Multi-party quantum summation with a single d-level quantum system

2019 ◽  
Vol 17 (03) ◽  
pp. 1950027
Author(s):  
C. Zhang ◽  
H. Situ ◽  
Q. Huang ◽  
Z. Sun ◽  
Z. Huang

A multi-party quantum summation with a single [Formula: see text]-level quantum system is proposed, in which a semi-honest third party (TP) is employed. Only sequential communication of a single quantum [Formula: see text]-level system (for any prime [Formula: see text]) is required in the presented protocol, resulting in advantages in scalability. In addition, it can be realized with state-of-the-art technology. Due to the semi-honest TP, the protocol is not only secure against outside attacks, but also secure against participant attacks.

Author(s):  
Carl E. Henderson

Over the past few years it has become apparent in our multi-user facility that the computer system and software supplied in 1985 with our CAMECA CAMEBAX-MICRO electron microprobe analyzer has the greatest potential for improvement and updating of any component of the instrument. While the standard CAMECA software running on a DEC PDP-11/23+ computer under the RSX-11M operating system can perform almost any task required of the instrument, the commands are not always intuitive and can be difficult to remember for the casual user (of which our laboratory has many). Given the widespread and growing use of other microcomputers (such as PC’s and Macintoshes) by users of the microprobe, the PDP has become the “oddball” and has also fallen behind the state-of-the-art in terms of processing speed and disk storage capabilities. Upgrade paths within products available from DEC are considered to be too expensive for the benefits received. After using a Macintosh for other tasks in the laboratory, such as instrument use and billing records, word processing, and graphics display, its unique and “friendly” user interface suggested an easier-to-use system for computer control of the electron microprobe automation. Specifically a Macintosh IIx was chosen for its capacity for third-party add-on cards used in instrument control.


Data ◽  
2021 ◽  
Vol 6 (8) ◽  
pp. 87
Author(s):  
Sara Ferreira ◽  
Mário Antunes ◽  
Manuel E. Correia

Deepfake and manipulated digital photos and videos are being increasingly used in a myriad of cybercrimes. Ransomware, the dissemination of fake news, and digital kidnapping-related crimes are the most recurrent, in which tampered multimedia content has been the primordial disseminating vehicle. Digital forensic analysis tools are being widely used by criminal investigations to automate the identification of digital evidence in seized electronic equipment. The number of files to be processed and the complexity of the crimes under analysis have highlighted the need to employ efficient digital forensics techniques grounded on state-of-the-art technologies. Machine Learning (ML) researchers have been challenged to apply techniques and methods to improve the automatic detection of manipulated multimedia content. However, the implementation of such methods have not yet been massively incorporated into digital forensic tools, mostly due to the lack of realistic and well-structured datasets of photos and videos. The diversity and richness of the datasets are crucial to benchmark the ML models and to evaluate their appropriateness to be applied in real-world digital forensics applications. An example is the development of third-party modules for the widely used Autopsy digital forensic application. This paper presents a dataset obtained by extracting a set of simple features from genuine and manipulated photos and videos, which are part of state-of-the-art existing datasets. The resulting dataset is balanced, and each entry comprises a label and a vector of numeric values corresponding to the features extracted through a Discrete Fourier Transform (DFT). The dataset is available in a GitHub repository, and the total amount of photos and video frames is 40,588 and 12,400, respectively. The dataset was validated and benchmarked with deep learning Convolutional Neural Networks (CNN) and Support Vector Machines (SVM) methods; however, a plethora of other existing ones can be applied. Generically, the results show a better F1-score for CNN when comparing with SVM, both for photos and videos processing. CNN achieved an F1-score of 0.9968 and 0.8415 for photos and videos, respectively. Regarding SVM, the results obtained with 5-fold cross-validation are 0.9953 and 0.7955, respectively, for photos and videos processing. A set of methods written in Python is available for the researchers, namely to preprocess and extract the features from the original photos and videos files and to build the training and testing sets. Additional methods are also available to convert the original PKL files into CSV and TXT, which gives more flexibility for the ML researchers to use the dataset on existing ML frameworks and tools.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Tao Chen ◽  
Wei Gou ◽  
Dizhou Xie ◽  
Teng Xiao ◽  
Wei Yi ◽  
...  

AbstractWe experimentally study quantum Zeno effects in a parity-time (PT) symmetric cold atom gas periodically coupled to a reservoir. Based on the state-of-the-art control of inter-site couplings of atoms in a momentum lattice, we implement a synthetic two-level system with passive PT symmetry over two lattice sites, where an effective dissipation is introduced through repeated couplings to the rest of the lattice. Quantum Zeno (anti-Zeno) effects manifest in our experiment as the overall dissipation of the two-level system becoming suppressed (enhanced) with increasing coupling intensity or frequency. We demonstrate that quantum Zeno regimes exist in the broken PT symmetry phase, and are bounded by exceptional points separating the PT symmetric and PT broken phases, as well as by a discrete set of critical coupling frequencies. Our experiment establishes the connection between PT-symmetry-breaking transitions and quantum Zeno effects, and is extendable to higher dimensions or to interacting regimes, thanks to the flexible control with atoms in a momentum lattice.


2017 ◽  
Vol 31 (04) ◽  
pp. 1750027 ◽  
Author(s):  
Andrey V. Soldatov

It is shown that a two-level quantum system possessing dipole moment operator with permanent non-equal diagonal matrix elements and driven by external semiclassical monochromatic high-frequency electromagnetic (EM) (laser) field can amplify EM radiation waves of much lower frequency.


2006 ◽  
Vol 129 (1) ◽  
pp. 211-215 ◽  
Author(s):  
John D. Fishburn

Within the current design codes for boilers, piping, and pressure vessels, there are many different equations for the thickness of a cylindrical section under internal pressure. A reassessment of these various formulations, using the original data, is described together with more recent developments in the state of the art. A single formula, which can be demonstrated to retain the same design margin in both the time-dependent and time-independent regimes, is shown to give the best correlation with the experimental data and is proposed for consideration for inclusion in the design codes.


Electronics ◽  
2019 ◽  
Vol 8 (6) ◽  
pp. 641 ◽  
Author(s):  
Miguel Rivera-Acosta ◽  
Susana Ortega-Cisneros ◽  
Jorge Rivera

This paper presents a platform that automatically generates custom hardware accelerators for convolutional neural networks (CNNs) implemented in field-programmable gate array (FPGA) devices. It includes a user interface for configuring and managing these accelerators. The herein-presented platform can perform all the processes necessary to design and test CNN accelerators from the CNN architecture description at both layer and internal parameter levels, training the desired architecture with any dataset and generating the configuration files required by the platform. With these files, it can synthesize the register-transfer level (RTL) and program the customized CNN accelerator into the FPGA device for testing, making it possible to generate custom CNN accelerators quickly and easily. All processes save the CNN architecture description are fully automatized and carried out by the platform, which manages third-party software to train the CNN and synthesize and program the generated RTL. The platform has been tested with the implementation of some of the CNN architectures found in the state-of-the-art for freely available datasets such as MNIST, CIFAR-10, and STL-10.


Entropy ◽  
2019 ◽  
Vol 21 (8) ◽  
pp. 806 ◽  
Author(s):  
Andrei Khrennikov

This paper is aimed to dissociate nonlocality from quantum theory. We demonstrate that the tests on violation of the Bell type inequalities are simply statistical tests of local incompatibility of observables. In fact, these are tests on violation of the Bohr complementarity principle. Thus, the attempts to couple experimental violations of the Bell type inequalities with “quantum nonlocality” is really misleading. These violations are explained in the quantum theory as exhibitions of incompatibility of observables for a single quantum system, e.g., the spin projections for a single electron or the polarization projections for a single photon. Of course, one can go beyond quantum theory with the hidden variables models (as was suggested by Bell) and then discuss their possible nonlocal features. However, conventional quantum theory is local.


Author(s):  
Johann F Jadebeck ◽  
Axel Theorell ◽  
Samuel Leweke ◽  
Katharina Nöh

Abstract Summary The C++ library Highly Optimized Polytope Sampling (HOPS) provides implementations of efficient and scalable algorithms for sampling convex-constrained models that are equipped with arbitrary target functions. For uniform sampling, substantial performance gains were achieved compared to the state-of-the-art. The ease of integration and utility of non-uniform sampling is showcased in a Bayesian inference setting, demonstrating how HOPS interoperates with third-party software. Availability and implementation Source code is available at https://github.com/modsim/hops/, tested on Linux and MS Windows, includes unit tests, detailed documentation, example applications and a Dockerfile. Contact [email protected] Supplementary information Supplementary data are available at Bioinformatics online.


2019 ◽  
Vol 15 (9) ◽  
pp. 941-946 ◽  
Author(s):  
Yu-Ming He ◽  
Hui Wang ◽  
Can Wang ◽  
M.-C. Chen ◽  
Xing Ding ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document