Filtry
wszystkich: 1238
-
Katalog
- Publikacje 1110 wyników po odfiltrowaniu
- Czasopisma 37 wyników po odfiltrowaniu
- Konferencje 11 wyników po odfiltrowaniu
- Osoby 24 wyników po odfiltrowaniu
- Projekty 1 wyników po odfiltrowaniu
- Kursy Online 20 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 34 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: randomness generation protocols
-
Robustness of quantum-randomness expansion protocols in the presence of noise
PublikacjaIn this paper we investigate properties of several randomness generation protocols in the device independent framework. Using Bell-type inequalities it is possible to certify that the numbers generated by an untrusted device are indeed random. We present a selection of certificates which guarantee two bits of randomness for each run of the experiment in the noiseless case and require the parties to share a maximally entangled state....
-
Increased Certification of Semi-device Independent Random Numbers using Many Inputs and More Postprocessing
PublikacjaQuantum communication with systems of dimension larger than two provides advantages in information processing tasks. Examples include higher rates of key distribution and random number generation. The main disadvantage of using such multi-dimensional quantum systems is the increased complexity of the experimental setup. Here, we analyze a not-so-obvious problem: the relation between randomness certification and computational requirements...
-
Free randomness amplification using bipartite chain correlations
PublikacjaA direct analysis of the task of randomness amplification from Santha-Vazirani sources using the violation of the chained Bell inequality is performed in terms of the convex combination of no-signaling boxes required to simulate quantum violation of the inequality. This analysis is used to find the exact threshold value of the initial randomness parameter from which perfect randomness can be extracted in the asymptotic limit of...
-
Applications of semi-definite optimization in quantum information protocols
PublikacjaThis work is concerned with the issue of applications of the semi-definite programming (SDP) in the field of quantum information sci- ence. Our results of the analysis of certain quantum information protocols using this optimization technique are presented, and an implementation of a relevant numerical tool is introduced. The key method used is NPA discovered by Navascues et al. [Phys. Rev. Lett. 98, 010401 (2007)]. In chapter...
-
Device-independent quantum key distribution based on measurement inputs
PublikacjaWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Properties of dimension witnesses and their semidefinite programming relaxations
PublikacjaIn this paper we develop a method for investigating semi-device-independent randomness expansion protocols that was introduced in Li et al. [H.-W. Li, P. Mironowicz, M. Pawłowski, Z.-Q. Yin, Y.-C. Wu, S. Wang, W. Chen, H.-G. Hu, G.-C. Guo, and Z.-F. Han, Phys. Rev. A 87, 020302(R) (2013)]. This method allows us to lower bound, with semi-definite programming, the randomness obtained from random number generators based on dimension...
-
Elemental and tight monogamy relations in nonsignaling theories
PublikacjaPhysical principles constrain the way nonlocal correlations can be distributed among distant parties. These constraints are usually expressed by monogamy relations that bound the amount of Bell inequality violation observed among a set of parties by the violation observed by a different set of parties. We prove here that much stronger monogamy relations are possible for nonsignaling correlations by showing how nonlocal correlations...
-
Quantum randomness protected against detection loophole attacks
PublikacjaDevice and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....
-
Randomness Amplification under Minimal Fundamental Assumptions on the Devices
PublikacjaRecently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components...
-
Relationship between semi- and fully-device-independent protocols
PublikacjaWe study the relation between semi and fully device independent protocols. As a tool, we use the correspondence between Bell inequalities and dimension witnesses. We present a method for converting the former into the latter and vice versa. This relation provides us with interesting results for both scenarios. First, we find new random number generation protocols with higher bit rates for both the semi and fully device independent...
-
Experimental certification of more than one bit of quantum randomness in the two inputs and two outputs scenario
PublikacjaOne of the striking properties of quantum mechanics is the occurrence of the Bell-type non-locality. They are a fundamental feature of the theory that allows two parties that share an entangled quantum system to observe correlations stronger than possible in classical physics. In addition to their theoretical significance, non-local correlations have practical applications, such as device-independent randomness generation, providing...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublikacjaThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublikacjaRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
The need for new transport protocols on the INTERNET
PublikacjaThe TCP/IP protocol suite is widely used in IP networks, regardless of diverse environments and usage scenarios. Due to the fact of being the basic concept of organizing the work of the Internet, it is the subject of interest and constant analysis of operators, users, network researchers, and designers. The Internet is a "living" organism in which new needs appear all the time. This is particularly important due to the emerging...
-
IoT protocols, architectures, and applications
PublikacjaThe proliferation of embedded systems, wireless technologies, and Internet protocols have enabled the IoT to bridge the gap between the virtual and physical world enabling the monitoring and control of the environment by data processing systems. IoT refers to the inter-networking of everyday objects that are equipped with sensing, computation, and communication capabilities. These networks can collaboratively interact and perform...
-
Structure and Randomness in Planning and Reinforcement Learning
PublikacjaPlanning in large state spaces inevitably needs to balance the depth and breadth of the search. It has a crucial impact on the performance of a planner and most manage this interplay implicitly. We present a novel method \textit{Shoot Tree Search (STS)}, which makes it possible to control this trade-off more explicitly. Our algorithm can be understood as an interpolation between two celebrated search mechanisms: MCTS and random...
-
Sylwester Kaczmarek dr hab. inż.
OsobySylwester Kaczmarek ukończył studia w 1972 roku jako mgr inż. Elektroniki, a doktorat i habilitację uzyskał z technik komutacyjnych i inżynierii ruchu telekomunikacyjnego w 1981 i 1994 roku na Politechnice Gdańskiej. Jego zainteresowania badawcze ukierunkowane są na: sieci IP QoS, sieci GMPLS, sieci SDN, komutację, ruting QoS, inżynierię ruchu telekomunikacyjnego, usługi multimedialne i jakość usług. Aktualnie jego badania skupiają...
-
A random signal generation method for microcontrollers with DACs
PublikacjaA new method of noise generation based on software implementation of a 7-bit LFSR based on a common polynomial PRBS7 using microcontrollers equipped with internal ADCs and DACs and a microcontroller noise generator structure are proposed in the paper. Two software applications implementing the method: written in ANSI C and based on the LUT technique and written in AVR Assembler are also proposed. In the method the ADC results are...
-
Better understanding EMI generation of power converters
PublikacjaPrzedstawiono metodę przewidywania poziomu zaburzeń w układzie podwyższającym napięcie w oparciu o metodę filtracji Wienera. Pozwoliło to na określenie odpowiedzi impulsowej pomiędzy przyczyną zaburzenia (zmianą napięcia na elementach półprzewdonikowych) a zaburzeniem. Metodę zwerifikowano przy użyciu danych z symulacji oraz pomiarów w rzeczywistym obiekcie
-
Life Cycle Assessment of Analytical Protocols
Publikacja -
Life Cycle Assessment of Analytical Protocols
PublikacjaLife cycle assessment is a relatively new tool for environmental management, which is becoming more and more important owing to the globalization of the world economy, where there is a need to develop standards in protecting the environment
-
An integrated method for security protocols analysis
Publikacja -
Soft Real-Time Communication with WebSocket and WebRTC Protocols Performance Analysis for Web-based Control Loops
PublikacjaThe web browser has become an access window for content and services. The browser is available on almost any device connected to the network, regardless of its intended use: desktop, mobile device, computing server, e-book reader etc. Browsers are used by people to read news, contact the world, to check a bank account, register a visit at the doctor, watching video content, electronic purchases, using web versions of the office...
-
Interlaboratory Test to Characterize the Cyclic Behavior of Bituminous Interlayers: An Overview of Testing Equipment and Protocols
PublikacjaThe performance assessment of multi-layered pavements strongly depends on the mechanical behavior of the interface between bituminous layers. So far, comprehensive studies have been carried out mainly using quasi-static laboratory tests focusing on the interlayer shear strength at failure. However, it is generally recognized that cyclic shear testing will lead to the determination of parameters which are more closely linked to...
-
Comparative Review of Selected Internet Communication Protocols
Publikacja -
A model-based approach to analysis of authentication protocols.
PublikacjaW referacie przedstawiono zintegrowane podejście do analizy protokołów uwierzytelniania o nazwie Object-oriented Formal Authentication Protocol Security Analysis Framework (OF-APSAF). Podejście to jest zaprojektowane na bazie sprawdzonej metody formalnej CSP wraz z narzędziami ją wspierającymi: Casper oraz FDR. Jego integralną częścią jest półformalna zorientowana obiektowo technika modelowania protokołów, ich kontekstu oraz wymagań...
-
Interlaboratory Test to Characterize the Cyclic Behavior of Bituminous Interlayers: An Overview of Testing Equipment and Protocols
PublikacjaThe performance assessment of multi-layered pavements strongly depends on the mechanical behavior of the interface between bituminous layers. So far, comprehensive studies have been carried out mainly using quasi-static laboratory tests focusing on the interlayer shear strength at failure. However, it is generally recognized that cyclic shear testing will lead to the determination of parameters which are more closely linked to...
-
Finite element matrix generation on a GPU
PublikacjaThis paper presents an efficient technique for fast generation of sparse systems of linear equations arising in computational electromagnetics in a finite element method using higher order elements. The proposed approach employs a graphics processing unit (GPU) for both numerical integration and matrix assembly. The performance results obtained on a test platform consisting of a Fermi GPU (1x Tesla C2075) and a CPU (2x twelve-core...
-
Current Protocols
Czasopisma -
STAR Protocols
Czasopisma -
Methods and Protocols
Czasopisma -
Analysis of electricity generation variability in 2019 with special consideration of electrical energy generation from wind sources.
PublikacjaThis article presents issues related to the broadly understood development of wind energy. The state of the art of wind energy in the world has been discussed. This paper also shows issues related to factors affecting the development of renewable energy sources and their impact on the natural environment on the basis of available research. The focus is, however, on the critical analysis of phenomena in the data of the Transmission...
-
Systematic Test Data Generation for Embedded Software
PublikacjaSystematic Test Data Generation for Embedded Software
-
Power Generation Technology
Czasopisma -
Cryptographic Protocols' Performance and Network Layer Security of RSMAD
PublikacjaW artykule omówiono architekturę bezpieczeństwa warstwy sieciowej Radiowego Systemu Monitorowania i Akwizycji Danych z urządzeń fotoradarowych (w skrócie RSMAD). Bezpieczeństwo w warstwie sieciowej tego systemu jest zapewniane przede wszystkim dzięki wykorzystaniu Virtual Private Network (w skrócie VPN). W tym celu zaimplementowano dwa protokoły IPsec i L2TP.Zastosowane mechanizmy ochrony danych, w tym typy i parametry VPNów zostały...
-
Application of Majority Voting Protocols to Supporting Trading Decisions
PublikacjaA broad spectrum of analysis and prediction indicators and methods exists to support trading decisions, but no hard knowledge exist to tell in advance which of them will fit best in a given timeframe. To support trading decisions, a multi-agent self-organizing system has been proposed. The system is based on history based dynamic weight voting and selects the right indicators based on their past performance. The formal analysis...
-
APPLICATION OF MAJORITY VOTING PROTOCOLS TO SUPPORTING TRADING DECISIONS
PublikacjaA broad spectrum of analysis and prediction indicators and methods exists to support trading decisions, but no hard knowledge exist to tell in advance which of them will fit best in a given timeframe. To support trading decisions, a multi-agent self-organizing system has been proposed. The system is based on history based dynamic weight voting and selects the right indicators based on their past performance. The formal analysis...
-
Application capabilities of the maximum distributed generation estimate methodology
PublikacjaThe paper presents application capabilities of the maximum distributed generation estimate methodology. This subject is an example of solutions to the problem that today face the transmission system operator and distribution system operators, which is related to the high saturation with wind power generation predicted for the near future.
-
Physical and chemical basis of energy generation
Kursy Online -
CRVG - a new model for wireless networks topology generation
PublikacjaThis paper presents a new model of wireless network topology generator. Its main advantage is the possibility of relatively sparse networks generation. Because no iteration is needed, the model can be used for massive generation of networks for testing. The topological properties of produced graphs place them in the class of scale free networks, resembling real ones.
-
Generation and Propagation of Nonlinear Waves in a Towing Tank
PublikacjaThe paper presents the results of the research focused on linear and nonlinear wave generation and propagation in a deepwater towing tank equipped with a single flap-type wavemaker of variable draft. The problem of wave generation and propagation has been theoretically formulated and solved by applying an analytical method; linear and nonlinear solutions were obtained. The linear solution has been verified experimentally. The...
-
Extended Reflexive Ontologies for the Generation of Clinical Recommendations
PublikacjaDecision recommendations are a set of alternative options for clinical decisions (e.g., diagnosis, prognosis, treatment selection, follow-up, and prevention) that are provided to decision makers by knowledge-based Clinical Decision Support Systems (k-CDSS) as aids. We propose to follow a ‘‘reasoning over domain’’ approach for the generation of decision recommendations by gathering and inferring conclusions from production rules....
-
Next generation radio communication systems (2022)
Kursy Online -
Ad hoc routing protocols - security objectives, threats and solution
PublikacjaZaprezentowano przykładowe strategie routingu stosowane w bezprzewodowych sieciach ad-hoc z transmisją wieloetapową. Dokonanao przegladu protokołow routingu, zidentyfikowano podstawowe typy ataków i zagrożenia integralności i poufności transmisji w sieciach bezprzewodowych. Przedstawiono przykładowe rozwiazania algorytmów routingu.
-
Appraisement of modifications in dynamic routing protocols to support the IPng Protocol
PublikacjaW pracy, biorąc pod uwagę dynamiczny proces migracji sieci IPv4 do nowej wersji protokołu IP, przedstawiono konieczność realizacji w Internecie nowych protokołów routingu dynamicznego lub adaptacji już istniejących do nowego protokołu IPng. W artykule przedstawiono sposoby dostosowania protokołów routingu dynamicznego RIP, OSPF, BGP do nowego protokołu IP. Oceniono wpływ w/w dostosowywania na zbieżność i skalowalność protokołów...
-
A model-based approach to analysis of security protocols - a case study
PublikacjaArtykuł przedstawia zintegrowane środowisko analizy protokołów bezpieczeństwa. Środowisko zostało oparte o znaną metodę formalną CSP oraz wspierające ją narzędzia: Casper oraz FDR. Integralną częścią opisywanego środowiska jest pół-formalne zorientowane obiektowo podejście do modelowania protokołów kryptograficznych, ich kontekstu aplikacyjnego oraz wymagań bezpieczeństwa. Modelowanie obiektowe zostało oparte o język UML oraz...
-
Arabinoxylans: A review on protocols for their recovery, functionalities and roles in food formulations
PublikacjaArabinoxylans (AXs) are compounds with high nutritional value and applicability, including prebiotics or supplementary ingredients, in food manufacturing industries. Unfortunately, the recovery of AXs may require advanced separation and integrated strategies. Here, an analysis of the emerging techniques to extract AXs from cereals and their by-products is discussed. This review covers distinct methods implemented over the last...
-
NEW TRENDS IN DEVELOPMENT OF ORC'S FOR MICROPOWER GENERATION
PublikacjaIn the paper, new trends in development of micropower generation of heat and electricity are presented. New type of CHP for domestic usage is developed in the Institute of Fluid-Flow Machinery PAS and methods of its design are presented. The most promising trends in equipment of ORC cycle for this purpose were discussed. Main attention was focused on micro-heat exchangers design based on micro-channels and micro-jets. In our opinion...
-
Generation of random fields to reflect material and geometric imperfections of plates and shells
PublikacjaThe paper covers two patterns of random field generation: conditional acceptance – rejection method and Karhunen – Loève expansion. The generation of two-dimensional random fields is essential in plates and shells analysis, allowing for a relevant limit and critical state assessment of geometrically and ma-terially imperfect structures. The features of both generation methods dedicate them to selected problems.
-
OpenGL accelerated method of the material matrix generation for FDTD simulations
PublikacjaThis paper presents the accelerated technique of the material matrix generation from CAD models utilized by the finite-difference time-domain (FDTD) simulators. To achieve high performance of these computations, the parallel-processing power of a graphics processing unit was employed with the use of the OpenGL library. The method was integrated with the developed FDTD solver, providing approximately five-fold speedup of the material...