We perform decoy-state quantum key distribution between a low-Earth-orbit satellite and multiple ground stations located in Xinglong, Nanshan, and Graz, which establish satellite-to-ground secure keys with ∼kHz rate ...
详细信息
We perform decoy-state quantum key distribution between a low-Earth-orbit satellite and multiple ground stations located in Xinglong, Nanshan, and Graz, which establish satellite-to-ground secure keys with ∼kHz rate per passage of the satellite Micius over a ground station. The satellite thus establishes a secure key between itself and, say, Xinglong, and another key between itself and, say, Graz. Then, upon request from the ground command, Micius acts as a trusted relay. It performs bitwise exclusive or operations between the two keys and relays the result to one of the ground stations. That way, a secret key is created between China and Europe at locations separated by 7600 km on Earth. These keys are then used for intercontinental quantum-secured communication. This was, on the one hand, the transmission of images in a one-time pad configuration from China to Austria as well as from Austria to China. Also, a video conference was performed between the Austrian Academy of sciences and the Chinese Academy of sciences, which also included a 280 km optical ground connection between Xinglong and Beijing. Our work clearly confirms the Micius satellite as a robust platform for quantum key distribution with different ground stations on Earth, and points towards an efficient solution for an ultralong-distance global quantum network.
We introduce a novel distributed control architecture for disturbances attenuation in heterogeneous platoons of linear and time-invariant autonomous agents that inherits the performance achievable by the leader-follow...
Norm optimal iterative learning control(NOILC) has recently been applied to iterative learning control(ILC) problems in which tracking is only required at a subset of isolated time points along the trial duration. Thi...
详细信息
Norm optimal iterative learning control(NOILC) has recently been applied to iterative learning control(ILC) problems in which tracking is only required at a subset of isolated time points along the trial duration. This problem addresses the practical needs of many applications, including industrial automation, crane control, satellite positioning and motion control within a medical stroke rehabilitation context. This paper provides a substantial generalization of this framework by providing a solution to the problem of convergence at intermediate points with simultaneous tracking of subsets of outputs to reference trajectories on subintervals. This formulation enables the NOILC paradigm to tackle tasks which mix "point to point" movements with linear tracking requirements and hence substantially broadens the application domain to include automation tasks which include welding or cutting movements, or human motion control where the movement is restricted by the task to straight line and/or planar segments. A solution to the problem is presented in the framework of NOILC and inherits NOILC s well-defined convergence properties. Design guidelines and supporting experimental results are included.
The article presents the material type from which the conductors of the overhead power lines are produced influences on the size of the overhang and the tension. The aim of the calculations was to present the benefits...
The article presents the material type from which the conductors of the overhead power lines are produced influences on the size of the overhang and the tension. The aim of the calculations was to present the benefits of the mechanics of the cable resulting from the type of cable used. The analysis was performed for two types of cables: aluminium with steel core and aluminium with composite core, twice span power line section. 10 different conductor-to-strand coil, wind, icing, and temperature variations were included in the calculations. The string description was made by means of a chain curve, while the horizontal component H of the tension force was determined using the bisection method. The loads were collected in accordance with applicable Eurocode.
It is well known that star sensor is an accurate attitude sensor in various real applications,which however has not been fully used to observe stars and the moon *** paper investigates how the moon and stars can be ob...
详细信息
ISBN:
(纸本)9781467383196
It is well known that star sensor is an accurate attitude sensor in various real applications,which however has not been fully used to observe stars and the moon *** paper investigates how the moon and stars can be observed by the star sensor,and how to process the images taken under different light conditions to extract information to determine attitude and location of the *** are conducted to show that the star sensor can be efficiently applied as an integrated celestial sensor,providing economical,reliable and autonomous benefits to the missions conducted on the earth,in the air,on other planets and so on.
In this study, the dynamics and control aspects of a spherical rolling robot's lateral motion are investigated. An approximate, simplified to a single plane, mathematical model is derived using Lagrange equations ...
In this study, the dynamics and control aspects of a spherical rolling robot's lateral motion are investigated. An approximate, simplified to a single plane, mathematical model is derived using Lagrange equations to check stability of the system. Utilizing the fusion of sensor data, a precise orientation measurement is achieved. Document focuses on a synthesis of a PID controller reducing sideway oscillations that occur in motion of a spherical robot with internal pendulum mechanism.
The Many Task Computing paradigm was first introduced by loan Raicu and could be described shortly as solving a large number of tasks with short time executions (i.e. seconds to minutes long) that are data intensive. ...
详细信息
control systems behavior can be analyzed taking into account a large number of parameters: performances, reliability, availability, security. Each control system presents various security vulnerabilities that affect i...
详细信息
control systems behavior can be analyzed taking into account a large number of parameters: performances, reliability, availability, security. Each control system presents various security vulnerabilities that affect in lower or higher measure its functioning. In this paper the authors present a method to assess the impact of security issues on the systems availability. A fuzzy model for estimating the availability of the system based on the security level and achieved availability coefficient (depending on MTBF and MTR) is developed and described. The results of the fuzzy inference system (FIS) are presented in the last section of the paper.
作者:
M PłaczekM MaćkowskiP NowakSilesian University of Technology
Faculty of Mechanical Engineering Institute of Engineering Processes Automation and Integrated Manufacturing Systems Konarskiego 18A 44-100 Gliwice Poland Silesian University of Technology
Faculty of Automatic Control Electronics and Computer Science Institute of Informatics Akademicka 16 44-100 Gliwice Poland
The goal of presented work was to build an electronic device in order to test the effectiveness of different EMC-improving solutions. Three EMC tests were done in order to check the created device compliance with the ...
The goal of presented work was to build an electronic device in order to test the effectiveness of different EMC-improving solutions. Three EMC tests were done in order to check the created device compliance with the electromagnetic compatibility directive. Each of them was conducted for both industrial and non-industrial parameters (voltage and field strength), according to IEC PN-EN 61000 standards. Three tests were done: conductive immunity test in EM clamp, radiated immunity test in GTEM chamber, radiated emission test in GTEM chamber. Firstly, the device's conductive immunity was examined. The set of possible solutions was created by examining existing designs, papers, books and producers' recommendations. In result, different component configurations were chosen to determine the most EMC-effective one. Next, electromagnetic compatibility of proposed device configurations was tested in the GTEM chamber (radiated immunity and radiated emission). Tests results are presented on charts and analysed in order to verify if designed device face requirements of the electromagnetic compatibility directive. It was verify which of proposed electromagnetic compatibility improving solutions can solve problems with electromagnetic compatibility.
The ongoing adoption of Cloud Computing at a fast rate has lead to an increase in the number of users and in the same time, in the level of complexity and performance. The interaction model is based on services offere...
详细信息
暂无评论