29,710 research outputs found

    Quantum secret sharing between m-party and n-party with six states

    Full text link
    We propose a quantum secret sharing scheme between mm-party and nn-party using three conjugate bases, i.e. six states. A sequence of single photons, each of which is prepared in one of the six states, is used directly to encode classical information in the quantum secret sharing process. In this scheme, each of all mm members in group 1 choose randomly their own secret key individually and independently, and then directly encode their respective secret information on the states of single photons via unitary operations, then the last one (the mmth member of group 1) sends 1/n1/n of the resulting qubits to each of group 2. By measuring their respective qubits, all members in group 2 share the secret information shared by all members in group 1. The secret message shared by group 1 and group 2 in such a way that neither subset of each group nor the union of a subset of group 1 and a subset of group 2 can extract the secret message, but each whole group (all the members of each group) can. The scheme is asymptotically 100% in efficiency. It makes the Trojan horse attack with a multi-photon signal, the fake-signal attack with EPR pairs, the attack with single photons, and the attack with invisible photons to be nullification. We show that it is secure and has an advantage over the one based on two conjugate bases. We also give the upper bounds of the average success probabilities for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle entangled states. This protocol is feasible with present-day technique.Comment: 7 page

    Technological innovations at the onset of the Mid-Pleistocene Climate Transition in high-latitude East Asia

    No full text
    The interplay between Pleistocene climatic variability and hominin adaptations to diverse terrestrial ecosystems is a key topic in human evolutionary studies. Early and Middle Pleistocene environmental change and its relation to hominin behavioural responses has been a subject of great interest in Africa and Europe, though little information is available for other key regions of the Old World, particularly from Eastern Asia. Here we examine key Early Pleistocene sites of the Nihewan Basin, in high-latitude northern China, dating between ∼1.4 to 1.0 million years ago (Ma). We compare stone tool assemblages from three Early Pleistocene sites in the Nihewan Basin, including detailed assessment of stone tool refitting sequences at the ∼1.1 Ma-old site of Cenjiawan. Increased toolmaking skills and technological innovations are evident in the Nihewan Basin at the onset of the Mid-Pleistocene Climate Transition (MPT). Examination of the lithic technology of the Nihewan sites, together with an assessment of other key Palaeolithic sites of China, indicates that toolkits show increasing diversity at the outset of the MPT and in its aftermath. The overall evidence indicates the adaptive flexibility of early hominins to ecosystem changes since the MPT, though regional abandonments are also apparent in high-latitudes, likely owing to cold and oscillating environmental conditions. The view presented here sharply contrasts with traditional arguments that stone tool technologies of China are homogeneous and continuous over the course of the Early Pleistocene.Introduction Results - Stone-tool-knapping skills recorded in the Cenjiawan assemblage - Technological comparisons of the Nihewan Basin assemblages Discussio

    A three-dimensional imaging system for surface profilometry of moving objects

    Get PDF
    Non-contact optical imaging system design and the corresponding surface profilometry algorithm are critical components in various metrology applications, such as surface inspection of semiconductor components on the production line. For such challenging industrial applications, the most important considerations are often automation, precision and speed of the inspection. In this work, we propose a mathematical framework and a dynamic phase-shift algorithm (D-PSA) for a dense surface profilometry of moving objects. We also present a fringe pattern projection system with projector and camera arrays, with an aim to reduce the undesirable effects such as the uneven illumination and the perspective geometry effect on the reconstructed surface using a large field-of-view inspection system. This system is then applied to the inspection of the surface of moving printed circuit boards along a conveyor belt. Experimental results show that our approach can reconstruct the object surface effectively and efficiently. © 2013 IEEE.published_or_final_versio

    Optimal Preview Control for a Class of Linear Continuous Stochastic Control Systems in the Infinite Horizon

    Get PDF
    Copyright © 2016 Jiang Wu et al.This paper discusses the optimal preview control problem for a class of linear continuous stochastic control systems in the infinite horizon, based on the augmented error system method. Firstly, an assistant system is designed and the state equation is translated to the assistant system. Then, an integrator is introduced to construct a stochastic augmented error system. As a result, the tracking problem is converted to a regulation problem. Secondly, the optimal regulator is solved based on dynamic programming principle for the stochastic system, and the optimal preview controller of the original system is obtained. Compared with the finite horizon, we simplify the performance index. We also study the stability of the stochastic augmented error system and design the observer for the original stochastic system. Finally, the simulation example shows the effectiveness of the conclusion in this paper

    Efficient quantum cryptography network without entanglement and quantum memory

    Full text link
    An efficient quantum cryptography network protocol is proposed with d-dimension polarized photons, without resorting to entanglement and quantum memory. A server on the network, say Alice, provides the service for preparing and measuring single photons whose initial state are |0>. The users code the information on the single photons with some unitary operations. For preventing the untrustworthy server Alice from eavesdropping the quantum lines, a nonorthogonal-coding technique (decoy-photon technique) is used in the process that the quantum signal is transmitted between the users. This protocol does not require the servers and the users to store the quantum state and almost all of the single photons can be used for carrying the information, which makes it more convenient for application than others with present technology. We also discuss the case with a faint laser pulse.Comment: 4 pages, 1 figures. It also presented a way for preparing decoy photons without a sinigle-photon sourc

    Circular quantum secret sharing

    Full text link
    A circular quantum secret sharing protocol is proposed, which is useful and efficient when one of the parties of secret sharing is remote to the others who are in adjacent, especially the parties are more than three. We describe the process of this protocol and discuss its security when the quantum information carrying is polarized single photons running circularly. It will be shown that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency is improved to approach 100% as almost all the instances can be used for generating the private key, and each photon can carry one bit of information without quantum storage. It is straightforwardly to utilize this topological structure to complete quantum secret sharing with multi-level two-particle entanglement in high capacity securely.Comment: 7 pages, 2 figure

    De Novo Genome Sequence of "Candidatus Liberibacter solanacearum" from a Single Potato Psyllid in California.

    Get PDF
    The draft genome sequence of "Candidatus Liberibacter solanacearum" strain RSTM from a potato psyllid (Bactericera cockerelli) in California is reported here. The RSTM strain has a genome size of 1,286,787 bp, a G+C content of 35.1%, 1,211 predicted open reading frames (ORFs), and 43 RNA genes
    • …
    corecore