SlideShare a Scribd company logo
1 of 15
Download to read offline
Source coding for a mixed source:
determination of second order asymptotics
arXiv:1407.6616
Felix Leditzky Nilanjana Datta
27 August 2014
QESS, Smolenice
Table of Contents
Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 2 / 1
Fixed-length visible source coding
Quantum source: pure-state ensemble {pi , ψi }
Visible setting: Alice knows identity of signals ψi
→ receives classical information in form of label i
Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 3 / 1
Fixed-length visible source coding
Encoding
Input
Decoding
Visible encoder: V : {1, . . . , k} → D(Hc) (can be non-linear!)
Hc: compressed Hilbert space with M := dim Hc < dim H.
Decoding: D : D(Hc) → D(H) (CPTP map)
Goal: Retrieve output state that is close to input state on average
Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 4 / 1
Fixed-length visible source coding
Figure of merit: Ensemble average fidelity
¯F(E, V, D) :=
i
pi Tr((D ◦ V)(i)ψi )
For ∈ (0, 1), a code (V, D, M) is -admissible if
¯F(E, V, D) ≥ 1 − .
Definition
-error one-shot minimum compression length:
m(1),
(ρ) := inf{log M | (V, D, M) is an -admissible code}
Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 5 / 1
Table of Contents
Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 6 / 1
Mixed source coding
Mixed source: emits signals from one of two i.i.d. sources:
1 2
1 2
n
n
t
Source state: ρ(n) = tρ⊗n
1 + (1 − t)ρ⊗n
2
After the first signal, the source sticks to the chosen source.
Simple example of a non-i.i.d. protocol
For ∈ (0, 1) we define mn, (ρ1, ρ2, t) := m(1), ρ(n) .
Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 7 / 1
Mixed source coding
Goal: determine the second order asymptotics of mn, (ρ1, ρ2, t)
Find a and b in the expansion
mn,
(ρ1, ρ2, t) = na +
√
nb + O(log n).
Compare: Single source with i.i.d. state ρ(n) = ρ⊗n:
Schumacher: a = S(ρ)
b given by a Gaussian approximation [Datta, FL]
Mixed source with non-i.i.d. source state
ρ(n)
= tρ⊗n
1 + (1 − t)ρ⊗n
2
is much harder to evaluate!
Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 8 / 1
Table of Contents
Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 9 / 1
One-shot bounds
Bounds for the minimum compression length in terms of the
information spectrum entropy
Hs(ρ) := inf{γ ∈ R | Tr(ρ − 2−γ
1)+ ≥ 1 − }
Properties: positive for states, quasi-concavity, etc.
Source state for a single use of the source: ρ = tρ1 + (1 − t)ρ2
Theorem
For ∈ (0, 1), we have
m1,
(ρ1, ρ2, t) ≈ max H 1
s (ρ1) , H 2
s (ρ2)
where i = i ( , t).
Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 10 / 1
Table of Contents
Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 11 / 1
Second order asymptotics
Key tool: Second order asymptotic expansion of Hs(ρ⊗n):
Hs(ρ⊗n
) = nS(ρ) −
√
n s(ρ)Φ−1
( ) + O(log n)
s(ρ) := Tr(ρ(log ρ)2
) − S(ρ)2
is the quantum information variance.
Φ−1
( ) = sup{z ∈ R | Φ(z) ≤ } is the inverse of the cdf of a normal
random variable.
Goal: determine expansion
mn,
(ρ1, ρ2, t) = na +
√
nb + O(log n).
Problem: due to maximum of Hs(ρi ) appearing in one-shot bounds,
direct application of the second order expansion is not possible.
Solution: distinction between three cases based on the von Neumann
entropies S(ρi ) and mixing parameter t.
Inspired by classical analysis of mixed sources [Nomura, Han].
Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 12 / 1
Second order asymptotics
The three cases: abbreviate Si ≡ S(ρi ), si ≡ s(ρi )
Case 1: S1 = S2, s1 < s2, ∈ (0, 1/2)
Case 2: S1 > S2, t >
Case 3: S1 > S2, t <
Main result
Let , t ∈ (0, 1) and ρ1, ρ2 ∈ D(H).
Case 1: mn, (ρ1, ρ2, t) = nS2 −
√
n s2Φ−1 ( ) + O(log n)
Case 2: mn, (ρ1, ρ2, t) = nS1 −
√
n s1Φ−1
t + O(log n)
Case 3: mn, (ρ1, ρ2, t) = nS2 −
√
n s2Φ−1 −t
1−t + O(log n)
Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 13 / 1
References & Acknowledgements
References:
FL, Nilanjana Datta, “Source coding for a mixed source:
determination of second order asymptotics,” arXiv:1407.6616
[quant-ph], 2014.
Nilanjana Datta, FL, “Second-order asymptotics for source coding,
dense coding and pure-state entanglement conversions,”
arXiv:1403.2543 [quant-ph], 2014.
Marco Tomamichel, Masahito Hayashi, “A hierarchy of information
quantities for finite block length analysis of quantum tasks, IEEE
Trans. on Inf. Th. 59, no. 11, 76937710, 2013.
Special thanks to Francesco Buscemi, Nilanjana Datta, Will Matthews and
David Reeb for valuable feedback.
Thank you very much for your attention!
Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 14 / 1
Second order asymptotics
How do we prove this?
Key observation: Growth of Hs(ρ⊗n
i ) is mainly governed by first
order term Si in asymptotic expansion
Hs(ρ⊗n
i ) = nSi −
√
n si Φ−1
( ) + O(log n).
Example: Case 2
By assumption, S1 > S2 and t > .
For sufficiently large n, this implies that
H
1
s ρ⊗n
1 > H
2
s ρ⊗n
2
for any 1, 2 ∈ (0, 1).
Hence, the first source ρ1 dominates in the second order asymptotics of
the minimum compression length.
Similar assertions hold in Cases 1 and 3.
Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 15 / 1

More Related Content

What's hot

TopicModels_BleiPaper_Summary.pptx
TopicModels_BleiPaper_Summary.pptxTopicModels_BleiPaper_Summary.pptx
TopicModels_BleiPaper_Summary.pptx
Kalpit Desai
 

What's hot (13)

Ch03 Mining Massive Data Sets stanford
Ch03 Mining Massive Data Sets  stanfordCh03 Mining Massive Data Sets  stanford
Ch03 Mining Massive Data Sets stanford
 
Adaptation of Multilingual Transformer Encoder for Robust Enhanced Universal ...
Adaptation of Multilingual Transformer Encoder for Robust Enhanced Universal ...Adaptation of Multilingual Transformer Encoder for Robust Enhanced Universal ...
Adaptation of Multilingual Transformer Encoder for Robust Enhanced Universal ...
 
Paper talk (presented by Prof. Ludaescher), WORKS workshop, 2010
Paper talk (presented by Prof. Ludaescher), WORKS workshop, 2010Paper talk (presented by Prof. Ludaescher), WORKS workshop, 2010
Paper talk (presented by Prof. Ludaescher), WORKS workshop, 2010
 
Topic Models - LDA and Correlated Topic Models
Topic Models - LDA and Correlated Topic ModelsTopic Models - LDA and Correlated Topic Models
Topic Models - LDA and Correlated Topic Models
 
Graph-to-Text Generation and its Applications to Dialogue
Graph-to-Text Generation and its Applications to DialogueGraph-to-Text Generation and its Applications to Dialogue
Graph-to-Text Generation and its Applications to Dialogue
 
Topic Modeling
Topic ModelingTopic Modeling
Topic Modeling
 
Data Structure and Algorithms
Data Structure and Algorithms Data Structure and Algorithms
Data Structure and Algorithms
 
Topic Models
Topic ModelsTopic Models
Topic Models
 
Competence-Level Prediction and Resume & Job Description Matching Using Conte...
Competence-Level Prediction and Resume & Job Description Matching Using Conte...Competence-Level Prediction and Resume & Job Description Matching Using Conte...
Competence-Level Prediction and Resume & Job Description Matching Using Conte...
 
TopicModels_BleiPaper_Summary.pptx
TopicModels_BleiPaper_Summary.pptxTopicModels_BleiPaper_Summary.pptx
TopicModels_BleiPaper_Summary.pptx
 
3 - Finding similar items
3 - Finding similar items3 - Finding similar items
3 - Finding similar items
 
Automata And Compiler Design
Automata And Compiler DesignAutomata And Compiler Design
Automata And Compiler Design
 
COA-QUESTION-BANK.pdf
COA-QUESTION-BANK.pdfCOA-QUESTION-BANK.pdf
COA-QUESTION-BANK.pdf
 

Viewers also liked

Combining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicityCombining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicity
IAEME Publication
 
Predictive Coding Legaltech
Predictive Coding LegaltechPredictive Coding Legaltech
Predictive Coding Legaltech
Justin_Feferman
 

Viewers also liked (20)

Source coding theorem
Source coding theoremSource coding theorem
Source coding theorem
 
Source coding
Source codingSource coding
Source coding
 
Source coding
Source codingSource coding
Source coding
 
Combining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicityCombining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicity
 
Full-Rate Full-Diversity Space-Frequency Block Coding for Digital TV Broadcas...
Full-Rate Full-Diversity Space-Frequency Block Coding for Digital TV Broadcas...Full-Rate Full-Diversity Space-Frequency Block Coding for Digital TV Broadcas...
Full-Rate Full-Diversity Space-Frequency Block Coding for Digital TV Broadcas...
 
Code rule
Code ruleCode rule
Code rule
 
Assignments of source coding theory and applications
Assignments of source coding theory and applicationsAssignments of source coding theory and applications
Assignments of source coding theory and applications
 
The Ethics of Predictive Coding
The Ethics of Predictive CodingThe Ethics of Predictive Coding
The Ethics of Predictive Coding
 
Predictive Coding Legaltech
Predictive Coding LegaltechPredictive Coding Legaltech
Predictive Coding Legaltech
 
Predictive coding
Predictive codingPredictive coding
Predictive coding
 
Coding style for good synthesis
Coding style for good synthesisCoding style for good synthesis
Coding style for good synthesis
 
Block Truncation Coding
Block Truncation CodingBlock Truncation Coding
Block Truncation Coding
 
Huffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysisHuffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysis
 
Coding
CodingCoding
Coding
 
Channel coding
Channel coding  Channel coding
Channel coding
 
Huffman Student
Huffman StudentHuffman Student
Huffman Student
 
Channel coding
Channel codingChannel coding
Channel coding
 
Linear block coding
Linear block codingLinear block coding
Linear block coding
 
Linear block code
Linear block codeLinear block code
Linear block code
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similar to Source coding for a mixed source: determination of second order asymptotics

CommunicationComplexity1_jieren
CommunicationComplexity1_jierenCommunicationComplexity1_jieren
CommunicationComplexity1_jieren
jie ren
 
Physics-driven Spatiotemporal Regularization for High-dimensional Predictive...
 Physics-driven Spatiotemporal Regularization for High-dimensional Predictive... Physics-driven Spatiotemporal Regularization for High-dimensional Predictive...
Physics-driven Spatiotemporal Regularization for High-dimensional Predictive...
Hui Yang
 
Kati_Marton Bibliography and more details.
Kati_Marton Bibliography and more details.Kati_Marton Bibliography and more details.
Kati_Marton Bibliography and more details.
draconox80
 
02-VariableLengthCodes_pres.pdf
02-VariableLengthCodes_pres.pdf02-VariableLengthCodes_pres.pdf
02-VariableLengthCodes_pres.pdf
JunZhao68
 
Tele4653 l9
Tele4653 l9Tele4653 l9
Tele4653 l9
Vin Voro
 
Security of continuous variable quantum key distribution against general attacks
Security of continuous variable quantum key distribution against general attacksSecurity of continuous variable quantum key distribution against general attacks
Security of continuous variable quantum key distribution against general attacks
wtyru1989
 
Computing f-Divergences and Distances of High-Dimensional Probability Density...
Computing f-Divergences and Distances of High-Dimensional Probability Density...Computing f-Divergences and Distances of High-Dimensional Probability Density...
Computing f-Divergences and Distances of High-Dimensional Probability Density...
Alexander Litvinenko
 

Similar to Source coding for a mixed source: determination of second order asymptotics (20)

CommunicationComplexity1_jieren
CommunicationComplexity1_jierenCommunicationComplexity1_jieren
CommunicationComplexity1_jieren
 
Physics-driven Spatiotemporal Regularization for High-dimensional Predictive...
 Physics-driven Spatiotemporal Regularization for High-dimensional Predictive... Physics-driven Spatiotemporal Regularization for High-dimensional Predictive...
Physics-driven Spatiotemporal Regularization for High-dimensional Predictive...
 
Itblock2 150209161919-conversion-gate01
Itblock2 150209161919-conversion-gate01Itblock2 150209161919-conversion-gate01
Itblock2 150209161919-conversion-gate01
 
k-MLE: A fast algorithm for learning statistical mixture models
k-MLE: A fast algorithm for learning statistical mixture modelsk-MLE: A fast algorithm for learning statistical mixture models
k-MLE: A fast algorithm for learning statistical mixture models
 
Non-Bayesian Additive Regularization for Multimodal Topic Modeling of Large C...
Non-Bayesian Additive Regularization for Multimodal Topic Modeling of Large C...Non-Bayesian Additive Regularization for Multimodal Topic Modeling of Large C...
Non-Bayesian Additive Regularization for Multimodal Topic Modeling of Large C...
 
Kati_Marton Bibliography and more details.
Kati_Marton Bibliography and more details.Kati_Marton Bibliography and more details.
Kati_Marton Bibliography and more details.
 
RuleML 2015
RuleML 2015RuleML 2015
RuleML 2015
 
main_presentation
main_presentationmain_presentation
main_presentation
 
02-VariableLengthCodes_pres.pdf
02-VariableLengthCodes_pres.pdf02-VariableLengthCodes_pres.pdf
02-VariableLengthCodes_pres.pdf
 
Eighth Asian-European Workshop on Information Theory: Fundamental Concepts in...
Eighth Asian-European Workshop on Information Theory: Fundamental Concepts in...Eighth Asian-European Workshop on Information Theory: Fundamental Concepts in...
Eighth Asian-European Workshop on Information Theory: Fundamental Concepts in...
 
Tele4653 l9
Tele4653 l9Tele4653 l9
Tele4653 l9
 
Computational Information Geometry on Matrix Manifolds (ICTP 2013)
Computational Information Geometry on Matrix Manifolds (ICTP 2013)Computational Information Geometry on Matrix Manifolds (ICTP 2013)
Computational Information Geometry on Matrix Manifolds (ICTP 2013)
 
2023 02 23 DSP Lec 7 v2.pdf
2023 02 23 DSP  Lec 7 v2.pdf2023 02 23 DSP  Lec 7 v2.pdf
2023 02 23 DSP Lec 7 v2.pdf
 
Security of continuous variable quantum key distribution against general attacks
Security of continuous variable quantum key distribution against general attacksSecurity of continuous variable quantum key distribution against general attacks
Security of continuous variable quantum key distribution against general attacks
 
Pres metabief2020jmm
Pres metabief2020jmmPres metabief2020jmm
Pres metabief2020jmm
 
Computing f-Divergences and Distances of High-Dimensional Probability Density...
Computing f-Divergences and Distances of High-Dimensional Probability Density...Computing f-Divergences and Distances of High-Dimensional Probability Density...
Computing f-Divergences and Distances of High-Dimensional Probability Density...
 
Slides: A glance at information-geometric signal processing
Slides: A glance at information-geometric signal processingSlides: A glance at information-geometric signal processing
Slides: A glance at information-geometric signal processing
 
Pre-Cal 40S Slides May 29, 2007
Pre-Cal 40S Slides May 29, 2007Pre-Cal 40S Slides May 29, 2007
Pre-Cal 40S Slides May 29, 2007
 
Kanal wireless dan propagasi
Kanal wireless dan propagasiKanal wireless dan propagasi
Kanal wireless dan propagasi
 
Introduction to Full Counting Statistics
Introduction to Full Counting StatisticsIntroduction to Full Counting Statistics
Introduction to Full Counting Statistics
 

Recently uploaded

CYTOGENETIC MAP................ ppt.pptx
CYTOGENETIC MAP................ ppt.pptxCYTOGENETIC MAP................ ppt.pptx
CYTOGENETIC MAP................ ppt.pptx
Silpa
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Sérgio Sacani
 
Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.
Silpa
 
POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.
Silpa
 
Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Cyathodium bryophyte: morphology, anatomy, reproduction etc.Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Silpa
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptx
seri bangash
 
THE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptx
THE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptxTHE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptx
THE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptx
ANSARKHAN96
 

Recently uploaded (20)

CYTOGENETIC MAP................ ppt.pptx
CYTOGENETIC MAP................ ppt.pptxCYTOGENETIC MAP................ ppt.pptx
CYTOGENETIC MAP................ ppt.pptx
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.
 
GBSN - Microbiology (Unit 3)Defense Mechanism of the body
GBSN - Microbiology (Unit 3)Defense Mechanism of the body GBSN - Microbiology (Unit 3)Defense Mechanism of the body
GBSN - Microbiology (Unit 3)Defense Mechanism of the body
 
POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.
 
300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptx300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptx
 
Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Cyathodium bryophyte: morphology, anatomy, reproduction etc.Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Cyathodium bryophyte: morphology, anatomy, reproduction etc.
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptx
 
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
 
Site Acceptance Test .
Site Acceptance Test                    .Site Acceptance Test                    .
Site Acceptance Test .
 
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .
 
Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdf
 
GBSN - Biochemistry (Unit 2) Basic concept of organic chemistry
GBSN - Biochemistry (Unit 2) Basic concept of organic chemistry GBSN - Biochemistry (Unit 2) Basic concept of organic chemistry
GBSN - Biochemistry (Unit 2) Basic concept of organic chemistry
 
THE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptx
THE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptxTHE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptx
THE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptx
 
Cyanide resistant respiration pathway.pptx
Cyanide resistant respiration pathway.pptxCyanide resistant respiration pathway.pptx
Cyanide resistant respiration pathway.pptx
 
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate ProfessorThyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
 
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
 

Source coding for a mixed source: determination of second order asymptotics

  • 1. Source coding for a mixed source: determination of second order asymptotics arXiv:1407.6616 Felix Leditzky Nilanjana Datta 27 August 2014 QESS, Smolenice
  • 2. Table of Contents Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 2 / 1
  • 3. Fixed-length visible source coding Quantum source: pure-state ensemble {pi , ψi } Visible setting: Alice knows identity of signals ψi → receives classical information in form of label i Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 3 / 1
  • 4. Fixed-length visible source coding Encoding Input Decoding Visible encoder: V : {1, . . . , k} → D(Hc) (can be non-linear!) Hc: compressed Hilbert space with M := dim Hc < dim H. Decoding: D : D(Hc) → D(H) (CPTP map) Goal: Retrieve output state that is close to input state on average Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 4 / 1
  • 5. Fixed-length visible source coding Figure of merit: Ensemble average fidelity ¯F(E, V, D) := i pi Tr((D ◦ V)(i)ψi ) For ∈ (0, 1), a code (V, D, M) is -admissible if ¯F(E, V, D) ≥ 1 − . Definition -error one-shot minimum compression length: m(1), (ρ) := inf{log M | (V, D, M) is an -admissible code} Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 5 / 1
  • 6. Table of Contents Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 6 / 1
  • 7. Mixed source coding Mixed source: emits signals from one of two i.i.d. sources: 1 2 1 2 n n t Source state: ρ(n) = tρ⊗n 1 + (1 − t)ρ⊗n 2 After the first signal, the source sticks to the chosen source. Simple example of a non-i.i.d. protocol For ∈ (0, 1) we define mn, (ρ1, ρ2, t) := m(1), ρ(n) . Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 7 / 1
  • 8. Mixed source coding Goal: determine the second order asymptotics of mn, (ρ1, ρ2, t) Find a and b in the expansion mn, (ρ1, ρ2, t) = na + √ nb + O(log n). Compare: Single source with i.i.d. state ρ(n) = ρ⊗n: Schumacher: a = S(ρ) b given by a Gaussian approximation [Datta, FL] Mixed source with non-i.i.d. source state ρ(n) = tρ⊗n 1 + (1 − t)ρ⊗n 2 is much harder to evaluate! Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 8 / 1
  • 9. Table of Contents Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 9 / 1
  • 10. One-shot bounds Bounds for the minimum compression length in terms of the information spectrum entropy Hs(ρ) := inf{γ ∈ R | Tr(ρ − 2−γ 1)+ ≥ 1 − } Properties: positive for states, quasi-concavity, etc. Source state for a single use of the source: ρ = tρ1 + (1 − t)ρ2 Theorem For ∈ (0, 1), we have m1, (ρ1, ρ2, t) ≈ max H 1 s (ρ1) , H 2 s (ρ2) where i = i ( , t). Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 10 / 1
  • 11. Table of Contents Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 11 / 1
  • 12. Second order asymptotics Key tool: Second order asymptotic expansion of Hs(ρ⊗n): Hs(ρ⊗n ) = nS(ρ) − √ n s(ρ)Φ−1 ( ) + O(log n) s(ρ) := Tr(ρ(log ρ)2 ) − S(ρ)2 is the quantum information variance. Φ−1 ( ) = sup{z ∈ R | Φ(z) ≤ } is the inverse of the cdf of a normal random variable. Goal: determine expansion mn, (ρ1, ρ2, t) = na + √ nb + O(log n). Problem: due to maximum of Hs(ρi ) appearing in one-shot bounds, direct application of the second order expansion is not possible. Solution: distinction between three cases based on the von Neumann entropies S(ρi ) and mixing parameter t. Inspired by classical analysis of mixed sources [Nomura, Han]. Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 12 / 1
  • 13. Second order asymptotics The three cases: abbreviate Si ≡ S(ρi ), si ≡ s(ρi ) Case 1: S1 = S2, s1 < s2, ∈ (0, 1/2) Case 2: S1 > S2, t > Case 3: S1 > S2, t < Main result Let , t ∈ (0, 1) and ρ1, ρ2 ∈ D(H). Case 1: mn, (ρ1, ρ2, t) = nS2 − √ n s2Φ−1 ( ) + O(log n) Case 2: mn, (ρ1, ρ2, t) = nS1 − √ n s1Φ−1 t + O(log n) Case 3: mn, (ρ1, ρ2, t) = nS2 − √ n s2Φ−1 −t 1−t + O(log n) Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 13 / 1
  • 14. References & Acknowledgements References: FL, Nilanjana Datta, “Source coding for a mixed source: determination of second order asymptotics,” arXiv:1407.6616 [quant-ph], 2014. Nilanjana Datta, FL, “Second-order asymptotics for source coding, dense coding and pure-state entanglement conversions,” arXiv:1403.2543 [quant-ph], 2014. Marco Tomamichel, Masahito Hayashi, “A hierarchy of information quantities for finite block length analysis of quantum tasks, IEEE Trans. on Inf. Th. 59, no. 11, 76937710, 2013. Special thanks to Francesco Buscemi, Nilanjana Datta, Will Matthews and David Reeb for valuable feedback. Thank you very much for your attention! Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 14 / 1
  • 15. Second order asymptotics How do we prove this? Key observation: Growth of Hs(ρ⊗n i ) is mainly governed by first order term Si in asymptotic expansion Hs(ρ⊗n i ) = nSi − √ n si Φ−1 ( ) + O(log n). Example: Case 2 By assumption, S1 > S2 and t > . For sufficiently large n, this implies that H 1 s ρ⊗n 1 > H 2 s ρ⊗n 2 for any 1, 2 ∈ (0, 1). Hence, the first source ρ1 dominates in the second order asymptotics of the minimum compression length. Similar assertions hold in Cases 1 and 3. Felix Leditzky (University of Cambridge) Source coding for a mixed source 27 August 2014 15 / 1