-
Slice-100K: A Multimodal Dataset for Extrusion-based 3D Printing
Authors:
Anushrut Jignasu,
Kelly O. Marshall,
Ankush Kumar Mishra,
Lucas Nerone Rillo,
Baskar Ganapathysubramanian,
Aditya Balu,
Chinmay Hegde,
Adarsh Krishnamurthy
Abstract:
G-code (Geometric code) or RS-274 is the most widely used computer numerical control (CNC) and 3D printing programming language. G-code provides machine instructions for the movement of the 3D printer, especially for the nozzle, stage, and extrusion of material for extrusion-based additive manufacturing. Currently there does not exist a large repository of curated CAD models along with their corre…
▽ More
G-code (Geometric code) or RS-274 is the most widely used computer numerical control (CNC) and 3D printing programming language. G-code provides machine instructions for the movement of the 3D printer, especially for the nozzle, stage, and extrusion of material for extrusion-based additive manufacturing. Currently there does not exist a large repository of curated CAD models along with their corresponding G-code files for additive manufacturing. To address this issue, we present SLICE-100K, a first-of-its-kind dataset of over 100,000 G-code files, along with their tessellated CAD model, LVIS (Large Vocabulary Instance Segmentation) categories, geometric properties, and renderings. We build our dataset from triangulated meshes derived from Objaverse-XL and Thingi10K datasets. We demonstrate the utility of this dataset by finetuning GPT-2 on a subset of the dataset for G-code translation from a legacy G-code format (Sailfish) to a more modern, widely used format (Marlin). SLICE-100K will be the first step in developing a multimodal foundation model for digital manufacturing.
△ Less
Submitted 11 July, 2024; v1 submitted 4 July, 2024;
originally announced July 2024.
-
Arboretum: A Large Multimodal Dataset Enabling AI for Biodiversity
Authors:
Chih-Hsuan Yang,
Benjamin Feuer,
Zaki Jubery,
Zi K. Deng,
Andre Nakkab,
Md Zahid Hasan,
Shivani Chiranjeevi,
Kelly Marshall,
Nirmal Baishnab,
Asheesh K Singh,
Arti Singh,
Soumik Sarkar,
Nirav Merchant,
Chinmay Hegde,
Baskar Ganapathysubramanian
Abstract:
We introduce Arboretum, the largest publicly accessible dataset designed to advance AI for biodiversity applications. This dataset, curated from the iNaturalist community science platform and vetted by domain experts to ensure accuracy, includes 134.6 million images, surpassing existing datasets in scale by an order of magnitude. The dataset encompasses image-language paired data for a diverse set…
▽ More
We introduce Arboretum, the largest publicly accessible dataset designed to advance AI for biodiversity applications. This dataset, curated from the iNaturalist community science platform and vetted by domain experts to ensure accuracy, includes 134.6 million images, surpassing existing datasets in scale by an order of magnitude. The dataset encompasses image-language paired data for a diverse set of species from birds (Aves), spiders/ticks/mites (Arachnida), insects (Insecta), plants (Plantae), fungus/mushrooms (Fungi), snails (Mollusca), and snakes/lizards (Reptilia), making it a valuable resource for multimodal vision-language AI models for biodiversity assessment and agriculture research. Each image is annotated with scientific names, taxonomic details, and common names, enhancing the robustness of AI model training.
We showcase the value of Arboretum by releasing a suite of CLIP models trained using a subset of 40 million captioned images. We introduce several new benchmarks for rigorous assessment, report accuracy for zero-shot learning, and evaluations across life stages, rare species, confounding species, and various levels of the taxonomic hierarchy.
We anticipate that Arboretum will spur the development of AI models that can enable a variety of digital tools ranging from pest control strategies, crop monitoring, and worldwide biodiversity assessment and environmental conservation. These advancements are critical for ensuring food security, preserving ecosystems, and mitigating the impacts of climate change. Arboretum is publicly available, easily accessible, and ready for immediate use.
Please see the \href{https://baskargroup.github.io/Arboretum/}{project website} for links to our data, models, and code.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
Robust Concept Erasure Using Task Vectors
Authors:
Minh Pham,
Kelly O. Marshall,
Chinmay Hegde,
Niv Cohen
Abstract:
With the rapid growth of text-to-image models, a variety of techniques have been suggested to prevent undesirable image generations. Yet, these methods often only protect against specific user prompts and have been shown to allow unsafe generations with other inputs. Here we focus on unconditionally erasing a concept from a text-to-image model rather than conditioning the erasure on the user's pro…
▽ More
With the rapid growth of text-to-image models, a variety of techniques have been suggested to prevent undesirable image generations. Yet, these methods often only protect against specific user prompts and have been shown to allow unsafe generations with other inputs. Here we focus on unconditionally erasing a concept from a text-to-image model rather than conditioning the erasure on the user's prompt. We first show that compared to input-dependent erasure methods, concept erasure that uses Task Vectors (TV) is more robust to unexpected user inputs, not seen during training. However, TV-based erasure can also affect the core performance of the edited model, particularly when the required edit strength is unknown. To this end, we propose a method called Diverse Inversion, which we use to estimate the required strength of the TV edit. Diverse Inversion finds within the model input space a large set of word embeddings, each of which induces the generation of the target concept. We find that encouraging diversity in the set makes our estimation more robust to unexpected prompts. Finally, we show that Diverse Inversion enables us to apply a TV edit only to a subset of the model weights, enhancing the erasure capabilities while better maintaining the core functionality of the model.
△ Less
Submitted 4 April, 2024;
originally announced April 2024.
-
AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response
Authors:
Govind Mittal,
Arthur Jakobsson,
Kelly O. Marshall,
Chinmay Hegde,
Nasir Memon
Abstract:
Scammers are aggressively leveraging AI voice-cloning technology for social engineering attacks, a situation significantly worsened by the advent of audio Real-time Deepfakes (RTDFs). RTDFs can clone a target's voice in real-time over phone calls, making these interactions highly interactive and thus far more convincing. Our research confidently addresses the gap in the existing literature on deep…
▽ More
Scammers are aggressively leveraging AI voice-cloning technology for social engineering attacks, a situation significantly worsened by the advent of audio Real-time Deepfakes (RTDFs). RTDFs can clone a target's voice in real-time over phone calls, making these interactions highly interactive and thus far more convincing. Our research confidently addresses the gap in the existing literature on deepfake detection, which has largely been ineffective against RTDF threats. We introduce a robust challenge-response-based method to detect deepfake audio calls, pioneering a comprehensive taxonomy of audio challenges. Our evaluation pitches 20 prospective challenges against a leading voice-cloning system. We have compiled a novel open-source challenge dataset with contributions from 100 smartphone and desktop users, yielding 18,600 original and 1.6 million deepfake samples. Through rigorous machine and human evaluations of this dataset, we achieved a deepfake detection rate of 86% and an 80% AUC score, respectively. Notably, utilizing a set of 11 challenges significantly enhances detection capabilities. Our findings reveal that combining human intuition with machine precision offers complementary advantages. Consequently, we have developed an innovative human-AI collaborative system that melds human discernment with algorithmic accuracy, boosting final joint accuracy to 82.9%. This system highlights the significant advantage of AI-assisted pre-screening in call verification processes. Samples can be heard at https://mittalgovind.github.io/autch-samples/
△ Less
Submitted 28 February, 2024;
originally announced February 2024.
-
On the Expressive Power of Graph Neural Networks
Authors:
Ashwin Nalwade,
Kelly Marshall,
Axel Eladi,
Umang Sharma
Abstract:
The study of Graph Neural Networks has received considerable interest in the past few years. By extending deep learning to graph-structured data, GNNs can solve a diverse set of tasks in fields including social science, chemistry, and medicine. The development of GNN architectures has largely been focused on improving empirical performance on tasks like node or graph classification. However, a lin…
▽ More
The study of Graph Neural Networks has received considerable interest in the past few years. By extending deep learning to graph-structured data, GNNs can solve a diverse set of tasks in fields including social science, chemistry, and medicine. The development of GNN architectures has largely been focused on improving empirical performance on tasks like node or graph classification. However, a line of recent work has instead sought to find GNN architectures that have desirable theoretical properties - by studying their expressive power and designing architectures that maximize this expressiveness.
While there is no consensus on the best way to define the expressiveness of a GNN, it can be viewed from several well-motivated perspectives. Perhaps the most natural approach is to study the universal approximation properties of GNNs, much in the way that this has been studied extensively for MLPs. Another direction focuses on the extent to which GNNs can distinguish between different graph structures, relating this to the graph isomorphism test. Besides, a GNN's ability to compute graph properties such as graph moments has been suggested as another form of expressiveness. All of these different definitions are complementary and have yielded different recommendations for GNN architecture choices. In this paper, we would like to give an overview of the notion of "expressive power" of GNNs and provide some valuable insights regarding the design choices of GNNs.
△ Less
Submitted 8 March, 2024; v1 submitted 3 January, 2024;
originally announced January 2024.
-
Towards Foundational AI Models for Additive Manufacturing: Language Models for G-Code Debugging, Manipulation, and Comprehension
Authors:
Anushrut Jignasu,
Kelly Marshall,
Baskar Ganapathysubramanian,
Aditya Balu,
Chinmay Hegde,
Adarsh Krishnamurthy
Abstract:
3D printing or additive manufacturing is a revolutionary technology that enables the creation of physical objects from digital models. However, the quality and accuracy of 3D printing depend on the correctness and efficiency of the G-code, a low-level numerical control programming language that instructs 3D printers how to move and extrude material. Debugging G-code is a challenging task that requ…
▽ More
3D printing or additive manufacturing is a revolutionary technology that enables the creation of physical objects from digital models. However, the quality and accuracy of 3D printing depend on the correctness and efficiency of the G-code, a low-level numerical control programming language that instructs 3D printers how to move and extrude material. Debugging G-code is a challenging task that requires a syntactic and semantic understanding of the G-code format and the geometry of the part to be printed. In this paper, we present the first extensive evaluation of six state-of-the-art foundational large language models (LLMs) for comprehending and debugging G-code files for 3D printing. We design effective prompts to enable pre-trained LLMs to understand and manipulate G-code and test their performance on various aspects of G-code debugging and manipulation, including detection and correction of common errors and the ability to perform geometric transformations. We analyze their strengths and weaknesses for understanding complete G-code files. We also discuss the implications and limitations of using LLMs for G-code comprehension.
△ Less
Submitted 4 September, 2023;
originally announced September 2023.
-
Circumventing Concept Erasure Methods For Text-to-Image Generative Models
Authors:
Minh Pham,
Kelly O. Marshall,
Niv Cohen,
Govind Mittal,
Chinmay Hegde
Abstract:
Text-to-image generative models can produce photo-realistic images for an extremely broad range of concepts, and their usage has proliferated widely among the general public. On the flip side, these models have numerous drawbacks, including their potential to generate images featuring sexually explicit content, mirror artistic styles without permission, or even hallucinate (or deepfake) the likene…
▽ More
Text-to-image generative models can produce photo-realistic images for an extremely broad range of concepts, and their usage has proliferated widely among the general public. On the flip side, these models have numerous drawbacks, including their potential to generate images featuring sexually explicit content, mirror artistic styles without permission, or even hallucinate (or deepfake) the likenesses of celebrities. Consequently, various methods have been proposed in order to "erase" sensitive concepts from text-to-image models. In this work, we examine five recently proposed concept erasure methods, and show that targeted concepts are not fully excised from any of these methods. Specifically, we leverage the existence of special learned word embeddings that can retrieve "erased" concepts from the sanitized models with no alterations to their weights. Our results highlight the brittleness of post hoc concept erasure methods, and call into question their use in the algorithmic toolkit for AI safety.
△ Less
Submitted 8 October, 2023; v1 submitted 2 August, 2023;
originally announced August 2023.
-
ZeroForge: Feedforward Text-to-Shape Without 3D Supervision
Authors:
Kelly O. Marshall,
Minh Pham,
Ameya Joshi,
Anushrut Jignasu,
Aditya Balu,
Adarsh Krishnamurthy,
Chinmay Hegde
Abstract:
Current state-of-the-art methods for text-to-shape generation either require supervised training using a labeled dataset of pre-defined 3D shapes, or perform expensive inference-time optimization of implicit neural representations. In this work, we present ZeroForge, an approach for zero-shot text-to-shape generation that avoids both pitfalls. To achieve open-vocabulary shape generation, we requir…
▽ More
Current state-of-the-art methods for text-to-shape generation either require supervised training using a labeled dataset of pre-defined 3D shapes, or perform expensive inference-time optimization of implicit neural representations. In this work, we present ZeroForge, an approach for zero-shot text-to-shape generation that avoids both pitfalls. To achieve open-vocabulary shape generation, we require careful architectural adaptation of existing feed-forward approaches, as well as a combination of data-free CLIP-loss and contrastive losses to avoid mode collapse. Using these techniques, we are able to considerably expand the generative ability of existing feed-forward text-to-shape models such as CLIP-Forge. We support our method via extensive qualitative and quantitative evaluations
△ Less
Submitted 15 June, 2023; v1 submitted 13 June, 2023;
originally announced June 2023.
-
Biomedical image analysis competitions: The state of current participation practice
Authors:
Matthias Eisenmann,
Annika Reinke,
Vivienn Weru,
Minu Dietlinde Tizabi,
Fabian Isensee,
Tim J. Adler,
Patrick Godau,
Veronika Cheplygina,
Michal Kozubek,
Sharib Ali,
Anubha Gupta,
Jan Kybic,
Alison Noble,
Carlos Ortiz de Solórzano,
Samiksha Pachade,
Caroline Petitjean,
Daniel Sage,
Donglai Wei,
Elizabeth Wilden,
Deepak Alapatt,
Vincent Andrearczyk,
Ujjwal Baid,
Spyridon Bakas,
Niranjan Balu,
Sophia Bano
, et al. (331 additional authors not shown)
Abstract:
The number of international benchmarking competitions is steadily increasing in various fields of machine learning (ML) research and practice. So far, however, little is known about the common practice as well as bottlenecks faced by the community in tackling the research questions posed. To shed light on the status quo of algorithm development in the specific field of biomedical imaging analysis,…
▽ More
The number of international benchmarking competitions is steadily increasing in various fields of machine learning (ML) research and practice. So far, however, little is known about the common practice as well as bottlenecks faced by the community in tackling the research questions posed. To shed light on the status quo of algorithm development in the specific field of biomedical imaging analysis, we designed an international survey that was issued to all participants of challenges conducted in conjunction with the IEEE ISBI 2021 and MICCAI 2021 conferences (80 competitions in total). The survey covered participants' expertise and working environments, their chosen strategies, as well as algorithm characteristics. A median of 72% challenge participants took part in the survey. According to our results, knowledge exchange was the primary incentive (70%) for participation, while the reception of prize money played only a minor role (16%). While a median of 80 working hours was spent on method development, a large portion of participants stated that they did not have enough time for method development (32%). 25% perceived the infrastructure to be a bottleneck. Overall, 94% of all solutions were deep learning-based. Of these, 84% were based on standard architectures. 43% of the respondents reported that the data samples (e.g., images) were too large to be processed at once. This was most commonly addressed by patch-based training (69%), downsampling (37%), and solving 3D analysis tasks as a series of 2D tasks. K-fold cross-validation on the training set was performed by only 37% of the participants and only 50% of the participants performed ensembling based on multiple identical models (61%) or heterogeneous models (39%). 48% of the respondents applied postprocessing steps.
△ Less
Submitted 12 September, 2023; v1 submitted 16 December, 2022;
originally announced December 2022.
-
Hopf monoids of set families
Authors:
Kevin Marshall,
Jeremy L. Martin
Abstract:
A \textit{grounded set family} on $I$ is a subset $\mathcal{F}\subseteq2^I$ such that $\emptyset\in\mathcal{F}$. We study a linearized Hopf monoid \textbf{SF} on grounded set families, with restriction and contraction inspired by the corresponding operations for antimatroids. Many known combinatorial species, including simplicial complexes and matroids, form Hopf submonoids of \textbf{SF}, althoug…
▽ More
A \textit{grounded set family} on $I$ is a subset $\mathcal{F}\subseteq2^I$ such that $\emptyset\in\mathcal{F}$. We study a linearized Hopf monoid \textbf{SF} on grounded set families, with restriction and contraction inspired by the corresponding operations for antimatroids. Many known combinatorial species, including simplicial complexes and matroids, form Hopf submonoids of \textbf{SF}, although not always with the "standard" Hopf structure (for example, our contraction operation is not the usual contraction of matroids). We use the topological methods of Aguiar and Ardila to obtain a cancellation-free antipode formula for the Hopf submonoid of lattices of order ideals of finite posets. Furthermore, we prove that the Hopf algebra of lattices of order ideals of chain gangs extends the Hopf algebra of symmetric functions, and that its character group extends the group of formal power series in one variable with constant term 1 under multiplication.
△ Less
Submitted 22 August, 2022; v1 submitted 11 May, 2022;
originally announced May 2022.
-
A Novel Epidemiological Approach to Geographically Mapping Population Dry Eye Disease in the United States through Google Trends
Authors:
Daniel B. Azzam,
Nitish Nag,
Julia Tran,
Lauren Chen,
Kaajal Visnagra,
Kailey Marshall,
Matthew Wade
Abstract:
Dry eye disease (DED) affects approximately half of the United States population. DED is characterized by dryness on the corena surface due to a variety of causes. This study fills the spatiotemporal gaps in DED epidemiology by using Google Trends as a novel epidemiological tool for geographically mapping DED in relation to environmental risk factors. We utilized Google Trends to extract DED-relat…
▽ More
Dry eye disease (DED) affects approximately half of the United States population. DED is characterized by dryness on the corena surface due to a variety of causes. This study fills the spatiotemporal gaps in DED epidemiology by using Google Trends as a novel epidemiological tool for geographically mapping DED in relation to environmental risk factors. We utilized Google Trends to extract DED-related queries estimating user intent from 2004-2019 in the United States. We incorporated national climate data to generate heat maps comparing geographic, temporal, and environmental relationships of DED. Multi-variable regression models were constructed to generate quadratic forecasts predicting DED and control searches. Our results illustrated the upward trend, seasonal pattern, environmental influence, and spatial relationship of DED search volume across US geography. Localized patches of DED interest were visualized along the coastline. There was no significant difference in DED queries across US census regions. Regression model 1 predicted DED searches over time (R^2=0.97) with significant predictors being control queries (p=0.0024), time (p=0.001), and seasonality (Winter p=0.0028; Spring p<0.001; Summer p=0.018). Regression model 2 predicted DED queries per state (R^2=0.49) with significant predictors being temperature (p=0.0003) and coastal zone (p=0.025). Importantly, temperature, coastal status, and seasonality were stronger risk factors of DED searches than humidity, sunshine, pollution, or region as clinical literature may suggest. Our work paves the way for future exploration of geographic information systems for locating DED and other diseases via online search query metrics.
△ Less
Submitted 21 June, 2020;
originally announced June 2020.
-
Higgs Vacuum Decay in a Braneworld
Authors:
Leopoldo Cuspinera,
Ruth Gregory,
Katie M Marshall,
Ian G Moss
Abstract:
We examine the effect of large extra dimensions on vacuum decay in the Randall-Sundrum (RS) braneworld paradigm. We assume the scalar field is confined to the brane, and compute the probability for forming an "anti de Sitter" (AdS) bubble inside a critical flat RS brane. We present the first full numerical solutions for the brane instanton considering two test potentials for the scalar field. We e…
▽ More
We examine the effect of large extra dimensions on vacuum decay in the Randall-Sundrum (RS) braneworld paradigm. We assume the scalar field is confined to the brane, and compute the probability for forming an "anti de Sitter" (AdS) bubble inside a critical flat RS brane. We present the first full numerical solutions for the brane instanton considering two test potentials for the scalar field. We explore the geometrical impact of thin and thick bubble walls, and compute the instanton action in a range of cases. We conclude by commenting on a more physically realistic potential relevant for the standard model Higgs. For bubbles with large backreaction, the extra dimension has a dramatic effect on the tunnelling rate, however, for the weakly backreacting bubbles more relevant for realistic Standard Model potentials, the extra dimension has little impact.
△ Less
Submitted 25 July, 2019;
originally announced July 2019.
-
Universal quantum computing with thermal state bosonic systems
Authors:
Kevin Marshall,
Daniel F. V. James,
Alexandru Paler,
Hoi-Kwan Lau
Abstract:
Recent development of mixed-state encoding (MSE) allows pure-state logical information to be encoded by a bosonic (continuous-variable) system in mixed physical state. Despite interest due to its counter-intuitiveness, the utility of the current MSE scheme is limited due to several operational drawbacks, namely redundant information carrier, probabilistic initialisation, and requirement of discret…
▽ More
Recent development of mixed-state encoding (MSE) allows pure-state logical information to be encoded by a bosonic (continuous-variable) system in mixed physical state. Despite interest due to its counter-intuitiveness, the utility of the current MSE scheme is limited due to several operational drawbacks, namely redundant information carrier, probabilistic initialisation, and requirement of discrete-variable measurement. In this work, we present a simplified MSE that does not suffer from any of these drawbacks. Specifically, our protocol encodes each qubit by only one mixed-state bosonic mode, and the logical basis can be deterministically initialised from thermal equilibrium. All logical operations of this encoding can be performed with continuous-variable interaction and measurement only. Without the necessity of ground state cooling, our proposal could broaden the set of candidate systems for implementing quantum computers, and reduce the reliance on demanding refrigerating facility for current quantum computing architectures. Additionally, our protocol can enhance the noise tolerance of logical qubit even if the system can be efficiently cooled.
△ Less
Submitted 28 March, 2019; v1 submitted 10 December, 2018;
originally announced December 2018.
-
Negative modes of Coleman-de Luccia and black hole bubbles
Authors:
Ruth Gregory,
Katie M. Marshall,
Florent Michel,
Ian G. Moss
Abstract:
We study the negative modes of gravitational instantons representing vacuum decay in asymptotically flat space-time. We consider two different vacuum decay scenarios: the Coleman-de Luccia $\mathrm{O}(4)$-symmetric bubble, and $\mathrm{O}(3) \times \mathbb{R}$ instantons with a static black hole. In spite of the similarities between the models, we find qualitatively different behaviours. In the…
▽ More
We study the negative modes of gravitational instantons representing vacuum decay in asymptotically flat space-time. We consider two different vacuum decay scenarios: the Coleman-de Luccia $\mathrm{O}(4)$-symmetric bubble, and $\mathrm{O}(3) \times \mathbb{R}$ instantons with a static black hole. In spite of the similarities between the models, we find qualitatively different behaviours. In the $\mathrm{O}(4)$-symmetric case, the number of negative modes is known to be either one or infinite, depending on the sign of the kinetic term in the quadratic action. In contrast, solving the mode equation numerically for the static black hole instanton, we find only one negative mode with the kinetic term always positive outside the event horizon. The absence of additional negative modes supports the interpretation of these solutions as giving the tunnelling rate for false vacuum decay seeded by microscopic black holes.
△ Less
Submitted 25 April, 2019; v1 submitted 7 August, 2018;
originally announced August 2018.
-
Higgs Vacuum Decay from Particle Collisions?
Authors:
Leopoldo Cuspinera,
Ruth Gregory,
Katie Marshall,
Ian G Moss
Abstract:
We examine the effect of large extra dimensions on black hole seeded vacuum decay using the Randall-Sundrum model as a prototype for warped extra dimensions. We model the braneworld black hole by a tidal solution, and solve the Higgs equations of motion for the instanton on the brane. Remarkably, the action of the static instanton can be shown to be the difference in the bulk areas of the seed and…
▽ More
We examine the effect of large extra dimensions on black hole seeded vacuum decay using the Randall-Sundrum model as a prototype for warped extra dimensions. We model the braneworld black hole by a tidal solution, and solve the Higgs equations of motion for the instanton on the brane. Remarkably, the action of the static instanton can be shown to be the difference in the bulk areas of the seed and remnant black holes, and we estimate these areas assuming the black holes are small compared to the bulk AdS radius. Comparing to the Hawking evaporation rate shows that small black hole seeds preferentially catalyse vacuum decay, thus extending our previous results to higher dimensional braneworld scenarios. The parameter ranges do not allow for Standard Model Higgs decay from collider black holes, but they can be relevant for cosmic ray collisions.
△ Less
Submitted 11 December, 2018; v1 submitted 7 March, 2018;
originally announced March 2018.
-
Molecular Structure Extraction From Documents Using Deep Learning
Authors:
Joshua Staker,
Kyle Marshall,
Robert Abel,
Carolyn McQuaw
Abstract:
Chemical structure extraction from documents remains a hard problem due to both false positive identification of structures during segmentation and errors in the predicted structures. Current approaches rely on handcrafted rules and subroutines that perform reasonably well generally, but still routinely encounter situations where recognition rates are not yet satisfactory and systematic improvemen…
▽ More
Chemical structure extraction from documents remains a hard problem due to both false positive identification of structures during segmentation and errors in the predicted structures. Current approaches rely on handcrafted rules and subroutines that perform reasonably well generally, but still routinely encounter situations where recognition rates are not yet satisfactory and systematic improvement is challenging. Complications impacting performance of current approaches include the diversity in visual styles used by various software to render structures, the frequent use of ad hoc annotations, and other challenges related to image quality, including resolution and noise. We here present end-to-end deep learning solutions for both segmenting molecular structures from documents and for predicting chemical structures from these segmented images. This deep learning-based approach does not require any handcrafted features, is learned directly from data, and is robust against variations in image quality and style. Using the deep-learning approach described herein we show that it is possible to perform well on both segmentation and prediction of low resolution images containing moderately sized molecules found in journal articles and patents.
△ Less
Submitted 13 February, 2018;
originally announced February 2018.
-
Verifying cross-Kerr induced number squeezing: a case study
Authors:
David Schmid,
Kevin Marshall,
Daniel F. V. James
Abstract:
We analyze an experimental method for creating interesting nonclassical states by processing the entanglement generated when two large coherent states interact in a cross-Kerr medium. We specifically investigate the effects of loss and noise in every mode of the experiment, as well as the effect of "binning" the post-selection outcomes. Even with these imperfections, we find an optimal set of curr…
▽ More
We analyze an experimental method for creating interesting nonclassical states by processing the entanglement generated when two large coherent states interact in a cross-Kerr medium. We specifically investigate the effects of loss and noise in every mode of the experiment, as well as the effect of "binning" the post-selection outcomes. Even with these imperfections, we find an optimal set of currently-achievable parameters which would allow a proof-of-principle demonstration of number squeezing in states with large mean photon number. We discuss other useful states which can be generated with the same experimental tools, including a class of states which contain coherent superpositions of differing photon numbers, e.g. good approximations to the state $\frac{1}{\sqrt{2}} (|0\rangle+|20\rangle)$. Finally, we suggest one possible application of this state in the field of optomechanics.
△ Less
Submitted 9 June, 2017;
originally announced June 2017.
-
Linear Mode-Mixing of Phonons with Trapped Ions
Authors:
Kevin Marshall,
Daniel F. V. James
Abstract:
We propose a method to manipulate the normal modes in a chain of trapped ions using only two lasers. Linear chains of trapped ions have proven experimentally to be highly controllable quantum systems with a variety of refined techniques for preparation, evolution, and readout, however, typically for quantum information processing applications people have been interested in using the internal level…
▽ More
We propose a method to manipulate the normal modes in a chain of trapped ions using only two lasers. Linear chains of trapped ions have proven experimentally to be highly controllable quantum systems with a variety of refined techniques for preparation, evolution, and readout, however, typically for quantum information processing applications people have been interested in using the internal levels of the ions as the computational basis. We analyse the case where the motional degrees of freedom of the ions is the quantum system of interest, and where the internal levels are leveraged to facilitate interactions. In particular, we focus on an analysis of mode-mixing of phonons in different normal modes to mimic the quantum optical equivalent of a beam splitter.
△ Less
Submitted 15 October, 2016;
originally announced October 2016.
-
Practical quantum computing on encrypted data
Authors:
Kevin Marshall,
Christian S. Jacobsen,
Clemens Schafermeier,
Tobias Gehring,
Christian Weedbrook,
Ulrik L. Andersen
Abstract:
The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not unconditionally secure in the sense that they are dependent on a hacker's computational power. Here we theoretically investigate,…
▽ More
The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not unconditionally secure in the sense that they are dependent on a hacker's computational power. Here we theoretically investigate, and experimentally demonstrate with Gaussian displacement and squeezing operations, a quantum solution that achieves the unconditional security of a user's privacy using the practical technology of continuous variables. We demonstrate losses of up to 10 km both ways between the client and the server and show that security can still be achieved. Our approach offers a number of practical benefits, which can ultimately allow for the potential widespread adoption of this quantum technology in future cloud-based computing networks.
△ Less
Submitted 25 July, 2016;
originally announced July 2016.
-
Extension of Overbeck's Attack for Gabidulin Based Cryptosystems
Authors:
Anna-Lena Horlemann-Trautmann,
Kyle Marshall,
Joachim Rosenthal
Abstract:
We present a new attack against cryptosystems based on the rank metric. Our attack allows us to cryptanalyze two variants of the GPT cryptosystem which were designed to resist the attack of Overbeck.
We present a new attack against cryptosystems based on the rank metric. Our attack allows us to cryptanalyze two variants of the GPT cryptosystem which were designed to resist the attack of Overbeck.
△ Less
Submitted 4 January, 2016; v1 submitted 4 November, 2015;
originally announced November 2015.
-
New Criteria for MRD and Gabidulin Codes and some Rank-Metric Code Constructions
Authors:
Anna-Lena Horlemann-Trautmann,
Kyle Marshall
Abstract:
In this work we present a new criterion to check if a given rank-metric code is a maximum rank distance (MRD) code. Moreover, we derive a criterion to check if a given MRD code is a generalized Gabidulin code. We then use these results to come up with constructions of linear MRD codes of dimension 2 that are not generalized Gabidulin codes.
In this work we present a new criterion to check if a given rank-metric code is a maximum rank distance (MRD) code. Moreover, we derive a criterion to check if a given MRD code is a generalized Gabidulin code. We then use these results to come up with constructions of linear MRD codes of dimension 2 that are not generalized Gabidulin codes.
△ Less
Submitted 8 March, 2016; v1 submitted 30 July, 2015;
originally announced July 2015.
-
Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution
Authors:
Yi-Chen Zhang,
Zhengyu Li,
Christian Weedbrook,
Kevin Marshall,
Stefano Pirandola,
Song Yu,
Hong Guo
Abstract:
We propose a method to improve the performance of two entanglement-based continuous-variable quantum key distribution protocols using noiseless linear amplifiers. The two entanglement-based schemes consist of an entanglement distribution protocol with an untrusted source and an entanglement swapping protocol with an untrusted relay. Simulation results show that the noiseless linear amplifiers can…
▽ More
We propose a method to improve the performance of two entanglement-based continuous-variable quantum key distribution protocols using noiseless linear amplifiers. The two entanglement-based schemes consist of an entanglement distribution protocol with an untrusted source and an entanglement swapping protocol with an untrusted relay. Simulation results show that the noiseless linear amplifiers can improve the performance of these two protocols, in terms of maximal transmission distances, when we consider small amounts of entanglement, as typical in realistic setups.
△ Less
Submitted 1 July, 2015;
originally announced July 2015.
-
Quantum simulation of quantum field theory using continuous variables
Authors:
Kevin Marshall,
Raphael Pooser,
George Siopsis,
Christian Weedbrook
Abstract:
Much progress has been made in the field of quantum computing using continuous variables over the last couple of years. This includes the generation of extremely large entangled cluster states (10,000 modes, in fact) as well as a fault tolerant architecture. This has led to the point that continuous-variable quantum computing can indeed be thought of as a viable alternative for universal quantum c…
▽ More
Much progress has been made in the field of quantum computing using continuous variables over the last couple of years. This includes the generation of extremely large entangled cluster states (10,000 modes, in fact) as well as a fault tolerant architecture. This has led to the point that continuous-variable quantum computing can indeed be thought of as a viable alternative for universal quantum computing. With that in mind, we present a new algorithm for continuous-variable quantum computers which gives an exponential speedup over the best known classical methods. Specifically, this relates to efficiently calculating the scattering amplitudes in scalar bosonic quantum field theory, a problem that is believed to be hard using a classical computer. Building on this, we give an experimental implementation based on cluster states that is feasible with today's technology.
△ Less
Submitted 27 March, 2015;
originally announced March 2015.
-
Device-independent quantum key distribution with generalized two-mode Schrödinger cat states
Authors:
Curtis J. Broadbent,
Kevin Marshall,
Christian Weedbrook,
John C. Howell
Abstract:
We show how weak non-linearities can be used in a device-independent quantum key distribution (QKD) protocol using generalized two-mode Schrödinger cat states. The QKD protocol is therefore shown to be secure against collective attacks and for some coherent attacks. We derive analytical formulas for the optimal values of the Bell parameter, the quantum bit error rate, and the device-independent se…
▽ More
We show how weak non-linearities can be used in a device-independent quantum key distribution (QKD) protocol using generalized two-mode Schrödinger cat states. The QKD protocol is therefore shown to be secure against collective attacks and for some coherent attacks. We derive analytical formulas for the optimal values of the Bell parameter, the quantum bit error rate, and the device-independent secret key rate in the noiseless lossy bosonic channel. Additionally, we give the filters and measurements which achieve these optimal values. We find that over any distance in this channel the quantum bit error rate is identically zero, in principle, and the states in the protocol are always able to violate a Bell inequality. The protocol is found to be superior in some regimes to a device-independent QKD protocol based on polarization entangled states in a depolarizing channel. Finally, we propose an implementation for the optimal filters and measurements.
△ Less
Submitted 11 August, 2015; v1 submitted 5 March, 2015;
originally announced March 2015.
-
Repeat-until-success cubic phase gate for universal continuous-variable quantum computation
Authors:
Kevin Marshall,
Raphael Pooser,
George Siopsis,
Christian Weedbrook
Abstract:
In order to achieve universal quantum computation using continuous variables, one needs to jump out of the set of Gaussian operations and have a non-Gaussian element, such as the cubic phase gate. However, such a gate is currently very difficult to implement in practice. Here we introduce an experimentally viable 'repeat-until-success' approach to generating the cubic phase gate, which is achieved…
▽ More
In order to achieve universal quantum computation using continuous variables, one needs to jump out of the set of Gaussian operations and have a non-Gaussian element, such as the cubic phase gate. However, such a gate is currently very difficult to implement in practice. Here we introduce an experimentally viable 'repeat-until-success' approach to generating the cubic phase gate, which is achieved using sequential photon subtractions and Gaussian operations. We find that our scheme offers benefits in terms of the expected time until success, although we require a primitive quantum memory.
△ Less
Submitted 30 November, 2014;
originally announced December 2014.
-
Device-Independent Quantum Cryptography for Continuous Variables
Authors:
Kevin Marshall,
Christian Weedbrook
Abstract:
We present the first device-independent quantum cryptography protocol for continuous variables. Our scheme is based on the Gottesman-Kitaev-Preskill encoding scheme whereby a qubit is embedded in the infinite-dimensional space of a quantum harmonic oscillator. The novel application of discrete-variable device-independent quantum key distribution to this encoding enables a continuous-variable analo…
▽ More
We present the first device-independent quantum cryptography protocol for continuous variables. Our scheme is based on the Gottesman-Kitaev-Preskill encoding scheme whereby a qubit is embedded in the infinite-dimensional space of a quantum harmonic oscillator. The novel application of discrete-variable device-independent quantum key distribution to this encoding enables a continuous-variable analogue. Since the security of this protocol is based on discrete-variables we inherit by default security against collective attacks and, under certain memoryless assumptions, coherent attacks. We find that our protocol is valid over the same distances as its discrete-variable counterpart, except that we are able to take advantage of high efficiency commercially available detectors where, for the most part, only homodyne detection is required. This offers the potential of removing the difficulty in closing the loopholes associated with Bell inequalities.
△ Less
Submitted 27 May, 2014;
originally announced May 2014.
-
What is the best way to teleport a qudit?
Authors:
Kevin Marshall,
Daniel F. V. James
Abstract:
The need for high fidelity quantum teleportation arises in a variety of quantum algorithms and protocols. Unfortunately, conventional continuous variable teleportation schemes rely on EPR states that yield a fidelity that approaches unity only in the limit of an unphysical amount of squeezing. A new method, which utilizes an ensemble of single photon entangled states to teleport continuous variabl…
▽ More
The need for high fidelity quantum teleportation arises in a variety of quantum algorithms and protocols. Unfortunately, conventional continuous variable teleportation schemes rely on EPR states that yield a fidelity that approaches unity only in the limit of an unphysical amount of squeezing. A new method, which utilizes an ensemble of single photon entangled states to teleport continuous variable states with fidelity approaching unity with finite resources was recently proposed by Andersen and Ralph [Phys. Rev. Lett. 111, 050504 (2013)]. We extend these ideas to consider the general case of using maximally entangled states of an arbitrary dimension to teleport a continuous variable state and discuss how the corresponding results are affected.
△ Less
Submitted 11 October, 2013;
originally announced October 2013.
-
Subspace Fuzzy Vault
Authors:
Kyle Marshall,
Davide Schipani,
Anna-Lena Trautmann,
Joachim Rosenthal
Abstract:
Fuzzy vault is a scheme providing secure authentication based on fuzzy matching of sets. A major application is the use of biometric features for authentication, whereby unencrypted storage of these features is not an option because of security concerns. While there is still ongoing research around the practical implementation of such schemes, we propose and analyze here an alternative constructio…
▽ More
Fuzzy vault is a scheme providing secure authentication based on fuzzy matching of sets. A major application is the use of biometric features for authentication, whereby unencrypted storage of these features is not an option because of security concerns. While there is still ongoing research around the practical implementation of such schemes, we propose and analyze here an alternative construction based on subspace codes. This offers some advantages in terms of security, as an eventual discovery of the key does not provide an obvious access to the features. Crucial for an efficient implementation are the computational complexity and the choice of good code parameters. The parameters depend on the particular application, e.g. the biometric feature to be stored and the rate one wants to allow for false acceptance. The developed theory is closely linked to constructions of subspace codes studied in the area of random network coding.
△ Less
Submitted 16 April, 2015; v1 submitted 26 October, 2012;
originally announced October 2012.
-
On Burst Error Correction and Storage Security of Noisy Data
Authors:
Felix Fontein,
Kyle Marshall,
Joachim Rosenthal,
Davide Schipani,
Anna-Lena Trautmann
Abstract:
Secure storage of noisy data for authentication purposes usually involves the use of error correcting codes. We propose a new model scenario involving burst errors and present for that several constructions.
Secure storage of noisy data for authentication purposes usually involves the use of error correcting codes. We propose a new model scenario involving burst errors and present for that several constructions.
△ Less
Submitted 23 May, 2012;
originally announced May 2012.
-
The Dimension of Subcode-Subfields of Shortened Generalized Reed Solomon Codes
Authors:
Fernando Hernando,
Kyle Marshall,
Michael E. O'Sullivan
Abstract:
Reed-Solomon (RS) codes are among the most ubiquitous codes due to their good parameters as well as efficient encoding and decoding procedures. However, RS codes suffer from having a fixed length. In many applications where the length is static, the appropriate length can be obtained by an RS code by shortening or puncturing. Generalized Reed-Solomon (GRS) codes are a generalization of RS codes, w…
▽ More
Reed-Solomon (RS) codes are among the most ubiquitous codes due to their good parameters as well as efficient encoding and decoding procedures. However, RS codes suffer from having a fixed length. In many applications where the length is static, the appropriate length can be obtained by an RS code by shortening or puncturing. Generalized Reed-Solomon (GRS) codes are a generalization of RS codes, whose subfield-subcodes are extensively studied. In this paper we show that a particular class of GRS codes produces many subfield-subcodes with large dimension. An algorithm for searching through the codes is presented as well as a list of new codes obtained from this method.
△ Less
Submitted 27 August, 2011;
originally announced August 2011.
-
Simultaneous Multiwavelength and Optical Microvariability Observations of CTA 102 (PKS J2232+1143)
Authors:
Angela Osterman Meyer,
H. Richard Miller,
Kevin Marshall,
Wesley T. Ryle,
Hugh Aller,
Margo Aller,
Tom Balonek
Abstract:
We present analysis of both the short-term optical and long-term multiwavelength variability of CTA 102. In 2004, this object was observed in an intense optical flaring state. Extensive R-band microvariability observations were carried out during this high state. In 2005, we obtained several weeks of contemporaneous radio, optical, and X-ray observations of CTA 102. These observations recorded d…
▽ More
We present analysis of both the short-term optical and long-term multiwavelength variability of CTA 102. In 2004, this object was observed in an intense optical flaring state. Extensive R-band microvariability observations were carried out during this high state. In 2005, we obtained several weeks of contemporaneous radio, optical, and X-ray observations of CTA 102. These observations recorded distinct flaring activity in all three wavebands. Subsequent analysis revealed that this object may appear redder when in a brighter optical state, and that the X-ray, optical, and radio activity do not appear to be correlated. The shape of the observed spectral energy distributions suggests that both synchrotron-related and external inverse Compton processes may contribute to the X-ray emission. Our results are also compared with other results on this object and archival microvariability observations. It appears that more rapid, dramatic microvariability events occur when CTA 102 is in an elevated optical flux state.
△ Less
Submitted 9 November, 2009;
originally announced November 2009.
-
Disk-Jet Connection in the Radio Galaxy 3C 120
Authors:
Ritaban Chatterjee,
Alan P. Marscher,
Svetlana G. Jorstad,
Alice R. Olmstead,
Ian M. McHardy,
Margo F. Aller,
Hugh D. Aller,
Anne Lahteenmaki,
Merja Tornikoski,
Talvikki Hovatta,
Kevin Marshall,
H. Richard Miller,
Wesley T. Ryle,
Benjamin Chicka,
A. J. Benker,
Mark C. Bottorff,
David Brokofsky,
Jeffrey S. Campbell,
Taylor S. Chonis,
C. Martin Gaskell,
Evelina R. Gaynullina,
Konstantin N. Grankin,
Cecelia H. Hedrick,
Mansur A. Ibrahimov,
Elizabeth S. Klimek
, et al. (11 additional authors not shown)
Abstract:
We present the results of extensive multi-frequency monitoring of the radio galaxy 3C 120 between 2002 and 2007 at X-ray, optical, and radio wave bands, as well as imaging with the Very Long Baseline Array (VLBA). Over the 5 yr of observation, significant dips in the X-ray light curve are followed by ejections of bright superluminal knots in the VLBA images. Consistent with this, the X-ray flux…
▽ More
We present the results of extensive multi-frequency monitoring of the radio galaxy 3C 120 between 2002 and 2007 at X-ray, optical, and radio wave bands, as well as imaging with the Very Long Baseline Array (VLBA). Over the 5 yr of observation, significant dips in the X-ray light curve are followed by ejections of bright superluminal knots in the VLBA images. Consistent with this, the X-ray flux and 37 GHz flux are anti-correlated with X-ray leading the radio variations. This implies that, in this radio galaxy, the radiative state of accretion disk plus corona system, where the X-rays are produced, has a direct effect on the events in the jet, where the radio emission originates. The X-ray power spectral density of 3C 120 shows a break, with steeper slope at shorter timescale and the break timescale is commensurate with the mass of the central black hole based on observations of Seyfert galaxies and black hole X-ray binaries. These findings provide support for the paradigm that black hole X-ray binaries and active galactic nuclei are fundamentally similar systems, with characteristic time and size scales linearly proportional to the mass of the central black hole. The X-ray and optical variations are strongly correlated in 3C 120, which implies that the optical emission in this object arises from the same general region as the X-rays, i.e., in the accretion disk-corona system. We numerically model multi-wavelength light curves of 3C 120 from such a system with the optical-UV emission produced in the disk and the X-rays generated by scattering of thermal photons by hot electrons in the corona. From the comparison of the temporal properties of the model light curves to that of the observed variability, we constrain the physical size of the corona and the distances of the emitting regions from the central BH.
△ Less
Submitted 10 September, 2009;
originally announced September 2009.
-
Multi-wavelength Variability of the Broad Line Radio Galaxy 3C 120
Authors:
Kevin Marshall,
Wesley T. Ryle,
H. Richard Miller,
Alan P. Marscher,
Svetlana G. Jorstad,
Benjamin Chicka,
Ian M. McHardy
Abstract:
We present results from a multi-year monitoring campaign of the broad-line radio galaxy 3C 120, using the Rossi X-ray Timing Explorer (RXTE) for nearly five years of observations. Additionally, we present coincident optical monitoring using data from several ground-based observatories. Both the X-ray and optical emission are highly variable and appear to be strongly correlated, with the X-ray em…
▽ More
We present results from a multi-year monitoring campaign of the broad-line radio galaxy 3C 120, using the Rossi X-ray Timing Explorer (RXTE) for nearly five years of observations. Additionally, we present coincident optical monitoring using data from several ground-based observatories. Both the X-ray and optical emission are highly variable and appear to be strongly correlated, with the X-ray emission leading the optical by 28 days. The X-ray power density spectrum is best fit by a broken power law, with a low-frequency slope of -1.2, breaking to a high-frequency slope of -2.1, and a break frequency of log nu_b=-5.75 Hz, or 6.5 days. This value agrees well with the value expected based on 3C 120's mass and accretion rate. We find no evidence for a second break in the power spectrum. Combined with a moderately soft X-ray spectrum (Gamma=1.8) and a moderately high accretion rate (mdot / mdot_Edd ~ 0.3), this indicates that 3C 120 fits in wellwith the high/soft variability state found in most other AGNs. Previous studies have shown that the spectrum has a strong Fe K-alpha line, which may be relativistically broadened. The presence of this line, combined with a power spectrum similar to that seen in Seyfert galaxies, suggests that the majority of the X-ray emission in this object arises in or near the disk, and not in the jet.
△ Less
Submitted 17 February, 2009;
originally announced February 2009.
-
New Multiwavelength Observations of PKS 2155-304 and Implications for the Coordinated Variability Patterns of Blazars
Authors:
M. Angela Osterman,
H. Richard Miller,
Kevin Marshall,
Wesley T. Ryle,
Hugh Aller,
Margo Aller,
John P. McFarland
Abstract:
The TeV blazar PKS 2155--304 was the subject of an intensive 2 week optical and near-infrared observing campaign in 2004 August with the CTIO 0.9m telescope. During this time, simultaneous X-ray data from RXTE were also obtained. We compare the results of our observations to the results from two previous simultaneous multiwavelength campaigns on PKS 2155-304. We conclude that the correlation bet…
▽ More
The TeV blazar PKS 2155--304 was the subject of an intensive 2 week optical and near-infrared observing campaign in 2004 August with the CTIO 0.9m telescope. During this time, simultaneous X-ray data from RXTE were also obtained. We compare the results of our observations to the results from two previous simultaneous multiwavelength campaigns on PKS 2155-304. We conclude that the correlation between the X-ray and UV/optical variability is strongest and the time lag is shortest (only a few hours) when the object is brightest. As the object becomes fainter, the correlations are weaker and the lags longer, increasing to a few days. Based on the results of four campaigns, we find evidence for a linear relationship between the mean optical brightness and lag time of X-ray and UV/optical events. Furthermore, we assert that this behavior, along with the different multiwavelength flare lag times across different flux states is consistent with a highly relativistic shock propagating down the jet producing the flares observed during a high state. In a quiescent state, the variability is likely to be due to a number of factors including both the jet and contributions outside of the jet, such as the accretion disk.
△ Less
Submitted 15 November, 2007;
originally announced November 2007.
-
Correlated X-ray and Optical Variability in Mkn 509
Authors:
Kevin Marshall,
Wesley T. Ryle,
H. Richard Miller
Abstract:
We present results of a 3 year monitoring campaign of the Seyfert 1 galaxy Markarian 509, using X-ray data from the Rossi X-ray Timing Explorer (RXTE) and optical data taken by the SMARTS consortium. Both light curves show significant variations, and are strongly correlated with the optical flux leading the X-ray flux by 15 days. The X-ray power spectrum shows a steep high-frequency slope of -2.…
▽ More
We present results of a 3 year monitoring campaign of the Seyfert 1 galaxy Markarian 509, using X-ray data from the Rossi X-ray Timing Explorer (RXTE) and optical data taken by the SMARTS consortium. Both light curves show significant variations, and are strongly correlated with the optical flux leading the X-ray flux by 15 days. The X-ray power spectrum shows a steep high-frequency slope of -2.0, breaking to a slope of -1.0 at at timescale of 34 days. The lag from optical to X-ray emission is most likely caused by variations in the accretion disk propagating inward.
△ Less
Submitted 7 November, 2007;
originally announced November 2007.
-
Multiwavelength Observations of the Extreme X-Ray Selected BL Lac Object PG 1553+11 (1ES 1553+113)
Authors:
M. Angela Osterman,
H. Richard Miller,
Amy M. Campbell,
Kevin Marshall,
John P. McFarland,
Hugh Aller,
Margo Aller,
Robert E. Fried,
Omar M. Kurtanidze,
Maria G. Nikolashvili,
Merja Tornikoski,
Esko Valtaoja
Abstract:
PG 1553+11 was the target of a coordinated three week multiwavelength campaign during 2003 April and May. A significant X-ray flare was observed during the second half of this campaign. Although no optical flare was recorded during the X-ray campaign, optical observations obtained immediately prior to the campaign displayed a higher flux than that recorded during the campaign. An optical flare w…
▽ More
PG 1553+11 was the target of a coordinated three week multiwavelength campaign during 2003 April and May. A significant X-ray flare was observed during the second half of this campaign. Although no optical flare was recorded during the X-ray campaign, optical observations obtained immediately prior to the campaign displayed a higher flux than that recorded during the campaign. An optical flare was observed a few days after the end of the X-ray campaign and may be related to the X-ray flare. Radio observations were made at three frequencies, with no significant changes in flux detected near the times of the optical and X-ray flares. The spectral energy distributions and flux ratios in different wavebands observed for this object are compared to other X-ray selected blazars to demonstrate how PG 1553+11 is an extreme member of this group.
△ Less
Submitted 2 May, 2006;
originally announced May 2006.
-
Andreev Probe of Persistent Current States in Superconducting Quantum Circuits
Authors:
V. T. Petrashov,
K. G. Chua,
K. M. Marshall,
R. Sh. Shaikhaidarov,
J. T. Nicholls
Abstract:
Using the extraordinary sensitivity of Andreev interferometers to the superconducting phase difference associated with currents, we measure the persistent current quantum states in superconducting loops interrupted by Josephson junctions. Straightforward electrical resistance measurements of the interferometers give continuous read-out of the states, allowing us to construct the energy spectrum…
▽ More
Using the extraordinary sensitivity of Andreev interferometers to the superconducting phase difference associated with currents, we measure the persistent current quantum states in superconducting loops interrupted by Josephson junctions. Straightforward electrical resistance measurements of the interferometers give continuous read-out of the states, allowing us to construct the energy spectrum of the quantum circuit. The probe is estimated to be more precise and faster than previous methods, and can measure the local phase difference in a wide range of superconducting circuits.
△ Less
Submitted 17 August, 2005; v1 submitted 2 March, 2005;
originally announced March 2005.
-
X-ray/Optical Variability of Akn 120 and 3C 120
Authors:
K. Marshall,
E. C. Ferrara,
H. R. Miller,
A. P. Marscher,
G. Madejski
Abstract:
Using the Rossi X-ray Timing Experiment (RXTE), we have observed both the Seyfert 1 galaxy Akn 120 and the broad-line radio galaxy 3C 120. Monitoring observations spanning 2 years plus intensive stares spanning several days have been obtained for both objects. These data have allowed us to construct the power density spectrum (PDS) for each object. Covering more than 4 decades in temporal freque…
▽ More
Using the Rossi X-ray Timing Experiment (RXTE), we have observed both the Seyfert 1 galaxy Akn 120 and the broad-line radio galaxy 3C 120. Monitoring observations spanning 2 years plus intensive stares spanning several days have been obtained for both objects. These data have allowed us to construct the power density spectrum (PDS) for each object. Covering more than 4 decades in temporal frequency, the PDS for 3C 120 represents the first such measurement for a radio loud galaxy. The PDS for 3C 120 shows a steep power law at high frequencies, which turns over at low frequencies. Akn 120 also has a power law shape in its PDS. Using the PDS of Cygnus X-1, we estimate the masses for both of these objects. Optical data and cross correlation functions are also presented for Akn 120. The long-term light curve of Akn 120 shows a strong correlation with optical data, with zero time lag.
△ Less
Submitted 16 December, 2003;
originally announced December 2003.
-
Mass and Angular Momentum Transfer in the Massive Algol Binary RY Persei
Authors:
P. Barai,
D. R. Gies,
E. Choi,
V. Das,
R. Deo,
W. Huang,
K. Marshall,
M. V. McSwain,
C. Ogden,
A. Osterman,
R. L. Riddle,
J. L. Seymour Jr,
D. W. Wingert,
A. B. Kaye,
G. J. Peters
Abstract:
We present an investigation of H-alpha emission line variations observed in the massive Algol binary, RY Per. We give new radial velocity data for the secondary based upon our optical spectra and for the primary based upon high dispersion UV spectra. We present revised orbital elements and an estimate of the primary's projected rotational velocity (which indicates that the primary is rotating 7…
▽ More
We present an investigation of H-alpha emission line variations observed in the massive Algol binary, RY Per. We give new radial velocity data for the secondary based upon our optical spectra and for the primary based upon high dispersion UV spectra. We present revised orbital elements and an estimate of the primary's projected rotational velocity (which indicates that the primary is rotating 7 times faster than synchronous). We use a Doppler tomography algorithm to reconstruct the individual primary and secondary spectra in the region of H-alpha, and we subtract the latter from each of our observations to obtain profiles of the primary and its disk alone. Our H-alpha observations of RY Per show that the mass gaining primary is surrounded by a persistent but time variable accretion disk. The profile that is observed outside-of-eclipse has weak, double-peaked emission flanking a deep central absorption, and we find that these properties can be reproduced by a disk model that includes the absorption of photospheric light by the band of the disk seen in projection against the face of the star. We developed a new method to reconstruct the disk surface density distribution from the ensemble of H-alpha profiles observed around the orbit, and this method accounts for the effects of disk occultation by the stellar components, the obscuration of the primary by the disk, and flux contributions from optically thick disk elements. The resulting surface density distribution is elongated along the axis joining the stars, in the same way as seen in hydrodynamical simulations of gas flows that strike the mass gainer near trailing edge of the star. This type of gas stream configuration is optimal for the transfer of angular momentum, and we show that rapid rotation is found in other Algols that have passed through a similar stage.
△ Less
Submitted 2 April, 2004; v1 submitted 26 September, 2003;
originally announced September 2003.