Filtry
wszystkich: 1185
wybranych: 1085
-
Katalog
- Publikacje 1085 wyników po odfiltrowaniu
- Czasopisma 1 wyników po odfiltrowaniu
- Konferencje 1 wyników po odfiltrowaniu
- Osoby 7 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Kursy Online 17 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 72 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: MULTIPARTITE DISTILLABLE KEY
-
Multipartite secret key distillation and bound entanglement
PublikacjaRecently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable...
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublikacjaIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Squashed entanglement for multipartite states and entanglement measures based on the mixed convex roof
PublikacjaNew measures of multipartite entanglement are constructedbased on two definitions of multipartite information anddifferent methods of optimizing over extensions of the states. Oneis a generalization of the squashed entanglement where one takesthe mutual information of parties conditioned on the state's extensionand takes the infimum over such extensions. Additivity ofthe multipartite squashed entanglement is proved for both versionsof...
-
All Nonclassical Correlations Can Be Activated into Distillable Entanglement
PublikacjaWe devise a protocol in which general nonclassical multipartite correlations produce a physically relevant effect, leading to the creation of bipartite entanglement. In particular, we show that the relative entropy of quantumness, which measures all nonclassical correlations among subsystems of a quantum system, is equivalent to and can be operationally interpreted as the minimum distillable entanglement generated between the system...
-
Postulates for measures of genuine multipartite correlations
PublikacjaA lot of research has been done on multipartite correlations. However, it seems strange thatthere is no denition of so called genuine multipartite correlations. In this paper we propose threereasonable postulates which each measure or indicator of genuine multipartite correlations (or gen-uine multipartite entanglement) should satisfy. We also introduce degree of correlations which givespartial characterization of multipartite...
-
No-local-broadcasting theorem for multipartite quantum correlations
PublikacjaWe prove that the correlations present in a multipartite quantum state have an operational quantum character even if the state is unentangled, as long as it does not simply encode a multipartite classical probability distribution. Said quantumness is revealed by the new task of local broadcasting, i.e., of locally sharing preestablished correlations, which is feasible if and only if correlations are stricly classical. Our operational...
-
General paradigm for distilling classical key from quantum states
PublikacjaIn this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...
-
W-like bound entangled states and secure key distillation
PublikacjaWe construct multipartite entangled states with underlying W-type structuresatisfying positive partial transpose (PPT) condition under any (N −1)|1 partition. Then we showhow to distill a N-partite secure key from the states using two different methods: direct applicationof local filtering and novel random key distillation scheme in which we adopt the idea from recentresults on entanglement distillation. Open problems and possible...
-
Scheduling with Complete Multipartite Incompatibility Graph on Parallel Machines
PublikacjaIn this paper we consider a problem of job scheduling on parallel machines with a presence of incompatibilities between jobs. The incompatibility relation can be modeled as a complete multipartite graph in which each edge denotes a pair of jobs that cannot be scheduled on the same machine. Our research stems from the works of Bodlaender, Jansen, and Woeginger (1994) and Bodlaender and Jansen (1993). In particular, we pursue the...
-
Constructing genuinely entangled multipartite states with applications to local hidden variables and local hidden states models
PublikacjaBuilding upon the results of R. Augusiak et al. [Phys. Rev. Lett. 115, 030404 (2015)] we develop a general approach to the generation of genuinely entangled multipartite states of any number of parties from genuinely entangled states of a fixed number of parties, in particular, the bipartite entangled ones. In our approach, certain isometries whose output subspaces are either symmetric or genuinely entangled in some multipartite...
-
Scheduling with Complete Multipartite Incompatibility Graph on Parallel Machines: Complexity and Algorithms
PublikacjaIn this paper, the problem of scheduling on parallel machines with a presence of incompatibilities between jobs is considered. The incompatibility relation can be modeled as a complete multipartite graph in which each edge denotes a pair of jobs that cannot be scheduled on the same machine. The paper provides several results concerning schedules, optimal or approximate with respect to the two most popular criteria of optimality:...
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublikacjaIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
Quantum states representing perfectly secure bits are always distillable
PublikacjaW pracy pokazano, że ostatnio wprowadzone stany kwantowe reprezentujące perfekcyjnie bezpieczny bit klucza kryptograficznegooraz ich wielocząstkowe i wielowymiarowe uogólnienia zawsze reprezentują destylowalne splątanie. Podano ograniczenia dolne na wielkość destylowalnego splątania. Ponadto podano alternatywny dowód faktu, że koszt splątania jest ograniczeniem górnym na wielkość destylowalnego klucza kryptograficznego w dwucząstkowym...
-
Image as a key factor of brand value at social media
PublikacjaThe paper aims to investigate the relationship between social media presence and activities and brand value for the most valuable Global Brands 2012 (Interbrandt 2013). Social media communication is an innovative way of communication. Brand value is a key performance indicator of brand strategy for managers. Brand and category image realized to be the key factor of investigated relation.
-
On incidence coloring of coloring of complete multipartite and semicubic bipartite graphs
PublikacjaIn the paper, we show that the incidence chromatic number of a complete k-partite graph is at most ∆+2 (i.e., proving the incidence coloring conjecture for these graphs) and it is equal to ∆+1 if and only if the smallest part has only one vertex.
-
Device-independent quantum key distribution based on measurement inputs
PublikacjaWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Breast MRI segmentation by deep learning: key gaps and challenges
PublikacjaBreast MRI segmentation plays a vital role in early diagnosis and treatment planning of breast anomalies. Convolutional neural networks with deep learning have indicated promise in automating this process, but significant gaps and challenges remain to address. This PubMed-based review provides a comprehensive literature overview of the latest deep learning models used for breast segmentation. The article categorizes the literature...
-
Evaluating the effectivness of an outsourced processes on the basis of key performance indicators
PublikacjaAccording to the statistics outsourcing has become typical solution for mature economies. Besides short run attempt based on cost reduction, getting popular is the method of increasing the effectiveness by implementing outsourced process. Authors in this article present the methods of measuring outsourcing performance on the basis of key performance indicators.
-
Distributed correlations and information flows within a hybrid multipartite quantum-classical system
PublikacjaUnderstanding the non-Markovian mechanisms underlying the revivals of quantum entanglement in the presence of classical environments is central in the theory of quantum information. Tentative interpretations have been given by either the role of the environment as a control device or the concept of hidden entanglement. We address this issue from an information-theoretic point of view. To this aim, we consider a paradigmatic tripartite...
-
Resolving Conflicts in Object Tracking in Video Stream Employing Key Point Matching
PublikacjaA novel approach to resolving ambiguous situations in object tracking in video streams is presented. The proposed method combines standard tracking technique employing Kalman filters with global feature matching method. Object detection is performed using a background subtraction algorithm, then Kalman filters are used for object tracking. At the same time, SURF key points are detected only in image sections identified as moving...
-
Key success factors for small design offices in the bidding process
PublikacjaCompetition in the design office market is high, therefore it is important to be aware of the conditions determining the competitive advantage, thus increasing the bidding effectiveness. For this reason, the aim of the article is to identify key success factors (KSF) increasing successful bidding of a small design office. The factors were identified and then analysed based on a literature review, expert interviews and using Group...
-
Unifying classical and quantum key distillation
PublikacjaPrzypuśćmy, że dwie oddalone od siebie osoby, Alicja i Bob, oraz osoba z nimi niewspółpracująca, Ewa, mają dostęp do systemów kwantowych przygotowanych w stanie rho_ABE. Ponadto Alicja i Bob mogą używać lokalnych operacji i uwiarygodnionej komunikacji publicznej. Celem Alicji i Boba jest ustanowienie klucza, który nie będzie znany Ewie. Nasze badania inicjują podejście do wspomnianego zagadnienia oparte na unifikacji dwóch standardowych...
-
Secure key from bound entanglement
PublikacjaScharakteryzowaliśmy zestaw dzielonych kwantowych stanów, który zawiera kryptograficznie prywatny klucz. Pozwala nam to przerobić teorię prywatności jako paradygmat blisko związany z tą, która jest używana w manipulacjach splątania.
-
Knowledge-Based Management as the Key Success Factor for Research and Development Organizations
PublikacjaA key to achieving success in project organizations lies in exemplary management of processes within those organizations, while the ongoing projects are mainly characterized by their uniqueness. The situation is no different in commercial research and development organizations (R&D) where accuracy and repeatability of elementary processes guarantees efficient and productive realization of all enterprises. R&D organizations are...
-
Protection of Pedestrians as the Key Action for Implementing - Poland’s Vision Zero
PublikacjaWHO reports show that pedestrians account for 10 to 70% of total road crash fatalities. In Poland, pedestrians also represent a significant road safety problem. For many years, pedestrian collisions have accounted for approx. 30% of total road crashes with more than 30% of pedestrians killed. Therefore, pedestrian safety has been one of Poland’s main objectives in its road safety programs implemented over the past 20 years. The...
-
Review and Indication of Key Activities for Energy Management Improvement in DC Microgrids
PublikacjaDC MicroGrids (MG) must have Energy Management Systems (EMS) to guarantee efficient, dependable, and environmentally friendly electricity. The application of Model Predictive Control (MPC), proved to be helpful due to its adaptability and capacity to use non-linear models. This paper, based on an extensive literature review, identifies and discusses the three key activities to improve the characteristics of DC microgrids, i.e.:...
-
Key activities to improve energy management in DC microgrids connected by urban traction
PublikacjaDC MicroGrids must have Energy Management Systems to guarantee efficient, dependable, and environmentally friendly electricity. The application of Model Predictive Control, proved to be helpful due to its adaptability and capacity to use non-linear models. This paper, based on an extensive literature review, identifies and discusses the three key activities to improve the characteristics of DC MicroGrids, i.e.: the use of Energy...
-
An Improved Convolutional Neural Network for Steganalysis in the Scenario of Reuse of the Stego-Key
PublikacjaThe topic of this paper is the use of deep learning techniques, more specifically convolutional neural networks, for steganalysis of digital images. The steganalysis scenario of the repeated use of the stego-key is considered. Firstly, a study of the influence of the depth and width of the convolution layers on the effectiveness of classification was conducted. Next, a study on the influence of depth and width of fully connected...
-
Performance Analysis of the "Intelligent" Kirchhoff- Law - Johnson-Noise Secure Key Exchange
PublikacjaThe Kirchhoff-law - Johnson-noise (KLJN) secure key distribution system provides a way of exchanging theoretically secure keys by measuring random voltage and current through the wire connecting two different resistors at Alice’s and Bob’s ends. Recently new advanced protocols for the KLJN method have been proposed with enhanced performance. In this paper, we analyze the KLJN system and compare with the „intelligent” KLJN (iKLJN)...
-
Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange
PublikacjaThis paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...
-
Preparation of samples for analysis: the key to analytical success
PublikacjaW rozdziale przedstawiono informacje literaturowe o nowych rozwiązaniach metodycznych w zakresie:-izolacji i/lub wzbogacania śladowych składników z próbek środowiskowych-mineralizacji próbek.Szczególna uwagę zwrócono na wykorzystanie w procesie przygotowania próbek nowych typów rozpuszczalników i mediów reakcyjnych spełniających wymogi związane z koncepcją zrównoważonego rozwoju.
-
Human serum interactions with phenolic and aroma substances of Kaffir(Citrus hystrix) and Key lime (Citrus aurantifolia) juices
PublikacjaTo understand the therapeutic application of polyphenols extracted from Kaffir (PolKaf) and Key (PolKey) limesdifferent analytical methods were applied. Based on quantitative analysis by two dimensional gas chromato-graphy (GC×GC) and time of flight mass spectrometry (TOFMS) it can be observed that the biggest differencesin the contents of selected terpenes of Kaffir and Key limes occur in chemical compounds such as limonene, citraland...
-
Bile Acids: Key Players in Inflammatory Bowel Diseases?
Publikacja -
SERRATE: a key factor in coordinated RNA processing in plants
Publikacja -
Key Role of CRF in the Skin Stress Response System
Publikacja -
The Practice of Dyadic Interviewing: Strengths, Limitations and Key Decisions
PublikacjaDyadic interviews, in which two participants are interviewed together, are becoming more popular in qualitative research, but are much less discussed in the methodological literature than individual and group forms. In this article, we consider the nature and value of dyadic interviews, recognizing them as active, relational encounters, shaped by what all parties bring to them, and infused with issues of power. Drawing on our research...
-
Key logistics processes in project management based on organisation of an international training session-case study
PublikacjaImprovement of processes, including the logistics processes forms one of the essential aspects of modern business entities functioning. Search for the solutions allowing for quicker and less costly method of realisation of particular activities in highly significant, especially in the conditions of a dynamically changing environment in which the organisations have to function. It is a natural field occuring principally both in...
-
Do clusters help companies to "go green"? Experience of Polish National Key Clusters
PublikacjaThis study aims to explore cluster activity in the field of green transformation, taking into account the green, low-carbon and circular economy. Our intention was to identify the main green practices used by cluster organizations, which we showed through the lens of the attributes of both the cluster and the cluster organization. Through our study, we sought to answer the question: what is the role of cluster organizations in...
-
On the distillation of cryptographic key from multipartie entangled quantum states
PublikacjaCelem pracy było uzupełnienie ogólnego paradygmatu destylacji bezpiecznego klucza kryptograficznego z dwucząstkowych stanów splątanych, a w szczegolności znalezienie nowych konstrukcji stanów kwantowych o splątaniu związanym z niezerowym destylowanym kluczem kryptograficznym. Kolejnym celem pracy było uogólnienie powyższego paradygmatu dwucząstkowego na przypadek wielu cząstek. W szczególności sformułowanie definicji wielocząstkowych...
-
Innovative Techniques of Processing Human Milk to Preserve Key Components
Publikacja -
Ecological trends in machining as a key factor in sustainable production – A review
Publikacja -
Planning for the redevelopment of the Imperial Shipyard - a key eleemnt of Gdańsk waterfront
PublikacjaThis article deals with the planning and implementation of the new urban concept for the young city development structure in Gdańsk
-
Long-Term Preservation Services as a Key Element of the Digital Libraries Infrastructure
Publikacja -
Comparative Analysis of the Key Factors Influencing Healthcare Systems of OECD Countries
Publikacja -
Landscape as a Potential Key Concept in Urban Environmental Planning: The Case of Poland
PublikacjaRapid urban development increases the consumption of materials, energy, and water, resulting in an overproduction of waste and emissions. These cause many environmental threats, such as ozone layer depletion and rain acidification, leading to climate change. Therefore, the question arises on how to improve the effectiveness of tools that strengthen environmental protection. This discursive article presents an approach stressing...
-
SiC-based phase-shift dual half bridge DC-DC converter as a key component of multilevel cascaded MV converters
PublikacjaThe paper describes SiC-based dual half bridge (DHB) DC-DC converter considered as a key component of high frequency isolated multilevel cascaded medium voltage converters. Two topologies of bi-directional DC-DC converters: the resonant half-bridge DC-DC converter and the phase-shift DHB converter are compared in the paper. Experimental results of SiC-based 50 kHz DHB DC-DC converter are presented in the paper.
-
Key-Marker Volatile Compounds in Aromatic Rice (Oryza sativa) Grains: An HS-SPME Extraction Method Combined with GC×GC-TOFMS
PublikacjaThe aroma of rice essentially contributes to the quality of rice grains. For some varieties, their aroma properties really drive consumer preferences. In this paper, using a dynamic headspace solid-phase microextraction (HS-SPME) system coupled to a two-dimensional gas chromatography (GC×GC) using a time-of-flight mass spectrometric detector (TOFMS) and multivariate analysis, the volatile compounds of aromatic and non-aromatic...
-
The advanced monitoring as a key factor for appropriate optimization and control of full-scale activated sludge systems – case study Debogorze WWTP.
PublikacjaComputer simulation has become a helpful tool in wastewater treatment systems performance and effectiveness analysis. Advanced monitoring, by using appropriate software, enables to create a mathematical model of a real wastewater treatment plant (WWTP), run a simulation and subsequently interpret results under various conditions. An operation of WWTP is usually controlled by global parameters such as flow, solids retention time,...
-
Stability of CII is a key element in the cold stress response of bacteriophage lambda infection
Publikacja -
ClaR—a novel key regulator of cellobiose and lactose metabolism in Lactococcus lactis IL1403
Publikacja