![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Comparison of Fourier-transformed and Wavelet-transformed EXAFS
Local structural properties of compounds are often critical to understand the physical and chemical properties of the systems. Extended X-ray absorption fine structure (EXAFS) is a unique tool to describe loca...
-
Article
Establishing Voltage Operation Standards for 70 kV Transmission Voltage
Preparations for grid integration of large-scale renewable energy sources, such as wind and solar farms, are being made worldwide. These sources require 154 kV transmission networks. However, such integration ...
-
Article
Open AccessMutual entity authentication of quantum key distribution network system using authentication qubits
Entity authentication is crucial for ensuring secure quantum communication as it helps confirm the identity of participants before transmitting any confidential information. We propose a practical entity authe...
-
Article
Open AccessQuantum authentication method based on key-controlled maximally mixed quantum state encryption
Quantum authentication is a fundamental first step that ensures secure quantum communication. Although various quantum authentication methods have been proposed recently, their implementation efficiency is lim...
-
Article
Design and application of laser scanning strategy for machining deep surface grooves with a continuous-wave fiber laser
A laser scanning strategy for fabricating deep surface grooves using a continuous-wave fiber laser was investigated in this study. Because the low productivity of short-pulsed-wave lasers limits their applicat...
-
Article
Open AccessDispersion and stability mechanism of Pt nanoparticles on transition-metal oxides
The heterogeneous catalysts of Pt/transition-metal oxides are typically synthesized through calcination at 500 °C, and Pt nanoparticles are uniformly and highly dispersed when hydrogen peroxide (H2O2) is applied ...
-
Article
Innovative square cogging to enhance void closure efficiency during forging of continuously cast round blooms
The use of continuously cast round blooms as a substitute for cast ingots has attracted wide interest because it can improve yields and reduce operating costs through continuous operation. However, central voi...
-
Article
Open Access2×N twin-field quantum key distribution network configuration based on polarization, wavelength, and time division multiplexing
Develo** quantum key distribution (QKD) has been recently directed toward distance extension and network expansion for real-world secure communications. Considering a recent report on a quantum communication...
-
Article
Open AccessHole do** effect of MoS2 via electron capture of He+ ion irradiation
Beyond the general purpose of noble gas ion sputtering, which is to achieve functional defect engineering of two-dimensional (2D) materials, we herein report another positive effect of low-energy (100 eV) He+ ion...
-
Article
Open AccessAuthor Correction: Quantum enhanced multiple-phase estimation with multi-mode N00N states
-
Article
Open AccessQuantum enhanced multiple-phase estimation with multi-mode N00N states
Quantum metrology can achieve enhanced sensitivity for estimating unknown parameters beyond the standard quantum limit. Recently, multiple-phase estimation exploiting quantum resources has attracted intensive ...
-
Article
Measurement-device-independent mutual quantum entity authentication
Quantum entity authentication (QEA) based on security guaranteed by the laws of physics is the first and most important step for secure communication under the threat of a quantum adversary. QEA theoretically ...
-
Article
Characterizing Bell state analyzer using weak coherent pulses
Bell state analyzer (BSA) is one of the most crucial apparatuses in photonic quantum information processing. While linear optics provide a practical way to implement BSA, it provides unavoidable errors when in...
-
Article
Advanced disk-forging process in producing heavy defect-free disk using counteracting dies
During the conventional disk-forging, the upper die repeatedly compresses materials on the flat stationary base. As the strain distributions of the forged disk are non-uniform owing to friction and uneven temp...
-
Article
Prokaryotic DNA methylation and its functional roles
DNA methylation is known as a universal mechanism of epigenetic regulation in all kingdoms of life. Particularly, given that prokaryotes lack key elements such as histones and nucleosomes that can structurally...
-
Article
Open AccessDecoupling the metal insulator transition and crystal field effects of VO2
VO2 is a highly correlated electron system which has a metal-to-insulator transition (MIT) with a dramatic change of conductivity accompanied by a first-order structural phase transition (SPT) near room temperatu...
-
Article
Manufacturing of a corrugated double-layered tube for the high-performance compact heat exchanger
Compact heat exchangers are expected to be one of the solutions for advanced heat exchanger having light weight, minimum volume, and high performance to improve the uses of energy sources and contribute to sus...
-
Article
Open AccessObserving the quantum Cheshire cat effect with noninvasive weak measurement
One of the common conceptions of nature, typically derived from the experiences with classical systems, is that attributes of the matter coexist with the substance. In the quantum regime, however, the quantum ...
-
Article
Open AccessOptical Fredkin gate assisted by quantum dot within optical cavity under vacuum noise and sideband leakage
We propose a deterministic Fredkin gate which can accomplish controlled-swap operation between three-qubit states. The proposed Fredkin gate consists of a photonic system (single photon) and quantum dots (QDs)...
-
Article
Response to “Comment on ‘Controlled mutual quantum entity authentication with an untrusted third party’”
Recently, Wang et al. (Quantum Inf Process, QINP-D-18-00478R1, 2019) commented that a third party can obtain an authentication key from communicating parties by performing an entanglement swap** attack on th...