نتایج جستجو برای: key word bpnts
تعداد نتایج: 651132 فیلتر نتایج به سال:
We devise a simple modification that essentially doubles the efficiency of a well-known quantum key distribution scheme proposed by Bennett and Brassard (BB84). Our scheme assigns significantly different probabilities for the different polarization bases during both transmission and reception to reduce the fraction of discarded data. The actual probabilities used in the scheme are announced in ...
We introduce a generalization of Hadamard and the controlled not gates which together with the generalized Bell states, enable us to introduce new methods for quantum key distribution (QKD) of d-level quantum states (qudits). In case of eavesdropping, an error rate of d−1 d is introduced in Bob’s received qudits, so that for large d, comparison of only a tiny fraction of received qudits with th...
Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but...
We introduce Cro36WSD, a freely-available medium-sized lexical sample for Croatian word sense disambiguation (WSD). Cro36WSD comprises 36 words: 12 adjectives, 12 nouns, and 12 verbs, balanced across both frequency bands and polysemy levels. We adopt the multi-label annotation scheme in the hope of lessening the drawbacks of discrete sense inventories and obtaining more realistic annotations fr...
This study was designed to examine factors associated with literal interpretations of homonyms. Participants were 212 second graders, ages 7;0-8;11, who listened to a story containing 16 key words. The key words were homonymous words ('pseudo-homonyms'), nonsense words, or familiar words used accurately. While listening to the story, children selected an illustration of each key word. Later, th...
در این تحقیق با استفاده از نظریه تابع چگالی، پارامترهای الکتریکی، ساختاری، کوانتومی و تشدید مغناطیس هسته ای(nmr) مربوط به برهم کنش گاز n2o بر روی وضعیت اتم های b و p حالت های خالص و آلایش یافته با si، ga و siga نانولوله آرمچیر(4 و4) بور فسفید(bpnts) مورد بررسی قرار گرفته است. برای این منظور هفت مدل جذبی را بر روی سطح خارجی نانو لوله بور فسفید در نظر گرفته و سپس تمام ساختارهای مورد مطالعه را با ...
Pervasive secure computing paradigms in the publicly interconnected world pose new challenges in the architecture of future general-purpose processors. These paradigms include safer communications, storage and execution. Basic security functions like confidentiality, data integrity and user authentication can be achieved by symmetric-key, hash and public-key cryptography algorithms, respectivel...
When the 4-state or the 6-state protocol of quantum cryptography is carried out on a noisy quantum channel, then the raw key has to be processed to reduce the information of a spy down to an arbitrarily low value, providing Alice and Bob with a secret key. In principle, quantum algorithms as well as classical algorithms can be used for this processing. A natural question is: Up to which error r...
This article describes the implementation of Word Sense Disambiguation system that participated in the SemEval-2007 multilingual Chinese-English lexical sample task. We adopted a supervised learning approach with Maximum Entropy classifier. The features used were neighboring words and their part-of-speech, as well as single words in the context, and other syntactic features based on shallow par...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید