2,029 research outputs found

    Universally-composable finite-key analysis for efficient four-intensity decoy-state quantum key distribution

    Full text link
    We propose an efficient four-intensity decoy-state BB84 protocol and derive concise security bounds for this protocol with the universally composable finite-key analysis method. Comparing with the efficient three-intensity protocol, we find that our efficient four-intensity protocol can increase the secret key rate by at least 30%30\%. Particularly, this increasing rate of secret key rate will be raised as the transmission distance increases. At a large transmission distance, our efficient four-intensity protocol can improve the performance of quantum key distribution profoundly.Comment: accepted by Eur. Phys. J.

    Based on Two and Three Dimensional Technology to quickly build a Virtual Battlefield

    Get PDF
    AbstractVirtual battlefield environment is the use of computer technology, graphics technology and virtual reality technology to the real battle space in the computer. As technology advances and development, virtual battlefield environment system has been applied more and more combat troops and combat command being. Virtual Battlefield Environment Simulation System is a system for the commander to provide a realistic battlefield environment to facilitate their understanding of the terrain, the battlefield awareness information. In this paper, two-dimensional battlefield maps based on MapObject structures and the construction of three-dimensional virtual battlefield environment problem, a second, three-dimensional virtual battlefield environment with the rapid construction techniques. Operational commanders can quickly build a virtual battlefield, not only from the macro real-time battlefield information and to grasp the battlefield situation, but also learned from the battlefield of detailed microscopic details
    • …
    corecore