Quantum secure communications could securely transmit quantum information by using quantum ***,novel applications such as bidirectional and asymmetric quantum protocols have been *** this paper,we propose a new method...
详细信息
Quantum secure communications could securely transmit quantum information by using quantum ***,novel applications such as bidirectional and asymmetric quantum protocols have been *** this paper,we propose a new method for generating entanglement which is highly useful for multiparty quantum communications such as teleportation and Remote state Preparation(RSP).As one of its applications,we propose a new type of quantum secure communications,*** RSP *** from a four-party controlled cyclic RSP protocol of one-qubit states,we show that this cyclic protocol can be generalized to a multiparty controlled cyclic RSP protocol for preparation of arbitrary qubit *** point out that previous bidirectional and asymmetric protocols can be regarded as a simpler form of our cyclic RSP protocols.
In the Large High Altitude Air Shower Observatory (LHAASO), the square kilometer array, with 5249 electromagnetic particle detectors (EDs) and 1188 muon detectors, is deployed to explore the gamma-ray sources above 30...
详细信息
In the Large High Altitude Air Shower Observatory (LHAASO), the square kilometer array, with 5249 electromagnetic particle detectors (EDs) and 1188 muon detectors, is deployed to explore the gamma-ray sources above 30 TeV with unprecedented sensitivity and to measure primary cosmic rays in the energy range from 10 TeV to 100 PeV. The energetic particles produced by extensive air showers can serve as a continuously available source for calibration of the numerous EDs over a large area. In this study, the detector untriggered probability is first proposed to estimate the particle density at different distances from the shower core and distinguish the characteristic single-particle signal detected by each ED. This method uses science data directly, and does not require prior knowledge of the cosmic-ray elemental composition or hadronic interaction model. Experimental results show that this self-calibration can be used to determine the number of particles detected by each ED with an accuracy better than 2% within a time scale of hours, which is adequate to meet the physics requirements of the LHAASO experiment. With this high efficiency and accuracy, this calibration also provides an ideal method to monitor the detector performance throughout an expected lifetime of >10 years.
Mathematical function is an essential part of numerical program, and it is also the key factor that affects the precision and performance of a program. In the design of mathematical functions, in order to satisfy most...
Mathematical function is an essential part of numerical program, and it is also the key factor that affects the precision and performance of a program. In the design of mathematical functions, in order to satisfy most application scenarios, it is necessary to correctly round and cover the calculated interval as much as possible. But in certain applications, correct rounding and full coverage of definition domain may not be required. Therefore, mathematical functions can be customized according to application requirements to avoid precision waste as well as improve performance. However, manually implementing mathematical functions is a time-consuming and error-prone task. Tools like Metalibm is designed to automatically generate mathematical function code, which is difficult to take advantage of all the mathematical properties of a function and results in the generated code performing slowly than the corresponding mathematical library function. A method of generating variable precision code based on mathematical properties is proposed for the transcendental function in this work. Experiments showed the performance of the proposed method is comparable to Glibc mathematical function.
Loop fission is an effective loop optimization for exploiting fine-grained parallelism. Currently, loop fission is widely used in existing parallelizing compilers. To fully exploit the optimization, we proposed and im...
详细信息
In reality, many cryptographic analysis techniques are based on a specific cryptographic system or a large number of encrypted ciphertext. The identification and detection of cryptographic system is of great significa...
In reality, many cryptographic analysis techniques are based on a specific cryptographic system or a large number of encrypted ciphertext. The identification and detection of cryptographic system is of great significance for evaluating the security of the algorithm and guiding the design and improvement of the algorithm. In this paper, we transcode each character in ciphertext into a decimal number, construct these numbers into one-dimensional arrays, and obtain the Euclidean distance between these one-dimensional arrays. Then we use these distances as features and input them into three machine learning classifiers: random forest, logistic regression and support vector machine to recognize cryptosystem and compare their recognition accuracy. The subjects include 8 common block ciphers (DES, 3DES, AES-128, AES-256, IDEA, SMS4, Blowfish, Camellia-128). The experimental results show that using the feature extraction scheme not only shortens the experimental time, reduces the computational cost, but also improves the recognition accuracy of eight typical block cipher algorithms. The classification accuracy of the ECB mode in the random forest classifier is 75%, which is higher than the existing published literature experimental results. The classification accuracy rate of CBC mode is higher than 13.5%, which is higher than the accuracy of random classification.
Objectives We aim to assess the impact of temperature and relative humidity on the transmission of COVID-19 across communities after accounting for community-level factors such as demographics, socioeconomic status, a...
详细信息
Oxygen interstitials and vacancies play a key role in modulating the microstructure and properties of nonstoichiometric oxide systems, such as those used for superconductors and multiferroics. key to understanding the...
详细信息
Oxygen interstitials and vacancies play a key role in modulating the microstructure and properties of nonstoichiometric oxide systems, such as those used for superconductors and multiferroics. key to understanding the tuning mechanisms resulting from oxygen doping is a knowledge of the precise positions of these lattice defects, and of the interaction both between these defects and with many order parameters. Here, we report how such information can, for the first time, be obtained from a sample of LuFe2O4.22 using a range of techniques including advanced electron microscopy, atomic-resolution spectroscopy, and density functional theory calculations. The results provide quantitative atomic details of the crystal unit cell, together with a description of the ferroelastic, ferroelectric, and ferromagnetic order parameters. We elucidate also the interaction between these order parameters and the positions of the oxygen interstitials in the oxygen-enriched sample. The comprehensive analysis of oxygen interstitial ordering provides insights into understanding the coupling among different degrees of freedom in rare earth ferrites and demonstrates that oxygen content regulation is a powerful tool for tuning the microstructure and properties for this class of quantum material.
Infrastructure as a service (IaaS) which is one of the cloud computing's service modes provides virtual machines to clients via shared physical machines. This Service provides convenience for many enterprises, but...
详细信息
ISBN:
(纸本)9789811136719
Infrastructure as a service (IaaS) which is one of the cloud computing's service modes provides virtual machines to clients via shared physical machines. This Service provides convenience for many enterprises, but also introduces new security threats. Many studies have shown that the co-residency side-channel can be used to extract sensitive information by malicious users. Remarkably, Soo-Jin has present a migration-based system called Nomad to mitigating known and future side-channel which is more universal than the traditional method. However, large scale migration will lead to huge network overheads. To solve the above problems, the characteristics of co-residency side-channel on the single physical server is analyzed, based on which two virtual machine schedule algorithms according the leakage model in Nomad were proposed. The simulation results show that the algorithm can mitigate the threats effectively.
Malware detection is an important topic in cyber security. The research presented in this paper mainly studies on disassembly codes of Windows executable files, learns from the research route of bioinformatics and pro...
Malware detection is an important topic in cyber security. The research presented in this paper mainly studies on disassembly codes of Windows executable files, learns from the research route of bioinformatics and proposes the concept of software gene. A distance-based method is also proposed to measure the difference of genes and the dimensionality reduction based on a modified clustering algorithm of biological phylogenetic model. Finally a gene-inspired malware detector is constructed using Random Forest model. The software gene extraction proposed in this paper is more flexible and generates less data than the widely-used n-gram method. The detector based on genes also performs better. The clustering-based dimensionality reduction retains more comprehensive features and maintains the interpretability in software analysis area. The detector based on gene-inspired malware detection approach can reach the precision 96.14%, which is better than traditional methods.
In accordance with the distributive traits of semiprimes’ divisors, the article proposes an approach that can find out the small divisor of a semiprime by parallel computing. The approach incorporates a deterministic...
详细信息
In accordance with the distributive traits of semiprimes’ divisors, the article proposes an approach that can find out the small divisor of a semiprime by parallel computing. The approach incorporates a deterministic search with a probabilistic search, requires less memory and can be implemented on ordinary multicore computers. Experiments show that certain semiprimes of 27 to 46 decimal-bits can be validly factorized with the approach on personal computer in expected time.
暂无评论