1,380 research outputs found

    Video Processing Acceleration using Reconfigurable Logic and Graphics Processors

    No full text
    A vexing question is `which architecture will prevail as the core feature of the next state of the art video processing system?' This thesis examines the substitutive and collaborative use of the two alternatives of the reconfigurable logic and graphics processor architectures. A structured approach to executing architecture comparison is presented - this includes a proposed `Three Axes of Algorithm Characterisation' scheme and a formulation of perfor- mance drivers. The approach is an appealing platform for clearly defining the problem, assumptions and results of a comparison. In this work it is used to resolve the advanta- geous factors of the graphics processor and reconfigurable logic for video processing, and the conditions determining which one is superior. The comparison results prompt the exploration of the customisable options for the graphics processor architecture. To clearly define the architectural design space, the graphics processor is first identifed as part of a wider scope of homogeneous multi-processing element (HoMPE) architectures. A novel exploration tool is described which is suited to the investigation of the customisable op- tions of HoMPE architectures. The tool adopts a systematic exploration approach and a high-level parameterisable system model, and is used to explore pre- and post-fabrication customisable options for the graphics processor. A positive result of the exploration is the proposal of a reconfigurable engine for data access (REDA) to optimise graphics processor performance for video processing-specific memory access patterns. REDA demonstrates the viability of the use of reconfigurable logic as collaborative `glue logic' in the graphics processor architecture

    The binary-outcome detection loophole

    Get PDF
    The detection loophole problem arises when quantum devices fail to provide an output for some runs. If treating these devices in a device-independent manner, failure to include the unsuccessful runs in the output statistics can lead to an adversary falsifying security i.e. Bell inequality violation. If the devices fail with too high frequency, known as the detection threshold, then no security is possible, as the full statistics cannot violate a Bell inequality. In this work we provide an intuitive local hidden-variable strategy that the devices may use to falsify any two-party, binary-outcome no-signalling distribution up to a threshold of 2(mA + mB − 8)/(mAmB − 16), where mA, mB refer to the number of available inputs choices to the two parties. This value is the largest analytically predicted lower bound for no-signalling distributions. We strongly conjecture it gives the true detection threshold for mA = mB, and for computationally tractable scenarios we provide the Bell inequality which verifies this. We also prove that a non-trivial detection threshold remains, even when allowing one party an arbitrary number of input choices

    Leases for Other Minerals: Recent Developments

    Get PDF
    14 pages. Contains references

    Adaptive estimation and discrimination of Holevo-Werner channels

    Get PDF
    The class of quantum states known as Werner states have several interesting properties, which often serve to illuminate unusual properties of quantum information. Closely related to these states are the Holevo-Werner channels whose Choi matrices are Werner states. Exploiting the fact that these channels are teleportation covariant, and therefore simulable by teleportation, we compute the ultimate precision in the adaptive estimation of their channel-defining parameter. Similarly, we bound the minimum error probability affecting the adaptive discrimination of any two of these channels. In this case, we prove an analytical formula for the quantum Chernoff bound which also has a direct counterpart for the class of depolarizing channels. Our work exploits previous methods established in [Pirandola and Lupo, PRL 118, 100502 (2017)] to set the metrological limits associated with this interesting class of quantum channels at any finite dimension

    The microphysics of clouds over the Antarctic Peninsula – Part 1: Observations

    Get PDF
    Observations of clouds over the Antarctic Peninsula during summer 2010 and 2011 are presented here. The peninsula is up to 2500 m high and acts as a barrier to weather systems approaching from the Pacific sector of the Southern Ocean. Observations of the number of ice and liquid particles as well as the ice water content and liquid water content in the clouds from both sides of the peninsula and from both years were compared. In 2011 there were significantly more water drops and ice crystals, particularly in the east, where there were approximately twice the number of drops and ice crystals in 2011. Ice crystals observations as compared to ice nuclei parameterizations suggest that secondary ice multiplication at temperatures around −5 °C is important for ice crystal formation on both sides of the peninsula below 2000 m. Also, back trajectories have shown that in 2011 the air masses over the peninsula were more likely to have passed close to the surface over the sea ice in the Weddell Sea. This suggests that the sea-ice-covered Weddell Sea can act as a source of both cloud condensation nuclei and ice-nucleating particles

    High avidity autoreactive T cells with a low signalling capacity through the T-cell receptor: central to rheumatoid arthritis pathogenesis?

    Get PDF
    Self-reactive T cells with low signalling capacity through the T-cell receptor were recently observed in the SKG mouse model of rheumatoid arthritis (RA) and have been linked to a spontaneous mutation in the ZAP-70 signal transduction molecule. Here we hypothesize that similar mechanisms also drive RA, associated with an abnormal innate and adaptive immune response driven by nuclear factor-κB activation and tumour necrosis factor secretion. Similar to the essential role played by pathogens in SKG mice, we propose that HLA-associated immunity to chronic viral infection is a key factor in the immune dysregulation and joint inflammation that characterize RA

    The Role of Entanglement in Quantum Communication, and Analysis of the Detection Loophole

    Get PDF
    Entanglement is a feature at the heart of quantum information. Its enablement of unusual correlations between particles drives a new wave of communication and computation. This thesis explores some of the ways in which the tools for studying entanglement can be used to quantify the transmission of quantum information, and compares the use of different techniques. We begin this thesis by expanding the technique of teleportation simulation, which adds noise to the entangled resource state to mimic channel effects. By introducing classical noise in the communication step, we show it is possible to simulate more than just Pauli channels using teleportation. This new class is characterised, and studied in detail for a particular resource state, leading to a family of simulable channels named “Pauli-Damping channels” whose properties are analysed. Also introduced are a new family of quantum states, “phase Werner” states, whose entanglement properties relate to the interesting conjecture of bound entangled states with a negative partial transpose. Holevo-Werner channels, to which these states are connected, are shown to be teleportation covariant. We exploit this to present several interesting results, including the optimal estimation of the channel-defining parameter. The minimal binary-discrimination error for Holevo-Werner channels is bounded for the first time with the analytical form of the quantum Chernoff bound. We also consider the secret key capacity of these channels, showing how different entanglement measures provide a better upper bound for different regions of these channels. Finally, a method for generating new Bell inequalities is presented, exploiting nonphysical probability distributions to obtain new inequalities. Tens of thousands of new inequivalent inequalities are generated, and their usefulness in closing the detection loophole for imperfect detectors is examined, with comparison to the current optimal construction. Two candidate Bell inequalities which may equal or beat the best construction are presented

    Growth, Condition, and Trophic Relations of Stocked Trout in Southern Appalachian Mountain Streams

    Get PDF
    Stream trout fisheries are among the most popular and valuable in the United States, but many are dependent on hatcheries to sustain fishing and harvest. Thus, understanding the ecology of hatchery‐reared trout stocked in natural environments is fundamental to management. We evaluated the growth, condition, and trophic relations of Brook Trout Salvelinus fontinalis, Brown Trout Salmo trutta, and Rainbow Trout Oncorhynchus mykiss that were stocked in southern Appalachian Mountain streams in western North Carolina. Stocked and wild (naturalized) trout were sampled over time (monthly; September 2012–June 2013) to compare condition and diet composition and to evaluate temporal dynamics of trophic position with stable isotope analysis. Relative weights (Wr) of stocked trout were inversely associated with their stream residence time but were consistently higher than those of wild trout. Weight loss of harvested stocked trout was similar among species and sizes, but fish stocked earlier lost more weight. Overall, 40% of 141 stomachs from stocked trout were empty compared to 15% of wild trout stomachs (N = 26). We identified a much higher rate of piscivory in wild trout (18 times that of stocked trout), and wild trout were 4.3 times more likely to consume gastropods relative to stocked trout. Hatchery‐reared trout were isotopically similar to co‐occurring wild fish for both δ13C and δ15N values but were less variable than wild trout. Differences in sulfur isotope ratios (δ34S) between wild and hatchery‐reared trout indicated that the diets of wild fish were enriched in δ34S relative to the diets of hatchery‐reared fish. Although hatcheryreared trout consumed prey items similar to those of wild fish, differences in consumption or behavior (e.g., reduced feeding) may have resulted in lower condition and negative growth. These findings provide critical insight on the trophic dynamics of stocked trout and may assist in developing and enhancing stream trout fisheries

    Post-feminism for children: feminism ‘repackaged’ in the Bratz films

    Get PDF
    After their release in 2001, Bratz dolls carved into Barbie’s previously monopolistic share of teen doll sales. Amidst their growing popularity, cultural critics expressed a host of concerns about Bratz dolls, especially over how they sexualize youth, but the line grew to include a host of products like costumes, makeup kits, games, books, clothing, and movies. It also inspired new, similar doll lines from other toy companies. In this article, we situate the Bratz’s popularity in a specific cultural moment tied to the history of modern feminism. We use a content analysis of the Bratz movie series to explore the feminist and post-feminist thematics it contains. We identify the images of girlhood that are being marketed through the films and explore how the series repackages not only girlhood but also feminism itself in a way that encourages girls to exchange political power for purchasing power
    corecore