. Four
levels of security standards of SIED are defined correspondingly. Based on the
existing reversible data hiding techniques, we give four schemes of SIED as
practical instances with different security levels. By analyzing the embedding
and extraction characteris-tics of each instance, their SIED modes, application
frameworks and security lev-els are discussed in detail
- …