864 research outputs found

    Design of coupled mace filters for optical pattern recognition using practical spatial light modulators

    Get PDF
    Spatial light modulators (SLMs) are being used in correlation-based optical pattern recognition systems to implement the Fourier domain filters. Currently available SLMs have certain limitations with respect to the realizability of these filters. Therefore, it is necessary to incorporate the SLM constraints in the design of the filters. The design of a SLM-constrained minimum average correlation energy (SLM-MACE) filter using the simulated annealing-based optimization technique was investigated. The SLM-MACE filter was synthesized for three different types of constraints. The performance of the filter was evaluated in terms of its recognition (discrimination) capabilities using computer simulations. The correlation plane characteristics of the SLM-MACE filter were found to be reasonably good. The SLM-MACE filter yielded far better results than the analytical MACE filter implemented on practical SLMs using the constrained magnitude technique. Further, the filter performance was evaluated in the presence of noise in the input test images. This work demonstrated the need to include the SLM constraints in the filter design. Finally, a method is suggested to reduce the computation time required for the synthesis of the SLM-MACE filter

    Correlator Convolutional Neural Networks: An Interpretable Architecture for Image-like Quantum Matter Data

    Full text link
    Machine learning models are a powerful theoretical tool for analyzing data from quantum simulators, in which results of experiments are sets of snapshots of many-body states. Recently, they have been successfully applied to distinguish between snapshots that can not be identified using traditional one and two point correlation functions. Thus far, the complexity of these models has inhibited new physical insights from this approach. Here, using a novel set of nonlinearities we develop a network architecture that discovers features in the data which are directly interpretable in terms of physical observables. In particular, our network can be understood as uncovering high-order correlators which significantly differ between the data studied. We demonstrate this new architecture on sets of simulated snapshots produced by two candidate theories approximating the doped Fermi-Hubbard model, which is realized in state-of-the art quantum gas microscopy experiments. From the trained networks, we uncover that the key distinguishing features are fourth-order spin-charge correlators, providing a means to compare experimental data to theoretical predictions. Our approach lends itself well to the construction of simple, end-to-end interpretable architectures and is applicable to arbitrary lattice data, thus paving the way for new physical insights from machine learning studies of experimental as well as numerical data.Comment: 7 pages, 4 figures + 13 pages of supplemental materia

    Parity Doubling Among the Baryons

    Full text link
    We study the evidence for and possible origins of parity doubling among the baryons. First we explore the experimental evidence, finding a significant signal for parity doubling in the non-strange baryons, but little evidence among strange baryons. Next we discuss potential explanations for this phenomenon. Possibilities include suppression of the violation of the flavor singlet axial symmetry (U(1)AU(1)_{A}) of QCD, which is broken by the triangle anomaly and by quark masses. A conventional Wigner-Weyl realization of the SU(2)LĂ—SU(2)RSU(2)_{L}\times SU(2)_{R} chiral symmetry would also result in parity doubling. However this requires the suppression of families of \emph{chirally invariant} operators by some other dynamical mechanism. In this scenario the parity doubled states should decouple from pions. We discuss other explanations including connections to chiral invariant short distance physics motivated by large NcN_{c} arguments as suggested by Shifman and others, and intrinsic deformation of relatively rigid highly excited hadrons, leading to parity doubling on the leading Regge trajectory. Finally we review the spectroscopic consequences of chiral symmetry using a formalism introduced by Weinberg, and use it to describe two baryons of opposite parity.Comment: 32 pages, 8 figures; v2 revised and expanded; submitted to Phys. Re

    Optical implementations of radial basis classifiers

    Get PDF
    We describe two optical systems based on the radial basis function approach to pattern classification. An optical-disk-based system for handwritten character recognition is demonstrated. The optical system computes the Euclidean distance between an unknown input and 650 stored patterns at a demonstrated rate of 26,000 pattern comparisons/s. The ultimate performance of this system is limited by optical-disk resolution to 10^11 binary operations/s. An adaptive system is also presented that facilitates on-line learning and provides additional robustness

    News from bottomonium spectral functions in thermal QCD

    Get PDF

    Comments on the Necessity and Implications of State-Dependence in the Black Hole Interior

    Get PDF
    We revisit the "state-dependence" of the map that we proposed recently between bulk operators in the interior of a large AdS black hole and operators in the boundary CFT. By refining recent versions of the information paradox, we show that this feature is necessary for the CFT to successfully describe local physics behind the horizon --- not only for single-sided black holes but even in the eternal black hole. We show that state-dependence is invisible to an infalling observer who cannot differentiate these operators from those of ordinary quantum effective field theory. Therefore the infalling observer does not observe any violations of quantum mechanics. We successfully resolve a large class of potential ambiguities in our construction. We analyze states where the CFT is entangled with another system and show that the ER=EPR conjecture emerges from our construction in a natural and precise form. We comment on the possible semi-classical origins of state-dependence.Comment: 136 pages, 16 figure

    Spread spectrum-based video watermarking algorithms for copyright protection

    Get PDF
    Merged with duplicate record 10026.1/2263 on 14.03.2017 by CS (TIS)Digital technologies know an unprecedented expansion in the last years. The consumer can now benefit from hardware and software which was considered state-of-the-art several years ago. The advantages offered by the digital technologies are major but the same digital technology opens the door for unlimited piracy. Copying an analogue VCR tape was certainly possible and relatively easy, in spite of various forms of protection, but due to the analogue environment, the subsequent copies had an inherent loss in quality. This was a natural way of limiting the multiple copying of a video material. With digital technology, this barrier disappears, being possible to make as many copies as desired, without any loss in quality whatsoever. Digital watermarking is one of the best available tools for fighting this threat. The aim of the present work was to develop a digital watermarking system compliant with the recommendations drawn by the EBU, for video broadcast monitoring. Since the watermark can be inserted in either spatial domain or transform domain, this aspect was investigated and led to the conclusion that wavelet transform is one of the best solutions available. Since watermarking is not an easy task, especially considering the robustness under various attacks several techniques were employed in order to increase the capacity/robustness of the system: spread-spectrum and modulation techniques to cast the watermark, powerful error correction to protect the mark, human visual models to insert a robust mark and to ensure its invisibility. The combination of these methods led to a major improvement, but yet the system wasn't robust to several important geometrical attacks. In order to achieve this last milestone, the system uses two distinct watermarks: a spatial domain reference watermark and the main watermark embedded in the wavelet domain. By using this reference watermark and techniques specific to image registration, the system is able to determine the parameters of the attack and revert it. Once the attack was reverted, the main watermark is recovered. The final result is a high capacity, blind DWr-based video watermarking system, robust to a wide range of attacks.BBC Research & Developmen
    • …
    corecore