首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 11 毫秒
1.
A scheme is presented to implement bidirectional controlled quantum teleportation (QT) by using a five-qubit entangled state as a quantum channel, where Alice may transmit an arbitrary single qubit state called qubit A to Bob and at the same time, Bob may also transmit an arbitrary single qubit state called qubit B to Alice via the control of the supervisor Charlie. Based on our channel, we explicitly show how the bidirectional controlled QT protocol works. By using this bidirectional controlled teleportation, espcially, a bidirectional controlled quantum secure direct communication (QSDC) protocol, i.e., the so-called controlled quantum dialogue, is further investigated. Under the situation of insuring the security of the quantum channel, Alice (Bob) encodes a secret message directly on a sequence of qubit states and transmits them to Bob (Alice) supervised by Charlie. Especially, the qubits carrying the secret message do not need to be transmitted in quantum channel. At last, we show this QSDC scheme may be determinate and secure.  相似文献   

2.
研究了真六量子比特纠缠态在双向量子受控远程态制备中的一个新应用。在协议中,远程的两方在遥远的第三方控制下,能够同时地、确定地交换他们的量子态。如果没有控制者的允许,这种交换是不能成功的,而作为原始的非局域量子资源的一个真六量子比特纠缠态是预先被三方共享的。  相似文献   

3.
Using a partially entangled EPR-type state as quantum channel, we investigate quantum teleportation (QT) of a qubit state in noisy environments by solving the master equation in the Lindblad form. We analyze the different influence for the partially entangled EPR-type channel and the EPR channel on the fidelity and the average fidelity of the QT process in the presence of Pauli noises. It is found that the fidelity depends on the type and the strength of the noise, and the initial state to be teleported. Moreover, the EPR channel is more robust than the partially entangled EPR-type channel against the influence of the noises. It is also found that the partially entangled EPR-type channel enables the average fidelity as a function of the decoherence parameter $kt$ to decay with different velocities for different Pauli noises.  相似文献   

4.
In the present paper, a novel bidirectional quantum teleportation protocol is proposed. By using entanglement swapping technique, two GHZ states are shared as a quantum channel between Alice and Bob as legitimate users. In this scheme, based on controlled-not operation, single-qubit measurement, and appropriate unitary operations, two users can simultaneously transmit a pure EPR state to each other, While, in the previous protocols, the users can just teleport a single-qubit state to each other via more than four-qubit state. Therefore, the proposed scheme is economical compared with previous protocols.  相似文献   

5.
融合了双向隐形传态、受控隐形传态、概率隐形传态及多参数测量思想,提出了一个新的双向受控概率隐形传态协议。在该协议中,以五粒子非最大纠缠团簇态为信道,发送者采用多参数通用测量,接收者引入辅助粒子,并在控制者的允许下,利用测量信息施行适当酉变换,就能以一定概率同时交换他们的量子态。分析了成功概率(经典耗费)与量子纠缠参数及测量参数间的依赖关系,说明了该协议可以根据量子信道的参数来调整多参数测量的参数,达到调节成功概率或经典耗费,满足真实世界中多种不同需求的目的。此外,该协议是经典双向受控隐形传态的推广。  相似文献   

6.
We constructed a class of non-maximally entangled mixed states (Adhikari et al. in Quantum Inf Comput 10:0398, 2010) and extensively studied their entanglement properties and also their usefulness as teleportation channels. In this article, we have revisited our constructed state and have studied it from three different perspectives. Since every entangled state is associated with a witness operator, we have found a suitable entanglement as well as teleportation witness operator for our non-maximally entangled mixed states. We considered the noisy channel’s effects on our constructed states to see how much it affects the states’ capacities as teleportation channels. For this purpose, we have mainly focussed on amplitude damping channel. A comparative study on concurrence and quantum discord of our constructed state of Adhikari et al. (2010) has also been carried out here.  相似文献   

7.
Zhang  Da  Zha  Xin-wei  Duan  Ya-jun  Yang  Yu-quan 《Quantum Information Processing》2016,15(5):2169-2179

In this paper, we presented a controlled bidirectional remote state preparation scheme which used the six-qubit entangled state as quantum channel. In our scheme, Alice and Bob can prepare simultaneously an arbitrary single-qubit state in each other’s place with the control of the supervisor Charlie. The success probability for our scheme reaches unit. Furthermore, we analyze the expression of quantum channel for controlled bidirectional remote state preparation. Finally, we discuss the security of our scheme, the detailed security analysis shows that the supervisor Charlie’s control can greatly improve the security of our scheme.

  相似文献   

8.
In this paper, we present a scheme for Hierarchically controlled remote preparation of an arbitrary single-qubit state via a four-qubit \(|\chi \rangle \) state as the quantum channel. In this scheme, a sender wishes to help three agents to remotely prepare a quantum state, respectively. The three agents are divided into two grades, that is, an agent is in the upper grade and other two agents are in the lower grade. It is shown that the agent of the upper grade only needs the assistance of any one of the other two agents for recovering the sender’s original state, while an agent of the lower grade needs the collaboration of all the other two agents. In other words, the agents of two grades have different authorities to recover sender’s original state.  相似文献   

9.
10.
11.
We study use of non-maximally entangled states (NME) in quantum teleportation (QT) of single qubit. We find that if NME states are written in the form ${| E \rangle =\sum_{j,k} {E_{jk} | j \rangle | k \rangle}}$ , where (j, k) = 0 and 1, and maximally entangled Bell-basis is used in measurement by the sender, the ??Minimum Assured Fidelity?? (the minimum value of fidelity for all possible information states) for QT is 2C/(1?+?C), where C is the concurrence of ${| E \rangle }$ given by C?=?2|det (E)| and E is the matrix defined by the coefficients E jk . We also find the average of fidelity over various results of Bell-state measurement and its minimum value over all possible information states and discuss it for some special cases. We also show that, to evaluate quality of imperfect QT, minimum assured fidelity is a better measure than concurrence or minimum average fidelity.  相似文献   

12.
This paper investigates the contribution of formants and prosodic features such as pitch and energy in Arabic speech recognition under real-life conditions. Our speech recognition system based on Hidden Markov Models (HMMs) is implemented using the HTK Toolkit. The front-end of the system combines features based on conventional Mel-Frequency Cepstral Coefficient (MFFC), prosodic information and formants. The experiments are performed on the ARADIGIT corpus which is a database of Arabic spoken words. The obtained results show that the resulting multivariate feature vectors, in noisy environment, lead to a significant improvement, up to 27%, in word accuracy relative the word accuracy obtained from the state-of-the-art MFCC-based system.  相似文献   

13.
Performance of deterministic learning in noisy environments   总被引:1,自引:0,他引:1  
In this paper, based on the previous results of deterministic learning, we investigate the performance of deterministic learning in noisy environments. Two different types of noises arising in practical implementations are considered: the system noise and the measurement noise. By employing the convergence results of a class of perturbed linear time-varying (LTV) systems, the effects of these noises upon the learning performance are revealed. It is shown that while there is little effect upon the learning speed, noises have much influence on the learning accuracy. Compared with system noise, the effects of measurement noise appear to be more complicated. Under the noisy environments, robustification technique on the learning algorithm is required to avoid parameter drift. Furthermore, it is shown that additive system noise can be used to enhance the generalization ability of the RBF networks. Simulation studies are included to illustrate the results.  相似文献   

14.
We present a scheme for joint remote implementation of an arbitrary single-qubit operation following some ideas in one-way quantum computation. All the senders share the information of implemented quantum operation and perform corresponding single-qubit measurements according to their information of implemented operation. An arbitrary single-qubit operation can be implemented upon the remote receiver’s quantum system if the receiver cooperates with all the senders. Moreover, we study the protocol of multiparty joint remote implementation of an arbitrary single-qubit operation with many senders by using a multiparticle entangled state as the quantum channel.  相似文献   

15.
A new application of the genuinely entangled five-qubit state introduced by Brown et al. (J Phys A 38(5), 1119–1131, 2005) is investigated for quantum information splitting (QIS) of an arbitrary three-qubit state. We demonstrate that such a genuine five-qubit entangled state and a Bell-state can be used to realize the deterministic QIS of an arbitrary three-qubit state by performing the Bell-state measurements and single qubit measurement. The presented protocol is showed to be secure against certain eavesdropping attacks.  相似文献   

16.
In systems where agents are required to interact with a partially known and dynamic world, sensors can be used to obtain knowledge about the environment. However, sensors may be unreliable, that is, they may deliver wrong information (due, e.g., to hardware or software malfunctioning) and, consequently, they may cause agents to take wrong decisions, which is a scenario that should be avoided. The paper considers the problem of reasoning in noisy environments in a setting where no (either certain or probabilistic) data is available in advance about the reliability of sensors. Therefore, assuming that each agent is equipped with a background theory encoding its general knowledge about the world, a concept of detecting an anomaly perceived in sensor data and the related concept of agent recovering to a coherent status of information are defined. In this context, the complexities of various anomaly detection and anomaly recovery problems are studied. Finally, rewriting algorithms are proposed that transform recovery problems into equivalent inference problems under answer set semantics, thereby making them effectively realizable on top of available answer set solvers.  相似文献   

17.
This paper proposes a new speech detection method by recurrent neural fuzzy network in variable noise-level environments. The detection method uses wavelet energy (WE) and zero crossing rate (ZCR) as detection parameters. The WE is a new and robust parameter, and is derived using wavelet transformation. It can reduce the influences of different types of noise at different levels. With the inclusion of ZCR, we can robustly and effectively detect speech from noise with only two parameters. For detector design, a singleton-type recurrent fuzzy neural network (SRNFN) is proposed. The SRNFN is constructed by recurrent fuzzy if-then rules with fuzzy singletons in the consequences, and the recurrent property makes them suitable for processing speech patterns with temporal characteristics. The learning ability of SRNFN helps avoid the need of empirically determining a threshold in normal detection algorithms. Experiments with different types of noises and various signal-to noise ratios (SNRs) are performed. The results show that using the WE and ZCR parameters-based SRNFN, a pretty good performance is achieved. Comparisons with another robust detection method, the refined time–frequency-based method, and other detectors have also verified the performance of the proposed method.  相似文献   

18.
Noise estimation and detection algorithms must adapt to a changing environment quickly, so they use a least mean square (LMS) filter. However, there is a downside. An LMS filter is very low, and it consequently lowers speech recognition rates. In order to overcome such a weak point, we propose a method to establish a robust speech recognition clustering model for noisy environments. Since this proposed method allows the cancelation of noise with an average estimator least mean square (AELMS) filter in a noisy environment, a robust speech recognition clustering model can be established. With the AELMS filter, which can preserve source features of speech and decrease the degradation of speech information, noise in a contaminated speech signal gets canceled, and a Gaussian state model is clustered as a method to make noise more robust. By composing a Gaussian clustering model, which is a robust speech recognition clustering model, in a noisy environment, recognition performance was evaluated. The study shows that the signal-to-noise ratio of speech, which was improved by canceling environment noise that kept changing, was enhanced by 2.8 dB on average, and recognition rate improved by 4.1 %.  相似文献   

19.
Quantum Information Processing - We propose a deterministic remote state preparation (RSP) scheme for preparing an arbitrary (including pure and mixed) qubit, where a partially entangled state and...  相似文献   

20.
Detection of multiple ellipses in noisy environments is a basic yet challenging task in many vision related problems. The key area of difficulty is on distinguishing the pixels pertaining to each target in the presence of noise. To tackle with the issue, we propose a hierarchical approach which is motivated by the fact that any segment of an ellipse can identify itself in ellipse reconstruction. First, we find all the neat edges without any branches, followed by an ellipse fitting on each of them. Second, some target candidates are estimated based on the neat edges, by a proposed grouping strategy. Finally, the targets are detected based on the candidates, by a proposed selective competitive algorithm to distinguish the true pixels of each target. A real application of the proposed method is illustrated in addition to some other demonstrative experiments.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号