Filtry
wszystkich: 25297
-
Katalog
- Publikacje 3269 wyników po odfiltrowaniu
- Czasopisma 611 wyników po odfiltrowaniu
- Konferencje 246 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 249 wyników po odfiltrowaniu
- Projekty 12 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Kursy Online 181 wyników po odfiltrowaniu
- Wydarzenia 4 wyników po odfiltrowaniu
- Dane Badawcze 20723 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: ANALYTIC INFORMATION THEORY
-
Product Graph Invariants with Applications in the Theory of Information
PublikacjaThere are a large number of graph invariants. In the paper, we consider some of them, e.g. the independence and chromatic numbers. It is well know that we cannot efficiently calculate these numbers for arbitrary graphs. In the paper we present relations between these invariants and concepts from the theory of information. Concepts such as source coding and transmission over a noisy channel with zero probability of error are modeled...
-
IEEE TRANSACTIONS ON INFORMATION THEORY
Czasopisma -
Foundations and Trends in Communications and Information Theory
Czasopisma -
Journal of Information Science Theory and Practice
Czasopisma -
Information Theory and Coding 2023/2024
Kursy OnlineThe course is an auxiliary tool for completing the subject Information Theory and Coding.
-
Information theory and coding 2024/2025
Kursy OnlineThe course is an auxiliary tool for completing the subject Information Theory and Coding.
-
Information Theory and Coding - 2022/2023
Kursy Online -
Information Theory Workshop
Konferencje -
Information Visualisation Theory and Practice
Konferencje -
Workshop in Information Security Theory and Practices
Konferencje -
IEEE International Symposium on Information Theory
Konferencje -
International Conference on the Theory of Information Retrieval (The 3rd ACM International Conference on the Theory of Information Retrieval)
Konferencje -
Average Redundancy of the Shannon Code for Markov Sources
PublikacjaIt is known that for memoryless sources, the average and maximal redundancy of fixed–to–variable length codes, such as the Shannon and Huffman codes, exhibit two modes of behavior for long blocks. It either converges to a limit or it has an oscillatory pattern, depending on the irrationality or rationality, respectively, of certain parameters that depend on the source. In this paper, we extend these findings, concerning the Shannon...
-
TAI: Algorithmic Information Theory: Kolmogorov Complexity
Konferencje -
International Symposium on Information Theory and Its Applications
Konferencje -
On the Limiting Distribution of Lempel-Ziv’78 Redundancy for Memoryless Sources
PublikacjaWe study the Lempel-Ziv'78 algorithm and show that its (normalized) redundancy rate tends to a Gaussian distribution for memoryless sources. We accomplish it by extending findings from our 1995 paper, in particular, by presenting a new simplified proof of the central limit theorem (CLT) for the number of phrases in the LZ'78 algorithm. We first analyze the asymptotic behavior of the total path length in the associated digital search...
-
Squashed entanglement for multipartite states and entanglement measures based on the mixed convex roof
PublikacjaNew measures of multipartite entanglement are constructedbased on two definitions of multipartite information anddifferent methods of optimizing over extensions of the states. Oneis a generalization of the squashed entanglement where one takesthe mutual information of parties conditioned on the state's extensionand takes the infimum over such extensions. Additivity ofthe multipartite squashed entanglement is proved for both versionsof...
-
Types of Markov Fields and Tilings
PublikacjaThe method of types is one of the most popular techniques in information theory and combinatorics. However, thus far the method has been mostly applied to one-dimensional Markov processes, and it has not been thoroughly studied for general Markov fields. Markov fields over a finite alphabet of size m ≥ 2 can be viewed as models for multi-dimensional systems with local interactions. The locality of these interactions is represented...
-
International Conference on the Theory and Application of Cryptology and Information Security
Konferencje -
General paradigm for distilling classical key from quantum states
PublikacjaIn this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...
-
On the Characteristic Graph of a Discrete Symmetric Channel
PublikacjaWe present some characterizations of characteristic graphs of row and/or column symmetric channels. We also give a polynomial-time algorithm that decides whether there exists a discrete symmetric channel whose characteristic graph is equal to a given input graph. In addition, we show several applications of our results.
-
A few steps more towards NPT bound entanglement
PublikacjaIn this paper, existence of bound entangled states with nonpositive partial transpose (NPT) is considered. As one knows, existence of such states would in particular imply nonadditivity of distillable entanglement. Moreover, it would rule out a simple mathematical description of the set of distillable states. The particular state, known to be 1-copy nondistillable and supposed to be bound entangled, is considered. The problem of...
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublikacjaIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublikacjaIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublikacjaThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
IEEE Information Theory Workshop on Detection, Estimation, Classification and Imaging
Konferencje -
Extending loophole-free nonlocal correlations to arbitrarily large distances
PublikacjaQuantum theory allows spatially separated observers to share nonlocal correlations, which enable them to accomplish classically inconceivable information processing and cryptographic feats. However, the distances over which nonlocal correlations can be realized remain severely limited due to their high fragility to noise and high threshold detection efficiencies. To enable loophole- free nonlocality across large distances, we introduce...
-
The OpenMolcas Web: A Community-Driven Approach to Advancing Computational Chemistry
Dane BadawczeThe developments of the open-source OpenMolcas chemistry software environment since spring 2020 are described, with a focus on novel functionalities accessible in the stable branch of the package or via interfaces with other packages. These developments span a wide range of topics in computational chemistry and are presented in thematic sections: electronic...
-
Robert Piotrowski dr hab. inż.
OsobyRobert Piotrowski jest absolwentem Wydziału Elektrotechniki i Automatyki (2001r., kierunek: Automatyka i Robotyka) oraz Wydziału Zarządzania i Ekonomii (2002r., kierunek: Organizacja Systemów Produkcyjnych) Politechniki Gdańskiej. Od 2005 roku jest zatrudniony na Wydziale Elektrotechniki i Automatyki, aktualnie w Katedrze Inteligentnych Systemów Sterowania i Wspomagania Decyzji. W 2005 roku obronił rozprawę doktorską (Automatyka...
-
Application of the numerical-analytic method for systems of differential equations with parameter
PublikacjaThe numerical-analytic method is applied to systems of differential equations with parameter under the assumption that the corresponding functions satisfy the Lipschitz conditions in matrix notation. We also obtain several existence results for problems with deviations of an argument
-
Workshop on Analytic Algorithmics and Combinatorics
Konferencje -
Tomasz Janowski dr
OsobyTomasz Janowski jest kierownikiem Katedry Informatyki w Zarządzaniu, Politechnika Gdańska; profesorem wizytującym w Department for E-Governance and Administration, University for Continuing Education Krems, Austria; oraz współredaktorem naczelnym czasopisma Government Information Quarterly, Elsevier. Wcześniej był założycielem i kierownikiem United Nations University Operating Unit on Policy-Driven Electronic Governance (UNU-EGOV),...
-
Jerzy Konorski dr hab. inż.
OsobyJerzy Konorski otrzymał tytuł mgr inż. telekomunikacji na Poitechnice Gdańskiej, zaś stopień doktora n.t. w dyscyplinie informatyka w Instytucie Podstaw Informatyki PAN. W r. 2007 obronił rozprawę habilitacyjną na Wydziale Elektroniki, Telekomnikacji i Informatyki PG. Jest autorem ponad 150 publikacji naukowych, prowadził projekty naukowo-badawcze finansowane ze środków Komitetu Badań Naukowych, UE, US Air Force Office of Scientific...
-
Marek Czachor prof. dr hab.
Osoby -
Jolanta Łopatowska dr inż.
OsobyJolanta Łopatowska, adiunkt w Katedrze Inżynierii Zarządzania i Jakości na Wydziale Zarzadzania i Ekonomii, jest absolwentką Wydziału Elektroniki PG i Instytutu Organizacji i Projektowania Systemów Produkcyjnych PG oraz doktorem w dyscyplinie nauk ekonomicznych. Jej zainteresowania naukowo-badawcze koncentrują się wokół zaawansowanych organizacyjnie i technologicznie systemów produkcyjnych, ze szczególnym uwzględnieniem procesów...
-
International Conference on Theorem Proving with Analytic Tableaux and Related Methods
Konferencje -
A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence
PublikacjaWe resolve a conjecture proposed by D.E. Knuth concerning a recurrence arising in the satisfiability problem. Knuth's recurrence resembles recurrences arising in the analysis of tries, in particular PATRICIA tries, and asymmetric leader election. We solve Knuth's recurrence exactly and asymptotically, using analytic techniques such as the Mellin transform and analytic depoissonization.
-
Application of Analytic Signal and Smooth Interpolation in Pulse Width Modulation for Conventional Matrix Converters
PublikacjaThe paper proposes an alternative and novel approach to the PWM duty cycles computation for Conventional Matrix Converters (CMC) fed by balanced, unbalanced or non–sinusoidal AC voltage sources. The presented solution simplifies the prototyping of direct modulation algorithms. PWM duty cycles are calculated faster by the smooth interpolation technique, using only vector coordinates, without trigonometric functions and angles. Both...
-
MULTI-CRITERIA INVESTMENT DECISION SUPPORT MODEL USING FUZZY ANALYTIC HIERARCHY PROCESS (F-AHP) METHOD FOR POWER INDUSTRY
PublikacjaIn this paper, the comparative analysis of two wind farm construction projects was presented. This particular type of analysis is commonly applied before purchasing investment project being in a planning phase by a company interested in its development. Conduction of this type of analysis is prompted by the necessity to take into consideration the requirements of Polish legislation. Comparison of wind farm construction projects...
-
Analiza lokalizacji biogazowni metodami AHP i taksonomi numerycznej - porównanie metod
PublikacjaArtykuł przedstawia porównanie wielokryterialnej metody Analytic Hierarchy Proces oraz taksonomii numerycznej w oparciu o wybór lokalizacji biogazowni.
-
Average Size of a Suffix Tree for Markov Sources
PublikacjaWe study a suffix tree built from a sequence generated by a Markovian source. Such sources are more realistic probabilistic models for text generation, data compression, molecular applications, and so forth. We prove that the average size of such a suffix tree is asymptotically equivalent to the average size of a trie built over n independentsequences from the same Markovian source. This equivalenceis only known for memoryless...
-
Zastosowanie metody AHP do oceny zagrożeń na stanowiskach pracy.
PublikacjaW artykule przedstawiono podstawy wielokryterialnej metody wspomagania decyzji AHP (ang. Analytic Hierarchy Process) oraz jej zastosowanie do oceny zagrożeń na stanowiskach pracy.
-
Analytical Steady-State Model of the Pipeline Flow Process
PublikacjaThe paper addresses the issue of modeling the flow process in transmission pipelines. A base model used for numerical simulation is introduced. Under certain assumptions concerning steady state analysis, the differential equations describing the process are solved analytically for two cases: zero and nonzero inclination angle α. These equations describe a constant flow rate and a corresponding distribution of the pressure along...
-
Assessment Of the Relevance of Best Practices in The Development of Medical R&D Projects Based on Machine Learning
PublikacjaMachine learning has emerged as a fundamental tool for numerous endeavors within health informatics, bioinformatics, and medicine. However, novices among biomedical researchers and IT developers frequently lack the requisite experience to effectively execute a machine learning project, thereby increasing the likelihood of adopting erroneous practices that may result in common pitfalls or overly optimistic predictions. The paper...
-
Long-distance quantum communication over noisy networks without long-time quantum memory
PublikacjaThe problem of sharing entanglement over large distances is crucial for implementations of quantum cryptography. A possible scheme for long-distance entanglement sharing and quantum communication exploits networks whose nodes share Einstein-Podolsky-Rosen (EPR) pairs. In Perseguers et al. [Phys. Rev. A 78, 062324 (2008)] the authors put forward an important isomorphism between storing quantum information in a dimension D and transmission...
-
Evaluating Industry 4.0 Implementation Challenges Using Interpretive Structural Modeling and Fuzzy Analytic Hierarchy Process
PublikacjaThe fourth industrial revolution known as Industry 4.0 is reshaping and evolving the way industries produce products and individuals live and work therefore, gaining massive attraction from academia, business and politics. The manufacturing industries are optimistic regarding the opportunities Industry 4.0 may offer such as, improved efficiency, productivity and customization. The present research contributes to the Industry 4.0...
-
An analysis of domain-based ship collision risk parameters
PublikacjaAccording to a lot of contemporary research on ship collision avoidance the classic approach parameters – distance at closest point of approach (DCPA) and time to the closest point of approach (TCPA) – are not sufficient for estimating ship collision risk and for planning evasive manoeuvres. Consequently new measures are introduced, often utilizing the concept of a ship domain. Their drawback, up to this point, was the lack of...
-
Fault diagnosing system of wheeled tractors
PublikacjaA defect of complex wheeled tractor assembles most frequently negative influence on exploitation efficiency, safety and exhaust gases emission. Structure complexity of wheeled tractors requires more and more advanced diagnostic methods for identification of their serviceable possibilities as well in manufacturing step as in exploitation. In classical diagnosing methods of wheeled tractor defects states mapping by measured diagnostic...
-
Problem of inconsistent and contradictory judgements in pairwise comparisonmethod in sense of AHP
PublikacjaThe aim of this paper is to show the relationship between inconsistent and contradictory matrices of data obtained as a result of the pairwise comparison of factors in the sense of the Analytic Hierarchy Process. The consistency check is performed to ensure that judgements are neither random nor illogical. This paper shows that even if a matrix will pass a consistency test successfully, it can be contradictory. Moreover an algorithm...
-
Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system
PublikacjaMotivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.