scispace - formally typeset
Search or ask a question

Showing papers in "Journal of Quantum Information Science in 2014"


Journal ArticleDOI
TL;DR: A survey on agents, causality and intelligence is presented and an equilibrium-based computing paradigm of quantum agents and quantum intelligence (QAQI) is proposed in this article.
Abstract: A survey on agents, causality and intelligence is presented and an equilibrium-based computing paradigm of quantum agents and quantum intelligence (QAQI) is proposed. In the survey, Aristotle’s causality principle and its historical extensions by David Hume, Bertrand Russell, Lotfi Zadeh, Donald Rubin, Judea Pearl, Niels Bohr, Albert Einstein, David Bohm, and the causal set initiative are reviewed; bipolar dynamic logic (BDL) is introduced as a causal logic for bipolar inductive and deductive reasoning; bipolar quantum linear algebra (BQLA) is introduced as a causal algebra for quantum agent interaction and formation. Despite the widely held view that causality is undefinable with regularity, it is shown that equilibrium-based bipolar causality is logically definable using BDL and BQLA for causal inference in physical, social, biological, mental, and philosophical terms. This finding leads to the paradigm of QAQI where agents are modeled as quantum ensembles; intelligence is revealed as quantum intelligence. It is shown that the ensembles formation, mutation and interaction of agents can be described as direct or indirect results of quantum causality. Some fundamental laws of causation are presented for quantum agent entanglement and quantum intelligence. Applicability is illustrated; major challenges are identified in equilibrium based causal inference and quantum data mining.

44 citations


Journal ArticleDOI
TL;DR: In this paper, two different theories were used to prove that dark energy density is the complimentary Legendre transformation of ordinary energy and vice versa as given by E(dark) = (4 -k)/4 = 3.8196011/4 = 0.9549150275.
Abstract: We utilize two different theories to prove that cosmic dark energy density is the complimentary Legendre transformation of ordinary energy and vice versa as given by E(dark) = mc2 (21/22) and E(ordinary) = mc2/22. The first theory used is based on G ‘t Hooft’s remarkably simple renormalization procedure in which a neat mathematical maneuver is introduced via the dimensionality of our four dimensional spacetime. Thus, ‘t Hooft used instead of D = 4 and then took at the end of an intricate and subtle computation the limit to obtain the result while avoiding various problems including the pole singularity at D = 4. Here and in contradistinction to the classical form of dimensional and renormalization we set and do not take the limit where and is the theoretically and experimentally well established Hardy’s generic quantum entanglement. At the end we see that the dark energy density is simply the ratio of and the smooth disentangled D = 4, i.e. (dark) = (4 -k)/4 = 3.8196011/4 = 0.9549150275. Consequently where we have ignored the fine structure details by rounding 21 + k to 21 and 22 + k to 22 in a manner not that much different from of the original form of dimensional regularization theory. The result is subsequently validated by another equally ingenious approach due mainly to E. Witten and his school of topological quantum field theory. We notice that in that theory the local degrees of freedom are zero. Therefore, we are dealing essentially with pure gravity where are the degrees of freedom and is the corresponding dimension. The results and the conclusion of the paper are summarized in Figure 1-3, Table 1 and Flow Chart 1.

34 citations


Journal ArticleDOI
TL;DR: In this paper, the authors show that all the involved physics in deriving the new quantum dissection of the famous formula of special relativity is actually a pure mathematical necessity anchored in the phenomena of volume concentration of convex manifold in high dimensional quasi Banach spaces.
Abstract: Einstein’s energy mass formula is shown to consist of two basically quantum components E(O) = mc2/22 and E(D) = mc2(21/22). We give various arguments and derivations to expose the quantum entanglement physics residing inside a deceptively simple expression E = mc2. The true surprising aspect of the present work is however the realization that all the involved “physics” in deriving the new quantum dissection of Einstein’s famous formula of special relativity is actually a pure mathematical necessity anchored in the phenomena of volume concentration of convex manifold in high dimensional quasi Banach spaces. Only an endophysical experiment encompassing the entire universe such as COBE, WMAP, Planck and supernova analysis could have discovered dark energy and our present dissection of Einstein’s marvelous formula.

34 citations


Journal ArticleDOI
TL;DR: It is demonstrated that the proposed reconciliation method for the BB84 Quantum Key Distribution protocol leads to a significant improvement of the protocol security and of the Bit Error Rate even with great eavesdropping capability.
Abstract: In this paper, we propose how to construct a reconciliation method for the BB84 Quantum Key Distribution (QKD) protocol. Theoretically, it is unconditionally secure because it is based on the quantum laws of physics, rather than the assumed computational complexity of mathematical problems. BB84 protocol performances can be reduced by various errors and information leakages such as limited intrinsic efficiency of the protocol, imperfect devices and eavesdropping. The proposed reconciliation method allowed to weed out these errors by using Turbo codes. Since their high error correction capability implies getting low errors, this method has high performance especially when compared to the last method presented in the literature based on Low-Density Parity Check codes (LDPC). In particular, we demonstrate that our method leads to a significant improvement of the protocol security and of the Bit Error Rate (BER) even with great eavesdropping capability.

13 citations


Journal ArticleDOI
TL;DR: In this paper, the quantum discord of a two-qubit anisotropy Heisenberg chain with Dzyaloshinskii-Moriya (DM) interaction under magnetic field was investigated.
Abstract: We investigate the quantum discord of a two-qubit anisotropy XXZ Heisenberg chain with Dzyaloshinskii-Moriya (DM) interaction under magnetic field. It is shown that the quantum discord highly depends on the system’s temperature T, DM interaction D, homogenous magnetic field B and the anisotropy Δ. For lower temperature T, by modulating D and B, the quantum discord can be controlled and the quantum discord switch can be realized.

12 citations


Journal ArticleDOI
TL;DR: In this paper, the effect of spin-orbit coupling on the entanglement between any two nodes of the network was investigated. And the authors quantified the entagglement using Woottores concurrence method.
Abstract: Dzyaloshiniskii-Moriya (DM) interaction in three directions (Dx, Dy and Dz) is used to generate entangled network from partially entangled states in the presence of the spin-orbit coupling. The effect of the spin coupling on the entanglement between any two nodes of the network is investigated. The entanglement is quantified using Woottores concurrence method. It is shown that the entanglement decays as the coupling increases. For larger values of the spin coupling, the entanglement oscillates within finite bounds. For the initially entangled channels, the upper bound does not exceed its initial value, whereas the entanglement reaches its maximum value for the channels generated via indirect interaction.

11 citations


Journal ArticleDOI
TL;DR: In this paper, the authors demonstrate n-party controlled-unitary gate implementations locally on arbitrary remote state through linear entangled channel where control parties share entanglement with the adjacent control parties and only one of them shares entangling with the target party.
Abstract: In this paper, we demonstrate n-party controlled unitary gate implementations locally on arbitrary remote state through linear entangled channel where control parties share entanglement with the adjacent control parties and only one of them shares entanglement with the target party. In such a network, we describe the protocol of simultaneous implementation of controlled-Hermitian gate starting from three party scenarios. We also explicate the implementation of three party controlled-Unitary gates, a generalized form of Toffoli gate and subsequently generalize the protocol for n-party using minimal cost.

9 citations


Journal ArticleDOI
TL;DR: In this paper, instead of projective measurement, the authors use weak measurements to define quantum and geometric discords, and compare them with the normal quantum discords based on the projective measurements in noninertial frames.
Abstract: Instead of projective measurement, we use weak measurement to define quantum and geometric discords, and compare them with the normal quantum and geometric discords based on the projective measurement in noninertial frames. We find that using weak measurement to define quantum discord we can capture more quantum correlations compared with the projective measurement, so calling it super quantum discord. However, we note that the geometric discord based on the weak measurements becomes smaller, so we name it inferior “geometric discord”. We also show that, although both the super quantum discord and the inferior “geometric discord” decrease with the increase of observer’s acceleration, the super quantum discord/inferior “geometric discord” increases/decreases as the measurements become weak. These differences reveal that the definitions of the quantum and geometric discords are not too concordant with each other.

6 citations


Journal ArticleDOI
TL;DR: A kind of novel three-party quantum secure direct communication protocol with the correlation of two-particle entangled state with security analysis shows that the present three- party scheme is a secure protocol.
Abstract: A kind of novel three-party quantum secure direct communication protocol is proposed with the correlation of two-particle entangled state. In this scheme the qubit transmission forms a closed loop and every one of the three participants is both a receiver and a sender of particle sequences in the bidirectional quantum channels. Each party implements the corresponding unitary operations according to its secret bit value over the quantum channels and then extracts the other two parties’ unitary operations by performing Bell measurements on the encoded particles. Thus they can obtain the secret information simultaneously. Finally, the security analysis shows that the present three-party scheme is a secure protocol.

4 citations


Journal ArticleDOI
TL;DR: In this paper, the relativistic analogue of Bell's inequality is discussed for three qubit states by explicit calculation of the Wigner rotation and the critical value of boost speed for violation of inequality for particles moving in the center of mass frame is greater than that for particles with the same momentum.
Abstract: Entanglement of tripartite spin states under Lorentz transformations is studied in the context of Bell’s inequality and positive partial transpose criterion. First the relativistic analogue of Bell’s inequality is discussed for three qubit states by explicit calculation of the Wigner rotation. We use the relativistic invariant spin operator which is related to the Pauli-Lubanski pseudo vector. For observers at rest the Bell’s inequality is speed-independent and maximally violated. For moving observers it’s shown that Bell’s inequality is violated and the amount of violation depends on the boost speed. We show that in ultrarelativistic limit Bell’s inequality is still maximally violated. We also obtained the critical value for satisfying Bell’s inequality. The critical value of boost speed for violation of inequality for particles moving in the center of mass frame is greater than that for particles moving with the same momentum. Second we investigate the entanglement distillability of tripartite mixed spin states under Lorentz transformations in the context of Werner states. We show that there are states that will change from distillable (entangled) into separable for a certain value of rapidity.

4 citations


Journal ArticleDOI
TL;DR: In this paper, the time dependence of probability and Shannon entropy of a modified damped harmonic oscillator was studied by using single and double Gaussian wave functions through the Feynman path method.
Abstract: The time dependence of probability and Shannon entropy of a modified damped harmonic oscillator is studied by using single and double Gaussian wave functions through the Feynman path method. We establish that the damped coefficient as well as the system frequency and the distance separating two consecutive waves of the initial double Gaussian function influences the coherence of the system and can be used to control its decoherence.

Journal ArticleDOI
TL;DR: In this article, the authors revisited the quantum features of an anti-ferromagnetic (AF) spin environment at finite temperature with gap in its frequency spectrum, on the dynamics quantum correlations of a coupled central two qubits system with Dzyaloshinskii-Moriya (DM) interaction, prepared in two entangled Bell states.
Abstract: We revisit the quantum features of an anti-ferromagnetic (AF) spin environment at finite temperature with gap in its frequency spectrum, on the dynamics quantum correlations of a coupled central two qubits system with Dzyaloshinskii-Moriya (DM) interaction, prepared in two entangled Bell states. Using entanglement and quantum discord as quantum meters of decoherence, the prepared entangled states are classified as robust or fragile relative to the degree of information leakage to the AF environment. By tailoring the size of the frequency gap, anisotropy field strength and induced field, due to system AF spin environment coupling, size of the AF environment and DM interaction parameter, a decoherence-free sub-space can be accessed for efficient execution of quantum protocols encoded in the entangled states.

Journal ArticleDOI
TL;DR: In this article, the Schrodinger perturbation energy for an arbitrary order N of the perturbations has been presented with the aid of a circular scale of time, and the method is of a recurrent character and developed for a non-degenerate quantum state.
Abstract: The Schrodinger perturbation energy for an arbitrary order N of the perturbation has been presented with the aid of a circular scale of time. The method is of a recurrent character and developed for a non-degenerate quantum state. It allows one to reduce the inflation of terms necessary to calculate known from the Feynman’s diagrammatical approach to a number below that applied in the original Schrodinger perturbation theory.

Journal ArticleDOI
TL;DR: In this paper, a single two-level atom interacting with a SU(1, 1) quantum system was studied, and the effects of different parameters on the scaled atomic Wehrl entropy and marginal atomic density were examined.
Abstract: In this paper, we study the dynamics of the atomic inversion, scaled atomic Wehrl entropy and marginal atomic Wehrl density for a single two-level atom interacting with SU(1,1) quantum system. We obtain the expectation values of the atomic variables using specific initial conditions. We examine the effects of different parameters on the scaled atomic Wehrl entropy and marginal atomic Wehrl density. We observe an interesting monotonic relation between the different physical quantities for different values of the initial atomic position and detuning parameter.

Journal ArticleDOI
TL;DR: In this paper, a quantum communication protocol, called approximate quantum state sharing (AQSS), is proposed and shown to be secure against any external and internal attacks of wiretapping.
Abstract: We investigate a quantum communication protocol, of so-called approximate quantum state sharing (AQSS), that protocol is basically based on pair of private quantum channels. In this paper, we prove that the scheme is secure against any external and internal attacks of wiretapping in principle. Although the protocol leaks small amount of information corresponding to a security parameter , the scheme still preserves its information-theoretic security.

Journal ArticleDOI
TL;DR: In this paper, the possibility of creating a spectrometer of THz range, which is based on non-stationary Josephson effect in HTSP, is considered, and a simple design of Josephson junction adjustable at cryogenic conditions is proposed.
Abstract: The possibility of creating a spectrometer of THz range, which is based on non-stationary Josephson effect in HTSP is considered. Simple design of Josephson junction adjustable at cryogenic conditions is proposed. Using of such device for solving the problem of factorization of high value numbers, which in fact is the only motivation for creating a quantum computer, is discussed.

Journal ArticleDOI
TL;DR: In this paper, the authors considered the physical limitations imposed on the information content of an image by the wave and quantum nature of light, when the image is obtained by illuminating a reflecting or transmitting planar object by natural (i.e., fully thermalized) light, or by observing an object emitting incoherent (thermal) radiation.
Abstract: We consider the physical limitations imposed on the information content of an image by the wave and quantum nature of light, when the image is obtained by illuminating a reflecting or transmitting planar object by natural (i.e., fully thermalized) light, or by observation of an object emitting incoherent (thermal) radiation. The discreteness of the degrees of freedom and the statistical properties of thermal radiation are taken into account. We derive the maximum amount of information that can be retrieved from the object. This amount is always finite and is proportional to the area of the object, the solid angle under which the entrance pupil of the receiver is seen from the object, and the time of observation. An explicit expression for the information in the case where the information recorded by the receiver obeys Planck’s spectral distribution is obtained. The amount of information per photon of recorded radiation is a universal numerical constant, independent of the parameters of observation.

Journal ArticleDOI
TL;DR: Barros and Nagata as discussed by the authors discuss the fact that only one expected value in a spin-1/2 pure state rules out the reality of the Pauli observable, and they do not accept extra assumptions about the truth of the observable.
Abstract: Barros discusses that [Jose Acacio de Barros, Int. J. Theor. Phys. 50, 1828 (2011)] Nagata derives inconsistencies from quantum mechanics [K. Nagata, Int. J. Theor. Phys. 48, 3532 (2009)]. Barros considers that the inconsistencies do not come from quantum mechanics, but from extra assumptions about the reality of observables. Here we discuss the fact that there is a contradiction within the quantum theory. We discuss the fact that only one expected value in a spin-1/2 pure state 〈σx〉rules out the reality of the observable. We do not accept extra assumptions about the reality of observables. We use the actually measured results of quantum measurements (raw data). We use a single Pauli observable. We stress that we can use the quantum theory even if we give up the axiomatic system for the quantum theory.

Journal ArticleDOI
TL;DR: A new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob; each is in one of four possible states, which provides an additional layer of security over the standard BB84 protocol.
Abstract: We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob; each is in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob’s secure key in order to match Alice’s secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

Journal ArticleDOI
TL;DR: In this article, a mathematical formalism for describing the machinery of human mind creativity is proposed, where the authors focus on the discrete mode of the mind activity, and the fundamental novelty of the model is in its capability to move from disorder to order without external inputs in violation of the second law of thermodynamics.
Abstract: This paper proposes a mathematical formalism for describing the machinery of human mind creativity. Since some functions of mind support discreteness of cognition, but others support its continuity, while time in physics is always continuous, an attempt to overcome the continuous/discrete duality of mind performance is implemented via utilization of special critical points: terminal attractors and repellers that act as autonomous biological clock. In this paper, attention is concentrated upon the discrete mode of the mind activity since the continuous mode was introduced and discussed in details in our previous publications. The fundamental novelty of the model is in its capability to move from disorder to order without external inputs in violation of the second law of thermodynamics; that suggests that this kind of dynamics requires extension of modern physics to include physics of life. Conceptually the discrete model links to its continuous version represented by a hypothetical particle of life that is briefly discussed prior to derivation of the discrete model. However, the discrete model should be considered as the next step in study of mind dynamics since it provides a bridge to mathematical origin of self-generated novelties in such brunches as mathematical logic and linguistic, i.e. the highest level activities of human mind. The proposed model deals with rules of mind activity rather than with its content.

Journal ArticleDOI
TL;DR: In this article, a new feature on entropy squeezing for a two level system with a class of nonlinear and coherent states (NCS) is observed and an interesting result on the comparison between the coherent state (CS) and NCS is explored.
Abstract: Entropy squeezing is an important feature in performing different tasks in quantum information processing such as quantum cryptography and superdense coding. These quantum information tasks depend on finding the states in which squeezing can be created. In this article, a new feature on entropy squeezing for a two level system with a class of nonlinear coherent state (NCS) is observed. An interesting result on the comparison between the coherent state (CS) and NCS is explored. The influence of the Lamb-Dick parameter in both absence and presence of the Kerr medium is examined. A rich feature of entropy squeezing in the case of NCS, which is observed to describe the motion of the trapped ion, has been obtained.

Journal ArticleDOI
TL;DR: In this article, the principles of causality conspiracy are introduced to provide a consistent epistemology for quantum theory, relativity theory, and all the known sciences, and the principles can be used to model the information charges in the vacuum of a quantum probability firmament as symmetry of quantum charges with a zero net charge.
Abstract: The human mind understands logical processes and causality and formulates theories based on logical descriptions of empirical evidence. The Principles of Causal Conspiracy is based on defining information as logical charges similar to electric charges. Such information charges can be modeled in the vacuum of a quantum probability firmament as symmetry of quantum charges with a zero net charge. Observation of a state lifts one of these charges in a Möbius transformation from a multipolar field of possibilities that maximizes a local monopole field that is observable. In the first of several papers, I introduce new and profound principles, the Principles of Causal Conspiracy, to provide a consistent epistemology for quantum theory, relativity theory and all the known sciences.

Journal ArticleDOI
TL;DR: In this article, a new type of numbers, called virtual numbers, which produce zero upon multiplication with complex numbers is introduced, and a composition of entangled quantum states such as a Bell state can then be decomposed into its constituent quantum states.
Abstract: In the existing formalism of quantum states, probability amplitudes of quantum states are complex numbers. A composition of entangled quantum states, such as a Bell state, cannot be decomposed into its constituent quantum states, implying that quantum states lose their identities when they get entangled. This is contrary to the observation that a composition of entangled quantum states decays back to its constituent quantum states. To eliminate this discrepancy, this paper introduces a new type of numbers, called virtual numbers, which produce zero upon multiplication with complex numbers. In the proposed formalism of quantum states, probability amplitudes of quantum states are general numbers made of complex and virtual numbers. A composition of entangled quantum states, such as a Bell state, can then be decomposed into its constituent quantum states, implying that quantum states retain their identities when they get entangled.

Journal ArticleDOI
TL;DR: In this article, the Dirac-Podolsky-Rosen paradox is resolved dynamically by using spin-dependent quantum trajectories inferred from Dirac's equation for a relativistic electron.
Abstract: The Einstein-Podolsky-Rosen paradox is resolved dynamically by using spin-dependent quantum trajectories inferred from Dirac’s equation for a relativistic electron. The theory provides a practical computational methodology for studying entanglement versus disentanglement for realistic Hamiltonians.