نتایج جستجو برای: کد alice
تعداد نتایج: 12588 فیلتر نتایج به سال:
We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and timebin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We...
Beauty is produced much more abundantly at LHC energies compared to RHIC energies. The increase in production, coupled with the beauty large mass, makes it an interesting observable for the physic of the ALICE experiment[1]. Semi-electronic decay of beauty mesons offers a powerful tool to study beauty production in ALICE, attributed to its high tracking resolution (ITS, TPC, TRD) and vertexing ...
We consider a setup in which the channel from Alice to Bob is less noisy than the channel from Eve to Bob. We show that there exist encoding and decoding which accomplish error correction and authentication simultaneously; that is, Bob is able to correctly decode a message coming from Alice and reject a message coming from Eve with high probability. The system does not require any secret key sh...
The protocol is, however, susceptible to a man-in-the-middle attack [3], in which the adversary (Eve) intercepts a message from Alice and creates a new message to send to Bob (Fig.1). Eve performs the exchange with Alice using the original message, while Bob performs the exchange using the newly created message. At the final stage, Eve has the original message in decrypted form, while Bob has t...
Computer-based instructional interventions are increasingly popular in classroom curricula. For students to benefit from these interventions, it is vital that they are properly trained to use the software. We investigate the effects of using active versus passive training techniques to familiarize users with a graphical programming environment, Alice. We examine the impact using measures of kno...
Bell’s theorem [1, 2] basically states that local hidden variable theory cannot predict the correlations produced by quantum mechanics. It is based on the assumption that Alice and Bob can choose measurements from a measurement set containing more than one element. We establish a new paradigm that departs from Bell’s paradigm by assuming that there are no choices for Alice and Bob and that the ...
“I don’t know what you mean by ‘glory’” Alice said. Humpty Dumpty smiled contemptuously. “Of course you don’t — till I tell you. I meant ‘there’s a nice knock-down argument for you!’” “But glory doesn’t mean ‘a nice knock-down argument,’” Alice objected. “When I use a word,” Humpty Dumpty said, in a rather scornful tone, “it means just what I choose it to mean — neither more nor less.” “The que...
The ALICE experiment is devoted to the study of quark-gluon plasma (QGP) created in heavy-ion collisions at CERN LHC. experimental setup allows for many different observables that contributed characterization properties QGP. went through a major upgrade during LS2 profit from increased LHC luminosity and improve tracking resolution. An additional planned LS3. A new experiment, 3, was proposed a...
Qing-yu Cai Wuhan Institute of Physics and Mathematics, The Chinese Academy of Sciences, Wuhan, 430071, People’s Republic of China Bostr .. om and Felbinger [1] have presented a ping-pong communication protocol which allows the information transferred in a deterministic secure manner. The security of this ping-pong protocol is based on an entangled pair of qubits. And the proof of the case of e...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید