-
RobustSAM: Segment Anything Robustly on Degraded Images
Authors:
Wei-Ting Chen,
Yu-Jiet Vong,
Sy-Yen Kuo,
Sizhuo Ma,
Jian Wang
Abstract:
Segment Anything Model (SAM) has emerged as a transformative approach in image segmentation, acclaimed for its robust zero-shot segmentation capabilities and flexible prompting system. Nonetheless, its performance is challenged by images with degraded quality. Addressing this limitation, we propose the Robust Segment Anything Model (RobustSAM), which enhances SAM's performance on low-quality image…
▽ More
Segment Anything Model (SAM) has emerged as a transformative approach in image segmentation, acclaimed for its robust zero-shot segmentation capabilities and flexible prompting system. Nonetheless, its performance is challenged by images with degraded quality. Addressing this limitation, we propose the Robust Segment Anything Model (RobustSAM), which enhances SAM's performance on low-quality images while preserving its promptability and zero-shot generalization. Our method leverages the pre-trained SAM model with only marginal parameter increments and computational requirements. The additional parameters of RobustSAM can be optimized within 30 hours on eight GPUs, demonstrating its feasibility and practicality for typical research laboratories. We also introduce the Robust-Seg dataset, a collection of 688K image-mask pairs with different degradations designed to train and evaluate our model optimally. Extensive experiments across various segmentation tasks and datasets confirm RobustSAM's superior performance, especially under zero-shot conditions, underscoring its potential for extensive real-world application. Additionally, our method has been shown to effectively improve the performance of SAM-based downstream tasks such as single image dehazing and deblurring.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
DSL-FIQA: Assessing Facial Image Quality via Dual-Set Degradation Learning and Landmark-Guided Transformer
Authors:
Wei-Ting Chen,
Gurunandan Krishnan,
Qiang Gao,
Sy-Yen Kuo,
Sizhuo Ma,
Jian Wang
Abstract:
Generic Face Image Quality Assessment (GFIQA) evaluates the perceptual quality of facial images, which is crucial in improving image restoration algorithms and selecting high-quality face images for downstream tasks. We present a novel transformer-based method for GFIQA, which is aided by two unique mechanisms. First, a Dual-Set Degradation Representation Learning (DSL) mechanism uses facial image…
▽ More
Generic Face Image Quality Assessment (GFIQA) evaluates the perceptual quality of facial images, which is crucial in improving image restoration algorithms and selecting high-quality face images for downstream tasks. We present a novel transformer-based method for GFIQA, which is aided by two unique mechanisms. First, a Dual-Set Degradation Representation Learning (DSL) mechanism uses facial images with both synthetic and real degradations to decouple degradation from content, ensuring generalizability to real-world scenarios. This self-supervised method learns degradation features on a global scale, providing a robust alternative to conventional methods that use local patch information in degradation learning. Second, our transformer leverages facial landmarks to emphasize visually salient parts of a face image in evaluating its perceptual quality. We also introduce a balanced and diverse Comprehensive Generic Face IQA (CGFIQA-40k) dataset of 40K images carefully designed to overcome the biases, in particular the imbalances in skin tone and gender representation, in existing datasets. Extensive analysis and evaluation demonstrate the robustness of our method, marking a significant improvement over prior methods.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
Improving Point-based Crowd Counting and Localization Based on Auxiliary Point Guidance
Authors:
I-Hsiang Chen,
Wei-Ting Chen,
Yu-Wei Liu,
Ming-Hsuan Yang,
Sy-Yen Kuo
Abstract:
Crowd counting and localization have become increasingly important in computer vision due to their wide-ranging applications. While point-based strategies have been widely used in crowd counting methods, they face a significant challenge, i.e., the lack of an effective learning strategy to guide the matching process. This deficiency leads to instability in matching point proposals to target points…
▽ More
Crowd counting and localization have become increasingly important in computer vision due to their wide-ranging applications. While point-based strategies have been widely used in crowd counting methods, they face a significant challenge, i.e., the lack of an effective learning strategy to guide the matching process. This deficiency leads to instability in matching point proposals to target points, adversely affecting overall performance. To address this issue, we introduce an effective approach to stabilize the proposal-target matching in point-based methods. We propose Auxiliary Point Guidance (APG) to provide clear and effective guidance for proposal selection and optimization, addressing the core issue of matching uncertainty. Additionally, we develop Implicit Feature Interpolation (IFI) to enable adaptive feature extraction in diverse crowd scenarios, further enhancing the model's robustness and accuracy. Extensive experiments demonstrate the effectiveness of our approach, showing significant improvements in crowd counting and localization performance, particularly under challenging conditions. The source codes and trained models will be made publicly available.
△ Less
Submitted 17 May, 2024;
originally announced May 2024.
-
Engineering A Workload-balanced Push-Relabel Algorithm for Massive Graphs on GPUs
Authors:
Chou-Ying Hsieh,
Po-Chieh Lin,
Sy-Yen Kuo
Abstract:
The push-relabel algorithm is an efficient algorithm that solves the maximum flow/ minimum cut problems of its affinity to parallelization. As the size of graphs grows exponentially, researchers have used Graphics Processing Units (GPUs) to accelerate the computation of the push-relabel algorithm further. However, prior works need to handle the significant memory consumption to represent a massive…
▽ More
The push-relabel algorithm is an efficient algorithm that solves the maximum flow/ minimum cut problems of its affinity to parallelization. As the size of graphs grows exponentially, researchers have used Graphics Processing Units (GPUs) to accelerate the computation of the push-relabel algorithm further. However, prior works need to handle the significant memory consumption to represent a massive residual graph. In addition, the nature of their algorithms has inherently imbalanced workload distribution on GPUs. This paper first identifies the two challenges with the memory and computational models. Based on the analysis of these models, we propose a workload-balanced push-relabel algorithm (WBPR) with two enhanced compressed sparse representations (CSR) and a vertex-centric approach. The enhanced CSR significantly reduces memory consumption, while the vertex-centric approach alleviates the workload imbalance and improves the utilization of the GPU. In the experiment, our approach reduces the memory consumption from O(V^2) to O(V + E). Moreover, we can achieve up to 7.31x and 2.29x runtime speedup compared to the state-of-the-art on real-world graphs in maximum flow and bipartite matching tasks, respectively. Our code will be open-sourced for further research on accelerating the push-relabel algorithm.
△ Less
Submitted 30 March, 2024;
originally announced April 2024.
-
Metropolitan-scale Entanglement Distribution with Co-existing Quantum and Classical Signals in a single fiber
Authors:
A. Rahmouni,
P. S. Kuo,
Y. S. Li-Baboud,
I. A. Burenkov,
Y. Shi,
M. V. Jabir,
N. Lal,
D. Reddy,
M. Merzouki,
L. Ma,
A. Battou,
S. V. Polyakov,
O. Slattery,
T. Gerrits
Abstract:
The development of prototype metropolitan-scale quantum networks is underway and entails transmitting quantum information via single photons through deployed optical fibers spanning several tens of kilometers. The major challenges in building metropolitan-scale quantum networks are compensation of polarization mode dispersion, high-precision clock synchronization, and compensation for cumulative t…
▽ More
The development of prototype metropolitan-scale quantum networks is underway and entails transmitting quantum information via single photons through deployed optical fibers spanning several tens of kilometers. The major challenges in building metropolitan-scale quantum networks are compensation of polarization mode dispersion, high-precision clock synchronization, and compensation for cumulative transmission time fluctuations. One approach addressing these challenges is to co-propagate classical probe signals in the same fiber as the quantum signal. Thus, both signals experience the same conditions, and the changes of the fiber can therefore be monitored and compensated. Here, we demonstrate the distribution of polarization entangled quantum signals co-propagating with the White Rabbit Precision Time Protocol (WR-PTP) classical signals in the same single-core fiber strand at metropolitan-scale distances. Our results demonstrate the feasibility of this quantum-classical coexistence by achieving high-fidelity entanglement distribution between nodes separated by 100 km of optical fiber. This advancement is a significant step towards the practical implementation of robust and efficient metropolitan-scale quantum networks.
△ Less
Submitted 1 March, 2024; v1 submitted 1 February, 2024;
originally announced February 2024.
-
Improving Limited Supervised Foot Ulcer Segmentation Using Cross-Domain Augmentation
Authors:
Shang-Jui Kuo,
Po-Han Huang,
Chia-Ching Lin,
Jeng-Lin Li,
Ming-Ching Chang
Abstract:
Diabetic foot ulcers pose health risks, including higher morbidity, mortality, and amputation rates. Monitoring wound areas is crucial for proper care, but manual segmentation is subjective due to complex wound features and background variation. Expert annotations are costly and time-intensive, thus hampering large dataset creation. Existing segmentation models relying on extensive annotations are…
▽ More
Diabetic foot ulcers pose health risks, including higher morbidity, mortality, and amputation rates. Monitoring wound areas is crucial for proper care, but manual segmentation is subjective due to complex wound features and background variation. Expert annotations are costly and time-intensive, thus hampering large dataset creation. Existing segmentation models relying on extensive annotations are impractical in real-world scenarios with limited annotated data. In this paper, we propose a cross-domain augmentation method named TransMix that combines Augmented Global Pre-training AGP and Localized CutMix Fine-tuning LCF to enrich wound segmentation data for model learning. TransMix can effectively improve the foot ulcer segmentation model training by leveraging other dermatology datasets not on ulcer skins or wounds. AGP effectively increases the overall image variability, while LCF increases the diversity of wound regions. Experimental results show that TransMix increases the variability of wound regions and substantially improves the Dice score for models trained with only 40 annotated images under various proportions.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
Accelerating Maximal Biclique Enumeration on GPUs
Authors:
Chou-Ying Hsieh,
Chia-Ming Chang,
Po-Hsiu Cheng,
Sy-Yen Kuo
Abstract:
Maximal Biclique Enumeration (MBE) holds critical importance in graph theory with applications extending across fields such as bioinformatics, social networks, and recommendation systems. However, its computational complexity presents barriers for efficiently scaling to large graphs. To address these challenges, we introduce cuMBE, a GPU-optimized parallel algorithm for MBE. Utilizing a unique dat…
▽ More
Maximal Biclique Enumeration (MBE) holds critical importance in graph theory with applications extending across fields such as bioinformatics, social networks, and recommendation systems. However, its computational complexity presents barriers for efficiently scaling to large graphs. To address these challenges, we introduce cuMBE, a GPU-optimized parallel algorithm for MBE. Utilizing a unique data structure, called compact array, cuMBE eradicates the need for recursion, thereby significantly minimizing dynamic memory requirements and computational overhead. The algorithm utilizes a hybrid parallelism approach, in which GPU thread blocks handle coarse-grained tasks associated with part of the search process. Besides, we implement three fine-grained optimizations within each thread block to enhance performance. Further, we integrate a work-stealing mechanism to mitigate workload imbalances among thread blocks. Our experiments reveal that cuMBE achieves an geometric mean speedup of 4.02x and 4.13x compared to the state-of-the-art serial algorithm and parallel CPU-based algorithm on both common and real-world datasets, respectively.
△ Less
Submitted 10 January, 2024;
originally announced January 2024.
-
Rethinking Backdoor Attacks on Dataset Distillation: A Kernel Method Perspective
Authors:
Ming-Yu Chung,
Sheng-Yen Chou,
Chia-Mu Yu,
Pin-Yu Chen,
Sy-Yen Kuo,
Tsung-Yi Ho
Abstract:
Dataset distillation offers a potential means to enhance data efficiency in deep learning. Recent studies have shown its ability to counteract backdoor risks present in original training samples. In this study, we delve into the theoretical aspects of backdoor attacks and dataset distillation based on kernel methods. We introduce two new theory-driven trigger pattern generation methods specialized…
▽ More
Dataset distillation offers a potential means to enhance data efficiency in deep learning. Recent studies have shown its ability to counteract backdoor risks present in original training samples. In this study, we delve into the theoretical aspects of backdoor attacks and dataset distillation based on kernel methods. We introduce two new theory-driven trigger pattern generation methods specialized for dataset distillation. Following a comprehensive set of analyses and experiments, we show that our optimization-based trigger design framework informs effective backdoor attacks on dataset distillation. Notably, datasets poisoned by our designed trigger prove resilient against conventional backdoor attack detection and mitigation methods. Our empirical results validate that the triggers developed using our approaches are proficient at executing resilient backdoor attacks.
△ Less
Submitted 28 November, 2023;
originally announced November 2023.
-
Tunable non-Lifshitz-Kosevich temperature dependence of Shubnikov-de Haas oscillation amplitudes in SmSb
Authors:
Wei Zhang,
C. N. Kuo,
S. T. Kuo,
Chun Wa So,
Jianyu Xie,
Kwing To Lai,
Wing Chi Yu,
C. S. Lue,
Hoi Chun Po,
Swee K. Goh
Abstract:
The Lifshitz-Kosevich (LK) theory is the pillar of magnetic quantum oscillations, which have been extensively applied to characterize a wide range of metallic states. In this study, we focus on the Shubnikov-de Haas (SdH) effect observed in SmSb, a rare-earth monopnictide. We observed a significant departure from the expected LK theory near $T_N=2.4$~K: both a peak-like anomaly and an enhancement…
▽ More
The Lifshitz-Kosevich (LK) theory is the pillar of magnetic quantum oscillations, which have been extensively applied to characterize a wide range of metallic states. In this study, we focus on the Shubnikov-de Haas (SdH) effect observed in SmSb, a rare-earth monopnictide. We observed a significant departure from the expected LK theory near $T_N=2.4$~K: both a peak-like anomaly and an enhancement in the temperature dependence of quantum oscillation amplitude are seen in SmSb. Moreover, we discovered a remarkable sensitivity of the SdH amplitudes to sample purity. By adjusting the sample purity, we were able to tune the temperature dependence of the $α$ band's SdH amplitudes from a peak-like anomalous behavior to an enhancement. Therefore, SdH oscillations from the $α$ band connect the two well-known non-LK behaviours, controllable through varying the sample purity, paving the way for developing further understanding of the mechanism leading to the anomalous quantum oscillations.
△ Less
Submitted 10 October, 2023;
originally announced October 2023.
-
Counting Crowds in Bad Weather
Authors:
Zhi-Kai Huang,
Wei-Ting Chen,
Yuan-Chun Chiang,
Sy-Yen Kuo,
Ming-Hsuan Yang
Abstract:
Crowd counting has recently attracted significant attention in the field of computer vision due to its wide applications to image understanding. Numerous methods have been proposed and achieved state-of-the-art performance for real-world tasks. However, existing approaches do not perform well under adverse weather such as haze, rain, and snow since the visual appearances of crowds in such scenes a…
▽ More
Crowd counting has recently attracted significant attention in the field of computer vision due to its wide applications to image understanding. Numerous methods have been proposed and achieved state-of-the-art performance for real-world tasks. However, existing approaches do not perform well under adverse weather such as haze, rain, and snow since the visual appearances of crowds in such scenes are drastically different from those images in clear weather of typical datasets. In this paper, we propose a method for robust crowd counting in adverse weather scenarios. Instead of using a two-stage approach that involves image restoration and crowd counting modules, our model learns effective features and adaptive queries to account for large appearance variations. With these weather queries, the proposed model can learn the weather information according to the degradation of the input image and optimize with the crowd counting module simultaneously. Experimental results show that the proposed algorithm is effective in counting crowds under different weather types on benchmark datasets. The source code and trained models will be made available to the public.
△ Less
Submitted 1 June, 2023;
originally announced June 2023.
-
DehazeNeRF: Multiple Image Haze Removal and 3D Shape Reconstruction using Neural Radiance Fields
Authors:
Wei-Ting Chen,
Wang Yifan,
Sy-Yen Kuo,
Gordon Wetzstein
Abstract:
Neural radiance fields (NeRFs) have demonstrated state-of-the-art performance for 3D computer vision tasks, including novel view synthesis and 3D shape reconstruction. However, these methods fail in adverse weather conditions. To address this challenge, we introduce DehazeNeRF as a framework that robustly operates in hazy conditions. DehazeNeRF extends the volume rendering equation by adding physi…
▽ More
Neural radiance fields (NeRFs) have demonstrated state-of-the-art performance for 3D computer vision tasks, including novel view synthesis and 3D shape reconstruction. However, these methods fail in adverse weather conditions. To address this challenge, we introduce DehazeNeRF as a framework that robustly operates in hazy conditions. DehazeNeRF extends the volume rendering equation by adding physically realistic terms that model atmospheric scattering. By parameterizing these terms using suitable networks that match the physical properties, we introduce effective inductive biases, which, together with the proposed regularizations, allow DehazeNeRF to demonstrate successful multi-view haze removal, novel view synthesis, and 3D shape reconstruction where existing approaches fail.
△ Less
Submitted 20 March, 2023;
originally announced March 2023.
-
Certified Robustness of Quantum Classifiers against Adversarial Examples through Quantum Noise
Authors:
Jhih-Cing Huang,
Yu-Lin Tsai,
Chao-Han Huck Yang,
Cheng-Fang Su,
Chia-Mu Yu,
Pin-Yu Chen,
Sy-Yen Kuo
Abstract:
Recently, quantum classifiers have been found to be vulnerable to adversarial attacks, in which quantum classifiers are deceived by imperceptible noises, leading to misclassification. In this paper, we propose the first theoretical study demonstrating that adding quantum random rotation noise can improve robustness in quantum classifiers against adversarial attacks. We link the definition of diffe…
▽ More
Recently, quantum classifiers have been found to be vulnerable to adversarial attacks, in which quantum classifiers are deceived by imperceptible noises, leading to misclassification. In this paper, we propose the first theoretical study demonstrating that adding quantum random rotation noise can improve robustness in quantum classifiers against adversarial attacks. We link the definition of differential privacy and show that the quantum classifier trained with the natural presence of additive noise is differentially private. Finally, we derive a certified robustness bound to enable quantum classifiers to defend against adversarial examples, supported by experimental results simulated with noises from IBM's 7-qubits device.
△ Less
Submitted 28 April, 2023; v1 submitted 2 November, 2022;
originally announced November 2022.
-
RVSL: Robust Vehicle Similarity Learning in Real Hazy Scenes Based on Semi-supervised Learning
Authors:
Wei-Ting Chen,
I-Hsiang Chen,
Chih-Yuan Yeh,
Hao-Hsiang Yang,
Hua-En Chang,
Jian-Jiun Ding,
Sy-Yen Kuo
Abstract:
Recently, vehicle similarity learning, also called re-identification (ReID), has attracted significant attention in computer vision. Several algorithms have been developed and obtained considerable success. However, most existing methods have unpleasant performance in the hazy scenario due to poor visibility. Though some strategies are possible to resolve this problem, they still have room to be i…
▽ More
Recently, vehicle similarity learning, also called re-identification (ReID), has attracted significant attention in computer vision. Several algorithms have been developed and obtained considerable success. However, most existing methods have unpleasant performance in the hazy scenario due to poor visibility. Though some strategies are possible to resolve this problem, they still have room to be improved due to the limited performance in real-world scenarios and the lack of real-world clear ground truth. Thus, to resolve this problem, inspired by CycleGAN, we construct a training paradigm called \textbf{RVSL} which integrates ReID and domain transformation techniques. The network is trained on semi-supervised fashion and does not require to employ the ID labels and the corresponding clear ground truths to learn hazy vehicle ReID mission in the real-world haze scenes. To further constrain the unsupervised learning process effectively, several losses are developed. Experimental results on synthetic and real-world datasets indicate that the proposed method can achieve state-of-the-art performance on hazy vehicle ReID problems. It is worth mentioning that although the proposed method is trained without real-world label information, it can achieve competitive performance compared to existing supervised methods trained on complete label information.
△ Less
Submitted 18 September, 2022;
originally announced September 2022.
-
Possibly heteroclite electron Yukawa coupling and small $\triangle a_μ$ in a hidden Abelian gauge model for neutrino masses
Authors:
We-Fu Chang,
Shih-Hsien Kuo
Abstract:
We attempt to simultaneously explain the neutrino oscillation data and the observed $(g-2)_{e,μ}$ in a hidden gauge $U(1)_X$ model where all the Standard Model(SM) fields are $U(1)_X$ singlets. The minimal version of this model calls for four exotic scalars and two pairs of vector fermions, and all are charged under $U(1)_X$. We carefully consider the experimental limits on charge lepton flavor vi…
▽ More
We attempt to simultaneously explain the neutrino oscillation data and the observed $(g-2)_{e,μ}$ in a hidden gauge $U(1)_X$ model where all the Standard Model(SM) fields are $U(1)_X$ singlets. The minimal version of this model calls for four exotic scalars and two pairs of vector fermions, and all are charged under $U(1)_X$. We carefully consider the experimental limits on charge lepton flavor violation without assuming any flavor symmetry and explore the viable model parameter space. The model can accommodate the neutrino oscillation data for both the normal and the inverted mass ordering while explaining the central value of $\triangle a_e$ by adopting the fine structure constant determined by using either Cesium or Rubidium atoms. However, mainly constrained by the current experimental bound on ${\cal B}(τ\rightarrow μγ)$, this model predicts $\triangle a_μ<5.5(8.0)\times 10^{-10}$ for the normal(inverted) neutrino ordering. Moreover, while the muon Yukawa coupling is close to the SM one, we find the magnitude of the electron Yukawa coupling could be one order of magnitude larger than the SM prediction. This abnormal electron Yukawa could be probed in the future FCC-ee collider and plays an essential role in testing flavor physics.
△ Less
Submitted 11 July, 2022; v1 submitted 29 June, 2022;
originally announced June 2022.
-
PSCNN: A 885.86 TOPS/W Programmable SRAM-based Computing-In-Memory Processor for Keyword Spotting
Authors:
Shu-Hung Kuo,
Tian-Sheuan Chang
Abstract:
Computing-in-memory (CIM) has attracted significant attentions in recent years due to its massive parallelism and low power consumption. However, current CIM designs suffer from large area overhead of small CIM macros and bad programmablity for model execution. This paper proposes a programmable CIM processor with a single large sized CIM macro instead of multiple smaller ones for power efficient…
▽ More
Computing-in-memory (CIM) has attracted significant attentions in recent years due to its massive parallelism and low power consumption. However, current CIM designs suffer from large area overhead of small CIM macros and bad programmablity for model execution. This paper proposes a programmable CIM processor with a single large sized CIM macro instead of multiple smaller ones for power efficient computation and a flexible instruction set to support various binary 1-D convolution Neural Network (CNN) models in an easy way. Furthermore, the proposed architecture adopts the pooling write-back method to support fused or independent convolution/pooling operations to reduce 35.9\% of latency, and the flexible ping-pong feature SRAM to fit different feature map sizes during layer-by-layer execution.The design fabricated in TSMC 28nm technology achieves 150.8 GOPS throughput and 885.86 TOPS/W power efficiency at 10 MHz when executing our binary keyword spotting model, which has higher power efficiency and flexibility than previous designs.
△ Less
Submitted 2 May, 2022;
originally announced May 2022.
-
ContourletNet: A Generalized Rain Removal Architecture Using Multi-Direction Hierarchical Representation
Authors:
Wei-Ting Chen,
Cheng-Che Tsai,
Hao-Yu Fang,
I-Hsiang Chen,
Jian-Jiun Ding,
Sy-Yen Kuo
Abstract:
Images acquired from rainy scenes usually suffer from bad visibility which may damage the performance of computer vision applications. The rainy scenarios can be categorized into two classes: moderate rain and heavy rain scenes. Moderate rain scene mainly consists of rain streaks while heavy rain scene contains both rain streaks and the veiling effect (similar to haze). Although existing methods h…
▽ More
Images acquired from rainy scenes usually suffer from bad visibility which may damage the performance of computer vision applications. The rainy scenarios can be categorized into two classes: moderate rain and heavy rain scenes. Moderate rain scene mainly consists of rain streaks while heavy rain scene contains both rain streaks and the veiling effect (similar to haze). Although existing methods have achieved excellent performance on these two cases individually, it still lacks a general architecture to address both heavy rain and moderate rain scenarios effectively. In this paper, we construct a hierarchical multi-direction representation network by using the contourlet transform (CT) to address both moderate rain and heavy rain scenarios. The CT divides the image into the multi-direction subbands (MS) and the semantic subband (SS). First, the rain streak information is retrieved to the MS based on the multi-orientation property of the CT. Second, a hierarchical architecture is proposed to reconstruct the background information including damaged semantic information and the veiling effect in the SS. Last, the multi-level subband discriminator with the feedback error map is proposed. By this module, all subbands can be well optimized. This is the first architecture that can address both of the two scenarios effectively. The code is available in https://github.com/cctakaet/ContourletNet-BMVC2021.
△ Less
Submitted 25 November, 2021;
originally announced November 2021.
-
BeamScatter: Scalable, Deployable Long-Range backscatter communication with Beam-Steering
Authors:
Manideep Dunna,
Shihkai Kuo,
Akshit Agarwal,
Patrick Mercier,
Dinesh Bharadia
Abstract:
WiFi backscatter tags can enable direct connectivity of IoT devices with commodity WiFi hardware at low power. However, most state of the art backscatter tag implementations in this area have limited transmitter to tag range, are not suitable to be deployed in a WiFi mesh network, and do not take full advantage of today's WiFi network capabilities such as MIMO. In this paper, we present BeamScatte…
▽ More
WiFi backscatter tags can enable direct connectivity of IoT devices with commodity WiFi hardware at low power. However, most state of the art backscatter tag implementations in this area have limited transmitter to tag range, are not suitable to be deployed in a WiFi mesh network, and do not take full advantage of today's WiFi network capabilities such as MIMO. In this paper, we present BeamScatter, which can realize a backscatter tag based on MIMO techniques that can work at a very long separation of 28m from an access-point and enables their deployment in WiFi mesh networks. BeamScatter presents a novel technique to perform beam-steering on the MIMO tag at a very low power consumption of 88 uW while achieving a peak throughput of 500kbps. Next, BeamScatter creates a novel modeling framework to decide the optimal phase setting on the tag to steer the backscattered signal WiFi access point.
△ Less
Submitted 13 October, 2022; v1 submitted 27 October, 2021;
originally announced October 2021.
-
Multi-modal Bifurcated Network for Depth Guided Image Relighting
Authors:
Hao-Hsiang Yang,
Wei-Ting Chen,
Hao-Lun Luo,
Sy-Yen Kuo
Abstract:
Image relighting aims to recalibrate the illumination setting in an image. In this paper, we propose a deep learning-based method called multi-modal bifurcated network (MBNet) for depth guided image relighting. That is, given an image and the corresponding depth maps, a new image with the given illuminant angle and color temperature is generated by our network. This model extracts the image and th…
▽ More
Image relighting aims to recalibrate the illumination setting in an image. In this paper, we propose a deep learning-based method called multi-modal bifurcated network (MBNet) for depth guided image relighting. That is, given an image and the corresponding depth maps, a new image with the given illuminant angle and color temperature is generated by our network. This model extracts the image and the depth features by the bifurcated network in the encoder. To use the two features effectively, we adopt the dynamic dilated pyramid modules in the decoder. Moreover, to increase the variety of training data, we propose a novel data process pipeline to increase the number of the training data. Experiments conducted on the VIDIT dataset show that the proposed solution obtains the \textbf{1}$^{st}$ place in terms of SSIM and PMS in the NTIRE 2021 Depth Guide One-to-one Relighting Challenge.
△ Less
Submitted 4 May, 2021; v1 submitted 3 May, 2021;
originally announced May 2021.
-
S3Net: A Single Stream Structure for Depth Guided Image Relighting
Authors:
Hao-Hsiang Yang,
Wei-Ting Chen,
and Sy-Yen Kuo
Abstract:
Depth guided any-to-any image relighting aims to generate a relit image from the original image and corresponding depth maps to match the illumination setting of the given guided image and its depth map. To the best of our knowledge, this task is a new challenge that has not been addressed in the previous literature. To address this issue, we propose a deep learning-based neural Single Stream Stru…
▽ More
Depth guided any-to-any image relighting aims to generate a relit image from the original image and corresponding depth maps to match the illumination setting of the given guided image and its depth map. To the best of our knowledge, this task is a new challenge that has not been addressed in the previous literature. To address this issue, we propose a deep learning-based neural Single Stream Structure network called S3Net for depth guided image relighting. This network is an encoder-decoder model. We concatenate all images and corresponding depth maps as the input and feed them into the model. The decoder part contains the attention module and the enhanced module to focus on the relighting-related regions in the guided images. Experiments performed on challenging benchmark show that the proposed model achieves the 3 rd highest SSIM in the NTIRE 2021 Depth Guided Any-to-any Relighting Challenge.
△ Less
Submitted 4 May, 2021; v1 submitted 3 May, 2021;
originally announced May 2021.
-
Linear magnetoresistance with a universal energy scale in a strong-coupling superconductor
Authors:
W. Zhang,
Y. J. Hu,
C. N. Kuo,
S. T. Kuo,
Yue-Wen Fang,
Kwing To Lai,
X. Y. Liu,
K. Y. Yip,
D. Sun,
F. F. Balakirev,
C. S. Lue,
Hanghui Chen,
Swee K. Goh
Abstract:
The recent discovery of a nonsaturating linear magnetoresistance in several correlated electron systems near a quantum critical point has revealed an interesting interplay between the linear magnetoresistance and the zero-field linear-in-temperature resistivity. These studies suggest a possible role of quantum criticality on the observed linear magnetoresistance. Here, we report our discovery of a…
▽ More
The recent discovery of a nonsaturating linear magnetoresistance in several correlated electron systems near a quantum critical point has revealed an interesting interplay between the linear magnetoresistance and the zero-field linear-in-temperature resistivity. These studies suggest a possible role of quantum criticality on the observed linear magnetoresistance. Here, we report our discovery of a nonsaturating, linear magnetoresistance in Mo$_8$Ga$_{41}$, a nearly isotropic strong electron-phonon coupling superconductor with a linear-in-temperature resistivity from the transition temperature to $\sim$55 K. The growth of the resistivity in field is comparable to that in temperature, provided that both quantities are measured in the energy unit. Our datasets are remarkably similar to magnetoresistance data of the optimally doped La$_{2-x}$Sr$_x$CuO$_4$, despite the clearly different crystal and electronic structures, and the apparent absence of quantum critical physics in Mo$_8$Ga$_{41}$. A new empirical scaling formula is developed, which is able to capture the key features of the low-temperature magnetoresistance data of Mo$_8$Ga$_{41}$, as well as the data of La$_{2-x}$Sr$_x$CuO$_4$.
△ Less
Submitted 7 October, 2020;
originally announced October 2020.
-
Whose Side are Ethics Codes On? Power, Responsibility and the Social Good
Authors:
Anne L. Washington,
Rachel S. Kuo
Abstract:
The moral authority of ethics codes stems from an assumption that they serve a unified society, yet this ignores the political aspects of any shared resource. The sociologist Howard S. Becker challenged researchers to clarify their power and responsibility in the classic essay: Whose Side Are We On. Building on Becker's hierarchy of credibility, we report on a critical discourse analysis of data e…
▽ More
The moral authority of ethics codes stems from an assumption that they serve a unified society, yet this ignores the political aspects of any shared resource. The sociologist Howard S. Becker challenged researchers to clarify their power and responsibility in the classic essay: Whose Side Are We On. Building on Becker's hierarchy of credibility, we report on a critical discourse analysis of data ethics codes and emerging conceptualizations of beneficence, or the "social good", of data technology. The analysis revealed that ethics codes from corporations and professional associations conflated consumers with society and were largely silent on agency. Interviews with community organizers about social change in the digital era supplement the analysis, surfacing the limits of technical solutions to concerns of marginalized communities. Given evidence that highlights the gulf between the documents and lived experiences, we argue that ethics codes that elevate consumers may simultaneously subordinate the needs of vulnerable populations. Understanding contested digital resources is central to the emerging field of public interest technology. We introduce the concept of digital differential vulnerability to explain disproportionate exposures to harm within data technology and suggest recommendations for future ethics codes.
△ Less
Submitted 4 February, 2020;
originally announced February 2020.
-
Unitary limit and linear scaling of neutrons in harmonic trap with tuned CD-Bonn and square-well interactions
Authors:
Yi-Yuan Cheng,
Thomas T. S. Kuo,
Ruprecht Machleidt,
Yu-Min Zhao
Abstract:
We study systems of finite-number neutrons in a harmonic trap at the unitary limit. Two very different types of neutron-neutron interactions are applied, namely, the meson-theoretic CD-Bonn potential and hard-core square-well interactions, all tuned to possess infinite scattering lengths, and with effective ranges comparable to or larger than the trap size. The potentials are renormalized to equiv…
▽ More
We study systems of finite-number neutrons in a harmonic trap at the unitary limit. Two very different types of neutron-neutron interactions are applied, namely, the meson-theoretic CD-Bonn potential and hard-core square-well interactions, all tuned to possess infinite scattering lengths, and with effective ranges comparable to or larger than the trap size. The potentials are renormalized to equivalent, scattering-length preserving low-momentum potentials, $V_{{\rm low}-k}$, with which the particle-particle hole-hole ring diagrams are summed to all orders to yield the ground-state energy $E_0$ of the finite neutron system. We find the ratio $E_0/E_0^{\rm free}$ (where $E_0^{\rm free}$ denotes the ground-state energy of the corresponding non-interacting system) to be remarkably independent from variations of the harmonic trap parameter, the number of neutrons, the decimation momentum of $V_{{\rm low}-k}$, and the type and effective range of the unitarity potential. Our results support a special virial linear scaling relation of $E_0$. Certain properties of Landau's quasi-particles for trapped neutrons at the unitary limit are also discussed.
△ Less
Submitted 11 December, 2018; v1 submitted 1 September, 2018;
originally announced September 2018.
-
Nucleon-anti-nucleon intruder state of Dirac equation for nucleon in deep scalar potential well
Authors:
T. T. S. Kuo,
T. K. Kuo,
E. Osnes,
S. Shu
Abstract:
We solve the Dirac radial equation for a nucleon in a scalar Woods-Saxon potential well of depth $V_0$ and radius $r_0$. A sequence of values for the depth and radius are considered. For shallow potentials with $-1000 MeV\lesssim V_0 < 0$ the wave functions for the positive-energy states $Ψ_+(r)$ are dominated by their nucleon component $g(r)$. But for deeper potentials with…
▽ More
We solve the Dirac radial equation for a nucleon in a scalar Woods-Saxon potential well of depth $V_0$ and radius $r_0$. A sequence of values for the depth and radius are considered. For shallow potentials with $-1000 MeV\lesssim V_0 < 0$ the wave functions for the positive-energy states $Ψ_+(r)$ are dominated by their nucleon component $g(r)$. But for deeper potentials with $V_0 \lesssim -1500 MeV $ the $Ψ_+(r)$s begin to have dominant anti-nucleon component $f(r)$. In particular, a special intruder state enters with wave function $Ψ_{1/2}(r)$ and energy $E_{1/2}$. We have considered several $r_0$ values between 2 and 8 fm. For $V_0 \lesssim -2000 MeV$ and the above $r_0$ values, $Ψ_{1/2}$ is the only bound positive-energy state and has its $g(r)$ closely equal to $-f(r)$, both having a narrow wave-packet shape centered around $r_0$. The $E_{1/2}$ of this state is practically independent of $V_0$ for the above $V_0$ range and obeys closely the relation $E_{1/2}=\frac{\hbar c}{r_0}$.
△ Less
Submitted 1 May, 2017;
originally announced May 2017.
-
Scale-Invariant Hidden Local Symmetry, Topology Change and Dense Baryonic Matter II
Authors:
Won-Gi Paeng,
Thomas T. S. Kuo,
Hyun Kyu Lee,
Yong-Liang Ma,
Mannque Rho
Abstract:
Exploiting certain robust topological inputs from the skyrmion description of compressed baryonic matter with a scale-chiral symmetric Lagrangian, we predict the equation of state that is consistent with the properties of nuclear matter at the equilibrium density, supports the maximum mass of massive compact star $\sim 2 M_\odot$ and surprisingly gives the sound velocity close to the "conformal ve…
▽ More
Exploiting certain robust topological inputs from the skyrmion description of compressed baryonic matter with a scale-chiral symmetric Lagrangian, we predict the equation of state that is consistent with the properties of nuclear matter at the equilibrium density, supports the maximum mass of massive compact star $\sim 2 M_\odot$ and surprisingly gives the sound velocity close to the "conformal velocity" $1/\sqrt{3}$ at densities $\gtrsim 3 n_0$. At the core of this result is the observation that parity-doubling occurs in the nucleon structure as density goes above $\sim 2n_0$ with a chiral-singlet mass $m_0 \sim (0.6-0.9) m_N$, hinting at a possible up-to-date unsuspected source of proton mass and an emergence at high density of scale symmetry and flavor local symmetry, both hidden in the QCD vacuum.
△ Less
Submitted 10 April, 2017;
originally announced April 2017.
-
Introduction to low-momentum effective interactions with Brown-Rho scaling and three-nucleon forces
Authors:
T. T. S. Kuo,
J. W. Holt,
E. Osnes
Abstract:
Model-space effective interactions $V_{eff}$ derived from free-space nucleon-nucleon interactions $V_{NN}$ are reviewed. We employ a double decimation approach: first we extract a low-momentum interaction $V_{low-k}$ from $V_{NN}$ using a $T$-matrix equivalence decimation method. Then $V_{eff}$ is obtained from $V_{low-k}$ by way of a folded-diagram effective interaction method. For decimation mom…
▽ More
Model-space effective interactions $V_{eff}$ derived from free-space nucleon-nucleon interactions $V_{NN}$ are reviewed. We employ a double decimation approach: first we extract a low-momentum interaction $V_{low-k}$ from $V_{NN}$ using a $T$-matrix equivalence decimation method. Then $V_{eff}$ is obtained from $V_{low-k}$ by way of a folded-diagram effective interaction method. For decimation momentum $Λ\simeq 2 fm^{-1}$, the $V_{low-k}$ interactions derived from different realistic $V_{NN}$ models are nearly model independent, and so are the resulting shell-model effective interactions. For nucleons in a low-density nuclear medium like valence nucleons near the nuclear surface, such effective interactions derived from free-space $V_{NN}$ are satisfactory in reproducing experimental nuclear properties. But it is not so for nucleons in a nuclear medium with density near or beyond nuclear matter saturation density. In this case it may be necessary to include the effects from Brown-Rho (BR) scaling of hadrons and/or three-nucleon forces $V_{3N}$, effectively changing the free-space $V_{NN}$ into a density-dependent one. The density-dependent effects from BR scaling and $V_{3N}$ are compared with those from empirical Skyrme effective interactions.
△ Less
Submitted 15 October, 2015;
originally announced October 2015.
-
Scale-Invariant Hidden Local Symmetry, Topology Change and Dense Baryonic Matter
Authors:
Won-Gi Paeng,
Thomas T. S. Kuo,
Hyun Kyu Lee,
Mannque Rho
Abstract:
When scale symmetry is implemented into hidden local symmetry in low-energy strong interactions to arrive at a scale-invariant hidden local symmetric (HLS) theory, the scalar $f_0(500)$ may be interpreted as pseudo-Nambu-Goldstone (pNG) boson, i.e., dilaton, of spontaneously broken scale invariance, joining the pseudo-scalar pNG bosons $π$ and the matter fields $V=(ρ,ω)$ as relevant degrees of fre…
▽ More
When scale symmetry is implemented into hidden local symmetry in low-energy strong interactions to arrive at a scale-invariant hidden local symmetric (HLS) theory, the scalar $f_0(500)$ may be interpreted as pseudo-Nambu-Goldstone (pNG) boson, i.e., dilaton, of spontaneously broken scale invariance, joining the pseudo-scalar pNG bosons $π$ and the matter fields $V=(ρ,ω)$ as relevant degrees of freedom. Implementing the skyrmion-half-skyrmion transition predicted at large $N_c$ in QCD at a density roughly twice the nuclear matter density found in the crystal simulation of dense skyrmion matter, we determine the intrinsically density-dependent (IDD) "bare parameters" of the scale-invariant HLS Lagrangian matched to QCD at a matching scale $Λ_M$. The resulting effective Lagrangian, with the parameters scaling with the density of the system, is applied to nuclear matter and dense baryonic matter relevant to massive compact stars by means of the double-decimation renormalization-group $V_{lowk}$ formalism. We satisfactorily post-dict the properties of normal nuclear matter and more significantly {\it predict} the EoS of dense compact-star matter that quantitatively accounts for the presently available data coming from both the terrestrial and space laboratories. We interpret the resulting structure of compact-star matter as revealing how the combination of hidden-scale symmetry and hidden local symmetry manifests itself in compressed baryonic matter.
△ Less
Submitted 4 April, 2016; v1 submitted 21 August, 2015;
originally announced August 2015.
-
A Novel Method for Stock Forecasting based on Fuzzy Time Series Combined with the Longest Common/Repeated Sub-sequence
Authors:
He-Wen Chen,
Zih-Ci Wang,
Shu-Yu Kuo,
Yao-Hsin Chou
Abstract:
Stock price forecasting is an important issue for investors since extreme accuracy in forecasting can bring about high profits. Fuzzy Time Series (FTS) and Longest Common/Repeated Sub-sequence (LCS/LRS) are two important issues for forecasting prices. However, to the best of our knowledge, there are no significant studies using LCS/LRS to predict stock prices. It is impossible that prices stay exa…
▽ More
Stock price forecasting is an important issue for investors since extreme accuracy in forecasting can bring about high profits. Fuzzy Time Series (FTS) and Longest Common/Repeated Sub-sequence (LCS/LRS) are two important issues for forecasting prices. However, to the best of our knowledge, there are no significant studies using LCS/LRS to predict stock prices. It is impossible that prices stay exactly the same as historic prices. Therefore, this paper proposes a state-of-the-art method which combines FTS and LCS/LRS to predict stock prices. This method is based on the principle that history will repeat itself. It uses different interval lengths in FTS to fuzzify the prices, and LCS/LRS to look for the same pattern in the historical prices to predict future stock prices. In the experiment, we examine various intervals of fuzzy time sets in order to achieve high prediction accuracy. The proposed method outperforms traditional methods in terms of prediction accuracy and, furthermore, it is easy to implement.
△ Less
Submitted 21 June, 2015;
originally announced June 2015.
-
Shell-model study of quadrupole collectivity in light tin isotopes
Authors:
L. Coraggio,
A. Covello,
A. Gargano,
N. Itaco,
T. T. S. Kuo
Abstract:
A realistic shell-model study is performed for neutron-deficient tin isotopes up to mass A=108. All shell-model ingredients, namely two-body matrix elements, single-particle energies, and effective charges for electric quadrupole transition operators, have been calculated by way of the many-body perturbation theory, starting from a low-momentum interaction derived from the high-precision CD-Bonn f…
▽ More
A realistic shell-model study is performed for neutron-deficient tin isotopes up to mass A=108. All shell-model ingredients, namely two-body matrix elements, single-particle energies, and effective charges for electric quadrupole transition operators, have been calculated by way of the many-body perturbation theory, starting from a low-momentum interaction derived from the high-precision CD-Bonn free nucleon-nucleon potential. The focus has been put on the enhanced quadrupole collectivity of these nuclei, which is testified by the observed large B(E2;0+ -> 2+)s. Our results evidence the crucial role played by the Z=50 cross-shell excitations that need to be taken into account explicitly to obtain a satisfactory theoretical description of light tin isotopes. We find also that a relevant contribution comes from the calculated neutron effective charges, whose magnitudes exceed the standard empirical values. An original double-step procedure has been introduced to reduce effectively the model space in order to overcome the computational problem.
△ Less
Submitted 13 April, 2015; v1 submitted 20 February, 2015;
originally announced February 2015.
-
Stiffer EoS for Compact Star with New Scaling Law
Authors:
Kyungmin Kim,
T. T. S. Kuo,
Hyun Kyu Lee,
Jaehyun Lee,
Mannque Rho
Abstract:
We present in this paper a simple and unequivocal prediction on the deformation of the compact star, that will be measured in gravity waves, with an EoS obtained in renormailzation-group implemented effective field theory anchored on scale and hidden-local symmetric Lagrangian endowed with topology change . The objective is not to offer a superior or improved EoS for compact stars but to confront…
▽ More
We present in this paper a simple and unequivocal prediction on the deformation of the compact star, that will be measured in gravity waves, with an EoS obtained in renormailzation-group implemented effective field theory anchored on scale and hidden-local symmetric Lagrangian endowed with topology change . The objective is not to offer a superior or improved EoS for compact stars but to confront with a forthcoming astrophysical observable the given model formulated in what is considered to be consistent with the premise of QCD. The model so obtained is found to satisfactorily describe the observation of a 2-solar mass neutron star with a minimum number of parameters. Specifically the observable we are considering in this paper is the tidal deformability parameter $λ$ (equivalently the Love number, $k_2$) in gravity waves. The merit of our prediction is that the prediction can be readily confirmed or falsified by forth-coming aLIGO and aVirgo gravity-wave observations and provide a valuable guidance for arriving at a better understanding of highly compressed baryonic matter.
△ Less
Submitted 3 August, 2015; v1 submitted 17 December, 2014;
originally announced December 2014.
-
Core polarization, Brown-Rho scaling and a memory of Gerry's Princeton years
Authors:
T. T. S. Kuo,
J. W. Holt
Abstract:
Core-polarization (CP) and Brown-Rho (BR) scaling were among Gerry's most favorite topics. In this contribution, we will discuss some of the early history as well as more recent work associated with these two fascinating phenomena. I (TTSK) will begin with some recollections of Princeton, where I met Gerry for the first time in 1964 and worked as his postdoc. Core polarization was in fact the firs…
▽ More
Core-polarization (CP) and Brown-Rho (BR) scaling were among Gerry's most favorite topics. In this contribution, we will discuss some of the early history as well as more recent work associated with these two fascinating phenomena. I (TTSK) will begin with some recollections of Princeton, where I met Gerry for the first time in 1964 and worked as his postdoc. Core polarization was in fact the first topic he assigned to me. JWH started working with Gerry at Stony Brook from 2003 and was Gerry's last student in nuclear physics. We three had teamed up well, working closely on both CP and BR scaling, particularly on the latter's connection to the anomalously-long beta-decay lifetime of carbon-14. We shall here briefly review these topics, including a recently developed new Brown-Rho scaling based on a Skyrmion half-Skyrmion two-phase model.
△ Less
Submitted 2 September, 2014;
originally announced September 2014.
-
Two-photon interference with continuous-wave multi-mode coherent light
Authors:
Yong-Su Kim,
Oliver Slattery,
Paulina S. Kuo,
Xiao Tang
Abstract:
We report two-photon interference with continuous-wave multi-mode coherent light. We show that the two-photon interference, in terms of the detection time difference, reveals two-photon beating fringes with the visibility $V = 0.5$. While scanning the optical delay of the interferometer, Hong-Ou-Mandel dips or peaks are measured depending on the chosen detection time difference. The HOM dips/peaks…
▽ More
We report two-photon interference with continuous-wave multi-mode coherent light. We show that the two-photon interference, in terms of the detection time difference, reveals two-photon beating fringes with the visibility $V = 0.5$. While scanning the optical delay of the interferometer, Hong-Ou-Mandel dips or peaks are measured depending on the chosen detection time difference. The HOM dips/peaks are repeated when the optical delay and the first-order coherence revival period of the multi-mode coherent light are the same.
△ Less
Submitted 11 September, 2013;
originally announced September 2013.
-
Fault-tolerant Operations for Universal Blind Quantum Computation
Authors:
Chia-Hung Chien,
Rodney Van Meter,
Sy-Yen Kuo
Abstract:
Blind quantum computation is an appealing use of quantum information technology because it can conceal both the client's data and the algorithm itself from the server. However, problems need to be solved in the practical use of blind quantum computation and fault-tolerance is a major challenge. On an example circuit, the computational cost measured in T gates executed by the client is 97 times mor…
▽ More
Blind quantum computation is an appealing use of quantum information technology because it can conceal both the client's data and the algorithm itself from the server. However, problems need to be solved in the practical use of blind quantum computation and fault-tolerance is a major challenge. On an example circuit, the computational cost measured in T gates executed by the client is 97 times more than performing the original computation directly, without using the server, even before applying error correction. (The client still benefits due to drastically reduced memory requirements.) Broadbent et al. proposed running error correction over blind computation, but our first protocol applies one layer of Steane's [[7,1,3]] code underneath instead. This protocol has better fault tolerance, but still results in a substantial overhead. We propose another protocol to reduce the client's computational load by transferring the qubit preparation to the server. For each logical qubit used in the computation, the client is only required to receive eight logical qubits via teleportation then buffer two logical qubits before returning one. This protocol also protects the client's fault-tolerant preparation of logical qubits from a side-channel attack.
△ Less
Submitted 16 June, 2013;
originally announced June 2013.
-
Prospects for Observing and Localizing Gravitational-Wave Transients with Advanced LIGO, Advanced Virgo and KAGRA
Authors:
The LIGO Scientific Collaboration,
the Virgo Collaboration,
the KAGRA Collaboration,
B. P. Abbott,
R. Abbott,
T. D. Abbott,
S. Abraham,
F. Acernese,
K. Ackley,
C. Adams,
V. B. Adya,
C. Affeldt,
M. Agathos,
K. Agatsuma,
N. Aggarwal,
O. D. Aguiar,
L. Aiello,
A. Ain,
P. Ajith,
T. Akutsu,
G. Allen,
A. Allocca,
M. A. Aloy,
P. A. Altin,
A. Amato
, et al. (1297 additional authors not shown)
Abstract:
We present our current best estimate of the plausible observing scenarios for the Advanced LIGO, Advanced Virgo and KAGRA gravitational-wave detectors over the next several years, with the intention of providing information to facilitate planning for multi-messenger astronomy with gravitational waves. We estimate the sensitivity of the network to transient gravitational-wave signals for the third…
▽ More
We present our current best estimate of the plausible observing scenarios for the Advanced LIGO, Advanced Virgo and KAGRA gravitational-wave detectors over the next several years, with the intention of providing information to facilitate planning for multi-messenger astronomy with gravitational waves. We estimate the sensitivity of the network to transient gravitational-wave signals for the third (O3), fourth (O4) and fifth observing (O5) runs, including the planned upgrades of the Advanced LIGO and Advanced Virgo detectors. We study the capability of the network to determine the sky location of the source for gravitational-wave signals from the inspiral of binary systems of compact objects, that is BNS, NSBH, and BBH systems. The ability to localize the sources is given as a sky-area probability, luminosity distance, and comoving volume. The median sky localization area (90\% credible region) is expected to be a few hundreds of square degrees for all types of binary systems during O3 with the Advanced LIGO and Virgo (HLV) network. The median sky localization area will improve to a few tens of square degrees during O4 with the Advanced LIGO, Virgo, and KAGRA (HLVK) network. We evaluate sensitivity and localization expectations for unmodeled signal searches, including the search for intermediate mass black hole binary mergers.
△ Less
Submitted 24 November, 2020; v1 submitted 2 April, 2013;
originally announced April 2013.
-
Conditions for two-photon interference with coherent pulses
Authors:
Yong-Su Kim,
Oliver Slattery,
Paulina S. Kuo,
Xiao Tang
Abstract:
We study the conditions for two-photon classical interference with coherent pulses. We find that the temporal overlap between optical pulses is not required for interference However, coherence within the same inputs is found to be essential for the interference.
We study the conditions for two-photon classical interference with coherent pulses. We find that the temporal overlap between optical pulses is not required for interference However, coherence within the same inputs is found to be essential for the interference.
△ Less
Submitted 27 June, 2013; v1 submitted 1 March, 2013;
originally announced March 2013.
-
Pairing and realistic shell-model interactions
Authors:
A. Covello,
A. Gargano,
T. T. S Kuo
Abstract:
This paper starts with a brief historical overview of pairing in nuclei, which fulfills the purpose of properly framing the main subject. This concerns the pairing properties of a realistic shell-model effective interaction which has proved very successful in describing nuclei around doubly magic 132Sn. We focus attention on the two nuclei 134Te and 134Sn with two valence protons and neutrons, res…
▽ More
This paper starts with a brief historical overview of pairing in nuclei, which fulfills the purpose of properly framing the main subject. This concerns the pairing properties of a realistic shell-model effective interaction which has proved very successful in describing nuclei around doubly magic 132Sn. We focus attention on the two nuclei 134Te and 134Sn with two valence protons and neutrons, respectively. Our study brings out the key role of one particle-one hole excitations in producing a significant difference between proton and neutron pairing in this region.
△ Less
Submitted 20 November, 2012;
originally announced November 2012.
-
Second-harmonic generation using 4-bar quasi-phasematching in a GaAs microdisk cavity
Authors:
Paulina S. Kuo,
Glenn S. Solomon
Abstract:
The 4-bar crystal symmetry in materials such as GaAs can enable quasi-phasematching for efficient frequency conversion without poling, twinning or other engineered domain inversions. 4-bar symmetry means that a 90 degree rotation is equivalent to a crystallographic inversion. Therefore, propagation geometries where light circulates about the 4-bar axis produce effective domain inversions, useful f…
▽ More
The 4-bar crystal symmetry in materials such as GaAs can enable quasi-phasematching for efficient frequency conversion without poling, twinning or other engineered domain inversions. 4-bar symmetry means that a 90 degree rotation is equivalent to a crystallographic inversion. Therefore, propagation geometries where light circulates about the 4-bar axis produce effective domain inversions, useful for quasi-phasematching. Microdisk optical cavities also offer resonance field-enhancement and excellent spatial overlap, resulting in highly efficient frequency conversion in micrometer-scale volumes. These devices can be integrated in photonic circuits as compact sources of radiation or entangled photons. Efficient second-order frequency conversion is a new functionality for nonlinear semiconductor microdisk resonators, which have been previously explored for all-optical circuits as switches, signal routers and optical logic gates. Arrays of microresonators can produce slow light and robust optical delay lines. Here, we present the first experimental observation of efficient second-harmonic generation in a microdisk cavity utilizing 4-bar quasi-phasematching.
△ Less
Submitted 6 October, 2012;
originally announced October 2012.
-
Half-Skyrmions and the Equation of State for Compact-Star Matter
Authors:
Huan Dong,
T. T. S. Kuo,
Hyun Kyu Lee,
R. Machleidt,
Mannque Rho
Abstract:
The half-skyrmions that appear in dense baryonic matter when skyrmions are put on crystals modify drastically hadron properties in dense medium and affect strongly the nuclear tensor forces, thereby influencing the equation of state (EoS) of dense nuclear and asymmetric nuclear matter. The matter comprised of half skyrmions has vanishing quark condensate but non-vanishing pion decay constant and c…
▽ More
The half-skyrmions that appear in dense baryonic matter when skyrmions are put on crystals modify drastically hadron properties in dense medium and affect strongly the nuclear tensor forces, thereby influencing the equation of state (EoS) of dense nuclear and asymmetric nuclear matter. The matter comprised of half skyrmions has vanishing quark condensate but non-vanishing pion decay constant and could be interpreted as a hadronic dual of strong-coupled quark matter. We infer from this observation combined with certain predictions of hidden local symmetry in low-energy hadronic interactionsa a set of new scaling laws -- called "new-BR" -- for the parameters in nuclear effective field theory controlled by renormalization-group flow. They are subjected to the EoS of symmetric and asymmetric nuclear matter, and are then applied to nuclear symmetry energies and properties of compact stars. The changeover from the skyrmion matter to a half-skyrmion matter that takes place after the cross-over density $n_{1/2}$ provides a simple and natural field theoretic explanation for the change of the EoS from soft to stiff at a density above that of nuclear matter required for compact stars as massive as $\sim 2.4M_\odot$. Cross-over density in the range $1.5n_0 \lsim n_{1/2} \lsim 2.0 n_0$ has been employed, and the possible skyrmion half-skyrmion coexistence {or cross-over} near $n_{1/2}$ is discussed. The novel structure of {the tensor forces and} the EoS obtained with the new-BR scaling is relevant for neutron-rich nuclei and compact star matter and could be studied in RIB (rare isotope beam) machines.
△ Less
Submitted 29 May, 2013; v1 submitted 2 July, 2012;
originally announced July 2012.
-
Effective shell-model hamiltonians from realistic nucleon-nucleon potentials within a perturbative approach
Authors:
L. Coraggio,
A. Covello,
A. Gargano,
N. Itaco,
T. T. S. Kuo
Abstract:
This paper discusses the derivation of an effective shell-model hamiltonian starting from a realistic nucleon-nucleon potential by way of perturbation theory. More precisely, we present the state of the art of this approach when the starting point is the perturbative expansion of the Q-box vertex function. Questions arising from diagrammatics, intermediate-states and order-by-order convergences, a…
▽ More
This paper discusses the derivation of an effective shell-model hamiltonian starting from a realistic nucleon-nucleon potential by way of perturbation theory. More precisely, we present the state of the art of this approach when the starting point is the perturbative expansion of the Q-box vertex function. Questions arising from diagrammatics, intermediate-states and order-by-order convergences, and their dependence on the chosen nucleon-nucleon potential, are discussed in detail, and the results of numerical applications for the p-shell model space starting from chiral next-to-next-to-next-to-leading order potentials are shown. Moreover, an alternative graphical method to derive the effective hamiltonian, based on the Z-box vertex function recently introduced by Suzuki et al., is applied to the case of a non-degenerate (0+2) hbaromega model space. Finally, our shell-model results are compared with the exact ones obtained from no-core shell-model calculations.
△ Less
Submitted 3 May, 2012; v1 submitted 2 May, 2012;
originally announced May 2012.
-
Shell-model descriptions of mass 16-19 nuclei with chiral two- and three-nucleon interactions
Authors:
Huan Dong,
T. T. S. Kuo,
J. W. Holt
Abstract:
Shell-model calculations for several mass 16-19 nuclei are performed using the N$^3$LO two-nucleon potential $V_{2N}$ with and without the addition of an in-medium three-nucleon potential $V_{3N}^{med}$, which is a density-dependent effective two-nucleon potential recently derived from the leading-order chiral three-nucleon force $V_{3N}$ by Holt, Kaiser, and Weise. We first calculate the…
▽ More
Shell-model calculations for several mass 16-19 nuclei are performed using the N$^3$LO two-nucleon potential $V_{2N}$ with and without the addition of an in-medium three-nucleon potential $V_{3N}^{med}$, which is a density-dependent effective two-nucleon potential recently derived from the leading-order chiral three-nucleon force $V_{3N}$ by Holt, Kaiser, and Weise. We first calculate the $V_{low-k}$ low-momentum interactions from $V_{2N}$ and $V_{3N}^{med}$. The shell-model effective interactions for both the $sd$ one-shell and $sdpf$ two-shell model spaces are then obtained from these low-momentum interactions using respectively the Lee-Suzuki and the recently developed Okamoto and Suzuki iteration methods.
The effects of $V_{3N}^{med}$ to the low-lying states of $^{18}O$, $^{18}F$, $^{19}O$ and $^{19}F$ are generally small and attractive, mainly lowering the ground-state energies of these nuclei and making them in better agreements with experiments than those calculated with $V_{2N}$ alone. The excitation spectra of these nuclei are not significantly affected by $V_{3N}^{med}$. The low-lying spectra of these nuclei calculated with the $sd$ and $sdpf$ model spaces are closely similar to each other. Our shell-model calculations for $^{16}O$ indicate that the $V_{3N}^{med}$ interaction is important and desirable for the binding energy of this nucleus.
△ Less
Submitted 20 May, 2011;
originally announced May 2011.
-
Lost in translation: data integration tools meet the Semantic Web (experiences from the Ondex project)
Authors:
Andrea Splendiani,
Chris J Rawlings,
Shao-Chih Kuo,
Robert Stevens,
Phillip Lord
Abstract:
More information is now being published in machine processable form on the web and, as de-facto distributed knowledge bases are materializing, partly encouraged by the vision of the Semantic Web, the focus is shifting from the publication of this information to its consumption. Platforms for data integration, visualization and analysis that are based on a graph representation of information appear…
▽ More
More information is now being published in machine processable form on the web and, as de-facto distributed knowledge bases are materializing, partly encouraged by the vision of the Semantic Web, the focus is shifting from the publication of this information to its consumption. Platforms for data integration, visualization and analysis that are based on a graph representation of information appear first candidates to be consumers of web-based information that is readily expressible as graphs. The question is whether the adoption of these platforms to information available on the Semantic Web requires some adaptation of their data structures and semantics. Ondex is a network-based data integration, analysis and visualization platform which has been developed in a Life Sciences context. A number of features, including semantic annotation via ontologies and an attention to provenance and evidence, make this an ideal candidate to consume Semantic Web information, as well as a prototype for the application of network analysis tools in this context. By analyzing the Ondex data structure and its usage, we have found a set of discrepancies and errors arising from the semantic mismatch between a procedural approach to network analysis and the implications of a web-based representation of information. We report in the paper on the simple methodology that we have adopted to conduct such analysis, and on issues that we have found which may be relevant for a range of similar platforms
△ Less
Submitted 24 March, 2011;
originally announced March 2011.
-
Fully microscopic shell-model calculations with realistic effective hamiltonians
Authors:
L. Coraggio,
A. Covello,
A. Gargano,
N. Itaco,
T. T. S. Kuo
Abstract:
The advent of nucleon-nucleon potentials derived from chiral perturbation theory, as well as the so-called V-low-k approach to the renormalization of the strong short-range repulsion contained in the potentials, have brought renewed interest in realistic shell-model calculations. Here we focus on calculations where a fully microscopic approach is adopted. No phenomenological input is needed in the…
▽ More
The advent of nucleon-nucleon potentials derived from chiral perturbation theory, as well as the so-called V-low-k approach to the renormalization of the strong short-range repulsion contained in the potentials, have brought renewed interest in realistic shell-model calculations. Here we focus on calculations where a fully microscopic approach is adopted. No phenomenological input is needed in these calculations, because single-particle energies, matrix elements of the two-body interaction, and matrix elements of the electromagnetic multipole operators are derived theoretically. This has been done within the framework of the time-dependent degenerate linked-diagram perturbation theory. We present results for some nuclei in different mass regions. These evidence the ability of realistic effective hamiltonians to provide an accurate description of nuclear structure properties.
△ Less
Submitted 24 January, 2011;
originally announced January 2011.
-
Low-momentum interactions with Brown-Rho-Ericson scalings and the density dependence of the nuclear symmetry energy
Authors:
Huan Dong,
T. T. S. Kuo,
R. Machleidt
Abstract:
We have calculated the nuclear symmetry energy $E_{sym}(ρ)$ up to densities of $4 \sim 5 ρ_0$ with the effects from the Brown-Rho (BR) and Ericson scalings for the in-medium mesons included. Using the $V_{low-k}$ low-momentum interaction with and without such scalings, the equations of state (EOS) of symmetric and asymmetric nuclear matter have been calculated using a ring-diagarm formalism where…
▽ More
We have calculated the nuclear symmetry energy $E_{sym}(ρ)$ up to densities of $4 \sim 5 ρ_0$ with the effects from the Brown-Rho (BR) and Ericson scalings for the in-medium mesons included. Using the $V_{low-k}$ low-momentum interaction with and without such scalings, the equations of state (EOS) of symmetric and asymmetric nuclear matter have been calculated using a ring-diagarm formalism where the particle-particle-hole-hole ring diagrams are included to all orders. The EOS for symmetric nuclear matter and neutron matter obtained with linear BR scaling are both overly stiff compared with the empirical constraints of Danielewicz {\it et al.} \cite{daniel02}. In contrast, satisfactory results are obtained by either using the nonlinear Ericson scaling or by adding a Skyrme-type three-nucleon force (TNF) to the unscaled $V_{low-k}$ interaction.
Our results for $E_{sym}(ρ)$ obtained with the nonlinear Ericson scaling are in good agreement with the empirical values of Tsang {\it et al.} \cite{tsang09} and Li {\it et al.} \cite{li05}, while those with TNF are slightly below these values. For densities below the nuclear saturation density $ρ_0$, the results of the above calculations are nearly equivalent to each other and all in satisfactory agreement with the empirical values.
△ Less
Submitted 10 January, 2011;
originally announced January 2011.
-
Non-degenerate shell-model effective interactions from the Okamoto-Suzuki and Krenciglowa-Kuo iteration methods
Authors:
Huan Dong,
T. T. S. Kuo,
J. W. Holt
Abstract:
We present calculations of shell-model effective interactions for both degenerate and non-degenerate model spaces using the Krenciglowa-Kuo (KK) and the extended Krenciglowa-Kuo iteration method recently developed by Okamoto, Suzuki {\it et al.} (EKKO). The starting point is the low-momentum nucleon-nucleon interaction $V_{low-k}$ obtained from the N$^3$LO chiral two-nucleon interaction. The model…
▽ More
We present calculations of shell-model effective interactions for both degenerate and non-degenerate model spaces using the Krenciglowa-Kuo (KK) and the extended Krenciglowa-Kuo iteration method recently developed by Okamoto, Suzuki {\it et al.} (EKKO). The starting point is the low-momentum nucleon-nucleon interaction $V_{low-k}$ obtained from the N$^3$LO chiral two-nucleon interaction. The model spaces spanned by the $sd$ and $sdpf$ shells are both considered. With a solvable model, we show that both the KK and EKKO methods are convenient for deriving the effective interactions for non-degenerate model spaces. The EKKO method is especially desirable in this situation since the vertex function $\hat Z$-box employed therein is well behaved while the corresponding vertex function $\hat Q$-box employed in the Lee-Suzuki (LS) and KK methods may have singularities. The converged shell-model effective interactions given by the EKKO and KK methods are equivalent, although the former method is considerably more efficient. The degenerate $sd$-shell effective interactions given by the LS method are practically identical to those from the EKKO and KK methods. Results of the $sd$ one-shell and $sdpf$ two-shell calculations for $^{18}$O, $^{18}$F, $^{19}$O and $^{19}$F using the EKKO effective interactions are compared, and the importance of the shell-model three-nucleon forces is discussed.
△ Less
Submitted 23 May, 2011; v1 submitted 5 November, 2010;
originally announced November 2010.
-
Fermionic-bosonic couplings in a weakly-deformed odd-mass nucleus, $^{93}_{41}$Nb
Authors:
J. N. Orce,
J. D. Holt,
A. Linnemann,
C. J. McKay,
C. Fransen,
J. Jolie,
T. T. S. Kuo,
S. R. Lesher,
M. T. McEllistrem,
N. Pietralla,
V. Werner,
S. W. Yates
Abstract:
A comprehensive decay scheme of $^{93}$Nb below 2 MeV has been constructed from information obtained with the $^{93}$Nb(n,n$^\prime$$γ$) and $^{94}$Zr(p,2n$γ$$γ$)$^{93}$Nb reactions. Branching ratios, lifetimes, transition multipolarities and spin assignments have been determined. From $M1$ and $E2$ strengths, fermionic-bosonic excitations of isoscalar and isovector character have been identified…
▽ More
A comprehensive decay scheme of $^{93}$Nb below 2 MeV has been constructed from information obtained with the $^{93}$Nb(n,n$^\prime$$γ$) and $^{94}$Zr(p,2n$γ$$γ$)$^{93}$Nb reactions. Branching ratios, lifetimes, transition multipolarities and spin assignments have been determined. From $M1$ and $E2$ strengths, fermionic-bosonic excitations of isoscalar and isovector character have been identified from the weak coupling $\pi1g_{9/2}$$\otimes$$^{92}_{40}$Zr and $\pi2p_{1/2}^{-1}$$\otimes$$^{94}_{42}$Mo configurations. A microscopic interpretation of such excitations is attained from shell-model calculations using low-momentum effective interactions.
△ Less
Submitted 21 July, 2010; v1 submitted 16 July, 2010;
originally announced July 2010.
-
Unitarity potentials and neutron matter at the unitary limit
Authors:
Huan Dong,
L. -W. Siu,
T. T. S. Kuo,
R. Machleidt
Abstract:
We study the equation of state of neutron matter using a family of unitarity potentials all of which are constructed to have infinite $^1S_0$ scattering lengths $a_s$. For such system, a quantity of much interest is the ratio $ξ=E_0/E_0^{free}$ where $E_0$ is the true ground-state energy of the system, and $E_0^{free}$ is that for the non-interacting system. In the limit of $a_s\to \pm \infty$,…
▽ More
We study the equation of state of neutron matter using a family of unitarity potentials all of which are constructed to have infinite $^1S_0$ scattering lengths $a_s$. For such system, a quantity of much interest is the ratio $ξ=E_0/E_0^{free}$ where $E_0$ is the true ground-state energy of the system, and $E_0^{free}$ is that for the non-interacting system. In the limit of $a_s\to \pm \infty$, often referred to as the unitary limit, this ratio is expected to approach a universal constant, namely $ξ\sim 0.44(1)$. In the present work we calculate this ratio $ξ$ using a family of hard-core square-well potentials whose $a_s$ can be exactly obtained, thus enabling us to have many potentials of different ranges and strengths, all with infinite $a_s$. We have also calculated $ξ$ using a unitarity CDBonn potential obtained by slightly scaling its meson parameters. The ratios $ξ$ given by these different unitarity potentials are all close to each other and also remarkably close to 0.44, suggesting that the above ratio $ξ$ is indifferent to the details of the underlying interactions as long as they have infinite scattering length. A sum-rule and scaling constraint for the renormalized low-momentum interaction in neutron matter at the unitary limit is discussed.
△ Less
Submitted 22 February, 2010; v1 submitted 1 December, 2009;
originally announced December 2009.
-
Constrained Function Based En-Route Filtering for Sensor Networks
Authors:
Chia-Mu Yu,
Chun-Shien Lu,
Sy-Yen Kuo
Abstract:
Sensor networks are vulnerable to \emph{false data injection attack} and \emph{path-based DoS} (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an \emph{en-route filtering} scheme acts as a defense against these two attacks. To construct an efficient en-route filtering scheme, this paper first presents a Constrained Function based me…
▽ More
Sensor networks are vulnerable to \emph{false data injection attack} and \emph{path-based DoS} (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an \emph{en-route filtering} scheme acts as a defense against these two attacks. To construct an efficient en-route filtering scheme, this paper first presents a Constrained Function based message Authentication (CFA) scheme, which can be thought of as a hash function directly supporting the en-route filtering functionality. Together with the \emph{redundancy property} of sensor networks, which means that an event can be simultaneously observed by multiple sensor nodes, the devised CFA scheme is used to construct a CFA-based en-route filtering (CFAEF) scheme. In contrast to most of the existing methods, which rely on complicated security associations among sensor nodes, our design, which directly exploits an en-route filtering hash function, appears to be novel. We examine the CFA and CFAEF schemes from both the theoretical and numerical aspects to demonstrate their efficiency and effectiveness.
△ Less
Submitted 22 November, 2009;
originally announced November 2009.
-
Secure Multidimensional Queries in Tiered Sensor Networks
Authors:
Chia-Mu Yu,
Chun-Shien Lu,
Sy-Yen Kuo
Abstract:
In this paper, aiming at securing range query, top-k query, and skyline query in tiered sensor networks, we propose the Secure Range Query (SRQ), Secure Top-$k$ Query (STQ), and Secure Skyline Query (SSQ) schemes, respectively. In particular, SRQ, by using our proposed \emph{prime aggregation} technique, has the lowest communication overhead among prior works, while STQ and SSQ, to our knowledge…
▽ More
In this paper, aiming at securing range query, top-k query, and skyline query in tiered sensor networks, we propose the Secure Range Query (SRQ), Secure Top-$k$ Query (STQ), and Secure Skyline Query (SSQ) schemes, respectively. In particular, SRQ, by using our proposed \emph{prime aggregation} technique, has the lowest communication overhead among prior works, while STQ and SSQ, to our knowledge, are the first proposals in tiered sensor networks for securing top-$k$ and skyline queries, respectively. Moreover, the relatively unexplored issue of the security impact of sensor node compromises on multidimensional queries is studied; two attacks incurred from the sensor node compromises, \emph{collusion attack} and \emph{false-incrimination attack}, are investigated in this paper. After developing a novel technique called \emph{subtree sampling}, we also explore methods of efficiently mitigating the threat of sensor node compromises. Performance analyses regarding the probability for detecting incomplete query-results and communication cost of the proposed schemes are also studied.
△ Less
Submitted 16 December, 2009; v1 submitted 22 November, 2009;
originally announced November 2009.
-
Shell-model study of the N=82 isotonic chain with a realistic effective hamiltonian
Authors:
L. Coraggio,
A. Covello,
A. Gargano,
N. Itaco,
T. T. S. Kuo
Abstract:
We have performed shell-model calculations for the even- and odd-mass N=82 isotones, focusing attention on low-energy states. The single-particle energies and effective two-body interaction have been both determined within the framework of the time-dependent degenerate linked-diagram perturbation theory, starting from a low-momentum interaction derived from the CD-Bonn nucleon-nucleon potential.…
▽ More
We have performed shell-model calculations for the even- and odd-mass N=82 isotones, focusing attention on low-energy states. The single-particle energies and effective two-body interaction have been both determined within the framework of the time-dependent degenerate linked-diagram perturbation theory, starting from a low-momentum interaction derived from the CD-Bonn nucleon-nucleon potential. In this way, no phenomenological input enters our effective Hamiltonian, whose reliability is evidenced by the good agreement between theory and experiment.
△ Less
Submitted 29 September, 2009;
originally announced September 2009.
-
Neutron star, $β$-stable ring-diagram equation of state and Brown-Rho scaling
Authors:
Huan Dong,
T. T. S. Kuo,
R. Machleidt
Abstract:
Neutron star properties, such as its mass, radius, and moment of inertia, are calculated by solving the Tolman-Oppenheimer-Volkov (TOV) equations using the ring-diagram equation of state (EOS) obtained from realistic low-momentum NN interactions $V_{low-k}$. Several NN potentials (CDBonn, Nijmegen, Argonne V18 and BonnA) have been employed to calculate the ring-diagram EOS where the particle-par…
▽ More
Neutron star properties, such as its mass, radius, and moment of inertia, are calculated by solving the Tolman-Oppenheimer-Volkov (TOV) equations using the ring-diagram equation of state (EOS) obtained from realistic low-momentum NN interactions $V_{low-k}$. Several NN potentials (CDBonn, Nijmegen, Argonne V18 and BonnA) have been employed to calculate the ring-diagram EOS where the particle-particle hole-hole ring diagrams are summed to all orders. The proton fractions for different radial regions of a $β$-stable neutron star are determined from the chemical potential conditions $μ_n-μ_p = μ_e = μ_μ$. The neutron star masses, radii and moments of inertia given by the above potentials all tend to be too small compared with the accepted values. Our results are largely improved with the inclusion of medium corrections based on Brown-Rho scaling where the in-medium meson masses, particularly those of $ω$, $ρ$ and $σ$, are slightly decreased compared with their in-vacuum values. Representative results using such medium corrected interactions are neutron star mass $M\sim 1.8 M_{\odot}$, radius $R\sim 9$ km and moment of inertia $\sim 60 M_{\odot}km^2$. The mass-radius trajectories given by the above four realistic NN potentials are by and large overlapping.
△ Less
Submitted 25 November, 2009; v1 submitted 2 September, 2009;
originally announced September 2009.
-
Low-momentum NN interactions and all-order summation of ring diagrams of symmetric nuclear matter
Authors:
L. -W. Siu,
J. W. Holt,
T. T. S. Kuo,
G. E. Brown
Abstract:
We study the equation of state for symmetric nuclear matter using a ring-diagram approach in which the particle-particle hole-hole ($pphh$) ring diagrams within a momentum model space of decimation scale $Λ$ are summed to all orders. The calculation is carried out using the renormalized low-momentum nucleon-nucleon (NN) interaction $V_{low-k}$, which is obtained from a bare NN potential by integ…
▽ More
We study the equation of state for symmetric nuclear matter using a ring-diagram approach in which the particle-particle hole-hole ($pphh$) ring diagrams within a momentum model space of decimation scale $Λ$ are summed to all orders. The calculation is carried out using the renormalized low-momentum nucleon-nucleon (NN) interaction $V_{low-k}$, which is obtained from a bare NN potential by integrating out the high-momentum components beyond $Λ$. The bare NN potentials of CD-Bonn, Nijmegen and Idaho have been employed. The choice of $Λ$ and its influence on the single particle spectrum are discussed. Ring-diagram correlations at intermediate momenta ($k\simeq$ 2 fm$^{-1}$) are found to be particularly important for nuclear saturation, suggesting the necessity of using a sufficiently large decimation scale so that the above momentum region is not integrated out. Using $V_{low-k}$ with $Λ\sim 3$ fm$^{-1}$, we perform a ring-diagram computation with the above potentials, which all yield saturation energies $E/A$ and Fermi momenta $k_F^{(0)}$ considerably larger than the empirical values. On the other hand, similar computations with the medium-dependent Brown-Rho scaled NN potentials give satisfactory results of $E/A \simeq -15$ MeV and $k_F^{(0)}\simeq 1.4$ fm$^{-1}$. The effect of this medium dependence is well reproduced by an empirical 3-body force of the Skyrme type.
△ Less
Submitted 7 April, 2009;
originally announced April 2009.