CN114024797A - Method for constructing urban intelligent traffic network - Google Patents

Method for constructing urban intelligent traffic network Download PDF

Info

Publication number
CN114024797A
CN114024797A CN202111372891.XA CN202111372891A CN114024797A CN 114024797 A CN114024797 A CN 114024797A CN 202111372891 A CN202111372891 A CN 202111372891A CN 114024797 A CN114024797 A CN 114024797A
Authority
CN
China
Prior art keywords
traffic
network
intelligent
information
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111372891.XA
Other languages
Chinese (zh)
Inventor
刘智和
刘智涵
刘文祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202111372891.XA priority Critical patent/CN114024797A/en
Publication of CN114024797A publication Critical patent/CN114024797A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Abstract

The task of the invention is to realize interconnection, intercommunication and interoperation of various networks by adopting a new network interconnection technology and utilizing the Internet to the communication controllers or special networks of various vehicles (including buses, trucks, buses, cars, and the like) controlled by an urban intelligent traffic network, so as to establish a special network of the urban intelligent traffic network. The basic theory of the invention is "physical official science". Two laws of essence of the particles establish the microscopic physics that replace quantum theory; deducing the axiom of quantum mechanics, and eliminating quantum paradox. Two fundamental laws of an object establish macroscopic physics instead of classical physics (including relativity); the principle of classical mechanics is deduced, and paradox is rejected. Particle entry and exit theory uniformly clarifies four forces.

Description

Method for constructing urban intelligent traffic network
The invention relates to urban intelligent traffic networks, information technology, internet, artificial intelligence and the like.
The urban intelligent traffic network is a mark for measuring the urban civilization progress and is a life pulse of urban life. With the rapid development of the social economy, the urbanization process is accelerated, the living standard of people is continuously improved, the urban traffic demand is rapidly increased, the traffic problem is just a great problem which disturbs the urban development, and the traffic jam becomes a bottleneck which restricts the urban economy and the social development due to the problems of time waste, operation cost rise, traffic accidents, air pollution, noise pollution and the like brought by the traffic jam. Therefore, how to adopt the internet technology to avoid and reduce the influence caused by traffic jam and keep the characteristics of high speed, safety and comfort of road traffic becomes a problem which is urgently needed to be solved by the traffic department in China.
With the rapid development of cities, the quantity of motor vehicles kept is gradually enlarged, but the development of relative road infrastructure and the like is relatively slow, and the expansion of roads cannot be continued indefinitely due to the influence of regions and the like. When the law states that: the construction of the new road reduces the travel time, but simultaneously attracts the traffic transfer of other roads and other modes, and finally restores the original congestion level after a period of time. The causes of urban traffic congestion include two aspects: firstly, the traffic flow is suddenly increased to form a traffic bottleneck, which is often generated in holiday peak periods of working and leaving work; and secondly, traffic congestion caused by reduction of traffic capacity of roads or excessive traffic capacity is attracted due to road emergencies, such as traffic accidents or events like major activities.
The most direct harm caused by urban traffic jam is that the travel traffic delay is increased, the driving speed is reduced, and therefore time loss and fuel cost increase are caused. The low-speed running of the automobile increases the exhaust emission and the environmental pollution. In addition, traffic accidents are increased due to urban traffic jam, and the occurrence of the traffic accidents can cause the traffic jam, so that vicious circle is caused, great influence is brought to normal work and life of people, and the traffic jam gradually becomes a bottleneck problem of urban development.
In order to solve the urban traffic jam condition, the basic approaches are two: firstly, urban traffic demand is controlled, and traffic infrastructure construction is accelerated; secondly, the urban traffic management is enhanced.
Cities in China have the characteristics of large population, high density, low road network density, serious mixed traffic and the like. Therefore, it is determined that the current situation of urban traffic jam in China needs to be combined to make a practical jam dredging mode in the aspect of urban traffic jam management in China.
The internet is characterized by being anytime and anywhere, convenient and easy to use, instant interaction and the like. These provide very good technical support for interaction and sharing of intelligent traffic control, all-weather cross-regional and low-cost processing of urban intelligent traffic control.
Security is a significant problem for the internet. Each user router connected to the internet must take security measures such as firewalls to ensure the security of each site. But each firewall must be open to the provider in order to access the relevant equipment, which in itself would be a security risk. When the network size is large, managing firewalls becomes difficult.
The invention relates to a method for constructing an urban intelligent traffic network, which aims to construct a private network of the urban intelligent traffic network by adopting a new network interconnection technology and utilizing the Internet to realize interconnection, intercommunication and interoperation of various networks for a traffic controller or a special network of various vehicles (including buses, trucks, buses, cars and the like) controlled by a certain urban intelligent traffic network.
The basic theory of the invention is 'axiom physics'. Where the inertial system, mode, true static system, float, quantum system, spin, etc. are defined. Liu Ching discovered two new laws of physics of particle nature that address the conservation of the average of the drift characteristics, energy or momentum or angular momentum of a particle. The two laws create new microcosmic physics, derive the axiom of quantum mechanics, and remove the paradox of quantum theory. Liu Zhi and two new physical laws for discovering the nature of an object reveal the laws of modality and attraction. The new macroscopic physics constructed by the two laws deduces the principle of classical mechanics and eliminates the paradox. The theory of particle entry and exit of Liuwenxiang unifies the four sources of force.
1. Introduction to the design reside in
The physical quantities are time, length and force. The definitions of other concepts herein are unchanged except for redefined concepts. Classical mass is divided into three concepts: modality, obstacle, and volume. The true static system and the drift are the meanings of absolute space-time and medium-free normalized matter waves. The two laws of particle nature derive the equation of motion of particles in the system, and quantum, wave-particle duality, hidden variable, wave function collapse and the like are abandoned. Two laws of the nature of the object predict the speed of the sun in a true static system, and the ether transformation, the Lorentz transformation, the equivalent principle, the space-time bending and the like are abandoned. The theory of particle entry and exit derives local norm transformation, etc. The axiomatic physics built by the compact definitions and laws are complete and self consistent.
2. New definition of physical concepts and new physical concepts
2.1 definition: a system which runs with even time and does static or uniform linear motion relative to a cosmic microwave background is called an inertial system. Defining: the rate of change dF/da of the force F on the mass point of the object to the acceleration a at time t in the inertial system is called the mode m of the object.
Namely: m (t) ═ dF (t)/da (t) (1)
Defining: the rate of change dp (t)/dv (t) of the momentum P of the object in the inertial system to its velocity V is called the obstacle b (t) of the object.
Defining: the amount of material in the object is referred to as the amount of material in the object. Microscopic objects, called particles.
Defining: two-object barriers create and annihilate intangible particles called attractors. Attractors interact with objects, called attraction or attraction.
Defining: two objects with the same distance are respectively static in each inertial system; the inertial system in which the attractive force is the smallest is called the true static system.
Defining: the obstacle of the object in the true static system is called the attraction load of the object. The attraction vector in the direction of the attraction force is called an attraction vector.
Defining: the attraction vector of the connecting line direction of two objects with unit attraction load when the two objects leave the unit length is called as an attraction constant.
Defining: a right-handed rectangular coordinate system formed by taking a certain time in the inertial system as zero time, the particle mass point at that time as the origin, the velocity direction of the particle mass point as the Z axis, and the X axis and the Y axis is referred to as a particle coordinate system. The vector with the starting point as the origin and the end point as the point r is called radial vector r.
Defining: the complex plane formed by a point r in the coordinate system of the particle and parallel to the real and imaginary axes of the X and Y axes, respectively, is referred to as the sagittal plane of the point r of the particle.
Defining: the specific physical vector having the origin at the starting point and the end point Aexp (i θ) in the sagittal plane of the particle point r is referred to as the jitter S of the particle.
S(r,t)=A(r,t)exp[iθ(r,t)] (2)
Where the real function theta is called the phase of the particle. The real function A ≠ 0, which is called the amplitude of the particle.
Defining: of point rPartial derivative of particle phase theta with respect to time
Figure BSA0000258289830000021
The angular frequency ω (r, t) of the particle at time t, referred to as point r.
Defining: let Δ r → 0, the partial derivative of the particle phase θ to the sagittal vector with a direction from the end of the jitter S (r, t) of the particle to the end of S (r + Δ r, t) at the point r
Figure BSA0000258289830000022
The vector of (d) is referred to as the number of phases k (r, t) of the particle at point r at time t.
Defining: the finite domain of the jitter of the particles is called the domain omega of the particle jitter. Volume differential: d τ dr dx dy dz.
Defining: dithering S of the particlesnOr sum of their weights Σn=1 kCn(r,t)SnLength of, called scale of single or multiple particles
Figure BSA0000258289830000025
Figure BSA0000258289830000023
Or
Figure BSA0000258289830000024
Defining: when the angular frequency ω and the phase number k are constant, the particle jitter of the phase [ k · r- ω t ± Φ π/2] is called the harmonic of the particle.
Ξ(r,t)=A(r,t)exp[i(k·r-ωt±Фπ/2)] (4)
Where Φ is 0, 1, 2, 3, or 4, the behavior is referred to as a particle. The + -phi pi/2 is called the initial phase of the particle. And pi is the circumferential ratio.
Defining: harmonic xi (r, t) of a particle divided by its single particle scale
Figure BSA0000258289830000026
Referred to as the drift ψ (r, t) of the particle. The floating domain is Ω.
From (3) toTo get, the scale of the single particles of harmonic:
Figure BSA0000258289830000031
from (4):
Figure BSA0000258289830000032
wherein the floating amplitude is: η (r, t) ═ a (r, t)/| [. clar | ]ΩΞ*(r,t)Ξ(r,t)dτ]1/2| (6)
Defining: hidden particles with r points in the particle drift appear in probability density and are called hidden particles of the particles. The bleaching of hidden particles is called sub-bleaching.
Defining: the time t, the distance of the phase change 2 pi is called the drift length. The time for which the drift phase at point r changes by 2 pi is called the period.
Defining: the end point of the float or sub-float of the particle with the phase theta forms a curved surface called a float-plane theta. The foremost floating-plane is called as pre-floating.
Defining: the rate of change dr/dt of the radial vector r (θ, t) with respect to time in the drift plane θ is referred to as the particle drift velocity v (θ, t) of the drift plane θ.
Defining: the drift velocity of photons in the inertial system is called the speed of light C. The ratio of the speed V of the object to the speed of light is called the speed ratio λ of the object.
Defining: the rate of change of the total number of particles of a substance in the eustatic system, N (t), dN/dt, divided by the total number of particles is called the decay constant, μ.
Defining: the ratio of the body spring force F to its deformation x in the opposite direction is called the stiffness constant k (instead of hooke's law F ═ k · x).
Defining: the ratio of the voltage across the linear circuit to its current is called the resistance.
2.2 definition: the angular frequency of photon unit energy generation is called the float-particle constant B. I.e. B-angular frequency/energy-2 pi/planck constant.
Defining: the constant angular momentum vector [ (phi/2 +1) phi/2) of the particle]1/2and/B, referred to as particle spin σ. Φ is a particle property.
Defining: particle coordinate system Z axis and spin angle (radian) divided by pi scalar (-phi/2 + n)S) B, called particle norm σZ
Wherein: n isSEither 0 or 1 … or Φ, called the magnetic number of the particle. In the positive direction of the Z axis, the direction is the same as the projection direction of the spin of the particle on the Z axis (norm σ)ZPositive values) or vice versa (σ)ZNegative), it is called a dextrorotatory particle or a levorotatory particle.
Defining: float-particle constant B, combined quantity of momentum, energy and norm of particle B [ P.r-Et + π σZ]Referred to as the potential head of the particle.
Defining: in system psinThe positive square root of the amount of drift, called psinRoot of Chinese Aralia Rn. The positive square root of total floating amount is called floating total root Rd
Defining: psinRoot of Chinese Aralia Rn(r, t) times the float, called the float ψnThe portion of (A): rnψn≡Rn(r,t)ψn(r,t)。
Defining: various float psi in the systemnThe shares of (c) are added, called the share Φ. Float set of quota union { psinIs called the floating set of the system.
Ф(r,t)=∑n=1 kRn(r,t)ψn(r, t). Where n is 1, 2 …, k (may be infinity) (7)
Defining: scale of multiparticulates of Biphi divided by it
Figure BSA0000258289830000038
Referred to as unit portion
Figure BSA0000258289830000033
Figure BSA0000258289830000034
Scale
Figure BSA0000258289830000035
Hereinafter, W represents any physical quantity excluding time. Stipulating: wn-1<Wn
Defining: any physical quantity W in the system is in a limited interval [ W1,Wj]Within. Divide it into j average intervals (W)n-1,Wn]:n=1,…j,W0=W1-(Wj-W1) /(j-1). When j → ∞, (W)n-1,Wn]Physical quantity W referred to as discrete or continuousn
Defining: time t in the inertial system, discrete or continuous physical quantity WnParticles of (2), W referred to as time tn-particles.
Defining: w in the systemnThe positive square root of the number of particles (or total number of particles), called WnRoot of particle Rwn(or particle Total root R)w)。Wn-particle root RwnDivided by the total root R of the particlewIs called WnQuota of particles pwn≡ρ(Wn,t)=Rwn(Wn,t)/Rw
Defining: wn-particle quota ρwnMultiplied by its drift psinIs called WnDynamic ξ of particlesn≡ξ(Wn,t)=ρ(Wn,t)ψn
Defining: the property Φ is an odd number of particles, called real (fermi). The property Φ is an even number of particles and is called a null (boson).
Defining: transition WmThe number of particles AmIs +/-Am 1/2(AmSymbol of-1) hacamIs called Wm-a drop of a particle.
Defining: transition WmThe number of particles AmIs (A)m+1)1/2(AmSymbol of +1) haca+ mIs called Wm-the ascender of the particle.
Defining: and the real or empty seeds with the same name and spin are called as the same-name real seeds or the same-name empty seeds.
Defining: the drift psi acting on the system particles is equal to its physical value WnSymbol multiplied by its drift
Figure BSA0000258289830000036
Referred to as physical operator of the physical quantity W.
Figure BSA0000258289830000037
Defining: two physical quantities of a single term in the particle potential head are called conjugated physical quantities. Their physical operators are called conjugate physical operators.
Defining: the drift of the particle whose initial phase ± Φ π/2 becomes zero is called the simple drift ψ' (r, t) of the particle.
2.3 definition: in the N-dimensional orthogonal complex coordinate system, the elements are psimFloating rotation matrix Lm]N×NThe group (2) is called floating group SU (N).
Defining: set of matrices [ L ] capable of linearly forming minimum number of elements in SU (N)m/N]N×NCalled fundamental matrix [ tau ]m]N×N
N is 1 or 2 or 3. m is 1, 2, …, y. Since SU (N) has an identity matrix. So the number y of basic matrixes is Max (N)2-1,1)。
Defining: structural constant lambdaabcComprises the following steps: the subscripts are the same in sign and have a value of zero; subscripts are arranged cyclically, with a value of 1; otherwise, the value is-1.
Defining: satisfy the relationship of reciprocal [ tau ]m a,τm b]=iλabcτm cOf the basic matrix τmReferred to as a generator. a. b and c are 1 and … y.
Defining: the phenomenon of two particles generating and annihilating vacancies is called particle ingress and egress. The theory of particle entry and exit is called the study of the rule of particle entry and exit.
Defining: during the process of particle entry and exit, vacancies are interactions of glue or photons or weak ions, which are called strong or electric or weak interactions.
Defining: the particles have a colloid, photon or weak particle occurrence probability density of 0.219, fine structure constant or 4.38 × 10-5Is called the physical quantity of the positive square root of (1), called the particle heavy load gSG of electric loadEOr weak load gW. Strong, electric or weak against particlesLoading is-gS、-gEOr-gW
Defining: the forces generated by the G and G carriers of the two particles creating and annihilating the corresponding vacancies are referred to as the carrier forces F (r, t) of the particles.
Defining: the load force of the particle load G per unit load on the dots r is called the load strength of the load G: ε (r, t) ═ F (r, t)/g.
Defining: the load G moves the load G from infinity (potential equal to 0) to a point r to work a negative value of H, called the load potential-H (r, t) of G to G.
Defining: the potential energy of the particle carried G on the point r, which is 1/G of the unit carried potential-H (r, t)/G, is called the scalar potential-A (r, t) of the carried G.
Defining: the G-loading force of the moving G-loading versus the velocity V is the product of gV and γ cross. γ is called the loading intensity of G. F ═ gV × γ.
Defining: at time t, the momentum created by the intensity of the particle-borne G on the moving G is called the G-to-G latent momentum PL(r,t)。
Defining: latent momentum P of the moving load of the point of action r of the moving load GL(r, t)/G, referred to as G, the vector potential Q (r, t) at point r.
Defining: drift phase theta in systemmDivided by the corresponding load gmMatrix of [ theta ]m/gm]Multiplying by the generator matrix [ tau ]m]Called vorticity
Figure BSA0000258289830000041
Matrix array
Figure BSA0000258289830000042
Defining: vorticity of system multiplied by corresponding phase matrix
Figure BSA0000258289830000043
Called the result of the System [ Qm]。
Matrix array
Figure BSA0000258289830000044
3. Two laws of particle nature establish the microscopic physics that supersede quantum theory
Scale of harmonic tones (i.e. medialess plane waves) of particles
Figure BSA0000258289830000045
Is a constant value, obtained from equation (8):
Figure BSA0000258289830000046
theorem 1: the harmonics of the physical operator on the particles in the system are equal to their physical quantities times their harmonics.
Inference 1: the physical value of a particle in the system is the eigenvalue of its harmonic equation.
Let the harmonic sounds of two particles be ximXi and xin. They are respectively scaled as
Figure BSA0000258289830000047
And
Figure BSA0000258289830000048
their floats are respectively psimAnd psin
From (5) and (6):
Figure BSA0000258289830000049
and
Figure BSA00002582898300000410
and is obtained from the formula (11):
Figure BSA00002582898300000411
therefore, it is not only easy to use
Figure BSA00002582898300000412
From (11):
Figure BSA00002582898300000413
due to psi in the systemnRoot of bleaching RnIs a real constant. From (7) and (8), the same can be obtained:
Figure BSA00002582898300000414
Figure BSA0000258289830000051
inference 2: the physical operator that acts on the quantum union (instead of the wave function) is an operator that is self-conjugate (i.e., hermitian) and linear.
Assume that the physical values of the two particles are respectively
Figure BSA0000258289830000059
And
Figure BSA00002582898300000510
their harmonic sounds are ximXi and xin
From the formula (11):
Figure BSA0000258289830000052
from the formulae (11) and (12):
Figure BSA0000258289830000053
from (14) and (15):
Figure BSA0000258289830000054
from (3), (4), (5), (6) and (16):
when in use
Figure BSA0000258289830000055
ΩΞ*mΞndτ=∫ΩAm 2(r, t) d τ. Otherwise it is zero. (17)
When in use
Figure BSA0000258289830000056
Ωψ*m(r,t)ψn(r, t) d τ is 1. Otherwise it is zero. (18)
Theorem on bleaching Properties 1: the drift (instead of the normalized simple harmonic) of the definition domain, which is the coordinate axes [ -L/2, L/2] of the particle coordinate system, respectively, is:
ψ(r,t)=L-3/2exp(i[k·r-ωt±Фπ/2]) (19)
from equations (3), (7) and (18), the scale of the portion union is:
Figure BSA00002582898300000511
scale theorem: in any system, the square of the scale of any one of the couples is the total number R of floats (or particles) therein2 d(or R)2 w)。
From the definition of the unit share couple (instead of the normalized wave function) and equation (20), we obtain:
Figure BSA0000258289830000057
from the probabilistic significance of particle events and their mode of action, one can derive:
theorem of probability sum: the probability that a particle event occurs in each of the equivalent ways is the square of the absolute value of the sum of the drifts of the particles for each way.
Theorem of probability product: the probability that a particle event occurs in a series of successive steps is the square of the absolute value of the product of the drifts of the particles at each step.
3.1 first law of particle identity: the floating amplitude of a particle is the positive square root of its position probability density and the floating phase is its potential head.
Namely: amplitude η (r, t) ═ P1/2(r, t) | > 0; phase (k · r- ω t ± Φ pi/2) ═ B (P ·)r-Et+σZπ)。
Where P (r, t) is the probability density of the particle position. B is the float-granule constant.
As shown in the formula (5), the energy-saving magnetic material has a momentum P, an energy E and a norm sigmaZThe drift of the particles (instead of the third component of the spin) is:
ψ(r,t)=η(r,t)exp{i[k·r-ωt±Фπ/2]}==|P1/2(r,t)|exp{iB[P·r-Et+πσZ]} (22)
due to the floating domain there are infinite locations r and times t. Therefore, the first and second electrodes are formed on the substrate,
theorem on bleaching Properties 2: ω ═ BE and k ═ BP and ± Φ ═ 2B σZ (23)
The planck's hypothesis and the de broglie's formula are both special cases of the property theorem 2 of drift.
The angular frequency ω and the number of phases k of the drift of the particles are constant with respect to any inertial system. Defined from the drift velocity (alternative wave velocity), we get:
bleaching speed:
Figure BSA0000258289830000058
and (3) determining the bleaching speed: the drift velocity of a particle is constant with respect to any inertial system, independent of its drift phase.
According to the definition of the drift and the first law of particle nature, it is possible to obtain:
theorem on bleaching Properties 3: the drift is a periodic vector with no mass, no mode, no obstacle, no energy, no momentum, and square integrable.
The particle and its hidden particle have the same physical quantity (including the probability density of their location). Therefore, from the definition of the sub-float:
the theory of son bleaching: the amplitude, angular frequency, number of phases and initial phase of the particle's sub-drift are the same as the particle's drift.
According to the definition of property theorem 3, sub-bleaching theorem and pre-bleaching, it can be obtained that:
float-noodle theorem: the envelope of each sub-float of the upper particles before the float is a new float-surface; these drifts are superimposed coherently (huygens-fresnel principle).
According to exp [ +/- (Φ/2) π ] ═ exp [ +/- (Φ/2) (π +4 π/Φ) ] and (22),
the floating symmetry theorem: the rotation radian of the float rotating around the origin of the particle coordinate system is 4 pi divided by the character phi; the drift is unchanged.
From (22):
|ψ(r,t)|2=ψ*(r,t)ψ(r,t)=η2(r,t)=P(r,t) (24)
theorem on bleaching Properties 4: the square of the floating amplitude of a particle is the probability density that it occurs at each point (alternative wave function statistical interpretation).
Multi-slit interference experiment: the sub-drifts generated by each particle at each slit interfere with each other after passing through the slit. The particles randomly pass through a slit. If a viewer is added next to the slot. The particles passing through the slit are subjected to the action of the particles emitted from the observation instrument, and drift changes, so that there is no drift interference.
Optical retardation selection experiment: two sub-floats generated by each photon in the device respectively propagate along two paths. The photon can only move along one of the paths. If the two sub-floats meet and interfere with each other, there is an interference pattern. Otherwise they do not interfere with the image.
The particles make a position change jumping motion. It has no continuous speed of motion. This jump speed is called the transition speed, abbreviated as particle speed.
The line segment formed by the space-time point of the maximum probability density of the particle position is called the orbit of the particle. The drift of electrons replaces the electron cloud.
The section with the largest floating amplitude is called floating belly. The section with zero floating amplitude is called floating joint. The floating node is not moved, called as the stationary floating.
Atomic theorem: electron drift around the nucleus interacts to form various atoms.
By using induction method, it can be obtained from the first law of particle nature, the theorem of bleaching nature 3, (7) and (18),
share association theorem 1: a unit quantum union is a bounded, single-valued, continuous, square-integrable complex number (otherwise its scale is meaningless).
From the definition of the dynamics of the W-particles (i.e., representation in quantum theory), the scaling theorem and the equation (18), one can obtain:
|ξ(Wn,t)|2=|ρwnψn|2=|Rwnψn/Rw|2=R2 wn/R2 w (25)
bleaching nature theorem 5: wnThe absolute value squared of the dynamics of the particle, W in the systemn-the ratio of the number of particles to the total number of particles.
Drift property theorem 6 (phase symmetry theorem): the drift phase of the particles in the system does not change WnThe probability density of the occurrence of particles.
From formulas (18) and (21):
Figure BSA0000258289830000061
inference 4 (drift probability theorem): drift phase variation in the system unchanged by psinRatio of drift number to total drift number (i.e., psi)nProbability density).
From (21):
Figure BSA0000258289830000062
suppose the sum of the dynamics of the particles in the system is: ξ (W, t) ≡ Σn=1 kξ(Wn,t)=∑n=1 kρ(Wn,t)ψn(r,t)
Let W and V be a pair of conjugated physical quantities. The following can be obtained:
Figure BSA0000258289830000063
Figure BSA0000258289830000064
theorem of bleaching Properties 7: unit share in system
Figure BSA0000258289830000065
And the particle dynamics sum ξ (W), which are Fourier transforms each other.
Is provided with CjIs an arbitrary complex constant. At time t, WjnPhi of particlesjnRoot of the Chinese brown drift is Rjn
From equation (7), the j-th share in the system is combined as:
Фj=∑n=1 k(j)Rjnψjn(j=1,2,…,m;n=1,…,k(j))
where k (j) is the jth share of φjW of various typesjn-the number of particles.
The compound is obtained from the formula (8),
Figure BSA0000258289830000071
theorem 2 of operators: the physical operators that act on the quantum union are hermitian and linear operators.
Setting a complex constant:
Figure BSA0000258289830000072
bleaching of particles: psijn=ηjnexp[iθjn(r,t)] (30)
Then
Figure BSA00002582898300000715
' Lin ' of share 'j=CjФj
Phi isjAnd'jThe float sets in (1) are all { psijn}。
Ф’jOn a scale of:
Figure BSA0000258289830000073
the unit share is as follows:
Figure BSA0000258289830000074
quota unitTheorem 2: the share is multiplied by an arbitrary complex constant, then W isnThe quota or number of particles is unchanged.
Inference 5 (as evidenced by mathematical induction): quota federation phi in systemjLinear superposition sigmaj=1 mCjФjDoes not change Wj-the quota of particles.
Share association theorem 3 (superposition theorem): the linear superposition of each share pair in the system does not change Wn-the ratio of the number of particles to the total number of particles.
3.1.1 from the definition of physical operators, deduction 1, deduction 2, operator theorem 1 and operator theorem 2, we can:
operator theorem 3: each physical quantity corresponds to a linear and hermitian physical operator (i.e., a quantum theory operator).
Drift psi of individual W-particles of the systemnIs the basis vector. Their dynamics are a column matrix. The physical operator can be expressed as a linear hermitian [ W ]nk]。
Wherein
Figure BSA0000258289830000075
Inference 6: the physical quantities of the W-particles form a linear Hermitian matrix, and the linear Hermitian matrix dynamically form a column matrix; the drift equation becomes a matrix equation.
3.1.2 multiplying the left sides of the two sides of the formula (27) by the floating phin(r, t) and integrated in the drift domain (Ω).
And is obtained from (18):
Figure BSA0000258289830000076
namely:
Figure BSA0000258289830000077
from (8):
Figure BSA0000258289830000078
obtaining an average value of the physical quantities Waverage from the formulae (34) and (35):
Figure BSA0000258289830000079
physical average theorem: the average physical quantity of the particles in the system is
Figure BSA00002582898300000710
(i.e., quantum theory mean axiom).
3.1.3 System Each particle and its float
Figure BSA00002582898300000716
Is considered to be a subsystem. In each subsystem, unit shares are combined:
Figure BSA00002582898300000711
and average value
Figure BSA00002582898300000717
From the physical averaging theorem, equations (8) and (36), each subsystem has:
Figure BSA00002582898300000712
multiplication on the left side of the integrand
Figure BSA00002582898300000718
The following can be obtained:
Figure BSA00002582898300000713
the physical operator, the physical value and the integration range in the integrand are independent of the independent variable. Obtaining:
Figure BSA00002582898300000714
operator theorem 4: the physical quantity of each particle can only be the eigenvalue of its physical operator (i.e. the axiom of quantum theory measurements).
3.1.4 in the system, let W be differentnTwo dynamic sets of particles, respectively { ξa(WanT) and ξb(WbnT) }. Their quota sets are respectively { ρa(WanT) } and { ρb(WbnT) }. Their float sets are respectively { psinAnd
Figure BSA0000258289830000081
from (27):
Figure BSA0000258289830000082
and
Figure BSA0000258289830000083
let unit share ally
Figure BSA0000258289830000084
And is obtained from the formula:
Figure BSA0000258289830000085
multiplying the left sides of the above formulas by
Figure BSA0000258289830000086
And integrated in the floating domain (Ω).
And is obtained from (18):
ρb(Wbj,t)=∑n=1 kWjnρa(Wan,t)。
in which the physical quantity WbElements of the matrix of (c):
Figure BSA0000258289830000087
inference 7: w-particle dynamics from { ξa(Wan) Is converted into { xi }b(Wbj)}. Physical quantity matrix [ W]Is converted into [ W']=[S+][W][S]。
Wherein the unitary matrix [ S]The elements of (A) are:
Figure BSA0000258289830000088
and deducing 8: the dynamics of the W-particles in the system can be changed from one to another.
3.1.5 assume that the set of drifts of the system is psin}。
The complex function satisfying the theorem of quota conjoint 1 is Φ (r, t).
From formula (3), it scales as:
Figure BSA0000258289830000089
its unit portion is combined as
Figure BSA00002582898300000810
From the formula (29), each WnDynamic ξ (W) of the particlesn,t)。
Its absolute value is WnQuota of particles pn
From (27): the complex function phi can be expanded as WnLinear superposition of the drifts of the particles.
Share linkage theorem 4: the complex function satisfying the theorem of quota conjoining 1 can be expressed as W in the systemnLinear superposition of the drifts of the particles.
3.1.6 hypothesis Drift psi1(r1),…,ψj(rj) The fraction formed is related to ζ (r)1,…,rj)。
From the theorem of probability products, the two particle fractions are combined:
|ζ(r1,r2)|2=|ψ1(r1)|22(r2)|2or|ζ(r2,r1)|2=|ψ1(r2)|22(r1)|2
then ζ (r)1,r2)=±ψ1(r12(r2) Or ζ (r)2,r1)=±ψ1(r22(r1) (37)
The property Φ of any particle is 0, 1, 2, 3, or 4.
Therefore, from the definition of brief bleaching, the fractions ζ of two particles are one of four:
ζ1(r1,r2)=ψ’1(r1)exp(±iФπ/2)ψ’2(r2) exp (i phi pi/2) ═ zeta2(r2,r1)
ζ3(r1,r2)=ψ’1exp(±iФπ/2)ψ’2exp(±iФπ/2)=±ζ4(r2,r1) (38)
3.1.6.1 traits of any fruiting body: Φ is 1 or 3.
From the formula (38), the initial phases of two homonyms are the shares of phi pi/2 and-phi pi/2 respectively, and are combined as follows:
ζ1(r1,r2)=ζ2(r2,r1)=ψ’1(r1)ψ’2(r2)
from the formula (38), the initial phases of two homonyms are the shares of phi pi/2 or-phi pi/2, and the shares are combined as follows:
ζ3(r1,r2)=ζ4(r2,r1)=-ψ’1(r2)ψ’2(r1)
from the theorem of probability sum, it can be obtained
Ф’A=±[ψ’1(r1)ψ’2(r2)-ψ’1(r2)ψ’2(r1)]。
Scale of the portion
Figure BSA0000258289830000091
Is 21/2
Ф’AMultiplication by
Figure BSA0000258289830000092
Or
Figure BSA0000258289830000093
We obtain a unit share union of two fruits with the same name
Figure BSA0000258289830000094
Figure BSA0000258289830000095
3.1.6.2 trait of any one of the nulls: Φ is 0, 2, or 4.
The same theory can obtain the unit share union of two homonymous vacancies
Figure BSA00002582898300000913
Comprises the following steps:
Figure BSA0000258289830000096
from the formulae (39) and (40), it can be demonstrated by mathematical induction:
share linkage theorem 5: the unit share union of homonymous real or homonymous empty in the system is an antisymmetric or symmetric complex function.
3.1.6.3 from formulas (39) and (40), as evidenced by the mathematical induction:
the theorem of isotactic particles: exchanging with real or empty son; the unit shares are related to opposite or identical functions (axiom of quantum homologies).
3.1.6.4 two congruent fruits psi1(r22(r1)=-ψ1(r12(r2)。
From the formula (39), unit portion
Figure BSA00002582898300000914
Is zero drift.
Theory of excess incompatibility: in a certain time and space, at most only one identical particle exists (replacing the incompatible principle of quantum theory).
3.1.6.5 in the same way, two homovacancies: psi1(r22(r1)=ψ1(r12(r2)。
From the formula (40), the unit portion is combined
Figure BSA0000258289830000097
It can be shown that,
the theory of vacancy compatibility: there may be many congruent vacancies in the air at any time.
3.1.7 simple and convenient, WmDrift of particles psim(r,t)=ηmexp[iB(Pm·r--Emt+σmπ)]Mark as ≈ Wm>。
Wherein WmIs any one of the physical values of the drift phase of the particle.
Let AmIs Wm-number of particles. Particle fraction: ═ Am 1/2|Wm>≡|Am 1/2m(r,t)。
From the definitions of descenders and ascenders, one can obtain:
ǎmAm↑|Am 1/2|Wm>=±|Am 1/2|(Am-1)↑|Am 1/2|Wm> (41)
ǎ+ mAm↑|(Am+1)1/2|Wm>=|(Am+1)1/2|(Am+1)↑|(Am+1)1/2|Wm> (42)
fraction ≠ A of empty or solid particlesm 1/2|WmComplex functions that are symmetric or anti-symmetric.
Is represented by the formulae (41) and (42):
ǎ+ mǎm[Am↑|Am 1/2|Wm>]=ǎ+ m[±|Am 1/2|(Am-1)↑|Am 1/2|Wm>]=±Am[Am↑|Am 1/2|Wm>]
theorem 1 for quantity operator: the down-then-up command is the number of W-particles AmThe physical operator of (2).
The same can be obtained: amǎ+ m[Am↑|(Am+1)1/2Wm>]=(Am+1)[Am↑|(Am+1)1/2Wm>]
Theorem 2 for quantity operator: the up-then-down instruction is the number of W-particles AmAnd 1, and a physical operator.
3.1.8 let δ be the Kronecker notation. The following equations (41) and (42) can be obtained:
theorem of adversarial relationship: the fact that only satisfies the relationship [ am1,ǎ+ m2]=-δ12. The vacancies satisfy the inverse-easy relationship [ { hacek } [ ]m1,ǎ+ m2]+=δ12
3.1.9 observable physical quantities of particles in the system
Figure BSA0000258289830000098
The variance of (c) is:
Figure BSA0000258289830000099
according to the theorem of adversarial relationships, one can deduce:
Figure BSA00002582898300000910
(alternative uncertainty principle).
Conjugation theorem: product of standard deviations of two conjugated physical quantities (or physical operators)
Figure BSA00002582898300000911
(or
Figure BSA00002582898300000912
) Not less than 1/2B.
Description of the drawings: the absolute value of the difference between the physical value of the particle and the average value of the physical quantity of the system is the standard deviation of the physical quantity of the particle. It is not an uncertainty or measurement error.
3.1.10 the included angle between the polarization direction of the polarizer and the X-axis of the photon coordinate system was γ. Its drift amplitude in the polarization direction was η cos γ.
The principle of light polarization (first rule from particle properties): the position probability density of photons capable of passing through the polarizer is eta2cos2Υ。
3.1.11 the direction of the total magnetic dipole moment of the particle is the left and right atom, which passes through the non-uniform magnetic field in the vertical direction and is divided into two beams, upper and lower. Any one of the particles passes through the horizontal magnetic field again and is divided into a front beam and a rear beam.
And (3) bundle theorem: a particle having a magnetic dipole moment is split by the inhomogeneous magnetic field into two beams, one of which is deflected in the direction of the magnetic field and the other is reversed.
3.2 particle cost second law: in the inertial particle system, the average of the total energy, the total momentum, or the total angular momentum is conserved.
As can be seen from equations (18) and (36), the average value of the physical quantity W is:
<W>=∑n=1 kρ*(Wn,t)Wnρ(Wn,t)=∑n=1 kξ(Wn,t)Wnξ(Wn,t) (43)
the physical operators of the radial vector r, the energy E, the momentum P and the potential energy U are respectively
Figure BSA0000258289830000101
p、
Figure BSA0000258289830000102
The eigenvalues are respectively
Figure BSA0000258289830000103
3.2.1 when the position of the particle is at point r, its eigenvalue is
Figure BSA0000258289830000104
Namely, it is
Figure BSA0000258289830000105
Because the drift of the particles satisfies:
Figure BSA0000258289830000106
it holds true for any point in time. Then
Figure BSA0000258289830000107
Therefore, the first and second electrodes are formed on the substrate,
Figure BSA0000258289830000108
3.2.2 order the momentum of the W-particles to be Pn. It floats to be psin=ηnexp[iB(Pnr-Et+πσZ)]Obtaining;
Figure BSA0000258289830000109
further, the average momentum value can be obtained from the expressions (18), (27), (34), (35) and (43):
Figure BSA00002582898300001010
from (36):
Figure BSA00002582898300001011
from formulae (45) and (46):
Figure BSA00002582898300001012
left multiplication of the integrand
Figure BSA00002582898300001013
Obtaining:
Figure BSA00002582898300001014
(47) in the constant integration on both sides of the formula, the integrated function and its independent variable range are the same. The derivation is carried out on the two sides to obtain,
the momentum operator:
Figure BSA00002582898300001015
from equation (48):
Figure BSA00002582898300001016
3.2.3 similarly, energy operator:
Figure BSA0000258289830000111
and
Figure BSA0000258289830000112
3.2.4 from formulae (44) and (48),
inference 9: angular momentum operator
Figure BSA0000258289830000113
3.2.5 average of potential energy U from equation (36):
Figure BSA0000258289830000114
3.2.6 from (44) and (48):
and (3) deducing 10: correlation equation
Figure BSA0000258289830000115
3.2.7 Total energy of Low velocity particle System (containing Single particles):
E=P2/(2m)+U (53)
from the second law of particle cost, the physical average of a particle system:
Figure BSA0000258289830000116
the particle drift and unit share in the system are psi respectivelyn(r, t) and
Figure BSA0000258289830000117
from formulae (36) and (54), the following are obtained:
Figure BSA0000258289830000118
in the constant integrals on both sides of the above equation, the ranges of the integrated function and its argument are the same. Taking the derivatives of both sides, we can obtain:
Figure BSA0000258289830000119
substituting (49), (50) and (51) into the formula (55), and then left-multiplying
Figure BSA00002582898300001113
Obtaining:
Figure BSA00002582898300001110
(56) the formula is called the slow speed drift equation.
When the system:
Figure BSA00002582898300001111
in time, (56) type is schrodinger equation (i.e. the wave equation axiom of quantum theory).
3.3 deduction 11: the deviations of certain physical quantities of the individual particles in the object cancel each other out. The object has no microscopic features.
According to the second law of particle identity,
and (3) stationary bleaching theorem: the velocity of each electron in the standing drift is constant, and the average total energy of the electrons is the same. It cannot emit photons (according to conservation of energy).
And 3.4, setting H as the Hamilton quantity. From the theorem on the reciprocity relation, the derivative of the average physical quantity can be found:
Figure BSA00002582898300001112
3.5 from equation (56), harmonic oscillators, electron orbitals in atoms, barrier tunneling, etc. can be calculated.
The maximum value of the drift velocity is the light velocity C. In the light velocity direction, the light velocity particles have no acceleration. The force experienced by the particle in that direction is zero.
4. Two laws of the nature of an object establish the macroscopic physics that supersedes relativity
Momentum is defined as p (t) m (t) v (t). We have withdrawn the definition of "force f (t) ═ dp (t)/dt".
Newton's second law follows from equation (1): df (t) da (t).
If F (t) is 0. Then a (t) is 0. The unstressed object is in a static or uniform linear motion state (Newton's first law).
The external force of the two objects is not changed; the forces between them can only be the same absolute value but opposite (newton's third law).
The mode of a stationary body in the inertial system, called its static mode m0. The mode produced by the motion of the body, called its dynamic mode mm
Static mode m of object0Momentum m of0V, called its static amount P0. Its dynamic mode mmMomentum m ofmV, called its momentum Pm
Static mode m of object0The induced energy, called its static energy E0. Its dynamic mode mmIs called its kinetic energy Em
Total mode m of object0+mm. Total momentum P ═ P0+Pm. Total energy E ═ E0+Em (57)
The square of the total mode of the object minus the square of the positive square root of the static mode of the object is called the pure mode m of the objectp。mp=|(m2-m0 2)1/2|。
Pure mode m of objectpInduced momentum mpC, called pure momentum Pp. Pure momentum PpInduced energy PpC, called pure energy Ep
4.1 object essence first law: the change rate of the total mode shape of the object in the true static system to the speed ratio is the total mode shape multiplied by the speed ratio.
Let m (λ) represent the total mode shape of the object with a speed ratio λ in a true static system.
When lambda is 0, the static mode of the object in the true static system is m0
Then: dm (λ)/d λ ═ m (λ) λ
The total mode of the object in the true static system can be obtained:
m(λ)=m0exp(λ2/2) (58)
according to the first law of the nature of the object, the modal-velocity formula in the true stationary system is:
m(λ)/m0=1+λ2/2+λ4/(2!22)+λ6/(3!23)+…
according to the narrow relativity theory, the mass-velocity formula in the inertial system is:
m(λ)/m0=1+λ2/2+3λ4/(2!22)+3×5λ6/(3!23)+…
and (3) inference 12: in the true static system, the equation of the object mode-speed is the same as that of the object mass-speed within the square precision of the speed ratio.
Differentiation: d exp [ V.V/2C2]=exp[V·V/2C2]d(V·V/2C2) (59)
Where V is the velocity of the object in the true static system.
Differentiation: d (V.V/2) ═ dV.V + V.dV)/2 ═ V.dV
And the kinetic energy E of the object in the true-static system is obtained from the formulas (1), (58) and (59)mDifferentiation of (d):
dEm=F·Vdt=mV·dV=
=m C2d(V·V/2C2)=
=m0C2exp[V·V/2C2]d(V·V/2C2)=
=m0C2dexp[V·W2C2]=
=d[m0C2exp(V2/2C2)]=
=d[m C2] (60)
let m0Is the mode when the object is at rest. Then Em=(m0+mm)C2+X。
Due to mm0. Then Em0. Comprises the following steps: x ═ m0C2
From formulas (57) and (60):
Em=m C2-m0C2=E-E0 (61)
if m is00. Then E0=0。 (62)
The total energy is obtained from the equations (61) and (62): e-m C2 (63)
Obtaining the static energy from equations (61) and (63): e0=m0C2 (64)
Kinetic energy derived from equations (57), (63), and (64): em=mmC2 (65)
From the formulae (58), (63), (64) and (65),
the theorem of object velocity: the mode or energy of a velocity V object in a true-static system is its stationary exp [ V2/(2C2)]And (4) doubling.
The modal and energy theorem: the ratio of static energy to static mode, or dynamic energy to dynamic mode, or total energy to total mode of the object is C2
4.1.1 from equations (58) and (63), the total energy of the velocity V object in the true static system:
E=mC2=m0C2exp(V2/2C2) (66)
square of total mode m2=(m0+mm)2=m0 2+mp 2 (67)
From the formulae (66) and (67), the following are true static systems:
m2C4=(m0C2)2+(mpC2)2 (68)
the theorem of total energy: e ═ m ± (m)0 2C4+Pp 2C2)1/2 (69)
Without confusion, pure momentum PpCan be represented as P
Then pure energy Ep 2=P2C2
From equation (69), the true-static system includes:
E2=m0 2C4+P2C2=E0 2+Ep 2 (70)
energy square theorem: the sum of the square of the static energy of any particle and the square of its pure energy is the square of its total energy.
4.1.2 order Wn-the quota of particles is βnIts static mode is m0nThe static energy of (a) is:
E0n=βnm0nC2 (71)
rated at alphanThe kinetic energy of the particles of (a) is:
Emn=αn·Epn=αn·Pnc (component α)ni、Pni,i=1,2,3) (72)
Physical operator Pn、αn、m0n、βnMatrix [ P ] equivalent to inference 6ni]、[αni](i=1,2,3)、[m0n]And [ beta ]n]。
From the matrices of equations (57), (71), and (72), the total energy matrix of the system is:
E=Cα·P+βm0C2 (73)
and is obtained from the formulas (70) and (73):
i][αi]=[β][β]unit matrix [ I ═] (74)
Antilogarithm [ C alpha ]i·Pi,βC2m0]+=δ12
For the substance: quota alphaiAnd β is a second order pauli matrix.
For species and counter-species: quota alphaiAnd β is a fourth order dirac matrix.
4.1.3 assume that in the system, the potential energy is U (r, t).
From particle cost second law and equation (73), the mean equation of the total energy of the particle system:
Figure BSA0000258289830000136
suppose that the unit shares in the system are combined as
Figure BSA0000258289830000137
From the formulae (36) and (75), it is possible to obtain:
Figure BSA0000258289830000131
the column matrix of the four unit share unions is:
Figure BSA0000258289830000132
(76) in the constant integrals on both sides of the equation, the ranges of the integrated function and its argument are the same. Taking the derivatives of both sides, we can obtain:
Figure BSA0000258289830000133
substituting (49), (50) and (51) into (77), and left-multiplying
Figure BSA0000258289830000138
The following can be obtained:
Figure BSA0000258289830000134
the solution to the equation is a share join of the real seed with the trait 1.
(78) The floating equation called real (i.e., extended dirac equation).
4.1.4 static energy of the void E0=m0C2And pure energy EpPC satisfies the formulae (57) and (70).
The same method as in section 4.1.3 can be used to obtain the bleaching equation of the nulls as:
Figure BSA0000258289830000135
the solution to the equation is the share of the empty with the property 0. Where C is the speed of light.
(79) The equation is called the drift equation for spin zero (i.e., the extended cliclein-gordon equation).
From the formulae (23) and (63), the mode m (t) of the photon is ω (t)/(BC)2)。
The obstacle of a particle moving at the speed of light in its direction of motion is zero, as defined by the obstacle.
The theory of disorder: photons or attractors have modes, no obstacles, and no attractive forces between them.
According to the first law of drift velocity theorem and particle nature, it can be derived:
photon angular frequency/phase number photon energy E/momentum P constant (80)
Light velocity theorem: the drift velocity of photons or attractors in vacuum is a constant C (one of the relativistic principles) with respect to any inertial system.
Light velocity theorem: the drift velocity of photons or attractors in vacuum is a constant C (one of the relativistic principles) with respect to any inertial system.
From equation (80), the square of the total energy of the light velocity particle satisfies:
E2=P2C2
the same can be obtained:
Figure BSA0000258289830000141
equation (81) is called the drift equation of spin one (i.e., the extended Proca equation).
The quantum of the photons of the electromagnetic wave is replaced, and the quantum, the mode, the momentum and the energy are absent. The attractor share replaces the gravitational wave.
The theorem of force action: the force can change the velocity of any non-light-velocity particle and the velocity direction of the photon, but cannot change the drift velocity of the particle.
From the first law of particle nature, entanglement is independent of the over-distance effect.
4.1.5 if the direction of motion of the particles and their spin direction are not parallel. The addition of these two velocities changes the speed of light of the particle in the direction of the speed of light. I.e. the angle between the direction of motion of a photon and its spin can only be pi or zero. I.e. its norm sigmaZBut only-1/B or 1/B.
Norm theorem: norm sigma of photon (or attractor)ZCan only be one of + -1/B (or + -2/B).
The drift velocity of photons (i.e., the speed of light) and the speed of the light source are different kinds of velocities. It is incorrect to add them relationally.
4.1.6 Each W in the SystemmThe probability density of the particle position remains unchanged. Its share must satisfy the second law of particle nature.
The drift equation has the theorem: the drift equation, derived from the second law of particle cost, necessarily has a solution of the quantum union.
4.1.7 true statics, from the definition of the decay constant μ:
dN(t)/dt=-μN(t) (82)
the total mode of the static object is M at the time t in the true static systemr(t)。
Wherein the total mode of each particle is a constant mr
Number of particles Nr(t)=Mr(t)/mr
From the formula (82), it is possible to obtain:
d[Mr(t)]/dt=-μrMr(t) (83)
setting the total mode of the object at time t, velocity V to be Mv(t)。
Wherein the total mode of each particle is a constant mv
The same can be obtained:
d[Mv(t)]/dt=-μvMv(t) (84)
further, from equation (82), the decay constants are constant, regardless of the velocity of the particles.
Namely: d [ M ]v]/dt=d[Mr]/dt。
And from (83) and (84):
μrMr=μvMv
from (58):
Mv=Mrexp(V2/(2C2))。
the average time (lifetime) T of the particles was 1/. mu..
Let the stationary particle life be Tr. Particle lifetime at velocity V of Tv. The following can be obtained:
Tv=Trexp[V2/(2C2)] (85)
the theorem of life: object or particle mean life T of velocity V in true static systemvFor its rest life TrExp [ V ] of2/(2C2)]And (4) doubling.
4.1.8 the rate of change of momentum of the object in the inertial system is:
dP/dt=d(mV)/dt=mdV/dt+Vdm/dt (86)
let d//P/dt and d//V/dt (or d)P/dt and dV/dt) is the parallel (or perpendicular) component in the direction of motion of the object.
Their rates of change in momentum and velocity are dP/dt and dV/dt.
dP/dt does not change the absolute value of the object velocity.
From (58): and dm/dt is 0.
And is further represented by the formula (86): dP/dt=mdV/dt。
d//P/dt or d//The direction of V/dt is the same as the direction of the object velocity V. They may operate as scalars.
Because of V2=V·V=V2
And from (58), (59), and (86):
d//P/dt=md//V/dt+V·d{m0exp[V·V/(2C2)]}/dt=md//V/dt+(mV2/C2)dV/dt。
in the inertial system:
dP/dt=dP/dt+d//P/dt=m(1+V2/C2)dV/dt (87)
from the defined object obstacles:
b(t)=dP/dV=m(t)(1+V2(t)/C2)==m0exp[V·V/(2C2)(1+V2(t)/C2) (88)
let the speeds of two objects relative to the true stationary system be VkTheir total mode is Mk
From the definitions and (88), their attractive loads (instead of newtonian mass of attraction):
Lk(t)=bk(t)=Mk(t)(1+Vk 2(t)/C2),(k=1,2) (89)
suction load theorem: velocity VkIs the total mode shape M of the object (including photons)kOf (1+ V)k 2(t)/C2) And (4) doubling.
4.2 second law of matter: the attraction between the two objects is the product of the attraction load multiplied by the attraction constant divided by the square of the distance.
Attraction (instead of gravitational force): fA(t)=-GAL1(t)L2(t)r/r3 (90)
Wherein G isAIs an attractive constant. L isk(k is 1, 2) are suction loads of the two objects, respectively. r is the distance of their particles.
Suction load of the low-speed object is obtained from equations (58) and (89):
Lk(i.e. total attraction load) approximately equal to Mk(i.e. total mode) approximately equal to M0k(i.e. static mode) (91)
From the formulae (90) and (91), an attractive force can be obtained:
FA(t)≈-GAM1M2/r2(relativity) ≈ GAM01M02/r2(Newton) (92)
Relative to the true static system: the smaller object has a total mode m, velocity v, attraction load l. The larger object has a total mode M, velocity V, attraction load L. The distance between them is R. From equation (89), the suction loads for the larger and smaller objects are:
attraction of larger objects: m (1+ V)2/C2)。
Attraction of smaller objects: l ═ m (1+ v)2/C2)。
From equations (89) and (90), the attraction experienced by the two objects is obtained:
FA=-GA·1·LR/R3=-GALm(1+v2/C2)R/R3 (93)
from equations (1), (91), and (93), the acceleration of the smaller object is obtained:
a=-GAL(1+v2/C2)R/R3≈-GAM(1+v2/C2)R/R3
it differs from the relativistic calculated acceleration by-GAM/R2Comprises the following steps:
Δa=GAM(v2/C2)/R2
v=(Δa R2C2/GAM)1/2 (94)
according to the equations (23) and (63), the relationship between the total energy E and the total mode m of the particle is:
m=ω/(BC2)=E/C2 (95)
further, from the formula (89), the attraction of photons:
1=2m=2ω/(BC2)=2E/C2 (96)
from the formula (93), it is possible to obtain:
FA=-GALm(1+v2/C2)R/R3
=-GALm0exp[v2/(2C2)](1+v2/C2)R/R3
=-GALm0R/R3-[3v2/(2C2)]GALm0R/R3-[5v4/(8C4)]GALm0R/R3+… (97)
attraction constant GANewton's constant G of attractionN=6.6726×10-20km3/kg·s2
Attraction load L of the sun is approximately equal to the static mode M thereof0(=1.99×1030kg)。
Inference 13: classical attraction ≦ attraction in this context ≦ attraction in the generalized relativistic.
26.9. 4.2.11998, reported as "a peculiar phenomenon of universe" in Zhou journal of England "Economist: the acceleration of the spacecraft such as pioneers No. 10, No. 11, Eulisius and Galileo is 8 multiplied by 10 more than the calculated delta a of the generalized relativity theory-8cm/s2
The extra acceleration Δ a of the spacecraft is its missing acceleration relative to the true static system in the relativistic orbit calculation.
Mean radius of spacecraft around sun R1.49X 108km。
From equation (94), the velocity of the spacecraft relative to the true static system:
v=[Δa R2C2/GAMD]1/2=[8×1.492×2.9982×103/(6.6726×1.99)]1/2=109.6km/s。
its direction is the direction of the spacecraft acceleration Δ a.
The average speed of the object in the solar system is the same relative to the true static system.
We predict that: the speed of the solar system relative to the true static system is 109.6 km/s.
The speed of light was 299800 km/s. The velocity of the earth relative to the true stationary system was 109.6 km/s. Thus, the earth approximates a true static system.
Let GNIs the newtonian constant of gravity measured on earth. GAIs an attractive constant.
Then G isA=GN/(1+109.62/2998002)2=0.99999973271GN=6.672598×10-20km3/kg·s2
Muons are generated aloft of the earth and fly toward the earth. As the earth approaches a true stationary system. Its motion approximates that of a relative true static system.
According to the lifetime theorem, the average lifetime of muons at velocity V is exp [ V ] of their average rest lifetime2/(2C2)]And (4) doubling.
The twin A is set to drive the spacecraft to do uniform linear motion at the speed v of 0.99C. After flying for a long time, the airship turns around and continues to make uniform linear motion at a speed v to fly back to the twin B of the earth. As the earth approaches a true stationary system. Twin a is younger.
4.2.2 mode M, attraction load L, and distance R between the planet with radius R and the earth. The total energy of the planet photons to reach the earth varies:
ΔE=GAL1/r-GAL1/R (98)
further, from equation (23), the total energy of photons becomes:
ΔE=Δω/B (99)
where R is much smaller than R.
Scalar calculations are used. From equations (96), (98), and (99), the attraction red-shift of the photon is:
Δω/ω=2GAL/(C2r)-2GAL/(C2R)≈2GAL/(C2r)≈2GAM/(C2r) (100)
(100) formula G is gravity red shift formula of relativistic theoryAM/(C2r) twice as much.
If equation (100) is used to calculate the spectral attractive red-shift of the stars or galaxies. Then:
some stars have a blue shift. Some stars have red-shifts. It negates large explosions and cosmic expansions.
The star velocities around the center of the galaxies are slower than those calculated by relativity and follow the second law of matter nature. This negates dark material.
The astrology kinematics mode calculated by the second law of the object essence is approximately equal to the photometry mode and the non-luminous celestial mode. This negates the dark energy.
4.2.3 in this section we use the real world as reference frame.
Wherein the sun speed ratio is 3.653 × 10-4. Its mode M ≈ its attraction load Ls
The distance vector from the center of the sun to the mass point of the object (including the photons) is R.
Let m be the mode of the object or photon. Its static mode is mo. The speed of the object moving around the sun is v (t). Its acceleration to the sun is a (t). Its attraction or centripetal force to the sun is FA(t) of (d). The perpendicular component of the direction of motion of the object being vAnd aAnd FA
The suction load thereof is given by the formulae (58) and (89):
LP(t)=bP(t)=m(t)(1+v2/C2)=mo(1+v2/C2)exp(v2/2C2) (101)
4.2.3.1 let the photon's attractive charge be l. Its mode is m.
From formulas (93) and (96), the photons are attracted to the sun:
FA=GALs|r/r3=2GALsmr/r3 (102)
the photon coordinate system is a plane rectangular coordinate system which takes the sun center as the origin and the straight line parallel to the rays near the sun as the X axis.
The sagittal of the photon is r (t). The included angle between the X-axis and the positive direction of the X-axis is theta (t). It is possible to obtain,
Figure BSA0000258289830000171
obtaining:
Figure BSA0000258289830000172
the distance that the photon travels is ds ═ Cdt
Then:
Figure BSA0000258289830000173
because of the fact thatsinθds=rdθ;rsinθ=Ro(i.e., the distance of a photon passing near the sun to the center of the sun, which is the radius of the sun).
Therefore, the first and second electrodes are formed on the substrate,
Figure BSA0000258289830000174
let σ be the total deflection angle at which a photon moves from x ═ infinity to x ∞.
Then the differential deflection angle of the sun to photons over dt time is:
Figure BSA0000258289830000175
therefore, it is not only easy to use
Figure BSA0000258289830000176
Radius of the sun Ro=6.9×105Km and other parameters are substituted into the formula to obtain:
σ=4×6.672×10-20×1.99×1030/(2.9982×1010×6.9×105)=8.5675×106and the radian is 1.7672'.
It is consistent with the observed value of 1.775' within the error range. The deflection of the light by the sun proves the correctness of the two new laws of the properties of the object.
4.2.3.2A rectangular plane coordinate system with the sun center as the origin and the major axis and minor axis of the planetary elliptical orbit as the X axis and Y axis, respectively, is called as the planetary coordinate system. Wherein the radial vector of the planetary position is r. The included angle formed by the X-axis and the positive direction of the X-axis is theta.
Let the attraction load of the planet be IPIts mode is m. The planet absolute velocity is v relative to the true static system; the absolute speed of the sun is V. The average speed V of the sun is equal to the average speed V of the planets.
The solar attraction parameters were:
Figure BSA00002582898300001810
wherein G isAIs an attractive constant. Attraction of the sun LsIs a constant.
From equations (88), (93), and (108), the attraction acceleration of the planet:
Figure BSA0000258289830000181
centripetal acceleration of the planet around the sun:
a=v2/r (110)
from the formulae (109) and (110)
Figure BSA0000258289830000182
Planetary attraction is given by equation (93):
FA=-GALs|r/r3=-GALsm(1+v2/C2)r/r3=FN+FNv2/C2=FN+ΔFN (112)
the force and Newton's attractive force FNThe phase difference is as follows:
ΔFN=-FNv2/C2 (113)
due to-delta FN/FN=v2/C2Is a very small number. The precession of the planet near-sun point can be calculated by a first-order difference method.
The extra precession of the planet is due to the difference Δ L of its attractive carrier (or sun attraction parameter)s(or
Figure BSA0000258289830000183
) And (3) the product is obtained.
The difference in the attraction load of the sun is:
ΔLs=Lsv2/C2 (114)
the difference in the attraction parameters of the sun is:
Figure BSA0000258289830000184
from the full differential of the formula (109), it is possible to obtain
Figure BSA0000258289830000185
Centripetal force of the planet around the sun:
Figure BSA0000258289830000186
due to the fact that
Figure BSA0000258289830000187
And from (111) and (117):
Figure BSA0000258289830000188
FNthe variation of (2) causes a variation of the radial vector, and can be taken as the formula FNDifference Δ r of (c):
Δr=-mv2ΔFN/FN 2 (119)
from equations (111), (112), (113), and (119), the difference of the radial vectors r can be obtained:
Figure BSA0000258289830000189
the minus sign indicates: the attraction of the planets increases; its radius vector r decreases.
By substituting expressions (111), (115), and (120) into expression (116), the difference of centripetal acceleration of the planet can be obtained:
Figure BSA0000258289830000191
it is caused by the difference between the true attraction of the planet and the newtonian attraction. This results in additional variation in the speed of the planet.
In the coordinate system of the planet, the planet moves along an elliptical orbit from the positive X-axis direction (point a) to the positive Y-axis direction (point B). The integral of the difference Δ a of the centripetal acceleration projected on the X-axis with respect to time is the difference Δ v of the speed Δ v of the planet in the direction of the X-axisX
Δv(t)=ΔvX=Δa∫-∞ cosθdt=Δa∫0 π/2cosθd(rθ)/v=(r/v)Δa (122)
The planetary orbital motion period is set as T. Then v (T)/r ═ 2 pi/T
Substituting (121) into equation (122) yields the additional angle swept by the radial planet vector per unit time as:
Figure BSA0000258289830000192
the additional angle σ (t) swept by the planetary radial vector per week is the additional attraction Δ F missing in Newton mechanicsNThe additional precession that is created.
Let σ (t) be the additional angle swept by the sagittal planet per cycle. From (123), one can obtain:
Figure BSA0000258289830000193
the mean value A (1-epsilon) of the orbital radius r of the planet2) And solar attraction parameters
Figure BSA0000258289830000194
Substituting into equation (124) to obtain additional precession:
Figure BSA0000258289830000195
where A is the planet orbital semi-major axis. ε is the eccentricity of the track.
T (day) is the revolution period of the planet. For one hundred years 36525 days.
The semimajor axis A of the water star orbit is 5.791 multiplied by 1010m, eccentricity epsilon is 0.206, and period T is 87.969 d. The speed v is 47.89 km/s.
σ=6π×1.989×1030×6.672×10-11×415.203/(5.791×1010(1-0.2062)×2.99792×1016)==2.0839955×10-4Radian/century (42.9855'/century (126)
Actually measuring the extra precession of the water star: σ ═ 42.9 "± 0.45"/century.
Two laws of substance nature of the object increase attraction Δ F over the law of universal gravitationNThe extra precession of the resulting water stars corresponds to the observed values.
The water star is the planet closest to the sun. Its extra precession is most pronounced.
This extra precession of the other planets is very small.
This strongly justifies both laws of the nature of the object.
(97) The first term on the right side of the formula is approximated by Newton's gravitational force FN
According to Newton's force of attraction FNThe precession of the meteor caused by the sun and other planets is 5557'/century.
The light gravity deflection angle and the meteor precession result calculated by the generalized relativistic theory are the same as the result of the inventor. They differ in their physical meaning.
4.2.4 assuming that a celestial body attracts photons in its vicinity, it can form or be trapped by an elliptical ring of light around it. It is a black hole.
4.2.5 We discarded "transverse mass" and "longitudinal mass" in the relativity. The two principles of relativity and the equivalent in relativity are not the generally applicable ones.
The relativistic mass-velocity formula indicates that the total mass of the object at the speed of light is infinite. But the total mass of photons is limited. This is a syndrome of pseudo relativity.
4.3 two general laws of the nature of the object, apply to particles as well.
However, the second law of the nature of the object has little effect on the particles.
4.4 definition: the photon velocity of a stationary light source in one inertial system is referred to as the photon apparent velocity of the observer for the observer velocity in the other inertial system.
According to the light speed theorem, the drift velocity (i.e., the speed of light) of photons is the same for observers in fast trains and on the ground. The frequency of the photon on the train minus the doppler effect is the same as the frequency of this photon at the surface.
The speed V of the light emitted by the static light source in the train is the vector sum of the speed V and the downward direction light speed relative to the visual speed of a ground observer.
The apparent speed of photons of stars relative to an observer of the earth is the vector sum of the speed of stars and the speed of light in the direction of the earth. The speed of view may exceed the speed of light.
5. The theory of particle entry and exit derives the local regulation principle of unifying four natural forces
From the theorem 6 on the property of the drift, it can be seen that the rotation of the drift phase of each particle in the system does not change the probability density of the positions of these particles. The individual particles are subjected to scalar and vector potentials, causing their phase at each point to rotate. However, their drift equations remain unchanged.
Four fundamental force causes: the strong (or weak) charge of the quark (or elementary particle) and the electrical (or attractive) charge of the object generate and annihilate the glue (or weak) and the photon (or attractor), respectively. The particle ingress and egress generates strong (or weak) and electromagnetic (or attractive) forces.
According to the specific physical conditions and the two laws of particle nature of Liu Zhi culvert, four natural forces can be described uniformly. The mode of the nulls is real.
Let the axis of the particle coordinate system be μi. i is 0 (i.e., time), 1, 2, 3 (i.e., space).
Let the m-th air float
Figure BSA0000258289830000201
According to the theorem of probability product, the unit share of y vacancies appearing simultaneously, namely ^ (r, t), is as follows:
Figure BSA0000258289830000202
wherein
Figure BSA0000258289830000203
And y is the number of generators of SU (N) share pairs. The dimension N of the space can only be 1 or 2 or 3.
Before the particles come in and go out, the elements of the matrix are the shares of the various entities. The floating column matrix is:
Figure BSA0000258289830000204
the elements of the matrix are the shares of the various entities, given the particles coming in and going out. The floating column matrix is:
Figure BSA0000258289830000205
from the theorem of probability product, the positive space term of formula (128) and the space, it can be obtained:
Figure BSA0000258289830000206
namely:
Figure BSA0000258289830000207
from formulae (9) and (132), we obtain:
Figure BSA0000258289830000208
and (3) deducing 14: the element is the transposition of the matrix of unit share union, and then the complex conjugate of the element is taken as the inverse matrix of the matrix:
Figure BSA0000258289830000209
the following same conclusions are obtained for the drift equations that satisfy the second law of particle cost. So the equation (78) is only used as an example.
Let gmIs the m-th particle carrier. The potential energy acting on the particles is
Figure BSA00002582898300002010
Energy rewriting into four-dimensional momentum component P0. Then (78):
Figure BSA00002582898300002011
wherein gamma isμ≡(γ0,γ1,γ2,γ3) Is a dirac matrix.
Figure BSA00002582898300002012
B is the float-granule constant. m isO mIs the static mode of the m-th identical particle. And C is the speed of light. Equivalence potential
Figure BSA00002582898300002013
(134) Potential energy in the formula
Figure BSA00002582898300002014
Can be expanded into a taylor series of g-carriers.
The theorem of vacancies: during the particle entrance and exit, the total energy of the positive and negative vacancies cancel each other out (i.e. their total mode is zero).
Photons and attractors, with a kinetic mode; but without a static mode.
According to the conjugation theorem, it can be observed that the product of the standard deviations of the two conjugated physical quantities of the particles is Δ EΔ t ≧ 1/2B. The product of the standard deviations of the two conjugates of the non-observable nulls (or dummy nulls) is then: delta E delta t is less than or equal to 1/2B.
The total mode of the virtual vacancies is Δ m. Standard deviation of its lifetime: Δ t is less than or equal to 1/(2B Δ mC)2)。
Wherein the standard deviation of the static mode of the air is Delta mo. The standard deviation of the static life is as follows: Δ to≤1/(2BΔmoC2). Its standard deviation in the range (or radius) of entry and exit is: delta r is less than or equal to 1/(2B Delta m)oC)。
Physical operator of particle access process: momentum
Figure BSA0000258289830000211
Total energy
Figure BSA0000258289830000212
Static energy mOC2
If the unit shares are combined
Figure BSA0000258289830000213
The free particle generation and annihilation unit share of [ ^]mThe void of (2). The system loading potential H is 0.
From the second law of particle cost, (10), (132), and (134):
Figure BSA0000258289830000214
according to the definition of scalar potential A:
-H(r,t)=A(r,t)·g。
from the particle's second law (134):
Figure BSA0000258289830000215
from formulae (135) and (136), we obtain:
m=1 k[Aμ]m N×N=∑m=1 k(C/B)∑j=1 y[Qi μ]m N×Nj]-1 (137)
from (10), (132), and (137):
Figure BSA0000258289830000216
(138) in the formula
Figure BSA0000258289830000217
And
Figure BSA0000258289830000218
all satisfy (1)34) Formula (II) is shown.
Figure BSA0000258289830000219
Wherein Dμ mReferred to as m-th Wm-partial derivatives of the entry and exit of the particles.
From equations (137), (138) and (139), the partial derivatives of entrance and exit are:
Figure BSA00002582898300002110
obtained from the formula (136), Wm-before the particles come in and out:
Figure BSA00002582898300002111
Wm-after the particles have come in and out:
Figure BSA00002582898300002112
by substituting (141) and (142) into the formula (138), the following can be obtained:
Figure BSA00002582898300002113
Figure BSA00002582898300002114
(132) and (143) is the phase invariant theorem (i.e., the local norm principle).
Defining: correlation equation (i/g) [ D ]m μ,Dm v]Referred to as the influence intensity Fm μv
From equation (140), the impact strength is:
Figure BSA00002582898300002115
let the scalar potential of vector G to vector G be-A (r) and the vector potential be Q (r).
The potential energy of the carrier vector G to the carrier vector G is-gA, and the potential momentum is gQ.
Let the other energies and momentums of the g-loaded particles be E and P, respectively. And from formula (22), it floats as:
ψ(r,t)=|P1/2|exp{iB[(P+gQ)·r-(E+gA)t+πσZ]}
scalar potentials and vector potentials are the sources of interaction of carriers.
From the definitions of carrier intensity epsilon, scalar potentials and vector potentials,
load strength theorem: the gradient of the scalar potential (-A (r)) of vector G (r) is the carrier strength ε (r, t) of vector G (r).
Intensity loading theorem: the momentum of vector g (r) vector potential q (r) is the intensity y (r, t) of vector g (r).
Figure BSA0000258289830000221
They are in different units.
For example: the intensity of the electrical carrier g (r) in electrical interaction is the magnetic field strength b (r).
From the low-speed drift equation (56) or the spin one-drift equation (81), maxwell's equation, the black body radiation equation, the discrete values of the energy and angular momentum of the particle, the continuous value of the momentum of the particle, the tunnel effect of the particle, and the like can be obtained.
5.1 let the distance between quark and point r be S. According to the definition of carrier intensity epsilon and scalar potential a,
comprises the following steps: -H (r, t) g · a (r, t) gS · epsilon (r, t) (144)
Therefore, a (r, t) ═ S · epsilon (r, t) (145)
The glue also has strong load. It can produce new glue. Therefore, the probability of the occurrence of glue in the hadron range is the same. From (144):
asymptotic free theorem: the strong loading potential energy of any two quarks in the hadron-H (r, t) is proportional to the distance between the two.
Let the minimum basic unit of electrical load be 1. Then one-third or two-thirds of the quarks of the electrical load cannot exist alone (quark confinement).
5.2 drift ψ ═ Aexp (ik r) for incident particles, particles encountering scattering potentials to yield drift f (θ, φ) exp (ik r)/r.
Where θ is the scattering angle of the particle. Phi is the azimuth angle of the particle. f (θ, φ)/r is the scattering amplitude away from the scattering center. r is greater than 0.
5.3 Aheroov-Bohm experiment: a solenoid is added between two slots in the double slot interference experiment. In the presence of a magnetic field therein, the electron phase angle is large, which is the same as the vector potential direction. The phase angle against the vector potential direction is small. The phase difference between the two causes the interference fringes to move.
In weak interactions, there is and must be the participation of mesogens. The neutrino has only a negative norm sigmaZ. Its property breaks the symmetry of the parity. According to the average value conservation of angular momentum of the particle local second law of Liu Zhi culvert, the method obtains
The theorem of parity: the weak action is not conservative.
5.4 stationary bleaching theorem: the number of virtual particles residing between two very close metal plates is less than the normal number, and they are subjected to inward pressure.
From the distance between the two metal plates, the energy difference between the inside and outside of the plates and its attraction force causing the energy difference (i.e. the Casimir effect) can be calculated.
By definition, the effect of strong, electrical or weak, the g-load is the positive square root of the probability of the occurrence of a null. They are conservative.
Load conservation theorem: strong load (number of heavy seeds/3), electric load (square root of fine structure constant), weak load (number of light seeds), or attractive load conservation.
5.5 the elementary particles are point particles. The interaction between them can only occur at the same time space point. Otherwise, it is an over-distance action. For example, float psi1The electron of (r, t) radiates a photon of floating A (r, t) at a certain point, becoming floating psi2Electrons of (r, t). According to the theorem of probability product, the action formula is as follows: psi1(r,t)A(r,t)ψ2(r,t)。
Probability g of appearance of attractor (or photon or weak or glue)A 2≈6.20×10-39(or g)E 2Fine structure is commonAmount or gW 2≈4.38×10-5Or gS 20.219) is the vertex of the minimum interaction that attracts the load (either electrically or weakly or strongly). Heavy load gS0.468. Electric load gER 0.0854. Light load gW≈6.618×10-3. Suction carrier gA≈7.87×10-19
According to the theorem of probability sum, the theorem of probability product, inference 4, inference 5 and the theorem of property of drift 6, the description and calculation of the minimal interaction vertex of the particle in and out can be obtained. The number of particles per system is limited. Their calculation is unlikely to be infinite.
6. Conclusion
The branches of physics, other than classical mechanics (including elastography, electromagnetics, relativity, etc.) and quantum mechanics, can be chosen from the most basic principles or axioms of which are the laws of "axiom physics". They constitute with this document the complete and self-consistent "axiom physics".
For example: the three laws of thermodynamics can be derived from the basic statistical principles in statistical physics as the law of "axiom physics".
Photons or attractors have a mode but no obstruction, according to the definition of mode and obstruction. There is no attraction between them. The four forces can be described uniformly.
The drift velocity of the particles is constant with respect to any inertial system. The speed of the current is the drift speed (speed of light) of the photon that the electron creates or annihilates.
The modal-velocity equation or the mass-velocity equation in relativity theory of the object can prove that the relativity principle is not applicable to any inertial system.
From the first law of the essence of Liu Zhi He, the low-speed inertial system approximately satisfies the principle of relativity. The principle of relativity is not a common rationale.
From the second law of the nature of Liu's intelligence and the acceleration values of the spacecraft, the speed of the solar system in the true-static system is 109.6 km/s.
The two laws of the object essence of Liu Zhi He derive all laws and principles of classical mechanics, and fundamentally change the understanding of people on the object essence.
The photon's drift replaces its "electromagnetic wave". Unit fractions jointly replace "quantum fields" without mass, modality, energy and momentum.
The two laws of particle nature of Liu Zhi connotation deduce all axioms and principles of quantum mechanics, and fundamentally changes people's understanding of particle nature.
The theory of particle entry and exit derives the principle of local regulation, which explains the factors of various forces generated by particle entry and exit and the over-distance action of the side-by-side repulsion.
The above "physical and chemical physics" is the theoretical basis for the "method for constructing an urban intelligent traffic network" in the invention.
The display with microcomputer function is made by combining the display and the integrated circuit card or the optical memory card, and is called as a micro-control display, which is called as a control display for short. It is a novel IC card; the display device not only has the functions of data processing and storage, but also has the function of display.
The control display device adopts an information encryption system, a digital signature and an access control strategy; and performs security level management on various information transmitted by means of an application layer. It can also perform corresponding security encryption according to different security levels of some sections in a message. The safety control software stored in the display controller has the function of checking the personal identification number to determine the legality of the holder. It can contain and display the second generation ID card number of the person and the personal photo therein, and implement real name system. Due to its high storage capacity, it is sufficient to keep a record of each transaction in memory. The control display device not only needs to be online for information processing, but also does not need to be online for authorization processing. Thus allowing it to be used off-line.
Each control display device has input and output interfaces which are matched with each other. And the communication between the two devices can be realized directly through information interaction. The display control device solves four key technical problems of information security, authenticity, anonymity and separability.
The control display stores safety control software and has the functions of checking identity and confirming the legality of the holder.
The existing IC card can not display the information of traffic state, and can not prevent the phenomena of forged IC card, etc.
Each control display device or dedicated network of the urban intelligent traffic control network is called a traffic calling machine in the urban intelligent traffic control network. It corresponds to a virtual local area network, called a traffic caller network.
In a traffic caller or private network, we set the functions of the specific software to be: wirelessly connected with the internet and controlling a traffic caller or a private network, and interconnecting, intercommunicating and interoperating with the internet. This particular software is called a traffic controller. The traffic controller has a function of encrypting (or decrypting) information sent to (or received from) another traffic calling machine of the urban intelligent traffic network from among the traffic calling machines of the urban intelligent traffic network and then forwarding the encrypted information to the internet (or the traffic calling machines), other functions of the urban intelligent traffic network, and the like, can contain antivirus software or programs for processing various information streams, and the like, and can have a function of running a plurality of traffic calling machines concurrently.
And different traffic calling machines of the urban intelligent traffic network are respectively connected with the Internet through traffic controllers. This constitutes the private network of the urban intelligent transportation network. The information sent by each traffic calling machine in the urban intelligent traffic network is sent to the traffic controller of the urban intelligent traffic network for encryption processing, then transmitted through the Internet, then decrypted by the traffic controller at the receiving end, restored into the original information and forwarded to the traffic calling machine at the receiving end.
The information sent to each traffic controller of the internet is decrypted and restored into the original information through the traffic controller of the receiving end, the safety of the information is confirmed after viruses are checked, and the information is forwarded to the traffic controller, so that the safety of the information is ensured.
Existing firewalls (including hardware devices, associated software code and security policies) or virtual private network technologies are easily overcome by hacker "anti-port" technologies, and intrusion into the urban intelligent transportation network behind the firewall is one of the major drawbacks.
The existing virtual private network technology can not act on the destruction and the deception of illegal network internal resource access implemented by disguised addresses; it is also unavoidable that hackers bypass the authentication and authentication mechanism, disguise the identity, and destroy existing connections.
Drawings
Fig. 1 is a schematic diagram of a display controller. They are equipped with a microprocessor and a memory for identification and control software, respectively, and with reading and writing devices and liquid crystal displays, etc. A digital input interface in the control display receives a TMDS digital signal output by a TMDS transmitter in an external computer; sending to a TMDS receiver in a mainboard of the liquid crystal display; the input clock signal of which is fed to a clock generator. The digital signal is decoded and sent to an image scaling processor of the main control circuit for processing; making it possible to adapt to the digital signal of the physical resolution of the liquid crystal panel. The liquid crystal panel interface circuit sends the converted digital video signal to a timing circuit and a driving control circuit of the liquid crystal panel; driving the liquid crystal display; characters and images are displayed on the liquid crystal display screen.
FIG. 2 is a diagram of an urban intelligent transportation network database automation scheme. It is composed of RF receiver, demodulator, preamplifier, power amplifier and RF oscillator. Radio frequency devices are microwave generating, transmitting and receiving devices. It is mainly composed of radio frequency oscillator, power amplifier, radio frequency receiver, detection demodulator and preamplifier. The signal generated by the antenna is changed into a high-frequency carrier signal through a radio frequency oscillator, and then is amplified by a power amplifier (or a radio frequency processor) and transmitted through an antenna.
Fig. 3 shows a structure diagram of an urban intelligent traffic control network. In the urban intelligent traffic control network, each traffic calling machine is communicated, interconnected and interoperated with the Internet through a traffic controller, so that a safe, reliable and information interoperation urban intelligent traffic control private network is constructed. The system comprises an Internet, a database server, a traffic calling machine and the like, which form an urban intelligent traffic control network.
The secure and accurate communication over the internet between different traffic callers of an intelligent urban transportation network (fig. 3) is as follows:
information sent from the source end of any traffic calling machine in the urban intelligent traffic network; a source end traffic controller which is provided with a program of a check program and a source end encryption program at a source end is reached; after virus elimination and encryption; through the internet; to a host traffic controller provided with a host decryption program and a program of an inspection program; after decryption and virus checking; and transferring to a host traffic calling machine.
In the urban intelligent traffic network system, traffic controllers are provided with the same standard programs of ' inspection program ', source end encryption program ' and ' host end decryption program '. Therefore, each traffic controller can monitor information entering and exiting the urban intelligent traffic network and refuse illegal access to the urban intelligent traffic network.
In the urban intelligent traffic network system, each traffic controller can also be provided with the same standard program of 'procedure for authenticating, encrypting and authorizing urban intelligent traffic network' and all the standard programs are provided with an IP address table of each traffic controller and an access control list of each address of the system. Therefore, each traffic controller can monitor the information entering and exiting the urban intelligent traffic network system and refuse illegal access to the urban intelligent traffic network system.
Program of examination program function: the source traffic controller, upon receiving the plaintext information, examines the information and, after finding the programs therein, arranges them together and temporarily stores them in an external memory while presenting them on the display screen of the computer. If the programs are legitimate programs that allow their access; the user selects the "allow later" option when the prompt first appears, and the traffic controller encounters these programs later, does not query again, and allows access. When the user does not reply or selects the "not allowed" reply option within a certain time, the traffic controller discards the program.
After the traffic controller is installed with the program of the inspection program, the virus can be prevented from attacking the traffic calling machine network protected by the traffic controller.
Function of source encryption program: a source end traffic controller adds a symmetric encryption key behind plaintext information to be sent through the Internet; inputting the combined data into a one-way hash function to obtain a hash value (source hash value); adding a source hash value behind plaintext information (not containing a key), and encrypting by using the key to obtain a ciphertext; and finally sending the ciphertext to a host end traffic controller.
The "host decryption program" function: the host traffic controller decrypts the received ciphertext into a plaintext by using a shared key negotiated in advance to obtain plaintext information and a source hash value; adding a key behind the plaintext information (not containing the hash value); inputting the combined data into a one-way hash function agreed in advance to obtain a hash value (a host hash value); the sink hash value is compared with the received source hash value; if the two hash values are the same; confirming that the message is sent from a legal source-end traffic calling machine, and receiving the message; and sending the information to the host traffic calling machine, otherwise, discarding the information.
The simplest method for identity authentication is to establish a user name and password database in each traffic controller.
And each traffic controller of the urban intelligent traffic network carries out identity verification by accessing the control list. The list simply identifies the identities of the different types of source virtual networks (represented by traffic controller IP addresses).
Authentication controls who can access the urban intelligent transportation network. Authorization specifies what the user can do after being qualified to access the intelligent transportation network.
The new method of identity authentication and authorization is to establish a database of user names, IP addresses, passwords and authorization rights.
1. The business headquarters network of the urban intelligent traffic network and the internal networks (traffic calling machines) distributed at different positions are connected with the Internet in a wireless way through traffic controllers respectively, so that a safe and reliable urban intelligent traffic control network system with information interoperation is constructed (figure 3). Information between two hosts in different traffic controllers of the network can be safely and accurately interconnected, intercommunicated and interoperated through the Internet.
The urban intelligent traffic network system is characterized in that information transmitted on the Internet is subjected to encryption processing, complete inspection and identity authentication; the confidentiality, the integrity and the authenticity of information are ensured; has the capability of resisting the hacking attack on the network.
The traffic caller sends the required results to the browser in a hypertext transfer protocol (HTTP) search. The browser writes data on the control display device arranged on the browser, and characters or images are displayed by the liquid crystal display of the control display device.
In the urban intelligent traffic network system, various anti-virus software can be installed in a traffic controller to monitor the Internet system in real time; and regularly updating a virus information base of the anti-virus software so as to furthest protect the system from being attacked by the virus. In case that a certain traffic controller is attacked by viruses on the Internet, only the traffic controller is paralyzed, and the normal operation of other traffic controllers is not influenced.
The traffic controller of the urban intelligent traffic network can also record all external accesses in detail; while preventing illegal access to external information on the internet. It makes the access of external computer to traffic calling machine only concentrate on traffic controller. This ensures the reliability and security of all other computers on the traffic controller. The traffic controller also allows the traffic caller connected thereto to transmit and receive encrypted information from the traffic controller for other services of the system via the internet.
The traffic controller of the urban intelligent traffic calling machine network sends information to the traffic controller of another intelligent traffic calling machine, the information content is firstly encrypted by the traffic controller of the sender, then the router checks the address of the destination, and then the information content is sent to another traffic controller through the Internet. When the information arrives, the router of the receiving party judges whether the information is allowed to pass according to the IP address of the sending party. And after the traffic controller of the receiver verifies the information and decrypts the information, the information is transferred to a traffic calling machine for processing. This network technology allows multiple decentralized traffic controllers to build a private network of urban intelligent traffic using the internet as the line of its intelligent network.
The traffic controller of the urban intelligent traffic network system not only contains a program of a browser, but also can encode transmission data by adopting an information verification code technology, thereby ensuring the integrity of information which is attacked maliciously. The typical encoding mechanism is a cryptographic hash mechanism. It is loaded with a browser program and some application programs. A program for checking viruses on the traffic controller, which allows users of the internet to access the traffic controller according with conditions; and also allows the traffic calling machine of the urban intelligent traffic network to directly access the outside.
Backup software of the urban intelligent transportation network provides complete data protection. The method has the technical characteristics of flexible setting, disaster recovery, parallel processing, reliable data, simple and convenient use, monitoring capability, system data recovery and the like.
The control display device comprises a micro traffic controller, an input key, a small liquid crystal display (figure 1) and the like. It may also have radio frequency transceiving and its associated circuitry. The single chip microcomputer has the functions of reading, writing, processing information and other conventional computers.
The integrated circuit of the display controller contains the basic components and circuits of the main microcomputer such as microprocessor, random access memory, read only memory, interrupt system, timer/counter and input/output. The circuits of all the components are connected together through an address bus, a data bus and a control bus, and then are communicated with the circuit of an external computer through an input/output interface.
The micro traffic controller on the control display has the important function of controlling the liquid crystal display to display characters and images, is not only responsible for the overall coordination and control of the control display, but also bears the control of reading and storing the numbers and parameters of the control display.
The display control device is different from the external data interface of the browser in reading and writing modes and can be divided into two categories, namely a contact type category and a non-contact type category.
The processed line synchronizing signal in the LCD main control circuit of the display controller is sent to the phase-locked loop type clock generator circuit, so that the generated clock pulse is locked with the input line synchronizing signal; the other path is sent to the screen display circuit. The line/field synchronizing signal required by the screen display circuit is not directly taken from the line/field synchronizing signal input from the outside, but taken from the line/field synchronizing signal output by the main control circuit. Even if the LCD has no signal input, the line/field synchronizing signal from the main control circuit to the on-screen display circuit is generated in the image scaling processor based on the pre-programmed timing data to ensure normal on-screen display and menu display of the LCD.
Each traffic controller of the urban intelligent traffic network independently records the condition of each urban intelligent traffic calling machine network. And finally summarizing every day, and informing the result of a specific traffic controller in the designated urban intelligent traffic network system. And the special traffic controllers of the urban intelligent traffic network are collected and stored.
The automatic scheme (figure 2) of the urban intelligent traffic network database consists of a radio frequency receiver, a detection demodulator, a preamplifier, a power amplifier, a radio frequency oscillator and the like. It is composed of RF receiver, demodulator, preamplifier, power amplifier and RF oscillator. Radio frequency devices are microwave generating, transmitting and receiving devices. It is mainly composed of radio frequency oscillator, power amplifier, radio frequency receiver, detection demodulator and preamplifier. The intelligent traffic data storage system is a place for processing and storing urban intelligent traffic network data.
The reader or computer is typically referred to as an application, database, or file server. It is also used to represent traffic callers that can read data from online storage and transmit the data to various urban intelligent transportation networks. Meanwhile, the method can also be used as backup of the urban intelligent traffic network database.
The main backup server of the urban intelligent traffic network is used for arranging backup and recovery work and maintaining a storage medium of data.
The software of the control display of the urban intelligent traffic network has the same software of code adding, encryption, modulation and demodulation, decryption, decoding and the like. The control display also has encryption and decryption software for the secure encryption algorithm of the control display. It uses a Personal Identification Number (PIN) to identify the identity of the bearer. And the important data in the display control device is encrypted and then is added with an information identification code MAC. The control display device checks the identification code, can recognize whether the control display device is tampered and displays the identification code on the liquid crystal display of the control display device.
The minimized transmission differential signal adopted by the liquid crystal display (figure 1) of the control display of the urban intelligent traffic network is not only suitable for the digital signal interface of the main board on the liquid crystal display, but also needs a transmitter and a receiver when carrying out digital transmission.
A digital input interface of a liquid crystal display in a control display of the urban intelligent traffic network receives TMDS digital signals output by a TMDS transmitter in an external computer; sending to a TMDS receiver in a mainboard of the liquid crystal display; the output clock signal is sent to a clock generator. The digital signal is decoded and sent to an image scaling processor of the main control circuit for processing. The main control circuit judges the format of the input image signal and performs operations such as scaling processing, image positioning and the like on the image.
The service system of the urban intelligent traffic network applies modern computer technology, communication technology and internet technology and can provide convenient and fast urban intelligent traffic service for urban vehicles. The urban intelligent traffic network provided by the system fully embodies fairness, openness and justice. Various encryption anti-counterfeiting and security technologies of the system can thoroughly prevent unsafe factors of information and ensure safety, reliability and no leakage.

Claims (10)

1. A method for constructing urban intelligent traffic network (intelligent traffic network) is characterized by that it adopts new network interconnection technique to implement interconnection, intercommunication and interoperation of various networks of traffic controllers or special networks of various vehicles (including bus, truck, passenger car and car) controlled by a certain urban intelligent traffic network, and utilizes the Internet to construct a private network of said urban intelligent traffic network.
The intelligent traffic network system is technically characterized in that: the method comprises the steps that each scattered traffic calling machine forms a safe and reliable intelligent traffic network with interconnection, intercommunication and interoperation through a traffic controller and the Internet; wherein the traffic calling machine is wirelessly connected with the Internet; it can defend against various viruses and trojan attacks; each traffic calling machine is logically isolated from the Internet through the control function of the traffic controller, and performs information interoperation by utilizing the Internet; the traffic controller can ensure the safety of the intelligent traffic network and the effectiveness, reliability and confidentiality of various information;
traffic calling machine in intelligent transportation network, its technical characterstic: a virtual network system is formed by adopting a local area network technology for a plurality of running and identifying software, servers, clients, browsers and the like of each automobile;
traffic controller in traffic calling machine, its technical characterstic: it is a component (containing several special softwares) for making wireless interconnection between traffic calling machine and Internet, and controlling safe and reliable interoperation of various informations between traffic calling machine and Internet; the traffic controller is provided with a standard program which transmits (or receives) information of any protected traffic calling machine in the intelligent traffic network to another traffic calling machine of the network, encrypts (or decrypts) the information and then transmits the information to the Internet (or the traffic calling machine); it may also contain software to handle viruses and trojans [ programs to check programs ];
the anti-virus security software is characterized in that: standard procedures with protection against viruses and information security; the standard procedure was:
program of inspection program software functions: after receiving the plaintext information, the traffic controller of the source end or the host end checks the information, arranges any programs in the information together after finding the programs, temporarily stores the programs in an external memory, and simultaneously presents a first program on a display screen of specified software; if some programs are legitimate programs that allow their access; when the prompt appears for the first time, the user selects the 'all-after-permission' reply option, and when the traffic controller encounters the programs later, the user does not inquire again and allows the access; when the user does not answer or selects the 'disallow' reply option within a certain time, the traffic controller discards the program; the source end traffic controller and the host end traffic controller run the program, so that the intelligent traffic network protected by the traffic controller can be prevented from being attacked by viruses;
in the intelligent transportation network, the safe and reliable communication between the various transportation calling machines through the internet is as follows:
information sent from source software in the traffic caller; the source end traffic controller which is provided with a program of a check program and a program of a source end encryption program at the source end is reached through a source end traffic calling machine; after virus elimination and encryption; through the internet; to a sink traffic controller loaded with a [ sink decryption program ] and a [ program of inspection program ]; after decryption and virus checking; transferring to a host traffic calling machine; the traffic controller monitors the information of the traffic calling machine in the intelligent traffic network protected by the traffic controller, and refuses the illegal access to the traffic calling machine;
the system for controlling the intelligent transportation network automation service is formed by connecting a plurality of identification devices and a piece of general software through a transmission medium in a short distance according to the physical topological structure of a transportation calling machine; each identification device is fixedly distributed in a monitoring area and respectively undertakes the identification tasks of various safe operation conditions of an operation automobile in one monitoring area in the intelligent traffic network system; the traffic calling machine in the intelligent traffic network comprises operating system software, a database and management software thereof and language processing software; through the GPS positioning function, a specific intelligent traffic task can be processed in time, and the identification equipment is driven to implement automatic safe traffic operation; software or identification equipment in the traffic calling machine can control and manage each automatic operation unit of the intelligent traffic network in real time; the intelligent traffic network operation process or the intelligent traffic network operation task can be decomposed into some simple tasks; they are carried out according to certain steps; each step is implemented according to a certain safe traffic sequence; it is composed of one or several procedures arranged in sequence; the process is a basic unit forming the intelligent transportation network and is the most basic process in the operation of the intelligent transportation network; the method is also a basic unit for making an intelligent transportation network operation plan and carrying out economic accounting; for the operation service of the intelligent transportation network, different methods and steps to be solved in the operation process are different, and different intelligent transportation operation schemes can be formulated; therefore, the method of the intelligent transportation network operation process must be considered, and a proper operation scheme is selected and various parameters of the intelligent transportation operation are set; the intelligent traffic process consists of program segments; wherein each instruction has a fixed format; the instruction formats of different programs of intelligent transportation can also be different; an intelligent traffic instruction needs to be written according to the format of the intelligent traffic;
the wireless radio frequency identification of an operating automobile is a non-contact automatic identification technology; the radio frequency identification device reads information stored in an electronic tag through radio communication between a radio frequency and a reader which is a few centimeters to a few meters away, and identifies various conditions, people and appliances of an operating automobile represented by the electronic tag; the RFID technology can identify high-speed moving objects and a plurality of labels, can work in various severe environments, and is quick and convenient in automatic operation; the RFID technology consists of an electronic tag and identification equipment, and is suitable for non-contact data acquisition and exchange occasions;
the tag consists of a microwave antenna, a reflection modulator, an encoder, a microprocessor and a memory; storing related technical parameters and identification information of various conditions of the identified operating automobile in a memory of the tag;
the identification equipment consists of an antenna, a radio frequency device and a reader and can identify the electronic tag; the device is composed of more than one processor connected together by topological structure lines; each processor undertakes at least one intelligent traffic function of the intelligent traffic network identification equipment; each processor can independently run programs, and can exchange information with other processors through a communication medium line or a shared memory, coordinate steps and complete the intelligent traffic task borne by the identification equipment in real time.
2. The intelligent transportation network tag of claim 1, which is replaced with a display tag to form a display tag intelligent transportation network; the technical characteristics are as follows: the microwave antenna, the reflection modulator, the encoder, the microprocessor and the memory; storing the related technical parameters and identification information of the identified object in a memory, and also containing certain additional information; the encoder has a function of writing data; the tag has a display, and combines tag technology and display technology, so that the tag has a function of displaying various related information of an identified object; the intelligent traffic information display system can display information of various intelligent traffics; according to different functions, the display labels are divided into: the display device comprises an active display label, a passive display label, a read-only display label and a read-write display label; the label technology and the display technology are combined, so that the label has the function of displaying various related information of the identified object;
the signal generated by the radio frequency device is changed into a high-frequency carrier signal through a radio frequency oscillator, and then is amplified by a power amplifier and transmitted out through an antenna; after receiving the carrier signal sent by the identification equipment, the display label is activated by the inquiry signal, quickly enters a working state, and reflects the identification information compiled in the display label back to the identification equipment; an antenna of the identification device receives a signal reflected by the display tag, a radio frequency receiver performs transceiving separation, then demodulation and demodulation are performed, and the signal is amplified through a preamplifier and sent to a reader for processing; the reader is essentially read-out software; the antenna is a transmitting and receiving device for data transmission exchange between the display tag and the radio frequency device.
3. The intelligent transportation network of claim 1 wherein the identification device is replaced with an intelligent device; the technical characteristics of the intelligent equipment are as follows: adopting a single processor structure system; the system consists of a microprocessor connected together by some physical topological structure; the intelligent traffic network identification system can independently run the assembly program, can exchange information with other processors through a communication medium line or a shared memory, coordinates steps and completes the task of intelligent traffic network identification in real time.
4. The intelligent transportation network as claimed in claim 1, wherein the technical features are: adding software of a source end encryption program in a dialectic machine;
source-side encryption program software functions: a source end traffic controller adds a symmetric encryption key behind plaintext information to be sent through the Internet; inputting the combined data into a one-way hash function to obtain a source end hash value; adding a source hash value behind plaintext information which does not contain the key, and encrypting the plaintext information by using the key to form a ciphertext; finally, sending the ciphertext to a host end traffic controller;
host decryption program software functions: the host traffic controller decrypts the received ciphertext into a plaintext by using a shared secret key agreed in advance to obtain plaintext information and a source hash value; adding a key behind plaintext information which does not contain a hash value; inputting the combined data into a one-way hash function agreed in advance to obtain a host hash value; the sink hash value is compared with the received source hash value; if the two hash values are the same; confirming that the information is sent from a legal source end traffic controller, and receiving the information; otherwise, discarding the information;
the secure and accurate communication between two traffic callers protected by a traffic controller over the internet is as follows:
the source end traffic controller connected with the protected network is provided with a program of a check program, a source end encryption program and a sink end decryption program, can defend viruses and encrypt various information, only allows the information in the source end protected network to enter the Internet after being encrypted;
the host end traffic controller connected with the protected network is provided with a program of a check program, a source end encryption program and a host end decryption program, can defend viruses and decrypt various information coming from the Internet, and only allows software information in the source end network appointed by the protected network or a partner of other source ends of the enterprise or the organization to enter receiving software in the host end protected network after decryption.
5. The intelligent transportation network as claimed in claim 1, wherein the identity authentication is added, and the technical characteristics are as follows: an access control list (including a user name and password database) is built in the dialer.
The traffic controller performs authentication by accessing the control list. The username and password database list simply identifies the identity of the different types of source protected networks (represented by their traffic controller IP addresses). The traffic controller accesses the control list for authentication of the user. The list identifies different types of source (username) traffic controller IP addresses and user passwords. Address-based authentication is guaranteed to take effect only if the username, IP address, and password of the user are the same as in the access control list.
6. The intelligent transportation network as claimed in claim 1, wherein the flexible intelligent transportation network is constructed by adopting object-oriented modularization; the technical characteristics are as follows: software in the intelligent traffic network unit adopts object-oriented modular design, so that the intelligent traffic network unit has large functional coverage and enhanced tailorability, and is convenient for meeting the requirements of different operation automobile users; the flexible performance of the intelligent transportation network unit is realized; it can have a system for tracking moving objects.
7. The intelligent transportation network as claimed in claim 1, wherein a simulation technology is adopted to construct a simulation intelligent transportation network; the technical characteristics are as follows: the simulation technology carries out static or dynamic simulation on the structure and the operation of the intelligent traffic network through software, thereby predicting or evaluating the behavior effect of the operation of the intelligent traffic network and providing information and basis for decision making; efficient modeling is one of the core competitiveness of intelligent traffic network units; automatic control-feedback is carried out in each link of the operation.
8. The intelligent transportation network traffic calling machine of claim 1, which employs a neutral platform technology to construct a neutral platform intelligent transportation network; the technical characteristics are as follows: the traffic calling machine provides a neutral mechanism platform independent of a specific intelligent traffic network, and is a brand-new intelligent traffic network concept; the intelligent traffic network system code is transmitted to the software through the network, then the intelligent traffic network system task is distributed to the corresponding operating automobile with the intelligent traffic network equipment by the software, and then the intelligent traffic network equipment completes the task.
9. The intelligent transportation network traffic calling machine of claim 1, wherein a video intelligent transportation network is constructed by adopting a video technology; the technical characteristics are as follows: in order to monitor the running state of the intelligent traffic running equipment controlled in a traffic calling machine in an intelligent traffic network, a camera can be arranged on the equipment; and the video in the traffic calling machine is published in real time by adopting a multimedia technology.
10. The intelligent transportation network traffic calling machine of claim 1, wherein an order processing intelligent transportation network is constructed by adopting an order processing private network; the technical characteristics are as follows: in the intelligent traffic network, each virtual network of a plurality of branches distributed at different geographic positions and a private network for processing unit orders respectively pass through a traffic controller and the Internet; which assigns specific tasks to the respective operating cars.
CN202111372891.XA 2021-11-10 2021-11-10 Method for constructing urban intelligent traffic network Pending CN114024797A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111372891.XA CN114024797A (en) 2021-11-10 2021-11-10 Method for constructing urban intelligent traffic network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111372891.XA CN114024797A (en) 2021-11-10 2021-11-10 Method for constructing urban intelligent traffic network

Publications (1)

Publication Number Publication Date
CN114024797A true CN114024797A (en) 2022-02-08

Family

ID=80065305

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111372891.XA Pending CN114024797A (en) 2021-11-10 2021-11-10 Method for constructing urban intelligent traffic network

Country Status (1)

Country Link
CN (1) CN114024797A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160379486A1 (en) * 2015-03-24 2016-12-29 Donald Warren Taylor Apparatus and system to manage monitored vehicular flow rate
CN111709848A (en) * 2020-06-21 2020-09-25 刘文祥 Intelligent factory controlled by Internet
CN113222491A (en) * 2021-03-22 2021-08-06 刘智和 Method for constructing network logistics

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160379486A1 (en) * 2015-03-24 2016-12-29 Donald Warren Taylor Apparatus and system to manage monitored vehicular flow rate
CN111709848A (en) * 2020-06-21 2020-09-25 刘文祥 Intelligent factory controlled by Internet
CN113222491A (en) * 2021-03-22 2021-08-06 刘智和 Method for constructing network logistics

Similar Documents

Publication Publication Date Title
Krelina Quantum technology for military applications
Terashima et al. Einstein-Podolsky-Rosen correlation in a gravitational field
Yamamoto et al. Quantum information science and technology in Japan
Frolov et al. Proof of the generalized second law for quasistationary semiclassical black holes
Zhou et al. Logarithmic encryption scheme for cyber–physical systems employing Fibonacci Q-matrix
DE112019001441T5 (en) FORGETTABLE PSEUDO ACCIDENT FUNCTION IN A KEY MANAGEMENT SYSTEM
CN102546600A (en) Deputy-based encryption, decryption method, network equipment, network device and system
Agnesi et al. Exploring the boundaries of quantum mechanics: advances in satellite quantum communications
Lanzagorta Quantum information in gravitational fields
CN111709848A (en) Intelligent factory controlled by Internet
Chen et al. Deterministic joint remote preparation of an arbitrary three-qubit state via EPR pairs
CN113222491A (en) Method for constructing network logistics
Yu et al. Quantum algorithm for approximating maximum independent sets
Wang et al. Quantum algorithms: overviews, foundations, and speedups
Kim et al. Quantum messages with signatures forgeable in arbitrated quantum signature schemes
CN114024797A (en) Method for constructing urban intelligent traffic network
CN114119254A (en) Method for constructing medical service intelligent network
CN114331664A (en) Method for constructing training service intelligent network
Michal Quantum technology for military applications
Chen et al. An efficient verifiable quantum secret sharing scheme via quantum walk teleportation
CN115695164A (en) Method for constructing customized product system intelligent network
CN114567654A (en) Method for constructing intelligent network of endowment service system
CN115426241A (en) Method for constructing intelligent network of environmental pollution prevention and control system
CN113947004A (en) Method for constructing intelligent network of catering service
CN113888215A (en) Method for constructing chain operation intelligent network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination