1,561 research outputs found

    Statistical Constraints on State Preparation for a Quantum Computer

    Full text link
    Quantum computing algorithms require that the quantum register be initially present in a superposition state. To achieve this, we consider the practical problem of creating a coherent superposition state of several qubits. Owing to considerations of quantum statistics, this requires that the entropy of the system go down. This, in turn, has two practical implications: (i) the initial state cannot be controlled; (ii) the temperature of the system must be reduced. These factors, in addition to decoherence and sensitivity to errors, must be considered in the implementation of quantum computers.Comment: 7 pages; the final published versio

    A Three-Stage Quantum Cryptography Protocol

    Full text link
    We present a three-stage quantum cryptographic protocol guaranteeing security in which each party uses its own secret key. Unlike the BB84 protocol, where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage. A related system of key distribution is also described.Comment: 5 pages, 2 figure

    Multi-View Face Recognition From Single RGBD Models of the Faces

    Get PDF
    This work takes important steps towards solving the following problem of current interest: Assuming that each individual in a population can be modeled by a single frontal RGBD face image, is it possible to carry out face recognition for such a population using multiple 2D images captured from arbitrary viewpoints? Although the general problem as stated above is extremely challenging, it encompasses subproblems that can be addressed today. The subproblems addressed in this work relate to: (1) Generating a large set of viewpoint dependent face images from a single RGBD frontal image for each individual; (2) using hierarchical approaches based on view-partitioned subspaces to represent the training data; and (3) based on these hierarchical approaches, using a weighted voting algorithm to integrate the evidence collected from multiple images of the same face as recorded from different viewpoints. We evaluate our methods on three datasets: a dataset of 10 people that we created and two publicly available datasets which include a total of 48 people. In addition to providing important insights into the nature of this problem, our results show that we are able to successfully recognize faces with accuracies of 95% or higher, outperforming existing state-of-the-art face recognition approaches based on deep convolutional neural networks

    Geometric phase and gauge theory structure in quantum computing

    Full text link
    We discuss the presence of a geometrical phase in the evolution of a qubit state and its gauge structure. The time evolution operator is found to be the free energy operator, rather than the Hamiltonian operator.Comment: 5 pages, presented at Fifth International Workshop DICE2010: Space-Time-Matter - current issues in quantum mechanics and beyond, Castiglioncello (Tuscany), September 13-17, 201

    Self-Policing: Dissemination and Adoption of Police Eyewitness Policies in Virginia

    Get PDF
    Professional policing organizations emphasize the importance of the adoption of sound police policies and procedures, but traditionally doing so has been left to individual agencies. State and local government typically does not closely regulate police, and neither federal constitutional rulings nor state law typically sets out in any detail the practices that police should follow. Thus, law enforcement agencies must themselves draft and disseminate policy. This paper presents the results of studies used to assess the adoption of eyewitness identification policies by law enforcement agencies in Virginia. Policymakers were focused on this problem because Virginia experienced a series of DNA exonerations in cases involving eyewitness misidentifications. In 2005, lawmakers enacted a law that required agencies to have some written policy in place. However, there was little guidance on what that policy should be. To remedy this problem, the state law enforcement policy agency, the Virginia Department of Criminal Justice Services (DCJS) promulgated, in 2011, a detailed model policy on eyewitness procedure. Nevertheless, as reported in a 2013 study, those model practices were only haltingly adopted. In particular, many agencies did not use blind or blinded lineups, in which the administrator does not know which photo is that of a suspect or cannot view which photo the eyewitness is examining. In Fall 2018, all of the over-three hundred law enforcement agencies in Virginia had their policies on this subject requested, using the state freedom of information law. The results show that there has now been widespread adoption of the DCJS model policy. Improved eyewitness identification practices have been adopted by the vast majority of agencies, including large and small agencies. This Article concludes by asking what contributed to the extensive dissemination of a model police policy, and what its implications are for improving police policy and practice without the use of regulation

    PSEIKI: A Production System Environment for Integrating Knowledge with Images

    Get PDF
    A description of work-in-progress on PSEIKI is presented. PSEIKI is a computer vision system designed to use multiple sources of knowledge to aid in the image understanding task. In this report we describe the concepts used in PSEIKI and how the incorporation of world knowledge is used to make PSEIKI expectation driven. The world knowledge in the system is represented as a line drawing of the expected scene. The system is implemented as a 2 panel / 6 level blackboard and uses the Dempster-Shafer formalism to accomplish inexact reasoning in a hierarchical spac

    The PSEIKI Report—Version 2. Evidence Accumulation and Flow of Control in a Hierarchical Spatial Reasoning System

    Get PDF
    A fundamental goal of computer vision is the development of systems capable of carrying out scene interpretation while taking into account all the available knowledge. In this report, we have focused on how the interpretation task may be aided by expected-scene information which, in most cases, would not be in registration with the perceived scene. In this report, we describe PSEIKI, a framework for expectation-driven interpretation of image data. PSEIKI builds abstraction hierarchies in image data using, for cues, supplied abstraction hierarchies in a scene expectation map. Hypothesized abstractions in the image data are geometrically compared with the known abstractions in the expected scene; the metrics used for these comparisons translate into belief values. The Dempster-Shafer formalism is used to accumulate beliefs for the synthesized abstractions in the image data. For accumulating belief values, a computationally efficient variation of Dempster’s rule of combination is developed to enable the system to deal with the overwhelming amount of information present in most images. This variation of Dempster’s rule allows the reasoning process to be embedded into the abstraction hierarchy by allowing for the propagation of belief values between elements at different levels of abstraction. The system has been implemented as a 2- panel, 5-level blackboard in OPS 83. This report also discusses the control aspects of the blackboard, achieved via a distributed monitor using the OPS83 demons and a scheduler. Various knowledge sources for forming groupings in the image data and for labeling such groupings with abstractions from the scene expectation map are also discussed

    Momentum space tomographic imaging of photoelectrons

    Full text link
    We apply tomography, a general method for reconstructing 3-D distributions from multiple projections, to reconstruct the momentum distribution of electrons produced via strong field photoionization. The projections are obtained by rotating the electron distribution via the polarization of the ionizing laser beam and recording a momentum spectrum at each angle with a 2-D velocity map imaging spectrometer. For linearly polarized light the tomographic reconstruction agrees with the distribution obtained using an Abel inversion. Electron tomography, which can be applied to any polarization, will simplify the technology of electron imaging. The method can be directly generalized to other charged particles.Comment: Accepted by J. Phys.

    Insight on the usage of mask with respect to COVID-19: a review

    Get PDF
    Face-masks are currently turning into a fundamental piece of our clothing standard, without a doubt. While the West wasn't entirely ok with face-masks in the pre-COVID-19 period, East Asians were all the more inviting of them. Controlling a respiratory contamination at source by a mask is an entrenched procedure. The utilization of masks followed by certain precautionary measure is a piece of a thorough bundle of the avoidance and control gauges that can restrain the spread of any respiratory viral maladies, including COVID-19. Subsequently the fundamental point of the examination is to illuminate the mask, their utilization and guidelines to be followed during this pandemic period. Numerous nations have suggested the utilization of fabric mask/face covers for the overall population. Right now, the boundless utilization of mask by healthy individuals in the network setting isn't yet upheld by high calibre or direct logical proof and there are likely advantages and damages to consider. Any mask worn for everyday assurance against COVID-19 will be flawed, at any rate for the current pandemic time

    Reconstruction from Radon projections and orthogonal expansion on a ball

    Full text link
    The relation between Radon transform and orthogonal expansions of a function on the unit ball in \RR^d is exploited. A compact formula for the partial sums of the expansion is given in terms of the Radon transform, which leads to algorithms for image reconstruction from Radon data. The relation between orthogonal expansion and the singular value decomposition of the Radon transform is also exploited.Comment: 15 page
    • …
    corecore