We introduce the concepts of unitary, almost unitary and strongly almost unitary subset of an ordered semigroup. For the notions of almost unitary and strongly almost unitary subset of an ordered semigroup, we use the...We introduce the concepts of unitary, almost unitary and strongly almost unitary subset of an ordered semigroup. For the notions of almost unitary and strongly almost unitary subset of an ordered semigroup, we use the notion of translational hull of an ordered semigroup. If (S,⋅,≤) is an ordered semigroup having an element e such that e ≤ e<sup>2</sup> and U is a nonempty subset of S such that u ≤ eu, u ≤ ue for all u ∈ U, we show that U is almost unitary in S if and only if U is unitary in . Also if (S,⋅,≤) is an ordered semigroup, e ∉ S, U is a nonempty subset of S, S<sup>e</sup>:= S ∪ {e} and U<sup>e</sup>:= U ∪ {e}, we give conditions that an (“extension” of S) ordered semigroup and the subset U<sup>e</sup> of S<sup>e</sup> must satisfy in order for U to be almost unitary or strongly almost unitary in S (in case U is strongly almost unitary in S, then the given conditions are equivalent).展开更多
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc...In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.展开更多
Orthogonal time frequency space(OTFS)technique, which modulates data symbols in the delayDoppler(DD) domain, presents a potential solution for supporting reliable information transmission in highmobility vehicular net...Orthogonal time frequency space(OTFS)technique, which modulates data symbols in the delayDoppler(DD) domain, presents a potential solution for supporting reliable information transmission in highmobility vehicular networks. In this paper, we study the issues of DD channel estimation for OTFS in the presence of fractional Doppler. We first propose a channel estimation algorithm with both low complexity and high accuracy based on the unitary approximate message passing(UAMP), which exploits the structured sparsity of the effective DD domain channel using hidden Markov model(HMM). The empirical state evolution(SE) analysis is then leveraged to predict the performance of our proposed algorithm. To refine the hyperparameters in the proposed algorithm,we derive the update criterion for the hyperparameters through the expectation-maximization(EM) algorithm. Finally, Our simulation results demonstrate that our proposed algorithm can achieve a significant gain over various baseline schemes.展开更多
The performance loss of an approximately 3 dB signal-to-noise ratio is always paid with conventional differential detection compared to the related coherent detection. A new detection scheme consisting of two steps is...The performance loss of an approximately 3 dB signal-to-noise ratio is always paid with conventional differential detection compared to the related coherent detection. A new detection scheme consisting of two steps is proposed for the differential unitary space-time modulation (DUSTM) system. In the first step, the data sequence is estimated by conventional unitary space-time demodulation (DUSTD) and differentially encoded again to produce an initial estimate of the transmitted symbol stream. In the second step, the initial estimate of the symbol stream is utilized to initialize an expectation maximization (EM)-based iterative detector. In each iteration, the most recent detected symbol stream is employed to estimate the channel, which is then used to implement coherent sequence detection to refine the symbol stream. Simulation results show that the proposed detection scheme performs much better than the conventional DUSTD after several iterations.展开更多
Traditional air conditioner used to be in local control mode. However, with the development of modern information technology, the control of air conditioner will have to support many more functions. As a first step ...Traditional air conditioner used to be in local control mode. However, with the development of modern information technology, the control of air conditioner will have to support many more functions. As a first step in such a development, we have implemented a remote monitoring system of unitary air conditioners, using the manufacturing message specification (MMS). MMS is an OSI application protocol designed for the remote control and monitoring of real devices. The functions supported are those that an operator would do normally at the console of the unitary air conditioner. Due to the accomplishment of UMCS (Unitary air conditioner MMS Control System), there will be a leap of the application of MMS and the control technology of unitary air conditioner.展开更多
Generally unitary solution to the system of martix equations over the quaternion field [X mA ns =B ns ,X nn C nt =D nt ] is considered. A necessary and sufficient condition for the existence o...Generally unitary solution to the system of martix equations over the quaternion field [X mA ns =B ns ,X nn C nt =D nt ] is considered. A necessary and sufficient condition for the existence of and the expression for the generally unitary solution of the system are derived.展开更多
An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein-Podolsky-Rosen (EPR) pair block as the quantum information carrier. The server, say Alice,...An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein-Podolsky-Rosen (EPR) pair block as the quantum information carrier. The server, say Alice, prepares and measures the EPR pairs in the quantum communication and the users perform the four local unitary operations to encode their message. Anyone of the legitimate users can communicate another one on the network securely. Since almost all of the instances in this scheme are useful and each EPR pair can carry two bits of information, the efficiency for qubits and the source capacity both approach the maximal values.展开更多
In this paper a quantum dialogue scheme is proposed by using N batches of single photons. The same secret message is encoded on each batch of single photons by the sender with two different unitary operations, and the...In this paper a quantum dialogue scheme is proposed by using N batches of single photons. The same secret message is encoded on each batch of single photons by the sender with two different unitary operations, and then the N batches of single photons are sent to the receiver. After eavesdropping check, the message is encoded on the one remaining batch by the receiver. It is shown that the intercept-and-resend attack and coupling auxiliary modes attack can be resisted more efficiently, because the photons are sent only once in our quantum dialogue scheme.展开更多
文摘We introduce the concepts of unitary, almost unitary and strongly almost unitary subset of an ordered semigroup. For the notions of almost unitary and strongly almost unitary subset of an ordered semigroup, we use the notion of translational hull of an ordered semigroup. If (S,⋅,≤) is an ordered semigroup having an element e such that e ≤ e<sup>2</sup> and U is a nonempty subset of S such that u ≤ eu, u ≤ ue for all u ∈ U, we show that U is almost unitary in S if and only if U is unitary in . Also if (S,⋅,≤) is an ordered semigroup, e ∉ S, U is a nonempty subset of S, S<sup>e</sup>:= S ∪ {e} and U<sup>e</sup>:= U ∪ {e}, we give conditions that an (“extension” of S) ordered semigroup and the subset U<sup>e</sup> of S<sup>e</sup> must satisfy in order for U to be almost unitary or strongly almost unitary in S (in case U is strongly almost unitary in S, then the given conditions are equivalent).
基金supported by the National Natural Science Foundation of China(Grant No.12301590)the Natural Science Foundation of Hebei Province(Grant No.A2022210002)。
文摘In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.
基金supported by the Key Scientific Research Project in Colleges and Universities of Henan Province of China(Grant Nos.21A510003)Science and the Key Science and Technology Research Project of Henan Province of China(Grant Nos.222102210053)。
文摘Orthogonal time frequency space(OTFS)technique, which modulates data symbols in the delayDoppler(DD) domain, presents a potential solution for supporting reliable information transmission in highmobility vehicular networks. In this paper, we study the issues of DD channel estimation for OTFS in the presence of fractional Doppler. We first propose a channel estimation algorithm with both low complexity and high accuracy based on the unitary approximate message passing(UAMP), which exploits the structured sparsity of the effective DD domain channel using hidden Markov model(HMM). The empirical state evolution(SE) analysis is then leveraged to predict the performance of our proposed algorithm. To refine the hyperparameters in the proposed algorithm,we derive the update criterion for the hyperparameters through the expectation-maximization(EM) algorithm. Finally, Our simulation results demonstrate that our proposed algorithm can achieve a significant gain over various baseline schemes.
基金The National Natural Science Foundation of China(No60572072,60496311)the National High Technology Research and Development Program of China (863Program) (No2006AA01Z264)+1 种基金the National Basic Research Program of China (973Program) (No2007CB310603)the PhD Programs Foundation of Ministry of Educa-tion of China (No20060286016)
文摘The performance loss of an approximately 3 dB signal-to-noise ratio is always paid with conventional differential detection compared to the related coherent detection. A new detection scheme consisting of two steps is proposed for the differential unitary space-time modulation (DUSTM) system. In the first step, the data sequence is estimated by conventional unitary space-time demodulation (DUSTD) and differentially encoded again to produce an initial estimate of the transmitted symbol stream. In the second step, the initial estimate of the symbol stream is utilized to initialize an expectation maximization (EM)-based iterative detector. In each iteration, the most recent detected symbol stream is employed to estimate the channel, which is then used to implement coherent sequence detection to refine the symbol stream. Simulation results show that the proposed detection scheme performs much better than the conventional DUSTD after several iterations.
文摘Traditional air conditioner used to be in local control mode. However, with the development of modern information technology, the control of air conditioner will have to support many more functions. As a first step in such a development, we have implemented a remote monitoring system of unitary air conditioners, using the manufacturing message specification (MMS). MMS is an OSI application protocol designed for the remote control and monitoring of real devices. The functions supported are those that an operator would do normally at the console of the unitary air conditioner. Due to the accomplishment of UMCS (Unitary air conditioner MMS Control System), there will be a leap of the application of MMS and the control technology of unitary air conditioner.
文摘Generally unitary solution to the system of martix equations over the quaternion field [X mA ns =B ns ,X nn C nt =D nt ] is considered. A necessary and sufficient condition for the existence of and the expression for the generally unitary solution of the system are derived.
基金Supported by the National Natural Science Foundation of China under Grant Nos 10447106, 10435020, 10254002, A0325401 and 10374010, and Beijing Education Committee under Grant No XK100270454.
文摘An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein-Podolsky-Rosen (EPR) pair block as the quantum information carrier. The server, say Alice, prepares and measures the EPR pairs in the quantum communication and the users perform the four local unitary operations to encode their message. Anyone of the legitimate users can communicate another one on the network securely. Since almost all of the instances in this scheme are useful and each EPR pair can carry two bits of information, the efficiency for qubits and the source capacity both approach the maximal values.
基金Project supported by the Science Foundation of Yanbian University of China (Grant No 2005-20).
文摘In this paper a quantum dialogue scheme is proposed by using N batches of single photons. The same secret message is encoded on each batch of single photons by the sender with two different unitary operations, and then the N batches of single photons are sent to the receiver. After eavesdropping check, the message is encoded on the one remaining batch by the receiver. It is shown that the intercept-and-resend attack and coupling auxiliary modes attack can be resisted more efficiently, because the photons are sent only once in our quantum dialogue scheme.