-
Multi-step feature fusion for natural disaster damage assessment on satellite images
Authors:
Mateusz Żarski,
Jarosław Adam Miszczak
Abstract:
Quick and accurate assessment of the damage state of buildings after natural disasters is crucial for undertaking properly targeted rescue and subsequent recovery operations, which can have a major impact on the safety of victims and the cost of disaster recovery. The quality of such a process can be significantly improved by harnessing the potential of machine learning methods in computer vision.…
▽ More
Quick and accurate assessment of the damage state of buildings after natural disasters is crucial for undertaking properly targeted rescue and subsequent recovery operations, which can have a major impact on the safety of victims and the cost of disaster recovery. The quality of such a process can be significantly improved by harnessing the potential of machine learning methods in computer vision. This paper presents a novel damage assessment method using an original multi-step feature fusion network for the classification of the damage state of buildings based on pre- and post-disaster large-scale satellite images. We introduce a novel convolutional neural network (CNN) module that performs feature fusion at multiple network levels between pre- and post-disaster images in the horizontal and vertical directions of CNN network. An additional network element - Fuse Module - was proposed to adapt any CNN model to analyze image pairs in the issue of pair classification. We use, open, large-scale datasets (IDA-BD and xView2) to verify, that the proposed method is suitable to improve on existing state-of-the-art architectures. We report over a 3 percentage point increase in the accuracy of the Vision Transformer model.
△ Less
Submitted 29 October, 2024;
originally announced October 2024.
-
Analytical assessment of workers' safety concerning direct and indirect ways of getting infected by dangerous pathogen
Authors:
Krzysztof Domino,
Arkadiusz Sochan,
Jarosław Adam Miszczak
Abstract:
Developing safety policies to protect large groups of individuals working in indoor environments from disease spread is an important and challenging task. To address this issue, we investigate the scenario of workers becoming infected by a dangerous airborne pathogen in a near-real-life industrial environment. We present a simple analytical model based on observations made during the recent COVID-…
▽ More
Developing safety policies to protect large groups of individuals working in indoor environments from disease spread is an important and challenging task. To address this issue, we investigate the scenario of workers becoming infected by a dangerous airborne pathogen in a near-real-life industrial environment. We present a simple analytical model based on observations made during the recent COVID-19 pandemic and business expectations concerning worker protection. The model can be adapted to address other epidemic or non-epidemic threats, including hazardous vapors from industrial processes. In the presented model, we consider both direct and indirect modes of infection. Direct infection occurs through direct contact with an infected individual, while indirect infection results from contact with a contaminated environment, including airborne pathogens in enclosed spaces or contaminated surfaces. Our analysis utilizes a simplified droplet/aerosol diffusion model, validated by droplet spread simulations. This model can be easily applied to new scenarios and has modest computational requirements compared to full simulations. Thus, it can be implemented within an automated protection ecosystem in an industrial setting, where rapid assessment of potential danger is required, and calculations must be performed almost in real-time. We validate general research findings on disease spread using a simple agent-based model. Based on our results, we outline a set of countermeasures for infection prevention, which could serve as the foundation for a prevention policy suited to industrial scenarios.
△ Less
Submitted 13 November, 2024; v1 submitted 25 September, 2024;
originally announced September 2024.
-
YAQQ: Yet Another Quantum Quantizer -- Design Space Exploration of Quantum Gate Sets using Novelty Search
Authors:
Aritra Sarkar,
Akash Kundu,
Matthew Steinberg,
Sibasish Mishra,
Sebastiaan Fauquenot,
Tamal Acharya,
Jarosław A. Miszczak,
Sebastian Feld
Abstract:
In the standard circuit model of quantum computation, the number and quality of the quantum gates composing the circuit influence the runtime and fidelity of the computation. The fidelity of the decomposition of quantum algorithms, represented as unitary matrices, to bounded depth quantum circuits depends strongly on the set of gates available for the decomposition routine. To investigate this dep…
▽ More
In the standard circuit model of quantum computation, the number and quality of the quantum gates composing the circuit influence the runtime and fidelity of the computation. The fidelity of the decomposition of quantum algorithms, represented as unitary matrices, to bounded depth quantum circuits depends strongly on the set of gates available for the decomposition routine. To investigate this dependence, we explore the design space of discrete quantum gate sets and present a software tool for comparative analysis of quantum processing units and control protocols based on their native gates. The evaluation is conditioned on a set of unitary transformations representing target use cases on the quantum processors. The cost function considers three key factors: (i) the statistical distribution of the decomposed circuits' depth, (ii) the statistical distribution of process fidelities for the approximate decomposition, and (iii) the relative novelty of a gate set compared to other gate sets in terms of the aforementioned properties. The developed software, YAQQ (Yet Another Quantum Quantizer), enables the discovery of an optimized set of quantum gates through this tunable joint cost function. To identify these gate sets, we use the novelty search algorithm, circuit decomposition techniques, and stochastic optimization to implement YAQQ within the Qiskit quantum simulator environment. YAQQ exploits reachability tradeoffs conceptually derived from quantum algorithmic information theory. Our results demonstrate the pragmatic application of identifying gate sets that are advantageous to popularly used quantum gate sets in representing quantum algorithms. Consequently, we demonstrate pragmatic use cases of YAQQ in comparing transversal logical gate sets in quantum error correction codes, designing optimal quantum instruction sets, and compiling to specific quantum processors.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
Statistical analysis of geoinformation data for increasing railway safety
Authors:
Katarzyna Gawlak,
Jarosław Konieczny,
Krzysztof Domino,
Jarosław Adam Miszczak
Abstract:
The impact of rail transport on the environment is one of the crucial factors for the sustainable development of this form of mass transport. We present a data-driven analysis of wild animal railway accidents in the region of southern Poland, a step to create the train driver warning system. We built our method by harnessing the Bayesian approach to the statistical analysis of information about th…
▽ More
The impact of rail transport on the environment is one of the crucial factors for the sustainable development of this form of mass transport. We present a data-driven analysis of wild animal railway accidents in the region of southern Poland, a step to create the train driver warning system. We built our method by harnessing the Bayesian approach to the statistical analysis of information about the geolocation of the accidents. The implementation of the proposed model does not require advanced knowledge of data mining and can be applied even in less developed railway systems with small IT support. Furthermore, we have discovered unusual patterns of accidents while considering the number of trains and their speed and time at particular geographical locations of the railway network. We test the developed approach using data from southern Poland, compromising wildlife habitats and one of the most urbanised regions in Central Europe, based on this we conclude that our model is best suited to railway lines that pass through varying types of landscape.
△ Less
Submitted 1 August, 2024; v1 submitted 3 June, 2024;
originally announced June 2024.
-
Rule switching mechanisms in the Game of Life with synchronous and asynchronous updating policy
Authors:
Jarosław Adam Miszczak
Abstract:
The emergence of complex structures in the systems governed by a simple set of rules is among the most fascinating aspects of Nature. The particularly powerful and versatile model suitable for investigating this phenomenon is provided by cellular automata, with the Game of Life being one of the most prominent examples. However, this simplified model can be too limiting in providing a tool for mode…
▽ More
The emergence of complex structures in the systems governed by a simple set of rules is among the most fascinating aspects of Nature. The particularly powerful and versatile model suitable for investigating this phenomenon is provided by cellular automata, with the Game of Life being one of the most prominent examples. However, this simplified model can be too limiting in providing a tool for modelling real systems. To address this, we introduce and study an extended version of the Game of Life, with the dynamical process governing the rule selection at each step. We show that the introduced modification significantly alters the behaviour of the game. We also demonstrate that the choice of the synchronization policy can be used to control the trade-off between the stability and the growth in the system.
△ Less
Submitted 4 October, 2023;
originally announced October 2023.
-
Enhancing variational quantum state diagonalization using reinforcement learning techniques
Authors:
Akash Kundu,
Przemysław Bedełek,
Mateusz Ostaszewski,
Onur Danaci,
Yash J. Patel,
Vedran Dunjko,
Jarosław A. Miszczak
Abstract:
The variational quantum algorithms are crucial for the application of NISQ computers. Such algorithms require short quantum circuits, which are more amenable to implementation on near-term hardware, and many such methods have been developed. One of particular interest is the so-called variational quantum state diagonalization method, which constitutes an important algorithmic subroutine and can be…
▽ More
The variational quantum algorithms are crucial for the application of NISQ computers. Such algorithms require short quantum circuits, which are more amenable to implementation on near-term hardware, and many such methods have been developed. One of particular interest is the so-called variational quantum state diagonalization method, which constitutes an important algorithmic subroutine and can be used directly to work with data encoded in quantum states. In particular, it can be applied to discern the features of quantum states, such as entanglement properties of a system, or in quantum machine learning algorithms. In this work, we tackle the problem of designing a very shallow quantum circuit, required in the quantum state diagonalization task, by utilizing reinforcement learning (RL). We use a novel encoding method for the RL-state, a dense reward function, and an $ε$-greedy policy to achieve this. We demonstrate that the circuits proposed by the reinforcement learning methods are shallower than the standard variational quantum state diagonalization algorithm and thus can be used in situations where hardware capabilities limit the depth of quantum circuits. The methods we propose in the paper can be readily adapted to address a wide range of variational quantum algorithms.
△ Less
Submitted 11 January, 2024; v1 submitted 19 June, 2023;
originally announced June 2023.
-
Symbolic quantum programming for supporting applications of quantum computing technologies
Authors:
Jarosław Adam Miszczak
Abstract:
The goal of this paper is to deliver the overview of the current state of the art, to provide experience report on developing quantum software tools, and to outline the perspective for developing quantum programming tools supporting symbolic programming for the needs of quantum computing technologies. The main focus of this paper is on quantum computing technologies, as they can in the most direct…
▽ More
The goal of this paper is to deliver the overview of the current state of the art, to provide experience report on developing quantum software tools, and to outline the perspective for developing quantum programming tools supporting symbolic programming for the needs of quantum computing technologies. The main focus of this paper is on quantum computing technologies, as they can in the most direct way benefit from developing tools enabling the symbolic manipulation of quantum circuits and providing software tools for creating, optimizing, and testing quantum programs. We deliver a short survey of the most popular approaches in the field of quantum software development and we aim at pointing their strengths and weaknesses. This helps to formulate a list of desirable characteristics which should be included in quantum computing frameworks. Next, we describe a software architecture and its preliminary implementation supporting the development of quantum programs using symbolic approach, encouraging the functional programming paradigm, and, at the same, time enabling the integration with high-performance and cloud computing. The described software consists of several packages developed to address different needs, but nevertheless sharing common design concepts. We also outline how the presented approach could be used in tasks in quantum software engineering, namely quantum software testing and quantum circuit construction.
△ Less
Submitted 18 February, 2023;
originally announced February 2023.
-
Computer Vision based inspection on post-earthquake with UAV synthetic dataset
Authors:
Mateusz Żarski,
Bartosz Wójcik,
Jarosław A. Miszczak,
Bartłomiej Blachowski,
Mariusz Ostrowski
Abstract:
The area affected by the earthquake is vast and often difficult to entirely cover, and the earthquake itself is a sudden event that causes multiple defects simultaneously, that cannot be effectively traced using traditional, manual methods. This article presents an innovative approach to the problem of detecting damage after sudden events by using an interconnected set of deep machine learning mod…
▽ More
The area affected by the earthquake is vast and often difficult to entirely cover, and the earthquake itself is a sudden event that causes multiple defects simultaneously, that cannot be effectively traced using traditional, manual methods. This article presents an innovative approach to the problem of detecting damage after sudden events by using an interconnected set of deep machine learning models organized in a single pipeline and allowing for easy modification and swapping models seamlessly. Models in the pipeline were trained with a synthetic dataset and were adapted to be further evaluated and used with unmanned aerial vehicles (UAVs) in real-world conditions. Thanks to the methods presented in the article, it is possible to obtain high accuracy in detecting buildings defects, segmenting constructions into their components and estimating their technical condition based on a single drone flight.
△ Less
Submitted 11 October, 2022;
originally announced October 2022.
-
Will you infect me with your opinion?
Authors:
Krzysztof Domino,
Jarosław Adam Miszczak
Abstract:
Opinion formation is one of the most fascinating phenomena observed in human communities, and the ability to predict and to control the dynamics of this process is interesting from the theoretical as well as practical point of view. Although there are many sophisticated models of opinion formation, they often lack the connection with real life data, and there are still sociological processes that…
▽ More
Opinion formation is one of the most fascinating phenomena observed in human communities, and the ability to predict and to control the dynamics of this process is interesting from the theoretical as well as practical point of view. Although there are many sophisticated models of opinion formation, they often lack the connection with real life data, and there are still sociological processes that need to be explained. To address this, we propose a model describing the dynamics of opinion formation which mimics the process of the virus or disease spreading in the population. The introduced model is motivated by the model of disease spread with three possible channels - direct contact, indirect contact, and contact with "contaminated" elements. We demonstrate that the presence of "contaminated" elements, which in the case of on-line communities can be represented as the content published on the Internet, has considerable impact on the process of opinion formation. We argue that by using a simple mechanism of opinion spreading via passive elements, the introduced model captures the meaningful elements of opinion formation in complex communities. The presented work provides a step towards formulating universal laws governing social as well as physical or technical systems.
△ Less
Submitted 1 November, 2022; v1 submitted 29 August, 2022;
originally announced August 2022.
-
Constructing games on networks for controlling the inequalities in the capital distribution
Authors:
Jarosław Adam Miszczak
Abstract:
The inequality in capital or resource distribution is among the important phenomena observed in populations. The sources of inequality and methods for controlling it are of practical interest. To study this phenomenon, we introduce a model of interaction between agents in the network designed for reducing the inequality in the distribution of capital. To achieve the effect of inequality reduction,…
▽ More
The inequality in capital or resource distribution is among the important phenomena observed in populations. The sources of inequality and methods for controlling it are of practical interest. To study this phenomenon, we introduce a model of interaction between agents in the network designed for reducing the inequality in the distribution of capital. To achieve the effect of inequality reduction, we interpret the outcome of the elementary game played in the network such that the wining of the game is translated into the reduction of the inequality. We study different interpretations of the introduced scheme and their impact on the behaviour of agents in the terms of the capital distribution, and we provide examples based on the capital dependent Parrondo's paradox. The results presented in this study provide insight into the mechanics of the inequality formation in the society.
△ Less
Submitted 26 January, 2022;
originally announced January 2022.
-
Hard hat wearing detection based on head keypoint localization
Authors:
Bartosz Wójcik,
Mateusz Żarski,
Kamil Książek,
Jarosław Adam Miszczak,
Mirosław Jan Skibniewski
Abstract:
In recent years, a lot of attention is paid to deep learning methods in the context of vision-based construction site safety systems, especially regarding personal protective equipment. However, despite all this attention, there is still no reliable way to establish the relationship between workers and their hard hats. To answer this problem a combination of deep learning, object detection and hea…
▽ More
In recent years, a lot of attention is paid to deep learning methods in the context of vision-based construction site safety systems, especially regarding personal protective equipment. However, despite all this attention, there is still no reliable way to establish the relationship between workers and their hard hats. To answer this problem a combination of deep learning, object detection and head keypoint localization, with simple rule-based reasoning is proposed in this article. In tests, this solution surpassed the previous methods based on the relative bounding box position of different instances, as well as direct detection of hard hat wearers and non-wearers. The results show that the conjunction of novel deep learning methods with humanly-interpretable rule-based systems can result in a solution that is both reliable and can successfully mimic manual, on-site supervision. This work is the next step in the development of fully autonomous construction site safety systems and shows that there is still room for improvement in this area.
△ Less
Submitted 24 June, 2022; v1 submitted 21 June, 2021;
originally announced June 2021.
-
Variational certification of quantum devices
Authors:
Akash Kundu,
Jarosław Adam Miszczak
Abstract:
One of the requirements imposed on the realistic quantum computers is to provide computation results which can be repeated and reproduced. In the situation when one needs to repeat the quantum computation procedure several times, it is crucial that the copies of the quantum devices are similar in the sense of the produced results. In this work, we describe a simple procedure based on variational q…
▽ More
One of the requirements imposed on the realistic quantum computers is to provide computation results which can be repeated and reproduced. In the situation when one needs to repeat the quantum computation procedure several times, it is crucial that the copies of the quantum devices are similar in the sense of the produced results. In this work, we describe a simple procedure based on variational quantum eigensolver which can be utilized to compare quantum devices. The procedure is developed by combining Choi-Jamiołkowski isomorphism with the variational hybrid quantum-classical procedure for matrix diagonalization. We compare the introduced procedure with the scheme based on the standard bounds for the similarity between quantum operations by analysing its action on random quantum channels. We also discuss the sensitivity of the described procedure to the noise, and we provide numerical results demonstrating its feasibility in realistic scenarios by running the procedure on IBM quantum computer.
△ Less
Submitted 25 August, 2022; v1 submitted 3 November, 2020;
originally announced November 2020.
-
KrakN: Transfer Learning framework for thin crack detection in infrastructure maintenance
Authors:
Mateusz Żarski,
Bartosz Wójcik,
Jarosław Adam Miszczak
Abstract:
Monitoring the technical condition of infrastructure is a crucial element to its maintenance. Currently applied methods are outdated, labour-intensive and inaccurate. At the same time, the latest methods using Artificial Intelligence techniques are severely limited in their application due to two main factors -- labour-intensive gathering of new datasets and high demand for computing power. We pro…
▽ More
Monitoring the technical condition of infrastructure is a crucial element to its maintenance. Currently applied methods are outdated, labour-intensive and inaccurate. At the same time, the latest methods using Artificial Intelligence techniques are severely limited in their application due to two main factors -- labour-intensive gathering of new datasets and high demand for computing power. We propose to utilize custom made framework -- KrakN, to overcome these limiting factors. It enables the development of unique infrastructure defects detectors on digital images, achieving the accuracy of above 90%. The framework supports semi-automatic creation of new datasets and has modest computing power requirements. It is implemented in the form of a ready-to-use software package openly distributed to the public. Thus, it can be used to immediately implement the methods proposed in this paper in the process of infrastructure management by government units, regardless of their financial capabilities.
△ Less
Submitted 11 October, 2020; v1 submitted 26 April, 2020;
originally announced April 2020.
-
Passive network evolution promotes group welfare in complex networks
Authors:
Ye Ye,
Xiao Rong Hang,
Jin Ming Koh,
Jarosław Adam Miszczak,
Kang Hao Cheong,
Neng-gang Xie
Abstract:
The Parrondo's paradox is a counterintuitive phenomenon in which individually losing strategies, canonically termed game A and game B, are combined to produce winning outcomes. In this paper, a co-evolution of game dynamics and network structure is adopted to study adaptability and survivability in multi-agent dynamics. The model includes action A, representing a rewiring process on the network, a…
▽ More
The Parrondo's paradox is a counterintuitive phenomenon in which individually losing strategies, canonically termed game A and game B, are combined to produce winning outcomes. In this paper, a co-evolution of game dynamics and network structure is adopted to study adaptability and survivability in multi-agent dynamics. The model includes action A, representing a rewiring process on the network, and a two-branch game B, representing redistributive interactions between agents. Simulation results indicate that stochastically mixing action A and game B can produce enhanced, and even winning outcomes, despite gameB being individually losing. In other words, a Parrondo-type paradox can be achieved, but unlike canonical variants, the source of agitation is provided by passive network evolution instead of an active second game. The underlying paradoxical mechanism is analyzed, revealing that the rewiring process drives a topology shift from initial regular lattices towards scale-free characteristics, and enables exploitative behavior that grants enhanced access to the favourable branch of game B.
△ Less
Submitted 10 October, 2019;
originally announced October 2019.
-
Approximation of quantum control correction scheme using deep neural networks
Authors:
M. Ostaszewski,
J. A. Miszczak,
P. Sadowski,
L. Banchi
Abstract:
We study the functional relationship between quantum control pulses in the idealized case and the pulses in the presence of an unwanted drift. We show that a class of artificial neural networks called LSTM is able to model this functional relationship with high efficiency, and hence the correction scheme required to counterbalance the effect of the drift. Our solution allows studying the mapping f…
▽ More
We study the functional relationship between quantum control pulses in the idealized case and the pulses in the presence of an unwanted drift. We show that a class of artificial neural networks called LSTM is able to model this functional relationship with high efficiency, and hence the correction scheme required to counterbalance the effect of the drift. Our solution allows studying the mapping from quantum control pulses to system dynamics and then analysing the robustness of the latter against local variations in the control profile.
△ Less
Submitted 28 March, 2019; v1 submitted 14 March, 2018;
originally announced March 2018.
-
Geometrical versus time-series representation of data in quantum control learning
Authors:
M. Ostaszewski,
J. A. Miszczak,
P. Sadowski
Abstract:
Recently machine learning techniques have become popular for analysing physical systems and solving problems occurring in quantum computing. In this paper we focus on using such techniques for finding the sequence of physical operations implementing the given quantum logical operation. In this context we analyse the flexibility of the data representation and compare the applicability of two machin…
▽ More
Recently machine learning techniques have become popular for analysing physical systems and solving problems occurring in quantum computing. In this paper we focus on using such techniques for finding the sequence of physical operations implementing the given quantum logical operation. In this context we analyse the flexibility of the data representation and compare the applicability of two machine learning approaches based on different representations of data. We demonstrate that the utilization of the geometrical structure of control pulses is sufficient for achieving high-fidelity of the implemented evolution. We also demonstrate that artificial neural networks, unlike geometrical methods, posses the generalization abilities enabling them to generate control pulses for the systems with variable strength of the disturbance. The presented results suggest that in some quantum control scenarios, geometrical data representation and processing is competitive to more complex methods.
△ Less
Submitted 29 April, 2020; v1 submitted 14 March, 2018;
originally announced March 2018.
-
Impact of the malicious input data modification on the efficiency of quantum spatial search
Authors:
Adam Glos,
Jarosław Adam Miszczak
Abstract:
In this paper we demonstrate that the efficiency of quantum algorithms can be significantly altered by malicious manipulation of the input data. We exemplify the possibility of attacks on quantum spatial search based on Szegedy walk. We achieve this by proposing a framework suitable for analysing efficiency of attacks on quantum search algorithms. We provide the analysis of proposed attacks for di…
▽ More
In this paper we demonstrate that the efficiency of quantum algorithms can be significantly altered by malicious manipulation of the input data. We exemplify the possibility of attacks on quantum spatial search based on Szegedy walk. We achieve this by proposing a framework suitable for analysing efficiency of attacks on quantum search algorithms. We provide the analysis of proposed attacks for different models of random graphs.
△ Less
Submitted 18 September, 2019; v1 submitted 27 February, 2018;
originally announced February 2018.
-
The role of quantum correlations in Cop and Robber game
Authors:
Adam Glos,
Jarosław Adam Miszczak
Abstract:
We introduce and study quantized versions of Cop and Robber game. We achieve this by using graph-preserving quantum operations, which are the quantum analogues of stochastic operations preserving the graph. We provide the tight bound for the number of operations required to reach the given state. By extending them to the controlled operations, we define a quantum-controlled Cop and Robber game, wh…
▽ More
We introduce and study quantized versions of Cop and Robber game. We achieve this by using graph-preserving quantum operations, which are the quantum analogues of stochastic operations preserving the graph. We provide the tight bound for the number of operations required to reach the given state. By extending them to the controlled operations, we define a quantum-controlled Cop and Robber game, which expands the classical Cop and Robber game, as well as the classically controlled quantum Cop and Robber game. In contrast to the typical scheme for introducing quantum games, we assume that both parties can utilise full information about the opponent's strategy. We show that the utilisation of the full knowledge about the opponent's state does not provide the advantage. Moreover, the chances of catching the Robber decrease for classical cop-win graphs. This result does not depend on the chosen model of evolution. On the other hand, the possibility to execute controlled quantum operations allows catching the Robber on almost all classical cop-win graphs. By this, we demonstrate that it is necessary to enrich the structure of correlations between the players' systems to provide a non-trivial quantized Cop and Robber game. Thus the quantum controlled operations offer a significant advantage over the classically controlled quantum operations.
△ Less
Submitted 28 November, 2017; v1 submitted 25 February, 2017;
originally announced February 2017.
-
A general scheme for information interception in the ping pong protocol
Authors:
Piotr Zawadzki,
Jarosław Adam Miszczak
Abstract:
The existence of an undetectable eavesdropping of dense coded information has been already demonstrated by Pavičić for the quantum direct communication based on the ping-pong paradigm. However, a) the explicit scheme of the circuit is only given and no design rules are provided, b) the existence of losses is implicitly assumed, c) the attack has been formulated against qubit based protocol only an…
▽ More
The existence of an undetectable eavesdropping of dense coded information has been already demonstrated by Pavičić for the quantum direct communication based on the ping-pong paradigm. However, a) the explicit scheme of the circuit is only given and no design rules are provided, b) the existence of losses is implicitly assumed, c) the attack has been formulated against qubit based protocol only and it is not clear whether it can be adapted to higher dimensional systems. These deficiencies are removed in the presented contribution. A new generic eavesdropping scheme built on a firm theoretical background is proposed. In contrast to the previous approach, it does not refer to the properties of the vacuum state, so it is fully consistent with the absence of losses assumption. Moreover, the scheme applies to the communication paradigm based on signal particles of any dimensionality. It is also shown that some well known attacks are special cases of the proposed scheme.
△ Less
Submitted 7 June, 2016;
originally announced June 2016.
-
States and channels in quantum mechanics without complex numbers
Authors:
J. A. Miszczak
Abstract:
In the presented note we aim at exploring the possibility of abandoning complex numbers in the representation of quantum states and operations. We demonstrate a simplified version of quantum mechanics in which the states are represented using real numbers only. The main advantage of this approach is that the simulation of the $n$-dimensional quantum system requires $n^2$ real numbers, in contrast…
▽ More
In the presented note we aim at exploring the possibility of abandoning complex numbers in the representation of quantum states and operations. We demonstrate a simplified version of quantum mechanics in which the states are represented using real numbers only. The main advantage of this approach is that the simulation of the $n$-dimensional quantum system requires $n^2$ real numbers, in contrast to the standard case where $n^4$ real numbers are required. The main disadvantage is the lack of hermicity in the representation of quantum states. Using Mathematica computer algebra system we develop a set of functions for manipulating real-only quantum states. With the help of this tool we study the properties of the introduced representation and the induced representation of quantum channels.
△ Less
Submitted 15 March, 2016;
originally announced March 2016.
-
Pattern recognition on the quantum Bloch sphere
Authors:
Giuseppe Sergioli,
Enrica Santucci,
Luca Didaci,
Jaroslaw A. Miszczak,
Roberto Giuntini
Abstract:
We introduce a framework suitable for describing pattern recognition task using the mathematical language of density matrices. In particular, we provide a one-to-one correspondence between patterns and pure density operators. This correspondence enables us to: i) represent the Nearest Mean Classifier (NMC) in terms of quantum objects, ii) introduce a Quantum Classifier (QC). By comparing the QC wi…
▽ More
We introduce a framework suitable for describing pattern recognition task using the mathematical language of density matrices. In particular, we provide a one-to-one correspondence between patterns and pure density operators. This correspondence enables us to: i) represent the Nearest Mean Classifier (NMC) in terms of quantum objects, ii) introduce a Quantum Classifier (QC). By comparing the QC with the NMC on different 2D datasets, we show the first classifier can provide additional information that are particularly beneficial on a classical computer with respect to the second classifier.
△ Less
Submitted 7 June, 2016; v1 submitted 1 March, 2016;
originally announced March 2016.
-
Lively quantum walks on cycles
Authors:
Przemysław Sadowski,
Jarosław Adam Miszczak,
Mateusz Ostaszewski
Abstract:
We introduce a family of quantum walks on cycles parametrized by their liveliness, defined by the ability to execute a long-range move. We investigate the behaviour of the probability distribution and time-averaged probability distribution. We show that the liveliness parameter, controlling the magnitude of the additional long-range move, has a direct impact on the periodicity of the limiting dist…
▽ More
We introduce a family of quantum walks on cycles parametrized by their liveliness, defined by the ability to execute a long-range move. We investigate the behaviour of the probability distribution and time-averaged probability distribution. We show that the liveliness parameter, controlling the magnitude of the additional long-range move, has a direct impact on the periodicity of the limiting distribution. We also show that the introduced model provides a method for network exploration which is robust against trapping.
△ Less
Submitted 8 February, 2017; v1 submitted 9 December, 2015;
originally announced December 2015.
-
Separable and non-separable data representation for pattern discrimination
Authors:
Jarosław Adam Miszczak
Abstract:
We provide a complete work-flow, based on the language of quantum information theory, suitable for processing data for the purpose of pattern recognition. The main advantage of the introduced scheme is that it can be easily implemented and applied to process real-world data using modest computation resources. At the same time it can be used to investigate the difference in the pattern recognition…
▽ More
We provide a complete work-flow, based on the language of quantum information theory, suitable for processing data for the purpose of pattern recognition. The main advantage of the introduced scheme is that it can be easily implemented and applied to process real-world data using modest computation resources. At the same time it can be used to investigate the difference in the pattern recognition resulting from the utilization of the tensor product structure of the space of quantum states. We illustrate this difference by providing a simple example based on the classification of 2D data.
△ Less
Submitted 15 March, 2015;
originally announced March 2015.
-
Quantum network exploration with a faulty sense of direction
Authors:
Jarosław Adam Miszczak,
Przemysław Sadowski
Abstract:
We develop a model which can be used to analyse the scenario of exploring quantum network with a distracted sense of direction. Using this model we analyse the behaviour of quantum mobile agents operating with non-adaptive and adaptive strategies which can be employed in this scenario. We introduce the notion of node visiting suitable for analysing quantum superpositions of states by distinguishin…
▽ More
We develop a model which can be used to analyse the scenario of exploring quantum network with a distracted sense of direction. Using this model we analyse the behaviour of quantum mobile agents operating with non-adaptive and adaptive strategies which can be employed in this scenario. We introduce the notion of node visiting suitable for analysing quantum superpositions of states by distinguishing between visiting and attaining a position. We show that without a proper model of adaptiveness, it is not possible for the party representing the distraction in the sense of direction, to obtain the results analogous to the classical case. Moreover, with additional control resources the total number of attained positions is maintained if the number of visited positions is strictly limited.
△ Less
Submitted 25 March, 2014; v1 submitted 27 August, 2013;
originally announced August 2013.
-
Functional framework for representing and transforming quantum channels
Authors:
Jarosław Adam Miszczak
Abstract:
We develop a framework which aims to simplify the analysis of quantum states and quantum operations by harnessing the potential of function programming paradigm. We show that the introduced framework allows a seamless manipulation of quantum channels, in particular to convert between different representations of quantum channels, and thus that the use of functional programming concepts facilitates…
▽ More
We develop a framework which aims to simplify the analysis of quantum states and quantum operations by harnessing the potential of function programming paradigm. We show that the introduced framework allows a seamless manipulation of quantum channels, in particular to convert between different representations of quantum channels, and thus that the use of functional programming concepts facilitates the manipulation of abstract objects used in the language of quantum theory.
For the purpose of our presentation we will use Mathematica computer algebra system. This choice is motivated twofold. First, it offers a rich programming language based on the functional paradigm. Second, this programming language is combined with powerful symbolic and numeric manipulation capabilities.
△ Less
Submitted 18 July, 2013;
originally announced July 2013.
-
RandFile package for Mathematica for accessing file-based sources of randomness
Authors:
J. A. Miszczak,
M. Wahl
Abstract:
We present a package for Mathematica computer algebra system which allows the exploitation of local files as sources of random data. We provide the description of the package and illustrate its usage by showing some examples. We also compare the provided functionality with alternative sources of randomness, namely a built-in pseudo-random generator and the package for accessing hardware true rando…
▽ More
We present a package for Mathematica computer algebra system which allows the exploitation of local files as sources of random data. We provide the description of the package and illustrate its usage by showing some examples. We also compare the provided functionality with alternative sources of randomness, namely a built-in pseudo-random generator and the package for accessing hardware true random number generators.
△ Less
Submitted 15 March, 2015; v1 submitted 12 February, 2013;
originally announced February 2013.
-
General method for the security analysis in a quantum direct communication protocol
Authors:
Jarosław Adam Miszczak,
Piotr Zawadzki
Abstract:
We introduce a general approach for the analysis of a quantum direct communication protocol. The method is based on the investigation of the superoperator acting on a joint system of the communicating parties and the eavesdropper. The introduced method is more versatile than the approaches used so far as it permits to incorporate different noise models in a unified way. Moreover, it make use of a…
▽ More
We introduce a general approach for the analysis of a quantum direct communication protocol. The method is based on the investigation of the superoperator acting on a joint system of the communicating parties and the eavesdropper. The introduced method is more versatile than the approaches used so far as it permits to incorporate different noise models in a unified way. Moreover, it make use of a well grounded theory of quantum discrimination for the purpose of estimating the eavesdropper's information gain.
△ Less
Submitted 22 January, 2013;
originally announced January 2013.
-
Analysis of patent activity in the field of quantum information processing
Authors:
Ryszard Winiarczyk,
Piotr Gawron,
Jarosław Adam Miszczak,
Łukasz Pawela,
Zbigniew Puchała
Abstract:
This paper provides an analysis of patent activity in the field of quantum information processing. Data from the PatentScope database from the years 1993-2011 was used. In order to predict the future trends in the number of filed patents time series models were used.
This paper provides an analysis of patent activity in the field of quantum information processing. Data from the PatentScope database from the years 1993-2011 was used. In order to predict the future trends in the number of filed patents time series models were used.
△ Less
Submitted 11 December, 2012;
originally announced December 2012.
-
Employing online quantum random number generators for generating truly random quantum states in Mathematica
Authors:
J. A. Miszczak
Abstract:
We present a new version of TRQS package for Mathematica computing system. The package allows harnessing quantum random number generators (QRNG) for investigating the statistical properties of quantum states. It implements a number of functions for generating random states. The new version of the package adds the ability to use the on-line quantum random number generator service and implements new…
▽ More
We present a new version of TRQS package for Mathematica computing system. The package allows harnessing quantum random number generators (QRNG) for investigating the statistical properties of quantum states. It implements a number of functions for generating random states. The new version of the package adds the ability to use the on-line quantum random number generator service and implements new functions for retrieving lists of random numbers. Thanks to the introduced improvements, the new version provides faster access to high-quality sources of random numbers and can be used in simulations requiring large amount of random data.
△ Less
Submitted 20 August, 2012;
originally announced August 2012.
-
Increasing the security of the ping-pong protocol by using many mutually unbiased bases
Authors:
Piotr Zawadzki,
Zbigniew Puchała,
Jarosław Adam Miszczak
Abstract:
In this paper we propose an extended version of the ping-pong protocol and study its security. The proposed protocol incorporates the usage of mutually unbiased bases in the control mode. We show that, by increasing the number of bases, it is possible to improve the security of this protocol. We also provide the upper bounds on eavesdropping average non-detection probability and propose a control…
▽ More
In this paper we propose an extended version of the ping-pong protocol and study its security. The proposed protocol incorporates the usage of mutually unbiased bases in the control mode. We show that, by increasing the number of bases, it is possible to improve the security of this protocol. We also provide the upper bounds on eavesdropping average non-detection probability and propose a control mode modification that increases the attack detection probability.
△ Less
Submitted 11 April, 2012; v1 submitted 16 January, 2012;
originally announced January 2012.
-
Symbolic integration with respect to the Haar measure on the unitary group
Authors:
Zbigniew Puchała,
Jarosław Adam Miszczak
Abstract:
We present IntU package for Mathematica computer algebra system. The presented package performs a symbolic integration of polynomial functions over the unitary group with respect to unique normalized Haar measure. We describe a number of special cases which can be used to optimize the calculation speed for some classes of integrals. We also provide some examples of usage of the presented package.
We present IntU package for Mathematica computer algebra system. The presented package performs a symbolic integration of polynomial functions over the unitary group with respect to unique normalized Haar measure. We describe a number of special cases which can be used to optimize the calculation speed for some classes of integrals. We also provide some examples of usage of the presented package.
△ Less
Submitted 22 February, 2017; v1 submitted 20 September, 2011;
originally announced September 2011.
-
Eigengestures for natural human computer interface
Authors:
Piotr Gawron,
Przemysław Głomb,
Jarosław Adam Miszczak,
Zbigniew Puchała
Abstract:
We present the application of Principal Component Analysis for data acquired during the design of a natural gesture interface. We investigate the concept of an eigengesture for motion capture hand gesture data and present the visualisation of principal components obtained in the course of conducted experiments. We also show the influence of dimensionality reduction on reconstructed gesture data qu…
▽ More
We present the application of Principal Component Analysis for data acquired during the design of a natural gesture interface. We investigate the concept of an eigengesture for motion capture hand gesture data and present the visualisation of principal components obtained in the course of conducted experiments. We also show the influence of dimensionality reduction on reconstructed gesture data quality.
△ Less
Submitted 6 May, 2011;
originally announced May 2011.
-
Generating and using truly random quantum states in Mathematica
Authors:
J. A. Miszczak
Abstract:
The problem of generating random quantum states is of a great interest from the quantum information theory point of view. In this paper we present a package for Mathematica computing system harnessing a specific piece of hardware, namely Quantis quantum random number generator (QRNG), for investigating statistical properties of quantum states. The described package implements a number of functions…
▽ More
The problem of generating random quantum states is of a great interest from the quantum information theory point of view. In this paper we present a package for Mathematica computing system harnessing a specific piece of hardware, namely Quantis quantum random number generator (QRNG), for investigating statistical properties of quantum states. The described package implements a number of functions for generating random states, which use Quantis QRNG as a source of randomness. It also provides procedures which can be used in simulations not related directly to quantum information processing.
△ Less
Submitted 19 October, 2011; v1 submitted 22 February, 2011;
originally announced February 2011.
-
Models of quantum computation and quantum programming languages
Authors:
J. A. Miszczak
Abstract:
The goal of the presented paper is to provide an introduction to the basic computational models used in quantum information theory. We review various models of quantum Turing machine, quantum circuits and quantum random access machine (QRAM) along with their classical counterparts. We also provide an introduction to quantum programming languages, which are developed using the QRAM model. We review…
▽ More
The goal of the presented paper is to provide an introduction to the basic computational models used in quantum information theory. We review various models of quantum Turing machine, quantum circuits and quantum random access machine (QRAM) along with their classical counterparts. We also provide an introduction to quantum programming languages, which are developed using the QRAM model. We review the syntax of several existing quantum programming languages and discuss their features and limitations.
△ Less
Submitted 3 December, 2011; v1 submitted 29 December, 2010;
originally announced December 2010.
-
Design-on-demand or how to create a target-oriented social web-site
Authors:
Jarosław Adam Miszczak,
Izabela Sobota-Miszczak
Abstract:
We describe an informal methodology for developing on-line applications, which is, to some extent, complementary to the Web 2.0 aspects of web development. The presented methodology is suitable for developing low-cost and non-cost web sites targeted at medium-sized communities. We present basic building blocks used in the described strategy. To achieve a better understanding of the discussed conce…
▽ More
We describe an informal methodology for developing on-line applications, which is, to some extent, complementary to the Web 2.0 aspects of web development. The presented methodology is suitable for developing low-cost and non-cost web sites targeted at medium-sized communities. We present basic building blocks used in the described strategy. To achieve a better understanding of the discussed concepts we comment on their application during the realization of two web projects. We focus on the role of community-driven development, which is crucial for projects of the discussed type.
△ Less
Submitted 24 October, 2010;
originally announced October 2010.
-
Extending scientific computing system with structural quantum programming capabilities
Authors:
P. Gawron,
J. Klamka,
J. A. Miszczak,
R. Winiarczyk
Abstract:
We present a basic high-level structures used for developing quantum programming languages. The presented structures are commonly used in many existing quantum programming languages and we use quantum pseudo-code based on QCL quantum programming language to describe them. We also present the implementation of introduced structures in GNU Octave language for scientific computing. Procedures used in…
▽ More
We present a basic high-level structures used for developing quantum programming languages. The presented structures are commonly used in many existing quantum programming languages and we use quantum pseudo-code based on QCL quantum programming language to describe them. We also present the implementation of introduced structures in GNU Octave language for scientific computing. Procedures used in the implementation are available as a package quantum-octave, providing a library of functions, which facilitates the simulation of quantum computing. This package allows also to incorporate high-level programming concepts into the simulation in GNU Octave and Matlab. As such it connects features unique for high-level quantum programming languages, with the full palette of efficient computational routines commonly available in modern scientific computing systems. To present the major features of the described package we provide the implementation of selected quantum algorithms. We also show how quantum errors can be taken into account during the simulation of quantum algorithms using quantum-octave package. This is possible thanks to the ability to operate on density matrices.
△ Less
Submitted 8 June, 2010;
originally announced June 2010.
-
Quantum Implementation of Parrondo's Paradox
Authors:
J. A. Miszczak,
P. Gawron
Abstract:
We propose a quantum implementation of a capital-dependent Parrondo's paradox that uses $O(\log_2(n))$ qubits, where $n$ is the number of Parrondo games. We present its implementation in the quantum computer language (QCL) and show simulation results.
We propose a quantum implementation of a capital-dependent Parrondo's paradox that uses $O(\log_2(n))$ qubits, where $n$ is the number of Parrondo games. We present its implementation in the quantum computer language (QCL) and show simulation results.
△ Less
Submitted 7 December, 2005; v1 submitted 28 February, 2005;
originally announced February 2005.
-
Numerical simulations of mixed states quantum computation
Authors:
P. Gawron,
J. A. Miszczak
Abstract:
We describe quantum-octave package of functions useful for simulations of quantum algorithms and protocols. Presented package allows to perform simulations with mixed states. We present numerical implementation of important quantum mechanical operations - partial trace and partial transpose. Those operations are used as building blocks of algorithms for analysis of entanglement and quantum error…
▽ More
We describe quantum-octave package of functions useful for simulations of quantum algorithms and protocols. Presented package allows to perform simulations with mixed states. We present numerical implementation of important quantum mechanical operations - partial trace and partial transpose. Those operations are used as building blocks of algorithms for analysis of entanglement and quantum error correction codes. Simulation of Shor's algorithm is presented as an example of package capabilities.
△ Less
Submitted 29 June, 2004;
originally announced June 2004.