Parameters Optimization of Decoy-State Phase-Matching Quantum Key Distribution Based on the Nature-Inspired Algorithms

  • Corresponding author:

    Haiqiang Ma, Email: hqma@bupt.edu.cn

  • Received Date: September 13, 2024
  • Accepted Date: December 08, 2024
  • Published Date: December 31, 2024
  • Abstract Phase-matching quantum-key distribution (PM-QKD) has achieved significant results in various practical applications. However, real-time communication requires dynamic adjustment and optimization of key parameters during communication. In this letter, we predict the PM-QKD parameters using nature-inspired algorithms (NIAs). The results are obtained from an exhaustive traversal algorithm (ETA), which serves as a benchmark. We mainly study the parameter optimization effects of the two NIAs: ant colony optimization (ACO) and the genetic algorithm (GA). The configuration of the inherent parameters of these algorithms in the decoy-state PM-QKD is also discussed. The simulation results indicate that the parameters obtained by the ACO exhibit superior convergence and stability, whereas the GA results are relatively scattered. Nevertheless, more than 97% of the key rates predicted by both algorithms are highly consistent with the optimal key rate. Moreover, the relative error of the key rates remained below 10%. Furthermore, NIAs maintain power consumption below 8 W and require three orders of magnitude less computing time than ETA.
  • Article Text

  • 1. Introduction. Quantum key distribution (QKD) is based on the principles of quantum mechanics,[1] which allow the unconditional and secure sharing of keys between trusted communication parties without limiting the computing power of potential eavesdroppers. The BB84-QKD protocol lays the foundation for the development of QKD.[2] Various protocols have been proposed over the past 40 years. Among them, the decoy-state-QKD protocol addresses the problem of multiphoton security vulnerability at the source side in practical QKD systems.[3] The measurement-device-independent QKD (MDI-QKD) protocol is designed to withstand all attacks against the detector side,[4,5] such as time-shift attacks,[6,7] faked states attacks,[8,9] and detector blinding attacks.[10,11] However, all these protocols share a common challenge: the key rate cannot exceed the Pirandola-Laurenza-Ottaviani-Banchi (PLOB) bound without the use of a quantum repeater.[12,13] The twin-field QKD (TF-QKD) protocol, proposed by Lucamarini et al., addresses this limitation.[14] Based on the principle of single-photon interference, the security key rate of TF-QKD is proportional to the square root of the transmittance of the channel. This feature is particularly critical in long-distance communication scenarios, significantly extending the effective coding distance and demonstrating significant advantages over traditional MDI-QKD. However, a later announcement of the phase information in TF-QKD causes security loopholes, and many variants of TF-QKD have been proposed to close these loopholes. Among them, decoy-state phase-matching QKD (PM-QKD) offers a quadratic improvement in the key rate without requiring basic selection. It eliminates the requirement for phase locking or pre-phase feedback, thereby obviating the need for a phase post-compensation technique.[15]

    With the deepening of QKD theory research, its practical application has made remarkable progress, including constructing large-scale intercity QKD networks and realizing space-to-ground integrated QKD systems.[1621] Nevertheless, the deployment of decoy-state PM-QKD in practical settings inevitably confronts multifaceted challenges such as encompassing electromagnetic interference,[22] light source defects,[23] and environmental noise[24]. These factors directly affect the key rate of the decoy-state PM-QKD, which may endanger the security and efficiency of communication. To address these challenges, optimizing the parameter settings of the decoy-state PM-QKD protocol is crucial to reducing the impact of external interference on system performance through precise adjustments. Traditionally, parameter optimization has adopted exhaustive traversal algorithms (ETA) and local search algorithms (LSA).[25] Although these methods can obtain the optimal parameter values, their optimization process is time-consuming and fails to meet the high real-time demands of modern communication systems. Therefore, exploring and developing more efficient and fast parameter optimization algorithms is necessary to ensure that the decoy-state PM-QKD system can maintain stable performance and efficient security key generation ability in various application scenarios.

    Nature-inspired algorithms (NIAs) are a class of algorithms designed to draw inspiration from natural biological phenomena and patterns.[26,27] These algorithms embody the survival strategies, group behaviors, and evolutionary mechanisms of organisms in nature. They are known for their adaptive distributed computation and powerful global search capabilities. Over the past few decades, NIAs such as ant colony optimization (ACO) and genetic algorithm (GA),[2831] have been widely applied to solve the problem of optimal parameter setting.[3234] These algorithms can efficiently explore the entire solution space with a certain probability within a specified range, ultimately identifying the optimal solution owing to their inherent characteristics. Importantly, these approaches do not alter the fundamental principles or underlying logic of QKD protocols, making them suitable for various QKD protocols, including subsequent variants of TF-QKD and MP-QKD.[4,3538]

    In this letter, we study the effects of ACO and GA on parameter optimization in decoy-state PM-QKD. ACO is commonly used to solve the traveling salesman problem (TSP),[39] with its pheromone renewal strategy typically associated with the distances between cities. In QKD parameter optimization, we consider the key rate to be a crucial metric in the pheromone update strategy. To comprehensively evaluate the performance of these two algorithms in decoy-state PM-QKD parameter optimization, we conduct a comparative analysis of three key dimensions: the accuracy of the parameter prediction, size of the relative error value of the key rate, and computational cost. The results show that both NIAs perform well across all three categories. Moreover, the parameters predicted by the ACO demonstrate greater accuracy.

    2. Decoy-State PM-QKD. Alice and Bob each generate a coherent state |sei(ϕA(B)+πκA(B))A(B), where κA(B) denotes the random key, ϕA(B) denotes the random phase, and s∈{μ,ν,ω} denotes the random intensity (μ,ν,ω represent the signal state, decoy state, and vacuum state, respectively). Alice and Bob then send the modulated pulses to an untrusted third party, Eve, who conducts the interferometry and records the responses from the detectors. After Eve announces the detection results, Alice and Bob announce the phase slice index where the random phase is located and sift the key based on Eve’s published detection success events (noticing that only one of the two detectors responded). Finally, a secure key is extracted from the filtered bits through key extraction, parameter estimation, and postprocessing.

    Using Gottesman, Lo, Lütkenhaus and Preskill (GLLP) theory,[40] the gain obtained is as follows:

    Qs=1esηdη+2Pdcesηdη,s{μ,ν,ω},

    (1)

    where Pdc denotes the dark count rate, ηd denotes the detection efficiency of the detector and η = 10αL/20 with α and L denoting the fiber loss factor and transmission distance, respectively.

    The quantum bit error rate (QBER) in the Z basis is as follows:

    EZs=(Pdc+sηdηeδ)esηdηQs,

    (2)

    where eδ denotes the misalignment error rate.

    The phase-error rate is[41]

    EXμ=q1eZ1+q0+eZ0+(1q0q1),

    (3)

    where qk represents the ratio of the kphoton signal to fully detected signal, and eZk represents the quantum bit error rate of the k-photon signal.

    In Eq. (3), the upper bound of the single-photon signal error is as follows:

    eZ1=EZνQνeνEZωQωeω(νω)Y1,

    (4)

    where Y1 denotes the single-photon yield.

    The key rate of decoy-state PM-QKD in the asymptotic scenario is:

    R=2MQμ[1fH(EZμ)H(EXμ)],

    (5)

    where M denotes the number of slices, f denotes the error correction efficiency, and H(x) denotes the binary entropy, expressed as H(x) = −xlog2(x) – (1 – x)log2(1 – x).

    From the above analysis, it is evident that inherent statistical fluctuations in the observed values must be considered when employing decoy state analysis to estimate the contribution of a single photon. Consequently, selecting an appropriate strength value to optimize key rate generation is essential. Here, we mainly optimize μ and ν, which are constrained to lie within the range of [0.01, 1], under the condition that μ > ν and ω = 0. Subsequently, ACO and GA are employed to search for the optimal solution within this range using their respective computational techniques. The principles underlying these methods are as follows.

    3. ACO and GA. ACO, a metaheuristic algorithm inspired by the foraging behavior of ants, has demonstrated remarkable effectiveness in solving complex optimization problems. This fundamental concept is based on the efficient collective intelligence exhibited by ants when locating food sources. Particularly the route selection mechanisms and information transmission through releasing and detecting pheromones. Australian scholars Marco Dorigo et al. proposed an ACO algorithm based precisely on the foraging behavior of ants.[29] Subsequently, the ant cycle, quantity, and density systems were derived according to the characteristics of releasing pheromones Δτ, among which the most commonly used is the ant cycle system. Now, we utilize the concept of the ant cycle system (i.e., ants release pheromones after only one cycle) and combine it with the characteristics of the decoy-state PM-QKD protocol to obtain Δτ = RTF–QKD. The specific solution process for ACO is shown in Fig. 1. The key steps of the ACO are as follows:

    Fig. 1.  Flowchart of the ACO.

    (1) Updated pheromone concentrations

    τi(iter+1)=τi(iter)×(1ρ)+Δτi(iter),

    (6)

    where the subscript i represents the ith ant, and iter denotes the number of iterations; τ denotes the pheromone concentration correspondingly; ρ denotes the pheromone volatilization factor; Δτ is the value of the fitness function, which is denoted as RTF–QKD.

    (2) State transfer probability

    Pi(iter)=(τbest(iter)τi(iter))/τbest(iter),

    (7)

    where P denotes the state transfer probability and τbest denotes the maximum pheromone concentration.

    Xi(iter+1)={Xi(iter)+(2×rand1)/max_iterPi(iter)<P0,Xi(iter)+(UpLow)×(rand0.5)Pi(iter)>P0,

    (8)

    where X indicates the positional coordinates of the ant, rand denotes a pseudo-random number between 0 and 1, Up and Low are the upper and lower bounds of the ant’s coordinates, respectively, and P0 denotes the transfer probability constant.

    Concurrently, we combine the GA with decoy-state PM-QKD to study its optimization performance. The following is a brief introduction to this principle. John Holland originally proposed the GA as a heuristic solution search or optimization technique based on the natural selection of Darwin’s biological evolution theory and the biological evolution process of genetic mechanisms.[31] Holland’s schema theorem and the related building block hypothesis provide the theoretical and conceptual foundation for the design of an efficient GA. In GA, each solution instance is regarded as an “individual”, and the entire solution space forms a “population”. Each individual is represented by a “chromosome”, in which binary numbers typically represent the information on the chromosome. Then, a fitness-based selection and recombination process is performed to generate a subsequent population, that is, the next generation. As the population iterates, fitness continuously improves until the optimal solution is reached. Its core steps include selection, crossover [as shown in Fig. 2(a)], and mutation [as shown in Fig. 2(b)].[31]

    Fig. 2.  Crossover and mutation processes of GA. (a) Single-point crossover process. According to a certain crossover probability, two-parent individuals select a crossover point on their chromosomes. Subsequently, they produce two new offspring by exchanging gene segments. (b) Mutation process. Certain individual loci with a specific probability of mutation are selected. Subsequently, the values of these loci are altered, which may involve changes in the locus value from 0 to 1 or from 1 to 0.

    4. Numerical Simulation. Considering the impact of the algorithm’s internal parameters on the computational performance, we analyzed the simulation results under different parameter combinations and selected the optimal internal parameter configuration accordingly. In this study, we regarded the prediction results obtained by the ETA as the optimal values. We selected 145,800 data sets with channel distances within 600 km to carefully study the parameters listed in Table 1. Simultaneously, the standard deviations of μ and ν were calculated for each parameter combination, which were used as indicators to evaluate the proximity between the predicted and optimal results.

    Table  1.  The inherent parameters and the test range. s1, ρ, and P0 represent the population number, pheromone volatilization factor, and the ACO transfer probability constant, respectively. s2, Pc, and Pm represent the population size, crossover probability, and mutation probability of the GA, respectively.
    Inherent parameterss1ρP0s2PcPm
    Test range[10, 300][0.1, 0.9][0.1, 0.9][10, 300][0.1, 0.9][0.1, 0.9]
     | Show Table
    DownLoad: CSV

    The data analysis shows that after selecting the parameter s1 in the ACO, the maximum difference in the standard deviation across various combinations of ρ and P0 is 0.0027. This finding underscores the high robustness of the ACO with respect to ρ and P0. However, as s1 increased, the standard deviation decreased, whereas the running time increased significantly. By contrast, the GA was less sensitive to the parameters s2 and Pc, yielding satisfactory results when s2 ⩾ 20. Specifically, when Pc and Pm are fixed, increasing s2 from 20 to 300 decreased the standard deviation by only 8.2%. It is important to note that the GA is highly sensitive to variations in the parameter Pm, and reducing the probability of variation can significantly enhance the accuracy of the results. Therefore, after considering key factors such as running time, power consumption, and accuracy, we opted for a trade-off, sacrificing accuracy to optimize the overall performance. The selected parameters are presented in Table 2.

    Table  2.  Inherent parameters of ACO and GA.
    Inherent parameterss1ρP0s2PcPm
    Value700.80.2200.80.1
     | Show Table
    DownLoad: CSV

    After selecting the inherent parameters of the algorithms, we predicted the decoy-state PM-QKD parameters. The decoy-state PM-QKD system parameters are listed in Table 3. Initially, we compared the computational costs of the three algorithms (CPU: 13th Gen Intel(R) Core(TM) i7-13700 @ 2.10 GHz; RAM: 16.0 GB), as shown in Table 4. NIAs take approximately 33 s, which is three orders of magnitude shorter than the ETA. In addition, NIAs consume less power, allowing them to save on electricity costs in the long run.

    Table  3.  Simulation parameters.
    ParametersfMαPdcηd
    Value1.15160.28 × 10−80.145
     | Show Table
    DownLoad: CSV
    Table  4.  Comparison of the computational cost by ACO, GA, and ETA.
    Time (s)CPU (%)Power consumption (W)
    ACO32.5410%<8
    GA34.1110%<8
    ETA13835.9311%1000
     | Show Table
    DownLoad: CSV

    Figure 3 shows the prediction performance of ACO and the GA for parameter μ under different distance conditions. The results indicate that the predicted values generated by ACO were closely aligned with the optimal predicted values. In addition, the data points are tightly clustered around the optimal value, demonstrating high consistency and accuracy. In contrast, although the predicted values from the GA also exhibited a trend similar to the optimal values, some data points were widely dispersed, indicating significant variability. This discrepancy is particularly evident for longer distances. Figure 4 further highlights the prediction performance of the two algorithms for the parameter ν at different distances, revealing that the values predicted by the GA exhibit greater dispersion. In summary, ACO clearly outperformed the GA regarding parameter prediction accuracy.

    Fig. 3.  Comparison of the performance of GA and ACO in predicting μ. The green and blue dots represent μ obtained by GA and ACO, respectively, whereas the red dots denote the optimal μ obtained by ETA.
    Fig. 4.  Comparison of the performance of GA and ACO in predicting ν. The green and blue dots represent ν obtained by GA and ACO, respectively, whereas the red dots denote the optimal ν obtained by ETA.

    Additionally, given the significance of the key rate in evaluating protocol quality, we conducted a specific analysis of the key rate calculated by these two algorithms to assess their effectiveness and impact in practical applications comprehensively. Comparing the data accuracy of the algorithms, ACO showed remarkable superiority. The experimental results are shown in Fig. 5, where 98.7% of the ACO calculation results fall within the 10% relative error range. By contrast, the GA achieved a data accuracy of 97.6%. Although its numerical results are good, the ACO clearly offers greater advantages in scenarios that demand higher accuracy.

    Fig. 5.  Relative error values of key rates from ACO and GA. Black dots represent the relative errors between the GA and ETA, and red dots represent those between the ACO and ETA.

    5. Conclusion. In this study, the parameter optimization strategy of a decoy-state PM-QKD system was comprehensively analyzed. Initially, we researched the inherent parameter settings of ACO and the GA, recognizing that varying parameter configurations can lead to different operational outcomes. Subsequently, we systematically evaluated the performances of the two NIAs in predicting the parameters using the classical optimization method, ETA, as a benchmark. The results demonstrated that NIAs operate three orders of magnitude faster than ETA while maintaining a power consumption below 8 W. The accuracy of the obtained key rate exceeded 97% (98.7% for ACO and 97.6% for GA). However, the different NIAs exhibited variations in the accuracy of parameter predictions. The ACO displayed remarkable stability, with its optimized parameter values fluctuating around the optimal value, indicating excellent convergence characteristics. In contrast, the GA showed considerable fluctuations in the parameter predictions, resulting in a more scattered data distribution. Therefore, NIAs can be effectively employed for parameter prediction in decoy-state PM-QKD application scenarios with stringent low-latency requirements. Additionally, ACO or GA can be judiciously selected based on a comprehensive computational efficiency assessment and prediction accuracy assessment.

    Acknowledgement: This work is supported by the State Key Laboratory of Information Photonics and Optical Communications (Beijing University of Posts and Telecommunications) No. IPOC2021ZT10, BUPT Excellent Ph.D. Students Foundation (Grant No. CX2023207), and the BUPT innovation and entrepreneurship support program No. 2024-YC-A188.
  • [1]
    Wootters W K, Zurek W H, 1982 Nature 299:802 doi: 10.1038/299802a0

    CrossRef Google Scholar

    [2]
    Bennett C H, Brassard G, 2014 Theor. Comput. Sci 560:7 doi: 10.1016/j.tcs.2014.05.025

    CrossRef Google Scholar

    [3]
    Lo H K, Ma X, Chen K, 2005 Phys. Rev. Lett. 94:230504 doi: 10.1103/PhysRevLett.94.230504

    CrossRef Google Scholar

    [4]
    Lo H K, Curty M, Qi B, 2012 Phys. Rev. Lett. 108:130503 doi: 10.1103/PhysRevLett.108.130503

    CrossRef Google Scholar

    [5]
    Tang G Z, Sun S H, Li C Y, 2019 Chin. Phys. Lett. 36:070301 doi: 10.1088/0256-307X/36/7/070301

    CrossRef Google Scholar

    [6]
    Qi B, Fred Fung C H, Lo H K, Ma X F, 2007 Quantum Inf. Comput. 7:73https://dl.acm.org/doi/10.5555/2011706.2011709

    Google Scholar

    [7]
    Zhao Y, Fred Fung C H, Qi B, Chen C, Lo H K, 2008 Phys. Rev. A 78:042333 doi: 10.1103/PhysRevA.78.042333

    CrossRef Google Scholar

    [8]
    Makarov V, Hjelme D R, 2007 J. Mod. Opt. 52:691 doi: 10.1080/09500340410001730986

    CrossRef Google Scholar

    [9]
    Iwakoshi T, 2015 Proceedings of the SPIE 9505:950504 doi: 10.1117/12.2176770

    CrossRef Google Scholar

    [10]
    Makarov V, 2009 New J. Phys. 11:065003 doi: 10.1088/1367-2630/11/6/065003

    CrossRef Google Scholar

    [11]
    Chistiakov V, Huang A Q, Egorov V, Makarov V, 2019 Opt. Express 27:32253 doi: 10.1364/OE.27.032253

    CrossRef Google Scholar

    [12]
    Pirandola S, Laurenza R, Ottaviani C, Banchi L, 2017 Nat. Commun. 8:15043 doi: 10.1038/ncomms15043

    CrossRef Google Scholar

    [13]
    Li Z D, Zhang R, Yin X F, et al. 2019 Nat. Photonics 13:644 doi: 10.1038/s41566-019-0468-5

    CrossRef Google Scholar

    [14]
    Lucamarini M, Yuan Z L, Dynes J F, Shields A J, 2018 Nature 557:400 doi: 10.1038/s41586-018-0066-6

    CrossRef Google Scholar

    [15]
    Ma X F, Zeng P, Zhou H Y, 2018 Phys. Rev. X 8:031043 doi: 10.1103/PhysRevX.8.031043

    CrossRef Google Scholar

    [16]
    Liu H, Jiang C, Zhu H T, et al. 2021 Phys. Rev. Lett. 126:250502 doi: 10.1103/PhysRevLett.126.250502

    CrossRef Google Scholar

    [17]
    Chen T Y, Jiang X, Tang S B, et al. 2021 npj Quantum Inf. 7:134 doi: 10.1038/s41534-021-00474-3

    CrossRef Google Scholar

    [18]
    Liu Y, Zhang W J, Jiang C, et al. 2023 Phys. Rev. Lett. 130:210801 doi: 10.1103/PhysRevLett.130.210801

    CrossRef Google Scholar

    [19]
    Yin J, Li Y H, Liao S K, et al. 2020 Nature 582:501 doi: 10.1038/s41586-020-2401-y

    CrossRef Google Scholar

    [20]
    Chen Y A, Zhang Q, Chen T Y, et al. 2021 Nature 589:214 doi: 10.1038/s41586-020-03093-8

    CrossRef Google Scholar

    [21]
    Liao S K, Lin J, Ren J G, et al. 2017 Chin. Phys. Lett. 34:090302 doi: 10.1088/0256-307X/34/9/090302

    CrossRef Google Scholar

    [22]
    Li F Y, Wang D, Wang S, et al. 2014 Chin. Phys. B 23:124201 doi: 10.1088/1674-1056/23/12/124201

    CrossRef Google Scholar

    [23]
    Gu J, Cao X Y, Fu Y, et al. 2022 Sci. Bull. 67:2167 doi: 10.1016/j.scib.2022.10.010

    CrossRef Google Scholar

    [24]
    Bertaina G, et al. 2024 Nature 7:2400032

    Google Scholar

    [25]
    Xu F H, Xu H, Lo H K, 2014 Phys. Rev. A 89:052333 doi: 10.1103/PhysRevA.89.052333

    CrossRef Google Scholar

    [26]
    Kumar A, Nadeem M, Banka H, 2022 Evolving Systems 14:141 doi: 10.1007/s12530-022-09432-6

    CrossRef Google Scholar

    [27]
    Darvishpoor S, Darvishpour A, Escarcega M, Hassanalian M, 2023 Drones 7:427 doi: 10.3390/drones7070427

    CrossRef Google Scholar

    [28]
    Fidanova S, 2021 Ant Colony Optimization and Applications SwitzerlandSpringer cham doi: 10.1007/978-3-030-67380-2

    CrossRef Google Scholar

    [29]
    Dorigo M, Stützle T, 2019 Ant colony optimization: overview and recent advances BerlinSpringer:311 doi: 10.1007/978-3-319-91086-4_10

    CrossRef Google Scholar

    [30]
    Anwaar A, Ashraf A, Bangyal W H K, Iqbal M, 2022 Genetic Algorithms: Brief review on Genetic Algorithms for Global Optimization Problems AmericaIEEE:1 doi: 10.1109/HCCS55241.2022.10090327

    CrossRef Google Scholar

    [31]
    Holland J H, 1992 Adaptation in natural and systems: an introductory analysis with applications to biology, control, and artificial intelligence AmericaMassachusetts Institute of Technology Press doi: 10.7551/mitpress/1090.001.0001

    CrossRef Google Scholar

    [32]
    Razavi S, Jalali-Farahani F, 2010 J Petrol. Sci. Eng. 74:147 doi: 10.1016/j.petrol.2010.08.009

    CrossRef Google Scholar

    [33]
    Vassiliadis V, Dounias G, 2008 Int. J. Artif. Intell. 18:487 doi: 10.1142/S021821300900024X

    CrossRef Google Scholar

    [34]
    Lin Z L, Zhang Z C, 2020 Eur. J. Remote Sens 53:124 doi: 10.1080/22797254.2020.1747949

    CrossRef Google Scholar

    [35]
    Wang X B, Yu Z W, Hu X L, 2018 Phys. Rev. A 98:062323 doi: 10.1103/PhysRevA.98.062323

    CrossRef Google Scholar

    [36]
    Zeng P, Zhou H Y, Wu W J, Ma X F, 2022 Nat. Commun. 13:3903 doi: 10.1038/s41467-022-31534-7

    CrossRef Google Scholar

    [37]
    Xie Y M, Weng C X, Lu Y S, Fu Y, Wang Y, Yin H L, Chen Z B, 2023 Phys. Rev. A 107:042603 doi: 10.1103/PhysRevA.107.042603

    CrossRef Google Scholar

    [38]
    Li B H, Xie Y M, Li Z, Weng C X, Li C L, Yin H L, Chen Z B, 2021 Opt. Lett. 46:5529 doi: 10.1364/OL.443099

    CrossRef Google Scholar

    [39]
    Lu Y L, Hao J k, Wu Q H, 2022 PeerJ Comput. Sci. 8:e972 doi: 10.7717/peerj-cs.972

    CrossRef Google Scholar

    [40]
    Liu B, Liu X R, Jia W G, 2024 Eur. Phys. J. Plus 137:412 doi: 10.1140/epjp/s13360-022-02633-7

    CrossRef Google Scholar

    [41]
    Song Z A, Huang G Q, Dong Q, Jiao R Z, 2021 Eur. Phys. J. D 75:298 doi: 10.1140/epjd/s10053-021-00311-4

    CrossRef Google Scholar

  • Related Articles

    [1]LIU Yuan, JIA Ya-Fei, LI Wei-Dong. Fermi-Decay Law of Bose–Einstein Condensate Trapped in an Anharmonic Potential [J]. Chin. Phys. Lett., 2012, 29(4): 040304. doi: 10.1088/0256-307X/29/4/040304
    [2]HAO Ya-Jiang. Ground State Density Distribution of Bose-Fermi Mixture in a One-Dimensional Harmonic Trap [J]. Chin. Phys. Lett., 2011, 28(1): 010302. doi: 10.1088/0256-307X/28/1/010302
    [3]YOU Yi-Zhuang. Ground State Energy of One-Dimensional δ-Function Interacting Bose and Fermi Gas [J]. Chin. Phys. Lett., 2010, 27(8): 080305. doi: 10.1088/0256-307X/27/8/080305
    [4]XIONG De-Zhi, CHEN Hai-Xia, WANG Peng-Jun, YU Xu-Dong, GAO Feng, ZHANG Jing. Quantum Degenerate Fermi--Bose Mixtures of 40K and 87Rb Atoms in a Quadrupole-Ioffe Configuration Trap [J]. Chin. Phys. Lett., 2008, 25(3): 843-846.
    [5]ZHANG Peng-Fei, ZHANG Hai-Chao, XU Xin-Ping, WANG Yu-Zhu. Monte Carlo Simulation of Cooling Induced by Parametric Resonance [J]. Chin. Phys. Lett., 2008, 25(1): 89-92.
    [6]WANG Jin-Feng, LIU Yang, XU You-Sheng, WU Feng-Min. Lattice Boltzmann Simulation for the Optimized Surface Pattern in a Micro-Channel [J]. Chin. Phys. Lett., 2007, 24(10): 2898-2901.
    [7]MA Yong-Li. Phase Diagram and Phase Separation of a Trapped Interacting Bose--Fermi Gas Mixture [J]. Chin. Phys. Lett., 2004, 21(12): 2355-2358.
    [8]LIU Rang-Su, DONG Ke-Jun, LI Ji-Yon, YU Ai-Bing, ZOU Rui-Ping. Molecular Dynamics Simulation of Microstructure Transitions in a Large-Scale Liquid Metal Al System During Rapid Cooling Processes [J]. Chin. Phys. Lett., 2002, 19(8): 1144-1147.
    [9]LIU Chang-Song, ZHU Zhen-Gang, XIA Jun-Chao, SUN De-Yan. Different Cooling Rate Dependences of Different Microstructure Units in Aluminium Glass by Molecular Dynamics Simulation [J]. Chin. Phys. Lett., 2000, 17(1): 34-36.
    [10]CHEN Yixin, NI Guangjiong. DIRAC-BERGMANN FORMALISM OF THE FERMI-BOSE TRANSMUTATION IN (2+1)-DIMENSIONS [J]. Chin. Phys. Lett., 1990, 7(10): 433-436.

Catalog

    Figures(5)  /  Tables(4)

    Article views (45) PDF downloads (25) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return