Wyniki wyszukiwania dla: QUANTUM RANDOM ACCESS CODES
-
Connections between Mutually Unbiased Bases and Quantum Random Access Codes
PublikacjaWe present a new quantum communication complexity protocol, the promise--Quantum Random Access Code, which allows us to introduce a new measure of unbiasedness for bases of Hilbert spaces. The proposed measure possesses a clear operational meaning and can be used to investigate whether a specific number of mutually unbiased bases exist in a given dimension by employing Semi--Definite Programming techniques.
-
Complementarity between entanglement-assisted and quantum distributed random access code
PublikacjaCollaborative communication tasks such as random access codes (RACs) employing quantum resources have manifested great potential in enhancing information processing capabilities beyond the classical limitations. The two quantum variants of RACs, namely, quantum random access code (QRAC) and the entanglement-assisted random access code (EARAC), have demonstrated equal prowess for a number of tasks. However, there do exist specific...
-
Experimentally feasible semi-device-independent certification of four-outcome positive-operator-valued measurements
PublikacjaRecently the quantum information science community devoted a lot of attention to the theoretical and practical aspects of generalized measurements, the formalism of all possible quantum operations leading to acquisition of classical information. On the other hand, due to imperfections present in quantum devices, and limited thrust to them, a trend of formulating quantum information tasks in a semi-device-independent manner emerged....
-
Quantum Steering Inequality with Tolerance for Measurement-Setting Errors: Experimentally Feasible Signature of Unbounded Violation
Publikacjauantum steering is a relatively simple test for proving that the values of quantum-mechanical measurement outcomes come into being only in the act of measurement. By exploiting quantum correlations, Alice can influence — steer — Bob ’ s physical system in a way that is impossible in classical mechanics, as shown by the violation of steering inequalities. Demonstrating this and similar quantum effects for systems of increasing size,...
-
Marek Czachor prof. dr hab.
Osoby -
Multiacces quantum communication and product higher rank numerical range
PublikacjaIn the present paper we initiate the study of the product higher rank numerical range. The latter, being a variant of the higher rank numerical range, is a natural tool for study- ing a construction of quantum error correction codes for multiple access channels. We review properties of this set and relate it to other numerical ranges, which were recently introduced in the literature. Further, the concept is applied to the construction...
-
Decoherence-free communication over multiaccess quantum channels
PublikacjaIn this paper we consider decoherence-free communication over multiple access and k-user quantum channels. First, we concentrate on a hermitian unitary noise model U for a two-access bi-unitary channel and show that in this case a decoherence-free code exists if the space of Schmidt matrices of an eigensubspace of U exhibits certain properties of decomposability. Then, we show that our technique is also applicable for generic random unitary...
-
Increased Certification of Semi-device Independent Random Numbers using Many Inputs and More Postprocessing
PublikacjaQuantum communication with systems of dimension larger than two provides advantages in information processing tasks. Examples include higher rates of key distribution and random number generation. The main disadvantage of using such multi-dimensional quantum systems is the increased complexity of the experimental setup. Here, we analyze a not-so-obvious problem: the relation between randomness certification and computational requirements...
-
Nonadditivity of quantum and classical capacities for entanglement breaking multiple-access channels and the butterfly network
PublikacjaWe analyze quantum network primitives which are entanglement breaking. We show superadditivity of quantum and classical capacity regions for quantum multiple-access channels and the quantum butterfly network. Since the effects are especially visible at high noise they suggest that quantum information effects may be particularly helpful in the case of the networks with occasional high noise rates. The present effects provide a qualitative...
-
Quantum superadditivity in linear optics networks: Sending bits via multiple-access Gaussian channels
PublikacjaSuperadditivity effects of communication capacities are known in the case of discrete variable quantum channels. We describe the continuous variable analog of one of these effects in the framework of Gaussian multiple access channels (MACs). Classically, superadditivity-type effects are strongly restricted: For example, adding resources to one sender is never advantageous to other senders in sending their respective information...
-
Subadditivity of the minimum output entropy and superactivation of the classical capacity of quantum multiple access channels
PublikacjaWe study subadditivity of the minimum output entropy (Hmin) of quantum multiple access channels (MACs). We provide an example of violation of the additivity theorem for Hmin known in classical information theory. Our result is based on a fundamental property of MACs, i.e., independence of each sender. The channels used in the example can be constructed explicitly. On the basis of subadditivity of Hmin we also provide an example...
-
Purely quantum superadditivity of classical capacities of quantum multiple access channels
PublikacjaWe are studying classical capacities of quantum memoryless multiaccess channels in geometric terms and we are revealing a break of additivity of the Holevo-like capacity. This effect is a purely quantum mechanical one, since, as we point out, the capacity regions of all classical memoryless multiaccess channels are additive. It is the first such effect revealed in the field of classical information transmission via quantum channels.
-
Oxide layers fabricated by spray pyrolysis for resistance random access memory
PublikacjaW pracy zbadano przydatność pirolizy aerozolowej do wytwarzania warstw dla memrystorów.
-
A random access protocol under backoff attack: performance and game-theoretic deterrent
PublikacjaPrzedstawiono metodę obrony przed atakiem na protokół CSMA/CA, opartą na generacji sekwencji zagłuszających z wykorzystaniem wzajemnej słyszalności stacji. Na podstawie analizy wypłat odpowiedniej gry w formie rozwiniętej pokazano możliwość osiągania punktu równowagi odpowiadającego standardowym ustawieniom protokołu.
-
Kamila Kokot-Kanikuła mgr
OsobyKamila Kokot-Kanikuła pracuje w Bibliotece Politechniki Gdańskiej w Sekcji Budowy Zbiorów Cyfrowych i Multimedialnych na stanowisku starszego bibliotekarza. Jest absolwentką Instytutu Historycznego oraz Informacji Naukowej i Bibliotekoznawstwa na Uniwersytecie Wrocławskim. Główne kierunki zainteresowań to starodruki, biblioteki cyfrowe, repozytoria instytucjonalne, Otwarte Zasoby Edukacyjne, Open Access i Open Data. W bibliotece...
-
Performance analysis of data transmission in MC-CDMA radio interface with turbo codes
PublikacjaMulti-carrier code division multiple access (MC-CDMA) technique is a combination of two radio access techniques: CDMA and orthogonal frequency division multiplexing and has the advantages of both techniques. The paper presents the design of transmitter and receiver for MC-CDMA radio interface. It also presents encoders and decoders of turbo codes which were used in simulation of the MC-CDMA technique. Two turbo codes with 8-state...
-
Własności kwantowe przemian energetycznych zachodzących w silnikach o zapłonie samoczynnym = Quantum properties of energy transformation in diesel engines
PublikacjaW pracy uzasadniono, że w badaniach własności energetycznych silników spalinowych o zapłonie samoczynnym należy uwzględnić istniejącą w ich eksploatacji przypadkowość i nieprzewidywalność zdarzeń. Nawiązano do osiągnięć mechaniki kwantowej wskazując na wynikający z nich postulat, że wielkości nazywane komplementarnymi, mają istotną własność, która polega na tym, że niemożliwy jest jednoczesny i zarazem dokładny pomiar ich wartości....
-
Kod fontannowy z przyrastającą liczbą symboli źródłowych
PublikacjaKody fontannowe zabezpieczające transmisję przed wymazaniami wyróżnia brak określonej z góry długości i losowy sposób generacji kolejnych pakietów kodowych. W pracy pokazano jak właściwości tych kodów zależą od rozkładu macierzy generującej dla dwóch wariantów dostarczania pakietów do kodera. Szczególnie interesujący jest przypadek, gdy pakiety źródłowe trafiają do kodera stopniowo podczas transmisji. Uzyskane wyniki wskazują na...
-
Quantum security and theory of decoherence
PublikacjaWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
Generic emergence of classical features in quantum Darwinism
PublikacjaQuantum Darwinism posits that only specific information about a quantum system that is redundantly proliferated to many parts of its environment becomes accessible and objective, leading to the emergence of classical reality. However, it is not clear under what conditions this mechanism holds true. Here we prove that the emergence of classical features along the lines of quantum Darwinism is a general feature of any quantum dynamics:...
-
Analytical studies of spectrum broadcast structures in quantum Brownian motion
PublikacjaSpectrum broadcast structures are a new and fresh concept in the quantum-to-classical transition, introduced recently in the context of decoherence and the appearance of objective features in quantum mechanics. These are specific quantum state structures, responsible for the objectivization of the decohered state of a system. Recently, they have been demonstrated by means of the well-known quantum Brownian motion model of the recoilless...
-
No Quantum Realization of Extremal No-Signaling Boxes
PublikacjaThe study of quantum correlations is important for fundamental reasons as well as for quantum communication and information processing tasks. On the one hand, it is of tremendous interest to derive the correlations produced by measurements on separated composite quantum systems from within the set of all correlations obeying the no-signaling principle of relativity, by means of information-theoretic principles. On the other hand,...
-
Generic appearance of objective results in quantum measurements
PublikacjaMeasurement is of central interest in quantum mechanics as it provides the link between the quantum world and the world of everyday experience. One of the features of everyday experience is its robust, objective character, contrasting the delicate nature of quantum systems. Here we analyze in a completely model-independent way the celebrated von Neumann measurement process, using recent techniques of information flow, studied in...
-
Analysis of distance measurement errors in CW FM sonar with MLS code modulation
PublikacjaAlthough used in the classic silent sonar, the CW FM sounding signal has a major flaw which is its inaccuracy in determining the distance to a target. The authors of the article have developed a concept of silent sonar using frequency modulation signals switched by pseudorandom codes, already discussed in their previous work. This article presents a detailed analysis of errors in CW FM sonar with pseudo-random sequence code modulation...
-
Applications of semi-definite optimization in quantum information protocols
PublikacjaThis work is concerned with the issue of applications of the semi-definite programming (SDP) in the field of quantum information sci- ence. Our results of the analysis of certain quantum information protocols using this optimization technique are presented, and an implementation of a relevant numerical tool is introduced. The key method used is NPA discovered by Navascues et al. [Phys. Rev. Lett. 98, 010401 (2007)]. In chapter...
-
Evaluation of ChatGPT Applicability to Learning Quantum Physics
PublikacjaChatGPT is an application that uses a large language model. Its purpose is to generate answers to various questions as well as provide information, help solve problems and participate in conversations on a wide range of topics. This application is also widely used by students for the purposes of learning or cheating (e.g., writing essays or programming codes). Therefore, in this contribution, we evaluate the ability of ChatGPT...
-
Cichy sonar - stan aktualny i perspektywy
PublikacjaW zastosowaniach militarnych często istnieje potrzeba prowadzenia obserwacji w sposób skryty za pomocą urządzeń emitujących sygnały trudne do przechwycenia przez przeciwnika. Rozwiązania stosowane w cichych radarach stanowiły punkt wyjścia do opracowania cichego sonaru. Prace nad projektem rozpoczęto na Politechnice Gdańskiej w roku 2010 w ramach Grantu NCBiR i są one dalej kontynuowane. W celu zachowania w cichym sonarze warunków...
-
A Parallel MPI I/O Solution Supported by Byte-addressable Non-volatile RAM Distributed Cache
PublikacjaWhile many scientific, large-scale applications are data-intensive, fast and efficient I/O operations have become of key importance for HPC environments. We propose an MPI I/O extension based on in-system distributed cache with data located in Non-volatile Random Access Memory (NVRAM) available in each cluster node. The presented architecture makes effective use of NVRAM properties such as persistence and byte-level access behind...
-
Distributed correlations and information flows within a hybrid multipartite quantum-classical system
PublikacjaUnderstanding the non-Markovian mechanisms underlying the revivals of quantum entanglement in the presence of classical environments is central in the theory of quantum information. Tentative interpretations have been given by either the role of the environment as a control device or the concept of hidden entanglement. We address this issue from an information-theoretic point of view. To this aim, we consider a paradigmatic tripartite...
-
NVRAM as Main Storage of Parallel File System
PublikacjaModern cluster environments' main trouble used to be lack of computational power provided by CPUs and GPUs, but recently they suffer more and more from insufficient performance of input and output operations. Apart from better network infrastructure and more sophisticated processing algorithms, a lot of solutions base on emerging memory technologies. This paper presents evaluation of using non-volatile random-access memory as a...
-
Impact of dyes isomerization effect on the charge transfer phenomenon occurring on the dye/nanosemiconductor interface
PublikacjaThe present work aimed to find the answer how does the isomerization of the Ru based dyes affect the overall photon-to-current efficiency of the DSSCs and to explain the charge transfer phenomenon occurring on the dye/ nanosemiconductor interface. Therefore, electronic and optical properties of three bipyridine derivatives anchored on the TiO2 electrode were investigated by computational simulations based on quantum chemistry codes...
-
Convex set of quantum states with positive partial transpose analysed by hit and run algorithm
PublikacjaThe convex set of quantum states of a composite K×K system with positive partial transpose is analysed. A version of the hit and run algorithm is used to generate a sequence of random points covering this set uniformly and an estimation for the convergence speed of the algorithm is derived. For K >3 or K=3 this algorithm works faster than sampling over the entire set of states and verifying whether the partial transpose is positive....
-
Experimental certification of more than one bit of quantum randomness in the two inputs and two outputs scenario
PublikacjaOne of the striking properties of quantum mechanics is the occurrence of the Bell-type non-locality. They are a fundamental feature of the theory that allows two parties that share an entangled quantum system to observe correlations stronger than possible in classical physics. In addition to their theoretical significance, non-local correlations have practical applications, such as device-independent randomness generation, providing...
-
Quality of graphical markers for the needs of eyewear devices
Publikacjain this paper we propose to cast the problem of identification of people, objects or places into an application for smart glasses that decodes information from graphical markers. We focus on analyzing different factors that can have influence on the processes of the automatic recognition of information from a code. The research we present aims at reviewing recognition performances in function of: size of a marker, distance from/to...
-
Study of the Performance of DSSS UAC System Depending on the System Bandwidth and the Spreading Sequence
PublikacjaA signal transmitted in an Underwater Acoustic Communication (UAC) system operating in a shallow-water channel suffers from strong time dispersion due to multipath propagation. This causes the Inter-Symbol Interference (ISI) observed in the received signal, which significantly limits the communication system’s reliability and transmission rate. In such propagation conditions, the Direct-Sequence Spread Spectrum (DSSS) method is...
-
Nanostructures fabrication with use of electrical AFM litography
Dane BadawczeIn the last 10 years, one of the nanotechnological trends has been observed, consisting in the development of new variants of computer memory systems with high capacity and speed of access, using quantum dots. One of the techniques for creating nanodots and other nanostructures is based on the use of an atomic force microscope acting as a lithographic...
-
Device-independent quantum key distribution based on measurement inputs
PublikacjaWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Distributed Representations Based on Geometric Algebra: the Continuous Model
PublikacjaAuthors revise the concept of a distributed representation of data as well as two previously developed models: Holographic Reduced Representation (HRR) and Binary Spatter Codes (BSC). A Geometric Analogue (GAc - ''c'' stands for continuous as opposed to its discrete version) of HRR is introduced - it employs role-filler binding based on geometric products. Atomic objects are real-valued vectors in n-dimensional Euclidean space...
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublikacjaRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
Extensions of ETSI performance measurements methodology for statistical results analysis =Rozszerzenia metodologii pomiarów wydajności zaproponowanej przez ETSI przy statystycznej analizy wyników
PublikacjaNext Generation Network (NGN) architecture was proposed by International Telecommunication Union Telecommunication Standardization Sector (ITU-T) to deliver telecommunication services satisfying the needs of modern society for an access to information. The core of NGN service stratum are IP Multimedia Subsystem (IMS) elements acting as service controls units. To assess performance of IMS components, European Telecommunications...
-
Performance of the Direct Sequence Spread Spectrum Underwater Acoustic Communication System with Differential Detection in Strong Multipath Propagation Conditions
PublikacjaThe underwater acoustic communication (UAC) operating in very shallow-water should ensure reliable transmission in conditions of strong multipath propagation, significantly disturbing the received signal. One of the techniques to achieve this goal is the direct sequence spread spectrum (DSSS) technique, which consists in binary phase shift keying (BPSK) according to a pseudo-random spreading sequence. This paper describes the DSSS...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublikacjaThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
A Wideband Channel Model for Body Area Networks in Circular Metallic Indoor Environments
PublikacjaIn this paper, the wideband characterization of the propagation channel in circular metallic indoor environments is addressed, regarding Body Area Networks and 5G small cells, an analytical model for the dependence of the mean delay and the average delay spread on the circle radius, the working frequency and the distance between the transmitter and the receiver being proposed. The derivation of the model is initially done analytically,...
-
Integrated model for the fast assessment of flood volume: Modelling – management, uncertainty and sensitivity analysis
PublikacjaThe specific flood volume is an important criterion for assessing the performance of sewage networks. It has been shown that its value is greatly influenced by the layout of the sewers in the catchment area, which is usually expressed by a fractal dimension. Currently, only mechanistic models (such as SWMM) enable the determination of the impact of the layout of the sewers on flooding volume, but they require additional and robust...
-
Linear-scaling calculation of Hartree-Fock exchange energy with Non-orthogonal Generalised Wannier Functions
PublikacjaWe present a method for the calculation of four-centre two-electron repulsion integrals in terms of localised non-orthogonal generalised Wannier functions (NGWFs). Our method has been imple- mented in the ONETEP program and is used to compute the Hartree-Fock exchange energy component of Hartree-Fock and Density Functional Theory (DFT) calculations with hybrid exchange-correlation functionals. As the NGWFs are optimised in situ...
-
Comparing Apples and Oranges: A Mobile User Experience Study of iOS and Android Consumer Devices
PublikacjaWith the rapid development of wireless networks and the spread of broadband access around the world, the number of active mobile user devices continues to grow. Each year more and more terminals are released on the market, with the smartphone being the most popular among them. They include low-end, mid-range, and of course high-end devices, with top hardware specifications. They do vary in build quality, utilized type of material,...
-
Magnetism from fundamentals to spintronics 22/23
Kursy Online1. Basic magnetic quantities2. Magnetism of atoms and molecules, atoms in external magnetic fields3. Solid state magnetism, types of magnetic materials (dia-, para-, and ferromagnetism)4. Ferromagnetism and domain structures5. Magnetism of small particles, single domain particles (StonerWohlfarth model), thin films6. Experimental techniques of magnetic properties and magnetisation state determination. Domain structurevisualisation...
-
Computer controlled systems - 2022/2023
Kursy Onlinemateriały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution...
-
CCS-lecture-2023-2024
Kursy Onlinemateriały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution optimization...