Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2020 ( 1 )

2019 ( 23 )

2018 ( 165 )

2017 ( 151 )

Custom range...

Search Results: 1 - 10 of 11348 matches for " CAI Xiongfeng "
All listed articles are free for downloading (OA Articles)
Page 1 /11348
Display every page Item
Quantum cryptography: theory and practice
Xiongfeng Ma
Physics , 2008,
Abstract: A highly attenuated laser pulse which gives a weak coherent state is widely used in quantum key distribution (QKD) experiments. A weak coherent state has multi-photon components, which opens up a security loophole to the sophisticated eavesdropper. With a small adjustment of the hardware, we prove that the decoy state method can close this loophole and substantially improve the QKD performance. We also propose a few practical decoy state protocols, study statistical fluctuations and perform experimental demonstrations. Moreover, we apply the methods from entanglement distillation protocols based on two-way classical communication to improve the decoy state QKD performance. Furthermore, we study the decoy state methods for other single photon sources, such as triggering parametric down-conversion (PDC) source. We propose a model and post-processing scheme for the entanglement-based QKD with a PDC source. Although the model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. By simulating a real PDC experiment, we show that the entanglement-based QKD can achieve longer maximal secure distance than the single-photon-based QKD schemes. We present a time-shift attack that exploits the efficiency mismatch of two single photon detectors in a QKD system. This eavesdropping strategy can be realized by current technology. We also discuss counter measures against the attack and study the security of a QKD system with efficiency mismatch detectors.
Unconditional security at a low cost
Xiongfeng Ma
Physics , 2006, DOI: 10.1103/PhysRevA.74.052325
Abstract: By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data post-processing schemes based on security against individual attack by L\"{u}tkenhaus, and unconditional security analysis by Gottesman-Lo-L\"{u}tkenhaus-Preskill. Our results show that these two schemes yield close performances. Since the Holy Grail of QKD is its unconditional security, we conclude that one is better off considering unconditional security, rather than restricting to individual attacks.
Security of Quantum Key Distribution with Realistic Devices
Xiongfeng Ma
Physics , 2005,
Abstract: We simulate quantum key distribution (QKD) experimental setups and give out some improvement for QKD procedures. A new data post-processing protocol is introduced, mainly including error correction and privacy amplification. This protocol combines the ideas of GLLP and the decoy states, which essentially only requires to turn up and down the source power. We propose a practical way to perform the decoy state method, which mainly follows the idea of Lo's decoy state. A new data post-processing protocol is then developed for the QKD scheme with the decoy state. We first study the optimal expected photon number mu of the source for the improved QKD scheme. We get the new optimal mu=O(1) comparing with former mu=O(eta), where eta is the overall transmission efficiency. With this protocol, we can then improve the key generation rate from quadratic of transmission efficiency O(eta2) to O(eta). Based on the recent experimental setup, we obtain the maximum secure transmission distance of over 140 km.
Electrochemical numerical analysis of anode supported solid oxide fuel cell

CAI Donggen
,CAI Xiongfeng,YANG Yunzhen,XIA Weisheng

- , 2018,
Abstract: 根据阳极支撑平板型固体氧化物燃料电池(Solid Oxide Fuel Cell,SOFC)的工作原理,建立了SOFC的三维热流电化学模型,研究燃料电池进气方式、进气速率、燃料气组成对其温度场、燃料利用率以及电池性能的影响.结果表明,相比于反向进气方式,采用同向进气,电池温度分布更均匀,热应力更小;适当提高阴极侧空气进气速率会降低电池平均温度和热应力,同时也有利于提高电池功率密度和燃料利用率;增加燃料气的进气摩尔分数,反应速率、系统温度梯度和功率密度随之加大,由于温度梯度的增大最终导致热应力增加.
Effect of Preparation Method on Catalytic Properties of Double Perovskite Oxides LaSrFeMo0.9Co0.1O6 for Methane Combustion  [PDF]
Jiandong Zheng, Xiongfeng Lang, Changjiang Wang
Advances in Chemical Engineering and Science (ACES) , 2014, DOI: 10.4236/aces.2014.43040

The double perovskite oxides LaSrFeMo0.9Co0.1O6 was prepared by co-precipitation method and sol-gel method. The title catalysts were calcined at 800°C and characterized by XRD H2-TPR, SEM and TG-DTA techniques. The catalytic activity was evaluated for methane combustion. The specific surface area of them was calculated by BET model. The samples exhibit significant catalytic activity for methane combustion at 800°C. Upon calcination at 800°C, the LaSrFeMo0.9Co0.1O6 prepared by sol-gel method retains a specific surface area of 24 m2.g-1 and shows an excellent activity for methane combustion (the conversion of 10% and 90% are obtained at 505

Quantum key distribution secure against the efficiency loophole
Xiongfeng Ma,Tobias Moroder,Norbert Lütkenhaus
Physics , 2008,
Abstract: An efficiency-loophole-free quantum key distribution (QKD) scheme is proposed, which involves no hardware change but a modification in the data post-processing step. The scheme applies to a generic class of detection systems which allow correlations between the detection efficiency and the outcomes. We study the system transmittance and the detection error rate that allow implementing this scheme. We also consider the case that a quantum memory is used to boost the performance and investigate the criteria of the readout probability. The simulation result shows that the lowest tolerable system transmittance (readout probability) is 50%, while the necessary efficiency for an efficiency-loophole-free Bell's inequality test is 82.8%.
Quantum key distribution with triggering parametric down conversion sources
Xiongfeng Ma,Hoi-Kwong Lo
Physics , 2008, DOI: 10.1088/1367-2630/10/7/073018
Abstract: Parametric down-conversion (PDC) sources can be used for quantum key distribution (QKD). One can use a PDC source as a triggered single photon source. Recently, there are various practical proposals of the decoy state QKD with triggering PDC sources. In this paper, we generalize the passive decoy state idea, originally proposed by Mauerer and Silberhorn. The generalized passive decoy state idea can be applied to cases where either threshold detectors or photon number resolving detectors are used. The decoy state protocol proposed by Adachi, Yamamoto, Koashi and Imoto (AYKI) can be treated as a special case of the generalized passive decoy state method. By simulating a recent PDC experiment, we compare various practical decoy state protocols with the infinite decoy protocol and also compare the cases using threshold detectors and photon-number resolving detectors. Our simulation result shows that with the AYKI protocol, one can achieve a key generation rate that is close to the theoretical limit of infinite decoy protocol. Furthermore, our simulation result shows that a photon-number resolving detector appears to be not very useful for improving QKD performance in this case. Although our analysis is focused on the QKD with PDC sources, we emphasize that it can also be applied to other QKD setups with triggered single photon sources.
Explicit combinatorial design
Xiongfeng Ma,Zhen Zhang,Xiaoqing Tan
Computer Science , 2011,
Abstract: A combinatorial design is a family of sets that are almost disjoint, which is applied in pseudo random number generations and randomness extractions. The parameter, $\rho$, quantifying the overlap between the sets within the family, is directly related to the length of a random seed needed and the efficiency of an extractor. Nisan and Wigderson proposed an explicit construction of designs in 1994. Later in 2003, Hartman and Raz proved a bound of $\rho\le e^2$ for the Nisan-Wigderson construction in a limited parameter regime. In this work, we prove a tighter bound of $\rho
Diffusion Wave for Navier-Stokes Equations in Even Space Dimensions
偶数维空间 Navier-Stokes 方程的扩散波

Xu Hongmei,Yang Xiongfeng,

数学物理学报(A辑) , 2007,
Abstract: The authors study the large time behavior of solutions to general Navier-stokes equations in even space-dimension.Through the pointwise estimate of the Green function of the linearized system,the authors obtain explicit expressions of the time-asymptotic behavior of the solutions.The result coincides with weak Huygen's principle.
Ventilation Structure Improvement of Induction Motor Using Multiphysics Simulations
Yujiao Zhang,Xiongfeng Huang,Tao Huang,Jiangjun Ruan
TELKOMNIKA : Indonesian Journal of Electrical Engineering , 2012, DOI: 10.11591/telkomnika.v10i3.605
Abstract: Temperature rise analysis has significant impact in the design of air-cooled asynchronous induction motor. However, the affection cannot be accurately evaluated by using traditional empirical curves method due to the complexity of the inductor architecture. Considering Joule’s losses in stator windings and the induced eddy current in squirrel cages, and heat dissipation by air convection and solid conduction, in this paper a 3-D coupled-field finite-element method (FEM) is investigated to demonstrate the temperature distribution. The Joule’s losses calculated by 3-D eddy- current field analysis are used as the input for the thermal field analysis, which is deeply dependent on accurate air fluid field analysis. A novel multi-component fluid model is employed to deal with the influence of rotor rotation upon the air convection. The simulation results show the fatal influence of the ventilation structure and the effectiveness of the proposed cooling improvement way.
Page 1 /11348
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.