1,659 research outputs found

    Non-weighted aggregate evaluation function of multi-objective optimization for knock engine modeling

    Get PDF
    In decision theory, the weighted sum model (WSM) is the best known Multi-Criteria Decision Analysis (MCDA) approach for evaluating a number of alternatives in terms of a number of decision criteria. Assigning weights is a difficult task, especially if the number of criteria is large and the criteria are very different in character. There are some problems in the real world which utilize conflicting criteria and mutual effect. In the field of automotive, the knocking phenomenon in internal combustion or spark ignition engines limits the efficiency of the engine. Power and fuel economy can be maximized by optimizing some factors that affect the knocking phenomenon, such as temperature, throttle position sensor, spark ignition timing, and revolution per minute. Detecting knocks and controlling the above factors or criteria may allow the engine to run at the best power and fuel economy. The best decision must arise from selecting the optimum trade-off within the above criteria. The main objective of this study was to proposed a new Non-Weighted Aggregate Evaluation Function (NWAEF) model for non-linear multi-objectives function which will simulate the engine knock behavior (non-linear dependent variable) in order to optimize non-linear decision factors (non-linear independent variables). This study has focused on the construction of a NWAEF model by using a curve fitting technique and partial derivatives. It also aims to optimize the nonlinear nature of the factors by using Genetic Algorithm (GA) as well as investigate the behavior of such function. This study assumes that a partial and mutual influence between factors is required before such factors can be optimized. The Akaike Information Criterion (AIC) is used to balance the complexity of the model and the data loss, which can help assess the range of the tested models and choose the best ones. Some statistical tools are also used in this thesis to assess and identify the most powerful explanation in the model. The first derivative is used to simplify the form of evaluation function. The NWAEF model was compared to Random Weights Genetic Algorithm (RWGA) model by using five data sets taken from different internal combustion engines. There was a relatively large variation in elapsed time to get to the best solution between the two model. Experimental results in application aspect (Internal combustion engines) show that the new model participates in decreasing the elapsed time. This research provides a form of knock control within the subspace that can enhance the efficiency and performance of the engine, improve fuel economy, and reduce regulated emissions and pollution. Combined with new concepts in the engine design, this model can be used for improving the control strategies and providing accurate information to the Engine Control Unit (ECU), which will control the knock faster and ensure the perfect condition of the engine

    Intrinsic randomness in non-local theories: quantification and amplification

    Get PDF
    Quantum mechanics was developed as a response to the inadequacy of classical physics in explaining certain physical phenomena. While it has proved immensely successful, it also presents several features that severely challenge our classicality based intuition. Randomness in quantum theory is one such and is the central theme of this dissertation. Randomness is a notion we have an intuitive grasp on since it appears to abound in nature. It a icts weather systems and nancial markets and is explicitly used in sport and gambling. It is used in a wide range of scienti c applications such as the simulation of genetic drift, population dynamics and molecular motion in fluids. Randomness (or the lack of it) is also central to philosophical concerns such as the existence of free will and anthropocentric notions of ethics and morality. The conception of randomness has evolved dramatically along with physical theory. While all randomness in classical theory can be fully attributed to a lack of knowledge of the observer, quantum theory qualitatively departs by allowing the existence of objective or intrinsic randomness. It is now known that intrinsic randomness is a generic feature of hypothetical theories larger than quantum theory called the non-signalling theories. They are usually studied with regards to a potential future completion of quantum mechanics or from the perspective of recognizing new physical principles describing nature. While several aspects have been studied to date, there has been little work in globally characterizing and quantifying randomness in quantum and non-signalling theories and the relationship between them. This dissertation is an attempt to ll this gap. Beginning with the unavoidable assumption of a weak source of randomness in the universe, we characterize upper bounds on quantum and non-signalling randomness. We develop a simple symmetry argument that helps identify maximal randomness in quantum theory and demonstrate its use in several explicit examples. Furthermore, we show that maximal randomness is forbidden within general non-signalling theories and constitutes a quantitative departure from quantum theory. We next address (what was) an open question about randomness ampli cation. It is known that a single source of randomness cannot be ampli ed using classical resources alone. We show that using quantum resources on the other hand allows a full ampli cation of the weakest sources of randomness to maximal randomness even in the presence of supra-quantum adversaries. The signi cance of this result spans practical cryptographic scenarios as well as foundational concerns. It demonstrates that conditional on the smallest set of assumptions, the existence of the weakest randomness in the universe guarantees the existence of maximal randomness. The next question we address is the quanti cation of intrinsic randomness in non-signalling correlations. While this is intractable in general, we identify cases where this can be quanti ed. We nd that in these cases all observed randomness is intrinsic even relaxing the measurement independence assumption. We nally turn to the study of the only known resource that allows generating certi able intrinsic randomness in the laboratory i.e. entanglement. We address noisy quantum systems and calculate their entanglement dynamics under decoherence. We identify exact results for several realistic noise models and provide tight bounds in some other cases. We conclude by putting our results into perspective, pointing out some drawbacks and future avenues of work in addressing these concerns

    Quantum information with black boxes : lifting protocols from theory to implementation

    Get PDF
    According to recent estimates, 10^18 bytes of data are generated on a daily basis around the globe. Our information society urges for radical solutions to treat such data deluge. By exploiting fundamental key elements of quantum theory -arguably the most probed theory of modern physics- quantum information science is nowadays revolutionizing the way in which we acquire, process, store and transmit information. In the midst of the information era, the potential of quantum technologies is being recognized by the industry sector, and in turn, new capabilities for quantum information processing keep driving exciting discoveries related to more fundamental aspects of science. There are several research programs all around the world fostering the development and commercialization of quantum technologies, mostly for cryptographic and randomness generation duties. Thus, the technological limitations that today step us aside from the quantum information era are gradually being overcome. But there is a fundamental issue that still needs to be faced: the impossibility to know what is really going on in quantum experiments, due to their atomic-scale dimensions. Indeed, how will an average user guarantee the proper functioning of a quantum device that has been purchased from an external company? To his eyes, the device will merely look like a black box. Even if the customer holds a PhD in quantum science, the issue will remain fundamentally cumbersome because of the impossibility to fully control, i.e. monitor, all the physical processes occurring in any quantum experiment. Furthermore, the situation turns even more dramatic when considering adversarial applications, where a malicious eavesdropper could break the devices to manipulate their internal working, turning the protocol insecure and hence irrelevant as well. Therefore, it is the purpose of this Thesis to contribute to the experimental development of quantum information protocols with uncharacterized devices, namely, device-independent quantum information protocols. These protocols are naturally immune to any attack or failure related to mismatches between protocol theory and its actual implementation. This is achieved throughout the different Chapters by pursuing the following three overlapping duties: (i) To broaden theoretic capabilities by establishing a richer understanding of relevant fundamental resources lying at the basis of the theory of quantum information with uncharacterized devices. (ii) To develop competitive quantum information protocols by finding an adequate trade-off between high-performance and practicability; between the power of the device-independent framework and its less demanding, so-called semi-device-independent, relaxations. (iii) To analyze and improve experimental conditions of diverse physical setups in order to carry out implementations in proof-of-principle experiments demonstrating quantum information protocols with black boxes. Our objective of turning the theory of quantum information into a graspable technology for our society through the development and implementation of protocols based on the minimalist, user-friendly, black-box paradigm contributes not only to the technological development of these protocols, but it also offers valuable insights on more fundamental aspects of quantum theory. In this sense, we contribute to the characterization and quantification of entanglement -the pivotal quantum resource at the basis of most testable phenomena without classical account- in scenarios of practical interest where uncharacterized devices are used. From the more applied perspective, we contribute to the development of two specific information tasks: the certification of genuinely random numbers in device-independent and semi-device-independent scenarios, and the generation of a shared secret key among two parties in a full device-independent manner.De acuerdo con estimaciones recientes, 10^18 bytes de datos se generan diariamente alrededor del mundo. Nuestra sociedad necesita urgentemente soluciones efectivas para lidiar con este diluvio de datos. Utilizando elementos fundamentales de la teoría cuántica -la teoría más explorada de la física moderna, posiblemente- la información cuántica está revolucionando la forma en la que adquirimos, procesamos, almacenamos y transmitimos información. En plena era de la información, el sector industrial reconoce cada vez más el potencial de las tecnologías cuánticas, y a su vez nuevos desarrollos en el procesamiento de la información cuántica continúan impulsando descubrimientos prominentes relacionados con aspectos científcos de carácter más fundamental. Existen varios programas de investigación alrededor del mundo desarrollando y comercializando tecnologías cuánticas, principalmente para aplicaciones de criptografía y generación de números aleatorios. Así, las limitaciones que hoy nos separan de la era de la información cuántica están siendo gradualmente superadas. Sin embargo, existe un problema fundamental que aún necesita ser enfrentado: la imposibilidad de saber lo que realmente sucede en un experimento cuántico, debido a sus dimensiones de tamaño atómico. En efecto, ¿cómo podrá un usuario garantizar el funcionamiento adecuado de un dispositivo cuántico que ha sido adquirido a través de una compañía externa? A sus ojos el dispositivo será una verdadera caja negra. Incluso si el usuario contara con un Doctorado en ciencia cuántica, el problema prevalecería insoluble debido a la imposibilidad de controlar a la perfección, es decir monitorear, todos los procesos físicos que ocurren en cualquier experimento cuántico. Además, la situación se vuelve aún más dramática si se piensa en aplicaciones en donde un agente maligno pudiese hackear los dispositivos y manipular su funcionamiento interno, volviendo así el protocolo en cuestión inseguro y por ende también irrelevante. El propósito de esta Tesis es entonces contribuir al desarrollo experimental de protocolos de información cuántica con dispositivos sin caracterizar, llamados "device-independent". Estos protocolos son, por naturaleza, immunes a cualquier ataque o falla relacionada con desajustes entre la teoría y la implementación del protocolo. Esto se logra a lo largo de los diferentes Capítulos prosiguiendo las siguientes tres tareas que en ocasiones se traslapan: (i) Ampliar las capacidades teóricas estableciendo un entendimiento mayor de los recursos fundamentales de la teoría de la información cuántica con dispositivos sin caracterizar. (ii) Desarrollar protocolos de información cuántica competitivos, encontrando un intercambio adecuado entre alto rendimiento y practicabilidad; entre el poder del marco de trabajo device-independent y sus menos demandantes versiones, dichas "semi-device-independent". (iii) Analizar y mejorar las condiciones experimentales de diversas plataformas para llevar a cabo implementaciones en experimentos de prueba de principio, demostrando la realización de protocolos de información cuántica con cajas negras. Nuestro objetivo de convertir la teoría de la información cuántica en una tecnología tangible para nuestra sociedad a través del uso de dispositivos sin caracterizar contribuye no solamente al desarrollo tecnológico de estos protocolos, sino que también ofrece una visión valiosa de aspectos más fundamental. En este sentido, contribuimos a la caracterización y cuantificación del entrelazamiento -el recurso cuántico fundamental de muchos fenómenos sin contraparte clásica- en escenarios de interés práctico en dónde se consideran dispositivos sin caracterizar. Desde la perspectiva más aplicada, contribuimos al desarrollo de dos tareas específicas: la certificación de números genuinamente aleatorios en escenarios device-independent y semi-device-independent, y la generación de una llave secreta entre dos partes de manera device-independent

    Quantum information with black boxes : lifting protocols from theory to implementation

    Get PDF
    According to recent estimates, 10^18 bytes of data are generated on a daily basis around the globe. Our information society urges for radical solutions to treat such data deluge. By exploiting fundamental key elements of quantum theory -arguably the most probed theory of modern physics- quantum information science is nowadays revolutionizing the way in which we acquire, process, store and transmit information. In the midst of the information era, the potential of quantum technologies is being recognized by the industry sector, and in turn, new capabilities for quantum information processing keep driving exciting discoveries related to more fundamental aspects of science. There are several research programs all around the world fostering the development and commercialization of quantum technologies, mostly for cryptographic and randomness generation duties. Thus, the technological limitations that today step us aside from the quantum information era are gradually being overcome. But there is a fundamental issue that still needs to be faced: the impossibility to know what is really going on in quantum experiments, due to their atomic-scale dimensions. Indeed, how will an average user guarantee the proper functioning of a quantum device that has been purchased from an external company? To his eyes, the device will merely look like a black box. Even if the customer holds a PhD in quantum science, the issue will remain fundamentally cumbersome because of the impossibility to fully control, i.e. monitor, all the physical processes occurring in any quantum experiment. Furthermore, the situation turns even more dramatic when considering adversarial applications, where a malicious eavesdropper could break the devices to manipulate their internal working, turning the protocol insecure and hence irrelevant as well. Therefore, it is the purpose of this Thesis to contribute to the experimental development of quantum information protocols with uncharacterized devices, namely, device-independent quantum information protocols. These protocols are naturally immune to any attack or failure related to mismatches between protocol theory and its actual implementation. This is achieved throughout the different Chapters by pursuing the following three overlapping duties: (i) To broaden theoretic capabilities by establishing a richer understanding of relevant fundamental resources lying at the basis of the theory of quantum information with uncharacterized devices. (ii) To develop competitive quantum information protocols by finding an adequate trade-off between high-performance and practicability; between the power of the device-independent framework and its less demanding, so-called semi-device-independent, relaxations. (iii) To analyze and improve experimental conditions of diverse physical setups in order to carry out implementations in proof-of-principle experiments demonstrating quantum information protocols with black boxes. Our objective of turning the theory of quantum information into a graspable technology for our society through the development and implementation of protocols based on the minimalist, user-friendly, black-box paradigm contributes not only to the technological development of these protocols, but it also offers valuable insights on more fundamental aspects of quantum theory. In this sense, we contribute to the characterization and quantification of entanglement -the pivotal quantum resource at the basis of most testable phenomena without classical account- in scenarios of practical interest where uncharacterized devices are used. From the more applied perspective, we contribute to the development of two specific information tasks: the certification of genuinely random numbers in device-independent and semi-device-independent scenarios, and the generation of a shared secret key among two parties in a full device-independent manner.De acuerdo con estimaciones recientes, 10^18 bytes de datos se generan diariamente alrededor del mundo. Nuestra sociedad necesita urgentemente soluciones efectivas para lidiar con este diluvio de datos. Utilizando elementos fundamentales de la teoría cuántica -la teoría más explorada de la física moderna, posiblemente- la información cuántica está revolucionando la forma en la que adquirimos, procesamos, almacenamos y transmitimos información. En plena era de la información, el sector industrial reconoce cada vez más el potencial de las tecnologías cuánticas, y a su vez nuevos desarrollos en el procesamiento de la información cuántica continúan impulsando descubrimientos prominentes relacionados con aspectos científcos de carácter más fundamental. Existen varios programas de investigación alrededor del mundo desarrollando y comercializando tecnologías cuánticas, principalmente para aplicaciones de criptografía y generación de números aleatorios. Así, las limitaciones que hoy nos separan de la era de la información cuántica están siendo gradualmente superadas. Sin embargo, existe un problema fundamental que aún necesita ser enfrentado: la imposibilidad de saber lo que realmente sucede en un experimento cuántico, debido a sus dimensiones de tamaño atómico. En efecto, ¿cómo podrá un usuario garantizar el funcionamiento adecuado de un dispositivo cuántico que ha sido adquirido a través de una compañía externa? A sus ojos el dispositivo será una verdadera caja negra. Incluso si el usuario contara con un Doctorado en ciencia cuántica, el problema prevalecería insoluble debido a la imposibilidad de controlar a la perfección, es decir monitorear, todos los procesos físicos que ocurren en cualquier experimento cuántico. Además, la situación se vuelve aún más dramática si se piensa en aplicaciones en donde un agente maligno pudiese hackear los dispositivos y manipular su funcionamiento interno, volviendo así el protocolo en cuestión inseguro y por ende también irrelevante. El propósito de esta Tesis es entonces contribuir al desarrollo experimental de protocolos de información cuántica con dispositivos sin caracterizar, llamados "device-independent". Estos protocolos son, por naturaleza, immunes a cualquier ataque o falla relacionada con desajustes entre la teoría y la implementación del protocolo. Esto se logra a lo largo de los diferentes Capítulos prosiguiendo las siguientes tres tareas que en ocasiones se traslapan: (i) Ampliar las capacidades teóricas estableciendo un entendimiento mayor de los recursos fundamentales de la teoría de la información cuántica con dispositivos sin caracterizar. (ii) Desarrollar protocolos de información cuántica competitivos, encontrando un intercambio adecuado entre alto rendimiento y practicabilidad; entre el poder del marco de trabajo device-independent y sus menos demandantes versiones, dichas "semi-device-independent". (iii) Analizar y mejorar las condiciones experimentales de diversas plataformas para llevar a cabo implementaciones en experimentos de prueba de principio, demostrando la realización de protocolos de información cuántica con cajas negras. Nuestro objetivo de convertir la teoría de la información cuántica en una tecnología tangible para nuestra sociedad a través del uso de dispositivos sin caracterizar contribuye no solamente al desarrollo tecnológico de estos protocolos, sino que también ofrece una visión valiosa de aspectos más fundamental. En este sentido, contribuimos a la caracterización y cuantificación del entrelazamiento -el recurso cuántico fundamental de muchos fenómenos sin contraparte clásica- en escenarios de interés práctico en dónde se consideran dispositivos sin caracterizar. Desde la perspectiva más aplicada, contribuimos al desarrollo de dos tareas específicas: la certificación de números genuinamente aleatorios en escenarios device-independent y semi-device-independent, y la generación de una llave secreta entre dos partes de manera device-independent.Postprint (published version

    Bell Nonlocality

    Get PDF
    Nonlocality was discovered by John Bell in 1964, in the context of the debates about quantum theory, but is a phenomenon that can be studied in its own right. Its observation proves that measurements are not revealing pre-determined values, falsifying the idea of “local hidden variables” suggested by Einstein and others. One is then forced to make some radical choice: either nature is intrinsically statistical and individual events are unspeakable, or our familiar space-time cannot be the setting for the whole of physics. As phenomena, nonlocality and its consequences will have to be predicted by any future theory, and may possibly play the role of foundational principles in these developments. But nonlocality has found a role in applied physics too: it can be used for “device-independent” certification of the correct functioning of random number generators and other devices. After a self-contained introduction to the topic, this monograph on nonlocality presents the main tools and results following a logical, rather than a chronological, order

    A domain-specific language and matrix-free stencil code for investigating electronic properties of Dirac and topological materials

    Full text link
    We introduce PVSC-DTM (Parallel Vectorized Stencil Code for Dirac and Topological Materials), a library and code generator based on a domain-specific language tailored to implement the specific stencil-like algorithms that can describe Dirac and topological materials such as graphene and topological insulators in a matrix-free way. The generated hybrid-parallel (MPI+OpenMP) code is fully vectorized using Single Instruction Multiple Data (SIMD) extensions. It is significantly faster than matrix-based approaches on the node level and performs in accordance with the roofline model. We demonstrate the chip-level performance and distributed-memory scalability of basic building blocks such as sparse matrix-(multiple-) vector multiplication on modern multicore CPUs. As an application example, we use the PVSC-DTM scheme to (i) explore the scattering of a Dirac wave on an array of gate-defined quantum dots, to (ii) calculate a bunch of interior eigenvalues for strong topological insulators, and to (iii) discuss the photoemission spectra of a disordered Weyl semimetal.Comment: 16 pages, 2 tables, 11 figure
    corecore