1,083 research outputs found

    Complex-valued Retrievals From Noisy Images Using Diffusion Models

    Full text link
    In diverse microscopy modalities, sensors measure only real-valued intensities. Additionally, the sensor readouts are affected by Poissonian-distributed photon noise. Traditional restoration algorithms typically aim to minimize the mean squared error (MSE) between the original and recovered images. This often leads to blurry outcomes with poor perceptual quality. Recently, deep diffusion models (DDMs) have proven to be highly capable of sampling images from the a-posteriori probability of the sought variables, resulting in visually pleasing high-quality images. These models have mostly been suggested for real-valued images suffering from Gaussian noise. In this study, we generalize annealed Langevin Dynamics, a type of DDM, to tackle the fundamental challenges in optical imaging of complex-valued objects (and real images) affected by Poisson noise. We apply our algorithm to various optical scenarios, such as Fourier Ptychography, Phase Retrieval, and Poisson denoising. Our algorithm is evaluated on simulations and biological empirical data.Comment: 11 pages, 7figure

    Learning design studio: educational practice as design inquiry of learning

    No full text
    Recently we are urged to transform education into an evidence based profession, and promote scientific standards or practice. These calls are not new – they seem to emerge every few years. We do not argue with their goal, but we contend that the suitable frame of reference is the paradigm of design science, rather than the common metaphor of medical research. This paper proposes Design Inquiry of Learning as a projection of educational design science into a professional domain, and offers the Learning Design Studio as a pedagogical manifestation of this approach. The learning design studio is a collaborative, blended, project based framework for training educators in effective and evidence-based use of educational technology. We present its theoretical underpinnings, note its fundamental principles and structures, and review three independent cases where it has been trialed. The results show that this model is effective in developing learners’ theoretical knowledge as well as their practical skills, and allows them to link the two. However, it requires a considerable commitment of both learners and tutors, and may not be applicable in more casual settings

    Non-Abelian toplogical superconductors from topological semimetals and related systems under superconducting proximity effect

    Full text link
    Non-Abelian toplogical superconductors are characterized by the existence of {zero-energy} Majorana fermions bound in the quantized vortices. This is a consequence of the nontrivial bulk topology characterized by an {\em odd} Chern number. It is found that in topological semimetals with a single two-bands crossing point all the gapped superconductors are non-Abelian ones. Such a property is generalized to related but more generic systems which will be useful in the search of non-Abelian superconductors and Majorana fermions

    IoTSan: Fortifying the Safety of IoT Systems

    Full text link
    Today's IoT systems include event-driven smart applications (apps) that interact with sensors and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app interactions, or device/communication failures, can cause unsafe and dangerous physical states. Detecting flaws that lead to such states, requires a holistic view of installed apps, component devices, their configurations, and more importantly, how they interact. In this paper, we design IoTSan, a novel practical system that uses model checking as a building block to reveal "interaction-level" flaws by identifying events that can lead the system to unsafe states. In building IoTSan, we design novel techniques tailored to IoT systems, to alleviate the state explosion associated with model checking. IoTSan also automatically translates IoT apps into a format amenable to model checking. Finally, to understand the root cause of a detected vulnerability, we design an attribution mechanism to identify problematic and potentially malicious apps. We evaluate IoTSan on the Samsung SmartThings platform. From 76 manually configured systems, IoTSan detects 147 vulnerabilities. We also evaluate IoTSan with malicious SmartThings apps from a previous effort. IoTSan detects the potential safety violations and also effectively attributes these apps as malicious.Comment: Proc. of the 14th ACM CoNEXT, 201

    Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung

    Get PDF
    OnlinePublThe Pilsung cipher is part of the North Korean Red Star operating system, which was leaked to the West in 2014. Initial analysis by Kryptos Logic reported a possibility of a class of weak keys due to the use of pseudo-random diffusion. Following this lead, we analyzed the cipher and identified a small class of such weak keys. We developed techniques for searching for a key that belongs to the class. After spending thousands of CPU hours, we found a supposedly weak key for a slightly weaker version of Pilsung, but the key did not behave as we expected. On further investigation we found out a crucial misunderstanding in a critical part of the cipher and that no such class of weak keys exists in Pilsung. Thus, this paper makes two main contributions to the art of cryptanalysis. First, it identifies and shows how to investigate a potential weakness in randomizing diffusion, which although does not exist in Pilsung, may affect future designs. Second, it highlights the need for early verification of results in order to identify errors before expending significant resources.Chitchanok Chuengsatiansup, Eyal Ronen, Gregory G. Rose, and Yuval Yaro

    Introduction to topological superconductivity and Majorana fermions

    Full text link
    This short review article provides a pedagogical introduction to the rapidly growing research field of Majorana fermions in topological superconductors. We first discuss in some details the simplest "toy model" in which Majoranas appear, namely a one-dimensional tight-binding representation of a p-wave superconductor, introduced more than ten years ago by Kitaev. We then give a general introduction to the remarkable properties of Majorana fermions in condensed matter systems, such as their intrinsically non-local nature and exotic exchange statistics, and explain why these quasiparticles are suspected to be especially well suited for low-decoherence quantum information processing. We also discuss the experimentally promising (and perhaps already successfully realized) possibility of creating topological superconductors using semiconductors with strong spin-orbit coupling, proximity-coupled to standard s-wave superconductors and exposed to a magnetic field. The goal is to provide an introduction to the subject for experimentalists or theorists who are new to the field, focusing on the aspects which are most important for understanding the basic physics. The text should be accessible for readers with a basic understanding of quantum mechanics and second quantization, and does not require knowledge of quantum field theory or topological states of matter.Comment: 21 pages, 5 figure

    Identifying the favored mutation in a positive selective sweep.

    Get PDF
    Most approaches that capture signatures of selective sweeps in population genomics data do not identify the specific mutation favored by selection. We present iSAFE (for "integrated selection of allele favored by evolution"), a method that enables researchers to accurately pinpoint the favored mutation in a large region (∼5 Mbp) by using a statistic derived solely from population genetics signals. iSAFE does not require knowledge of demography, the phenotype under selection, or functional annotations of mutations

    Evolutionarily conserved human targets of adenosine to inosine RNA editing

    Get PDF
    A-to-I RNA editing by ADARs is a post-transcriptional mechanism for expanding the proteomic repertoire. Genetic recoding by editing was so far observed for only a few mammalian RNAs that are predominantly expressed in nervous tissues. However, as these editing targets fail to explain the broad and severe phenotypes of ADAR1 knockout mice, additional targets for editing by ADARs were always expected. Using comparative genomics and expressed sequence analysis, we identified and experimentally verified four additional candidate human substrates for ADAR-mediated editing: FLNA, BLCAP, CYFIP2 and IGFBP7. Additionally, editing of three of these substrates was verified in the mouse while two of them were validated in chicken. Interestingly, none of these substrates encodes a receptor protein but two of them are strongly expressed in the CNS and seem important for proper nervous system function. The editing pattern observed suggests that some of the affected proteins might have altered physiological properties leaving the possibility that they can be related to the phenotypes of ADAR1 knockout mice
    • …
    corecore