-
Matrix Multiplication Verification Using Coding Theory
Authors:
Huck Bennett,
Karthik Gajulapalli,
Alexander Golovnev,
Philip G. Warton
Abstract:
We study the Matrix Multiplication Verification Problem (MMV) where the goal is, given three $n \times n$ matrices $A$, $B$, and $C$ as input, to decide whether $AB = C$. A classic randomized algorithm by Freivalds (MFCS, 1979) solves MMV in $\widetilde{O}(n^2)$ time, and a longstanding challenge is to (partially) derandomize it while still running in faster than matrix multiplication time (i.e.,…
▽ More
We study the Matrix Multiplication Verification Problem (MMV) where the goal is, given three $n \times n$ matrices $A$, $B$, and $C$ as input, to decide whether $AB = C$. A classic randomized algorithm by Freivalds (MFCS, 1979) solves MMV in $\widetilde{O}(n^2)$ time, and a longstanding challenge is to (partially) derandomize it while still running in faster than matrix multiplication time (i.e., in $o(n^ω)$ time).
To that end, we give two algorithms for MMV in the case where $AB - C$ is sparse. Specifically, when $AB - C$ has at most $O(n^δ)$ non-zero entries for a constant $0 \leq δ< 2$, we give (1) a deterministic $O(n^{ω- \varepsilon})$-time algorithm for constant $\varepsilon = \varepsilon(δ) > 0$, and (2) a randomized $\widetilde{O}(n^2)$-time algorithm using $δ/2 \cdot \log_2 n + O(1)$ random bits. The former algorithm is faster than the deterministic algorithm of Künnemann (ESA, 2018) when $δ\geq 1.056$, and the latter algorithm uses fewer random bits than the algorithm of Kimbrel and Sinha (IPL, 1993), which runs in the same time and uses $\log_2 n + O(1)$ random bits (in turn fewer than Freivalds's algorithm).
We additionally study the complexity of MMV. We first show that all algorithms in a natural class of deterministic linear algebraic algorithms for MMV (including ours) require $Ω(n^ω)$ time. We also show a barrier to proving a super-quadratic running time lower bound for matrix multiplication (and hence MMV) under the Strong Exponential Time Hypothesis (SETH). Finally, we study relationships between natural variants and special cases of MMV (with respect to deterministic $\widetilde{O}(n^2)$-time reductions).
△ Less
Submitted 28 September, 2023;
originally announced September 2023.
-
Topological $k$-metrics
Authors:
Willow Barkan-Vered,
Huck Bennett,
Amir Nayyeri
Abstract:
Metric spaces $(X, d)$ are ubiquitous objects in mathematics and computer science that allow for capturing (pairwise) distance relationships $d(x, y)$ between points $x, y \in X$. Because of this, it is natural to ask what useful generalizations there are of metric spaces for capturing "$k$-wise distance relationships" $d(x_1, \ldots, x_k)$ among points $x_1, \ldots, x_k \in X$ for $k > 2$. To tha…
▽ More
Metric spaces $(X, d)$ are ubiquitous objects in mathematics and computer science that allow for capturing (pairwise) distance relationships $d(x, y)$ between points $x, y \in X$. Because of this, it is natural to ask what useful generalizations there are of metric spaces for capturing "$k$-wise distance relationships" $d(x_1, \ldots, x_k)$ among points $x_1, \ldots, x_k \in X$ for $k > 2$. To that end, Gähler (Math. Nachr., 1963) (and perhaps others even earlier) defined $k$-metric spaces, which generalize metric spaces, and most notably generalize the triangle inequality $d(x_1, x_2) \leq d(x_1, y) + d(y, x_2)$ to the "simplex inequality" $d(x_1, \ldots, x_k) \leq \sum_{i=1}^k d(x_1, \ldots, x_{i-1}, y, x_{i+1}, \ldots, x_k)$. (The definition holds for any fixed $k \geq 2$, and a $2$-metric space is just a (standard) metric space.)
In this work, we introduce strong $k$-metric spaces, $k$-metric spaces that satisfy a topological condition stronger than the simplex inequality, which makes them "behave nicely." We also introduce coboundary $k$-metrics, which generalize $\ell_p$ metrics (and in fact all finite metric spaces induced by norms) and minimum bounding chain $k$-metrics, which generalize shortest path metrics (and capture all strong $k$-metrics). Using these definitions, we prove analogs of a number of fundamental results about embedding finite metric spaces including Fréchet embedding (isometric embedding into $\ell_{\infty}$) and isometric embedding of all tree metrics into $\ell_1$. We also study relationships between families of (strong) $k$-metrics, and show that natural quantities, like simplex volume, are strong $k$-metrics.
△ Less
Submitted 8 August, 2023;
originally announced August 2023.
-
Parallel Matrix Multiplication Using Voltage Controlled Magnetic Anisotropy Domain Wall Logic
Authors:
Nicholas Zogbi,
Samuel Liu,
Christopher H. Bennett,
Sapan Agarwal,
Matthew J. Marinella,
Jean Anne C. Incorvia,
T. Patrick Xiao
Abstract:
The domain wall-magnetic tunnel junction (DW-MTJ) is a versatile device that can simultaneously store data and perform computations. These three-terminal devices are promising for digital logic due to their nonvolatility, low-energy operation, and radiation hardness. Here, we augment the DW-MTJ logic gate with voltage controlled magnetic anisotropy (VCMA) to improve the reliability of logical conc…
▽ More
The domain wall-magnetic tunnel junction (DW-MTJ) is a versatile device that can simultaneously store data and perform computations. These three-terminal devices are promising for digital logic due to their nonvolatility, low-energy operation, and radiation hardness. Here, we augment the DW-MTJ logic gate with voltage controlled magnetic anisotropy (VCMA) to improve the reliability of logical concatenation in the presence of realistic process variations. VCMA creates potential wells that allow for reliable and repeatable localization of domain walls. The DW-MTJ logic gate supports different fanouts, allowing for multiple inputs and outputs for a single device without affecting area. We simulate a systolic array of DW-MTJ Multiply-Accumulate (MAC) units with 4-bit and 8-bit precision, which uses the nonvolatility of DW-MTJ logic gates to enable fine-grained pipelining and high parallelism. The DW-MTJ systolic array provides comparable throughput and efficiency to state-of-the-art CMOS systolic arrays while being radiation-hard. These results improve the feasibility of using domain wall-based processors, especially for extreme-environment applications such as space.
△ Less
Submitted 14 April, 2023; v1 submitted 26 January, 2023;
originally announced January 2023.
-
Lattice Problems Beyond Polynomial Time
Authors:
Divesh Aggarwal,
Huck Bennett,
Zvika Brakerski,
Alexander Golovnev,
Rajendra Kumar,
Zeyong Li,
Spencer Peters,
Noah Stephens-Davidowitz,
Vinod Vaikuntanathan
Abstract:
We study the complexity of lattice problems in a world where algorithms, reductions, and protocols can run in superpolynomial time, revisiting four foundational results: two worst-case to average-case reductions and two protocols. We also show a novel protocol.
1. We prove that secret-key cryptography exists if $\widetilde{O}(\sqrt{n})$-approximate SVP is hard for $2^{\varepsilon n}$-time algori…
▽ More
We study the complexity of lattice problems in a world where algorithms, reductions, and protocols can run in superpolynomial time, revisiting four foundational results: two worst-case to average-case reductions and two protocols. We also show a novel protocol.
1. We prove that secret-key cryptography exists if $\widetilde{O}(\sqrt{n})$-approximate SVP is hard for $2^{\varepsilon n}$-time algorithms. I.e., we extend to our setting (Micciancio and Regev's improved version of) Ajtai's celebrated polynomial-time worst-case to average-case reduction from $\widetilde{O}(n)$-approximate SVP to SIS.
2. We prove that public-key cryptography exists if $\widetilde{O}(n)$-approximate SVP is hard for $2^{\varepsilon n}$-time algorithms. This extends to our setting Regev's celebrated polynomial-time worst-case to average-case reduction from $\widetilde{O}(n^{1.5})$-approximate SVP to LWE. In fact, Regev's reduction is quantum, but ours is classical, generalizing Peikert's polynomial-time classical reduction from $\widetilde{O}(n^2)$-approximate SVP.
3. We show a $2^{\varepsilon n}$-time coAM protocol for $O(1)$-approximate CVP, generalizing the celebrated polynomial-time protocol for $O(\sqrt{n/\log n})$-CVP due to Goldreich and Goldwasser. These results show complexity-theoretic barriers to extending the recent line of fine-grained hardness results for CVP and SVP to larger approximation factors. (This result also extends to arbitrary norms.)
4. We show a $2^{\varepsilon n}$-time co-non-deterministic protocol for $O(\sqrt{\log n})$-approximate SVP, generalizing the (also celebrated!) polynomial-time protocol for $O(\sqrt{n})$-CVP due to Aharonov and Regev.
5. We give a novel coMA protocol for $O(1)$-approximate CVP with a $2^{\varepsilon n}$-time verifier.
All of the results described above are special cases of more general theorems that achieve time-approximation factor tradeoffs.
△ Less
Submitted 21 November, 2022;
originally announced November 2022.
-
Parameterized Inapproximability of the Minimum Distance Problem over all Fields and the Shortest Vector Problem in all $\ell_p$ Norms
Authors:
Huck Bennett,
Mahdi Cheraghchi,
Venkatesan Guruswami,
João Ribeiro
Abstract:
We prove that the Minimum Distance Problem (MDP) on linear codes over any fixed finite field and parameterized by the input distance bound is W[1]-hard to approximate within any constant factor. We also prove analogous results for the parameterized Shortest Vector Problem (SVP) on integer lattices. Specifically, we prove that SVP in the $\ell_p$ norm is W[1]-hard to approximate within any constant…
▽ More
We prove that the Minimum Distance Problem (MDP) on linear codes over any fixed finite field and parameterized by the input distance bound is W[1]-hard to approximate within any constant factor. We also prove analogous results for the parameterized Shortest Vector Problem (SVP) on integer lattices. Specifically, we prove that SVP in the $\ell_p$ norm is W[1]-hard to approximate within any constant factor for any fixed $p >1$ and W[1]-hard to approximate within a factor approaching $2$ for $p=1$. (We show hardness under randomized reductions in each case.)
These results answer the main questions left open (and explicitly posed) by Bhattacharyya, Bonnet, Egri, Ghoshal, Karthik C. S., Lin, Manurangsi, and Marx (Journal of the ACM, 2021) on the complexity of parameterized MDP and SVP. For MDP, they established similar hardness for binary linear codes and left the case of general fields open. For SVP in $\ell_p$ norms with $p > 1$, they showed inapproximability within some constant factor (depending on $p$) and left open showing such hardness for arbitrary constant factors. They also left open showing W[1]-hardness even of exact SVP in the $\ell_1$ norm.
△ Less
Submitted 26 February, 2024; v1 submitted 15 November, 2022;
originally announced November 2022.
-
How Community Agreements Can Improve Workplace Culture in Physics
Authors:
Emanuela Barzi,
Simonetta Liuti,
Christine Nattrass,
Roxanne Springer,
Charles H. Bennett
Abstract:
Equity, Diversity, and Inclusion (EDI) committees and Codes of Conduct (CoC) have become common in laboratories and physics departments across the country. However, very often these EDI committees and CoC are not equipped to provide practical consequences for violations, and therefore are mostly performative in nature. A considerable effort has been devoted by various groups within APS units and b…
▽ More
Equity, Diversity, and Inclusion (EDI) committees and Codes of Conduct (CoC) have become common in laboratories and physics departments across the country. However, very often these EDI committees and CoC are not equipped to provide practical consequences for violations, and therefore are mostly performative in nature. A considerable effort has been devoted by various groups within APS units and beyond the APS in develo** instead what are now called Community Guidelines. Community Guidelines help implement the core principles in CoC, by setting expectations for participation in in-person events and virtual communication. When further accompanied by accountability and enforcement processes, they develop into Community Agreements. This White Paper discusses the elements necessary to create and implement an effective Community Agreement, reviews examples of Community Agreements in physics, and argues that physics collaborations, physics departments, and ultimately as many physics organizations as possible, however large or small, should have a Community Agreement in place. We advocate that Community Agreements should become part of the bylaws of any entity that has bylaws.
△ Less
Submitted 27 October, 2022; v1 submitted 14 September, 2022;
originally announced September 2022.
-
Tunable intervalence charge transfer in ruthenium Prussian blue analogue enables stable and efficient biocompatible artificial synapses
Authors:
Donald A. Robinson,
Michael E. Foster,
Christopher H. Bennett,
Austin Bhandarkar,
Elizabeth R. Webster,
Aleyna Celebi,
Nisa Celebi,
Elliot J. Fuller,
Vitalie Stavila,
Catalin D. Spataru,
David S. Ashby,
Matthew J. Marinella,
Raga Krishnakumar,
Mark D. Allendorf,
A. Alec Talin
Abstract:
Emerging concepts for neuromorphic computing, bioelectronics, and brain-computer interfacing inspire new research avenues aimed at understanding the relationship between oxidation state and conductivity in unexplored materials. Here, we present ruthenium Prussian blue analogue (RuPBA), a mixed valence coordination compound with an open framework structure and ability to conduct both ionic and elec…
▽ More
Emerging concepts for neuromorphic computing, bioelectronics, and brain-computer interfacing inspire new research avenues aimed at understanding the relationship between oxidation state and conductivity in unexplored materials. Here, we present ruthenium Prussian blue analogue (RuPBA), a mixed valence coordination compound with an open framework structure and ability to conduct both ionic and electronic charge, for flexible artificial synapses that reversibly switch conductance by more than four orders of magnitude based on electrochemically tunable oxidation state. Retention of programmed states is improved by nearly two orders of magnitude compared to the extensively studied organic polymers, thus reducing the frequency, complexity and energy costs associated with error correction schemes. We demonstrate dopamine detection using RuPBA synapses and biocompatibility with neuronal cells, evoking prospective application for brain-computer interfacing. By application of electron transfer theory to in-situ spectroscopic probing of intervalence charge transfer, we elucidate a switching mechanism whereby the degree of mixed valency between N-coordinated Ru sites controls the carrier concentration and mobility, as supported by DFT.
△ Less
Submitted 15 July, 2022;
originally announced July 2022.
-
Hydrated Organic Matter: Functional Relationships with the Mass Physical Static and Dynamic Properties of Marine Mud
Authors:
Richard H. Bennett,
Matthew H. Hulbert,
Roger W. Meredith
Abstract:
The mass physical and dynamic properties of marine mud deposits are a function of the interaction among a maximum of four sediment Phases as follows: (1) clay mineral solids that often include silt and sand size particles of different mineralogy, (2) semisolid hydrated organic matter, (3) free pore water, and (4) free gas when present. Historically, the total water was removed by oven drying which…
▽ More
The mass physical and dynamic properties of marine mud deposits are a function of the interaction among a maximum of four sediment Phases as follows: (1) clay mineral solids that often include silt and sand size particles of different mineralogy, (2) semisolid hydrated organic matter, (3) free pore water, and (4) free gas when present. Historically, the total water was removed by oven drying which includes the seawater of hydration of the organic matter (OM); thus, the total water content was considered free pore water in several research disciplines. The semisolid hydrated OM resists transport through the mud pore space and the water that is bound to the OM is not free pore water. Calculations of marine mud mass-physical properties without consideration and correction for the presence of hydrated organic matter can introduce significant error in the amount of free water content of the pore space in the mud and the quantitative differences in both porosity and void ratio. Simulations reveal absolute relative differences due to the presence of hydrated OM that can reach meaningful values even when the %TOC values are below ~3%. Relevance is determined by comparing the differences due to the hydrated OM Phase with the differences in the fluid saturation Phase at 100% and at 90%. Understanding the presence and characteristics of hydrated OM is expected to engage important future research in several sciences and in geotechnical engineering of terrestrial and marine mud deposits.
△ Less
Submitted 29 March, 2022;
originally announced March 2022.
-
Metaplastic and Energy-Efficient Biocompatible Graphene Artificial Synaptic Transistors for Enhanced Accuracy Neuromorphic Computing
Authors:
Dmitry Kireev,
Samuel Liu,
Harrison **,
T. Patrick Xiao,
Christopher H. Bennett,
Deji Akinwande,
Jean Anne Incorvia
Abstract:
CMOS-based computing systems that employ the von Neumann architecture are relatively limited when it comes to parallel data storage and processing. In contrast, the human brain is a living computational signal processing unit that operates with extreme parallelism and energy efficiency. Although numerous neuromorphic electronic devices have emerged in the last decade, most of them are rigid or con…
▽ More
CMOS-based computing systems that employ the von Neumann architecture are relatively limited when it comes to parallel data storage and processing. In contrast, the human brain is a living computational signal processing unit that operates with extreme parallelism and energy efficiency. Although numerous neuromorphic electronic devices have emerged in the last decade, most of them are rigid or contain materials that are toxic to biological systems. In this work, we report on biocompatible bilayer graphene-based artificial synaptic transistors (BLAST) capable of mimicking synaptic behavior. The BLAST devices leverage a dry ion-selective membrane, enabling long-term potentiation, with ~50 aJ/m^2 switching energy efficiency, at least an order of magnitude lower than previous reports on two-dimensional material-based artificial synapses. The devices show unique metaplasticity, a useful feature for generalizable deep neural networks, and we demonstrate that metaplastic BLASTs outperform ideal linear synapses in classic image classification tasks. With switching energy well below the 1 fJ energy estimated per biological synapse, the proposed devices are powerful candidates for bio-interfaced online learning, bridging the gap between artificial and biological neural networks.
△ Less
Submitted 8 March, 2022;
originally announced March 2022.
-
Hardness of the (Approximate) Shortest Vector Problem: A Simple Proof via Reed-Solomon Codes
Authors:
Huck Bennett,
Chris Peikert
Abstract:
$\newcommand{\NP}{\mathsf{NP}}\newcommand{\GapSVP}{\textrm{GapSVP}}$We give a simple proof that the (approximate, decisional) Shortest Vector Problem is $\NP$-hard under a randomized reduction. Specifically, we show that for any $p \geq 1$ and any constant $γ< 2^{1/p}$, the $γ$-approximate problem in the $\ell_p$ norm ($γ$-$\GapSVP_p$) is not in $\mathsf{RP}$ unless $\NP \subseteq \mathsf{RP}…
▽ More
$\newcommand{\NP}{\mathsf{NP}}\newcommand{\GapSVP}{\textrm{GapSVP}}$We give a simple proof that the (approximate, decisional) Shortest Vector Problem is $\NP$-hard under a randomized reduction. Specifically, we show that for any $p \geq 1$ and any constant $γ< 2^{1/p}$, the $γ$-approximate problem in the $\ell_p$ norm ($γ$-$\GapSVP_p$) is not in $\mathsf{RP}$ unless $\NP \subseteq \mathsf{RP}$. Our proof follows an approach pioneered by Ajtai (STOC 1998), and strengthened by Micciancio (FOCS 1998 and SICOMP 2000), for showing hardness of $γ$-$\GapSVP_p$ using locally dense lattices. We construct such lattices simply by applying "Construction A" to Reed-Solomon codes with suitable parameters, and prove their local density via an elementary argument originally used in the context of Craig lattices.
As in all known $\NP$-hardness results for $\GapSVP_p$ with $p < \infty$, our reduction uses randomness. Indeed, it is a notorious open problem to prove $\NP$-hardness via a deterministic reduction. To this end, we additionally discuss potential directions and associated challenges for derandomizing our reduction. In particular, we show that a close deterministic analogue of our local density construction would improve on the state-of-the-art explicit Reed-Solomon list-decoding lower bounds of Guruswami and Rudra (STOC 2005 and IEEE Trans. Inf. Theory 2006).
As a related contribution of independent interest, we also give a polynomial-time algorithm for decoding $n$-dimensional "Construction A Reed-Solomon lattices" (with different parameters than those used in our hardness proof) to a distance within an $O(\sqrt{\log n})$ factor of Minkowski's bound. This asymptotically matches the best known distance for decoding near Minkowski's bound, due to Mook and Peikert (IEEE Trans. Inf. Theory 2022), whose work we build on with a somewhat simpler construction and analysis.
△ Less
Submitted 15 February, 2022;
originally announced February 2022.
-
The 1.28 GHz MeerKAT Galactic Center Mosaic
Authors:
I. Heywood,
I. Rammala,
F. Camilo,
W. D. Cotton,
F. Yusef-Zadeh,
T. D. Abbott,
R. M. Adam,
G. Adams,
M. A. Aldera,
K. M. B. Asad,
E. F. Bauermeister,
T. G. H. Bennett,
H. L. Bester,
W. A. Bode,
D. H. Botha,
A. G. Botha,
L. R. S. Brederode,
S. Buchner,
J. P. Burger,
T. Cheetham,
D. I. L. de Villiers,
M. A. Dikgale-Mahlakoana,
L. J. du Toit,
S. W. P. Esterhuyse,
B. L. Fanaroff
, et al. (86 additional authors not shown)
Abstract:
The inner $\sim$200 pc region of the Galaxy contains a 4 million M$_{\odot}$ supermassive black hole (SMBH), significant quantities of molecular gas, and star formation and cosmic ray energy densities that are roughly two orders of magnitude higher than the corresponding levels in the Galactic disk. At a distance of only 8.2 kpc, the region presents astronomers with a unique opportunity to study a…
▽ More
The inner $\sim$200 pc region of the Galaxy contains a 4 million M$_{\odot}$ supermassive black hole (SMBH), significant quantities of molecular gas, and star formation and cosmic ray energy densities that are roughly two orders of magnitude higher than the corresponding levels in the Galactic disk. At a distance of only 8.2 kpc, the region presents astronomers with a unique opportunity to study a diverse range of energetic astrophysical phenomena, from stellar objects in extreme environments, to the SMBH and star-formation driven feedback processes that are known to influence the evolution of galaxies as a whole. We present a new survey of the Galactic center conducted with the South African MeerKAT radio telescope. Radio imaging offers a view that is unaffected by the large quantities of dust that obscure the region at other wavelengths, and a scene of striking complexity is revealed. We produce total intensity and spectral index mosaics of the region from 20 pointings (144 hours on-target in total), covering 6.5 square degrees with an angular resolution of 4$"$,at a central frequency of 1.28 GHz. Many new features are revealed for the first time due to a combination of MeerKAT's high sensitivity, exceptional $u,v$-plane coverage, and geographical vantage point. We highlight some initial survey results, including new supernova remnant candidates, many new non-thermal filament complexes, and enhanced views of the Radio Arc Bubble, Sgr A and Sgr B regions. This project is a SARAO public legacy survey, and the image products are made available with this article.
△ Less
Submitted 27 January, 2022; v1 submitted 25 January, 2022;
originally announced January 2022.
-
Shape-Dependent Multi-Weight Magnetic Artificial Synapses for Neuromorphic Computing
Authors:
Thomas Leonard,
Samuel Liu,
Mahshid Alamdar,
Can Cui,
Otitoaleke G. Akinola,
Lin Xue,
T. Patrick Xiao,
Joseph S. Friedman,
Matthew J. Marinella,
Christopher H. Bennett,
Jean Anne C. Incorvia
Abstract:
In neuromorphic computing, artificial synapses provide a multi-weight conductance state that is set based on inputs from neurons, analogous to the brain. Additional properties of the synapse beyond multiple weights can be needed, and can depend on the application, requiring the need for generating different synapse behaviors from the same materials. Here, we measure artificial synapses based on ma…
▽ More
In neuromorphic computing, artificial synapses provide a multi-weight conductance state that is set based on inputs from neurons, analogous to the brain. Additional properties of the synapse beyond multiple weights can be needed, and can depend on the application, requiring the need for generating different synapse behaviors from the same materials. Here, we measure artificial synapses based on magnetic materials that use a magnetic tunnel junction and a magnetic domain wall. By fabricating lithographic notches in a domain wall track underneath a single magnetic tunnel junction, we achieve 4-5 stable resistance states that can be repeatably controlled electrically using spin orbit torque. We analyze the effect of geometry on the synapse behavior, showing that a trapezoidal device has asymmetric weight updates with high controllability, while a straight device has higher stochasticity, but with stable resistance levels. The device data is input into neuromorphic computing simulators to show the usefulness of application-specific synaptic functions. Implementing an artificial neural network applied on streamed Fashion-MNIST data, we show that the trapezoidal magnetic synapse can be used as a metaplastic function for efficient online learning. Implementing a convolutional neural network for CIFAR-100 image recognition, we show that the straight magnetic synapse achieves near-ideal inference accuracy, due to the stability of its resistance levels. This work shows multi-weight magnetic synapses are a feasible technology for neuromorphic computing and provides design guidelines for emerging artificial synapse technologies.
△ Less
Submitted 17 February, 2022; v1 submitted 22 November, 2021;
originally announced November 2021.
-
The MeerKAT Galaxy Cluster Legacy Survey I. Survey Overview and Highlights
Authors:
K. Knowles,
W. D. Cotton,
L. Rudnick,
F. Camilo,
S. Goedhart,
R. Deane,
M. Ramatsoku,
M. F. Bietenholz,
M. Brüggen,
C. Button,
H. Chen,
J. O. Chibueze,
T. E. Clarke,
F. de Gasperin,
R. Ianjamasimanana,
G. I. G. Józsa,
M. Hilton,
K. C. Kesebonye,
K. Kolokythas,
R. C. Kraan-Korteweg,
G. Lawrie,
M. Lochner,
S. I. Loubser,
P. Marchegiani,
N. Mhlahlo
, et al. (126 additional authors not shown)
Abstract:
MeerKAT's large number of antennas, spanning 8 km with a densely packed 1 km core, create a powerful instrument for wide-area surveys, with high sensitivity over a wide range of angular scales. The MeerKAT Galaxy Cluster Legacy Survey (MGCLS) is a programme of long-track MeerKAT L-band (900-1670 MHz) observations of 115 galaxy clusters, observed for $\sim$6-10 hours each in full polarisation. The…
▽ More
MeerKAT's large number of antennas, spanning 8 km with a densely packed 1 km core, create a powerful instrument for wide-area surveys, with high sensitivity over a wide range of angular scales. The MeerKAT Galaxy Cluster Legacy Survey (MGCLS) is a programme of long-track MeerKAT L-band (900-1670 MHz) observations of 115 galaxy clusters, observed for $\sim$6-10 hours each in full polarisation. The first legacy product data release (DR1), made available with this paper, includes the MeerKAT visibilities, basic image cubes at $\sim$8" resolution, and enhanced spectral and polarisation image cubes at $\sim$8" and 15" resolutions. Typical sensitivities for the full-resolution MGCLS image products are $\sim$3-5 μJy/beam. The basic cubes are full-field and span 4 deg^2. The enhanced products consist of the inner 1.44 deg^2 field of view, corrected for the primary beam. The survey is fully sensitive to structures up to $\sim$10' scales and the wide bandwidth allows spectral and Faraday rotation map**. HI map** at 209 kHz resolution can be done at $0<z<0.09$ and $0.19<z<0.48$. In this paper, we provide an overview of the survey and DR1 products, including caveats for usage. We present some initial results from the survey, both for their intrinsic scientific value and to highlight the capabilities for further exploration with these data. These include a primary beam-corrected compact source catalogue of $\sim$626,000 sources for the full survey, and an optical/infrared cross-matched catalogue for compact sources in Abell 209 and Abell S295. We examine dust unbiased star-formation rates as a function of clustercentric radius in Abell 209 and present a catalogue of 99 diffuse cluster sources (56 are new), some of which have no suitable characterisation. We also highlight some of the radio galaxies which challenge current paradigms and present first results from HI studies of four targets.
△ Less
Submitted 10 November, 2021;
originally announced November 2021.
-
Improved Hardness of BDD and SVP Under Gap-(S)ETH
Authors:
Huck Bennett,
Chris Peikert,
Yi Tang
Abstract:
We show improved fine-grained hardness of two key lattice problems in the $\ell_p$ norm: Bounded Distance Decoding to within an $α$ factor of the minimum distance ($\mathrm{BDD}_{p, α}$) and the (decisional) $γ$-approximate Shortest Vector Problem ($\mathrm{SVP}_{p,γ}$), assuming variants of the Gap (Strong) Exponential Time Hypothesis (Gap-(S)ETH). Specifically, we show:
1. For all…
▽ More
We show improved fine-grained hardness of two key lattice problems in the $\ell_p$ norm: Bounded Distance Decoding to within an $α$ factor of the minimum distance ($\mathrm{BDD}_{p, α}$) and the (decisional) $γ$-approximate Shortest Vector Problem ($\mathrm{SVP}_{p,γ}$), assuming variants of the Gap (Strong) Exponential Time Hypothesis (Gap-(S)ETH). Specifically, we show:
1. For all $p \in [1, \infty)$, there is no $2^{o(n)}$-time algorithm for $\mathrm{BDD}_{p, α}$ for any constant $α> α_\mathsf{kn}$, where $α_\mathsf{kn} = 2^{-c_\mathsf{kn}} < 0.98491$ and $c_\mathsf{kn}$ is the $\ell_2$ kissing-number constant, unless non-uniform Gap-ETH is false.
2. For all $p \in [1, \infty)$, there is no $2^{o(n)}$-time algorithm for $\mathrm{BDD}_{p, α}$ for any constant $α> α^\ddagger_p$, where $α^\ddagger_p$ is explicit and satisfies $α^\ddagger_p = 1$ for $1 \leq p \leq 2$, $α^\ddagger_p < 1$ for all $p > 2$, and $α^\ddagger_p \to 1/2$ as $p \to \infty$, unless randomized Gap-ETH is false.
3. For all $p \in [1, \infty) \setminus 2 \mathbb{Z}$ and all $C > 1$, there is no $2^{n/C}$-time algorithm for $\mathrm{BDD}_{p, α}$ for any constant $α> α^\dagger_{p, C}$, where $α^\dagger_{p, C}$ is explicit and satisfies $α^\dagger_{p, C} \to 1$ as $C \to \infty$ for any fixed $p \in [1, \infty)$, unless non-uniform Gap-SETH is false.
4. For all $p > p_0 \approx 2.1397$, $p \notin 2\mathbb{Z}$, and all $C > C_p$, there is no $2^{n/C}$-time algorithm for $\mathrm{SVP}_{p, γ}$ for some constant $γ> 1$, where $C_p > 1$ is explicit and satisfies $C_p \to 1$ as $p \to \infty$, unless randomized Gap-SETH is false.
△ Less
Submitted 25 January, 2022; v1 submitted 8 September, 2021;
originally announced September 2021.
-
On the Accuracy of Analog Neural Network Inference Accelerators
Authors:
T. Patrick Xiao,
Ben Feinberg,
Christopher H. Bennett,
Venkatraman Prabhakar,
Prashant Saxena,
Vineet Agrawal,
Sapan Agarwal,
Matthew J. Marinella
Abstract:
Specialized accelerators have recently garnered attention as a method to reduce the power consumption of neural network inference. A promising category of accelerators utilizes nonvolatile memory arrays to both store weights and perform $\textit{in situ}$ analog computation inside the array. While prior work has explored the design space of analog accelerators to optimize performance and energy ef…
▽ More
Specialized accelerators have recently garnered attention as a method to reduce the power consumption of neural network inference. A promising category of accelerators utilizes nonvolatile memory arrays to both store weights and perform $\textit{in situ}$ analog computation inside the array. While prior work has explored the design space of analog accelerators to optimize performance and energy efficiency, there is seldom a rigorous evaluation of the accuracy of these accelerators. This work shows how architectural design decisions, particularly in map** neural network parameters to analog memory cells, influence inference accuracy. When evaluated using ResNet50 on ImageNet, the resilience of the system to analog non-idealities - cell programming errors, analog-to-digital converter resolution, and array parasitic resistances - all improve when analog quantities in the hardware are made proportional to the weights in the network. Moreover, contrary to the assumptions of prior work, nearly equivalent resilience to cell imprecision can be achieved by fully storing weights as analog quantities, rather than spreading weight bits across multiple devices, often referred to as bit slicing. By exploiting proportionality, analog system designers have the freedom to match the precision of the hardware to the needs of the algorithm, rather than attempting to guarantee the same level of precision in the intermediate results as an equivalent digital accelerator. This ultimately results in an analog accelerator that is more accurate, more robust to analog errors, and more energy-efficient.
△ Less
Submitted 3 February, 2022; v1 submitted 2 September, 2021;
originally announced September 2021.
-
High-Speed CMOS-Free Purely Spintronic Asynchronous Recurrent Neural Network
Authors:
Pranav O. Mathews,
Christian B. Duffee,
Abel Thayil,
Ty E. Stovall,
Christopher H. Bennett,
Felipe Garcia-Sanchez,
Matthew J. Marinella,
Jean Anne C. Incorvia,
Naimul Hassan,
Xuan Hu,
Joseph S. Friedman
Abstract:
Neuromorphic computing systems overcome the limitations of traditional von Neumann computing architectures. These computing systems can be further improved upon by using emerging technologies that are more efficient than CMOS for neural computation. Recent research has demonstrated memristors and spintronic devices in various neural network designs boost efficiency and speed. This paper presents a…
▽ More
Neuromorphic computing systems overcome the limitations of traditional von Neumann computing architectures. These computing systems can be further improved upon by using emerging technologies that are more efficient than CMOS for neural computation. Recent research has demonstrated memristors and spintronic devices in various neural network designs boost efficiency and speed. This paper presents a biologically inspired fully spintronic neuron used in a fully spintronic Hopfield RNN. The network is used to solve tasks, and the results are compared against those of current Hopfield neuromorphic architectures which use emerging technologies.
△ Less
Submitted 30 September, 2022; v1 submitted 5 July, 2021;
originally announced July 2021.
-
Controllable reset behavior in domain wall-magnetic tunnel junction artificial neurons for task-adaptable computation
Authors:
Samuel Liu,
Christopher H. Bennett,
Joseph S. Friedman,
Matthew J. Marinella,
David Paydarfar,
Jean Anne C. Incorvia
Abstract:
Neuromorphic computing with spintronic devices has been of interest due to the limitations of CMOS-driven von Neumann computing. Domain wall-magnetic tunnel junction (DW-MTJ) devices have been shown to be able to intrinsically capture biological neuron behavior. Edgy-relaxed behavior, where a frequently firing neuron experiences a lower action potential threshold, may provide additional artificial…
▽ More
Neuromorphic computing with spintronic devices has been of interest due to the limitations of CMOS-driven von Neumann computing. Domain wall-magnetic tunnel junction (DW-MTJ) devices have been shown to be able to intrinsically capture biological neuron behavior. Edgy-relaxed behavior, where a frequently firing neuron experiences a lower action potential threshold, may provide additional artificial neuronal functionality when executing repeated tasks. In this study, we demonstrate that this behavior can be implemented in DW-MTJ artificial neurons via three alternative mechanisms: shape anisotropy, magnetic field, and current-driven soft reset. Using micromagnetics and analytical device modeling to classify the Optdigits handwritten digit dataset, we show that edgy-relaxed behavior improves both classification accuracy and classification rate for ordered datasets while sacrificing little to no accuracy for a randomized dataset. This work establishes methods by which artificial spintronic neurons can be flexibly adapted to datasets.
△ Less
Submitted 8 January, 2021;
originally announced January 2021.
-
Domain Wall Leaky Integrate-and-Fire Neurons with Shape-Based Configurable Activation Functions
Authors:
Wesley H. Brigner,
Naimul Hassan,
Xuan Hu,
Christopher H. Bennett,
Felipe Garcia-Sanchez,
Can Cui,
Alvaro Velasquez,
Matthew J. Marinella,
Jean Anne C. Incorvia,
Joseph S. Friedman
Abstract:
Complementary metal oxide semiconductor (CMOS) devices display volatile characteristics, and are not well suited for analog applications such as neuromorphic computing. Spintronic devices, on the other hand, exhibit both non-volatile and analog features, which are well-suited to neuromorphic computing. Consequently, these novel devices are at the forefront of beyond-CMOS artificial intelligence ap…
▽ More
Complementary metal oxide semiconductor (CMOS) devices display volatile characteristics, and are not well suited for analog applications such as neuromorphic computing. Spintronic devices, on the other hand, exhibit both non-volatile and analog features, which are well-suited to neuromorphic computing. Consequently, these novel devices are at the forefront of beyond-CMOS artificial intelligence applications. However, a large quantity of these artificial neuromorphic devices still require the use of CMOS, which decreases the efficiency of the system. To resolve this, we have previously proposed a number of artificial neurons and synapses that do not require CMOS for operation. Although these devices are a significant improvement over previous renditions, their ability to enable neural network learning and recognition is limited by their intrinsic activation functions. This work proposes modifications to these spintronic neurons that enable configuration of the activation functions through control of the shape of a magnetic domain wall track. Linear and sigmoidal activation functions are demonstrated in this work, which can be extended through a similar approach to enable a wide variety of activation functions.
△ Less
Submitted 11 November, 2020;
originally announced November 2020.
-
Domain Wall-Magnetic Tunnel Junction Spin Orbit Torque Devices and Circuits for In-Memory Computing
Authors:
Mahshid Alamdar,
Thomas Leonard,
Can Cui,
Bishweshwor P. Rimal,
Lin Xue,
Otitoaleke G. Akinola,
T. Patrick Xiao,
Joseph S. Friedman,
Christopher H. Bennett,
Matthew J. Marinella,
Jean Anne C. Incorvia
Abstract:
There are pressing problems with traditional computing, especially for accomplishing data-intensive and real-time tasks, that motivate the development of in-memory computing devices to both store information and perform computation. Magnetic tunnel junction (MTJ) memory elements can be used for computation by manipulating a domain wall (DW), a transition region between magnetic domains. But, these…
▽ More
There are pressing problems with traditional computing, especially for accomplishing data-intensive and real-time tasks, that motivate the development of in-memory computing devices to both store information and perform computation. Magnetic tunnel junction (MTJ) memory elements can be used for computation by manipulating a domain wall (DW), a transition region between magnetic domains. But, these devices have suffered from challenges: spin transfer torque (STT) switching of a DW requires high current, and the multiple etch steps needed to create an MTJ pillar on top of a DW track has led to reduced tunnel magnetoresistance (TMR). These issues have limited experimental study of devices and circuits. Here, we study prototypes of three-terminal domain wall-magnetic tunnel junction (DW-MTJ) in-memory computing devices that can address data processing bottlenecks and resolve these challenges by using perpendicular magnetic anisotropy (PMA), spin-orbit torque (SOT) switching, and an optimized lithography process to produce average device tunnel magnetoresistance TMR = 164%, resistance-area product RA = 31 Ω-μm^2, close to the RA of the unpatterned film, and lower switching current density compared to using spin transfer torque. A two-device circuit shows bit propagation between devices. Device initialization variation in switching voltage is shown to be curtailed to 7% by controlling the DW initial position, which we show corresponds to 96% accuracy in a DW-MTJ full adder simulation. These results make strides in using MTJs and DWs for in-memory and neuromorphic computing applications.
△ Less
Submitted 26 October, 2020;
originally announced October 2020.
-
Reconstructing weighted voting schemes from partial information about their power indices
Authors:
Huck Bennett,
Anindya De,
Rocco A. Servedio,
Emmanouil-Vasileios Vlatakis-Gkaragkounis
Abstract:
A number of recent works [Goldberg 2006; O'Donnell and Servedio 2011; De, Diakonikolas, and Servedio 2017; De, Diakonikolas, Feldman, and Servedio 2014] have considered the problem of approximately reconstructing an unknown weighted voting scheme given information about various sorts of ``power indices'' that characterize the level of control that individual voters have over the final outcome. In…
▽ More
A number of recent works [Goldberg 2006; O'Donnell and Servedio 2011; De, Diakonikolas, and Servedio 2017; De, Diakonikolas, Feldman, and Servedio 2014] have considered the problem of approximately reconstructing an unknown weighted voting scheme given information about various sorts of ``power indices'' that characterize the level of control that individual voters have over the final outcome. In the language of theoretical computer science, this is the problem of approximating an unknown linear threshold function (LTF) over $\{-1, 1\}^n$ given some numerical measure (such as the function's $n$ ``Chow parameters,'' a.k.a. its degree-1 Fourier coefficients, or the vector of its $n$ Shapley indices) of how much each of the $n$ individual input variables affects the outcome of the function.
In this paper we consider the problem of reconstructing an LTF given only partial information about its Chow parameters or Shapley indices; i.e. we are given only the Chow parameters or the Shapley indices corresponding to a subset $S \subseteq [n]$ of the $n$ input variables. A natural goal in this partial information setting is to find an LTF whose Chow parameters or Shapley indices corresponding to indices in $S$ accurately match the given Chow parameters or Shapley indices of the unknown LTF. We refer to this as the Partial Inverse Power Index Problem.
Our main results are a polynomial time algorithm for the ($\varepsilon$-approximate) Chow Parameters Partial Inverse Power Index Problem and a quasi-polynomial time algorithm for the ($\varepsilon$-approximate) Shapley Indices Partial Inverse Power Index Problem.
△ Less
Submitted 26 July, 2020; v1 submitted 19 July, 2020;
originally announced July 2020.
-
Device-aware inference operations in SONOS nonvolatile memory arrays
Authors:
Christopher H. Bennett,
T. Patrick Xiao,
Ryan Dellana,
Vineet Agrawal,
Ben Feinberg,
Venkatraman Prabhakar,
Krishnaswamy Ramkumar,
Long Hinh,
Swatilekha Saha,
Vijay Raghavan,
Ramesh Chettuvetty,
Sapan Agarwal,
Matthew J. Marinella
Abstract:
Non-volatile memory arrays can deploy pre-trained neural network models for edge inference. However, these systems are affected by device-level noise and retention issues. Here, we examine damage caused by these effects, introduce a mitigation strategy, and demonstrate its use in fabricated array of SONOS (Silicon-Oxide-Nitride-Oxide-Silicon) devices. On MNIST, fashion-MNIST, and CIFAR-10 tasks, o…
▽ More
Non-volatile memory arrays can deploy pre-trained neural network models for edge inference. However, these systems are affected by device-level noise and retention issues. Here, we examine damage caused by these effects, introduce a mitigation strategy, and demonstrate its use in fabricated array of SONOS (Silicon-Oxide-Nitride-Oxide-Silicon) devices. On MNIST, fashion-MNIST, and CIFAR-10 tasks, our approach increases resilience to synaptic noise and drift. We also show strong performance can be realized with ADCs of 5-8 bits precision.
△ Less
Submitted 2 April, 2020;
originally announced April 2020.
-
Unsupervised Competitive Hardware Learning Rule for Spintronic Clustering Architecture
Authors:
Alvaro Velasquez,
Christopher H. Bennett,
Naimul Hassan,
Wesley H. Brigner,
Otitoaleke G. Akinola,
Jean Anne C. Incorvia,
Matthew J. Marinella,
Joseph S. Friedman
Abstract:
We propose a hardware learning rule for unsupervised clustering within a novel spintronic computing architecture. The proposed approach leverages the three-terminal structure of domain-wall magnetic tunnel junction devices to establish a feedback loop that serves to train such devices when they are used as synapses in a neuromorphic computing architecture.
We propose a hardware learning rule for unsupervised clustering within a novel spintronic computing architecture. The proposed approach leverages the three-terminal structure of domain-wall magnetic tunnel junction devices to establish a feedback loop that serves to train such devices when they are used as synapses in a neuromorphic computing architecture.
△ Less
Submitted 24 March, 2020;
originally announced March 2020.
-
Evaluating complexity and resilience trade-offs in emerging memory inference machines
Authors:
Christopher H. Bennett,
Ryan Dellana,
T. Patrick Xiao,
Ben Feinberg,
Sapan Agarwal,
Suma Cardwell,
Matthew J. Marinella,
William Severa,
Brad Aimone
Abstract:
Neuromorphic-style inference only works well if limited hardware resources are maximized properly, e.g. accuracy continues to scale with parameters and complexity in the face of potential disturbance. In this work, we use realistic crossbar simulations to highlight that compact implementations of deep neural networks are unexpectedly susceptible to collapse from multiple system disturbances. Our w…
▽ More
Neuromorphic-style inference only works well if limited hardware resources are maximized properly, e.g. accuracy continues to scale with parameters and complexity in the face of potential disturbance. In this work, we use realistic crossbar simulations to highlight that compact implementations of deep neural networks are unexpectedly susceptible to collapse from multiple system disturbances. Our work proposes a middle path towards high performance and strong resilience utilizing the Mosaics framework, and specifically by re-using synaptic connections in a recurrent neural network implementation that possesses a natural form of noise-immunity.
△ Less
Submitted 25 February, 2020;
originally announced March 2020.
-
Hardness of Bounded Distance Decoding on Lattices in $\ell_p$ Norms
Authors:
Huck Bennett,
Chris Peikert
Abstract:
$ \newcommand{\Z}{\mathbb{Z}} \newcommand{\eps}{\varepsilon} \newcommand{\cc}[1]{\mathsf{#1}} \newcommand{\NP}{\cc{NP}} \newcommand{\problem}[1]{\mathrm{#1}} \newcommand{\BDD}{\problem{BDD}}
$Bounded Distance Decoding $\BDD_{p,α}$ is the problem of decoding a lattice when the target point is promised to be within an $α$ factor of the minimum distance of the lattice, in the $\ell_{p}…
▽ More
$ \newcommand{\Z}{\mathbb{Z}} \newcommand{\eps}{\varepsilon} \newcommand{\cc}[1]{\mathsf{#1}} \newcommand{\NP}{\cc{NP}} \newcommand{\problem}[1]{\mathrm{#1}} \newcommand{\BDD}{\problem{BDD}}
$Bounded Distance Decoding $\BDD_{p,α}$ is the problem of decoding a lattice when the target point is promised to be within an $α$ factor of the minimum distance of the lattice, in the $\ell_{p}$ norm. We prove that $\BDD_{p, α}$ is $\NP$-hard under randomized reductions where $α\to 1/2$ as $p \to \infty$ (and for $α=1/2$ when $p=\infty$), thereby showing the hardness of decoding for distances approaching the unique-decoding radius for large $p$. We also show fine-grained hardness for $\BDD_{p,α}$. For example, we prove that for all $p \in [1,\infty) \setminus 2\Z$ and constants $C > 1, \eps > 0$, there is no $2^{(1-\eps)n/C}$-time algorithm for $\BDD_{p,α}$ for some constant $α$ (which approaches $1/2$ as $p \to \infty$), assuming the randomized Strong Exponential Time Hypothesis (SETH). Moreover, essentially all of our results also hold (under analogous non-uniform assumptions) for $\BDD$ with preprocessing, in which unbounded precomputation can be applied to the lattice before the target is available.
Compared to prior work on the hardness of $\BDD_{p,α}$ by Liu, Lyubashevsky, and Micciancio (APPROX-RANDOM 2008), our results improve the values of $α$ for which the problem is known to be $\NP$-hard for all $p > p_1 \approx 4.2773$, and give the very first fine-grained hardness for $\BDD$ (in any norm). Our reductions rely on a special family of "locally dense" lattices in $\ell_{p}$ norms, which we construct by modifying the integer-lattice sparsification technique of Aggarwal and Stephens-Davidowitz (STOC 2018).
△ Less
Submitted 17 March, 2020;
originally announced March 2020.
-
Quantum cryptography: Public key distribution and coin tossing
Authors:
Charles H. Bennett,
Gilles Brassard
Abstract:
When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle gives rise to novel cryptographic phenomena unachievable with traditional transmission media, e.g. a communications channel on which it is impossible in principle to eavesdrop without a high probability of disturbing the transmission in such a way as to be detected. Such…
▽ More
When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle gives rise to novel cryptographic phenomena unachievable with traditional transmission media, e.g. a communications channel on which it is impossible in principle to eavesdrop without a high probability of disturbing the transmission in such a way as to be detected. Such a quantum channel can be used in conjunction with ordinary insecure classical channels to distribute random key information between two users with the assurance that it remains unknown to anyone else, even when the users share no secret information initially. We also present a protocol for coin-tossing by exchange of quantum messages, which is secure against traditional kinds of cheating, even by an opponent with unlimited computing power, but ironically can be subverted by use of a still subtler quantum phenomenon, the Einstein-Podolsky-Rosen paradox.
△ Less
Submitted 14 March, 2020;
originally announced March 2020.
-
Plasticity-Enhanced Domain-Wall MTJ Neural Networks for Energy-Efficient Online Learning
Authors:
Christopher H. Bennett,
T. Patrick Xiao,
Can Cui,
Naimul Hassan,
Otitoaleke G. Akinola,
Jean Anne C. Incorvia,
Alvaro Velasquez,
Joseph S. Friedman,
Matthew J. Marinella
Abstract:
Machine learning implements backpropagation via abundant training samples. We demonstrate a multi-stage learning system realized by a promising non-volatile memory device, the domain-wall magnetic tunnel junction (DW-MTJ). The system consists of unsupervised (clustering) as well as supervised sub-systems, and generalizes quickly (with few samples). We demonstrate interactions between physical prop…
▽ More
Machine learning implements backpropagation via abundant training samples. We demonstrate a multi-stage learning system realized by a promising non-volatile memory device, the domain-wall magnetic tunnel junction (DW-MTJ). The system consists of unsupervised (clustering) as well as supervised sub-systems, and generalizes quickly (with few samples). We demonstrate interactions between physical properties of this device and optimal implementation of neuroscience-inspired plasticity learning rules, and highlight performance on a suite of tasks. Our energy analysis confirms the value of the approach, as the learning budget stays below 20 $μJ$ even for large tasks used typically in machine learning.
△ Less
Submitted 4 March, 2020;
originally announced March 2020.
-
CMOS-Free Multilayer Perceptron Enabled by Four-Terminal MTJ Device
Authors:
Wesley H. Brigner,
Naimul Hassan,
Xuan Hu,
Christopher H. Bennett,
Felipe Garcia-Sanchez,
Matthew J. Marinella,
Jean Anne C. Incorvia,
Joseph S. Friedman
Abstract:
Neuromorphic computing promises revolutionary improvements over conventional systems for applications that process unstructured information. To fully realize this potential, neuromorphic systems should exploit the biomimetic behavior of emerging nanodevices. In particular, exceptional opportunities are provided by the non-volatility and analog capabilities of spintronic devices. While spintronic d…
▽ More
Neuromorphic computing promises revolutionary improvements over conventional systems for applications that process unstructured information. To fully realize this potential, neuromorphic systems should exploit the biomimetic behavior of emerging nanodevices. In particular, exceptional opportunities are provided by the non-volatility and analog capabilities of spintronic devices. While spintronic devices have previously been proposed that emulate neurons and synapses, complementary metal-oxide-semiconductor (CMOS) devices are required to implement multilayer spintronic perceptron crossbars. This work therefore proposes a new spintronic neuron that enables purely spintronic multilayer perceptrons, eliminating the need for CMOS circuitry and simplifying fabrication.
△ Less
Submitted 3 February, 2020;
originally announced February 2020.
-
The 1.28 GHz MeerKAT DEEP2 Image
Authors:
T. Mauch,
W. D. Cotton,
J. J. Condon,
A. M. Matthews,
T. D. Abbott,
R. M. Adam,
M. A. Aldera,
K. M. B. Asad,
E. F. Bauermeister,
T. G. H. Bennett,
H. Bester,
D. H. Botha,
L. R. S. Brederode,
Z. B. Brits,
S. J. Buchner,
J. P. Burger,
F. Camilo,
J. M. Chalmers,
T. Cheetham,
D. de Villiers,
M. S. de Villiers,
M. A. Dikgale-Mahlakoana,
L. J. du Toit,
S. W. P. Esterhuyse,
G. Fadana
, et al. (79 additional authors not shown)
Abstract:
We present the confusion-limited 1.28 GHz MeerKAT DEEP2 image covering one $\approx 68'$ FWHM primary beam area with $7.6''$ FWHM resolution and $0.55 \pm 0.01$ $μ$Jy/beam rms noise. Its J2000 center position $α=04^h 13^m 26.4^s$, $δ=-80^\circ 00' 00''$ was selected to minimize artifacts caused by bright sources. We introduce the new 64-element MeerKAT array and describe commissioning observations…
▽ More
We present the confusion-limited 1.28 GHz MeerKAT DEEP2 image covering one $\approx 68'$ FWHM primary beam area with $7.6''$ FWHM resolution and $0.55 \pm 0.01$ $μ$Jy/beam rms noise. Its J2000 center position $α=04^h 13^m 26.4^s$, $δ=-80^\circ 00' 00''$ was selected to minimize artifacts caused by bright sources. We introduce the new 64-element MeerKAT array and describe commissioning observations to measure the primary beam attenuation pattern, estimate telescope pointing errors, and pinpoint $(u,v)$ coordinate errors caused by offsets in frequency or time. We constructed a 1.4 GHz differential source count by combining a power-law count fit to the DEEP2 confusion $P(D)$ distribution from $0.25$ to $10$ $μ$Jy with counts of individual DEEP2 sources between $10$ $μ$Jy and $2.5$ mJy. Most sources fainter than $S \sim 100$ $μ$Jy are distant star-forming galaxies obeying the FIR/radio correlation, and sources stronger than $0.25$ $μ$Jy account for $\sim93\%$ of the radio background produced by star-forming galaxies. For the first time, the DEEP2 source count has reached the depth needed to reveal the majority of the star formation history of the universe. A pure luminosity evolution of the 1.4 GHz local luminosity function consistent with the Madau & Dickinson (2014) model for the evolution of star-forming galaxies based on UV and infrared data underpredicts our 1.4 GHz source count in the range $-5 \lesssim \log[S(\mathrm{Jy})] \lesssim -4$.
△ Less
Submitted 12 December, 2019;
originally announced December 2019.
-
Maximized Lateral Inhibition in Paired Magnetic Domain Wall Racetracks for Neuromorphic Computing
Authors:
C. Cui,
O. G. Akinola,
N. Hassan,
C. H. Bennett,
M. J. Marinella,
J. S. Friedman,
J. A. C. Incorvia
Abstract:
Lateral inhibition is an important functionality in neuromorphic computing, modeled after the biological neuron behavior that a firing neuron deactivates its neighbors belonging to the same layer and prevents them from firing. In most neuromorphic hardware platforms lateral inhibition is implemented by external circuitry, thereby decreasing the energy efficiency and increasing the area overhead of…
▽ More
Lateral inhibition is an important functionality in neuromorphic computing, modeled after the biological neuron behavior that a firing neuron deactivates its neighbors belonging to the same layer and prevents them from firing. In most neuromorphic hardware platforms lateral inhibition is implemented by external circuitry, thereby decreasing the energy efficiency and increasing the area overhead of such systems. Recently, the domain wall -- magnetic tunnel junction (DW-MTJ) artificial neuron is demonstrated in modeling to be inherently inhibitory. Without peripheral circuitry, lateral inhibition in DW-MTJ neurons results from magnetostatic interaction between neighboring neuron cells. However, the lateral inhibition mechanism in DW-MTJ neurons has not been studied thoroughly, leading to weak inhibition only in very closely-spaced devices. This work approaches these problems by modeling current- and field- driven DW motion in a pair of adjacent DW-MTJ neurons. We maximize the magnitude of lateral inhibition by tuning the magnetic interaction between the neurons. The results are explained by current-driven DW velocity characteristics in response to external magnetic field and quantified by an analytical model. Finally, the dependence of lateral inhibition strength on device parameters is investigated. This provides a guideline for the optimization of lateral inhibition implementation in DW-MTJ neurons. With strong lateral inhibition achieved, a path towards competitive learning algorithms such as the winner-take-all are made possible on such neuromorphic devices.
△ Less
Submitted 10 December, 2019;
originally announced December 2019.
-
Fine-grained hardness of CVP(P) -- Everything that we can prove (and nothing else)
Authors:
Divesh Aggarwal,
Huck Bennett,
Alexander Golovnev,
Noah Stephens-Davidowitz
Abstract:
We show a number of fine-grained hardness results for the Closest Vector Problem in the $\ell_p$ norm ($\mathrm{CVP}_p$), and its approximate and non-uniform variants. First, we show that $\mathrm{CVP}_p$ cannot be solved in $2^{(1-\varepsilon)n}$ time for all $p \notin 2\mathbb{Z}$ and $\varepsilon > 0$, assuming the Strong Exponential Time Hypothesis (SETH). Second, we extend this by showing tha…
▽ More
We show a number of fine-grained hardness results for the Closest Vector Problem in the $\ell_p$ norm ($\mathrm{CVP}_p$), and its approximate and non-uniform variants. First, we show that $\mathrm{CVP}_p$ cannot be solved in $2^{(1-\varepsilon)n}$ time for all $p \notin 2\mathbb{Z}$ and $\varepsilon > 0$, assuming the Strong Exponential Time Hypothesis (SETH). Second, we extend this by showing that there is no $2^{(1-\varepsilon)n}$-time algorithm for approximating $\mathrm{CVP}_p$ to within a constant factor $γ$ for such $p$ assuming a "gap" version of SETH, with an explicit relationship between $γ$, $p$, and the arity $k = k(\varepsilon)$ of the underlying hard CSP. Third, we show the same hardness result for (exact) $\mathrm{CVP}_p$ with preprocessing (assuming non-uniform SETH).
For exact "plain" $\mathrm{CVP}_p$, the same hardness result was shown in [Bennett, Golovnev, and Stephens-Davidowitz FOCS 2017] for all but finitely many $p \notin 2\mathbb{Z}$, where the set of exceptions depended on $\varepsilon$ and was not explicit. For the approximate and preprocessing problems, only very weak bounds were known prior to this work.
We also show that the restriction to $p \notin 2\mathbb{Z}$ is in some sense inherent. In particular, we show that no "natural" reduction can rule out even a $2^{3n/4}$-time algorithm for $\mathrm{CVP}_2$ under SETH. For this, we prove that the possible sets of closest lattice vectors to a target in the $\ell_2$ norm have quite rigid structure, which essentially prevents them from being as expressive as $3$-CNFs.
We prove these results using techniques from many different fields, including complex analysis, functional analysis, additive combinatorics, and discrete Fourier analysis. E.g., along the way, we give a new (and tighter) proof of Szemerédi's cube lemma for the boolean cube.
△ Less
Submitted 7 August, 2021; v1 submitted 6 November, 2019;
originally announced November 2019.
-
Shape-based Magnetic Domain Wall Drift for an Artificial Spintronic Leaky Integrate-and-Fire Neuron
Authors:
Wesley H. Brigner,
Naimul Hassan,
Lucian Jiang-Wei,
Xuan Hu,
Diptish Saha,
Christopher H. Bennett,
Matthew J. Marinella,
Jean Anne C. Incorvia,
Felipe Garcia-Sanchez,
Joseph S. Friedman
Abstract:
Spintronic devices based on domain wall (DW) motion through ferromagnetic nanowire tracks have received great interest as components of neuromorphic information processing systems. Previous proposals for spintronic artificial neurons required external stimuli to perform the leaking functionality, one of the three fundamental functions of a leaky integrate-and-fire (LIF) neuron. The use of this ext…
▽ More
Spintronic devices based on domain wall (DW) motion through ferromagnetic nanowire tracks have received great interest as components of neuromorphic information processing systems. Previous proposals for spintronic artificial neurons required external stimuli to perform the leaking functionality, one of the three fundamental functions of a leaky integrate-and-fire (LIF) neuron. The use of this external magnetic field or electrical current stimulus results in either a decrease in energy efficiency or an increase in fabrication complexity. In this work, we modify the shape of previously demonstrated three-terminal magnetic tunnel junction neurons to perform the leaking operation without any external stimuli. The trapezoidal structure causes shape-based DW drift, thus intrinsically providing the leaking functionality with no hardware cost. This LIF neuron therefore promises to advance the development of spintronic neural network crossbar arrays.
△ Less
Submitted 14 May, 2019;
originally announced May 2019.
-
Comment on 'The aestivation hypothesis for resolving Fermi's paradox'
Authors:
Charles H. Bennett,
Robin Hanson,
C. Jess Riedel
Abstract:
In their article [arXiv:1705.03394], 'That is not dead which can eternal lie: the aestivation hypothesis for resolving Fermi's paradox', Sandberg et al. try to explain the Fermi paradox (we see no aliens) by claiming that Landauer's principle implies that a civilization can in principle perform far more (${\sim} 10^{30}$ times more) irreversible logical operations (e.g., error-correcting bit erasu…
▽ More
In their article [arXiv:1705.03394], 'That is not dead which can eternal lie: the aestivation hypothesis for resolving Fermi's paradox', Sandberg et al. try to explain the Fermi paradox (we see no aliens) by claiming that Landauer's principle implies that a civilization can in principle perform far more (${\sim} 10^{30}$ times more) irreversible logical operations (e.g., error-correcting bit erasures) if it conserves its resources until the distant future when the cosmic background temperature is very low. So perhaps aliens are out there, but quietly waiting. Sandberg et al. implicitly assume, however, that computer-generated entropy can only be disposed of by transferring it to the cosmological background. In fact, while this assumption may apply in the distant future, our universe today contains vast reservoirs and other physical systems in non-maximal entropy states, and computer-generated entropy can be transferred to them at the adiabatic conversion rate of one bit of negentropy to erase one bit of error. This can be done at any time, and is not improved by waiting for a low cosmic background temperature. Thus aliens need not wait to be active. As Sandberg et al. do not provide a concrete model of the effect they assert, we construct one and show where their informal argument goes wrong.
△ Less
Submitted 18 February, 2019;
originally announced February 2019.
-
Revival of the magnetar PSR J1622-4950: observations with MeerKAT, Parkes, XMM-Newton, Swift, Chandra, and NuSTAR
Authors:
F. Camilo,
P. Scholz,
M. Serylak,
S. Buchner,
M. Merryfield,
V. M. Kaspi,
R. F. Archibald,
M. Bailes,
A. Jameson,
W. van Straten,
J. Sarkissian,
J. E. Reynolds,
S. Johnston,
G. Hobbs,
T. D. Abbott,
R. M. Adam,
G. B. Adams,
T. Alberts,
R. Andreas,
K. M. B. Asad,
D. E. Baker,
T. Baloyi,
E. F. Bauermeister,
T. Baxana,
T. G. H. Bennett
, et al. (183 additional authors not shown)
Abstract:
New radio (MeerKAT and Parkes) and X-ray (XMM-Newton, Swift, Chandra, and NuSTAR) observations of PSR J1622-4950 indicate that the magnetar, in a quiescent state since at least early 2015, reactivated between 2017 March 19 and April 5. The radio flux density, while variable, is approximately 100x larger than during its dormant state. The X-ray flux one month after reactivation was at least 800x la…
▽ More
New radio (MeerKAT and Parkes) and X-ray (XMM-Newton, Swift, Chandra, and NuSTAR) observations of PSR J1622-4950 indicate that the magnetar, in a quiescent state since at least early 2015, reactivated between 2017 March 19 and April 5. The radio flux density, while variable, is approximately 100x larger than during its dormant state. The X-ray flux one month after reactivation was at least 800x larger than during quiescence, and has been decaying exponentially on a 111+/-19 day timescale. This high-flux state, together with a radio-derived rotational ephemeris, enabled for the first time the detection of X-ray pulsations for this magnetar. At 5%, the 0.3-6 keV pulsed fraction is comparable to the smallest observed for magnetars. The overall pulsar geometry inferred from polarized radio emission appears to be broadly consistent with that determined 6-8 years earlier. However, rotating vector model fits suggest that we are now seeing radio emission from a different location in the magnetosphere than previously. This indicates a novel way in which radio emission from magnetars can differ from that of ordinary pulsars. The torque on the neutron star is varying rapidly and unsteadily, as is common for magnetars following outburst, having changed by a factor of 7 within six months of reactivation.
△ Less
Submitted 5 April, 2018;
originally announced April 2018.
-
Spatio-temporal Learning with Arrays of Analog Nanosynapses
Authors:
Christopher H. Bennett,
Damien Querlioz,
Jacques-Olivier Klein
Abstract:
Emerging nanodevices such as resistive memories are being considered for hardware realizations of a variety of artificial neural networks (ANNs), including highly promising online variants of the learning approaches known as reservoir computing (RC) and the extreme learning machine (ELM). We propose an RC/ELM inspired learning system built with nanosynapses that performs both on-chip projection an…
▽ More
Emerging nanodevices such as resistive memories are being considered for hardware realizations of a variety of artificial neural networks (ANNs), including highly promising online variants of the learning approaches known as reservoir computing (RC) and the extreme learning machine (ELM). We propose an RC/ELM inspired learning system built with nanosynapses that performs both on-chip projection and regression operations. To address time-dynamic tasks, the hidden neurons of our system perform spatio-temporal integration and can be further enhanced with variable sampling or multiple activation windows. We detail the system and show its use in conjunction with a highly analog nanosynapse device on a standard task with intrinsic timing dynamics- the TI-46 battery of spoken digits. The system achieves nearly perfect (99%) accuracy at sufficient hidden layer size, which compares favorably with software results. In addition, the model is extended to a larger dataset, the MNIST database of handwritten digits. By translating the database into the time domain and using variable integration windows, up to 95% classification accuracy is achieved. In addition to an intrinsically low-power programming style, the proposed architecture learns very quickly and can easily be converted into a spiking system with negligible loss in performance- all features that confer significant energy efficiency.
△ Less
Submitted 12 September, 2017;
originally announced September 2017.
-
GlnK facilitates the dynamic regulation of bacterial nitrogen assimilation
Authors:
Adam Gosztolai,
Jörg Schumacher,
Volker Behrends,
Jacob G Bundy,
Franziska Heydenreich,
Mark H Bennett,
Martin Buck,
Mauricio Barahona
Abstract:
Ammonium assimilation in E. coli is regulated by two paralogous proteins (GlnB and GlnK), which orchestrate interactions with regulators of gene expression, transport proteins and metabolic pathways. Yet how they conjointly modulate the activity of glutamine synthetase (GS), the key enzyme for nitrogen assimilation, is poorly understood. We combine experiments and theory to study the dynamic roles…
▽ More
Ammonium assimilation in E. coli is regulated by two paralogous proteins (GlnB and GlnK), which orchestrate interactions with regulators of gene expression, transport proteins and metabolic pathways. Yet how they conjointly modulate the activity of glutamine synthetase (GS), the key enzyme for nitrogen assimilation, is poorly understood. We combine experiments and theory to study the dynamic roles of GlnB and GlnK during nitrogen starvation and upshift. We measure time-resolved in vivo concentrations of metabolites, total and post-translationally modified proteins, and develop a concise biochemical model of GlnB and GlnK that incorporates competition for active and allosteric sites, as well as functional sequestration of GlnK. The model predicts the responses of GS, GlnB and GlnK under time-varying external ammonium level in the wild type and two genetic knock-outs. Our results show that GlnK is tightly regulated under nitrogen-rich conditions, yet it is expressed during ammonium run-out and starvation. This suggests a role for GlnK as a buffer of nitrogen shock after starvation, and provides a further functional link between nitrogen and carbon metabolisms.
△ Less
Submitted 19 April, 2017;
originally announced April 2017.
-
On the Quantitative Hardness of CVP
Authors:
Huck Bennett,
Alexander Golovnev,
Noah Stephens-Davidowitz
Abstract:
$ \newcommand{\eps}{\varepsilon} \newcommand{\problem}[1]{\ensuremath{\mathrm{#1}} } \newcommand{\CVP}{\problem{CVP}} \newcommand{\SVP}{\problem{SVP}} \newcommand{\CVPP}{\problem{CVPP}} \newcommand{\ensuremath}[1]{#1} $For odd integers $p \geq 1$ (and $p = \infty$), we show that the Closest Vector Problem in the $\ell_p$ norm ($\CVP_p$) over rank $n$ lattices cannot be solved in $2^{(1-\eps) n}…
▽ More
$ \newcommand{\eps}{\varepsilon} \newcommand{\problem}[1]{\ensuremath{\mathrm{#1}} } \newcommand{\CVP}{\problem{CVP}} \newcommand{\SVP}{\problem{SVP}} \newcommand{\CVPP}{\problem{CVPP}} \newcommand{\ensuremath}[1]{#1} $For odd integers $p \geq 1$ (and $p = \infty$), we show that the Closest Vector Problem in the $\ell_p$ norm ($\CVP_p$) over rank $n$ lattices cannot be solved in $2^{(1-\eps) n}$ time for any constant $\eps > 0$ unless the Strong Exponential Time Hypothesis (SETH) fails. We then extend this result to "almost all" values of $p \geq 1$, not including the even integers. This comes tantalizingly close to settling the quantitative time complexity of the important special case of $\CVP_2$ (i.e., $\CVP$ in the Euclidean norm), for which a $2^{n +o(n)}$-time algorithm is known. In particular, our result applies for any $p = p(n) \neq 2$ that approaches $2$ as $n \to \infty$.
We also show a similar SETH-hardness result for $\SVP_\infty$; hardness of approximating $\CVP_p$ to within some constant factor under the so-called Gap-ETH assumption; and other quantitative hardness results for $\CVP_p$ and $\CVPP_p$ for any $1 \leq p < \infty$ under different assumptions.
△ Less
Submitted 5 October, 2017; v1 submitted 12 April, 2017;
originally announced April 2017.
-
Exploiting the Short-term to Long-term Plasticity Transition in Memristive Nanodevice Learning Architectures
Authors:
Christopher H. Bennett,
Selina La Barbera,
Adrien F. Vincent,
Fabien Alibart,
Damien Querlioz
Abstract:
Memristive nanodevices offer new frontiers for computing systems that unite arithmetic and memory operations on-chip. Here, we explore the integration of electrochemical metallization cell (ECM) nanodevices with tunable filamentary switching in nanoscale learning systems. Such devices offer a natural transition between short-term plasticity (STP) and long-term plasticity (LTP). In this work, we sh…
▽ More
Memristive nanodevices offer new frontiers for computing systems that unite arithmetic and memory operations on-chip. Here, we explore the integration of electrochemical metallization cell (ECM) nanodevices with tunable filamentary switching in nanoscale learning systems. Such devices offer a natural transition between short-term plasticity (STP) and long-term plasticity (LTP). In this work, we show that this property can be exploited to efficiently solve noisy classification tasks. A single crossbar learning scheme is first introduced and evaluated. Perfect classification is possible only for simple input patterns, within critical timing parameters, and when device variability is weak. To overcome these limitations, a dual-crossbar learning system partly inspired by the extreme learning machine (ELM) approach is then introduced. This approach outperforms a conventional ELM-inspired system when the first layer is imprinted before training and testing, and especially so when variability in device timing evolution is considered: variability is therefore transformed from an issue to a feature. In attempting to classify the MNIST database under the same conditions, conventional ELM obtains 84% classification, the imprinted, uniform device system obtains 88% classification, and the imprinted, variable device system reaches 92% classification. We discuss benefits and drawbacks of both systems in terms of energy, complexity, area imprint, and speed. All these results highlight that tuning and exploiting intrinsic device timing parameters may be of central interest to future bio-inspired approximate computing systems.
△ Less
Submitted 27 June, 2016;
originally announced June 2016.
-
On the Lattice Distortion Problem
Authors:
Huck Bennett,
Daniel Dadush,
Noah Stephens-Davidowitz
Abstract:
We introduce and study the \emph{Lattice Distortion Problem} (LDP). LDP asks how "similar" two lattices are. I.e., what is the minimal distortion of a linear bijection between the two lattices? LDP generalizes the Lattice Isomorphism Problem (the lattice analogue of Graph Isomorphism), which simply asks whether the minimal distortion is one.
As our first contribution, we show that the distortion…
▽ More
We introduce and study the \emph{Lattice Distortion Problem} (LDP). LDP asks how "similar" two lattices are. I.e., what is the minimal distortion of a linear bijection between the two lattices? LDP generalizes the Lattice Isomorphism Problem (the lattice analogue of Graph Isomorphism), which simply asks whether the minimal distortion is one.
As our first contribution, we show that the distortion between any two lattices is approximated up to a $n^{O(\log n)}$ factor by a simple function of their successive minima. Our methods are constructive, allowing us to compute low-distortion map**s that are within a $2^{O(n \log \log n/\log n)}$ factor of optimal in polynomial time and within a $n^{O(\log n)}$ factor of optimal in singly exponential time. Our algorithms rely on a notion of basis reduction introduced by Seysen (Combinatorica 1993), which we show is intimately related to lattice distortion. Lastly, we show that LDP is NP-hard to approximate to within any constant factor (under randomized reductions), by a reduction from the Shortest Vector Problem.
△ Less
Submitted 30 October, 2016; v1 submitted 11 May, 2016;
originally announced May 2016.
-
Electric-field Controlled Magnetization Switching in Co/Pt thin-Film Ferromagnets
Authors:
A. Siddique,
S. Gu,
R. Witte,
M. Ghahremani,
C. A. Nwokoye,
A. Aslani,
R. Kruk,
V. Provenzano,
L. H. Bennett,
E. Della Torre
Abstract:
A study of dynamic and reversible voltage controlled magnetization switching in ferromagnetic Co/Pt thin film with perpendicular magnetic anisotropy at room temperature is presented. The change in the magnetic properties of the system is observed in a relatively thick film of 15 nm. A surface charge is induced by the formation of electrochemical double layer between the metallic thin film and non-…
▽ More
A study of dynamic and reversible voltage controlled magnetization switching in ferromagnetic Co/Pt thin film with perpendicular magnetic anisotropy at room temperature is presented. The change in the magnetic properties of the system is observed in a relatively thick film of 15 nm. A surface charge is induced by the formation of electrochemical double layer between the metallic thin film and non-aqueous lithium LiClO4 electrolyte to manipulate the magnetism. The change in the magnetic properties occurred by the application of an external electric field. As the negative voltage was increased, the coercivity and the switching magnetic field decreased thus activating magnetization switching. The results are envisaged to lead to faster and ultra-low power magnetization switching as compared to spin-transfer torque (STT) switching in spintronic devices.
△ Less
Submitted 11 November, 2015;
originally announced November 2015.
-
Optimization of Magnetic Refrigerators by Tuning the Heat Transfer Medium and Operating Conditions
Authors:
Mohammadreza Ghahremani,
Amir Aslani,
Lawrence H. Bennett,
Edward Della Torre
Abstract:
A new experimental test bed has been designed, built, and tested to evaluate the effect of the systems parameters on a reciprocating Active Magnetic Regenerator (AMR) near room temperature. Bulk gadolinium was used as the refrigerant, silicon oil as the heat transfer medium, and a magnetic field of 1.3 T was cycled. This study focuses on the methodology of single stage AMR operation conditions to…
▽ More
A new experimental test bed has been designed, built, and tested to evaluate the effect of the systems parameters on a reciprocating Active Magnetic Regenerator (AMR) near room temperature. Bulk gadolinium was used as the refrigerant, silicon oil as the heat transfer medium, and a magnetic field of 1.3 T was cycled. This study focuses on the methodology of single stage AMR operation conditions to get a higher temperature span near room temperature. Herein, the main objective is not to report the absolute maximum attainable temperature span seen in an AMR system, but rather to find the systems optimal operating conditions to reach that maximum span. The results of this research show that there is a optimal operating frequency, heat transfer fluid flow rate, flow duration, and displaced volume ratio in an AMR system. By optimizing these parameters the refrigeration performance increased by 24%. It is expected that such optimization will permit the design of a more efficient magnetic refrigeration system.
△ Less
Submitted 7 November, 2015;
originally announced November 2015.
-
Comment on 3D Penrose Tiling of the Icosahedral Quasicrystalline Phase
Authors:
Lydon Swartzendruber,
Lawrence H. Bennett
Abstract:
A recent arXiv contribution makes the case that the quasicrystallinephase is due to twinning, albeit with a different twinning scheme than thatpresented by Pauling. It appears to us that this approach, though novel, hasno validity.
A recent arXiv contribution makes the case that the quasicrystallinephase is due to twinning, albeit with a different twinning scheme than thatpresented by Pauling. It appears to us that this approach, though novel, hasno validity.
△ Less
Submitted 15 October, 2015;
originally announced October 2015.
-
Quantum Cryptography II: How to re-use a one-time pad safely even if P=NP
Authors:
Charles H. Bennett,
Gilles Brassard,
Seth Breidbart
Abstract:
When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle gives rise to novel cryptographic phenomena unachievable with traditional transmission media, e.g. a communications channel on which it is impossible in principle to eavesdrop without a high probability of being detected. With such a channel, a one-time pad can safely be…
▽ More
When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle gives rise to novel cryptographic phenomena unachievable with traditional transmission media, e.g. a communications channel on which it is impossible in principle to eavesdrop without a high probability of being detected. With such a channel, a one-time pad can safely be reused many times as long as no eavesdrop is detected, and, planning ahead, part of the capacity of these uncompromised transmissions can be used to send fresh random bits with which to replace the one-time pad when an eavesdrop finally is detected. Unlike other schemes for stretching a one-time pad, this scheme does not depend on complexity-theoretic assumptions such as the difficulty of factoring.
△ Less
Submitted 1 July, 2014;
originally announced July 2014.
-
Affine Maps Between CAT(0) Spaces
Authors:
Hanna Bennett,
Christopher Mooney,
Ralf Spatzier
Abstract:
We study affine maps between CAT(0) spaces with geometric actions, and show that they essentially split as products of dilations and linear maps (on the Euclidean factor). This extends known results from the Riemannian case. Furthermore, we prove a splitting lemma for the Tits boundary of a CAT(0) space with geometric action, a variant of a splitting lemma for geodesically complete CAT(1) spaces b…
▽ More
We study affine maps between CAT(0) spaces with geometric actions, and show that they essentially split as products of dilations and linear maps (on the Euclidean factor). This extends known results from the Riemannian case. Furthermore, we prove a splitting lemma for the Tits boundary of a CAT(0) space with geometric action, a variant of a splitting lemma for geodesically complete CAT(1) spaces by Lytchak.
△ Less
Submitted 7 October, 2014; v1 submitted 4 September, 2013;
originally announced September 2013.
-
On the security of key distribution based on Johnson-Nyquist noise
Authors:
Charles H. Bennett,
C. Jess Riedel
Abstract:
We point out that arguments for the security of Kish's noise-based cryptographic protocol have relied on an unphysical no-wave limit, which if taken seriously would prevent any correlation from develo** between the users. We introduce a noiseless version of the protocol, also having illusory security in the no-wave limit, to show that noise and thermodynamics play no essential role. Then we prov…
▽ More
We point out that arguments for the security of Kish's noise-based cryptographic protocol have relied on an unphysical no-wave limit, which if taken seriously would prevent any correlation from develo** between the users. We introduce a noiseless version of the protocol, also having illusory security in the no-wave limit, to show that noise and thermodynamics play no essential role. Then we prove generally that classical electromagnetic protocols cannot establish a secret key between two parties separated by a spacetime region perfectly monitored by an eavesdropper. We note that the original protocol of Kish is vulnerable to passive time-correlation attacks even in the quasi-static limit. Finally we show that protocols of this type can be secure in practice against an eavesdropper with noisy monitoring equipment. In this case the security is a straightforward consequence of Maurer and Wolf's discovery that key can be distilled by public discussion from correlated random variables in a wide range of situations where the eavesdropper's noise is at least partly independent from the users' noise.
△ Less
Submitted 29 March, 2013;
originally announced March 2013.
-
Information Distance
Authors:
Charles H. Bennett,
Peter Gacs,
Ming Li,
Paul M. B. Vitanyi,
Wojciech H. Zurek
Abstract:
While Kolmogorov complexity is the accepted absolute measure of information content in an individual finite object, a similarly absolute notion is needed for the information distance between two individual objects, for example, two pictures. We give several natural definitions of a universal information metric, based on length of shortest programs for either ordinary computations or reversible (di…
▽ More
While Kolmogorov complexity is the accepted absolute measure of information content in an individual finite object, a similarly absolute notion is needed for the information distance between two individual objects, for example, two pictures. We give several natural definitions of a universal information metric, based on length of shortest programs for either ordinary computations or reversible (dissipationless) computations. It turns out that these definitions are equivalent up to an additive logarithmic term. We show that the information distance is a universal cognitive similarity distance. We investigate the maximal correlation of the shortest programs involved, the maximal uncorrelation of programs (a generalization of the Slepian-Wolf theorem of classical information theory), and the density properties of the discrete metric spaces induced by the information distances. A related distance measures the amount of nonreversibility of a computation. Using the physical theory of reversible computation, we give an appropriate (universal, anti-symmetric, and transitive) measure of the thermodynamic work required to transform one object in another object by the most efficient process. Information distance between individual objects is needed in pattern recognition where one wants to express effective notions of "pattern similarity" or "cognitive similarity" between individual objects and in thermodynamics of computation where one wants to analyse the energy dissipation of a computation from a particular input to a particular output.
△ Less
Submitted 17 June, 2010;
originally announced June 2010.
-
Volume distortion in groups
Authors:
Hanna Bennett
Abstract:
Given a space $Y$ in $X$, a cycle in $Y$ may be filled with a chain in two ways: either by restricting the chain to $Y$ or by allowing it to be anywhere in $X$. When the pair $(G,H)$ acts on $(X, Y)$, we define the $k$-volume distortion function of $H$ in $G$ to measure the large-scale difference between the volumes of such fillings. We show that these functions are quasi-isometry invariants, an…
▽ More
Given a space $Y$ in $X$, a cycle in $Y$ may be filled with a chain in two ways: either by restricting the chain to $Y$ or by allowing it to be anywhere in $X$. When the pair $(G,H)$ acts on $(X, Y)$, we define the $k$-volume distortion function of $H$ in $G$ to measure the large-scale difference between the volumes of such fillings. We show that these functions are quasi-isometry invariants, and thus independent of the choice of spaces, and provide several bounds in terms of other group properties, such as Dehn functions. We also compute the volume distortion in a number of examples, including characterizing the $k$-volume distortion of $\Z^k$ in $\Z^k \rtimes_M \Z$, where $M$ is a diagonalizable matrix. We use this to prove a conjecture of Gersten.
△ Less
Submitted 4 February, 2010;
originally announced February 2010.
-
Quantum Reverse Shannon Theorem
Authors:
Charles H. Bennett,
Igor Devetak,
Aram W. Harrow,
Peter W. Shor,
Andreas Winter
Abstract:
Dual to the usual noisy channel coding problem, where a noisy (classical or quantum) channel is used to simulate a noiseless one, reverse Shannon theorems concern the use of noiseless channels to simulate noisy ones, and more generally the use of one noisy channel to simulate another. For channels of nonzero capacity, this simulation is always possible, but for it to be efficient, auxiliary resour…
▽ More
Dual to the usual noisy channel coding problem, where a noisy (classical or quantum) channel is used to simulate a noiseless one, reverse Shannon theorems concern the use of noiseless channels to simulate noisy ones, and more generally the use of one noisy channel to simulate another. For channels of nonzero capacity, this simulation is always possible, but for it to be efficient, auxiliary resources of the proper kind and amount are generally required. In the classical case, shared randomness between sender and receiver is a sufficient auxiliary resource, regardless of the nature of the source, but in the quantum case the requisite auxiliary resources for efficient simulation depend on both the channel being simulated, and the source from which the channel inputs are coming. For tensor power sources (the quantum generalization of classical IID sources), entanglement in the form of standard ebits (maximally entangled pairs of qubits) is sufficient, but for general sources, which may be arbitrarily correlated or entangled across channel inputs, additional resources, such as entanglement-embezzling states or backward communication, are generally needed. Combining existing and new results, we establish the amounts of communication and auxiliary resources needed in both the classical and quantum cases, the tradeoffs among them, and the loss of simulation efficiency when auxiliary resources are absent or insufficient. In particular we find a new single-letter expression for the excess forward communication cost of coherent feedback simulations of quantum channels (i.e. simulations in which the sender retains what would escape into the environment in an ordinary simulation), on non-tensor-power sources in the presence of unlimited ebits but no other auxiliary resource. Our results on tensor power sources establish a strong converse to the entanglement-assisted capacity theorem.
△ Less
Submitted 4 March, 2014; v1 submitted 30 December, 2009;
originally announced December 2009.
-
A Note on Monotonically Metacompact Spaces
Authors:
Harold R. Bennett,
Klaas Pieter Hart,
David J. Lutzer
Abstract:
We show that any metacompact Moore space is monotonically metacompact and use that result to characterize monotone metacompactness in certain generalized ordered (GO)spaces. We show, for example, that a generalized ordered space with a sigma-closed-discrete dense subset is metrizable if and only if it is monotonically (countably) metacompact, that a monotonically (countably) metacompact GO-space…
▽ More
We show that any metacompact Moore space is monotonically metacompact and use that result to characterize monotone metacompactness in certain generalized ordered (GO)spaces. We show, for example, that a generalized ordered space with a sigma-closed-discrete dense subset is metrizable if and only if it is monotonically (countably) metacompact, that a monotonically (countably) metacompact GO-space is hereditarily paracompact, and that a locally countably compact GO-space is metrizable if and only if it is monotonically (countably) metacompact. We give an example of a non-metrizable LOTS that is monotonically metacompact, thereby answering a question posed by S. G. Popvassilev. We also give consistent examples showing that if there is a Souslin line, then there is one Souslin line that is monotonically countable metacompact, and another Souslin line that is not monotonically countably metacompact.
△ Less
Submitted 21 October, 2009;
originally announced October 2009.
-
Can closed timelike curves or nonlinear quantum mechanics improve quantum state discrimination or help solve hard problems?
Authors:
Charles H. Bennett,
Debbie Leung,
Graeme Smith,
John A. Smolin
Abstract:
We study the power of closed timelike curves (CTCs) and other nonlinear extensions of quantum mechanics for distinguishing nonorthogonal states and speeding up hard computations. If a CTC-assisted computer is presented with a labeled mixture of states to be distinguished--the most natural formulation--we show that the CTC is of no use. The apparent contradiction with recent claims that CTC-assis…
▽ More
We study the power of closed timelike curves (CTCs) and other nonlinear extensions of quantum mechanics for distinguishing nonorthogonal states and speeding up hard computations. If a CTC-assisted computer is presented with a labeled mixture of states to be distinguished--the most natural formulation--we show that the CTC is of no use. The apparent contradiction with recent claims that CTC-assisted computers can perfectly distinguish nonorthogonal states is resolved by noting that CTC-assisted evolution is nonlinear, so the output of such a computer on a mixture of inputs is not a convex combination of its output on the mixture's pure components. Similarly, it is not clear that CTC assistance or nonlinear evolution help solve hard problems if computation is defined as we recommend, as correctly evaluating a function on a labeled mixture of orthogonal inputs.
△ Less
Submitted 15 October, 2009; v1 submitted 20 August, 2009;
originally announced August 2009.
-
Postulates for measures of genuine multipartite correlations
Authors:
Charles H. Bennett,
Andrzej Grudka,
Michal Horodecki,
Pawel Horodecki,
Ryszard Horodecki
Abstract:
A lot of research has been done on multipartite correlations. However, it seems strange that there is no definition of so called genuine multipartite correlations. In this paper we propose three reasonable postulates which each measure or indicator of genuine multipartite correlations (or genuine multipartite entanglement) should satisfy. We also introduce degree of correlations which gives part…
▽ More
A lot of research has been done on multipartite correlations. However, it seems strange that there is no definition of so called genuine multipartite correlations. In this paper we propose three reasonable postulates which each measure or indicator of genuine multipartite correlations (or genuine multipartite entanglement) should satisfy. We also introduce degree of correlations which gives partial characterization of multipartite correlations. Then, we show that covariance does not satisfy two postulates and hence, it cannot be used as an indicator of genuine multipartite correlations. Finally, we propose candidate for a measure of genuine multipartite correlations based on the work that can be drawn from local bath by means of a multipartite state.
△ Less
Submitted 16 January, 2010; v1 submitted 20 May, 2008;
originally announced May 2008.