Filtry
wszystkich: 24754
-
Katalog
- Publikacje 2923 wyników po odfiltrowaniu
- Czasopisma 591 wyników po odfiltrowaniu
- Konferencje 239 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 204 wyników po odfiltrowaniu
- Projekty 11 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Kursy Online 106 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 20675 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: analytic information theory
-
Product Graph Invariants with Applications in the Theory of Information
PublikacjaThere are a large number of graph invariants. In the paper, we consider some of them, e.g. the independence and chromatic numbers. It is well know that we cannot efficiently calculate these numbers for arbitrary graphs. In the paper we present relations between these invariants and concepts from the theory of information. Concepts such as source coding and transmission over a noisy channel with zero probability of error are modeled...
-
IEEE TRANSACTIONS ON INFORMATION THEORY
Czasopisma -
Foundations and Trends in Communications and Information Theory
Czasopisma -
Journal of Information Science Theory and Practice
Czasopisma -
Information Theory and Coding - 2022/2023
Kursy Online -
Information Theory Workshop
Konferencje -
Information Visualisation Theory and Practice
Konferencje -
Workshop in Information Security Theory and Practices
Konferencje -
IEEE International Symposium on Information Theory
Konferencje -
TAI: Algorithmic Information Theory: Kolmogorov Complexity
Konferencje -
International Symposium on Information Theory and Its Applications
Konferencje -
Average Redundancy of the Shannon Code for Markov Sources
PublikacjaIt is known that for memoryless sources, the average and maximal redundancy of fixed–to–variable length codes, such as the Shannon and Huffman codes, exhibit two modes of behavior for long blocks. It either converges to a limit or it has an oscillatory pattern, depending on the irrationality or rationality, respectively, of certain parameters that depend on the source. In this paper, we extend these findings, concerning the Shannon...
-
On the Limiting Distribution of Lempel-Ziv’78 Redundancy for Memoryless Sources
PublikacjaWe study the Lempel-Ziv'78 algorithm and show that its (normalized) redundancy rate tends to a Gaussian distribution for memoryless sources. We accomplish it by extending findings from our 1995 paper, in particular, by presenting a new simplified proof of the central limit theorem (CLT) for the number of phrases in the LZ'78 algorithm. We first analyze the asymptotic behavior of the total path length in the associated digital search...
-
The 3rd ACM International Conference on the Theory of Information Retrieval
Konferencje -
International Conference on the Theory and Application of Cryptology and Information Security
Konferencje -
Squashed entanglement for multipartite states and entanglement measures based on the mixed convex roof
PublikacjaNew measures of multipartite entanglement are constructedbased on two definitions of multipartite information anddifferent methods of optimizing over extensions of the states. Oneis a generalization of the squashed entanglement where one takesthe mutual information of parties conditioned on the state's extensionand takes the infimum over such extensions. Additivity ofthe multipartite squashed entanglement is proved for both versionsof...
-
Types of Markov Fields and Tilings
PublikacjaThe method of types is one of the most popular techniques in information theory and combinatorics. However, thus far the method has been mostly applied to one-dimensional Markov processes, and it has not been thoroughly studied for general Markov fields. Markov fields over a finite alphabet of size m ≥ 2 can be viewed as models for multi-dimensional systems with local interactions. The locality of these interactions is represented...
-
General paradigm for distilling classical key from quantum states
PublikacjaIn this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...
-
A few steps more towards NPT bound entanglement
PublikacjaIn this paper, existence of bound entangled states with nonpositive partial transpose (NPT) is considered. As one knows, existence of such states would in particular imply nonadditivity of distillable entanglement. Moreover, it would rule out a simple mathematical description of the set of distillable states. The particular state, known to be 1-copy nondistillable and supposed to be bound entangled, is considered. The problem of...
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublikacjaIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublikacjaIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublikacjaThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
On the Characteristic Graph of a Discrete Symmetric Channel
PublikacjaWe present some characterizations of characteristic graphs of row and/or column symmetric channels. We also give a polynomial-time algorithm that decides whether there exists a discrete symmetric channel whose characteristic graph is equal to a given input graph. In addition, we show several applications of our results.
-
IEEE Information Theory Workshop on Detection, Estimation, Classification and Imaging
Konferencje -
Robert Piotrowski dr hab. inż.
OsobyRobert Piotrowski jest absolwentem Wydziału Elektrotechniki i Automatyki (2001r., kierunek: Automatyka i Robotyka) oraz Wydziału Zarządzania i Ekonomii (2002r., kierunek: Organizacja Systemów Produkcyjnych) Politechniki Gdańskiej. Od 2005 roku jest zatrudniony na Wydziale Elektrotechniki i Automatyki, aktualnie w Katedrze Inteligentnych Systemów Sterowania i Wspomagania Decyzji. W 2005 roku obronił rozprawę doktorską (Automatyka...
-
Application of the numerical-analytic method for systems of differential equations with parameter
PublikacjaThe numerical-analytic method is applied to systems of differential equations with parameter under the assumption that the corresponding functions satisfy the Lipschitz conditions in matrix notation. We also obtain several existence results for problems with deviations of an argument
-
Workshop on Analytic Algorithms and Combinatorics
Konferencje -
Jerzy Konorski dr hab. inż.
OsobyJerzy Konorski otrzymał tytuł mgr inż. telekomunikacji na Poitechnice Gdańskiej, zaś stopień doktora n.t. w dyscyplinie informatyka w Instytucie Podstaw Informatyki PAN. W r. 2007 obronił rozprawę habilitacyjną na Wydziale Elektroniki, Telekomnikacji i Informatyki PG. Jest autorem ponad 150 publikacji naukowych, prowadził projekty naukowo-badawcze finansowane ze środków Komitetu Badań Naukowych, UE, US Air Force Office of Scientific...
-
Marek Czachor prof. dr hab.
Osoby -
Tomasz Janowski dr
OsobyTomasz Janowski jest kierownikiem Katedry Informatyki w Zarządzaniu na Wydziale Ekonomii i Zarządzania Politechniki Gdańskiej; profesorem wizytującym w Department for E-Governance and Administration, Faculty of Business and Globalization, University for Continuing Education Krems, Austria; oraz współredaktorem naczelnym czasopisma Government Information Quarterly, Elsevier. Wcześniej był profesorem wizytującym w Università Della...
-
Jolanta Łopatowska dr inż.
OsobyJolanta Łopatowska, adiunkt w Katedrze Inżynierii Zarządzania i Jakości na Wydziale Zarzadzania i Ekonomii, jest absolwentką Wydziału Elektroniki PG i Instytutu Organizacji i Projektowania Systemów Produkcyjnych PG oraz doktorem w dyscyplinie nauk ekonomicznych. Jej zainteresowania naukowo-badawcze koncentrują się wokół zaawansowanych organizacyjnie i technologicznie systemów produkcyjnych, ze szczególnym uwzględnieniem procesów...
-
A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence
PublikacjaWe resolve a conjecture proposed by D.E. Knuth concerning a recurrence arising in the satisfiability problem. Knuth's recurrence resembles recurrences arising in the analysis of tries, in particular PATRICIA tries, and asymmetric leader election. We solve Knuth's recurrence exactly and asymptotically, using analytic techniques such as the Mellin transform and analytic depoissonization.
-
International Conference on Theorem Proving with Analytic Tableaux and Related Methods
Konferencje -
Application of Analytic Signal and Smooth Interpolation in Pulse Width Modulation for Conventional Matrix Converters
PublikacjaThe paper proposes an alternative and novel approach to the PWM duty cycles computation for Conventional Matrix Converters (CMC) fed by balanced, unbalanced or non–sinusoidal AC voltage sources. The presented solution simplifies the prototyping of direct modulation algorithms. PWM duty cycles are calculated faster by the smooth interpolation technique, using only vector coordinates, without trigonometric functions and angles. Both...
-
MULTI-CRITERIA INVESTMENT DECISION SUPPORT MODEL USING FUZZY ANALYTIC HIERARCHY PROCESS (F-AHP) METHOD FOR POWER INDUSTRY
PublikacjaIn this paper, the comparative analysis of two wind farm construction projects was presented. This particular type of analysis is commonly applied before purchasing investment project being in a planning phase by a company interested in its development. Conduction of this type of analysis is prompted by the necessity to take into consideration the requirements of Polish legislation. Comparison of wind farm construction projects...
-
Analiza lokalizacji biogazowni metodami AHP i taksonomi numerycznej - porównanie metod
PublikacjaArtykuł przedstawia porównanie wielokryterialnej metody Analytic Hierarchy Proces oraz taksonomii numerycznej w oparciu o wybór lokalizacji biogazowni.
-
Average Size of a Suffix Tree for Markov Sources
PublikacjaWe study a suffix tree built from a sequence generated by a Markovian source. Such sources are more realistic probabilistic models for text generation, data compression, molecular applications, and so forth. We prove that the average size of such a suffix tree is asymptotically equivalent to the average size of a trie built over n independentsequences from the same Markovian source. This equivalenceis only known for memoryless...
-
Zastosowanie metody AHP do oceny zagrożeń na stanowiskach pracy.
PublikacjaW artykule przedstawiono podstawy wielokryterialnej metody wspomagania decyzji AHP (ang. Analytic Hierarchy Process) oraz jej zastosowanie do oceny zagrożeń na stanowiskach pracy.
-
Analytical Steady-State Model of the Pipeline Flow Process
PublikacjaThe paper addresses the issue of modeling the flow process in transmission pipelines. A base model used for numerical simulation is introduced. Under certain assumptions concerning steady state analysis, the differential equations describing the process are solved analytically for two cases: zero and nonzero inclination angle α. These equations describe a constant flow rate and a corresponding distribution of the pressure along...
-
Long-distance quantum communication over noisy networks without long-time quantum memory
PublikacjaThe problem of sharing entanglement over large distances is crucial for implementations of quantum cryptography. A possible scheme for long-distance entanglement sharing and quantum communication exploits networks whose nodes share Einstein-Podolsky-Rosen (EPR) pairs. In Perseguers et al. [Phys. Rev. A 78, 062324 (2008)] the authors put forward an important isomorphism between storing quantum information in a dimension D and transmission...
-
Evaluating Industry 4.0 Implementation Challenges Using Interpretive Structural Modeling and Fuzzy Analytic Hierarchy Process
PublikacjaThe fourth industrial revolution known as Industry 4.0 is reshaping and evolving the way industries produce products and individuals live and work therefore, gaining massive attraction from academia, business and politics. The manufacturing industries are optimistic regarding the opportunities Industry 4.0 may offer such as, improved efficiency, productivity and customization. The present research contributes to the Industry 4.0...
-
An analysis of domain-based ship collision risk parameters
PublikacjaAccording to a lot of contemporary research on ship collision avoidance the classic approach parameters – distance at closest point of approach (DCPA) and time to the closest point of approach (TCPA) – are not sufficient for estimating ship collision risk and for planning evasive manoeuvres. Consequently new measures are introduced, often utilizing the concept of a ship domain. Their drawback, up to this point, was the lack of...
-
Fault diagnosing system of wheeled tractors
PublikacjaA defect of complex wheeled tractor assembles most frequently negative influence on exploitation efficiency, safety and exhaust gases emission. Structure complexity of wheeled tractors requires more and more advanced diagnostic methods for identification of their serviceable possibilities as well in manufacturing step as in exploitation. In classical diagnosing methods of wheeled tractor defects states mapping by measured diagnostic...
-
Problem of inconsistent and contradictory judgements in pairwise comparisonmethod in sense of AHP
PublikacjaThe aim of this paper is to show the relationship between inconsistent and contradictory matrices of data obtained as a result of the pairwise comparison of factors in the sense of the Analytic Hierarchy Process. The consistency check is performed to ensure that judgements are neither random nor illogical. This paper shows that even if a matrix will pass a consistency test successfully, it can be contradictory. Moreover an algorithm...
-
Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system
PublikacjaMotivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.
-
DL_MG: A Parallel Multigrid Poisson and Poisson–Boltzmann Solver for Electronic Structure Calculations in Vacuum and Solution
PublikacjaThe solution of the Poisson equation is a crucial step in electronic structure calculations, yielding the electrostatic potential -- a key component of the quantum mechanical Hamiltonian. In recent decades, theoretical advances and increases in computer performance have made it possible to simulate the electronic structure of extended systems in complex environments. This requires the solution of more complicated variants of the...
-
Three-dimensional conceptual model for service-oriented simulation
Publikacjan this letter, we propose a novel three-dimensional conceptual model for an emerging service-oriented simulation paradigm. The model can be used as a guideline or an analytic means to find the potential and possible future directions of the current simulation frameworks. In particular, the model inspects the crossover between the disciplines of modeling and simulation, service-orientation, and software/systems engineering. Finally,...
-
Emotions Embodied in the SVC of an Autonomous Driver System
PublikacjaA concept of embodied intelligence (EI) is considered. None of such implementations can be fully identified with artificial intelligence. Projects that dare to approach AI and EI should be based on both the AI concepts (symbolic and sub-symbolic), in solving real problems of perception and decision-making. Therefore, the EI, in this paper, is understood as a methodology that uses all available resources and algorithms from the...
-
Enriched buckling for beam-lattice metamaterials
PublikacjaWe discuss two examples of beam-lattice metamaterials which show attractive mechanical properties concerning their enriched buckling. The first one considers pantographic beams and the nonlinear solution is traced out numerically on the base of a Hencky’s model and an algorithm based on Riks’ arc-length scheme. The second one concerns a beam-lattice with sliders and the nonlinear solution is discussed in analytic way and, finally,...
-
On a Recurrence Arising in Graph Compression
PublikacjaIn a recently proposed graphical compression algorithm by Choi and Szpankowski (2012), the following tree arose in the course of the analysis. The root contains n balls that are consequently distributed between two subtrees according to a simple rule: In each step, all balls independently move down to the left subtree (say with probability p) or the right subtree (with probability 1p). A new node is created as long as...