EPR-Bell Numeric Simulations

Based on previous studies about EPR experiments and quantum cryptography , we studied a pattern of reply functions for Alice and Bob in the Bell theorem experiments and found the Bell cosinus2 delta angles curve , by only adding a no answer option. Preliminary results are along the line of data from Zeilinger et AL. released in Nature in 2013 ( 10.1038/nature12012 ). We link explicitly our model singles and no answer pairs ( 27 to 38% pairs lost ) to the concept of arm efficiency ( 74-78% of efficient photons, 22-26% arm lost , then 45% pairs lost ). Finally, only the lost 2% of the experiment might be related to technical precision.

The important fact is that singles are identified before the correlation computing. When we find 70% of pairs, it means that the arm efficiency of the model if about 86%. If we keep 75% arm efficiency models and use another algorithm not needing great computing precision , we can get a curves accuracies serie converging to zero.
The functions family seems suitable to modelize other entangled objects correlations.

New physics experiments might measure a relation between efficiency and the curve accuracy.

It is only numeric, not physics but this shows that Quantum Mechanics non locality has great constraints.

Many other periodic functions might be brought from macroscopic laws to correlations using the same algorithms, ie almost any cos(wt+p). This reveals a purely mathematic process that is not limited to our particular case.

I found recently that Maudlin had theorized something similar in Quantum Non-Locality and Relativity : Metaphysical Intimations of Modern Physics, 3rd Edition 2011. He made almost all the predictions of the model study but I don't know if he found functions that seem so natural. He suggested to measure the arm efficiency and to finish with the realistic models with an arm efficiency greater then 82%. But, 82% is not enough and we saw a lot less in december in Austria

We will show later that theses new functions are cryptology safe, in a way where q-cryptography will emerge strengthened and essential.

Welcome to the realistic world of q-crypt.com , the Read Once Bit corporation in a spacetime perhaps not local , but so little :)
Igael Azoulay
q-crypt

image1

Hidden variables are shared parameters by photons before their spacial separation. For example, polarization angles similarly to the Malus law.
This sharing is less than identity and it doesn't need non locality.

if you want to participate to a PC chain to correlate in group, please send me an email. Correlations don't need synchronicity :)

Kirk, Tara, Alice and Bob "correlated" 3 times with each other using common uniq answers. We self-correlated many times in the past as well as in the future.