Filters
total: 49
Search results for: VIOLATION
-
Quantum communication complexity advantage implies violation of a Bell inequality
PublicationWe obtain a general connection between a quantum advantage in communication complexity and non-locality. We show that given any protocol offering a (sufficiently large) quantum advantage in communication complexity, there exists a way of obtaining measurement statistics which violate some Bell inequality. Our main tool is port-based teleportation. If the gap between quantum and classical communication complexity can grow arbitrarily...
-
Visual Detection of People Movement Rules Violation in Crowded Indoor Scenes
PublicationThe paper presents a camera-independent framework for detecting violations of two typical people movement rules that are in force in many public transit terminals: moving in the wrong direction or across designated lanes. Low-level image processing is based on object detection with Gaussian Mixture Models and employs Kalman filters with conflict resolving extensions for the object tracking. In order to allow an effective event...
-
Quantum Steering Inequality with Tolerance for Measurement-Setting Errors: Experimentally Feasible Signature of Unbounded Violation
Publicationuantum steering is a relatively simple test for proving that the values of quantum-mechanical measurement outcomes come into being only in the act of measurement. By exploiting quantum correlations, Alice can influence — steer — Bob ’ s physical system in a way that is impossible in classical mechanics, as shown by the violation of steering inequalities. Demonstrating this and similar quantum effects for systems of increasing size,...
-
Trade-offs in multiparty Bell-inequality violations in qubit networks
PublicationTwo overlapping bipartite binary input Bell inequalities cannot be simultaneously violated as this would contradict the usual no-signalling principle. This property is known as monogamy of Bell inequality violations and generally Bell monogamy relations refer to trade-offs between simultaneous violations of multiple inequalities. It turns out that multipartite Bell inequalities admit weaker forms of monogamies that allow for violations...
-
Strong Monogamies of No-Signaling Violations for Bipartite Correlation Bell Inequalities
PublicationThe phenomenon of monogamy of Bell inequality violations is interesting both from the fundamental perspective as well as in cryptographic applications such as the extraction of randomness and secret bits. In this article, we derive new and stronger monogamy relations for violations of Bell inequalities in general no-signaling theories. These relations are applicable to the class of binary output correlation inequalities known as...
-
Free randomness amplification using bipartite chain correlations
PublicationA direct analysis of the task of randomness amplification from Santha-Vazirani sources using the violation of the chained Bell inequality is performed in terms of the convex combination of no-signaling boxes required to simulate quantum violation of the inequality. This analysis is used to find the exact threshold value of the initial randomness parameter from which perfect randomness can be extracted in the asymptotic limit of...
-
Elemental and tight monogamy relations in nonsignaling theories
PublicationPhysical principles constrain the way nonlocal correlations can be distributed among distant parties. These constraints are usually expressed by monogamy relations that bound the amount of Bell inequality violation observed among a set of parties by the violation observed by a different set of parties. We prove here that much stronger monogamy relations are possible for nonsignaling correlations by showing how nonlocal correlations...
-
Robust amplification of Santha-Vazirani sources with three devices
PublicationWe demonstrate that amplification of arbitrarily weak randomness is possible using quantum resources. We present a randomness amplification protocol that involves Bell experiments. We find a Bell inequality which can amplify arbitrarily weak randomness and give a detailed analysis of the protocol involving it. Our analysis includes finding a sufficient violation of Bell inequality as a function of the initial quality of randomness....
-
Simulation Environment in Python for Ship Encounter Situations
PublicationTo assess the risk of collision in radar navigation distance-based safety measures such as Distance at the Closest Point of Approach and Time to the Closest Point of Approach are most commonly used. Also Bow Crossing Range and Bow Crossing Time measures are good complement to the picture of the meeting situation. When ship safety domain is considered then Degree of Domain Violation and Time to Domain Violation can be applied. This...
-
An analysis of domain-based ship collision risk parameters
PublicationAccording to a lot of contemporary research on ship collision avoidance the classic approach parameters – distance at closest point of approach (DCPA) and time to the closest point of approach (TCPA) – are not sufficient for estimating ship collision risk and for planning evasive manoeuvres. Consequently new measures are introduced, often utilizing the concept of a ship domain. Their drawback, up to this point, was the lack of...
-
A video monitoring system using ontology-driven identification of threats
PublicationIn this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...
-
Subadditivity of the minimum output entropy and superactivation of the classical capacity of quantum multiple access channels
PublicationWe study subadditivity of the minimum output entropy (Hmin) of quantum multiple access channels (MACs). We provide an example of violation of the additivity theorem for Hmin known in classical information theory. Our result is based on a fundamental property of MACs, i.e., independence of each sender. The channels used in the example can be constructed explicitly. On the basis of subadditivity of Hmin we also provide an example...
-
Imitating Quantum Probabilities: Beyond Bell’s Theorem and Tsirelson Bounds
PublicationLocal hidden-variable model of singlet-state correlations discussed in M. Czachor, Acta Phys. Polon. A 139, 70, is shown to be a particular case of an infinite hierarchy of local hidden-variable models based on an infinite hierarchy of calculi. Violation of Bell-type inequalities can be interpreted as a `confusion of languages' problem, a result of mixing different but neighboring levels of the hierarchy. Mixing of non-neighboring...
-
A ship domain-based model of collision risk for near-miss detection and Collision Alert Systems
PublicationThe paper presents a new model of ship collision risk, which utilises a ship domain concept and the related domain-based collision risk parameters. An encounter is here described by five variables representing: degree of domain violation (DDV), relative speed of the two vessels, combination of the vessels’ courses, arena violations and encounter complexity. As for the first three variables, their values can be directly computed...
-
Increased Certification of Semi-device Independent Random Numbers using Many Inputs and More Postprocessing
PublicationQuantum communication with systems of dimension larger than two provides advantages in information processing tasks. Examples include higher rates of key distribution and random number generation. The main disadvantage of using such multi-dimensional quantum systems is the increased complexity of the experimental setup. Here, we analyze a not-so-obvious problem: the relation between randomness certification and computational requirements...
-
A Framework of a Ship Domain-based Collision Alert System
PublicationThe paper presents a framework of a planned ship collision alert system. The envisaged system is compliant with IMO Resolution MSC.252 (83) “Adoption of the revised performance standards for Integrated Navigation Systems (INS)”. It is based on a ship domain-oriented approach to collision risk and introduces a policy of alerts on dangerous situations. The alerts will include cautions, warnings and alarms, which will be triggered...
-
Wave propagation in damage assessment of ground anchors
PublicationThe inspection possibilities of ground anchors are limited to destructive test such as pull-out test. Guided wave propagation gives an opportunity to develop an inspection system dedicated to determine the condition of inspected element without violation of their integrity. In this paper the experimental study on wave propagation in laboratory models of ground anchors are presented. Experiments were conducted for different bonding...
-
Correlation between charge density waves and antiferromagnetism in Nd1−xGdxNiC2 solid solutions
PublicationWe report a study on the evolution of a charge density wave and antiferromagnetism in the series of the polycrystalline solid solution Nd1−xGdxNiC2 (0 _ x _ 1) by means of magnetic and transport properties measurements. The experimental results reveal the violation of the de Gennes law and a strong correlation between the Peierls, Néel, and Curie-Weiss temperatures, which strongly suggests a cooperative interaction between the...
-
Nonlinear strain gradient and micromorphic one-dimensional elastic continua: Comparison through strong ellipticity conditions
PublicationWe discuss the strong ellipticity (SE) conditions for strain gradient and micromorphic continua considering them as an enhancement of a simple nonlinearly elastic material called in the following primary material. Recently both models are widely used for description of material behavior of beam-lattice metamaterials which may possess various types of material instabilities. We analyze how a possible loss of SE results in the behavior...
-
TensorHive: Management of Exclusive GPU Access for Distributed Machine Learning Workloads
PublicationTensorHive is a tool for organizing work of research and engineering teams that use servers with GPUs for machine learning workloads. In a comprehensive web interface, it supports reservation of GPUs for exclusive usage, hardware monitoring, as well as configuring, executing and queuing distributed computational jobs. Focusing on easy installation and simple configuration, the tool automatically detects the available computing...
-
Digital Fingerprinting based on Quaternion Encryption for Image Transmission
PublicationIn this paper a new digital fingerprinting scheme for images is proposed. A proposed method is based on quaternion encryption with Cipher Block Chaining (CBC) mode of operation. Quaternions are hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm is designed for grey-tone images. For purpose of encryption, the algorithm uses the rotation of data vectors presented...
-
Rapid surrogate-assisted statistical analysis of compact microstrip couplers
PublicationIn this paper, a technique for low-cost statistical analysis and yield estimation of compact microwave couplers has been presented. The analysis is executed at the level of a fast surrogate model representing selected characteristic points of the coupler response that are critical to determine satisfaction/violation of the prescribed design specifications. Because of less nonlinear dependence of the characteristic points on geometry...
-
Modeling of Accidental Bunker Oil Spills as a Result of Ship's Bunker Tanks Rupture - a Case Study
PublicationAIS (Automatic Identification System) data analysis is used to define ship domain for grounding scenarios. The domain has been divided into two areas as inner and outer domains. Inner domain has clear border, which is based on ship dynamic characteristics. Violation of inner domain makes the grounding accident unavoidable. Outer domain area is defined with AIS data analyzing. Outer domain shows the situation of own ship in compare...
-
From unextendible product bases to genuinely entangled subspaces
PublicationUnextendible product bases (UPBs) are interesting mathematical objects arising in composite Hilbert spaces that have found various applications in quantum information theory, for instance in a construction of bound entangled states or Bell inequalities without quantum violation. They are closely related to another important notion, completely entangled subspaces (CESs), which are those that do not contain any fully separable pure...
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublicationRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublicationIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
Improved-Efficacy EM-Based Antenna Miniaturization by Multi-Fidelity Simulations and Objective Function Adaptation
PublicationThe growing demands for integration of surface mount design (SMD) antennas into miniatur-ized electronic devices have been continuously imposing limitations on the structure dimen-sions. Examples include embedded antennas in applications such as on-board devices, picosatel-lites, 5G communications, or implantable and wearable devices. The demands for size reduction while ensuring a satisfactory level of the electrical and field...
-
Local hidden–variable models for entangled quantum states
PublicationWhile entanglement and violation of Bell inequalities were initially thought to be equivalent quantum phenomena, we now have different examples of entangled states whose correlations can be described by local hidden-variable models and, therefore, do not violate any of the Bell inequalities. We provide an up-to-date overview of the existing literature regarding local hidden-variable models for entangled quantum states, in both...
-
Entangled rendezvous: a possible application of Bell non-locality for mobile agents on networks
PublicationRendezvous is an old problem of assuring that two or more parties, initially separated, not knowing the position of each other, and not allowed to communicate, are striving to meet without pre-agreement on the meeting point. This problem has been extensively studied in classical computer science and has vivid importance to modern and future applications. Quantum non-locality, like Bell inequality violation, has shown that in many...
-
ANALIZA MOŻLIWOŚCI ZASTOSOWANIA STEROWANIA PREDYKCYJNEGO TURBINĄ PAROWĄ ELEKTROWNI JĄDROWEJ
PublicationArtykuł przedstawia wyniki wstępnej analizy możliwości zastosowania sterowania predykcyjnego MPC turbiną parową elektrowni jądrowej. Tradycyjnie przyjmuje się, że turbina pracuje w jednym punkcie pracy odpowiadającym jej mocy nominalnej, co pozwala na stosowanie klasycznych regulatorów PID. Synteza sterowania dla warunków zmiennego punktu pracy wymaga uwzględnienia nieliniowego charakteru procesów turbiny oraz możliwości naruszania...
-
Hidden Tensor Structures
PublicationAny single system whose space of states is given by a separable Hilbert space is automatically equipped with infinitely many hidden tensor-like structures. This includes all quantum mechanical systems as well as classical field theories and classical signal analysis. Accordingly, systems as simple as a single one-dimensional harmonic oscillator, an infinite potential well, or a classical finite-amplitude signal of finite duration...
-
Accurate simulation-driven modeling and design optimization of compact microwave structures
PublicationCost efficient design optimization of microwave structures requires availability of fast yet reliable replacement models so that multiple evaluations of the structure at hand can be executed in reasonable timeframe. Direct utilization of full-wave electromagnetic (EM) simulations is often prohibitive. On the other hand, accurate data-driven modeling normally requires a very large number of training points and it is virtually infeasible...
-
Device-independent quantum key distribution based on measurement inputs
PublicationWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Rapid multi-criterial design of microwave components with robustness analysis by means of knowledge-based surrogates
PublicationManufacturing tolerances and uncertainties concerning material parameters, e.g., operating conditions or substrate permittivity are detrimental to characteristics of microwave components. The knowledge of relations between acceptable parameter deviations (not leading to violation of design specifications) and the nominal performance (not considering uncertainties), and is therefore indispensable. This paper proposes a multi-objective...
-
THIRD-ORDER EXPONENTIAL INTEGRATOR FOR LINEAR KLEIN–GORDON EQUATIONS WITH TIME AND SPACE-DEPENDANT MASS
PublicationAllowing for space- and time-dependance of mass in Klein–Gordon equations re- solves the problem of negative probability density and of violation of Lorenz covariance of interaction in quantum mechanics. Moreover it extends their applicability to the domain of quantum cosmology, where the variation in mass may be accompanied by high oscillations....
-
THIRD-ORDER EXPONENTIAL INTEGRATOR FOR LINEAR KLEIN–GORDON EQUATIONS WITH TIME AND SPACE-DEPENDANT MASS
PublicationAllowing for space- and time-dependance of mass in Klein–Gordon equations re- solves the problem of negative probability density and of violation of Lorenz covariance of interaction in quantum mechanics. Moreover it extends their applicability to the domain of quantum cosmology, where the variation in mass may be accompanied by high oscillations....
-
Quantum structure in competing lizard communities
PublicationAlmost two decades of research on applications of the mathematical formalism of quantum theory as a modeling tool in domains different from the micro-world has given rise to many successful applications in situations related to human behavior and thought, more specifically in cognitive processes of decision-making and the ways concepts are combined into sentences. In this article, we extend this approach to animal behavior, showing...
-
Experimental certification of more than one bit of quantum randomness in the two inputs and two outputs scenario
PublicationOne of the striking properties of quantum mechanics is the occurrence of the Bell-type non-locality. They are a fundamental feature of the theory that allows two parties that share an entangled quantum system to observe correlations stronger than possible in classical physics. In addition to their theoretical significance, non-local correlations have practical applications, such as device-independent randomness generation, providing...
-
Two-spinors, oscillator algebras, and qubits: aspects of manifestly covariant approach to relativistic quantum information
PublicationThe first part of the paper reviews applications of 2-spinor methods to relativistic qubits (analogies between tetrads in Minkowski space and 2-qubit states, qubits defined by means of null directions and their role for elimination of the Peres-Scudo-Terno phenomenon, advantages and disadvantages of relativistic polarization operators defined by the Pauli-Lubanski vector, manifestly covariant approach to unitary representations...
-
Hybrid no-signaling-quantum correlations
PublicationFundamental investigations in non-locality have shown that while the no-signaling principle alone is not sufficient to single out the set of quantum non-local correlations, local quantum mechanics and no-signaling together exactly reproduce the set of quantum correlations in the two-party Bell scenario. Here, we introduce and study an intermediate hybrid no-signaling quantum set of non-local correlations that we term HNSQ in the...
-
Linear game non-contextuality and Bell inequalities—a graph-theoretic approach
PublicationWe study the classical and quantum values of a class of one-and two-party unique games, that generalizes the well-known XOR games to the case of non-binary outcomes. In the bipartite case the generalized XOR(XOR-d) games we study are a subclass of the well-known linear games. We introduce a 'constraint graph' associated to such a game, with the constraints defining the game represented by an edge-coloring of the graph. We use the...
-
Randomness Amplification under Minimal Fundamental Assumptions on the Devices
PublicationRecently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components...
-
Rola inicjatyw społecznych w ochronie dziedzictwa kulturowego na przykładzie mozaiki Anny Fiszer na ścianie kina Neptun w Gdańsku
PublicationStreszczenie: Rola inicjatyw społecznych w ochronie dziedzictwa kulturowego na przykładzie mozaiki Anny Fiszer na ścianie kina Neptun w Gdańsku. Celem artykułu jest wykazanie roli inicjatyw społecznych w budzeniu poczucia odpowiedzialności za dziedzictwo materialne i kulturowe. Przyjęto założenie, że dla lokalnych społeczności miasto jest przestrzenią pamięci. Nastrój, atmosfera i klimat miejsca to słowa, które określają fizyczny...
-
Sprawiedliwość agrarna
Publicationprawiedliwość agrarna została napisana z intencją zreformowania stosunków społeczno-politycznych. Tekst opiera się na założeniu wywodzącym się z tradycji prawnonaturalnej, które brzmi, iż pierwotnie każdy był współwłaścicielem powierzchni Ziemi. Powstanie prywatnej własności ziemskiej (czyli, eo ipso, wywłaszczenie większości ludzi) należy zakwalifikować jako akt bezprawia, kumulujący się w historycznie nawarstwionych nierównościach...
-
Automatic recognition of males and females among web browser users based on behavioural patterns of peripherals usage
PublicationPurpose The purpose of this paper is to answer the question whether it is possible to recognise the gender of a web browser user on the basis of keystroke dynamics and mouse movements. Design/methodology/approach An experiment was organised in order to track mouse and keyboard usage using a special web browser plug-in. After collecting the data, a number of parameters describing the users’ keystrokes, mouse movements and clicks...
-
On Decision-Making Strategies for Improved-Reliability Size Reduction of Microwave Passives: Intermittent Correction of Equality Constraints and Adaptive Handling of Inequality Constraints
PublicationDesign optimization of passive microwave components is an intricate process, especially if the primary objective is a reduction of the physical size of the structure. The latter has become an important design consideration for a growing number of modern applications (mobile communications, wearable/implantable devices, internet of things), where miniaturization is imperative due to a limited space allocated for the electronic circuitry....
-
Człowiek i jego samochód - relacje w strukturach mieszkaniowych w warunkach zrównoważonego rozwoju. Zapis refleksji
PublicationJakość środowiska zbudowanego - przekształcanego i tworzonego dla coraz liczniejszych pokoleń mieszkańców jest przedmiotem wieloletniej i narastającej dyskusji zawodowej środowiska architektonicznego.Ludzka potrzeba samorealizacji poprzez codzienną aktywność, działalność zawodową, przyjmowane role społeczne wpływa na kształtowanie indywidualnych modeli codzienności miejskiej, na decyzje o wyborach miejsca zamieszkania, miejsca...
-
Marek Czachor prof. dr hab.
People -
Architektura a dekonstrukcja. Przypadek Petera Eisenmana i Bernarda Tschumiego
PublicationArchitecture and Deconstruction Case of Peter Eisenman and Bernard Tschumi Introduction Towards deconstruction in architecture Intensive relations between philosophical deconstruction and architecture, which were present in the late 1980s and early 1990s, belong to the past and therefore may be described from a greater than...