Article Open Access

The photon identification loophole in EPRB experiments: computer models with single-wing selection

  • EMAIL logo , and
Published/Copyright: November 22, 2017

Abstract

Recent Einstein-Podolsky-Rosen-Bohm experiments [M. Giustina et al. Phys. Rev. Lett. 115, 250401 (2015); L. K. Shalm et al. Phys. Rev. Lett. 115, 250402 (2015)] that claim to be loophole free are scrutinized. The combination of a digital computer and discrete-event simulation is used to construct a minimal but faithful model of the most perfected realization of these laboratory experiments. In contrast to prior simulations, all photon selections are strictly made, as they are in the actual experiments, at the local station and no other “post-selection” is involved. The simulation results demonstrate that a manifestly non-quantum model that identifies photons in the same local manner as in these experiments can produce correlations that are in excellent agreement with those of the quantum theoretical description of the corresponding thought experiment, in conflict with Bell’s theorem which states that this is impossible. The failure of Bell’s theorem is possible because of our recognition of the photon identification loophole. Such identification measurement-procedures are necessarily included in all actual experiments but are not included in the theory of Bell and his followers.

1 Introduction

The debate between Einstein and Bohr, about the foundations of quantum mechanics, resulted in a Gedanken- experiment suggested by Einstein-Podolsky-Rosen (EPR) [28] that was later modified by Bohm (EPRB) [7]. The schematics of this experiment is shown in Figure 1 and involves two wings and two measurement stations. EPR used the quantum mechanical predictions for possible outcomes of this experiment to show that quantum mechanics was incomplete.

Figure 1 Diagram of the EPRB thought experiment. The source S, activated at times labeled by n = 1, 2, …, N, sends a photon to the observation station R1 and another photon to the observation station R2. Depending on the settings of these observation stations represented by unit vectors a1 and a2, the signal going to the left (right) triggers the counters D+, 1 or D–, 1 (D+, 2 or D–, 2).
Figure 1

Diagram of the EPRB thought experiment. The source S, activated at times labeled by n = 1, 2, …, N, sends a photon to the observation station R1 and another photon to the observation station R2. Depending on the settings of these observation stations represented by unit vectors a1 and a2, the signal going to the left (right) triggers the counters D+, 1 or D–, 1 (D+, 2 or D–, 2).

Many years later, John S. Bell derived an inequality for the possible outcomes of EPRB experiments that he perceived to be based only on the physics of Einstein’s relativity [6]. Bell’s inequality, as it was henceforth called, seemed to contradict the quantum predictions for EPRB experimental outcomes altogether [6].

Experimental investigations, following Bell’s theoretical suggestions, provided a large number of data that were violating Bell-type inequalities and climaxed in the suspicion of a failure of Einstein’s physics and his basic understanding of space and time [3, 12, 15, 57, 89].

Central to these discussions and questions are the correlations of space-like separated detection events, some of which are interpreted as the observation of a pair of entities such as photons. The problem of classifying events as the observation of a “photon” or of something else is not as simple as in the case of say, billiard balls. The particle identification problem is, in fact, key for the understanding of the epistemology of correlations between events.

What do we know about such correlations of space-like separated events? Popular presentations of Bell’s work typically involve two isolated agents (Alice, Bob) at separated measurement stations (Tenerife, La Palma), who just collect data of local measurements. But how does Alice know that she is dealing with a particle of a pair of which Bob investigates the other particle? She is supposed to be totally isolated from Bob’s wing of the experiment in order to fulfill Einstein’s separation and locality principle! The answer is that neither Alice nor Bob know they deal with correlated pairs if their stations are completely separated from each other and have no space-time knowledge of the other wing ever.

In his papers on the EPRB experiment, Bell did not address this fundamental question but considered correlated pairs as given, without any trace of the tools of measurement and of space-time concepts that are both necessary to accomplish the identification of events. He then claimed to have discovered a conflict between his theoretical description and the quantum theoretical description of the EPRB thought experiment [6]. As a consequence of this discovery, much research was devoted to

  1. the actual derivation of Bell-type inequalities from Einstein’s framework of physics (particularly his separation principle that derives from the speed of light in vacuum (c being the limit of all speeds) and Kolmogorov’s probability theory [59],

  2. designing and performing laboratory experiments that provide data that are in conflict with the Bell-type inequalities,

  3. constructing mathematical-physical models, at times supported by computer simulations that entirely comply with Einstein’s and Einstein’s separation principle, that do not rely on concepts of quantum theory, and are nevertheless in conflict with the Bell’s theorem.

Bell’s theory, and the theories of all his followers, including Wigner, do not deal with the identification of the correlated particles and assume that they are known automatically, so to speak per fiat. But the knowledge of pairing requires additional data or additional channels of information. These additional data may be measurement times, certain thresholds for detection and many other elements of the physical reality of the experiments in both wings. It is important to note that these data must involve measurements in both stations and are necessarily influencing the possible knowledge of the correlations of the single measurements in these stations. In the case of atomic or subatomic measurements the measurement equipment does not only influence the single outcomes as Bohr has taught us, but correlated measurement equipment (such as synchronized clocks or instruments that determine thresholds) also influence the knowledge of correlations of these single outcomes. It is this extension of the Copenhagen view that leads to a loophole in Bell’s Theorem, the photon identification loophole. The violations of Bell-type inequalities described in this paper are based on this loophole.

Bell and followers envisage that the correlations may be measured in the laboratory in complete separation and, therefore, physical models of the Bell opponents must only use the measurements of two completely separated wings operated by Alice and Bob who know nothing of each other. As just explained, correlations of spatially separated events can only be conceived by involving the human-invented space-time system in order to demonstrate the pairing, the knowledge that measurements of particles belong together. Therefore, correlations can only be determined in a consistent way under the umbrella of a given space-time system that encompasses the two or more measurement stations. This space-time system that all experimenters subscribe to enables us to ban spooky influences out of science, particularly for the EPR experiments that Einstein constructed for the purpose to show this fact.

We maintain that it is highly non-trivial to identify (correlated) photons by experimental methods and that this identification involves, at least in some way, a space-time system, a system developed by the human mind and agreed upon by all experimenters and evaluators of the Bell-type experiments. In fact, the identification of particle pairs requires certain knowledge of the space-time properties of all the experimental equipment involved. This knowledge must necessarily extend to measurement stations far from each other and is, therefore, “non-local”. Of course, this non-local knowledge does not imply that there are non-local physical influences on the data measured in the two wings. In EPRB experiments [34, 38, 85, 89], great care is taken to rule out the possibility that the observed correlations are due to physical influences that travel with velocities not exceeding the speed of light in vacuum. But without that non-local knowledge, only spooky influences are left as a possibility for connecting events in the two experimental wings. A space-time knowledge of all involved equipment is nevertheless required to apply the scientific method.

2 Aim and structure of the paper

As explained above, it is essential that the identification of photons is included into any meaningful theoretical model of an EPRB experiment because otherwise, the model is too simple to describe this experiment. Failing to do so, only spooky influences can explain the observed pair correlations. Specifically, omitting the inclusion of data which select the photons and/or pairs opens an Einstein-local loophole, which we call henceforth the photon identification loophole. By design, Bell-type models for the recent experiments that claim to be loophole free [34, 85] suffer from this loophole.

The main aim of this paper is to show that by exploiting this loophole, or formulated more positively, by constructing a model that captures the essence of these recent laboratory experiments [34, 85], a manifestly non-quantum computer simulation of an Einstein-local model that employs the same local photon identification method in each wing of the EPRB experiments as in recent EPRB experiments [34, 85], yields the photon pair correlation of a pair of photons in the singlet state (of their polarizations), in blatant contradiction with Bell’s theorem.

The paper is structured as follows. Section 3 argues that a simulation on a digital computer is a perfect laboratory experiment with a physically existing device and can therefore be used as a metaphor for other laboratory experiments. The material in this section forms the conceptual basis for developing computer simulation models of the recent EPRB experiments [34, 85].

Section 4 discusses the relevance of counterfactual definiteness (CFD) in relation to the derivation of Bell-type inequalities and hence also for computer simulation models that yield data that are in conflict with these inequalities. In Section 5, we introduce a CFD-compliant computer simulation model of the recent EPRB experiments [34, 85]. We discuss the correspondence of the essential elements of the latter with those of the simulation model but refrain from plunging into the details of the algorithm itself.

Section 6 gives a simple, rigorous proof that operationally but not conceptually, photon identification in each wing by a local voltage threshold [34], photon identification in each wing by a local time window, and photon identification by time-coincidence counting are all mathematically equivalent. In Section 7, we discuss the consequences of excluding from a model, at least one feature that is essential for an experiment to yield useful data. We argue that Bell-type models, which are believed to be relevant for the description of recent EPRB experiments [34, 85], suffer from the photon identification loophole in a dramatic manner.

Section 8 is devoted to a simple proof that the simulation model introduced in Section 5 is CFD-compliant. In Section 9, we give a simple derivation of the Bell [5], Clauser-Horn-Shimony-Holt (CHSH) [14], Eberhard [27], and Clauser-Horn (CH) [13] inequalities for real data, not for the imagined data produced by probabilistic models (which are discussed in the Appendix) and in Section 10 we present a more general inequality that accounts for the local photon identification procedure, employed in the laboratory experiments.

In section 11, we specify the computer simulation algorithm and the simulation procedure in full detail. A representative collection of simulation results is presented in section 12. The main conclusion from these simulations is that a non-quantum model that employs the same photon identification method in each wing of the EPRB experiments as the one used in recent EPRB experiments [34, 85], reproduces the results of quantum theory of the EPRB thought experiment.

In section 13, we argue that all EPRB laboratory experiments with photons can be viewed as a tool to characterize the response of the observation stations, leading to the conclusion that this response, in particular the local photon identification rate, depends on the settings of these stations, consistent with the assumptions made in constructing the simulation model and debunking the hypothesis that the observed pair correlations can be explained by non-local influences only. The paper ends with section 14 which contains our conclusions.

3 Metaphor for a perfect laboratory experiment

An important, characteristic feature of digital computers is that their logical operation does not depend on the technology that is used to construct the machine. These days, the first thing that comes to mind when talking about digital computers are the electronic machines based on semiconductor technology but it is a fact that, although not cost-effective nor particularly useful in practice, digital computers can also be built from mechanical parts, e.g. Lego™ elements.

In former times, one could read off the state of the computer’s internal registers from a LED display. Although not practical at all, in principle one could use a huge LED display to show the internal state of the whole computer. This is only to say that there is a one-to-one mapping from the state of the computer to sense impressions (e.g. light on/off). Therefore, the metaphor also offers unique possibilities to confront man-made concepts and theories with actual facts, i.e. real perfect experiments, because it guarantees that we have a well-defined, precise representation of the concepts and algorithms (both in terms of bits) involved that directly translate into sense impressions.

In the analysis of laboratory EPRB experiments, it is essential that all the important degrees of freedom that affect the data analysis are identified and included, otherwise the conclusions drawn from an incomplete analysis may be wrong [36]. Computer simulation puts us in the position to perform experiments under the same mathematical conditions for which e.g. Bell-type inequalities can be derived, simply because we can carry out real, perfect experiments that are void of any unknown elements that may affect the results and analysis.

A digital computer is a physical (electronic or mechanical) device that changes its physical state (by flipping bits) according to well-defined rules (the algorithm). Therefore, assuming that the machine is operating flawless for the time period of interest (a very reasonable assumption these days), executing an algorithm on a digital computer is a physics experiment in which there are no unknown elements of physical reality that might affect the outcome. In this sense, the “digital computer + algorithm” can be viewed as a metaphor for a perfected laboratory experiment, a discrete-event simulation that represents the so called “loophole-free” EPRB experiments [34, 85].

Starting with Bell’s work [5], most theoretical work on the subject matter is based on probability theory. This mathematical framework contains conceptual elements (probability measures and infinitesimals) that are outside the domain of our sensory experiences and have no counterpart in our physical world. Therefore, to avoid pitfalls, we first devise an algorithm that simulates the perfect laboratory experiment and then construct a probabilistic model of this algorithm. A graphical representation of the modeling philosophy that we adopt in this paper is shown in Figure 2. Note that our approach starts from the experiments and results in a theory, which we believe is the only direction one should go. In contrast, Bell’s approach was the design of an experiment starting from his theoretical point of view.

Figure 2 Diagram indicating the direction of the modeling process adopted in this paper. An algorithm executing on a digital computer is an instance of an experiment on a physically existing device, a metaphor for a perfect laboratory experiment in which there are no  unknown influences.
Figure 2

Diagram indicating the direction of the modeling process adopted in this paper. An algorithm executing on a digital computer is an instance of an experiment on a physically existing device, a metaphor for a perfect laboratory experiment in which there are no unknown influences.

4 Counterfactual definiteness

Counterfactual reasoning plays a significant role in the literature related to Bell’s work and is seen by many a conditio sine qua non to derive Bell-type inequalities [18, 40, 56, 67]. However, as explained below, the actual EPRB experiments do not permit any proof of CFD compliance. This fact demonstrates an unexpected conceptual advantage of computer experiments. We can turn on and off CFD compliancy at will in our algorithm and simulate the consequences and thus distinguish the precise conditions that may or may not lead to violations of Bell-type inequalities. This is our reason to dedicate significant sections of this paper to counterfactual definiteness (CFD) as defined below, and include CFD-compliant models at the side of more faithful models of the actual EPRB experiments.

So called counterfactual “measurements” yield values that have been derived by means other than direct observation or actual measurement, such as by calculation on the basis of a well-substantiated theory. If one knows an equation that permits deriving reliably, output values from a list of inputs to the system under investigation, then one has “counterfactual definiteness” (CFD) in the knowledge of that system [79].

The word “counterfactual” is a misnomer [79] but is well established. It is therefore helpful to have a clear-cut operational definition of what is meant with CFD. In essence, CFD means that the output state of a system, represented by a vector of values y, can be calculated using an explicit formula, e.g. y = f(x) where f(.) is a known vector-valued function of its argument x. If x denotes a vector of values, the elements of this vector must be independent variables for the mathematical model to be CFD-compliant [23, 40].

In laboratory EPRB experiments, every trial takes place under different conditions, different settings etc. which may or may not affect the outcome of a single trial. Mathematically, we may express this dependence as y = F(x, C, U) where now F(.) is a vector-valued function of its arguments and C and U represent the known conditions/settings and unknown influences, respectively. In general, there is no reason why U should be a constant from trial to trial. In other words, F(.) is unknown. Therefore, data produced by laboratory EPRB experiments (or any other laboratory experiments) cannot, as a matter of principle, be cast in the form of data generated by a CFD-compliant model. On the other hand, performing computer experiments in a CFD-compliant manner is not difficult nor is it much work to change a CFD-compliant algorithm into one that does not meet all the requirements of CFD simulation. In other words, computer experiments can be carried out in both CFD and non-CFD mode, providing quantitative information about the differences of these two modes of modeling.

In the realm of finite sets of two-valued data, a strict derivation of Bell-type inequalities [5, 6], such as the Bell-CHSH [5, 14] and Eberhard’s inequalities [27] require that these data are generated in a CFD-compliant manner [23, 40]. In other words, CFD is a prerequisite for deriving Bell-type inequalities. Therefore, to test whether or not a simulation model produces data that do not satisfy such inequalities, it is necessary to perform a CFD-compliant simulation. Otherwise, there is no mathematical justification for the hypothesis that these data should satisfy Bell-type inequalities in the first place. Of course, we can always revert to the non-CFD algorithm and check if e.g. averages exhibit the same features as the averages obtained from the CFD-compliant algorithm (see section 12).

In an earlier paper [23], we have adopted this strategy to demonstrate that in the case of EPRB experiments,

  1. CFD-compliant simulations can reproduce the averages and correlation of two particles in the singlet state,

  2. CFD does not distinguish classical from quantum physics because our computer models do not contain any quantum concepts, yet yield results that lead to conclusions (e.g. entanglement) that are commonly regarded as signatures of quantum physics.

In this paper, we adopt the same strategy. We construct a CFD-compliant simulation model of the laboratory experiments [34, 85], meaning that we simulate a perfected, idealized realization of these laboratory experiments. Of course, this does not mean that we omit essential features of the laboratory experiments. These features have to be included, otherwise the simulation model is not applicable to these laboratory experiments. see section 7 for a general discussion of this aspect.

5 Computational model of the laboratory experiments [34, 85]

In this section, we introduce the essential elements of the simulation model of the laboratory experiments reported in Ref. [34, 85]. The details of the simulation algorithm are given in section 11. For concreteness, we adopt the terminology that is used in Ref. [34] when we connect the elements of the simulation model to those of the laboratory experiments.

As shown in Figure 1, in a typical EPRB experiment there are three different components. There is a source and there are two observation stations. The algorithm that simulates the source is described in full detail in section 11. In this section, we focus on the observation stations which, because we are performing “perfected” experiments, are assumed to be identical.

5.1 Observation station

In Figure 3, we show a graphical representation of the function of an observation station. Input to an observation station is the setting a (representing the orientation of the polarizer), two numbers 0 ≤ r, r^ < 1 taken from a list of uniform random numbers (see section 11 for further details) and an angle 0 ≤ ϕ < 2π (representing the initial polarization of the photon). Output of the observation station is a two-valued variable x = ± 1 and a detector-related variable vminvvmax.

Figure 3 Block diagram of an observation station. The specific form of the input-output relations x = x(a, ϕ, r) and v = v(a, ϕ, r^$\widehat {r\,}$) is not important to follow the discussion on the conceptual level and is only essential to perform the simulations reported in this paper. These relations are defined by Eqs. (19) and (20) in section 11.
Figure 3

Block diagram of an observation station. The specific form of the input-output relations x = x(a, ϕ, r) and v = v(a, ϕ, r^) is not important to follow the discussion on the conceptual level and is only essential to perform the simulations reported in this paper. These relations are defined by Eqs. (19) and (20) in section 11.

The correspondence between the data produced by the experimental realization of an observation station and those generated by the computational model is as follows. The variable x encodes the detector outcomes (either D+, i or D-, i in station i = 1, 2) that fired. In the laboratory experiments [34, 85] there is only one detector in each station but in the computer experiment we can easily simulate the complete EPRB experiment (see Figure 1), hence we consider both the “+” and “-” events. The variable v represents the voltage signal produced by the electronics that amplifies the transition-edge detector current (see the description in section IV of the supplementary material to Ref. [34]).

If necessary, we label different events by attaching the subscript i = 1, 2 of the observation station and/or the subscript k where k = 1, …, N and N denotes the total number of input events to a station. In full detail, for the kth input at station i, the observation station i generates the output values xi = xi(ai, ϕi, k, ri, k) and vi = vi(ai, ϕi, k, r^i,k) according to the rules which will be specified in full detail in section 12. Occasionally, we write xi(ai) = xi(ai, ϕi, k, ri, k) and vi(ai) = vi(ai, ϕi, k, r^i,k) to simplify the notation while still emphasizing that the x’s and v’s only depend on variables that are local to the respective station.

5.2 Photon identification

In the following, we use the term detection event whenever the negative voltage signal produced by the electronics that amplifies the transition-edge detector current is smaller (we are dealing with negative voltages) than the “trigger threshold” (terminology from Ref. [34] (supplementary material)), and speak of the observation of a photon whenever the same negative voltage signal is smaller than the “photon identification threshold” (about 4/3 times the “trigger threshold”) (terminology from Ref. [34] (supplementary material)).

From the description of the laboratory EPRB experiments under scrutiny, it follows immediately that not every detection event is regarded as the observation of a photon [34, 85]. Indeed, after all the voltage traces of an experimental run have been recorded, a part of the collected trace is analyzed by software, the photon identification thresholds are “calibrated” and assuming that the relevant properties of the whole set of traces is stationary in real time, the remaining set of traces is analyzed [34]. In Ref. [34] there is no specification of the cost function that is being minimized by the calibration procedure whereas Ref. [85] (supplementary material) explicitly states that “Because the experiment was calibrated to maximize violation of the CH inequality…”. This seems to suggest that the software is designed to adjust the photon identification thresholds such that the desired result, namely a violation of a Bell-type inequality, is obtained.

In our simulation approach, we may assume that all units are identical. Therefore, unlike in Ref. [34], one and the same value of photon identification threshold, denoted by 𝓥, can be used to identify photons. The effect of the photon identification threshold is captured by the function

w(ai)=wi(ai,ϕi,k,r^i,k)=Θ(Vvi),i=1,2,(1)

where Θ(x) is equal to one if x > 0 and is zero otherwise. Recall that, as in Ref. [34], 𝓥 is negative. In the simulation, we do not “calibrate” 𝓥 but simply generate the data and analyze the results as a function 𝓥.

The correspondence with the data collected in the laboratory experiment is as follows: a detection event is represented by xi(ai) = +1 and wi(ai) = 0 and the observation of a photon in station i = 1, 2 is represented by xi(ai) = +1 (because there is only one, not two, transition-edge detectors at each station) and wi(ai) = +1 (implemented in software), both exactly as in the simulation model. Recall, and this is new and important, that also in the simulations the photon identification is performed locally, i.e. without communication between the observation stations.

6 Equivalence of local time-window and time-coincidence processing

In this section we show that in spite of the conceptually very different setup, from an operational point of view, employing local photon identification thresholds is equivalent to local time-window selection and also to time-coincidence counting that is used in most EPRB experiments with photons [3, 15, 57, 89].

As explained above, in the laboratory experiments a detection event is classified as being a photon if the (negative) voltage signal, denoted by v, produced by the electronics that amplifies the transition-edge detector current (see the description in section IV of the supplementary material to Ref. [34]) is smaller than the photon identification threshold 𝓥. This rejection criterion is implemented through Eq. (1) from which it follows directly that the criterion to observe a photon in these laboratory experiments is v ≤ 𝓥. Recall that we adopted the convention of the laboratory experiments [34] in which 𝓥 takes negative values.

In practice, we have vminvivmax and vmin ≤ 𝓥 ≤ vmax with finite vmin and vmax, hence the condition for counting a detection event as photon may be written as

0vivminvmaxvminVvminvmaxvmin,i=1,2.(2)

Defining a dimensionless “time” ti ≡ (vivmin)/(vmaxvmin) and a dimensionless “time window” W = (𝓥 − vmin)/(vmaxvmin), Eq. (2) reads

0tiW,i=1,2,(3)

which expresses the condition to observe a photon at station i = 1, 2 in terms of locally defined time slots of size W. From Eq. (3) we have −t2t1t2Wt2 and using −W ≤ −t2 we find

|t1t2|W,(4)

which is exactly the same criterion as the one used in most EPRB experiments with photons [3, 15, 57, 89] (with t1, t2 and W representing physical times in that case) and in computer simulation models thereof [19, 20, 22, 23, 24, 25, 26, 78, 90].

In summary: although physically very different, local voltage thresholds, local time windows or time-coincidence counting are mathematically equivalent and all serve the same purpose, namely to give an operational meaning to the statement “a single photon (pair)” has been identified.

7 Loopholes in experimental tests of Bell’s theorem

A useful model of an experiment needs to encompass all relevant parameters that affect the experimental outcomes and, of course, the most important elements of physical reality, namely the data itself. Specifically, a physical theory that describes pair-correlations of space-like separated systems, must account for and include all procedures that determine the detection of the particles and the knowledge which pair of particles and data belongs together. Therefore, any model which purports to describe the laboratory experiments [34, 85] that we consider in this paper must necessarily account for the photon identification threshold mechanism that is instrumental in the data-processing step of these experiments, see section 5.2. Likewise, the earlier generation of EPRB experiments that employ time coincidence to identify pairs [3, 13, 89] can only be faithfully be described by models that incorporate the time-coincidence window selection process that is an essential component of this class of experiments [19, 20, 22, 23, 24, 25, 26, 78, 90].

Drawing a conclusion about a world view from models (such as those of Bell and his followers, see the Appendix) that do not properly account for the photon identification threshold mechanism which, in the laboratory experiments [34, 85], is essential for identifying the photons, requires a drastic departure from rational reasoning. If we allow for such a departure, we might equally well wonder what it means for our world view when we construct and analyze a model of an airplane that excludes the engines and then observe that a real airplane can take off by itself. Any reasonable person would rightfully question our ability to represent the airplane (or laboratory experiments) by such a model and regard the idea that we may have to change our world because of the contradictions to such a model as unfounded. In other words, the only logically correct conclusion that one can draw from the failure of Bell-type models to describe the qualitative features of the experimental data is that these models are too simple.

The photon-identification loophole that we introduce in this paper accounts for

  1. the fact that laboratory experiments [34, 85] employ a threshold to decide whether or not a detection event is considered to be a photon,

  2. the assumption that voltage signals produced by the detection equipment may depend on the analyzer setting (see Eq. (1)). Regarding this latter assumption, it is of interest to recall that since the early days of the Bell-test experiments, it is well-known that application of Bell-type models requires at least one extra assumption. We reproduce here the relevant passage from Ref. [13] (p.1890): “The approach used by CHSH is to introduce an auxiliary assumption, that if a particle passes through a spin analyser, its probability of detection is independent of the analyser’s orientation. Unfortunately, this assumption is not contained in the hypotheses of locality, realism or determinism.”

  3. the requirement that a relevant model of an experiment needs to encompass all elements that affect the experimental outcomes.

There is a large body of theoretical work that considers all kinds of loopholes in experiments that must be closed before a definite conclusion about the consequences of Bell inequality tests for certain wold views can be drawn. A detailed, comprehensive discussion of a large collection of loopholes is given in Ref. [68]. Also in this respect, the digital computer – laboratory experiment metaphor offers unique possibilities because we can open and close loopholes at will. As this and our earlier paper [23] demonstrate, computer simulation models of EPRB experiments can easily be engineered to be free of e.g. detection, coincidence, and memory loopholes [68] and, in addition, include features such as CFD compliance that close the contextuality loophole [75, 76, 77].

Wrapping up: in this paper we construct a minimal model of the perfected version of the laboratory experiment [34]. With the exception of the photon-identification loophole, this minimal model is free of the known loopholes and reproduces the quantum results of the EPRB thought experiment, from which violations follow automatically. This approach offers the unique possibility to confront all kinds of reasonings and assumptions, such as the (ii) above, with actual facts.

8 CFD compliance

In section 5, the operation of the simulation model of an observation station has been defined such that for every input event (a,ϕ,r, r^), we know the values of all outputs variables x = x(a,ϕ,r) and v = v(a,ϕ,r^). Therefore, the input-output relation of this unit, represented by the diagram of Figure 3, satisfies the requirement of a CFD-compliant model.

The computational equivalent of the EPRB experiments [34, 85] is shown in Figure 4. Each time the source S is activated, it sends one entity carrying the data ϕ1 to station 1 and another entity carrying the data ϕ2 to station 2. The procedure for generating the ϕ’s, r’s and r^’s is specified in section 12.

Figure 4 Schematic layout of the computational equivalent of the laboratory EPRB experiments reported in Refs. [34, 85]. The input-output relation for i = 1,2 is given by xi = xi(ai,ϕi,ri) and vi = vi(ai,ϕi,
r^i$\begin{array}{}
\widehat{r\,}_i
\end{array} $) defined by Eqs. (19) and (20). Alternatively, the input-output relation may be written as (x1,v1,x2,v2) = F(a1,a2,ϕ1,ϕ2,r1,r2,
r^1,r^2$\begin{array}{}
\widehat{r\,}_1,\widehat{r\,}_2
\end{array} $) showing that for fixed (a1,a2) the simulation model satisfies the definition of a CFD theory [40].
Figure 4

Schematic layout of the computational equivalent of the laboratory EPRB experiments reported in Refs. [34, 85]. The input-output relation for i = 1,2 is given by xi = xi(ai,ϕi,ri) and vi = vi(ai,ϕi, r^i) defined by Eqs. (19) and (20). Alternatively, the input-output relation may be written as (x1,v1,x2,v2) = F(a1,a2,ϕ1,ϕ2,r1,r2, r^1,r^2) showing that for fixed (a1,a2) the simulation model satisfies the definition of a CFD theory [40].

Upon arrival of the entities, observation stations i = 1,2 execute their internal algorithm (completely specified by Eqs. (19) and (20)) and produces output in the form of the pair (xi,vi). The scheme represented by Figure 4 computes the vector-valued function

x1v1x2v2=x1=x1(a1,ϕ1,r1)v1=v1(a1,ϕ1,r^1)x2=x2(a2,ϕ2,r2)v2=v2(a2,ϕ2,r^2)=F(a1,a2,ϕ1,ϕ2,r1,r2,r^1,r^2),(5)

which clearly defines a CFD-compliant model. Nevertheless, with this CFD-compliant model we cannot construct the quadruple (x1,x2, x1,x2) in a CFD-compliant manner. Indeed, by construction, there is no guarantee that the (ϕi,k,ri,k)’s that determine say the x1’s for the pair of settings (a1,a2) will be the same as the (ϕi,k,ri,k)’s that determine that values of the x1’s for the pair of settings ( a1,a2). Of course, with a simulation on a digital computer being an ideal, fully controllable experiment, we could enforce CFD-compliance by re-using the same (ϕi,k,ri,k, r^i,k)’s for every pair of settings. This would make the simulation CFD-compliant. However, in this paper we do not so but instead generate new values of the (ϕi,k,ri,k, r^i,k)’s for every new instance of input.

The layout of a CFD-compliant computer model of the EPRB experiment is depicted in Figure 5. It uses the same units as the model shown in Figure 4, the only difference being that the input ϕi is now fed into an observation station with setting ai and into another one with setting ai, something which, for obvious reasons, is impossible to realize in laboratory experiments with photons. As each of the four units operates according to the rules given by Eq. (19) and (20), we have (x1,x1,x2,x2)=X(a1,a1,a2,a2,ϕ1,ϕ2,r1,r2) and (v1,v1,v2,v2)=T(a1,a1,a2,a2,ϕ1,ϕ2,r^1,r^2). As the arguments of the functions X and T are independent and may take any value out of their respective domain, the whole system represented by Figure 5 satisfies, by construction, the criterion of a CFD theory.

Figure 5 Computational model for the EPRB experiment satisfying the criterion of a CFD theory.
Figure 5

Computational model for the EPRB experiment satisfying the criterion of a CFD theory.

Note that the actual EPRB experiments produce only pairs of data. The three pairs of data considered by Bell involve, therefore, six local measurements and the four pairs of CHSH involve eight local measurements. Our CFD compliant model considers only quadruple (= four local) measurements to simulate the actual eight possible measurement outcomes of a CHSH type experiment.

9 Bell-type inequalities

It is evident from the formulation of his model that Bell and all his followers, including Wigner, do not deal with the issue of identifying particles and take for granted that the measured pairs correspond to the correlated particles. The common prejudice that additional variables cannot possibly defeat Bell-type inequalities is based on the assumption that all sent out correlated pairs, or a representative sample of them, are measured. This reasoning does not account for the photon identification or pair-modeling loophole: the necessary particle or pair identification may necessarily select in a way that is not representative for all possible measurements of all possible pairs emanating from the source. In this section, we adopt Bell’s viewpoint by ignoring the v-variables and demonstrate that CFD-compliance and the existence of Bell-type inequalities are mathematically equivalent.

Figure 5 shows the CFD compliant arrangement of the computer experiment. The two stations on the left of the source S receive the same data ϕ1 from the source. The settings a1 and a1 are fixed for the duration of the N repetitions of the experiment. The same holds for the two stations on the right of the source, with subscript 1 replaced by 2. Clearly, the algorithm represented by Figure 5 generates quadruples of output data (x1, x1,x2, x2) in a CFD-compliant manner.

For any such quadruple (x1, x1,x2, x2) in which the x’s only take values +1 and -1, it is straightforward to verify that the following equalities hold:

b1=x1x1+x1x2+x1x2=1+3(6)
b2=x1x1+x1x2+x1x2=1+3(7)
b3=x1x2+x1x2+x2x2=1+3(8)
b4=x1x2+x1x2+x2x2=1+3(9)
s=x1x2x1x2+x1x2+x1x2=2+2.(10)

Other equivalent sets of equalities can be obtained by replacing e.g. x1 by −x1 etc. Note that e.g. Eq. (6) follows from Eq. (10) if we set x2.

In a non-CFD setting, the data is collected as four pairs which we may denote as (x1,x2), (1,x2), ( x1,2), and ( x~1,x~2) where the tilde is used to indicate that the value of e.g. x1 obtained with setting (a1, a2) may be different from the one obtained with setting (a1,a2). Instead of Eq. (10), we now consider the expression = x1x21x2 + x12 + x~1,x~2 = −4,−2,0,+2,+4 and similar ones for 1,…,4, each of them taking values −3,−1,+1,+3. If we now impose that = −2,+2 and 1…,4 = −1,3, simple enumeration of all possible values of the x’s and the ’s shows that in order for all equalities to be satisfied simultaneously we must have x~1=x1,x~1=x1,x~2=x2,x~2=x2.. In other words, imposing the constraints = −2,+2 and 1 = −1,3,…,4 = −1,3 on data obtained in a non-CFD setting forces this data to form quadruples, i.e. to be CFD compliant. It then follows immediately that CFD is necessary and sufficient for the equalities Eqs. (6)(10) to hold.

Attaching the subscript k (k = 1,…,N) to label the events, the algorithm generates the set of quadruples {(x1,k,x1,k,x2,k,x2,k)|k=1,,N}. Introducing the Bell-CHSH function

S^=1Nk=1Nsk,(11)

it follows immediately from |sk| = 2 (see Eq. (10)) that | S^| ≤ 2 for all N ≥ 1, that is we obtain the Bell-CHSH inequality constraining four correlations of pairs of actual data. Put differently, if the output consists of quadruples of two-valued data generated by the setup shown in Figure 5 and we ignore the v-variables then the Bell-CHSH inequality | S^| ≤ 2 is always satisfied, independent of the number of events N ≥ 1 considered.

Similarly, from the fact that for example b1,k = −1,3 we obtain the Leggett-Garg inequality [41, 69] for three correlations of pairs of actual data and by combining b1,k = −1,3 with the equalities obtained by substituting x1 → −x1 we obtain the Bell inequality involving three correlations of pairs of actual data [5]. In other words, Bell-type inequalities follow directly from the fact that quadruples of data satisfy rather trivial arithmetic identities such as Eq. (10).

It then also follows immediately that CFD is a necessary and sufficient condition for the data (x1,k,x2,k), (x~1,k,x2,k),(x1,k,x~2,k), and (x~1,k,x~2,k) with k = 1,…,N to satisfy simultaneously for all N ≥ 1, all Bell-type inequalities involving three and four different correlations of pairs. We emphasize that this conclusion follows from elementary arithmetic only. Concepts such as “locality” or any other physical argument are irrelevant for establishing this result.

Similar reasoning yields Eberhard’s inequality which differs from the Bell-CHSH inequality in the sense that it can account for reduced detector efficiencies [27]. For convenience of comparison with the original work, we temporarily adopt Eberhard’s parlance and notation. Central to Eberhard’s derivation is the so-called fate of a photon. This fate can be either detected in the ordinary beam (labeled o), or detected in the extraordinary beam (labeled e), or undetected (labeled u). For counting purposes, we represent the fate of a photon by the symbol f, taking the values +1, 0, and −1 corresponding to o, u and e, respectively. Introducing the variables no = f(f+1)/2, ne = f(f−1)/2, and nu = (1−f2), it is clear that one of them takes the value 1 with the other two taking the value 0. For a given pair of settings, say (α1,β2), the number of pairs with both photons suffering fate (o) is then given by noo(α1,β1) = no(α1)no(β1) = f1,1(f1,1+1)f2,1(f2,1+1)/4 where f1,1 = f1,i(αi) and f2,i = f2,i(βi) for i = 1,2. There are similar expressions for neo(α1,β2), nuo(α1,β2), etc. Following Eberhard, we consider the expression [27]

j=noe(α1,β2)+nou(α1,β2)+neo(α2,β1)+nuo(α2,β1)+noo(α2,β2)noo(α1,β1).(12)

It is straightforward to enumerate all possible 81 values of the 4 different f-variables that appear in Eq. (12). This enumeration proves that j ≥ 0, independent of the values of the settings. Attaching the subscript k (k = 1,…,N) to label the events as we did to derive the Bell-CHSH inequality and introducing the Eberhard function

JEberhard=k=1Njk,(13)

it follows immediately that JEberhard ≥ 0 for all N ≥ 1.

In the laboratory experiments [34, 85] there is only one detector per observation station. Hence it makes sense to regard also say, the e photons, as undetected. In terms of the “fate” variables f introduced above this amounts to letting f taking the values +1 and 0 corresponding to o and u, respectively. Instead of Eq. (12), we now consider the expression

jCH=nou(α1,β2)+nuo(α2,β1)+noo(α2,β2)noo(α1,β1).(14)

Enumerating all possible 16 values of the 4 different f-variables that appear in Eq. (13) proves that jCH ≥ 0, independent of the values of the settings. Attaching the subscript k (k = 1,…,N) to label the events as before and introducing the CH function

JCH=k=1NjCH,k,(15)

it follows immediately that the CH inequality [13] JCH ≥ 0 holds for all N ≥ 1.

In short: if for all N, the x’s (f’s) are generated according to a CFD-compliant procedure the Bell-CHSH (the Eberhard and CH) inequality is (are) satisfied. In essence, this result is embodied in the work of George Boole [8], see also Ref. [21, 83]. Moreover, as CFD implies that all Bell-type inequalities hold for all N ≥ 1, there is no room for speculating without violating at least one of the rules of Aristotelian logic that something “spooky” is going on if we encounter data that violate a Bell-type inequality. The logically correct conclusion that one can draw from such a violation is that these data have not been generated in a CFD-compliant manner.

10 An inequality accounting for photon identification

In this section, we address the modifications to the inequality |S^| ≤ 2 that ensue when we take into account the fact that laboratory experiments employ the photon identification threshold to decide whether or not a detection event corresponds to the observation of a photon.

The average detection event counts and detection event pair correlation are given by

E^i(ai)=1Nxi(ai),i=1,2E^(a1,a2)=1Nx1(a1)x2(a2),(16)

respectively, and we have similar expressions for the other choices of settings. In Eq. (16) and in the equations that follow, it is understood that ∑ means k=1N, i.e. the sum over all input events, represented by values of the ϕ’s. As shown in section 9, if the x’s that enter Eq. (16) have been obtained by a CFD-compliant procedure, the correlations E^(a1,a2),… satisfy Bell-type inequalities.

In contrast to Eq. (16), the average photon counts and photon pair correlation for the settings (a1,a2) are given by

Ei(ai)=w(ai)xi(ai)w(ai),i=1,2E(a1,a2)=w(a1)w(a2)x1(a1)x2(a2)w(a1)w(a2),(17)

where, as explained in section 5.2, the w’s in Eq. (17) account for the effect of the photon identification thresholds and take values 0 or 1. Clearly, Eq. (17) is very different from Eq. (16) unless all the w’s that appear in Eq. (17) are equal to 1, in which case the photon identification threshold mechanism is superfluous and unlike as in the laboratory experiment [34], the number of photon and detection events is the same.

In the analysis of the experimental data, the photon identification threshold is chosen such that many of the w’s are zero [34]. Hence from the discussion in section 9, it follows immediately that with some w’s zero, it is impossible to prove that the Bell-CHSH function S = S(a1,a2, a1,a2) ≡ E(a1,a2)− E(a1, a2)+ E(a1,a2)+ E( a1,a2) satisfies the inequality |S| ≤ 2.

However, it directly follows from the proof given in our earlier paper [23] that if the x’s and w’s have been generated by a CFD-compliant procedure, the Bell-CHSH function S can never violate the inequality

|S|=E(a1,a2)E(a1,a2)+E(a1,a2)+E(a1,a2)42δ.(18)

The term 2δ in Eq. (18) is a measure for the number of paired events that have been rejected relative to the number of emitted pairs. In detail, 0 ≤ δN′/Nmax ≤ 1 where N′ denotes the number of input events for which the negative voltage signal of all the photons is smaller than the photon identification threshold 𝓥 and Nmax is the maximum number of contributing pairs per setting. If all paired events would be regarded as photon pairs then δ = 1 and then, and only then we recover the Bell-CHSH inequality |S| ≤ 2. If the x’s and w’s have not been generated by a CFD-compliant procedure, there is only the trivial bound |S| ≤ 4.

The inequality Eq. (18) is a rigorous mathematical fact that holds if, for all N ≥ 1, the x’s and v’s are generated in a CFD-compliant manner and none of the denominators in Eq. (17) is identically zero (in which case no photon pairs have been detected). Conversely, if we find a set of x’s and v’s that yields a value of |S| that exceeds 4 – 2δ, we can only conclude that these data have not been obtained from a CFD-compliant procedure. Any other conclusion would not be logically justified.

In analogy with the derivation of Eq. (18), one may derive an Eberhard-type or CH-type inequality that accounts for the w’s but as such inequalities do not add anything to the discussion that follows, we do not discuss them any further.

11 Discrete-event simulation algorithm

In this section, we specify the algorithm and the simulation procedure in full detail. The algorithm that mimics the operation of the particle source is very simple. For each event k = 1,…,N, a uniform random generator is used to generate a floating-point number 0 ≤ ϕ1,k ≤ 2π. This number is input to the stations with setting (a1,a1) and another number ϕ2,k = ϕ1,k+π/2 is input to the stations with setting (a2, a2). Because of ϕ2,k = ϕ1,k+π/2, the kth event simulates the emission of a photon pair with maximally correlated, orthogonal polarizations. In this respect, we deviate from what is done in the laboratory experiments [34, 85] in the following sense. Unlike in the computer simulation, the detectors used in these laboratory experiments are not perfect. As already mentioned, Eberhard’s inequality can account for reduced detector efficiencies and this feature can be put to good use through minimizing the value of JEberhard with respect to the correlation [27]. This is what is done in the laboratory experiments [34, 85]. However, in our simulation model, the detectors are perfect. Hence the minimum value of JEberhard will be obtained by choosing maximally correlated, orthogonal polarizations [27]. Recall that our aim here is to simulate the most ideal, perfect experiment that accounts for all the essential features of the laboratory experiments, not to simulate a real laboratory experiment including trams passing by [34] etc.

Upon receiving the input ϕ an observation station (see Figure 3) executes the following two steps. First it retrieves two uniform random numbers r and r^ from a list of such numbers (or, more conveniently, generates these numbers on the fly) and then

  1. computes

    c=cos[2(aϕ)],s=sin[2(aϕ)],(19)
  2. sets

    x=sign(1+c2r),v=r^|s|d(VmaxVmin)Vmax,(20)

where d, is an adjustable parameter to be discussed later and 0 ≤ Vmax, and 0 ≤ VminVmax set the range of the voltage signal. From Eq. (20) it follows that −Vmaxv,𝓥 ≤ −Vmin, as in the laboratory experiment [34].

Our choice for the specific functional forms of x = x(a,ϕ,r) and v = v(a,ϕ,r^) is inspired by previous work in which it was shown that a similar model, which employs time-coincidence to identify pairs, exactly reproduces the single particle averages and two-particle correlations of the singlet state if the number of events becomes very large [26, 72].

Equations (19) and (20) form the core of the simulation algorithm which has the following key features:

  1. For any fixed value of ϕ and uniformly distributed random numbers r, the unit generates a sequence of randomly distributed x’s such that the average of the x’s agrees (within statistical fluctuations) with Malus’ law, i.e. the normalized frequencies to observe x = +1 and x = −1 are given by cos2(aϕ) and sin2(aϕ), respectively.

  2. The presence of an output variable v which serves to mimic the detector traces recorded in the laboratory experiments. Note that the explicit expression of v = v(a,ϕ,r^) shows a dependence on the local setting of the station. Such a dependence cannot be ruled out a posteriori but finds a post-factum justification in the fact that the simulations reproduce the results for two particles in a singlet state, see section 13.

  3. The use of the random numbers 0 ≤ r, r^ ≤ 1 mimics the uncertainties about the outcomes, as observed in experiments. Thereby, it is implicitly understood that for every instance of new input, new values of the uniform random numbers r and r^ have been generated.

  4. By construction, the algorithm is a metaphor for Einstein-local experiments: changing a1 (a2) does not affect the present, past or future values of x2 (x1) or v2 (v1). In plain words, the output of one particular unit depends on the input to that particular unit only.

For the settings of the observation stations, we take a1 = θ+π/8, a1 = a1+π/4, a2 = π/8, a2 = 3π/8 and let θ vary from 0 to π. For this choice of settings, quantum theory for a system in the singlet state predicts E(a1,a2) = E( a1,a2) = cos 2θ, E(a1, a2) = E(a1,a2) = sin 2θ and S(a1,a2,a1,a2) = −2 2cos(2θ+π/4), the latter reaching its maximum 2 2 at θ = 3π/8. When we operate the computer model in non-CFD mode, random numbers are used to make a choice between the settings ai and ai, for i = 1,2, exactly as in the experiments [34, 85].

The simulation procedure is quite simple. We choose a fixed photon identification threshold 𝓥, generate input pairs k = 1,…,N, collect corresponding outputs in terms of x’s and w’s, and compute the single- and two-particle averages according to Eq. (18), the Bell-CHSH function S(a1,a2,a1,a2) = E(a1,a2) − E(a1, a2)+E(a1,a2)+E(a1,a2), and the Eberhard function J given by Eq. (13).

Because the computer experiment is “perfect”, it differs from the laboratory experiment in the sense that all pairs are created “on demand” and all emitted pairs create one detection event in each station (there are no “false” detection events) but exactly as in the laboratory experiment, the local photon identification threshold at each observation station serves to decide whether a photon has arrived or not.

12 Computer simulation results

This section reports the results of simulations with N = 105 events for the CFD-compliant and N = 105 events per setting for the non-CFD model, with Vmin = 1/2 and Vmax = 1. Note that the “time-tag threshold” and a “trigger threshold” (terminology from Ref. [34] (supplementary material)) are important to the laboratory implementation but are superfluous, meaning that they do not affect the results of our computer experiments in any way. Indeed, in our perfect experiments, there is no ambiguity in determining when a particle arrives at the observation station. Nevertheless, to counter possible (pointless) critique that we have not incorporated into our simulation model the two thresholds that are essential to the laboratory implementation, we have chosen Vmin = 1/2 in order to leave room for introducing these thresholds.

We limit the discussion to the case d = 4 because we know from earlier work [20, 72, 90], which uses time-coincidence selection, that for d = 4 the computer model reproduces the quantum theoretical result of the correlation of two particles in the singlet state, Malus’ law for the single-particle averages etc. if N → ∞ followed by 𝓥 → − Vmax.

It is not difficult to see that single-particle averages E1(a1, a2), E2(a1, a2) etc. are expected to be zero, up to fluctuations. The reason is that ϕϕ + π/2 changes the sign of the x’s but has no effect on the values of the v’s (see Eq. (20)). Therefore, if the ϕ’s uniformly cover [0, 2π[, the number of times that x = +1 and x = −1 appear is about the same. All our simulation results are in concert with this prediction.

In Figure 6, we present the simulation data of the correlation E(a1, a2) (◯), the single-particle averages E1(a1, a2) (△) and E2(a1, a2) (▽) as a function of θ=a1a2, as obtained from a CFD-compliant (Figure 6(a)) and non-CFD (Figure 6(b)) simulation. All the simulation data are in excellent agreement with the quantum theoretical description of a two-particle system in the singlet state which predicts E1(a1, a2) = E2(a1, a2) = 0 and E(a1, a2) = −cos 2θ. Within statistical fluctuations, it is difficult to distinguish between CFD-compliant and non-CFD simulation data, in concert with our earlier work [23].

Figure 6 The correlation E(a1, a2) (◯), the single-particle averages E1(a1, a2) (△) and E2(a1, a2) (▽) as a function of θ = a1 − a2.(a) CFD-compliant model; (b) non-CFD model. Solid line: quantum theoretical prediction E(a1, a2) = −cos 2θ. Dashed line: quantum theoretical prediction E1(a1, a2) = E2(a1, a2) = 0. The photon identification threshold is 𝓥 = −0.995.
Figure 6

The correlation E(a1, a2) (◯), the single-particle averages E1(a1, a2) (△) and E2(a1, a2) (▽) as a function of θ = a1a2.

(a) CFD-compliant model; (b) non-CFD model. Solid line: quantum theoretical prediction E(a1, a2) = −cos 2θ. Dashed line: quantum theoretical prediction E1(a1, a2) = E2(a1, a2) = 0. The photon identification threshold is 𝓥 = −0.995.

In Figure 7 we show the data of the Bell-CHSH function S(θ + π/8, θ + 3π/8, π/8, 3π/8) as a function of θ. Clearly the simulation results are in excellent agreement with the quantum theoretical prediction S(θ + π/8, θ + 3π/8, π/8, 3π/8) = −22 cos(2θ + π/4). In both Figs.6 and Figure 7, there are deviations from the quantum theoretical prediction which are not due to statistical fluctuations. These deviations can be reduced systematically and eventually vanish by letting 𝓥 → −Vmax (𝓥 → > −Vmax), a fact that can be proven rigorously for the probabilistic version of the simulation model [20, 72, 90].

Figure 7 The Bell-CHSH function S(θ + π/8, θ + 3π/8, π/8, 3π/8) obtained from the data shown in Figure 6 as a function of θ = a1 − a2.(a) CFD-compliant model; (b) non-CFD model. Solid line: quantum theoretical prediction S(θ + π/8, θ + 3π/8, π/8, 3π/8) = −22$\sqrt{2} $ cos(2θ + π/4). The photon identification threshold is 𝓥 = −0.995.
Figure 7

The Bell-CHSH function S(θ + π/8, θ + 3π/8, π/8, 3π/8) obtained from the data shown in Figure 6 as a function of θ = a1a2.

(a) CFD-compliant model; (b) non-CFD model. Solid line: quantum theoretical prediction S(θ + π/8, θ + 3π/8, π/8, 3π/8) = −22 cos(2θ + π/4). The photon identification threshold is 𝓥 = −0.995.

We note in passing that the observation that the frequency distribution of many events agrees with the probability distribution of a singlet state is a post-factum characterization of the repeated preparation and measurement process only, not a demonstration that at the end of the preparation stage, each pair of particles actually is in an entangled state. The latter describes the statistics, not a property of a particular pair of particles [4].

Results of the Eberhard function Eq. (13) as a function of θ are given in Figure 8(a). The correspondence between the symbols used in Eberhard’s and this paper are as follows: o ⇔ + 1, e ⇔ − 1, α1a1, α2a1, β1a2, and β2a2. As expected from the requirements to derive Eq. (13) (see section 9), the CFD-compliant simulation without the photon identification threshold satisfies JEberhard ≥ 0 for all θ whereas processing the data as in the laboratory experiment, i.e. by employing a photon identification threshold, yields JEberhard < 0 for a non-zero interval of θ’s. As is clear from Figure 8(a), the results of Eberhard function Eq. (13) do not change significantly if we use replace the CFD-compliant simulation model by its non-CFD version. The reason for this apparent violation is that the data obtained through the application of the photon identification mechanism do not satisfy the mathematical requirements for deriving Eq. (13).

Figure 8 (a) The Eberhard function JEberhard given by Eq. (13) as a function of θ, for the CFD-compliant (open symbols) and non-CFD model (solid symbols), with (circles) and without (squares) using the photon identification threshold (see text). (b) The value of δ entering the inequalities Eq. (18) as a function of θ. The photon identification threshold 𝓥 = −0.995.
Figure 8

(a) The Eberhard function JEberhard given by Eq. (13) as a function of θ, for the CFD-compliant (open symbols) and non-CFD model (solid symbols), with (circles) and without (squares) using the photon identification threshold (see text). (b) The value of δ entering the inequalities Eq. (18) as a function of θ. The photon identification threshold 𝓥 = −0.995.

For completeness, in Figure 8(b) we present results for the function δ which determines the upperbound to the Bell-CHSH function in the case that the photon identification threshold is being used to discard detection events (see Eq. (18)). From Figure 8(b), it follows that δ < 0.8. Hence Eq. (18) predicts an upperbound that is not smaller than 3.4, large enough to include the maximum value of 22 ≈ 2.83 predicted by the quantum theory of the polarizations of two photons (or, equivalently, two spin-1/2 particles).

Finally, it is instructive to compare the number of detection events that the photon identification threshold rejects as being a photon. In the laboratory experiment [34], the number of trials is about 3.5 × 109 and the total number of so-called “relevant counts”, i.e. the number of times that at least one photon was identified by means of the photon identification thresholds (by software), is about 1.8 × 105. Thus, in this experiment the overall number of events considered to be relevant for the physics, relative to the number of detection events is about 0.005%. For comparison, in the simulations, a photon identification threshold 𝓥 = −0.995 identifies about 23% of the detection events as photons, several orders of magnitude larger than in the laboratory experiment. Clearly, the quality of the data collected in the laboratory experiments are not on par with the quality of the data produced by the computer experiments but obviously, the latter is much easier to realize and use than the former.

13 Post-factum justification of the simulation model

We have already drawn attention to the fact that the explicit expression of the voltage v = v(a, ϕ, r^) shows a dependence on the local setting of the station through the factor |sin[2(aϕ)]|d (see Eqs. (19) and (20)) and mentioned that such a dependence cannot be ruled out a posteriori. In this section, we examine the consequences of removing this dependence.

In Figure 9, we show results for d = 0, in which case the random variations of the voltage signals v1, v1, v2, and v2 do not depend on a1, a1, a2, and a2, respectively. Instead of E(a1, a2) ≈ −cos 2θ for d = 4, the simulation for d = 0 yields E(a1, a2) ≈ −(1/2) cos 2θ and, as Figure 9(b) shows, |S(θ + π/8, θ + 3π/8, π/8, 3π/8)| ≤ 2. Therefore, the only way to have simulation models of the laboratory experiment [34] reproduce the quantum theoretical prediction of the polarizations of two photons (or, equivalently, two spin-1/2 particles) is to assume that v1, v1, v2, and v2 depend on a1, a1, a2, and a2. Of course, there is no good argument why, in a particular experiment, this dependence should be of the form Eq. (20). We repeat that we have chosen the form Eq. (20) because our main goal is to reproduce by a CFD-compliant, manifestly non-quantum model, the quantum theoretical predictions of the polarizations of two photons (or, equivalently, two spin-1/2 particles), which as a by-product, yields |S(θ + π/8, θ + 3π/8, π/8, 3π/8)| > 2.

Figure 9 Demonstration that the simulation model cannot reproduce the correlation of the quantum system if the voltage signals v1 and v2 are independent of the settings a1 and a2, respectively.(a) The correlation E(a1, a2) (◯), the single-particle averages E1(a1, a2) (△) and E2(a1, a2) (▽) as a function of θ = a1 − a2 as obtained from a CFD-compliant simulation. (b) The Bell-CHSH function S(θ + π/8, θ + 3π/8, π/8, 3π/8) obtained from the data shown in Figure 9(a) as a function of θ. The photon identification threshold 𝓥 = −0.995, Vmin = 0.95, Vmin = 1, and d = 0. Solid lines: quantum theoretical predictions.
Figure 9

Demonstration that the simulation model cannot reproduce the correlation of the quantum system if the voltage signals v1 and v2 are independent of the settings a1 and a2, respectively.

(a) The correlation E(a1, a2) (◯), the single-particle averages E1(a1, a2) (△) and E2(a1, a2) (▽) as a function of θ = a1a2 as obtained from a CFD-compliant simulation. (b) The Bell-CHSH function S(θ + π/8, θ + 3π/8, π/8, 3π/8) obtained from the data shown in Figure 9(a) as a function of θ. The photon identification threshold 𝓥 = −0.995, Vmin = 0.95, Vmin = 1, and d = 0. Solid lines: quantum theoretical predictions.

Disregarding the original motivation to perform the Bell-test experiments, the experimental setup shown in Figure 1 can be regarded as a tool to characterize the response of the observation stations to the incoming signals. In the case at hand, what is under scrutiny is the response of the observation station, i.e. of its optical components, the transition-edge detector and the electronics that amplifies its current, under the condition that the incident light is extremely feeble. Viewed from this perspective, our simulations support the hypothesis that the laboratory experiments [34, 85] convincingly demonstrate that the statistics of the observed photons, as defined by the photon detection threshold, depends on the settings (and hence on the polarizations assigned to the photons) of the observation stations.

It is of interest to mention here that since the early days of the Bell-test experiments, it is well-known that application of a Bell-type model requires at least one extra assumption. We reproduce here a passage from Ref. [13] (p.1890): “The approach used by CHSH is to introduce an auxiliary assumption, that if a particle passes through a spin analyser, its probability of detection is independent of the analyser’s orientation. Unfortunately, this assumption is not contained in the hypotheses of locality, realism or determinism.” It is stunning that although there is at least one auxiliary assumption involved in testing e.g. the CHSH inequality with Bell-test data, the possibility that this assumption is not valid is, to the best of our knowledge, ignored in the experimental studies. As a matter of fact, as we have argued above, all Bell-test experiments with photons performed up to this day can be regarded as direct experimental proof that this auxiliary assumption is invalid. In view of the intricate atomic-scale processes that are involved when light passes through a material, this conclusion seems very reasonable but is, of course, way less spectacular than the conclusion that Bell-type experiments can be used to rule out certain world views.

14 Conclusion

The general message of this paper is that a model that purports to describe the data produced by an experiment should account for all the data that are relevant for the analysis of the experimental results. In the case at hand, the situation is as follows:

  1. experimental data [34] are interpreted in terms of a Bell-type model that uses only half of the variables (the x’s),

  2. in the actual experiments [34] the other half of the variables (the v’s) is essential for the identification of the photons but are ignored in Bell-type models,

  3. the failure of Bell-type models to describe the experimental data is taken as a proof that “local realism” (local in Einstein’s sense) is incompatible with quantum theory and is therefore is declared dead.

We believe that it requires an exotic form of logic to reconciliate the last statement (iii) with the second one (ii).

To head off possible misunderstandings, the authors of this paper do not necessarily subscribe to all or any forms of what is called local realism, CFD theories, or … We are of the opinion that the arguments based on Bell’s theorem in conjunction with Bell-type experiments suffer from what we earlier called the photon identification loophole. One simply cannot blame a model that only accounts for part of the data for not describing all of them. Regarding the previous sentence, Albert Einstein’s quote “make it as simple as possible, but not simpler” is more pertinent than ever.

The challenge for the Bell-experiments community is, therefore, to construct an EPRB-type experiment with a photon (pair) identification that cannot, from the perspective of the simple Bell models, be turned into a “loophole”. Our general proofs of the derivation of Bell-type inequalities for actual data (see section 9), indicate that this challenge cannot be met.

Acknowledgement

We like to thank D. Willsch, F. Jin, and M. Nocon for useful comments and discussions.

A Probabilistic models

Traditionally, mathematical models of the EPRB experiments are formulated in terms of probabilistic models [1, 2, 5, 9, 10, 14, 16, 17, 21, 29, 30, 31, 32, 33, 35, 39, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 58, 60, 61, 62, 63, 64, 65, 66, 67, 70, 71, 73, 74, 75, 76, 77, 80, 83, 84, 86], often without explicitly mentioning Kolmogorov’s axiomatic framework of probability theory [37, 59]. However, there is a considerable, conceptual gap between a laboratory EPRB experiment and a probabilistic model thereof. The (over)simplifications required to come up with a tractable, proper probabilistic model of a laboratory EPRB experiment are key to the understanding of the phenomena involved.

When we use the “digital computer – laboratory experiment” metaphor, both the simplification and replacement are made during the formulation of the computer model. A computer simulation algorithm entails a complete specification of how the data are generated. In this respect, all “physically relevant” processes are well-defined (by construction) and known explicitly in full detail. There are no uncertainties or unknown influences. Note that the reverse operation, i.e. to construct an algorithm for a digital computer out of a probabilistic model is, as a matter of principle, impossible. At most, a probabilistic model can serve as a guide to construct an algorithm, see also [66].

In the particular case where the observed phenomena take the form of data generated by simulations of EPRB experiments on a digital computer, the transition from the observed phenomena to suitable mathematical models does not suffer from the many “uncertain” factors that may or may not play an essential role in the laboratory experiments and is, therefore, a fairly simple transition. In this section, we start from a computer simulation model and construct the probabilistic model thereof. We start by showing that the simplest of these models are identical to those proposed and analyzed by Bell [6] and then move on to the construction of a probabilistic model for the computer model of the recent Bell-type experiments [34, 85] that we use in our simulation work presented in section 12.

A.1 Bell-type models

Consider the CFD simulation model in which we explicitly ignore the v-variables. For a given input to the observation stations, the outcome is one of the so-called elementary events [37, 59], in this case one of the 16 different quadruples (x1,x1,x2,x2). In the language of probability theory, the set of these 16 different quadruples is called the sample space Ω [37, 59], the set of elementary events, from which we construct the so-called σ-field 𝓕 of subsets of Ω, containing the impossible (null) event and all the (compound) events in whose occurences we may be interested [37, 59]. In modeling the computer experiments, we only need to consider finite sets, hence we do not have to worry about the mathematical subtleties that arise when dealing with infinite sets [37, 59].

The next step is to assign a real number, a probability measure, between zero and one that expresses the likelihood that an element of the set Ω occurs [37, 59]. We denote this (conditional) probability measure by P(x1,x1,x2,x2|a1,a1,a2,a2,Z), the part |a1,a1,a2,a2,Z) indicating that the settings and all other conditions, denoted collectively by Z, do not change during the imaginary probabilistic experiment. By definition, the probability measure satisfies (x1,x1,x2,x2)ΩP(x1,x1,x2,x2|a1,a1,a2,a2,Z)= 1 [37, 59].

Note that a probability measure is a purely mental construct [59]. If it were not, we could interchange the experiment/computer simulation, the results of which directly connect to our senses, with the imaginary world of mathematical models and prove theorems, not only about the mathematical description, but also about our sensory experiences, a tantalizing possibility. One such example that exploits intricate features of set theory is given in Ref. [81], in which it is explicitly stated that there does not exist an algorithm to actually calculate the relevant functions. In other words, this example cannot be realized on a physical device such as a digital computer, not even approximately. Moreover, unlike the simulation algorithm executing on a digital computer, the probabilistic description does not contain a specification of the process that actually produces an event: we have to call up Tyche to do this for us. In other words, a probabilistic model is incomplete in that it only describes the outcomes of the simulation procedure, not the procedure itself. However, this incompleteness is partially compensated for by the fact that the calculation of averages and correlations no longer involves the number of events N. We have for instance

E~12(a1,a1,a2,a2)=Ωx1x2P(x1,x1,x2,x2|a1,a1,a2,a2,Z),(21)

and we have similar expressions for the other two-particle averages and also for the single-particle averages. Here and in the following, we use the shorthand notation ∑Ω = (x1,x1,x2,x2)Ω. We have written instead of E^ to emphasize that the former have been calculated within a probabilistic model whereas the latter involve calculations with actual data. From Eq. (21), we have

S~(a1,a2,a1,a2)=Ωx1x2x1x2+x1x2+x1x2×P(x1,x1,x2,x2|a1,a1,a2,a2,Z),(22)

and because the elementary events are quadruples, it follows directly from Eq. (10) that |(a1,a2,a1,a2) | ≤ 2. Thus, in the probabilistic realm, not in the world of the observed two-valued data, the existence of the Bell-CHSH inequality follows from the existence of a probability measure for the elementary events of quadruples (x1,x1,x2,x2). Moreover, it can be shown that with some additional requirements on its marginals, the existence of such a probability measure is necessary and sufficient for Bell-type inequalities to hold [11, 30, 82, 87, 88].

It is clear from Figure 5 that xi and xi for i = 1, 2 only depend on the corresponding ai and ai, respectively. However, the probability measure for quadruples, P(x1,x1,x2,x2|a1,a1,a2,a2,Z), does not express this basic property of the computer model, nor does it explicitly express the dependence on the ϕ’s.

A simple way to incorporate all these features of the simulation model in a probabilistic description is to define a new joint probability measure for quadruples by

P(x1,x1,x2,x2|a1,a1,a2,a2,Z)=P(x1|a1,ϕ1,Z)P(x1|a1,ϕ1,Z)P(x2|a2,ϕ2,Z)×P(x2|a2,ϕ2,Z)μ(ϕ1,ϕ2)dϕ1dϕ2,(23)

where P(x1|a1, ϕ1, Z) etc. are the “local” probabilities to observe x1 etc., the integration is over the whole domain of ϕ1 and ϕ2 and μ(ϕ1, ϕ2) is a non-negative, normalized density. With the new probability measure Eq. (23), Eq. (21) simplifies considerably. For instance, for the detection events we have 12(a1,a1,a2,a2) = (a1, a2) where

E~(a,b)=x,y=±1xyP(x|a,ϕ1,Z)P(y|b,ϕ2,Z)×μ(ϕ1,ϕ2)dϕ1dϕ2.(24)

Instead of Eq. (22), we now have

|S~(a1,a2,a1,a2)|=|E~(a1,a2)E~(a1,a2)+E~(a1,a2)+E~(a1,a2)|2,(25)

which is the Bell-CHSH inequality in probabilistic form [5, 14].

From Eq. (23), it follows directly that

P(x1,x2|a1,a2,Z)=x1=±1x2=±1P(x1,x1,x2,x2|a1,a1,a2,a2,Z)=P(x1|a1,ϕ1,Z)P(x2|a2,ϕ2,Z)μ(ϕ1,ϕ2)dϕ1dϕ2,(26)

which expresses the probability measure P′(x1, x2|a1, a2, Z) in terms of the single-variable probability measures P(x1|a1, ϕ1, Z) and P(x2|a2, ϕ2, Z) and the measure μ(ϕ1, ϕ2) of the variables ϕ1 and ϕ2.

The factorized form Eq. (26) is the landmark of the so-called “local hidden-variable models” [5, 13]. Although “local” is often used to express the notion that physical influences do not travel faster than the speed of light it is, in the context of a probabilistic model (computer model), an expression of statistical (arithmetic) independence only. Bell’s theorem uses the factorized form Eq. (26) to state that quantum mechanics is incompatible with local realism, the world view in which physical properties of objects exist independently of measurement and where physical influences cannot travel faster than the speed of light [34].

In one respect, Eq. (26) is grossly deceiving, namely it does not reflect the elementary fact that the parent probability measure Eq. (23) from which Eq. (26) follows, concerns quadruples, not pairs. Without the knowledge that Eq. (26) is in fact a marginal distribution of the probability measure Eq. (23) for quadruples, one is inclined to think, as Bell did and his followers still seem to do, that there are “physical” assumptions involved in justifying the factorized form Eq. (26). However, this is not the case because the Bell-type inequalities hold if and only if there exists a joint probability measure for the quadruples [30]. This mathematical statement is void of any physical meaning.

In summary: in this subsection we have shown that a probabilistic model of the CFD computer simulation model that does not account for the photon identification mechanism of the EPRB laboratory experiment, automatically leads to the models introduced by Bell [5]. Within this framework, the existence of Bell-type inequalities and the corresponding joint probability measures are mathematically equivalent [30]. The latter statement, which relates to imaginary data only, corresponds to the statement that in the realm of actual two-valued data, the existence of Bell-type inequalities and CFD-compliant generation of all the quadruples are mathematically equivalent, see section 9.

A.2 Incorporating the photon identification threshold

Referring to Eq. (5), the extension of the construction outlined in section A.1 to incorporate the local photon identification mechanism is of purely technical nature. Instead of Eq. (23), we now introduce

P(x1,v1,x1,v1,x2,v2,x2,v2|a1,a1,a2,a2,Z)=P(v1|a1,ϕ1,Z)P(x1|a1,ϕ1,Z)P(v1|a1,ϕ1,Z)×P(x1|a1,ϕ1,Z)P(v2|a2,ϕ2,Z)P(x2|a2,ϕ2,Z)×P(v2|a2,ϕ2,Z)P(x2|a2,ϕ2,Z)×μ(ϕ1,ϕ2)dϕ1dϕ2dv1dv2,(27)

where P(v1|a1, ϕ1, Z) etc. are the “local” probability densities to pick v1 etc., and all other symbols have the same meaning as in Eq. (23).

It is now straightforward to write down the probabilistic expressions that incorporate in exactly the same manner as in the analysis of the laboratory experiment data [34], the effect of the photon identification threshold. For instance, we have for the photon counts

E~(a1,a2)=A(a1,a2)B(a1,a2),

where

A(a1,a2)=x1,x2=±1x1x2Θ(Vv1)Θ(Vv2)×P(v1|a1,ϕ1,Z)P(x1|a1,ϕ1,Z)P(v2|a2,ϕ2,Z)×P(x2|a2,ϕ2,Z)μ(ϕ1,ϕ2)dϕ1dϕ2dv1dv2,

and

B(a1,a2)=Θ(Vv1)Θ(Vv2)P(v1|a1,ϕ1,Z)×P(v2|a2,ϕ2,Z)μ(ϕ1,ϕ2)dϕ1dϕ2dv1dv2,(28)

and, as before, we have similar expressions for the other expectations in Eq. (21) and for the single-particle averages.

The expressions for the single- and two-particles averages that derive from the probabilistic model Eq. (27) all have the form that is characteristic of a genuine “local hidden-variable model”, as exemplified by Eq. (28). Only “local” detection and photon identification are involved. The values of the variables local to one observation station do not depend on variables that are local to another observation station. The only form of “communication” between the stations is through the “hidden” variables ϕ1 and ϕ2.

It directly follows from the general discussion of section 6 that A(a1, a2) and B(a1, a2) can be expressed in terms of both the local time-window and time-coincidence selection. In detail, for the local time-window selection we have

A(a1,a2)=x1,x2=±1x1x2Θ(Wt1)Θ(Wt2)Θ(t1)Θ(t2)×P(t1|a1,ϕ1,Z)P(x1|a1,ϕ1,Z)P(t2|a2,ϕ2,Z)×P(x2|a2,ϕ2,Z)μ(ϕ1,ϕ2)dϕ1dϕ2dt1dt2,

and

B(a1,a2)=Θ(Wt1)Θ(Wt2)Θ(t1)Θ(t2)P(t1|a1,ϕ1,Z)×P(t2|a2,ϕ2,Z)μ(ϕ1,ϕ2)dϕ1dϕ2dt1dt2,(29)

for the time-coincidence selection we have

A(a1,a2)=x1,x2=±1x1x2Θ(W|t1t2|)P(t1|a1,ϕ1,Z)×P(x1|a1,ϕ1,Z)P(t2|a2,ϕ2,Z)P(x2|a2,ϕ2,Z)×μ(ϕ1,ϕ2)dϕ1dϕ2dt1dt2,

and

B(a1,a2)=Θ(W|t1t2|)P(t1|a1,ϕ1,Z)×P(t2|a2,ϕ2,Z)μ(ϕ1,ϕ2)dϕ1dϕ2dt1dt2.(30)

From earlier work based on representation Eq. (30) [20, 26, 72] and from the simulation results presented in section 12, it follows directly that the probabilistic model defined by Eq. (27) is capable of reproducing the predictions of quantum theory for the single- and two-particles averages of two photon polarizations in the singlet state. This then should stop spreading the misconception that Bell has proven that quantum theory is incompatible with all “local hidden-variable models”. Of course, “local hidden-variable models” that do not include the, for the laboratory experiment essential, mechanism to identify single or pairs of photons are incapable to describe the salient features of the experimental data but as explained in section 7, that is hardly more than a platitude.

In summary, in this appendix we have shown how to construct probabilistic descriptions of computer simulation models of EPRB experiments that rely on photon identification thresholds to decide whether or not a photon has been detected [34]. The resulting probabilistic models conform to the requirements of genuine “local hidden-variable models” and if they account for a local mechanism to identify photons, are also capable of producing results that are in full agreement with quantum theory.

References

[1] Accardi L., Some loopholes to save quantum nonlocality, AIP Conf. Proc., 2005, 750, 1–20.10.1063/1.1874552Search in Google Scholar

[2] Adenier G., Khrennikov A.Y., Is the fair sampling assumption supported by EPR experiments. J. Phys. B: At. Mol. Opt. Phys., 2007, 40, 131–141.10.1088/0953-4075/40/1/012Search in Google Scholar

[3] Aspect A., Dalibard J., Roger G., Experimental test of Bell’s inequalities using time-varying analyzers, Phys. Rev. Lett., 1982, 49, 1804–1807.10.1103/PhysRevLett.49.1804Search in Google Scholar

[4] Ballentine L.E., Quantum Mechanics: A Modern Development. World Scientigic, Singapore, 2003Search in Google Scholar

[5] Bell J.S., Speakable and Unspeakable in Quantum Mechanics. Cambridge University Press, Cambridge, 1993Search in Google Scholar

[6] Bell J.S., On the Foundations of Quantum Mechanics, World Scientific, Singapore, New Jersey, London, Hong Kong, 2001Search in Google Scholar

[7] Bohm D., Quantum Theory, Prentice-Hall, New York, 1951Search in Google Scholar

[8] Boole G., On the theory of probabilities, Phil. Trans. R. Soc. Lond., 1862, 152, 225–252.10.1017/CBO9780511693090.017Search in Google Scholar

[9] Brans C., Bell’s theorem does not eliminate fully causal hidden variables, Int. J. Theor. Phys., 1987, 27, 219–226.10.1007/BF00670750Search in Google Scholar

[10] Brody T., The Philosphy Behind Physics, Springer, Berlin, 199310.1007/978-3-642-78978-6Search in Google Scholar

[11] Brody T.A., The Suppes-Zanotti theorem and the Bell inequalities, Revista Mexicana de Física, 1989, 35, 170–187.Search in Google Scholar

[12] Christensen B., McCusker K., Altepeter J., Calkins B., Lim C., Gisin N., Kwiat P., Detection-loophole-free test of quantum non-locality, and applications, Phys. Rev. Lett., 2013, 111, 13040610.1103/PhysRevLett.111.130406Search in Google Scholar PubMed

[13] Clauser J.F., Horn M.A., Experimental consequences of objective local theories, Phys. Rev. D, 1974, 10, 526–535.10.1103/PhysRevD.10.526Search in Google Scholar

[14] Clauser J.F., Horn M.A., Shimony A., Holt R.A. Proposed experiment to test local hidden-variable theories, Phys. Rev. Lett., 1969, 23, 880–884.10.1103/PhysRevLett.23.880Search in Google Scholar

[15] Clauser J.F., Shimony A., Bell’s theorem: Experimental tests and implications, Rep. Prog. Phys., 1978. 41(12), 1881–1927.10.1088/0034-4885/41/12/002Search in Google Scholar

[16] De Baere W., Mann A., Revzen M. Locality and Bell’s theorem, Found. Phys., 1999. 29, 67–77.10.1023/A:1018865120111Search in Google Scholar

[17] de la Peña L., Cetto A.M., Brody T.A., On hidden-variable theories and Bell’s inequality, Lett. Nuovo Cim., 1972, 5, 177–181.10.1007/BF02815921Search in Google Scholar

[18] de Muynck V., W. W.D., Martens H. Interpretations of quantum mechanics, joint measurement of incompatible observables and counterfactual definiteness, Found. Phys., 1994, 24, 1589–1664.10.1007/BF02054787Search in Google Scholar

[19] De Raedt H., De Raedt K., Michielsen K., Keimpema K., Miyashita S., Event-based computer simulation model of Aspect-type experiments strictly satisfying Einstein’s locality conditions, J. Phys. Soc. Jpn., 2007, 76, 10400510.1143/JPSJ.76.104005Search in Google Scholar

[20] De Raedt H., De Raedt K., Michielsen K., Keimpema K., Miyashita S. Event-by-event simulation of quantum phenomena: Applica tion to Einstein-Podolosky-Rosen-Bohm experiments, J. Comput. Theor. Nanosci., 2007, 4, 957–991.10.1166/jctn.2007.2381Search in Google Scholar

[21] De Raedt H., Hess K., Michielsen K. Extended, Boole-Bell inequalities applicable to quantum theory, J. Comput. Theor. Nanosci., 2011, 8, 1011–1039.10.1166/jctn.2011.1781Search in Google Scholar

[22] De Raedt H., Jin F., Michielsen K., Data analysis of Einstein-Podolsky-Rosen-Bohm laboratory experiments, Proc. SPIE, 2013, 8832, 88321N1–1110.1063/1.3688952Search in Google Scholar

[23] De Raedt H., Michielsen K., Hess K., The digital computer as a metaphor for the perfect laboratory experiment: Loophole-free Bell experiments, Comp. Phys. Comm., 2016, 209, 42–47.10.1016/j.cpc.2016.08.010Search in Google Scholar

[24] De Raedt H., Michielsen K., Jin F., Einstein-Podolsky-Rosen-Bohm laboratory experiments: Data analysis and simulation. AIP Conf. Proc., 2012, 1424, 55–66.10.1063/1.3688952Search in Google Scholar

[25] De Raedt K., De Raedt H., Michielsen K., A computer program to simulate Einstein-Podolsky-Rosen-Bohm experiments with photons, Comp. Phys. Comm., 2007, 176, 642–651.10.1016/j.cpc.2007.01.007Search in Google Scholar

[26] De Raedt K., Keimpema K., De Raedt H., Michielsen K., Miyashita S., A local realist model for correlations of the singlet state, Eur. Phys. J. B, 2006, 53, 139–142.10.1140/epjb/e2006-00364-9Search in Google Scholar

[27] Eberhard P.H., Background level and counter efficiencies required for a loophole-free Einstein-Podolsky-Rosen experiment, Phys. Rev. A, 1993, 47, R747–R750.10.1103/PhysRevA.47.R747Search in Google Scholar PubMed

[28] Einstein A., Podolsky A., Rosen N., Can quantum-mechanical description of physical reality be considered complete?, Phys. Rev., 1935, 47, 777–780.10.1103/PhysRev.47.777Search in Google Scholar

[29] Fine A., On the completeness of quantum theory, Synthese, 1974, 29, 257–289.10.1007/978-94-010-9466-5_13Search in Google Scholar

[30] Fine A., Hidden variables, joint probability, and Bell inequalities, Phys. Rev. Lett., 1982, 48, 291–295.10.1103/PhysRevLett.48.291Search in Google Scholar

[31] Fine A., Joint distributions, quantum correlations, and commuting observables, J. Math. Phys., 1982, 23, 1306–1310.10.1063/1.525514Search in Google Scholar

[32] Fine A., Some local models for correlation experiments, Synthese, 1982, 50, 279–294.10.1007/BF00416904Search in Google Scholar

[33] Fine A., The Shaky Game: Einstein Realism and the Quantum Theory, University of Chicago Press, Chicago, 199610.7208/chicago/9780226923260.001.0001Search in Google Scholar

[34] Giustina M., Versteegh M.A.M., Wengerowsky S., Handsteiner J., Hochrainer A., Phelan K., Steinlechner F., Kofler J., Larsson J.A., Abellán C., Amaya W., Pruneri V., Mitchell M.W., Beyer J., Gerrits T., Lita A.E., Shalm L.K., Nam S.W., Scheidl T., Ursin R., Wittmann B., Zeilinger A. Significant-loophole-free test of Bell’s theorem with entangled photons, Phys. Rev. Lett., 2015. 115, 25040110.1103/PhysRevLett.115.250401Search in Google Scholar PubMed

[35] Graft D.A. The Bell inequality cannot be validly applied to the Einstein-Podolsky-Rosen-Bohm (EPRB) experiments, Phys. Essays, 2009, 22, 534–542.10.4006/1.3231944Search in Google Scholar

[36] Graft D.A., Analysis of the Christensen et al. test of local realism, J. Adv. Phys., 2015, 4, 284–300.10.1166/jap.2015.1198Search in Google Scholar

[37] Grimmet G.R., Stirzaker D.R., Probability and Random Processes, Clarendon Press, Oxford, 1995Search in Google Scholar

[38] Hensen B., Bernien H., Dreau A.E., Reiserer A., Kalb N., Blok M.S., Ruitenberg J., Vermeulen R.F.L., Schouten R.N., Abellan C., Amaya W., Pruneri V., Mitchell M.W., Markham M., Twitchen D.J., Elkouss D., Wehner S., Taminiau T.H., Hanson R., Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres, Nature, 2015, 1575910.1038/nature15759Search in Google Scholar PubMed

[39] Hess K., Einstein Was Right! Pan Stanford Publishing, Singapore, 201510.1201/b16809Search in Google Scholar

[40] Hess K., De Raedt H., Michielsen K., Counterfactual definiteness and Bell’s inequality, J. Mod. Phys., 2016, 7, 1651–1660.10.4236/jmp.2016.713150Search in Google Scholar

[41] Hess K., De Raedt H., Michielsen K., From Boole to Leggett-Garg: Epistemology of Bell-type inequalities, Adv. Math. Phys., 2016, 2016, 462304010.1155/2016/4623040Search in Google Scholar

[42] Hess K., Michielsen K., De Raedt H., Possible experience: from Boole to Bell, Europhys. Lett., 2009, 87, 6000710.1209/0295-5075/87/60007Search in Google Scholar

[43] Hess K., Philipp W., A possible loophole in the theorem of Bell. Proc. Natl. Acad. Sci. USA, 2001, 98, 14224–14277.10.1073/pnas.251524998Search in Google Scholar PubMed PubMed Central

[44] Hess K., Philipp W., Bell’s theorem and the problem of decidability between the views of Einstein and Bohr, Proc. Natl. Acad. Sci. USA, 2001, 98, 14228–14233.10.1073/pnas.251525098Search in Google Scholar PubMed PubMed Central

[45] Hess K., Philipp W., Bell’s theorem: Critique of proofs with and without inequalities, AIP Conf. Proc., 2005, 750, 150–157.10.1063/1.1874568Search in Google Scholar

[46] Jaynes E.T., Clearing up mysteries - The original goal. In: J. Skilling, ed., Maximum Entropy and Bayesian Methods, Kluwer Academic Publishers, Dordrecht, 1989, 36, 1–2710.1007/978-94-015-7860-8_1Search in Google Scholar

[47] Khrennikov A., EPR-Bohm experiment and interference of probabilities. Found. Phys. Lett., 2004, 17, 691–700.10.1007/s10702-004-1122-zSearch in Google Scholar

[48] Khrennikov A., Bell’s inequality: Nonlocalty, “death of reality”, or incompatibility of random variables? AIP Conf. Proc., 2007, 962, 121–131.10.1063/1.2827294Search in Google Scholar

[49] Khrennikov A., Nonlocality as well as rejection of realism are only sufficient (but non-necessary!) conditions for violation of Bell’s inequality. Inf. Sciences, 2009, 179, 492–504.10.1016/j.ins.2008.08.021Search in Google Scholar

[50] Khrennikov A., After Bell, Fortschritte der Physik, 2017, 65, 160004410.1002/prop.201600044Search in Google Scholar

[51] Khrennikov A.Y., Interpretations of Probability, VSP Int. Sc. Publishers, Utrecht, 1999Search in Google Scholar

[52] Khrennikov A.Y., Amathematicians viewpoint to Bell’s theorem: in memory of Walter Philipp, AIP Conf. Proc., 2007, 889, 7–17.10.1063/1.2713442Search in Google Scholar

[53] Khrennikov A.Y., Contextual Approach to Quantum Formalism. Springer, Berlin, 200910.1007/978-1-4020-9593-1Search in Google Scholar

[54] Khrennikov A.Y., Violation of Bell’s inequality and non- Kolmogorovness, AIP Conf. Proc., 2009, 1001, 8610.1063/1.3109976Search in Google Scholar

[55] Khrennikov A.Y., On the role of probabilistic models in quantumphysics: Bell’s inequality and probabilistic incompatibility, J. Comput. Theor. Nanosci., 2011, 8, 1006–1010.10.1166/jctn.2011.1780Search in Google Scholar

[56] Khrennikov A.Y., Volovich Y., Discrete time dynamical models and their quantum-like context-dependent properties, J. Mod. Opt., 2004, 51, 1113–1114.10.1080/09500340408233646Search in Google Scholar

[57] Kocher C.A., Commins E.D., Polarization correlation of photons emitted in an atomic cascade. Phys. Rev. Lett., 1967, 18, 575–577.10.1103/PhysRevLett.18.575Search in Google Scholar

[58] Kofler J., Giustina M., Larsson J.Å., Mitchell M., Requirements for a loophole-free photonic bell test using imperfect setting gen erators, Phys. Rev. A, 2016, 93, 03211510.1103/PhysRevA.93.032115Search in Google Scholar

[59] Kolmogorov A., Foundations of the Theory of Probability, Chelsea Publishing Co., New York, 1956Search in Google Scholar

[60] Kracklauer A.F., Bell’s inequalities and EPR-B experiments: Are they disjoint?, AIP Conf. Proc., 2005, 750, 219–227.10.1063/1.1874573Search in Google Scholar

[61] Kupczynski M., On some tests of completeness of quantummechanics. Phys. Lett. A, 1986, 116, 417–419.10.1016/0375-9601(86)90372-5Search in Google Scholar

[62] Kupczynski M. Bertrand’s paradox and Bell’s inequalities. Phys. Lett. A, 1987, 121, 205–207.10.1016/0375-9601(87)90002-8Search in Google Scholar

[63] Kupczynski M., Entanglement and Bell inequalities, J. Russ. Las. Res., 2005, 26, 514–523.10.1007/s10946-005-0048-7Search in Google Scholar

[64] Kupczynski M., Entanglement and quantum nonlocality demystified, AIP Conf. Proc., 2012, 1508(1), 253–264. 10.1063/1.356746510.1063/1.4773137Search in Google Scholar

[65] Kupczynski M., Causality and local determinism versus quantum nonlocality, J. Phys.: Conference Series, 2014, 504(1), 01201510.1088/1742-6596/504/1/012015Search in Google Scholar

[66] Kupczynski M., Entanglement and quantumnonlocality demystified. Found. Phys., 2015, 45, 735–753.10.1007/s10701-014-9863-4Search in Google Scholar

[67] Kupczynski M., EPR paradox, quantum nonlocality and physical reality, Journal of Physics: Conference Series, 2016, 701(1), 01202110.1088/1742-6596/701/1/012021Search in Google Scholar

[68] Larsson J.Å., Loopholes in Bell inequality tests of local realism, J. Phys. A: Math. Theor., 2014, 47, 42400310.1088/1751-8113/47/42/424003Search in Google Scholar

[69] Leggett A.J., Garg A., Quantum Mechanics versus Macroscopic Realism: Is the Flux There when Nobody Looks. Phys. Rev. Lett.,1985, 9, 857–860.10.1103/PhysRevLett.54.857Search in Google Scholar

[70] Loubenets E., “Local Realism”, Bell’s Theorem and Quantum “Locally Realistic” Inequalities, Found. Phys., 2005, 35, 2051–2072.10.1007/s10701-005-8662-3Search in Google Scholar

[71] Matzkin A., Is Bell’s theorem relevant to quantum mechanics? On locality and non-commuting observables, AIP Conf. Proc., 2009, 1101, 339–348.10.1063/1.3109959Search in Google Scholar

[72] Michielsen K., De Raedt H., Event-based simulation of quantum physics experiments, Int. J. Mod. Phys. C, 2014, 25, 0143000310.1142/9789814616737_0007Search in Google Scholar

[73] Morgan P., Bell inequalities for random fields, J. Phys. A, 2006, 39, 7441–7445.10.1088/0305-4470/39/23/018Search in Google Scholar

[74] de Muynck W.M., The Bell inequalities and their irrelevance to the problem of locality in quantum mechanics, Phys. Lett. A, 1986, 114, 65–67.10.1016/0375-9601(86)90480-9Search in Google Scholar

[75] Nieuwenhuizen T., Kupczynski M., The contextuality loophole is fatal for the derivation of Bell inequalities: Reply to a comment by I. Schmelzer, Found. Phys., 2017, 47, 316–319.10.1007/s10701-017-0062-ySearch in Google Scholar

[76] Nieuwenhuizen T.M., Where Bell went wrong, AIP Conf. Proc., 2009, 1101, 127–133.10.1063/1.3109932Search in Google Scholar

[77] Nieuwenhuizen T.M., Is the contextuality loophole fatal for the derivation of Bell inequalities?, Found. Phys., 2011, 41, 580–591.10.1007/s10701-010-9461-zSearch in Google Scholar

[78] Pascazio S. Time and Bell-type inequalities, Phys. Lett. A, 1986, 118, 47–53.10.1016/0375-9601(86)90645-6Search in Google Scholar

[79] Pearl J., Causality: models, reasoning, and inference, Cambridge University Press, Cambridge, 2000Search in Google Scholar

[80] Pearle P.M., Hidden-variable example based upon data rejection, Phys. Rev. D, 1970, 2, 1418–1425.10.1103/PhysRevD.2.1418Search in Google Scholar

[81] Pitowsky I., Resolution of the Einstein-Podolsky-Rosen and Bell Paradoxes, Phys. Rev. Lett., 1982, 48, 1299–1302.10.1103/PhysRevLett.48.1299Search in Google Scholar

[82] Pitowsky I., Correlation polytopes: Their geometry and complex- ity. Math. Program., 1991, 50, 395–414.10.1007/BF01594946Search in Google Scholar

[83] Pitowsky I., George Boole’s ‘Conditions of Possible Experience’ and the Quantum Puzzle, Brit. J. Phil. Sci., 1994, 45, 95–125.10.1093/bjps/45.1.95Search in Google Scholar

[84] Santos E., Bell’s theorem and the experiments: Increasing empirical support to local realism? Stud. Hist. Phil. Mod. Phys., 2005, 36, 544–565.10.1016/j.shpsb.2005.05.007Search in Google Scholar

[85] Shalm L.K., Meyer-Scott E., Christensen B.G., Bierhorst P., Wayne M.A., Stevens M.J., Gerrits T., Glancy S., Hamel D.R., Allman M.S., Coakley K.J., Dyer S.D., Hodge C., Lita A.E., Verma V.B., Lambrocco C., Tortorici E., Migdall A.L., Zhang Y., Kumor D., Farr W.H., Marsili F., Shaw M.D., Stern J.A., Abellán C., Amaya W., Pruneri V., Jennewein T., Mitchell M.W., Kwiat P.G., Bienfang J.C., Mirin R.P., Knill E., Nam S.W., Strong loophole-free test of local realism, Phys. Rev. Lett., 2015, 115, 25040210.1364/CLEO_QELS.2016.FW4C.1Search in Google Scholar

[86] Sica L., Bell’s inequalities I: An explanation for their experimental violation, Opt. Comm., 1999, 170, 55–60.10.1016/S0030-4018(99)00417-4Search in Google Scholar

[87] Suppes P., Zanotti M., When are probabilistic explanations possible?, Synthese, 1981, 48, 191–199.10.1007/BF01063886Search in Google Scholar

[88] Vorob’ev N.N., Consistent families of measures and their extensions, Theor. Probab. Appl., 1962, 7, 147–162.10.1137/1107014Search in Google Scholar

[89] Weihs G., Jennewein T., Simon C., Weinfurther H., Zeilinger A., Violation of Bell’s inequality under strict Einstein locality conditions, Phys. Rev. Lett., 1998, 81, 5039–5043.10.1103/PhysRevLett.81.5039Search in Google Scholar

[90] Zhao S., De Raedt H., Michielsen K, Event-by-event simulation model of Einstein-Podolsky-Rosen-Bohm experiments, Found. Phys., 2008, 38, 322–347.10.1007/s10701-008-9205-5Search in Google Scholar

Received: 2017-8-1
Accepted: 2017-10-5
Published Online: 2017-11-22

© 2017 H. De Raedt et al.

This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.

Articles in the same Issue

  1. Regular Articles
  2. Analysis of a New Fractional Model for Damped Bergers’ Equation
  3. Regular Articles
  4. Optimal homotopy perturbation method for nonlinear differential equations governing MHD Jeffery-Hamel flow with heat transfer problem
  5. Regular Articles
  6. Semi- analytic numerical method for solution of time-space fractional heat and wave type equations with variable coefficients
  7. Regular Articles
  8. Investigation of a curve using Frenet frame in the lightlike cone
  9. Regular Articles
  10. Construction of complex networks from time series based on the cross correlation interval
  11. Regular Articles
  12. Nonlinear Schrödinger approach to European option pricing
  13. Regular Articles
  14. A modified cubic B-spline differential quadrature method for three-dimensional non-linear diffusion equations
  15. Regular Articles
  16. A new miniaturized negative-index meta-atom for tri-band applications
  17. Regular Articles
  18. Seismic stability of the survey areas of potential sites for the deep geological repository of the spent nuclear fuel
  19. Regular Articles
  20. Distributed containment control of heterogeneous fractional-order multi-agent systems with communication delays
  21. Regular Articles
  22. Sensitivity analysis and economic optimization studies of inverted five-spot gas cycling in gas condensate reservoir
  23. Regular Articles
  24. Quantum mechanics with geometric constraints of Friedmann type
  25. Regular Articles
  26. Modeling and Simulation for an 8 kW Three-Phase Grid-Connected Photo-Voltaic Power System
  27. Regular Articles
  28. Application of the optimal homotopy asymptotic method to nonlinear Bingham fluid dampers
  29. Regular Articles
  30. Analysis of Drude model using fractional derivatives without singular kernels
  31. Regular Articles
  32. An unsteady MHD Maxwell nanofluid flow with convective boundary conditions using spectral local linearization method
  33. Regular Articles
  34. New analytical solutions for conformable fractional PDEs arising in mathematical physics by exp-function method
  35. Regular Articles
  36. Quantum mechanical calculation of electron spin
  37. Regular Articles
  38. CO2 capture by polymeric membranes composed of hyper-branched polymers with dense poly(oxyethylene) comb and poly(amidoamine)
  39. Regular Articles
  40. Chain on a cone
  41. Regular Articles
  42. Multi-task feature learning by using trace norm regularization
  43. Regular Articles
  44. Superluminal tunneling of a relativistic half-integer spin particle through a potential barrier
  45. Regular Articles
  46. Neutrosophic triplet normed space
  47. Regular Articles
  48. Lie algebraic discussion for affinity based information diffusion in social networks
  49. Regular Articles
  50. Radiation dose and cancer risk estimates in helical CT for pulmonary tuberculosis infections
  51. Regular Articles
  52. A comparison study of steady-state vibrations with single fractional-order and distributed-order derivatives
  53. Regular Articles
  54. Some new remarks on MHD Jeffery-Hamel fluid flow problem
  55. Regular Articles
  56. Numerical investigation of magnetohydrodynamic slip flow of power-law nanofluid with temperature dependent viscosity and thermal conductivity over a permeable surface
  57. Regular Articles
  58. Charge conservation in a gravitational field in the scalar ether theory
  59. Regular Articles
  60. Measurement problem and local hidden variables with entangled photons
  61. Regular Articles
  62. Compression of hyper-spectral images using an accelerated nonnegative tensor decomposition
  63. Regular Articles
  64. Fabrication and application of coaxial polyvinyl alcohol/chitosan nanofiber membranes
  65. Regular Articles
  66. Calculating degree-based topological indices of dominating David derived networks
  67. Regular Articles
  68. The structure and conductivity of polyelectrolyte based on MEH-PPV and potassium iodide (KI) for dye-sensitized solar cells
  69. Regular Articles
  70. Chiral symmetry restoration and the critical end point in QCD
  71. Regular Articles
  72. Numerical solution for fractional Bratu’s initial value problem
  73. Regular Articles
  74. Structure and optical properties of TiO2 thin films deposited by ALD method
  75. Regular Articles
  76. Quadruple multi-wavelength conversion for access network scalability based on cross-phase modulation in an SOA-MZI
  77. Regular Articles
  78. Application of ANNs approach for wave-like and heat-like equations
  79. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  80. Study on node importance evaluation of the high-speed passenger traffic complex network based on the Structural Hole Theory
  81. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  82. A mathematical/physics model to measure the role of information and communication technology in some economies: the Chinese case
  83. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  84. Numerical modeling of the thermoelectric cooler with a complementary equation for heat circulation in air gaps
  85. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  86. On the libration collinear points in the restricted three – body problem
  87. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  88. Research on Critical Nodes Algorithm in Social Complex Networks
  89. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  90. A simulation based research on chance constrained programming in robust facility location problem
  91. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  92. A mathematical/physics carbon emission reduction strategy for building supply chain network based on carbon tax policy
  93. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  94. Mathematical analysis of the impact mechanism of information platform on agro-product supply chain and agro-product competitiveness
  95. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  96. A real negative selection algorithm with evolutionary preference for anomaly detection
  97. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  98. A privacy-preserving parallel and homomorphic encryption scheme
  99. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  100. Random walk-based similarity measure method for patterns in complex object
  101. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  102. A Mathematical Study of Accessibility and Cohesion Degree in a High-Speed Rail Station Connected to an Urban Bus Transport Network
  103. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  104. Design and Simulation of the Integrated Navigation System based on Extended Kalman Filter
  105. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  106. Oil exploration oriented multi-sensor image fusion algorithm
  107. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  108. Analysis of Product Distribution Strategy in Digital Publishing Industry Based on Game-Theory
  109. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  110. Expanded Study on the accumulation effect of tourism under the constraint of structure
  111. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  112. Unstructured P2P Network Load Balance Strategy Based on Multilevel Partitioning of Hypergraph
  113. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  114. Research on the method of information system risk state estimation based on clustering particle filter
  115. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  116. Demand forecasting and information platform in tourism
  117. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  118. Physical-chemical properties studying of molecular structures via topological index calculating
  119. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  120. Local kernel nonparametric discriminant analysis for adaptive extraction of complex structures
  121. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  122. City traffic flow breakdown prediction based on fuzzy rough set
  123. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  124. Conservation laws for a strongly damped wave equation
  125. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  126. Blending type approximation by Stancu-Kantorovich operators based on Pólya-Eggenberger distribution
  127. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  128. Computing the Ediz eccentric connectivity index of discrete dynamic structures
  129. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  130. A discrete epidemic model for bovine Babesiosis disease and tick populations
  131. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  132. Study on maintaining formations during satellite formation flying based on SDRE and LQR
  133. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  134. Relationship between solitary pulmonary nodule lung cancer and CT image features based on gradual clustering
  135. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  136. A novel fast target tracking method for UAV aerial image
  137. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  138. Fuzzy comprehensive evaluation model of interuniversity collaborative learning based on network
  139. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  140. Conservation laws, classical symmetries and exact solutions of the generalized KdV-Burgers-Kuramoto equation
  141. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  142. After notes on self-similarity exponent for fractal structures
  143. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  144. Excitation probability and effective temperature in the stationary regime of conductivity for Coulomb Glasses
  145. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  146. Comparisons of feature extraction algorithm based on unmanned aerial vehicle image
  147. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  148. Research on identification method of heavy vehicle rollover based on hidden Markov model
  149. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  150. Classifying BCI signals from novice users with extreme learning machine
  151. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  152. Topics on data transmission problem in software definition network
  153. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  154. Statistical inferences with jointly type-II censored samples from two Pareto distributions
  155. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  156. Estimation for coefficient of variation of an extension of the exponential distribution under type-II censoring scheme
  157. Special issue on Nonlinear Dynamics in General and Dynamical Systems in particular
  158. Analysis on trust influencing factors and trust model from multiple perspectives of online Auction
  159. Special Issue on Advances on Modelling of Flowing and Transport in Porous Media
  160. Coupling of two-phase flow in fractured-vuggy reservoir with filling medium
  161. Special Issue on Advances on Modelling of Flowing and Transport in Porous Media
  162. Production decline type curves analysis of a finite conductivity fractured well in coalbed methane reservoirs
  163. Special Issue on Advances on Modelling of Flowing and Transport in Porous Media
  164. Flow Characteristic and Heat Transfer for Non-Newtonian Nanofluid in Rectangular Microchannels with Teardrop Dimples/Protrusions
  165. Special Issue on Advances on Modelling of Flowing and Transport in Porous Media
  166. The size prediction of potential inclusions embedded in the sub-surface of fused silica by damage morphology
  167. Special Issue on Advances on Modelling of Flowing and Transport in Porous Media
  168. Research on carbonate reservoir interwell connectivity based on a modified diffusivity filter model
  169. Special Issue on Advances on Modelling of Flowing and Transport in Porous Media
  170. The method of the spatial locating of macroscopic throats based-on the inversion of dynamic interwell connectivity
  171. Special Issue on Advances on Modelling of Flowing and Transport in Porous Media
  172. Unsteady mixed convection flow through a permeable stretching flat surface with partial slip effects through MHD nanofluid using spectral relaxation method
  173. Special Issue on Advances on Modelling of Flowing and Transport in Porous Media
  174. A volumetric ablation model of EPDM considering complex physicochemical process in porous structure of char layer
  175. Special Issue on Advances on Modelling of Flowing and Transport in Porous Media
  176. Numerical simulation on ferrofluid flow in fractured porous media based on discrete-fracture model
  177. Special Issue on Advances on Modelling of Flowing and Transport in Porous Media
  178. Macroscopic lattice Boltzmann model for heat and moisture transfer process with phase transformation in unsaturated porous media during freezing process
  179. Special Issue on Advances on Modelling of Flowing and Transport in Porous Media
  180. Modelling of intermittent microwave convective drying: parameter sensitivity
  181. Special Issue on Advances on Modelling of Flowing and Transport in Porous Media
  182. Simulating gas-water relative permeabilities for nanoscale porous media with interfacial effects
  183. Special Issue on Advances on Modelling of Flowing and Transport in Porous Media
  184. Simulation of counter-current imbibition in water-wet fractured reservoirs based on discrete-fracture model
  185. Special Issue on Advances on Modelling of Flowing and Transport in Porous Media
  186. Investigation effect of wettability and heterogeneity in water flooding and on microscopic residual oil distribution in tight sandstone cores with NMR technique
  187. Special Issue on Advances on Modelling of Flowing and Transport in Porous Media
  188. Analytical modeling of coupled flow and geomechanics for vertical fractured well in tight gas reservoirs
  189. Special Issue on Ever-New "Loopholes" in Bell’s Argument and Experimental Tests
  190. Special Issue: Ever New "Loopholes" in Bell’s Argument and Experimental Tests
  191. Special Issue on Ever-New "Loopholes" in Bell’s Argument and Experimental Tests
  192. The ultimate loophole in Bell’s theorem: The inequality is identically satisfied by data sets composed of ±1′s assuming merely that they exist
  193. Special Issue on Ever-New "Loopholes" in Bell’s Argument and Experimental Tests
  194. Erratum to: The ultimate loophole in Bell’s theorem: The inequality is identically satisfied by data sets composed of ±1′s assuming merely that they exist
  195. Special Issue on Ever-New "Loopholes" in Bell’s Argument and Experimental Tests
  196. Rhetoric, logic, and experiment in the quantum nonlocality debate
  197. Special Issue on Ever-New "Loopholes" in Bell’s Argument and Experimental Tests
  198. What If Quantum Theory Violates All Mathematics?
  199. Special Issue on Ever-New "Loopholes" in Bell’s Argument and Experimental Tests
  200. Relativity, anomalies and objectivity loophole in recent tests of local realism
  201. Special Issue on Ever-New "Loopholes" in Bell’s Argument and Experimental Tests
  202. The photon identification loophole in EPRB experiments: computer models with single-wing selection
  203. Special Issue on Ever-New "Loopholes" in Bell’s Argument and Experimental Tests
  204. Bohr against Bell: complementarity versus nonlocality
  205. Special Issue on Ever-New "Loopholes" in Bell’s Argument and Experimental Tests
  206. Is Einsteinian no-signalling violated in Bell tests?
  207. Special Issue on Ever-New "Loopholes" in Bell’s Argument and Experimental Tests
  208. Bell’s “Theorem”: loopholes vs. conceptual flaws
  209. Special Issue on Ever-New "Loopholes" in Bell’s Argument and Experimental Tests
  210. Nonrecurrence and Bell-like inequalities
  211. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  212. Three-dimensional computer models of electrospinning systems
  213. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  214. Electric field computation and measurements in the electroporation of inhomogeneous samples
  215. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  216. Modelling of magnetostriction of transformer magnetic core for vibration analysis
  217. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  218. Comparison of the fractional power motor with cores made of various magnetic materials
  219. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  220. Dynamics of the line-start reluctance motor with rotor made of SMC material
  221. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  222. Inhomogeneous dielectrics: conformal mapping and finite-element models
  223. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  224. Topology optimization of induction heating model using sequential linear programming based on move limit with adaptive relaxation
  225. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  226. Detection of inter-turn short-circuit at start-up of induction machine based on torque analysis
  227. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  228. Current superimposition variable flux reluctance motor with 8 salient poles
  229. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  230. Modelling axial vibration in windings of power transformers
  231. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  232. Field analysis & eddy current losses calculation in five-phase tubular actuator
  233. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  234. Hybrid excited claw pole generator with skewed and non-skewed permanent magnets
  235. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  236. Electromagnetic phenomena analysis in brushless DC motor with speed control using PWM method
  237. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  238. Field-circuit analysis and measurements of a single-phase self-excited induction generator
  239. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  240. A comparative analysis between classical and modified approach of description of the electrical machine windings by means of T0 method
  241. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  242. Field-based optimal-design of an electric motor: a new sensitivity formulation
  243. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  244. Application of the parametric proper generalized decomposition to the frequency-dependent calculation of the impedance of an AC line with rectangular conductors
  245. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  246. Virtual reality as a new trend in mechanical and electrical engineering education
  247. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  248. Holonomicity analysis of electromechanical systems
  249. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  250. An accurate reactive power control study in virtual flux droop control
  251. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  252. Localized probability of improvement for kriging based multi-objective optimization
  253. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  254. Research of influence of open-winding faults on properties of brushless permanent magnets motor
  255. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  256. Optimal design of the rotor geometry of line-start permanent magnet synchronous motor using the bat algorithm
  257. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  258. Model of depositing layer on cylindrical surface produced by induction-assisted laser cladding process
  259. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  260. Detection of inter-turn faults in transformer winding using the capacitor discharge method
  261. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  262. A novel hybrid genetic algorithm for optimal design of IPM machines for electric vehicle
  263. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  264. Lamination effects on a 3D model of the magnetic core of power transformers
  265. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  266. Detection of vertical disparity in three-dimensional visualizations
  267. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  268. Calculations of magnetic field in dynamo sheets taking into account their texture
  269. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  270. 3-dimensional computer model of electrospinning multicapillary unit used for electrostatic field analysis
  271. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  272. Optimization of wearable microwave antenna with simplified electromagnetic model of the human body
  273. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  274. Induction heating process of ferromagnetic filled carbon nanotubes based on 3-D model
  275. Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF 2017
  276. Speed control of an induction motor by 6-switched 3-level inverter
Downloaded on 5.4.2026 from https://www.degruyterbrill.com/document/doi/10.1515/phys-2017-0085/html
Scroll to top button