Search results for: TOLERANT QUANTUM COMPUTATION - Bridge of Knowledge

Search

Search results for: TOLERANT QUANTUM COMPUTATION

Search results for: TOLERANT QUANTUM COMPUTATION

  • A macroscopic device for quantum computation

    Publication
    • D. Aerts
    • E. D'Hondt
    • B. D'Hooghe
    • M. Czachor
    • J. Dehaene
    • B. De Moor

    - INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS - Year 2008

    Przeanalizowano mechaniczny model kwantowego układu 2-bitowego. Model jest zilustrowany algorytmem Deutscha i Arvinda.

  • Consistency of Quantum Computation and the Equivalence Principle.

    Publication

    The equivalence principle, being one of the building blocks of general relativity, seems to be crucial for analysis of quantum effects in gravity. In this paper we consider the relation between the equivalence principle and the consistency of quantum information processing in gravitational field. We propose an analysis with a looped evolution consisting of steps both in the gravitational field and in the accelerated reference frame....

    Full text available to download

  • Cartoon computation: Quantum-like algorithms without quantum mechanics

    Zaproponowano formalizm prowadzący do algorytmów analogicznych do kwantowych, lecz wykorzystujący jedynie struktury geometryczne. Jako przykład sformułowano odpowiednik kwantowego algorytmu Deutscha-Jozsy.

    Full text available to download

  • QUANTUM INFORMATION & COMPUTATION

    Journals

    ISSN: 1533-7146

  • A new quantum-inspired approach to reduce the blocking probability of demands in resource-constrained path computation scenarios

    This article presents a new approach related with end-to-end routing, which, owing to quantum-inspired mecha-nisms of prediction of availability of network resources, results in improved blocking probability of incoming requests to establish transmission paths. The proposed scheme has been analyzed for three network topologies and several scenarios of network load. Obtained results show a significant (even twofold) reduction of...

    Full text to download in external service

  • International Conference on Experimental Implementation of Quantum Computation

    Conferences

  • Are quantum correlations symmetric?

    Publication

    - QUANTUM INFORMATION & COMPUTATION - Year 2010

    We provide operational definition of symmetry of entanglement: An entangled state contains symmetric entanglement if its subsystems can be exchanged (swapped) by means of local operations and classical communication. We show that in general states have asymmetric entanglement. This allows to construct nonsymmetric measure of entanglement, and a parameter that reports asymmetry of entanglement contents of quantum state. We propose...

    Full text to download in external service

  • Multiacces quantum communication and product higher rank numerical range

    Publication

    In the present paper we initiate the study of the product higher rank numerical range. The latter, being a variant of the higher rank numerical range, is a natural tool for study- ing a construction of quantum error correction codes for multiple access channels. We review properties of this set and relate it to other numerical ranges, which were recently introduced in the literature. Further, the concept is applied to the construction...

    Full text available to download

  • ON THE NON-LOCALITY OF TRIPARTITE NON-SINGALING BOXES EMERGING FROM WIRINGS

    Publication

    - QUANTUM INFORMATION & COMPUTATION - Year 2015

    It has been recently shown, that some of the tripartite boxes admittin g bilocal decom- position, lead to non-locality under wiring operation applied to t wo of the subsystems [R. Gallego et al. Physical Review Letters 109 , 070401 (2012)]. In the following, we study this phenomenon quantitatively. Basing on the known classes of bo xes closed un- der wirings, we introduce multipartite monotones which are count erparts of bipartite ones...

    Full text to download in external service

  • NO-BROADCASTING OF NON-SIGNALLING BOXES VIA OPERATIONS WHICH TRANSFORM LOCAL BOXES INTO LOCAL ONES

    Publication
    • P. Joshi
    • A. Grudka
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • R. Horodecki

    - QUANTUM INFORMATION & COMPUTATION - Year 2013

    We deal with families of probability distributions satisfying non-signalling condition, called non-signalling boxes and consider a class of operations that transform local boxes into local ones (the one that admit LHV model). We prove that any operation from this class cannot broadcast a bipartite non-local box with 2 binary inputs and outputs. We consider a function called anti-Robustness which can not decrease under these operations....

    Full text available to download

  • Marek Czachor prof. dr hab.

  • Direct detection of quantum entanglement

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2002

    Basing on positive maps separability criterion we propose the experimentally viable, direct detection of quantum entanglement. It is efficient and does not require any a priori knowledge about the state. For two qubits it provides a sharp (i.e., “if and only if”) separability test and estimation of amount of entanglement. We view this method as a new form of quantum computation, namely, as a decision problem with quantum data structure.

  • Realistic noise-tolerant randomness amplification using finite number of devices

    Publication
    • F. Brandão
    • R. Ramanathan
    • A. Grudka
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • T. Szarek
    • H. Wojewódka

    - Nature Communications - Year 2016

    Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...

    Full text available to download

  • Long-distance quantum communication over noisy networks without long-time quantum memory

    Publication
    • P. Mazurek
    • A. Grudka
    • M. Horodecki
    • P. Horodecki
    • J. Łodyga
    • Ł. Pankowski
    • A. Przysiężna

    - PHYSICAL REVIEW A - Year 2014

    The problem of sharing entanglement over large distances is crucial for implementations of quantum cryptography. A possible scheme for long-distance entanglement sharing and quantum communication exploits networks whose nodes share Einstein-Podolsky-Rosen (EPR) pairs. In Perseguers et al. [Phys. Rev. A 78, 062324 (2008)] the authors put forward an important isomorphism between storing quantum information in a dimension D and transmission...

    Full text available to download

  • Time travel without paradoxes: Ring resonator as a universal paradigm for looped quantum evolutions

    Publication

    A ring resonator involves a scattering process where a part of the output is fed again into the input. The same formal structure is encountered in the problem of time travel in a neighborhood of a closed timelike curve (CTC). We know how to describe quantum optics of ring resonators, and the resulting description agrees with experiment. We can apply the same formal strategy to any looped quantum evolution, in particular to the...

    Full text available to download

  • Hidden Tensor Structures

    Publication

    - ENTROPY - Year 2024

    Any single system whose space of states is given by a separable Hilbert space is automatically equipped with infinitely many hidden tensor-like structures. This includes all quantum mechanical systems as well as classical field theories and classical signal analysis. Accordingly, systems as simple as a single one-dimensional harmonic oscillator, an infinite potential well, or a classical finite-amplitude signal of finite duration...

    Full text available to download

  • Binary-Encounter Model for Direct Ionization of Molecules by Positron-Impact

    Publication

    We introduce two models for the computation of direct ionization cross sections by positron impact over a wide range of collision energies. The models are based on the binary-encounter-Bethe model and take into account an extension of the Wannier theory. The cross sections computed with these models show good agreement with experimental data. The extensions improve the agreement between theory and experiment for collision energies...

    Full text available to download

  • Linear game non-contextuality and Bell inequalities—a graph-theoretic approach

    Publication

    - NEW JOURNAL OF PHYSICS - Year 2016

    We study the classical and quantum values of a class of one-and two-party unique games, that generalizes the well-known XOR games to the case of non-binary outcomes. In the bipartite case the generalized XOR(XOR-d) games we study are a subclass of the well-known linear games. We introduce a 'constraint graph' associated to such a game, with the constraints defining the game represented by an edge-coloring of the graph. We use the...

    Full text available to download

  • Karolina Lademann mgr

    People

    Curriculum vitae

  • PCA based Fault Tolerant MPC

    Publication

    - Year 2007

    This chapter presents a Fault Tolerant - Model Predictive Control (FT-MPC) schemes for sensor faults accommodation. A Fault Detection and Isolation (FDI) Unit, which is an integral part of FT-MPC system, is based on the Principal Component Analysis (PCA) method. Introduced approach enables efficient bias and drift faults accommodation in single, as well as simultaneous faults case. Simple simulation exercise is presented.Rozdział...

  • Harmony Search for Self-configuration of Fault–Tolerant and Intelligent Grids

    Publication

    - Year 2016

    In this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Self-configuration of computer grids lies in the fact that new computer nodes are automatically configured by software agents and then integrated into the grid. A base node works due to several configuration parameters that define some aspects of data communications and energy power consumption. We...

    Full text to download in external service

  • APPLIED MATHEMATICS AND COMPUTATION

    Journals

    ISSN: 0096-3003 , eISSN: 1873-5649

  • Semantics for an Interdisciplinary Computation

    Publication

    - Year 2013

    Semantics for an interdisciplinary computation is becoming increasingly difficult to capture while dealing with multi-domain problems. Expertise from Computer Science, Computer Engineering, Electrical Engineering, and other disciplines merges as engineering challenges in modern systems, such as, Cyber-Physical Systems, Smart Cities, and Bionic Systems must be tackled in a methodological manner. In this paper, a paradigm for formalization...

    Full text to download in external service

  • Optimizing the computation of a parallel 3D finite difference algorithm for graphics processing units

    Publication
    • J. Porter-Sobieraj
    • S. Cygert
    • K. Daniel
    • J. Sikorski
    • M. Słodkowski

    - CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE - Year 2015

    This paper explores the possibilities of using a graphics processing unit for complex 3D finite difference computation via MUSTA‐FORCE and WENO algorithms. We propose a novel algorithm based on the new properties of CUDA surface memory optimized for 2D spatial locality and compare it with 3D stencil computations carried out via shared memory, which is currently considered to be the best approach. A case study was performed for...

    Full text to download in external service

  • Zero-knowledge convincing protocol on quantum bit is impossible

    Publication

    - Quantum Journal - Year 2017

    It is one of fundamental features of quantum formalism that o n one hand it provides a new infor- mation processing resources and on the other hand puts funda mental constraints on the processing of quantum information implying “no-go” theorems for cloni ng [1–3], bit commitment [4, 5] and deleting [6] in quantum theory. Here we ask about possibilit y of “zero knowledge” scenario which, for its simplicity, can be considered as...

    Full text available to download

  • Harmony Search to Self-Configuration of Fault-Tolerant Grids for Big Data

    In this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Some tasks related to big data processing have been considered. Moreover, two criteria have been applied to evaluate quality of grids. The first criterion is a probability that all tasks meet their deadlines and the second one is grid reliability. Furthermore, some intelligent agents based on harmony...

    Full text to download in external service

  • Materials science. Quantum particle approach. 2022.

    e-Learning Courses
    • M. Bobrowski

    quantum methods for materials and molecular modeling.

  • Material Science Quantum Particle Approach 2021

    e-Learning Courses
    • M. Bobrowski

    quantum methods for materials and molecular modeling.

  • Quantum entanglement

    Publication

    - REVIEWS OF MODERN PHYSICS - Year 2009

    All our former experience with application of quantum theory seems to say that what is predicted by quantum formalism must occur in the laboratory. But the essence of quantum formalism-entanglement, recognized by Einstein, Podolsky, Rosen, and Schrödinger-waited over 70 years to enter laboratories as a new resource as real as energy. This holistic property of compound quantum systems, which involves nonclassical correlations between...

    Full text to download in external service

  • Materials science. Quantum particle approach. 2023.

    e-Learning Courses
    • M. Bobrowski

    Quantum ideas applied for particle systems and for chemical reactions.

  • Blurred quantum Darwinism across quantum reference frames

    Publication

    Quantum Darwinism describes objectivity of quantum systems via their correlations with their environment--information that hypothetical observers can recover by measuring the environments. However, observations are done with respect to a frame of reference. Here, we take the formalism of [Giacomini, Castro-Ruiz, & Brukner. Nat Commun 10, 494 (2019)], and consider the repercussions on objectivity when changing quantum reference...

    Full text available to download

  • Quantum randomness protected against detection loophole attacks

    Publication
    • P. A. Mironowicz
    • G. Cañas
    • J. Cariñe
    • E. S. Gómez
    • J. F. Barra
    • A. Cabello
    • G. B. Xavier
    • G. Lima
    • M. Pawłowski

    - Quantum Information Processing - Year 2021

    Device and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....

    Full text to download in external service

  • Introduction to quantum mechanics 2022/2023

    e-Learning Courses
    • S. Winczewski

    Introduction to quantum mechanics, kierunek: Nanotechnologia, specjalność: Nanostructures and computer simulations in material science, II stopień, semestr 1

  • Anomalous decay of quantum correlations of quantum-dot qubits

    Publication

    - PHYSICAL REVIEW A - Year 2013

    We study the evolution of quantum correlations, quantified by the geometric discord, of two excitonic quantum-dot qubits under the influence of the phonon environment. We show that the decay of these correlations differs substantially from the decay of entanglement. Instead of displaying sudden-death-type behavior, the geometric discord shows a tendency to undergo transitions between different types of decay, is sensitive to nonlocal...

    Full text available to download

  • Quantum Coherence as a Resource

    Publication
    • A. Streltsov
    • G. Adesso
    • M. B. Plenio

    - REVIEWS OF MODERN PHYSICS - Year 2017

    The coherent superposition of states, in combination with the quantization of observables, represents one of the most fundamental features that mark the departure of quantum mechanics from the classical realm. Quantum coherence in many-body systems embodies the essence of entanglement and is an essential ingredient for a plethora of physical phenomena in quantum optics, quantum information, solid state physics, and nanoscale thermodynamics....

    Full text available to download

  • Fault tolerant guarding of grids

    Publication

    - Year 2006

    W pracy rozważano problem strzeżenia krat dwuwymiarowych przez dwa niezależne zespoły straży. Wykazano, że zagadnienie minimalizacyjne jest NP-trudne i zaproponowano dla niego wielomianowy algorytm 6/5-przybliżony.

    Full text to download in external service

  • Quantum entanglement in time

    Publication

    In this paper we present a concept of quantum entanglement in time in a context of entangled consistent histories. These considerations are supported by presentation of necessary tools closely related to those acting on a space of spatial multipartite quantum states. We show that in similarity to monogamy of quantum entanglement in space, quantum entanglement in time is also endowed with this property for a particular history....

    Full text available to download

  • Purely quantum superadditivity of classical capacities of quantum multiple access channels

    Publication

    We are studying classical capacities of quantum memoryless multiaccess channels in geometric terms and we are revealing a break of additivity of the Holevo-like capacity. This effect is a purely quantum mechanical one, since, as we point out, the capacity regions of all classical memoryless multiaccess channels are additive. It is the first such effect revealed in the field of classical information transmission via quantum channels.

    Full text available to download

  • Quantum origins of objectivity

    Publication

    - PHYSICAL REVIEW A - Year 2015

    In spite of all of its successes, quantum mechanics leaves us with a central problem: How does nature create a bridge from fragile quanta to the objective world of everyday experience? Here we find that a basic structure within quantum mechanics that leads to the perceived objectivity is a so-called spectrum broadcast structure. We uncover this based on minimal assumptions, without referring to any dynamical details or a concrete...

    Full text available to download

  • The Ellenbogen's “Matter as Software” Concept for Quantum Computer Implementation. C60 and X@C60 Molecules as Available Molecular Building Blocks (MBBs) for Tip-Based Nanofabrication (TBN) of Quantum Computing Devices

    Publication

    - Quantum Matter - Year 2015

    The TBN bottom-up strategy of building quantum devices from C60 and X@C60 MBBs is proposed as an extension of the Ellenbogen's “Matter as Software” idea to quantum information processing. The capped SW or DW CNT STM tip is considered as device for manipulating C60 and X@C60 molecules. In this article, the possibility of using easily available on the market C60 Fullerene and endohedral X@C60 molecules together with commercial CNT...

    Full text to download in external service

  • The Ellenbogen's "Matter as Software" Concept for Quantum Computer Implementation: III. Selection of X@C60 Molecular Building Blocks (MBBs) for Tip-Based Nanofabrication (TBN) of Trapped Neutral Atom Quantum Computing Devices

    Publication

    - Quantum Matter - Year 2016

    The selection of guest atoms X of X@C60 MBBs for TBN of trapped neutral atom quantum computing devices is reported. Assuming the all-optical quantum computing as a final target stage, the two criteria are most important: the charge q accumulated on the C60 host must be as low as possible, and the atom X must have one or more available excited states within the band falling into the low energy window of neutral C60 molecule electronic...

    Full text to download in external service

  • Quantum security and theory of decoherence

    Publication

    We sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...

    Full text available to download

  • FPGA computation of magnitude of complex numbers using modified CORDIC algorithm

    In this work we present computation of the magnitude of complex numbers using a modified version of the CORDIC algorithm that uses only five iterations. The relationship between the computation error and the number of CORDIC iterations are presented for floating-point and integer arithmetics. The proposed modification of CORDIC for integer arithmetic relies upon the introduction of correction once basic computations are performed...

    Full text available to download

  • Hybrid no-signaling-quantum correlations

    Publication

    - NEW JOURNAL OF PHYSICS - Year 2022

    Fundamental investigations in non-locality have shown that while the no-signaling principle alone is not sufficient to single out the set of quantum non-local correlations, local quantum mechanics and no-signaling together exactly reproduce the set of quantum correlations in the two-party Bell scenario. Here, we introduce and study an intermediate hybrid no-signaling quantum set of non-local correlations that we term HNSQ in the...

    Full text available to download

  • The symmetric extendibility of quantum states

    Studies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...

    Full text to download in external service

  • Journal of Chemical Theory and Computation

    Journals

    ISSN: 1549-9618 , eISSN: 1549-9626

  • Quantum privacy witness

    Publication

    - PHYSICAL REVIEW A - Year 2012

    While it is usually known that the mean value of a single observable is enough to detect entanglement or its distillability, the counterpart of such an approach in the case of quantum privacy has been missing. Here we develop the concept of a privacy witness, i.e., a single observable that may detect the presence of the secure key even in the case of bound entanglement. Then we develop the notion of secret-key estimation based...

    Full text available to download

  • Remote command and control capabilities for data acquisition systems provided by delay-tolerant network mechanisms

    Publication

    The paper presents an assessment of a remote device reconfiguration service employing a Delay Tolerant Network (DTN) mechanisms. This service has been implemented as a part of a communication appliance dedicated to marine data transfer in off-shore and open sea areas. The service has been successfully deployed and validation test have been completed. The practical use-case has been defined as remote access to the equipment operating...

    Full text to download in external service

  • Semi-definite programming and quantum information

    This paper presents a comprehensive exploration of semi-definite programming (SDP) techniques within the context of quantum information. It examines the mathematical foundations of convex optimization, duality, and SDP formulations, providing a solid theoretical framework for addressing optimization challenges in quantum systems. By leveraging these tools, researchers and practitioners can characterize classical and quantum correlations,...

    Full text available to download

  • Superadditivity of two quantum information resources

    Publication

    - Science Advances - Year 2017

    Entanglement is one of the most puzzling features of quantum theory and a principal resource for quantum information processing. It is well known that in classical information theory, the addition of two classical information resources will not lead to any extra advantages. On the contrary, in quantum information, a spectacular phenomenon of the superadditivity of two quantum information resources emerges. It shows that quantum...

    Full text available to download