scholarly journals Logic of Representation and Information

Author(s):  
Subhash Kak

<p>Classical reality is described in terms of objects and things and their mutual relationships. On the other hand, in the case of quantum reality, the collapse of the state in an interaction assigns a unique position to the observer. These two disparate views are based on different logics of representation. In this paper, we first summarize the early evolution of these ideas and then go beyond the implicit dependence of the quantum theory framework on the mathematical apparatus of calculus and vector spaces, by delving one layer deeper to an information-theoretic understanding of symbol representation. We examine some epistemic implications of the fact that, mathematically, <i>e</i>-symbol representation is optimal and 3 symbols are more efficient that 2 symbols, and this optimality leads to the idea that space itself is <i>e</i>-dimensional, and not 3-dimensional. We also discuss the principle of veiled nonlocality as a way to understand the split between the observer and the physical process. </p>

2021 ◽  
Author(s):  
Subhash Kak

<p>Classical reality is described in terms of objects and things and their mutual relationships. On the other hand, in the case of quantum reality, the collapse of the state in an interaction assigns a unique position to the observer. These two disparate views are based on different logics of representation. In this paper, we first summarize the early evolution of these ideas and then go beyond the implicit dependence of the quantum theory framework on the mathematical apparatus of calculus and vector spaces, by delving one layer deeper to an information-theoretic understanding of symbol representation. We examine some epistemic implications of the fact that, mathematically, <i>e</i>-symbol representation is optimal and 3 symbols are more efficient that 2 symbols, and this optimality leads to the idea that space itself is <i>e</i>-dimensional, and not 3-dimensional. We also discuss the principle of veiled nonlocality as a way to understand the split between the observer and the physical process. </p>


Author(s):  
Amos Golan

In this chapter I provide additional rationalization for using the info-metrics framework. This time the justifications are in terms of the statistical, mathematical, and information-theoretic properties of the formalism. Specifically, in this chapter I discuss optimality, statistical and computational efficiency, sufficiency, the concentration theorem, the conditional limit theorem, and the concept of information compression. These properties, together with the other properties and measures developed in earlier chapters, provide logical, mathematical, and statistical justifications for employing the info-metrics framework.


Author(s):  
Z. Bay ◽  
P. S. Farago

SynopsisAfter the detection of correlations in two coherent light beams by Hanbury Brown and Twiss, objections were raised by Brannen and Ferguson on the basis of the experiments of Adam, Janossy and Varga and their own experiments in which no correlations were detected. It is pointed out here that the different groups were looking for two entirely different effects, one being quadratic, the other one linear in the number of photons involved; the quadratic effect (discovered by Hanbury Brown and Twiss) is in agreement with quantum theory while the linear effect is not. It was shown by Purcell and by Hanbury Brown and Twiss that the choice of parameters in the experiments which gave negative results was inadequate to show the quadratic effect. It is shown in this paper that their experiments were also inadequate to decide between the existence or nonexistence of the linear effect.


2014 ◽  
Vol 14 (7&8) ◽  
pp. 589-607
Author(s):  
Xiu-Bo Chen ◽  
Gang Xu ◽  
Yuan Su ◽  
Yi-Xian Yang

In this paper, the perfect secret sharing in quantum cryptography is investigated. On one hand, the security of a recent protocol [Adhikari et al. Quantum Inform. \& Comput. 12 (2012) 0253-0261] is re-examined. We find that it violates the requirement of information theoretic security in the secret sharing and suffers from the information leakage. The cryptanalysis including several specific attack strategies are given, which shows that a dishonest participant can steal half or all of the secrets without being detected. On the other hand, we design a new quantum secret sharing protocol. The security of protocol is rigorously proved. It meets the fundamental requirement of information theoretic security. Furthermore, the security analysis including both the outside attacks and participant attacks is given in details. It is shown that our proposed protocol can achieve perfect secret sharing.


Axiomathes ◽  
2016 ◽  
Vol 26 (3) ◽  
pp. 313-328 ◽  
Author(s):  
Harald Walach ◽  
Patrizio Tressoldi ◽  
Luciano Pederzoli

Author(s):  
Songtao Wang ◽  
Gang Cheng ◽  
Jianhua Yang ◽  
Xihui Chen

For a parallel hip joint manipulator, the unified kinematics and stiffness model are established based on a novel unified theory, and then the bifurcation and stability are analyzed under the same unified theory framework. In bifurcation analysis, a chaos method is first applied to solve the non-linear bifurcation equations in order to get the full configuration of the parallel hip joint manipulator, which improves the convergence rate and accuracy. Based on the full-configuration solution, the single-parameter and double-parameter simulation for the bifurcation and stability of the parallel hip joint manipulator is performed. The bifurcation simulation results show that the configuration only changes along the corresponding path but cannot change to other paths when the configuration of the parallel hip joint manipulator is at a certain path. The stability simulation results show that when the parallel hip joint manipulator enters into an uncontrolled domain of a bifurcation posture along different paths, the posture component which changes dramatically will lose control first, and the other posture components will move along the changed configuration. In this paper, the kinematics, stiffness, bifurcation and stability of the parallel hip joint manipulator are solved under the same theory framework, which improves the solving efficiency and enriches the mechanical theory for the parallel manipulators.


Author(s):  
Wendy Lipworth

Using an institutional theory framework, this chapter discusses the place of the pharmaceutical industry within the health care organizational field, and the wide-ranging effects the industry has on the other organizations in the field. It then provides a snapshot of the discourse that has emerged about the pharmaceutical industry, and about commercialization and marketization of the health care more generally. This paints a picture of deep ambivalence toward the pharmaceutical industry, both within and between stakeholder groups. The chapter ends with an effort to explain this ambivalence as the effect of competing institutional logics. This, in turn, points to some suggestions as to how the pharmaceutical industry might be better accommodated within the health care organizational field, without losing sight of the need for ongoing critique of industry behavior.


2020 ◽  
Vol 6 (37) ◽  
pp. eaaz4487 ◽  
Author(s):  
Margarida Pereira ◽  
Go Kato ◽  
Akihiro Mizutani ◽  
Marcos Curty ◽  
Kiyoshi Tamaki

In theory, quantum key distribution (QKD) offers information-theoretic security. In practice, however, it does not due to the discrepancies between the assumptions used in the security proofs and the behavior of the real apparatuses. Recent years have witnessed a tremendous effort to fill the gap, but the treatment of correlations among pulses has remained a major elusive problem. Here, we close this gap by introducing a simple yet general method to prove the security of QKD with arbitrarily long-range pulse correlations. Our method is compatible with those security proofs that accommodate all the other typical device imperfections, thus paving the way toward achieving implementation security in QKD with arbitrary flawed devices. Moreover, we introduce a new framework for security proofs, which we call the reference technique. This framework includes existing security proofs as special cases, and it can be widely applied to a number of QKD protocols.


1994 ◽  
Vol 72 (3-4) ◽  
pp. 130-133
Author(s):  
Paul B. Slater

Guiasu employed a statistical estimation principle to derive time-independent Schrödinger equations for the position but, as is usual, not the spin of a particle. Here, on the other hand, this principle is used to obtain Schrödinger-like equations for the spin but not the position of a particle. Steady states are described by continuous probability distributions, obtained by information-theoretic arguments, over spin measurements, states, and wave functions. These distributions serve as weight functions for orthogonal polynomials. Associated "wave functions," products of the polynomials and the square root of the weight function, satisfy differential equations, reducing to time-independent Schrödinger form at the point corresponding to the fully mixed spin-1/2 state.


Author(s):  
Jingjun Lou ◽  
Shijian Zhu

In contrast to the unilateral claim in some papers that a positive Lyapunov exponent means chaos, it was claimed in this paper that this is just one of the three conditions that Lyapunov exponent should satisfy in a dissipative dynamical system when the chaotic motion appears. The other two conditions, any continuous dynamical system without a fixed point has at least one zero exponent, and any dissipative dynamical system has at least one negative exponent and the sum of all of the 1-dimensional Lyapunov exponents id negative, are also discussed. In order to verify the conclusion, a MATLAB scheme was developed for the computation of the 1-dimensional and 3-dimensional Lyapunov exponents of the Duffing system with square and cubic nonlinearity.


Sign in / Sign up

Export Citation Format

Share Document