Filtry
wszystkich: 948
-
Katalog
- Publikacje 728 wyników po odfiltrowaniu
- Czasopisma 67 wyników po odfiltrowaniu
- Konferencje 29 wyników po odfiltrowaniu
- Osoby 14 wyników po odfiltrowaniu
- Projekty 3 wyników po odfiltrowaniu
- Kursy Online 18 wyników po odfiltrowaniu
- Wydarzenia 2 wyników po odfiltrowaniu
- Dane Badawcze 87 wyników po odfiltrowaniu
Wyniki wyszukiwania dla: TOLERANT QUANTUM COMPUTATION
-
A macroscopic device for quantum computation
PublikacjaPrzeanalizowano mechaniczny model kwantowego układu 2-bitowego. Model jest zilustrowany algorytmem Deutscha i Arvinda.
-
Consistency of Quantum Computation and the Equivalence Principle.
PublikacjaThe equivalence principle, being one of the building blocks of general relativity, seems to be crucial for analysis of quantum effects in gravity. In this paper we consider the relation between the equivalence principle and the consistency of quantum information processing in gravitational field. We propose an analysis with a looped evolution consisting of steps both in the gravitational field and in the accelerated reference frame....
-
Cartoon computation: Quantum-like algorithms without quantum mechanics
PublikacjaZaproponowano formalizm prowadzący do algorytmów analogicznych do kwantowych, lecz wykorzystujący jedynie struktury geometryczne. Jako przykład sformułowano odpowiednik kwantowego algorytmu Deutscha-Jozsy.
-
QUANTUM INFORMATION & COMPUTATION
Czasopisma -
A new quantum-inspired approach to reduce the blocking probability of demands in resource-constrained path computation scenarios
PublikacjaThis article presents a new approach related with end-to-end routing, which, owing to quantum-inspired mecha-nisms of prediction of availability of network resources, results in improved blocking probability of incoming requests to establish transmission paths. The proposed scheme has been analyzed for three network topologies and several scenarios of network load. Obtained results show a significant (even twofold) reduction of...
-
International Conference on Experimental Implementation of Quantum Computation
Konferencje -
Are quantum correlations symmetric?
PublikacjaWe provide operational definition of symmetry of entanglement: An entangled state contains symmetric entanglement if its subsystems can be exchanged (swapped) by means of local operations and classical communication. We show that in general states have asymmetric entanglement. This allows to construct nonsymmetric measure of entanglement, and a parameter that reports asymmetry of entanglement contents of quantum state. We propose...
-
Multiacces quantum communication and product higher rank numerical range
PublikacjaIn the present paper we initiate the study of the product higher rank numerical range. The latter, being a variant of the higher rank numerical range, is a natural tool for study- ing a construction of quantum error correction codes for multiple access channels. We review properties of this set and relate it to other numerical ranges, which were recently introduced in the literature. Further, the concept is applied to the construction...
-
ON THE NON-LOCALITY OF TRIPARTITE NON-SINGALING BOXES EMERGING FROM WIRINGS
PublikacjaIt has been recently shown, that some of the tripartite boxes admittin g bilocal decom- position, lead to non-locality under wiring operation applied to t wo of the subsystems [R. Gallego et al. Physical Review Letters 109 , 070401 (2012)]. In the following, we study this phenomenon quantitatively. Basing on the known classes of bo xes closed un- der wirings, we introduce multipartite monotones which are count erparts of bipartite ones...
-
NO-BROADCASTING OF NON-SIGNALLING BOXES VIA OPERATIONS WHICH TRANSFORM LOCAL BOXES INTO LOCAL ONES
PublikacjaWe deal with families of probability distributions satisfying non-signalling condition, called non-signalling boxes and consider a class of operations that transform local boxes into local ones (the one that admit LHV model). We prove that any operation from this class cannot broadcast a bipartite non-local box with 2 binary inputs and outputs. We consider a function called anti-Robustness which can not decrease under these operations....
-
Marek Czachor prof. dr hab.
Osoby -
Direct detection of quantum entanglement
PublikacjaBasing on positive maps separability criterion we propose the experimentally viable, direct detection of quantum entanglement. It is efficient and does not require any a priori knowledge about the state. For two qubits it provides a sharp (i.e., “if and only if”) separability test and estimation of amount of entanglement. We view this method as a new form of quantum computation, namely, as a decision problem with quantum data structure.
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublikacjaRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
Long-distance quantum communication over noisy networks without long-time quantum memory
PublikacjaThe problem of sharing entanglement over large distances is crucial for implementations of quantum cryptography. A possible scheme for long-distance entanglement sharing and quantum communication exploits networks whose nodes share Einstein-Podolsky-Rosen (EPR) pairs. In Perseguers et al. [Phys. Rev. A 78, 062324 (2008)] the authors put forward an important isomorphism between storing quantum information in a dimension D and transmission...
-
Time travel without paradoxes: Ring resonator as a universal paradigm for looped quantum evolutions
PublikacjaA ring resonator involves a scattering process where a part of the output is fed again into the input. The same formal structure is encountered in the problem of time travel in a neighborhood of a closed timelike curve (CTC). We know how to describe quantum optics of ring resonators, and the resulting description agrees with experiment. We can apply the same formal strategy to any looped quantum evolution, in particular to the...
-
Hidden Tensor Structures
PublikacjaAny single system whose space of states is given by a separable Hilbert space is automatically equipped with infinitely many hidden tensor-like structures. This includes all quantum mechanical systems as well as classical field theories and classical signal analysis. Accordingly, systems as simple as a single one-dimensional harmonic oscillator, an infinite potential well, or a classical finite-amplitude signal of finite duration...
-
Binary-Encounter Model for Direct Ionization of Molecules by Positron-Impact
PublikacjaWe introduce two models for the computation of direct ionization cross sections by positron impact over a wide range of collision energies. The models are based on the binary-encounter-Bethe model and take into account an extension of the Wannier theory. The cross sections computed with these models show good agreement with experimental data. The extensions improve the agreement between theory and experiment for collision energies...
-
Linear game non-contextuality and Bell inequalities—a graph-theoretic approach
PublikacjaWe study the classical and quantum values of a class of one-and two-party unique games, that generalizes the well-known XOR games to the case of non-binary outcomes. In the bipartite case the generalized XOR(XOR-d) games we study are a subclass of the well-known linear games. We introduce a 'constraint graph' associated to such a game, with the constraints defining the game represented by an edge-coloring of the graph. We use the...
-
Karolina Lademann mgr
OsobyCurriculum vitae
-
PCA based Fault Tolerant MPC
PublikacjaThis chapter presents a Fault Tolerant - Model Predictive Control (FT-MPC) schemes for sensor faults accommodation. A Fault Detection and Isolation (FDI) Unit, which is an integral part of FT-MPC system, is based on the Principal Component Analysis (PCA) method. Introduced approach enables efficient bias and drift faults accommodation in single, as well as simultaneous faults case. Simple simulation exercise is presented.Rozdział...
-
Harmony Search for Self-configuration of Fault–Tolerant and Intelligent Grids
PublikacjaIn this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Self-configuration of computer grids lies in the fact that new computer nodes are automatically configured by software agents and then integrated into the grid. A base node works due to several configuration parameters that define some aspects of data communications and energy power consumption. We...
-
APPLIED MATHEMATICS AND COMPUTATION
Czasopisma -
Semantics for an Interdisciplinary Computation
PublikacjaSemantics for an interdisciplinary computation is becoming increasingly difficult to capture while dealing with multi-domain problems. Expertise from Computer Science, Computer Engineering, Electrical Engineering, and other disciplines merges as engineering challenges in modern systems, such as, Cyber-Physical Systems, Smart Cities, and Bionic Systems must be tackled in a methodological manner. In this paper, a paradigm for formalization...
-
Optimizing the computation of a parallel 3D finite difference algorithm for graphics processing units
PublikacjaThis paper explores the possibilities of using a graphics processing unit for complex 3D finite difference computation via MUSTA‐FORCE and WENO algorithms. We propose a novel algorithm based on the new properties of CUDA surface memory optimized for 2D spatial locality and compare it with 3D stencil computations carried out via shared memory, which is currently considered to be the best approach. A case study was performed for...
-
Zero-knowledge convincing protocol on quantum bit is impossible
PublikacjaIt is one of fundamental features of quantum formalism that o n one hand it provides a new infor- mation processing resources and on the other hand puts funda mental constraints on the processing of quantum information implying “no-go” theorems for cloni ng [1–3], bit commitment [4, 5] and deleting [6] in quantum theory. Here we ask about possibilit y of “zero knowledge” scenario which, for its simplicity, can be considered as...
-
Harmony Search to Self-Configuration of Fault-Tolerant Grids for Big Data
PublikacjaIn this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Some tasks related to big data processing have been considered. Moreover, two criteria have been applied to evaluate quality of grids. The first criterion is a probability that all tasks meet their deadlines and the second one is grid reliability. Furthermore, some intelligent agents based on harmony...
-
Quantum entanglement
PublikacjaAll our former experience with application of quantum theory seems to say that what is predicted by quantum formalism must occur in the laboratory. But the essence of quantum formalism-entanglement, recognized by Einstein, Podolsky, Rosen, and Schrödinger-waited over 70 years to enter laboratories as a new resource as real as energy. This holistic property of compound quantum systems, which involves nonclassical correlations between...
-
Materials science. Quantum particle approach. 2022.
Kursy Onlinequantum methods for materials and molecular modeling.
-
Material Science Quantum Particle Approach 2021
Kursy Onlinequantum methods for materials and molecular modeling.
-
Blurred quantum Darwinism across quantum reference frames
PublikacjaQuantum Darwinism describes objectivity of quantum systems via their correlations with their environment--information that hypothetical observers can recover by measuring the environments. However, observations are done with respect to a frame of reference. Here, we take the formalism of [Giacomini, Castro-Ruiz, & Brukner. Nat Commun 10, 494 (2019)], and consider the repercussions on objectivity when changing quantum reference...
-
Materials science. Quantum particle approach. 2023.
Kursy OnlineQuantum ideas applied for particle systems and for chemical reactions.
-
Materials science. Quantum particle approach. 2024
Kursy OnlineQuantum ideas applied for particle systems and for chemical reactions.
-
Quantum randomness protected against detection loophole attacks
PublikacjaDevice and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....
-
Anomalous decay of quantum correlations of quantum-dot qubits
PublikacjaWe study the evolution of quantum correlations, quantified by the geometric discord, of two excitonic quantum-dot qubits under the influence of the phonon environment. We show that the decay of these correlations differs substantially from the decay of entanglement. Instead of displaying sudden-death-type behavior, the geometric discord shows a tendency to undergo transitions between different types of decay, is sensitive to nonlocal...
-
Introduction to quantum mechanics 2022/2023
Kursy OnlineIntroduction to quantum mechanics, kierunek: Nanotechnologia, specjalność: Nanostructures and computer simulations in material science, II stopień, semestr 1
-
Introduction to quantum mechanics 2024/2025
Kursy OnlineIntroduction to quantum mechanics, kierunek: Nanotechnologia, specjalność: Nanostructures and computer simulations in material science, II stopień, semestr 1
-
Quantum Coherence as a Resource
PublikacjaThe coherent superposition of states, in combination with the quantization of observables, represents one of the most fundamental features that mark the departure of quantum mechanics from the classical realm. Quantum coherence in many-body systems embodies the essence of entanglement and is an essential ingredient for a plethora of physical phenomena in quantum optics, quantum information, solid state physics, and nanoscale thermodynamics....
-
Fault tolerant guarding of grids
PublikacjaW pracy rozważano problem strzeżenia krat dwuwymiarowych przez dwa niezależne zespoły straży. Wykazano, że zagadnienie minimalizacyjne jest NP-trudne i zaproponowano dla niego wielomianowy algorytm 6/5-przybliżony.
-
Purely quantum superadditivity of classical capacities of quantum multiple access channels
PublikacjaWe are studying classical capacities of quantum memoryless multiaccess channels in geometric terms and we are revealing a break of additivity of the Holevo-like capacity. This effect is a purely quantum mechanical one, since, as we point out, the capacity regions of all classical memoryless multiaccess channels are additive. It is the first such effect revealed in the field of classical information transmission via quantum channels.
-
Quantum entanglement in time
PublikacjaIn this paper we present a concept of quantum entanglement in time in a context of entangled consistent histories. These considerations are supported by presentation of necessary tools closely related to those acting on a space of spatial multipartite quantum states. We show that in similarity to monogamy of quantum entanglement in space, quantum entanglement in time is also endowed with this property for a particular history....
-
Quantum origins of objectivity
PublikacjaIn spite of all of its successes, quantum mechanics leaves us with a central problem: How does nature create a bridge from fragile quanta to the objective world of everyday experience? Here we find that a basic structure within quantum mechanics that leads to the perceived objectivity is a so-called spectrum broadcast structure. We uncover this based on minimal assumptions, without referring to any dynamical details or a concrete...
-
The Ellenbogen's “Matter as Software” Concept for Quantum Computer Implementation. C60 and X@C60 Molecules as Available Molecular Building Blocks (MBBs) for Tip-Based Nanofabrication (TBN) of Quantum Computing Devices
PublikacjaThe TBN bottom-up strategy of building quantum devices from C60 and X@C60 MBBs is proposed as an extension of the Ellenbogen's “Matter as Software” idea to quantum information processing. The capped SW or DW CNT STM tip is considered as device for manipulating C60 and X@C60 molecules. In this article, the possibility of using easily available on the market C60 Fullerene and endohedral X@C60 molecules together with commercial CNT...
-
The Ellenbogen's "Matter as Software" Concept for Quantum Computer Implementation: III. Selection of X@C60 Molecular Building Blocks (MBBs) for Tip-Based Nanofabrication (TBN) of Trapped Neutral Atom Quantum Computing Devices
PublikacjaThe selection of guest atoms X of X@C60 MBBs for TBN of trapped neutral atom quantum computing devices is reported. Assuming the all-optical quantum computing as a final target stage, the two criteria are most important: the charge q accumulated on the C60 host must be as low as possible, and the atom X must have one or more available excited states within the band falling into the low energy window of neutral C60 molecule electronic...
-
FPGA computation of magnitude of complex numbers using modified CORDIC algorithm
PublikacjaIn this work we present computation of the magnitude of complex numbers using a modified version of the CORDIC algorithm that uses only five iterations. The relationship between the computation error and the number of CORDIC iterations are presented for floating-point and integer arithmetics. The proposed modification of CORDIC for integer arithmetic relies upon the introduction of correction once basic computations are performed...
-
Quantum security and theory of decoherence
PublikacjaWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
Hybrid no-signaling-quantum correlations
PublikacjaFundamental investigations in non-locality have shown that while the no-signaling principle alone is not sufficient to single out the set of quantum non-local correlations, local quantum mechanics and no-signaling together exactly reproduce the set of quantum correlations in the two-party Bell scenario. Here, we introduce and study an intermediate hybrid no-signaling quantum set of non-local correlations that we term HNSQ in the...
-
The symmetric extendibility of quantum states
PublikacjaStudies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...
-
Journal of Chemical Theory and Computation
Czasopisma -
Remote command and control capabilities for data acquisition systems provided by delay-tolerant network mechanisms
PublikacjaThe paper presents an assessment of a remote device reconfiguration service employing a Delay Tolerant Network (DTN) mechanisms. This service has been implemented as a part of a communication appliance dedicated to marine data transfer in off-shore and open sea areas. The service has been successfully deployed and validation test have been completed. The practical use-case has been defined as remote access to the equipment operating...
-
Quantum privacy witness
PublikacjaWhile it is usually known that the mean value of a single observable is enough to detect entanglement or its distillability, the counterpart of such an approach in the case of quantum privacy has been missing. Here we develop the concept of a privacy witness, i.e., a single observable that may detect the presence of the secure key even in the case of bound entanglement. Then we develop the notion of secret-key estimation based...