1,276 research outputs found
Experimental implementation of bit commitment in the noisy-storage model
Fundamental primitives such as bit commitment and oblivious transfer serve as
building blocks for many other two-party protocols. Hence, the secure
implementation of such primitives are important in modern cryptography. In this
work, we present a bit commitment protocol which is secure as long as the
attacker's quantum memory device is imperfect. The latter assumption is known
as the noisy-storage model. We experimentally executed this protocol by
performing measurements on polarization-entangled photon pairs. Our work
includes a full security analysis, accounting for all experimental error rates
and finite size effects. This demonstrates the feasibility of two-party
protocols in this model using real-world quantum devices. Finally, we provide a
general analysis of our bit commitment protocol for a range of experimental
parameters.Comment: 21 pages (7 main text +14 appendix), 6+3 figures. New version changed
author's name from Huei Ying Nelly Ng to Nelly Huei Ying Ng, for consistency
with other publication
Quantum Communication Uplink to a 3U CubeSat: Feasibility & Design
Satellites are the efficient way to achieve global scale quantum
communication (Q.Com) because unavoidable losses restrict fiber based Q.Com to
a few hundred kilometers. We demonstrate the feasibility of establishing a
Q.Com uplink with a tiny 3U CubeSat (measuring just 10X10X32 cm^3 ) using
commercial off-the-shelf components, the majority of which have space heritage.
We demonstrate how to leverage the latest advancements in nano-satellite
body-pointing to show that our 4kg CubeSat can provide performance comparable
to much larger 600kg satellite missions. A comprehensive link budget and
simulation was performed to calculate the secure key rates. We discuss design
choices and trade-offs to maximize the key rate while minimizing the cost and
development needed. Our detailed design and feasibility study can be readily
used as a template for global scale Q.Com.Comment: 24 pages, 9 figures, 2 tables. Fixed tables and figure
Space QUEST mission proposal: experimentally testing decoherence due to gravity
Models of quantum systems on curved space-times lack sufficient experimental verification. Some speculative theories suggest that quantum correlations, such as entanglement, may exhibit different behavior to purely classical correlations in curved space. By measuring this effect or lack thereof, we can test the hypotheses behind several such models. For instance, as predicted by Ralph et al [5] and Ralph and Pienaar [1], a bipartite entangled system could decohere if each particle traversed through a different gravitational field gradient. We propose to study this effect in a ground to space uplink scenario. We extend the above theoretical predictions of Ralph and coworkers and discuss the scientific consequences of detecting/failing to detect the predicted gravitational decoherence. We present a detailed mission design of the European Space Agency's Space QUEST (Space—Quantum Entanglement Space Test) mission, and study the feasibility of the mission scheme.Peer ReviewedPostprint (published version
Пошук спільних рис під час обробки текстів людиною та машиною
Language makes human communication possible. Apart from everyday applications, language can provide insights into individuals’ thinking and reasoning. Machine-based analyses of text are becoming widespread in business applications, but their utility in learning contexts are a neglected area of research. Therefore, the goal of the present work is to explore machine-assisted approaches to aid in the analysis of students’ written compositions. A method for extracting common topics from written text is applied to 78 student papers on technology and ethics. The primary tool for analysis is the Latent Dirichlet Allocation algorithm. The results suggest that this machine-based topic extraction method is effective and supports a promising prospect for enhancing classroom learning and instruction. The method may also prove beneficial in other applied applications, like those in clinical and counseling practice.
Мова уможливлює людське спілкування. Крім повсякденних застосувань, мова може забезпечити розуміння думок та міркувань людей. Машинний аналіз тексту набуває великої популярності у сфері ведення бізнесу, проте його корисність у навчальному процесі залишається досі недослідженою темою. Тому мета статті – дослідити автоматизовані підходи, що можуть бути корисними під час аналізу писемної продукції студентів. 78 студентських робіт із галузей технології та етики було піддано аналізу з вико-ристанням методу вилучення загальних тем із письмового тексту. Основним інструментом для аналізу став алгоритм латентного розташування Дирихле. Результати свідчать про те, що цей автоматизований інструмент виокремлення теми є ефективним й перспективним у плані підвищення рівня навчання в аудиторії та викладання. Метод також може бути засто-сованим в інших прикладних програмах, наприклад, у тих, якими користуються під час клінічної практики та консультування
Parameters identification of unknown delayed genetic regulatory networks by a switching particle swarm optimization algorithm
The official published version can be found at the link below.This paper presents a novel particle swarm optimization (PSO) algorithm based on Markov chains and competitive penalized method. Such an algorithm is developed to solve global optimization problems with applications in identifying unknown parameters of a class of genetic regulatory networks (GRNs). By using an evolutionary factor, a new switching PSO (SPSO) algorithm is first proposed and analyzed, where the velocity updating equation jumps from one mode to another according to a Markov chain, and acceleration coefficients are dependent on mode switching. Furthermore, a leader competitive penalized multi-learning approach (LCPMLA) is introduced to improve the global search ability and refine the convergent solutions. The LCPMLA can automatically choose search strategy using a learning and penalizing mechanism. The presented SPSO algorithm is compared with some well-known PSO algorithms in the experiments. It is shown that the SPSO algorithm has faster local convergence speed, higher accuracy and algorithm reliability, resulting in better balance between the global and local searching of the algorithm, and thus generating good performance. Finally, we utilize the presented SPSO algorithm to identify not only the unknown parameters but also the coupling topology and time-delay of a class of GRNs.This research was partially supported by the National Natural Science Foundation of PR China (Grant No. 60874113), the Research Fund for the Doctoral Program of Higher Education (Grant No. 200802550007), the Key Creative Project of Shanghai Education Community (Grant No. 09ZZ66), the Key Foundation Project of Shanghai (Grant No. 09JC1400700), the Engineering and Physical Sciences Research Council EPSRC of the UK under Grant No. GR/S27658/01, the International Science and Technology Cooperation Project of China under Grant No. 2009DFA32050, an International Joint Project sponsored by the Royal Society of the UK, and the Alexander von Humboldt Foundation of Germany
In-field entanglement distribution over a 96 km-long submarine optical fibre
Techniques for the distribution of quantum-secured cryptographic keys have
reached a level of maturity allowing them to be implemented in all kinds of
environments, away from any form of laboratory infrastructure. Here, we detail
the distribution of entanglement between Malta and Sicily over a 96 km-long
submarine telecommunications optical fibre cable. We used this standard
telecommunications fibre as a quantum channel to distribute
polarisation-entangled photons and were able to observe around 257 photon pairs
per second, with a polarisation visibility above 90%. Our experiment
demonstrates the feasibility of using deployed submarine telecommunications
optical fibres as long-distance quantum channels for polarisation-entangled
photons. This opens up a plethora of possibilities for future experiments and
technological applications using existing infrastructure.Comment: 6 pages, 4 figure
Improving Quality of Life Using ICT, IoT and AI (HONET)
Autonomous robots can be assigned with various tasks such as moving payload, analyzing terrain, and capturing data in an environment. For an Autonomous Mobile Robot (AMR) to execute such tasks the robot (Hussarion ROSbot) will require efficient algorithms and techniques to reference its current location. The robot is relative to surrounding obstacles in its predetermined path. The conducted research study explains the coordinated method used to successfully allow a robot to identify its position in the environment (Gazebo Simulation) and avoid obstructions with increasing velocity - contingent on nearby surroundings. The results show multiple robots individually tasked with distinct roles, while incorporating an obstacle avoidance function used to avoid both static and dynamic obstacles. Such results can be used in the applications of a high-capacity warehouse environments
Gun Control: The Gun Violence Epidemic in the U.S.
While holding almost half of all civilian-owned guns around the globe and yet only 4.4 percent of the world’s population, the United States of America is heavily centered around gun rights due to the 2nd amendment in the U.S. Constitution. But gun violence is on the rise as deaths due to gun violence are at its highest rate in nearly 40 years. Americans are divided amongst themselves when it comes to how we must approach this issue. In order to reduce gun violence in the U.S., both Republican and Democrat leaders must come together and make bipartisan moves to implement stricter gun control regulation at the federal level. This paper explores the level of urgency gun control regulation calls for as well as the many ways gun violence is tolerated. By using previous studies and a survey poll conducted by myself, statistical data will be used to support arguments for better gun control regulation at the federal level. These research sources include quantitative methods. Since gun violence is heavily credited to the gun purchasing system itself, federal changes must be made in the process to legally obtain a gun. From extending background check wait periods to instilling limitations on age and types of weapon purchased, the reduction of America’s high gun violence rates is certainly possible if Congress would pave a pathway and actively pass new gun control laws
- …
