114 research outputs found

    Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation

    Full text link
    We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making a double use of the quantum channel and the potential of long-distance secure communication using two-way protocol.Comment: 14 pages, 8 figure

    Improvement of two-way continuous-variable quantum key distribution with virtual photon subtraction

    Full text link
    We propose a method to improve the performance of two-way continuous-variable quantum key distribution protocol by virtual photon subtraction. The Virtual photon subtraction implemented via non-Gaussian post-selection not only enhances the entanglement of two-mode squeezed vacuum state but also has advantages in simplifying physical operation and promoting efficiency. In two-way protocol, virtual photon subtraction could be applied on two sources independently. Numerical simulations show that the optimal performance of renovated two-way protocol is obtained with photon subtraction only used by Alice. The transmission distance and tolerable excess noise are improved by using the virtual photon subtraction with appropriate parameters. Moreover, the tolerable excess noise maintains a high value with the increase of distance so that the robustness of two-way continuous-variable quantum key distribution system is significantly improved, especially at long transmission distance.Comment: 15 pages, 6 figure

    Moving adsorption belt system for continuous bioproduct recovery

    Get PDF
    Please click Additional Files below to see the full abstract

    Finite-size analysis of continuous-variable measurement-device-independent quantum key distribution

    Full text link
    We study the impact of the finite-size effect on the continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) protocol, mainly considering the finite-size effect on the parameter estimation procedure. The central-limit theorem and maximum likelihood estimation theorem are used to estimate the parameters. We also analyze the relationship between the number of exchanged signals and the optimal modulation variance in the protocol. It is proved that when Charlie's position is close to Bob, the CV-MDI QKD protocol has the farthest transmission distance in the finite-size scenario. Finally, we discuss the impact of finite-size effects related to the practical detection in the CV-MDI QKD protocol. The overall results indicate that the finite-size effect has a great influence on the secret key rate of the CV-MDI QKD protocol and should not be ignored.Comment: 9 pages, 9 figure

    Class-Incremental Learning based on Label Generation

    Full text link
    Despite the great success of pre-trained language models, it is still a challenge to use these models for continual learning, especially for the class-incremental learning (CIL) setting due to catastrophic forgetting (CF). This paper reports our finding that if we formulate CIL as a continual label generation problem, CF is drastically reduced and the generalizable representations of pre-trained models can be better retained. We thus propose a new CIL method (VAG) that also leverages the sparsity of vocabulary to focus the generation and creates pseudo-replay samples by using label semantics. Experimental results show that VAG outperforms baselines by a large margin.Comment: 12 pages, ACL 2023 Main Conferenc

    Short-Term Multi-Horizon Line Loss Rate Forecasting of a Distribution Network Using Attention-GCN-LSTM

    Full text link
    Accurately predicting line loss rates is vital for effective line loss management in distribution networks, especially over short-term multi-horizons ranging from one hour to one week. In this study, we propose Attention-GCN-LSTM, a novel method that combines Graph Convolutional Networks (GCN), Long Short-Term Memory (LSTM), and a three-level attention mechanism to address this challenge. By capturing spatial and temporal dependencies, our model enables accurate forecasting of line loss rates across multiple horizons. Through comprehensive evaluation using real-world data from 10KV feeders, our Attention-GCN-LSTM model consistently outperforms existing algorithms, exhibiting superior performance in terms of prediction accuracy and multi-horizon forecasting. This model holds significant promise for enhancing line loss management in distribution networks

    Acute and Subacute Oral Toxicity Evaluation of Eriobotrya japonica

    Get PDF
    The interest focusing on Eriobotrya japonica leaf triterpene acid (ELTA) has increased recently because of its beneficial effects on health. However, there has been a lack of experimental data on its toxicity. The present study therefore was conducted to evaluate its toxicity in ICR mice. The results showed that ELTA produced neither mortality nor toxicity of the main organs in ICR male and female mice in both acute (0.30, 0.65, 1.39, and 3.00 g·kg−1 body weight) and subacute (150, 300, and 600 mg·kg−1 BW) 28-day toxicity studies. Because of lacking apparently adverse effects found in the hematology, clinical biochemistry, and histopathology evaluation, results of the present study together with the beneficial effects make ELTA as a promising dietary supplement and indicated that ELTA administered orally might have a large safety margin for human
    • …
    corecore