Publications by authors named "Karol Lukanowski"

In optical communication, the transmitter encodes information into a set of light states defined by the modulation format, selected to accommodate specific channel conditions and to remain sufficiently distinguishable at the output. Various receiver architectures have been designed to improve the demodulation performance, ultimately limited by quantum theory. In this work, I introduce a new receiver based on a locally optimal greedy algorithm and apply it to pulse position modulation.

View Article and Find Full Text PDF

Rydberg atoms exhibit both remarkable sensitivity to electromagnetic fields making them promising candidates for revolutionizing field sensors and, unlike conventional antennas, they neither disturb the measured field nor necessitate extensive calibration procedures. In this study, we propose a receiver design for data-modulated signal reception near the 2.4 GHz Wi-Fi frequency band, harnessing the capabilities of warm Rydberg atoms.

View Article and Find Full Text PDF

We investigate theoretically coherent detection implemented simultaneously on a set of mutually orthogonal spatial modes in the image plane as a method to characterize properties of a composite thermal source below the Rayleigh limit. A general relation between the intensity distribution in the source plane and the covariance matrix for the complex field amplitudes measured in the image plane is derived. An algorithm to estimate parameters of a two-dimensional symmetric binary source is devised and verified using Monte Carlo simulations to provide super-resolving capability for a high ratio of signal to detection noise (SNR).

View Article and Find Full Text PDF

Device-independent quantum key distribution is a secure quantum cryptographic paradigm that allows two honest users to establish a secret key, while putting minimal trust in their devices. Most of the existing protocols have the following structure: first, a bipartite nonlocal quantum state is distributed between the honest users, who perform local projective measurements to establish nonlocal correlations. Then, they announce the implemented measurements and extract a secure key by postprocessing their measurement outcomes.

View Article and Find Full Text PDF