We propose a wide class of distillation schemes for multi-partite entangled states that are CSS-states. Our proposal provides not only superior efficiency, but also new insights on the connection between CSS-states an...
详细信息
ISBN:
(纸本)0780391500
We propose a wide class of distillation schemes for multi-partite entangled states that are CSS-states. Our proposal provides not only superior efficiency, but also new insights on the connection between CSS-states and bipartite graph states. We then consider the applications of our distillation schemes for two cryptographic tasks - namely, (a) conference key agreement and (b) quantum sharing of classical secrets. In particular, we construct "prepare-and-measure" protocols. Also we study the yield of those protocols and the threshold value of the fidelity above which the protocols can function securely. Surprisingly, our protocols function securely even when the initial state does not violate the standard Bell-inequalities for GHZ states. Experimental realization involving only bipartite entanglement is also suggested
This paper is concerned with the derivation of the kinematics model of the University of Tehran-Pole Climbing Robot (UT-PCR). As the first step, an appropriate set of coordinates is selected and used to describe the s...
详细信息
This paper is concerned with the derivation of the kinematics model of the University of Tehran-Pole Climbing Robot (UT-PCR). As the first step, an appropriate set of coordinates is selected and used to describe the state of the robot. Nonholonomic constraints imposed by the wheels are then expressed as a set of differential equations. By describing these equations in terms of the state of the robot an underactuated driftless nonlinear control system with affine inputs that governs the motion of the robot is derived. A set of experimental results are also given to show the capability of the UT-PCR in climbing a stepped pole.
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only tw...
详细信息
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states—the vacuum and a weak decoy state—asymptotically approaches the theoretical limit of the most general type of decoy state protocol (with an infinite number of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long-distance (larger than 100 km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.
We derive lower limits on the inefficiency and classical communication costs of dilution between two-term bipartite pure states that are partially entangled. We first calculate explicit relations between the allowable...
详细信息
We derive lower limits on the inefficiency and classical communication costs of dilution between two-term bipartite pure states that are partially entangled. We first calculate explicit relations between the allowable error and classical communication costs of entanglement dilution using a previously described protocol, then consider a two-stage dilution from singlets with this protocol followed by some unknown protocol for conversion between partially entangled states. Applying overall lower bounds on classical communication and inefficiency to this two-stage protocol, we derive bounds for the unknown protocol. In addition we derive analogous (but looser) bounds for general pure states.
There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distributio...
详细信息
There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most of those experiments secure by using essentially the same hardware. Our method is to use decoy states to detect eavesdropping attacks. As a consequence, we have the best of both worlds—enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing even some of the best experimental performances reported in the literature.
Although structural constraints such as model order and time delay have been incorporated in the continuous time system identification since its origin, the constraints on the estimated model parameters were rarely en...
详细信息
For multi-input, multi-output stochastic systems, by means of auxiliary models - finite impulse response (FIR) models, we develop an identification algorithm to estimate the FIR model parameters of each entry (sub-sub...
详细信息
For multi-input, multi-output stochastic systems, by means of auxiliary models - finite impulse response (FIR) models, we develop an identification algorithm to estimate the FIR model parameters of each entry (sub-submodel) of transfer matrices with an increasing order for the FIR model. The basic idea is to use auxiliary models to predict/estimate the outputs of the sub-submodels, and further to use the recursive least squares algorithm or the Pade approximation method to produce the parameter estimates of sub-submodels. Some simulation results are included.
In this paper, we focus on the issue of adaptive H ∞ -control design for a class of linear parameter-varying (LPV) systems based on the Hamiltonian-Jacobi-Isaac (HJI) method. By combining the idea of polynomially par...
详细信息
In this paper, we focus on the issue of adaptive H ∞ -control design for a class of linear parameter-varying (LPV) systems based on the Hamiltonian-Jacobi-Isaac (HJI) method. By combining the idea of polynomially parameter-dependent quadratic functions and vector projection method to derive an adaptive H ∞ -control, sufficient conditions with high precision are given to guarantee both robust asymptotic stability and disturbance attenuation of the LPV systems with unknown constant parameters. The applicability of the proposed design method is illustrated on a simple example.
In this paper, we deal with the issue of robust delay-independent asymptotic stability and robust disturbance attenuation problem for linear parameter-dependent systems. Using Hamiltonian-Jacoby-Isaac approach, a para...
详细信息
In this paper, we deal with the issue of robust delay-independent asymptotic stability and robust disturbance attenuation problem for linear parameter-dependent systems. Using Hamiltonian-Jacoby-Isaac approach, a parameter-dependent LMI optimization is obtained. It is shown that by utilizing polynomial parameter-dependent quadratic Lyapunov functions, a parameter-dependent LMI optimization problem is derived. Therefore, state feedback control is determined by solving a parameter-independent LMI. Finally, the applicability of the proposed design is illustrated on a simple example
Many researchers have been interested in approximation properties of fuzzy logic systems (FLS), which like neural networks, can be seen as approximation schemes. Almost all of them tackled Mamdani fuzzy model, which w...
详细信息
Many researchers have been interested in approximation properties of fuzzy logic systems (FLS), which like neural networks, can be seen as approximation schemes. Almost all of them tackled Mamdani fuzzy model, which was shown to have many interesting features. This paper aims to present an alternative for traditional inference mechanisms and CRI method. The most attractive advantage of this new method is its higher robustness with respect to changes in rule base and ability to operate when latter is sparse. In this paper interpolation with high order polynomials and /spl beta/-function is reported.
暂无评论