We discuss a quantum remote state preparation protocol by which two parties, Alice and Candy, prepare a single-qubit and a two-qubit state, respectively, at the site of the receiver Bob. The single-qubit state is know...We discuss a quantum remote state preparation protocol by which two parties, Alice and Candy, prepare a single-qubit and a two-qubit state, respectively, at the site of the receiver Bob. The single-qubit state is known to Alice while the two-qubit state which is a non-maximally entangled Bell state is known to Candy. The three parties are connected through a single entangled state which acts as a quantum channel. We first describe the protocol in the ideal case when the entangled channel under use is in a pure state. After that, we consider the effect of amplitude damping(AD) noise on the quantum channel and describe the protocol executed through the noisy channel. The decrement of the fidelity is shown to occur with the increment in the noise parameter. This is shown by numerical computation in specific examples of the states to be created. Finally, we show that it is possible to maintain the label of fidelity to some extent and hence to decrease the effect of noise by the application of weak and reversal measurements. We also present a scheme for the generation of the five-qubit entangled resource which we require as a quantum channel. The generation scheme is run on the IBMQ platform.展开更多
In this paper, we introduce two new iterative algorithms for finding a common element of the set of solutions of a general equilibrium problem and the set of solutions of the variational inequality for an inverse-stro...In this paper, we introduce two new iterative algorithms for finding a common element of the set of solutions of a general equilibrium problem and the set of solutions of the variational inequality for an inverse-strongly monotone operator and the set of common fixed points of two infinite families of relatively nonexpansive mappings or the set of common fixed points of an infinite family of relatively quasi-nonexpansive mappings in Banach spaces. Then we study the weak convergence of the two iterative sequences. Our results improve and extend the results announced by many others.展开更多
The purpose of this article is to investigate (s, t)-weak tractability of multivariate linear problems in the average case set ting. The considered algorithms use finitely many evaluations of arbitrary linear function...The purpose of this article is to investigate (s, t)-weak tractability of multivariate linear problems in the average case set ting. The considered algorithms use finitely many evaluations of arbitrary linear functionals. Generally, we obtained matching necessary and sufficient conditions for (s,t)-weak tractability in terms of the corresponding non-increasing sequence of eigenvalues. Specifically, we discussed (s, t)-weak tractability of linear tensor product problems and obtained necessary and sufficient conditions in terms of the corresponding one-dimensional problem. As an example of applications, we discussed also (s,t)-weak tractability of a multivariate approximation problem.展开更多
Passive decoy-state quantum key distribution systems, proven to be more desirable than active ones in some scenarios, also have the problem of device imperfections like finite-length keys. In this paper, based on the ...Passive decoy-state quantum key distribution systems, proven to be more desirable than active ones in some scenarios, also have the problem of device imperfections like finite-length keys. In this paper, based on the WCP source which can be used for the passive decoy-state method, we obtain the expressions of single-photon error rates, single-photon counts, and phase error rates. According to the information of smooth min-entropy, we calculate the key generation rate under the condition of finite-length key. Key generation rates with different numbers of pulses are compared by numerical simulations. From the results, it can be seen that the passive decoy-state method can have good results if the total number of pulses reaches 1010. We also simulate the passive decoy-state method with different probabilities of choosing a pulse for parameter estimation when the number of pulses is fixed.展开更多
Accurate and efficient online parameter identification and state estimation are crucial for leveraging digital twin simulations to optimize the operation of near-carbon-free nuclear energy systems.In previous studies,...Accurate and efficient online parameter identification and state estimation are crucial for leveraging digital twin simulations to optimize the operation of near-carbon-free nuclear energy systems.In previous studies,we developed a reactor operation digital twin(RODT).However,non-differentiabilities and discontinuities arise when employing machine learning-based surrogate forward models,challenging traditional gradient-based inverse methods and their variants.This study investigated deterministic and metaheuristic algorithms and developed hybrid algorithms to address these issues.An efficient modular RODT software framework that incorporates these methods into its post-evaluation module is presented for comprehensive comparison.The methods were rigorously assessed based on convergence profiles,stability with respect to noise,and computational performance.The numerical results show that the hybrid KNNLHS algorithm excels in real-time online applications,balancing accuracy and efficiency with a prediction error rate of only 1%and processing times of less than 0.1 s.Contrastingly,algorithms such as FSA,DE,and ADE,although slightly slower(approximately 1 s),demonstrated higher accuracy with a 0.3%relative L_2 error,which advances RODT methodologies to harness machine learning and system modeling for improved reactor monitoring,systematic diagnosis of off-normal events,and lifetime management strategies.The developed modular software and novel optimization methods presented offer pathways to realize the full potential of RODT for transforming energy engineering practices.展开更多
To solve the sparse reward problem of job-shop scheduling by deep reinforcement learning,a deep reinforcement learning framework considering sparse reward problem is proposed.The job shop scheduling problem is transfo...To solve the sparse reward problem of job-shop scheduling by deep reinforcement learning,a deep reinforcement learning framework considering sparse reward problem is proposed.The job shop scheduling problem is transformed into Markov decision process,and six state features are designed to improve the state feature representation by using two-way scheduling method,including four state features that distinguish the optimal action and two state features that are related to the learning goal.An extended variant of graph isomorphic network GIN++is used to encode disjunction graphs to improve the performance and generalization ability of the model.Through iterative greedy algorithm,random strategy is generated as the initial strategy,and the action with the maximum information gain is selected to expand it to optimize the exploration ability of Actor-Critic algorithm.Through validation of the trained policy model on multiple public test data sets and comparison with other advanced DRL methods and scheduling rules,the proposed method reduces the minimum average gap by 3.49%,5.31%and 4.16%,respectively,compared with the priority rule-based method,and 5.34%compared with the learning-based method.11.97%and 5.02%,effectively improving the accuracy of DRL to solve the approximate solution of JSSP minimum completion time.展开更多
Recently, the Hong-Ou-Mandel (HOM) interference between two independent weak coherent pulses (WCPs) has been paid much attention due to the measurement-device-independent (MDI) quantum key distribution (QKD). ...Recently, the Hong-Ou-Mandel (HOM) interference between two independent weak coherent pulses (WCPs) has been paid much attention due to the measurement-device-independent (MDI) quantum key distribution (QKD). Using classical wave theory, articles reported before show that the visibility of this kind of HOM-type interference is 〈 50%. In this work, we analyze this kind of interference using quantum optics, which reveals more details compared to the wave theory. Analyses confirm the maximum visibility of 50%. And we conclude that the maximum visibility of 50% comes from the two single-photon states in WCPs, without considering the noise. In the experiment, we successfully approach the visibility of 50% by using WCPs splitting from the single pico-second laser source and phase scanning. Since this kind of HOM interference is immune to slow phase fluctuations, both the realized and proposed experiment designs can provide stable ways of high-resolution optical distance detection.展开更多
Multi-qubit entanglement states are the key resources for various multipartite quantum communication tasks. For a class of generalized three-qubit quantum entanglement, W-like state, we demonstrate that the weak measu...Multi-qubit entanglement states are the key resources for various multipartite quantum communication tasks. For a class of generalized three-qubit quantum entanglement, W-like state, we demonstrate that the weak measurement and the reversal measurement are capable of suppressing the amplitude damping decoherence by reducing the initial damping factor into a smaller equivalent damping factor. Furthermore, we propose an iteration method in the weak measurement and the reversal measurement to enhance the success probability of the total measurements. Finally, we discuss how the number of the iterations influences the overall effect of decoherence suppression, and find that the "half iteration" method is a better option that has more practical value.展开更多
The conventional Duffing oscillator weak signal detection method, which is based on a strong reference signal, has inherent deficiencies. To address these issues, the characteristics of the Duffing oscillator's phase...The conventional Duffing oscillator weak signal detection method, which is based on a strong reference signal, has inherent deficiencies. To address these issues, the characteristics of the Duffing oscillator's phase trajectory in a small- scale periodic state are analyzed by introducing the theory of stopping oscillation system. Based on this approach, a novel Duffing oscillator weak wide-band signal detection method is proposed. In this novel method, the reference signal is discarded, and the to-be-detected signal is directly used as a driving force. By calculating the cosine function of a phase space angle, a single Duffing oscillator can be used for weak wide-band signal detection instead of an array of uncoupled Duffing oscillators. Simulation results indicate that, compared with the conventional Duffing oscillator detection method, this approach performs better in frequency detection intervals, and reduces the signal-to-noise ratio detection threshold, while improving the real-time performance of the system.展开更多
In this paper,weak optimal inverse problems of interval linear programming(IvLP)are studied based on KKT conditions.Firstly,the problem is precisely defined.Specifically,by adjusting the minimum change of the current ...In this paper,weak optimal inverse problems of interval linear programming(IvLP)are studied based on KKT conditions.Firstly,the problem is precisely defined.Specifically,by adjusting the minimum change of the current cost coefficient,a given weak solution can become optimal.Then,an equivalent characterization of weak optimal inverse IvLP problems is obtained.Finally,the problem is simplified without adjusting the cost coefficient of null variable.展开更多
In this paper, both Fritz John and Karush-Kuhn-Tucker necessary optimality conditions are established for a (weakly) LU-efficient solution in the considered nonsmooth multiobjective programming problem with the mult...In this paper, both Fritz John and Karush-Kuhn-Tucker necessary optimality conditions are established for a (weakly) LU-efficient solution in the considered nonsmooth multiobjective programming problem with the multiple interval-objective function. Further, the sufficient optimality conditions for a (weakly) LU-efficient solution and several duality results in Mond-Weir sense are proved under assumptions that the functions constituting the considered nondifferentiable multiobjective programming problem with the multiple interval- objective function are convex.展开更多
Based on the theories of three-dimensional elasticity and piezoelectricity, and by assuming appropriate boundary functions, we established a state equation of piezoelectric cylindrical shells. By using the transfer ma...Based on the theories of three-dimensional elasticity and piezoelectricity, and by assuming appropriate boundary functions, we established a state equation of piezoelectric cylindrical shells. By using the transfer matrix method, we presented an analytical solution that satisfies all the arbitrary boundary conditions at boundary edges, as well as on upper and bottom surfaces. Our solution takes into account all the independent elastic and piezoelectric constants for a piezoelectric orthotropy, and satisfies continuity conditions between plies of the laminates. The principle of the present method and corresponding results can be widely used in many engineering fields and be applied to assess the effectiveness of various approximate and numerical models.展开更多
Weak formulation of mixed state equations including boundary conditions are presented in a cylindrical coordinate system by introducing Hellinger-Reissner variational principle. Analytical solutions are obtained for l...Weak formulation of mixed state equations including boundary conditions are presented in a cylindrical coordinate system by introducing Hellinger-Reissner variational principle. Analytical solutions are obtained for laminated cylindrical shell by means of state space method. The present study extends and unifies the solution of laminated shells.展开更多
Passive decoy-state quantum key distribution is more desirable than the active one in some scenarios. It is also affected by the imperfections of the devices. In this paper, the influence of modulator attenuation on t...Passive decoy-state quantum key distribution is more desirable than the active one in some scenarios. It is also affected by the imperfections of the devices. In this paper, the influence of modulator attenuation on the passive decoy-state method is considered. We introduce and analyze the unbalanced Mach-Zehnder interferometer, briefly, and combining with the virtual source and imaginary unitary transformation, we characterize the passive decoy-state method using a weak coherent photon source with modulator attenuation. According to the attenuation parameter 6, the pass efficiencies are given. Then, the key generation rate can be acquired. From numerical simulations, it can be seen that modulator attenuation has a non- negligible influence on the performance of passive-state QKD protocol. Based on the research, the analysis method of virtual source and imaginary unitary transformation are preferred in analyzing passive decoy state protocol, and the passive decoy-state method is better than the active one and is close to the active vacuum + weak decoy state under the condition of having the same modulator attenuation.展开更多
This paper derives energy level formula for two moving charged particles with Coulomb coupling by making full use of two mutually conjugate entangled state representations. These newly introduced entangled state repre...This paper derives energy level formula for two moving charged particles with Coulomb coupling by making full use of two mutually conjugate entangled state representations. These newly introduced entangled state representations seem to provide a direct and convenient approach for solving certain dynamical problems for two-body systems.展开更多
A kind of direct methods is presented for the solution of optimal control problems with state constraints. These methods are sequential quadratic programming methods. At every iteration a quadratic programming which i...A kind of direct methods is presented for the solution of optimal control problems with state constraints. These methods are sequential quadratic programming methods. At every iteration a quadratic programming which is obtained by quadratic approximation to Lagrangian function and linear approximations to constraints is solved to get a search direction for a merit function. The merit function is formulated by augmenting the Lagrangian function with a penalty term. A line search is carried out along the search direction to determine a step length such that the merit function is decreased. The methods presented in this paper include continuous sequential quadratic programming methods and discreate sequential quadratic programming methods.展开更多
Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections...Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation.展开更多
We consider a linear-quadratical optimal control problem of a system governed by parabolic equation with distributed in right-hand side control and control and state constraints. We construct a mesh approximation of t...We consider a linear-quadratical optimal control problem of a system governed by parabolic equation with distributed in right-hand side control and control and state constraints. We construct a mesh approximation of this problem using different two-level approximations of the state equation, ADI and fractional steps approximations in time among others. Iterative solution methods are investigated for all constructed approximations of the optimal control problem. Their implementation can be carried out in parallel manner.展开更多
Usually the equation of state (EoS) of dark matter is zero when it is cold, however there exists the possibility of a (effective) nonzero EoS of dark matter due to its decay and interaction with dark energy. In th...Usually the equation of state (EoS) of dark matter is zero when it is cold, however there exists the possibility of a (effective) nonzero EoS of dark matter due to its decay and interaction with dark energy. In this work, we try to constrain the EoS of dark matter/JAdm using the currently available cosmic observations which include the geometrical and dynamical measurements. For the geometrical measurements, the luminosity distance of type Ia supernovae, the angular diameter distance and comoving sound horizon from baryon acoustic oscillations and the cosmic microwave background radiation will be employed. The data points from the redshift-space distortion and weak gravitational lensing will be taken as dynamical measurements. Using the Markov chain Monte Carlomethod, we obtain a very tight constraint on the-EoS of dark matter:wdm=0.0000532 +0.000692+0.00136+0.00183 -0.000686-0.00136-0.00177.展开更多
基金Project supported by Indian Institute of Engineering Science and Technology, Shibpur, India
文摘We discuss a quantum remote state preparation protocol by which two parties, Alice and Candy, prepare a single-qubit and a two-qubit state, respectively, at the site of the receiver Bob. The single-qubit state is known to Alice while the two-qubit state which is a non-maximally entangled Bell state is known to Candy. The three parties are connected through a single entangled state which acts as a quantum channel. We first describe the protocol in the ideal case when the entangled channel under use is in a pure state. After that, we consider the effect of amplitude damping(AD) noise on the quantum channel and describe the protocol executed through the noisy channel. The decrement of the fidelity is shown to occur with the increment in the noise parameter. This is shown by numerical computation in specific examples of the states to be created. Finally, we show that it is possible to maintain the label of fidelity to some extent and hence to decrease the effect of noise by the application of weak and reversal measurements. We also present a scheme for the generation of the five-qubit entangled resource which we require as a quantum channel. The generation scheme is run on the IBMQ platform.
文摘In this paper, we introduce two new iterative algorithms for finding a common element of the set of solutions of a general equilibrium problem and the set of solutions of the variational inequality for an inverse-strongly monotone operator and the set of common fixed points of two infinite families of relatively nonexpansive mappings or the set of common fixed points of an infinite family of relatively quasi-nonexpansive mappings in Banach spaces. Then we study the weak convergence of the two iterative sequences. Our results improve and extend the results announced by many others.
基金supported by the National Natural Science Foundation of China(11471043,11671271)the Beijing Natural Science Foundation(1172004)
文摘The purpose of this article is to investigate (s, t)-weak tractability of multivariate linear problems in the average case set ting. The considered algorithms use finitely many evaluations of arbitrary linear functionals. Generally, we obtained matching necessary and sufficient conditions for (s,t)-weak tractability in terms of the corresponding non-increasing sequence of eigenvalues. Specifically, we discussed (s, t)-weak tractability of linear tensor product problems and obtained necessary and sufficient conditions in terms of the corresponding one-dimensional problem. As an example of applications, we discussed also (s,t)-weak tractability of a multivariate approximation problem.
基金supported by the National Natural Science Foundation of China(Grant No.11304397)
文摘Passive decoy-state quantum key distribution systems, proven to be more desirable than active ones in some scenarios, also have the problem of device imperfections like finite-length keys. In this paper, based on the WCP source which can be used for the passive decoy-state method, we obtain the expressions of single-photon error rates, single-photon counts, and phase error rates. According to the information of smooth min-entropy, we calculate the key generation rate under the condition of finite-length key. Key generation rates with different numbers of pulses are compared by numerical simulations. From the results, it can be seen that the passive decoy-state method can have good results if the total number of pulses reaches 1010. We also simulate the passive decoy-state method with different probabilities of choosing a pulse for parameter estimation when the number of pulses is fixed.
基金supported by the Natural Science Foundation of Shanghai(No.23ZR1429300)Innovation Funds of CNNC(Lingchuang Fund,Contract No.CNNC-LCKY-202234)the Project of the Nuclear Power Technology Innovation Center of Science Technology and Industry(No.HDLCXZX-2023-HD-039-02)。
文摘Accurate and efficient online parameter identification and state estimation are crucial for leveraging digital twin simulations to optimize the operation of near-carbon-free nuclear energy systems.In previous studies,we developed a reactor operation digital twin(RODT).However,non-differentiabilities and discontinuities arise when employing machine learning-based surrogate forward models,challenging traditional gradient-based inverse methods and their variants.This study investigated deterministic and metaheuristic algorithms and developed hybrid algorithms to address these issues.An efficient modular RODT software framework that incorporates these methods into its post-evaluation module is presented for comprehensive comparison.The methods were rigorously assessed based on convergence profiles,stability with respect to noise,and computational performance.The numerical results show that the hybrid KNNLHS algorithm excels in real-time online applications,balancing accuracy and efficiency with a prediction error rate of only 1%and processing times of less than 0.1 s.Contrastingly,algorithms such as FSA,DE,and ADE,although slightly slower(approximately 1 s),demonstrated higher accuracy with a 0.3%relative L_2 error,which advances RODT methodologies to harness machine learning and system modeling for improved reactor monitoring,systematic diagnosis of off-normal events,and lifetime management strategies.The developed modular software and novel optimization methods presented offer pathways to realize the full potential of RODT for transforming energy engineering practices.
基金Shaanxi Provincial Key Research and Development Project(2023YBGY095)and Shaanxi Provincial Qin Chuangyuan"Scientist+Engineer"project(2023KXJ247)Fund support.
文摘To solve the sparse reward problem of job-shop scheduling by deep reinforcement learning,a deep reinforcement learning framework considering sparse reward problem is proposed.The job shop scheduling problem is transformed into Markov decision process,and six state features are designed to improve the state feature representation by using two-way scheduling method,including four state features that distinguish the optimal action and two state features that are related to the learning goal.An extended variant of graph isomorphic network GIN++is used to encode disjunction graphs to improve the performance and generalization ability of the model.Through iterative greedy algorithm,random strategy is generated as the initial strategy,and the action with the maximum information gain is selected to expand it to optimize the exploration ability of Actor-Critic algorithm.Through validation of the trained policy model on multiple public test data sets and comparison with other advanced DRL methods and scheduling rules,the proposed method reduces the minimum average gap by 3.49%,5.31%and 4.16%,respectively,compared with the priority rule-based method,and 5.34%compared with the learning-based method.11.97%and 5.02%,effectively improving the accuracy of DRL to solve the approximate solution of JSSP minimum completion time.
基金Project supported by the National Basic Research Program of China(Grants Nos.2011CBA00200 and 2011CB921200)the National Natural Science Foundation of China(Grant Nos.61201239,61205118,11304397,and 61475148)the“Strategic Priority Research Program(B)”of the Chinese Academy of Sciences(Grant No.XDB01030100 and XDB01030300)
文摘Recently, the Hong-Ou-Mandel (HOM) interference between two independent weak coherent pulses (WCPs) has been paid much attention due to the measurement-device-independent (MDI) quantum key distribution (QKD). Using classical wave theory, articles reported before show that the visibility of this kind of HOM-type interference is 〈 50%. In this work, we analyze this kind of interference using quantum optics, which reveals more details compared to the wave theory. Analyses confirm the maximum visibility of 50%. And we conclude that the maximum visibility of 50% comes from the two single-photon states in WCPs, without considering the noise. In the experiment, we successfully approach the visibility of 50% by using WCPs splitting from the single pico-second laser source and phase scanning. Since this kind of HOM interference is immune to slow phase fluctuations, both the realized and proposed experiment designs can provide stable ways of high-resolution optical distance detection.
基金supported by the National Natural Science Foundation of China(Grant No.61172071)the International Scientific Cooperation Program of Shaanxi Province,China(Grant No.2015KW-013)the Scientific Research Program Funded by Shaanxi Provincial Education Department,China(Grant No.16JK1711)
文摘Multi-qubit entanglement states are the key resources for various multipartite quantum communication tasks. For a class of generalized three-qubit quantum entanglement, W-like state, we demonstrate that the weak measurement and the reversal measurement are capable of suppressing the amplitude damping decoherence by reducing the initial damping factor into a smaller equivalent damping factor. Furthermore, we propose an iteration method in the weak measurement and the reversal measurement to enhance the success probability of the total measurements. Finally, we discuss how the number of the iterations influences the overall effect of decoherence suppression, and find that the "half iteration" method is a better option that has more practical value.
基金Project supported by the National Natural Science Foundation of China(Grant No.61673066)
文摘The conventional Duffing oscillator weak signal detection method, which is based on a strong reference signal, has inherent deficiencies. To address these issues, the characteristics of the Duffing oscillator's phase trajectory in a small- scale periodic state are analyzed by introducing the theory of stopping oscillation system. Based on this approach, a novel Duffing oscillator weak wide-band signal detection method is proposed. In this novel method, the reference signal is discarded, and the to-be-detected signal is directly used as a driving force. By calculating the cosine function of a phase space angle, a single Duffing oscillator can be used for weak wide-band signal detection instead of an array of uncoupled Duffing oscillators. Simulation results indicate that, compared with the conventional Duffing oscillator detection method, this approach performs better in frequency detection intervals, and reduces the signal-to-noise ratio detection threshold, while improving the real-time performance of the system.
基金Supported by the National Natural Science Foundation of China(11971433)First Class Discipline of Zhe-jiang-A(Zhejiang Gongshang University-Statistics,1020JYN4120004G-091),Graduate Scientic Research and Innovation Foundation of Zhejiang Gongshang University.
文摘In this paper,weak optimal inverse problems of interval linear programming(IvLP)are studied based on KKT conditions.Firstly,the problem is precisely defined.Specifically,by adjusting the minimum change of the current cost coefficient,a given weak solution can become optimal.Then,an equivalent characterization of weak optimal inverse IvLP problems is obtained.Finally,the problem is simplified without adjusting the cost coefficient of null variable.
文摘In this paper, both Fritz John and Karush-Kuhn-Tucker necessary optimality conditions are established for a (weakly) LU-efficient solution in the considered nonsmooth multiobjective programming problem with the multiple interval-objective function. Further, the sufficient optimality conditions for a (weakly) LU-efficient solution and several duality results in Mond-Weir sense are proved under assumptions that the functions constituting the considered nondifferentiable multiobjective programming problem with the multiple interval- objective function are convex.
基金Funded by the Natural Science Foundation of Anhui Province (No. 070414190)
文摘Based on the theories of three-dimensional elasticity and piezoelectricity, and by assuming appropriate boundary functions, we established a state equation of piezoelectric cylindrical shells. By using the transfer matrix method, we presented an analytical solution that satisfies all the arbitrary boundary conditions at boundary edges, as well as on upper and bottom surfaces. Our solution takes into account all the independent elastic and piezoelectric constants for a piezoelectric orthotropy, and satisfies continuity conditions between plies of the laminates. The principle of the present method and corresponding results can be widely used in many engineering fields and be applied to assess the effectiveness of various approximate and numerical models.
文摘Weak formulation of mixed state equations including boundary conditions are presented in a cylindrical coordinate system by introducing Hellinger-Reissner variational principle. Analytical solutions are obtained for laminated cylindrical shell by means of state space method. The present study extends and unifies the solution of laminated shells.
基金supported by the National Natural Science Foundation of China(Grant No.11304397)
文摘Passive decoy-state quantum key distribution is more desirable than the active one in some scenarios. It is also affected by the imperfections of the devices. In this paper, the influence of modulator attenuation on the passive decoy-state method is considered. We introduce and analyze the unbalanced Mach-Zehnder interferometer, briefly, and combining with the virtual source and imaginary unitary transformation, we characterize the passive decoy-state method using a weak coherent photon source with modulator attenuation. According to the attenuation parameter 6, the pass efficiencies are given. Then, the key generation rate can be acquired. From numerical simulations, it can be seen that modulator attenuation has a non- negligible influence on the performance of passive-state QKD protocol. Based on the research, the analysis method of virtual source and imaginary unitary transformation are preferred in analyzing passive decoy state protocol, and the passive decoy-state method is better than the active one and is close to the active vacuum + weak decoy state under the condition of having the same modulator attenuation.
基金Project supported by the Natural Science Foundation of Shandong Province of China (Grant No. Y2008A23)the Natural Science Foundation of Liaocheng University (Grant No. X071049)
文摘This paper derives energy level formula for two moving charged particles with Coulomb coupling by making full use of two mutually conjugate entangled state representations. These newly introduced entangled state representations seem to provide a direct and convenient approach for solving certain dynamical problems for two-body systems.
文摘A kind of direct methods is presented for the solution of optimal control problems with state constraints. These methods are sequential quadratic programming methods. At every iteration a quadratic programming which is obtained by quadratic approximation to Lagrangian function and linear approximations to constraints is solved to get a search direction for a merit function. The merit function is formulated by augmenting the Lagrangian function with a penalty term. A line search is carried out along the search direction to determine a step length such that the merit function is decreased. The methods presented in this paper include continuous sequential quadratic programming methods and discreate sequential quadratic programming methods.
基金the National Key Research and Development Program of China(Grant No.2020YFA0309702)NSAF(Grant No.U2130205)+3 种基金the National Natural Science Foundation of China(Grant Nos.62101597,61605248,and 61505261)the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies。
文摘Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation.
文摘We consider a linear-quadratical optimal control problem of a system governed by parabolic equation with distributed in right-hand side control and control and state constraints. We construct a mesh approximation of this problem using different two-level approximations of the state equation, ADI and fractional steps approximations in time among others. Iterative solution methods are investigated for all constructed approximations of the optimal control problem. Their implementation can be carried out in parallel manner.
基金Supported by the National Natural Science Foundation of China under Grant No 11275035
文摘Usually the equation of state (EoS) of dark matter is zero when it is cold, however there exists the possibility of a (effective) nonzero EoS of dark matter due to its decay and interaction with dark energy. In this work, we try to constrain the EoS of dark matter/JAdm using the currently available cosmic observations which include the geometrical and dynamical measurements. For the geometrical measurements, the luminosity distance of type Ia supernovae, the angular diameter distance and comoving sound horizon from baryon acoustic oscillations and the cosmic microwave background radiation will be employed. The data points from the redshift-space distortion and weak gravitational lensing will be taken as dynamical measurements. Using the Markov chain Monte Carlomethod, we obtain a very tight constraint on the-EoS of dark matter:wdm=0.0000532 +0.000692+0.00136+0.00183 -0.000686-0.00136-0.00177.