2,347 research outputs found

    Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source

    Full text link
    The method of decoy-state quantum key distribution (QKD) requests different intensities of light pulses. Existing theory has assumed exact control of intensities. Here we propose a simple protocol which is secure and efficient even there are errors in intensity control. In our protocol, decoy pulses and signal pulses are generated from the same father pulses with a two-value attenuation. Given the upper bound of fluctuation of the father pulses, our protocol is secure provided that the two-value attenuation is done exactly. We propose to use unbalanced beam-splitters for a stable attenuation. Given that the intensity error is bounded by ±5\pm5%, with the same key rate, our method can achieve a secure distance only 1 km shorter than that of an ideal protocol with exactly controlled source

    Spatial spectrum and energy efficiency of random cellular networks

    Get PDF
    It is a great challenge to evaluate the network performance of cellular mobile communication systems. In this paper, we propose new spatial spectrum and energy efficiency models for Poisson-Voronoi tessellation (PVT) random cellular networks. To evaluate the user access the network, a Markov chain based wireless channel access model is first proposed for PVT random cellular networks. On that basis, the outage probability and blocking probability of PVT random cellular networks are derived, which can be computed numerically. Furthermore, taking into account the call arrival rate, the path loss exponent and the base station (BS) density in random cellular networks, spatial spectrum and energy efficiency models are proposed and analyzed for PVT random cellular networks. Numerical simulations are conducted to evaluate the network spectrum and energy efficiency in PVT random cellular networks.Comment: appears in IEEE Transactions on Communications, April, 201

    Ultrathin Acoustic Parity-Time Symmetric Metasurface Cloak

    Get PDF
    Invisibility or unhearability cloaks have beenmade possible by using metamaterials enabling light or sound to flow around obstacle without the trace of reflections or shadows. Metamaterials are known for being flexible building units that can mimic a host of unusual and extreme material responses, which are essential when engineering artificial material properties to realize a coordinate transforming cloak. Bending and stretching the coordinate grid in space require stringent material parameters; therefore, small inaccuracies and inevitablematerial losses become sources for unwanted scattering that are decremental to the desired effect.These obstacles further limit the possibility of achieving a robust concealment of sizeable objects from either radar or sonar detection. By using an elaborate arrangement of gain and lossy acousticmedia respecting parity-time symmetry, we built a one-way unhearability cloak able to hide objects seven times larger than the acoustic wavelength. Generally speaking, our approach has no limits in terms of working frequency, shape, or size, specifically though we demonstrate how, in principle, an object of the size of a human can be hidden from audible sound

    General theory of decoy-state quantum cryptography with source errors

    Full text link
    The existing theory of decoy-state quantum cryptography assumes the exact control of each states from Alice's source. Such exact control is impossible in practice. We develop the theory of decoy-state method so that it is unconditionally secure even there are state errors of sources, if the range of a few parameters in the states are known. This theory simplifies the practical implementation of the decoy-state quantum key distribution because the unconditional security can be achieved with a slightly shortened final key, even though the small errors of pulses are not corrected.Comment: Our results can be used securely for any source of diagonal states, including the Plug-&-Play protocol with whatever error pattern, if we know the ranges of errors of a few parameter

    Density alteration in non-physiological cells

    Get PDF
    In the present study an important phenomenon of cells was discovered: the change of intracellular density in cell's response to drug and environmental factors. For convenience, this phenomenon is named as "density alteration in non-physiological cells" ( DANCE). DANCE was determined by discontinuous sucrose gradient centrifugation (DSGC), in which cells were separated into several bands. The number and position of the bands in DSGC varied with the change of cell culture conditions, drugs, and physical process, indicating that cell's response to these factors was associated with alteration of intracellular density. Our results showed that the bands of cells were molecularly different from each other, such as the expression of some mRNAs. For most cells tested, intracellular density usually decreased when the cells were in bad conditions, in presence of drugs, or undergoing pathological changes. However, unlike other tissue cells, brain cells showed increased intracellular density in 24 hrs after the animal death. In addition, DANCE was found to be related to drug resistance, with higher drug-resistance in cells of lower intracellular density. Further study found that DANCE also occurred in microorganisms including bacteria and fungus, suggesting that DANCE might be a sensitive and general response of cells to drugs and environmental change. The mechanisms for DANCE are not clear. Based on our study the following causes were hypothesized: change of metabolism mode, change of cell membrane function, and pathological change. DANCE could be important in medical and biological sciences. Study of DANCE might be helpful to the understanding of drug resistance, development of new drugs, separation of new subtypes from a cell population, forensic analysis, and importantly, discovery of new physiological or pathological properties of cells
    corecore