23,041 research outputs found
A relationship between the integrated CO intensity and the radio continuum emission in spiral galaxies
In an effort to determine the role played by cosmic ray electrons and interstellar radiation fields on the collapse of molecular clouds, a survey was begun to investigate the relationship between the radio continuum brightness emission and the integrated CO intensity in spiral galaxies. The investigation was done on two scales; a global galaxy to galaxy comparison of integrated disk values, and a ring-averaged study over the disks of individual galaxies. For the large-scale survey, radio continuum flux densities integrated over the full disk at 1.49 GHz were taken from Condon (1987) and the total CO fluxes were taken from Verter (1985). The galaxies with values included in the two catalogs are displayed. It can be seen that a good correlation exists between the integrated CO emission and radio continuum emission
A high resolution CO map of M51
Observations of the CO (1-0) emission in two fields of M51 were taken with the Berkeley-Illinois-Maryland Array at Hat Creek, California from May 1988 to February 1989. When combined with two previously observed fields (Lo et al. 1988), a complete map of the central 5 minute x 4 minute at a resolution of 7 seconds x 10 seconds was obtained. The project is part of an ongoing high-resolution survey of the molecular, atomic, and ionized gas distributions in nearby spiral galaxies. The two recently observed fields can be compared to the results of the interferometric study of Vogel et al. (1988 - hereafter VKS). Since the shortest spacing in the current survey is shorter than that of VKS, researchers expect to see more of the extended emission. This is evident when comparing the width of the spiral arms in each survey; ours are a bit broader. While some of the peaks in this region correspond to the peaks in VKS, several of them do not. These discrepancies are probably because of the low signal to noise inherent in observations of this nature. Single-dish maps are currently being readied for inclusion with the interferometer data. These will help fill the short-spacing hole in the UV plane, and serve to recover the flux missing from the interferometer maps
Extraction of Airways with Probabilistic State-space Models and Bayesian Smoothing
Segmenting tree structures is common in several image processing
applications. In medical image analysis, reliable segmentations of airways,
vessels, neurons and other tree structures can enable important clinical
applications. We present a framework for tracking tree structures comprising of
elongated branches using probabilistic state-space models and Bayesian
smoothing. Unlike most existing methods that proceed with sequential tracking
of branches, we present an exploratory method, that is less sensitive to local
anomalies in the data due to acquisition noise and/or interfering structures.
The evolution of individual branches is modelled using a process model and the
observed data is incorporated into the update step of the Bayesian smoother
using a measurement model that is based on a multi-scale blob detector.
Bayesian smoothing is performed using the RTS (Rauch-Tung-Striebel) smoother,
which provides Gaussian density estimates of branch states at each tracking
step. We select likely branch seed points automatically based on the response
of the blob detection and track from all such seed points using the RTS
smoother. We use covariance of the marginal posterior density estimated for
each branch to discriminate false positive and true positive branches. The
method is evaluated on 3D chest CT scans to track airways. We show that the
presented method results in additional branches compared to a baseline method
based on region growing on probability images.Comment: 10 pages. Pre-print of the paper accepted at Workshop on Graphs in
Biomedical Image Analysis. MICCAI 2017. Quebec Cit
Security proof of a three-state quantum key distribution protocol without rotational symmetry
Standard security proofs of quantum key distribution (QKD) protocols often
rely on symmetry arguments. In this paper, we prove the security of a
three-state protocol that does not possess rotational symmetry. The three-state
QKD protocol we consider involves three qubit states, where the first two
states, |0_z> and |1_z>, can contribute to key generation and the third state,
|+>=(|0_z>+|1_z>)/\sqrt{2}, is for channel estimation. This protocol has been
proposed and implemented experimentally in some frequency-based QKD systems
where the three states can be prepared easily. Thus, by founding on the
security of this three-state protocol, we prove that these QKD schemes are, in
fact, unconditionally secure against any attacks allowed by quantum mechanics.
The main task in our proof is to upper bound the phase error rate of the qubits
given the bit error rates observed. Unconditional security can then be proved
not only for the ideal case of a single-photon source and perfect detectors,
but also for the realistic case of a phase-randomized weak coherent light
source and imperfect threshold detectors. Our result on the phase error rate
upper bound is independent of the loss in the channel. Also, we compare the
three-state protocol with the BB84 protocol. For the single-photon source case,
our result proves that the BB84 protocol strictly tolerates a higher quantum
bit error rate than the three-state protocol; while for the coherent-source
case, the BB84 protocol achieves a higher key generation rate and secure
distance than the three-state protocol when a decoy-state method is used.Comment: 10 pages, 3 figures, 2 column
Kerncraft: A Tool for Analytic Performance Modeling of Loop Kernels
Achieving optimal program performance requires deep insight into the
interaction between hardware and software. For software developers without an
in-depth background in computer architecture, understanding and fully utilizing
modern architectures is close to impossible. Analytic loop performance modeling
is a useful way to understand the relevant bottlenecks of code execution based
on simple machine models. The Roofline Model and the Execution-Cache-Memory
(ECM) model are proven approaches to performance modeling of loop nests. In
comparison to the Roofline model, the ECM model can also describes the
single-core performance and saturation behavior on a multicore chip. We give an
introduction to the Roofline and ECM models, and to stencil performance
modeling using layer conditions (LC). We then present Kerncraft, a tool that
can automatically construct Roofline and ECM models for loop nests by
performing the required code, data transfer, and LC analysis. The layer
condition analysis allows to predict optimal spatial blocking factors for loop
nests. Together with the models it enables an ab-initio estimate of the
potential benefits of loop blocking optimizations and of useful block sizes. In
cases where LC analysis is not easily possible, Kerncraft supports a cache
simulator as a fallback option. Using a 25-point long-range stencil we
demonstrate the usefulness and predictive power of the Kerncraft tool.Comment: 22 pages, 5 figure
Heisenberg-picture approach to the exact quantum motion of a time-dependent forced harmonic oscillator
In the Heisenberg picture, the generalized invariant and exact quantum
motions are found for a time-dependent forced harmonic oscillator. We find the
eigenstate and the coherent state of the invariant and show that the
dispersions of these quantum states do not depend on the external force. Our
formalism is applied to several interesting cases.Comment: 15 pages, two eps files, to appear in Phys. Rev. A 53 (6) (1996
Practical Evaluation of Security for Quantum Key Distribution
Many papers proved the security of quantum key distribution (QKD) system, in
the asymptotic framework. The degree of the security has not been discussed in
the finite coding-length framework, sufficiently. However, to guarantee any
implemented QKD system requires, it is needed to evaluate a protocol with a
finite coding-length. For this purpose, we derive a tight upper bound of the
eavesdropper's information. This bound is better than existing bounds. We also
obtain the exponential rate of the eavesdropper's information. Further, we
approximate our bound by using the normal distribution.Comment: The manuscript has been modfie
Upper bounds for the secure key rate of decoy state quantum key distribution
The use of decoy states in quantum key distribution (QKD) has provided a
method for substantially increasing the secret key rate and distance that can
be covered by QKD protocols with practical signals. The security analysis of
these schemes, however, leaves open the possibility that the development of
better proof techniques, or better classical post-processing methods, might
further improve their performance in realistic scenarios. In this paper, we
derive upper bounds on the secure key rate for decoy state QKD. These bounds
are based basically only on the classical correlations established by the
legitimate users during the quantum communication phase of the protocol. The
only assumption about the possible post-processing methods is that double click
events are randomly assigned to single click events. Further we consider only
secure key rates based on the uncalibrated device scenario which assigns
imperfections such as detection inefficiency to the eavesdropper. Our analysis
relies on two preconditions for secure two-way and one-way QKD: The legitimate
users need to prove that there exists no separable state (in the case of
two-way QKD), or that there exists no quantum state having a symmetric
extension (one-way QKD), that is compatible with the available measurements
results. Both criteria have been previously applied to evaluate single-photon
implementations of QKD. Here we use them to investigate a realistic source of
weak coherent pulses. The resulting upper bounds can be formulated as a convex
optimization problem known as a semidefinite program which can be efficiently
solved. For the standard four-state QKD protocol, they are quite close to known
lower bounds, thus showing that there are clear limits to the further
improvement of classical post-processing techniques in decoy state QKD.Comment: 10 pages, 3 figure
Quantum key distribution with "dual detectors"
To improve the performance of a quantum key distribution (QKD) system, high
speed, low dark count single photon detectors (or low noise homodyne detectors)
are required. However, in practice, a fast detector is usually noisy. Here, we
propose a "dual detectors" method to improve the performance of a practical QKD
system with realistic detectors: the legitimate receiver randomly uses either a
fast (but noisy) detector or a quiet (but slow) detector to measure the
incoming quantum signals. The measurement results from the quiet detector can
be used to bound eavesdropper's information, while the measurement results from
the fast detector are used to generate secure key. We apply this idea to
various QKD protocols. Simulation results demonstrate significant improvements
in both BB84 protocol with ideal single photon source and Gaussian-modulated
coherent states (GMCS) protocol; while for decoy-state BB84 protocol with weak
coherent source, the improvement is moderate. We also discuss various practical
issues in implementing the "dual detectors" scheme.Comment: 22 pages, 9 figure
- …