Search results for: GENUINELY MULTIPARTY ENTANGLEMENT, GENUINELY ENTANGLED SUBSPACE,COMPLETELY ENTANGLED SUBSPACE,
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublicationIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
Experimental certification of an informationally complete quantum measurement in a device-independent protocol
PublicationMinimal informationally complete positive operator-valued measures (MIC-POVMs) are special kinds of measurement in quantum theory in which the statistics of their d2-outcomes are enough to reconstruct any d-dimensional quantum state. For this reason, MIC-POVMs are referred to as standard measurements for quantum information.Here, we report an experiment with entangled photon pairs that certifies, for what we believe is the first...
-
Efficient model order reduction for FEM analysis of waveguide structures and resonators
PublicationAn efficient model order reduction method for three-dimensional Finite Element Method (FEM) analysis of waveguide structures is proposed. The method is based on the Efficient Modal Order Reduction (ENOR) algorithm for creating macro-elements in cascaded subdomains. The resulting macro-elements are represented by very compact submatrices, leading to significant reduction of the overall number of unknowns. The efficiency of the model...
-
Efficacy of modal curvature damage detection in various pre-damage data assumptions and modal identification techniques
PublicationThe efficacy of modal curvature approach for damage localization is discussed in the paper in the context of input data. Three modal identification methods, i.e., Eigensystem Realization Algorithm (ERA), Natural Excitation Technique with ERA (NExT-ERA) and Covariance Driven Stochastic Subspace Identification (SSI-Cov), and four methods of determining baseline data, i.e., real measurement of the undamaged state, analytical function,...
-
Robustness of quantum-randomness expansion protocols in the presence of noise
PublicationIn this paper we investigate properties of several randomness generation protocols in the device independent framework. Using Bell-type inequalities it is possible to certify that the numbers generated by an untrusted device are indeed random. We present a selection of certificates which guarantee two bits of randomness for each run of the experiment in the noiseless case and require the parties to share a maximally entangled state....
-
Can Communication Power of Separable Correlations Exceed That of Entanglement Resource?
PublicationThe scenario of remote state preparation with a shared correlated quantum state and one bit of forward communication [B. Dakić et al., Nat. Phys. 8, 666 (2012)] is considered. Optimization of the transmission efficiency is extended to include general encoding and decoding strategies. The importance of the use of linear fidelity is recognized. It is shown that separable states cannot exceed the efficiency of entangled states by...
-
Numerical Methods for Partial Differential Equations
e-Learning CoursesCourse description: This course focuses on modern numerical techniques for linear and nonlinear elliptic, parabolic and hyperbolic partial differential equations (PDEs), and integral equations fundamental to a large variety of applications in science and engineering. Topics include: formulations of problems in terms of initial and boundary value problems; finite difference and finite element discretizations; boundary element approach;...
-
Adversarial attack algorithm for traffic sign recognition
PublicationDeep learning suffers from the threat of adversarial attacks, and its defense methods have become a research hotspot. In all applications of deep learning, intelligent driving is an important and promising one, facing serious threat of adversarial attack in the meanwhile. To address the adversarial attack, this paper takes the traffic sign recognition as a typical object, for it is the core function of intelligent driving. Considering...
-
Introduction to Numerical Simulation
e-Learning CoursesCourse description: This interdisciplinary course provides an introduction to computational techniques for the simulation of a broad range of engineering and physical systems. Concepts and methods discussed are widely illustrated by applications drawn from electrical, mechanical, and chemical engineering. Topics include: mathematical formulations of simulation problems; sparse direct and iterative linear system solution techniques,...
-
A Compact Basis for Reliable Fast Frequency Sweep via the Reduced-Basis Method
PublicationA reliable reduced-order model (ROM) for fast frequency sweep in time-harmonic Maxwell’s equations by means of the reduced-basis method is detailed. Taking frequency as a parameter, the electromagnetic field in microwave circuits does not arbitrarily vary as frequency changes, but evolves on a very low-dimensional manifold. Approximating this low-dimensional manifold by a low dimension subspace, namely, reduced-basis space, gives...
-
Device-independent quantum key distribution based on measurement inputs
PublicationWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Generalized measurements on qubits in quantum randomness certification and expansion
PublicationQuantum mechanics has greatly impacted our understanding of microscopic nature. One of the key concepts of this theory is generalized measurements, which have proven useful in various quantum information processing tasks. However, despite their significance, they have not yet been shown empirically to provide an advantage in quantum randomness certification and expansion protocols. This investigation explores scenarios where generalized...
-
Swapping Space for Time: An Alternative to Time-Domain Interferometry
PublicationYoung's double-slit experiment [1] requires two waves produced simultaneously at two different points in space. In quantum mechanics the waves correspond to a single quantum object, even as complex as a big molecule. An interference is present as long as one cannot tell for sure which slit is chosen by the object. The more we know about the path, the worse the interference. In the paper we show that quantum mechanics allows for...
-
Chemical Pressure Tuning Magnetism from Pyrochlore to Triangular Lattices
PublicationGeometrically frustrated lattices combined with magnetism usually host quantum fluctuations that suppress magnetic orders and generate highly entangled ground states. Three-dimensionally (3D) frustrated magnets generally exist in the diamond and pyrochlore lattices, while two-dimensionally (2D) frustrated geometries contain Kagomé, triangular, and honeycomb lattices. In this work, we reported using chemical pressure to tune the magnetism...
-
Experimental certification of more than one bit of quantum randomness in the two inputs and two outputs scenario
PublicationOne of the striking properties of quantum mechanics is the occurrence of the Bell-type non-locality. They are a fundamental feature of the theory that allows two parties that share an entangled quantum system to observe correlations stronger than possible in classical physics. In addition to their theoretical significance, non-local correlations have practical applications, such as device-independent randomness generation, providing...
-
The effect of groyne field on trapping macroplastic. Preliminary results from laboratory experiments
PublicationMacroplastic, a precursor of microplastic pollution, has become a new scope of research interest. However, the physical processes of macroplastic transport and deposition in rivers are poorly understood, which makes the decisions of where to locate macroplastic trapping infrastructure difficult. In this research, we conducted a series of experiments in a laboratory channel, exploring the impact of groynes and flexible artificial...
-
A system for Direction-Of-Arrival estimation in ISM 2.4 GHz frequency band based on ESPAR antenna and SDR technology
PublicationDetermination of the direction of the signal arrival (DOA) finds many applications in various areas of science and industry. Knowledge of DOA is used, among others to determine the position of a satellite with a low Earth orbit (LEO), localization of people and things as well as in research of wireless communication systems, for instance the determination of the number of...
-
Numerical Methods
e-Learning CoursesNumerical Methods: for Electronics and Telecommunications students, Master's level, semester 1 Instructor: Michał Rewieński, Piotr Sypek Course description: This course provides an introduction to computational techniques for the simulation and modeling of a broad range of engineering and physical systems. Concepts and methods discussed are widely illustrated by various applications including modeling of integrated circuits,...
-
Jaroslaw Spychala dr
PeopleOprócz bardzo dobrego wykształcenia osoba posiada również wieloletnie doświadczenie zawodowe, które jest poświadczeniem tego, że potrafi wykorzystać swoją wiedzę teoretyczną w praktycznych działaniach. Doświadczenie zawodowe jest bardzo bogate i rozbudowane. Ze względu na nabyte całkiem nowe umiejętności zwiększa się atrakcyjność doświadczonego pracownika. Są to między innymi kreatywne myślenie, zorientowanie na cel, odporność...