Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 11 de 11
Filter
Add more filters










Publication year range
1.
J Appl Stat ; 49(1): 44-63, 2022.
Article in English | MEDLINE | ID: mdl-35707800

ABSTRACT

Combination of multiple biomarkers to improve diagnostic accuracy is meaningful for practitioners and clinicians, and are attractive to lots of researchers. Nowadays, with development of modern techniques, functional markers such as curves or images, play an important role in diagnosis. There exists rich literature developing combination methods for continuous scalar markers. Unfortunately, only sporadic works have studied how functional markers affect diagnosis in the literature. Moreover, no publication can be found to do combination of multiple functional markers to improve the diagnostic accuracy. It is impossible to apply scalar combination methods to the multiple functional markers directly because of infinite dimensionality of functional markers. In this article, we propose a one-dimension scalar feature motivated by square loss distance, as an alternative of the original functional curve in the sense that, it can retain information to the most extent. The square loss distance is defined as the function of projection scores generated from functional principal component decomposition. Then existing variety of scalar combination methods can be applied to scalar features of functional markers after dimension reduction to improve the diagnostic accuracy. Area under the receiver operating characteristic curve and Youden index are used to assess performances of various methods in numerical studies. We also analyzed the high- or low- hospital admissions due to respiratory diseases between 2010 and 2017 in Hong Kong by combining weather conditions and media information, which are regarded as functional markers. Finally, we provide an R function for convenient application.

2.
Materials (Basel) ; 13(23)2020 Nov 30.
Article in English | MEDLINE | ID: mdl-33266326

ABSTRACT

A novel structure aluminosilicate molecular sieve, named BUCT-3, was prepared by dynamic hydrothermal synthesis, and the critical factor to obtain the new structure is using an active silicon and aluminum source, aluminosilica perhydrate hydrogel. Meanwhile, only high content of O-O bonds can ensure the pure phase of BUCT-3. Through the characterization of x-ray powder diffraction (XRD), Fourier transform infrared spectra (FTIR), scanning electron microscopy (SEM), and so on, some structure and morphology information of BUCT-3 molecular sieves as well as the special silicon and aluminum source was obtained. It's worth noticing that the O-O bonds of reactants can be reserved in the products, and thus, help us to get a new structure with cell parameters a = 8.9645 Å, b = 15.2727 Å, c = 11.3907 Å, α = 90°, ß = 93.858°, γ = 90°. The crystal system is monoclinic. Though the thermostability of BUCT-3 is not satisfactory, its potential application derived from O-O bonds cannot be neglected.

3.
Opt Lett ; 45(22): 6334-6337, 2020 Nov 15.
Article in English | MEDLINE | ID: mdl-33186983

ABSTRACT

The source flaw associated with the basis vector in the reference-frame-independent measurement-device-independent quantum key distribution (RFI-MDI-QKD) has not been systematically studied. As a result, it is often assumed that bit error is equal to phase error, which is not theoretically rigorous. Here, we propose a postprocessing method to estimate the phase error rate from the discarded mismatched-basis statistics, where the qubit source does not need to be characterized in detail. The source flaw in the basis vector of the RFI-MDI-QKD protocol can thus be corrected using this method. The numerical simulation results clearly demonstrate that the RFI-MDI-QKD protocol with uncharacterized sources is also insensitive to the misalignment of the reference frame.

4.
Sci Rep ; 8(1): 5728, 2018 Apr 10.
Article in English | MEDLINE | ID: mdl-29636492

ABSTRACT

Measurement-device-independent entanglement witness (MDI-EW) plays an important role for detecting entanglement with untrusted measurement device. We present a double blinding-attack on a quantum secret sharing (QSS) protocol based on GHZ state. Using the MDI-EW method, we propose a QSS protocol against all detector side-channels. We allow source flaws in practical QSS system, so that Charlie can securely distribute a key between the two agents Alice and Bob over long distances. Our protocol provides condition on the extracted key rate for the secret against both external eavesdropper and arbitrary dishonest participants. A tight bound for collective attacks can provide good bounds on the practical QSS with source flaws. Then we show through numerical simulations that using single-photon source a secure QSS over 136 km can be achieved.

5.
Sci Rep ; 7(1): 449, 2017 03 27.
Article in English | MEDLINE | ID: mdl-28348408

ABSTRACT

Recently, to bridge the gap between security of Measurement-device-independent quantum key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector-device-independent QKD (DDI-QKD), has been independently proposed by several groups and has attracted great interest. A higher key rate is obtained, since a single photon bell state measurement (BSM) setup is applied to DDI-QKD. Subsequently, Qi has proposed two attacks for this protocol. However, the first attack, in which Bob's BSM setup is assumed to be completely a "black box", is easily prevented by using some additional monitoring devices or by specifically characterizing the BSM. The second attack, which combines the blinding attack and the detector wavelength-dependent efficiency, is not explicitly discussed, and its feasibility is not experimentally confirmed. Here, we show that the second attack is not technically viable because of an intrinsically wavelength-dependent property of a realistic beam splitter, which is an essential component in DDI-QKD. Moreover, we propose a feasible attack that combines a well-known attack-detector blinding attack with intrinsic imperfections of single-photon detectors. The experimental measurement and proof-of-principle test results confirm that our attack can allow Eve to get a copy of quantum keys without being detected and that it is feasible with current technology.

6.
Opt Lett ; 38(21): 4494-7, 2013 Nov 01.
Article in English | MEDLINE | ID: mdl-24177128

ABSTRACT

We present a robust single-photon quantum secret sharing (QSS) scheme with phase encoding in three-party implementations and a design way of more parties over a 50 km single-mode fiber network using a single QSS protocol. This scheme automatically provides perfect compensation for birefringence. A high visibility of 99.4% is obtained over three hours in visibility and stability measurements without any system adjustments, showing good potential for practical systems. Furthermore, polarization-insensitive phase modulators are realized using this system.

7.
Opt Express ; 21(14): 16663-9, 2013 Jul 15.
Article in English | MEDLINE | ID: mdl-23938518

ABSTRACT

We present a robust single photon circular quantum secret sharing (QSS) scheme with phase encoding over 50 km single mode fiber network using a circular QSS protocol. Our scheme can automatically provide a perfect compensation of birefringence and remain stable for a long time. A high visibility of 99.3% is obtained. Furthermore, our scheme realizes a polarization insensitive phase modulators. The visibility of this system can be maintained perpetually without any adjustment to the system every time we test the system.


Subject(s)
Algorithms , Computer Communication Networks/instrumentation , Computer Security/instrumentation , Fiber Optic Technology/instrumentation , Refractometry/instrumentation , Signal Processing, Computer-Assisted/instrumentation , Telecommunications/instrumentation , Equipment Design , Equipment Failure Analysis , Quantum Theory
8.
J Opt Soc Am A Opt Image Sci Vis ; 30(1): 124-7, 2013 Jan 01.
Article in English | MEDLINE | ID: mdl-23456008

ABSTRACT

We propose an approach to generate true random number sequences based on the discretized encoding of the time interval between photons. The method is simple and efficient, and can produce a highly random sequence several times longer than that of other methods based on threshold or parity selection, without the need for hashing. A proof-of-principle experiment has been performed, showing that the system could be easily integrated and applied to quantum cryptography and other fields.

9.
Opt Lett ; 35(8): 1203-5, 2010 Apr 15.
Article in English | MEDLINE | ID: mdl-20410967

ABSTRACT

A robust two-way quantum key distribution system based on phase encoding is demonstrated in 50 km and 100 km commercial communication fiber. The system can automatically compensate for birefringence effects and remain stable over 23 h. A low quantum bit error rate and high visibility are obtained. Furthermore, the storage fiber is unnecessary and train of pulses is only needed in the test with 100 km fiber.

10.
Opt Lett ; 32(6): 698-700, 2007 Mar 15.
Article in English | MEDLINE | ID: mdl-17308606

ABSTRACT

A one-way quantum key distribution scheme based on intrinsically stable Faraday-mirror-type Michelson interferometers with four-port polarizing beam splitters has been demonstrated that can compensate for birefringence effects automatically. The encoding is performed with phase modulators, but decoding is accomplished through measurement of the polarization state of Bob's photons. An extinction ratio of about 30 dB was maintained for several hours over 50 km of fiber at 1310 nm without any adjustment to the setup, which shows its good potential for practical systems.

11.
Appl Opt ; 44(36): 7760-3, 2005 Dec 20.
Article in English | MEDLINE | ID: mdl-16381524

ABSTRACT

We report the demonstration of a new type of true random number generator based on the random distribution of the time interval between photons from a single-photon-like source. The experimental setup is simple and robust against mechanical and temperature disturbances. With improved detector resolution and efficiency, the random number bit rate could be increased by more than an order of magnitude to satisfy practical requirements.

SELECTION OF CITATIONS
SEARCH DETAIL
...