-
Quantum reinforcement learning of classical rare dynamics: Enhancement by intrinsic Fourier features
Authors:
Alissa Wilms,
Laura Ohff,
Andrea Skolik,
Jens Eisert,
Sumeet Khatri,
David A. Reiss
Abstract:
Rare events are essential for understanding the behavior of non-equilibrium and industrial systems. It is of ongoing interest to develop methods for effectively searching for rare events. With the advent of quantum computing and its potential advantages over classical computing for applications like sampling certain probability distributions, the question arises whether quantum computers could als…
▽ More
Rare events are essential for understanding the behavior of non-equilibrium and industrial systems. It is of ongoing interest to develop methods for effectively searching for rare events. With the advent of quantum computing and its potential advantages over classical computing for applications like sampling certain probability distributions, the question arises whether quantum computers could also provide an advantage or inspire new methods for sampling the statistics of rare events. In this work, we propose a quantum reinforcement learning (QRL) method for studying rare dynamics, and we investigate their benefits over classical approaches based on neural networks. As a proof-of-concept example, we demonstrate that our QRL agents can learn and generate the rare dynamics of random walks, and we are able to explain this success as well as the different contributing factors to it via the intrinsic Fourier features of the parameterized quantum circuit. Furthermore, we show better learning behavior with fewer parameters compared to classical approaches. This is the first investigation of QRL applied to generating rare events and suggests that QRL is a promising method to study their dynamics and statistics.
△ Less
Submitted 22 April, 2025;
originally announced April 2025.
-
Constant Overhead Entanglement Distillation via Scrambling
Authors:
Andi Gu,
Lorenzo Leone,
Kenneth Goodenough,
Sumeet Khatri
Abstract:
High-fidelity quantum entanglement enables key quantum networking capabilities such as secure communication and distributed quantum computing, but distributing entangled states through optical fibers is limited by noise and loss. Entanglement distillation protocols address this problem by extracting high-fidelity Bell pairs from multiple noisy ones. The primary objective is minimizing the resource…
▽ More
High-fidelity quantum entanglement enables key quantum networking capabilities such as secure communication and distributed quantum computing, but distributing entangled states through optical fibers is limited by noise and loss. Entanglement distillation protocols address this problem by extracting high-fidelity Bell pairs from multiple noisy ones. The primary objective is minimizing the resource overhead: the number of noisy input pairs needed to distill each high-fidelity output pair. While protocols achieving optimal overhead are known in theory, they often require complex decoding operations that make practical implementation challenging. We circumvent this challenge by introducing protocols that use quantum scrambling - the spreading of quantum information under chaotic dynamics - through random Clifford operations. Based on this scrambling mechanism, we design a distillation protocol that maintains asymptotically constant overhead, independent of the desired output error rate $\bar{\varepsilon}$, and can be implemented with shallow quantum circuits of depth $O(\operatorname{poly} \log \log \bar{\varepsilon}^{-1})$ and memory $O(\operatorname{poly} \log \bar{\varepsilon}^{-1})$. We show this protocol remains effective even with noisy quantum gates, making it suitable for near-term devices. Furthermore, by incorporating partial error correction, our protocol achieves state-of-the-art performance: starting with pairs of 10% initial infidelity, we require only 7 noisy inputs per output pair to distill a single Bell pair with infidelity $\bar{\varepsilon}=10^{-12}$, substantially outperforming existing schemes. Finally, we demonstrate the utility of our protocols through applications to quantum repeater networks.
△ Less
Submitted 13 February, 2025;
originally announced February 2025.
-
Towards a General Framework for Practical Quantum Network Protocols
Authors:
Sumeet Khatri
Abstract:
The quantum internet is one of the frontiers of quantum information science. It will revolutionize the way we communicate and do other tasks, and it will allow for tasks that are not possible using the current, classical internet. The backbone of a quantum internet is entanglement distributed globally in order to allow for such novel applications to be performed over long distances. Experimental p…
▽ More
The quantum internet is one of the frontiers of quantum information science. It will revolutionize the way we communicate and do other tasks, and it will allow for tasks that are not possible using the current, classical internet. The backbone of a quantum internet is entanglement distributed globally in order to allow for such novel applications to be performed over long distances. Experimental progress is currently being made to realize quantum networks on a small scale, but much theoretical work is still needed in order to understand how best to distribute entanglement and to guide the realization of large-scale quantum networks, and eventually the quantum internet, especially with the limitations of near-term quantum technologies. This work provides an initial step towards this goal. The main contribution of this thesis is a mathematical framework for entanglement distribution protocols in a quantum network, which allows for discovering optimal protocols using reinforcement learning. We start with a general development of quantum decision processes, which is the theoretical backdrop of reinforcement learning. Then, we define the general task of entanglement distribution in a quantum network, and we present ground- and satellite-based quantum network architectures that incorporate practical aspects of entanglement distribution. We combine the theory of decision processes and the practical quantum network architectures into an overall entanglement distribution protocol. We also define practical figures of merit to evaluate entanglement distribution protocols, which help to guide experimental implementations.
△ Less
Submitted 29 December, 2024;
originally announced December 2024.
-
Multipartite entanglement distribution in Bell-pair networks without Steiner trees and with reduced gate cost
Authors:
S. Siddardha Chelluri,
Sumeet Khatri,
Peter van Loock
Abstract:
Multipartite entangled states, particularly Greenberger--Horne--Zeilinger (GHZ) and other graph states, are important resources in multiparty quantum network protocols and measurement-based quantum computing. We consider the problem of generating such states from networks of bipartite entangled (Bell) pairs. Although an optimal protocol (in terms of time steps and consumed Bell pairs) for generati…
▽ More
Multipartite entangled states, particularly Greenberger--Horne--Zeilinger (GHZ) and other graph states, are important resources in multiparty quantum network protocols and measurement-based quantum computing. We consider the problem of generating such states from networks of bipartite entangled (Bell) pairs. Although an optimal protocol (in terms of time steps and consumed Bell pairs) for generating GHZ states in Bell-pair networks has been identified in [Phys. Rev. A 100, 052333 (2019)], it makes use of at most $O(N^2)$ gates, where $N$ is the number of nodes in the network. It also involves solving the NP-hard Steiner tree problem as an initial step. Reducing the gate cost is an important consideration now and into the future, because both qubits and gate operations are noisy. To this end, we present a protocol for producing GHZ states in arbitrary Bell-pair networks that provably requires only $O(N)$ gates, and we present numerical evidence that our protocol indeed reduces the gate cost on real-world network models, compared to prior work. Notably, the gate cost of our protocol depends only on the number of nodes and is independent of the topology of the network. At the same time, our protocol maintains nearly the optimal number of consumed Bell pairs, and it avoids finding a Steiner tree or solving any other computationally hard problem by running in polynomial time with respect to $N$. By considering the number of gates as a figure of merit, our work approaches entanglement distribution from the perspective that, in practice, unlike the traditional information-theoretic setting, local operations and classical communications are not free.
△ Less
Submitted 13 January, 2025; v1 submitted 5 December, 2024;
originally announced December 2024.
-
Experimental measurement and a physical interpretation of quantum shadow enumerators
Authors:
Daniel Miller,
Kyano Levi,
Lukas Postler,
Alex Steiner,
Lennart Bittel,
Gregory A. L. White,
Yifan Tang,
Eric J. Kuehnke,
Antonio A. Mele,
Sumeet Khatri,
Lorenzo Leone,
Jose Carrasco,
Christian D. Marciniak,
Ivan Pogorelov,
Milena Guevara-Bertsch,
Robert Freund,
Rainer Blatt,
Philipp Schindler,
Thomas Monz,
Martin Ringbauer,
Jens Eisert
Abstract:
Throughout its history, the theory of quantum error correction has heavily benefited from translating classical concepts into the quantum setting. In particular, classical notions of weight enumerators, which relate to the performance of an error-correcting code, and MacWilliams' identity, which helps to compute enumerators, have been generalized to the quantum case. In this work, we establish a d…
▽ More
Throughout its history, the theory of quantum error correction has heavily benefited from translating classical concepts into the quantum setting. In particular, classical notions of weight enumerators, which relate to the performance of an error-correcting code, and MacWilliams' identity, which helps to compute enumerators, have been generalized to the quantum case. In this work, we establish a distinct relationship between the theoretical machinery of quantum weight enumerators and a seemingly unrelated physics experiment: we prove that Rains' quantum shadow enumerators - a powerful mathematical tool - arise as probabilities of observing fixed numbers of triplets in a Bell sampling experiment. This insight allows us to develop here a rigorous framework for the direct measurement of quantum weight enumerators, thus enabling experimental and theoretical studies of the entanglement structure of any quantum error-correcting code or state under investigation. On top of that, we derive concrete sample complexity bounds and physically-motivated robustness guarantees against unavoidable experimental imperfections. Finally, we experimentally demonstrate the possibility of directly measuring weight enumerators on a trapped-ion quantum computer. Our experimental findings are in good agreement with theoretical predictions and illuminate how entanglement theory and quantum error correction can cross-fertilize each other once Bell sampling experiments are combined with the theoretical machinery of quantum weight enumerators.
△ Less
Submitted 29 August, 2024;
originally announced August 2024.
-
Online learning of quantum processes
Authors:
Asad Raza,
Matthias C. Caro,
Jens Eisert,
Sumeet Khatri
Abstract:
Among recent insights into learning quantum states, online learning and shadow tomography procedures are notable for their ability to accurately predict expectation values even of adaptively chosen observables. In contrast to the state case, quantum process learning tasks with a similarly adaptive nature have received little attention. In this work, we investigate online learning tasks for quantum…
▽ More
Among recent insights into learning quantum states, online learning and shadow tomography procedures are notable for their ability to accurately predict expectation values even of adaptively chosen observables. In contrast to the state case, quantum process learning tasks with a similarly adaptive nature have received little attention. In this work, we investigate online learning tasks for quantum processes. Whereas online learning is infeasible for general quantum channels, we show that channels of bounded gate complexity as well as Pauli channels can be online learned in the regret and mistake-bounded models of online learning. In fact, we can online learn probabilistic mixtures of any exponentially large set of known channels. We also provide a provably sample-efficient shadow tomography procedure for Pauli channels. Our results extend beyond quantum channels to non-Markovian multi-time processes, with favorable regret and mistake bounds, as well as a shadow tomography procedure. We complement our online learning upper bounds with mistake as well as computational lower bounds. On the technical side, we make use of the multiplicative weights update algorithm, classical adaptive data analysis, and Bell sampling, as well as tools from the theory of quantum combs for multi-time quantum processes. Our work initiates a study of online learning for classes of quantum channels and, more generally, non-Markovian quantum processes. Given the importance of online learning for state shadow tomography, this may serve as a step towards quantum channel variants of adaptive shadow tomography.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Noise-induced shallow circuits and absence of barren plateaus
Authors:
Antonio Anna Mele,
Armando Angrisani,
Soumik Ghosh,
Sumeet Khatri,
Jens Eisert,
Daniel Stilck França,
Yihui Quek
Abstract:
Motivated by realistic hardware considerations of the pre-fault-tolerant era, we comprehensively study the impact of uncorrected noise on quantum circuits. We first show that any noise `truncates' most quantum circuits to effectively logarithmic depth, in the task of estimating observable expectation values. We then prove that quantum circuits under any non-unital noise exhibit lack of barren plat…
▽ More
Motivated by realistic hardware considerations of the pre-fault-tolerant era, we comprehensively study the impact of uncorrected noise on quantum circuits. We first show that any noise `truncates' most quantum circuits to effectively logarithmic depth, in the task of estimating observable expectation values. We then prove that quantum circuits under any non-unital noise exhibit lack of barren plateaus for cost functions composed of local observables. But, by leveraging the effective shallowness, we also design an efficient classical algorithm to estimate observable expectation values within any constant additive accuracy, with high probability over the choice of the circuit, in any circuit architecture. The runtime of the algorithm is independent of circuit depth, and for any inverse-polynomial target accuracy, it operates in polynomial time in the number of qubits for one-dimensional architectures and quasi-polynomial time for higher-dimensional ones. Taken together, our results showcase that, unless we carefully engineer the circuits to take advantage of the noise, it is unlikely that noisy quantum circuits are preferable over shallow quantum circuits for algorithms that output observable expectation value estimates, like many variational quantum machine learning proposals. Moreover, we anticipate that our work could provide valuable insights into the fundamental open question about the complexity of sampling from (possibly non-unital) noisy random circuits.
△ Less
Submitted 10 October, 2024; v1 submitted 20 March, 2024;
originally announced March 2024.
-
Reducing classical communication costs in multiplexed quantum repeaters using hardware-aware quasi-local policies
Authors:
Stav Haldar,
Pratik J. Barge,
Xiang Cheng,
Kai-Chi Chang,
Brian T. Kirby,
Sumeet Khatri,
Chee Wei Wong,
Hwang Lee
Abstract:
Future quantum networks will have nodes equipped with multiple quantum memories, allowing for multiplexing and entanglement distillation strategies in order to increase fidelities and reduce waiting times for end-to-end entanglement distribution. In this work, we introduce \textit{quasi-local} policies for multiplexed quantum repeater chains. In fully-local policies, nodes make decisions based onl…
▽ More
Future quantum networks will have nodes equipped with multiple quantum memories, allowing for multiplexing and entanglement distillation strategies in order to increase fidelities and reduce waiting times for end-to-end entanglement distribution. In this work, we introduce \textit{quasi-local} policies for multiplexed quantum repeater chains. In fully-local policies, nodes make decisions based only on knowledge of their own states. In our quasi-local policies, nodes have increased knowledge of the state of the repeater chain, but not necessarily full, global knowledge. Our policies exploit the observation that for most decisions the nodes have to make, they only need to have information about the connected region of the chain they belong to, and not the entire chain. In this way, we not only obtain improved performance over local policies, but we reduce the classical communication (CC) costs inherent to global-knowledge policies. Our policies also outperform the well-known and widely studied nested purification and doubling swapping policy in practically relevant parameter regimes. We also carefully examine the role of entanglement distillation. Via analytical and numerical results, we identify the parameter regimes in which distillation makes sense and is useful. In these regimes, we also address the question: "Should we distill before swapping, or vice versa?" Finally, to provide further practical guidance, we propose an experimental implementation of a multiplexing-based repeater chain, and experimentally demonstrate the key element, a high-dimensional biphoton frequency comb. We then evaluate the anticipated performance of our multiplexing-based policies in such a real-world network through simulation results for two concrete memory platforms, namely rare-earth ions and diamond vacancies.
△ Less
Submitted 12 May, 2025; v1 submitted 23 January, 2024;
originally announced January 2024.
-
Quantum metrology in the finite-sample regime
Authors:
Johannes Jakob Meyer,
Sumeet Khatri,
Daniel Stilck França,
Jens Eisert,
Philippe Faist
Abstract:
In quantum metrology, one of the major applications of quantum technologies, the ultimate precision of estimating an unknown parameter is often stated in terms of the Cramér-Rao bound. Yet, the latter is no longer guaranteed to carry an operational meaning in the regime where few measurement samples are obtained, which we illustrate through a simple example. We instead propose to quantify the qual…
▽ More
In quantum metrology, one of the major applications of quantum technologies, the ultimate precision of estimating an unknown parameter is often stated in terms of the Cramér-Rao bound. Yet, the latter is no longer guaranteed to carry an operational meaning in the regime where few measurement samples are obtained, which we illustrate through a simple example. We instead propose to quantify the quality of a metrology protocol by the probability of obtaining an estimate with a given accuracy. This approach, which we refer to as probably approximately correct (PAC) metrology, ensures operational significance in the finite-sample regime. The accuracy guarantees hold for any value of the unknown parameter, unlike the Cramér-Rao bound which assumes it is approximately known. We establish a strong connection to multi-hypothesis testing with quantum states, which allows us to derive an analogue of the Cramér-Rao bound which contains explicit corrections relevant to the finite-sample regime. We further study the asymptotic behavior of the success probability of the estimation procedure for many copies of the state and apply our framework to the example task of phase estimation with an ensemble of spin-1/2 particles. Overall, our operational approach allows the study of quantum metrology in the finite-sample regime and opens up a plethora of new avenues for research at the interface of quantum information theory and quantum metrology.
△ Less
Submitted 12 July, 2023;
originally announced July 2023.
-
Fast and reliable entanglement distribution with quantum repeaters: principles for improving protocols using reinforcement learning
Authors:
Stav Haldar,
Pratik J. Barge,
Sumeet Khatri,
Hwang Lee
Abstract:
Future quantum technologies such as quantum communication, quantum sensing, and distributed quantum computation, will rely on networks of shared entanglement between spatially separated nodes. In this work, we provide improved protocols/policies for entanglement distribution along a linear chain of nodes, both homogeneous and inhomogeneous, that take practical limitations such as photon losses, no…
▽ More
Future quantum technologies such as quantum communication, quantum sensing, and distributed quantum computation, will rely on networks of shared entanglement between spatially separated nodes. In this work, we provide improved protocols/policies for entanglement distribution along a linear chain of nodes, both homogeneous and inhomogeneous, that take practical limitations such as photon losses, non-ideal measurements, and quantum memories with short coherence times into account. For a wide range of parameters, our policies improve upon previously known policies, such as the "swap-as-soon-as-possible" policy, with respect to both the waiting time and the fidelity of the end-to-end entanglement. This improvement is greatest for the most practically relevant cases, namely, for short coherence times, high link losses, and highly asymmetric links. To obtain our results, we model entanglement distribution using a Markov decision process, and then we use the Q-learning reinforcement learning (RL) algorithm to discover new policies. These new policies are characterized by dynamic, state-dependent memory cutoffs and collaboration between the nodes. In particular, we quantify this collaboration between the nodes. Our quantifiers tell us how much "global" knowledge of the network every node has. Finally, our understanding of the performance of large quantum networks is currently limited by the computational inefficiency of simulating them using RL or other optimization methods. Thus, in this work, we present a method for nesting policies in order to obtain policies for large repeater chains. By nesting our RL-based policies for small repeater chains, we obtain policies for large repeater chains that improve upon the swap-as-soon-as-possible policy, and thus we pave the way for a scalable method for obtaining policies for long-distance entanglement distribution.
△ Less
Submitted 31 March, 2024; v1 submitted 1 March, 2023;
originally announced March 2023.
-
Global Pandemics Influence on Cyber Security and Cyber Crimes
Authors:
Somya Khatri,
Aswani Kumar Cherukuri,
Firuz Kamalov
Abstract:
COVID-19 has caused widespread damage across many areas of life and has made humans more dependent on the internet and technology making us realize the importance of secure remote working environments. While social separation is encouraged during moments of lockdown, online infrastructure has become the central focus for communication, commerce, working, and learning, creating a new challenge and…
▽ More
COVID-19 has caused widespread damage across many areas of life and has made humans more dependent on the internet and technology making us realize the importance of secure remote working environments. While social separation is encouraged during moments of lockdown, online infrastructure has become the central focus for communication, commerce, working, and learning, creating a new challenge and trend for companies to adopt new methods and operating models. The cases of cyber-attacks increased, and fraudsters and cybercriminals took use of this to intensify their illegal activities by taking advantage of remote workers' vulnerabilities and the public's interest in information about the coronavirus. This paper examines the different types of security threats and cyber crimes that people faced in the pandemic time and the need for a safe and secure cyber infrastructure. This paper attempts to analyze the security implications of the issues.
△ Less
Submitted 24 February, 2023;
originally announced February 2023.
-
Exponentially tighter bounds on limitations of quantum error mitigation
Authors:
Yihui Quek,
Daniel Stilck França,
Sumeet Khatri,
Johannes Jakob Meyer,
Jens Eisert
Abstract:
Quantum error mitigation has been proposed as a means to combat unwanted and unavoidable errors in near-term quantum computing without the heavy resource overheads required by fault tolerant schemes. Recently, error mitigation has been successfully applied to reduce noise in near-term applications. In this work, however, we identify strong limitations to the degree to which quantum noise can be ef…
▽ More
Quantum error mitigation has been proposed as a means to combat unwanted and unavoidable errors in near-term quantum computing without the heavy resource overheads required by fault tolerant schemes. Recently, error mitigation has been successfully applied to reduce noise in near-term applications. In this work, however, we identify strong limitations to the degree to which quantum noise can be effectively `undone' for larger system sizes. Our framework rigorously captures large classes of error mitigation schemes in use today. By relating error mitigation to a statistical inference problem, we show that even at shallow circuit depths comparable to the current experiments, a superpolynomial number of samples is needed in the worst case to estimate the expectation values of noiseless observables, the principal task of error mitigation. Notably, our construction implies that scrambling due to noise can kick in at exponentially smaller depths than previously thought. They also impact other near-term applications, constraining kernel estimation in quantum machine learning, causing an earlier emergence of noise-induced barren plateaus in variational quantum algorithms and ruling out exponential quantum speed-ups in estimating expectation values in the presence of noise or preparing the ground state of a Hamiltonian.
△ Less
Submitted 29 March, 2024; v1 submitted 20 October, 2022;
originally announced October 2022.
-
Perturbative gadgets for gate-based quantum computing: Non-recursive constructions without subspace restrictions
Authors:
Simon Cichy,
Paul K. Faehrmann,
Sumeet Khatri,
Jens Eisert
Abstract:
Perturbative gadgets are a tool to encode part of a Hamiltonian, usually the low-energy subspace, into a different Hamiltonian with favorable properties, for instance, reduced locality. Many constructions of perturbative gadgets have been proposed over the years. Still, all of them are restricted in some ways: Either they apply to some specific classes of Hamiltonians, they involve recursion to re…
▽ More
Perturbative gadgets are a tool to encode part of a Hamiltonian, usually the low-energy subspace, into a different Hamiltonian with favorable properties, for instance, reduced locality. Many constructions of perturbative gadgets have been proposed over the years. Still, all of them are restricted in some ways: Either they apply to some specific classes of Hamiltonians, they involve recursion to reduce locality, or they are limited to studying time evolution under the gadget Hamiltonian, e.g., in the context of adiabatic quantum computing, and thus involve subspace restrictions. In this work, we fill the gap by introducing a versatile universal, non-recursive, non-adiabatic perturbative gadget construction without subspace restrictions, that encodes an arbitrary many-body Hamiltonian into the low-energy subspace of a three-body Hamiltonian and is therefore applicable to gate-based quantum computing. Our construction requires $rk$ additional qubits for a $k$-body Hamiltonian comprising $r$ terms. Besides a specific gadget construction, we also provide a recipe for constructing similar gadgets, which can be tailored to different properties, which we discuss.
△ Less
Submitted 27 August, 2024; v1 submitted 6 October, 2022;
originally announced October 2022.
-
On the design and analysis of near-term quantum network protocols using Markov decision processes
Authors:
Sumeet Khatri
Abstract:
The quantum internet is one of the frontiers of quantum information science research. It will revolutionize the way we communicate and do other tasks, and it will allow for tasks that are not possible using the current, classical internet. The backbone of a quantum internet is entanglement distributed globally in order to allow for such novel applications to be performed over long distances. Exper…
▽ More
The quantum internet is one of the frontiers of quantum information science research. It will revolutionize the way we communicate and do other tasks, and it will allow for tasks that are not possible using the current, classical internet. The backbone of a quantum internet is entanglement distributed globally in order to allow for such novel applications to be performed over long distances. Experimental progress is currently being made to realize quantum networks on a small scale, but much theoretical work is still needed in order to understand how best to distribute entanglement, especially with the limitations of near-term quantum technologies taken into account. This work provides an initial step towards this goal. In this work, we lay out a theory of near-term quantum networks based on Markov decision processes (MDPs), and we show that MDPs provide a precise and systematic mathematical framework to model protocols for near-term quantum networks that is agnostic to the specific implementation platform. We start by simplifying the MDP for elementary links introduced in prior work, and by providing new results on policies for elementary links. In particular, we show that the well-known memory-cutoff policy is optimal. Then we show how the elementary link MDP can be used to analyze a quantum network protocol in which we wait for all elementary links to be active before creating end-to-end links. We then provide an extension of the MDP formalism to two elementary links, which is useful for analyzing more sophisticated quantum network protocols. Here, as new results, we derive linear programs that give us optimal steady-state policies with respect to the expected fidelity and waiting time of the end-to-end link.
△ Less
Submitted 16 November, 2023; v1 submitted 7 July, 2022;
originally announced July 2022.
-
A Novel ASIC Design Flow using Weight-Tunable Binary Neurons as Standard Cells
Authors:
Ankit Wagle,
Gian Singh,
Sunil Khatri,
Sarma Vrudhula
Abstract:
In this paper, we describe a design of a mixed signal circuit for a binary neuron (a.k.a perceptron, threshold logic gate) and a methodology for automatically embedding such cells in ASICs. The binary neuron, referred to as an FTL (flash threshold logic) uses floating gate or flash transistors whose threshold voltages serve as a proxy for the weights of the neuron. Algorithms for mapping the weigh…
▽ More
In this paper, we describe a design of a mixed signal circuit for a binary neuron (a.k.a perceptron, threshold logic gate) and a methodology for automatically embedding such cells in ASICs. The binary neuron, referred to as an FTL (flash threshold logic) uses floating gate or flash transistors whose threshold voltages serve as a proxy for the weights of the neuron. Algorithms for mapping the weights to the flash transistor threshold voltages are presented. The threshold voltages are determined to maximize both the robustness of the cell and its speed. The performance, power, and area of a single FTL cell are shown to be significantly smaller (79.4%), consume less power (61.6%), and operate faster (40.3%) compared to conventional CMOS logic equivalents. Also included are the architecture and the algorithms to program the flash devices of an FTL. The FTL cells are implemented as standard cells, and are designed to allow commercial synthesis and P&R tools to automatically use them in synthesis of ASICs. Substantial reductions in area and power without sacrificing performance are demonstrated on several ASIC benchmarks by the automatic embedding of FTL cells. The paper also demonstrates how FTL cells can be used for fixing timing errors after fabrication.
△ Less
Submitted 17 April, 2022;
originally announced April 2022.
-
CIDAN: Computing in DRAM with\\Artificial Neurons
Authors:
Gian Singh,
Ankit Wagle,
Sarma Vrudhula,
Sunil Khatri
Abstract:
Numerous applications such as graph processing, cryptography, databases, bioinformatics, etc., involve the repeated evaluation of Boolean functions on large bit vectors. In-memory architectures which perform processing in memory (PIM) are tailored for such applications. This paper describes a different architecture for in-memory computation called CIDAN, that achieves a 3X improvement in performan…
▽ More
Numerous applications such as graph processing, cryptography, databases, bioinformatics, etc., involve the repeated evaluation of Boolean functions on large bit vectors. In-memory architectures which perform processing in memory (PIM) are tailored for such applications. This paper describes a different architecture for in-memory computation called CIDAN, that achieves a 3X improvement in performance and a 2X improvement in energy for a representative set of algorithms over the state-of-the-art in-memory architectures. CIDAN uses a new basic processing element called a TLPE, which comprises a threshold logic gate (TLG) (a.k.a artificial neuron or perceptron). The implementation of a TLG within a TLPE is equivalent to a multi-input, edge-triggered flipflop that computes a subset of threshold functions of its inputs. The specific threshold function is selected on each cycle by enabling/disabling a subset of the weights associated with the threshold function, by using logic signals. In addition to the TLG, a TLPE realizes some non-threshold functions by a sequence of TLG evaluations. An equivalent CMOS implementation of a TLPE requires a substantially higher area and power. CIDAN has an array of TLPE(s) that is integrated with a DRAM, to allow fast evaluation of any one of its set of functions on large bit vectors. Results of running several common in-memory applications in graph processing and cryptography are presented.
△ Less
Submitted 30 November, 2021;
originally announced December 2021.
-
Qualities of Quality: A Tertiary Review of Software Quality Measurement Research
Authors:
Kaylea Champion,
Sejal Khatri,
Benjamin Mako Hill
Abstract:
This paper presents a tertiary review of software quality measurement research. To conduct this review, we examined an initial dataset of 7,811 articles and found 75 relevant and high-quality secondary analyses of software quality research. Synthesizing this body of work, we offer an overview of perspectives, measurement approaches, and trends. We identify five distinct perspectives that conceptua…
▽ More
This paper presents a tertiary review of software quality measurement research. To conduct this review, we examined an initial dataset of 7,811 articles and found 75 relevant and high-quality secondary analyses of software quality research. Synthesizing this body of work, we offer an overview of perspectives, measurement approaches, and trends. We identify five distinct perspectives that conceptualize quality as heuristic, as maintainability, as a holistic concept, as structural features of software, and as dependability. We also identify three key challenges. First, we find widespread evidence of validity questions with common measures. Second, we observe the application of machine learning methods without adequate evaluation. Third, we observe the use of aging datasets. Finally, from these observations, we sketch a path toward a theoretical framework that will allow software engineering researchers to systematically confront these weaknesses while remaining grounded in the experiences of developers and the real world in which code is ultimately deployed.
△ Less
Submitted 28 July, 2021;
originally announced July 2021.
-
A Configurable BNN ASIC using a Network of Programmable Threshold Logic Standard Cells
Authors:
Ankit Wagle,
Sunil Khatri,
Sarma Vrudhula
Abstract:
This paper presents TULIP, a new architecture for a binary neural network (BNN) that uses an optimal schedule for executing the operations of an arbitrary BNN. It was constructed with the goal of maximizing energy efficiency per classification. At the top-level, TULIP consists of a collection of unique processing elements (TULIP-PEs) that are organized in a SIMD fashion. Each TULIP-PE consists of…
▽ More
This paper presents TULIP, a new architecture for a binary neural network (BNN) that uses an optimal schedule for executing the operations of an arbitrary BNN. It was constructed with the goal of maximizing energy efficiency per classification. At the top-level, TULIP consists of a collection of unique processing elements (TULIP-PEs) that are organized in a SIMD fashion. Each TULIP-PE consists of a small network of binary neurons, and a small amount of local memory per neuron. The unique aspect of the binary neuron is that it is implemented as a mixed-signal circuit that natively performs the inner-product and thresholding operation of an artificial binary neuron. Moreover, the binary neuron, which is implemented as a single CMOS standard cell, is reconfigurable, and with a change in a single parameter, can implement all standard operations involved in a BNN. We present novel algorithms for mapping arbitrary nodes of a BNN onto the TULIP-PEs. TULIP was implemented as an ASIC in TSMC 40nm-LP technology. To provide a fair comparison, a recently reported BNN that employs a conventional MAC-based arithmetic processor was also implemented in the same technology. The results show that TULIP is consistently 3X more energy-efficient than the conventional design, without any penalty in performance, area, or accuracy.
△ Less
Submitted 4 April, 2021;
originally announced April 2021.
-
Principles of Quantum Communication Theory: A Modern Approach
Authors:
Sumeet Khatri,
Mark M. Wilde
Abstract:
This is a preliminary version of a book in progress on the theory of quantum communication. We adopt an information-theoretic perspective throughout and give a comprehensive account of fundamental results in quantum communication theory from the past decade (and earlier), with an emphasis on the modern one-shot-to-asymptotic approach that underlies much of today's state-of-the-art research in this…
▽ More
This is a preliminary version of a book in progress on the theory of quantum communication. We adopt an information-theoretic perspective throughout and give a comprehensive account of fundamental results in quantum communication theory from the past decade (and earlier), with an emphasis on the modern one-shot-to-asymptotic approach that underlies much of today's state-of-the-art research in this field. In Part I, we cover mathematical preliminaries and provide a detailed study of quantum mechanics from an information-theoretic perspective. We also provide an extensive and thorough review of quantum entropies, and we devote an entire chapter to the study of entanglement measures. Equipped with these essential tools, in Part II we study classical communication (with and without entanglement assistance), entanglement distillation, quantum communication, secret key distillation, and private communication. In Part III, we cover the latest developments in feedback-assisted communication tasks, such as quantum and classical feedback-assisted communication, LOCC-assisted quantum communication, and secret key agreement.
△ Less
Submitted 11 February, 2024; v1 submitted 9 November, 2020;
originally announced November 2020.
-
Bounding the forward classical capacity of bipartite quantum channels
Authors:
Dawei Ding,
Sumeet Khatri,
Yihui Quek,
Peter W. Shor,
Xin Wang,
Mark M. Wilde
Abstract:
We introduce various measures of forward classical communication for bipartite quantum channels. Since a point-to-point channel is a special case of a bipartite channel, the measures reduce to measures of classical communication for point-to-point channels. As it turns out, these reduced measures have been reported in prior work of Wang et al. on bounding the classical capacity of a quantum channe…
▽ More
We introduce various measures of forward classical communication for bipartite quantum channels. Since a point-to-point channel is a special case of a bipartite channel, the measures reduce to measures of classical communication for point-to-point channels. As it turns out, these reduced measures have been reported in prior work of Wang et al. on bounding the classical capacity of a quantum channel. As applications, we show that the measures are upper bounds on the forward classical capacity of a bipartite channel. The reduced measures are upper bounds on the classical capacity of a point-to-point quantum channel assisted by a classical feedback channel. Some of the various measures can be computed by semi-definite programming.
△ Less
Submitted 6 January, 2023; v1 submitted 2 October, 2020;
originally announced October 2020.
-
Policies for elementary links in a quantum network
Authors:
Sumeet Khatri
Abstract:
Distributing entanglement over long distances is one of the central tasks in quantum networks. An important problem, especially for near-term quantum networks, is to develop optimal entanglement distribution protocols that take into account the limitations of current and near-term hardware, such as quantum memories with limited coherence time. We address this problem by initiating the study of qua…
▽ More
Distributing entanglement over long distances is one of the central tasks in quantum networks. An important problem, especially for near-term quantum networks, is to develop optimal entanglement distribution protocols that take into account the limitations of current and near-term hardware, such as quantum memories with limited coherence time. We address this problem by initiating the study of quantum network protocols for entanglement distribution using the theory of decision processes, such that optimal protocols (referred to as policies in the context of decision processes) can be found using dynamic programming or reinforcement learning algorithms. As a first step, in this work we focus exclusively on the elementary link level. We start by defining a quantum decision process for elementary links, along with figures of merit for evaluating policies. We then provide two algorithms for determining policies, one of which we prove to be optimal (with respect to fidelity and success probability) among all policies. Then we show that the previously-studied memory-cutoff protocol can be phrased as a policy within our decision process framework, allowing us to obtain several new fundamental results about it. The conceptual developments and results of this work pave the way for the systematic study of the fundamental limitations of near-term quantum networks, and the requirements for physically realizing them.
△ Less
Submitted 3 September, 2021; v1 submitted 7 July, 2020;
originally announced July 2020.
-
Plasmonic random laser on an optical fiber tip
Authors:
Dipendra S. Khatri,
Ying Li,
Jiyang Chen,
Anna Elizabeth Stocks,
Elyahb Allie Kwizera,
Xiaohua Huang,
Christos Argyropoulos,
Thang Hoang
Abstract:
Random lasing occurs as the result of a coherent optical feedback from multiple scattering centers. Here, we demonstrate that plasmonic gold nanostars are efficient light scattering centers, exhibiting strong field enhancement at their nanotips, which assists a very narrow bandwidth and highly amplified coherent random lasing with a low lasing threshold. First, by embedding plasmonic gold nanostar…
▽ More
Random lasing occurs as the result of a coherent optical feedback from multiple scattering centers. Here, we demonstrate that plasmonic gold nanostars are efficient light scattering centers, exhibiting strong field enhancement at their nanotips, which assists a very narrow bandwidth and highly amplified coherent random lasing with a low lasing threshold. First, by embedding plasmonic gold nanostars in a rhodamine 6G dye gain medium, we observe a series of very narrow random lasing peaks with full-width at half-maximum ~ 0.8 nm. In contrast, free rhodamine 6G dye molecules exhibit only a single amplified spontaneous emission peak with a broader linewidth of 6 nm. The lasing threshold for the dye with gold nanostars is two times lower than that for a free dye. Furthermore, by coating the tip of a single-mode optical fiber with gold nanostars, we demonstrate a collection of random lasing signal through the fiber that can be easily guided and analyzed. Time-resolved measurements show a significant increase in the emission rate above the lasing threshold, indicating a stimulated emission process. Our study provides a method for generating random lasing in the nanoscale with low threshold values that can be easily collected and guided, which promise a range of potential applications in remote sensing, information processing, and on-chip coherent light sources.
△ Less
Submitted 26 February, 2020;
originally announced February 2020.
-
From genotypes to organisms: State-of-the-art and perspectives of a cornerstone in evolutionary dynamics
Authors:
Susanna Manrubia,
José A. Cuesta,
Jacobo Aguirre,
Sebastian E. Ahnert,
Lee Altenberg,
Alejandro V. Cano,
Pablo Catalán,
Ramon Diaz-Uriarte,
Santiago F. Elena,
Juan Antonio García-Martín,
Paulien Hogeweg,
Bhavin S. Khatri,
Joachim Krug,
Ard A. Louis,
Nora S. Martin,
Joshua L. Payne,
Matthew J. Tarnowski,
Marcel Weiß
Abstract:
Understanding how genotypes map onto phenotypes, fitness, and eventually organisms is arguably the next major missing piece in a fully predictive theory of evolution. We refer to this generally as the problem of the genotype-phenotype map. Though we are still far from achieving a complete picture of these relationships, our current understanding of simpler questions, such as the structure induced…
▽ More
Understanding how genotypes map onto phenotypes, fitness, and eventually organisms is arguably the next major missing piece in a fully predictive theory of evolution. We refer to this generally as the problem of the genotype-phenotype map. Though we are still far from achieving a complete picture of these relationships, our current understanding of simpler questions, such as the structure induced in the space of genotypes by sequences mapped to molecular structures, has revealed important facts that deeply affect the dynamical description of evolutionary processes. Empirical evidence supporting the fundamental relevance of features such as phenotypic bias is mounting as well, while the synthesis of conceptual and experimental progress leads to questioning current assumptions on the nature of evolutionary dynamics-cancer progression models or synthetic biology approaches being notable examples. This work delves into a critical and constructive attitude in our current knowledge of how genotypes map onto molecular phenotypes and organismal functions, and discusses theoretical and empirical avenues to broaden and improve this comprehension. As a final goal, this community should aim at deriving an updated picture of evolutionary processes soundly relying on the structural properties of genotype spaces, as revealed by modern techniques of molecular and functional analysis.
△ Less
Submitted 17 March, 2021; v1 submitted 2 February, 2020;
originally announced February 2020.
-
Spooky action at a global distance: analysis of space-based entanglement distribution for the quantum internet
Authors:
Sumeet Khatri,
Anthony J. Brady,
Renée A. Desporte,
Manon P. Bart,
Jonathan P. Dowling
Abstract:
Recent experimental breakthroughs in satellite quantum communications have opened up the possibility of creating a global quantum internet using satellite links. This approach appears to be particularly viable in the near term, due to the lower attenuation of optical signals from satellite to ground, and due to the currently short coherence times of quantum memories. The latter prevents ground-bas…
▽ More
Recent experimental breakthroughs in satellite quantum communications have opened up the possibility of creating a global quantum internet using satellite links. This approach appears to be particularly viable in the near term, due to the lower attenuation of optical signals from satellite to ground, and due to the currently short coherence times of quantum memories. The latter prevents ground-based entanglement distribution using atmospheric or optical-fiber links at high rates over long distances. In this work, we propose a global-scale quantum internet consisting of a constellation of orbiting satellites that provides a continuous, on-demand entanglement distribution service to ground stations. The satellites can also function as untrusted nodes for the purpose of long-distance quantum-key distribution. We develop a technique for determining optimal satellite configurations with continuous coverage that balances both the total number of satellites and entanglement-distribution rates. Using this technique, we determine various optimal satellite configurations for a polar-orbit constellation, and we analyze the resulting satellite-to-ground loss and achievable entanglement-distribution rates for multiple ground station configurations. We also provide a comparison between these entanglement-distribution rates and the rates of ground-based quantum repeater schemes. Overall, our work provides the theoretical tools and the experimental guidance needed to make a satellite-based global quantum internet a reality.
△ Less
Submitted 11 January, 2021; v1 submitted 13 December, 2019;
originally announced December 2019.
-
Threshold Logic in a Flash
Authors:
Ankit Wagle,
Gian Singh,
Jinghua Yang,
Sunil Khatri,
Sarma Vrudhula
Abstract:
This paper describes a novel design of a threshold logic gate (a binary perceptron) and its implementation as a standard cell. This new cell structure, referred to as flash threshold logic (FTL), uses floating gate (flash) transistors to realize the weights associated with a threshold function. The threshold voltages of the flash transistors serve as a proxy for the weights. An FTL cell can be equ…
▽ More
This paper describes a novel design of a threshold logic gate (a binary perceptron) and its implementation as a standard cell. This new cell structure, referred to as flash threshold logic (FTL), uses floating gate (flash) transistors to realize the weights associated with a threshold function. The threshold voltages of the flash transistors serve as a proxy for the weights. An FTL cell can be equivalently viewed as a multi-input, edge-triggered flipflop which computes a threshold function on a clock edge. Consequently, it can be used in the automatic synthesis of ASICs. The use of flash transistors in the FTL cell allows programming of the weights after fabrication, thereby preventing discovery of its function by a foundry or by reverse engineering. This paper focuses on the design and characteristics of the FTL cell. We present a novel method for programming the weights of an FTL cell for a specified threshold function using a modified perceptron learning algorithm. The algorithm is further extended to select weights to maximize the robustness of the design in the presence of process variations. The FTL circuit was designed in 40nm technology and simulations with layout-extracted parasitics included, demonstrate significant improvements in the area (79.7%), power (61.1%), and performance (42.5%) when compared to the equivalent implementations of the same function in conventional static CMOS design. Weight selection targeting robustness is demonstrated using Monte Carlo simulations. The paper also shows how FTL cells can be used for fixing timing errors after fabrication.
△ Less
Submitted 10 October, 2019;
originally announced October 2019.
-
Second-order coding rates for key distillation in quantum key distribution
Authors:
Sumeet Khatri,
Eneet Kaur,
Saikat Guha,
Mark M. Wilde
Abstract:
The security of quantum key distribution has traditionally been analyzed in either the asymptotic or non-asymptotic regimes. In this paper, we provide a bridge between these two regimes, by determining second-order coding rates for key distillation in quantum key distribution under collective attacks. Our main result is a formula that characterizes the backoff from the known asymptotic formula for…
▽ More
The security of quantum key distribution has traditionally been analyzed in either the asymptotic or non-asymptotic regimes. In this paper, we provide a bridge between these two regimes, by determining second-order coding rates for key distillation in quantum key distribution under collective attacks. Our main result is a formula that characterizes the backoff from the known asymptotic formula for key distillation -- our formula incorporates the reliability and security of the protocol, as well as the mutual information variances to the legitimate receiver and the eavesdropper. In order to determine secure key rates against collective attacks, one should perform a joint optimization of the Holevo information and the Holevo information variance to the eavesdropper. We show how to do so by analyzing several examples, including the six-state, BB84, and continuous-variable quantum key distribution protocols (the last involving Gaussian modulation of coherent states along with heterodyne detection). The technical contributions of this paper include one-shot and second-order analyses of private communication over a compound quantum wiretap channel with fixed marginal and key distillation over a compound quantum wiretap source with fixed marginal. We also establish the second-order asymptotics of the smooth max-relative entropy of quantum states acting on a separable Hilbert space, and we derive a formula for the Holevo information variance of a Gaussian ensemble of Gaussian states.
△ Less
Submitted 26 July, 2021; v1 submitted 9 October, 2019;
originally announced October 2019.
-
Noise Resilience of Variational Quantum Compiling
Authors:
Kunal Sharma,
Sumeet Khatri,
M. Cerezo,
Patrick J. Coles
Abstract:
Variational hybrid quantum-classical algorithms (VHQCAs) are near-term algorithms that leverage classical optimization to minimize a cost function, which is efficiently evaluated on a quantum computer. Recently VHQCAs have been proposed for quantum compiling, where a target unitary $U$ is compiled into a short-depth gate sequence $V$. In this work, we report on a surprising form of noise resilienc…
▽ More
Variational hybrid quantum-classical algorithms (VHQCAs) are near-term algorithms that leverage classical optimization to minimize a cost function, which is efficiently evaluated on a quantum computer. Recently VHQCAs have been proposed for quantum compiling, where a target unitary $U$ is compiled into a short-depth gate sequence $V$. In this work, we report on a surprising form of noise resilience for these algorithms. Namely, we find one often learns the correct gate sequence $V$ (i.e., the correct variational parameters) despite various sources of incoherent noise acting during the cost-evaluation circuit. Our main results are rigorous theorems stating that the optimal variational parameters are unaffected by a broad class of noise models, such as measurement noise, gate noise, and Pauli channel noise. Furthermore, our numerical implementations on IBM's noisy simulator demonstrate resilience when compiling the quantum Fourier transform, Toffoli gate, and W-state preparation. Hence, variational quantum compiling, due to its robustness, could be practically useful for noisy intermediate-scale quantum devices. Finally, we speculate that this noise resilience may be a general phenomenon that applies to other VHQCAs such as the variational quantum eigensolver.
△ Less
Submitted 3 April, 2020; v1 submitted 12 August, 2019;
originally announced August 2019.
-
Retention of rising droplets in density stratification
Authors:
Tracy Mandel,
De Zhen Zhou,
Lindsay Waldrop,
Maxime Theillard,
Dustin Kleckner,
Shilpa Khatri
Abstract:
In this study, we present results from experiments on the retention of single oil droplets rising through a two-layer density stratification. These experiments confirm the significant slowdown observed in past literature of settling and rising particles and droplets in stratification, and are the first experiments to study single liquid droplets as opposed to solid particles. By tracking the motio…
▽ More
In this study, we present results from experiments on the retention of single oil droplets rising through a two-layer density stratification. These experiments confirm the significant slowdown observed in past literature of settling and rising particles and droplets in stratification, and are the first experiments to study single liquid droplets as opposed to solid particles. By tracking the motion of the droplets as they rise through a stratified fluid, we identify two timescales which quantitatively describe this slowdown: an entrainment timescale, and a retention timescale. The entrainment timescale is a measure of the time that a droplet spends below its upper-layer terminal velocity and relates to the length of time over which the droplet's rise is affected by entrained dense fluid. The retention time is a measure of the time that the droplet is delayed from reaching an upper threshold far from the density transition. Both timescales are found to depend on the Froude and Reynolds numbers of the system, Fr $=U_u/(Nd)$ and Re $=ρ_u U_u d/ν$. We find that both timescales are only significantly large for Fr $\lesssim1$, indicating that trapping dynamics in a relatively sharp stratification arise from a balance between drop inertia and buoyancy. Finally, we present a theoretical formulation for the drag enhancement $Γ$, the ratio between the maximum stratification force and the corresponding drag force on the droplet, based on a simple force balance at the point of the velocity minimum. Using our experimental data, we find that our formulation compares well with recent theoretical and computational work by Zhang et al. [J. Fluid Mech. 875, 622-656 (2019)] on the drag enhancement on a solid sphere settling in a stratified fluid, and provides the first experimental data supporting their approach.
△ Less
Submitted 24 March, 2020; v1 submitted 9 July, 2019;
originally announced July 2019.
-
Practical figures of merit and thresholds for entanglement distribution in quantum networks
Authors:
Sumeet Khatri,
Corey T. Matyas,
Aliza U. Siddiqui,
Jonathan P. Dowling
Abstract:
Before global-scale quantum networks become operational, it is important to consider how to evaluate their performance so that they can be built to achieve the desired performance. We propose two practical figures of merit for the performance of a quantum network: the average connection time and the average largest entanglement cluster size. These quantities are based on the generation of elementa…
▽ More
Before global-scale quantum networks become operational, it is important to consider how to evaluate their performance so that they can be built to achieve the desired performance. We propose two practical figures of merit for the performance of a quantum network: the average connection time and the average largest entanglement cluster size. These quantities are based on the generation of elementary links in a quantum network, which is a crucial initial requirement that must be met before any long-range entanglement distribution can be achieved and is inherently probabilistic with current implementations. We obtain bounds on these figures of merit for a particular class of quantum repeater protocols consisting of repeat-until-success elementary link generation followed by joining measurements at intermediate nodes that extend the entanglement range. Our results lead to requirements on quantum memory coherence times, requirements on repeater chain lengths in order to surpass the repeaterless rate limit, and requirements on other aspects of quantum network implementations. These requirements are based solely on the inherently probabilistic nature of elementary link generation in quantum networks, and they apply to networks with arbitrary topology.
△ Less
Submitted 28 September, 2019; v1 submitted 16 May, 2019;
originally announced May 2019.
-
Extendibility of bosonic Gaussian states
Authors:
Ludovico Lami,
Sumeet Khatri,
Gerardo Adesso,
Mark M. Wilde
Abstract:
Extendibility of bosonic Gaussian states is a key issue in continuous-variable quantum information. We show that a bosonic Gaussian state is $k$-extendible if and only if it has a Gaussian $k$-extension, and we derive a simple semidefinite program, whose size scales linearly with the number of local modes, to efficiently decide $k$-extendibility of any given bosonic Gaussian state. When the system…
▽ More
Extendibility of bosonic Gaussian states is a key issue in continuous-variable quantum information. We show that a bosonic Gaussian state is $k$-extendible if and only if it has a Gaussian $k$-extension, and we derive a simple semidefinite program, whose size scales linearly with the number of local modes, to efficiently decide $k$-extendibility of any given bosonic Gaussian state. When the system to be extended comprises one mode only, we provide a closed-form solution. Implications of these results for the steerability of quantum states and for the extendibility of bosonic Gaussian channels are discussed. We then derive upper bounds on the distance of a $k$-extendible bosonic Gaussian state to the set of all separable states, in terms of trace norm and Rényi relative entropies. These bounds, which can be seen as "Gaussian de Finetti theorems," exhibit a universal scaling in the total number of modes, independently of the mean energy of the state. Finally, we establish an upper bound on the entanglement of formation of Gaussian $k$-extendible states, which has no analogue in the finite-dimensional setting.
△ Less
Submitted 10 August, 2019; v1 submitted 4 April, 2019;
originally announced April 2019.
-
Information-theoretic aspects of the generalized amplitude damping channel
Authors:
Sumeet Khatri,
Kunal Sharma,
Mark M. Wilde
Abstract:
The generalized amplitude damping channel (GADC) is one of the sources of noise in superconducting-circuit-based quantum computing. It can be viewed as the qubit analogue of the bosonic thermal channel, and it thus can be used to model lossy processes in the presence of background noise for low-temperature systems. In this work, we provide an information-theoretic study of the GADC. We first deter…
▽ More
The generalized amplitude damping channel (GADC) is one of the sources of noise in superconducting-circuit-based quantum computing. It can be viewed as the qubit analogue of the bosonic thermal channel, and it thus can be used to model lossy processes in the presence of background noise for low-temperature systems. In this work, we provide an information-theoretic study of the GADC. We first determine the parameter range for which the GADC is entanglement breaking and the range for which it is anti-degradable. We then establish several upper bounds on its classical, quantum, and private capacities. These bounds are based on data-processing inequalities and the uniform continuity of information-theoretic quantities, as well as other techniques. Our upper bounds on the quantum capacity of the GADC are tighter than the known upper bound reported recently in [Rosati et al., Nat. Commun. 9, 4339 (2018)] for the entire parameter range of the GADC, thus reducing the gap between the lower and upper bounds. We also establish upper bounds on the two-way assisted quantum and private capacities of the GADC. These bounds are based on the squashed entanglement, and they are established by constructing particular squashing channels. We compare these bounds with the max-Rains information bound, the mutual information bound, and another bound based on approximate covariance. For all capacities considered, we find that a large variety of techniques are useful in establishing bounds.
△ Less
Submitted 8 July, 2020; v1 submitted 18 March, 2019;
originally announced March 2019.
-
Asymptotic approximations for the close evaluation of double-layer potentials
Authors:
Camille Carvalho,
Shilpa Khatri,
Arnold D. Kim
Abstract:
When using the boundary integral equation method to solve a boundary value problem, the evaluation of the solution near the boundary is challenging to compute because the layer potentials that represent the solution are nearly-singular integrals. To address this close evaluation problem, we apply an asymptotic analysis of these nearly singular integrals and obtain an asymptotic approximation. We d…
▽ More
When using the boundary integral equation method to solve a boundary value problem, the evaluation of the solution near the boundary is challenging to compute because the layer potentials that represent the solution are nearly-singular integrals. To address this close evaluation problem, we apply an asymptotic analysis of these nearly singular integrals and obtain an asymptotic approximation. We derive the asymptotic approximation for the case of the double-layer potential in two and three dimensions, representing the solution of the interior Dirichlet problem for Laplace's equation. By doing so, we obtain an asymptotic approximation given by the Dirichlet data at the boundary point nearest to the interior evaluation point plus a nonlocal correction. We present numerical methods to compute this asymptotic approximation, and we demonstrate the efficiency and accuracy of the asymptotic approximation through several examples. These examples show that the asymptotic approximation is useful as it accurately approximates the close evaluation of the double-layer potential while requiring only modest computational resources.
△ Less
Submitted 4 October, 2018;
originally announced October 2018.
-
Close evaluation of layer potentials in three dimensions
Authors:
S. Khatri,
A. D. Kim,
Ricado Cortez,
Camille Carvalho
Abstract:
We present a simple and effective method for evaluating double-and single-layer potentials for Laplace's equation in three dimensions close to the boundary. The close evaluation of these layer potentials is challenging because they are nearly singular integrals. The method we propose is based on writing these layer potentials in spherical coordinates where the point at which their kernels are peak…
▽ More
We present a simple and effective method for evaluating double-and single-layer potentials for Laplace's equation in three dimensions close to the boundary. The close evaluation of these layer potentials is challenging because they are nearly singular integrals. The method we propose is based on writing these layer potentials in spherical coordinates where the point at which their kernels are peaked maps to the north pole. An N-point Gauss-Legendre quadrature rule is used for integration with respect to the the polar angle rather than the cosine of the polar angle. A 2N-point periodic trapezoid rule is used to compute the integral with respect to the azimuthal angle which acts as a natural and effective averaging operation in this coordinate system. The numerical method resulting from combining these two quadrature rules in this rotated coordinate system yields results that are consistent with asymptotic behaviors of the double- and single-layer potentials at close evaluation distances. In particular, we show that the error in computing the double-layer potential, after applying a subtraction method, is quadratic with respect to the evaluation distance from the boundary, and the error is linear for the single-layer potential. We improve upon the single-layer potential by introducing an alternate approximation based on a perturbation expansion and obtain an error that is quadratic with respect to the evaluation distance from the boundary.
△ Less
Submitted 24 August, 2020; v1 submitted 6 July, 2018;
originally announced July 2018.
-
Quantum-assisted quantum compiling
Authors:
Sumeet Khatri,
Ryan LaRose,
Alexander Poremba,
Lukasz Cincio,
Andrew T. Sornborger,
Patrick J. Coles
Abstract:
Compiling quantum algorithms for near-term quantum computers (accounting for connectivity and native gate alphabets) is a major challenge that has received significant attention both by industry and academia. Avoiding the exponential overhead of classical simulation of quantum dynamics will allow compilation of larger algorithms, and a strategy for this is to evaluate an algorithm's cost on a quan…
▽ More
Compiling quantum algorithms for near-term quantum computers (accounting for connectivity and native gate alphabets) is a major challenge that has received significant attention both by industry and academia. Avoiding the exponential overhead of classical simulation of quantum dynamics will allow compilation of larger algorithms, and a strategy for this is to evaluate an algorithm's cost on a quantum computer. To this end, we propose a variational hybrid quantum-classical algorithm called quantum-assisted quantum compiling (QAQC). In QAQC, we use the overlap between a target unitary $U$ and a trainable unitary $V$ as the cost function to be evaluated on the quantum computer. More precisely, to ensure that QAQC scales well with problem size, our cost involves not only the global overlap ${\rm Tr} (V^\dagger U)$ but also the local overlaps with respect to individual qubits. We introduce novel short-depth quantum circuits to quantify the terms in our cost function, and we prove that our cost cannot be efficiently approximated with a classical algorithm under reasonable complexity assumptions. We present both gradient-free and gradient-based approaches to minimizing this cost. As a demonstration of QAQC, we compile various one-qubit gates on IBM's and Rigetti's quantum computers into their respective native gate alphabets. Furthermore, we successfully simulate QAQC up to a problem size of 9 qubits, and these simulations highlight both the scalability of our cost function as well as the noise resilience of QAQC. Future applications of QAQC include algorithm depth compression, black-box compiling, noise mitigation, and benchmarking.
△ Less
Submitted 7 May, 2019; v1 submitted 2 July, 2018;
originally announced July 2018.
-
Efficacy of Object-Based Passwords for User Authentication
Authors:
Sufian Hameed,
Lamak Qaizar,
Shankar Khatri
Abstract:
Traditional text-based password schemes are inherently weak. Users tend to choose passwords that are easy to remember, making them susceptible to various attacks that have matured over the years. ObPwd [5] has tried to address these issues by converting user-selected digital objects to high-entropy text passwords for user authentication.
In this paper, we extend the ObPwd scheme with a new objec…
▽ More
Traditional text-based password schemes are inherently weak. Users tend to choose passwords that are easy to remember, making them susceptible to various attacks that have matured over the years. ObPwd [5] has tried to address these issues by converting user-selected digital objects to high-entropy text passwords for user authentication.
In this paper, we extend the ObPwd scheme with a new object based password scheme that performs majority of the computation at the server side. This paper essentially discusses two frameworks for object password schemes, an object hash-based scheme (where the client machine computes the hash of the object to be used as text password) and an object-based scheme (where the object is directly transmitted to the server as password). We also evaluate the performance of both the object password schemes against conventional text-based password schemes using prototypes of each of the frameworks. Implications with respect to ease of use, sharing and security are also discussed.
△ Less
Submitted 23 December, 2017; v1 submitted 30 November, 2017;
originally announced November 2017.
-
Robust quantum network architectures and topologies for entanglement distribution
Authors:
Siddhartha Das,
Sumeet Khatri,
Jonathan P. Dowling
Abstract:
Entanglement distribution is a prerequisite for several important quantum information processing and computing tasks, such as quantum teleportation, quantum key distribution, and distributed quantum computing. In this work, we focus on two-dimensional quantum networks based on optical quantum technologies using dual-rail photonic qubits for the building of a fail-safe quantum internet. We lay out…
▽ More
Entanglement distribution is a prerequisite for several important quantum information processing and computing tasks, such as quantum teleportation, quantum key distribution, and distributed quantum computing. In this work, we focus on two-dimensional quantum networks based on optical quantum technologies using dual-rail photonic qubits for the building of a fail-safe quantum internet. We lay out a quantum network architecture for entanglement distribution between distant parties using a Bravais lattice topology, with the technological constraint that quantum repeaters equipped with quantum memories are not easily accessible. We provide a robust protocol for simultaneous entanglement distribution between two distant groups of parties on this network. We also discuss a memory-based quantum network architecture that can be implemented on networks with an arbitrary topology. We examine networks with bow-tie lattice and Archimedean lattice topologies and use percolation theory to quantify the robustness of the networks. In particular, we provide figures of merit on the loss parameter of the optical medium that depend only on the topology of the network and quantify the robustness of the network against intermittent photon loss and intermittent failure of nodes. These figures of merit can be used to compare the robustness of different network topologies in order to determine the best topology in a given real-world scenario, which is critical in the realization of the quantum internet.
△ Less
Submitted 31 January, 2018; v1 submitted 21 September, 2017;
originally announced September 2017.
-
Under the sea: Pulsing corals in ambient flow
Authors:
Nicholas A. Battista,
Julia E. Samson,
Shilpa Khatri,
Laura A. Miller
Abstract:
While many organisms filter feed and exchange heat or nutrients in flow, few benthic organisms also actively pulse to enhance feeding and exchange. One example is the pulsing soft coral (Heteroxenia fuscescens). Pulsing corals live in colonies, where each polyp actively pulses through contraction and relaxation of their tentacles. The pulses are typically out of phase and without a clear pattern.…
▽ More
While many organisms filter feed and exchange heat or nutrients in flow, few benthic organisms also actively pulse to enhance feeding and exchange. One example is the pulsing soft coral (Heteroxenia fuscescens). Pulsing corals live in colonies, where each polyp actively pulses through contraction and relaxation of their tentacles. The pulses are typically out of phase and without a clear pattern. These corals live in lagoons and bays found in the Red Sea and Indian Ocean where they at times experience strong ambient flows. In this paper, $3D$ fluid-structure interaction simulations are used to quantify the effects of ambient flow on the exchange currents produced by the active contraction of pulsing corals. We find a complex interaction between the flows produced by the coral and the background flow. The dynamics can either enhance or reduce the upward jet generated in a quiescent medium. The pulsing behavior also slows the average horizontal flow near the polyp when there is a strong background flow. The dynamics of these flows have implications for particle capture and nutrient exchange.
△ Less
Submitted 15 September, 2017;
originally announced September 2017.
-
Pulsing corals: A story of scale and mixing
Authors:
Julia E. Samson,
Nicholas A. Battista,
Shilpa Khatri,
Laura A. Miller
Abstract:
Effective methods of fluid transport vary across scale. A commonly used dimensionless number for quantifying the effective scale of fluid transport is the Reynolds number, Re, which gives the ratio of inertial to viscous forces. What may work well for one Re regime may not produce significant flows for another. These differences in scale have implications for many organisms, ranging from the mecha…
▽ More
Effective methods of fluid transport vary across scale. A commonly used dimensionless number for quantifying the effective scale of fluid transport is the Reynolds number, Re, which gives the ratio of inertial to viscous forces. What may work well for one Re regime may not produce significant flows for another. These differences in scale have implications for many organisms, ranging from the mechanics of how organisms move through their fluid environment to how hearts pump at various stages in development. Some organisms, such as soft pulsing corals, actively contract their tentacles to generate mixing currents that enhance photosynthesis. Their unique morphology and intermediate scale where both viscous and inertial forces are significant make them a unique model organism for understanding fluid mixing. In this paper, 3D fluid-structure interaction simulations of a pulsing soft coral are used to quantify fluid transport and fluid mixing across a wide range of Re. The results show that net transport is negligible for $Re<10$, and continuous upward flow is produced for $Re\geq 10$.
△ Less
Submitted 14 September, 2017;
originally announced September 2017.
-
Fundamental limits on quantum dynamics based on entropy change
Authors:
Siddhartha Das,
Sumeet Khatri,
George Siopsis,
Mark M. Wilde
Abstract:
It is well known in the realm of quantum mechanics and information theory that the entropy is non-decreasing for the class of unital physical processes. However, in general, the entropy does not exhibit monotonic behavior. This has restricted the use of entropy change in characterizing evolution processes. Recently, a lower bound on the entropy change was provided in the work of Buscemi, Das, and…
▽ More
It is well known in the realm of quantum mechanics and information theory that the entropy is non-decreasing for the class of unital physical processes. However, in general, the entropy does not exhibit monotonic behavior. This has restricted the use of entropy change in characterizing evolution processes. Recently, a lower bound on the entropy change was provided in the work of Buscemi, Das, and Wilde~[Phys.~Rev.~A~93(6),~062314~(2016)]. We explore the limit that this bound places on the physical evolution of a quantum system and discuss how these limits can be used as witnesses to characterize quantum dynamics. In particular, we derive a lower limit on the rate of entropy change for memoryless quantum dynamics, and we argue that it provides a witness of non-unitality. This limit on the rate of entropy change leads to definitions of several witnesses for testing memory effects in quantum dynamics. Furthermore, from the aforementioned lower bound on entropy change, we obtain a measure of non-unitarity for unital evolutions.
△ Less
Submitted 29 January, 2018; v1 submitted 20 July, 2017;
originally announced July 2017.
-
The Dependence of Halo Mass on Galaxy Size at Fixed Stellar Mass Using Weak Lensing
Authors:
Paul J. L. Charlton,
Michael J. Hudson,
Michael L. Balogh,
Sumeet Khatri
Abstract:
Stellar mass has been shown to correlate with halo mass, with non-negligible scatter. The stellar mass-size and luminosity-size relationships of galaxies also show significant scatter in galaxy size at fixed stellar mass. It is possible that, at fixed stellar mass and galaxy colour, the halo mass is correlated with galaxy size. Galaxy-galaxy lensing allows us to measure the mean masses of dark mat…
▽ More
Stellar mass has been shown to correlate with halo mass, with non-negligible scatter. The stellar mass-size and luminosity-size relationships of galaxies also show significant scatter in galaxy size at fixed stellar mass. It is possible that, at fixed stellar mass and galaxy colour, the halo mass is correlated with galaxy size. Galaxy-galaxy lensing allows us to measure the mean masses of dark matter haloes for stacked samples of galaxies. We extend the analysis of the galaxies in the CFHTLenS catalogue by fitting single Sérsic surface brightness profiles to the lens galaxies in order to recover half-light radius values, allowing us to determine halo masses for lenses according to their size. Comparing our halo masses and sizes to baselines for that stellar mass yields a differential measurement of the halo mass-galaxy size relationship at fixed stellar mass, defined as $M_{h}(M_{*}) \propto r_{\mathrm{eff}}^η(M_{*})$. We find that on average, our lens galaxies have an $η= 0.42\pm0.12$, i.e. larger galaxies live in more massive dark matter haloes. The $η$ is strongest for high mass luminous red galaxies (LRGs). Investigation of this relationship in hydrodynamical simulations suggests that, at a fixed $M_{*}$, satellite galaxies have a larger $η$ and greater scatter in the $M_{\mathrm{h}}$ and $r_{\mathrm{eff}}$ relationship compared to central galaxies.
△ Less
Submitted 16 July, 2017;
originally announced July 2017.
-
Asymptotic analysis for close evaluation of layer potentials
Authors:
Camille Carvalho,
Shilpa Khatri,
Arnold D Kim
Abstract:
We study the evaluation of layer potentials close to the domain boundary. Accurate evaluation of layer potentials near boundaries is needed in many applications, including fluid-structure interactions and near-field scattering in nano-optics. When numerically evaluating layer potentials, it is natural to use the same quadrature rule as the one used in the Nyström method to solve the underlying bou…
▽ More
We study the evaluation of layer potentials close to the domain boundary. Accurate evaluation of layer potentials near boundaries is needed in many applications, including fluid-structure interactions and near-field scattering in nano-optics. When numerically evaluating layer potentials, it is natural to use the same quadrature rule as the one used in the Nyström method to solve the underlying boundary integral equation. However, this method is problematic for evaluation points close to boundaries. For a fixed number of quadrature points, $N$, this method incurs $O(1)$ errors in a boundary layer of thickness $O(1/N)$. Using an asymptotic expansion for the kernel of the layer potential, we remove this $O(1)$ error. We demonstrate the effectiveness of this method for interior and exterior problems for Laplace's equation in two dimensions.
△ Less
Submitted 17 November, 2017; v1 submitted 31 May, 2017;
originally announced June 2017.
-
Numerical evidence for bound secrecy from two-way post-processing in quantum key distribution
Authors:
Sumeet Khatri,
Norbert Lütkenhaus
Abstract:
Bound secret information is classical information that contains secrecy but from which secrecy cannot be extracted. The existence of bound secrecy has been conjectured but is currently unproven, and in this work we provide analytical and numerical evidence for its existence. Specifically, we consider two-way post-processing protocols in prepare-and-measure quantum key distribution based on the wel…
▽ More
Bound secret information is classical information that contains secrecy but from which secrecy cannot be extracted. The existence of bound secrecy has been conjectured but is currently unproven, and in this work we provide analytical and numerical evidence for its existence. Specifically, we consider two-way post-processing protocols in prepare-and-measure quantum key distribution based on the well-known six-state signal states. In terms of the quantum bit-error rate $Q$ of the classical data, such protocols currently exist for $Q<\frac{5-\sqrt{5}}{10}\approx 27.6\%$. On the other hand, for $Q\geq\frac{1}{3}$ no such protocol can exist as the observed data is compatible with an intercept-resend attack. This leaves the interesting question of whether successful protocols exist in the interval $\frac{5-\sqrt{5}}{10}\leq Q<\frac{1}{3}$.
Previous work has shown that a necessary condition for the existence of two-way post-processing protocols for distilling secret key is breaking the symmetric extendability of the underlying quantum state shared by Alice and Bob. Using this result, it has been proven that symmetric extendability can be broken up to the $27.6\%$ lower bound using the advantage distillation protocol. In this work, we first show that to break symmetric extendability it is sufficient to consider a generalized form of advantage distillation consisting of one round of post-selection by Bob on a block of his data. We then provide evidence that such generalized protocols cannot break symmetric extendability beyond $27.6\%$. We thus have evidence to believe that $27.6\%$ is an upper bound on two-way post-processing and that the interval $\frac{5-\sqrt{5}}{10}\leq Q<\frac{1}{3}$ is a domain of bound secrecy.
△ Less
Submitted 14 April, 2017; v1 submitted 22 December, 2016;
originally announced December 2016.
-
Response to "Comment on 'Zero and negative energy dissipation at information-theoretic erasure'"
Authors:
Laszlo B. Kish,
Claes-G. Granqvist,
Sunil P. Khatri,
Ferdinand Peper
Abstract:
We prove that statistical information theoretic quantities, such as information entropy, cannot generally be interrelated with the lower limit of energy dissipation during information erasure. We also point out that, in deterministic and error-free computers, the information entropy of memories does not change during erasure because its value is always zero. On the other hand, for information-theo…
▽ More
We prove that statistical information theoretic quantities, such as information entropy, cannot generally be interrelated with the lower limit of energy dissipation during information erasure. We also point out that, in deterministic and error-free computers, the information entropy of memories does not change during erasure because its value is always zero. On the other hand, for information-theoretic erasure - i.e., "thermalization" / randomization of the memory - the originally zero information entropy (with deterministic data in the memory) changes after erasure to its maximum value, 1 bit / memory bit, while the energy dissipation is still positive, even at parameters for which the thermodynamic entropy within the memory cell does not change. Information entropy does not convert to thermodynamic entropy and to the related energy dissipation; they are quantities of different physical nature. Possible specific observations (if any) indicating convertibility are at most fortuitous and due to the disregard of additional processes that are present.
△ Less
Submitted 5 February, 2016;
originally announced February 2016.
-
Asymptotic Green's function for the stochastic reproduction of competing variants via Fisher's angular transformation
Authors:
Bhavin S. Khatri
Abstract:
The Wright-Fisher Fokker-Planck equation describes the stochastic dynamics of self-reproducing, competing variants at fixed population size. We use Fisher's angular transformation, which defines a natural length for this stochastic process, to remove the co-ordinate dependence of it's diffusive dynamics, resulting in simple Brownian motion in an unstable potential, driving variants to extinction o…
▽ More
The Wright-Fisher Fokker-Planck equation describes the stochastic dynamics of self-reproducing, competing variants at fixed population size. We use Fisher's angular transformation, which defines a natural length for this stochastic process, to remove the co-ordinate dependence of it's diffusive dynamics, resulting in simple Brownian motion in an unstable potential, driving variants to extinction or fixation. This insight allows calculation of very accurate asymptotic formula for the Green's function under neutrality and selection, using a novel heuristic Gaussian approximation.
△ Less
Submitted 4 September, 2015; v1 submitted 6 August, 2015;
originally announced August 2015.
-
Zero and negative energy dissipation at information-theoretic erasure
Authors:
Laszlo B. Kish,
Claes G. Granqvist,
Sunil P. Khatri,
Ferdinand Peper
Abstract:
We introduce information-theoretic erasure based on Shannon's binary channel formula. It is pointed out that this type of erasure is a natural energy-dissipation-free way in which information is lost in double-potential-well memories, and it may be the reason why the brain can forget things effortlessly. We also demonstrate a new non-volatile, charge-based memory scheme wherein the erasure can be…
▽ More
We introduce information-theoretic erasure based on Shannon's binary channel formula. It is pointed out that this type of erasure is a natural energy-dissipation-free way in which information is lost in double-potential-well memories, and it may be the reason why the brain can forget things effortlessly. We also demonstrate a new non-volatile, charge-based memory scheme wherein the erasure can be associated with even negative energy dissipation; this implies that the memory's environment is cooled during information erasure and contradicts Landauer's principle of erasure dissipation. On the other hand, writing new information into the memory always requires positive energy dissipation in our schemes. Finally, we show a simple system where even a classical erasure process yields negative energy dissipation of arbitrarily large energy.
△ Less
Submitted 23 September, 2015; v1 submitted 30 July, 2015;
originally announced July 2015.
-
Optimal Chemotactic Responses in Stochastic Environments
Authors:
Martin Godány,
Bhavin S. Khatri,
Richard A. Goldstein
Abstract:
Most of our understanding of bacterial chemotaxis comes from studies of Escherichia coli. However, recent evidence suggests significant departures from the E. coli paradigm in other bacterial species. This variation may stem from different species inhabiting distinct environments and thus adapting to specific environmental pressures. In particular, these complex and dynamic environments may be poo…
▽ More
Most of our understanding of bacterial chemotaxis comes from studies of Escherichia coli. However, recent evidence suggests significant departures from the E. coli paradigm in other bacterial species. This variation may stem from different species inhabiting distinct environments and thus adapting to specific environmental pressures. In particular, these complex and dynamic environments may be poorly represented by standard experimental and theoretical models. In this work, we study the performance of various chemotactic strategies under a range of stochastic time- and space-varying attractant distributions in silico. We describe a novel type of response in which the bacterium tumbles more when attractant concentration is increasing, in contrast to the response of E. coli, and demonstrate how this response explains the behavior of aerobically-grown Rhodobacter sphaeroides. In this "speculator" response, bacteria compare the current attractant concentration to the long-term average. By tumbling persistently when the current concentration is higher than the average, bacteria maintain their position in regions of high attractant concentration. If the current concentration is lower than the average, or is declining, bacteria swim away in search of more favorable conditions. When the attractant distribution is spatially complex but slowly-changing, this response is as effective as that of E. coli.
△ Less
Submitted 26 March, 2015;
originally announced March 2015.
-
A simple biophysical model predicts more rapid accumulation of hybrid incompatibilities in small populations
Authors:
Bhavin S. Khatri,
Richard A. Goldstein
Abstract:
Speciation is fundamental to the huge diversity of life on Earth. Evidence suggests reproductive isolation arises most commonly in allopatry with a higher speciation rate in small populations. Current theory does not address this dependence in the important weak mutation regime. Here, we examine a biophysical model of speciation based on the binding of a protein transcription factor to a DNA bindi…
▽ More
Speciation is fundamental to the huge diversity of life on Earth. Evidence suggests reproductive isolation arises most commonly in allopatry with a higher speciation rate in small populations. Current theory does not address this dependence in the important weak mutation regime. Here, we examine a biophysical model of speciation based on the binding of a protein transcription factor to a DNA binding site, and how their independent co-evolution, in a stabilizing landscape, of two allopatric lineages leads to incompatibilities. Our results give a new prediction for the monomorphic regime of evolution, consistent with data, that smaller populations should develop incompatibilities more quickly. This arises as: 1) smaller populations having a greater initial drift load, as there are more sequences that bind poorly than well, so fewer substitutions are needed to reach incompatible regions of phenotype space; 2) slower divergence when the population size is larger than the inverse of discrete differences in fitness. Further, we find longer sequences develop incompatibilities more quickly at small population sizes, but more slowly at large population sizes. The biophysical model thus represents a robust mechanism of rapid reproductive isolation for small populations and large sequences, that does not require peak-shifts or positive selection.
△ Less
Submitted 26 March, 2015;
originally announced March 2015.
-
Critical Remarks on Landauer's principle of erasure-dissipation
Authors:
Laszlo B. Kish,
Claes-Goran Granqvist,
Sunil P. Khatri,
Janusz Smulko
Abstract:
We briefly address Landauer's Principle and some related issues in thermal demons. We show that an error-free Turing computer works in the zero-entropy limit, which proves Landauer's derivation incorrect. To have a physical logic gate, memory or information-engine, a few essential components necessary for the operation of these devices are often neglected, such as various aspects of control, dampi…
▽ More
We briefly address Landauer's Principle and some related issues in thermal demons. We show that an error-free Turing computer works in the zero-entropy limit, which proves Landauer's derivation incorrect. To have a physical logic gate, memory or information-engine, a few essential components necessary for the operation of these devices are often neglected, such as various aspects of control, damping and the fluctuation-dissipation theorem. We also point out that bit erasure is typically not needed or used for the functioning of computers or engines (except for secure erasure).
△ Less
Submitted 31 March, 2015; v1 submitted 22 September, 2014;
originally announced December 2014.
-
Multiple-line inference of selection on quantitative traits
Authors:
Nico Riedel,
Bhavin S. Khatri,
Michael Lässig,
Johannes Berg
Abstract:
Trait differences between species may be attributable to natural selection. However, quantifying the strength of evidence for selection acting on a particular trait is a difficult task. Here we develop a population-genetic test for selection acting on a quantitative trait which is based on multiple-line crosses. We show that using multiple lines increases both the power and the scope of selection…
▽ More
Trait differences between species may be attributable to natural selection. However, quantifying the strength of evidence for selection acting on a particular trait is a difficult task. Here we develop a population-genetic test for selection acting on a quantitative trait which is based on multiple-line crosses. We show that using multiple lines increases both the power and the scope of selection inference. First, a test based on three or more lines detects selection with strongly increased statistical significance, and we show explicitly how the sensitivity of the test depends on the number of lines. Second, a multiple-line test allows to distinguish different lineage-specific selection scenarios. Our analytical results are complemented by extensive numerical simulations. We then apply the multiple-line test to QTL data on floral character traits in plant species of the Mimulus genus and on photoperiodic traits in different maize strains, where we find a signatures of lineage-specific selection not seen in a two-line test.
△ Less
Submitted 6 July, 2015; v1 submitted 7 May, 2014;
originally announced May 2014.
-
Improving the Testability of Object-oriented Software during Testing and Debugging Processes
Authors:
Sujata Khatri,
R. S. Chhillar,
V. B. Singh
Abstract:
Testability is the probability whether tests will detect a fault, given that a fault in the program exists. How efficiently the faults will be uncovered depends upon the testability of the software. Various researchers have proposed qualitative and quantitative techniques to improve and measure the testability of software. In literature, a plethora of reliability growth models have been used to as…
▽ More
Testability is the probability whether tests will detect a fault, given that a fault in the program exists. How efficiently the faults will be uncovered depends upon the testability of the software. Various researchers have proposed qualitative and quantitative techniques to improve and measure the testability of software. In literature, a plethora of reliability growth models have been used to assess and measure the quantitative quality assessment of software during testing and operational phase. The knowledge about failure distribution and their complexity can improve the testability of software. Testing effort allocation can be made easy by knowing the failure distribution and complexity of faults, and this will ease the process of revealing faults from the software. As a result, the testability of the software will be improved. The parameters of the model along with the proportion of faults of different complexity to be removed from the software have been presented in the paper .We have used failure data of two object oriented software developed under open source environment namely MySQL for python and Squirrel SQL Client for estimation purpose
△ Less
Submitted 15 August, 2013;
originally announced August 2013.