864 research outputs found
Design of coupled mace filters for optical pattern recognition using practical spatial light modulators
Spatial light modulators (SLMs) are being used in correlation-based optical pattern recognition systems to implement the Fourier domain filters. Currently available SLMs have certain limitations with respect to the realizability of these filters. Therefore, it is necessary to incorporate the SLM constraints in the design of the filters. The design of a SLM-constrained minimum average correlation energy (SLM-MACE) filter using the simulated annealing-based optimization technique was investigated. The SLM-MACE filter was synthesized for three different types of constraints. The performance of the filter was evaluated in terms of its recognition (discrimination) capabilities using computer simulations. The correlation plane characteristics of the SLM-MACE filter were found to be reasonably good. The SLM-MACE filter yielded far better results than the analytical MACE filter implemented on practical SLMs using the constrained magnitude technique. Further, the filter performance was evaluated in the presence of noise in the input test images. This work demonstrated the need to include the SLM constraints in the filter design. Finally, a method is suggested to reduce the computation time required for the synthesis of the SLM-MACE filter
Correlator Convolutional Neural Networks: An Interpretable Architecture for Image-like Quantum Matter Data
Machine learning models are a powerful theoretical tool for analyzing data
from quantum simulators, in which results of experiments are sets of snapshots
of many-body states. Recently, they have been successfully applied to
distinguish between snapshots that can not be identified using traditional one
and two point correlation functions. Thus far, the complexity of these models
has inhibited new physical insights from this approach. Here, using a novel set
of nonlinearities we develop a network architecture that discovers features in
the data which are directly interpretable in terms of physical observables. In
particular, our network can be understood as uncovering high-order correlators
which significantly differ between the data studied. We demonstrate this new
architecture on sets of simulated snapshots produced by two candidate theories
approximating the doped Fermi-Hubbard model, which is realized in state-of-the
art quantum gas microscopy experiments. From the trained networks, we uncover
that the key distinguishing features are fourth-order spin-charge correlators,
providing a means to compare experimental data to theoretical predictions. Our
approach lends itself well to the construction of simple, end-to-end
interpretable architectures and is applicable to arbitrary lattice data, thus
paving the way for new physical insights from machine learning studies of
experimental as well as numerical data.Comment: 7 pages, 4 figures + 13 pages of supplemental materia
Parity Doubling Among the Baryons
We study the evidence for and possible origins of parity doubling among the
baryons. First we explore the experimental evidence, finding a significant
signal for parity doubling in the non-strange baryons, but little evidence
among strange baryons. Next we discuss potential explanations for this
phenomenon. Possibilities include suppression of the violation of the flavor
singlet axial symmetry () of QCD, which is broken by the triangle
anomaly and by quark masses. A conventional Wigner-Weyl realization of the
chiral symmetry would also result in parity
doubling. However this requires the suppression of families of \emph{chirally
invariant} operators by some other dynamical mechanism. In this scenario the
parity doubled states should decouple from pions. We discuss other explanations
including connections to chiral invariant short distance physics motivated by
large arguments as suggested by Shifman and others, and intrinsic
deformation of relatively rigid highly excited hadrons, leading to parity
doubling on the leading Regge trajectory. Finally we review the spectroscopic
consequences of chiral symmetry using a formalism introduced by Weinberg, and
use it to describe two baryons of opposite parity.Comment: 32 pages, 8 figures; v2 revised and expanded; submitted to Phys. Re
Optical implementations of radial basis classifiers
We describe two optical systems based on the radial basis function approach to pattern classification. An optical-disk-based system for handwritten character recognition is demonstrated. The optical system computes the Euclidean distance between an unknown input and 650 stored patterns at a demonstrated rate of 26,000 pattern comparisons/s. The ultimate performance of this system is limited by optical-disk resolution to 10^11 binary operations/s. An adaptive system is also presented that facilitates on-line learning and provides additional robustness
Comments on the Necessity and Implications of State-Dependence in the Black Hole Interior
We revisit the "state-dependence" of the map that we proposed recently
between bulk operators in the interior of a large AdS black hole and operators
in the boundary CFT. By refining recent versions of the information paradox, we
show that this feature is necessary for the CFT to successfully describe local
physics behind the horizon --- not only for single-sided black holes but even
in the eternal black hole. We show that state-dependence is invisible to an
infalling observer who cannot differentiate these operators from those of
ordinary quantum effective field theory. Therefore the infalling observer does
not observe any violations of quantum mechanics. We successfully resolve a
large class of potential ambiguities in our construction. We analyze states
where the CFT is entangled with another system and show that the ER=EPR
conjecture emerges from our construction in a natural and precise form. We
comment on the possible semi-classical origins of state-dependence.Comment: 136 pages, 16 figure
Spread spectrum-based video watermarking algorithms for copyright protection
Merged with duplicate record 10026.1/2263 on 14.03.2017 by CS (TIS)Digital technologies know an unprecedented expansion in the last years. The consumer can
now benefit from hardware and software which was considered state-of-the-art several years
ago. The advantages offered by the digital technologies are major but the same digital
technology opens the door for unlimited piracy. Copying an analogue VCR tape was certainly
possible and relatively easy, in spite of various forms of protection, but due to the analogue
environment, the subsequent copies had an inherent loss in quality. This was a natural way of
limiting the multiple copying of a video material. With digital technology, this barrier
disappears, being possible to make as many copies as desired, without any loss in quality
whatsoever. Digital watermarking is one of the best available tools for fighting this threat.
The aim of the present work was to develop a digital watermarking system compliant with the
recommendations drawn by the EBU, for video broadcast monitoring. Since the watermark
can be inserted in either spatial domain or transform domain, this aspect was investigated and
led to the conclusion that wavelet transform is one of the best solutions available. Since
watermarking is not an easy task, especially considering the robustness under various attacks
several techniques were employed in order to increase the capacity/robustness of the system:
spread-spectrum and modulation techniques to cast the watermark, powerful error correction
to protect the mark, human visual models to insert a robust mark and to ensure its invisibility.
The combination of these methods led to a major improvement, but yet the system wasn't
robust to several important geometrical attacks. In order to achieve this last milestone, the
system uses two distinct watermarks: a spatial domain reference watermark and the main
watermark embedded in the wavelet domain. By using this reference watermark and techniques
specific to image registration, the system is able to determine the parameters of the attack and
revert it. Once the attack was reverted, the main watermark is recovered. The final result is a
high capacity, blind DWr-based video watermarking system, robust to a wide range of attacks.BBC Research & Developmen
- …