1,084 research outputs found
Application Protocols enabling Internet of Remote Things via Random Access Satellite Channels
Nowadays, Machine-to-Machine (M2M) and Internet of Things (IoT) traffic rate
is increasing at a fast pace. The use of satellites is expected to play a large
role in delivering such a traffic. In this work, we investigate the use of two
of the most common M2M/IoT protocols stacks on a satellite Random Access (RA)
channel, based on DVB-RCS2 standard. The metric under consideration is the
completion time, in order to identify the protocol stack that can provide the
best performance level
A matrix product algorithm for stochastic dynamics on networks, applied to non-equilibrium Glauber dynamics
We introduce and apply a novel efficient method for the precise simulation of
stochastic dynamical processes on locally tree-like graphs. Networks with
cycles are treated in the framework of the cavity method. Such models
correspond, for example, to spin-glass systems, Boolean networks, neural
networks, or other technological, biological, and social networks. Building
upon ideas from quantum many-body theory, the new approach is based on a matrix
product approximation of the so-called edge messages -- conditional
probabilities of vertex variable trajectories. Computation costs and accuracy
can be tuned by controlling the matrix dimensions of the matrix product edge
messages (MPEM) in truncations. In contrast to Monte Carlo simulations, the
algorithm has a better error scaling and works for both, single instances as
well as the thermodynamic limit. We employ it to examine prototypical
non-equilibrium Glauber dynamics in the kinetic Ising model. Because of the
absence of cancellation effects, observables with small expectation values can
be evaluated accurately, allowing for the study of decay processes and temporal
correlations.Comment: 5 pages, 3 figures; minor improvements, published versio
High dimensional measurement device independent quantum key distribution on two dimensional subspaces
Quantum key distribution (QKD) provides ultimate cryptographic security based
on the laws of quantum mechanics. For point-to-point QKD protocols, the
security of the generated key is compromised by detector side channel attacks.
This problem can be solved with measurement device independent QKD (mdi-QKD).
However, mdi-QKD has shown limited performances in terms of the secret key
generation rate, due to post-selection in the Bell measurements. We show that
high dimensional (Hi-D) encoding (qudits) improves the performance of current
mdi-QKD implementations. The scheme is proven to be unconditionally secure even
for weak coherent pulses with decoy states, while the secret key rate is
derived in the single photon case. Our analysis includes phase errors,
imperfect sources and dark counts to mimic real systems. Compared to the
standard bidimensional case, we show an improvement in the key generation rate.Comment: 6 pages, 3 figure
The average number of distinct sites visited by a random walker on random graphs
We study the linear large behavior of the average number of distinct
sites visited by a random walker after steps on a large random
graph. An expression for the graph topology dependent prefactor in is proposed. We use generating function techniques to relate this prefactor
to the graph adjacency matrix and then devise message-passing equations to
calculate its value. Numerical simulations are performed to evaluate the
agreement between the message passing predictions and random walk simulations
on random graphs. Scaling with system size and average graph connectivity are
also analysed.Comment: 22 pages, 4 figure
Rare events statistics of random walks on networks: localization and other dynamical phase transitions
Rare event statistics for random walks on complex networks are investigated
using the large deviations formalism. Within this formalism, rare events are
realized as typical events in a suitably deformed path-ensemble, and their
statistics can be studied in terms of spectral properties of a deformed Markov
transition matrix. We observe two different types of phase transition in such
systems: (i) rare events which are singled out for sufficiently large values of
the deformation parameter may correspond to {\em localized\/} modes of the
deformed transition matrix, (ii) "mode-switching transitions" may occur as the
deformation parameter is varied. Details depend on the nature of the observable
for which the rare event statistics is studied, as well as on the underlying
graph ensemble. In the present letter we report on the statistics of the
average degree of the nodes visited along a random walk trajectory in
Erd\H{o}s-R\'enyi networks. Large deviations rate functions and localization
properties are studied numerically. For observables of the type considered
here, we also derive an analytical approximation for the Legendre transform of
the large-deviations rate function, which is valid in the large connectivity
limit. It is found to agree well with simulations.Comment: 5 pages, 3 figure
Passivation and Potential Fluctuation of AZ31B Alloy in Alkaline Environments
Magnesium (Mg) alloys are used in many industries because of their distinctive properties, but their high chemical reactivity and poor oxide film protection make them inferior. This project focused on investigating the effects of secondary phases and intermetallic particles (IMPs) on the corrosion behavior of AZ31B Mg alloy. The test solution was chloride free NaOH with varying pH levels between 10-14, as well as testing under deaerated conditions. The open circuit potential (OCP) measurements using AZ31B in static NaOH solutions showed potential fluctuation between approximately -1.6 VSCE (active state) and -0.4 VSCE (passive state) during the 24-h immersion. After long-term immersion (i.e., 120 h) in deaerated 1M NaOH, it was found that the OCP values stabilized at approximately -1.4 VSCE.At pH 10 and 11 it was found that the Al-Mn IMPs were the cathodes and an oxide film developed over them. Under pH 13 and 14, the Al-Mn IMPs partially dissolved and later were protected by an oxide film. The formation of oxide nodules under static conditions at the interface of the α-Mg matrix and the secondary phases revealed severe cracking due to increased volume within the oxide. This cracking may be the cause of the potential fluctuation that AZ31B undergoes
The edge-disjoint path problem on random graphs by message-passing
We present a message-passing algorithm to solve the edge disjoint path
problem (EDP) on graphs incorporating under a unique framework both traffic
optimization and path length minimization. The min-sum equations for this
problem present an exponential computational cost in the number of paths. To
overcome this obstacle we propose an efficient implementation by mapping the
equations onto a weighted combinatorial matching problem over an auxiliary
graph. We perform extensive numerical simulations on random graphs of various
types to test the performance both in terms of path length minimization and
maximization of the number of accommodated paths. In addition, we test the
performance on benchmark instances on various graphs by comparison with
state-of-the-art algorithms and results found in the literature. Our
message-passing algorithm always outperforms the others in terms of the number
of accommodated paths when considering non trivial instances (otherwise it
gives the same trivial results). Remarkably, the largest improvement in
performance with respect to the other methods employed is found in the case of
benchmarks with meshes, where the validity hypothesis behind message-passing is
expected to worsen. In these cases, even though the exact message-passing
equations do not converge, by introducing a reinforcement parameter to force
convergence towards a sub optimal solution, we were able to always outperform
the other algorithms with a peak of 27% performance improvement in terms of
accommodated paths. On random graphs, we numerically observe two separated
regimes: one in which all paths can be accommodated and one in which this is
not possible. We also investigate the behaviour of both the number of paths to
be accommodated and their minimum total length.Comment: 14 pages, 8 figure
Experimental quantum key distribution with finite-key security analysis for noisy channels
In quantum key distribution implementations, each session is typically chosen
long enough so that the secret key rate approaches its asymptotic limit.
However, this choice may be constrained by the physical scenario, as in the
perspective use with satellites, where the passage of one terminal over the
other is restricted to a few minutes. Here we demonstrate experimentally the
extraction of secure keys leveraging an optimal design of the
prepare-and-measure scheme, according to recent finite-key theoretical
tight-bounds. The experiment is performed in different channel conditions, and
assuming two distinct attack models: individual attacks, or general quantum
attacks. The request on the number of exchanged qubits is then obtained as a
function of the key size and of the ambient quantum bit error rate. The results
indicate that viable conditions for effective symmetric, and even one-time-pad,
cryptography are achievable.Comment: 20 pages, 4 figure
- …