Filtry
wszystkich: 49
Wyniki wyszukiwania dla: VIOLATION
-
Quantum communication complexity advantage implies violation of a Bell inequality
PublikacjaWe obtain a general connection between a quantum advantage in communication complexity and non-locality. We show that given any protocol offering a (sufficiently large) quantum advantage in communication complexity, there exists a way of obtaining measurement statistics which violate some Bell inequality. Our main tool is port-based teleportation. If the gap between quantum and classical communication complexity can grow arbitrarily...
-
Visual Detection of People Movement Rules Violation in Crowded Indoor Scenes
PublikacjaThe paper presents a camera-independent framework for detecting violations of two typical people movement rules that are in force in many public transit terminals: moving in the wrong direction or across designated lanes. Low-level image processing is based on object detection with Gaussian Mixture Models and employs Kalman filters with conflict resolving extensions for the object tracking. In order to allow an effective event...
-
Quantum Steering Inequality with Tolerance for Measurement-Setting Errors: Experimentally Feasible Signature of Unbounded Violation
Publikacjauantum steering is a relatively simple test for proving that the values of quantum-mechanical measurement outcomes come into being only in the act of measurement. By exploiting quantum correlations, Alice can influence — steer — Bob ’ s physical system in a way that is impossible in classical mechanics, as shown by the violation of steering inequalities. Demonstrating this and similar quantum effects for systems of increasing size,...
-
Trade-offs in multiparty Bell-inequality violations in qubit networks
PublikacjaTwo overlapping bipartite binary input Bell inequalities cannot be simultaneously violated as this would contradict the usual no-signalling principle. This property is known as monogamy of Bell inequality violations and generally Bell monogamy relations refer to trade-offs between simultaneous violations of multiple inequalities. It turns out that multipartite Bell inequalities admit weaker forms of monogamies that allow for violations...
-
Strong Monogamies of No-Signaling Violations for Bipartite Correlation Bell Inequalities
PublikacjaThe phenomenon of monogamy of Bell inequality violations is interesting both from the fundamental perspective as well as in cryptographic applications such as the extraction of randomness and secret bits. In this article, we derive new and stronger monogamy relations for violations of Bell inequalities in general no-signaling theories. These relations are applicable to the class of binary output correlation inequalities known as...
-
Free randomness amplification using bipartite chain correlations
PublikacjaA direct analysis of the task of randomness amplification from Santha-Vazirani sources using the violation of the chained Bell inequality is performed in terms of the convex combination of no-signaling boxes required to simulate quantum violation of the inequality. This analysis is used to find the exact threshold value of the initial randomness parameter from which perfect randomness can be extracted in the asymptotic limit of...
-
Elemental and tight monogamy relations in nonsignaling theories
PublikacjaPhysical principles constrain the way nonlocal correlations can be distributed among distant parties. These constraints are usually expressed by monogamy relations that bound the amount of Bell inequality violation observed among a set of parties by the violation observed by a different set of parties. We prove here that much stronger monogamy relations are possible for nonsignaling correlations by showing how nonlocal correlations...
-
Robust amplification of Santha-Vazirani sources with three devices
PublikacjaWe demonstrate that amplification of arbitrarily weak randomness is possible using quantum resources. We present a randomness amplification protocol that involves Bell experiments. We find a Bell inequality which can amplify arbitrarily weak randomness and give a detailed analysis of the protocol involving it. Our analysis includes finding a sufficient violation of Bell inequality as a function of the initial quality of randomness....
-
Simulation Environment in Python for Ship Encounter Situations
PublikacjaTo assess the risk of collision in radar navigation distance-based safety measures such as Distance at the Closest Point of Approach and Time to the Closest Point of Approach are most commonly used. Also Bow Crossing Range and Bow Crossing Time measures are good complement to the picture of the meeting situation. When ship safety domain is considered then Degree of Domain Violation and Time to Domain Violation can be applied. This...
-
An analysis of domain-based ship collision risk parameters
PublikacjaAccording to a lot of contemporary research on ship collision avoidance the classic approach parameters – distance at closest point of approach (DCPA) and time to the closest point of approach (TCPA) – are not sufficient for estimating ship collision risk and for planning evasive manoeuvres. Consequently new measures are introduced, often utilizing the concept of a ship domain. Their drawback, up to this point, was the lack of...
-
Subadditivity of the minimum output entropy and superactivation of the classical capacity of quantum multiple access channels
PublikacjaWe study subadditivity of the minimum output entropy (Hmin) of quantum multiple access channels (MACs). We provide an example of violation of the additivity theorem for Hmin known in classical information theory. Our result is based on a fundamental property of MACs, i.e., independence of each sender. The channels used in the example can be constructed explicitly. On the basis of subadditivity of Hmin we also provide an example...
-
A video monitoring system using ontology-driven identification of threats
PublikacjaIn this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...
-
Imitating Quantum Probabilities: Beyond Bell’s Theorem and Tsirelson Bounds
PublikacjaLocal hidden-variable model of singlet-state correlations discussed in M. Czachor, Acta Phys. Polon. A 139, 70, is shown to be a particular case of an infinite hierarchy of local hidden-variable models based on an infinite hierarchy of calculi. Violation of Bell-type inequalities can be interpreted as a `confusion of languages' problem, a result of mixing different but neighboring levels of the hierarchy. Mixing of non-neighboring...
-
A ship domain-based model of collision risk for near-miss detection and Collision Alert Systems
PublikacjaThe paper presents a new model of ship collision risk, which utilises a ship domain concept and the related domain-based collision risk parameters. An encounter is here described by five variables representing: degree of domain violation (DDV), relative speed of the two vessels, combination of the vessels’ courses, arena violations and encounter complexity. As for the first three variables, their values can be directly computed...
-
Increased Certification of Semi-device Independent Random Numbers using Many Inputs and More Postprocessing
PublikacjaQuantum communication with systems of dimension larger than two provides advantages in information processing tasks. Examples include higher rates of key distribution and random number generation. The main disadvantage of using such multi-dimensional quantum systems is the increased complexity of the experimental setup. Here, we analyze a not-so-obvious problem: the relation between randomness certification and computational requirements...
-
A Framework of a Ship Domain-based Collision Alert System
PublikacjaThe paper presents a framework of a planned ship collision alert system. The envisaged system is compliant with IMO Resolution MSC.252 (83) “Adoption of the revised performance standards for Integrated Navigation Systems (INS)”. It is based on a ship domain-oriented approach to collision risk and introduces a policy of alerts on dangerous situations. The alerts will include cautions, warnings and alarms, which will be triggered...
-
Wave propagation in damage assessment of ground anchors
PublikacjaThe inspection possibilities of ground anchors are limited to destructive test such as pull-out test. Guided wave propagation gives an opportunity to develop an inspection system dedicated to determine the condition of inspected element without violation of their integrity. In this paper the experimental study on wave propagation in laboratory models of ground anchors are presented. Experiments were conducted for different bonding...
-
Nonlinear strain gradient and micromorphic one-dimensional elastic continua: Comparison through strong ellipticity conditions
PublikacjaWe discuss the strong ellipticity (SE) conditions for strain gradient and micromorphic continua considering them as an enhancement of a simple nonlinearly elastic material called in the following primary material. Recently both models are widely used for description of material behavior of beam-lattice metamaterials which may possess various types of material instabilities. We analyze how a possible loss of SE results in the behavior...
-
Correlation between charge density waves and antiferromagnetism in Nd1−xGdxNiC2 solid solutions
PublikacjaWe report a study on the evolution of a charge density wave and antiferromagnetism in the series of the polycrystalline solid solution Nd1−xGdxNiC2 (0 _ x _ 1) by means of magnetic and transport properties measurements. The experimental results reveal the violation of the de Gennes law and a strong correlation between the Peierls, Néel, and Curie-Weiss temperatures, which strongly suggests a cooperative interaction between the...
-
TensorHive: Management of Exclusive GPU Access for Distributed Machine Learning Workloads
PublikacjaTensorHive is a tool for organizing work of research and engineering teams that use servers with GPUs for machine learning workloads. In a comprehensive web interface, it supports reservation of GPUs for exclusive usage, hardware monitoring, as well as configuring, executing and queuing distributed computational jobs. Focusing on easy installation and simple configuration, the tool automatically detects the available computing...