1,380 research outputs found
Video Processing Acceleration using Reconfigurable Logic and Graphics Processors
A vexing question is `which architecture will prevail as the core feature of the next state of
the art video processing system?' This thesis examines the substitutive and collaborative
use of the two alternatives of the reconfigurable logic and graphics processor architectures.
A structured approach to executing architecture comparison is presented - this includes a
proposed `Three Axes of Algorithm Characterisation' scheme and a formulation of perfor-
mance drivers. The approach is an appealing platform for clearly defining the problem,
assumptions and results of a comparison. In this work it is used to resolve the advanta-
geous factors of the graphics processor and reconfigurable logic for video processing, and
the conditions determining which one is superior. The comparison results prompt the
exploration of the customisable options for the graphics processor architecture. To clearly
define the architectural design space, the graphics processor is first identifed as part of
a wider scope of homogeneous multi-processing element (HoMPE) architectures. A novel
exploration tool is described which is suited to the investigation of the customisable op-
tions of HoMPE architectures. The tool adopts a systematic exploration approach and a
high-level parameterisable system model, and is used to explore pre- and post-fabrication
customisable options for the graphics processor. A positive result of the exploration is the
proposal of a reconfigurable engine for data access (REDA) to optimise graphics processor
performance for video processing-specific memory access patterns. REDA demonstrates
the viability of the use of reconfigurable logic as collaborative `glue logic' in the graphics
processor architecture
The binary-outcome detection loophole
The detection loophole problem arises when quantum devices fail to provide an output for some runs. If treating these devices in a device-independent manner, failure to include the unsuccessful runs in the output statistics can lead to an adversary falsifying security i.e. Bell inequality violation. If the devices fail with too high frequency, known as the detection threshold, then no security is possible, as the full statistics cannot violate a Bell inequality. In this work we provide an intuitive local hidden-variable strategy that the devices may use to falsify any two-party, binary-outcome no-signalling distribution up to a threshold of 2(mA + mB − 8)/(mAmB − 16), where mA, mB refer to the number of available inputs choices to the two parties. This value is the largest analytically predicted lower bound for no-signalling distributions. We strongly conjecture it gives the true detection threshold for mA = mB, and for computationally tractable scenarios we provide the Bell inequality which verifies this. We also prove that a non-trivial detection threshold remains, even when allowing one party an arbitrary number of input choices
Leases for Other Minerals: Recent Developments
14 pages.
Contains references
Adaptive estimation and discrimination of Holevo-Werner channels
The class of quantum states known as Werner states have several interesting properties, which often serve to illuminate unusual properties of quantum information. Closely related to these states are the Holevo-Werner channels whose Choi matrices are Werner states. Exploiting the fact that these channels are teleportation covariant, and therefore simulable by teleportation, we compute the ultimate precision in the adaptive estimation of their channel-defining parameter. Similarly, we bound the minimum error probability affecting the adaptive discrimination of any two of these channels. In this case, we prove an analytical formula for the quantum Chernoff bound which also has a direct counterpart for the class of depolarizing channels. Our work exploits previous methods established in [Pirandola and Lupo, PRL 118, 100502 (2017)] to set the metrological limits associated with this interesting class of quantum channels at any finite dimension
The microphysics of clouds over the Antarctic Peninsula – Part 1: Observations
Observations of clouds over the Antarctic Peninsula during summer 2010 and 2011 are presented here. The peninsula is up to 2500 m high and acts as a barrier to weather systems approaching from the Pacific sector of the Southern Ocean. Observations of the number of ice and liquid particles as well as the ice water content and liquid water content in the clouds from both sides of the peninsula and from both years were compared. In 2011 there were significantly more water drops and ice crystals, particularly in the east, where there were approximately twice the number of drops and ice crystals in 2011.
Ice crystals observations as compared to ice nuclei parameterizations suggest that secondary ice multiplication at temperatures around −5 °C is important for ice crystal formation on both sides of the peninsula below 2000 m. Also, back trajectories have shown that in 2011 the air masses over the peninsula were more likely to have passed close to the surface over the sea ice in the Weddell Sea. This suggests that the sea-ice-covered Weddell Sea can act as a source of both cloud condensation nuclei and ice-nucleating particles
High avidity autoreactive T cells with a low signalling capacity through the T-cell receptor: central to rheumatoid arthritis pathogenesis?
Self-reactive T cells with low signalling capacity through the T-cell receptor were recently observed in the SKG mouse model of rheumatoid arthritis (RA) and have been linked to a spontaneous mutation in the ZAP-70 signal transduction molecule. Here we hypothesize that similar mechanisms also drive RA, associated with an abnormal innate and adaptive immune response driven by nuclear factor-κB activation and tumour necrosis factor secretion. Similar to the essential role played by pathogens in SKG mice, we propose that HLA-associated immunity to chronic viral infection is a key factor in the immune dysregulation and joint inflammation that characterize RA
The Role of Entanglement in Quantum Communication, and Analysis of the Detection Loophole
Entanglement is a feature at the heart of quantum information. Its enablement of
unusual correlations between particles drives a new wave of communication and computation. This thesis explores some of the ways in which the tools for studying entanglement
can be used to quantify the transmission of quantum information, and compares the use
of different techniques.
We begin this thesis by expanding the technique of teleportation simulation, which adds
noise to the entangled resource state to mimic channel effects. By introducing classical
noise in the communication step, we show it is possible to simulate more than just Pauli
channels using teleportation. This new class is characterised, and studied in detail for a
particular resource state, leading to a family of simulable channels named “Pauli-Damping
channels” whose properties are analysed.
Also introduced are a new family of quantum states, “phase Werner” states, whose
entanglement properties relate to the interesting conjecture of bound entangled states
with a negative partial transpose. Holevo-Werner channels, to which these states are
connected, are shown to be teleportation covariant. We exploit this to present several
interesting results, including the optimal estimation of the channel-defining parameter.
The minimal binary-discrimination error for Holevo-Werner channels is bounded for the
first time with the analytical form of the quantum Chernoff bound. We also consider
the secret key capacity of these channels, showing how different entanglement measures
provide a better upper bound for different regions of these channels.
Finally, a method for generating new Bell inequalities is presented, exploiting nonphysical probability distributions to obtain new inequalities. Tens of thousands of new
inequivalent inequalities are generated, and their usefulness in closing the detection loophole for imperfect detectors is examined, with comparison to the current optimal construction. Two candidate Bell inequalities which may equal or beat the best construction are
presented
Growth, Condition, and Trophic Relations of Stocked Trout in Southern Appalachian Mountain Streams
Stream trout fisheries are among the most popular and valuable in the United States, but many are dependent on hatcheries to sustain fishing and harvest. Thus, understanding the ecology of hatchery‐reared trout stocked in natural environments is fundamental to management. We evaluated the growth, condition, and trophic relations of Brook Trout Salvelinus fontinalis, Brown Trout Salmo trutta, and Rainbow Trout Oncorhynchus mykiss that were stocked in southern Appalachian Mountain streams in western North Carolina. Stocked and wild (naturalized) trout were sampled over time (monthly; September 2012–June 2013) to compare condition and diet composition and to evaluate temporal dynamics of trophic position with stable isotope analysis. Relative weights (Wr) of stocked trout were inversely associated with their stream residence time but were consistently higher than those of wild trout. Weight loss of harvested stocked trout was similar among species and sizes, but fish stocked earlier lost more weight. Overall, 40% of 141 stomachs from stocked trout were empty compared to 15% of wild trout stomachs (N = 26). We identified a much higher rate of piscivory in wild trout (18 times that of stocked trout), and wild trout were 4.3 times more likely to consume gastropods relative to stocked trout. Hatchery‐reared trout were isotopically similar to co‐occurring wild fish for both δ13C and δ15N values but were less variable than wild trout. Differences in sulfur isotope ratios (δ34S) between wild and hatchery‐reared trout indicated that the diets of wild fish were enriched in δ34S relative to the diets of hatchery‐reared fish. Although hatcheryreared trout consumed prey items similar to those of wild fish, differences in consumption or behavior (e.g., reduced feeding) may have resulted in lower condition and negative growth. These findings provide critical insight on the trophic dynamics of stocked trout and may assist in developing and enhancing stream trout fisheries
Post-feminism for children: feminism ‘repackaged’ in the Bratz films
After their release in 2001, Bratz dolls carved into Barbie’s previously monopolistic share of teen doll sales. Amidst their growing popularity, cultural critics expressed a host of concerns about Bratz dolls, especially over how they sexualize youth, but the line grew to include a host of products like costumes, makeup kits, games, books, clothing, and movies. It also inspired new, similar doll lines from other toy companies. In this article, we situate the Bratz’s popularity in a specific cultural moment tied to the history of modern feminism. We use a content analysis of the Bratz movie series to explore the feminist and post-feminist thematics it contains. We identify the images of girlhood that are being marketed through the films and explore how the series repackages not only girlhood but also feminism itself in a way that encourages girls to exchange political power for purchasing power
- …