114 research outputs found
Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation
We analyze the security of the two-way continuous-variable quantum key
distribution protocol in reverse reconciliation against general two-mode
attacks, which represent all accessible attacks at fixed channel parameters.
Rather than against one specific attack model, the expression of secret key
rates of the two-way protocol are derived against all accessible attack models.
It is found that there is an optimal two-mode attack to minimize the
performance of the protocol in terms of both secret key rates and maximal
transmission distances. We identify the optimal two-mode attack, give the
specific attack model of the optimal two-mode attack and show the performance
of the two-way protocol against the optimal two-mode attack. Even under the
optimal two-mode attack, the performances of two-way protocol are still better
than the corresponding one-way protocol, which shows the advantage of making a
double use of the quantum channel and the potential of long-distance secure
communication using two-way protocol.Comment: 14 pages, 8 figure
Improvement of two-way continuous-variable quantum key distribution with virtual photon subtraction
We propose a method to improve the performance of two-way continuous-variable
quantum key distribution protocol by virtual photon subtraction. The Virtual
photon subtraction implemented via non-Gaussian post-selection not only
enhances the entanglement of two-mode squeezed vacuum state but also has
advantages in simplifying physical operation and promoting efficiency. In
two-way protocol, virtual photon subtraction could be applied on two sources
independently. Numerical simulations show that the optimal performance of
renovated two-way protocol is obtained with photon subtraction only used by
Alice. The transmission distance and tolerable excess noise are improved by
using the virtual photon subtraction with appropriate parameters. Moreover, the
tolerable excess noise maintains a high value with the increase of distance so
that the robustness of two-way continuous-variable quantum key distribution
system is significantly improved, especially at long transmission distance.Comment: 15 pages, 6 figure
Moving adsorption belt system for continuous bioproduct recovery
Please click Additional Files below to see the full abstract
Finite-size analysis of continuous-variable measurement-device-independent quantum key distribution
We study the impact of the finite-size effect on the continuous-variable
measurement-device-independent quantum key distribution (CV-MDI QKD) protocol,
mainly considering the finite-size effect on the parameter estimation
procedure. The central-limit theorem and maximum likelihood estimation theorem
are used to estimate the parameters. We also analyze the relationship between
the number of exchanged signals and the optimal modulation variance in the
protocol. It is proved that when Charlie's position is close to Bob, the CV-MDI
QKD protocol has the farthest transmission distance in the finite-size
scenario. Finally, we discuss the impact of finite-size effects related to the
practical detection in the CV-MDI QKD protocol. The overall results indicate
that the finite-size effect has a great influence on the secret key rate of the
CV-MDI QKD protocol and should not be ignored.Comment: 9 pages, 9 figure
Class-Incremental Learning based on Label Generation
Despite the great success of pre-trained language models, it is still a
challenge to use these models for continual learning, especially for the
class-incremental learning (CIL) setting due to catastrophic forgetting (CF).
This paper reports our finding that if we formulate CIL as a continual label
generation problem, CF is drastically reduced and the generalizable
representations of pre-trained models can be better retained. We thus propose a
new CIL method (VAG) that also leverages the sparsity of vocabulary to focus
the generation and creates pseudo-replay samples by using label semantics.
Experimental results show that VAG outperforms baselines by a large margin.Comment: 12 pages, ACL 2023 Main Conferenc
Short-Term Multi-Horizon Line Loss Rate Forecasting of a Distribution Network Using Attention-GCN-LSTM
Accurately predicting line loss rates is vital for effective line loss
management in distribution networks, especially over short-term multi-horizons
ranging from one hour to one week. In this study, we propose
Attention-GCN-LSTM, a novel method that combines Graph Convolutional Networks
(GCN), Long Short-Term Memory (LSTM), and a three-level attention mechanism to
address this challenge. By capturing spatial and temporal dependencies, our
model enables accurate forecasting of line loss rates across multiple horizons.
Through comprehensive evaluation using real-world data from 10KV feeders, our
Attention-GCN-LSTM model consistently outperforms existing algorithms,
exhibiting superior performance in terms of prediction accuracy and
multi-horizon forecasting. This model holds significant promise for enhancing
line loss management in distribution networks
Acute and Subacute Oral Toxicity Evaluation of Eriobotrya japonica
The interest focusing on Eriobotrya japonica leaf triterpene acid (ELTA) has increased recently because of its beneficial effects on health. However, there has been a lack of experimental data on its toxicity. The present study therefore was conducted to evaluate its toxicity in ICR mice. The results showed that ELTA produced neither mortality nor toxicity of the main organs in ICR male and female mice in both acute (0.30, 0.65, 1.39, and 3.00 g·kg−1 body weight) and subacute (150, 300, and 600 mg·kg−1 BW) 28-day toxicity studies. Because of lacking apparently adverse effects found in the hematology, clinical biochemistry, and histopathology evaluation, results of the present study together with the beneficial effects make ELTA as a promising dietary supplement and indicated that ELTA administered orally might have a large safety margin for human
- …