scispace - formally typeset
Search or ask a question
Author

You Long Yu

Bio: You Long Yu is an academic researcher from Hefei University of Technology. The author has contributed to research in topics: Algorithm & Distortion (music). The author has an hindex of 1, co-authored 1 publications receiving 18 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, a novel FBG sensors interrogation technique with advantages of high signal-to-noise ratio (SNR) and high interrogation speed is experimentally demonstrated, and a FBG sensing system based on this interrogation technique and the mature unbalanced scanning Michelson interferometer (USMI) demodulation technique is realized.

19 citations

Journal ArticleDOI
TL;DR: The problem of camera 1D calibration is well solved by the proposed high-precision algorithm, which can satisfy actual requirements and provides a new approach for desirable distortion correction and an idea for 2D calibration of large field of view.
Abstract: In this paper, the problem of camera 1D calibration is well solved by our proposed high-precision algorithm, which can satisfy actual requirements. We present a viewpoint that the closed-form solution can simply achieve high calibration accuracy in the absence of distortion. So, we abandon the habitual strategy of global nonlinear optimization for all intrinsic and extrinsic parameters. The innovations of the proposed algorithm are three-fold: firstly, cyclic distortion correction method is introduced to ensure that the estimated distortion parameters gradually approach the exact values; secondly, a new criterion for the nonlinear optimization of distortion correction is developed; thirdly, we enhance the anti-noise ability of the closed-form solution by optimally weighting the constraint equations. Extensive experiments prove that the proposed algorithm provides the highest calibration accuracy and robustness, which is comparable to 2D calibration. In addition, our proposed algorithm provides a new approach for desirable distortion correction and an idea for 2D calibration of large field of view.

1 citations

DOI
TL;DR: In this paper , a new component diameter measurement system that uses a twin-hole fiber Bragg grating (THFBG) is proposed, where the diameter is obtained by observing the distortion of the THFBG transmission spectrum.
Abstract: A new component diameter measurement system that uses a twin-hole fiber Bragg grating (THFBG) is proposed. The diameter is obtained by observing the distortion of the THFBG transmission spectrum. Furthermore, the wavelengths and the relative intensities of different troughs are extracted from the transmission spectrum to measure the diameter. It is experimentally found that the wavelengths of the troughs are independent of changes in the diameter, and the relative intensities of different troughs obtained via different calculation methods change monotonically with increasing diameter. The relative intensity ratio between different troughs is used to measure the sample diameter to eliminate the measurement interference caused by the difference in light source output intensity at different measuring points. The relationship between this relative intensity and the diameter is monotonic and nonlinear, and a maximum sensitivity of −0.5894 cm−1 is achieved when the sample diameter is 4 cm.

Cited by
More filters
Journal ArticleDOI
TL;DR: This paper studies the security of previous QPC protocols with a semi-honest third party (TP) from the viewpoint of secure multi-party computation and shows that the assumption of a semi -honest TP is unreasonable.
Abstract: As an important branch of quantum cryptography, quantum private comparison (QPC) has recently received a lot of attention. In this paper we study the security of previous QPC protocols with a semi-honest third party (TP) from the viewpoint of secure multi-party computation and show that the assumption of a semi-honest TP is unreasonable. Without the unreasonable assumption of a semi-honest TP, one can easily find that the QPC protocol (Tseng et al. in Quantum Inf Process, 2011, doi: 10.1007/s11128-011-0251-0 ) has an obvious security flaw. Some suggestions about the design of QPC protocols are also given.

123 citations

Journal ArticleDOI
TL;DR: In this paper, a quantum private comparison protocol is proposed based on bell entangled states that can compare the equality of their information with the help of a semi-honest third party.
Abstract: In this paper, a quantum private comparison protocol is proposed based on bell entangled states. In our protocol, two parties can compare the equality of their information with the help of a semi-honest third party. The correctness and security of our protocol are discussed. One party cannot learn the other's private information and the third party also cannot learn any information about the private information.

95 citations

Journal ArticleDOI
TL;DR: A new quantum private comparison protocol based on the four-particle χ-type states, which uses the Pauli local unitary operation on particles to encode the information and to extract information by measurement.
Abstract: We present a new quantum private comparison protocol based on the four-particle χ-type states. Different from previous protocols using the four-particle χ-type states, our protocol have some advantages. Without using the entangled character, we only need to prepare one type of χ-type state and N χ-type states. And we use the Pauli local unitary operation on particles to encode the information and to extract information by measurement. We also discuss that our protocol can withstand all various kinds of outside attacks and participant attacks.

81 citations

Journal ArticleDOI
TL;DR: In this protocol, two types of GHZ states are prepared and use their entanglement properties to encode and compare the private information of X and Y and can withstand all various kinds of outside attacks and participant attacks.
Abstract: We present a new quantum private comparison protocol based on the three-particle GHZ states. In this protocol, we prepare two types of GHZ states and use their entanglement properties to encode and compare the private information of X and Y. We also discuss that our protocol can withstand all various kinds of outside attacks and participant attacks.

77 citations

Journal ArticleDOI
TL;DR: A new multi-party quantum private comparison protocol based on d-dimensional basis states that can withstand various kinds of outside attacks and participant attacks is presented.
Abstract: We present a new multi-party quantum private comparison protocol based on d-dimensional basis states. Different from previous protocols, our protocol have some advantages. n parties can determine wether their private information are equal or not in one time execution of our protocol. Without using the entangled character of d-dimensional basis states, we only need to perform the local unitary operation on particles to encode the information and to get the comparison result. We also discuss that our protocol can withstand various kinds of outside attacks and participant attacks.

54 citations