A method of direction of arrival (DOA) estimation of coherent sources is proposed, which is based on arbitrary plane arrays. After constructing the mathematical model of coherent sources, virtual array transformation ...A method of direction of arrival (DOA) estimation of coherent sources is proposed, which is based on arbitrary plane arrays. After constructing the mathematical model of coherent sources, virtual array transformation and MUSIC algorithm are used to realize the azimuth estimation of coherent sources, which improved the DOA estimation performance greatly. According to the computer simulation, its validity is confirmed.展开更多
Recently, a novel kind of quantum key distribution called the round-robin differential phase-shift (RRDPS) protocol was proposed, which bounds the amount of leakage without monitoring signal disturbance. The protoco...Recently, a novel kind of quantum key distribution called the round-robin differential phase-shift (RRDPS) protocol was proposed, which bounds the amount of leakage without monitoring signal disturbance. The protocol can be implemented by a weak coherent source. The security of this protocol with a simply characterized source has been proved. The application of a common phase shift can improve the secret key rate of the protocol. In practice, the randomized phase is discrete and the secret key rate is deviated from the continuous case. In this study, we analyze security of the RRDPS protocol with discrete-phase-randomized coherent state source and bound the secret key rate. We fix the length of each packet at 32 and 64, then simulate the secret key rates of the RRDPS protocol with discrete-phase randomization and continuous-phase randomization. Our simulation results show that the performance of the discrete-phase randomization case is close to the continuous counterpart with only a small number of discrete phases. The research is practically valuable for experimental implementation.展开更多
文摘A method of direction of arrival (DOA) estimation of coherent sources is proposed, which is based on arbitrary plane arrays. After constructing the mathematical model of coherent sources, virtual array transformation and MUSIC algorithm are used to realize the azimuth estimation of coherent sources, which improved the DOA estimation performance greatly. According to the computer simulation, its validity is confirmed.
基金Supported by the National Basic Research Program of China under Grant No 2013CB338002the National Natural Science Foundation of China under Grant Nos 11304397 and 61505261
文摘Recently, a novel kind of quantum key distribution called the round-robin differential phase-shift (RRDPS) protocol was proposed, which bounds the amount of leakage without monitoring signal disturbance. The protocol can be implemented by a weak coherent source. The security of this protocol with a simply characterized source has been proved. The application of a common phase shift can improve the secret key rate of the protocol. In practice, the randomized phase is discrete and the secret key rate is deviated from the continuous case. In this study, we analyze security of the RRDPS protocol with discrete-phase-randomized coherent state source and bound the secret key rate. We fix the length of each packet at 32 and 64, then simulate the secret key rates of the RRDPS protocol with discrete-phase randomization and continuous-phase randomization. Our simulation results show that the performance of the discrete-phase randomization case is close to the continuous counterpart with only a small number of discrete phases. The research is practically valuable for experimental implementation.