• Approximation of the Masses and other properties of Unknown Hyperons in Standard Model(1709.09207)

Nov. 11, 2019 hep-ph
In particle physics, study of the symmetry and its breaking play very important role in order to get useful information about the nature. The classification and arrangements of subatomic particles is also necessary to study particle physics. Particles which are building blocks of nature are quarks, gluons and leptons. Baryons and Mesons composed of quarks were arranged by Gell-Mann and Okubo in their well-known Eight-Fold way up to SU(3) symmetry. Standard model of particles is composed of these particles. Particles in SU(4) also make some beautiful patron. These make some multiplets. but all the baryons with spin JP= 3/2+ in these multiplets have not been observed till date. In this paper the SU(4) multiplets have been organized and studied in an easy and new way. As a result we obtained some clues about the masses and other characteristics of the unknown hyperons. These approximations about the characteristics of the unidentified baryons have been recorded in this article. Mass formula for the baryon SU(4) multiplets have been obtained.
• Getting Virtualized Wireless Sensor Networks IaaS Ready for PaaS(1709.06486)

Sept. 19, 2017 cs.NI
With the recent advances in sensor hardware and software, architectures for virtualized Wireless Sensor Networks (vWSNs) are now emerging. Through node- and network-level virtualization, vWSNs can be offered as Infrastructure-as-a-Service (IaaS) which can aid in realizing the true potential of Internet-of-Things (IoT). Cloud computing offers elastic provisioning of large-scale infrastructures to multiple concurrent users where Platform-as-a-Service (PaaS) interacts with IaaS in order to efficiently host and execute applications over these infrastructures. Amalgamating IoT with cloud computing potentially allows rapid application and service provisioning in an efficient, scalable and robust manner. However, interactions between vWSNs and PaaS are largely an unexplored area. Indeed, existing vWSN IaaS are not yet ready for PaaS. This paper proposes a vWSN IaaS architecture which is ready for interactions with PaaS. The proposed architecture is based on our previous works and is rooted in the fundamental differences between traditional IaaS and vWSN IaaS. We built a prototype using Java Sunspot as the WSN tool kit and made early performance measurements.
• Quantum-limited measurements of optical signals from a geostationary satellite(1608.03511)

The measurement of quantum signals that traveled through long distances is of fundamental and technological interest. We present quantum-limited coherent measurements of optical signals, sent from a satellite in geostationary Earth orbit to an optical ground station. We bound the excess noise that the quantum states could have acquired after having propagated 38600 km through Earth's gravitational potential as well as its turbulent atmosphere. Our results indicate that quantum communication is feasible in principle in such a scenario, highlighting the possibility of a global quantum key distribution network for secure communication.
• Attacks on practical quantum key distribution systems (and how to prevent them)(1512.07990)

Sept. 17, 2016 quant-ph
With the emergence of an information society, the idea of protecting sensitive data is steadily gaining importance. Conventional encryption methods may not be sufficient to guarantee data protection in the future. Quantum key distribution (QKD) is an emerging technology that exploits fundamental physical properties to guarantee perfect security in theory. However, it is not easy to ensure in practice that the implementations of QKD systems are exactly in line with the theoretical specifications. Such theory-practice deviations can open loopholes and compromise the security. Several of such loopholes have been discovered and investigated in the last decade. These activities have motivated the proposal and implementation of appropriate countermeasures, thereby preventing future attacks and enhancing the practical security of QKD. This article introduces the so-called field of quantum hacking by summarizing a variety of attacks and their prevention mechanisms.
• Evading Vacuum Noise: Wigner Projections or Husimi Samples?(1604.07692)

April 26, 2016 quant-ph
The accuracy in determining the quantum state of a system depends on the type of measurement performed. Homodyne and heterodyne detection are the two main schemes in continuous-variable quantum information. The former leads to a direct reconstruction of the Wigner function of the state, whereas the latter samples its Husimi $Q$~function. We experimentally demonstrate that heterodyne detection outperforms homodyne detection for almost all Gaussian states, the details of which depend on the squeezing strength and thermal noise.
• Free-space quantum signatures using heterodyne detection(1604.03708)

April 13, 2016 quant-ph
Digital signatures guarantee the authorship of electronic communications. Currently used "classical" signature schemes rely on unproven computational assumptions for security, while quantum signatures rely only on the laws of quantum mechanics. Previous quantum signature schemes have used unambiguous quantum measurements. Such measurements, however, sometimes give no result, reducing the efficiency of the protocol. Here, we instead use heterodyne detection, which always gives a result, although there is always some uncertainty. We experimentally demonstrate feasibility in a real environment by distributing signature states through a noisy 1.6km free-space channel. Our results show that continuous-variable heterodyne detection improves the signature rate for this type of scheme and therefore represents an interesting direction in the search for practical quantum signature schemes.
• A Trust Model for Data Sharing in Smart Cities(1603.07524)

March 24, 2016 cs.CY
The data generated by the devices and existing infrastructure in the Internet of Things (IoT) should be shared among applications. However, data sharing in the IoT can only reach its full potential when multiple participants contribute their data, for example when people are able to use their smartphone sensors for this purpose. We believe that each step, from sensing the data to the actionable knowledge, requires trust-enabled mechanisms to facilitate data exchange, such as data perception trust, trustworthy data mining, and reasoning with trust related policies. The absence of trust could affect the acceptance of sharing data in smart cities. In this study, we focus on data usage transparency and accountability and propose a trust model for data sharing in smart cities, including system architecture for trust-based data sharing, data semantic and abstraction models, and a mechanism to enhance transparency and accountability for data usage. We apply semantic technology and defeasible reasoning with trust data usage policies. We built a prototype based on an air pollution monitoring use case and utilized it to evaluate the performance of our solution.
• Wireless Sensor Network Virtualization: A Survey(1503.01676)

Feb. 8, 2016 cs.NI
Wireless Sensor Networks (WSNs) are the key components of the emerging Internet-of-Things (IoT) paradigm. They are now ubiquitous and used in a plurality of application domains. WSNs are still domain specific and usually deployed to support a specific application. However, as WSN nodes are becoming more and more powerful, it is getting more and more pertinent to research how multiple applications could share a very same WSN infrastructure. Virtualization is a technology that can potentially enable this sharing. This paper is a survey on WSN virtualization. It provides a comprehensive review of the state-of-the-art and an in-depth discussion of the research issues. We introduce the basics of WSN virtualization and motivate its pertinence with carefully selected scenarios. Existing works are presented in detail and critically evaluated using a set of requirements derived from the scenarios. The pertinent research projects are also reviewed. Several research issues are also discussed with hints on how they could be tackled.
• Wireless Sensor Network Virtualization: Early Architecture and Research Perspectives(1501.07135)

Jan. 28, 2015 cs.NI
Wireless sensor networks (WSNs) have become pervasive and are used in many applications and services. Usually the deployments of WSNs are task oriented and domain specific; thereby precluding re-use when other applications and services are contemplated. This inevitably leads to the proliferation of redundant WSN deployments. Virtualization is a technology that can aid in tackling this issue, as it enables the sharing of resources/infrastructure by multiple independent entities. In this paper we critically review the state of the art and propose a novel architecture for WSN virtualization. The proposed architecture has four layers (physical layer, virtual sensor layer, virtual sensor access layer and overlay layer) and relies on the constrained application protocol (CoAP). We illustrate its potential by using it in a scenario where a single WSN is shared by multiple applications; one of which is a fire monitoring application. We present the proof-of-concept prototype we have built along with the performance measurements, and discuss future research directions.
• A Data Annotation Architecture for Semantic Applications in Virtualized Wireless Sensor Networks(1501.07139)

Jan. 28, 2015 cs.NI
Wireless Sensor Networks (WSNs) have become very popular and are being used in many application domains (e.g. smart cities, security, gaming and agriculture). Virtualized WSNs allow the same WSN to be shared by multiple applications. Semantic applications are situation-aware and can potentially play a critical role in virtualized WSNs. However, provisioning them in such settings remains a challenge. The key reason is that semantic applications provisioning mandates data annotation. Unfortunately it is no easy task to annotate data collected in virtualized WSNs. This paper proposes a data annotation architecture for semantic applications in virtualized heterogeneous WSNs. The architecture uses overlays as the cornerstone, and we have built a prototype in the cloud environment using Google App Engine. The early performance measurements are also presented.
• Risk analysis of Trojan-horse attacks on practical quantum key distribution systems(1408.0492)

Dec. 19, 2014 quant-ph
An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.
• Trojan-horse attacks threaten the security of practical quantum cryptography(1406.5813)

June 23, 2014 quant-ph
A quantum key distribution system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the back-reflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack. We show it in operation against the quantum cryptosystem Clavis2 from ID~Quantique, as a proof-of-principle. With just a few back-reflected photons, Eve discerns Bob's secret basis choice, and thus the raw key bit in the Scarani-Ac\'in-Ribordy-Gisin 2004 protocol, with higher than 90% probability. This would clearly breach the security of the cryptosystem. Unfortunately in Clavis2 Eve's bright pulses have a side effect of causing high level of afterpulsing in Bob's single-photon detectors, resulting in a high quantum bit error rate that effectively protects this system from our attack. However, in a Clavis2-like system equipped with detectors with less-noisy but realistic characteristics, an attack strategy with positive leakage of the key would exist. We confirm this by a numerical simulation. Both the eavesdropping setup and strategy can be generalized to attack most of the current QKD systems, especially if they lack proper safeguards. We also propose countermeasures to prevent such attacks.
• Atmospheric continuous-variable quantum communication(1406.1321)

June 5, 2014 quant-ph
We present a quantum communication experiment conducted over a point-to-point free-space link of 1.6 km in urban conditions. We study atmospheric influences on the capability of the link to act as a continuous-variable (CV) quantum channel. Continuous polarization states (that contain the signal encoding as well as a local oscillator in the same spatial mode) are prepared and sent over the link in a polarization multiplexed setting. Both signal and local oscillator undergo the same atmospheric fluctuations. These are intrinsically auto-compensated which removes detrimental influences on the interferometric visibility. At the receiver, we measure the Q-function and interpret the data using the framework of effective entanglement. We compare different state amplitudes and alphabets (two-state and four-state) and determine their optimal working points with respect to the distributed effective entanglement. Based on the high entanglement transmission rates achieved, our system indicates the high potential of atmospheric links in the field of CV QKD.
• Optimal working points for continuous-variable quantum channels(1301.6051)

Feb. 4, 2013 quant-ph
The most important ability of a quantum channel is to preserve the quantum properties of transmitted quantum states. We experimentally demonstrate a continuous-variable system for efficient benchmarking of quantum channels. We probe the tested quantum channels for a wide range of experimental parameters such as amplitude, phase noise and channel lengths up to 40 km. The data is analyzed using the framework of effective entanglement. We subsequently are able to deduce an optimal point of operation for each quantum channel with respect to the rate of distributed entanglement. This procedure is a promising candidate for benchmarking quantum nodes and individual links in large quantum networks of different physical implementations.
• A full-custom ASIC design of a 8-bit, 25 MHz, Pipeline ADC using 0.35 um CMOS technology(1011.4157)

July 24, 2012 cs.AR
The purpose of this project was to design and implement a pipeline Analog-to-Digital Converter using 0.35um CMOS technology. Initial requirements of a 25-MHz conversion rate and 8-bits of resolution where the only given ones. Although additional secondary goals such as low power consumption and small area were stated. The architecture is based on a 1.5 bit per stage structure utilizing digital correction for each stage [12]. A differential switched capacitor circuit consisting of a cascade gm-C op-amp with 200MHz ft is used for sampling and amplification in each stage [12]. Differential dynamic comparators are used to implement the decision levels required for the 1.5-b per stage structure. Correction of the pipeline is accomplished by using digital correction circuit consist of D-latches and full-adders. Area and Power consumption of whole design was 0.24mm2 and 35mW respectively. The maximum sample rate at which the converter gave an adequate output was 33MHz.
• Variance minimization variational Monte Carlo method(physics/0701223)

We present a variational Monte Carlo (VMC) method that works equally well for the ground and the excited states of a quantum system. The method is based on the minimization of the variance of energy, as opposed to the energy itself in standard methods. As a test, it is applied to the investigation of the universal spectrum at the van der Waals length scale for two identical Bose atoms in a symmetric harmonic trap, with results compared to the basically exact results obtained from a multiscale quantum-defect theory.
• Bose atoms in a trap: a variational Monte Carlo formulation for the universal behavior at the Van der Waals length scale(cond-mat/0603056)

March 2, 2006 cond-mat.stat-mech
We present a variational Monte Carlo (VMC) formulation for the universal equations of state at the Van der Waals length scale [B. Gao, J. Phys. B \textbf{37}, L227 (2004)] for $N$ Bose atoms in a trap. The theory illustrates both how such equations of state can be computed exactly, and the existence and the importance of long-range atom-atom correlation under strong confinement. Explicit numerical results are presented for N=3 and 5, and used to provide a quantitative understanding of the shape-dependent confinement correction that is important for few atoms under strong confinement.