Sequential Quantum Secret Sharing Using a Single Qudit

Size: px
Start display at page:

Download "Sequential Quantum Secret Sharing Using a Single Qudit"

Transcription

1 Commun. Theor. Phys. 69 ( Vo. 69, No. 5, May 1, 2018 Sequenta Quantum Secret Sharng Usng a Snge Qut Chen-Mng Ba ( 白晨明, 1 Zh-Hu L ( 李志慧, 1, an Yong-Mng L ( 李永明 2 1 Coege of Mathematcs an Informaton Scence, Shaanx Norma Unversty, X an , Chna 2 Coege of Computer Scence, Shaanx Norma Unversty, X an , Chna (Receve December 11, 2017; revse manuscrpt receve January 30, 2018 Abstract In ths paper we propose a nove an effcent quantum secret sharng protoco usng -eve snge partce, whch t can reaze a genera access structure va the thought of concatenaton. In aton, Our scheme ncues a avantages of Tavako s scheme [Phys. Rev. A 92 ( (R]. In contrast to Tavako s scheme, the effcency of our scheme s 1 for the same stuaton, an the access structure s more genera an has avantages n practca sgnfcance. Furthermore, we aso anayze the securty of our scheme n the prmary quantum attacks. PACS numbers: a, U DOI: / /69/5/513 Key wors: quantum secret sharng, access structure, thresho scheme 1 Introucton Secret sharng, frsty ntrouce by Shamr [1] an Bakey, [2] s a cryptographc prmtve whch pays a sgnfcant roe n the varous secure mutparty computaton tasks an management of keys. Secret sharng has extene to the quantum fe. [3 9] Quantum secret sharng (QSS s aso a cryptographc protoco to strbute ether a cassca secret (strng of bts or a quantum secret (unknown quantum state to a group of payers P such that ony authorze subsets of P can coaboratvey recover the secret. The securty of most cassca cryptographc systems s base on the assumptons of computatona compexty, whch mght be broken by the strong power of avance agorthms, such as Shor agorthm. In aton, another man rawback of cassca secret sharng schemes s that they are not perfecty secure from an eavesropper attack. Compare to the cassca one, QSS can enforce the securty for cryptographc tasks ue to the quantum no-conng theorem an uncertanty propertes of quantum mechancs. [10 11] In 1999, Hery et a. [3] frsty ntrouce a protoco of QSS by usng GHZ states. At the same year, Karsson et a. [12] showe how a QSS protoco can be mpemente usng two-partce quantum entangement an scusse how to etect eavesroppng or a shonest partcpant. In 2004, Xao et a. [13] generaze the QSS of Hery et a. nto arbtrary mutpartte entange state. From then on, varous QSS schemes have been propose. [14 23] Many schoars gave QSS schemes base on fferent prncpes, such as quantum error-correctng coe [24] an oca stngushabty of quantum states. [25 29] In these works, t has been shown that QSS s not ony a mere theoretca concept, but aso an expermenta possbty. [30] Wth the eveopment an appcaton of quantum communcaton, t s a great ea to esgn a quantum protoco wth a snge state. Recenty, Tavako et a. [31] propose a moe of (n, n-thresho secret sharng wth a snge -eve quantum system (for any prme. Ths moe has huge avantages n scaabty an can be reaze wth state-of-the-art technoogy. However, n ths scheme, there are two efcences. Frsty, the successfu probabty of each roun s epenent on measurement bases, that s, the effcency s 1/. Wth the ncrease of, the effcency of ths scheme w be very ow. In orer to mprove ths probem, Karmpour et a. [32] propose a QSS wth a ranom wak n a attce of states for arbtrary. Wth ths ranom wak pcture at han, they can mprove ther scheme effcency to reach 1/2. Athough the effcency has been mprove, Ln et a. [33] foun that ther scheme was not secure for one shonest who can recover the secret wthout the hep of other partcpants. Secony, Tavako s scheme s just an (n, n-thresho an not sutabe for a genera access structure. For the probem, Lu et a. [34] propose a (t, n-thresho QSS scheme base on a snge -eve quantum system. In ths scheme, they empoye the cassca Shamr s (t, n-thresho secret sharng. However, t cannot be appe to the genera access structure. The genera access structure of a secret sharng scheme s a famy of a authorze sets. In genera, access structures are consere to be monotone,.e., any superset of an authorze set must be authorze. Because each person has fferent weght n rea fe, the abty to recover the secret s fferent. Therefore, ths genera access structure s of practca sgnfcance an pays a major roe n secret sharng schemes. In ths paper, we propose a new QSS scheme, whch Sponsore by the Natona Natura Scence Founaton of Chna uner Grant Nos an , an Inustra Research an Deveopment Project of Scence an Technoogy of Shaanx Provnce uner Grant No. 2013k0611 E-ma: zhhu@snnu.eu.cn c 2018 Chnese Physca Socety an IOP Pubshng Lt

2 514 Communcatons n Theoretca Physcs Vo. 69 can sove the above two probems. For the frst probem, the strbutor Ace n our scheme vountary chooses the measurement bases an sens them to a partcpants through quantum secure rect communcaton. [35] Ths operaton can not ony mprove the effcency of the protoco but aso reuce the possbty of nformaton eakage. Through ths metho, the effcency of our scheme can reach 1. For the secon probem, we treat each authorze set as a sma thresho scheme. By cascang metho, we appy our scheme to the genera access structure, whch makes t more practca. In partcuar, f the access structure contans ony one authorze set, our scheme w be the same as Tavako s. Therefore, our scheme s more extensve an meanngfu. The structure of the paper s organze as foows. In Sec. 2, we gve some premnares. In Sec. 3, we propose the quantum secret sharng scheme for a genera access structure an show an exampe. Secton 4 anayzes the securty an compares our scheme wth the exstng scheme. Fnay, the concuson s gven n Sec Premnares In ths secton we brefy reca some basc concepts such as the access structure an mutuay unbase (orthonorma bases. 2.1 Access Structure Let P be a set of payers, then the authorze set s a subset of P, whch can reconstruct the orgna secret. The access structure Γ of a secret sharng scheme s a famy of a authorze sets. In genera, access structures are consere to be monotone ncreasng,.e., any superset of an authorze set must be authorze. For A, A P, f A Γ an A A, then A Γ. The bass of Γ s the coecton of a mnma authorze sets of P. We assume that every partcpant beongs to at east one mnma authorze set. 2.2 Mutuay Unbase Bases an Untary Operaton Mutuay unbase bases (MUBs are the mportant too n many quantum nformaton processng. As note n Refs. [36 37], t s possbe to fn + 1 MUBs n -mensona quantum system ony f s (any power of prme numbers an o prme. At frst, the computatona bass s enote by { k k D}, where D = {0,..., 1}. For consstency, we aso restrct to o prme number n the whoe artce. Beses the computatona bass, the expct forms of the remanng sets of MUBs are e (j = 1 1 ω k(+jk k, (1 where ω = e 2π/, j D abes the bass an D enumerates the vectors of the gven bass. They are mutuay unbase because the overap s e (j e (j = 1 for j j. (2 In Ref. [31], the encong operaton conssts of two untary operators, X an Y, whch are epcte as foows: 1 1 X = ω n n n, Y = ω n2 n n. (3 Usng Eqs. (1 an (3, we can get ( 1 ( X x Y y 1 = X x ω yn2 n n e(j 1 ω k(+jk k = ω xn n n ω k[+(j+yk] k = 1 1 ω k[(+x+(j+yk] k = e (j+y (+x. (4 For convenence, the operator X xy y s wrtten as U x,y,.e., U x,y e (j = e (j+y (+x. 3 The QSS Scheme on Access Structure In ths secton, we propose our scheme usng a snge qut to reaze a genera access struture. Assume that the strbutor Ace wants to share secret messages to a group P wth n partcpants, an the genera access structure s enote by Γ = {A 1, A 2,..., A r }, (5 where A ( = 1, 2,..., r s the mnma authorze set. By cascang metho, we utze our new scheme to mpement the genera access structure Γ, whch every mnma authorze set A can be reaze by a sma thresho scheme (see Fg. 1. In orer to factate the escrpton of our scheme, suppose the mnma authorze set A s expresse as A = {Bob (1, Bob (2,..., Bob (t }, ( = 1, 2,..., r. Step 1 Preparaton: Accorng to the authorze set A, the strbutor Ace ranomy chooses some numbers, y (1, y (2,..., y (t D, an sens y (ν to the partcpant Bob (ν (ν = 1, 2,..., t through quantum secure rect communcaton. Note that f Bob (ν appears n a fferent authorze set, Ace sens ony one y (ν. For the authorze set A, Ace generates two ranom numbers x (0, y (0 D an prepares a state e (j, (, j D an ony Ace knows, j. Then she performs the operaton U (0 x on e (j,y (0 an obtans a new sgna state e (j+y(0, enote by ψ (0. +x (0 Step 2 Dstrbuton: Ace sens ths state ψ (0 to the frst partcpant Bob (1 n the authorze set A. After recevng the state ψ (0 sent by Ace, f Bob (1 generate a prvate key x (1 has not, then he ranomy chooses a

3 No. 5 Communcatons n Theoretca Physcs 515 number x (1. Otherwse, the operaton s skppe. Combne wth y (1 sent by Ace, he performs the corresponng operaton U (1 x,y (1 on ths partce. Bob (1 sens the new state ψ (1 to the next partcpant Bob (2 n A. Then Bob (2 oes the same operaton as Bob (1. In turn, the ast partcpant Bob (t n A sens the new state to Ace unt he foows the above metho. Fg. 1 (Coor onne A fow chart for the access structure Γ = {A 1, A 2,..., A r }, where A ( = 1, 2,..., r s the mnma authorze set. Bue an re ots represent a partcpants, where re ots ncate that partcpants appear n fferent mnma authorze sets. Arrows enote the recton of partce transport. Every mnma authorze set A can be reaze by a thresho scheme. For authorze set A ( = 1, 2,..., r, the protoco works because after a the transformatons the fna state reas ( t ψ fna = ν=1 U (ν x,y (ν ψ (0. Step 3 Measurement: After Ace has receve the sgna state, she etermnes whch bass to measure the partce accorng to j, y (0, y (1,..., y (t. Through her cacuaton, f they satsfy the foowng conton j + y (0 + y (1 + + y (t = J(mo, (6 then she chooses the bass M J = { e (J D} to make a measurement on the ast partce an recors the measurement resut a. It mpes that the prvate ata of a partcpants n the authorze set A, {x (1,..., x (t }, satsfy gobay consstency conton + x (0 + x (1 + + x (t = a (mo. (7 Step 4 Detecton: In orer to check the securty, for a ranomy chosen (by Ace subset of the rouns, a partcpants Bob (1, Bob (2,..., Bob (t n A sen ther vaues of ther prvate ata x (ν (ν = 1,..., t to her, an Ace checks conton (7. If Eq. (7 oes not ho, she aborts the scheme an starts agan wth a new set of resources. Step 5 Reconstructon: If no eavesropper s etecte, accorng to x (0, an the measurement resut a, Ace can euce that x (1 + + x (t = (a x (0 (mo = b. (8 For fferent authorze sets, there may be fferent b s. Therefore, Ace epens on b to ajust the parameter α. In orer to restore the orgna secret, each partcpant n A sens the prvate key x (ν to the truste esgne combner (TDC. Afterwars, Ace aso sens the parameter α assocate wth the authorze set A to the TDC. After the TDC has receve a ata, t performs an operator O, whch s enote by O(α, x (1,..., x (t = { s, f (α + t ν=1 x(ν mo = s ; No, otherwse. (9

4 516 Communcatons n Theoretca Physcs Vo. 69 If Ace s secret s more than one bt, Ace an a partcpants n the authorze set A execute Steps 1 5 repeatey. In orer to save costs, the measurement bass nformaton, y (1, y (2,..., y (t D, can be reuse. At the same tme, Ace ony nees to change y (0 to ensure the securty of every roun. Exampe 1 In orer to expan our scheme more ceary, we w gve an exampe n the foowng. Suppose the access structure s enote by Γ = {P 1 P 4 P 5, P 2 P 3 P 5, P 1 P 2 } wth fve honest partcpants an Ace wants to share the secret message s = 2 F 5. We gve a strbutve fow chart for the access structure (see Fg. 2. Fg. 2 (Coor onne A strbutve fow chart for the access structure Γ = {P 1P 2, P 2P 3P 5, P 1P 4P 5}, where U x,y represents everyone operaton, the re ne represents the authorze set P 1P 2, the bue ne represents the authorze set P 2 P 3 P 5 an the back ne represents the authorze set P 1 P 4 P 5. In accorance wth the above steps a partcpants have ther prvate keys. We assume that x 1 = 0, x 2 = 2, x 3 = 3, x 4 = 1, x 5 = 3 respectvey. For the authorze set A 1 = {P 1 P 4 P 5 }, Ace can cacuate that x 1 + x 4 + x 5 = 4. Then she can choose parameter α 1 = 3 an sen t to the TDC. In orer to restore the secret, P 1, P 4 an P 5 sen ther prvate keys to the TDC. At ast, the TDC can output the secret s = 2 (see Fg. 3. Fg. 3 Reconstructon for the authorze set P 1 P 4 P 5. For the authorze set A 2 = {P 2 P 3 P 5 }, Ace can choose parameter α 2 = 4 an sen t to the TDC. P 2, P 3 an P 5 sen ther prvate keys to the TDC. Then, the TDC can cacuate α 2 + x 2 + x 3 + x 5 = 12 mo 5 = 2 an output the secret s = 2. For the authorze set A 3 = {P 1 P 2 }, Ace can choose parameter α 3 = 0. The TDC can cacuate α 3 + x 1 + x 2 an output the secret. 4 Anayss of Our Scheme 4.1 Securty Dscusson In Ref. [31], Tavako et a. have gven the securty anayss of ther scheme. However, we have mprove ther scheme an mpemente a genera access structure usng cascang metho. In orer to check the securty of our scheme, we anayse the attacks of our scheme,.e. externa attack an nterna attack. Externa attack The frst strategy for the eavesropper Eve s the ntercept-an-resen attack. For ths attack, we conser two cases. (a Eve may ntercept the qut, n the state e (j, on the way from Bob (k to Bob (k+1 n the authorze set A. (b Eve may ntercept the qut sent by the strbutor Ace an sen a qut of her own to the frst partcpant Bob (1 n A n ts stea. Eve coects her qut once t s sent by the ast partcpant Bob (t n A. However, for two cases, she oes not have any nformaton about the measurement bass because y (1,..., y (t n our protoco are sent to partcpants through quantum secure rect communcaton wthout pubcaton. In orer to get the orgna secret, she can ony choose one of reevant bases to measure. Obvousy, Eve can obtan the correct measurement resut ony when she happens to choose the true bass j = j. Therefore, the successfu probabty s 1/. The eavesroppng, to some extent epenng on, causes nconsstences between the prvate ata an conton (7. In aton, f Ace sens n-bt secret, the successfu probabty to obtan nformaton s (1/ n. Thus when the numbers of n get arger, the probabty s (1/ n 0. Therefore, ths ntercept-an-resen attack oes not work n our scheme.

5 No. 5 Communcatons n Theoretca Physcs 517 The secon strategy for the eavesropper Eve s the entange-an-measure attack. Assumng that the eavesropper Eve mpements ancary system to obtan the nformaton. Suppose that Eve performs the untary transform U E to entange an auxary partce on the transmtte partce an then measures the auxary partce to stea secret nformaton. Wthout oss of generaty, we conser the bass j = 0,.e., e (0 = (1/ 1 ωk k n the foowng forms, U E k E = 1 m=0 U E e (0 E = U E ( 1 a km m ε km, = m=0 ω k k E = 1 ω k a km ( g=0 ω k( 1 m=0 ω mg e (0 g a km m ε km ε km = m=0 g=0 (10 ω k mg a km e (0 g ε km, (11 where ω = e 2π/ ; E s the nta state of Eve s ancary system; ε km (k, m = 0, 1,..., 1 s the pure auxary state etermne unquey by the untary transform U E, an 1 m=0 a km 2 = 1 (k = 0, 1,..., 1. (12 In orer to avo ntroucng the error rate, Eve has to set: a km = 0, where k m an k, m {0, 1,..., 1}. Therefore, Eq. (10 an Eq. (11 can be smpfe as foows: U E k E = a kk k ε kk, (13 U E e (0 E = g=0 ω k( g a kk e (0 g ε kk. (14 Smary, Eve can obtan that 1 ωk( g a kk ε kk = 0, where g {0, 1,..., 1} an g. Then for any {0, 1,..., 1}, we can get equatons. Accorng to these equatons, we can compute that a 00 ε 00 = a 11 ε 11 = = a 1, 1 ε 1, 1. (15 Therefore, no matter what the usefu state s, Eve can ony obtan the same nformaton from ancary partces. The smar scusson can be appe for the other quantum state e (j = (1/ 1 ωk(+jk k. Therefore, the entange-an-measure attack s unsuccessfu. In Ref. [31], the authors consere that an aternatve attack use by Eve s to sen va the untary gate of payer Bob (k one more qut or even a mutqut puse so that t can be somehow ntercepte by her beyon the gate wthout nterceptng the protoco qut. For the eavesroppng, t s not sutabe for our scheme an she cannot earn the actua untary transformaton,.e., x (1,..., x (t because y (1,..., y (t n our protoco are not announce. Interna attack In the foowng, we w prmary conser the partcpants conspracy attack because t s aways easer an more powerfu than externa attack an the partcpants can get more usefu nformaton than a fourth eavesropper. In the worse case, ony the strbutor Ace an one more partcpant n each authorze set, are honest. For exampe, we assume that Bob (1 s honest n A = {Bob (1, Bob (2,..., Bob (t } an the rest t 1 are consprng payers. If they o not sen ther prvate keys to the TDC, they cannot recover any nformaton because they o not know the TDC s operator. If they sen ther prvate keys to the TDC, they can not restore the orgna nformaton because the TDC oes not start unt t must receve a ata. Even f Bob (1 aso sens hs key, they st can not obtan the secret ue to the ack of Ace s parameter α. Because Ace s parameter settng s epenent on the partcpant keys, f they sen some fake keys, then the TDC w output No, that s, they cannot get the secret. 4.2 Comparson x D} (J D to measure her own partce. Therefore, the probabty of a va roun s 1/. In aton, after y 1,..., y n are announce, the eavesropper may earn x 1,..., x n from the attack wth one more qut or even a mutqut puse through the untary gate. Therefore, the announcement of these ata ncreases the probabty of nformaton eakage. In our protoco, the strbutor vountary chooses y 1,..., y n wthout announcement, that s, she knows the measurement bass nformaton. Therefore, the probabty of a va roun s 1. In ths secton, we compare our protoco wth Tavako s scheme [31] n Tabe 1. In Tavako s scheme, a partcpants ranomy choose the measurement bass nformaton y 1,..., y n, that s, the strbutor Ace oes not know any nformaton about the measurement bass. Before announcng them, she ranomy chooses the bass M J = { e (J x In aton, Tavako et a. propose an (n, n- thresho scheme,.e., the (n, n-thresho access structure. In our protoco, we gve a quantum secret sharng scheme to reaze a genera access structure. If the access structure contans ony one authorze set, then our scheme w become an (n, n-thresho scheme. Therefore, our scheme s more extensve an meanngfu.

6 518 Communcatons n Theoretca Physcs Vo. 69 Tabe 1 Comparson of Tavako s scheme [31] an our propose one. Tavako s scheme Our propose scheme Quantum state Snge qut Snge qut Va probabty 1/ 1 Access structure (n, n-thresho Genera access structure 5 Concuson In ths paper, we propose a quantum secret sharng scheme wth a snge -eve quantum state to reaze a genera access structure. In the propose protoco, we st appe the cycc property of MUBs because these bases are mportant toos n quantum nformaton processng. In aton, we aso anayse the securty of our scheme aganst prmary quantum attacks an compare our protoco wth Tavako s scheme. For our scheme, the probabty of each va roun s 1. When our access structure contans ony one authorze set, our scheme w be the same as Tavako s. However, snce MUBs are st unknown, we ony conser the o prmes. For even number or power of prme number, we o not gve any scusson. In Refs. [36 27], many agebrac propertes of power of prme numbers have been gven, then we hope that more researchers w stuy these probems an propose more mportant schemes. Acknowegements We want to express our grattue to anonymous referees for ther vauabe an constructve comments. References [1] A. Shamr, Commun. ACM 22 ( [2] G. R. Bakey, n Proceengs of the Natona Computer Conference, (AFIPS, 1979 (1979 pp [3] M. Hery, V. Buzek, an A. Berthaume, Phys. Rev. A 59 ( [4] R. Ceve, D. Gottesman, an H. K. Lo, Phys. Rev. Lett. 83 ( [5] D. Gottesman, Phys. Rev. A 61 ( [6] F. G. Deng, H. Y. Zhou, an G. L. Long, J. Phys. A: Math. Gen. 39 ( [7] A. M. Lance, T. Symu, W. P. Bowen, et a., Phys. Rev. Lett. 92 ( [8] F. G. Deng, X. H. L, C. Y. L, et a., Phys. Rev. A 72 ( [9] G. Goron an G. Rgon, Phys. Rev. A 73 ( [10] W. K. Wootters an W. H. Zurek, Nature (Lonon 299 ( [11] D. Deks, Phys. Lett. A 92 ( [12] A. Karsson, M. Koash, an N. Imoto, Phys. Rev. A 59 ( [13] L. Xao, G. L. Long, F. G. Deng, an J. W. Pan, Phys. Rev. A 69 ( [14] H. Cao an W. P. Ma, IEEE Photoncs J. 9 ( [15] C. M. Ba, Z. H. L, T. T. Xu, an Y. M. L, Int. J. Theor. Phys. 55 ( [16] A. Matra, S. J. De, G. Pau, an A. K. Pa, Phys. Rev. A 92 ( [17] L. H. Gong, H. C. Song, C. S. He, et a., Physca Scrpta 89 ( [18] P. Sarvepa an R. Raussenorf, Phys. Rev. A 81 ( [19] L. Y. Hsu an C. M. L, Phys. Rev. A 71 ( [20] C. M. Ba, Z. H. L, M. M. S, et a., Eur. Phys. J. D 71 ( [21] X. J. Wang, L. X. An, X. T. Yu, et a., Phys. Lett. A 381 ( [22] Y. F. He an W. P. Ma, Int. J. Quantum Inf. 14 ( [23] K. J. Zhang, L. Zhang, T. T. Song, et a., Scence Chna Phys. Mech. & Astron. 6 ( [24] Z. Zhang, W. Lu, an C. L, Chn. Phys. B 20 ( [25] R. Rahaman an M. G. Parker, Phys. Rev. A 91 ( [26] Y. H. Yang, F. Gao, X. Wu, et a., Sc. Rep. 5 ( [27] C. M. Ba, Z. H. L, T. T. Xu, et a., Quantum Inf. Process 16 ( [28] J. Wang, L. L, H. Peng, an Y. Yang, Phys. Rev. A 95 ( [29] J. T. Wang, G. Xu, X. B. Chen, et a., Phys. Lett. A 381 ( [30] H. Lu, Z. Zhang, L. K. Chen, et a., Phys. Rev. Lett. 117 ( [31] A. Tavako, I. Herbauts, M. Zukowsk, an M. Bourennane, Phys. Rev. A 92 ( (R. [32] V. Karmpour an M. Asoueh, Phys. Rev. A 92 ( (R. [33] S. Ln, G. D. Guo, Y. Z. Xu, et a., Phys. Rev. A 93 ( [34] C. Lu, F. Mao, et a., Quantum Inf. Process 17 ( [35] C. Wang, F. Mao, Y. S. L, et a., Phys. Rev. A 71 ( [36] I. D. Ivonovc, J. Phys. A: Math. Gen. 14 ( [37] W. K. Wootters an B. D. Fes, Ann. Phys. 191 (

Neural network-based athletics performance prediction optimization model applied research

Neural network-based athletics performance prediction optimization model applied research Avaabe onne www.jocpr.com Journa of Chemca and Pharmaceutca Research, 04, 6(6):8-5 Research Artce ISSN : 0975-784 CODEN(USA) : JCPRC5 Neura networ-based athetcs performance predcton optmzaton mode apped

More information

High-Order Hamilton s Principle and the Hamilton s Principle of High-Order Lagrangian Function

High-Order Hamilton s Principle and the Hamilton s Principle of High-Order Lagrangian Function Commun. Theor. Phys. Bejng, Chna 49 008 pp. 97 30 c Chnese Physcal Socety Vol. 49, No., February 15, 008 Hgh-Orer Hamlton s Prncple an the Hamlton s Prncple of Hgh-Orer Lagrangan Functon ZHAO Hong-Xa an

More information

Analysis of Block OMP using Block RIP

Analysis of Block OMP using Block RIP Anayss of ock OMP usng ock RIP Jun Wang, Gang L, Hao Zhang, Xqn Wang Department of Eectronc Engneerng, snghua Unversty, eng 00084, Chna Emas: un-wang05@mas.tsnghua.eu.cn, {gang, haozhang, wangq_ee}@tsnghua.eu.cn

More information

Research on Complex Networks Control Based on Fuzzy Integral Sliding Theory

Research on Complex Networks Control Based on Fuzzy Integral Sliding Theory Advanced Scence and Technoogy Letters Vo.83 (ISA 205), pp.60-65 http://dx.do.org/0.4257/ast.205.83.2 Research on Compex etworks Contro Based on Fuzzy Integra Sdng Theory Dongsheng Yang, Bngqng L, 2, He

More information

Multispectral Remote Sensing Image Classification Algorithm Based on Rough Set Theory

Multispectral Remote Sensing Image Classification Algorithm Based on Rough Set Theory Proceedngs of the 2009 IEEE Internatona Conference on Systems Man and Cybernetcs San Antono TX USA - October 2009 Mutspectra Remote Sensng Image Cassfcaton Agorthm Based on Rough Set Theory Yng Wang Xaoyun

More information

ON AUTOMATIC CONTINUITY OF DERIVATIONS FOR BANACH ALGEBRAS WITH INVOLUTION

ON AUTOMATIC CONTINUITY OF DERIVATIONS FOR BANACH ALGEBRAS WITH INVOLUTION European Journa of Mathematcs and Computer Scence Vo. No. 1, 2017 ON AUTOMATC CONTNUTY OF DERVATONS FOR BANACH ALGEBRAS WTH NVOLUTON Mohamed BELAM & Youssef T DL MATC Laboratory Hassan Unversty MORO CCO

More information

A finite difference method for heat equation in the unbounded domain

A finite difference method for heat equation in the unbounded domain Internatona Conerence on Advanced ectronc Scence and Technoogy (AST 6) A nte derence method or heat equaton n the unbounded doman a Quan Zheng and Xn Zhao Coege o Scence North Chna nversty o Technoogy

More information

MARKOV CHAIN AND HIDDEN MARKOV MODEL

MARKOV CHAIN AND HIDDEN MARKOV MODEL MARKOV CHAIN AND HIDDEN MARKOV MODEL JIAN ZHANG JIANZHAN@STAT.PURDUE.EDU Markov chan and hdden Markov mode are probaby the smpest modes whch can be used to mode sequenta data,.e. data sampes whch are not

More information

L-Edge Chromatic Number Of A Graph

L-Edge Chromatic Number Of A Graph IJISET - Internatona Journa of Innovatve Scence Engneerng & Technoogy Vo. 3 Issue 3 March 06. ISSN 348 7968 L-Edge Chromatc Number Of A Graph Dr.R.B.Gnana Joth Assocate Professor of Mathematcs V.V.Vannaperuma

More information

WHY NOT USE THE ENTROPY METHOD FOR WEIGHT ESTIMATION?

WHY NOT USE THE ENTROPY METHOD FOR WEIGHT ESTIMATION? ISAHP 001, Berne, Swtzerlan, August -4, 001 WHY NOT USE THE ENTROPY METHOD FOR WEIGHT ESTIMATION? Masaak SHINOHARA, Chkako MIYAKE an Kekch Ohsawa Department of Mathematcal Informaton Engneerng College

More information

Nested case-control and case-cohort studies

Nested case-control and case-cohort studies Outne: Nested case-contro and case-cohort studes Ørnuf Borgan Department of Mathematcs Unversty of Oso NORBIS course Unversty of Oso 4-8 December 217 1 Radaton and breast cancer data Nested case contro

More information

Quantum secret sharing based on quantum error-correcting codes

Quantum secret sharing based on quantum error-correcting codes Quantum secret sharing based on quantum error-correcting codes Zhang Zu-Rong( ), Liu Wei-Tao( ), and Li Cheng-Zu( ) Department of Physics, School of Science, National University of Defense Technology,

More information

Note 2. Ling fong Li. 1 Klein Gordon Equation Probablity interpretation Solutions to Klein-Gordon Equation... 2

Note 2. Ling fong Li. 1 Klein Gordon Equation Probablity interpretation Solutions to Klein-Gordon Equation... 2 Note 2 Lng fong L Contents Ken Gordon Equaton. Probabty nterpretaton......................................2 Soutons to Ken-Gordon Equaton............................... 2 2 Drac Equaton 3 2. Probabty nterpretaton.....................................

More information

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

Analysis of Bivariate Excess Losses

Analysis of Bivariate Excess Losses by Janong Ren ABSTRACT The concept of ecess osses s wey use n rensurance an retrospectve nsurance ratng The mathematcs reate to t has been stue etensvey n the property an casuaty actuara terature However,

More information

Efficient many-party controlled teleportation of multi-qubit quantum information via entanglement

Efficient many-party controlled teleportation of multi-qubit quantum information via entanglement Effcent many-party controlled teleportaton of mult-qut quantum nformaton va entanglement Chu-Png Yang, Shh-I Chu, Syuan Han Physcal Revew A, 24 Presentng: Vctora Tchoudakov Motvaton Teleportaton va the

More information

Predicting Model of Traffic Volume Based on Grey-Markov

Predicting Model of Traffic Volume Based on Grey-Markov Vo. No. Modern Apped Scence Predctng Mode of Traffc Voume Based on Grey-Marov Ynpeng Zhang Zhengzhou Muncpa Engneerng Desgn & Research Insttute Zhengzhou 5005 Chna Abstract Grey-marov forecastng mode of

More information

3. Stress-strain relationships of a composite layer

3. Stress-strain relationships of a composite layer OM PO I O U P U N I V I Y O F W N ompostes ourse 8-9 Unversty of wente ng. &ech... tress-stran reatonshps of a composte ayer - Laurent Warnet & emo Aerman.. tress-stran reatonshps of a composte ayer Introducton

More information

Development of whole CORe Thermal Hydraulic analysis code CORTH Pan JunJie, Tang QiFen, Chai XiaoMing, Lu Wei, Liu Dong

Development of whole CORe Thermal Hydraulic analysis code CORTH Pan JunJie, Tang QiFen, Chai XiaoMing, Lu Wei, Liu Dong Deveopment of whoe CORe Therma Hydrauc anayss code CORTH Pan JunJe, Tang QFen, Cha XaoMng, Lu We, Lu Dong cence and technoogy on reactor system desgn technoogy, Nucear Power Insttute of Chna, Chengdu,

More information

New Liu Estimators for the Poisson Regression Model: Method and Application

New Liu Estimators for the Poisson Regression Model: Method and Application New Lu Estmators for the Posson Regresson Moel: Metho an Applcaton By Krstofer Månsson B. M. Golam Kbra, Pär Sölaner an Ghaz Shukur,3 Department of Economcs, Fnance an Statstcs, Jönköpng Unversty Jönköpng,

More information

Image Classification Using EM And JE algorithms

Image Classification Using EM And JE algorithms Machne earnng project report Fa, 2 Xaojn Sh, jennfer@soe Image Cassfcaton Usng EM And JE agorthms Xaojn Sh Department of Computer Engneerng, Unversty of Caforna, Santa Cruz, CA, 9564 jennfer@soe.ucsc.edu

More information

Delay tomography for large scale networks

Delay tomography for large scale networks Deay tomography for arge scae networks MENG-FU SHIH ALFRED O. HERO III Communcatons and Sgna Processng Laboratory Eectrca Engneerng and Computer Scence Department Unversty of Mchgan, 30 Bea. Ave., Ann

More information

Xin Li Department of Information Systems, College of Business, City University of Hong Kong, Hong Kong, CHINA

Xin Li Department of Information Systems, College of Business, City University of Hong Kong, Hong Kong, CHINA RESEARCH ARTICLE MOELING FIXE OS BETTING FOR FUTURE EVENT PREICTION Weyun Chen eartment of Educatona Informaton Technoogy, Facuty of Educaton, East Chna Norma Unversty, Shangha, CHINA {weyun.chen@qq.com}

More information

Analytical classical dynamics

Analytical classical dynamics Analytcal classcal ynamcs by Youun Hu Insttute of plasma physcs, Chnese Acaemy of Scences Emal: yhu@pp.cas.cn Abstract These notes were ntally wrtten when I rea tzpatrck s book[] an were later revse to

More information

Cyclic Codes BCH Codes

Cyclic Codes BCH Codes Cycc Codes BCH Codes Gaos Feds GF m A Gaos fed of m eements can be obtaned usng the symbos 0,, á, and the eements beng 0,, á, á, á 3 m,... so that fed F* s cosed under mutpcaton wth m eements. The operator

More information

arxiv:quant-ph/ v1 10 Apr 2006

arxiv:quant-ph/ v1 10 Apr 2006 Fake-signal-and-cheating attack on quantum secret sharing Fu-Guo Deng, 1,,3 Xi-Han Li, 1, Pan Chen, 4 Chun-Yan Li, 1, and Hong-Yu Zhou 1,,3 1 The Key Laboratory of Beam Technology and Material Modification

More information

ENTROPIC QUESTIONING

ENTROPIC QUESTIONING ENTROPIC QUESTIONING NACHUM. Introucton Goal. Pck the queston that contrbutes most to fnng a sutable prouct. Iea. Use an nformaton-theoretc measure. Bascs. Entropy (a non-negatve real number) measures

More information

Globally Optimal Multisensor Distributed Random Parameter Matrices Kalman Filtering Fusion with Applications

Globally Optimal Multisensor Distributed Random Parameter Matrices Kalman Filtering Fusion with Applications Sensors 2008, 8, 8086-8103; DOI: 10.3390/s8128086 OPEN ACCESS sensors ISSN 1424-8220 www.mdp.com/journa/sensors Artce Gobay Optma Mutsensor Dstrbuted Random Parameter Matrces Kaman Fterng Fuson wth Appcatons

More information

On the Power Function of the Likelihood Ratio Test for MANOVA

On the Power Function of the Likelihood Ratio Test for MANOVA Journa of Mutvarate Anayss 8, 416 41 (00) do:10.1006/jmva.001.036 On the Power Functon of the Lkehood Rato Test for MANOVA Dua Kumar Bhaumk Unversty of South Aabama and Unversty of Inos at Chcago and Sanat

More information

International Journal "Information Theories & Applications" Vol.13

International Journal Information Theories & Applications Vol.13 290 Concuson Wthn the framework of the Bayesan earnng theory, we anayze a cassfer generazaton abty for the recognton on fnte set of events. It was shown that the obtane resuts can be appe for cassfcaton

More information

Bounds for Spectral Radius of Various Matrices Associated With Graphs

Bounds for Spectral Radius of Various Matrices Associated With Graphs 45 5 Vol.45, No.5 016 9 AVANCES IN MATHEMATICS (CHINA) Sep., 016 o: 10.11845/sxjz.015015b Bouns for Spectral Raus of Varous Matrces Assocate Wth Graphs CUI Shuyu 1, TIAN Guxan, (1. Xngzh College, Zhejang

More information

The Application of BP Neural Network principal component analysis in the Forecasting the Road Traffic Accident

The Application of BP Neural Network principal component analysis in the Forecasting the Road Traffic Accident ICTCT Extra Workshop, Bejng Proceedngs The Appcaton of BP Neura Network prncpa component anayss n Forecastng Road Traffc Accdent He Mng, GuoXucheng &LuGuangmng Transportaton Coege of Souast Unversty 07

More information

Inthem-machine flow shop problem, a set of jobs, each

Inthem-machine flow shop problem, a set of jobs, each THE ASYMPTOTIC OPTIMALITY OF THE SPT RULE FOR THE FLOW SHOP MEAN COMPLETION TIME PROBLEM PHILIP KAMINSKY Industra Engneerng and Operatons Research, Unversty of Caforna, Bereey, Caforna 9470, amnsy@eor.bereey.edu

More information

arxiv:quant-ph/ Jul 2002

arxiv:quant-ph/ Jul 2002 Lnear optcs mplementaton of general two-photon proectve measurement Andrze Grudka* and Anton Wóck** Faculty of Physcs, Adam Mckewcz Unversty, arxv:quant-ph/ 9 Jul PXOWRZVNDR]QDRODQG Abstract We wll present

More information

Example: Suppose we want to build a classifier that recognizes WebPages of graduate students.

Example: Suppose we want to build a classifier that recognizes WebPages of graduate students. Exampe: Suppose we want to bud a cassfer that recognzes WebPages of graduate students. How can we fnd tranng data? We can browse the web and coect a sampe of WebPages of graduate students of varous unverstes.

More information

GENERIC CONTINUOUS SPECTRUM FOR MULTI-DIMENSIONAL QUASIPERIODIC SCHRÖDINGER OPERATORS WITH ROUGH POTENTIALS

GENERIC CONTINUOUS SPECTRUM FOR MULTI-DIMENSIONAL QUASIPERIODIC SCHRÖDINGER OPERATORS WITH ROUGH POTENTIALS GENERIC CONTINUOUS SPECTRUM FOR MULTI-DIMENSIONAL QUASIPERIODIC SCHRÖDINGER OPERATORS WITH ROUGH POTENTIALS YANG FAN AND RUI HAN Abstract. We stuy the mult-mensonal operator (H xu) n = m n = um + f(t n

More information

Polite Water-filling for Weighted Sum-rate Maximization in MIMO B-MAC Networks under. Multiple Linear Constraints

Polite Water-filling for Weighted Sum-rate Maximization in MIMO B-MAC Networks under. Multiple Linear Constraints 2011 IEEE Internatona Symposum on Informaton Theory Proceedngs Pote Water-fng for Weghted Sum-rate Maxmzaton n MIMO B-MAC Networks under Mutpe near Constrants An u 1, Youjan u 2, Vncent K. N. au 3, Hage

More information

QUARTERLY OF APPLIED MATHEMATICS

QUARTERLY OF APPLIED MATHEMATICS QUARTERLY OF APPLIED MATHEMATICS Voume XLI October 983 Number 3 DIAKOPTICS OR TEARING-A MATHEMATICAL APPROACH* By P. W. AITCHISON Unversty of Mantoba Abstract. The method of dakoptcs or tearng was ntroduced

More information

arxiv:quant-ph/ v1 27 Dec 2004

arxiv:quant-ph/ v1 27 Dec 2004 Multiparty Quantum Secret Sharing Zhan-jun Zhang 1,2, Yong Li 3 and Zhong-xiao Man 2 1 School of Physics & Material Science, Anhui University, Hefei 230039, China 2 Wuhan Institute of Physics and Mathematics,

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Approximate merging of a pair of BeÂzier curves

Approximate merging of a pair of BeÂzier curves COMPUTER-AIDED DESIGN Computer-Aded Desgn 33 (1) 15±136 www.esever.com/ocate/cad Approxmate mergng of a par of BeÂzer curves Sh-Mn Hu a,b, *, Rou-Feng Tong c, Tao Ju a,b, Ja-Guang Sun a,b a Natona CAD

More information

Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State

Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State Commun. Theor. Phys. (Beijing, China) 49 (2008) pp. 1468 1472 c Chinese Physical Society Vol. 49, No. 6, June 15, 2008 Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Visualization of 2D Data By Rational Quadratic Functions

Visualization of 2D Data By Rational Quadratic Functions 7659 Englan UK Journal of Informaton an Computng cence Vol. No. 007 pp. 7-6 Vsualzaton of D Data By Ratonal Quaratc Functons Malk Zawwar Hussan + Nausheen Ayub Msbah Irsha Department of Mathematcs Unversty

More information

G : Statistical Mechanics

G : Statistical Mechanics G25.2651: Statstca Mechancs Notes for Lecture 11 I. PRINCIPLES OF QUANTUM STATISTICAL MECHANICS The probem of quantum statstca mechancs s the quantum mechanca treatment of an N-partce system. Suppose the

More information

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com

More information

Greyworld White Balancing with Low Computation Cost for On- Board Video Capturing

Greyworld White Balancing with Low Computation Cost for On- Board Video Capturing reyword Whte aancng wth Low Computaton Cost for On- oard Vdeo Capturng Peng Wu Yuxn Zoe) Lu Hewett-Packard Laboratores Hewett-Packard Co. Pao Ato CA 94304 USA Abstract Whte baancng s a process commony

More information

Associative Memories

Associative Memories Assocatve Memores We consder now modes for unsupervsed earnng probems, caed auto-assocaton probems. Assocaton s the task of mappng patterns to patterns. In an assocatve memory the stmuus of an ncompete

More information

Supplementary Material: Learning Structured Weight Uncertainty in Bayesian Neural Networks

Supplementary Material: Learning Structured Weight Uncertainty in Bayesian Neural Networks Shengyang Sun, Changyou Chen, Lawrence Carn Suppementary Matera: Learnng Structured Weght Uncertanty n Bayesan Neura Networks Shengyang Sun Changyou Chen Lawrence Carn Tsnghua Unversty Duke Unversty Duke

More information

Quantum secure circuit evaluation

Quantum secure circuit evaluation Scence n Chna Ser. F Informaton Scences 2004 Vol.47 No.6 717 727 717 Quantum secure crcut evaluaton CHEN Huanhuan, LI Bn & ZHUANG Zhenquan Department of Electronc Scence and Technology, Unversty of Scence

More information

Lower bounds for the Crossing Number of the Cartesian Product of a Vertex-transitive Graph with a Cycle

Lower bounds for the Crossing Number of the Cartesian Product of a Vertex-transitive Graph with a Cycle Lower bounds for the Crossng Number of the Cartesan Product of a Vertex-transtve Graph wth a Cyce Junho Won MIT-PRIMES December 4, 013 Abstract. The mnmum number of crossngs for a drawngs of a gven graph

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Robust Multi-Objective Facility Location Model of Closed-Loop Supply Chain Network under Interval Uncertainty

Robust Multi-Objective Facility Location Model of Closed-Loop Supply Chain Network under Interval Uncertainty Internatona Journa of Operatons Research Internatona Journa of Operatons Research Vo. 14, No. 2, 53 63 (2017) Robust Mut-Obectve Facty Locaton Moe of Cose-Loop Suppy Chan Network uner Interva Uncertanty

More information

Chapter 6. Rotations and Tensors

Chapter 6. Rotations and Tensors Vector Spaces n Physcs 8/6/5 Chapter 6. Rotatons and ensors here s a speca knd of near transformaton whch s used to transforms coordnates from one set of axes to another set of axes (wth the same orgn).

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Combining Chain-Ladder and Additive Loss Reserving Methods for Dependent Lines of Business

Combining Chain-Ladder and Additive Loss Reserving Methods for Dependent Lines of Business Combnng Chan-Laer an tve Loss Reservng Methos for Depenent Lnes of Busness by Mchae Merz an Maro V Wüthrch BSTRCT Often n non-fe nsurance, cam reserves are the argest poston on the abty se of the baance

More information

COXREG. Estimation (1)

COXREG. Estimation (1) COXREG Cox (972) frst suggested the modes n whch factors reated to fetme have a mutpcatve effect on the hazard functon. These modes are caed proportona hazards (PH) modes. Under the proportona hazards

More information

arxiv: v3 [quant-ph] 6 Sep 2009

arxiv: v3 [quant-ph] 6 Sep 2009 Semi-quantum secret sharing using entangled states Qin Li, 1 W. H. Chan, and Dong-Yang Long 1 1 Department of Computer Science, Sun Yat-sen University, Guangzhou 51075, China Department of Mathematics,

More information

Competitive Experimentation and Private Information

Competitive Experimentation and Private Information Compettve Expermentaton an Prvate Informaton Guseppe Moscarn an Francesco Squntan Omtte Analyss not Submtte for Publcaton Dervatons for te Gamma-Exponental Moel Dervaton of expecte azar rates. By Bayes

More information

On Integrals Involving Universal Associated Legendre Polynomials and Powers of the Factor (1 x 2 ) and Their Byproducts

On Integrals Involving Universal Associated Legendre Polynomials and Powers of the Factor (1 x 2 ) and Their Byproducts Commun. Theor. Phys. 66 (216) 369 373 Vo. 66, No. 4, October 1, 216 On Integras Invoving Universa Associated Legendre Poynomias and Powers of the Factor (1 x 2 ) and Their Byproducts Dong-Sheng Sun ( 孙东升

More information

On a one-parameter family of Riordan arrays and the weight distribution of MDS codes

On a one-parameter family of Riordan arrays and the weight distribution of MDS codes On a one-parameter famly of Roran arrays an the weght strbuton of MDS coes Paul Barry School of Scence Waterfor Insttute of Technology Irelan pbarry@wte Patrck Ftzpatrck Department of Mathematcs Unversty

More information

The Noether theorem. Elisabet Edvardsson. Analytical mechanics - FYGB08 January, 2016

The Noether theorem. Elisabet Edvardsson. Analytical mechanics - FYGB08 January, 2016 The Noether theorem Elsabet Evarsson Analytcal mechancs - FYGB08 January, 2016 1 1 Introucton The Noether theorem concerns the connecton between a certan kn of symmetres an conservaton laws n physcs. It

More information

The line method combined with spectral chebyshev for space-time fractional diffusion equation

The line method combined with spectral chebyshev for space-time fractional diffusion equation Apped and Computatona Mathematcs 014; 3(6): 330-336 Pubshed onne December 31, 014 (http://www.scencepubshnggroup.com/j/acm) do: 10.1164/j.acm.0140306.17 ISS: 3-5605 (Prnt); ISS: 3-5613 (Onne) The ne method

More information

Quantum Runge-Lenz Vector and the Hydrogen Atom, the hidden SO(4) symmetry

Quantum Runge-Lenz Vector and the Hydrogen Atom, the hidden SO(4) symmetry Quantum Runge-Lenz ector and the Hydrogen Atom, the hdden SO(4) symmetry Pasca Szrftgser and Edgardo S. Cheb-Terrab () Laboratore PhLAM, UMR CNRS 85, Unversté Le, F-59655, France () Mapesoft Let's consder

More information

GENERATION OF GOLD-SEQUENCES WITH APPLICATIONS TO SPREAD SPECTRUM SYSTEMS

GENERATION OF GOLD-SEQUENCES WITH APPLICATIONS TO SPREAD SPECTRUM SYSTEMS GENERATION OF GOLD-SEQUENCES WITH APPLICATIONS TO SPREAD SPECTRUM SYSTEMS F. Rodríguez Henríquez (1), Member, IEEE, N. Cruz Cortés (1), Member, IEEE, J.M. Rocha-Pérez (2) Member, IEEE. F. Amaro Sánchez

More information

we have E Y x t ( ( xl)) 1 ( xl), e a in I( Λ ) are as follows:

we have E Y x t ( ( xl)) 1 ( xl), e a in I( Λ ) are as follows: APPENDICES Aendx : the roof of Equaton (6 For j m n we have Smary from Equaton ( note that j '( ( ( j E Y x t ( ( x ( x a V ( ( x a ( ( x ( x b V ( ( x b V x e d ( abx ( ( x e a a bx ( x xe b a bx By usng

More information

Solution of a nonsymmetric algebraic Riccati equation from a one-dimensional multistate transport model

Solution of a nonsymmetric algebraic Riccati equation from a one-dimensional multistate transport model IMA Journa of Numerca Anayss (2011) 1, 145 1467 do:10.109/manum/drq04 Advance Access pubcaton on May 0, 2011 Souton of a nonsymmetrc agebrac Rccat equaton from a one-dmensona mutstate transport mode TIEXIANG

More information

ID-based Proxy Re-signature with Aggregate Property

ID-based Proxy Re-signature with Aggregate Property JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 31 1199-1211 (2015) ID-based Proxy Re-sgnature wth Aggregate Property ZHI-WEI WANG 12 AND AI-DONG XIA 1 1 Coege of Computer Nanjng Unversty of Posts and Teecommuncatons

More information

Valuated Binary Tree: A New Approach in Study of Integers

Valuated Binary Tree: A New Approach in Study of Integers Internatonal Journal of Scentfc Innovatve Mathematcal Research (IJSIMR) Volume 4, Issue 3, March 6, PP 63-67 ISS 347-37X (Prnt) & ISS 347-34 (Onlne) wwwarcournalsorg Valuated Bnary Tree: A ew Approach

More information

LECTURE 21 Mohr s Method for Calculation of General Displacements. 1 The Reciprocal Theorem

LECTURE 21 Mohr s Method for Calculation of General Displacements. 1 The Reciprocal Theorem V. DEMENKO MECHANICS OF MATERIALS 05 LECTURE Mohr s Method for Cacuaton of Genera Dspacements The Recproca Theorem The recproca theorem s one of the genera theorems of strength of materas. It foows drect

More information

Short-Term Load Forecasting for Electric Power Systems Using the PSO-SVR and FCM Clustering Techniques

Short-Term Load Forecasting for Electric Power Systems Using the PSO-SVR and FCM Clustering Techniques Energes 20, 4, 73-84; do:0.3390/en40073 Artce OPEN ACCESS energes ISSN 996-073 www.mdp.com/journa/energes Short-Term Load Forecastng for Eectrc Power Systems Usng the PSO-SVR and FCM Custerng Technques

More information

2012 IEEE International Symposium on Information Theory Proceedings

2012 IEEE International Symposium on Information Theory Proceedings On the Uncertanty of Informaton Retreval n Assocatve Memores Etan Yaaob an Jehoshua Bruc Electrcal Engneerng Department, Calforna Insttute of Technology, Pasaena, CA 9115, U.S.A Electrcal an Computer Engneerng

More information

Subgradient Methods and Consensus Algorithms for Solving Convex Optimization Problems

Subgradient Methods and Consensus Algorithms for Solving Convex Optimization Problems Proceedngs of the 47th IEEE Conference on Decson and Contro Cancun, Mexco, Dec. 9-11, 2008 Subgradent Methods and Consensus Agorthms for Sovng Convex Optmzaton Probems Björn Johansson, Tamás Kevczy, Mae

More information

Negative Birefraction of Acoustic Waves in a Sonic Crystal

Negative Birefraction of Acoustic Waves in a Sonic Crystal Negatve Brefracton of Acoustc Waves n a Sonc Crysta Mng-Hu Lu 1, Chao Zhang 1, Lang Feng 1, * Jun Zhao 1, Yan-Feng Chen 1, Y-We Mao 2, Jan Z 3, Yong-Yuan Zhu 1, Sh-Nng Zhu 1 and Na-Ben Mng 1 1 Natona Laboratory

More information

Thermodynamics II. Department of Chemical Engineering. Prof. Kim, Jong Hak

Thermodynamics II. Department of Chemical Engineering. Prof. Kim, Jong Hak Thermodynamcs II Department o Chemca ngneerng ro. Km, Jong Hak .5 Fugacty & Fugacty Coecent : ure Speces µ > provdes undamenta crteron or phase equbrum not easy to appy to sove probem Lmtaton o gn (.9

More information

arxiv:quant-ph/ May 2002

arxiv:quant-ph/ May 2002 Multiparty -imensional quantum information splitting Anrze Gruka* an Antoni Wócik** Faculty of Physics, Aam Mickiewicz University, arxiv:quant-ph/5 7 May 8PXOWRZVND3R]QD3RODQG Abstract Generalization of

More information

Yukawa Potential and the Propagator Term

Yukawa Potential and the Propagator Term PHY304 Partcle Physcs 4 Dr C N Booth Yukawa Potental an the Propagator Term Conser the electrostatc potental about a charge pont partcle Ths s gven by φ = 0, e whch has the soluton φ = Ths escrbes the

More information

NONLINEAR SYSTEM IDENTIFICATION BASE ON FW-LSSVM

NONLINEAR SYSTEM IDENTIFICATION BASE ON FW-LSSVM Journa of heoretca and Apped Informaton echnoogy th February 3. Vo. 48 No. 5-3 JAI & LLS. A rghts reserved. ISSN: 99-8645 www.jatt.org E-ISSN: 87-395 NONLINEAR SYSEM IDENIFICAION BASE ON FW-LSSVM, XIANFANG

More information

arxiv: v3 [cond-mat.str-el] 15 Oct 2009

arxiv: v3 [cond-mat.str-el] 15 Oct 2009 Second Renormazaton of Tensor-Networ States Z. Y. Xe 1, H. C. Jang 2, Q. N. Chen 1, Z. Y. Weng 2, and T. Xang 3,1 1 Insttute of Theoretca Physcs, Chnese Academy of Scences, P.O. Box 2735, Beng 100190,

More information

Note On Some Identities of New Combinatorial Integers

Note On Some Identities of New Combinatorial Integers Apped Mathematcs & Informaton Scences 5(3 (20, 500-53 An Internatona Journa c 20 NSP Note On Some Identtes of New Combnatora Integers Adem Kııçman, Cenap Öze 2 and Ero Yımaz 3 Department of Mathematcs

More information

Perfect quantum teleportation and dense coding protocols via the 2N-qubit W state

Perfect quantum teleportation and dense coding protocols via the 2N-qubit W state Perfect quantum teleportation and dense coding protocols via the -qubit W state Wang Mei-Yu( ) a)b) and Yan Feng-Li( ) a)b) a) College of Physics Science and Information Engineering, Hebei ormal University,

More information

Appendix for An Efficient Ascending-Bid Auction for Multiple Objects: Comment For Online Publication

Appendix for An Efficient Ascending-Bid Auction for Multiple Objects: Comment For Online Publication Appendx for An Effcent Ascendng-Bd Aucton for Mutpe Objects: Comment For Onne Pubcaton Norak Okamoto The foowng counterexampe shows that sncere bddng by a bdders s not aways an ex post perfect equbrum

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

AERODYNAMIC OPTIMIZATION OF COAXIAL ROTOR IN HOVER AND AXIAL FLIGHT

AERODYNAMIC OPTIMIZATION OF COAXIAL ROTOR IN HOVER AND AXIAL FLIGHT AEODYNAMI OPIMIZAION OF OAXIAL OO IN HOVE AND AXIAL FGH Omr an Vamr Khromov Facuty of Aerospace Engneerng echnon Israe Insttute of echnoogy Hafa 3 Israe Keywors: coaxa rotor bae-eement momentum theory

More information

IDENTIFICATION OF NONLINEAR SYSTEM VIA SVR OPTIMIZED BY PARTICLE SWARM ALGORITHM

IDENTIFICATION OF NONLINEAR SYSTEM VIA SVR OPTIMIZED BY PARTICLE SWARM ALGORITHM Journa of Theoretca and Apped Informaton Technoogy th February 3. Vo. 48 No. 5-3 JATIT & LLS. A rghts reserved. ISSN: 99-8645 www.att.org E-ISSN: 87-395 IDENTIFICATION OF NONLINEAR SYSTEM VIA SVR OPTIMIZED

More information

Quantum Private Comparison via Cavity QED

Quantum Private Comparison via Cavity QED Commun. Theor. Phys. 67 (2017) 147 156 Vol. 67, No. 2, February 1, 2017 Quantum Prvate Comparson va Cavty QED Tan-Yu Ye ( 叶天语 ) College of Informaton and Electronc Engneerng, Zhejang Gongshang Unversty,

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

A MULTIDIMENSIONAL ANALOGUE OF THE RADEMACHER-GAUSSIAN TAIL COMPARISON

A MULTIDIMENSIONAL ANALOGUE OF THE RADEMACHER-GAUSSIAN TAIL COMPARISON A MULTIDIMENSIONAL ANALOGUE OF THE RADEMACHER-GAUSSIAN TAIL COMPARISON PIOTR NAYAR AND TOMASZ TKOCZ Abstract We prove a menson-free tal comparson between the Euclean norms of sums of nepenent ranom vectors

More information

ENGI9496 Lecture Notes Multiport Models in Mechanics

ENGI9496 Lecture Notes Multiport Models in Mechanics ENGI9496 Moellng an Smulaton of Dynamc Systems Mechancs an Mechansms ENGI9496 Lecture Notes Multport Moels n Mechancs (New text Secton 4..3; Secton 9.1 generalzes to 3D moton) Defntons Generalze coornates

More information

A MIN-MAX REGRET ROBUST OPTIMIZATION APPROACH FOR LARGE SCALE FULL FACTORIAL SCENARIO DESIGN OF DATA UNCERTAINTY

A MIN-MAX REGRET ROBUST OPTIMIZATION APPROACH FOR LARGE SCALE FULL FACTORIAL SCENARIO DESIGN OF DATA UNCERTAINTY A MIN-MAX REGRET ROBST OPTIMIZATION APPROACH FOR ARGE SCAE F FACTORIA SCENARIO DESIGN OF DATA NCERTAINTY Travat Assavapokee Department of Industra Engneerng, nversty of Houston, Houston, Texas 7704-4008,

More information

Optimum Selection Combining for M-QAM on Fading Channels

Optimum Selection Combining for M-QAM on Fading Channels Optmum Seecton Combnng for M-QAM on Fadng Channes M. Surendra Raju, Ramesh Annavajjaa and A. Chockangam Insca Semconductors Inda Pvt. Ltd, Bangaore-56000, Inda Department of ECE, Unversty of Caforna, San

More information

Comment on An arbitrated quantum signature scheme. with fast signing and verifying

Comment on An arbitrated quantum signature scheme. with fast signing and verifying Comment on n arbtrated quantum sgnature scheme wth fast sgnng and verfyng Y-Png Luo and Tzonelh Hwang * Department of Computer cence and Informaton Engneerng, Natonal Cheng ung Unversty, No, Unversty Rd,

More information

arxiv: v1 [physics.comp-ph] 17 Dec 2018

arxiv: v1 [physics.comp-ph] 17 Dec 2018 Pressures nsde a nano-porous medum. The case of a snge phase fud arxv:1812.06656v1 [physcs.comp-ph] 17 Dec 2018 Oav Gateand, Dck Bedeaux, and Sgne Kjestrup PoreLab, Department of Chemstry, Norwegan Unversty

More information

Single-Source/Sink Network Error Correction Is as Hard as Multiple-Unicast

Single-Source/Sink Network Error Correction Is as Hard as Multiple-Unicast Snge-Source/Snk Network Error Correcton Is as Hard as Mutpe-Uncast Wentao Huang and Tracey Ho Department of Eectrca Engneerng Caforna Insttute of Technoogy Pasadena, CA {whuang,tho}@catech.edu Mchae Langberg

More information

( ) r! t. Equation (1.1) is the result of the following two definitions. First, the bracket is by definition a scalar product.

( ) r! t. Equation (1.1) is the result of the following two definitions. First, the bracket is by definition a scalar product. Chapter. Quantum Mechancs Notes: Most of the matera presented n ths chapter s taken from Cohen-Tannoudj, Du, and Laoë, Chap. 3, and from Bunker and Jensen 5), Chap... The Postuates of Quantum Mechancs..

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

Non-negative Matrices and Distributed Control

Non-negative Matrices and Distributed Control Non-negatve Matrces an Dstrbute Control Yln Mo July 2, 2015 We moel a network compose of m agents as a graph G = {V, E}. V = {1, 2,..., m} s the set of vertces representng the agents. E V V s the set of

More information

A new Approach for Solving Linear Ordinary Differential Equations

A new Approach for Solving Linear Ordinary Differential Equations , ISSN 974-57X (Onlne), ISSN 974-5718 (Prnt), Vol. ; Issue No. 1; Year 14, Copyrght 13-14 by CESER PUBLICATIONS A new Approach for Solvng Lnear Ordnary Dfferental Equatons Fawz Abdelwahd Department of

More information

An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States Commun. Theor. Phys. 65 (2016) 705 710 Vol. 65, No. 6, June 1, 2016 An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States Shu-Jiang Xu (Å ), 1, Xiu-Bo

More information

Circular Semi-Quantum Secret Sharing Using Single Particles

Circular Semi-Quantum Secret Sharing Using Single Particles Commun. Theor. Phys. 70 (018) 661 671 Vol. 70 No. 6 December 1 018 Circular Semi-Quantum Secret Sharing Using Single Particles Chong-Qiang Ye ( 叶崇强 ) and Tian-Yu Ye ( 叶天语 ) College of Information & Electronic

More information