期刊文献+
共找到28篇文章
< 1 2 >
每页显示 20 50 100
Measurement-Device-Independent Quantum Key Distribution with Two-Way Local Operations and Classical Communications 被引量:1
1
作者 谭勇刚 刘强 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第9期10-13,共4页
Measurement-device-independent quantum key distribution (MDI-QKD) is proven to be immune to all the de- tector side channel attacks. With two symmetric quantum channels, the maximal transmission distance can be doub... Measurement-device-independent quantum key distribution (MDI-QKD) is proven to be immune to all the de- tector side channel attacks. With two symmetric quantum channels, the maximal transmission distance can be doubled when compared with the prepare-and-measure QKD. An interesting question is whether the transmission distance can be extended further. In this work, we consider the contributions of the two-way local operations and classical communications to the key generation rate and transmission distance of the MDI-QKD. Our numerical results show that the secure transmission distances are increased by about 12kin and 8 km when the 1 13 and the 2 B steps are implemented, respectively. 展开更多
关键词 QKD MDI is on Measurement-Device-Independent Quantum Key Distribution with Two-Way local operations and Classical Communications EPR QBER of with
下载PDF
Noiseless Linear Amplification with General Local Unitary Operations
2
作者 杨颂 阮宁娟 +2 位作者 苏云 林栩凌 邬志强 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第7期10-13,共4页
Noiseless linear amplification (NLA), first proposed by Ralpha et al., is a nondeterministic amplification process which gives gain to the Fock state |n) → gn|n), with g being the amplification gain. We here gi... Noiseless linear amplification (NLA), first proposed by Ralpha et al., is a nondeterministic amplification process which gives gain to the Fock state |n) → gn|n), with g being the amplification gain. We here give a general frame- work for improving the NLA scheme with arbitrary general local unitary operations. We derive the improvement in the amplification gain in 0 1 photon subspace. In particular, we study if the local unitary is composed of sin- gle mode squeezing and coherent displacement operation. Finally, numerical simulations show that local unitary operation could give a further enhancement in the amplification gain as well as the success probability, making the NLA more feasible in future optic quantum communications. 展开更多
关键词 NLA on MODE in Noiseless Linear Amplification with General local Unitary operations of IS with
下载PDF
Parametric down-conversion with local operation and two-way classical communication
3
作者 刘强 谭勇刚 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第4期44-47,共4页
The decoy-state quantum key distribution protocol suggested by Adachi et al. (Phys. Rev. Lett 99 180503 (2007)) is proven to be secure and feasible with current techniques. It owns two attractive merits, i.e., its... The decoy-state quantum key distribution protocol suggested by Adachi et al. (Phys. Rev. Lett 99 180503 (2007)) is proven to be secure and feasible with current techniques. It owns two attractive merits, i.e., its longer secure transmission distance and more convenient operation design. In this paper, we first improve the protocol with the aid of local operation and two-way classical communication (2-LOCC). After our modifications, the secure transmission distance is increased by about 20 km, which will make the protocol more practicable. 展开更多
关键词 parametric down-conversion local operation and two-way classical communication B step
下载PDF
LOCALIZATION OPERATORS ASSOCIATED WITH THE SPHERICAL MEAN OPERATOR
4
作者 Jiman Zhao 《Analysis in Theory and Applications》 2005年第4期317-325,共9页
In this paper, we define the localization operator associated with the spherical mean operator, and show that the localization operator is not only bounded, but also in Schatten-Von Neumann class. We also give a trace... In this paper, we define the localization operator associated with the spherical mean operator, and show that the localization operator is not only bounded, but also in Schatten-Von Neumann class. We also give a trace formula when the symbol function is a nonnegative function. 展开更多
关键词 Wigner transform localization operator trace formula
下载PDF
TWO WEIGHT CHARACTERIZATIONS FOR THE MULTILINEAR LOCAL MAXIMAL OPERATORS
5
作者 Yali PAN Qingying XUE 《Acta Mathematica Scientia》 SCIE CSCD 2021年第2期596-608,共13页
Let 0<β<1 andΩbe a proper open and non-empty subset of R^(n).In this paper,the object of our investigation is the multilinear local maximal operator Mβ,defined by M_(β)((f))(x)=sup_(Q(∈)xQ∈Fβ)Π_(i=1)^m1/... Let 0<β<1 andΩbe a proper open and non-empty subset of R^(n).In this paper,the object of our investigation is the multilinear local maximal operator Mβ,defined by M_(β)((f))(x)=sup_(Q(∈)xQ∈Fβ)Π_(i=1)^m1/|Q|∫_(Q)|f_(i)(y_(i))|dy_(i),where F_(β)={Q(x,l):x∈Ω,l<βd(x,Ω^(c))},Q=Q(x,l)is denoted as a cube with sides parallel to the axes,and x and l denote its center and half its side length.Two-weight characterizations for the multilinear local maximal operator M_(β)are obtained.A formulation of the Carleson embedding theorem in the multilinear setting is proved. 展开更多
关键词 Multilinear local maximal operators A_((p q))^(β)weights two-weight inequalities
下载PDF
Improving entanglement of assistance by local parity–time symmetric operation
6
作者 Zhi He Zun-Yan Nie Qiong Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第12期92-98,共7页
We investigate entanglement of assistance without and with decoherence using a local non-Hermitian operation, i.e.,parity–time(PT) symmetric operation. First we give the explicit expressions of entanglement of assist... We investigate entanglement of assistance without and with decoherence using a local non-Hermitian operation, i.e.,parity–time(PT) symmetric operation. First we give the explicit expressions of entanglement of assistance for a general W-like state of a three-qubit system under a local parity–time symmetric operation. Then for a famous W state without decoherence, we find that entanglement of assistance shared by two parties can be obviously enhanced with the assistance of the third party by a local parity–time symmetric operation. For the decoherence case, we provide two schemes to show the effects of local parity–time symmetric operation on improvement of entanglement of assistance against amplitude damping noise. We find that for the larger amplitude damping case the scheme of PT symmetric operation performed on one of two parties with the influence of noise is superior to that of PT symmetric operation performed on the third party without the influence of noise in suppressing amplitude damping noise. However, for the smaller amplitude damping case the opposite result is given. The obtained results imply that the local PT symmetric operation method may have potential applications in quantum decoherence control. 展开更多
关键词 entanglement of assistance local parity–time symmetric operation amplitude damping noise
下载PDF
Locally Defined Operators and Locally Lipschitz Composition Operators in the Space WBVp(·)([a, b])
7
作者 José Atilio Guerrero Odalis Mejía Nelson Merentes 《Advances in Pure Mathematics》 2016年第10期727-744,共18页
We give a neccesary and sufficient condition on a function such that the composition operator (Nemytskij Operator) H defined by acts in the space and satisfies a local Lipschitz condition. And, we prove that ever... We give a neccesary and sufficient condition on a function such that the composition operator (Nemytskij Operator) H defined by acts in the space and satisfies a local Lipschitz condition. And, we prove that every locally defined operator mapping the space of continuous and bounded Wiener p(&#183;)-variation with variable exponent functions into itself is a Nemytskij com-position operator. 展开更多
关键词 Generalized Variation p(·)-Variation in Wiener’s Sense Variable Exponent CONVERGENCE Helly’s Theorem local Operator
下载PDF
ON THE LOCAL NIKOLSKII CONSTANTS FOR BASKAKOV OPERATORS
8
作者 徐吉华 《Analysis in Theory and Applications》 1992年第4期89-96,共8页
In this paper we obtain all other local Nikolskii constants for Baskakov operators by ap- plying a method of asymptotic expansions,give a complete and satisfactory solution of Lehnhoff s open problems[1].
关键词 ON THE local NIKOLSKII CONSTANTS FOR BASKAKOV OPERATORS
下载PDF
A New Extrapolation Economy Cascadic Multigrid Method for Image Restoration Problems
9
作者 Zhaoteng Chu Ziqi Yan Chenliang Li 《American Journal of Computational Mathematics》 2023年第2期323-341,共19页
In this paper, a new extrapolation economy cascadic multigrid method is proposed to solve the image restoration model. The new method combines the new extrapolation formula and quadratic interpolation to design a nonl... In this paper, a new extrapolation economy cascadic multigrid method is proposed to solve the image restoration model. The new method combines the new extrapolation formula and quadratic interpolation to design a nonlinear prolongation operator, which provides more accurate initial values for the fine grid level. An edge preserving denoising operator is constructed to remove noise and preserve image edges. The local smoothing operator reduces the influence of staircase effect. The experiment results show that the new method not only improves the computational efficiency but also ensures good recovery quality. 展开更多
关键词 Extrapolation Economy Cascadic Multigrid Method New Extrapolation Formula Edge Preserving Denoising Operator local Smoothing Operator
下载PDF
Entanglement Distillation for Mixed States Using Particle Statistics 被引量:1
10
作者 黄晓理 程丽红 衣学喜 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第4期772-774,共3页
We extend the idea of entanglement concentration protocol for pure states (Phys. Rev. Lett. 88, 187903) to the case of entanglement distillation for mixed states. The scheme works only with particle statistics and l... We extend the idea of entanglement concentration protocol for pure states (Phys. Rev. Lett. 88, 187903) to the case of entanglement distillation for mixed states. The scheme works only with particle statistics and local operations, without the need of any other interactions. We show that the maximally entangled state can be distilled out when the initial state is pure, otherwise the entanglement distilled depends on the off-diagonal element of density matrix of the initial state. Because of the requirement for density matrix, the entanglement distilled is always less than one, and this result is the same for both fermionic and bosonic particles. The distillation efficiency is a product of the diagonal elements of the initial state, it takes the maximum 50%, the same as that in the case for pure states.We extend the idea of entanglement concentration protocol for pure states (Phys. Rev. Lett. 88, 187903) to the case of entanglement distillation for mixed states. The scheme works only with particle statistics and local operations, without the need of any other interactions. We show that the maximally entangled state can be distilled out when the initial state is pure, otherwise the entanglement distilled depends on the off-dlagonal element of density matrix of the initial state. Because of the requirement for density matrix, the entanglement distilled is always less than one, and this result is the same for both fermionic and bosonic particles. The distillation effciency is a product of the diagonal elements of the initial state, it takes the maximum 50%, the same as that in the case for pure states. 展开更多
关键词 QUANTUM COMPUTATION local operations PURIFICATION NONlocalITY
下载PDF
Classification of Bipartite and Tripartite Qutrit Entanglement Under SLOCC 被引量:1
11
作者 YANG Xin-Gang WANG Zhi-Xi +1 位作者 WANG Xiao-Hong FEI Shao-Ming 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第9期651-654,共4页
We classify biqutrit and triqutrit pure states under stochastic local operations and classical communication. By investigating the right singular vector spaces of the coefticient matrices of the states, we obtain expl... We classify biqutrit and triqutrit pure states under stochastic local operations and classical communication. By investigating the right singular vector spaces of the coefticient matrices of the states, we obtain explicitly two equivalent classes of biqutrit states and twelve equivalent classes of triqutrit states respectively. 展开更多
关键词 biqutrit triqutrit stochastic local operations and classical communication
下载PDF
Quantum Secure Direct Communication Network with Two-Step Protocol 被引量:20
12
作者 李熙涵 周萍 +3 位作者 梁玉洁 李春燕 周宏余 邓富国 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第5期1080-1083,共4页
An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein-Podolsky-Rosen (EPR) pair block as the quantum information carrier. The server, say Alice,... An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein-Podolsky-Rosen (EPR) pair block as the quantum information carrier. The server, say Alice, prepares and measures the EPR pairs in the quantum communication and the users perform the four local unitary operations to encode their message. Anyone of the legitimate users can communicate another one on the network securely. Since almost all of the instances in this scheme are useful and each EPR pair can carry two bits of information, the efficiency for qubits and the source capacity both approach the maximal values. 展开更多
关键词 local UNITARY operations KEY DISTRIBUTION EPR PAIRS BELL THEOREM GHZSTATE CRYPTOGRAPHY ENTANGLEMENT SCHEME TELEPORTATION DIALOGUE
下载PDF
Efficient Multiparty Quantum Secret Sharing with Greenberger-Horne-Zeilinger States 被引量:4
13
作者 邓富国 周萍 +2 位作者 李熙涵 李春燕 周宏余 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第5期1084-1087,共4页
An effcient multiparty quantum secret sharing scheme is proposed with Greenberger-Horne-Zeilinger (GHZ) states following some ideas in quantum dense coding. The agents take the single-photon measurements on the phot... An effcient multiparty quantum secret sharing scheme is proposed with Greenberger-Horne-Zeilinger (GHZ) states following some ideas in quantum dense coding. The agents take the single-photon measurements on the photons received for eavesdropping check and exploit the four local unitary operations Ⅰ, σx, σx and iσy to code their message. This scheme has the advantage of high capacity as each GHZ state can carry two bits of information. The parties do not need to announce the measuring bases for almost all the photons, which will reduce the classical information exchanged largely. The intrinsic efficiency for qubits and the total effciency both approach the maximal values. 展开更多
关键词 SECURE DIRECT COMMUNICATION local UNITARY operations KEY DISTRIBUTION NOISY CHANNELS ENTANGLEMENT SCHEME TELEPORTATION CRYPTOGRAPHY PAIRS
下载PDF
Classical Communication and Entanglement Cost in Preparing a Class of Multi-qubit States 被引量:2
14
作者 PAN Gui-Xia LIU Yi-Min ZHANG Zhan-Jun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第3期631-634,共4页
Recently, several similar protocols [J. Opt. B 4 (2002) 380; Phys. Lett. A 316 (2003) 159; Phys. Lett. A 355 (2006) 285; Phys. Lett. A 336 (2005) 317] for remotely preparing a class of multi-qubit states (i.... Recently, several similar protocols [J. Opt. B 4 (2002) 380; Phys. Lett. A 316 (2003) 159; Phys. Lett. A 355 (2006) 285; Phys. Lett. A 336 (2005) 317] for remotely preparing a class of multi-qubit states (i.e, α[0...0〉 +β[1... 1〉) were proposed, respectively. In this paper, by applying the controlled-not (CNOT) gate, a new simple protocol is proposed for remotely preparing such class of states. Compared to the previous protocols, both classical communication cost and required quantum entanglement in our protocol are remarkably reduced. Moreover, the difficulty of identifying some quantum states in our protocol is also degraded. Hence our protocol is more economical and feasible. 展开更多
关键词 remote state preparation quantum entanglement classical communication cost projective measurement local unitary operation
下载PDF
Face Recognition on Partial and Holistic LBP Features 被引量:2
15
作者 Xiao-Rong Pu,Yi Zhou,and Rui-Yi Zhou the School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 611731,China 《Journal of Electronic Science and Technology》 CAS 2012年第1期56-60,共5页
An algorithm for face description and recognition based on multi-resolution with multi-scale local binary pattern (multi-LBP) features is proposed. The facial image pyramid is constructed and each facial image is di... An algorithm for face description and recognition based on multi-resolution with multi-scale local binary pattern (multi-LBP) features is proposed. The facial image pyramid is constructed and each facial image is divided into various regions from which partial and holistic local binary patter (LBP) histograms are extracted. All LBP features of each image are concatenated to a single LBP eigenvector with different resolutions. The dimensionaUty of LBP features is then reduced by a local margin alignment (LMA) algorithm based on manifold, which can preserve the between-class variance. Support vector machine (SVM) is applied to classify facial images. Extensive experiments on ORL and CMU face databases clearly show the superiority of the proposed scheme over some existed algorithms, especially on the robustness of the method against different facial expressions and postures of the subjects. 展开更多
关键词 Face recognition local binary pattern operator multi-resolution with multi-scale local binary pattern ocal margin alignment dimensionality reduction.
下载PDF
Quantum Dialogue by Using Non-Symmetric Quantum Channel 被引量:1
16
作者 詹佑邦 张伶伶 +1 位作者 王郁武 张群永 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第4期648-652,共5页
A protocol for quantum dialogue is proposed to exchange directly the communicator's secret messages by using a three-dimensional Bell state and a two-dimensional Bell state as quantum channel with quantum superdence ... A protocol for quantum dialogue is proposed to exchange directly the communicator's secret messages by using a three-dimensional Bell state and a two-dimensional Bell state as quantum channel with quantum superdence coding, local collective unitary operations, and entanglement swapping. In this protocol, during the process of trans- mission of particles, the transmitted particles do not carry any secret messages and are transmitted only one time. The protocol has higher source capacity than protocols using symmetric two-dimensional states. The security is ensured by the unitary operations randomly performed on all checking groups before the particle sequence is transmitted and the application of entanglement swapping. 展开更多
关键词 quantum dialogue non-symmetric quantum channel local collective unitary operation entanglement swapping
下载PDF
Tracking topological entity changes in 3D collaborative modeling systems 被引量:2
17
作者 Cheng Yuan He Fazhi +2 位作者 Huang Zhiyong Cai Xiantao Zhang Dejun 《Computer Aided Drafting,Design and Manufacturing》 2012年第1期89-98,共10页
One of the key problems in collaborative geometric modeling systems is topological entity correspondence when topolog- ical structure of geometry models on collaborative sites changes, ha this article, we propose a so... One of the key problems in collaborative geometric modeling systems is topological entity correspondence when topolog- ical structure of geometry models on collaborative sites changes, ha this article, we propose a solution for tracking topological entity alterations in 3D collaborative modeling environment. We firstly make a thorough analysis and detailed categorization on the altera- tion properties and causations for each type of topological entity, namely topological face and topological edge. Based on collabora- tive topological entity naming mechanism, a data structure called TEST (Topological Entity Structure Tree) is introduced to track the changing history and current state of each topological entity, to embody the relationship among topological entities. Rules and algo- rithms are presented for identification of topological entities referenced by operations for correct execution and model consistency. The algorithm has been verified within the prototype we have implemented with ACIS. 展开更多
关键词 TEST textual modeling command local operation topological entity changes
下载PDF
Simplified Four-Qubit Cluster State for Splitting Arbitrary Single-Qubit Information
18
作者 尹晓峰 刘益民 +1 位作者 章文 张战军 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第1期49-53,共5页
The simplified four-qubit cluster state (i.e., (|0000〉 + |0011〉 + |1100〉 -|1111〉)/2) is explored for splitting an arbitrary single-qubit quantum information (QI). Various feasible distributions of the ... The simplified four-qubit cluster state (i.e., (|0000〉 + |0011〉 + |1100〉 -|1111〉)/2) is explored for splitting an arbitrary single-qubit quantum information (QI). Various feasible distributions of the four qubits among the Q,I sender and receivers for tri-splitting or hi-splitting are found out. For the distribution representations the corresponding splitting schemes and their LOCCs (local operation and classical communication) are presented amply while others are mentioned concisely. 展开更多
关键词 simplified cluster state quantum information splitting single-qubit quantum information local operation and classical communication
下载PDF
Multiparty Quantum Secret Report
19
作者 邓富国 李熙涵 +3 位作者 李春燕 周萍 梁玉洁 周宏余 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第7期1676-1679,共4页
A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M + 1)-particle Greenberger-Horne-Zeilinger (GHZ) states that only Alice k... A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M + 1)-particle Greenberger-Horne-Zeilinger (GHZ) states that only Alice knows which state each (M + 1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a aσ∞ operation on her particle in the GHZ state or not. After the GHZ states (the quantum key) are used up, the parties check whether there is a vicious eavesdropper, say Eve, monitoring the quantum line, by picking out some samples from the GHZ states shared and measuring them with two measuring bases. After confirming the security of the quantum key, they use the remaining GHZ states repeatedly for the next round of quantum communication. This scheme has the advantage of high intrinsic efficiency for the qubits and total efficiency. 展开更多
关键词 SECURE DIRECT COMMUNICATION local UNITARY operations KEY DISTRIBUTION BELLTHEOREM GHZ STATES ENTANGLEMENT CRYPTOGRAPHY SCHEME PROTOCOL NETWORK
下载PDF
Two-Step Deterministic Remote Preparation of an Arbitrary Quantum State
20
作者 王美玉 闫凤利 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第11期792-796,共5页
We present a two-step deterministic remote state preparation protocol for an arbitrary qubit with the aid of a three-particle Greenberger-Horne-Zeilinger state. Generalization of this protocol for higher-dimensional H... We present a two-step deterministic remote state preparation protocol for an arbitrary qubit with the aid of a three-particle Greenberger-Horne-Zeilinger state. Generalization of this protocol for higher-dimensional Hilbert space systems among three parties is also given. We show that only single-particle yon Neumann measurements, local operations, and classical communication are necessary. Moreover, since the overall information of the quantum state can be divided into two different pieces, which may be at different locations, this protocol may be useful in the quantum information field. 展开更多
关键词 remote state preparation GHZ state local operation
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部