论文研究-Quantum teleportation and state sharing via a generalized seven-qubit Brown state.pdf


-
基于广义七-粒子布朗态的量子隐形传态和量子态共享,康双勇,陈秀波,在这篇文章中,一个新颖的量子隐形传态和量子态共享方案被提出,广义的七-粒子布朗态$|B_{7}angle$被用作量子信息载体。首先,对于任意单�
国酗技论文在线 http://www.paper.edu.cn Recently, through an extensive numerical optimization procedure, Brown et al. 17 have discovered a. maximally entangled five-qubit Brown state 2(001))+010){〉+100)+11))12345 where 00)±11).y+)-一(01)±10) are Bell states. Afterwards, Muralidharan et a.l. [10 have proposed the generalized multi-qubit Brown state Bn+5 B2+=2(712100+m21010)+m2n100p++m211) (3) where na)m form a computational basis of nth order For example, if n=2, we can get the generalized seven- qubit Brown state B2(001+010104)+|10100++111+)12345 Enlightened by the works of Refs. [12, 13, 14, 15, 16, 17, we propose a novel scheine for QT and QSTs by using B7), which is a new state. B7) is different from generalized seven- particle ghz or w state under stochastic local operations and classical communication. And it optimally violates a new Bell inequality. Based on its peculiar construction. it can realize some special communication functions. In this paper, solving the problem for QT and QSTS is a new application of B7 The rest of this paper is organized as follows. In section 2, we present a perfect QT protocol and three distinct QSTS ones via. B7. Then we make an overall comparison among three QSTs ones and present an almost even distribution principle of particles. In sections 3 and 4, by mean of the principle we design several Qt and Qsts protocols of arbitrary two- and three-qubit via B7. In section 5 we consider the scheme's security. some conclusions are shown in section 6 1 QT and QSTs of a single-qubit state 1.1 QT of a single-qubit state We assume that Alice possesses an unknown single-qubit state 亚)a=(a0)+81)x where a)2+ B12=1. Alice wants to teleport y) to Bob and shares Br)with him. Initially Alice prepares the combined state of )z and qubits (1, 2, 3, 4, 5, 6 of B7), and then performs a sevell-qubit vOIl Neunann measurenent (VNM)oll these qubits. Since there are four possible 国酗技论文在线 http://www.paper.edu.cn measurement results(MRS), Alice can convey her MRS to Bob via classical channel. Depend- ing on the classical information sent by Alice, Bob can apply an appropriate paulli operator (I, ox, 0y, 02) to retrieve y)x, where I=|0)(0+11)(1,ox=|0)(11+1|1)(0, i0y=|1)0-10)(1,2=10)(0-1)(1 Thus Alice can perfectly communicate y)x with Bob via B7). This protocol is shown in detail as follows 亚x|Br) 1234567 2(a+1)(000业)+10101)+10100业)+1111+) 4三92++助)+192X-81)+(+Q113)+1-)1-18O) where Q2+)and 6+ are mutually orthogonal states of measurement basis. They are described +)=[00)(10100)-100011)+01(01001〉+11110)]123456 +[10)/(00010)-10101)+|11(01000+11111)128456 _)=100)(00010-10101))+01)(101000)+11112123456 士[10(00011)+10100)+|11)(101001)+|1110)2123456 1. 2 QSTS of a single-qubit state 45 x-1-2|345 t lirs 3 1: Different steps of protocol I K 2: Different steps of protocol II Motivated by Ref [18 we now proceed to study five QSTS protocols of v in Eq (5) imong three participants via B7), in other words, Alice wants to communicate y)a with Bob who is designated to reconstruct the original quantum information, under the help of Charlie 1.2.1 Protocol i The following steps can be illustrated the proceeding of proposed QSTs protocol I. The basic idea of this protocol is demonstrated in Fig. 1, where the solid lines connect qubits and 5 国酗技论文在线 http://www.paper.edu.cn a 1: The relation among mrs of Alice and Charlie and Bob's LuOs Alice's result Mri Charlie's result M234:6 U 00011+-0100)+|1111)a|0)+51 10100)-000112-101000)-111a|0)-11 010〉-10101)+101001)+1111)a11)+o) 1)-|01001〉-1 10100)-0001)-101000)-1111a10)+1 10100)-10001)+101000-12a10)-|1) 00010)-10101)-101001)-111)a1)+50 0010)-10101)+101001)+1111a1)-90 0101)+11+1001010101)a10)+月1 101001)+1110-100010)-10101)a0)-1) 0100941100101001+110 01000)+1111-100011)+10100)a|1)-0) 01001+1110-100010)-|10101)a|0)+|1 010021101-10010-10101)a|0)-l 01000)+1111-100011)-|10100)a|1)+|0)a 0100)+1111+10001-10100)a1)-0)-ia the dashed ones connect the measurement between qubits, they are denoted similar meanings in the following figures [SI] Distribution of qubits: Alice, Charlie and Bob possess qubits (1:(2, 3, 4, 5, 6 and (7] respectively. [Si] Alice's job: Alice first performs a Bell state measurement(BS M)on her particle pairs Le, 1. And then she tells her bSm to Bob and Charlie via classical channel [Sf Charlie s job: Charlie carries out a five-qubit vnm on his qubit pairs and tells Bob his MRS via classical channel [Sd] Bob's job: Depending on Alice and Charlie's measurement result, Bob can apply an appropriate local unitary operation(LUO on his qubits Now, let us take an example to illustrate the principle of this QsTs protocol. It is known that Alice may obtain one of four kinds of possible mrs with equal probability. Without loss of generality(WLG), firstly, we assume that Alice performs a BSM p+) and then she publicly announces mrs to Charlie via classical channel. Subsequently, Charlie should perform a five- qubit VNM on his qubits and announce his mrs to bob If Charlie s MR is 10100)-00011+01000)+11111), then Bob's qubit collapses to the state(a0)+B 1))7, It is exactly V)z and Bob needs to do nothing o if Charlie's MR is 10100)-00011-01000)-11111, then Bob's qubit is projected onto 0-B1)7, then Bob can reconstruct vx by performing operation on his qubit 6 国酗技论文在线 http://www.paper.edu.cn Moreover, we can find that this stage requires the transmission of six (two in the SI and four in the Si)bits of classical information(chits) between the parties in total. The relation among Alice's and Charlie's MRS and LUOs with which Bob reconstructs yx is shown in Tab. 1, where M1 and M23456 denote Mrs of Alice and Charlie. The normalization factors are omitted for convenience. In order to avoid unnecessary repetition we leave out the illustrates of some symbols and normalization factors in the following figures and tables 图3: Diffe of protocol III 1.2.2 Protocols ii and iii The basic ideas of protocols II and IIi are demonstrated in Figs. 2 and 3, respectively There also exists four steps for illustrating the proceeding of protocols II and li. These steps are the same as the proposed steps in protocol T except the fist step(sad: distribution of qubits For example, Alice, Charlie and Bob possess qubits (1, 2. 3, 4, 5, 6 and(7 in protocol II, while qubits ( 1, 2, 3,4,5, 6 and (7 belong to Alice, Bob and Charlie in protocol III. We can make the corresponding operation in other steps. Additiona lly, the classica l consume are six and five chits for protocol II and IIl, respectively. The relation among mrS of Alice and Charlie and LUOs with which Bob reconstructs y)2 is shown in Tabs. 2 and 3, respectively 2.3 Comparison and discussion For an arbitrary single-qubit, state, there are another two QSTS protocols via B7,, but, we dont listed them one by one and only simply add to Figs. 4 and 5, which depicts their basic ideas. The proceedings of Figs. 4 and 5 are analogous as Figs. 1 and 2, respectively. Thus Bri can be used for QSTS of an arbitrary single-qubit state perfectly. What's more, it could also be used for QSts of n-qubit G Hz type st n by ghain=a0)on +B 1on. Through further analysis, we can see that the classical consume are different in aforemen tioned three protocols. One requires 6 chits in total both in protocol i and I. while only 5 cits in protocol II. In the view of resource saving protocol Iii may be optimal among three protocols though it utilizes more quantum resources. However, in the realistic scenario, 国酗技论文在线 http://www.paper.edu.cn E 2: The relation among mrs of Alice and Charlie and Bob's LuOs Aice’ s result m12 Charlies result 113456 y〉r 000+01)+10)+11)10100)-1001)+1000)+111a0)+B1) 000+1001)+|10)+111)10100)-10011)-1000}-111)a|0)-B1)a 000+-10012+110)+1110010)-10101)+1001)+11)0a1)+B|0)a 100+101:+110+-111001)-10101)-1012-111041)-0)-27n 0o+1o)-10)-11)10100)-10011)-1000)-11)al0)+1 009+1001)-10)-11)10100)-1001)+1000+111alo)-B|1 000)+1001)-110 |10010)-10101)-1001)-10)a1)+0)am 000+1001)-|10)-11110010)-10101)+1001)+111)a1)-B|0)-10 010)+1011+100+101)1001+110)+0010)-10101)0)+1)7 010)+101)+100)+101)1001)+10-10010+10101)c0)-|1) 010)+10112+100)+101)1000+111-0011+10100)a1)+|0) 010}+1011)+100)+101)1000+111)+1001)-10100)a1)-|0) 010}+1011)-100)-101)1002+110)-0010)+10101)a|0)+1) o10)+10112-100-101)1001)+110+10010-10101)a|0)-1 010)+101)-100-101)1000+1114001-10100a1)+510)a 010)+1011-100)-101)1000+11-0011+10100)a1)-0)-i0g very difficult for protocol Iii to perform Alice's six-qubit VNM. Thus it's not feasible experi mentally. At the same time, for protocol I, it may encounter the same trouble as protocol III Furthermore, in protocol II mrs of Alice and Charlie can be realized through a series of simple operations such as BSM and single-qubit measurement Consequently, it shows that protocol II is the Inost optimal owing to reasonable distri bution of particles. It refers to the number of system qubits excluding receiver's should be even distribution or the quantity difference of qubits is as less as possible between sender and collaborators. We name it as almost even distribution principle of particles 2 QT and QSTS of an arbitrary two-qubit state 2.1 QT of an arbitrary two-qubit state For teleporting an arbitrary two-qubit state xg=(ao00)+a101)+a210)+a311)y 0 via Br), where iso la: 12=1. Alice can obtain a nine-qubit state and then makes a seven-qubit VNM using orthogonal states shown in the first column of Tab. 4, Alice sends her mrs to Bob via classical channel. Subsequently, Bob applies a suitable luo to recover y)ay. Hence, QT of an arbitrary two-qubit state is deterministically implemented. The relation between Alices MRS and the corresponding LUOs is shown in Tab. 4, where Meul2345 and U6 &U represent Alice's MRS and Bob's LUOs on their particles, respectively 国酗技论文在线 http://www.paper.edu.cn k3: The relation among mrs of Alice and Charlie and Bob's LUOs Alice's result M=12345 Charlies result MG 2 r t C1+|101010) a|1)+60) C00001)+|101010) al10)+B|1)1 000001)-1101010) a|1)-B|0)|-iy 00001-101010) 1)-a|0) 000001)+111111 1)+β|0 000U1)+|1111) 000001)-|11111 Lo y 000001〉-111111) c10)+B11)I 010100)+10101a) 1)+0) 010100)+|101010) a|0)-|1) 010100)-1101010 1〉-B|0 010100)-1101010) 0)+B1)1 010100)+|111111) a|1)+B0) 010100)+111111 l)+1)|1 0100)-111) 0 |1)-B0) 010100)-11111) 1 0〉-B1) 1U001)+1000 c|0)+B1) 001010)+|10001) 1 a|1)+30) 001010)-110001) a|0)-B1 01010)-|100001) 001010)+|110100 c|0)+B|1 0O1010)+|110100) B 0)-c1-ia UU1010)-1110100) a|0)-B|1) 001010〉-110100 a|1)+0) 0111110001 al1)+B1) 011111+1100001) c1)-B|0 011111-100001) 0)-Bl1)|a 011111}-|100001) a|1)+B|0 0111112+1110100) a|0)+61 0111112+1110100) a|1)+B|0) 1111)-110100 011111}-|110100) 1)-B|0)〉|-ic 9 国酗技论文在线 http://www.paper.edu.cn Now we proceed to study three QSTS protocols of y xy among three participants via B7) charlo R 4: This is the similar as Fig. 1 k 5: This is the similar as Fig. 2 2.2 QSTS of an arbitrary two-qubit state In order to concise our texts and avoid repetition, we dont list three Qsts protocols one by one, but Figs. 6 and 8 call adequately reflect the basic ideas of theIn. Conbining with our almost even distribution principle of particles we only choose Fig. 6 to illustrate the QSTs protocol of y)zy. Furthermore we could find it is the most optimal. The steps can be described as follows [S Distribution of qubits: Alice, Charlie and Bob possess qubits ( 1, 2, 3, 1, 7 and 15, 61 respectively So Alice's job: Alice first performs a four-qubit VNM on her particles. And then she tells her bsm to bob and charlie via classical channel [Si Charlie's job: Charlie carries out aa three-qubit VNM on his qubit pairs and tells Bob his mrs via classical channel [ Sd Bob's job: Depending on Alice and Charlie's measurement result, Bob can apply an appropriate local unitary operation(LUO) on his qubits The relation among mrs of Alice and Charlie and LUOs with which Bob reconstructs xy is shown in Tab. 5 10 国酗技论文在线 http://www.paper.edu.cn ( 6: Different steps for QSTS of an arbi- K 7: Different steps for QSrS of an arbi- trary two-qubit state via B7) trary three-qubit state via B7) 叶出」 3 8: Different steps for another two QSTS protocols of an arbitrary two-qubit state via B7 3 Qt and Qsts of an arbitrary three-qubit state 3.1 QT of an arbitrary three-qubit state For teleporting an arbitrary three-qubit state 业Dy2-(a000+a1001+a2010+011+a410+a5101+a110+a7111)2(11) via B7), where 2i-olaiI2=l. Alice can obtain a ten-qubit state and then makes a seven-qubit VNM, then Alice sends her Mrs to Bob via classical channel. Subsequently, Bob applies an suitable luo to recover y)ry2 Let us take an example to demonstrate the principle of QT WlG, we assume Alice obtains the state 0011111+1011011-0111101-1111001 and then she sends her mrS to Bob via four chits. Bob's qubits collapse to the state uol011)+a11ll-u21000)-a3 100)-W4001)

-
2019-08-20
560KB
论文研究-Multi-Step Quantum secure direct communication using multi-particle Green-Horne-Zeilinger state.pdf
2019-08-16基于多粒子GHZ态的多步量子直接安全通信,王川,邓富国,本论文提出了一个基于多粒子GHZ态的多步量子直接安全通讯方案。在本方案中,GHZ态的粒子通过多步过程从Alice发送到Bob. 它具有高效率��
10.6MB
Quantum Computation and Quantum Information
2017-11-02One of the most cited books in physics of all time, Quantum Computation and Quantum Information rema
202KB
论文研究-controlled quantum secure direct communication with authentication based on four particle cluster state.pdf
2019-08-15基于四粒子簇态的带认证的受控量子安全直接通信,赵喆子健,陈秀波,本文提出了新的基于四粒子簇态带认证的受控量子安全直接通信协议。通信双方通过事先共享的身份串来验证对方的身份以防止窃听者伪
270KB
论文研究-Quantum Particle swarm optimization based network Intrusion feature selection and Detection.pdf
2019-08-15基于量子粒子群优化的网络入侵特征选择与检测,张红梅,高海华,由于过滤式方法没有考虑特征间的相关性问题,本文提出一种基于量子粒子群与支持向量机结合的入侵检测特征选择打包算法。采用量子
519.87MB
isscc 2019 all
2020-06-29ISSCC2019 - Digest ISSCC2019论文 ISSCC2019 - DemoSessions.pdf SC1 - Introduction to Phased-Array Techn
204KB
论文研究-Quantum PLC在水电厂现地控制层中的应用 .pdf
2019-08-15Quantum PLC在水电厂现地控制层中的应用,李岚,张国钧,随着计算机技术和电子技术的不断发展,水电厂监控系统也朝着性能更全面,运行更加稳定可靠的方向进步。施奈德PLC以其较好的性价比
402KB
论文研究-A simple wet electrochemical lift-off method of GaN epitaxial film with damage-free of multi-quantum wells.pdf
2019-08-17用电化学刻蚀的方法来剥离GaN量子阱外延薄膜,刘后培,梁红伟,在无损伤的量子阱(MQWs)的情况下,通过侧向选择性电化学刻蚀的简易方法实现了从蓝宝石衬底上剥离氮化镓(GaN)外延。利用场发射扫描
253KB
论文研究-The general theory of three-party quantum secret sharing protocols under phase-damping channels.pdf
2019-08-16相位阻尼信道下三方QSS协议的一般性理论分析,宋婷婷,秦素娟,本文讨论了噪声信道下三方QSS协议的一般性理论。对于初始三粒子三体纯纠缠态,某一个粒子在噪声信道传输后,系统三粒子态变为混合态�
65.36MB
Cohen-Tannoudji Quantum Mechanics, Vol 2
2018-07-01Beginning students of quantum mechanics frequently experience difficulties separating essential unde
6.38MB
Scully, Marlan O._ Zubairy, Muhammad Suhail - Quantum optics.pdf
2019-05-25Scully, Marlan O. Zubairy, Muhammad Suhail = Quantum Optics.
745KB
Learning the quantum algorithm for state overlap.pdf
2020-05-05Learning the quantum algorithm for state overlap.pdf文件
1.30MB
ExtremeLearningMachine资源共享-Multi-elitist-immune-clonal-quantum-clustering-algorithm_2013_Neurocomputing.pdf
2019-08-12ExtremeLearningMachine资源共享-Multi-elitist-immune-clonal-quantum-clustering-algorithm_2013_Neurocomput
411KB
论文研究-Flexible quantum private queries based on quantum key distribution.pdf
2019-08-18基于量子密钥分发的灵活的保密查询方案,高飞,刘斌,本文提出一种灵活的基于量子密钥分发的保密查询协议。与Jakobi等人的协议类似,本文的协议也能容忍损耗,贴近于实际且可以抵抗量子存�
371KB
论文研究-A Novel Watermark Strategy For Quantum Images.pdf
2019-08-18一种新型的量子水印策略,张伟伟,高飞,随着量子计算机和量子网络的发展,量子数据的安全越来越重要。量子水印是一种可以将包括身份信息等的不可见信号嵌入到包括音频,视�
403KB
论文研究-Two Quantum Direct Communication Protocols Based on Quantum Search Algorithm.pdf
2019-08-19两个基于Grover搜索算法的量子直接通信协议,徐淑奖,陈秀波,基于二粒子的Grover搜索算法的特性,提出了两个量子直接通信协议,包括一个确定性安全量子通信协议和一个量子安全直接通信协议。借助�
8.60MB
Mark Fox - Quantum optics_ an introduction.pdf
2019-05-25Mark Fox, Quantum Optics an intorduction, 经典的量子光学。
225KB
论文研究-A NOVEL QUANTUM STEGANOGRAPHY PROTOCOL BASED ON PROBABILITY MEASUREMENTS.pdf
2019-08-24一种新颖的基于概率测量的量子隐写协议,魏战红,陈秀波,量子隐写一门隐藏在不安全的量子信道中传递秘密信息的通信过程的艺术。本文提出了一种基于概率测量的量子隐写协议,协议中可以通��
228KB
论文研究-Advanced Quantum Evolutionary Algorithm for QoS Multicast Routing optimization in Electric Power Communication Network.pdf
2019-08-16电力通信网络中QoS多播路由优化改进量子进化算法,宦海,黄敏,本论文研究了电力通信系统的要求,并对电力系统中的流量进行了分类。为了满足电力通信网络中组播流量对带宽、延迟、丢包等的要求
10.86MB
Practical Quantum Computing for Developers
2019-01-01Practical Quantum Computing for Developers: Programming Quantum Rigs in the Cloud using Python, Quan
10.44MB
Modicon Quantum 自动化平台选型手册(Unity,Concept,Proworx)-2004.7-EN.pdf
2019-10-30Modicon Quantum 自动化平台选型手册(Unity,Concept,Proworx)-2004.7-ENpdf,Modicon Quantum 自动化平台选型手册(Unity,Concep
3.13MB
Quantum Computation and Logic
2019-01-11Quantum Computation and Logic: How Quantum Computers Have Inspired Logical Investigations (Trends in
806KB
论文研究 - 在5-Qubit IBM Quantum计算机上进行的五项实验测试
2020-05-27IBM允许在云上开放访问的5量子位量子计算机原型允许在量子处理器上实施真实的实验。 我们介绍了在这些计算机上进行的五个实验测试中获得的结果:密集编码,量子傅立叶变换,贝尔不等式,梅尔明不等式(最高达n
356KB
Antiresonance in multi-quantum-dot system and its application as a spin filter
2020-03-12源于多量子点体系的反共振现象及其应用—自旋过滤器,公卫江,郑以松,本文主要通过非平衡态格林函数技巧及利用运动方程方法,得到了在考虑量子点中电子间Coulomb相互作用的情况下多量子点体系的线性电�
455KB
论文研究-Realizing Left-handed Medium in Optical Frequency Band Using Quantum Coherence.pdf
2019-08-19用量子相干的方法实现光频左手介质,康崇,樊黎明,在自然界中, 介质的介电常数 和磁导率 是描述物质基本电磁性质的两个重要参数, 这两个参数决定着电磁波的传播特性。左手介质(Left-h
866KB
论文研究 - IBM Quantum Simulator上两个Quantum最近邻居分类器的比较
2020-05-29如今,计算机被用来将数据存储在内存中,然后对其进行处理。 在我们的大数据时代,仅由于数据量的快速增长,我们就面临着存储和处理数据的挑战。 量子计算为这两个突出的问题提供了机械而美观的解决方案。 通过精
389KB
论文研究-A Novel Immune Clonal Algorithm and its Application.pdf
2019-08-20一种新颖的免疫克隆算法及其应用研究,李阳阳,焦李成,本文提出了一种基于量子免疫克隆计算的CDMA多用户检测方法。针对具体的问题,设计了一种简单易于实现的量子更新算子,实验结果表��
461KB
论文研究-Optical Waveguide Characterization of MgZnO/ZnO Single Quantum Well.pdf
2019-08-16MgZnO/ZnO单量子阱结构的光波导效应,边旭明,张景文,为了精确的设计建模MgZnO/ZnO异质结光电设备,对ZnO及其合金的基本光电特性有个精确的认识是很重要的。目前, MgZnO/ZnO量子阱
839KB
2-Quantum Algorithms for Linear Algebra and Machine.pdf
2020-08-03量子计算,量子线性代数算法,量子计算,量子线性代数算法,量子计算,量子线性代数算法,量子计算,量子线性代数算法,量子计算,量子线性代数算法,量子计算,量子线性代数算法,量子计算,量子线性代数算法,量子
220KB
Quantum Information Splitting of Arbitrary Three-qubit State by Using Five-qubit Cluster state and GHZ-state
2021-02-10Quantum Information Splitting of Arbitrary Three-qubit State by Using Five-qubit Cluster state and G
136KB
Quantum Information Splitting of a Two-qubit Bell State Using a Five-qubit Entangled State
2021-02-06Quantum Information Splitting of a Two-qubit Bell State Using a Five-qubit Entangled State
-
下载
《LoadRunner没有告诉你的》之一
《LoadRunner没有告诉你的》之一
-
博客
「照片方法」甘肃公务员考试报名照片要求在线处理照片教程
「照片方法」甘肃公务员考试报名照片要求在线处理照片教程
-
学院
MySQL 事务和锁
MySQL 事务和锁
-
下载
S7-200 SMART.7z
S7-200 SMART.7z
-
学院
项目管理工具与方法
项目管理工具与方法
-
博客
Github无法访问解决办法
Github无法访问解决办法
-
学院
Galera 高可用 MySQL 集群(PXC v5.6 + Ngin
Galera 高可用 MySQL 集群(PXC v5.6 + Ngin
-
博客
Mysql5.5版本中日期默认为CURRENT_TIMESTAMP报错
Mysql5.5版本中日期默认为CURRENT_TIMESTAMP报错
-
学院
用微服务spring cloud架构打造物联网云平台
用微服务spring cloud架构打造物联网云平台
-
博客
基于PHP的简单微博系统
基于PHP的简单微博系统
-
博客
leetcode 395 双指针X 分治✔
leetcode 395 双指针X 分治✔
-
下载
快手抢红包5.8.rar
快手抢红包5.8.rar
-
博客
LeetCode395. 至少有K个重复字符的最长子串
LeetCode395. 至少有K个重复字符的最长子串
-
下载
窗体应用程序的常用控件.zip
窗体应用程序的常用控件.zip
-
下载
Gocad2013.rar
Gocad2013.rar
-
博客
Oracle如何创建索引、删除索引、查询索引
Oracle如何创建索引、删除索引、查询索引
-
下载
DragDropTwoRecyclerViews.zip
DragDropTwoRecyclerViews.zip
-
学院
Docker从入门到精通
Docker从入门到精通
-
下载
用Subversion构建版本控制环境
用Subversion构建版本控制环境
-
下载
库存管理项目.zip
库存管理项目.zip
-
学院
华为1+X认证——网络系统建设与运维(初级)
华为1+X认证——网络系统建设与运维(初级)
-
学院
C/C++反汇编解密
C/C++反汇编解密
-
下载
凉开水2.2.1.exe
凉开水2.2.1.exe
-
博客
高并发学生选课系统设计
高并发学生选课系统设计
-
博客
宏电5G产品阵营再添强将!携手广和通重磅发布5G DTU!
宏电5G产品阵营再添强将!携手广和通重磅发布5G DTU!
-
学院
物联网基础篇:快速玩转MQTT
物联网基础篇:快速玩转MQTT
-
博客
Qt 判断一个IPV4 地址单播/组播/广播地址
Qt 判断一个IPV4 地址单播/组播/广播地址
-
学院
龙芯生态应用开发基础:C语言精要
龙芯生态应用开发基础:C语言精要
-
下载
netty-002.rar
netty-002.rar
-
学院
华为1+X——网络系统建设与运维(高级)
华为1+X——网络系统建设与运维(高级)