Search results for: information theory - Bridge of Knowledge

Search

Search results for: information theory

Filters

total: 157
filtered: 117

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: information theory

  • Product Graph Invariants with Applications in the Theory of Information

    Publication

    - Year 2012

    There are a large number of graph invariants. In the paper, we consider some of them, e.g. the independence and chromatic numbers. It is well know that we cannot efficiently calculate these numbers for arbitrary graphs. In the paper we present relations between these invariants and concepts from the theory of information. Concepts such as source coding and transmission over a noisy channel with zero probability of error are modeled...

  • Average Redundancy of the Shannon Code for Markov Sources

    Publication

    It is known that for memoryless sources, the average and maximal redundancy of fixed–to–variable length codes, such as the Shannon and Huffman codes, exhibit two modes of behavior for long blocks. It either converges to a limit or it has an oscillatory pattern, depending on the irrationality or rationality, respectively, of certain parameters that depend on the source. In this paper, we extend these findings, concerning the Shannon...

    Full text to download in external service

  • Squashed entanglement for multipartite states and entanglement measures based on the mixed convex roof

    Publication
    • D. Yang
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • J. Oppenheim
    • W. Song

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2009

    New measures of multipartite entanglement are constructedbased on two definitions of multipartite information anddifferent methods of optimizing over extensions of the states. Oneis a generalization of the squashed entanglement where one takesthe mutual information of parties conditioned on the state's extensionand takes the infimum over such extensions. Additivity ofthe multipartite squashed entanglement is proved for both versionsof...

    Full text to download in external service

  • Types of Markov Fields and Tilings

    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2016

    The method of types is one of the most popular techniques in information theory and combinatorics. However, thus far the method has been mostly applied to one-dimensional Markov processes, and it has not been thoroughly studied for general Markov fields. Markov fields over a finite alphabet of size m ≥ 2 can be viewed as models for multi-dimensional systems with local interactions. The locality of these interactions is represented...

    Full text available to download

  • On the Limiting Distribution of Lempel-Ziv’78 Redundancy for Memoryless Sources

    Publication

    We study the Lempel-Ziv'78 algorithm and show that its (normalized) redundancy rate tends to a Gaussian distribution for memoryless sources. We accomplish it by extending findings from our 1995 paper, in particular, by presenting a new simplified proof of the central limit theorem (CLT) for the number of phrases in the LZ'78 algorithm. We first analyze the asymptotic behavior of the total path length in the associated digital search...

    Full text to download in external service

  • Low-dimensional bound entanglement with one-way distillable cryptographic key

    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2008

    In this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...

  • Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity

    Publication
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • D. Leung
    • J. Oppenheim

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2008

    In this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...

  • General paradigm for distilling classical key from quantum states

    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2009

    In this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...

    Full text to download in external service

  • A few steps more towards NPT bound entanglement

    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2010

    In this paper, existence of bound entangled states with nonpositive partial transpose (NPT) is considered. As one knows, existence of such states would in particular imply nonadditivity of distillable entanglement. Moreover, it would rule out a simple mathematical description of the set of distillable states. The particular state, known to be 1-copy nondistillable and supposed to be bound entangled, is considered. The problem of...

    Full text to download in external service

  • On the Characteristic Graph of a Discrete Symmetric Channel

    We present some characterizations of characteristic graphs of row and/or column symmetric channels. We also give a polynomial-time algorithm that decides whether there exists a discrete symmetric channel whose characteristic graph is equal to a given input graph. In addition, we show several applications of our results.

    Full text to download in external service

  • Amplifying the Randomness of Weak Sources Correlated With Devices

    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2017

    The problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...

    Full text to download in external service

  • Superadditivity of two quantum information resources

    Publication

    - Science Advances - Year 2017

    Entanglement is one of the most puzzling features of quantum theory and a principal resource for quantum information processing. It is well known that in classical information theory, the addition of two classical information resources will not lead to any extra advantages. On the contrary, in quantum information, a spectacular phenomenon of the superadditivity of two quantum information resources emerges. It shows that quantum...

    Full text available to download

  • Shannon Capacity and Ramsey Numbers

    Publication

    - Year 2011

    Ramsey-type theorems are strongly related to some results from information theory. In this paper we present these relations.

  • Information content of systems as a physical principle

    Publication

    - PHYSICAL REVIEW A - Year 2017

    To explain the conceptual gap between classical and quantum and other, hypothetical descriptions of the world, several principles have been proposed. So far, all these principles have not explicitly included the uncertainty relation. Here we introduce an information content principle ( ICP ) which represents a constrained uncertainty principle. The principle, by taking into account the encoding and decoding properties of a single physical...

    Full text available to download

  • A Note on Shannon Capacity for Invariant and Evolving Channels

    Publication

    - Journal of Applied Computer Science - Year 2011

    In the paper we discuss the notion of Shannon capacity for invariant and evolving channels. We show how this notion is involved in information theory, graph theory and Ramsey theory.

    Full text to download in external service

  • Networkig activities of general judiciary - from theory to practice

    Publication

    - e-mentor - Year 2018

    Over the last three decades, networks - as a field of research - have acquired a significant place among management sciences. Unfortunately, in the judiciary they have become a subject of more careful analyses only recently, which resulted in a large discrepancy of knowledge - both in theory and in its practical adaptation for the needs of the courts. In order to fill this cognitive gap, an attempt was made to identify levels of...

    Full text available to download

  • Colorings of the Strong Product of Circulant Graphs

    Publication
    • M. Jurkiewicz

    - Year 2012

    Graph coloring is one of the famous problems in graph theory and it has many applications to information theory. In the paper we present colorings of the strong product of several circulant graphs.

  • Towards Resource Theory of Coherence in Distributed Scenarios

    Publication

    - Physical Review X - Year 2017

    The search for a simple description of fundamental physical processes is an important part of quantum theory. One example for such an abstraction can be found in the distance lab paradigm: if two separated parties are connected via a classical channel, it is notoriously difficult to characterize all possible operations these parties can perform. This class of operations is widely known as local operations and classical communication....

    Full text available to download

  • Redundant information encoding in QED during decoherence

    Publication

    - PHYSICAL REVIEW A - Year 2018

    Broadly understood decoherence processes in quantum electrodynamics, induced by neglecting either the radiation [L. Landau, Z. Phys. 45, 430 (1927)] or the charged matter [N. Bohr and L. Rosenfeld, K. Danske Vidensk. Selsk, Math.-Fys. Medd. XII, 8 (1933)], have been studied from the dawn of the theory. However, what happens in between, when a part of the radiation may be observed, as is the case in many real-life situations, has...

    Full text available to download

  • The Technological Advancement of New Products, Product Newness and Market Information

    Publication

    The purpose of this study is to propose product newness and obtaining market information as mediators of the relationship between the technological advancement of a new product and its commercial success. So far, little is known about the mediators of this relationship but knowledge about the factors that strengthen or weaken it is valid, both for the theory and practice of new product management. On the one hand, product newness...

    Full text available to download

  • Distributed correlations and information flows within a hybrid multipartite quantum-classical system

    Publication

    - PHYSICAL REVIEW A - Year 2015

    Understanding the non-Markovian mechanisms underlying the revivals of quantum entanglement in the presence of classical environments is central in the theory of quantum information. Tentative interpretations have been given by either the role of the environment as a control device or the concept of hidden entanglement. We address this issue from an information-theoretic point of view. To this aim, we consider a paradigmatic tripartite...

    Full text available to download

  • Impact of information systems (IS) infusion on Open Government Data (OGD) adoption

    Publication
    • R. Matheus
    • C. H. Alexopoulos
    • N. Rizun
    • L. Euripides
    • S. Saxena

    - Digital Policy Regulation and Governance - Year 2024

    Purpose – This study aims to underline the possible influence of the moderator, information systems (IS) infusion, on Open Government Data (OGD) adoption and usage. Design/methodology/approach – Using the partial least squares-structural equation modeling methodological approach, the adapted unified theory of acceptance and use of technology (UTAUT) model has been used for understanding the role of themoderating variable, namely,...

    Full text available to download

  • The Use of Information and Communication Technologies in Cluster Organizations

    Publication

    - Year 2019

    The purpose of the paper is to explore how cluster organizations (COs) take advantage of Information and Communication Technologies (ICT). The paper addresses the research question: “How do cluster organizations take advantage of ICT in fulfilling their main roles?”. The research was carried out in the first half of 2016 in four purposefully selected cluster organizations. The main research strategy involved Grounded Theory; the...

    Full text to download in external service

  • Connection matrix theory for discrete dynamical systems

    In [C] and [F1] the connection matrix theory for Morse decomposition is developedin the case of continuous dynamical systems. Our purpose is to study the case of discrete timedynamical systems.

  • Excited state properties of a series of molecular photocatalysts investigated by time dependent density functional theory.

    Publication

    Time dependent density functional theory calculations are applied on a series of molecular photocatalysts of the type [(tbbpy)2M1(tpphz)M2X2]2+ (M1 = Ru, Os; M2 = Pd, Pt; X = Cl, I) in order to provide information concerning the photochemistry occurring upon excitation of the compounds in the visible region. To this aim, the energies, oscillator strengths and orbital characters of the singlet and triplet excited states are investigated....

    Full text available to download

  • On symmetric extendibility of quantum states and its applications

    Publication

    - Year 2017

    This dissertation is focused on analysis of the symmetric extendibility of quantum states and its applications in the quantum information theory, with special attention paid to the area of quantum entanglement distillation, quantum channels theory, quantum security, and monogamy of quantum entanglement in time. We analyze geometry of the set of symmetric extendible states, i.e. such states that possess symmetric extensions and...

    Full text available to download

  • Paradygmat jakościowy w analizie interakcji międzykulturowych – interpretacja na bazie wybranych teorii psychologicznych

    Publication

    - Przedsiębiorczość i Zarządzanie - Year 2016

    Intercultural interactions in a multicultural work environment are a peculiar type of social interactions. The results of prior research on the effects of interactions in such environment are inconclusive. The majority of the previous studies have emphasized problems, applied a quantitative methodology and interpreted the results with regard to social identity and categorization theory, information-processing theory and intergroup contact...

    Full text available to download

  • Unifying Aspects of Generalized Calculus

    Publication

    - ENTROPY - Year 2020

    Non-Newtonian calculus naturally unifies various ideas that have occurred over the years in the field of generalized thermostatistics, or in the borderland between classical and quantum information theory. The formalism, being very general, is as simple as the calculus we know from undergraduate courses of mathematics. Its theoretical potential is huge, and yet it remains unknown or unappreciated.

    Full text available to download

  • Accuracy and Availability of EGNOS - Results of Observations

    Publication

    According to SBAS concept the user should receive timely the correct information about the system integrity and corrections to the pseudoranges measurements, which leads to better accuracyof coordinates. In theory the whole system is permanently monitored by RIMS stations, so it is impossible to deliver the faulty information to the user. The quality of the system is guaranteed inside the border of the system coverage however in...

    Full text available to download

  • The Method of a Two-Level Text-Meaning Similarity Approximation of the Customers’ Opinions

    The method of two-level text-meaning similarity approximation, consisting in the implementation of the classification of the stages of text opinions of customers and identifying their rank quality level was developed. Proposed and proved the significance of major hypotheses, put as the basis of the developed methodology, notably about the significance of suggestions about the existence of analogies between mathematical bases of...

    Full text available to download

  • Subadditivity of the minimum output entropy and superactivation of the classical capacity of quantum multiple access channels

    Publication

    We study subadditivity of the minimum output entropy (Hmin) of quantum multiple access channels (MACs). We provide an example of violation of the additivity theorem for Hmin known in classical information theory. Our result is based on a fundamental property of MACs, i.e., independence of each sender. The channels used in the example can be constructed explicitly. On the basis of subadditivity of Hmin we also provide an example...

    Full text available to download

  • Experimental generation of complex noisy photonic entanglement

    Publication
    • K. Dobek
    • M. Karpiński
    • R. Demkowicz-Dobrzański
    • K. Banaszek
    • P. Horodecki

    - LASER PHYSICS - Year 2013

    We present an experimental scheme based on spontaneous parametric down-conversion to produce multiple-photon pairs in maximally entangled polarization states using an arrangement of two type-I nonlinear crystals. By introducing correlated polarization noise in the paths of the generated photons we prepare mixed-entangled states whose properties illustrate fundamental results obtained recently in quantum information theory, in particular those...

    Full text to download in external service

  • Digitalization Process and Its Impact on Economic Growth A Panel Data Study for Developing Countries

    Publication

    - Year 2022

    This book analyses the impact of Information and Communication Technologies (ICTs) on economic development. It contains theoretical and empirical studies, including panel studies on various issues facing developing countries, such as education, corruption, economic growth, government expenditure, financial inclusion, foreign direct investment, infrastructure, economic and social welfare, and inequality. Each chapter offers a well-conceived...

    Full text to download in external service

  • Modeling the Customer’s Contextual Expectations Based on Latent Semantic Analysis Algorithms

    Publication

    Nowadays, in the age of Internet, access to open data detects the huge possibilities for information retrieval. More and more often we hear about the concept of open data which is unrestricted access, in addition to reuse and analysis by external institutions, organizations and people. It’s such information that can be freely processed, add another data (so-called remix) and then published. More and more data are available in text...

    Full text available to download

  • What matters most to patients? On the Core Determinants of Patient Experience from Free Text Feedback

    Publication

    - Year 2021

    Free-text feedback from patients is increasingly used for improving the quality of healthcare services and systems. A major reason for the growing interest in harnessing free-text feedback is the belief that it provides richer information about what patients want and care about. The use of computational approaches such as structural topic modelling for analysing large unstructured textual data such as free-text feedback from patients...

    Full text available to download

  • Game Theory Analysis of Bidding for a Construction Contract

    Publication

    The authors are concerned with a bidding problem. There are two companies (P1 and P2) bidding for a highway construction project. In order to be more competitive, P1 considers buying a new gravel pit near the construction site. The basic cost of the pit is known to both companies. However, there is also an additional, hidden, cost (C) known only to P1. P2 is uncertain whether the hidden cost is C = 0 or C = x. P1 plans to bid for...

    Full text available to download

  • Zero-knowledge convincing protocol on quantum bit is impossible

    Publication

    - Quantum Journal - Year 2017

    It is one of fundamental features of quantum formalism that o n one hand it provides a new infor- mation processing resources and on the other hand puts funda mental constraints on the processing of quantum information implying “no-go” theorems for cloni ng [1–3], bit commitment [4, 5] and deleting [6] in quantum theory. Here we ask about possibilit y of “zero knowledge” scenario which, for its simplicity, can be considered as...

    Full text available to download

  • No Quantum Realization of Extremal No-Signaling Boxes

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2016

    The study of quantum correlations is important for fundamental reasons as well as for quantum communication and information processing tasks. On the one hand, it is of tremendous interest to derive the correlations produced by measurements on separated composite quantum systems from within the set of all correlations obeying the no-signaling principle of relativity, by means of information-theoretic principles. On the other hand,...

    Full text to download in external service

  • Quantum security and theory of decoherence

    Publication

    We sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...

    Full text available to download

  • How do personality traits influence Open Government Data (OGD) adoption and usage? Investigating the indirect and moderating effects

    Publication
    • N. Rizun
    • C. H. Alexopoulos
    • S. Saxena
    • F. Kleiman
    • R. Matheus

    - Year 2023

    Open Government Data (OGD) research has focused for a long on the adoption and usage from the perspectives of users across different contexts. The underlying rationale for this specific focus is that OGD initiatives are undertaken to further citizen engagement with OGD for value generation and innovation purposes. Conceding that usage propensity is different across individuals, it is important to understand the influence of personality...

    Full text available to download

  • ON EGNOS MONITORING IN LOCAL CONDITIONS

    Any SBAS system should deliver to the user corrections to pseudoranges as well as information about the system integrity. In theory, as soon as the system is permanently monitored by RIMS stations, it is impossible to deliver the fault information to the user. However many observations shows that accuracy of EGNOS service in the same time are different in different places, which shows the influence of local conditions on them....

    Full text available to download

  • Observation Value Analysis – Integral Part of Bayesian Diagnostics

    The decision making process, in general, is understood as a process of selecting one of the available solutions to the problem. One of possible approaches supporting the process is Bayesian statistical decision theory providing a mathematical model to make decisions of a technical nature in conditions of uncertainty. Regarding above, a detailed subject of the research is to analyze the value of the observation, which is a part...

    Full text available to download

  • Firing map of an almost periodic input function

    Publication

    In mathematical biology and the theory of electric networks the firing map of an integrate-and-fire system is a notion of importance. In order to prove useful properties of this map authors of previous papers assumed that the stimulus function f of the system ẋ = f(t,x) is continuous and usually periodic in the time variable. In this work we show that the required properties of the firing map for the simplified model ẋ = f(t) still...

    Full text available to download

  • Principles of target DNA cleavage and the role of Mg2+ in the catalysis of CRISPR–Cas9

    Publication
    • Ł. Nierzwicki
    • P. R. Arantes
    • M. Jinek
    • G. Lisi
    • G. Palermo
    • K. East
    • J. Binz
    • R. Vsu
    • A. Mohd
    • E. Skeens
    • M. Pacesa

    - Nature Catalysis - Year 2022

    At the core of the CRISPR–Cas9 genome-editing technology, the endonuclease Cas9 introduces site-specific breaks in DNA. However, precise mechanistic information to ameliorate Cas9 function is still missing. Here, multimicrosecond molecular dynamics, free energy and multiscale simulations are combined with solution NMR and DNA cleavage experiments to resolve the catalytic mechanism of target DNA cleavage. We show that the conformation...

    Full text to download in external service

  • Fast Low-fidelity Wing Aerodynamics Model for Surrogate-Based Shape Optimization

    Publication

    Variable-fidelity optimization (VFO) can be efficient in terms of the computational cost when compared with traditional approaches, such as gradient-based methods with adjoint sensitivity information. In variable-fidelity methods, the directoptimization of the expensive high-fidelity model is replaced by iterative re-optimization of a physics-based surrogate model, which is constructed from a corrected low-fidelity model. The success...

    Full text available to download

  • Analysis of the objects images on the sea using Dempster-Shafer Theory

    Publication

    - Year 2016

    The paper presents the concept of using aerial and satellite imagery or images coming from the marine radar to identify and track vessels at sea. The acquired data were subjected to a highly advanced image analysis. The development of remote sensing techniques allows to gain a huge amount of data. These data are useful information source however usually we have to use different data mining methods to gain interested information....

    Full text to download in external service

  • Quantum metrology: Heisenberg limit with bound entanglement

    Publication

    - PHYSICAL REVIEW A - Year 2015

    Quantum entanglement may provide a huge boost in the precision of parameter estimation. However, quantum metrology seems to be extremely sensitive to noise in the probe state. There is an important still open question: What type of entanglement is useful as a resource in quantum metrology? Here we raise this question in relation to entanglement distillation. We provide a counterintuitive example of a family of bound entangled states...

    Full text available to download

  • Agent-based social network as a simulation of a market behaviour

    Publication

    - Year 2010

    Recent years and the outbreak of world's economic crisis in 2008 proved the crucial importance of reliable analysis of market dynamics. However, werarely apply models of proper detail level (the global prosperity forecast of 2007 can be seen as a grim proof). The behaviour of individuals and companies is far from being ideal and rational. Many claims that the economic paradigm of rational expectations (coming from J. Muth and R....

  • Risk Modelling with Bayesian Networks - Case Study: Construction of Tunnel under the Dead Vistula River in Gdansk

    The process of decision-making in public procurement of construction projects during the preparation and implementation phases ought to be supported by risk identification, assessment, and management. In risk assessment one has to take into account factors that lead to risk events (background info), as well as the information about the risk symptoms (monitoring info). Typically once the risks have been assessed a decision-maker...

    Full text available to download

  • Knowledge Flows in Cluster Organizations

    Publication

    - Year 2019

    This paper aims to identify knowledge flows in cluster organizations (COs). On the basis of a literature analysis on knowledge flows and cluster organizations, the following research question was formulated: What kind of knowledge flows can be identified in cluster organizations and what is their main characteristics? The paper is based on a literature analysis and Grounded Theory methodology, examining four purposefully selected...

    Full text to download in external service