Wusong, China

Time filter

Source Type

A cobalt-free Ba 0. 5Sr 0. 5Fe 0. 9Nb 0. 1O 3-δ (BSFNb) perovskite-type oxide was investigated as the cathode material for intermediate-temperature solid oxide fuel cells (IT-SOFCs) with Sm 0. 2Ce 0. 8O 1. 9 (SDC) electrolyte. XRD results showed that BSFNb cathode was chemically compatible with the electrolyte SDC up to 1,000 °C. The maximum output of anode-supported thin-film SOFC reached 503 mW cm -2 at 650 °C when employing humidified H 2 as fuel and static air as oxidizer. The electrode polarization resistance was low as 0. 078 Ω cm 2 at 650 °C, and the activation energy of the electrode polarization resistance was 129. 72 kJ mol -1. The experimental results indicated that the cobalt-free BSFNb was a promising cathode candidate for IT-SOFCs. © 2012 Springer-Verlag.


Gao G.,Tongling University
Quantum Information Processing | Year: 2013

Combining the block transmission in Long and Liu (Phys Rev A 65:032302, 2002) and the double operations in Lin et al. (Opt Commun 282:4455, 2009), we propose a secure multiparty quantum secret sharing protocol with the collective eavesdropping-check character. In this protocol, only the boss needs to prepare Bell states and perform Bell state measurements, and all agents only perform local operations, which makes this protocol more feasible with the current technique. Incidentally, we show that the other half of secret messages in Lin et al. protocol (Opt Commun 282:4455, 2009) may also be eavesdropped. © 2012 Springer Science+Business Media, LLC.


Gao G.,Tongling University
International Journal of Theoretical Physics | Year: 2010

By swapping the entanglement of χ-type state, we propose a quantum key distribution protocol, in which only Alice needs to prepare Χ-type states and transmit a particle sequence. Both Alice and Bob need to perform Χ-type state measurements. © 2010 Springer Science+Business Media, LLC.


Gao G.,Tongling University
Physica Scripta | Year: 2010

We propose a quantum key distribution protocol using entanglement swapping of χ-type state; in this protocol, Alice and Bob transmit a particle sequence to each other and perform χ-type state measurements. Alice's and Bob's roles are completely symmetric. © 2010 The Royal Swedish Academy of Sciences.


Yang R.,Tongling University
Journal of Convergence Information Technology | Year: 2012

In this paper, we investigate the multiconstrained shortest path problem. A Fully Polynomial Time Approximation Scheme (FPTAS) is presented. We analytically study the performance of FPTAS, our result shows that the presented FPTAS can find a provably good approximation for K-constrained (K ≥ 2) shortest path problem efficiently and effectively.


Gao G.,Tongling University
International Journal of Theoretical Physics | Year: 2014

Using one-dimensional four-particle cluster states, we propose a bidirectional quantum secure communication protocol, in which the information leakage does not exist. In order to judge whether two sequences composed of cluster states are transmitted safely, two batches of decoy particles are used. Moreover, we show that this protocol is secure against eavesdropping. © 2014, Springer Science+Business Media New York.


Gao G.,Tongling University
International Journal of Theoretical Physics | Year: 2014

Yuan et al. (Int. J. Theor. Phys. 51:3443, 2012) proposed a multiparty quantum secret sharing protocol using Bell states and continuous variable operations. Zhang and Qin (Int. J. Theor. Phys. 52:3953, 2013) showed that their protocol is not secure. In this paper, we will give an improvement of Yuan et al. protocol. Our improved protocol can stand against not only Zhang et al. attack strategies, but also the other ones efficiently. © 2014, Springer Science+Business Media New York.


Gao G.,Tongling University
Optics Communications | Year: 2010

In the paper [S. Lin, Q.Y. Wen, S.J. Qin, F.C. Zhu, Opt. Commun. 282(2009) 4455], Lin et al. put forward a quantum secret sharing protocol in which the collective eavesdropping-check is employed. We study the security of this protocol and find that it is insecure. Two dishonest agents may collaborate to eavesdrop (half of) Alice's secret messages without introducing any error. © 2010 Elsevier B.V. All rights reserved.


Gao G.,Tongling University
Optics Communications | Year: 2010

By swapping the entanglement of Bell states, we propose two quantum dialogue protocols, which have two different characters, one with the "two-step" character and the other with the "ping-pong" character. The common merits of two dialogue protocols are that the information leakage does not exist. © 2010 Elsevier B.V. All rights reserved.


Gao G.,Tongling University
Optics Communications | Year: 2011

Lin et al. [Song Lin, Fei Gao, Qiao-yan Wen, Fu-chen Zhu, Opt. Commun. 281 (2008) 4553] pointed out that the multiparty quantum secret sharing protocol [Zhan-jun Zhang, Gan Gao, Xin Wang, Lian-fang Han, Shou-hua Shi, Opt. Commun. 269 (2007) 418] is not secure and proposed an improved three-party quantum secret sharing protocol. In this paper, we study the security of the improved three-party quantum secret sharing protocol and find that it is still not secure. Finally, a further improved three-party quantum secret sharing protocol is proposed. © 2010 Elsevier B.V. All rights reserved.

Loading Tongling University collaborators
Loading Tongling University collaborators