We present explicit bounds on the classical communication cost and inefficiency of entanglement dilution via the Lo-Popescu protocol, for the case of two-term (single-qubit) entangled states. By considering a two-stag...
详细信息
We present explicit bounds on the classical communication cost and inefficiency of entanglement dilution via the Lo-Popescu protocol, for the case of two-term (single-qubit) entangled states. By considering a two-stage dilution, we consequently use prior results to obtain meaningful bounds on the classical communication cost and inefficiency of dilution between two-term partially entangled states
Robust nonlinear controller design with constraint on the poles’ location of the linear part of closed-loop system is proposed. The design method is based on the integrator backstepping procedure and linear constrain...
详细信息
Robust nonlinear controller design with constraint on the poles’ location of the linear part of closed-loop system is proposed. The design method is based on the integrator backstepping procedure and linear constrained H ∞ for nonlinear strict-feedback systems with disturbance also in strict-feedback form. The resulted closed-loop system will be globally stable, while both local robustness and desired α- stability are achieved. An analytic example is used to compare the performance of the proposed methodology with that of the locally optimal backstepping design with no closed-loop poles constraint.
We propose a wide class of distillation schemes for multi-partite entangled states that are CSS-states. Our proposal provides not only superior efficiency, but also new insights on the connection between CSS-states an...
详细信息
ISBN:
(纸本)0780391500
We propose a wide class of distillation schemes for multi-partite entangled states that are CSS-states. Our proposal provides not only superior efficiency, but also new insights on the connection between CSS-states and bipartite graph states. We then consider the applications of our distillation schemes for two cryptographic tasks - namely, (a) conference key agreement and (b) quantum sharing of classical secrets. In particular, we construct "prepare-and-measure" protocols. Also we study the yield of those protocols and the threshold value of the fidelity above which the protocols can function securely. Surprisingly, our protocols function securely even when the initial state does not violate the standard Bell-inequalities for GHZ states. Experimental realization involving only bipartite entanglement is also suggested
This paper is concerned with the derivation of the kinematics model of the University of Tehran-Pole Climbing Robot (UT-PCR). As the first step, an appropriate set of coordinates is selected and used to describe the s...
详细信息
This paper is concerned with the derivation of the kinematics model of the University of Tehran-Pole Climbing Robot (UT-PCR). As the first step, an appropriate set of coordinates is selected and used to describe the state of the robot. Nonholonomic constraints imposed by the wheels are then expressed as a set of differential equations. By describing these equations in terms of the state of the robot an underactuated driftless nonlinear control system with affine inputs that governs the motion of the robot is derived. A set of experimental results are also given to show the capability of the UT-PCR in climbing a stepped pole.
For a class of nonlinear systems affine in controls and with unknown high frequency gain, we develop a hybrid control strategy that guarantees (practical) global input-to-state stability (ISS) with respect to measurem...
详细信息
For a class of nonlinear systems affine in controls and with unknown high frequency gain, we develop a hybrid control strategy that guarantees (practical) global input-to-state stability (ISS) with respect to measurement noise. We provide a design procedure for the hybrid controller and apply it to Freeman’s counterexample and minimum-phase relative degree one systems.
作者:
J.R. RiehlJ.P. HespanhaCenter for Control
Dynamical Systems and Computation Electrical and Computer Engineering Department University of California Santa Barbara CA USA
We introduce methods of hierarchically decomposing three types of graph optimization problems: all-pairs shortest path, all-pairs maximum flow,and search. Each method uses a partition on the graph to create a high lev...
详细信息
We introduce methods of hierarchically decomposing three types of graph optimization problems: all-pairs shortest path, all-pairs maximum flow,and search. Each method uses a partition on the graph to create a high level problem and several lower level problems. The computations on each level are identical, so the low level problems can be further decomposed. In this way, the problems become fractal in nature. We use these decomposition methods to establish upper and lower bounds on the optimal criteria of each problem, which can be achieved with much less computation than what is required to solve the original problem. Also, for each problem, we find an optimal number of partitions that minimizes computation time. As the number of hierarchical levels increases, the computational complexity decreases at the expense of looser bounds.
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only tw...
详细信息
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states—the vacuum and a weak decoy state—asymptotically approaches the theoretical limit of the most general type of decoy state protocol (with an infinite number of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long-distance (larger than 100 km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.
We derive lower limits on the inefficiency and classical communication costs of dilution between two-term bipartite pure states that are partially entangled. We first calculate explicit relations between the allowable...
详细信息
We derive lower limits on the inefficiency and classical communication costs of dilution between two-term bipartite pure states that are partially entangled. We first calculate explicit relations between the allowable error and classical communication costs of entanglement dilution using a previously described protocol, then consider a two-stage dilution from singlets with this protocol followed by some unknown protocol for conversion between partially entangled states. Applying overall lower bounds on classical communication and inefficiency to this two-stage protocol, we derive bounds for the unknown protocol. In addition we derive analogous (but looser) bounds for general pure states.
There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distributio...
详细信息
There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most of those experiments secure by using essentially the same hardware. Our method is to use decoy states to detect eavesdropping attacks. As a consequence, we have the best of both worlds—enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing even some of the best experimental performances reported in the literature.
Although structural constraints such as model order and time delay have been incorporated in the continuous time system identification since its origin, the constraints on the estimated model parameters were rarely en...
详细信息
暂无评论