Quantum Key Distribution Using Decoy State Protocol

Size: px
Start display at page:

Download "Quantum Key Distribution Using Decoy State Protocol"

Transcription

1 American J. of Engineering and Applied Sciences 2 (4): , 2009 ISSN Science Pblications Qantm Key Distribtion sing Decoy State Protocol,2 Sellami Ali, 2 Shhairi Sahardin and,2 M.R.B. Wahiddin Department of Comptational and Theoretical Sciences, Faclty of Science, International Islamic niversity Malaysia, Malaysia 2 Information Secrity Clster, Mimos Berhad, Technology Park Malaysia, Malaysia Abstract: Problem statement: Qantm key distribtion provides nconditional secrity garanteed by the fndamental laws of qantm physics. nfortnately, for real-life experimental set-ps, which mainly based on faint laser plses, the occasional prodction of mlti-photons and channel loss make it possible for sophisticated eavesdroppers to lanch varios sbtle eavesdropping attacks inclding the Photon Nmber Splitting (PNS) attack. The decoy state protocols recently proposed to beat PNS attack and to improve dramatically distance and secre key generation rate of Qantm Key Distribtion (QKD). Approach: Objective of this stdy was experimental implementation of weak decoy + vacm states QKD for increasing the performance of QKD system. To show conceptally how simple it was to apply the weak decoy + vacm state idea to a commercial QKD system, we chosen ID-3000 commercial qantm key distribtion system manfactred by id qantiqe. To implement the weak decoy + vacm state protocol, we had to add some new optical and electronics components to id qantiqe and to attenate each signal to the intensity of either signal state or weak decoy or vacm state randomly. Reslts: In or implementation, the attenation will be done by placing a VOA (variable optical attenator) in Alice s side. Specifically, or QKD system reqired the polarizations of 2 plses from the same signal to be orthogonal. Therefore the VOA mst be polarization independent so as to attenate the two plses eqally. The VOA tilized in experiment to attenate signals dynamically was Intensity Modlator (IM). We had implemented weak + vacm protocol on a modified commercial QKD system over a 25 km of telecom fibers with an nconditionally secre key rate of per plse. Conclsion: By making simple modifications to a commercial qantm key distribtion system, we cold achieve mch better performance with sbstantially higher key generation rate and longer distance than QKD system withot decoy state. Key words: Qantm cryptography, qantm key distribtion, decoy state protocol and optical commnications INTRODCTION Qantm Key Distribtion (QKD) has drawn many attentions from scientists. Different from the classical cryptography, Qantm Key Distribtion (QKD) [-3] can help two remote parties to set p the secre key by noncloning theorem [4]. Frther, proofs for the nconditional secrity over noisy channel have been given [5-8]. nfortnately, in view of implementation, perfect devices are always very hard to bild. Therefore most p-to-date QKD systems sbstitte the desired perfect single photon sorces by heavily attenated coherent laser sorces. QKD can be performed with these laser sorces over more than 20 km of telecom fibers [9,0]. However, this sbstittion raises some severe secrity concern. The otpt of coherent laser sorce obeys Poisson distribtion. Ths the occasional prodction of mlti-photon signals is inevitable no matter how heavily people attenate the laser. Recall that the secrity of BB84 protocol [3] is garanteed by qantm no-cloning theorem, the prodction of mltiphoton signals is fatal for the secrity: The eavesdropper (normally denoted by Eve) can simply keep an identical copy of what Bob possesses by blocking all single-photon signals and splitting all mlti-photon signals. Most p-to-date QKD experiments have not taken this Photon-Nmber Splitting (PNS) attack into accont and ths are, in principle, insecre. Hwang [] proposed the decoy state method as an important weapon to combat those sophisticated attack: By preparing and testing the transmission properties of Corresponding Athor: Sellami Ali, Department of Comptational and Theoretical Sciences, Faclty of Science, International Islamic niversity Malaysia, Malaysia 694

2 some decoy states, Alice and Bob are in a mch better position to catch an eavesdropper. Hwang specifically proposed to se a decoy state with an average nmber of photon of order. Hwang s idea was highly innovative. Decoy plse QKD theory gives a rigoros bond of the characteristics of the single photon plses, which are the only sorce plses that contribte to the secre bit rate. In [2], combining the idea of secrity proofs sing the entanglement distillation approach in GP [0] with decoy method; they gave a formla for the key generation rate: { µ µ 2 µ 2 } R q Q f (E )H (E ) + Q [ H (e )] () Where: q = Depends on the protocol, the sbscript µ = The average photon nmber per signal in signal states Q µ = The gain of signal states E µ = The qantm bit error rate (QBER) of signal states Q = The gain of the single photon states in signal states e = The error rate of single photon states f(x) = The bi-directional error correction rate [3] H 2 (x) = Binary shannon information fnction H 2(x) = -x log 2(x) - ( - x) log 2( - x) (2) Or implementation is based on BB84 [3] protocol. Among total N plses sent in experiment, N S plses are sed as signal states. Therefore the factor q is given by q = ½ N S /N. Q µ and E µ can be measred directly from experiments. In [2], they have proposed a practical protocol with Weak + Vacm states with average photon nmber 0 and v. sch a protocol is relatively simple to implement. The gain of the weak decoy state Qv and its error rate E µ cold also be reqired directly from experiments. Considering statistical flctations, the lower bonds of Q and the pper bond of e are given by [2] : 2 µ µ e v µ v µ v Q Q = Q 2 e Qµ e Y µ v v e µ 0µ E Q 0 o e µ µ Q (3) e Y e e = (4) In which: Q ν = Q ν Y0 = Y0 Y0 = Y0 + N Q ν ν N Y 0 0 N Y 0 0 In this stdy, we will present the experimental implementation of weak decoy + vacm states QKD sing commercial QKD systems are bi-directional. To show conceptally how simple it is to apply the weak decoy + vacm state idea to a commercial QKD system, we chose ID-3000 commercial qantm key distribtion system manfactred by id qantiqe. To implement the weak decoy + vacm state protocol, we have to add some new optical and electronics components to id qantiqe and have to attenate each signal to the intensity of either signal state or weak decoy or vacm state randomly. In or implementation, the attenation will be done by placing a VOA (variable optical attenator) in Alice s side. Specifically, or QKD system reqires the polarizations of the two plses from the same signal to be orthogonal. Therefore the VOA mst be polarization independent so as to attenate the two plses eqally. The VOA tilized in or experiment to attenate signals dynamically is Intensity Modlator (IM). MATERIAS AND METHODS Experimental setp: Existing commercial QKD systems are bi-directional. To show conceptally how simple it is to apply the decoy state idea to a commercial QKD system, we chose ID-3000 commercial Qantm Key Distribtion system manfactred by id qantiqe. The prototype of this QKD system is described in [8]. Here we describe it briefly: A frame of NP plses (in or experiment, NP = 624) is generated from Bob and sent to Alice. Within a frame, the time interval between signals is 200ns. The next frame will not be generated ntil the whole frame has retrned to Bob. The long delay line inside Jr. Alice promises that the incoming signal and retrning signal will not overlap in the channel between Bob and Jr. Alice so as to avoid Rayleigh scattering. This QKD system is called p and p atocompensating set-p, where the key is encoded in the 695

3 phase between two plses traveling from Bob to Alice and back (Fig.. A strong laser plse (@ 550 nm) emitted at Bob is separated at a first 50/50 Beam Splitter (BS), after having traveled throgh a short arm and a long arm, inclding a Phase Modlator (PMb) and a 50 ns Delay ine (D), respectively. All fibers and optical elements at Bob are polarization maintaining. The linear polarization is trned by 90 in the short arm, therefore the two plses exit Bob s stepp by the same port of the PBS. The plses travel down to Alice, are reflected on a Fraday mirror, attenated and come back orthogonally polarized. In trn, both plses now take the other path at Bob and arrive at the same time at BS where they interfere. Then, they are detected either in D, or after passing throgh the circlator (C ) in D2. Since the two plses take the same path, inside Bob in reversed other, this interferometer is ato-compensated. The implementation of weak + vacm protocol reqires amplitde modlation of three levels: µ, v and 0. Note that it wold be qite hard for high-speed amplitde modlators to prepare the real vacm state de to finite distinction ratio. However, if the gain of the vacm state is very close (like within a few standard deviations) to the dark cont rate, it wold be a good approximation. In or implementation, the attenation is done by placing a VOA (variable optical attenator) in Alice s side. Figre shows the schematic of the optical and electric layots in or system. The commercial QKD system by id Qantiqe consists of Bob and Jr. Alice. In or decoy state experiment, the actal (sender s) system is called Alice. It consists of Jr. Alice and for new optical and electronics components added by s. More concretely, for or decoy state protocol, we place the Decoy Intensity Modlator IM (denoted by DA in Fig. ) right in front of Jr. Alice. Its idle state is set to maximm transmittance. When the frame comes from Bob, the Decoy IM is in the idle state. After the first plse reaches copler C2, it will be detected by the classical detector and a synchronization signal will be otpt to trigger the Decoy generator. The Decoy Generator (DG in Fig. ), being triggered, Fig.: Experimental setp of weak + vacm state protocol 696 will hold a delay time td before otptting N P modlation voltages driving the Decoy IM to attenate the intensity of each the N P signals to be either that of signal state or decoy state dynamically, according to the Decoy profile. RESTS We performed nmerical simlation to find ot the optimal parameters. According to simlation reslts, we choose the intensities as µ = 0.55, v = Nmbers of plses sed as signal state, weak decoy state and vacm state are N µ = 0.635N, N v = 0.203N and N 0 = 0.62N respectively, where N = 05Mbit is the total nmber of plses sent by Alice in this experiment. After the transmission of all the N signals, Alice broadcasted to Bob the distribtion of decoy states as well as basis information. Bob then annonced which signals he had actally received in correct basis. We assme Alice and Bob annonced the measrement otcomes of all decoy states as well as a sbset of the signal states. From those experimental data, Alice and Bob then determined Q µ, Q v, E µ and E v, whose vales are now listed in Table. Note that or experiment is based on BB84 [0] protocol, S Nµ S ths q = ( / 2), where N µ is the nmber of plses N sed as signal state when Alice and Bob chose the same basis (Eq. ). DISCSSION Alice and Bob have to derive a lower bond on the key generation rate, R, by applying the theory of one decoy state protocol to their experimental data. To begin, we discss the theory of weak + vacm protocol. The weak + vacm protocol was first proposed and analyzed in [2]. In sch a protocol, only vacm and one decoy state are sed (in principle, more decoy states might increase key generation rate) with average photon nmbers 0 and v respectively. The transmittance/gain of the decoy state Q µ and its error rate E µ cold also be acqired directly from experiments. The experimental reslts are shown in Table. Note that the gain of vacm state is indeed very close to the dark cont rate, therefore the vacm state in or experiment is qite vacm. By taking statistical flctations into accont, we cold estimate the lower bond of Q and pper bond of e by plgging these experimental reslts into the Eq. 3 and 4 [2]. In or analysis of experimental data, we estimated e and Q very conservatively as within 0 standard deviations (i.e., a = 0), which promises a confidence interval for statistical flctations of

4 Table : Direct reslts from or experiment Para Vale Para Vale Para Vale Q µ E µ q 0.39 Qν Eν f (E) [3].22 Y Table 2: The lower bonds of Q, R and the pper bond of e.the vales are calclated from Eq. -4, taking statistical flctation into accont Para Vale Para Vale Q e R The experimental reslts listed in Table are the inpt for Eq. -4, whose otpt is a lower bond of the key generation rate, as shown in Table 2. Even with or very conservative estimation of e and Q, we got a lower bond for the key generation rate R = per plse, which means a final key length of abot = NR = 66 kbit. The finite size of data (05 M) gives a final secre key 66 kbits and introdces statistical flctations and therefore redces the key generation rate (per plse) below the fndamental limit of R perfect, which corresponds to infinite data size and infinite decoy state protocol. We remark that, as discssed in [2], here we consider only the flctations of the parameters, Q s and e s becase we believe they, being rather small nmbers, are the main sorce of statistical flctations. We do not consider, for example, the flctations in the nmber of different type of plses (vacm, single-photon) as sch flctations are negligible, in comparison. Notice that, even with or very conservative estimation for a confidence of , the lower bond of R is still roghly /4 of R perfect. This fact hints that it is not necessary, or rather, not economical, to se either very large data size or a lot of different decoy states. We performed nmerical simlation ranging µ from 0-, while no positive lower bond on R can be fond. This fact indicates that for or set-p, at a distance of 25 km, withot decoy states, we wold have been nable to prove the secrity of or protocol in an analogos manner. We provide the experimental demonstration of decoy state QKD over 25 km of Telecom fibers. Or reslt shows that, with rather simple modifications (by adding commercial variable optical attenators) to a commercial QKD system, decoy state QKD allows s to achieve mch better performance (in terms of sbstantially higher key generation rate and longer distance) than what is otherwise possible. Or experiment gives nconditional secrity against the most general attack allowed by qantm mechanics. 697 Moreover, it gives a rather high key generation rate. We expect that decoy state QKD will play a major role in ftre QKD systems in both fibers and open air. CONCSION Experimental weak + vacm decoy QKD system sing commercial QKD system has been demonstrated over a 25 km fiber with an nconditionally secre key rate of per plse. It is nconditionally secre against all types of attacks, inclding the PNS attack. We conclde that decoy plses improve the secrity and performance of weak plse QKD. However, sorces and detectors mst be calibrated accrately to avoid any artifacts that may compromise secrity. ACKNOWEDGMENT One of the researchers (AS) is gratefl to the Faclty of Science of IIM and Mimos Berhad for the facilities provided to him in the ndertakings of his PhD s degree programme. REFERENCES. Nielsen, M.A. and I.. Chang, Qantm Comptation and Qantm Information. Illstrated Edn., Cambridge niversity Press, K., ISBN: , pp: Gisin, N., G. Ribordy, W. Tittel and H. Zbinden, Qantm cryptography. Rev. Mod. Phys., 74: DOI: 0.03/RevModPhys Bennett, C.H. and G. Brassard, 984. Qantm cryptography: Pblic key distribtion and coin tossing. Proceeding of the IEEE International Conference on Compters, Systems and Signal Processing, (ICCSSP 84), Bangalore, IEEE, New York, pp: Wootters, W.K. and W.H. Zrek, 982. A single qantm cannot be cloned. Natre, 299: DOI: 0.038/299802a0 5. Shor, P.W. and J. Preskill, Simple proof of secrity of the BB84 qantm key distribtion protocol. Phys. Rev. ett., 85: DOI: 0.03/PhysRevett o, H.K. and H.F. Cha, 999. nconditional secrity of qantm key distribtion over arbitrarily long distances. Science, 283: DOI: 0.26/science Mayers, D., 200. nconditional secrity in qantm cryptography. J. ACM., 48:

5 8. Ekert, A.K., 99. Qantm cryptography based on Bell s theorem. Phys. Rev. ett., 67: DOI: 0.03/PhysRevett Gobby, C., Z.. Yan and A.J. Shields, Qantm key distribtion over 22 km of standard telecom fiber. Applied Phys. ett., 84: DOI: 0.063/ Mo, X. et al., Faraday-Michelson system for qantm cryptography. Optics ett., 30: DOI: 0.364/O Hwang, W.Y., Qantm key distribtion with high loss: Toward global secre commnication. Phys. Rev. ett., 9: DOI: 0.03/PhysRevett Ma, X., B. Qi, Y. Zhao and H.K. o, Practical decoy state for qantm key distribtion. March, Brassard, G. and. Salvail, 994. Advances in cryptology EROCRYPT 93. ectre Notes Compt. Sci., 765: ryptology/book/

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber arxiv:quant-ph/06068v2 2 Oct 2006 Yi Zhao, Bing Qi, Xiongfeng Ma, Hoi-Kwong Lo, Li Qian Center for Quantum

More information

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber arxiv:quant-ph/0601168 v2 12 Oct 2006 Yi Zhao, Bing Qi, Xiongfeng Ma, Hoi-Kwong Lo, Li Qian Center for Quantum

More information

Modelling by Differential Equations from Properties of Phenomenon to its Investigation

Modelling by Differential Equations from Properties of Phenomenon to its Investigation Modelling by Differential Eqations from Properties of Phenomenon to its Investigation V. Kleiza and O. Prvinis Kanas University of Technology, Lithania Abstract The Panevezys camps of Kanas University

More information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport

More information

LOS Component-Based Equal Gain Combining for Ricean Links in Uplink Massive MIMO

LOS Component-Based Equal Gain Combining for Ricean Links in Uplink Massive MIMO 016 Sixth International Conference on Instrmentation & Measrement Compter Commnication and Control LOS Component-Based Eqal Gain Combining for Ricean Lins in plin Massive MIMO Dian-W Ye College of Information

More information

Technical Note. ODiSI-B Sensor Strain Gage Factor Uncertainty

Technical Note. ODiSI-B Sensor Strain Gage Factor Uncertainty Technical Note EN-FY160 Revision November 30, 016 ODiSI-B Sensor Strain Gage Factor Uncertainty Abstract Lna has pdated or strain sensor calibration tool to spport NIST-traceable measrements, to compte

More information

Introduction to Quantum Information Processing

Introduction to Quantum Information Processing Introdction to Qantm Information Processing Lectre 5 Richard Cleve Overview of Lectre 5 Review of some introdctory material: qantm states, operations, and simple qantm circits Commnication tasks: one qbit

More information

Quantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto

Quantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto Quantum Hacking Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto 1 Outline Introduction Quantum Key Distribution (QKD) Practical QKD Quantum Hacking Fake-state & Time-shifted

More information

Study on the impulsive pressure of tank oscillating by force towards multiple degrees of freedom

Study on the impulsive pressure of tank oscillating by force towards multiple degrees of freedom EPJ Web of Conferences 80, 0034 (08) EFM 07 Stdy on the implsive pressre of tank oscillating by force towards mltiple degrees of freedom Shigeyki Hibi,* The ational Defense Academy, Department of Mechanical

More information

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance Optimal Control of a Heterogeneos Two Server System with Consideration for Power and Performance by Jiazheng Li A thesis presented to the University of Waterloo in flfilment of the thesis reqirement for

More information

UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL

UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL 8th International DAAAM Baltic Conference "INDUSTRIAL ENGINEERING - 19-1 April 01, Tallinn, Estonia UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL Põdra, P. & Laaneots, R. Abstract: Strength analysis is a

More information

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY DISTRIBUTION WITH ENTANGLED PHOTONS FOLLOWING THE PING- PONG CODING PROTOCOL Martin Ostermeyer, Nino Walenta University of Potsdam, Institute of Physics, Nonlinear

More information

BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits

BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits (*) Yoshihiro NAMBU*, Takaaki HATANAKA, and Kazuo NAKAMURA (*) Corresponding author: E-mail address: y-nambu@ah.jp.nec.com

More information

PHASE STEERING AND FOCUSING BEHAVIOR OF ULTRASOUND IN CEMENTITIOUS MATERIALS

PHASE STEERING AND FOCUSING BEHAVIOR OF ULTRASOUND IN CEMENTITIOUS MATERIALS PHAS STRING AND FOCUSING BHAVIOR OF ULTRASOUND IN CMNTITIOUS MATRIALS Shi-Chang Wooh and Lawrence Azar Department of Civil and nvironmental ngineering Massachsetts Institte of Technology Cambridge, MA

More information

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C Security of Quantum Cryptography using Photons for Quantum Key Distribution Karisa Daniels & Chris Marcellino Physics C191C Quantum Key Distribution QKD allows secure key distribution Keys are then used

More information

Joint Transfer of Energy and Information in a Two-hop Relay Channel

Joint Transfer of Energy and Information in a Two-hop Relay Channel Joint Transfer of Energy and Information in a Two-hop Relay Channel Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, and Mohammad Reza Aref Information Systems and Secrity Lab (ISSL Department of Electrical

More information

Design and Analyses of some 1-D Chaotic Generators for Secure Data

Design and Analyses of some 1-D Chaotic Generators for Secure Data SETIT 2009 5 th International Conference: Sciences of Electronic, Tenologies of Information and Telecommnications Mar 22-26, 2009 TUISIA Design and Analyses of some 1-D Chaotic Generators for Secre Data

More information

Replacement of Einstein s Relativity Theory with a New One: Why the Second Postulate is Superfluous?

Replacement of Einstein s Relativity Theory with a New One: Why the Second Postulate is Superfluous? International Jornal of Physics, 16, Vol. 4, No. 5, 14-145 Available online at http://pbs.sciepb.com/ijp/4/5/5 Science and Edcation Pblishing DOI:1.1691/ijp-4-5-5 Replacement of Einstein s Relativity Theory

More information

Simplified Identification Scheme for Structures on a Flexible Base

Simplified Identification Scheme for Structures on a Flexible Base Simplified Identification Scheme for Strctres on a Flexible Base L.M. Star California State University, Long Beach G. Mylonais University of Patras, Greece J.P. Stewart University of California, Los Angeles

More information

The spreading residue harmonic balance method for nonlinear vibration of an electrostatically actuated microbeam

The spreading residue harmonic balance method for nonlinear vibration of an electrostatically actuated microbeam J.L. Pan W.Y. Zh Nonlinear Sci. Lett. Vol.8 No. pp.- September The spreading reside harmonic balance method for nonlinear vibration of an electrostatically actated microbeam J. L. Pan W. Y. Zh * College

More information

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Cryptography. Marshall Roth March 9, 2007 Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and

More information

Trustworthiness of detectors in quantum key distribution with untrusted detectors

Trustworthiness of detectors in quantum key distribution with untrusted detectors Trustworthiness of detectors in quantum key distribution with untrusted detectors Bing Qi Quantum Information Science Group, Computational Sciences and Engineering Division, Oak Ridge National Laboratory,

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

Quantum Cryptography

Quantum Cryptography http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehighed Zhiyan Yan Department of Electrical

More information

An Investigation into Estimating Type B Degrees of Freedom

An Investigation into Estimating Type B Degrees of Freedom An Investigation into Estimating Type B Degrees of H. Castrp President, Integrated Sciences Grop Jne, 00 Backgrond The degrees of freedom associated with an ncertainty estimate qantifies the amont of information

More information

Realization of B92 QKD protocol using id3100 Clavis 2 system

Realization of B92 QKD protocol using id3100 Clavis 2 system Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and

More information

Development of Second Order Plus Time Delay (SOPTD) Model from Orthonormal Basis Filter (OBF) Model

Development of Second Order Plus Time Delay (SOPTD) Model from Orthonormal Basis Filter (OBF) Model Development of Second Order Pls Time Delay (SOPTD) Model from Orthonormal Basis Filter (OBF) Model Lemma D. Tfa*, M. Ramasamy*, Sachin C. Patwardhan **, M. Shhaimi* *Chemical Engineering Department, Universiti

More information

Experimental realization of quantum cryptography communication in free space

Experimental realization of quantum cryptography communication in free space Science in China Ser. G Physics, Mechanics & Astronomy 2005 Vol.48 No.2 237 246 237 Experimental realization of quantum cryptography communication in free space WANG Chuan 1, ZHANG Jingfu 1, WANG Pingxiao

More information

Simulation investigation of the Z-source NPC inverter

Simulation investigation of the Z-source NPC inverter octoral school of energy- and geo-technology Janary 5 20, 2007. Kressaare, Estonia Simlation investigation of the Z-sorce NPC inverter Ryszard Strzelecki, Natalia Strzelecka Gdynia Maritime University,

More information

Practical Quantum Key Distribution

Practical Quantum Key Distribution Leopold-Franzens-Universität Innsbruck Institut für Experimentalphysik Technikerstrasse 25 http://www.uibk.ac.at Practical Quantum Key Distribution Gregor Weihs Contents QKD Protocols Implementations of

More information

arxiv:quant-ph/ v4 14 May 2003

arxiv:quant-ph/ v4 14 May 2003 Phase-transition-like Behavior of Qantm Games arxiv:qant-ph/0111138v4 14 May 2003 Jiangfeng D Department of Modern Physics, University of Science and Technology of China, Hefei, 230027, People s Repblic

More information

Effects of Soil Spatial Variability on Bearing Capacity of Shallow Foundations

Effects of Soil Spatial Variability on Bearing Capacity of Shallow Foundations Geotechnical Safety and Risk V T. Schweckendiek et al. (Eds.) 2015 The athors and IOS Press. This article is pblished online with Open Access by IOS Press and distribted nder the terms of the Creative

More information

Intrinsic-Stabilization Uni-Directional Quantum Key Distribution. Between Beijing and Tianjin

Intrinsic-Stabilization Uni-Directional Quantum Key Distribution. Between Beijing and Tianjin Intrinsic-Stabilization Uni-Directional Quantum Key Distribution Between Beijing and Tianjin Xiao-fan Mo 1, Bing Zhu 1, 2, Zheng-fu Han 1*, You-zhen Gui 1, Guang-can Guo 1 1 Key Lab of Quantum Information

More information

Performance analysis of GTS allocation in Beacon Enabled IEEE

Performance analysis of GTS allocation in Beacon Enabled IEEE 1 Performance analysis of GTS allocation in Beacon Enabled IEEE 8.15.4 Pangn Park, Carlo Fischione, Karl Henrik Johansson Abstract Time-critical applications for wireless sensor networks (WSNs) are an

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 1 1D Schrödinger equation: Particle in an infinite box Consider a particle of mass m confined to an infinite one-dimensional well of width L. The potential is given by V (x) = V 0 x L/2, V (x) =

More information

Phase-merging enhanced harmonic generation free-electron laser

Phase-merging enhanced harmonic generation free-electron laser OPEN ACCESS Phase-merging enhanced harmonic generation free-electron laser To cite this article: Chao Feng et al 014 New J. Phys. 16 04301 View the article online for pdates and enhancements. Related content

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehigh.ed Zhiyan Yan Department of Electrical

More information

Sareban: Evaluation of Three Common Algorithms for Structure Active Control

Sareban: Evaluation of Three Common Algorithms for Structure Active Control Engineering, Technology & Applied Science Research Vol. 7, No. 3, 2017, 1638-1646 1638 Evalation of Three Common Algorithms for Strctre Active Control Mohammad Sareban Department of Civil Engineering Shahrood

More information

Frequency Estimation, Multiple Stationary Nonsinusoidal Resonances With Trend 1

Frequency Estimation, Multiple Stationary Nonsinusoidal Resonances With Trend 1 Freqency Estimation, Mltiple Stationary Nonsinsoidal Resonances With Trend 1 G. Larry Bretthorst Department of Chemistry, Washington University, St. Lois MO 6313 Abstract. In this paper, we address the

More information

Prediction of Transmission Distortion for Wireless Video Communication: Analysis

Prediction of Transmission Distortion for Wireless Video Communication: Analysis Prediction of Transmission Distortion for Wireless Video Commnication: Analysis Zhifeng Chen and Dapeng W Department of Electrical and Compter Engineering, University of Florida, Gainesville, Florida 326

More information

Simulation and Modeling of Packet Loss on α-stable VoIP Traffic

Simulation and Modeling of Packet Loss on α-stable VoIP Traffic Simlation and Modeling of Pacet Loss on α-stable VoIP Traffic HOMERO TORAL, 2, DENI TORRES, LEOPOLDO ESTRADA Department of Electrical Engineering Centro de Investigación y Estdios Avanzados del I.P.N -

More information

RESGen: Renewable Energy Scenario Generation Platform

RESGen: Renewable Energy Scenario Generation Platform 1 RESGen: Renewable Energy Scenario Generation Platform Emil B. Iversen, Pierre Pinson, Senior Member, IEEE, and Igor Ardin Abstract Space-time scenarios of renewable power generation are increasingly

More information

Quantum Cryptography and Security of Information Systems

Quantum Cryptography and Security of Information Systems Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty

More information

Evaluation of the Fiberglass-Reinforced Plastics Interfacial Behavior by using Ultrasonic Wave Propagation Method

Evaluation of the Fiberglass-Reinforced Plastics Interfacial Behavior by using Ultrasonic Wave Propagation Method 17th World Conference on Nondestrctive Testing, 5-8 Oct 008, Shanghai, China Evalation of the Fiberglass-Reinforced Plastics Interfacial Behavior by sing Ultrasonic Wave Propagation Method Jnjie CHANG

More information

International Journal of Physical and Mathematical Sciences journal homepage:

International Journal of Physical and Mathematical Sciences journal homepage: 64 International Jornal of Physical and Mathematical Sciences Vol 2, No 1 (2011) ISSN: 2010-1791 International Jornal of Physical and Mathematical Sciences jornal homepage: http://icoci.org/ijpms PRELIMINARY

More information

FOUNTAIN codes [3], [4] provide an efficient solution

FOUNTAIN codes [3], [4] provide an efficient solution Inactivation Decoding of LT and Raptor Codes: Analysis and Code Design Francisco Lázaro, Stdent Member, IEEE, Gianligi Liva, Senior Member, IEEE, Gerhard Bach, Fellow, IEEE arxiv:176.5814v1 [cs.it 19 Jn

More information

Designing of Virtual Experiments for the Physics Class

Designing of Virtual Experiments for the Physics Class Designing of Virtal Experiments for the Physics Class Marin Oprea, Cristina Miron Faclty of Physics, University of Bcharest, Bcharest-Magrele, Romania E-mail: opreamarin2007@yahoo.com Abstract Physics

More information

1. Tractable and Intractable Computational Problems So far in the course we have seen many problems that have polynomial-time solutions; that is, on

1. Tractable and Intractable Computational Problems So far in the course we have seen many problems that have polynomial-time solutions; that is, on . Tractable and Intractable Comptational Problems So far in the corse we have seen many problems that have polynomial-time soltions; that is, on a problem instance of size n, the rnning time T (n) = O(n

More information

Feedback of a Non-Truncated Erlang Queuing System with Balking and Retention of Reneged Customers

Feedback of a Non-Truncated Erlang Queuing System with Balking and Retention of Reneged Customers Applied and Comptational Mathematics 08; 7(): 40-49 http://www.sciencepblishinggrop.com/j/acm doi: 0.648/j.acm.08070. ISSN: 8-5605 (Print); ISSN: 8-56 (Online) Feedbac of a Non-Trncated Erlang Qeing System

More information

PREDICTABILITY OF SOLID STATE ZENER REFERENCES

PREDICTABILITY OF SOLID STATE ZENER REFERENCES PREDICTABILITY OF SOLID STATE ZENER REFERENCES David Deaver Flke Corporation PO Box 99 Everett, WA 986 45-446-6434 David.Deaver@Flke.com Abstract - With the advent of ISO/IEC 175 and the growth in laboratory

More information

BB84 and Noise Immune Quantum Key Distribution Protocols Simulation: An Approach Using Photonic Simulator

BB84 and Noise Immune Quantum Key Distribution Protocols Simulation: An Approach Using Photonic Simulator BB84 and Noise Immune Quantum Key Distribution Protocols Simulation: An Approach Using Photonic Simulator Abudhahir. Buhari, Zuriati. Ahmad Zukarnai, Shamala. K.Subramaniam, Hisham. Zainuddin, and Suhairi.

More information

Formules relatives aux probabilités qui dépendent de très grands nombers

Formules relatives aux probabilités qui dépendent de très grands nombers Formles relatives ax probabilités qi dépendent de très grands nombers M. Poisson Comptes rends II (836) pp. 603-63 In the most important applications of the theory of probabilities, the chances of events

More information

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum

More information

Ground-Satellite QKD Through Free Space. Steven Taylor

Ground-Satellite QKD Through Free Space. Steven Taylor Ground-Satellite QKD Through Free Space Steven Taylor Quantum Computation and Quantum Information, Spring 2014 Introduction: In this paper I will provide a brief introduction on what Quantum Key Distribution

More information

EXCITATION RATE COEFFICIENTS OF MOLYBDENUM ATOM AND IONS IN ASTROPHYSICAL PLASMA AS A FUNCTION OF ELECTRON TEMPERATURE

EXCITATION RATE COEFFICIENTS OF MOLYBDENUM ATOM AND IONS IN ASTROPHYSICAL PLASMA AS A FUNCTION OF ELECTRON TEMPERATURE EXCITATION RATE COEFFICIENTS OF MOLYBDENUM ATOM AND IONS IN ASTROPHYSICAL PLASMA AS A FUNCTION OF ELECTRON TEMPERATURE A.N. Jadhav Department of Electronics, Yeshwant Mahavidyalaya, Ned. Affiliated to

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 NOTE: This problem set is to be handed in to my mail slot (SMITH) located in the Clarendon Laboratory by 5:00 PM (noon) Tuesday, 24 May. 1 1D Schrödinger equation: Particle in an infinite box Consider

More information

Control of a Power Assisted Lifting Device

Control of a Power Assisted Lifting Device Proceedings of the RAAD 212 21th International Workshop on Robotics in Alpe-Adria-Danbe Region eptember 1-13, 212, Napoli, Italy Control of a Power Assisted Lifting Device Dimeas otios a, Kostompardis

More information

Mathematical Analysis of Nipah Virus Infections Using Optimal Control Theory

Mathematical Analysis of Nipah Virus Infections Using Optimal Control Theory Jornal of Applied Mathematics and Physics, 06, 4, 099- Pblished Online Jne 06 in SciRes. http://www.scirp.org/jornal/jamp http://dx.doi.org/0.436/jamp.06.464 Mathematical Analysis of Nipah Virs nfections

More information

Simulation of BB84 Quantum Key Distribution in depolarizing channel

Simulation of BB84 Quantum Key Distribution in depolarizing channel Simulation of BB84 Quantum Key Distribution in depolarizing channel Hui Qiao, Xiao-yu Chen * College of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, 310018, China xychen@mail.zjgsu.edu.cn

More information

Elements of Coordinate System Transformations

Elements of Coordinate System Transformations B Elements of Coordinate System Transformations Coordinate system transformation is a powerfl tool for solving many geometrical and kinematic problems that pertain to the design of gear ctting tools and

More information

Reflections on a mismatched transmission line Reflections.doc (4/1/00) Introduction The transmission line equations are given by

Reflections on a mismatched transmission line Reflections.doc (4/1/00) Introduction The transmission line equations are given by Reflections on a mismatched transmission line Reflections.doc (4/1/00) Introdction The transmission line eqations are given by, I z, t V z t l z t I z, t V z, t c z t (1) (2) Where, c is the per-nit-length

More information

Sources of Non Stationarity in the Semivariogram

Sources of Non Stationarity in the Semivariogram Sorces of Non Stationarity in the Semivariogram Migel A. Cba and Oy Leangthong Traditional ncertainty characterization techniqes sch as Simple Kriging or Seqential Gassian Simlation rely on stationary

More information

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks The Cryptanalysis of a New Pblic-Key Cryptosystem based on Modlar Knapsacks Yeow Meng Chee Antoine Jox National Compter Systems DMI-GRECC Center for Information Technology 45 re d Ulm 73 Science Park Drive,

More information

A New Approach to Direct Sequential Simulation that Accounts for the Proportional Effect: Direct Lognormal Simulation

A New Approach to Direct Sequential Simulation that Accounts for the Proportional Effect: Direct Lognormal Simulation A ew Approach to Direct eqential imlation that Acconts for the Proportional ffect: Direct ognormal imlation John Manchk, Oy eangthong and Clayton Detsch Department of Civil & nvironmental ngineering University

More information

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled.

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled. Jnction elements in network models. Classify by nmber of ports and examine the possible strctres that reslt. Using only one-port elements, no more than two elements can be assembled. Combining two two-ports

More information

Discussion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli

Discussion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli 1 Introdction Discssion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen Department of Economics, University of Copenhagen and CREATES,

More information

Ted Pedersen. Southern Methodist University. large sample assumptions implicit in traditional goodness

Ted Pedersen. Southern Methodist University. large sample assumptions implicit in traditional goodness Appears in the Proceedings of the Soth-Central SAS Users Grop Conference (SCSUG-96), Astin, TX, Oct 27-29, 1996 Fishing for Exactness Ted Pedersen Department of Compter Science & Engineering Sothern Methodist

More information

Quantum key distribution with 2-bit quantum codes

Quantum key distribution with 2-bit quantum codes Quantum key distribution with -bit quantum codes Xiang-Bin Wang Imai Quantum Computation and Information project, ERATO, Japan Sci. and Tech. Corp. Daini Hongo White Bldg. 0, 5-8-3, Hongo, Bunkyo, Tokyo

More information

Section 7.4: Integration of Rational Functions by Partial Fractions

Section 7.4: Integration of Rational Functions by Partial Fractions Section 7.4: Integration of Rational Fnctions by Partial Fractions This is abot as complicated as it gets. The Method of Partial Fractions Ecept for a few very special cases, crrently we have no way to

More information

1 JAXA Special Pblication JAXA-SP-1-E Small-scale trblence affects flow fields arond a blff body and therefore it governs characteristics of cross-sec

1 JAXA Special Pblication JAXA-SP-1-E Small-scale trblence affects flow fields arond a blff body and therefore it governs characteristics of cross-sec First International Symposim on Fltter and its Application, 1 11 IEXPERIMENTAL STUDY ON TURBULENCE PARTIAL SIMULATION FOR BLUFF BODY Hiroshi Katschi +1 and Hitoshi Yamada + +1 Yokohama National University,

More information

Single-photon quantum error rejection and correction with linear optics

Single-photon quantum error rejection and correction with linear optics Single-photon quantum error rejection and correction with linear optics Demetrios Kalamidas Institute for ltrafast Spectroscopy and Lasers, City College of the City niversity of New York, 138 Street &

More information

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lectre Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 Prepared by, Dr. Sbhend Kmar Rath, BPUT, Odisha. Tring Machine- Miscellany UNIT 2 TURING MACHINE

More information

Deterministic secure communications using two-mode squeezed states

Deterministic secure communications using two-mode squeezed states Deterministic secure communications using twomode squeezed states Alberto M. Marino* and C. R. Stroud, Jr. The Institute of Optics, University of Rochester, Rochester, New York 467, USA Received 5 May

More information

Discussion Papers Department of Economics University of Copenhagen

Discussion Papers Department of Economics University of Copenhagen Discssion Papers Department of Economics University of Copenhagen No. 10-06 Discssion of The Forward Search: Theory and Data Analysis, by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen,

More information

Stair Matrix and its Applications to Massive MIMO Uplink Data Detection

Stair Matrix and its Applications to Massive MIMO Uplink Data Detection 1 Stair Matrix and its Applications to Massive MIMO Uplink Data Detection Fan Jiang, Stdent Member, IEEE, Cheng Li, Senior Member, IEEE, Zijn Gong, Senior Member, IEEE, and Roy S, Stdent Member, IEEE Abstract

More information

Full Duplex in Massive MIMO Systems: Analysis and Feasibility

Full Duplex in Massive MIMO Systems: Analysis and Feasibility Fll Dplex in Massive MIMO Systems: Analysis and Feasibility Radwa Sltan Lingyang Song Karim G. Seddik andzhan Electrical and Compter Engineering Department University of oston TX USA School of Electrical

More information

A Necessary Condition for the Security of Coherent- One-Way Quantum Key Distribution Protocol

A Necessary Condition for the Security of Coherent- One-Way Quantum Key Distribution Protocol Appl Math Inf Sci 8, No 6, 769-773 (4) 769 Applied Mathematics & Information Sciences An International Journal http://dxdoiorg/785/amis/86 A Necessary Condition for the Security of Coherent- One-Way Quantum

More information

Uncertainty Analysis of the Thunder Scientific Model 1200 Two-Pressure Humidity Generator

Uncertainty Analysis of the Thunder Scientific Model 1200 Two-Pressure Humidity Generator Uncertainty Analysis of the hnder cientific Model 100 wo-ressre Hmidity Generator 1.0 Introdction escribed here is the generated hmidity ncertainty analysis, following the Gidelines of NI and NL International

More information

Pulses on a Struck String

Pulses on a Struck String 8.03 at ESG Spplemental Notes Plses on a Strck String These notes investigate specific eamples of transverse motion on a stretched string in cases where the string is at some time ndisplaced, bt with a

More information

Lewis number and curvature effects on sound generation by premixed flame annihilation

Lewis number and curvature effects on sound generation by premixed flame annihilation Center for Trblence Research Proceedings of the Smmer Program 2 28 Lewis nmber and crvatre effects on sond generation by premixed flame annihilation By M. Talei, M. J. Brear AND E. R. Hawkes A nmerical

More information

Electron Phase Slip in an Undulator with Dipole Field and BPM Errors

Electron Phase Slip in an Undulator with Dipole Field and BPM Errors CS-T--14 October 3, Electron Phase Slip in an Undlator with Dipole Field and BPM Errors Pal Emma SAC ABSTRACT A statistical analysis of a corrected electron trajectory throgh a planar ndlator is sed to

More information

Multi-Voltage Floorplan Design with Optimal Voltage Assignment

Multi-Voltage Floorplan Design with Optimal Voltage Assignment Mlti-Voltage Floorplan Design with Optimal Voltage Assignment ABSTRACT Qian Zaichen Department of CSE The Chinese University of Hong Kong Shatin,N.T., Hong Kong zcqian@cse.chk.ed.hk In this paper, we stdy

More information

Optimal search: a practical interpretation of information-driven sensor management

Optimal search: a practical interpretation of information-driven sensor management Optimal search: a practical interpretation of information-driven sensor management Fotios Katsilieris, Yvo Boers and Hans Driessen Thales Nederland B.V. Hengelo, the Netherlands Email: {Fotios.Katsilieris,

More information

Linear and Nonlinear Model Predictive Control of Quadruple Tank Process

Linear and Nonlinear Model Predictive Control of Quadruple Tank Process Linear and Nonlinear Model Predictive Control of Qadrple Tank Process P.Srinivasarao Research scholar Dr.M.G.R.University Chennai, India P.Sbbaiah, PhD. Prof of Dhanalaxmi college of Engineering Thambaram

More information

Setting The K Value And Polarization Mode Of The Delta Undulator

Setting The K Value And Polarization Mode Of The Delta Undulator LCLS-TN-4- Setting The Vale And Polarization Mode Of The Delta Undlator Zachary Wolf, Heinz-Dieter Nhn SLAC September 4, 04 Abstract This note provides the details for setting the longitdinal positions

More information

MEASUREMENT OF TURBULENCE STATISTICS USING HOT WIRE ANEMOMETRY

MEASUREMENT OF TURBULENCE STATISTICS USING HOT WIRE ANEMOMETRY MEASUREMENT OF TURBULENCE STATISTICS USING HOT WIRE ANEMOMETRY Mrgan Thangadrai +, Atl Kmar Son *, Mritynjay Singh +, Sbhendra *, Vinoth Kmar ++, Ram Pyare Singh +, Pradip K Chatterjee + + Thermal Engineering,

More information

arxiv:quant-ph/ v1 21 Apr 2004

arxiv:quant-ph/ v1 21 Apr 2004 Distribution of time-bin entangled qubits over 5 km of optical fiber I. Marcikic, H. de Riedmatten, W. Tittel, H. Zbinden, M. Legré and N. Gisin Group of Applied Physics-Optique, University of Geneva,

More information

Possible holographic universe, graviton rest mass, mass gap and dark energy

Possible holographic universe, graviton rest mass, mass gap and dark energy JJJPL report 0423-2 (2015); vixra:1508.0292 (2015). Possible holographic niverse, graviton rest mass, mass gap and dark energy Jae-Kwang Hwang JJJ Physics Laboratory, 1077 Beech Tree Lane, Brentwood, TN

More information

Uncertainties of measurement

Uncertainties of measurement Uncertainties of measrement Laboratory tas A temperatre sensor is connected as a voltage divider according to the schematic diagram on Fig.. The temperatre sensor is a thermistor type B5764K [] with nominal

More information

Workshop on Understanding and Evaluating Radioanalytical Measurement Uncertainty November 2007

Workshop on Understanding and Evaluating Radioanalytical Measurement Uncertainty November 2007 1833-3 Workshop on Understanding and Evalating Radioanalytical Measrement Uncertainty 5-16 November 007 Applied Statistics: Basic statistical terms and concepts Sabrina BARBIZZI APAT - Agenzia per la Protezione

More information

Experimental Study of an Impinging Round Jet

Experimental Study of an Impinging Round Jet Marie Crie ay Final Report : Experimental dy of an Impinging Rond Jet BOURDETTE Vincent Ph.D stdent at the Rovira i Virgili University (URV), Mechanical Engineering Department. Work carried ot dring a

More information

Nonparametric Identification and Robust H Controller Synthesis for a Rotational/Translational Actuator

Nonparametric Identification and Robust H Controller Synthesis for a Rotational/Translational Actuator Proceedings of the 6 IEEE International Conference on Control Applications Mnich, Germany, October 4-6, 6 WeB16 Nonparametric Identification and Robst H Controller Synthesis for a Rotational/Translational

More information

Active Flux Schemes for Advection Diffusion

Active Flux Schemes for Advection Diffusion AIAA Aviation - Jne, Dallas, TX nd AIAA Comptational Flid Dynamics Conference AIAA - Active Fl Schemes for Advection Diffsion Hiroaki Nishikawa National Institte of Aerospace, Hampton, VA 3, USA Downloaded

More information

A probabilistic quantum key transfer protocol

A probabilistic quantum key transfer protocol SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 013; 6:1389 1395 Published online 13 March 013 in Wiley Online Library (wileyonlinelibrary.com)..736 RESEARCH ARTICLE Abhishek Parakh* Nebraska

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

Applying Fuzzy Set Approach into Achieving Quality Improvement for Qualitative Quality Response

Applying Fuzzy Set Approach into Achieving Quality Improvement for Qualitative Quality Response Proceedings of the 007 WSES International Conference on Compter Engineering and pplications, Gold Coast, stralia, Janary 17-19, 007 5 pplying Fzzy Set pproach into chieving Qality Improvement for Qalitative

More information

Step-Size Bounds Analysis of the Generalized Multidelay Adaptive Filter

Step-Size Bounds Analysis of the Generalized Multidelay Adaptive Filter WCE 007 Jly - 4 007 London UK Step-Size onds Analysis of the Generalized Mltidelay Adaptive Filter Jnghsi Lee and Hs Chang Hang Abstract In this paper we analyze the bonds of the fixed common step-size

More information

Intersubband Transitions in InAs/AlSb Quantum Wells

Intersubband Transitions in InAs/AlSb Quantum Wells Mat. Res. Soc. Symp. Proc. Vol. 7 3 Materials Research Society M9..1 Intersbband Transitions in InAs/AlSb Qantm Wells J. Li, 1) K. Koloolov, 1) C. Z. Ning, 1) D. C. Larraber, ) G. A. Khodaparast, ) J.

More information