13,731 research outputs found
Scalable solid-state quantum computation in decoherence-free subspaces with trapped ions
We propose a decoherence-free subspaces (DFS) scheme to realize scalable
quantum computation with trapped ions. The spin-dependent Coulomb interaction
is exploited, and the universal set of unconventional geometric quantum gates
is achieved in encoded subspaces that are immune from decoherence by collective
dephasing. The scalability of the scheme for the ion array system is
demonstrated, either by an adiabatic way of switching on and off the
interactions, or by a fast gate scheme with comprehensive DFS encoding and
noise decoupling techniques.Comment: 4 pages, 1 figur
Three-intensity decoy state method for device independent quantum key distribution with basis dependent errors
We study the measurement device independent quantum key distribution (MDIQKD)
in practice with limited resource, when there are only 3 different states in
implementing the decoy-state method and when there are basis dependent coding
errors. We present general formulas for the decoy-state method for two-pulse
sources with 3 different states, which can be applied to the recently proposed
MDIQKD with imperfect single-photon source such as the coherent states or the
heralded states from the parametric down conversion. We point out that the
existing result for secure QKD with source coding errors does not always hold.
We find that very accurate source coding is not necessary. In particular, we
loosen the precision of existing result by several magnitude orders for secure
QKD.Comment: Published version with Eq.(17) corrected. We emphasize that our major
result (Eq.16) for the decoy-state part can be applied to generate a key rate
very close to the ideal case of using infinite different coherent states, as
was numerically demonstrated in Ref.[21]. Published in PRA, 2013, Ja
Regularizing Face Verification Nets For Pain Intensity Regression
Limited labeled data are available for the research of estimating facial
expression intensities. For instance, the ability to train deep networks for
automated pain assessment is limited by small datasets with labels of
patient-reported pain intensities. Fortunately, fine-tuning from a
data-extensive pre-trained domain, such as face verification, can alleviate
this problem. In this paper, we propose a network that fine-tunes a
state-of-the-art face verification network using a regularized regression loss
and additional data with expression labels. In this way, the expression
intensity regression task can benefit from the rich feature representations
trained on a huge amount of data for face verification. The proposed
regularized deep regressor is applied to estimate the pain expression intensity
and verified on the widely-used UNBC-McMaster Shoulder-Pain dataset, achieving
the state-of-the-art performance. A weighted evaluation metric is also proposed
to address the imbalance issue of different pain intensities.Comment: 5 pages, 3 figure; Camera-ready version to appear at IEEE ICIP 201
Proofs of two conjectures on ternary weakly regular bent functions
We study ternary monomial functions of the form f(x)=\Tr_n(ax^d), where
x\in \Ff_{3^n} and \Tr_n: \Ff_{3^n}\to \Ff_3 is the absolute trace
function. Using a lemma of Hou \cite{hou}, Stickelberger's theorem on Gauss
sums, and certain ternary weight inequalities, we show that certain ternary
monomial functions arising from \cite{hk1} are weakly regular bent, settling a
conjecture of Helleseth and Kholosha \cite{hk1}. We also prove that the
Coulter-Matthews bent functions are weakly regular.Comment: 20 page
Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source
The method of decoy-state quantum key distribution (QKD) requests different
intensities of light pulses. Existing theory has assumed exact control of
intensities. Here we propose a simple protocol which is secure and efficient
even there are errors in intensity control. In our protocol, decoy pulses and
signal pulses are generated from the same father pulses with a two-value
attenuation. Given the upper bound of fluctuation of the father pulses, our
protocol is secure provided that the two-value attenuation is done exactly. We
propose to use unbalanced beam-splitters for a stable attenuation. Given that
the intensity error is bounded by , with the same key rate, our method
can achieve a secure distance only 1 km shorter than that of an ideal protocol
with exactly controlled source
Practical decoy state method in quantum key distribution with heralded single photon source
We propose a practical decoy state method with heralded single photon source
for quantum key distribution (QKD). In the protocol, 3 intensities are used and
one can estimate the fraction of single-photon counts. The final key rate over
transmission distance is simulated under various parameter sets. Due to the
lower dark count than that of a coherent state, it is shown that a 3-intensity
decoy-state QKD with a heralded source can work for a longer distance than that
of a coherent state.Comment: 10 pages, 4 Postscript figure
A decoy-state protocol for quantum cryptography with 4 intensities of coherent states
In order to beat any type of photon-number-splitting attack, we propose a
protocol for quantum key distributoin (QKD) using 4 different intensities of
pulses. They are vacuum and coherent states with mean photon number
and . is around 0.55 and this class of pulses are used as the
main signal states. The other two classes of coherent states () are
also used signal states but their counting rates should be studied jointly with
the vacuum. We have shown that, given the typical set-up in practice, the key
rate from the main signal pulses is quite close to the theoretically allowed
maximal rate in the case given the small overall transmittance of
- …