-
Angle-dependent in-situ fast flavor transformations in post-neutron star merger disks
Authors:
Kelsey A. Lund,
Payel Mukhopadhyay,
Jonah M. Miller,
G. C. McLaughlin
Abstract:
The remnant black hole-accretion disk system resulting from binary neutron star mergers has proven to be a promising site for synthesizing the heaviest elements via rapid neutron capture (r-process). A critical factor in determining the full r-process pattern in these environments is the neutron richness of the ejecta, which is strongly influenced by neutrino interactions. One key ingredient shapi…
▽ More
The remnant black hole-accretion disk system resulting from binary neutron star mergers has proven to be a promising site for synthesizing the heaviest elements via rapid neutron capture (r-process). A critical factor in determining the full r-process pattern in these environments is the neutron richness of the ejecta, which is strongly influenced by neutrino interactions. One key ingredient shaping these interactions is fast neutrino flavor conversions (FFCs), which arise due to angular crossings in neutrino distributions and occur on nanosecond timescales. We present the first three-dimensional, in-situ, angle-dependent modeling of FFCs in post-merger disks, implemented within general relativistic magnetohydrodynamics with Monte Carlo neutrino transport. Our results reveal that, by suppressing electron neutrinos, FFCs more efficiently cool the disk and weaken the early thermally driven wind. Less re-leptonization due to electron neutrino absorption makes this cooler wind more neutron-rich, producing a more robust r-process at higher latitudes of the outflow. This study underscores the necessity of incorporating FFCs in realistic simulations.
△ Less
Submitted 31 March, 2025;
originally announced March 2025.
-
The Well: a Large-Scale Collection of Diverse Physics Simulations for Machine Learning
Authors:
Ruben Ohana,
Michael McCabe,
Lucas Meyer,
Rudy Morel,
Fruzsina J. Agocs,
Miguel Beneitez,
Marsha Berger,
Blakesley Burkhart,
Keaton Burns,
Stuart B. Dalziel,
Drummond B. Fielding,
Daniel Fortunato,
Jared A. Goldberg,
Keiya Hirashima,
Yan-Fei Jiang,
Rich R. Kerswell,
Suryanarayana Maddu,
Jonah Miller,
Payel Mukhopadhyay,
Stefan S. Nixon,
Jeff Shen,
Romain Watteaux,
Bruno Régaldo-Saint Blancard,
François Rozet,
Liam H. Parker
, et al. (2 additional authors not shown)
Abstract:
Machine learning based surrogate models offer researchers powerful tools for accelerating simulation-based workflows. However, as standard datasets in this space often cover small classes of physical behavior, it can be difficult to evaluate the efficacy of new approaches. To address this gap, we introduce the Well: a large-scale collection of datasets containing numerical simulations of a wide va…
▽ More
Machine learning based surrogate models offer researchers powerful tools for accelerating simulation-based workflows. However, as standard datasets in this space often cover small classes of physical behavior, it can be difficult to evaluate the efficacy of new approaches. To address this gap, we introduce the Well: a large-scale collection of datasets containing numerical simulations of a wide variety of spatiotemporal physical systems. The Well draws from domain experts and numerical software developers to provide 15TB of data across 16 datasets covering diverse domains such as biological systems, fluid dynamics, acoustic scattering, as well as magneto-hydrodynamic simulations of extra-galactic fluids or supernova explosions. These datasets can be used individually or as part of a broader benchmark suite. To facilitate usage of the Well, we provide a unified PyTorch interface for training and evaluating models. We demonstrate the function of this library by introducing example baselines that highlight the new challenges posed by the complex dynamics of the Well. The code and data is available at https://github.com/PolymathicAI/the_well.
△ Less
Submitted 21 February, 2025; v1 submitted 30 November, 2024;
originally announced December 2024.
-
A quantum random access memory (QRAM) using a polynomial encoding of binary strings
Authors:
Priyanka Mukhopadhyay
Abstract:
Quantum algorithms claim significant speedup over their classical counterparts for solving many problems. An important aspect of many of these algorithms is the existence of a quantum oracle, which needs to be implemented efficiently in order to realize the claimed advantages. A quantum random access memory (QRAM) is a promising architecture for realizing these oracles. In this paper we develop a…
▽ More
Quantum algorithms claim significant speedup over their classical counterparts for solving many problems. An important aspect of many of these algorithms is the existence of a quantum oracle, which needs to be implemented efficiently in order to realize the claimed advantages. A quantum random access memory (QRAM) is a promising architecture for realizing these oracles. In this paper we develop a new design for QRAM and implement it with Clifford+T circuit. We focus on optimizing the T-count and T-depth since non-Clifford gates are the most expensive to implement fault-tolerantly. Integral to our design is a polynomial encoding of bit strings and so we refer to this design as $\text{QRAM}_{poly}$. Compared to the previous state-of-the-art bucket brigade architecture for QRAM, we achieve an exponential improvement in T-depth, while reducing T-count and keeping the qubit count same. Specifically, if $N$ is the number of memory locations, then $\text{QRAM}_{poly}$ has T-depth $O(\log\log N)$, T-count $O(N-\log N)$ and qubit count $O(N)$, while the bucket brigade circuit has T-depth $O(\log N)$, T-count $O(N)$ and qubit count $O(N)$. Combining two $\text{QRAM}_{poly}$ we design a quantum look-up-table, $\text{qLUT}_{poly}$, that has T-depth $O(\log\log N)$, T-count $O(\sqrt{N})$ and qubit count $O(\sqrt{N})$. A qLUT or quantum read-only memory (QROM) has restricted functionality than a QRAM and needs to be compiled each time the contents of the memory change. The previous state-of-the-art CSWAP architecture has T-depth $O(\sqrt{N})$, T-count $O(\sqrt{N})$ and qubit count $O(\sqrt{N})$. Thus we achieve a double exponential improvement in T-depth while keeping the T-count and qubit-count asymptotically same. Additionally, with our polynomial encoding of bit strings, we develop a method to optimize the Toffoli-count of circuits, specially those consisting of multi-controlled-NOT gates.
△ Less
Submitted 2 April, 2025; v1 submitted 28 August, 2024;
originally announced August 2024.
-
Optimized Quantum Simulation Algorithms for Scalar Quantum Field Theories
Authors:
Andrew Hardy,
Priyanka Mukhopadhyay,
M. Sohaib Alam,
Robert Konik,
Layla Hormozi,
Eleanor Rieffel,
Stuart Hadfield,
João Barata,
Raju Venugopalan,
Dmitri E. Kharzeev,
Nathan Wiebe
Abstract:
We provide practical simulation methods for scalar field theories on a quantum computer that yield improved asymptotics as well as concrete gate estimates for the simulation and physical qubit estimates using the surface code. We achieve these improvements through two optimizations. First, we consider a different approach for estimating the elements of the S-matrix. This approach is appropriate in…
▽ More
We provide practical simulation methods for scalar field theories on a quantum computer that yield improved asymptotics as well as concrete gate estimates for the simulation and physical qubit estimates using the surface code. We achieve these improvements through two optimizations. First, we consider a different approach for estimating the elements of the S-matrix. This approach is appropriate in general for 1+1D and for certain low-energy elastic collisions in higher dimensions. Second, we implement our approach using a series of different fault-tolerant simulation algorithms for Hamiltonians formulated both in the field occupation basis and field amplitude basis. Our algorithms are based on either second-order Trotterization or qubitization. The cost of Trotterization in occupation basis scales as $\widetilde{O}(λN^7 |Ω|^3/(M^{5/2} ε^{3/2})$ where $λ$ is the coupling strength, $N$ is the occupation cutoff $|Ω|$ is the volume of the spatial lattice, $M$ is the mass of the particles and $ε$ is the uncertainty in the energy calculation used for the $S$-matrix determination. Qubitization in the field basis scales as $\widetilde{O}(|Ω|^2 (k^2 Λ+kM^2)/ε)$ where $k$ is the cutoff in the field and $Λ$ is a scaled coupling constant. We find in both cases that the bounds suggest physically meaningful simulations can be performed using on the order of $4\times 10^6$ physical qubits and $10^{12}$ $T$-gates which corresponds to roughly one day on a superconducting quantum computer with surface code and a cycle time of 100 ns, placing simulation of scalar field theory within striking distance of the gate counts for the best available chemistry simulation results.
△ Less
Submitted 18 July, 2024;
originally announced July 2024.
-
The time evolution of fast flavor crossings in post-merger disks around a black hole remnant
Authors:
Payel Mukhopadhyay,
Jonah Miller,
Gail C. McLaughlin
Abstract:
We postprocess a three-dimensional general relativistic, full transport neutrino radiation magnetohydrodynamics simulation of the black hole--accretion disk--wind system thought to be a potential outcome of the GW170817 merger to investigate the presence of electron lepton number (ELN-XLN) crossings in the neutrino angular distribution. Neutrinos are evolved with an explicit Monte Carlo method and…
▽ More
We postprocess a three-dimensional general relativistic, full transport neutrino radiation magnetohydrodynamics simulation of the black hole--accretion disk--wind system thought to be a potential outcome of the GW170817 merger to investigate the presence of electron lepton number (ELN-XLN) crossings in the neutrino angular distribution. Neutrinos are evolved with an explicit Monte Carlo method and can interact with matter via emission, absorption, or scattering. Within the postprocessing framework, we find ubiquitous occurrence of ELN-XLN crossings at early times ($\sim$ 11ms) but this does not hold for later times in the simulation. At postmerger times of $ \sim$ 60 ms and beyond, ELN-XLN crossings are only present near the equator. We provide a detailed analysis of the neutrino radiation field to investigate the origin and time evolution of these crossings. Previous reports have suggested ubiquitous flavor crossings persisting throughout the simulation lifetime, albeit for different sets of conditions for the merger remnant, the treatment of hydrodynamics and neutrino transport. Even though we do not perform a direct comparison with other published works, we qualitatively assess the reasons for the difference with our results. The geometric structure and evolution of the ELN-XLN crossings found in our analysis, and by extension, fast flavor instabilities have important implications for heavy element nucleosynthesis in neutron star mergers.
△ Less
Submitted 27 April, 2024;
originally announced April 2024.
-
Trading Determinism for Noncommutativity in Edmonds' Problem
Authors:
V. Arvind,
Abhranil Chatterjee,
Partha Mukhopadhyay
Abstract:
Let $X=X_1\sqcup X_2\sqcup\ldots\sqcup X_k$ be a partitioned set of variables such that the variables in each part $X_i$ are noncommuting but for any $i\neq j$, the variables $x\in X_i$ commute with the variables $x'\in X_j$. Given as input a square matrix $T$ whose entries are linear forms over $\mathbb{Q}\langle{X}\rangle$, we consider the problem of checking if $T$ is invertible or not over the…
▽ More
Let $X=X_1\sqcup X_2\sqcup\ldots\sqcup X_k$ be a partitioned set of variables such that the variables in each part $X_i$ are noncommuting but for any $i\neq j$, the variables $x\in X_i$ commute with the variables $x'\in X_j$. Given as input a square matrix $T$ whose entries are linear forms over $\mathbb{Q}\langle{X}\rangle$, we consider the problem of checking if $T$ is invertible or not over the universal skew field of fractions of the partially commutative polynomial ring $\mathbb{Q}\langle{X}\rangle$ [Klep-Vinnikov-Volcic (2020)]. In this paper, we design a deterministic polynomial-time algorithm for this problem for constant $k$. The special case $k=1$ is the noncommutative Edmonds' problem (NSINGULAR) which has a deterministic polynomial-time algorithm by recent results [Garg-Gurvits-Oliveira-Wigderson (2016), Ivanyos-Qiao-Subrahmanyam (2018), Hamada-Hirai (2021)].
En-route, we obtain the first deterministic polynomial-time algorithm for the equivalence testing problem of $k$-tape \emph{weighted} automata (for constant $k$) resolving a long-standing open problem [Harju and Karhum"{a}ki(1991), Worrell (2013)]. Algebraically, the equivalence problem reduces to testing whether a partially commutative rational series over the partitioned set $X$ is zero or not [Worrell (2013)]. Decidability of this problem was established by Harju and Karhumäki (1991). Prior to this work, a \emph{randomized} polynomial-time algorithm for this problem was given by Worrell (2013) and, subsequently, a deterministic quasipolynomial-time algorithm was also developed [Arvind et al. (2021)].
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
Synthesizing Toffoli-optimal quantum circuits for arbitrary multi-qubit unitaries
Authors:
Priyanka Mukhopadhyay
Abstract:
In this paper we study the Clifford+Toffoli universal fault-tolerant gate set. We introduce a generating set in order to represent any unitary implementable by this gate set and with this we derive a bound on the Toffoli-count of arbitrary multi-qubit unitaries. We analyse the channel representation of the generating set elements, with the help of which we infer…
▽ More
In this paper we study the Clifford+Toffoli universal fault-tolerant gate set. We introduce a generating set in order to represent any unitary implementable by this gate set and with this we derive a bound on the Toffoli-count of arbitrary multi-qubit unitaries. We analyse the channel representation of the generating set elements, with the help of which we infer $|\mathcal{J}_n^{Tof}|<|\mathcal{J}_n^T|$, where $\mathcal{J}_n^{Tof}$ and $\mathcal{J}_n^T$ are the set of unitaries exactly implementable by the Clifford+Toffoli and Clifford+T gate set, respectively. We develop Toffoli-count optimal synthesis algorithms for both approximately and exactly implementable multi-qubit unitaries. With the help of these we prove $|\mathcal{J}_n^{Tof}|=|\mathcal{J}_n^{CS}|$, where $\mathcal{J}_n^{CS}$ is the set of unitaries exactly implementable by the Clifford+CS gate set.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
Successful $νp$-process in neutrino-driven outflows in core-collapse supernovae
Authors:
Alexander Friedland,
Payel Mukhopadhyay,
Amol V. Patwardhan
Abstract:
The origin of the solar system abundances of several proton-rich isotopes, especially $^{92,94}$Mo and $^{96,98}$Ru, has been an enduring mystery in nuclear astrophysics. An attractive proposal to solve this problem is the $νp$-process, which can operate in neutrino-driven outflows in a core-collapse supernova after the shock is launched. Years of detailed studies, however, have cast doubt over th…
▽ More
The origin of the solar system abundances of several proton-rich isotopes, especially $^{92,94}$Mo and $^{96,98}$Ru, has been an enduring mystery in nuclear astrophysics. An attractive proposal to solve this problem is the $νp$-process, which can operate in neutrino-driven outflows in a core-collapse supernova after the shock is launched. Years of detailed studies, however, have cast doubt over the ability of this process to generate sufficiently high absolute and relative amounts of various $p$-nuclei. The $νp$-process is also thought to be excluded by arguments based on the long-lived radionuclide $^{92}$Nb.Here, we present explicit calculations, in which both the abundance ratios and the absolute yields of the $p$-nuclei up to $A\lesssim 105$ are successfully reproduced, even when using the modern (medium enhanced) triple-$α$ reaction rates. The process is also shown to produce the necessary amounts of $^{92}$Nb. The models are characterized by subsonic outflows and by the protoneutron star masses in the $\gtrsim 1.7 M_\odot$ range. This suggests that the Mo and Ru $p$-nuclides observed in the Solar System were made in CCSN explosions characterized by an extended accretion stage.
△ Less
Submitted 6 February, 2025; v1 submitted 5 December, 2023;
originally announced December 2023.
-
Black-Box Identity Testing of Noncommutative Rational Formulas in Deterministic Quasipolynomial Time
Authors:
V. Arvind,
Abhranil Chatterjee,
Partha Mukhopadhyay
Abstract:
Rational Identity Testing (RIT) is the decision problem of determining whether or not a noncommutative rational formula computes zero in the free skew field. It admits a deterministic polynomial-time white-box algorithm [Garg, Gurvits, Oliveira, and Wigderson (2016); Ivanyos, Qiao, Subrahmanyam (2018); Hamada and Hirai (2021)], and a randomized polynomial-time algorithm [Derksen and Makam (2017)]…
▽ More
Rational Identity Testing (RIT) is the decision problem of determining whether or not a noncommutative rational formula computes zero in the free skew field. It admits a deterministic polynomial-time white-box algorithm [Garg, Gurvits, Oliveira, and Wigderson (2016); Ivanyos, Qiao, Subrahmanyam (2018); Hamada and Hirai (2021)], and a randomized polynomial-time algorithm [Derksen and Makam (2017)] in the black-box setting, via singularity testing of linear matrices over the free skew field. Indeed, a randomized NC algorithm for RIT in the white-box setting follows from the result of Derksen and Makam (2017).
Designing an efficient deterministic black-box algorithm for RIT and understanding the parallel complexity of RIT are major open problems in this area. Despite being open since the work of Garg, Gurvits, Oliveira, and Wigderson (2016), these questions have seen limited progress. In fact, the only known result in this direction is the construction of a quasipolynomial-size hitting set for rational formulas of only inversion height two [Arvind, Chatterjee, Mukhopadhyay (2022)].
In this paper, we significantly improve the black-box complexity of this problem and obtain the first quasipolynomial-size hitting set for all rational formulas of polynomial size. Our construction also yields the first deterministic quasi-NC upper bound for RIT in the white-box setting.
△ Less
Submitted 6 April, 2024; v1 submitted 27 September, 2023;
originally announced September 2023.
-
A Hierarchical Framework for explaining the Cosmic Ray Spectrum using Diffusive Shock Acceleration
Authors:
Roger Blandford,
Paul Simeon,
Noémie Globus,
Payel Mukhopadhyay,
Enrico Peretti,
Kirk S. S. Barrow
Abstract:
The hypothesis that the entire cosmic ray spectrum, from $\lesssim1\,{\rm GeV}$ to $\gtrsim100\,{\rm EeV}$ energy, can be accounted for by diffusive shock acceleration on increasingly large scales is critically examined. Specifically, it is conjectured that Galactic cosmic rays, up to $\sim3\,{\rm PeV}$, are mostly produced by local supernova remnants, from which they escape upstream. These cosmic…
▽ More
The hypothesis that the entire cosmic ray spectrum, from $\lesssim1\,{\rm GeV}$ to $\gtrsim100\,{\rm EeV}$ energy, can be accounted for by diffusive shock acceleration on increasingly large scales is critically examined. Specifically, it is conjectured that Galactic cosmic rays, up to $\sim3\,{\rm PeV}$, are mostly produced by local supernova remnants, from which they escape upstream. These cosmic rays initiate a powerful magnetocentrifugal wind, removing disk mass and angular momentum before passing through the Galactic Wind Termination Shock at a radius $\sim200\,{\rm kpc}$, where they can be re-accelerated to account for observed cosmic rays up to $\sim30\,{\rm PeV}$. The cosmic rays transmitted downstream from more powerful termination shocks associated with other galaxies can be further accelerated at Intergalactic Accretion Shocks to the highest energies observed. In this interpretation, the highest rigidity observed particles are protons; the highest energy particles are heavy nuclei, such as iron. A universal "bootstrap" prescription, coupling the energy density of the magnetic turbulence to that of the resonant cosmic rays, is proposed, initially for the highest energy particles escaping far ahead of the shock front and then scattering, successively, lower energy particles downstream. Observable implications of this general scheme relate to the spectrum, composition and sky distribution of Ultra-High-Energy Cosmic Rays, the extragalactic radio background, the Galactic halo magnetic field and Pevatrons.
△ Less
Submitted 16 September, 2023;
originally announced September 2023.
-
Covariant Closed String Bits -- Classical Theory
Authors:
Partha Mukhopadhyay
Abstract:
We study lattice wouldsheet theory with continuous time describing free motion of a system of bound string bits. We use a non-local lattice derivative that allows us to preserve all the symmetries of the continuum including the worldsheet local symmetries. There exists a ``local correspondence'' between the continuum and lattice theories in the sense that every local dynamical or constraint equati…
▽ More
We study lattice wouldsheet theory with continuous time describing free motion of a system of bound string bits. We use a non-local lattice derivative that allows us to preserve all the symmetries of the continuum including the worldsheet local symmetries. There exists a ``local correspondence'' between the continuum and lattice theories in the sense that every local dynamical or constraint equation in the continuum also holds true on the lattice, site-wise. We perform a detailed symmetry analysis for the bits and establish conservation laws. In particular, for a bosonic non-linear sigma model with arbitrary target space, we demonstrate both the global symmetry algebra and classical Virasoro algebra (in position space) on the lattice. Our construction is generalizable to higher dimensions for any generally covariant theory that can be studied by expanding around a globally hyperbolic spacetime with conformally flat Cauchy slices.
△ Less
Submitted 31 July, 2023;
originally announced July 2023.
-
Quantum Simulation of the First-Quantized Pauli-Fierz Hamiltonian
Authors:
Priyanka Mukhopadhyay,
Torin F. Stetina,
Nathan Wiebe
Abstract:
We provide an explicit recursive divide and conquer approach for simulating quantum dynamics and derive a discrete first quantized non-relativistic QED Hamiltonian based on the many-particle Pauli Fierz Hamiltonian. We apply this recursive divide and conquer algorithm to this Hamiltonian and compare it to a concrete simulation algorithm that uses qubitization. Our divide and conquer algorithm, usi…
▽ More
We provide an explicit recursive divide and conquer approach for simulating quantum dynamics and derive a discrete first quantized non-relativistic QED Hamiltonian based on the many-particle Pauli Fierz Hamiltonian. We apply this recursive divide and conquer algorithm to this Hamiltonian and compare it to a concrete simulation algorithm that uses qubitization. Our divide and conquer algorithm, using lowest order Trotterization, scales for fixed grid spacing as $\widetilde{O}(ΛN^2η^2 t^2 /ε)$ for grid size $N$, $η$ particles, simulation time $t$, field cutoff $Λ$ and error $ε$. Our qubitization algorithm scales as $\widetilde{O}(N(η+N)(η+Λ^2) t\log(1/ε)) $. This shows that even a naïve partitioning and low-order splitting formula can yield, through our divide and conquer formalism, superior scaling to qubitization for large $Λ$. We compare the relative costs of these two algorithms on systems that are relevant for applications such as the spontaneous emission of photons, and the photoionization of electrons. We observe that for different parameter regimes, one method can be favored over the other. Finally, we give new algorithmic and circuit level techniques for gate optimization including a new way of implementing a group of multi-controlled-X gates that can be used for better analysis of circuit cost.
△ Less
Submitted 15 March, 2024; v1 submitted 19 June, 2023;
originally announced June 2023.
-
The Noncommutative Edmonds' Problem Re-visited
Authors:
Abhranil Chatterjee,
Partha Mukhopadhyay
Abstract:
Let $T$ be a matrix whose entries are linear forms over the noncommutative variables $x_1, x_2, \ldots, x_n$. The noncommutative Edmonds' problem (NSINGULAR) aims to determine whether $T$ is invertible in the free skew field generated by $x_1,x_2,\ldots,x_n$. Currently, there are three different deterministic polynomial-time algorithms to solve this problem: using operator scaling [Garg, Gurvits,…
▽ More
Let $T$ be a matrix whose entries are linear forms over the noncommutative variables $x_1, x_2, \ldots, x_n$. The noncommutative Edmonds' problem (NSINGULAR) aims to determine whether $T$ is invertible in the free skew field generated by $x_1,x_2,\ldots,x_n$. Currently, there are three different deterministic polynomial-time algorithms to solve this problem: using operator scaling [Garg, Gurvits, Oliveira, and Wigserdon (2016)], algebraic methods [Ivanyos, Qiao, and Subrahmanyam (2018)], and convex optimization [Hamada and Hirai (2021)].
In this paper, we present a simpler algorithm for the NSINGULAR problem. While our algorithmic template is similar to the one in Ivanyos et. al.(2018), it significantly differs in its implementation of the rank increment step. Instead of computing the limit of a second Wong sequence, we reduce the problem to the polynomial identity testing (PIT) of noncommutative algebraic branching programs (ABPs).
This enables us to bound the bit-complexity of the algorithm over $\mathbb{Q}$ without requiring special care. Moreover, the rank increment step can be implemented in quasipolynomial-time even without an explicit description of the coefficient matrices in $T$. This is possible by exploiting the connection with the black-box PIT of noncommutative ABPs [Forbes and Shpilka (2013)].
△ Less
Submitted 17 May, 2023;
originally announced May 2023.
-
Reacceleration of Galactic Cosmic Rays Beyond the Knee at the Termination Shock of a Cosmic-Ray-Driven Galactic Wind
Authors:
Payel Mukhopadhyay,
Enrico Peretti,
Noemie Globus,
Paul Simeon,
Roger Blandford
Abstract:
The origin of cosmic rays above the knee in the spectrum is an unsolved problem. We present a wind model in which interstellar gas flows along a non-rotating, expanding flux tube with a changing speed and cross-sectional area. Cosmic rays from Galactic sources, such as supernova remnants, which are coupled to the plasma via Alfvén waves, provide the main pressure source for driving this outflow. T…
▽ More
The origin of cosmic rays above the knee in the spectrum is an unsolved problem. We present a wind model in which interstellar gas flows along a non-rotating, expanding flux tube with a changing speed and cross-sectional area. Cosmic rays from Galactic sources, such as supernova remnants, which are coupled to the plasma via Alfvén waves, provide the main pressure source for driving this outflow. These cosmic rays are then subject to diffusive shock reacceleration at the Galactic wind termination shock, which is located at a distance $\sim200\,{\rm kpc}$. Some of the highest-energy reaccelerated particles propagate upstream against the wind and can contribute to the PeV-EeV range of the spectrum. We analyze the conditions under which efficient reacceleration can occur and find that rigidities $\sim$ 10-40 PV can be obtained and that the termination shock may account for half of the proton spectrum measured in IceCube/IceTop experiment. The highest-energy particles that escape downstream from our termination shock, and similar shocks surrounding most galaxies, can be further accelerated by intergalactic shock fronts.
△ Less
Submitted 21 January, 2023;
originally announced January 2023.
-
On Identity Testing and Noncommutative Rank Computation over the Free Skew Field
Authors:
V. Arvind,
Abhranil Chatterjee,
Utsab Ghosal,
Partha Mukhopadhyay,
C. Ramya
Abstract:
The identity testing of rational formulas (RIT) in the free skew field efficiently reduces to computing the rank of a matrix whose entries are linear polynomials in noncommuting variables\cite{HW15}. This rank computation problem has deterministic polynomial-time white-box algorithms \cite{GGOW16, IQS18} and a randomized polynomial-time algorithm in the black-box setting \cite{DM17}. In this paper…
▽ More
The identity testing of rational formulas (RIT) in the free skew field efficiently reduces to computing the rank of a matrix whose entries are linear polynomials in noncommuting variables\cite{HW15}. This rank computation problem has deterministic polynomial-time white-box algorithms \cite{GGOW16, IQS18} and a randomized polynomial-time algorithm in the black-box setting \cite{DM17}. In this paper, we propose a new approach for efficient derandomization of \emph{black-box} RIT. Additionally, we obtain results for matrix rank computation over the free skew field, and construct efficient linear pencil representations for a new class of rational expressions. More precisely, we show the following results:
1. Under the hardness assumption that the ABP (algebraic branching program) complexity of every polynomial identity for the $k\times k$ matrix algebra is $2^{Ω(k)}$ \cite{BW05}, we obtain a subexponential-time black-box algorithm for RIT in almost general setting. This can be seen as the first "hardness implies derandomization" type theorem for rational formulas.
2. We show that the noncommutative rank of any matrix over the free skew field whose entries have small linear pencil representations can be computed in deterministic polynomial time. Prior to this, an efficient rank computation was only known for matrices with noncommutative formulas as entries\cite{GGOW20}. As special cases of our algorithm, we obtain the first deterministic polynomial-time algorithms for rank computation of matrices whose entries are noncommutative ABPs or rational formulas.
3. Motivated by the definition given by Bergman\cite{Ber76}, we define a new class that contains noncommutative ABPs and rational formulas. We obtain a polynomial-size linear pencil representation for this class. As a by-product, we obtain a white-box deterministic polynomial-time identity testing algorithm for the class.
△ Less
Submitted 11 September, 2022;
originally announced September 2022.
-
Synthesizing efficient circuits for Hamiltonian simulation
Authors:
Priyanka Mukhopadhyay,
Nathan Wiebe,
Hong Tao Zhang
Abstract:
We provide a new approach for compiling quantum simulation circuits that appear in Trotter, qDRIFT and multi-product formulas to Clifford and non-Clifford operations that can reduce the number of non-Clifford operations by a factor of up to $4$. In fact, the total number of gates reduce in many cases. We show that it is possible to implement an exponentiated sum of commuting Paulis with at most…
▽ More
We provide a new approach for compiling quantum simulation circuits that appear in Trotter, qDRIFT and multi-product formulas to Clifford and non-Clifford operations that can reduce the number of non-Clifford operations by a factor of up to $4$. In fact, the total number of gates reduce in many cases. We show that it is possible to implement an exponentiated sum of commuting Paulis with at most $m$ (controlled)-rotation gates, where $m$ is the number of distinct non-zero eigenvalues (ignoring sign). Thus we can collect mutually commuting Hamiltonian terms into groups that satisfy one of several symmetries identified in this work which allow an inexpensive simulation of the entire group of terms. We further show that the cost can in some cases be reduced by partially allocating Hamiltonian terms to several groups and provide a polynomial time classical algorithm that can greedily allocate the terms to appropriate groupings. We further specifically discuss these optimizations for the case of fermionic dynamics and provide extensive numerical simulations for qDRIFT of our grouping strategy to 6 and 4-qubit Heisenberg models, $LiH$, $H_2$ and observe a factor of 1.8-3.2 reduction in the number of non-Clifford gates. This suggests Trotter-based simulation of chemistry in second quantization may be even more practical than previously believed.
△ Less
Submitted 8 March, 2023; v1 submitted 7 September, 2022;
originally announced September 2022.
-
Black-box Identity Testing of Noncommutative Rational Formulas of Inversion Height Two in Deterministic Quasipolynomial-time
Authors:
V. Arvind,
Abhranil Chatterjee,
Partha Mukhopadhyay
Abstract:
Hrubeš and Wigderson (2015) initiated the complexity-theoretic study of noncommutative formulas with inverse gates. They introduced the Rational Identity Testing (RIT) problem which is to decide whether a noncommutative rational formula computes zero in the free skew field. In the white-box setting, deterministic polynomial-time algorithms are known for this problem following the works of Garg, Gu…
▽ More
Hrubeš and Wigderson (2015) initiated the complexity-theoretic study of noncommutative formulas with inverse gates. They introduced the Rational Identity Testing (RIT) problem which is to decide whether a noncommutative rational formula computes zero in the free skew field. In the white-box setting, deterministic polynomial-time algorithms are known for this problem following the works of Garg, Gurvits, Oliveira, and Wigderson (2016) and Ivanyos, Qiao, and Subrahmanyam (2018).
A central open problem in this area is to design efficient deterministic black-box identity testing algorithm for rational formulas. In this paper, we solve this problem for the first nested inverse case. More precisely, we obtain a deterministic quasipolynomial-time black-box RIT algorithm for noncommutative rational formulas of inversion height two via a hitting set construction. Several new technical ideas are involved in the hitting set construction, including key concepts from matrix coefficient realization theory (Volčič, 2018) and properties of cyclic division algebra (Lam, 2001). En route to the proof, an important step is to embed the hitting set of Forbes and Shpilka for noncommutative formulas (2013) inside a cyclic division algebra of small index.
△ Less
Submitted 11 February, 2022;
originally announced February 2022.
-
Self-Generated Cosmic-Ray Turbulence Can Explain the Morphology of TeV Halos
Authors:
Payel Mukhopadhyay,
Tim Linden
Abstract:
Observations have shown that spatially extended "TeV halos" are a common (and potentially generic) feature surrounding young and middle-aged pulsars. However, their morphology is not understood. They are larger than the "compact" region where the stellar remnant dominates the properties of the interstellar medium, but smaller than expected in models of cosmic-ray diffusion through the standard int…
▽ More
Observations have shown that spatially extended "TeV halos" are a common (and potentially generic) feature surrounding young and middle-aged pulsars. However, their morphology is not understood. They are larger than the "compact" region where the stellar remnant dominates the properties of the interstellar medium, but smaller than expected in models of cosmic-ray diffusion through the standard interstellar medium. Several explanations have been proposed, but all have shortcomings. Here, we revisit a class of models where the cosmic-ray gradient produced by the central source induces a streaming stability that "self-confines" the cosmic-ray population. We find that previous studies significantly underpredicted the degree of cosmic-ray confinement and show that corrected models can significantly inhibit cosmic-ray diffusion throughout the TeV halo, especially when similar contributions from the coincident supernova remnant are included.
△ Less
Submitted 1 November, 2021;
originally announced November 2021.
-
Adaptive estimation of quantum observables
Authors:
Ariel Shlosberg,
Andrew J. Jena,
Priyanka Mukhopadhyay,
Jan F. Haase,
Felix Leditzky,
Luca Dellantonio
Abstract:
The accurate estimation of quantum observables is a critical task in science. With progress on the hardware, measuring a quantum system will become increasingly demanding, particularly for variational protocols that require extensive sampling. Here, we introduce a measurement scheme that adaptively modifies the estimator based on previously obtained data. Our algorithm, which we call AEQuO, contin…
▽ More
The accurate estimation of quantum observables is a critical task in science. With progress on the hardware, measuring a quantum system will become increasingly demanding, particularly for variational protocols that require extensive sampling. Here, we introduce a measurement scheme that adaptively modifies the estimator based on previously obtained data. Our algorithm, which we call AEQuO, continuously monitors both the estimated average and the associated error of the considered observable, and determines the next measurement step based on this information. We allow both for overlap and non-bitwise commutation relations in the subsets of Pauli operators that are simultaneously probed, thereby maximizing the amount of gathered information. AEQuO comes in two variants: a greedy bucket-filling algorithm with good performance for small problem instances, and a machine learning-based algorithm with more favorable scaling for larger instances. The measurement configuration determined by these subroutines is further post-processed in order to lower the error on the estimator. We test our protocol on chemistry Hamiltonians, for which AEQuO provides error estimates that improve on all state-of-the-art methods based on various grouping techniques or randomized measurements, thus greatly lowering the toll of measurements in current and future quantum applications.
△ Less
Submitted 19 January, 2023; v1 submitted 28 October, 2021;
originally announced October 2021.
-
T-count and T-depth of any multi-qubit unitary
Authors:
Vlad Gheorghiu,
Michele Mosca,
Priyanka Mukhopadhyay
Abstract:
While implementing a quantum algorithm it is crucial to reduce the quantum resources, in order to obtain the desired computational advantage. For most fault-tolerant quantum error-correcting codes the cost of implementing the non-Clifford gate is the highest among all the gates in a universal fault-tolerant gate set. In this paper we design provable algorithm to determine T-count of any $n$-qubit…
▽ More
While implementing a quantum algorithm it is crucial to reduce the quantum resources, in order to obtain the desired computational advantage. For most fault-tolerant quantum error-correcting codes the cost of implementing the non-Clifford gate is the highest among all the gates in a universal fault-tolerant gate set. In this paper we design provable algorithm to determine T-count of any $n$-qubit ($n\geq 1$) unitary $W$ of size $2^n\times 2^n$, over the Clifford+T gate set. The space and time complexity of our algorithm are $O\left(2^{2n}\right)$ and $O\left(2^{2n\mathcal{T}_ε(W)+4n}\right)$ respectively. $\mathcal{T}_ε(W)$ ($ε$-T-count) is the (minimum possible) T-count of an exactly implementable unitary $U$ i.e. $\mathcal{T}(U)$, such that $d(U,W)\leqε$ and $\mathcal{T}(U)\leq\mathcal{T}(U')$ where $U'$ is any exactly implementable unitary with $d(U',W)\leqε$. $d(.,.)$ is the global phase invariant distance. Our algorithm can also be used to determine the (minimum possible) T-depth of any multi-qubit unitary and the complexity has exponential dependence on $n$ and $ε$-T-depth. This is the first algorithm that gives T-count or T-depth of any multi-qubit ($n\geq 1$) unitary. For small enough $ε$, we can synthesize the T-count and T-depth-optimal circuits. Our results can be used to determine the minimum count (or depth) of non-Clifford gates required to implement any multi-qubit unitary with a universal gate set consisting of Clifford and non-Clifford gates like Clifford+CS, Clifford+V, etc. To the best of our knowledge, there were no such optimal-synthesis algorithm for arbitrary multi-qubit unitaries in any universal gate set.
△ Less
Submitted 9 February, 2023; v1 submitted 19 October, 2021;
originally announced October 2021.
-
Monotone Complexity of Spanning Tree Polynomial Re-visited
Authors:
Arkadev Chattopadhyay,
Rajit Datta,
Utsab Ghosal,
Partha Mukhopadhyay
Abstract:
We prove two results that shed new light on the monotone complexity of the spanning tree polynomial, a classic polynomial in algebraic complexity and beyond.
First, we show that the spanning tree polynomials having $n$ variables and defined over constant-degree expander graphs, have monotone arithmetic complexity $2^{Ω(n)}$. This yields the first strongly exponential lower bound on the monotone…
▽ More
We prove two results that shed new light on the monotone complexity of the spanning tree polynomial, a classic polynomial in algebraic complexity and beyond.
First, we show that the spanning tree polynomials having $n$ variables and defined over constant-degree expander graphs, have monotone arithmetic complexity $2^{Ω(n)}$. This yields the first strongly exponential lower bound on the monotone arithmetic circuit complexity for a polynomial in VP. Before this result, strongly exponential size monotone lower bounds were known only for explicit polynomials in VNP (Gashkov-Sergeev'12, Raz-Yehudayoff'11, Srinivasan'20, Cavalar-Kumar-Rossman'20, Hrubes-Yehudayoff'21).
Recently, Hrubes'20 initiated a program to prove lower bounds against general arithmetic circuits by proving $ε$-sensitive lower bounds for monotone arithmetic circuits for a specific range of values for $ε\in (0,1)$. We consider the spanning tree polynomial $ST_{n}$ defined over the complete graph on $n$ vertices and show that the polynomials $F_{n-1,n} - ε\cdot ST_{n}$ and $F_{n-1,n} + ε\cdot ST_{n}$ defined over $n^2$ variables, have monotone circuit complexity $2^{Ω(n)}$ if $ε\geq 2^{-Ω(n)}$ and $F_{n-1,n} = \prod_{i=2}^n (x_{i,1} +\cdots + x_{i,n})$ is the complete set-multilinear polynomial. This provides the first $ε$-sensitive exponential lower bound for a family of polynomials inside VP. En-route, we consider a problem in 2-party, best partition communication complexity of deciding whether two sets of oriented edges distributed among Alice and Bob form a spanning tree or not. We prove that there exists a fixed distribution, under which the problem has low discrepancy with respect to every nearly-balanced partition. This result could be of interest beyond algebraic complexity.
△ Less
Submitted 14 September, 2021;
originally announced September 2021.
-
Composability of global phase invariant distance and its application to approximation error management
Authors:
Priyanka Mukhopadhyay
Abstract:
Many quantum algorithms can be written as a composition of unitaries, some of which can be exactly synthesized by a universal fault-tolerant gate set, while others can be approximately synthesized. A quantum compiler synthesizes each approximately synthesizable unitary up to some approximation error, such that the error of the overall unitary remains bounded by a certain amount. In this paper we c…
▽ More
Many quantum algorithms can be written as a composition of unitaries, some of which can be exactly synthesized by a universal fault-tolerant gate set, while others can be approximately synthesized. A quantum compiler synthesizes each approximately synthesizable unitary up to some approximation error, such that the error of the overall unitary remains bounded by a certain amount. In this paper we consider the case when the errors are measured in the global phase invariant distance. Apart from deriving a relation between this distance and the Frobenius norm, we show that this distance composes. If a unitary is written as a composition (product and tensor product) of other unitaries, we derive bounds on the error of the overall unitary as a function of the errors of the composed unitaries. Our bound is better than the sum-of-error bound (Bernstein,Vazirani,1997), derived for the operator norm. This indicates that synthesizing a circuit using global phase invariant distance maybe done with less number of resources.
Next we consider the following problem. Suppose we are given a decomposition of a unitary. The task is to distribute the errors in each component such that the T-count is optimized. Specifically, we consider those decompositions where $R_z(θ)$ gates are the only approximately synthesizable component. We prove analytically that for both the operator norm and global phase invariant distance, the error should be distributed equally among these components (given some approximations). The optimal number of T-gates obtained by using the global phase invariant distance is less. Furthermore, we show that in case of approximate Quantum Fourier Transform, the error obtained by pruning rotation gates is less when measured in this distance.
△ Less
Submitted 23 November, 2021; v1 submitted 13 June, 2021;
originally announced June 2021.
-
Celestial-Body Focused Dark Matter Annihilation Throughout the Galaxy
Authors:
Rebecca K. Leane,
Tim Linden,
Payel Mukhopadhyay,
Natalia Toro
Abstract:
Indirect detection experiments typically measure the flux of annihilating dark matter (DM) particles propagating freely through galactic halos. We consider a new scenario where celestial bodies "focus" DM annihilation events, increasing the efficiency of halo annihilation. In this setup, DM is first captured by celestial bodies, such as neutron stars or brown dwarfs, and then annihilates within th…
▽ More
Indirect detection experiments typically measure the flux of annihilating dark matter (DM) particles propagating freely through galactic halos. We consider a new scenario where celestial bodies "focus" DM annihilation events, increasing the efficiency of halo annihilation. In this setup, DM is first captured by celestial bodies, such as neutron stars or brown dwarfs, and then annihilates within them. If DM annihilates to sufficiently long-lived particles, they can escape and subsequently decay into detectable radiation. This produces a distinctive annihilation morphology, which scales as the product of the DM and celestial body densities, rather than as DM density squared. We show that this signal can dominate over the halo annihilation rate in $γ$-ray observations in both the Milky Way Galactic center and globular clusters. We use \textit{Fermi} and H.E.S.S. data to constrain the DM-nucleon scattering cross section, setting powerful new limits down to $\sim10^{-39}~$cm$^2$ for sub-GeV DM using brown dwarfs, which is up to nine orders of magnitude stronger than existing limits. We demonstrate that neutron stars can set limits for TeV-scale DM down to about $10^{-47}~$cm$^2$.
△ Less
Submitted 28 January, 2021;
originally announced January 2021.
-
A (quasi-)polynomial time heuristic algorithm for synthesizing T-depth optimal circuits
Authors:
Vlad Gheorghiu,
Michele Mosca,
Priyanka Mukhopadhyay
Abstract:
We investigate the problem of synthesizing T-depth optimal quantum circuits over the Clifford+T gate set. First we construct a special subset of T-depth 1 unitaries, such that it is possible to express the T-depth-optimal decomposition of any unitary as product of unitaries from this subset and a Clifford (up to global phase). The cardinality of this subset is at most $n\cdot 2^{5.6n}$. We use nes…
▽ More
We investigate the problem of synthesizing T-depth optimal quantum circuits over the Clifford+T gate set. First we construct a special subset of T-depth 1 unitaries, such that it is possible to express the T-depth-optimal decomposition of any unitary as product of unitaries from this subset and a Clifford (up to global phase). The cardinality of this subset is at most $n\cdot 2^{5.6n}$. We use nested meet-in-the-middle (MITM) technique to develop algorithms for synthesizing provably \emph{depth-optimal} and \emph{T-depth-optimal} circuits for exactly implementable unitaries. Specifically, for synthesizing T-depth-optimal circuits, we get an algorithm with space and time complexity $O\left(\left(4^{n^2}\right)^{\lceil d/c\rceil}\right)$ and $O\left(\left(4^{n^2}\right)^{(c-1)\lceil d/c\rceil}\right)$ respectively, where $d$ is the minimum T-depth and $c\geq 2$ is a constant. This is much better than the complexity of the algorithm by Amy et al.(2013), the previous best with a complexity $O\left(\left(3^n\cdot 2^{kn^2}\right)^{\lceil \frac{d}{2}\rceil}\cdot 2^{kn^2}\right)$, where $k>2.5$ is a constant. We design an even more efficient algorithm for synthesizing T-depth-optimal circuits. The claimed efficiency and optimality depends on some conjectures, which have been inspired from the work of Mosca and Mukhopadhyay (2020). To the best of our knowledge, the conjectures are not related to the previous work. Our algorithm has space and time complexity $poly(n,2^{5.6n},d)$ (or $poly(n^{\log n},2^{5.6n},d)$ under some weaker assumptions).
△ Less
Submitted 13 September, 2022; v1 submitted 8 January, 2021;
originally announced January 2021.
-
Reducing the CNOT count for Clifford+T circuits on NISQ architectures
Authors:
Vlad Gheorghiu,
Jiaxin Huang,
Sarah Meng Li,
Michele Mosca,
Priyanka Mukhopadhyay
Abstract:
While mapping a quantum circuit to the physical layer one has to consider the numerous constraints imposed by the underlying hardware architecture. Connectivity of the physical qubits is one such constraint that restricts two-qubit operations, such as CNOT, to "connected" qubits. SWAP gates can be used to place the logical qubits on admissible physical qubits, but they entail a significant increas…
▽ More
While mapping a quantum circuit to the physical layer one has to consider the numerous constraints imposed by the underlying hardware architecture. Connectivity of the physical qubits is one such constraint that restricts two-qubit operations, such as CNOT, to "connected" qubits. SWAP gates can be used to place the logical qubits on admissible physical qubits, but they entail a significant increase in CNOT-count. In this paper we consider the problem of reducing the CNOT-count in Clifford+T circuits on connectivity constrained architectures, like noisy intermediate-scale quantum (NISQ) computing devices. We "slice" the circuit at the position of Hadamard gates and "build" the intermediate {CNOT,T} sub-circuits using Steiner trees, significantly improving on previous methods. We compared the performance of our algorithms while mapping different benchmark and random circuits to some well-known architectures such as 9-qubit square grid, 16-qubit square grid, Rigetti 16-qubit Aspen, 16-qubit IBM QX5 and 20-qubit IBM Tokyo. Our methods give less CNOT-count compared to Qiskit and TKET transpiler as well as using SWAP gates. Assuming most of the errors in a NISQ circuit implementation are due to CNOT errors, then our method would allow circuits with few times more CNOT gates be reliably implemented than the previous methods would permit.
△ Less
Submitted 10 October, 2022; v1 submitted 24 November, 2020;
originally announced November 2020.
-
Near-critical supernova outflows and their neutrino signatures
Authors:
Alexander Friedland,
Payel Mukhopadhyay
Abstract:
We demonstrate that the neutrino-driven outflows inside exploding core-collapse supernovae possess a special property of near-criticality, that is, they are on the edge of forming termination shocks. We derive a novel criterion for the formation of the shock, in terms of the fundamental parameters of the problem: the neutrino luminosity and energy as well as the properties of the protoneutron star…
▽ More
We demonstrate that the neutrino-driven outflows inside exploding core-collapse supernovae possess a special property of near-criticality, that is, they are on the edge of forming termination shocks. We derive a novel criterion for the formation of the shock, in terms of the fundamental parameters of the problem: the neutrino luminosity and energy as well as the properties of the protoneutron star. The criterion provides a unified description of the available numerical results and motivates future simulations. The property of near-criticality makes the neutrino signatures of the termination shocks a sensitive diagnostic of the physical conditions around the PNS several seconds into the explosion. The expected signal at DUNE is found to be statistically significant.
△ Less
Submitted 29 August, 2022; v1 submitted 21 September, 2020;
originally announced September 2020.
-
A polynomial time and space heuristic algorithm for T-count
Authors:
Michele Mosca,
Priyanka Mukhopadhyay
Abstract:
This work focuses on reducing the physical cost of implementing quantum algorithms when using the state-of-the-art fault-tolerant quantum error correcting codes, in particular, those for which implementing the T gate consumes vastly more resources than the other gates in the gate set. More specifically, we consider the group of unitaries that can be exactly implemented by a quantum circuit consist…
▽ More
This work focuses on reducing the physical cost of implementing quantum algorithms when using the state-of-the-art fault-tolerant quantum error correcting codes, in particular, those for which implementing the T gate consumes vastly more resources than the other gates in the gate set. More specifically, we consider the group of unitaries that can be exactly implemented by a quantum circuit consisting of the Clifford+T gate set, a universal gate set. Our primary interest is to compute a circuit for a given $n$-qubit unitary $U$, using the minimum possible number of T gates (called the T-count of unitary $U$). We consider the problem COUNT-T, the optimization version of which aims to find the T-count of $U$. In its decision version the goal is to decide if the T-count is at most some positive integer $m$. Given an oracle for COUNT-T, we can compute a T-count-optimal circuit in time polynomial in the T-count and dimension of $U$. We give a provable classical algorithm that solves COUNT-T (decision) in time $O\left(N^{2(c-1)\lceil\frac{m}{c}\rceil}\text{poly}(m,N)\right)$ and space $O\left(N^{2\lceil\frac{m}{c}\rceil}\text{poly}(m,N)\right)$, where $N=2^n$ and $c\geq 2$. This gives a space-time trade-off for solving this problem with variants of meet-in-the-middle techniques. We also introduce an asymptotically faster multiplication method that shaves a factor of $N^{0.7457}$ off of the overall complexity. Lastly, beyond our improvements to the rigorous algorithm, we give a heuristic algorithm that outputs a T-count-optimal circuit and has space and time complexity $\text{poly}(m,N)$, under some assumptions. While our heuristic method still scales exponentially with the number of qubits (though with a lower exponent, there is a large improvement by going from exponential to polynomial scaling with $m$.
△ Less
Submitted 6 October, 2021; v1 submitted 22 June, 2020;
originally announced June 2020.
-
Equivalence Testing of Weighted Automata over Partially Commutative Monoids
Authors:
V. Arvind,
Abhranil Chatterjee,
Rajit Datta,
Partha Mukhopadhyay
Abstract:
We study \emph{multiplicity equivalence} testing of automata over partially commutative monoids (pc monoids) and show efficient algorithms in special cases, exploiting the structure of the underlying non-commutation graph of the monoid.
Specifically, if the clique cover number of the non-commutation graph (the minimum number of cliques covering the graph) of the pc monoid is a constant, we obtai…
▽ More
We study \emph{multiplicity equivalence} testing of automata over partially commutative monoids (pc monoids) and show efficient algorithms in special cases, exploiting the structure of the underlying non-commutation graph of the monoid.
Specifically, if the clique cover number of the non-commutation graph (the minimum number of cliques covering the graph) of the pc monoid is a constant, we obtain a deterministic quasi-polynomial time algorithm. As a consequence, we also obtain the first deterministic quasi-polynomial time algorithms for multiplicity equivalence testing of $k$-tape automata and for equivalence testing of deterministic $k$-tape automata for constant $k$. Prior to this, a randomized polynomial-time algorithm for the above problems was shown by Worrell [ICALP 2013].
We also consider pc monoids for which the non-commutation graphs have cover consisting of at most $k$ cliques and star graphs for any constant $k$. We obtain randomized polynomial-time algorithm for multiplicity equivalence testing of automata over such monoids.
△ Less
Submitted 31 May, 2020; v1 submitted 20 February, 2020;
originally announced February 2020.
-
Alternative Analysis Methods for Time to Event Endpoints under Non-proportional Hazards: A Comparative Analysis
Authors:
Ray S. Lin,
Ji Lin,
Satrajit Roychoudhury,
Keaven M. Anderson,
Tianle Hu,
Bo Huang,
Larry F Leon,
Jason JZ Liao,
Rong Liu,
Xiaodong Luo,
Pralay Mukhopadhyay,
Rui Qin,
Kay Tatsuoka,
Xuejing Wang,
Yang Wang,
Jian Zhu,
Tai-Tsang Chen,
Renee Iacona,
Cross-Pharma Non-proportional Hazards Working Group
Abstract:
The log-rank test is most powerful under proportional hazards (PH). In practice, non-PH patterns are often observed in clinical trials, such as in immuno-oncology; therefore, alternative methods are needed to restore the efficiency of statistical testing. Three categories of testing methods were evaluated, including weighted log-rank tests, Kaplan-Meier curve-based tests (including weighted Kaplan…
▽ More
The log-rank test is most powerful under proportional hazards (PH). In practice, non-PH patterns are often observed in clinical trials, such as in immuno-oncology; therefore, alternative methods are needed to restore the efficiency of statistical testing. Three categories of testing methods were evaluated, including weighted log-rank tests, Kaplan-Meier curve-based tests (including weighted Kaplan-Meier and Restricted Mean Survival Time, RMST), and combination tests (including Breslow test, Lee's combo test, and MaxCombo test). Nine scenarios representing the PH and various non-PH patterns were simulated. The power, type I error, and effect estimates of each method were compared. In general, all tests control type I error well. There is not a single most powerful test across all scenarios. In the absence of prior knowledge regarding the PH or non-PH patterns, the MaxCombo test is relatively robust across patterns. Since the treatment effect changes overtime under non-PH, the overall profile of the treatment effect may not be represented comprehensively based on a single measure. Thus, multiple measures of the treatment effect should be pre-specified as sensitivity analyses to evaluate the totality of the data.
△ Less
Submitted 20 September, 2019;
originally announced September 2019.
-
On Explicit Branching Programs for the Rectangular Determinant and Permanent Polynomials
Authors:
V. Arvind,
Abhranil Chatterjee,
Rajit Datta,
Partha Mukhopadhyay
Abstract:
We study the arithmetic circuit complexity of some well-known family of polynomials through the lens of parameterized complexity. Our main focus is on the construction of explicit algebraic branching programs (ABP) for determinant and permanent polynomials of the \emph{rectangular} symbolic matrix in both commutative and noncommutative settings. The main results are:
1. We show an explicit…
▽ More
We study the arithmetic circuit complexity of some well-known family of polynomials through the lens of parameterized complexity. Our main focus is on the construction of explicit algebraic branching programs (ABP) for determinant and permanent polynomials of the \emph{rectangular} symbolic matrix in both commutative and noncommutative settings. The main results are:
1. We show an explicit $O^{*}({n\choose {\downarrow k/2}})$-size ABP construction for noncommutative permanent polynomial of $k\times n$ symbolic matrix. We obtain this via an explicit ABP construction of size $O^{*}({n\choose {\downarrow k/2}})$ for $S_{n,k}^*$, noncommutative symmetrized version of the elementary symmetric polynomial $S_{n,k}$.
2. We obtain an explicit $O^{*}(2^k)$-size ABP construction for the commutative rectangular determinant polynomial of the $k\times n$ symbolic matrix.
3. In contrast, we show that evaluating the rectangular noncommutative determinant over rational matrices is $W[1]$-hard.
△ Less
Submitted 22 August, 2019;
originally announced August 2019.
-
Robust Design and Analysis of Clinical Trials With Non-proportional Hazards: A Straw Man Guidance from a Cross-pharma Working Group
Authors:
Satrajit Roychoudhury,
Keaven M Anderson,
Jiabu Ye,
Pralay Mukhopadhyay
Abstract:
Loss of power and clear description of treatment differences are key issues in designing and analyzing a clinical trial where non-proportional hazard is a possibility. A log-rank test may be very inefficient and interpretation of the hazard ratio estimated using Cox regression is potentially problematic. In this case, the current ICH E9 (R1) addendum would suggest designing a trial with a clinical…
▽ More
Loss of power and clear description of treatment differences are key issues in designing and analyzing a clinical trial where non-proportional hazard is a possibility. A log-rank test may be very inefficient and interpretation of the hazard ratio estimated using Cox regression is potentially problematic. In this case, the current ICH E9 (R1) addendum would suggest designing a trial with a clinically relevant estimand, e.g., expected life gain. This approach considers appropriate analysis methods for supporting the chosen estimand. However, such an approach is case specific and may suffer lack of power for important choices of the underlying alternate hypothesis distribution. On the other hand, there may be a desire to have robust power under different deviations from proportional hazards. Also, we would contend that no single number adequately describes treatment effect under non-proportional hazards scenarios. The cross-pharma working group has proposed a combination test to provide robust power under a variety of alternative hypotheses. These can be specified for primary analysis at the design stage and methods appropriately accounting for combination test correlations are efficient for a variety of scenarios. We have provided design and analysis considerations based on a combination test under different non-proportional hazard types and present a straw man proposal for practitioners. The proposals are illustrated with real life example and simulation.
△ Less
Submitted 12 January, 2021; v1 submitted 19 August, 2019;
originally announced August 2019.
-
The Projection Games Conjecture and the Hardness of Approximation of super-SAT and related problems
Authors:
Priyanka Mukhopadhyay
Abstract:
The Super-SAT or SSAT problem was introduced by Dinur et al.(2002,2003) to prove the NP-hardness of approximation of two popular lattice problems - Shortest Vector Problem(SVP) and Closest Vector Problem(CVP). They conjectured that SSAT is NP-hard to approximate to within a factor of $n^c$ ($c>0$ is constant), where $n$ is the size of the SSAT instance. In this paper we prove this conjecture assum…
▽ More
The Super-SAT or SSAT problem was introduced by Dinur et al.(2002,2003) to prove the NP-hardness of approximation of two popular lattice problems - Shortest Vector Problem(SVP) and Closest Vector Problem(CVP). They conjectured that SSAT is NP-hard to approximate to within a factor of $n^c$ ($c>0$ is constant), where $n$ is the size of the SSAT instance. In this paper we prove this conjecture assuming the Projection Games Conjecture(PGC), given by Moshkovitz (2012). This implies hardness of approximation of SVP and CVP within polynomial factors, assuming PGC. We also reduce SSAT to the Nearest Codeword Problem(NCP) and Learning Halfspace Problem(LHP), as considered by Arora et al.(1997). This proves that both these problems are NP-hard to approximate within a factor of $N^{c'/\log\log n}$($c'>0$ is constant) where $N$ is the size of the instances of the respective problems. Assuming PGC these problems are proved to be NP-hard to approximate within polynomial factors.
△ Less
Submitted 5 October, 2021; v1 submitted 11 July, 2019;
originally announced July 2019.
-
Faster provable sieving algorithms for the Shortest Vector Problem and the Closest Vector Problem on lattices in $\ell_p$ norm
Authors:
Priyanka Mukhopadhyay
Abstract:
In this work, we give provable sieving algorithms for the Shortest Vector Problem (SVP) and the Closest Vector Problem (CVP) on lattices in $\ell_p$ norm ($1\leq p\leq\infty$). The running time we obtain is better than existing provable sieving algorithms. We give a new linear sieving procedure that works for all $\ell_p$ norm ($1\leq p\leq\infty$). The main idea is to divide the space into hyperc…
▽ More
In this work, we give provable sieving algorithms for the Shortest Vector Problem (SVP) and the Closest Vector Problem (CVP) on lattices in $\ell_p$ norm ($1\leq p\leq\infty$). The running time we obtain is better than existing provable sieving algorithms. We give a new linear sieving procedure that works for all $\ell_p$ norm ($1\leq p\leq\infty$). The main idea is to divide the space into hypercubes such that each vector can be mapped efficiently to a sub-region. We achieve a time complexity of $2^{2.751n+o(n)}$, which is much less than the $2^{3.849n+o(n)}$ complexity of the previous best algorithm.
We also introduce a mixed sieving procedure, where a point is mapped to a hypercube within a ball and then a quadratic sieve is performed within each hypercube. This improves the running time, especially in the $\ell_2$ norm, where we achieve a time complexity of $2^{2.25n+o(n)}$, while the List Sieve Birthday algorithm has a running time of $2^{2.465n+o(n)}$.
We adopt our sieving techniques to approximation algorithms for SVP and CVP in $\ell_p$ norm ($1\leq p\leq\infty$) and show that our algorithm has a running time of $2^{2.001n+o(n)}$, while previous algorithms have a time complexity of $2^{3.169n+o(n)}$.
△ Less
Submitted 18 December, 2021; v1 submitted 9 July, 2019;
originally announced July 2019.
-
Efficient Black-Box Identity Testing over Free Group Algebra
Authors:
V. Arvind,
Abhranil Chatterjee,
Rajit Datta,
Partha Mukhopadhyay
Abstract:
Hrubeš and Wigderson [HW14] initiated the study of noncommutative arithmetic circuits with division computing a noncommutative rational function in the free skew field, and raised the question of rational identity testing. It is now known that the problem can be solved in deterministic polynomial time in the white-box model for noncommutative formulas with inverses, and in randomized polynomial ti…
▽ More
Hrubeš and Wigderson [HW14] initiated the study of noncommutative arithmetic circuits with division computing a noncommutative rational function in the free skew field, and raised the question of rational identity testing. It is now known that the problem can be solved in deterministic polynomial time in the white-box model for noncommutative formulas with inverses, and in randomized polynomial time in the black-box model [GGOW16, IQS18, DM18], where the running time is polynomial in the size of the formula. The complexity of identity testing of noncommutative rational functions remains open in general (when the formula size is not polynomially bounded). We solve the problem for a natural special case. We consider polynomial expressions in the free group algebra $\mathbb{F}\langle X, X^{-1}\rangle$ where $X=\{x_1, x_2, \ldots, x_n\}$, a subclass of rational expressions of inversion height one. Our main results are the following. 1. Given a degree $d$ expression $f$ in $\mathbb{F}\langle X, X^{-1}\rangle$ as a black-box, we obtain a randomized $\text{poly}(n,d)$ algorithm to check whether $f$ is an identically zero expression or not. We obtain this by generalizing the Amitsur-Levitzki theorem [AL50] to $\mathbb{F}\langle X, X^{-1}\rangle$. This also yields a deterministic identity testing algorithm (and even an expression reconstruction algorithm) that is polynomial time in the sparsity of the input expression. 2. Given an expression $f$ in $\mathbb{F}\langle X, X^{-1}\rangle$ of degree at most $D$, and sparsity $s$, as black-box, we can check whether $f$ is identically zero or not in randomized $\text{poly}(n,\log s, \log D)$ time.
△ Less
Submitted 28 April, 2019;
originally announced April 2019.
-
Univariate Ideal Membership Parameterized by Rank, Degree, and Number of Generators
Authors:
V. Arvind,
Abhranil Chatterjee,
Rajit Datta,
Partha Mukhopadhyay
Abstract:
Let $\mathbb{F}[X]$ be the polynomial ring over the variables $X=\{x_1,x_2, \ldots, x_n\}$. An ideal $I=\langle p_1(x_1), \ldots, p_n(x_n)\rangle$ generated by univariate polynomials $\{p_i(x_i)\}_{i=1}^n$ is a \emph{univariate ideal}. We study the ideal membership problem for the univariate ideals and show the following results.
\item Let $f(X)\in\mathbb{F}[\ell_1, \ldots, \ell_r]$ be a (low ra…
▽ More
Let $\mathbb{F}[X]$ be the polynomial ring over the variables $X=\{x_1,x_2, \ldots, x_n\}$. An ideal $I=\langle p_1(x_1), \ldots, p_n(x_n)\rangle$ generated by univariate polynomials $\{p_i(x_i)\}_{i=1}^n$ is a \emph{univariate ideal}. We study the ideal membership problem for the univariate ideals and show the following results.
\item Let $f(X)\in\mathbb{F}[\ell_1, \ldots, \ell_r]$ be a (low rank) polynomial given by an arithmetic circuit where $\ell_i : 1\leq i\leq r$ are linear forms, and $I=\langle p_1(x_1), \ldots, p_n(x_n)\rangle$ be a univariate ideal. Given $\vecα\in {\mathbb{F}}^n$, the (unique) remainder $f(X) \pmod I$ can be evaluated at $\vecα$ in deterministic time $d^{O(r)}\cdot poly(n)$, where $d=\max\{°(f),°(p_1)\ldots,°(p_n)\}$. This yields an $n^{O(r)}$ algorithm for minimum vertex cover in graphs with rank-$r$ adjacency matrices. It also yields an $n^{O(r)}$ algorithm for evaluating the permanent of a $n\times n$ matrix of rank $r$, over any field $\mathbb{F}$. Over $\mathbb{Q}$, an algorithm of similar run time for low rank permanent is due to Barvinok[Bar96] via a different technique.
\item Let $f(X)\in\mathbb{F}[X]$ be given by an arithmetic circuit of degree $k$ ($k$ treated as fixed parameter) and $I=\langle p_1(x_1), \ldots, p_n(x_n)\rangle$. We show in the special case when $I=\langle x_1^{e_1}, \ldots, x_n^{e_n}\rangle$, we obtain a randomized $O^*(4.08^k)$ algorithm that uses $poly(n,k)$ space.
\item Given $f(X)\in\mathbb{F}[X]$ by an arithmetic circuit and $I=\langle p_1(x_1), \ldots, p_k(x_k) \rangle$, membership testing is $W[1]$-hard, parameterized by $k$. The problem is $MINI[1]$-hard in the special case when $I=\langle x_1^{e_1}, \ldots, x_k^{e_k}\rangle$.
△ Less
Submitted 21 September, 2018; v1 submitted 31 August, 2018;
originally announced August 2018.
-
Fast Exact Algorithms Using Hadamard Product of Polynomials
Authors:
V. Arvind,
Abhranil Chatterjee,
Rajit Datta,
Partha Mukhopadhyay
Abstract:
Let $C$ be an arithmetic circuit of $poly(n)$ size given as input that computes a polynomial $f\in\mathbb{F}[X]$, where $X=\{x_1,x_2,\ldots,x_n\}$ and $\mathbb{F}$ is any field where the field arithmetic can be performed efficiently. We obtain new algorithms for the following two problems first studied by Koutis and Williams \cite{Kou08, Wi09, KW16}. k-MLC: Compute the sum of the coefficients of a…
▽ More
Let $C$ be an arithmetic circuit of $poly(n)$ size given as input that computes a polynomial $f\in\mathbb{F}[X]$, where $X=\{x_1,x_2,\ldots,x_n\}$ and $\mathbb{F}$ is any field where the field arithmetic can be performed efficiently. We obtain new algorithms for the following two problems first studied by Koutis and Williams \cite{Kou08, Wi09, KW16}. k-MLC: Compute the sum of the coefficients of all degree-$k$ multilinear monomials in the polynomial $f$. k-MMD: Test if there is a nonzero degree-$k$ multilinear monomial in the polynomial $f$.
Our algorithms are based on the fact that the Hadamard product $f\circ S_{n,k}$, is the degree-$k$ multilinear part of $f$, where $S_{n,k}$ is the $k^{th}$ elementary symmetric polynomial.
1. For k-MLC problem, we give a deterministic algorithm of run time $O^*(n^{k/2+c\log k})$ (where $c$ is a constant), answering an open question of Koutis and Williams \cite[ICALP'09]{KW16}. As corollaries, we show $O^*(\binom{n}{\downarrow k/2})$-time exact counting algorithms for several combinatorial problems: k-Tree, t-Dominating Set, m-Dimensional k-Matching.
2. For k-MMD problem, we give a randomized algorithm of run time $4.32^k\cdot poly(n,k)$. Our algorithm uses only $poly(n,k)$ space. This matches the run time of a recent algorithm \cite{BDH18} for $k-MMD$ which requires exponential (in $k$) space.
Other results include fast deterministic algorithms for k-MLC and k-MMD problems for depth three circuits.
△ Less
Submitted 1 June, 2020; v1 submitted 12 July, 2018;
originally announced July 2018.
-
A Note on Polynomial Identity Testing for Depth-3 Circuits
Authors:
V. Arvind,
Abhranil Chatterjee,
Rajit Datta,
Partha Mukhopadhyay
Abstract:
Let $C$ be a depth-3 arithmetic circuit of size at most $s$, computing a polynomial $ f \in \mathbb{F}[x_1,\ldots, x_n] $ (where $\mathbb{F}$ = $\mathbb{Q}$ or $\mathbb{C}$) and the fan-in of the product gates of $C$ is bounded by $d$. We give a deterministic polynomial identity testing algorithm to check whether $f\equiv 0$ or not in time $ 2^d \text{ poly}(n,s) $.
Let $C$ be a depth-3 arithmetic circuit of size at most $s$, computing a polynomial $ f \in \mathbb{F}[x_1,\ldots, x_n] $ (where $\mathbb{F}$ = $\mathbb{Q}$ or $\mathbb{C}$) and the fan-in of the product gates of $C$ is bounded by $d$. We give a deterministic polynomial identity testing algorithm to check whether $f\equiv 0$ or not in time $ 2^d \text{ poly}(n,s) $.
△ Less
Submitted 20 May, 2018; v1 submitted 17 May, 2018;
originally announced May 2018.
-
Carter Constant and Superintegrability
Authors:
Payel Mukhopadhyay,
Rajesh Kumble Nayak
Abstract:
Carter constant is a non-trivial conserved quantity of motion of a particle moving in stationary axisymmetric spacetime. In the version of the theorem originally given by Carter, due to the presence of two Killing vectors, the system effectively has two degrees of freedom. We propose an extension to the first version of Carter's theorem to a system having three degrees of freedom to find two funct…
▽ More
Carter constant is a non-trivial conserved quantity of motion of a particle moving in stationary axisymmetric spacetime. In the version of the theorem originally given by Carter, due to the presence of two Killing vectors, the system effectively has two degrees of freedom. We propose an extension to the first version of Carter's theorem to a system having three degrees of freedom to find two functionally independent Carter-like integrals of motion. We further generalize the theorem to a dynamical system with $N$ degrees of freedom. We further study the implications of Carter Constant to Superintegrability and present a different approach to probe a Superintegrable system. Our formalism gives another viewpoint to a Superintegrable system using the simple observation of separable Hamiltonian according to Carter's criteria. We then give some examples by constructing some 2-Dimensional superintegrable systems based on this idea and also show that all 3-D simple classical Superintegrable potentials are also Carter separable.
△ Less
Submitted 22 April, 2018;
originally announced April 2018.
-
Improved algorithms for the Shortest Vector Problem and the Closest Vector Problem in the infinity norm
Authors:
Divesh Aggarwal,
Priyanka Mukhopadhyay
Abstract:
Blomer and Naewe[BN09] modified the randomized sieving algorithm of Ajtai, Kumar and Sivakumar[AKS01] to solve the shortest vector problem (SVP). The algorithm starts with $N = 2^{O(n)}$ randomly chosen vectors in the lattice and employs a sieving procedure to iteratively obtain shorter vectors in the lattice. The running time of the sieving procedure is quadratic in $N$.
We study this problem f…
▽ More
Blomer and Naewe[BN09] modified the randomized sieving algorithm of Ajtai, Kumar and Sivakumar[AKS01] to solve the shortest vector problem (SVP). The algorithm starts with $N = 2^{O(n)}$ randomly chosen vectors in the lattice and employs a sieving procedure to iteratively obtain shorter vectors in the lattice. The running time of the sieving procedure is quadratic in $N$.
We study this problem for the special but important case of the $\ell_\infty$ norm. We give a new sieving procedure that runs in time linear in $N$, thereby significantly improving the running time of the algorithm for SVP in the $\ell_\infty$ norm. As in [AKS02,BN09], we also extend this algorithm to obtain significantly faster algorithms for approximate versions of the shortest vector problem and the closest vector problem (CVP) in the $\ell_\infty$ norm.
We also show that the heuristic sieving algorithms of Nguyen and Vidick[NV08] and Wang et al.[WLTB11] can also be analyzed in the $\ell_{\infty}$ norm. The main technical contribution in this part is to calculate the expected volume of intersection of a unit ball centred at origin and another ball of a different radius centred at a uniformly random point on the boundary of the unit ball. This might be of independent interest.
△ Less
Submitted 15 May, 2018; v1 submitted 8 January, 2018;
originally announced January 2018.
-
A Composition Theorem for Randomized Query Complexity
Authors:
Anurag Anshu,
Dmitry Gavinsky,
Rahul Jain,
Srijita Kundu,
Troy Lee,
Priyanka Mukhopadhyay,
Miklos Santha,
Swagato Sanyal
Abstract:
Let the randomized query complexity of a relation for error probability $ε$ be denoted by $R_ε(\cdot)$. We prove that for any relation $f \subseteq \{0,1\}^n \times \mathcal{R}$ and Boolean function $g:\{0,1\}^m \rightarrow \{0,1\}$, $R_{1/3}(f\circ g^n) = Ω(R_{4/9}(f)\cdot R_{1/2-1/n^4}(g))$, where $f \circ g^n$ is the relation obtained by composing $f$ and $g$. We also show that…
▽ More
Let the randomized query complexity of a relation for error probability $ε$ be denoted by $R_ε(\cdot)$. We prove that for any relation $f \subseteq \{0,1\}^n \times \mathcal{R}$ and Boolean function $g:\{0,1\}^m \rightarrow \{0,1\}$, $R_{1/3}(f\circ g^n) = Ω(R_{4/9}(f)\cdot R_{1/2-1/n^4}(g))$, where $f \circ g^n$ is the relation obtained by composing $f$ and $g$. We also show that $R_{1/3}\left(f \circ \left(g^\oplus_{O(\log n)}\right)^n\right)=Ω(\log n \cdot R_{4/9}(f) \cdot R_{1/3}(g))$, where $g^\oplus_{O(\log n)}$ is the function obtained by composing the xor function on $O(\log n)$ bits and $g^t$.
△ Less
Submitted 14 June, 2017; v1 submitted 1 June, 2017;
originally announced June 2017.
-
Efficient Identity Testing and Polynomial Factorization over Non-associative Free Rings
Authors:
V. Arvind,
Rajit Datta,
Partha Mukhopadhyay,
S. Raja
Abstract:
In this paper we study arithmetic computations in the nonassociative, and noncommutative free polynomial ring $\mathbb{F}\{x_1,x_2,\ldots,x_n\}$. Prior to this work, nonassociative arithmetic computation was considered by Hrubes, Wigderson, and Yehudayoff [HWY10], and they showed lower bounds and proved completeness results. We consider Polynomial Identity Testing (PIT) and polynomial factorizatio…
▽ More
In this paper we study arithmetic computations in the nonassociative, and noncommutative free polynomial ring $\mathbb{F}\{x_1,x_2,\ldots,x_n\}$. Prior to this work, nonassociative arithmetic computation was considered by Hrubes, Wigderson, and Yehudayoff [HWY10], and they showed lower bounds and proved completeness results. We consider Polynomial Identity Testing (PIT) and polynomial factorization over $\mathbb{F}\{x_1,x_2,\ldots,x_n\}$ and show the following results. (1) Given an arithmetic circuit $C$ of size $s$ computing a polynomial $f\in \mathbb{F} \{x_1,x_2,\ldots,x_n\}$ of degree $d$, we give a deterministic $poly(n,s,d)$ algorithm to decide if $f$ is identically zero polynomial or not. Our result is obtained by a suitable adaptation of the PIT algorithm of Raz-Shpilka [RS05] for noncommutative ABPs. (2) Given an arithmetic circuit $C$ of size $s$ computing a polynomial $f\in \mathbb{F} \{x_1,x_2,\ldots,x_n\}$ of degree $d$, we give an efficient deterministic algorithm to compute circuits for the irreducible factors of $f$ in time $poly(n,s,d)$ when $\mathbb{F}=\mathbb{Q}$. Over finite fields of characteristic $p$, our algorithm runs in time $poly(n,s,d,p)$.
△ Less
Submitted 6 July, 2017; v1 submitted 29 April, 2017;
originally announced May 2017.
-
Lifting randomized query complexity to randomized communication complexity
Authors:
Anurag Anshu,
Naresh B. Goud,
Rahul Jain,
Srijita Kundu,
Priyanka Mukhopadhyay
Abstract:
We show that for a relation $f\subseteq \{0,1\}^n\times \mathcal{O}$ and a function $g:\{0,1\}^{m}\times \{0,1\}^{m} \rightarrow \{0,1\}$ (with $m= O(\log n)$), $$\mathrm{R}_{1/3}(f\circ g^n) = Ω\left(\mathrm{R}_{1/3}(f) \cdot \left(\log\frac{1}{\mathrm{disc}(M_g)} - O(\log n)\right)\right),$$ where $f\circ g^n$ represents the composition of $f$ and $g^n$, $M_g$ is the sign matrix for $g$,…
▽ More
We show that for a relation $f\subseteq \{0,1\}^n\times \mathcal{O}$ and a function $g:\{0,1\}^{m}\times \{0,1\}^{m} \rightarrow \{0,1\}$ (with $m= O(\log n)$), $$\mathrm{R}_{1/3}(f\circ g^n) = Ω\left(\mathrm{R}_{1/3}(f) \cdot \left(\log\frac{1}{\mathrm{disc}(M_g)} - O(\log n)\right)\right),$$ where $f\circ g^n$ represents the composition of $f$ and $g^n$, $M_g$ is the sign matrix for $g$, $\mathrm{disc}(M_g)$ is the discrepancy of $M_g$ under the uniform distribution and $\mathrm{R}_{1/3}(f)$ ($\mathrm{R}_{1/3}(f\circ g^n)$) denotes the randomized query complexity of $f$ (randomized communication complexity of $f\circ g^n$) with worst case error $\frac{1}{3}$.
In particular, this implies that for a relation $f\subseteq \{0,1\}^n\times \mathcal{O}$, $$\mathrm{R}_{1/3}(f\circ \mathrm{IP}_m^n) = Ω\left(\mathrm{R}_{1/3}(f) \cdot m\right),$$ where $\mathrm{IP}_m:\{0,1\}^m\times \{0,1\}^m\rightarrow \{0,1\}$ is the Inner Product (modulo $2$) function and $m= O(\log(n))$.
△ Less
Submitted 20 January, 2018; v1 submitted 22 March, 2017;
originally announced March 2017.
-
Error tracing in linear and concatenated quantum circuits
Authors:
Ritajit Majumdar,
Saikat Basu,
Priyanka Mukhopadhyay,
Susmita Sur-Kolay
Abstract:
Descriptions of quantum algorithms, communication etc. protocols assume the existence of closed quantum system. However, real life quantum systems are open and are highly sensitive to errors. Hence error correction is of utmost importance if quantum computation is to be carried out in reality. Ideally, an error correction block should be placed after every gate operation in a quantum circuit. This…
▽ More
Descriptions of quantum algorithms, communication etc. protocols assume the existence of closed quantum system. However, real life quantum systems are open and are highly sensitive to errors. Hence error correction is of utmost importance if quantum computation is to be carried out in reality. Ideally, an error correction block should be placed after every gate operation in a quantum circuit. This increases the overhead and reduced the speedup of the quantum circuit. Moreover, the error correction blocks themselves may induce errors as the gates used for error correction may be noisy. In this paper, we have proposed a procedure to trace error probability due to noisy gates and decoherence in quantum circuit and place an error correcting block only when the error probability exceeds a certain threshold. This procedure shows a drastic reduction in the required number of error correcting blocks. Furthermore, we have considered concatenated codes with tile structure layout lattice architecture[25][21],[24] and SWAP gate based qubit transport mechanism. Tracing errors in higher levels of concatenation shows that, in most cases, after 1 or 2 levels of concatenation, the number of QECC blocks required become static. However, since the gate count increases with increasing concatenation, the percentage saving in gate count is considerably high.
△ Less
Submitted 23 December, 2016;
originally announced December 2016.
-
Identity Testing for +-Regular Noncommutative Arithmetic Circuits
Authors:
Vikraman Arvind,
Pushkar Joglekar,
Partha Mukhopadhyay,
S Raja
Abstract:
An efficient randomized polynomial identity test for noncommutative polynomials given by noncommutative arithmetic circuits remains an open problem. The main bottleneck to applying known techniques is that a noncommutative circuit of size $s$ can compute a polynomial of degree exponential in $s$ with a double-exponential number of nonzero monomials. In this paper, we report some progress by dealin…
▽ More
An efficient randomized polynomial identity test for noncommutative polynomials given by noncommutative arithmetic circuits remains an open problem. The main bottleneck to applying known techniques is that a noncommutative circuit of size $s$ can compute a polynomial of degree exponential in $s$ with a double-exponential number of nonzero monomials. In this paper, we report some progress by dealing with two natural subcases (both allow for polynomials of exponential degree and a double exponential number of monomials): (1) We consider \emph{$+$-regular} noncommutative circuits: these are homogeneous noncommutative circuits with the additional property that all the $+$-gates are layered, and in each $+$-layer all gates have the same syntactic degree. We give a \emph{white-box} polynomial-time deterministic polynomial identity test for such circuits. Our algorithm combines some new structural results for $+$-regular circuits with known results for noncommutative ABP identity testing [RS05PIT], rank bound of commutative depth three identities [SS13], and equivalence testing problem for words [Loh15, MSU97, Pla94]. (2) Next, we consider $ΣΠ^*Σ$ noncommutative circuits: these are noncommutative circuits with layered $+$-gates such that there are only two layers of $+$-gates. These $+$-layers are the output $+$-gate and linear forms at the bottom layer; between the $+$-layers the circuit could have any number of $\times$ gates. We given an efficient randomized \emph{black-box} identity testing problem for $ΣΠ^*Σ$ circuits. In particular, we show if $f\in F<Z>$ is a nonzero noncommutative polynomial computed by a $ΣΠ^*Σ$ circuit of size $s$, then $f$ cannot be a polynomial identity for the matrix algebra $\mathbb{M}_s(F)$, where the field $F$ is a sufficiently large extension of $F$ depending on the degree of $f$.
△ Less
Submitted 22 November, 2016;
originally announced November 2016.
-
General Construction of Tubular Geometry
Authors:
Partha Mukhopadhyay
Abstract:
We consider the problem of locally describing tubular geometry around a submanifold embedded in a (pseudo)Riemannian manifold in its general form. Given the geometry of ambient space in an arbitrary coordinate system and equations determining the submanifold in the same system, we compute the tubular expansion coefficients in terms of this {\it a priori data}. This is done by using an indirect met…
▽ More
We consider the problem of locally describing tubular geometry around a submanifold embedded in a (pseudo)Riemannian manifold in its general form. Given the geometry of ambient space in an arbitrary coordinate system and equations determining the submanifold in the same system, we compute the tubular expansion coefficients in terms of this {\it a priori data}. This is done by using an indirect method that crucially applies the tubular expansion theorem for vielbein previously derived. With an explicit construction involving the relevant coordinate and non-coordinate frames we verify consistency of the whole method up to quadratic order in vielbein expansion. Furthermore, we perform certain (long and tedious) higher order computation which verifies the first non-trivial spin connection term in the expansion for the first time. Earlier a similar method was used to compute tubular geometry in loop space. We explain this work in the light of our general construction.
△ Less
Submitted 26 August, 2016;
originally announced August 2016.
-
Randomized Polynomial Time Identity Testing for Noncommutative Circuits
Authors:
V. Arvind,
Partha Mukhopadhyay,
S. Raja
Abstract:
In this paper we show that the black-box polynomial identity testing for noncommutative polynomials $f\in\mathbb{F}\langle z_1,z_2,\cdots,z_n \rangle$ of degree $D$ and sparsity $t$, can be done in randomized $\poly(n,\log t,\log D)$ time. As a consequence, if the black-box contains a circuit $C$ of size $s$ computing $f\in\mathbb{F}\langle z_1,z_2,\cdots,z_n \rangle$ which has at most $t$ non-zer…
▽ More
In this paper we show that the black-box polynomial identity testing for noncommutative polynomials $f\in\mathbb{F}\langle z_1,z_2,\cdots,z_n \rangle$ of degree $D$ and sparsity $t$, can be done in randomized $\poly(n,\log t,\log D)$ time. As a consequence, if the black-box contains a circuit $C$ of size $s$ computing $f\in\mathbb{F}\langle z_1,z_2,\cdots,z_n \rangle$ which has at most $t$ non-zero monomials, then the identity testing can be done by a randomized algorithm with running time polynomial in $s$ and $n$ and $\log t$. This makes significant progress on a question that has been open for over ten years.
The earlier result by Bogdanov and Wee [BW05], using the classical Amitsur-Levitski theorem, gives a randomized polynomial-time algorithm only for circuits of polynomially bounded syntactic degree. In our result, we place no restriction on the degree of the circuit.
Our algorithm is based on automata-theoretic ideas introduced in [AMS08,AM08]. In those papers, the main idea was to construct deterministic finite automata that isolate a single monomial from the set of nonzero monomials of a polynomial $f$ in $\mathbb{F}\langle z_1,z_2,\cdots,z_n \rangle$. In the present paper, since we need to deal with exponential degree monomials, we carry out a different kind of monomial isolation using nondeterministic automata.
△ Less
Submitted 6 June, 2016; v1 submitted 2 June, 2016;
originally announced June 2016.
-
Quark stars admixed with dark matter
Authors:
Payel Mukhopadhyay,
Juregen Schaffner-Bielich
Abstract:
Compact stars consisting of massless quark matter and fermionic dark matter are studied by solving the Tolman-Oppenheimer-Volkoff equations for two fluids separately. Dark matter is further investigated by incorporating inter-fermionic interactions among the dark matter particles. The properties of stars made of quark matter particles and self-interacting and free dark matter particles are explore…
▽ More
Compact stars consisting of massless quark matter and fermionic dark matter are studied by solving the Tolman-Oppenheimer-Volkoff equations for two fluids separately. Dark matter is further investigated by incorporating inter-fermionic interactions among the dark matter particles. The properties of stars made of quark matter particles and self-interacting and free dark matter particles are explored by obtaining their mass-radius relations. The regions of stability for such a compact star are determined and it is demonstrated that the maximum stable total mass of such a star decreases approximately linearly with increasing dark matter fraction.
△ Less
Submitted 1 November, 2015;
originally announced November 2015.
-
Dynamic and rate-dependent yielding behavior of Co0.9Ni0.1 nanocluster based magnetorheological fluids
Authors:
Injamamul Arief,
Rasmita Sahoo,
P. K. Mukhopadhyay
Abstract:
In this paper we performed steady shear and oscillatory magnetorheological (MR) studies in magnetic fluids containing CoNi nanoclusters of 450 nm in diameter. Co-rich nanoclusters were synthesized by conventional homogeneous nucleation without any external surfactant or reducing agent in liquid polyol at elevated temperature. The x-ray diffraction, energy dispersive X-Ray analysis, scanning and tr…
▽ More
In this paper we performed steady shear and oscillatory magnetorheological (MR) studies in magnetic fluids containing CoNi nanoclusters of 450 nm in diameter. Co-rich nanoclusters were synthesized by conventional homogeneous nucleation without any external surfactant or reducing agent in liquid polyol at elevated temperature. The x-ray diffraction, energy dispersive X-Ray analysis, scanning and transmission electron microscopy studies were done for analyzing the sample composition and morphology. Two variants of fluid samples were prepared by dispersing 15 vol% and 20 Vol% of CoNi powders in castor oil. Room temperature steady magnetoshear studies indicate viscoplastic behavior with stronger dependence of static yield stress on magnetization than a dipolar coupling that was operational in the dynamic yield stress. Magnetosweep measurements at constant shear rate showed interesting relaxation at high magnetic fields. We also explored dynamical elastic behavior through oscillatory magnetorheological studies under both strain sweep and frequency sweep modes, and showed glass transition like phenomenon occurring in them above critical shear amplitudes.
△ Less
Submitted 22 July, 2015; v1 submitted 28 May, 2015;
originally announced May 2015.
-
Steady shear magnetorheology in Co0.9Ni0.1 nanocluster-based MR fluids at elevated temperatures
Authors:
Injamamul Arief,
P. K. Mukhopadhyay
Abstract:
In this paper, we present the study of magnetorheological properties of magnetic fluids containing Co0.9Ni0.1 nanocluster that have been measured as a function of both magnetic field and temperature. Co-rich nanoclusters were synthesized by conventional homogeneous nucleation in liquid polyol. Morphological characterization using FESEM revealed the non-aggregated nature of nanoclusters with an ave…
▽ More
In this paper, we present the study of magnetorheological properties of magnetic fluids containing Co0.9Ni0.1 nanocluster that have been measured as a function of both magnetic field and temperature. Co-rich nanoclusters were synthesized by conventional homogeneous nucleation in liquid polyol. Morphological characterization using FESEM revealed the non-aggregated nature of nanoclusters with an average diameter of 450 nm. Crystal structure and room temperature magnetization measurements were performed by powder XRD and vibrating sample magnetometry (VSM). Two MR samples of different particle volume fractions were prepared. Temperature-dependent steady shear MR characterizations for both the samples in the range of 250C-550C demonstrated systematic decline of MR parameters with increasing temperatures. The temperature-induced thinning of shear stress and viscosity was explained in terms of change in effective volume fraction and magnetic saturation. To analyze the measured variation in MR response with increasing temperature, suitable temperature-sensitive scaling parameters were also constructed. Finally to generalize the trend, rheological master curves were constructed by using time-temperature-field superposition method.
△ Less
Submitted 28 May, 2015;
originally announced May 2015.
-
Magnetorheological Payne effect in bidisperse MR fluids containing Fe nanorods and Fe3O4 nanospheres: a dynamic rheological study
Authors:
Injamamul Arief,
P. K. Mukhopadhyay
Abstract:
The spherical Fe3O4 with 300 nm in diameter was synthesized by typical thermal decomposition of Fe (III) organo-metallic precursor in polyol and polyacrylic acid. Fe-nanorods were prepared by reducing Fe (III) nitrate in presence of polyol-hydrazine-CTAB. Morphology and magnetic characterization of the nanoparticles were performed by ESEM, XRD and VSM studies. We performed detailed non-linear magn…
▽ More
The spherical Fe3O4 with 300 nm in diameter was synthesized by typical thermal decomposition of Fe (III) organo-metallic precursor in polyol and polyacrylic acid. Fe-nanorods were prepared by reducing Fe (III) nitrate in presence of polyol-hydrazine-CTAB. Morphology and magnetic characterization of the nanoparticles were performed by ESEM, XRD and VSM studies. We performed detailed non-linear magnetorheological properties of three MR fluids (10 vol%) containing isotropic Fe3O4 and anisotropic Fe-nanorods under both small and large amplitude oscillatory flow. The MR samples demonstrated strong magnetorheological Payne effect i.e. rapid stress relaxation under increasing deformation and uniform magnetic field beyond linear viscoelastic region (LVR), which has not been studied in-depth in conventional MR fluids. We have also shown that stress softening was more pronounced for MR fluids with higher anisotropic contents, in contrast to isotropic MR fluid. The onset strains for LVR to non-linear region transition for anisotropic fluids were much lower than that of isotropic spherical nanoparticle-containing fluid. The stronger MR response for nanorod-containing MR fluids can be explained in terms of enhanced field-induced structuration.
△ Less
Submitted 28 May, 2015;
originally announced May 2015.