3,225 research outputs found

    Adjacent Graph Based Vulnerability Assessment for Electrical Networks Considering Fault Adjacent Relationships Among Branches

    Get PDF
    Security issues related to vulnerability assessment in electrical networks are necessary for operators to identify the critical branches. At present, using complex network theory to assess the structural vulnerability of the electrical network is a popular method. However, the complex network theory cannot be comprehensively applicable to the operational vulnerability assessment of the electrical network because the network operation is closely dependent on the physical rules not only on the topological structure. To overcome the problem, an adjacent graph (AG) considering the topological, physical, and operational features of the electrical network is constructed to replace the original network. Through the AG, a branch importance index that considers both the importance of a branch and the fault adjacent relationships among branches is constructed to evaluate the electrical network vulnerability. The IEEE 118-bus system and the French grid are employed to validate the effectiveness of the proposed method.National Natural Science Foundation of China under Grant U1734202National Key Research and Development Plan of China under Grant 2017YFB1200802-12National Natural Science Foundation of China under Grant 51877181National Natural Science Foundation of China under Grant 61703345Chinese Academy of Sciences, under Grant 2018-2019-0

    Radial Angular Momentum Transfer and Magnetic Barrier for Short-Type Gamma-Ray Burst Central Engine Activity

    Get PDF
    Soft extended emission (EE) following initial hard spikes up to 100 seconds was observed with {\em Swift}/BAT for about half of short-type gamma-ray bursts (SGRBs). This challenges the conversional central engine models of SGRBs, i.e., compact star merger models. In the framework of the black hole-neutron star merger models, we study the roles of the radial angular momentum transfer in the disk and the magnetic barrier around the black hole for the activity of SGRB central engines. We show that the radial angular momentum transfer may significantly prolong the lifetime of the accretion process and multiple episodes may be switched by the magnetic barrier. Our numerical calculations based on the models of the neutrino-dominated accretion flows suggest that the disk mass is critical for producing the observed EE. In case of the mass being 0.8M\sim 0.8M_{\odot}, our model can reproduce the observed timescale and luminosity of both the main and EE episodes in a reasonable parameter set. The predicted luminosity of the EE component is lower than the observed EE with about one order of magnitude and the timescale is shorter than 20 seconds if the disk mass being 0.2M\sim 0.2M_{\odot}. {\em Swift}/BAT-like instruments may be not sensitive enough to detect the EE component in this case. We argue that the EE component would be a probe for merger process and disk formation for compact star mergers.Comment: 9 pages, 3 figures, accepted for publication in Ap

    Source attack of decoy-state quantum key distribution using phase information

    Get PDF
    Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security loopholes due to imperfect devices. In fact, practical attacks have successfully been demonstrated. Fortunately, most of them only exploit detection-side loopholes which are now closed by the recent idea of measurement-device-independent QKD. On the other hand, little attention is paid to the source which may still leave QKD systems insecure. In this work, we propose and demonstrate an attack that exploits a source-side loophole existing in qubit-based QKD systems using a weak coherent state source and decoy states. Specifically, by implementing a linear-optics unambiguous-state-discrimination measurement, we show that the security of a system without phase randomization --- which is a step assumed in conventional security analyses but sometimes neglected in practice --- can be compromised. We conclude that implementing phase randomization is essential to the security of decoy-state QKD systems under current security analyses.Comment: 12 pages, 5 figure

    High visibility on-chip quantum interference of single surface plasmons

    Full text link
    Quantum photonic integrated circuits (QPICs) based on dielectric waveguides have been widely used in linear optical quantum computation. Recently, surface plasmons have been introduced to this application because they can confine and manipulate light beyond the diffraction limit. In this study, the on-chip quantum interference of two single surface plasmons was achieved using dielectric-loaded surface-plasmon-polariton waveguides. The high visibility (greater than 90%) proves the bosonic nature of single plasmons and emphasizes the feasibility of achieving basic quantum logic gates for linear optical quantum computation. The effect of intrinsic losses in plasmonic waveguides with regard to quantum information processing is also discussed. Although the influence of this effect was negligible in the current experiment, our studies reveal that such losses can dramatically reduce quantum interference visibility in certain cases; thus, quantum coherence must be carefully considered when designing QPIC devices.Comment: 6 pages, 4 figure

    Asynchronous measurement-device-independent quantum key distribution with hybrid source

    Full text link
    The linear constraint of secret key rate capacity is overcome by the tiwn-field quantum key distribution (QKD). However, the complex phase-locking and phase-tracking technique requirements throttle the real-life applications of twin-field protocol. The asynchronous measurement-device-independent (AMDI) QKD or called mode-pairing QKD protocol [PRX Quantum 3, 020315 (2022), Nat. Commun. 13, 3903 (2022)] can relax the technical requirements and keep the similar performance of twin-field protocol. Here, we propose an AMDI-QKD protocol with a nonclassical light source by changing the phase-randomized weak coherent state to a phase-randomized coherent-state superposition (CSS) in the signal state time window. Simulation results show that our proposed hybrid source protocol significantly enhances the key rate of the AMDI-QKD protocol, while exhibiting robustness to imperfect modulation of nonclassical light sources.Comment: 9 pages, 4 figure

    N,N′-Di-8-quinolyladipamide

    Get PDF
    The complete molecule of the title compound, C24H22N4O2, is generated by a crystallographic inversion centre located at the mid-point of the central C—C bond. The quinoline ring system and the hexyl chain are both essentially planar, and the dihedral angle between them is 46.30 (2)°. Intra­molecular N—H⋯N and C—H⋯O hydrogen bonds form five- and six-numbered rings, respectively. The crystal packing is stabilized by short C—H⋯O inter­actions
    corecore