首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
We consider probabilistic theories in which the most elementary system, a two-dimensional system, contains one bit of information. The bit is assumed to be contained in any complete set of mutually complementary measurements. The requirement of invariance of the information under a continuous change of the set of mutually complementary measurements uniquely singles out a measure of information, which is quadratic in probabilities. The assumption which gives the same scaling of the number of degrees of freedom with the dimension as in quantum theory follows essentially from the assumption that all physical states of a higher dimensional system are those and only those from which one can post-select physical states of two-dimensional systems. The requirement that no more than one bit of information (as quantified by the quadratic measure) is contained in all possible post-selected two-dimensional systems is equivalent to the positivity of density operator in quantum theory. This article is dedicated to Pekka Lahti on the occasion of his 60th birthday.  相似文献   

2.
Recently, the integration of cooperation with coding has proven to be a very useful technique to enhance relay system performance. Relay systems based on low-density parity-check (LDPC) codes have the potential to approach the theoretical information limits very closely. However, LDPC codes have a disadvantage in that the encoding complexity is high. To solve this problem, serially concatenated low-density generator matrix (SCLDGM) codes are attracting attention owing to their low encoding complexity. However, the performance of SCLDGM coded relaying has not been investigated. In this paper, we apply SCLDGM codes to relay channel with the motivation of lowering the encoding complexity. Since SCLDGM codes are concatenated codes, we cannot use the same method as LDPC coded relaying. We propose a new relaying system and three cooperation protocols suited for SCLDGM codes. Computer simulation results show that the bit error rate (BER) performance of the proposed system is equal to that of conventional LDPC coded relaying system.  相似文献   

3.
We introduce a quantum key distribution protocol using mean multi-kings’ problem. Using this protocol, a sender can share a bit sequence as a secret key with receivers. We consider a relation between information gain by an eavesdropper and disturbance contained in legitimate users’ information. In BB84 protocol, such relation is known as the so-called information disturbance theorem. We focus on a setting that the sender and two receivers try to share bit sequences and the eavesdropper tries to extract information by interacting legitimate users’ systems and an ancilla system. We derive trade-off inequalities between distinguishability of quantum states corresponding to the bit sequence for the eavesdropper and error probability of the bit sequence shared with the legitimate users. Our inequalities show that eavesdropper’s extracting information regarding the secret keys inevitably induces disturbing the states and increasing the error probability.  相似文献   

4.
Security of a quantum secret sharing of quantum state protocol proposed by Guo et al. [Chin. Phys. Lett. 25 (2008) 16] is reexamined. It is shown that an eavesdropper can obtain some of the transmitted secret information by monitoring the classical channel or the entire secret by intercepting the quantum states, and moreover, the eavesdropper can even maliciously replace the secret message with an arbitrary message without being detected. Finally, the deep reasons why an eavesdropper can attack this protocol are discussed and the modified protocol is presented to amend the security loopholes.  相似文献   

5.
Decoy state quantum key distribution (QKD), being capable of beating PNS attack and being unconditionally secure has become attractive recently. However, in many QKD systems, disturbances of transmission channel make the quantum bit error rate (QBER) increase, which limits both security distance and key bit rate of real-world decoy state QKD systems. We demonstrate the two-intensity decoy QKD with a one-way Faraday- Michelson phase modulation system, which is free of channel disturbance and keeps an interference fringe visibility (99%) long period, over a 120 km single mode optical fibre in telecom (1550nm) wavelength. This is the longest distance fibre decoy state QKD system based on the two-intensity protocol.  相似文献   

6.
肖海林  欧阳缮  聂在平 《物理学报》2009,58(6):3685-3691
量子通信是一个量子密钥分发过程,目前采用的通信技术严重制约了量子密钥分发的比特率.将多输入多输出(MIMO)技术应用于量子通信系统,提高量子密钥分发的比特率,促进量子通信向高速大容量发展.然而,量子场本身不可避免地存在量子噪声约束容量的增长,限制了可利用空间资源,即空间自由度.文中采用光子场的量子化和满足Schrdinger方程条件的电磁场波动方程推导出MIMO量子信道的空间自由度上限,为开发稳健的MIMO量子通信空时处理算法和优化设计高性能MIMO量子通信系统提供理论基础和技术支持. 关键词: 多输入多输出 量子密钥分发 Schrdinger方程 光子场的量子化  相似文献   

7.
基于最少中继节点约束的量子VoIP路由优化策略   总被引:1,自引:0,他引:1       下载免费PDF全文
聂敏  刘广腾  杨光  裴昌幸 《物理学报》2016,65(12):120302-120302
量子信息的传输过程中,由于拥塞、链路故障等原因,导致数据分组在路由器排队,产生时延、丢包.为了保证量子Vo IP系统的性能,本文提出了基于最少中继节点约束的路由优化策略.采用基于纠缠交换的中继技术,通过优先选择最少中继节点的量子信道,实现多用户量子Vo IP通信.理论分析和仿真结果表明,当链路出现故障和拥塞时,基于M/M/m型排队系统,采用本策略,当设定量子比特的误码率为0.2,共用信道数目从4增加到8时,量子网络的呼损率由0.25下降到0.024,量子网络的最大吞吐量由64 kbps增加到132 kbps.当设定共用信道数目为4,控制量子比特的误码率从0.3到0.1时,可使量子网络最大吞吐量从41 kbps增加到140 kbps.由此可见,本策略能够极大地提高量子Vo IP网络的性能.  相似文献   

8.
We study quantum information properties of a seven-level system realized by a particle in a onedimensional square-well trap and discuss the features of encodings of seven-level systems in a form of three-qubit or qubit–qutrit systems. We use the three-qubit encoding of the system in order to investigate the subadditivity and strong subadditivity conditions for the particle’s thermal state. We employ the qubit–qutrit encoding to suggest a single qudit algorithm for calculating the parity of a bit string. The results obtained indicate on the potential resource of multilevel systems for realization of quantum information processing.  相似文献   

9.
冯海冉  李鹏  岳现房 《物理学报》2019,68(5):50201-050201
量子速度极限(QSL)的实用性研究关系到更高效量子技术的实现,研究不同分子体系中QSL问题可为基于分子体系的量子信息技术提供理论支持.采用代数方法讨论了不同的初始态对QSL度量方式的影响,研究发现初始态和分子参数均会影响QSL的度量方式,对分子体系无论Fock态还是相干态,量子Fisher信息度量方式优于Wigner-Yanase信息度量方式.广义几何QSL度量更适合描述强相干态下的分子动力学演化.  相似文献   

10.
At present longitudinal magnetic recording systems are the basis of all low cost high-density information storage systems. During the recent past the data density stored on rigid disk media which is the higher density format have increased at the rate of 60% per annum compound. However, very recently due to the introduction of new advanced GMR spin-valve heads this rate of advance has increased to 100% per annum in laboratory demonstrations. Hence, it is pertinent at this time to enquire as to where the fundamental physical limitations of longitudinal magnetic recording may lie. In this context there are two principle areas of interest: the first of these is limitations to data rate. These are concerned with the fundamental physics of the maximum rate at which a magnetic moment may reverse from one direction to the other. The theoretical calculation of these limits is complex and not well understood but the limits of our understanding will be reviewed in this paper. Secondly, and of principle concern is the limit to the density at which information can be stored in a magnetic thin film. This latter limitation is based around the signal to noise ratio and also the question of the stability of increasingly small written bits. Signal to noise considerations are extremely complex and derive from factors such as the shape of bits and cross-talk between neighbouring bits or even neighbouring tracks. In this article the fundamental origins of noise will be reviewed in terms of the basic physics that gives rise to variation in transition shapes. Cross-talk and cross-track interference will not be discussed as these are generally addressed through issues associated with the resolution of the servo-mechanism that positions the head above a track and is not associated with the fundamental physics of the medium itself. Thermal stability of a bit of information is of critical importance particularly as media is made ever thinner and will form a major aspect of the discussion in this work. Finally, possible material physics solutions to some of these limitations will be presented in terms of measurable parameters which to some limited degree may be controlled by process conditions.  相似文献   

11.
递变能量X射线高动态融合图像的灰度表征算法研究   总被引:1,自引:0,他引:1       下载免费PDF全文
陈平  阴晓刚  潘晋孝  韩焱 《物理学报》2014,63(20):208703-208703
递变能量X射线成像,通过获取并融合图像序列实现动态范围扩展,完整再现了检测对象的结构信息.但是在融合过程中往往是以质量优化为目的,忽略了与实际高动态成像的灰度映射正确性,从而不能保证图像信息与实际物体信息的物理匹配性.因此,本文提出了递变能量X射线高动态融合图像的灰度表征算法.该算法首先以标钢质准楔形试块为对象,将不同电压下的融合图像作为输入数据,直接采集高动态成像图像作为输出数据,利用神经网络方法构建递变能量成像的灰度表征模型.同时针对不同于训练对象的材料,对灰度表征模型进行修正,实现了不同材质的灰度正确表征,进而实现了低动态图像序列融合图像的正确表征.以12和16 bit成像系统进行实验,结果表明,利用12 bit探测器通过变电压采集图像序列,经图像融合、灰度映射及灰度校正,达到了16 bit探测器的成像效果,且满足灰度对应关系,有效拓展了成像器件的动态范围.  相似文献   

12.
By using large signal analysis for dispersive optical fiber, the FM-AM conversion with respect to binary intensity modulated PCM systems including second order dispersion term is discussed. The modified expression for power penalty has been derived and its impact on laser linewidth and bit rate has been investigated. For power penalty less than 0.5 dB, the plots between bit rate and transmission distance are plotted. It is seen that the transmission distance increases with decrease in linewidth over significant bit rates. The transmission distance with first order dispersion term for 300 MHz linewidth is approximately 800km. With proper first order dispersion compensation, i.e., with second order dispersion only, the transmission distance can be enhanced to 10 8 km for this linewidth. The linewidth requirements for systems with different bit rates and transmission distances are also calculated and discussed. Further, it is seen that by including the second-order dispersion term, the bit rate and transmission distance decreases. For higher linewidths, this decrease in bit rate and transmission distance is very less and vice versa. For 300 MHz linewidth, the decrease in transmission distance is just 30 km, and for 30 MHz linewidth, the decrease is approximately 600 km over significant bit rates.  相似文献   

13.
We show that three fundamental information-theoretic constraints—the impossibility of superluminal information transfer between two physical systems by performing measurements on one of them, the impossibility of broadcasting the information contained in an unknown physical state, and the impossibility of unconditionally secure bit commitment—suffice to entail that the observables and state space of a physical theory are quantum-mechanical. We demonstrate the converse derivation in part, and consider the implications of alternative answers to a remaining open question about nonlocality and bit commitment.  相似文献   

14.

We have demonstrated that light is confined in a single mode near a very small defect (such as an impurity atom) embedded in photonic crystals by coherent control using a dark line that is a spectrum singularity leading to the complete quenching of emission. In this demonstration, we have clarified the strong confinement and a very short response time, as compared with the widely used tunable PBG method. These features are useful for keeping the memory in a two-state quantum system such as a quantum bit (qubit) and for processing quantum information.

  相似文献   

15.
K. Cui  M.S. Leeson  E.L. Hines   《Optics Communications》2008,281(12):3245-3253
This paper introduces an incorporated spectral-amplitude coding (SAC) optical code-division multiple-access (OCDMA) scheme. One novel class of optical signature codes based on combinatorial designs is employed with M-ary pulse-position modulation (PPM) signaling to improve the system performance beyond the interference limit. A union upper bound on the bit error rate (BER) is derived and the performance characteristics are then discussed with a variety of system parameters. Furthermore, fuzzy logic (FL) control is proposed to provide tolerance of different degrees of reliability in multirate transmission and to achieve distinct service differentiation for multimedia applications. It is shown that the proposed system can effectively suppress noise effects and offer improved adaptation capabilities for multi-quality network requirements in comparison with systems without optimization.  相似文献   

16.
大气信道中的大气湍流是影响无线激光通信系统性能的主要因素之一, 其引起的强度闪烁效应会对接收信号的提取和还原造成很大干扰。基于Gamma-Gamma概率分布的大气湍流信道统计模型, 研究了利用副载波相移键控(PSK)强度调制技术的大气光通信系统的误码特性; 推导了副载波二进制相移键控(BPSK)及开关键控(OOK)两种调制模式下的系统误码率表达式; 对在一定条件下的大气光通信系统, 比较了副载波BPSK和OOK两种调制模式的误码特性; 分析了链路特征、接收口径尺寸、通信波长和天顶角等因素对系统误码率的影响。结果表明, 增大接收孔径和通信波长都能有效地降低系统误码率, 而天顶角的增大则会使系统误码率增加, 副载波BPSK调制模式的误码特性要优于OOK调制模式的误码特性。  相似文献   

17.
无线激光通信系统弱光干扰技术   总被引:3,自引:0,他引:3  
为了探求对无线激光通信最有效、最实用的干扰方式,针对目前应用范围最广泛的强度调制/直接检测无线激光通信系统,采用理论分析、仿真和实验相结合的方法详细地研究了无线激光通信系统的弱光干扰的原理和条件,验证了弱光干扰的可行性,发现其干扰现象主要表现为误码率升高。同时,研究了干扰光的不同重复频率、功率和占空比对采用不同通信体制、速率、发射功率等设计的无线激光通信系统产生的不同的干扰原理和现象。发现了同步通信与异步通信因其不同的时钟体制造成的弱光干扰差异,同步通信主要发生“比特干扰”和 “时钟恢复干扰”,异步通信系统主要发生“起始位干扰”和“数据位干扰”。由于异步通信中帧结构和编码都较为简单,与同步通信相比更易受到干扰光的影响,受到干扰的程度更为严重。  相似文献   

18.
CCD摄像机测量噪声与处理的研究   总被引:1,自引:0,他引:1  
吴震  李志杨 《应用光学》1993,14(4):37-41
估算在10位A/D转换精度时CCD摄像机测量的极限精度。详细分析多种噪声对测量精度的影响以及噪声的表现特征,最后对如何消除测量时直角的影响提出了实验数据。  相似文献   

19.
Haken recently applied the slaving principle to decompose expressions for information, information gain and efficiency of self-organizing systems into two parts. The first part in each case depends on the order parameter while the second on the slaved modes. Close to the instability points the latter contribution can be ignored. In this paper we elaborate on the formulas given by Haken and find exact expressions which are analytical in the entire domain of the values of control parameters. We also find their asymptotic limits in the immediate proximity of the instability point and far away from it. Our results provide a direct way of relating information, information gain and efficiency of nonequilibrium critical systems to their control parameters.  相似文献   

20.
In the past decades several theoretical Maxwell's demon models have been proposed to exhibit effects such as refrigerating,doing work at the cost of information,and some experiments have been carried out to realize these effects.We propose a model with a two-level demon,information represented by a sequence of bits,and two heat reservoirs.The reservoir that the demon is interacting with depends on the bit.When the temperature difference between the two heat reservoirs is large enough,the information can be erased.On the other hand,when the information is pure enough,heat transfer from one reservoir to the other can happen,resulting in the effect of refrigeration.Genuine examples of such a system are discussed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号