Wyniki wyszukiwania dla: INFORMATION THEORY - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: INFORMATION THEORY

Filtry

wszystkich: 158
wybranych: 117

wyczyść wszystkie filtry


Filtry wybranego katalogu

  • Kategoria

  • Rok

  • Opcje

wyczyść Filtry wybranego katalogu niedostępne

Wyniki wyszukiwania dla: INFORMATION THEORY

  • Product Graph Invariants with Applications in the Theory of Information

    Publikacja

    - Rok 2012

    There are a large number of graph invariants. In the paper, we consider some of them, e.g. the independence and chromatic numbers. It is well know that we cannot efficiently calculate these numbers for arbitrary graphs. In the paper we present relations between these invariants and concepts from the theory of information. Concepts such as source coding and transmission over a noisy channel with zero probability of error are modeled...

  • Average Redundancy of the Shannon Code for Markov Sources

    Publikacja

    It is known that for memoryless sources, the average and maximal redundancy of fixed–to–variable length codes, such as the Shannon and Huffman codes, exhibit two modes of behavior for long blocks. It either converges to a limit or it has an oscillatory pattern, depending on the irrationality or rationality, respectively, of certain parameters that depend on the source. In this paper, we extend these findings, concerning the Shannon...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Squashed entanglement for multipartite states and entanglement measures based on the mixed convex roof

    Publikacja
    • D. Yang
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • J. Oppenheim
    • W. Song

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2009

    New measures of multipartite entanglement are constructedbased on two definitions of multipartite information anddifferent methods of optimizing over extensions of the states. Oneis a generalization of the squashed entanglement where one takesthe mutual information of parties conditioned on the state's extensionand takes the infimum over such extensions. Additivity ofthe multipartite squashed entanglement is proved for both versionsof...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Types of Markov Fields and Tilings

    Publikacja

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2016

    The method of types is one of the most popular techniques in information theory and combinatorics. However, thus far the method has been mostly applied to one-dimensional Markov processes, and it has not been thoroughly studied for general Markov fields. Markov fields over a finite alphabet of size m ≥ 2 can be viewed as models for multi-dimensional systems with local interactions. The locality of these interactions is represented...

    Pełny tekst do pobrania w portalu

  • On the Limiting Distribution of Lempel-Ziv’78 Redundancy for Memoryless Sources

    Publikacja

    We study the Lempel-Ziv'78 algorithm and show that its (normalized) redundancy rate tends to a Gaussian distribution for memoryless sources. We accomplish it by extending findings from our 1995 paper, in particular, by presenting a new simplified proof of the central limit theorem (CLT) for the number of phrases in the LZ'78 algorithm. We first analyze the asymptotic behavior of the total path length in the associated digital search...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Low-dimensional bound entanglement with one-way distillable cryptographic key

    Publikacja

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2008

    In this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...

  • Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity

    Publikacja
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • D. Leung
    • J. Oppenheim

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2008

    In this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...

  • General paradigm for distilling classical key from quantum states

    Publikacja

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2009

    In this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A few steps more towards NPT bound entanglement

    Publikacja

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2010

    In this paper, existence of bound entangled states with nonpositive partial transpose (NPT) is considered. As one knows, existence of such states would in particular imply nonadditivity of distillable entanglement. Moreover, it would rule out a simple mathematical description of the set of distillable states. The particular state, known to be 1-copy nondistillable and supposed to be bound entangled, is considered. The problem of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • On the Characteristic Graph of a Discrete Symmetric Channel

    We present some characterizations of characteristic graphs of row and/or column symmetric channels. We also give a polynomial-time algorithm that decides whether there exists a discrete symmetric channel whose characteristic graph is equal to a given input graph. In addition, we show several applications of our results.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Amplifying the Randomness of Weak Sources Correlated With Devices

    Publikacja

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2017

    The problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Superadditivity of two quantum information resources

    Publikacja

    - Science Advances - Rok 2017

    Entanglement is one of the most puzzling features of quantum theory and a principal resource for quantum information processing. It is well known that in classical information theory, the addition of two classical information resources will not lead to any extra advantages. On the contrary, in quantum information, a spectacular phenomenon of the superadditivity of two quantum information resources emerges. It shows that quantum...

    Pełny tekst do pobrania w portalu

  • Shannon Capacity and Ramsey Numbers

    Publikacja

    - Rok 2011

    Ramsey-type theorems are strongly related to some results from information theory. In this paper we present these relations.

  • Information content of systems as a physical principle

    Publikacja

    - PHYSICAL REVIEW A - Rok 2017

    To explain the conceptual gap between classical and quantum and other, hypothetical descriptions of the world, several principles have been proposed. So far, all these principles have not explicitly included the uncertainty relation. Here we introduce an information content principle ( ICP ) which represents a constrained uncertainty principle. The principle, by taking into account the encoding and decoding properties of a single physical...

    Pełny tekst do pobrania w portalu

  • A Note on Shannon Capacity for Invariant and Evolving Channels

    Publikacja

    - Journal of Applied Computer Science - Rok 2011

    In the paper we discuss the notion of Shannon capacity for invariant and evolving channels. We show how this notion is involved in information theory, graph theory and Ramsey theory.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Networkig activities of general judiciary - from theory to practice

    Publikacja

    - e-mentor - Rok 2018

    Over the last three decades, networks - as a field of research - have acquired a significant place among management sciences. Unfortunately, in the judiciary they have become a subject of more careful analyses only recently, which resulted in a large discrepancy of knowledge - both in theory and in its practical adaptation for the needs of the courts. In order to fill this cognitive gap, an attempt was made to identify levels of...

    Pełny tekst do pobrania w portalu

  • Colorings of the Strong Product of Circulant Graphs

    Publikacja
    • M. Jurkiewicz

    - Rok 2012

    Graph coloring is one of the famous problems in graph theory and it has many applications to information theory. In the paper we present colorings of the strong product of several circulant graphs.

  • Towards Resource Theory of Coherence in Distributed Scenarios

    Publikacja

    - Physical Review X - Rok 2017

    The search for a simple description of fundamental physical processes is an important part of quantum theory. One example for such an abstraction can be found in the distance lab paradigm: if two separated parties are connected via a classical channel, it is notoriously difficult to characterize all possible operations these parties can perform. This class of operations is widely known as local operations and classical communication....

    Pełny tekst do pobrania w portalu

  • Redundant information encoding in QED during decoherence

    Publikacja

    - PHYSICAL REVIEW A - Rok 2018

    Broadly understood decoherence processes in quantum electrodynamics, induced by neglecting either the radiation [L. Landau, Z. Phys. 45, 430 (1927)] or the charged matter [N. Bohr and L. Rosenfeld, K. Danske Vidensk. Selsk, Math.-Fys. Medd. XII, 8 (1933)], have been studied from the dawn of the theory. However, what happens in between, when a part of the radiation may be observed, as is the case in many real-life situations, has...

    Pełny tekst do pobrania w portalu

  • The Technological Advancement of New Products, Product Newness and Market Information

    Publikacja

    The purpose of this study is to propose product newness and obtaining market information as mediators of the relationship between the technological advancement of a new product and its commercial success. So far, little is known about the mediators of this relationship but knowledge about the factors that strengthen or weaken it is valid, both for the theory and practice of new product management. On the one hand, product newness...

    Pełny tekst do pobrania w portalu

  • Distributed correlations and information flows within a hybrid multipartite quantum-classical system

    Publikacja

    - PHYSICAL REVIEW A - Rok 2015

    Understanding the non-Markovian mechanisms underlying the revivals of quantum entanglement in the presence of classical environments is central in the theory of quantum information. Tentative interpretations have been given by either the role of the environment as a control device or the concept of hidden entanglement. We address this issue from an information-theoretic point of view. To this aim, we consider a paradigmatic tripartite...

    Pełny tekst do pobrania w portalu

  • Impact of information systems (IS) infusion on Open Government Data (OGD) adoption

    Publikacja
    • R. Matheus
    • C. H. Alexopoulos
    • N. Rizun
    • L. Euripides
    • S. Saxena

    - Digital Policy Regulation and Governance - Rok 2024

    Purpose – This study aims to underline the possible influence of the moderator, information systems (IS) infusion, on Open Government Data (OGD) adoption and usage. Design/methodology/approach – Using the partial least squares-structural equation modeling methodological approach, the adapted unified theory of acceptance and use of technology (UTAUT) model has been used for understanding the role of themoderating variable, namely,...

    Pełny tekst do pobrania w portalu

  • The Use of Information and Communication Technologies in Cluster Organizations

    Publikacja

    - Rok 2019

    The purpose of the paper is to explore how cluster organizations (COs) take advantage of Information and Communication Technologies (ICT). The paper addresses the research question: “How do cluster organizations take advantage of ICT in fulfilling their main roles?”. The research was carried out in the first half of 2016 in four purposefully selected cluster organizations. The main research strategy involved Grounded Theory; the...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Connection matrix theory for discrete dynamical systems

    In [C] and [F1] the connection matrix theory for Morse decomposition is developedin the case of continuous dynamical systems. Our purpose is to study the case of discrete timedynamical systems.

  • Excited state properties of a series of molecular photocatalysts investigated by time dependent density functional theory.

    Publikacja

    Time dependent density functional theory calculations are applied on a series of molecular photocatalysts of the type [(tbbpy)2M1(tpphz)M2X2]2+ (M1 = Ru, Os; M2 = Pd, Pt; X = Cl, I) in order to provide information concerning the photochemistry occurring upon excitation of the compounds in the visible region. To this aim, the energies, oscillator strengths and orbital characters of the singlet and triplet excited states are investigated....

    Pełny tekst do pobrania w portalu

  • On symmetric extendibility of quantum states and its applications

    Publikacja

    - Rok 2017

    This dissertation is focused on analysis of the symmetric extendibility of quantum states and its applications in the quantum information theory, with special attention paid to the area of quantum entanglement distillation, quantum channels theory, quantum security, and monogamy of quantum entanglement in time. We analyze geometry of the set of symmetric extendible states, i.e. such states that possess symmetric extensions and...

    Pełny tekst do pobrania w portalu

  • Paradygmat jakościowy w analizie interakcji międzykulturowych – interpretacja na bazie wybranych teorii psychologicznych

    Publikacja

    - Przedsiębiorczość i Zarządzanie - Rok 2016

    Intercultural interactions in a multicultural work environment are a peculiar type of social interactions. The results of prior research on the effects of interactions in such environment are inconclusive. The majority of the previous studies have emphasized problems, applied a quantitative methodology and interpreted the results with regard to social identity and categorization theory, information-processing theory and intergroup contact...

    Pełny tekst do pobrania w portalu

  • Unifying Aspects of Generalized Calculus

    Publikacja

    - ENTROPY - Rok 2020

    Non-Newtonian calculus naturally unifies various ideas that have occurred over the years in the field of generalized thermostatistics, or in the borderland between classical and quantum information theory. The formalism, being very general, is as simple as the calculus we know from undergraduate courses of mathematics. Its theoretical potential is huge, and yet it remains unknown or unappreciated.

    Pełny tekst do pobrania w portalu

  • Accuracy and Availability of EGNOS - Results of Observations

    Publikacja

    According to SBAS concept the user should receive timely the correct information about the system integrity and corrections to the pseudoranges measurements, which leads to better accuracyof coordinates. In theory the whole system is permanently monitored by RIMS stations, so it is impossible to deliver the faulty information to the user. The quality of the system is guaranteed inside the border of the system coverage however in...

    Pełny tekst do pobrania w portalu

  • The Method of a Two-Level Text-Meaning Similarity Approximation of the Customers’ Opinions

    The method of two-level text-meaning similarity approximation, consisting in the implementation of the classification of the stages of text opinions of customers and identifying their rank quality level was developed. Proposed and proved the significance of major hypotheses, put as the basis of the developed methodology, notably about the significance of suggestions about the existence of analogies between mathematical bases of...

    Pełny tekst do pobrania w portalu

  • Experimental generation of complex noisy photonic entanglement

    Publikacja
    • K. Dobek
    • M. Karpiński
    • R. Demkowicz-Dobrzański
    • K. Banaszek
    • P. Horodecki

    - LASER PHYSICS - Rok 2013

    We present an experimental scheme based on spontaneous parametric down-conversion to produce multiple-photon pairs in maximally entangled polarization states using an arrangement of two type-I nonlinear crystals. By introducing correlated polarization noise in the paths of the generated photons we prepare mixed-entangled states whose properties illustrate fundamental results obtained recently in quantum information theory, in particular those...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Subadditivity of the minimum output entropy and superactivation of the classical capacity of quantum multiple access channels

    Publikacja

    We study subadditivity of the minimum output entropy (Hmin) of quantum multiple access channels (MACs). We provide an example of violation of the additivity theorem for Hmin known in classical information theory. Our result is based on a fundamental property of MACs, i.e., independence of each sender. The channels used in the example can be constructed explicitly. On the basis of subadditivity of Hmin we also provide an example...

    Pełny tekst do pobrania w portalu

  • Digitalization Process and Its Impact on Economic Growth A Panel Data Study for Developing Countries

    Publikacja

    - Rok 2022

    This book analyses the impact of Information and Communication Technologies (ICTs) on economic development. It contains theoretical and empirical studies, including panel studies on various issues facing developing countries, such as education, corruption, economic growth, government expenditure, financial inclusion, foreign direct investment, infrastructure, economic and social welfare, and inequality. Each chapter offers a well-conceived...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Modeling the Customer’s Contextual Expectations Based on Latent Semantic Analysis Algorithms

    Publikacja

    Nowadays, in the age of Internet, access to open data detects the huge possibilities for information retrieval. More and more often we hear about the concept of open data which is unrestricted access, in addition to reuse and analysis by external institutions, organizations and people. It’s such information that can be freely processed, add another data (so-called remix) and then published. More and more data are available in text...

    Pełny tekst do pobrania w portalu

  • What matters most to patients? On the Core Determinants of Patient Experience from Free Text Feedback

    Publikacja

    - Rok 2021

    Free-text feedback from patients is increasingly used for improving the quality of healthcare services and systems. A major reason for the growing interest in harnessing free-text feedback is the belief that it provides richer information about what patients want and care about. The use of computational approaches such as structural topic modelling for analysing large unstructured textual data such as free-text feedback from patients...

    Pełny tekst do pobrania w portalu

  • Game Theory Analysis of Bidding for a Construction Contract

    Publikacja

    The authors are concerned with a bidding problem. There are two companies (P1 and P2) bidding for a highway construction project. In order to be more competitive, P1 considers buying a new gravel pit near the construction site. The basic cost of the pit is known to both companies. However, there is also an additional, hidden, cost (C) known only to P1. P2 is uncertain whether the hidden cost is C = 0 or C = x. P1 plans to bid for...

    Pełny tekst do pobrania w portalu

  • Zero-knowledge convincing protocol on quantum bit is impossible

    Publikacja

    - Quantum Journal - Rok 2017

    It is one of fundamental features of quantum formalism that o n one hand it provides a new infor- mation processing resources and on the other hand puts funda mental constraints on the processing of quantum information implying “no-go” theorems for cloni ng [1–3], bit commitment [4, 5] and deleting [6] in quantum theory. Here we ask about possibilit y of “zero knowledge” scenario which, for its simplicity, can be considered as...

    Pełny tekst do pobrania w portalu

  • No Quantum Realization of Extremal No-Signaling Boxes

    Publikacja

    - PHYSICAL REVIEW LETTERS - Rok 2016

    The study of quantum correlations is important for fundamental reasons as well as for quantum communication and information processing tasks. On the one hand, it is of tremendous interest to derive the correlations produced by measurements on separated composite quantum systems from within the set of all correlations obeying the no-signaling principle of relativity, by means of information-theoretic principles. On the other hand,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Quantum security and theory of decoherence

    Publikacja

    We sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...

    Pełny tekst do pobrania w portalu

  • How do personality traits influence Open Government Data (OGD) adoption and usage? Investigating the indirect and moderating effects

    Publikacja
    • N. Rizun
    • C. H. Alexopoulos
    • S. Saxena
    • F. Kleiman
    • R. Matheus

    - Rok 2023

    Open Government Data (OGD) research has focused for a long on the adoption and usage from the perspectives of users across different contexts. The underlying rationale for this specific focus is that OGD initiatives are undertaken to further citizen engagement with OGD for value generation and innovation purposes. Conceding that usage propensity is different across individuals, it is important to understand the influence of personality...

    Pełny tekst do pobrania w portalu

  • ON EGNOS MONITORING IN LOCAL CONDITIONS

    Any SBAS system should deliver to the user corrections to pseudoranges as well as information about the system integrity. In theory, as soon as the system is permanently monitored by RIMS stations, it is impossible to deliver the fault information to the user. However many observations shows that accuracy of EGNOS service in the same time are different in different places, which shows the influence of local conditions on them....

    Pełny tekst do pobrania w portalu

  • Observation Value Analysis – Integral Part of Bayesian Diagnostics

    The decision making process, in general, is understood as a process of selecting one of the available solutions to the problem. One of possible approaches supporting the process is Bayesian statistical decision theory providing a mathematical model to make decisions of a technical nature in conditions of uncertainty. Regarding above, a detailed subject of the research is to analyze the value of the observation, which is a part...

    Pełny tekst do pobrania w portalu

  • Firing map of an almost periodic input function

    Publikacja

    In mathematical biology and the theory of electric networks the firing map of an integrate-and-fire system is a notion of importance. In order to prove useful properties of this map authors of previous papers assumed that the stimulus function f of the system ẋ = f(t,x) is continuous and usually periodic in the time variable. In this work we show that the required properties of the firing map for the simplified model ẋ = f(t) still...

    Pełny tekst do pobrania w portalu

  • Principles of target DNA cleavage and the role of Mg2+ in the catalysis of CRISPR–Cas9

    Publikacja
    • Ł. Nierzwicki
    • P. R. Arantes
    • M. Jinek
    • G. Lisi
    • G. Palermo
    • K. East
    • J. Binz
    • R. Vsu
    • A. Mohd
    • E. Skeens
    • M. Pacesa

    - Nature Catalysis - Rok 2022

    At the core of the CRISPR–Cas9 genome-editing technology, the endonuclease Cas9 introduces site-specific breaks in DNA. However, precise mechanistic information to ameliorate Cas9 function is still missing. Here, multimicrosecond molecular dynamics, free energy and multiscale simulations are combined with solution NMR and DNA cleavage experiments to resolve the catalytic mechanism of target DNA cleavage. We show that the conformation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Fast Low-fidelity Wing Aerodynamics Model for Surrogate-Based Shape Optimization

    Publikacja

    Variable-fidelity optimization (VFO) can be efficient in terms of the computational cost when compared with traditional approaches, such as gradient-based methods with adjoint sensitivity information. In variable-fidelity methods, the directoptimization of the expensive high-fidelity model is replaced by iterative re-optimization of a physics-based surrogate model, which is constructed from a corrected low-fidelity model. The success...

    Pełny tekst do pobrania w portalu

  • Analysis of the objects images on the sea using Dempster-Shafer Theory

    Publikacja

    - Rok 2016

    The paper presents the concept of using aerial and satellite imagery or images coming from the marine radar to identify and track vessels at sea. The acquired data were subjected to a highly advanced image analysis. The development of remote sensing techniques allows to gain a huge amount of data. These data are useful information source however usually we have to use different data mining methods to gain interested information....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Quantum metrology: Heisenberg limit with bound entanglement

    Publikacja

    - PHYSICAL REVIEW A - Rok 2015

    Quantum entanglement may provide a huge boost in the precision of parameter estimation. However, quantum metrology seems to be extremely sensitive to noise in the probe state. There is an important still open question: What type of entanglement is useful as a resource in quantum metrology? Here we raise this question in relation to entanglement distillation. We provide a counterintuitive example of a family of bound entangled states...

    Pełny tekst do pobrania w portalu

  • Agent-based social network as a simulation of a market behaviour

    Publikacja

    - Rok 2010

    Recent years and the outbreak of world's economic crisis in 2008 proved the crucial importance of reliable analysis of market dynamics. However, werarely apply models of proper detail level (the global prosperity forecast of 2007 can be seen as a grim proof). The behaviour of individuals and companies is far from being ideal and rational. Many claims that the economic paradigm of rational expectations (coming from J. Muth and R....

  • Risk Modelling with Bayesian Networks - Case Study: Construction of Tunnel under the Dead Vistula River in Gdansk

    The process of decision-making in public procurement of construction projects during the preparation and implementation phases ought to be supported by risk identification, assessment, and management. In risk assessment one has to take into account factors that lead to risk events (background info), as well as the information about the risk symptoms (monitoring info). Typically once the risks have been assessed a decision-maker...

    Pełny tekst do pobrania w portalu

  • Knowledge Flows in Cluster Organizations

    Publikacja

    - Rok 2019

    This paper aims to identify knowledge flows in cluster organizations (COs). On the basis of a literature analysis on knowledge flows and cluster organizations, the following research question was formulated: What kind of knowledge flows can be identified in cluster organizations and what is their main characteristics? The paper is based on a literature analysis and Grounded Theory methodology, examining four purposefully selected...

    Pełny tekst do pobrania w serwisie zewnętrznym