26,330 research outputs found
Multiparty Quantum Secret Sharing
Based on a quantum secure direct communication (QSDC) protocol [Phys. Rev.
A69(04)052319], we propose a -threshold scheme of multiparty quantum
secret sharing of classical messages (QSSCM) using only single photons. We take
advantage of this multiparty QSSCM scheme to establish a scheme of multiparty
secret sharing of quantum information (SSQI), in which only all quantum
information receivers collaborate can the original qubit be reconstructed. A
general idea is also proposed for constructing multiparty SSQI schemes from any
QSSCM scheme
Optimization of robustness of scale-free network to random and targeted attacks
The scale-fee networks, having connectivity distribution (where is the site connectivity), is very resilient to random
failures but fragile to intentional attack. The purpose of this paper is to
find the network design guideline which can make the robustness of the network
to both random failures and intentional attack maximum while keeping the
average connectivity per node constant. We find that when $=3$ the
robustness of the scale-free networks reach its maximum value if the minimal
connectivity $m=1$, but when is larger than four, the networks will
become more robust to random failures and targeted attacks as the minimal
connectivity gets larger
Optimization of scale-free network for random failures
It has been found that the networks with scale-free distribution are very
resilient to random failures. The purpose of this work is to determine the
network design guideline which maximize the network robustness to random
failures with the average number of links per node of the network is constant.
The optimal value of the distribution exponent and the minimum connectivity to
different network size are given in this paper. Finally, the optimization
strategy how to improve the evolving network robustness is given.Comment: 6 pages, 1 figur
A simple and sensitive silver-staining method for detecting AFLP markers in fungi
A simple and fast silver-staining method is described for detecting amplified fragment length polymorphism (AFLP) markers separated in denaturing polyacrylamide gels. The silver-staining method produced a good degree of resolution and sensitivity and could be widely applicable in AFLP analyses of fungi
Multiparty Quantum Secret Sharing Based on Entanglement Swapping
A multiparty quantum secret sharing (QSS) protocol is proposed by using
swapping quantum entanglement of Bell states. The secret messages are imposed
on Bell states by local unitary operations. The secret messages are split into
several parts and each part is distributed to a party so that no action of a
subset of all the parties but their entire cooperation is able to read out the
secret messages. In addition, the dense coding is used in this protocol to
achieve a high efficiency. The security of the present multiparty QSS against
eavesdropping has been analyzed and confirmed even in a noisy quantum channel.Comment: 5 page
Nuclear Modification to Parton Distribution Functions and Parton Saturation
We introduce a generalized definition of parton distribution functions (PDFs)
for a more consistent all-order treatment of power corrections. We present a
new set of modified DGLAP evolution equations for nuclear PDFs, and show that
the resummed -type of leading nuclear size enhanced power
corrections significantly slow down the growth of gluon density at small-.
We discuss the relation between the calculated power corrections and the
saturation phenomena.Comment: 4 pages, to appear in the proceedings of QM200
Runway exit designs for capacity improvement demonstrations. Phase 2: Computer model development
The development is described of a computer simulation/optimization model to: (1) estimate the optimal locations of existing and proposed runway turnoffs; and (2) estimate the geometric design requirements associated with newly developed high speed turnoffs. The model described, named REDIM 2.0, represents a stand alone application to be used by airport planners, designers, and researchers alike to estimate optimal turnoff locations. The main procedures are described in detail which are implemented in the software package and possible applications are illustrated when using 6 major runway scenarios. The main output of the computer program is the estimation of the weighted average runway occupancy time for a user defined aircraft population. Also, the location and geometric characteristics of each turnoff are provided to the user
Strangeness spin, magnetic moment and strangeness configurations of the proton
The implications of the empirical signatures for the positivity of the
strangeness magnetic moment , and the negativity of the strangeness
contribution to the proton spin , on the possible
configurations of five quarks in the proton are analyzed. The empirical signs
for the values of these two observables can only be obtained in configurations
where the system is orbitally excited and the quark is in the
ground state. The configurations, in which the is orbitally excited,
which include the conventional congfiguration, with the
exception of that, in which the component has spin 2, yield negative
values for . Here the strangeness spin , the strangeness
magnetic moment and the axial coupling constant are calculated
for all possible configurations of the component of the proton. In
the configuration with flavor-spin symmetry, which is
likely to have the lowest energy, is positive and .Comment: 17 page
- …