Filters
total: 25297
-
Catalog
- Publications 3269 available results
- Journals 611 available results
- Conferences 246 available results
- Publishing Houses 1 available results
- People 249 available results
- Projects 12 available results
- Research Teams 1 available results
- e-Learning Courses 181 available results
- Events 4 available results
- Open Research Data 20723 available results
displaying 1000 best results Help
Search results for: ANALYTIC INFORMATION THEORY
-
Product Graph Invariants with Applications in the Theory of Information
PublicationThere are a large number of graph invariants. In the paper, we consider some of them, e.g. the independence and chromatic numbers. It is well know that we cannot efficiently calculate these numbers for arbitrary graphs. In the paper we present relations between these invariants and concepts from the theory of information. Concepts such as source coding and transmission over a noisy channel with zero probability of error are modeled...
-
IEEE TRANSACTIONS ON INFORMATION THEORY
Journals -
Foundations and Trends in Communications and Information Theory
Journals -
Journal of Information Science Theory and Practice
Journals -
Information Theory and Coding 2023/2024
e-Learning CoursesThe course is an auxiliary tool for completing the subject Information Theory and Coding.
-
Information theory and coding 2024/2025
e-Learning CoursesThe course is an auxiliary tool for completing the subject Information Theory and Coding.
-
Information Theory and Coding - 2022/2023
e-Learning Courses -
Information Theory Workshop
Conferences -
Information Visualisation Theory and Practice
Conferences -
Workshop in Information Security Theory and Practices
Conferences -
IEEE International Symposium on Information Theory
Conferences -
International Conference on the Theory of Information Retrieval (The 3rd ACM International Conference on the Theory of Information Retrieval)
Conferences -
Average Redundancy of the Shannon Code for Markov Sources
PublicationIt is known that for memoryless sources, the average and maximal redundancy of fixed–to–variable length codes, such as the Shannon and Huffman codes, exhibit two modes of behavior for long blocks. It either converges to a limit or it has an oscillatory pattern, depending on the irrationality or rationality, respectively, of certain parameters that depend on the source. In this paper, we extend these findings, concerning the Shannon...
-
TAI: Algorithmic Information Theory: Kolmogorov Complexity
Conferences -
International Symposium on Information Theory and Its Applications
Conferences -
On the Limiting Distribution of Lempel-Ziv’78 Redundancy for Memoryless Sources
PublicationWe study the Lempel-Ziv'78 algorithm and show that its (normalized) redundancy rate tends to a Gaussian distribution for memoryless sources. We accomplish it by extending findings from our 1995 paper, in particular, by presenting a new simplified proof of the central limit theorem (CLT) for the number of phrases in the LZ'78 algorithm. We first analyze the asymptotic behavior of the total path length in the associated digital search...
-
Squashed entanglement for multipartite states and entanglement measures based on the mixed convex roof
PublicationNew measures of multipartite entanglement are constructedbased on two definitions of multipartite information anddifferent methods of optimizing over extensions of the states. Oneis a generalization of the squashed entanglement where one takesthe mutual information of parties conditioned on the state's extensionand takes the infimum over such extensions. Additivity ofthe multipartite squashed entanglement is proved for both versionsof...
-
Types of Markov Fields and Tilings
PublicationThe method of types is one of the most popular techniques in information theory and combinatorics. However, thus far the method has been mostly applied to one-dimensional Markov processes, and it has not been thoroughly studied for general Markov fields. Markov fields over a finite alphabet of size m ≥ 2 can be viewed as models for multi-dimensional systems with local interactions. The locality of these interactions is represented...
-
International Conference on the Theory and Application of Cryptology and Information Security
Conferences -
General paradigm for distilling classical key from quantum states
PublicationIn this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...
-
On the Characteristic Graph of a Discrete Symmetric Channel
PublicationWe present some characterizations of characteristic graphs of row and/or column symmetric channels. We also give a polynomial-time algorithm that decides whether there exists a discrete symmetric channel whose characteristic graph is equal to a given input graph. In addition, we show several applications of our results.
-
A few steps more towards NPT bound entanglement
PublicationIn this paper, existence of bound entangled states with nonpositive partial transpose (NPT) is considered. As one knows, existence of such states would in particular imply nonadditivity of distillable entanglement. Moreover, it would rule out a simple mathematical description of the set of distillable states. The particular state, known to be 1-copy nondistillable and supposed to be bound entangled, is considered. The problem of...
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublicationIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublicationIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublicationThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
IEEE Information Theory Workshop on Detection, Estimation, Classification and Imaging
Conferences -
Extending loophole-free nonlocal correlations to arbitrarily large distances
PublicationQuantum theory allows spatially separated observers to share nonlocal correlations, which enable them to accomplish classically inconceivable information processing and cryptographic feats. However, the distances over which nonlocal correlations can be realized remain severely limited due to their high fragility to noise and high threshold detection efficiencies. To enable loophole- free nonlocality across large distances, we introduce...
-
The OpenMolcas Web: A Community-Driven Approach to Advancing Computational Chemistry
Open Research DataThe developments of the open-source OpenMolcas chemistry software environment since spring 2020 are described, with a focus on novel functionalities accessible in the stable branch of the package or via interfaces with other packages. These developments span a wide range of topics in computational chemistry and are presented in thematic sections: electronic...
-
Robert Piotrowski dr hab. inż.
PeopleRobert Piotrowski jest absolwentem Wydziału Elektrotechniki i Automatyki (2001r., kierunek: Automatyka i Robotyka) oraz Wydziału Zarządzania i Ekonomii (2002r., kierunek: Organizacja Systemów Produkcyjnych) Politechniki Gdańskiej. Od 2005 roku jest zatrudniony na Wydziale Elektrotechniki i Automatyki, aktualnie w Katedrze Inteligentnych Systemów Sterowania i Wspomagania Decyzji. W 2005 roku obronił rozprawę doktorską (Automatyka...
-
Application of the numerical-analytic method for systems of differential equations with parameter
PublicationThe numerical-analytic method is applied to systems of differential equations with parameter under the assumption that the corresponding functions satisfy the Lipschitz conditions in matrix notation. We also obtain several existence results for problems with deviations of an argument
-
Workshop on Analytic Algorithmics and Combinatorics
Conferences -
Tomasz Janowski dr
PeopleTomasz Janowski is the Head of the Department of Informatics in Management, Gdańsk University of Technology, Poland; Invited Professor at the Department for E-Governance and Administration, University for Continuing Education Krems, Austria; and Co-Editor-in-Chief of Government Information Quarterly, Elsevier. Previously, he was the founder and head of the United Nations University Operating Unit on Policy-Driven Electronic Governance...
-
Marek Czachor prof. dr hab.
People -
Jerzy Konorski dr hab. inż.
PeopleJerzy Konorski received his M. Sc. degree in telecommunications from Gdansk University of Technology, Poland, and his Ph. D. degree in computer science from the Polish Academy of Sciences, Warsaw, Poland. In 2007, he defended his D. Sc. thesis at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. He has authored over 150 papers, led scientific projects funded by the European Union,...
-
Jolanta Łopatowska dr inż.
PeopleJolanta Łopatowska, assistant professor at the Department of Management Engineering and Quality at the Faculty of Management and Economics, is a graduate of the Faculty of Electronics at Gdańsk University of Technology and Institute of Organization and Design of Production Systems at Gdańsk University of Technology. She obtained Ph.D. degree in the discipline of Economic Science. Her scientific and research interests focus on organizationally...
-
International Conference on Theorem Proving with Analytic Tableaux and Related Methods
Conferences -
A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence
PublicationWe resolve a conjecture proposed by D.E. Knuth concerning a recurrence arising in the satisfiability problem. Knuth's recurrence resembles recurrences arising in the analysis of tries, in particular PATRICIA tries, and asymmetric leader election. We solve Knuth's recurrence exactly and asymptotically, using analytic techniques such as the Mellin transform and analytic depoissonization.
-
Application of Analytic Signal and Smooth Interpolation in Pulse Width Modulation for Conventional Matrix Converters
PublicationThe paper proposes an alternative and novel approach to the PWM duty cycles computation for Conventional Matrix Converters (CMC) fed by balanced, unbalanced or non–sinusoidal AC voltage sources. The presented solution simplifies the prototyping of direct modulation algorithms. PWM duty cycles are calculated faster by the smooth interpolation technique, using only vector coordinates, without trigonometric functions and angles. Both...
-
MULTI-CRITERIA INVESTMENT DECISION SUPPORT MODEL USING FUZZY ANALYTIC HIERARCHY PROCESS (F-AHP) METHOD FOR POWER INDUSTRY
PublicationIn this paper, the comparative analysis of two wind farm construction projects was presented. This particular type of analysis is commonly applied before purchasing investment project being in a planning phase by a company interested in its development. Conduction of this type of analysis is prompted by the necessity to take into consideration the requirements of Polish legislation. Comparison of wind farm construction projects...
-
Analiza lokalizacji biogazowni metodami AHP i taksonomi numerycznej - porównanie metod
PublicationArtykuł przedstawia porównanie wielokryterialnej metody Analytic Hierarchy Proces oraz taksonomii numerycznej w oparciu o wybór lokalizacji biogazowni.
-
Average Size of a Suffix Tree for Markov Sources
PublicationWe study a suffix tree built from a sequence generated by a Markovian source. Such sources are more realistic probabilistic models for text generation, data compression, molecular applications, and so forth. We prove that the average size of such a suffix tree is asymptotically equivalent to the average size of a trie built over n independentsequences from the same Markovian source. This equivalenceis only known for memoryless...
-
Zastosowanie metody AHP do oceny zagrożeń na stanowiskach pracy.
PublicationW artykule przedstawiono podstawy wielokryterialnej metody wspomagania decyzji AHP (ang. Analytic Hierarchy Process) oraz jej zastosowanie do oceny zagrożeń na stanowiskach pracy.
-
Analytical Steady-State Model of the Pipeline Flow Process
PublicationThe paper addresses the issue of modeling the flow process in transmission pipelines. A base model used for numerical simulation is introduced. Under certain assumptions concerning steady state analysis, the differential equations describing the process are solved analytically for two cases: zero and nonzero inclination angle α. These equations describe a constant flow rate and a corresponding distribution of the pressure along...
-
Assessment Of the Relevance of Best Practices in The Development of Medical R&D Projects Based on Machine Learning
PublicationMachine learning has emerged as a fundamental tool for numerous endeavors within health informatics, bioinformatics, and medicine. However, novices among biomedical researchers and IT developers frequently lack the requisite experience to effectively execute a machine learning project, thereby increasing the likelihood of adopting erroneous practices that may result in common pitfalls or overly optimistic predictions. The paper...
-
Long-distance quantum communication over noisy networks without long-time quantum memory
PublicationThe problem of sharing entanglement over large distances is crucial for implementations of quantum cryptography. A possible scheme for long-distance entanglement sharing and quantum communication exploits networks whose nodes share Einstein-Podolsky-Rosen (EPR) pairs. In Perseguers et al. [Phys. Rev. A 78, 062324 (2008)] the authors put forward an important isomorphism between storing quantum information in a dimension D and transmission...
-
Evaluating Industry 4.0 Implementation Challenges Using Interpretive Structural Modeling and Fuzzy Analytic Hierarchy Process
PublicationThe fourth industrial revolution known as Industry 4.0 is reshaping and evolving the way industries produce products and individuals live and work therefore, gaining massive attraction from academia, business and politics. The manufacturing industries are optimistic regarding the opportunities Industry 4.0 may offer such as, improved efficiency, productivity and customization. The present research contributes to the Industry 4.0...
-
An analysis of domain-based ship collision risk parameters
PublicationAccording to a lot of contemporary research on ship collision avoidance the classic approach parameters – distance at closest point of approach (DCPA) and time to the closest point of approach (TCPA) – are not sufficient for estimating ship collision risk and for planning evasive manoeuvres. Consequently new measures are introduced, often utilizing the concept of a ship domain. Their drawback, up to this point, was the lack of...
-
Fault diagnosing system of wheeled tractors
PublicationA defect of complex wheeled tractor assembles most frequently negative influence on exploitation efficiency, safety and exhaust gases emission. Structure complexity of wheeled tractors requires more and more advanced diagnostic methods for identification of their serviceable possibilities as well in manufacturing step as in exploitation. In classical diagnosing methods of wheeled tractor defects states mapping by measured diagnostic...
-
Problem of inconsistent and contradictory judgements in pairwise comparisonmethod in sense of AHP
PublicationThe aim of this paper is to show the relationship between inconsistent and contradictory matrices of data obtained as a result of the pairwise comparison of factors in the sense of the Analytic Hierarchy Process. The consistency check is performed to ensure that judgements are neither random nor illogical. This paper shows that even if a matrix will pass a consistency test successfully, it can be contradictory. Moreover an algorithm...
-
Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system
PublicationMotivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.