3,225 research outputs found
Adjacent Graph Based Vulnerability Assessment for Electrical Networks Considering Fault Adjacent Relationships Among Branches
Security issues related to vulnerability assessment in electrical networks are necessary for operators to identify the critical branches. At present, using complex network theory to assess the structural vulnerability of the electrical network is a popular method. However, the complex network theory cannot be comprehensively applicable to the operational vulnerability assessment of the electrical network because the network operation is closely dependent on the physical rules not only on the topological structure. To overcome the problem, an adjacent graph (AG) considering the topological, physical, and operational features of the electrical network is constructed to replace the original network. Through the AG, a branch importance index that considers both the importance of a branch and the fault adjacent relationships among branches is constructed to evaluate the electrical network vulnerability. The IEEE 118-bus system and the French grid are employed to validate the effectiveness of the proposed method.National Natural Science Foundation of China under Grant U1734202National Key Research and Development Plan of China under Grant 2017YFB1200802-12National Natural Science Foundation of China under Grant 51877181National Natural Science Foundation of China under Grant 61703345Chinese Academy of Sciences, under Grant 2018-2019-0
Radial Angular Momentum Transfer and Magnetic Barrier for Short-Type Gamma-Ray Burst Central Engine Activity
Soft extended emission (EE) following initial hard spikes up to 100 seconds
was observed with {\em Swift}/BAT for about half of short-type gamma-ray bursts
(SGRBs). This challenges the conversional central engine models of SGRBs, i.e.,
compact star merger models. In the framework of the black hole-neutron star
merger models, we study the roles of the radial angular momentum transfer in
the disk and the magnetic barrier around the black hole for the activity of
SGRB central engines. We show that the radial angular momentum transfer may
significantly prolong the lifetime of the accretion process and multiple
episodes may be switched by the magnetic barrier. Our numerical calculations
based on the models of the neutrino-dominated accretion flows suggest that the
disk mass is critical for producing the observed EE. In case of the mass being
, our model can reproduce the observed timescale and
luminosity of both the main and EE episodes in a reasonable parameter set. The
predicted luminosity of the EE component is lower than the observed EE with
about one order of magnitude and the timescale is shorter than 20 seconds if
the disk mass being . {\em Swift}/BAT-like instruments may
be not sensitive enough to detect the EE component in this case. We argue that
the EE component would be a probe for merger process and disk formation for
compact star mergers.Comment: 9 pages, 3 figures, accepted for publication in Ap
Source attack of decoy-state quantum key distribution using phase information
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to
achieve information-theoretically secure key generation. This field is now
approaching the stage of commercialization, but many practical QKD systems
still suffer from security loopholes due to imperfect devices. In fact,
practical attacks have successfully been demonstrated. Fortunately, most of
them only exploit detection-side loopholes which are now closed by the recent
idea of measurement-device-independent QKD. On the other hand, little attention
is paid to the source which may still leave QKD systems insecure. In this work,
we propose and demonstrate an attack that exploits a source-side loophole
existing in qubit-based QKD systems using a weak coherent state source and
decoy states. Specifically, by implementing a linear-optics
unambiguous-state-discrimination measurement, we show that the security of a
system without phase randomization --- which is a step assumed in conventional
security analyses but sometimes neglected in practice --- can be compromised.
We conclude that implementing phase randomization is essential to the security
of decoy-state QKD systems under current security analyses.Comment: 12 pages, 5 figure
High visibility on-chip quantum interference of single surface plasmons
Quantum photonic integrated circuits (QPICs) based on dielectric waveguides
have been widely used in linear optical quantum computation. Recently, surface
plasmons have been introduced to this application because they can confine and
manipulate light beyond the diffraction limit. In this study, the on-chip
quantum interference of two single surface plasmons was achieved using
dielectric-loaded surface-plasmon-polariton waveguides. The high visibility
(greater than 90%) proves the bosonic nature of single plasmons and emphasizes
the feasibility of achieving basic quantum logic gates for linear optical
quantum computation. The effect of intrinsic losses in plasmonic waveguides
with regard to quantum information processing is also discussed. Although the
influence of this effect was negligible in the current experiment, our studies
reveal that such losses can dramatically reduce quantum interference visibility
in certain cases; thus, quantum coherence must be carefully considered when
designing QPIC devices.Comment: 6 pages, 4 figure
Asynchronous measurement-device-independent quantum key distribution with hybrid source
The linear constraint of secret key rate capacity is overcome by the
tiwn-field quantum key distribution (QKD). However, the complex phase-locking
and phase-tracking technique requirements throttle the real-life applications
of twin-field protocol. The asynchronous measurement-device-independent (AMDI)
QKD or called mode-pairing QKD protocol [PRX Quantum 3, 020315 (2022), Nat.
Commun. 13, 3903 (2022)] can relax the technical requirements and keep the
similar performance of twin-field protocol. Here, we propose an AMDI-QKD
protocol with a nonclassical light source by changing the phase-randomized weak
coherent state to a phase-randomized coherent-state superposition (CSS) in the
signal state time window. Simulation results show that our proposed hybrid
source protocol significantly enhances the key rate of the AMDI-QKD protocol,
while exhibiting robustness to imperfect modulation of nonclassical light
sources.Comment: 9 pages, 4 figure
N,N′-Di-8-quinolyladipamide
The complete molecule of the title compound, C24H22N4O2, is generated by a crystallographic inversion centre located at the mid-point of the central C—C bond. The quinoline ring system and the hexyl chain are both essentially planar, and the dihedral angle between them is 46.30 (2)°. Intramolecular N—H⋯N and C—H⋯O hydrogen bonds form five- and six-numbered rings, respectively. The crystal packing is stabilized by short C—H⋯O interactions
- …