Quantum random numbers are a fundamental resource to security and cryptography. Based on the intrinsically random processes, quantum random number generators(QRNGs) provides an opportunity to certify genuine random ...
Quantum random numbers are a fundamental resource to security and cryptography. Based on the intrinsically random processes, quantum random number generators(QRNGs) provides an opportunity to certify genuine random numbers. All implementations of QRNGs that invoke device-independent(DI), the violation of Bell inequality are necessary to guarantee that the outcomes of the measurements cannot be determined in advance. For the single Clauser-Horne-Shimony-Holt(CHSH) inequality, it is not optimal with respect to randomness certification. Since local projective measurement are performed, one random bit can be certified from the maximally entangled two-qubit states. Recently, Andersson et al. [Phys. Rev. A 97, 012314(2018)] had proven that the device-independent certification can obtain two random bits through the maximum quantum violation of Gisin’s elegant Bell inequality. Here, we report a proof-of-principle realization of optimal randomness certification with practical photonic apparatus. In our experiment, we implement two kinds of qubit measurement, mutually unbiased bases(MUBs) and symmetric informationally complete positive operator-valued measures(SIC-POVM) of four-outcomes, respectively. Through randomness extractor, including Toeplitz-hashing extractor and an improved linear feedback shift register(LFSR), we finally extracted random bit string which have good uniformity and pass all randomness tests of the NIST.
Improving Q-factor of analogy of electromagnetically induced transparency (EIT-like) based on the symmetric and asymmetric quasi-dark mode has been numerically demonstrated. The Q-factor of EIT-like based on the symme...
详细信息
ISBN:
(纸本)9781538653746
Improving Q-factor of analogy of electromagnetically induced transparency (EIT-like) based on the symmetric and asymmetric quasi-dark mode has been numerically demonstrated. The Q-factor of EIT-like based on the symmetric quasi-dark mode (mirrored metasurface) is an order of magnitude larger than the Q-factor of EIT-like based on the asymmetric quasi-dark mode. The low radiative loss of the symmetric quasi-dark mode causes the improved Q-factor. Furthermore, the proposed way of improving the Q-factor has important application in microwave, terahertz and optical metasurface.
As a power and bandwidth efficient modulation scheme, the optical spatial modulation (SM) technique has recently drawn increased attention in the field of visible light communications (VLC). To guarantee the number of...
详细信息
The identity vector(i-vector) approach has been the state-of-the-art for text-independent speaker recognition, both identification and verification in recent years. An i-vector is a low-dimensional vector in the socal...
详细信息
The identity vector(i-vector) approach has been the state-of-the-art for text-independent speaker recognition, both identification and verification in recent years. An i-vector is a low-dimensional vector in the socalled total variability space represented with a thin and tall rectangular matrix. This paper introduces a novel algorithm to improve the computational and memory requirements for the application. In our method, the series of symmetric matrices can be represented by diagonal expression,sharing the same dictionary, which to some extent is analogous to eigen decomposition, and we name this algorithm Eigen decomposition like factorization(EDLF). Similar algorithms are listed for comparison, in the same condition,our method shows no disadvantages in identification accuracy.
A quality of service(QoS) guaranteed cross-layer resource allocation algorithm with physical layer, medium access control(MAC) layer and call admission control(CAC) considered simultaneously is proposed for the ...
详细信息
A quality of service(QoS) guaranteed cross-layer resource allocation algorithm with physical layer, medium access control(MAC) layer and call admission control(CAC) considered simultaneously is proposed for the full IP orthogonal frequency division multiple access(OFDMA) communication system, which can ensure the quality of multimedia services in full IP *** algorithm converts the physical layer resources such as subcarriers, transmission power, and the QoS metrics into equivalent bandwidth which can be distributed by the base station in all three layers. By this means, the QoS requirements in terms of bit error rate(BER), transmission delay and dropping probability can be guaranteed by the cross-layer optimal equivalent bandwidth allocation. The numerical results show that the proposed algorithm has higher spectrum efficiency compared to the existing systems.
Multimode terminals running multiple services at the same time are increasingly common, in response to this phenomenon, a network selection algorithm based on group decision making for heterogeneous wirelessnetworks ...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
Multimode terminals running multiple services at the same time are increasingly common, in response to this phenomenon, a network selection algorithm based on group decision making for heterogeneous wirelessnetworks is presented in this paper. The algorithm considers each service from the terminal as a decision-maker, and obtains the weight vector of all network attributes for each service by the analytic hierarchy process, then uses the group decision making to synthesize these weight vectors. At the same time, the utility function is used to normalize the network attributes. At last, the network selection is made according to the synthesized weight vector and attribute utility. The simulation results show that the proposed algorithm is far superior to the TOPSIS in satisfying the Qo S requirements of different class of services, and can solve the problem of network selection for a group of services from a multi-service terminal.
In this paper, an analytical framework is developed to evaluate the uplink outage and spatial blocking performance in a multichannel heterogeneous cellular network. A weighted uplink cell association criterion and ran...
详细信息
At present, speech recognition has become a keytechnology of human-computer interaction, which can be used in semantic recognition and speaker identification and other related applications. This paper focuses on a sp...
At present, speech recognition has become a keytechnology of human-computer interaction, which can be used in semantic recognition and speaker identification and other related applications. This paper focuses on a speaker identification scene and the technical design. Because artificial neural network has the ability to distinguish complex classification boundaries, plenty of work on speech recognition had studied multi-layer perceptual networks to improve the accuracy of classification where back propagation method (BP algorithm) has been used. In the studied scheme, when the test objects (speakers) speak the same isolated word, the identification system can judge who the speaker is by identifying the voice voiceprint of different people. Our design not only considers the recognition based on BP as well as its variant, but also explores the voiceprint recognition based on convolution neural network (CNN). Secondly, the network structure and performance are also compared in detail.
In this paper, a new method for two-dimensional (2-D) direction-of-arrival (DOA) estimation is proposed. We first reconstruct the covariance matrix of the coarray with block-Toeplitz structure and then retrieve the DO...
详细信息
暂无评论