1,084 research outputs found

    Application Protocols enabling Internet of Remote Things via Random Access Satellite Channels

    Full text link
    Nowadays, Machine-to-Machine (M2M) and Internet of Things (IoT) traffic rate is increasing at a fast pace. The use of satellites is expected to play a large role in delivering such a traffic. In this work, we investigate the use of two of the most common M2M/IoT protocols stacks on a satellite Random Access (RA) channel, based on DVB-RCS2 standard. The metric under consideration is the completion time, in order to identify the protocol stack that can provide the best performance level

    A matrix product algorithm for stochastic dynamics on networks, applied to non-equilibrium Glauber dynamics

    Full text link
    We introduce and apply a novel efficient method for the precise simulation of stochastic dynamical processes on locally tree-like graphs. Networks with cycles are treated in the framework of the cavity method. Such models correspond, for example, to spin-glass systems, Boolean networks, neural networks, or other technological, biological, and social networks. Building upon ideas from quantum many-body theory, the new approach is based on a matrix product approximation of the so-called edge messages -- conditional probabilities of vertex variable trajectories. Computation costs and accuracy can be tuned by controlling the matrix dimensions of the matrix product edge messages (MPEM) in truncations. In contrast to Monte Carlo simulations, the algorithm has a better error scaling and works for both, single instances as well as the thermodynamic limit. We employ it to examine prototypical non-equilibrium Glauber dynamics in the kinetic Ising model. Because of the absence of cancellation effects, observables with small expectation values can be evaluated accurately, allowing for the study of decay processes and temporal correlations.Comment: 5 pages, 3 figures; minor improvements, published versio

    High dimensional measurement device independent quantum key distribution on two dimensional subspaces

    Get PDF
    Quantum key distribution (QKD) provides ultimate cryptographic security based on the laws of quantum mechanics. For point-to-point QKD protocols, the security of the generated key is compromised by detector side channel attacks. This problem can be solved with measurement device independent QKD (mdi-QKD). However, mdi-QKD has shown limited performances in terms of the secret key generation rate, due to post-selection in the Bell measurements. We show that high dimensional (Hi-D) encoding (qudits) improves the performance of current mdi-QKD implementations. The scheme is proven to be unconditionally secure even for weak coherent pulses with decoy states, while the secret key rate is derived in the single photon case. Our analysis includes phase errors, imperfect sources and dark counts to mimic real systems. Compared to the standard bidimensional case, we show an improvement in the key generation rate.Comment: 6 pages, 3 figure

    The average number of distinct sites visited by a random walker on random graphs

    Full text link
    We study the linear large nn behavior of the average number of distinct sites S(n)S(n) visited by a random walker after nn steps on a large random graph. An expression for the graph topology dependent prefactor BB in S(n)=BnS(n) = Bn is proposed. We use generating function techniques to relate this prefactor to the graph adjacency matrix and then devise message-passing equations to calculate its value. Numerical simulations are performed to evaluate the agreement between the message passing predictions and random walk simulations on random graphs. Scaling with system size and average graph connectivity are also analysed.Comment: 22 pages, 4 figure

    Rare events statistics of random walks on networks: localization and other dynamical phase transitions

    Full text link
    Rare event statistics for random walks on complex networks are investigated using the large deviations formalism. Within this formalism, rare events are realized as typical events in a suitably deformed path-ensemble, and their statistics can be studied in terms of spectral properties of a deformed Markov transition matrix. We observe two different types of phase transition in such systems: (i) rare events which are singled out for sufficiently large values of the deformation parameter may correspond to {\em localized\/} modes of the deformed transition matrix, (ii) "mode-switching transitions" may occur as the deformation parameter is varied. Details depend on the nature of the observable for which the rare event statistics is studied, as well as on the underlying graph ensemble. In the present letter we report on the statistics of the average degree of the nodes visited along a random walk trajectory in Erd\H{o}s-R\'enyi networks. Large deviations rate functions and localization properties are studied numerically. For observables of the type considered here, we also derive an analytical approximation for the Legendre transform of the large-deviations rate function, which is valid in the large connectivity limit. It is found to agree well with simulations.Comment: 5 pages, 3 figure

    Passivation and Potential Fluctuation of AZ31B Alloy in Alkaline Environments

    Get PDF
    Magnesium (Mg) alloys are used in many industries because of their distinctive properties, but their high chemical reactivity and poor oxide film protection make them inferior. This project focused on investigating the effects of secondary phases and intermetallic particles (IMPs) on the corrosion behavior of AZ31B Mg alloy. The test solution was chloride free NaOH with varying pH levels between 10-14, as well as testing under deaerated conditions. The open circuit potential (OCP) measurements using AZ31B in static NaOH solutions showed potential fluctuation between approximately -1.6 VSCE (active state) and -0.4 VSCE (passive state) during the 24-h immersion. After long-term immersion (i.e., 120 h) in deaerated 1M NaOH, it was found that the OCP values stabilized at approximately -1.4 VSCE.At pH 10 and 11 it was found that the Al-Mn IMPs were the cathodes and an oxide film developed over them. Under pH 13 and 14, the Al-Mn IMPs partially dissolved and later were protected by an oxide film. The formation of oxide nodules under static conditions at the interface of the α-Mg matrix and the secondary phases revealed severe cracking due to increased volume within the oxide. This cracking may be the cause of the potential fluctuation that AZ31B undergoes

    The edge-disjoint path problem on random graphs by message-passing

    Get PDF
    We present a message-passing algorithm to solve the edge disjoint path problem (EDP) on graphs incorporating under a unique framework both traffic optimization and path length minimization. The min-sum equations for this problem present an exponential computational cost in the number of paths. To overcome this obstacle we propose an efficient implementation by mapping the equations onto a weighted combinatorial matching problem over an auxiliary graph. We perform extensive numerical simulations on random graphs of various types to test the performance both in terms of path length minimization and maximization of the number of accommodated paths. In addition, we test the performance on benchmark instances on various graphs by comparison with state-of-the-art algorithms and results found in the literature. Our message-passing algorithm always outperforms the others in terms of the number of accommodated paths when considering non trivial instances (otherwise it gives the same trivial results). Remarkably, the largest improvement in performance with respect to the other methods employed is found in the case of benchmarks with meshes, where the validity hypothesis behind message-passing is expected to worsen. In these cases, even though the exact message-passing equations do not converge, by introducing a reinforcement parameter to force convergence towards a sub optimal solution, we were able to always outperform the other algorithms with a peak of 27% performance improvement in terms of accommodated paths. On random graphs, we numerically observe two separated regimes: one in which all paths can be accommodated and one in which this is not possible. We also investigate the behaviour of both the number of paths to be accommodated and their minimum total length.Comment: 14 pages, 8 figure

    Experimental quantum key distribution with finite-key security analysis for noisy channels

    Full text link
    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight-bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks, or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.Comment: 20 pages, 4 figure
    • …
    corecore