2,675 research outputs found

    Hierarchical Pooling Structure for Weakly Labeled Sound Event Detection

    Full text link
    Sound event detection with weakly labeled data is considered as a problem of multi-instance learning. And the choice of pooling function is the key to solving this problem. In this paper, we proposed a hierarchical pooling structure to improve the performance of weakly labeled sound event detection system. Proposed pooling structure has made remarkable improvements on three types of pooling function without adding any parameters. Moreover, our system has achieved competitive performance on Task 4 of Detection and Classification of Acoustic Scenes and Events (DCASE) 2017 Challenge using hierarchical pooling structure

    SAM-GCNN: A Gated Convolutional Neural Network with Segment-Level Attention Mechanism for Home Activity Monitoring

    Full text link
    In this paper, we propose a method for home activity monitoring. We demonstrate our model on dataset of Detection and Classification of Acoustic Scenes and Events (DCASE) 2018 Challenge Task 5. This task aims to classify multi-channel audios into one of the provided pre-defined classes. All of these classes are daily activities performed in a home environment. To tackle this task, we propose a gated convolutional neural network with segment-level attention mechanism (SAM-GCNN). The proposed framework is a convolutional model with two auxiliary modules: a gated convolutional neural network and a segment-level attention mechanism. Furthermore, we adopted model ensemble to enhance the capability of generalization of our model. We evaluated our work on the development dataset of DCASE 2018 Task 5 and achieved competitive performance, with a macro-averaged F-1 score increasing from 83.76% to 89.33%, compared with the convolutional baseline system.Comment: 6 pages, accepted by ISSPIT 201

    More randomness from a prepare-and-measure scenario with independent devices

    Full text link
    How to generate genuine quantum randomness from untrusted devices is an important problem in quantum information processing. Inspired by previous work on a self-testing quantum random number generator [T. Lunghi et al., Phys. Rev. Lett. 114, 150501 (2015)], we present a method to generate quantum randomness from a prepare-and-measure scenario with independent devices. In existing protocols, the quantum randomness depends only on a witness value (e.g., Clauser-Horne-Shimony-Holt value), which is calculated with the observed probabilities. Differently, here all the observed probabilities are directly used to calculate the min-entropy in our method. Through numerical simulation, we find that the min-entropy of our proposed scheme is higher than that in the previous work when a typical untrusted Bennett-Brassard 1984 (BB84) setup is used. Consequently, thanks to the proposed method, more genuine quantum random numbers may be obtained than before.Comment: 8 pages, 3 figure

    Security of modified Ping-Pong protocol in noisy and lossy channel

    Full text link
    The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.Comment: 7 pages, 2 figures, published in scientific report

    Security of "Counterfactual Quantum Cryptography"

    Full text link
    Recently, a "counterfactual" quantum key distribution scheme was proposed by Tae-Gon Noh [1]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol (EDP). According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when perfect single photon source is applied and Trojan-horse attack can be detected. We also find that the security of this scheme is deeply related with not only the bit error rate but also the yields of photons. And our security proof may shed light on security of other two-way protocols.Comment: 5 pages, 1 figur

    Thermodynamics of rotating Bose gases in a trap

    Full text link
    Novel ground state properties of rotating Bose gases have been intensively studied in the context of neutral cold atoms. We investigate the rotating Bose gas in a trap from a thermodynamic perspective, taking the charged ideal Bose gas in magnetic field (which is equivalent to a neutral gas in a synthetic magnetic field) as an example. It is indicated that the Bose-Einstein condensation temperature is irrelevant to the magnetic field, conflicting with established intuition that the critical temperature decreases with the field increasing. The specific heat and Landau diamagnetization also exhibit intriguing behaviors. In contrast, we demonstrate that the condensation temperature for neutral Bose gases in a rotating frame drops to zero in the fast rotation limit, signaling a non-condensed quantum phase in the ground state.Comment: 4 pages, 1 figur

    Chau-Wang-Wong17 Scheme Is Experimentally More Feasible Than The Six-State Scheme

    Full text link
    Recently, Chau et al. [Phys. Rev. A 95, 022311 (2017)] reported a quantum-key-distribution (QKD) scheme using four-dimensional qudits. Surprisingly, as a function of the bit error rate of the raw key, the secret key rate of this scheme is equal to that of the (qubit-based) six-state scheme under one-way classical communication using ideal apparatus in the limit of arbitrarily long raw key length. Here we explain why this is the case in spite of the fact that these two schemes are not linearly related to each other. More importantly, we find that in terms of the four-dimensional dit error rate of the raw key, the Chau et al.'s scheme can tolerate up to 21.6% using one-way classical communications, which is better than the Sheridan and Scarani's scheme [Phys. Rev. A 82, 030301(R) (2010)]. In addition, we argue the experimental advantages of the Chau et al. implementation over the standard six-state scheme and report a corresponding proof-of-principle experiment using passive basis selection with decoy states. We also compare our experiment with the recent high secret key rate implementation of the Sheridan and Scarani's scheme by Islam et al. [Sci. Adv. \text{3}, e1701491].Comment: 8 pages, to appear in QI

    Phase-encoded measurement device independent quantum key distribution with practical spontaneous parametric-down-conversion sources

    Full text link
    Measurement-device-independent quantum key distribution (MDI-QKD) with weak coherent sources has been widely and meticulously analyzed. However, the analysis for MDI-QKD with spontaneous parametric-down-conversion sources (SPDCS) is incomplete. In this paper, by accounting for practical parameters of SPDCS with thermal distribution, we presents an investigation on the performances of MDI-QKD under the active three-intensity decoy protocol and the passive one-intensity decoy protocol respectively. Phase randomization, inherently prerequisite for decoy protocol, is taken into consideration for evaluating the overall quantum bit gain and quantum bit error rate. The numerical simulations show that MDI-QKD using SPDCS with practical decoy protocols can be demonstrated comparable to the asymptotical case with infinite decoy states and has apparent superiority both in transmission distance and key generation rate compared to the MDI-QKD using weak coherent sources. Our results also indicate that MDI-QKD using thermal distributed SPDCS with active three-intensity decoy protocol performs better than the one with passive one-intensity decoy protocol.Comment: 13 pages, 6 figure

    Detection efficiency and noise in semi-device independent randomness extraction protocol

    Full text link
    In this paper, we analyze several critical issues in semi-device independent quantum information processing protocol. In practical experimental realization randomness generation in that scenario is possible only if the efficiency of the detectors used is above a certain threshold. Our analysis shows that the critical detection efficiency is 0.7071 in the symmetric setup, while in the asymmetric setup if one of the bases has perfect critical detection efficiency then the other one can be arbitrarily close to 0. We also analyze the semi-device independent random number generation efficiency based on different averages of guessing probability. To generate more randomness, the proper averaging method should be applied. Its choice depends on the value of a certain dimension witness. More importantly, the general analytical relationship between the maximal average guessing probability and dimension witness is given

    Monte Carlo study of thermal fluctuations and Fermi-arc formation in d-wave superconductors

    Get PDF
    From the perspective of thermal fluctuations, we investigate the pseudogap phenomena in underdoped high-temperature curpate superconductors. We present a local update Monte Carlo procedure based on the Green's function method to sample the fluctuating pairing field. The Chebyshev polynomial method is applied to calculate the single-particle spectral function directly and efficiently. The evolution of Fermi arcs as a function of temperature is studied by examining the spectral function at Fermi energy as well as the loss of spectral weight. Our results signify the importance of the vortex-like phase fluctuation on the formation of Fermi arcs.Comment: 9 pages, 3 figures. Figures redraw
    corecore