10,004 research outputs found
Computational Evolutionary Embryogeny
Evolutionary and developmental processes are used to evolve the configurations of 3-D structures in silico to achieve desired performances. Natural systems utilize the combination of both evolution and development processes to produce remarkable performance and diversity. However, this approach has not yet been applied extensively to the design of continuous 3-D load-supporting structures. Beginning with a single artificial cell containing information analogous to a DNA sequence, a structure is grown according to the rules encoded in the sequence. Each artificial cell in the structure contains the same sequence of growth and development rules, and each artificial cell is an element in a finite element mesh representing the structure of the mature individual. Rule sequences are evolved over many generations through selection and survival of individuals in a population. Modularity and symmetry are visible in nearly every natural and engineered structure. An understanding of the evolution and expression of symmetry and modularity is emerging from recent biological research. Initial evidence of these attributes is present in the phenotypes that are developed from the artificial evolution, although neither characteristic is imposed nor selected-for directly. The computational evolutionary development approach presented here shows promise for synthesizing novel configurations of high-performance systems. The approach may advance the system design to a new paradigm, where current design strategies have difficulty producing useful solutions
Locking classical information
It is known that the maximum classical mutual information that can be
achieved between measurements on a pair of quantum systems can drastically
underestimate the quantum mutual information between those systems. In this
article, we quantify this distinction between classical and quantum information
by demonstrating that after removing a logarithmic-sized quantum system from
one half of a pair of perfectly correlated bitstrings, even the most sensitive
pair of measurements might only yield outcomes essentially independent of each
other. This effect is a form of information locking but the definition we use
is strictly stronger than those used previously. Moreover, we find that this
property is generic, in the sense that it occurs when removing a random
subsystem. As such, the effect might be relevant to statistical mechanics or
black hole physics. Previous work on information locking had always assumed a
uniform message. In this article, we assume only a min-entropy bound on the
message and also explore the effect of entanglement. We find that classical
information is strongly locked almost until it can be completely decoded. As a
cryptographic application of these results, we exhibit a quantum key
distribution protocol that is "secure" if the eavesdropper's information about
the secret key is measured using the accessible information but in which
leakage of even a logarithmic number of key bits compromises the secrecy of all
the others.Comment: 32 pages, 2 figure
Oxygen Cost of Recreational Horse-Riding in Females
Version: as accepted for publication.BACKGROUND: The purpose of this study was to characterize the physiological demands of a riding session comprising different types of recreational horse riding in females. METHODS: Sixteen female recreational riders (aged 17 to 54 years) completed an incremental cycle ergometer exercise test to determine peak oxygen consumption (VO₂peak) and a 45-minute riding session based upon a British Horse Society Stage 2 riding lesson (including walking, trotting, cantering and work without stirrups). Oxygen consumption (VO₂), from which metabolic equivalent (MET) and energy expenditure values were derived, was measured throughout. RESULTS: The mean VO₂ requirement for trotting/cantering (18.4 ± 5.1 ml·kg⁻¹·min⁻¹; 52 ± 12% VO₂peak; 5.3 ± 1.1 METs) was similar to walking/trotting (17.4 ± 5.1 ml·kg⁻¹·min⁻¹; 48 ± 13% VO₂peak; 5.0 ± 1.5 METs) and significantly higher than for work without stirrups (14.2 ± 2.9 ml·kg⁻¹·min⁻¹; 41 ± 12% VO₂peak; 4.2 ± 0.8 METs) (P = .001). CONCLUSIONS: The oxygen cost of different activities typically performed in a recreational horse riding session meets the criteria for moderate intensity exercise (3-6 METs) in females, and trotting combined with cantering imposes the highest metabolic demand. Regular riding could contribute to the achievement of the public health recommendations for physical activity in this population
A Quantum Lovasz Local Lemma
The Lovasz Local Lemma (LLL) is a powerful tool in probability theory to show
the existence of combinatorial objects meeting a prescribed collection of
"weakly dependent" criteria. We show that the LLL extends to a much more
general geometric setting, where events are replaced with subspaces and
probability is replaced with relative dimension, which allows to lower bound
the dimension of the intersection of vector spaces under certain independence
conditions. Our result immediately applies to the k-QSAT problem: For instance
we show that any collection of rank 1 projectors with the property that each
qubit appears in at most of them, has a joint satisfiable
state.
We then apply our results to the recently studied model of random k-QSAT.
Recent works have shown that the satisfiable region extends up to a density of
1 in the large k limit, where the density is the ratio of projectors to qubits.
Using a hybrid approach building on work by Laumann et al. we greatly extend
the known satisfiable region for random k-QSAT to a density of
. Since our tool allows us to show the existence of joint
satisfying states without the need to construct them, we are able to penetrate
into regions where the satisfying states are conjectured to be entangled,
avoiding the need to construct them, which has limited previous approaches to
product states.Comment: 19 page
Dilemma that cannot be resolved by biased quantum coin flipping
We show that a biased quantum coin flip (QCF) cannot provide the performance
of a black-boxed biased coin flip, if it satisfies some fidelity conditions.
Although such a QCF satisfies the security conditions of a biased coin flip, it
does not realize the ideal functionality, and therefore, does not fulfill the
demands for universally composable security. Moreover, through a comparison
within a small restricted bias range, we show that an arbitrary QCF is
distinguishable from a black-boxed coin flip unless it is unbiased on both
sides of parties against insensitive cheating. We also point out the difficulty
in developing cheat-sensitive quantum bit commitment in terms of the
uncomposability of a QCF.Comment: 5 pages and 1 figure. Accepted versio
- …