August 26, :27 WSPC/INSTRUCTION FILE ws-ijmpcbellcomputerref 2 CHSH AND A SIMPLE VIOLATING PROGRAM BASED ON LOCALITY.

Size: px
Start display at page:

Download "August 26, :27 WSPC/INSTRUCTION FILE ws-ijmpcbellcomputerref 2 CHSH AND A SIMPLE VIOLATING PROGRAM BASED ON LOCALITY."

Transcription

1 International Journal of Modern Physics C c World Scientific Publishing Company CHSH AND A SIMPLE VIOLATING PROGRAM BASED ON LOCALITY. HAN GEURDES CvdLijnstraat 164 The Hague, 2593NN, Netherlands han.geurdes@gmail.com Received 19 August 2013 In the present paper a simple computer code shows CHSH can be violated with strict LHV. Subject Classification: PACS 3.65 Keywords: CHSH & computer code violating the CHSH. 1. Introduction. Einstein never fully agreed with the foundational nature of quantum mechanics [1]. He wanted to explain a.o. Heisenberg s uncertainty and the correlation between particles with additional local hidden variables unknown to physics. In 1964, John Bell [2] reformulated Einstein s idea of local hidden variables (LHVs) into a form that allowed experimental research. Bell s probabilistic nature of the argument turned experimentation into checking of violation of inequalities [3], [4]. Especially strong is the claim that it is impossible with local means to violate the CHSH inequality even if the history of the system may be included [6]. We demonstrate in the present paper that a simple code exists such that this violation is possible. 2. Computer code Preliminaries. CHSH no-go conclusions are tested with the attempt to construct a computer program that shows a small but significant violation of the CHSH contrast. In the construction of the code use is made of simple LHV principles. The program employs the following expression of the CHSH contrast CHSH = 2 + 2N(= 1, 1) N(1, 1) 2N(= 1, 2) N(1, 2) 2N(= 2, 1) N(2, 1) 2N(= 2, 2) N(2, 2) (1) 1

2 2 Han Geurdes Here we have CHSH = Ê(1, 1) Ê(1, 2) Ê(2, 1) Ê(2, 2) and Ê(a, b) = N(= a, b) N( a, b) N(a, b) In the ideal experiment N(a, b) = N(= a, b) + N( a, b). Let us start the explanation of the code with the following remarks. The response in one measurement at A and B is denoted with S A and S B. At first instance let us take S B (b) = 1 and (P-a.s. = P almost sure) a = 1 S A (a) = 1, P a.s. a = 2 S A (a) = 1, P a.s. This leads to N(= 1, 1) = 0, N(= 2, 1) = N(2, 1), N(= 1, 2) = 0 and also N(= 2, 2) = N(2, 2). Hence, CHSH = 2 with obvious local means. In order to have sufficient random outcomes the source Σ sends out randomly selected numbers, r i { 1, 1} per trial i such that (S A, S B ) i r i (S A, S B ). For the construction of the algorithm this random multiplier r i is unimportant. (2) 2.2. Slack to violate. The general concept of the the program is to have a split somewhere in the trial number series and change strategy. In a half number of the total number of trials, the focus lies mainly on getting the CHSH = 2. In the other half, the second in the example program, a compensation for rigidity i.e. the slack in the algorithm is introduced. In the program we randomize 4N = setting pairs. The randomization is performed on N(1, 1) = N, N(1, 2) = N, N(2, 1) = N, N(2, 2) = N generated setting pairs (a, b). We have N = Subsequently we may note that the source Σ in Gill s supermartingale treatment [6] is allowed to have complete knowledge of the past. That implies, if we are in the i-th trial, i = 2,..., 4N, the source Σ is allowed to use N i 1 (= a, b), i.e. the count of equal spin measurements up until and including the i 1 trial for setting pair (a, b) {(1, 1), (1, 2), (2, 1), (2, 2)}. Note that we can also use the information N i 1 (= a, b) at the i-th trial in A and B but the explanation is conceptually somewhat more easy when the information is projected in the source Σ. In Σ the factor p = N i 1(= 1, 2) + 1 N i 1 (= 2, 2) + 1 is employed. In the computer simulation dp = 0.01 and the scan starts at p = 0.4 and ends at p = 0.8. In the code p is denoted P grens. We have (N max = 4N) for the first N max /2 number of trials, per selected p, that ɛ = p. For the remaining trials ɛ = 2. In case t i = 1 then S(b) is redefined. In the computer code we have replaced t i = 1 by a false Boolean. In the program code we have blselect for Boolean. The (3)

3 CHSH and violation with LHV computer program. 3 redefinition works as follows. Suppose ( ) i < Nmax 2 here i < then ɛ = p, if not then ɛ = 2. Under the condition that p from (3) such that p > p we, for i = 2,..., N max, see the following ( ) if η 3 = (Nmax/4) N i 1(= 1,2) (N max/4) < ɛ then t i = 1 else ( ) t i = 1 The first line in the rule (*) is there to minimize the N i 1 (= 1, 2) overshoot in relation to the N i 1 (= 2, 2) when ɛ < 1. If p p in trial i we have t i = 1, i.e. the Boolean is false. This part of the complete code in the appendix is given for reference:... If (n(1, 2) + 1) / (n(2, 2) + 1) > P grens T hen If eta3 < eps T hen blselect = T rue t i = 1 blselect = F alse t i = 1 blselect = F alse t i = 1... The n(a, b) represent the N j (= a, b) in the j-the trial, η 3 and ɛ are obviously translated in the code. When η 3 < ɛ then in case ɛ = p we can conclude that apparently N i 1 (= 1, 2) is close to N max /4. Considering the change in S B (b) response it follows that if t i = 1 then S B (b) = 1 for b {1, 2} else S B (2) = 1 & S B (1) = 1 In that scan, viewed over a number of experiments, i.e. different (a, b) distributions, the best violation found so far is CHSH = The worst value was CHSH = Measured in standard deviations the CHSH violation result is, seen over experiments, in m 40, p-scans per experiment, roughly 2 standard deviations away from 2. In Figure-1, a series of results with the computer program, given in the code section below, is presented. The computer code is an essential part of the paper. In order to demonstrate that the CHSH violation with the code can be improved, the following adaptation was introduced. In the first place we inspected the N max /4 approximation of pair (2, 2) with the use of (Nmax/4) Ni 1(= 2,2) (N max/4). Secondly, the code

4 4 Han Geurdes presented in (*) was adapted to if η 3 = if η 2 = t i = 1 else t i = 1 endif else t i = 1 endif ( (Nmax/4) N i 1(= 1,2) ( (N max/4) (Nmax/4) N i 1(= 2,2) (N max/4) ) < ɛ then ) < ɛ 1.5 then ( ) The use of endif is to aid the readability of the pseudocode. Of course, the rule if t i = 1 then S B (b) = 1 for b {1, 2} else S B (2) = 1 & S B (1) = 1 follows rule (**) in the same way as in the case of rule (*). As an addition to the present computation we studied N max = Step size is dp = 10 4 and the scan was from p = to In Figure-3 we can observe a relatively steep fall in CHSH, (1). This computation is only an indication to see a possible increase along the lines of this algorithm. The result of the more fine grained scan with p from 0.78 to 0.8 with dp = is presented in Figure-2. The number of computations increases dramatically with smaller dp and the rule in (**). That is why this type of fine grained scanning is run after possible identification of interesting sections in a more coarse first p scan. A run with N max = 10 6 and p from to with dp = and (*) replaced with (**) is given in Figure Scavenging ahead Algorithm A separate tactics shows that the code can even be improved to the order CHSH = The principle of this separate piece of coding is based on the fact that the scanning on p can be extended with a scanning to search for optimal scavenging violating photon pair equivalents. Let us note that the overshoot of photon pair equivalents is expressed in N(= 1, 2) + N(= 2, 2) ζ = ) (4) ( Nmax 4 The Napier logarithm of ζ will not be positve nonzero when N(= 1, 2) + N(= 2, 2) ( N max ) 4 but will be positive otherwise. The optimization scavenging of photon equivalent pair measurements will take place after log(ζ) > 0 occurred. The B measurement instrument will, in case b = 2 scan ahead two setting possibilities

5 CHSH and violation with LHV computer program. 5 in over eight possible array values of S b i.e. the tripples in the set T T = {(1, 1, 1), ( 1, 1, 1), (1, 1, 1), (1, 1, 1), (1, 1, 1), ( 1, 1, 1), (1, 1, 1), ( 1, 1, 1)} (5) The history is condensed in 8 array values at the i-th trial log(ζ j ) for j = 1, 2,.., 8. Before the (i + 3)-th trial starts an (S B,i, S B,(i+1), S B,(i+2) ) triple is selected from T under the condition b = 2. Now because all N k (= 1, 2) and N k (= 2, 2) data, k < i + 3, is known to B on the (i + 3)-th trial, the eightfold array with each possiblity for (S B,i, S B,(i+1), S B,(i+2) ) T is also known to B. If, for b = 2 only, the triple (S B,i, S B,(i+1), S B,(i+2) ) is used that has a maximal log(ζ j ) for j = 1, 2,.., 8 then the CHSH can reach the order of 2.04 with the present computer code. The drawback of this method is that the B waits two photon equivalent pairs before providing the maximal log(ζ) triple to be archived as measurement. The priniciple in Gill s method that B immediately produces the S B (b) appears violated on first sight in the linear not- parallel running computer program that we had to employ. However, the change from log(ζ) 0 to log(ζ) > 0 occurs somewhere around i = in our example case of N max = If we interpret the scanning for the optimal p parameter as simple parallel processing, the scavenging for optimal residual photon pair equivalents after log(ζ) > 0 can run parallel for the residual i = trials while the first i = is running for a maximal violating p. So with in principle classical computing running parallel the first trials run for maximal violating p while the is running parallel classically with the previous scavenging algorithm. In the optimum situation the maximal violating sequence of S B (b) is presented and archived for registration exactly as Gill prescribes in [6]. The variations discussed in the next section work however, without the scavenging residual algorithm disussed above. Results are provided in Figure Conclusion & Discussion In the present paper it was demonstrated that there is a numerical loophole in the no-go conclusions of CHSH. This conclusion is based on a simple computer code that uses a one-parameter optimization scan. The physical picture that can be imagined behind the optimization is the following. Nature uses parallel computing to find the optimal violating p parameter and then presents the optimal plus and minus outcomes in A and B. The code does not meet the Randi challenge requirement because the random distributed pairs of settings must be known first in order to find the maximal violating p parameter. The reason is that the results are tested with one thread non parallel computing. However, as one can clearly verify, the code only uses local principles to arrive at the result and shows that CHSH is not a reliable criterium irrespective of the necessary scanning to find the optimal parameter. If CHSH was waterproof and the supermartingale proof of Gill [6] was valid then this simple computer model would be impossible. This means no program

6 6 Han Geurdes based on local principles would give CHSH < 2. Additional arguments against Gill s supermartingale no-go can be found in [7]. The reader should note that mathematically CHSH 2. This is a strict claim for all LHV models. Finding with a computer simulation LHV models that numerically show CHSH > 2, simply refutes the for all part of the CHSH no-go claim and therewith rejects CHSH as a reliable means to claim no-go for LHV. The program is lagrely mechanical (with a slight probability to deviate: i.e. P-a.s). This concurs with previous work of the author [5] although some believe that the argument in [5] is still incomplete a. Because the results in the present computer simulation is simply based on countings as in an ordinary experiment the violation with LHV principles shows that the strict theoretical claim CHSH 2 can at its least be questioned because the probability density, ρ(λ) 0 that Bell uses gives dλ ρ(λ) = 1. Critics of λ Λ the violation conclusion can only avoid abandoning CHSH by increasing the γ in CHSH γ from 2 to 2 + δγ without a physics theory to support the δγ > 0 increase. We also note that the computer program is based on simple counting principles such as are found in experiment. The program is mechanistic. The usual statistical explaining away of the present result clearly ignores that. As an important final remark we would like to stress that the rejection of the use of history in the scanning for optimal parameter must be founded in physical theory not in statistical concepts. For after all, if we just gamble on the optimal parameter, there is a nonzero but small probability to get it right for just one step of a scan. The same argument goes for the optimal scavenfing algorithm introduced for the residual or final trials. The results of this algorithm are provided in Figure-4. In Figure-5 the numerical proof is given for an increase in amount of violation without scavenging algorithm. The parallel computing option takes away all the scanning effort but maintains classical local hidden variables. The no-scavenging present deepened algorithm arrives at approximately 320 to 340 photon pairs overshoot in case CHSH = to CHSH = violation. In numbers: we have roughly N(= 1, 2) + N(= 2, 2) (N max /4) 320 in N max = 10 5 trials and maintain N(= 1, 1) close to 0 while N(= 2, 1) is very close to N max /4. Figure-5 shows the minimum that was attained here. Moreover, Figure-6 shows with a different configuration of setting distributed over N max trials that CHSH = can be attained independently of that distribution. Another interesting observation is that introducing the following snippet in equation (6) into the code presented in the section below, the order N(= 1, 2) > N(= 2, 2) was changed in N(= 1, 2) < N(= 2, 2) in the violation CHSH > 2. This implies that the hidden structure that is expressed in the program code enables to redirect violating photon pair equivalents from N(= 1, 2) to N(= 2, 2) and adds to the a The counter arguments to [5] will be dealt with elsewhere.

7 CHSH and violation with LHV computer program. 7 power of LHV explanation with the code given in the appendix. If blselect T hen Sb = 1 If b = 1 T hen Sb = 1 If b = 2 T hen If ((n(1, 2) + n(2, 2))/(Nmax/4) ((Nmax/4)/Ncnt) 0) T hen Sb = 1 Sb = 1 (6) In addition it is noted that the history of the countings, i.e. employing N i 1 (= a, b) at trial i are only employed to scan for the proper parameters in the program. We claim that if parallel computing in nature occurs then the scanning-with-history such as employed in the present program is not essential. This is also true for a parallel scavenging ahead algorithm. Moreover, De Raedt, Jin and Michielsen employed the possibility of memory, i.e. the use of history, in neutron interferometry with good result [8]. In our program the history is employed more strategically to find a parameter and less in a fundamental sense such as in [8]. In passing we note that Gill s supermartingale argument [6] against CHSH is only refuted in a weak sense. The code does not produce CHSH > However, we showed that with more fine grained scanning and a change in rule from (*) to (**) the amount of violating the CHSH 2 can be improved. We employed N(= 2, 2) in rule (**) and a smaller dp in a scan of p from 0.78 to The differences in (a, b) distributions does not affect the outcome of the violation and when parallel computing is supposed instead of scanning, the order effect in the scanning, i.e. in one distribution the optimal p is found at p 1 while for another it is found at p 2 and p 1 p 1 is no longer of any importance to the optimization of the S B (b) outcome. We finally note that several kinds of improvements can be considered to get a better violation in one thread non-parallel computing to restrict the scanning effort. Parallel computing takes away the objection to know the (a, b) ditribution beforehand. Note that for e.g. the initial p = 0.4 the (a, b) distribution is unknown and random. Only when single thread computing is needed, the p = 0.41 (when e.g. dp = 0.01), runs through an known sequence of (a, b). If however, p = 0.4 runs in one thread and p = 0.41 parallel in another, the (a, b) is new and random to both threads. Note that, as already claimed, the use of history N k (= a, b) and k i 1 at the i-th trial, cannot be rejected on physical grounds. For k = 2, 3,..., N max we

8 8 Han Geurdes have N k (= a, b) N max /4. Parallel processing of different types of history would also be the solution to avoid having to use the history of measurement results such as in Gill s supermartingale restriction [6]. Most likely, if there are LHVs they express themselves in parallel processing for, both, optimal parameter scanning p and history N k (= a, b), for k = 2, 3,...N max. Appendix A. VBA Code The code was written in VBA for excel and is presented in the subsection below. Option Explicit Sub BellAgainM odoutdoors() Dim Sa, Sb As Integer Dim eta1, eta2, eta3, eps As Double Dim i, j, k, l As Long Dim a, b As Integer Dim n(2, 2), m(2, 2) As Long Dim CHSH As Double Dim Ncnt As Long Dim blselect As Boolean Const N max As Long = Dim P grens, dp, P max As Double If MsgBox( Rerandomize Settings?, vby esno) = vby es T hen Call Settings(1, 1, 1, N max/4) Call Settings(1, 2, (N max/4) + 1, N max/2) Call Settings(2, 1, (N max/2) + 1, 3 N max/4) Call Settings(2, 2, (3 Nmax/4) + 1, Nmax) Call Rerandomize(N max) Call Rerandomize(N max) Call Rerandomize(N max) P grens = 0.4 P max = 0.8 dp = 0.01 P grens = P grens dp j = 0 If P max < P grens T hen GoT o eind Do Until P grens > P max n(1, 1) = 0 : n(1, 2) = 0 : n(2, 1) = 0 : n(2, 2) = 0 m(1, 1) = 0 : m(1, 2) = 0 : m(2, 1) = 0 : m(2, 2) = 0 Ncnt = 0

9 CHSH and violation with LHV computer program. 9 Do Until Ncnt > Nmax Ncnt = Ncnt + 1 a = AcceptSetting(N cnt, 1) b = AcceptSetting(N cnt, 2) m(a, b) = m(a, b) + 1 eta3 = ((Nmax / 4) n(1, 2)) / (Nmax / 4) If Ncnt < (Nmax / 2) T hen eps = P grens eps = 2 If (n(1, 2) + 1) / (n(2, 2) + 1) > P grens T hen If eta3 < eps T hen blselect = T rue blselect = F alse blselect = F alse If blselect T hen Sb = 1 If b = 2 T hen Sb = 1 Sb = 1 Sa = f nresponse(a) If Sa = Sb T hen n(a, b) = n(a, b) + 1 Loop CHSH = ((2 n(1, 1) / m(1, 1)) 1) ((2 n(1, 2) / m(1, 2)) 1) ((2 n(2, 1) / m(2, 1)) 1) ((2 n(2, 2) / m(2, 2)) 1)

10 10 Han Geurdes W orksheets( Sheet1 ).Activate j = j + 1 Cells(j, 1) = CHSH Cells(j, 2) = P grens Cells(1, 3) = n(1, 1) : Cells(1, 4) = n(1, 2) : Cells(2, 3) = n(2, 1) : Cells(2, 4) = n(2, 2) : Cells(2, 5) = CHSH P grens = P grens + dp Loop eind : MsgBox Ok End Sub F unction f nresponse(a) As Integer Dim r As Double r = randomly If a = 2 T hen If r < T hen f nresponse = 1 fnresponse = 1 If r < T hen f nresponse = 1 fnresponse = 1 End F unction F unction AcceptSetting(k, i) As Integer W orksheets( Sheet4 ).Activate AcceptSetting = Cells(k, i) End F unction Sub Settings(x, y, p, q) Dim i As Long W orksheets( Sheet4 ).Activate F or i = p T o q Cells(i, 1) = x Cells(i, 2) = y Next End Sub

11 CHSH and violation with LHV computer program. 11 Sub Rerandomize(N max) Dim r As Double Dim i, j, k, n, m As Long r = randomly F or i = 1 T o Nmax k = 1 + Int(r (N max 1)) n = Cells(k, 1) m = Cells(k, 2) Cells(k, 1) = Cells(i, 1) Cells(k, 2) = Cells(i, 2) Cells(i, 1) = n Cells(i, 2) = m r = randomly Next End Sub F unction randomly() As Double Dim T istr As String Dim CtrStri As String Dim Nloop As Long Dim i, j, k As Long Dim r As Double T istr = T ime CtrStri = Right(T istr, 2) N loop = V al(ctrstri) + 1 F or i = 1 T o Nloop r = Rnd Next r = Rnd randomly = r End F unction

12 12 Han Geurdes References 1. A.Einstein,B.Podolsky and N.Rosen Phys. Rev. 47(10) (1935). 2. J.S. Bell,Physics (1964). 3. G.Weihs,T.Jennewein, C. Simon, H. Weinfurter and A. Zeilinger, Phys. Rev. Lett (1998). 4. A.Aspect, J. Dalibard and G. Roger, Phys. Rev. Lett (1982). 5. J.F. Geurdes, Optical Engineering. 51(12) (2012). 6. R. Gill, Time, Finite Statistics and Bell s fifth position, p188, Foundations of Probability and Physics, Växjö Sweden, (2002). 7. J.F. Geurdes, Bell s fifth position is not supported by supermartingale statistics, arxiv: H. De Raedt, F. Jin and K. Michielsen AIP Conf. Proc. 1508, (2012).

13 CHSH and violation with LHV computer program. 13-1,98-1, ,99-1, ,005-2,01 Series1 Series2 Series3-2,015-2,02-2,025 Fig. 1. Three series of trials where p ran from 0.60 to 0.89 and dp = 0.01.

14 August 26, :27 WSPC/INSTRUCTION FILE 14 Han Geurdes -2,016-2,018-2,02-2,022 Series1-2,024-2,026-2,028 Fig. 2. One series of trials where p ran from 0.78 to 0.80 with dp = and rule (*) is replaced by rule (**).

15 CHSH and violation with LHV computer program. 15-1,985-1, , ,005-2,01 Series1-2,015-2,02-2,025-2,03 Fig. 3. One run with N max = 10 6 where p ran from to with dp = and rule (*) is replaced by rule (**).

16 16 Han Geurdes -2,032-2, ,036-2,038-2,04-2,042-2,044-2,046-2,02708 Series1-2,0271-2, , ,02716 Fig. 4. One series of trials where p ran from 0.78 to 0.80 with dp = and rule (*) is replaced by rule (**) together with applying the scavenging algorithm for the final based on the change in sign of log(ζ), defined in (4) described in subsection-2.3.

17 CHSH and violation with LHV computer program. 17-2, ,0271-2, , , , ,026-2,0265-2,027-2,0275 Series1-2,0272-2,02722 Fig. 5. One run with N max = 10 5 where p ran from to with dp = and rule (*) is replaced by rule (**) and ɛ = 2 in the Ncnt 0.5 N max branch replaced with ɛ = 1. -1,99-1, ,005-2,01 Series1-2,015-2,02-2,025-2,03 Fig. 6. One run with N max = 10 5 where p ran from 0.20 to 0.84 with dp = 0.01 and rule (*) is employed on a different distribution of (a, b) settings over trials than in the previous figures.

A computational proof of locality in entanglement.

A computational proof of locality in entanglement. 1 Prepared for submission. 2 A computational proof of locality in entanglement. 3 4 5 6 Han Geurdes, a a Institution, Geurdes data science, C. vd Lijnstraat 164 2593 NN Den Haag, Netherlands E-mail: han.geurdes@gmail.com

More information

Anomaly in sign function - probability function integration III

Anomaly in sign function - probability function integration III Anomaly in sign function - probability function integration III Han GEURDES Address Geurdes Datascience, KvK 645, C vd Lijnstraat 64, 593 NN, Den Haag Netherlands Abstract E-mail :han.geurdes@gmail.com

More information

Introduction to Bell s theorem: the theory that solidified quantum mechanics

Introduction to Bell s theorem: the theory that solidified quantum mechanics Introduction to Bells theorem: the theory that solidified quantum mechanics Jia Wang Department of Chemistry, University of Michigan, 930 N. University Ave., Ann Arbor, MI 48109 (Received November 30,

More information

Heisenberg quantum mechanics, numeral set-theory and quantum ontology without space-time.

Heisenberg quantum mechanics, numeral set-theory and quantum ontology without space-time. Heisenberg quantum mechanics, numeral set-theory and quantum ontology without space-time. Han Geurdes 1 C. vd Lijnstraat 164, 2593 NN Den Haag, Netherlands Abstract. In the paper we will employ set theory

More information

Closing the Debates on Quantum Locality and Reality: EPR Theorem, Bell's Theorem, and Quantum Information from the Brown-Twiss Vantage

Closing the Debates on Quantum Locality and Reality: EPR Theorem, Bell's Theorem, and Quantum Information from the Brown-Twiss Vantage Closing the Debates on Quantum Locality and Reality: EPR Theorem, Bell's Theorem, and Quantum Information from the Brown-Twiss Vantage C. S. Unnikrishnan Fundamental Interactions Laboratory Tata Institute

More information

Einstein-Podolsky-Rosen paradox and Bell s inequalities

Einstein-Podolsky-Rosen paradox and Bell s inequalities Einstein-Podolsky-Rosen paradox and Bell s inequalities Jan Schütz November 27, 2005 Abstract Considering the Gedankenexperiment of Einstein, Podolsky, and Rosen as example the nonlocal character of quantum

More information

A proof of Bell s inequality in quantum mechanics using causal interactions

A proof of Bell s inequality in quantum mechanics using causal interactions A proof of Bell s inequality in quantum mechanics using causal interactions James M. Robins, Tyler J. VanderWeele Departments of Epidemiology and Biostatistics, Harvard School of Public Health Richard

More information

Has CHSH-inequality any relation to EPR-argument?

Has CHSH-inequality any relation to EPR-argument? arxiv:1808.03762v1 [quant-ph] 11 Aug 2018 Has CHSH-inequality any relation to EPR-argument? Andrei Khrennikov International Center for Mathematical Modeling in Physics, Engineering, Economics, and Cognitive

More information

Violation of Bell Inequalities

Violation of Bell Inequalities Violation of Bell Inequalities Philipp Kurpiers and Anna Stockklauser 5/12/2011 Quantum Systems for Information Technology Einstein-Podolsky-Rosen paradox (1935) Goal: prove that quantum mechanics is incomplete

More information

University of Groningen

University of Groningen University of Groningen Reply to comment on "A local realist model for correlations of the singlet state" by M.P. Seevinck and J.-A. Larsson De Raedt, H.; Michielsen, K.; Miyashita, S.; Keimpema, K. Published

More information

arxiv:quant-ph/ v1 15 Jun 1999

arxiv:quant-ph/ v1 15 Jun 1999 arxiv:quant-ph/9906049v1 15 Jun 1999 Bell inequality and the locality loophole: Active versus passive switches N. Gisin and H. Zbinden Group of Applied Physics University of Geneva, 1211 Geneva 4, Switzerland

More information

Take that, Bell s Inequality!

Take that, Bell s Inequality! Take that, Bell s Inequality! Scott Barker November 10, 2011 Abstract Bell s inequality was tested using the CHSH method. Entangled photons were produced from two different laser beams by passing light

More information

arxiv:quant-ph/ v2 21 Jun 2004

arxiv:quant-ph/ v2 21 Jun 2004 Europhysics Letters PREPRINT Bell s inequality and the coincidence-time loophole arxiv:quant-ph/0312035v2 21 Jun 2004 Jan-Åke Larsson 1 and Richard D. Gill 2,3 1 Matematiska Institutionen, Linköpings Universitet,

More information

Solving the Einstein Podolsky Rosen puzzle: The origin of non-locality in Aspect-type experiments

Solving the Einstein Podolsky Rosen puzzle: The origin of non-locality in Aspect-type experiments Front. Phys., 2012, 7(5): 504 508 DOI 10.1007/s11467-012-0256-x RESEARCH ARTICLE Solving the Einstein Podolsky Rosen puzzle: The origin of non-locality in Aspect-type experiments Werner A. Hofer Department

More information

Michael H. Shulman, 2006 (Revisited ) WHY QUANTUM MECHANICS IS NON-LOCAL?

Michael H. Shulman, 2006 (Revisited ) WHY QUANTUM MECHANICS IS NON-LOCAL? Michael H. Shulman, 2006 (shulman@dol.ru) (Revisited 20.07.2008) WHY QUANTUM MECHANICS IS NON-LOCAL? A question on a correspondence between the famous Bell s Theorem and Quantum Mechanics foundations is

More information

3/10/11. Which interpreta/on sounds most reasonable to you? PH300 Modern Physics SP11

3/10/11. Which interpreta/on sounds most reasonable to you? PH300 Modern Physics SP11 3// PH3 Modern Physics SP The problems of language here are really serious. We wish to speak in some way about the structure of the atoms. But we cannot speak about atoms in ordinary language. Recently:.

More information

Experimentally Generated Random Numbers Certified by the Impossibility of Superluminal Signaling

Experimentally Generated Random Numbers Certified by the Impossibility of Superluminal Signaling Experimentally Generated Random Numbers Certified by the Impossibility of Superluminal Signaling Peter Bierhorst, Lynden K. Shalm, Alan Mink, Stephen Jordan, Yi-Kai Liu, Scott Glancy, Bradley Christensen,

More information

Checking Consistency. Chapter Introduction Support of a Consistent Family

Checking Consistency. Chapter Introduction Support of a Consistent Family Chapter 11 Checking Consistency 11.1 Introduction The conditions which define a consistent family of histories were stated in Ch. 10. The sample space must consist of a collection of mutually orthogonal

More information

Laboratory 1: Entanglement & Bell s Inequalities

Laboratory 1: Entanglement & Bell s Inequalities Laboratory 1: Entanglement & Bell s Inequalities Jose Alejandro Graniel Institute of Optics University of Rochester, Rochester, NY 14627, U.S.A Abstract This experiment purpose was to study the violation

More information

Quantum Entanglement. Chapter Introduction. 8.2 Entangled Two-Particle States

Quantum Entanglement. Chapter Introduction. 8.2 Entangled Two-Particle States Chapter 8 Quantum Entanglement 8.1 Introduction In our final chapter on quantum mechanics we introduce the concept of entanglement. This is a feature of two-particle states (or multi-particle states) in

More information

Bell s inequalities and their uses

Bell s inequalities and their uses The Quantum Theory of Information and Computation http://www.comlab.ox.ac.uk/activities/quantum/course/ Bell s inequalities and their uses Mark Williamson mark.williamson@wofson.ox.ac.uk 10.06.10 Aims

More information

Lecture 14, Thurs March 2: Nonlocal Games

Lecture 14, Thurs March 2: Nonlocal Games Lecture 14, Thurs March 2: Nonlocal Games Last time we talked about the CHSH Game, and how no classical strategy lets Alice and Bob win it more than 75% of the time. Today we ll see how, by using entanglement,

More information

Is Faster-Than-Light Communication Possible?

Is Faster-Than-Light Communication Possible? Is Faster-Than-Light Communication Possible? Raymond W. Jensen Department of Mathematics, University of Notre Dame, Notre Dame IN 46556 rwjst4@alumni.nd.edu Abstract. It is shown here using elementary

More information

The Einstein-Podolsky-Rosen thought experiment and Bell s theorem

The Einstein-Podolsky-Rosen thought experiment and Bell s theorem PHYS419 Lecture 0 The Einstein-Podolsky-Rosen thought experiment and Bell s theorem 1 The Einstein-Podolsky-Rosen thought experiment and Bell s theorem As first shown by Bell (1964), the force of the arguments

More information

MACROREALISM, NONINVASIVENESS and WEAK MEASUREMENT

MACROREALISM, NONINVASIVENESS and WEAK MEASUREMENT A A MACROREALISM, NONINVASIVENESS and WEAK MEASUREMENT For orientation, original CHSH inequality: AB A B AB A B 2 ~ S (A, B, A, B 1) Satisfied by all objective local theories, df. by conjunction of 1)

More information

Entangled Frankenstein Photons

Entangled Frankenstein Photons Entangled Frankenstein Photons David R. Schneider (David@DrChinese.com) June 5, 2010 Abstract: The H> and V> outputs of a Polarizing Beam Splitter can be combined to restore the original input superposition

More information

Finite Automata, Random Fields, Quantum Fluctuations, and Bell Inequalities

Finite Automata, Random Fields, Quantum Fluctuations, and Bell Inequalities Finite Automata, Random Fields, Quantum Fluctuations, and Bell Inequalities Peter Morgan, Yale University NKS 2007 Wolfram Science Conference Small-scale physics is probabilistic/statistical. In the presence

More information

Causality and Local Determinism versus Quantum Nonlocality.

Causality and Local Determinism versus Quantum Nonlocality. Contribution to EMQ13 in Vienna, October 2013 Causality and Local Determinism versus Quantum Nonlocality. UQO marian.kupczynski@uqo.ca Intro It was shown by many authors that the violation of Bell Inequalities

More information

Local Realism Explains Bell Violations

Local Realism Explains Bell Violations Local Realism (2017-04-07v) 1 of 8 Local Realism Explains Bell Violations Andrew P. Yake apyake@gmail.com Local realism reduces to the proposition that local determinate reality is the necessary and sufficient

More information

Bell s Theorem. Ben Dribus. June 8, Louisiana State University

Bell s Theorem. Ben Dribus. June 8, Louisiana State University Bell s Theorem Ben Dribus Louisiana State University June 8, 2012 Introduction. Quantum Theory makes predictions that challenge intuitive notions of physical reality. Einstein and others were sufficiently

More information

Quantum measurements and Kolmogorovian probability theory

Quantum measurements and Kolmogorovian probability theory Quantum measurements and Kolmogorovian probability theory D.A.Slavnov arxiv:quant-ph/0301027v1 8 Jan 2003 Department of Physics, Moscow State University, Moscow 119992, Russia. E- mail: slavnov@goa.bog.msu.ru

More information

EPR Paradox and Bell Inequalities

EPR Paradox and Bell Inequalities Chapter 24 EPR Paradox and Bell Inequalities 24.1 Bohm Version of the EPR Paradox Einstein, Podolsky, and Rosen (EPR) were concerned with the following issue. Given two spatially separated quantum systems

More information

On Bell s experiment. Han Geurdes 1. formula. 35

On Bell s experiment. Han Geurdes 1. formula. 35 On Bell s experiment Han Geurdes 1 1 Geurdes data science kvk6450 - C vd Lijnstraat 164, 593 NN, Den Haag, Netherlands PACS 03.65.Ud First pacs description Abstract With the use of tropical algebra operators

More information

1.1.1 Bell Inequality - Spin correlation

1.1.1 Bell Inequality - Spin correlation January 8, 015 Lecture IV 1.1.1 Bell Inequality - Spin correlation Consider the final spin singlet state of the decay η 0 µ + µ We suppose that the η 0 decays and the muon and µ + travel in opposite directions,

More information

RUNS: A_B, A_B', A'_B,

RUNS: A_B, A_B', A'_B, A. Fine, 2013 THE BELL THEOREM The Bell theorem is a demonstration that a plausible way of picturing (or modeling) how the results of measurements occur, when made precise, leads to definite relations

More information

Inequalities for Dealing with Detector Inefficiencies in Greenberger-Horne-Zeilinger Type Experiments

Inequalities for Dealing with Detector Inefficiencies in Greenberger-Horne-Zeilinger Type Experiments PHYSICAL REVIEW LETTERS VOLUME 84 31 JANUARY 000 NUMBER 5 Inequalities for Dealing with Detector Inefficiencies in Greenberger-Horne-Zeilinger Type Experiments J. Acacio de Barros* and Patrick Suppes CSLI-Ventura

More information

No Fine Theorem for Macrorealism

No Fine Theorem for Macrorealism No Fine Theorem for Macrorealism Johannes Kofler Max Planck Institute of Quantum Optics (MPQ) Garching/Munich, Germany Quantum and Beyond Linnaeus University, Växjö, Sweden 14 June 2016 Acknowledgments

More information

Space Complexity. The space complexity of a program is how much memory it uses.

Space Complexity. The space complexity of a program is how much memory it uses. Space Complexity The space complexity of a program is how much memory it uses. Measuring Space When we compute the space used by a TM, we do not count the input (think of input as readonly). We say that

More information

Tutorial: Device-independent random number generation. Roger Colbeck University of York

Tutorial: Device-independent random number generation. Roger Colbeck University of York Tutorial: Device-independent random number generation Roger Colbeck University of York Outline Brief motivation of random number generation Discuss what we mean by a random number Discuss some ways of

More information

Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras

Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture - 13 Multiple Item Inventory - Constraint on Money Value, Space,

More information

Lecture 20: Bell inequalities and nonlocality

Lecture 20: Bell inequalities and nonlocality CPSC 59/69: Quantum Computation John Watrous, University of Calgary Lecture 0: Bell inequalities and nonlocality April 4, 006 So far in the course we have considered uses for quantum information in the

More information

A Superluminal communication solution based on Four-photon entanglement

A Superluminal communication solution based on Four-photon entanglement A Superluminal communication solution based on Four-photon entanglement Jia-Run Deng cmos001@163.com Abstract : Based on the improved design of Four-photon entanglement device and the definition of Encoding

More information

arxiv:quant-ph/ v1 19 Oct 1995

arxiv:quant-ph/ v1 19 Oct 1995 Generalized Kochen-Specker Theorem arxiv:quant-ph/9510018v1 19 Oct 1995 Asher Peres Department of Physics, Technion Israel Institute of Technology, 32 000 Haifa, Israel Abstract A generalized Kochen-Specker

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION doi: 1.138/nature5677 An experimental test of non-local realism Simon Gröblacher, 1, Tomasz Paterek, 3, 4 Rainer Kaltenbaek, 1 Časlav Brukner, 1, Marek Żukowski,3, 1 Markus Aspelmeyer, 1, and Anton Zeilinger

More information

221B Lecture Notes Many-Body Problems I

221B Lecture Notes Many-Body Problems I 221B Lecture Notes Many-Body Problems I 1 Quantum Statistics of Identical Particles If two particles are identical, their exchange must not change physical quantities. Therefore, a wave function ψ( x 1,

More information

Event-by-event simulation of quantum phenomena

Event-by-event simulation of quantum phenomena 1 Event-by-event simulation of quantum phenomena H. De Raedt 1, K. De Raedt 2, and K. Michielsen 1 1 Applied Physics - Computational Physics, Materials Science Centre, University of Groningen, Nijenborgh

More information

= 5 2 and = 13 2 and = (1) = 10 2 and = 15 2 and = 25 2

= 5 2 and = 13 2 and = (1) = 10 2 and = 15 2 and = 25 2 BEGINNING ALGEBRAIC NUMBER THEORY Fermat s Last Theorem is one of the most famous problems in mathematics. Its origin can be traced back to the work of the Greek mathematician Diophantus (third century

More information

EPR correlations, Bell s theorem, and entanglement at a distance: the naive view of an experimentalist

EPR correlations, Bell s theorem, and entanglement at a distance: the naive view of an experimentalist EPR correlations, Bell s theorem, and entanglement at a distance: the naive view of an experimentalist KITP, May 19, 004 Alain Aspect Laboratoire Charles Fabry de l Institut d Optique http://atomoptic.iota.u-psud.fr

More information

Lecture 6 Sept. 14, 2015

Lecture 6 Sept. 14, 2015 PHYS 7895: Quantum Information Theory Fall 205 Prof. Mark M. Wilde Lecture 6 Sept., 205 Scribe: Mark M. Wilde This document is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0

More information

An introduction to basic information theory. Hampus Wessman

An introduction to basic information theory. Hampus Wessman An introduction to basic information theory Hampus Wessman Abstract We give a short and simple introduction to basic information theory, by stripping away all the non-essentials. Theoretical bounds on

More information

Part 1: Logic and Probability

Part 1: Logic and Probability Part 1: Logic and Probability In some sense, probability subsumes logic: While a probability can be seen as a measure of degree of truth a real number between 0 and 1 logic deals merely with the two extreme

More information

221B Lecture Notes Many-Body Problems I (Quantum Statistics)

221B Lecture Notes Many-Body Problems I (Quantum Statistics) 221B Lecture Notes Many-Body Problems I (Quantum Statistics) 1 Quantum Statistics of Identical Particles If two particles are identical, their exchange must not change physical quantities. Therefore, a

More information

Hardy s Paradox. Chapter Introduction

Hardy s Paradox. Chapter Introduction Chapter 25 Hardy s Paradox 25.1 Introduction Hardy s paradox resembles the Bohm version of the Einstein-Podolsky-Rosen paradox, discussed in Chs. 23 and 24, in that it involves two correlated particles,

More information

Quantum Entanglement and Bell's Inequalities

Quantum Entanglement and Bell's Inequalities Quantum Entanglement and Bell's Inequalities James Westover University of Rochester In this experiment we produced entangled photons using a pair of BBO crystals. We then proceeded to make measurements

More information

CAN QUANTUM MECHANICS BE RECONCILED WITH CELLULAR AUTOMATA?

CAN QUANTUM MECHANICS BE RECONCILED WITH CELLULAR AUTOMATA? SPIN-2002/15 CAN QUANTUM MECHANICS BE RECONCILED WITH CELLULAR AUTOMATA? Gerard t Hooft Institute for Theoretical Physics Utrecht University, Leuvenlaan 4 3584 CC Utrecht, the Netherlands and Spinoza Institute

More information

Homework Assignment 4 Solutions

Homework Assignment 4 Solutions MTAT.03.86: Advanced Methods in Algorithms Homework Assignment 4 Solutions University of Tartu 1 Probabilistic algorithm Let S = {x 1, x,, x n } be a set of binary variables of size n 1, x i {0, 1}. Consider

More information

Entanglement of projection and a new class of quantum erasers

Entanglement of projection and a new class of quantum erasers PHYSICAL REVIEW A VOLUME 60, NUMBER 2 AUGUST 1999 Entanglement of projection and a new class of quantum erasers Robert Garisto BNL Theory Group, Building 510a, Brookhaven National Laboratory, Upton, New

More information

A Note on the Geometric Interpretation of Bell s Inequalities

A Note on the Geometric Interpretation of Bell s Inequalities Lett Math Phys DOI 10.1007/s11005-013-0631-8 A Note on the Geometric Interpretation of Bell s Inequalities PAOLO DAI PRA, MICHELE PAVON and NEERAJA SAHASRABUDHE Dipartimento di Matematica, Università di

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 9 February 6, 2012 CPSC 467b, Lecture 9 1/53 Euler s Theorem Generating RSA Modulus Finding primes by guess and check Density of

More information

Regularization Physics 230A, Spring 2007, Hitoshi Murayama

Regularization Physics 230A, Spring 2007, Hitoshi Murayama Regularization Physics 3A, Spring 7, Hitoshi Murayama Introduction In quantum field theories, we encounter many apparent divergences. Of course all physical quantities are finite, and therefore divergences

More information

Combining Shared Coin Algorithms

Combining Shared Coin Algorithms Combining Shared Coin Algorithms James Aspnes Hagit Attiya Keren Censor Abstract This paper shows that shared coin algorithms can be combined to optimize several complexity measures, even in the presence

More information

How to Characterize Solutions to Constrained Optimization Problems

How to Characterize Solutions to Constrained Optimization Problems How to Characterize Solutions to Constrained Optimization Problems Michael Peters September 25, 2005 1 Introduction A common technique for characterizing maximum and minimum points in math is to use first

More information

MACROREALISM and WEAK MEASUREMENT

MACROREALISM and WEAK MEASUREMENT CIFAR 1 MACROREALISM and WEAK MEASUREMENT Original CHSH inequality: A A AB A B AB A B 2 ~ S ~ B B (A, B, A, B 1) Satisfied by all objective local theories, df. by conjunction of 1) Induction 2) Einstein

More information

The Einstein-Podolsky-Rosen thought-experiment and Bell s theorem

The Einstein-Podolsky-Rosen thought-experiment and Bell s theorem PHYS419 Lecture 0 The Einstein-Podolsky-Rosen thought-experiment and Bell s theorem 1 The Einstein-Podolsky-Rosen thought-experiment and Bell s theorem As first shown by Bell (1964), the force of the arguments

More information

A NEW SET THEORY FOR ANALYSIS

A NEW SET THEORY FOR ANALYSIS Article A NEW SET THEORY FOR ANALYSIS Juan Pablo Ramírez 0000-0002-4912-2952 Abstract: We present the real number system as a generalization of the natural numbers. First, we prove the co-finite topology,

More information

Quantum Entanglement and Bell s Inequalities Zachary Evans, Joel Howard, Jahnavi Iyer, Ava Dong, and Maggie Han

Quantum Entanglement and Bell s Inequalities Zachary Evans, Joel Howard, Jahnavi Iyer, Ava Dong, and Maggie Han Quantum Entanglement and Bell s Inequalities Zachary Evans, Joel Howard, Jahnavi Iyer, Ava Dong, and Maggie Han Institute of Optics, University of Rochester Opt 101 Meeting, December 4, 2012, Rochester

More information

THE LOGIC OF COMPOUND STATEMENTS

THE LOGIC OF COMPOUND STATEMENTS CHAPTER 2 THE LOGIC OF COMPOUND STATEMENTS Copyright Cengage Learning. All rights reserved. SECTION 2.4 Application: Digital Logic Circuits Copyright Cengage Learning. All rights reserved. Application:

More information

Classical probability model for Bell inequality

Classical probability model for Bell inequality Journal of Physics: Conference Series OPEN ACCESS Classical probability model for Bell inequality To cite this article: Andrei Khrennikov 2014 J. Phys.: Conf. Ser. 504 012019 View the article online for

More information

Lecture 15: A Brief Look at PCP

Lecture 15: A Brief Look at PCP IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 15: A Brief Look at PCP David Mix Barrington and Alexis Maciel August 4, 2000 1. Overview

More information

Special Theory Of Relativity Prof. Shiva Prasad Department of Physics Indian Institute of Technology, Bombay

Special Theory Of Relativity Prof. Shiva Prasad Department of Physics Indian Institute of Technology, Bombay Special Theory Of Relativity Prof. Shiva Prasad Department of Physics Indian Institute of Technology, Bombay Lecture - 6 Length Contraction and Time Dilation (Refer Slide Time: 00:29) In our last lecture,

More information

No-Go of Quantized General Relativity

No-Go of Quantized General Relativity Advanced Studies in Theoretical Physics Vol. 10, 2016, no. 8, 415-420 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/astp.2016.6928 No-Go of Quantized General Relativity Johan Hansson Division of

More information

ON EPR PARADOX, BELL S INEQUALITIES AND EXPERIMENTS THAT PROVE NOTHING

ON EPR PARADOX, BELL S INEQUALITIES AND EXPERIMENTS THAT PROVE NOTHING May 1, 010 15:59 WSPC/INSTRUCTION FILE ignatovich epr ON EPR PARADOX, BELL S INEQUALITIES AND EXPERIMENTS THAT PROVE NOTHING IGNATOVICH V.K. FLNP JINR, 6 Joliot-Curie, Dubna, Moscow region, 11980, Russia

More information

Logical difficulty from combining counterfactuals in the GHZ-Bell theorems

Logical difficulty from combining counterfactuals in the GHZ-Bell theorems Logical difficulty from combining counterfactuals in the GHZ-Bell theorems ABSTRACT Louis Sica 1,2 1 Chapman University, Orange, CA & Burtonsville, MD, USA 2 Inspire Institute Inc., Alexandria, VA, USA

More information

Incompatibility Paradoxes

Incompatibility Paradoxes Chapter 22 Incompatibility Paradoxes 22.1 Simultaneous Values There is never any difficulty in supposing that a classical mechanical system possesses, at a particular instant of time, precise values of

More information

arxiv: v2 [quant-ph] 30 Nov 2016

arxiv: v2 [quant-ph] 30 Nov 2016 Where Bell went wrong Th. M. Nieuwenhuizen Institute for Theoretical Physics, Valckenierstraat 65, 1018 XE Amsterdam, The Netherlands It is explained on a physical basis how contextuality allows Bell inequalities

More information

Spatial Locality: A hidden variable unexplored in entanglement experiments

Spatial Locality: A hidden variable unexplored in entanglement experiments Spatial Locality: A hidden variable unexplored in entanglement experiments Ramzi Suleiman a Department of Psychology, University of Haifa, Abba Khoushy Avenue 199, Haifa 3498838, Israel & Department of

More information

SMT 2013 Power Round Solutions February 2, 2013

SMT 2013 Power Round Solutions February 2, 2013 Introduction This Power Round is an exploration of numerical semigroups, mathematical structures which appear very naturally out of answers to simple questions. For example, suppose McDonald s sells Chicken

More information

On the errors introduced by the naive Bayes independence assumption

On the errors introduced by the naive Bayes independence assumption On the errors introduced by the naive Bayes independence assumption Author Matthijs de Wachter 3671100 Utrecht University Master Thesis Artificial Intelligence Supervisor Dr. Silja Renooij Department of

More information

Photons uncertainty removes Einstein-Podolsky-Rosen paradox. Abstract

Photons uncertainty removes Einstein-Podolsky-Rosen paradox. Abstract quant-ph/0202175 Photons uncertainty removes Einstein-Podolsky-Rosen paradox Daniele Tommasini Departamento de Física Aplicada, Área de Física Teórica, Universidad de Vigo, 32004 Ourense, Spain (Dated:

More information

KOLMOGOROV s PROBABILITY THEORY IN QUANTUM PHYSICS

KOLMOGOROV s PROBABILITY THEORY IN QUANTUM PHYSICS KOLMOGOROV s PROBABILITY THEORY IN QUANTUM PHYSICS D.A. Slavnov Department of Physics, Moscow State University, GSP-2 Moscow 119992, Russia. E-mail: slavnov@theory.sinp.msu.ru A connection between the

More information

DEMBSKI S SPECIFIED COMPLEXITY: A SIMPLE ERROR IN ARITHMETIC

DEMBSKI S SPECIFIED COMPLEXITY: A SIMPLE ERROR IN ARITHMETIC DEMBSKI S SPECIFIED COMPLEXITY: A SIMPLE ERROR IN ARITHMETIC HOWARD A. LANDMAN Abstract. We show that the derivation of Dembski s formula for specified complexity contains a simple but enormous error,

More information

Mathematical and Physical Examination of the Locality Condition in Bell s Theorem

Mathematical and Physical Examination of the Locality Condition in Bell s Theorem Physics Essays volume 9, number 4, 006 Mathematical and Physical Examination of the Locality Condition in Bell s Theorem Abstract Using the Clauser Horne model of Bell s theorem, the locality condition

More information

Entanglement and information

Entanglement and information Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 10 February 19, 2013 CPSC 467b, Lecture 10 1/45 Primality Tests Strong primality tests Weak tests of compositeness Reformulation

More information

Sample Project: Simulation of Turing Machines by Machines with only Two Tape Symbols

Sample Project: Simulation of Turing Machines by Machines with only Two Tape Symbols Sample Project: Simulation of Turing Machines by Machines with only Two Tape Symbols The purpose of this document is to illustrate what a completed project should look like. I have chosen a problem that

More information

Computer Simulation of Einstein-Podolsky. Podolsky-Rosen- Bohm Experiments with Photons.

Computer Simulation of Einstein-Podolsky. Podolsky-Rosen- Bohm Experiments with Photons. Computer Simulation of Einstein-Podolsky Podolsky-Rosen- Bohm Experiments with Photons Shuang Zhao, Hans De Raedt and Kristel Michielsen http://www.compphys.net/dlm CCP2007 Introduction Computer simulation

More information

Contextuality and the Kochen-Specker Theorem. Interpretations of Quantum Mechanics

Contextuality and the Kochen-Specker Theorem. Interpretations of Quantum Mechanics Contextuality and the Kochen-Specker Theorem Interpretations of Quantum Mechanics by Christoph Saulder 19. 12. 2007 Interpretations of quantum mechanics Copenhagen interpretation the wavefunction has no

More information

Popper School Methodological Disproof of Quantum Logic

Popper School Methodological Disproof of Quantum Logic Popper School Methodological Disproof of Quantum Logic Steve Meyer Tachyon Design Automation San Francisco, CA 94111 smeyer@tdl.com Presented August 6, 2015 CLMPS Helsinki Slides and addition references

More information

Reconciling Einstein and Bohr: The Ultra-Instrument View of Quantum Mechanics

Reconciling Einstein and Bohr: The Ultra-Instrument View of Quantum Mechanics Adv. Studies Theor. Phys., Vol. 6, 01, no. 16, 781-789 Reconciling Einstein and Bohr: The Ultra-Instrument View of Quantum Mechanics J.F. Geurdes C. vd. Lijnstraat 164 593 NN Den Haag Netherlands han.geurdes@gmail.com

More information

arxiv:quant-ph/ v1 5 Sep 2002

arxiv:quant-ph/ v1 5 Sep 2002 Realization of All-or-nothing-type Kochen-Specker Experiment with Single Photons Yun-Feng Huang, Chuan-Feng Li, Yong-Sheng Zhang, Jian-Wei Pan, and Guang-Can Guo Key Laboratory of Quantum Information,

More information

A history of entanglement

A history of entanglement A history of entanglement Jos Uffink Philosophy Department, University of Minnesota, jbuffink@umn.edu May 17, 2013 Basic mathematics for entanglement of pure states Let a compound system consists of two

More information

Ordinary Differential Equations Prof. A. K. Nandakumaran Department of Mathematics Indian Institute of Science Bangalore

Ordinary Differential Equations Prof. A. K. Nandakumaran Department of Mathematics Indian Institute of Science Bangalore Ordinary Differential Equations Prof. A. K. Nandakumaran Department of Mathematics Indian Institute of Science Bangalore Module - 3 Lecture - 10 First Order Linear Equations (Refer Slide Time: 00:33) Welcome

More information

A Classification of Hidden-Variable Properties

A Classification of Hidden-Variable Properties A Classification of Hidden-Variable Properties Joint work with Adam Brandenburger Noson S. Yanofsky Brooklyn College and The Graduate Center, CUNY noson@sci.brooklyn.cuny.edu Quantum Logic Inspired by

More information

Is Bell s Locality Condition Necessary for The Derivation of Bell s Inequality?

Is Bell s Locality Condition Necessary for The Derivation of Bell s Inequality? Annales de la Fondation Louis de Broglie, Volume 26 no 4, 2001 735 Is Bell s Locality Condition Necessary for The Derivation of Bell s Inequality? M. Golshani, A. Fahmi Institute for Studies in Theoretical

More information

arxiv:quant-ph/ v1 8 Sep 2006

arxiv:quant-ph/ v1 8 Sep 2006 Hidden variables or hidden theories? arxiv:quant-ph/0609062 v1 8 Sep 2006 A. Feoli Dipartimento di Ingegneria, Università del Sannio, Corso Garibaldi n. 107, Palazzo Bosco Lucarelli I-82100 - Benevento,

More information

8 Primes and Modular Arithmetic

8 Primes and Modular Arithmetic 8 Primes and Modular Arithmetic 8.1 Primes and Factors Over two millennia ago already, people all over the world were considering the properties of numbers. One of the simplest concepts is prime numbers.

More information

Article. Reference. Bell Inequalities for Arbitrarily High-Dimensional Systems. COLLINS, Daniel Geoffrey, et al.

Article. Reference. Bell Inequalities for Arbitrarily High-Dimensional Systems. COLLINS, Daniel Geoffrey, et al. Article Bell Inequalities for Arbitrarily High-Dimensional Systems COLLINS, Daniel Geoffrey, et al. Abstract We develop a novel approach to Bell inequalities based on a constraint that the correlations

More information

MIDTERM SOLUTIONS: FALL 2012 CS 6375 INSTRUCTOR: VIBHAV GOGATE

MIDTERM SOLUTIONS: FALL 2012 CS 6375 INSTRUCTOR: VIBHAV GOGATE MIDTERM SOLUTIONS: FALL 2012 CS 6375 INSTRUCTOR: VIBHAV GOGATE March 28, 2012 The exam is closed book. You are allowed a double sided one page cheat sheet. Answer the questions in the spaces provided on

More information

Selecting Efficient Correlated Equilibria Through Distributed Learning. Jason R. Marden

Selecting Efficient Correlated Equilibria Through Distributed Learning. Jason R. Marden 1 Selecting Efficient Correlated Equilibria Through Distributed Learning Jason R. Marden Abstract A learning rule is completely uncoupled if each player s behavior is conditioned only on his own realized

More information

arxiv: v2 [physics.gen-ph] 7 Jan 2015

arxiv: v2 [physics.gen-ph] 7 Jan 2015 Noname manuscript No. (will be inserted by the editor) Concrete incompleteness of Bell s correlation formula. Han Geurdes arxiv:149.74v2 [physics.gen-ph] 7 Jan 215 Received: Januari 5 215 / Accepted: date

More information