-
Thirty-six officers, artisanally entangled
Authors:
David Gross,
Paulina Goedicke
Abstract:
A perfect tensor of order $d$ is a state of four $d$-level systems that is maximally entangled under any bipartition. These objects have attracted considerable attention in quantum information and many-body theory. Perfect tensors generalize the combinatorial notion of orthogonal Latin squares (OLS). Deciding whether OLS of a given order exist has historically been a difficult problem. The case…
▽ More
A perfect tensor of order $d$ is a state of four $d$-level systems that is maximally entangled under any bipartition. These objects have attracted considerable attention in quantum information and many-body theory. Perfect tensors generalize the combinatorial notion of orthogonal Latin squares (OLS). Deciding whether OLS of a given order exist has historically been a difficult problem. The case $d=6$ proved particularly thorny, and was popularized by Leonhard Euler in terms of a putative constellation of "36 officers". It took more than a century to show that Euler's puzzle has no solution. After yet another century, its quantum generalization was resolved in the affirmative: 36 entangled officers can be suitably arranged. However, the construction and verification of known instances relies on elaborate computer codes. (In particular, Leonhard would have had no means of dealing with such solutions to his own puzzle -- an unsatisfactory state of affairs). In this paper, we present the first human-made order-$6$ perfect tensors. We decompose the Hilbert space $(\mathbb{C}^6)^{\otimes 2}$ of two quhexes into the direct sum $(\mathbb{C}^3)^{\otimes 2}\oplus(\mathbb{C}^3)^{\otimes 3}$ comprising superpositions of two-qutrit and three-qutrit states. Perfect tensors arise when certain Clifford unitaries are applied separately to the two sectors. Technically, our construction realizes solutions to the perfect functions ansatz recently proposed by Rather. Generalizing an observation of Bruzda and Życzkowski, we show that any solution of this kind gives rise to a two-unitary complex Hadamard matrix, of which we construct infinite families. Finally, we sketch a formulation of the theory of perfect tensors in terms of quasi-orthogonal decompositions of matrix algebras.
△ Less
Submitted 21 April, 2025;
originally announced April 2025.
-
Benchmarking of quantum and classical SDP relaxations for QUBO formulations of real-world logistics problems
Authors:
Birte Ostermann,
Taylor Garnowski,
Fabian Henze,
Vaibhavnath Jha,
Asra Dia,
Frederik Fiand,
David Gross,
Wendelin Gross,
Julian Nowak,
Timo de Wolff
Abstract:
Quadratic unconstrained binary optimization problems (QUBOs) are intensively discussed in the realm of quantum computing and polynomial optimization. We provide a vast experimental study of semidefinite programming (SDP) relaxations of QUBOs using sums of squares methods and on Hamiltonian Updates. We test on QUBO reformulations of industry-based instances of the (open) vehicle routing problem and…
▽ More
Quadratic unconstrained binary optimization problems (QUBOs) are intensively discussed in the realm of quantum computing and polynomial optimization. We provide a vast experimental study of semidefinite programming (SDP) relaxations of QUBOs using sums of squares methods and on Hamiltonian Updates. We test on QUBO reformulations of industry-based instances of the (open) vehicle routing problem and the (affinity-based) slotting problem -- two common combinatorial optimization problems in logistics. Beyond comparing the performance of various methods and software, our results reaffirm that optimizing over non-generic, real-world instances provides additional challenges. In consequence, this study underscores recent developments towards structure exploitation and specialized solver development for the used methods and simultaneously shows that further research is necessary in this direction both on the classical and the quantum side.
△ Less
Submitted 13 March, 2025;
originally announced March 2025.
-
Solving quadratic binary optimization problems using quantum SDP methods: Non-asymptotic running time analysis
Authors:
Fabian Henze,
Viet Tran,
Birte Ostermann,
Richard Kueng,
Timo de Wolff,
David Gross
Abstract:
Quantum computers can solve semidefinite programs (SDPs) using resources that scale better than state-of-the-art classical methods as a function of the problem dimension. At the same time, the known quantum algorithms scale very unfavorably in the precision, which makes it non-trivial to find applications for which the quantum methods are well-suited. Arguably, precision is less crucial for SDP re…
▽ More
Quantum computers can solve semidefinite programs (SDPs) using resources that scale better than state-of-the-art classical methods as a function of the problem dimension. At the same time, the known quantum algorithms scale very unfavorably in the precision, which makes it non-trivial to find applications for which the quantum methods are well-suited. Arguably, precision is less crucial for SDP relaxations of combinatorial optimization problems (such as the Goemans-Williamson algorithm), because these include a final rounding step that maps SDP solutions to binary variables. With this in mind, Brandão, França, and Kueng have proposed to use quantum SDP solvers in order to achieve an end-to-end speed-up for obtaining approximate solutions to combinatorial optimization problems. They did indeed succeed in identifying an algorithm that realizes a polynomial quantum advantage in terms of its asymptotic running time. However, asymptotic results say little about the problem sizes for which advantages manifest. Here, we present an analysis of the non-asymptotic resource requirements of this algorithm. The work consists of two parts. First, we optimize the original algorithm with a particular emphasis on performance for realistic problem instances. In particular, we formulate a version with adaptive step-sizes, an improved detection criterion for infeasible instances, and a more efficient rounding procedure. In a second step, we benchmark both the classical and the quantum version of the algorithm. The benchmarks did not identify a regime where even the optimized quantum algorithm would beat standard classical approaches for input sizes that can be realistically solved at all. In the absence of further significant improvements, these algorithms therefore fall into a category sometimes called galactic: Unbeaten in their asymptotic scaling behavior, but not practical for realistic problems.
△ Less
Submitted 21 February, 2025;
originally announced February 2025.
-
Unified CNNs and transformers underlying learning mechanism reveals multi-head attention modus vivendi
Authors:
Ella Koresh,
Ronit D. Gross,
Yuval Meir,
Yarden Tzach,
Tal Halevi,
Ido Kanter
Abstract:
Convolutional neural networks (CNNs) evaluate short-range correlations in input images which progress along the layers, whereas vision transformer (ViT) architectures evaluate long-range correlations, using repeated transformer encoders composed of fully connected layers. Both are designed to solve complex classification tasks but from different perspectives. This study demonstrates that CNNs and…
▽ More
Convolutional neural networks (CNNs) evaluate short-range correlations in input images which progress along the layers, whereas vision transformer (ViT) architectures evaluate long-range correlations, using repeated transformer encoders composed of fully connected layers. Both are designed to solve complex classification tasks but from different perspectives. This study demonstrates that CNNs and ViT architectures stem from a unified underlying learning mechanism, which quantitatively measures the single-nodal performance (SNP) of each node in feedforward (FF) and multi-head attention (MHA) sub-blocks. Each node identifies small clusters of possible output labels, with additional noise represented as labels outside these clusters. These features are progressively sharpened along the transformer encoders, enhancing the signal-to-noise ratio. This unified underlying learning mechanism leads to two main findings. First, it enables an efficient applied nodal diagonal connection (ANDC) pruning technique without affecting the accuracy. Second, based on the SNP, spontaneous symmetry breaking occurs among the MHA heads, such that each head focuses its attention on a subset of labels through cooperation among its SNPs. Consequently, each head becomes an expert in recognizing its designated labels, representing a quantitative MHA modus vivendi mechanism. This statistical mechanics inspired viewpoint enables to reveal macroscopic behavior of the entire network from the microscopic performance of each node. These results are based on a compact convolutional transformer architecture trained on the CIFAR-100 and Flowers-102 datasets and call for their extension to other architectures and applications, such as natural language processing.
△ Less
Submitted 9 April, 2025; v1 submitted 22 January, 2025;
originally announced January 2025.
-
Advanced deep architecture pruning using single filter performance
Authors:
Yarden Tzach,
Yuval Meir,
Ronit D. Gross,
Ofek Tevet,
Ella Koresh,
Ido Kanter
Abstract:
Pruning the parameters and structure of neural networks reduces the computational complexity, energy consumption, and latency during inference. Recently, a novel underlying mechanism for successful deep learning (DL) was presented based on a method that quantitatively measures the single filter performance in each layer of a DL architecture, and a new comprehensive mechanism of how deep learning w…
▽ More
Pruning the parameters and structure of neural networks reduces the computational complexity, energy consumption, and latency during inference. Recently, a novel underlying mechanism for successful deep learning (DL) was presented based on a method that quantitatively measures the single filter performance in each layer of a DL architecture, and a new comprehensive mechanism of how deep learning works was presented. This statistical mechanics inspired viewpoint enables to reveal the macroscopic behavior of the entire network from the microscopic performance of each filter and their cooperative behavior. Herein, we demonstrate how this understanding paves the path to high quenched dilution of the convolutional layers of deep architectures without affecting their overall accuracy using applied filter cluster connections (AFCC). AFCC is exemplified on VGG-11 and EfficientNet-B0 architectures trained on CIFAR-100, and its high pruning outperforms other techniques using the same pruning magnitude. Additionally, this technique is broadened to single nodal performance and highly pruning of fully connected layers, suggesting a possible implementation to considerably reduce the complexity of over-parameterized AI tasks.
△ Less
Submitted 12 June, 2025; v1 submitted 22 January, 2025;
originally announced January 2025.
-
Turn-based Multi-Agent Reinforcement Learning Model Checking
Authors:
Dennis Gross
Abstract:
In this paper, we propose a novel approach for verifying the compliance of turn-based multi-agent reinforcement learning (TMARL) agents with complex requirements in stochastic multiplayer games. Our method overcomes the limitations of existing verification approaches, which are inadequate for dealing with TMARL agents and not scalable to large games with multiple agents. Our approach relies on tig…
▽ More
In this paper, we propose a novel approach for verifying the compliance of turn-based multi-agent reinforcement learning (TMARL) agents with complex requirements in stochastic multiplayer games. Our method overcomes the limitations of existing verification approaches, which are inadequate for dealing with TMARL agents and not scalable to large games with multiple agents. Our approach relies on tight integration of TMARL and a verification technique referred to as model checking. We demonstrate the effectiveness and scalability of our technique through experiments in different types of environments. Our experiments show that our method is suited to verify TMARL agents and scales better than naive monolithic model checking.
△ Less
Submitted 6 January, 2025;
originally announced January 2025.
-
Co-Activation Graph Analysis of Safety-Verified and Explainable Deep Reinforcement Learning Policies
Authors:
Dennis Gross,
Helge Spieker
Abstract:
Deep reinforcement learning (RL) policies can demonstrate unsafe behaviors and are challenging to interpret. To address these challenges, we combine RL policy model checking--a technique for determining whether RL policies exhibit unsafe behaviors--with co-activation graph analysis--a method that maps neural network inner workings by analyzing neuron activation patterns--to gain insight into the s…
▽ More
Deep reinforcement learning (RL) policies can demonstrate unsafe behaviors and are challenging to interpret. To address these challenges, we combine RL policy model checking--a technique for determining whether RL policies exhibit unsafe behaviors--with co-activation graph analysis--a method that maps neural network inner workings by analyzing neuron activation patterns--to gain insight into the safe RL policy's sequential decision-making. This combination lets us interpret the RL policy's inner workings for safe decision-making. We demonstrate its applicability in various experiments.
△ Less
Submitted 6 January, 2025;
originally announced January 2025.
-
Frequency stability of grid-forming power-limiting droop control
Authors:
Amirhossein Iraniparast,
Dominic Groß
Abstract:
In this paper, we analyze power-limiting grid-forming droop control used for grid-connected power converters. Compared to conventional grid-forming droop control, power-limiting droop control explicitly accounts for active power limits of the generation (e.g., renewables) interfaced by the converter. While power-limiting droop control has been demonstrated to work well in simulation and experiment…
▽ More
In this paper, we analyze power-limiting grid-forming droop control used for grid-connected power converters. Compared to conventional grid-forming droop control, power-limiting droop control explicitly accounts for active power limits of the generation (e.g., renewables) interfaced by the converter. While power-limiting droop control has been demonstrated to work well in simulation and experiment, analytical results are not readily available. To address this gap, we first reformulate the dynamics of a power system comprised of converters using power-limiting droop controller as a projected dynamical system in nodal coordinates. Next, we change coordinates from nodal coordinates to edge coordinates to interpret the resulting dynamics as primal-dual dynamics associated with a constrained power flow problem. Leveraging convergence results for primal-dual dynamics, we show that, under mild feasibility assumptions, the frequency dynamics of a power system comprised of converters using power-limiting droop control are globally asymptotically stable with respect to the set of optimizers of its associated constrained power flow problem. Moreover, we show that (i) the converter frequencies synchronize to a common synchronous frequency for each grid-forming converter, and (ii) characterize the synchronous frequency in the case of converters operating at their power limit. Specifically, this result establishes that power-limiting droop control exhibits properties similar to so-called power-sharing in conventional unconstrained droop control.
△ Less
Submitted 8 November, 2024;
originally announced November 2024.
-
Safety-Oriented Pruning and Interpretation of Reinforcement Learning Policies
Authors:
Dennis Gross,
Helge Spieker
Abstract:
Pruning neural networks (NNs) can streamline them but risks removing vital parameters from safe reinforcement learning (RL) policies. We introduce an interpretable RL method called VERINTER, which combines NN pruning with model checking to ensure interpretable RL safety. VERINTER exactly quantifies the effects of pruning and the impact of neural connections on complex safety properties by analyzin…
▽ More
Pruning neural networks (NNs) can streamline them but risks removing vital parameters from safe reinforcement learning (RL) policies. We introduce an interpretable RL method called VERINTER, which combines NN pruning with model checking to ensure interpretable RL safety. VERINTER exactly quantifies the effects of pruning and the impact of neural connections on complex safety properties by analyzing changes in safety measurements. This method maintains safety in pruned RL policies and enhances understanding of their safety dynamics, which has proven effective in multiple RL settings.
△ Less
Submitted 16 September, 2024;
originally announced September 2024.
-
Efficient Milling Quality Prediction with Explainable Machine Learning
Authors:
Dennis Gross,
Helge Spieker,
Arnaud Gotlieb,
Ricardo Knoblauch,
Mohamed Elmansori
Abstract:
This paper presents an explainable machine learning (ML) approach for predicting surface roughness in milling. Utilizing a dataset from milling aluminum alloy 2017A, the study employs random forest regression models and feature importance techniques. The key contributions include developing ML models that accurately predict various roughness values and identifying redundant sensors, particularly t…
▽ More
This paper presents an explainable machine learning (ML) approach for predicting surface roughness in milling. Utilizing a dataset from milling aluminum alloy 2017A, the study employs random forest regression models and feature importance techniques. The key contributions include developing ML models that accurately predict various roughness values and identifying redundant sensors, particularly those for measuring normal cutting force. Our experiments show that removing certain sensors can reduce costs without sacrificing predictive accuracy, highlighting the potential of explainable machine learning to improve cost-effectiveness in machining.
△ Less
Submitted 16 September, 2024;
originally announced September 2024.
-
Enhancing RL Safety with Counterfactual LLM Reasoning
Authors:
Dennis Gross,
Helge Spieker
Abstract:
Reinforcement learning (RL) policies may exhibit unsafe behavior and are hard to explain. We use counterfactual large language model reasoning to enhance RL policy safety post-training. We show that our approach improves and helps to explain the RL policy safety.
Reinforcement learning (RL) policies may exhibit unsafe behavior and are hard to explain. We use counterfactual large language model reasoning to enhance RL policy safety post-training. We show that our approach improves and helps to explain the RL policy safety.
△ Less
Submitted 16 September, 2024;
originally announced September 2024.
-
The polarization hierarchy for polynomial optimization over convex bodies, with applications to nonnegative matrix rank
Authors:
Martin Plávala,
Laurens T. Ligthart,
David Gross
Abstract:
We construct a convergent family of outer approximations for the problem of optimizing polynomial functions over convex bodies subject to polynomial constraints. This is achieved by generalizing the polarization hierarchy, which has previously been introduced for the study of polynomial optimization problems over state spaces of $C^*$-algebras, to convex cones in finite dimensions. If the convex b…
▽ More
We construct a convergent family of outer approximations for the problem of optimizing polynomial functions over convex bodies subject to polynomial constraints. This is achieved by generalizing the polarization hierarchy, which has previously been introduced for the study of polynomial optimization problems over state spaces of $C^*$-algebras, to convex cones in finite dimensions. If the convex bodies can be characterized by linear or semidefinite programs, then the same is true for our hierarchy. Convergence is proven by relating the problem to a certain de Finetti theorem for general probabilistic theories, which are studied as possible generalizations of quantum mechanics. We apply the method to the problem of nonnegative matrix factorization, and in particular to the nested rectangles problem. A numerical implementation of the third level of the hierarchy is shown to give rise to a very tight approximation for this problem.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
Wigner's Theorem for stabilizer states and quantum designs
Authors:
Valentin Obst,
Arne Heimendahl,
Tanmay Singal,
David Gross
Abstract:
We describe the symmetry group of the stabilizer polytope for any number $n$ of systems and any prime local dimension $d$. In the qubit case, the symmetry group coincides with the linear and anti-linear Clifford operations. In the case of qudits, the structure is somewhat richer: for $n=1$, it is a wreath product of permutations of bases and permutations of the elements within each basis. For…
▽ More
We describe the symmetry group of the stabilizer polytope for any number $n$ of systems and any prime local dimension $d$. In the qubit case, the symmetry group coincides with the linear and anti-linear Clifford operations. In the case of qudits, the structure is somewhat richer: for $n=1$, it is a wreath product of permutations of bases and permutations of the elements within each basis. For $n>1$, the symmetries are given by affine symplectic similitudes. These are the affine maps that preserve the symplectic form of the underlying discrete phase space up to a non-zero multiplier. We phrase these results with respect to a number of a priori different notions of "symmetry'', including Kadison symmetries (bijections that are compatible with convex combinations), Wigner symmetries (bijections that preserve inner products), and symmetries realized by an action on Hilbert space. Going beyond stabilizer states, we extend an observation of Heinrich and Gross (Ref. [25]) and show that the symmetries of fairly general sets of Hermitian operators are constrained by certain moments. In particular: the symmetries of a set that behaves like a 3-design preserve Jordan products and are therefore realized by conjugation with unitaries or anti-unitaries. (The structure constants of the Jordan algebra are encoded in an order-three tensor, which we connect to the third moments of a design). This generalizes Kadison's formulation of the classic Wigner Theorem on quantum mechanical symmetries.
△ Less
Submitted 8 June, 2024; v1 submitted 27 May, 2024;
originally announced May 2024.
-
Black Start Operation of Grid-Forming Converters Based on Generalized Three-phase Droop Control Under Unbalanced Conditions
Authors:
Zexian Zeng,
Prajwal Bhagwat,
Maryam Saeedifard,
Dominic Groß
Abstract:
This paper focuses on the challenging task of bottom-up restoration in a complete blackout system using Grid-forming (GFM) converters. Challenges arise due to the limited current capability of power converters, resulting in distinct dynamic responses and fault current characteristics compared to synchronous generators. Additionally, GFM control needs to address the presence of unbalanced condition…
▽ More
This paper focuses on the challenging task of bottom-up restoration in a complete blackout system using Grid-forming (GFM) converters. Challenges arise due to the limited current capability of power converters, resulting in distinct dynamic responses and fault current characteristics compared to synchronous generators. Additionally, GFM control needs to address the presence of unbalanced conditions commonly found in distribution systems. To address these challenges, this paper explores the black start capability of GFM converters with a generalized three-phase GFM droop control. This approach integrates GFM controls individually for each phase, incorporating phase-balancing feedback and enabling current limiting for each phase during unbalanced faults or overloading. The introduction of a phase-balancing gain provides flexibility to trade-off between voltage and power imbalances. The study further investigates bottom-up black start operations using GFM converters, incorporating advanced load relays into breakers for gradual load energization without central coordination. The effectiveness of bottom-up black start operations with GFM converters, utilizing the generalized three-phase GFM droop, is evaluated through electromagnetic transient (EMT) simulations in MATLAB/Simulink. The results confirm the performance and effectiveness of this approach in achieving successful black start operations under unbalanced conditions.
△ Less
Submitted 23 May, 2024;
originally announced May 2024.
-
Entanglement-swapping in generalised probabilistic theories, and iterated CHSH games
Authors:
Lionel J. Dmello,
Laurens T. Ligthart,
David Gross
Abstract:
While there exist theories that have states "more strongly entangled" than quantum theory, in the sense that they show CHSH values above Tsirelson's bound, all known examples of such theories have a strictly smaller set of measurements. Therefore, in tasks which require both bipartite states and measurements, they do not perform better than QM. One of the simplest information processing tasks invo…
▽ More
While there exist theories that have states "more strongly entangled" than quantum theory, in the sense that they show CHSH values above Tsirelson's bound, all known examples of such theories have a strictly smaller set of measurements. Therefore, in tasks which require both bipartite states and measurements, they do not perform better than QM. One of the simplest information processing tasks involving both bipartite states and measurements is that of entanglement swapping. In this paper, we study entanglement swapping in generalised probabilistic theories (GPTs). In particular, we introduce the iterated CHSH game, which measures the power of a GPT to preserve non-classical correlations, in terms of the largest CHSH value obtainable after $n$ rounds of entanglement swapping. Our main result is the construction of a GPT that achieves a CHSH value of $4$ after an arbitrary number of rounds. This addresses a question about the optimality of quantum theory for such games recently raised by Weilenmann and Colbeck. One challenge faced when treating this problem is that there seems to be no general framework for constructing GPTs in which entanglement swapping is a well-defined operation. Therefore, we introduce an algorithmic construction that turns a bipartite GPT into a multipartite GPT that supports entanglement swapping, if consistently possible.
△ Less
Submitted 2 September, 2024; v1 submitted 22 May, 2024;
originally announced May 2024.
-
Dual-Port Grid-Forming Interconnecting Power Converters in Hybrid AC/DC Grids
Authors:
Josep Arévalo-Soler,
Mehrdad Nahalparvari,
Dominic Gross,
Eduardo Prieto-Araujo,
Staffan Norrga,
Oriol Gomis-Bellmunt
Abstract:
Interconnecting power converters (IPC) are the main elements enabling the interconnection of multiple high-voltage alternating current (HVAC) and high-voltage direct current (HVDC) subgrids. These converters can be classified either as grid-forming or grid-following. These roles can be assigned to both ac and dc terminals. This work compares state-of-the-art single-port grid-forming and grid-follo…
▽ More
Interconnecting power converters (IPC) are the main elements enabling the interconnection of multiple high-voltage alternating current (HVAC) and high-voltage direct current (HVDC) subgrids. These converters can be classified either as grid-forming or grid-following. These roles can be assigned to both ac and dc terminals. This work compares state-of-the-art single-port grid-forming and grid-following control schemes with a dual-port grid-forming control scheme, which can simultaneously form a stable voltage on the ac and the dc sides. The dual-port grid-forming small-signal stability and dynamic behavior under fluctuations in the power flow are studied and compared against state-of-the-art control architectures. Moreover, the dual-port control scheme is validated and tested on a down-scaled laboratory platform with several transient events.
△ Less
Submitted 20 December, 2024; v1 submitted 30 April, 2024;
originally announced April 2024.
-
Input-Output Specifications of Grid-Forming Functions and Data-Driven Verification Methods
Authors:
Jennifer T. Bui,
Dominic Groß
Abstract:
This work investigates interoperability and performance specifications for converter interfaced generation (CIG) that can be verified using only input-output data. First, we develop decentralized conditions on frequency stability that account for network circuit dynamics and can be verified using CIG terminal dynamics and a few key network parameters. Next, we formalize performance specifications…
▽ More
This work investigates interoperability and performance specifications for converter interfaced generation (CIG) that can be verified using only input-output data. First, we develop decentralized conditions on frequency stability that account for network circuit dynamics and can be verified using CIG terminal dynamics and a few key network parameters. Next, we formalize performance specifications that impose requirements on the CIG disturbance response. A simple data-driven validation method is presented that enables verification of the interoperability and performance specifications for CIG using input-output data from a two-node system. Data obtained from electromagnetic transient (EMT) simulations are used to illustrate the proposed approach and the impact of key parameters such as inner control loop gains, network coupling strength, and controller bandwidth limitations.
△ Less
Submitted 24 April, 2024;
originally announced April 2024.
-
Runtime-coherence trade-offs for hybrid SAT-solvers
Authors:
Vahideh Eshaghian,
Sören Wilkening,
Johan Åberg,
David Gross
Abstract:
Many search-based quantum algorithms that achieve a theoretical speedup are not practically relevant since they require extraordinarily long coherence times, or lack the parallelizability of their classical counterparts.This raises the question of how to divide computational tasks into a collection of parallelizable sub-problems, each of which can be solved by a quantum computer with limited coher…
▽ More
Many search-based quantum algorithms that achieve a theoretical speedup are not practically relevant since they require extraordinarily long coherence times, or lack the parallelizability of their classical counterparts.This raises the question of how to divide computational tasks into a collection of parallelizable sub-problems, each of which can be solved by a quantum computer with limited coherence time. Here, we approach this question via hybrid algorithms for the k-SAT problem. Our analysis is based on Schöning's algorithm, which solves instances of k-SAT by performing random walks in the space of potential assignments. The search space of the walk allows for "natural" partitions, where we subject only one part of the partition to a Grover search, while the rest is sampled classically, thus resulting in a hybrid scheme. In this setting, we argue that there exists a simple trade-off relation between the total runtime and the coherence-time, which no such partition based hybrid-scheme can surpass. For several concrete choices of partitions, we explicitly determine the specific runtime coherence-time relations, and show saturation of the ideal trade-off. Finally, we present numerical simulations which suggest additional flexibility in implementing hybrid algorithms with optimal trade-off.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
Enhancing Manufacturing Quality Prediction Models through the Integration of Explainability Methods
Authors:
Dennis Gross,
Helge Spieker,
Arnaud Gotlieb,
Ricardo Knoblauch
Abstract:
This research presents a method that utilizes explainability techniques to amplify the performance of machine learning (ML) models in forecasting the quality of milling processes, as demonstrated in this paper through a manufacturing use case. The methodology entails the initial training of ML models, followed by a fine-tuning phase where irrelevant features identified through explainability metho…
▽ More
This research presents a method that utilizes explainability techniques to amplify the performance of machine learning (ML) models in forecasting the quality of milling processes, as demonstrated in this paper through a manufacturing use case. The methodology entails the initial training of ML models, followed by a fine-tuning phase where irrelevant features identified through explainability methods are eliminated. This procedural refinement results in performance enhancements, paving the way for potential reductions in manufacturing costs and a better understanding of the trained ML models. This study highlights the usefulness of explainability techniques in both explaining and optimizing predictive models in the manufacturing realm.
△ Less
Submitted 27 March, 2024;
originally announced March 2024.
-
Probabilistic Model Checking of Stochastic Reinforcement Learning Policies
Authors:
Dennis Gross,
Helge Spieker
Abstract:
We introduce a method to verify stochastic reinforcement learning (RL) policies. This approach is compatible with any RL algorithm as long as the algorithm and its corresponding environment collectively adhere to the Markov property. In this setting, the future state of the environment should depend solely on its current state and the action executed, independent of any previous states or actions.…
▽ More
We introduce a method to verify stochastic reinforcement learning (RL) policies. This approach is compatible with any RL algorithm as long as the algorithm and its corresponding environment collectively adhere to the Markov property. In this setting, the future state of the environment should depend solely on its current state and the action executed, independent of any previous states or actions. Our method integrates a verification technique, referred to as model checking, with RL, leveraging a Markov decision process, a trained RL policy, and a probabilistic computation tree logic (PCTL) formula to build a formal model that can be subsequently verified via the model checker Storm. We demonstrate our method's applicability across multiple benchmarks, comparing it to baseline methods called deterministic safety estimates and naive monolithic model checking. Our results show that our method is suited to verify stochastic RL policies.
△ Less
Submitted 27 March, 2024;
originally announced March 2024.
-
Synchronized states of power grids and oscillator networks by convex optimization
Authors:
Carsten Hartmann,
Philipp C. Böttcher,
David Gross,
Dirk Witthaut
Abstract:
Synchronization is essential for the operation of AC power systems: All generators in the power grid must rotate with fixed relative phases to enable a steady flow of electric power. Understanding the conditions for and the limitations of synchronization is of utmost practical importance. In this article, we propose a novel approach to compute and analyze the stable stationary states of a power gr…
▽ More
Synchronization is essential for the operation of AC power systems: All generators in the power grid must rotate with fixed relative phases to enable a steady flow of electric power. Understanding the conditions for and the limitations of synchronization is of utmost practical importance. In this article, we propose a novel approach to compute and analyze the stable stationary states of a power grid or an oscillator network in terms of a convex optimization problem. This approach allows to systematically compute \emph{all} stable states where the phase difference across an edge does not exceed $π/2$.Furthermore, the optimization formulation allows to rigorously establish certain properties of synchronized states and to bound the error in the widely used linear power flow approximation.
△ Less
Submitted 14 March, 2024;
originally announced March 2024.
-
Secret extraction attacks against obfuscated IQP circuits
Authors:
David Gross,
Dominik Hangleiter
Abstract:
Quantum computing devices can now perform sampling tasks which, according to complexity-theoretic and numerical evidence, are beyond the reach of classical computers. This raises the question of how one can efficiently verify that a quantum computer operating in this regime works as intended. In 2008, Shepherd and Bremner proposed a protocol in which a verifier constructs a unitary from the compar…
▽ More
Quantum computing devices can now perform sampling tasks which, according to complexity-theoretic and numerical evidence, are beyond the reach of classical computers. This raises the question of how one can efficiently verify that a quantum computer operating in this regime works as intended. In 2008, Shepherd and Bremner proposed a protocol in which a verifier constructs a unitary from the comparatively easy-to-implement family of so-called IQP circuits, and challenges a prover to execute it on a quantum computer. The challenge problem is designed to contain an obfuscated secret, which can be turned into a statistical test that accepts samples from a correct quantum implementation. It was conjectured that extracting the secret from the challenge problem is NP-hard, so that the ability to pass the test constitutes strong evidence that the prover possesses a quantum device and that it works as claimed. Unfortunately, about a decade later, Kahanamoku-Meyer found an efficient classical secret extraction attack. Bremner, Cheng, and Ji very recently followed up by constructing a wide-ranging generalization of the original protocol. Their IQP Stabilizer Scheme has been explicitly designed to circumvent the known weakness. They also suggested that the original construction can be made secure by adjusting the problem parameters. In this work, we develop a number of secret extraction attacks which are effective against both new approaches in a wide range of problem parameters. In particular, we find multiple ways to recover the 300-bit secret hidden in a challenge data set published by Bremner, Cheng, and Ji. The important problem of finding an efficient and reliable verification protocol for sampling-based proofs of quantum supremacy thus remains open.
△ Less
Submitted 19 February, 2025; v1 submitted 15 December, 2023;
originally announced December 2023.
-
Realistic Runtime Analysis for Quantum Simplex Computation
Authors:
Sabrina Ammann,
Maximilian Hess,
Debora Ramacciotti,
Sándor P. Fekete,
Paulina L. A. Goedicke,
David Gross,
Andreea Lefterovici,
Tobias J. Osborne,
Michael Perk,
Antonio Rotundo,
S. E. Skelton,
Sebastian Stiller,
Timo de Wolff
Abstract:
In recent years, strong expectations have been raised for the possible power of quantum computing for solving difficult optimization problems, based on theoretical, asymptotic worst-case bounds. Can we expect this to have consequences for Linear and Integer Programming when solving instances of practically relevant size, a fundamental goal of Mathematical Programming, Operations Research and Algor…
▽ More
In recent years, strong expectations have been raised for the possible power of quantum computing for solving difficult optimization problems, based on theoretical, asymptotic worst-case bounds. Can we expect this to have consequences for Linear and Integer Programming when solving instances of practically relevant size, a fundamental goal of Mathematical Programming, Operations Research and Algorithm Engineering? Answering this question faces a crucial impediment: The lack of sufficiently large quantum platforms prevents performing real-world tests for comparison with classical methods.
In this paper, we present a quantum analog for classical runtime analysis when solving real-world instances of important optimization problems. To this end, we measure the expected practical performance of quantum computers by analyzing the expected gate complexity of a quantum algorithm. The lack of practical quantum platforms for experimental comparison is addressed by hybrid benchmarking, in which the algorithm is performed on a classical system, logging the expected cost of the various subroutines that are employed by the quantum versions. In particular, we provide an analysis of quantum methods for Linear Programming, for which recent work has provided asymptotic speedup through quantum subroutines for the Simplex method. We show that a practical quantum advantage for realistic problem sizes would require quantum gate operation times that are considerably below current physical limitations.
△ Less
Submitted 16 November, 2023;
originally announced November 2023.
-
DualStream: Spatially Sharing Selves and Surroundings using Mobile Devices and Augmented Reality
Authors:
Rishi Vanukuru,
Suibi Che-Chuan Weng,
Krithik Ranjan,
Torin Hopkins,
Amy Banic,
Mark D. Gross,
Ellen Yi-Luen Do
Abstract:
In-person human interaction relies on our spatial perception of each other and our surroundings. Current remote communication tools partially address each of these aspects. Video calls convey real user representations but without spatial interactions. Augmented and Virtual Reality (AR/VR) experiences are immersive and spatial but often use virtual environments and characters instead of real-life r…
▽ More
In-person human interaction relies on our spatial perception of each other and our surroundings. Current remote communication tools partially address each of these aspects. Video calls convey real user representations but without spatial interactions. Augmented and Virtual Reality (AR/VR) experiences are immersive and spatial but often use virtual environments and characters instead of real-life representations. Bridging these gaps, we introduce DualStream, a system for synchronous mobile AR remote communication that captures, streams, and displays spatial representations of users and their surroundings. DualStream supports transitions between user and environment representations with different levels of visuospatial fidelity, as well as the creation of persistent shared spaces using environment snapshots. We demonstrate how DualStream can enable spatial communication in real-world contexts, and support the creation of blended spaces for collaboration. A formative evaluation of DualStream revealed that users valued the ability to interact spatially and move between representations, and could see DualStream fitting into their own remote communication practices in the near future. Drawing from these findings, we discuss new opportunities for designing more widely accessible spatial communication tools, centered around the mobile phone.
△ Less
Submitted 2 September, 2023;
originally announced September 2023.
-
Three-phase grid-forming droop control for unbalanced systems and fault ride through
Authors:
Prajwal Bhagwat,
Dominic Groß
Abstract:
In this work, we investigate grid-forming (GFM) control for dc/ac voltage source converters (VSC) under unbalanced system conditions and unbalanced faults. To fully leverage the degrees of freedom of VSCs, we introduce the concept of generalized three-phase GFM control that combines individual GFM controls for every phase with a phase balancing feedback. The proposed control allows trading off vol…
▽ More
In this work, we investigate grid-forming (GFM) control for dc/ac voltage source converters (VSC) under unbalanced system conditions and unbalanced faults. To fully leverage the degrees of freedom of VSCs, we introduce the concept of generalized three-phase GFM control that combines individual GFM controls for every phase with a phase balancing feedback. The proposed control allows trading off voltage and power unbalance under unbalanced conditions, enables current limiting for each phase during unbalanced faults, and reduces to positive sequence GFM droop control in balanced systems. High-fidelity simulations are used to illustrate the properties of the control.
△ Less
Submitted 28 July, 2023;
originally announced July 2023.
-
The mechanism underlying successful deep learning
Authors:
Yarden Tzach,
Yuval Meir,
Ofek Tevet,
Ronit D. Gross,
Shiri Hodassman,
Roni Vardi,
Ido Kanter
Abstract:
Deep architectures consist of tens or hundreds of convolutional layers (CLs) that terminate with a few fully connected (FC) layers and an output layer representing the possible labels of a complex classification task. According to the existing deep learning (DL) rationale, the first CL reveals localized features from the raw data, whereas the subsequent layers progressively extract higher-level fe…
▽ More
Deep architectures consist of tens or hundreds of convolutional layers (CLs) that terminate with a few fully connected (FC) layers and an output layer representing the possible labels of a complex classification task. According to the existing deep learning (DL) rationale, the first CL reveals localized features from the raw data, whereas the subsequent layers progressively extract higher-level features required for refined classification. This article presents an efficient three-phase procedure for quantifying the mechanism underlying successful DL. First, a deep architecture is trained to maximize the success rate (SR). Next, the weights of the first several CLs are fixed and only the concatenated new FC layer connected to the output is trained, resulting in SRs that progress with the layers. Finally, the trained FC weights are silenced, except for those emerging from a single filter, enabling the quantification of the functionality of this filter using a correlation matrix between input labels and averaged output fields, hence a well-defined set of quantifiable features is obtained. Each filter essentially selects a single output label independent of the input label, which seems to prevent high SRs; however, it counterintuitively identifies a small subset of possible output labels. This feature is an essential part of the underlying DL mechanism and is progressively sharpened with layers, resulting in enhanced signal-to-noise ratios and SRs. Quantitatively, this mechanism is exemplified by the VGG-16, VGG-6, and AVGG-16. The proposed mechanism underlying DL provides an accurate tool for identifying each filter's quality and is expected to direct additional procedures to improve the SR, computational complexity, and latency of DL.
△ Less
Submitted 29 May, 2023;
originally announced May 2023.
-
Universal dual-port grid-forming control: bridging the gap between grid-forming and grid-following control
Authors:
Irina Subotić,
and Dominic Groß
Abstract:
We analyze a dual-port grid-forming (GFM) control for power systems containing ac and dc transmission, converter-interfaced generation and energy storage, and legacy generation. To operate such a system and provide standard services, state-of-the-art control architectures i) require assigning grid-following (GFL) and GFM controls to different converters, and ii) result in highly complex system dyn…
▽ More
We analyze a dual-port grid-forming (GFM) control for power systems containing ac and dc transmission, converter-interfaced generation and energy storage, and legacy generation. To operate such a system and provide standard services, state-of-the-art control architectures i) require assigning grid-following (GFL) and GFM controls to different converters, and ii) result in highly complex system dynamics. In contrast, dual-port GFM control (i) subsumes common functions of GFM and GFL controls in a simple controller, ii) can be applied to a wide range of emerging technologies independently of the network configuration, and iii) significantly reduces system complexity. In this work, we provide i) an end-to-end modeling framework that allows to model complex topologies through composition of reduced-order device models, ii) an in-depth discussion of universal dual-port GFM control for emerging power systems, and iii) end-to-end stability conditions that cover a wide range of network topologies, emerging technologies, and legacy technologies. Finally, we validate our findings in detailed case studies.
△ Less
Submitted 16 January, 2024; v1 submitted 10 April, 2023;
originally announced April 2023.
-
Enhancing the accuracies by performing pooling decisions adjacent to the output layer
Authors:
Yuval Meir,
Yarden Tzach,
Ronit D. Gross,
Ofek Tevet,
Roni Vardi,
Ido Kanter
Abstract:
Learning classification tasks of (2^nx2^n) inputs typically consist of \le n (2x2) max-pooling (MP) operators along the entire feedforward deep architecture. Here we show, using the CIFAR-10 database, that pooling decisions adjacent to the last convolutional layer significantly enhance accuracies. In particular, average accuracies of the advanced-VGG with m layers (A-VGGm) architectures are 0.936,…
▽ More
Learning classification tasks of (2^nx2^n) inputs typically consist of \le n (2x2) max-pooling (MP) operators along the entire feedforward deep architecture. Here we show, using the CIFAR-10 database, that pooling decisions adjacent to the last convolutional layer significantly enhance accuracies. In particular, average accuracies of the advanced-VGG with m layers (A-VGGm) architectures are 0.936, 0.940, 0.954, 0.955, and 0.955 for m=6, 8, 14, 13, and 16, respectively. The results indicate A-VGG8s' accuracy is superior to VGG16s', and that the accuracies of A-VGG13 and A-VGG16 are equal, and comparable to that of Wide-ResNet16. In addition, replacing the three fully connected (FC) layers with one FC layer, A-VGG6 and A-VGG14, or with several linear activation FC layers, yielded similar accuracies. These significantly enhanced accuracies stem from training the most influential input-output routes, in comparison to the inferior routes selected following multiple MP decisions along the deep architecture. In addition, accuracies are sensitive to the order of the non-commutative MP and average pooling operators adjacent to the output layer, varying the number and location of training routes. The results call for the reexamination of previously proposed deep architectures and their accuracies by utilizing the proposed pooling strategy adjacent to the output layer.
△ Less
Submitted 31 August, 2023; v1 submitted 10 March, 2023;
originally announced March 2023.
-
The inflation hierarchy and the polarization hierarchy are complete for the quantum bilocal scenario
Authors:
Laurens T. Ligthart,
David Gross
Abstract:
It is a fundamental but difficult problem to characterize the set of correlations that can be obtained by performing measurements on quantum mechanical systems. The problem is particularly challenging when the preparation procedure for the quantum states is assumed to comply with a given causal structure. Recently, a first completeness result for this quantum causal compatibility problem has been…
▽ More
It is a fundamental but difficult problem to characterize the set of correlations that can be obtained by performing measurements on quantum mechanical systems. The problem is particularly challenging when the preparation procedure for the quantum states is assumed to comply with a given causal structure. Recently, a first completeness result for this quantum causal compatibility problem has been given, based on the so-called quantum inflation technique. However, completeness was achieved by imposing additional technical constraints, such as an upper bound on the Schmidt rank of the observables. Here, we show that these complications are unnecessary in the quantum bilocal scenario, a much-studied abstract model of entanglement swapping experiments. We prove that the quantum inflation hierarchy is complete for the bilocal scenario in the commuting observables model of locality. We also give a bilocal version of an observation by Tsirelson, namely that in finite dimensions, the commuting observables model and the tensor product model of locality coincide. These results answer questions recently posed by Renou and Xu. Finally, we point out that our techniques can be interpreted more generally as giving rise to an SDP hierarchy that is complete for the problem of optimizing polynomial functions in the states of operator algebras defined by generators and relations. The completeness of this polarization hierarchy follows from a quantum de Finetti theorem for states on maximal $C^*$-tensor products.
△ Less
Submitted 26 May, 2023; v1 submitted 21 December, 2022;
originally announced December 2022.
-
Targeted Adversarial Attacks on Deep Reinforcement Learning Policies via Model Checking
Authors:
Dennis Gross,
Thiago D. Simao,
Nils Jansen,
Guillermo A. Perez
Abstract:
Deep Reinforcement Learning (RL) agents are susceptible to adversarial noise in their observations that can mislead their policies and decrease their performance. However, an adversary may be interested not only in decreasing the reward, but also in modifying specific temporal logic properties of the policy. This paper presents a metric that measures the exact impact of adversarial attacks against…
▽ More
Deep Reinforcement Learning (RL) agents are susceptible to adversarial noise in their observations that can mislead their policies and decrease their performance. However, an adversary may be interested not only in decreasing the reward, but also in modifying specific temporal logic properties of the policy. This paper presents a metric that measures the exact impact of adversarial attacks against such properties. We use this metric to craft optimal adversarial attacks. Furthermore, we introduce a model checking method that allows us to verify the robustness of RL policies against adversarial attacks. Our empirical analysis confirms (1) the quality of our metric to craft adversarial attacks against temporal logic properties, and (2) that we are able to concisely assess a system's robustness against attacks.
△ Less
Submitted 10 December, 2022;
originally announced December 2022.
-
Efficient shallow learning as an alternative to deep learning
Authors:
Yuval Meir,
Ofek Tevet,
Yarden Tzach,
Shiri Hodassman,
Ronit D. Gross,
Ido Kanter
Abstract:
The realization of complex classification tasks requires training of deep learning (DL) architectures consisting of tens or even hundreds of convolutional and fully connected hidden layers, which is far from the reality of the human brain. According to the DL rationale, the first convolutional layer reveals localized patterns in the input and large-scale patterns in the following layers, until it…
▽ More
The realization of complex classification tasks requires training of deep learning (DL) architectures consisting of tens or even hundreds of convolutional and fully connected hidden layers, which is far from the reality of the human brain. According to the DL rationale, the first convolutional layer reveals localized patterns in the input and large-scale patterns in the following layers, until it reliably characterizes a class of inputs. Here, we demonstrate that with a fixed ratio between the depths of the first and second convolutional layers, the error rates of the generalized shallow LeNet architecture, consisting of only five layers, decay as a power law with the number of filters in the first convolutional layer. The extrapolation of this power law indicates that the generalized LeNet can achieve small error rates that were previously obtained for the CIFAR-10 database using DL architectures. A power law with a similar exponent also characterizes the generalized VGG-16 architecture. However, this results in a significantly increased number of operations required to achieve a given error rate with respect to LeNet. This power law phenomenon governs various generalized LeNet and VGG-16 architectures, hinting at its universal behavior and suggesting a quantitative hierarchical time-space complexity among machine learning architectures. Additionally, the conservation law along the convolutional layers, which is the square-root of their size times their depth, is found to asymptotically minimize error rates. The efficient shallow learning that is demonstrated in this study calls for further quantitative examination using various databases and architectures and its accelerated implementation using future dedicated hardware developments.
△ Less
Submitted 23 November, 2022; v1 submitted 15 November, 2022;
originally announced November 2022.
-
Grid-forming control of three-phase and single-phase converters across unbalanced transmission and distribution systems
Authors:
Shahin S. Nudehi,
Dominic Groß
Abstract:
In this work, we investigate grid-forming control for power systems containing three-phase and single-phase converters connected to unbalanced distribution and transmission networks, investigate self-balancing between single-phase converters, and propose a novel balancing feedback for grid-forming control that explicitly allows to trade-off unbalances in voltage and power. We develop a quasi-stead…
▽ More
In this work, we investigate grid-forming control for power systems containing three-phase and single-phase converters connected to unbalanced distribution and transmission networks, investigate self-balancing between single-phase converters, and propose a novel balancing feedback for grid-forming control that explicitly allows to trade-off unbalances in voltage and power. We develop a quasi-steady-state power network model that allows to analyze the interactions between three-phase and single-phase power converters across transmission, distribution, and standard transformer interconnections. We first investigate conditions under which this general network admits a well-posed kron-reduced quasi-steady-state network model. Our main contribution leverages this reduced-order model to develop analytical conditions for stability of the overall network with grid-forming three-phase and single-phase converters connected through standard transformer interconnections. Specifically, we provide conditions on the network topology under which (i) single-phase converters autonomously self-synchronize to a phase-balanced operating point and (ii) single-phase converters phase-balance through synchronization with three-phase converters. Moreover, we establish that the conditions can be relaxed if a phase-balancing feedback control is used. Finally, case studies combining detailed models of transmission systems (i.e., IEEE 9-bus) and distribution systems (i.e., IEEE 13-bus) are used to illustrate the results for (i) a power system containing a mix of transmission and distribution connected converters and, (ii) a power system solely using distribution-connected converters at the grid edge.
△ Less
Submitted 11 November, 2022;
originally announced November 2022.
-
Frequency shaping control for weakly-coupled grid-forming IBRs
Authors:
Bala Kameshwar Poolla,
Yashen Lin,
Andrey Bernstein,
Enrique Mallada,
Dominic Groß
Abstract:
We consider the problem of controlling the frequency of low-inertia power systems via inverter-based resources (IBRs) that are weakly connected to the grid. We propose a novel grid-forming control strategy, the so-called frequency shaping control, that aims to shape the frequency response of synchronous generators (SGs) to load perturbations so as to efficiently arrest sudden frequency drops. Our…
▽ More
We consider the problem of controlling the frequency of low-inertia power systems via inverter-based resources (IBRs) that are weakly connected to the grid. We propose a novel grid-forming control strategy, the so-called frequency shaping control, that aims to shape the frequency response of synchronous generators (SGs) to load perturbations so as to efficiently arrest sudden frequency drops. Our solution relaxes several existing assumptions in the literature and is able to navigate tradeoffs between peak power requirements and maximum frequency deviations. Finally, we analyze the robustness to imperfect knowledge of network parameters, while particularly highlighting the importance of accurate estimation of these parameters.
△ Less
Submitted 17 December, 2022; v1 submitted 26 September, 2022;
originally announced September 2022.
-
COOL-MC: A Comprehensive Tool for Reinforcement Learning and Model Checking
Authors:
Dennis Gross,
Nils Jansen,
Sebastian Junges,
Guillermo A. Perez
Abstract:
This paper presents COOL-MC, a tool that integrates state-of-the-art reinforcement learning (RL) and model checking. Specifically, the tool builds upon the OpenAI gym and the probabilistic model checker Storm. COOL-MC provides the following features: (1) a simulator to train RL policies in the OpenAI gym for Markov decision processes (MDPs) that are defined as input for Storm, (2) a new model buil…
▽ More
This paper presents COOL-MC, a tool that integrates state-of-the-art reinforcement learning (RL) and model checking. Specifically, the tool builds upon the OpenAI gym and the probabilistic model checker Storm. COOL-MC provides the following features: (1) a simulator to train RL policies in the OpenAI gym for Markov decision processes (MDPs) that are defined as input for Storm, (2) a new model builder for Storm, which uses callback functions to verify (neural network) RL policies, (3) formal abstractions that relate models and policies specified in OpenAI gym or Storm, and (4) algorithms to obtain bounds on the performance of so-called permissive policies. We describe the components and architecture of COOL-MC and demonstrate its features on multiple benchmark environments.
△ Less
Submitted 15 September, 2022;
originally announced September 2022.
-
A thermo-mechanical phase-field fracture model: application to hot cracking simulations in additive manufacturing
Authors:
Hui Ruan,
Shahed Rezaei,
Yangyiwei Yang,
Dietmar Gross,
Bai-Xiang Xu
Abstract:
Thermal fracture is prevalent in many engineering problems and is one of the most devastating defects in metal additive manufacturing. Due to the interactive underlying physics involved, the computational simulation of such a process is challenging. In this work, we propose a thermo-mechanical phase-field fracture model, which is based on a thermodynamically consistent derivation. The influence of…
▽ More
Thermal fracture is prevalent in many engineering problems and is one of the most devastating defects in metal additive manufacturing. Due to the interactive underlying physics involved, the computational simulation of such a process is challenging. In this work, we propose a thermo-mechanical phase-field fracture model, which is based on a thermodynamically consistent derivation. The influence of different coupling terms such as damage-informed thermomechanics and heat conduction and temperature-dependent fracture properties, as well as different phase-field fracture formulations, are discussed. Finally, the model is implemented in the finite element method and applied to simulate the hot cracking in additive manufacturing. Thereby not only the thermal strain but also the solidification shrinkage are considered. As for thermal history, various predicted thermal profiles, including analytical solution and numerical thermal temperature profile around the melting pool, are regarded, whereas the latter includes the influence of different process parameters. The studies reveal that the solidification shrinkage strain takes a dominant role in the formation of the circumferential crack, while the temperature gradient is mostly responsible for the central crack. Process parameter study demonstrates further that a higher laser power and slower scanning speed are favorable for keyhole mode hot cracking while a lower laser power and quicker scanning speed tend to form the conduction mode cracking. The numerical predictions of the hot cracking patterns are in good agreement with similar experimental observations, showing the capability of the model for further studies.
△ Less
Submitted 3 August, 2022;
originally announced August 2022.
-
Duality theory for Clifford tensor powers
Authors:
Felipe Montealegre-Mora,
David Gross
Abstract:
The representation theory of the Clifford group is playing an increasingly prominent role in quantum information theory, including in such diverse use cases as the construction of protocols for quantum system certification, quantum simulation, and quantum cryptography. In these applications, the tensor powers of the defining representation seem particularly important. The representation theory of…
▽ More
The representation theory of the Clifford group is playing an increasingly prominent role in quantum information theory, including in such diverse use cases as the construction of protocols for quantum system certification, quantum simulation, and quantum cryptography. In these applications, the tensor powers of the defining representation seem particularly important. The representation theory of these tensor powers is understood in two regimes. 1. For odd qudits in the case where the power t is not larger than the number of systems n: Here, a duality theory between the Clifford group and certain discrete orthogonal groups can be used to make fairly explicit statements about the occurring irreps (this theory is related to Howe duality and the eta-correspondence). 2. For qubits: Tensor powers up to t=4 have been analyzed on a case-by-case basis. In this paper, we provide a unified framework for the duality approach that also covers qubit systems. To this end, we translate the notion of rank of symplectic representations to representations of the qubit Clifford group, and generalize the eta correspondence between symplectic and orthogonal groups to a correspondence between the Clifford and certain orthogonal-stochastic groups. As a sample application, we provide a protocol to efficiently implement the complex conjugate of a black-box Clifford unitary evolution.
△ Less
Submitted 3 November, 2024; v1 submitted 2 August, 2022;
originally announced August 2022.
-
Unified Grid-Forming Control of PMSG Wind Turbines for Fast Frequency Response and MPPT
Authors:
Xue Lyu,
Irina Subotić,
Dominic Groß
Abstract:
In this work we present a novel dual-port grid-forming control strategy, for permanent magnet synchronous generator wind turbines with back-to-back voltage source converters, that unifies the entire range of functions from maximum power point tracking (MPPT) to providing inertia and fast frequency response without explicit mode switching between grid-following and grid-forming control. The control…
▽ More
In this work we present a novel dual-port grid-forming control strategy, for permanent magnet synchronous generator wind turbines with back-to-back voltage source converters, that unifies the entire range of functions from maximum power point tracking (MPPT) to providing inertia and fast frequency response without explicit mode switching between grid-following and grid-forming control. The controls impose a well-defined AC voltage at the grid-side converter (GSC) and the machine-side converter (MSC) AC terminals and explicitly stabilize the DC-link capacitor voltage through both GSC and MSC. The wind turbine's kinetic energy storage and curtailment are adjusted through a combination of implicit rotor speed control and pitch angle control and directly determine the operating mode and level of grid support. Moreover, we provide analytical small-signal stability conditions for a simplified system and explicitly characterize the relationship between control gains, curtailment, and the wind turbines steady-state response. Finally, a detailed simulation study is used to validate the results and compared the proposed control with state-of-the-art MPPT control.
△ Less
Submitted 19 July, 2022;
originally announced July 2022.
-
Minimising statistical errors in calibration of quantum-gate sets
Authors:
Yaiza Aragonés-Soria,
René Otten,
Tobias Hangleiter,
Pascal Cerfontaine,
David Gross
Abstract:
Calibration of quantum gates is a necessary hurdle to overcome on the way to a reliable quantum computer. In a recent paper, a protocol called Gate Set Calibration protocol (GSC) has been introduced and used to learn coherent errors from multi-qubit quantum gates. Here, we extend this study in a number of ways: First, we perform a statistical analysis of the measurement uncertainties. Second, we f…
▽ More
Calibration of quantum gates is a necessary hurdle to overcome on the way to a reliable quantum computer. In a recent paper, a protocol called Gate Set Calibration protocol (GSC) has been introduced and used to learn coherent errors from multi-qubit quantum gates. Here, we extend this study in a number of ways: First, we perform a statistical analysis of the measurement uncertainties. Second, we find explicit measurement settings that minimize this uncertainty, while also requiring that the protocol involves only a small number of distinct gates, aiding physical realizability. We numerically demonstrate that, just by adding two more single-qubit gates to GSC, the statistical error produced in the calibration of a CNOT gate is divided by a factor of more than two.
△ Less
Submitted 21 July, 2023; v1 submitted 7 June, 2022;
originally announced June 2022.
-
A convergent inflation hierarchy for quantum causal structures
Authors:
Laurens T. Ligthart,
Mariami Gachechiladze,
David Gross
Abstract:
A causal structure is a description of the functional dependencies between random variables. A distribution is compatible with a given causal structure if it can be realized by a process respecting these dependencies. Deciding whether a distribution is compatible with a structure is a practically and fundamentally relevant, yet very difficult problem. Only recently has a general class of algorithm…
▽ More
A causal structure is a description of the functional dependencies between random variables. A distribution is compatible with a given causal structure if it can be realized by a process respecting these dependencies. Deciding whether a distribution is compatible with a structure is a practically and fundamentally relevant, yet very difficult problem. Only recently has a general class of algorithms been proposed: These so-called inflation techniques associate to any causal structure a hierarchy of increasingly strict compatibility tests, where each test can be formulated as a computationally efficient convex optimization problem. Remarkably, it has been shown that in the classical case, this hierarchy is complete in the sense that each non-compatible distribution will be detected at some level of the hierarchy. An inflation hierarchy has also been formulated for causal structures that allow for the observed classical random variables to arise from measurements on quantum states - however, no proof of completeness of this quantum inflation hierarchy has been supplied. In this paper, we construct a first version of the quantum inflation hierarchy that is provably convergent. From a technical point of view, convergence proofs are built on de Finetti Theorems, which show that certain symmetries (which can be imposed in convex optimization problems) imply independence of random variables (which is not directly a convex constraint). A main technical ingredient to our proof is a Quantum de Finetti Theorem that holds for general tensor products of $C^*$-algebras, generalizing previous work that was restricted to minimal tensor products.
△ Less
Submitted 7 December, 2022; v1 submitted 27 October, 2021;
originally announced October 2021.
-
Dual-port grid-forming control of MMCs and its applications to grids of grids
Authors:
Dominic Groß,
Sánchez-Sánchez,
Eduardo Prieto-Araujo,
Oriol Gomis-Bellmunt
Abstract:
This work focuses on grid-forming (GFM) control of Interconnecting Power Converters (IPCs) that are used to interconnect multiple HVAC and HVDC subgrids to form a grid of grids. We introduce the concept of dual-port GFM control that leverages the ability of Modular Multilevel Converters (MMCs) to simultaneously form its AC and DC terminal voltage and present two dual-port GFM MMC controls. We prov…
▽ More
This work focuses on grid-forming (GFM) control of Interconnecting Power Converters (IPCs) that are used to interconnect multiple HVAC and HVDC subgrids to form a grid of grids. We introduce the concept of dual-port GFM control that leverages the ability of Modular Multilevel Converters (MMCs) to simultaneously form its AC and DC terminal voltage and present two dual-port GFM MMC controls. We provide analytical results and high-fidelity simulations that demonstrate that (i) dual-port GFM control is more resilient to contingencies (i.e., line and generator outages) than state-of-the-art single-port GFM control, and (ii) unlike single-port GFM control, dual-port GFM control does not require assigning grid-forming and grid-following (GFL) roles to the IPC terminals in grids of grids. Finally, we provide an in-depth discussion and comparison of single-port GFM control and the proposed dual-port GFM controls.
△ Less
Submitted 3 March, 2022; v1 submitted 21 June, 2021;
originally announced June 2021.
-
Power-balancing dual-port grid-forming power converter control for renewable integration and hybrid AC/DC power systems
Authors:
Irina Subotić,
Dominic Groß
Abstract:
In this work, we investigate grid-forming (GFM) control for dc/ac power converters in emerging power systems that contain ac and dc networks, renewable generation, and conventional generation. We propose a novel power-balancing GFM control strategy that simultaneously forms the converter ac and dc voltage (i.e., dual-port GFM), unifies standard grid-following (GFL) and GFM functions, and is backwa…
▽ More
In this work, we investigate grid-forming (GFM) control for dc/ac power converters in emerging power systems that contain ac and dc networks, renewable generation, and conventional generation. We propose a novel power-balancing GFM control strategy that simultaneously forms the converter ac and dc voltage (i.e., dual-port GFM), unifies standard grid-following (GFL) and GFM functions, and is backwards compatible with conventional machine-based generation. Notably, in contrast to state-of-the-art control architectures that use a mix of grid-forming and grid-following control, dual-port GFM control can be used independently of the converter power source or network configuration. Our main contribution are stability conditions that cover emerging hybrid ac/dc networks as well as machines and converters with and without controlled power source, that only require knowledge of the system topology. Finally, a detailed case study is used to illustrate and validate the results.
△ Less
Submitted 19 July, 2022; v1 submitted 18 June, 2021;
originally announced June 2021.
-
Proof methods for robust low-rank matrix recovery
Authors:
Tim Fuchs,
David Gross,
Peter Jung,
Felix Krahmer,
Richard Kueng,
Dominik Stöger
Abstract:
Low-rank matrix recovery problems arise naturally as mathematical formulations of various inverse problems, such as matrix completion, blind deconvolution, and phase retrieval. Over the last two decades, a number of works have rigorously analyzed the reconstruction performance for such scenarios, giving rise to a rather general understanding of the potential and the limitations of low-rank matrix…
▽ More
Low-rank matrix recovery problems arise naturally as mathematical formulations of various inverse problems, such as matrix completion, blind deconvolution, and phase retrieval. Over the last two decades, a number of works have rigorously analyzed the reconstruction performance for such scenarios, giving rise to a rather general understanding of the potential and the limitations of low-rank matrix models in sensing problems. In this article, we compare the two main proof techniques that have been paving the way to a rigorous analysis, discuss their potential and limitations, and survey their successful applications. On the one hand, we review approaches based on descent cone analysis, showing that they often lead to strong guarantees even in the presence of adversarial noise, but face limitations when it comes to structured observations. On the other hand, we discuss techniques using approximate dual certificates and the golfing scheme, which are often better suited to deal with practical measurement structures, but sometimes lead to weaker guarantees. Lastly, we review recent progress towards analyzing descent cones also for structured scenarios -- exploiting the idea of splitting the cones into multiple parts that are analyzed via different techniques.
△ Less
Submitted 8 June, 2021;
originally announced June 2021.
-
Sketching with Kerdock's crayons: Fast sparsifying transforms for arbitrary linear maps
Authors:
Tim Fuchs,
David Gross,
Felix Krahmer,
Richard Kueng,
Dustin G. Mixon
Abstract:
Given an arbitrary matrix $A\in\mathbb{R}^{n\times n}$, we consider the fundamental problem of computing $Ax$ for any $x\in\mathbb{R}^n$ such that $Ax$ is $s$-sparse. While fast algorithms exist for particular choices of $A$, such as the discrete Fourier transform, there is currently no $o(n^2)$ algorithm that treats the unstructured case. In this paper, we devise a randomized approach to tackle t…
▽ More
Given an arbitrary matrix $A\in\mathbb{R}^{n\times n}$, we consider the fundamental problem of computing $Ax$ for any $x\in\mathbb{R}^n$ such that $Ax$ is $s$-sparse. While fast algorithms exist for particular choices of $A$, such as the discrete Fourier transform, there is currently no $o(n^2)$ algorithm that treats the unstructured case. In this paper, we devise a randomized approach to tackle the unstructured case. Our method relies on a representation of $A$ in terms of certain real-valued mutually unbiased bases derived from Kerdock sets. In the preprocessing phase of our algorithm, we compute this representation of $A$ in $O(n^3\log n)$ operations. Next, given any unit vector $x\in\mathbb{R}^n$ such that $Ax$ is $s$-sparse, our randomized fast transform uses this representation of $A$ to compute the entrywise $ε$-hard threshold of $Ax$ with high probability in only $O(sn + ε^{-2}\|A\|_{2\to\infty}^2n\log n)$ operations. In addition to a performance guarantee, we provide numerical results that demonstrate the plausibility of real-world implementation of our algorithm.
△ Less
Submitted 12 May, 2021;
originally announced May 2021.
-
Chaotic scattering of highly excited strings
Authors:
David J. Gross,
Vladimir Rosenhaus
Abstract:
Motivated by the desire to understand chaos in the $S$-matrix of string theory, we study tree level scattering amplitudes involving highly excited strings. While the amplitudes for scattering of light strings have been a hallmark of string theory since its early days, scattering of excited strings has been far less studied. Recent results on black hole chaos, combined with the correspondence princ…
▽ More
Motivated by the desire to understand chaos in the $S$-matrix of string theory, we study tree level scattering amplitudes involving highly excited strings. While the amplitudes for scattering of light strings have been a hallmark of string theory since its early days, scattering of excited strings has been far less studied. Recent results on black hole chaos, combined with the correspondence principle between black holes and strings, suggest that the amplitudes have a rich structure. We review the procedure by which an excited string is formed by repeatedly scattering photons off of an initial tachyon (the DDF formalism). We compute the scattering amplitude of one arbitrary excited string and any number of tachyons in bosonic string theory. At high energies and high mass excited state these amplitudes are determined by a saddle-point in the integration over the positions of the string vertex operators on the sphere (or the upper half plane), thus yielding a generalization of the "scattering equations". We find a compact expression for the amplitude of an excited string decaying into two tachyons, and study its properties for a generic excited string. We find the amplitude is highly erratic as a function of both the precise excited string state and of the tachyon scattering angle relative to its polarization, a sign of chaos.
△ Less
Submitted 16 June, 2021; v1 submitted 28 March, 2021;
originally announced March 2021.
-
Certifying Numerical Decompositions of Compact Group Representations
Authors:
Felipe Montealegre-Mora,
Denis Rosset,
Jean-Daniel Bancal,
David Gross
Abstract:
We present a performant and rigorous algorithm for certifying that a matrix is close to being a projection onto an irreducible subspace of a given group representation. This addresses a problem arising when one seeks solutions to semi-definite programs (SDPs) with a group symmetry. Indeed, in this context, the dimension of the SDP can be significantly reduced if the irreducible representations of…
▽ More
We present a performant and rigorous algorithm for certifying that a matrix is close to being a projection onto an irreducible subspace of a given group representation. This addresses a problem arising when one seeks solutions to semi-definite programs (SDPs) with a group symmetry. Indeed, in this context, the dimension of the SDP can be significantly reduced if the irreducible representations of the group action are explicitly known. Rigorous numerical algorithms for decomposing a given group representation into irreps are known, but fairly expensive. To avoid this performance problem, existing software packages -- e.g. RepLAB, which motivated the present work -- use randomized heuristics. While these seem to work well in practice, the problem of to which extent the results can be trusted arises. Here, we provide rigorous guarantees applicable to finite and compact groups, as well as a software implementation that can interface with RepLAB. Under natural assumptions, a commonly used previous method due to Babai and Friedl runs in time O(n^5) for n-dimensional representations. In our approach, the complexity of running both the heuristic decomposition and the certification step is O(max{n^3 log n, D d^2 log d}), where d is the maximum dimension of an irreducible subrepresentation, and D is the time required to multiply elements of the group. A reference implementation interfacing with RepLAB is provided.
△ Less
Submitted 27 August, 2021; v1 submitted 28 January, 2021;
originally announced January 2021.
-
The axiomatic and the operational approaches to resource theories of magic do not coincide
Authors:
Arne Heimendahl,
Markus Heinrich,
David Gross
Abstract:
Stabiliser operations occupy a prominent role in fault-tolerant quantum computing. They are defined operationally: by the use of Clifford gates, Pauli measurements and classical control. These operations can be efficiently simulated on a classical computer, a result which is known as the Gottesman-Knill theorem. However, an additional supply of magic states is enough to promote them to a universal…
▽ More
Stabiliser operations occupy a prominent role in fault-tolerant quantum computing. They are defined operationally: by the use of Clifford gates, Pauli measurements and classical control. These operations can be efficiently simulated on a classical computer, a result which is known as the Gottesman-Knill theorem. However, an additional supply of magic states is enough to promote them to a universal, fault-tolerant model for quantum computing. To quantify the needed resources in terms of magic states, a resource theory of magic has been developed. Stabiliser operations (SO) are considered free within this theory, however they are not the most general class of free operations. From an axiomatic point of view, these are the completely stabiliser-preserving (CSP) channels, defined as those that preserve the convex hull of stabiliser states. It has been an open problem to decide whether these two definitions lead to the same class of operations. In this work, we answer this question in the negative, by constructing an explicit counter-example. This indicates that recently proposed stabiliser-based simulation techniques of CSP maps are strictly more powerful than Gottesman-Knill-like methods. The result is analogous to a well-known fact in entanglement theory, namely that there is a gap between the operationally defined class of local operations and classical communication (LOCC) and the axiomatically defined class of separable channels.
△ Less
Submitted 18 January, 2022; v1 submitted 23 November, 2020;
originally announced November 2020.
-
Rapid characterisation of linear-optical networks via PhaseLift
Authors:
Daniel Suess,
Nicola Maraviglia,
Richard Kueng,
Alexandre Maïnos,
Chris Sparrow,
Toshikazu Hashimoto,
Nobuyuki Matsuda,
David Gross,
Anthony Laing
Abstract:
Linear-optical circuits are elementary building blocks for classical and quantum information processing with light. In particular, due to its monolithic structure, integrated photonics offers great phase-stability and can rely on the large scale manufacturability provided by the semiconductor industry. New devices, based on such optical circuits, hold the promise of faster and energy-efficient com…
▽ More
Linear-optical circuits are elementary building blocks for classical and quantum information processing with light. In particular, due to its monolithic structure, integrated photonics offers great phase-stability and can rely on the large scale manufacturability provided by the semiconductor industry. New devices, based on such optical circuits, hold the promise of faster and energy-efficient computations in machine learning applications and even implementing quantum algorithms intractable for classical computers. However, this technological revolution requires accurate and scalable certification protocols for devices that can be comprised of thousands of optical modes. Here, we present a novel technique to reconstruct the transfer matrix of linear optical networks that is based on the recent advances in low-rank matrix recovery and convex optimisation problems known as PhaseLift algorithms. Conveniently, our characterisation protocol can be performed with a coherent classical light source and photodiodes. We prove that this method is robust to noise and scales efficiently with the number of modes. We experimentally tested the proposed characterisation protocol on a programmable integrated interferometer designed for quantum information processing. We compared the transfer matrix reconstruction obtained with our method against the one provided by a more demanding reconstruction scheme based on two-photon quantum interference. For 5-dimensional random unitaries, the average circuit fidelity between the matrices obtained from the two reconstructions is 0.993.
△ Less
Submitted 1 October, 2020;
originally announced October 2020.
-
Adversarial Patch Camouflage against Aerial Detection
Authors:
Ajaya Adhikari,
Richard den Hollander,
Ioannis Tolios,
Michael van Bekkum,
Anneloes Bal,
Stijn Hendriks,
Maarten Kruithof,
Dennis Gross,
Nils Jansen,
Guillermo Pérez,
Kit Buurman,
Stephan Raaijmakers
Abstract:
Detection of military assets on the ground can be performed by applying deep learning-based object detectors on drone surveillance footage. The traditional way of hiding military assets from sight is camouflage, for example by using camouflage nets. However, large assets like planes or vessels are difficult to conceal by means of traditional camouflage nets. An alternative type of camouflage is th…
▽ More
Detection of military assets on the ground can be performed by applying deep learning-based object detectors on drone surveillance footage. The traditional way of hiding military assets from sight is camouflage, for example by using camouflage nets. However, large assets like planes or vessels are difficult to conceal by means of traditional camouflage nets. An alternative type of camouflage is the direct misleading of automatic object detectors. Recently, it has been observed that small adversarial changes applied to images of the object can produce erroneous output by deep learning-based detectors. In particular, adversarial attacks have been successfully demonstrated to prohibit person detections in images, requiring a patch with a specific pattern held up in front of the person, thereby essentially camouflaging the person for the detector. Research into this type of patch attacks is still limited and several questions related to the optimal patch configuration remain open.
This work makes two contributions. First, we apply patch-based adversarial attacks for the use case of unmanned aerial surveillance, where the patch is laid on top of large military assets, camouflaging them from automatic detectors running over the imagery. The patch can prevent automatic detection of the whole object while only covering a small part of it. Second, we perform several experiments with different patch configurations, varying their size, position, number and saliency. Our results show that adversarial patch attacks form a realistic alternative to traditional camouflage activities, and should therefore be considered in the automated analysis of aerial surveillance imagery.
△ Less
Submitted 31 August, 2020;
originally announced August 2020.
-
RoomShift: Room-scale Dynamic Haptics for VR with Furniture-moving Swarm Robots
Authors:
Ryo Suzuki,
Hooman Hedayati,
Clement Zheng,
James Bohn,
Daniel Szafir,
Ellen Yi-Luen Do,
Mark D. Gross,
Daniel Leithinger
Abstract:
RoomShift is a room-scale dynamic haptic environment for virtual reality, using a small swarm of robots that can move furniture. RoomShift consists of nine shape-changing robots: Roombas with mechanical scissor lifts. These robots drive beneath a piece of furniture to lift, move and place it. By augmenting virtual scenes with physical objects, users can sit on, lean against, place and otherwise in…
▽ More
RoomShift is a room-scale dynamic haptic environment for virtual reality, using a small swarm of robots that can move furniture. RoomShift consists of nine shape-changing robots: Roombas with mechanical scissor lifts. These robots drive beneath a piece of furniture to lift, move and place it. By augmenting virtual scenes with physical objects, users can sit on, lean against, place and otherwise interact with furniture with their whole body; just as in the real world. When the virtual scene changes or users navigate within it, the swarm of robots dynamically reconfigures the physical environment to match the virtual content. We describe the hardware and software implementation, applications in virtual tours and architectural design and interaction techniques.
△ Less
Submitted 19 August, 2020;
originally announced August 2020.
-
Stabilizer extent is not multiplicative
Authors:
Arne Heimendahl,
Felipe Montealegre-Mora,
Frank Vallentin,
David Gross
Abstract:
The Gottesman-Knill theorem states that a Clifford circuit acting on stabilizer states can be simulated efficiently on a classical computer. Recently, this result has been generalized to cover inputs that are close to a coherent superposition of logarithmically many stabilizer states. The runtime of the classical simulation is governed by the stabilizer extent, which roughly measures how many stab…
▽ More
The Gottesman-Knill theorem states that a Clifford circuit acting on stabilizer states can be simulated efficiently on a classical computer. Recently, this result has been generalized to cover inputs that are close to a coherent superposition of logarithmically many stabilizer states. The runtime of the classical simulation is governed by the stabilizer extent, which roughly measures how many stabilizer states are needed to approximate the state. An important open problem is to decide whether the extent is multiplicative under tensor products. An affirmative answer would yield an efficient algorithm for computing the extent of product inputs, while a negative result implies the existence of more efficient classical algorithms for simulating largescale quantum circuits. Here, we answer this question in the negative. Our result follows from very general properties of the set of stabilizer states, such as having a size that scales subexponentially in the dimension, and can thus be readily adapted to similar constructions for other resource theories.
△ Less
Submitted 19 February, 2021; v1 submitted 8 July, 2020;
originally announced July 2020.