-
Mechanisms of mirror energy difference for states exhibiting Thomas-Ehrman shift: Gamow shell model case studies of $^{18}$Ne/$^{18}$O and $^{19}$Na/$^{19}$O
Authors:
J. G. Li,
K. H. Li,
N. Michel,
H. H. Li,
W. Zuo
Abstract:
The mirror energy difference (MED) of the mirror state, especially for states bearing the Thomas-Erhman shift, serves as a sensitive probe of isospin symmetry breaking. We employ the Gamow shell model, which includes the inter-nucleon correlation and continuum coupling, to investigate the MED for $sd$-shell nuclei by taking the $^{18}$Ne/$^{18}$O and $^{19}$Na/$^{19}$O as examples. Our GSM provide…
▽ More
The mirror energy difference (MED) of the mirror state, especially for states bearing the Thomas-Erhman shift, serves as a sensitive probe of isospin symmetry breaking. We employ the Gamow shell model, which includes the inter-nucleon correlation and continuum coupling, to investigate the MED for $sd$-shell nuclei by taking the $^{18}$Ne/$^{18}$O and $^{19}$Na/$^{19}$O as examples. Our GSM provides good descriptions for the excitation energies and MEDs for the $^{18}$Ne/$^{18}$O and $^{19}$Na/$^{19}$O. Moreover, our calculations also reveal that the large MED of the mirror states is caused by the significant occupation of the weakly bound or unbound $s_{1/2}$ waves, giving the radial density distribution of the state in the proton-rich nucleus more extended than that of mirror states in deeply-bound neutron-rich nuclei. Furthermore, our GSM calculation shows that the contribution of Coulomb is different for the low-lying states in proton-rich nuclei, which significantly contributes to MEDs of mirror states. Moreover, the contributions of the nucleon-nucleon interaction are different for the mirror state, especially for the state of proton-rich nuclei bearing the Thomas-Erhman shift, which also contributes to the significant isospin symmetry breaking with large MED.
△ Less
Submitted 30 June, 2024;
originally announced July 2024.
-
High-dimensional entanglement witnessed by correlations in arbitrary bases
Authors:
Nicky Kai Hong Li,
Marcus Huber,
Nicolai Friis
Abstract:
Certifying entanglement is an important step in the development of many quantum technologies, especially for higher-dimensional systems, where entanglement promises increased capabilities for quantum communication and computation. A key feature distinguishing entanglement from classical correlations is the occurrence of correlations for complementary measurement bases. In particular, mutually unbi…
▽ More
Certifying entanglement is an important step in the development of many quantum technologies, especially for higher-dimensional systems, where entanglement promises increased capabilities for quantum communication and computation. A key feature distinguishing entanglement from classical correlations is the occurrence of correlations for complementary measurement bases. In particular, mutually unbiased bases (MUBs) are a paradigmatic example that is well-understood and routinely employed for entanglement certification. However, implementing unbiased measurements exactly is challenging and not generically possible for all physical platforms. Here, we extend the entanglement-certification toolbox from correlations in MUBs to arbitrary bases, even without requiring aligned reference frames. This represents a practically significant simplification that paves the way for the efficient characterization of high-dimensional entanglement in a wide range of physical systems.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Tachis: Higher-Order Separation Logic with Credits for Expected Costs
Authors:
Philipp G. Haselwarter,
Kwing Hei Li,
Markus de Medeiros,
Simon Oddershede Gregersen,
Alejandro Aguirre,
Joseph Tassarotti,
Lars Birkedal
Abstract:
We present Tachis, a higher-order separation logic to reason about the expected cost of probabilistic programs. Inspired by the uses of time credits for reasoning about the running time of deterministic programs, we introduce a novel notion of probabilistic cost credit. Probabilistic cost credits are a separation logic resource that can be used to pay for the cost of operations in programs, and th…
▽ More
We present Tachis, a higher-order separation logic to reason about the expected cost of probabilistic programs. Inspired by the uses of time credits for reasoning about the running time of deterministic programs, we introduce a novel notion of probabilistic cost credit. Probabilistic cost credits are a separation logic resource that can be used to pay for the cost of operations in programs, and that can be distributed across all possible branches of sampling instructions according to their weight, thus enabling us to reason about expected cost. The representation of cost credits as separation logic resources gives Tachis a great deal of flexibility and expressivity. In particular, it permits reasoning about amortized expected cost by storing excess credits as potential into data structures to pay for future operations. Tachis further supports a range of cost models, including running time and entropy usage. We showcase the versatility of this approach by applying our techniques to prove upper bounds on the expected cost of a variety of probabilistic algorithms and data structures, including randomized quicksort, hash tables, and meldable heaps.
All of our results have been mechanized using Coq, Iris, and the Coquelicot real analysis library.
△ Less
Submitted 30 May, 2024;
originally announced May 2024.
-
Error Credits: Resourceful Reasoning about Error Bounds for Higher-Order Probabilistic Programs
Authors:
Alejandro Aguirre,
Philipp G. Haselwarter,
Markus de Medeiros,
Kwing Hei Li,
Simon Oddershede Gregersen,
Joseph Tassarotti,
Lars Birkedal
Abstract:
Probabilistic programs often trade accuracy for efficiency, and are thus only approximately correct. It is important to obtain precise error bounds for these approximations, but existing approaches rely on simplifications that make the error bounds excesively coarse, or only apply to first-order programs. In this paper we present Eris, a higher-order separation logic for probabilistic programs wri…
▽ More
Probabilistic programs often trade accuracy for efficiency, and are thus only approximately correct. It is important to obtain precise error bounds for these approximations, but existing approaches rely on simplifications that make the error bounds excesively coarse, or only apply to first-order programs. In this paper we present Eris, a higher-order separation logic for probabilistic programs written in an expressive higher-order language.
Our key novelty is the introduction of error credits, a separation logic resource that tracks the error bound of a program. By representing error bounds as a resource, we recover the benefits of separation logic, including compositionality, modularity, and dependency between errors and program terms, allowing for more precise specifications. Moreover, we enable novel reasoning principles such as expectation-preserving error composition, amortized error reasoning, and proving almost-sure termination by induction on the error.
We illustrate the advantages of our approach by proving amortized error bounds on a range of examples, including collision probabilities in hash functions, which allows us to write more modular specifications for data structures that use them as clients. We also use our logic to prove correctness and almost-sure termination of rejection sampling algorithms. All of our results have been mechanized in the Coq proof assistant using the Iris separation logic framework and the Coquelicot real analysis library.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
Identifying families of multipartite states with non-trivial local entanglement transformations
Authors:
Nicky Kai Hong Li,
Cornelia Spee,
Martin Hebenstreit,
Julio I. de Vicente,
Barbara Kraus
Abstract:
The study of state transformations by spatially separated parties with local operations assisted by classical communication (LOCC) plays a crucial role in entanglement theory and its applications in quantum information processing. Transformations of this type among pure bipartite states were characterized long ago and have a revealing theoretical structure. However, it turns out that generic fully…
▽ More
The study of state transformations by spatially separated parties with local operations assisted by classical communication (LOCC) plays a crucial role in entanglement theory and its applications in quantum information processing. Transformations of this type among pure bipartite states were characterized long ago and have a revealing theoretical structure. However, it turns out that generic fully entangled pure multipartite states cannot be obtained from nor transformed to any inequivalent fully entangled state under LOCC. States with this property are referred to as isolated. Nevertheless, the above result does not forbid the existence of particular SLOCC classes that are free of isolation, and therefore, display a rich structure regarding LOCC convertibility. In fact, it is known that the celebrated $n$-qubit GHZ and W states give particular examples of such classes and in this work, we investigate this question in general. One of our main results is to show that the SLOCC class of the 3-qutrit totally antisymmetric state is isolation-free as well. Actually, all states in this class can be converted to inequivalent states by LOCC protocols with just one round of classical communication (as in the GHZ and W cases). Thus, we consider next whether there are other classes with this property and we find a large set of negative answers. Indeed, we prove weak isolation (i.e., states that cannot be obtained with finite-round LOCC nor transformed by one-round LOCC) for very general classes, including all SLOCC families with compact stabilizers and many with non-compact stabilizers, such as the classes corresponding to the $n$-qunit totally antisymmetric states for $n\geq4$. Finally, given the pleasant feature found in the family corresponding to the 3-qutrit totally antisymmetric state, we explore in more detail the structure induced by LOCC and the entanglement properties within this class.
△ Less
Submitted 22 February, 2024; v1 submitted 6 February, 2023;
originally announced February 2023.
-
Formalizing May's Theorem
Authors:
Kwing Hei Li
Abstract:
This report presents a formalization of May's theorem in the proof assistant Coq. It describes how the theorem statement is first translated into Coq definitions, and how it is subsequently proved. Various aspects of the proof and related work are discussed. To the best of the author's knowledge, this project is the first documented attempt in mechanizing May's Theorem.
This report presents a formalization of May's theorem in the proof assistant Coq. It describes how the theorem statement is first translated into Coq definitions, and how it is subsequently proved. Various aspects of the proof and related work are discussed. To the best of the author's knowledge, this project is the first documented attempt in mechanizing May's Theorem.
△ Less
Submitted 11 October, 2022;
originally announced October 2022.
-
Secure Aggregation for Federated Learning in Flower
Authors:
Kwing Hei Li,
Pedro Porto Buarque de Gusmão,
Daniel J. Beutel,
Nicholas D. Lane
Abstract:
Federated Learning (FL) allows parties to learn a shared prediction model by delegating the training computation to clients and aggregating all the separately trained models on the server. To prevent private information being inferred from local models, Secure Aggregation (SA) protocols are used to ensure that the server is unable to inspect individual trained models as it aggregates them. However…
▽ More
Federated Learning (FL) allows parties to learn a shared prediction model by delegating the training computation to clients and aggregating all the separately trained models on the server. To prevent private information being inferred from local models, Secure Aggregation (SA) protocols are used to ensure that the server is unable to inspect individual trained models as it aggregates them. However, current implementations of SA in FL frameworks have limitations, including vulnerability to client dropouts or configuration difficulties.
In this paper, we present Salvia, an implementation of SA for Python users in the Flower FL framework. Based on the SecAgg(+) protocols for a semi-honest threat model, Salvia is robust against client dropouts and exposes a flexible and easy-to-use API that is compatible with various machine learning frameworks. We show that Salvia's experimental performance is consistent with SecAgg(+)'s theoretical computation and communication complexities.
△ Less
Submitted 12 May, 2022;
originally announced May 2022.
-
Anapole-Mediated Emission Enhancement in Gallium Nitride Nanocavities
Authors:
Hao Wang,
**g Wang,
Shasha Li,
Kwai Hei Li,
Hai-Qing Lin,
Lei Shao
Abstract:
Benefiting from their low-loss light manipulation at subwavelength scales, optically resonant dielectric nanostructures have emerged as one of the most promising nanophotonic building blocks. Here, we theoretically conceive a dielectric nanocavity made of moderate-refractive-index gallium nitride and investigate the strong electromagnetic field confinement inside the nanocavity. We demonstrate tha…
▽ More
Benefiting from their low-loss light manipulation at subwavelength scales, optically resonant dielectric nanostructures have emerged as one of the most promising nanophotonic building blocks. Here, we theoretically conceive a dielectric nanocavity made of moderate-refractive-index gallium nitride and investigate the strong electromagnetic field confinement inside the nanocavity. We demonstrate that gallium nitride nanodisks can support anapole states, which result from interference between electric dipole and toroidal dipole modes and are tunable by changing sizes of the nanodisks. The highly confined electromagnetic field of the anapole states can promote the emission efficiency of a single quantum emitter inside the nanocavity. Moreover, the emission polarization can be tuned by placing the quantum emitter off the nanodisk center. Our findings provide a promising candidate for the construction of ultra-compact, super-radiative integrated quantum light sources.
△ Less
Submitted 17 November, 2021;
originally announced November 2021.
-
State transformations within entanglement classes containing permutation-symmetric states
Authors:
Martin Hebenstreit,
Cornelia Spee,
Nicky Kai Hong Li,
Barbara Kraus,
Julio I. de Vicente
Abstract:
The study of state transformations under local operations and classical communication (LOCC) plays a crucial role in entanglement theory. While this has been long ago characterized for pure bipartite states, the situation is drastically different for systems of more parties: generic pure qudit states cannot be obtained from nor transformed to any state (i.e., they are isolated), which contains a d…
▽ More
The study of state transformations under local operations and classical communication (LOCC) plays a crucial role in entanglement theory. While this has been long ago characterized for pure bipartite states, the situation is drastically different for systems of more parties: generic pure qudit states cannot be obtained from nor transformed to any state (i.e., they are isolated), which contains a different amount of entanglement. We consider here the question of LOCC convertibility for permutation-symmetric pure states of an arbitrary number of parties and local dimension, a class of clear interest both for physical and mathematical reasons and for which the aforementioned result does not apply given that it is a zero-measure subset in the state space. While it turns out that generic $n$-qubit symmetric states are also isolated, we consider particular families for which we can determine to be, on the contrary, endowed with a rich local stabilizer, a necessary requirement for LOCC convertibility to be possible. This allows us to identify classes in which LOCC transformations among permutation-symmetric states are possible. Notwithstanding, we provide several results that indicate severe obstructions to LOCC convertibility in general even within these highly symmetrical classes. In the course of the study of LOCC transformations, we also characterize the local symmetries of symmetric states.
△ Less
Submitted 5 September, 2023; v1 submitted 29 July, 2021;
originally announced July 2021.
-
Non-Orthogonal Multiple Access (NOMA) With Multiple Intelligent Reflecting Surfaces
Authors:
Yanyu Cheng,
Kwok Hung Li,
Yuanwei Liu,
Kah Chan Teh,
George K. Karagiannidis
Abstract:
In this paper, non-orthogonal multiple access (NOMA) networks assisted by multiple intelligent reflecting surfaces (IRSs) with discrete phase shifts are investigated, in which each user device (UD) is served by an IRS to improve the quality of the received signal. Two scenarios are considered according to whether there is a direct link between the base station (BS) and each UD, and the outage perf…
▽ More
In this paper, non-orthogonal multiple access (NOMA) networks assisted by multiple intelligent reflecting surfaces (IRSs) with discrete phase shifts are investigated, in which each user device (UD) is served by an IRS to improve the quality of the received signal. Two scenarios are considered according to whether there is a direct link between the base station (BS) and each UD, and the outage performance is analyzed for each of them. Specifically, the asymptotic expressions for the upper and lower bounds of the outage probability in the high signal-to-noise ratio (SNR) regime are derived. Following that, the diversity order is obtained. It is shown that the use of discrete phase shifts does not degrade diversity order. More importantly, simulation results reveal that a 3-bit resolution for discrete phase shifts is sufficient to achieve near-optimal outage performance. Simulation results also imply the superiority of IRSs over full-duplex decode-and-forward relays.
△ Less
Submitted 25 May, 2021; v1 submitted 31 October, 2020;
originally announced November 2020.
-
Flower: A Friendly Federated Learning Research Framework
Authors:
Daniel J. Beutel,
Taner Topal,
Akhil Mathur,
Xinchi Qiu,
Javier Fernandez-Marques,
Yan Gao,
Lorenzo Sani,
Kwing Hei Li,
Titouan Parcollet,
Pedro Porto Buarque de Gusmão,
Nicholas D. Lane
Abstract:
Federated Learning (FL) has emerged as a promising technique for edge devices to collaboratively learn a shared prediction model, while kee** their training data on the device, thereby decoupling the ability to do machine learning from the need to store the data in the cloud. However, FL is difficult to implement realistically, both in terms of scale and systems heterogeneity. Although there are…
▽ More
Federated Learning (FL) has emerged as a promising technique for edge devices to collaboratively learn a shared prediction model, while kee** their training data on the device, thereby decoupling the ability to do machine learning from the need to store the data in the cloud. However, FL is difficult to implement realistically, both in terms of scale and systems heterogeneity. Although there are a number of research frameworks available to simulate FL algorithms, they do not support the study of scalable FL workloads on heterogeneous edge devices.
In this paper, we present Flower -- a comprehensive FL framework that distinguishes itself from existing platforms by offering new facilities to execute large-scale FL experiments and consider richly heterogeneous FL device scenarios. Our experiments show Flower can perform FL experiments up to 15M in client size using only a pair of high-end GPUs. Researchers can then seamlessly migrate experiments to real devices to examine other parts of the design space. We believe Flower provides the community with a critical new tool for FL study and development.
△ Less
Submitted 5 March, 2022; v1 submitted 28 July, 2020;
originally announced July 2020.
-
Improving key rates of the unbalanced phase-encoded BB84 protocol using the flag-state squashing model
Authors:
Nicky Kai Hong Li,
Norbert Lütkenhaus
Abstract:
All phase-encoded BB84 implementations have signal states with unbalanced amplitudes in practice. Thus, the original security analyses a priori do not apply to them. Previous security proofs use signal tagging of multi-photon pulses to recover the behaviour of regular BB84. This is overly conservative, as for unbalanced signals, the photon-number splitting attack does not leak full information to…
▽ More
All phase-encoded BB84 implementations have signal states with unbalanced amplitudes in practice. Thus, the original security analyses a priori do not apply to them. Previous security proofs use signal tagging of multi-photon pulses to recover the behaviour of regular BB84. This is overly conservative, as for unbalanced signals, the photon-number splitting attack does not leak full information to Eve. In this work, we exploit the flag-state squashing model to preserve some parts of the multi-photon generated private information in our analysis. Using a numerical proof technique, we obtain significantly higher key rates compared with previously published results in the low-loss regime. It turns out that the usual scenario of untrusted dark counts runs into conceptual difficulties in some parameter regime. Thus, we discuss the trusted dark count scenario in this paper as well. We also report a gain in key rates when part of the total loss is known to be induced by a trusted device. We highlight that all these key rate improvements can be achieved without modification of the experimental setup.
△ Less
Submitted 30 July, 2020; v1 submitted 16 July, 2020;
originally announced July 2020.
-
Downlink and Uplink Intelligent Reflecting Surface Aided Networks: NOMA and OMA
Authors:
Yanyu Cheng,
Kwok Hung Li,
Yuanwei Liu,
Kah Chan Teh,
H. Vincent Poor
Abstract:
Intelligent reflecting surfaces (IRSs) are envisioned to provide reconfigurable wireless environments for future communication networks. In this paper, both downlink and uplink IRS-aided non-orthogonal multiple access (NOMA) and orthogonal multiple access (OMA) networks are studied, in which an IRS is deployed to enhance the coverage by assisting a cell-edge user device (UD) to communicate with th…
▽ More
Intelligent reflecting surfaces (IRSs) are envisioned to provide reconfigurable wireless environments for future communication networks. In this paper, both downlink and uplink IRS-aided non-orthogonal multiple access (NOMA) and orthogonal multiple access (OMA) networks are studied, in which an IRS is deployed to enhance the coverage by assisting a cell-edge user device (UD) to communicate with the base station (BS). To characterize system performance, new channel statistics of the BS-IRS-UD link with Nakagami-$m$ fading are investigated. For each scenario, the closed-form expressions for the outage probability and ergodic rate are derived. To gain further insight, the diversity order and high signal-to-noise ratio (SNR) slope for each scenario are obtained according to asymptotic approximations in the high-SNR regime. It is demonstrated that the diversity order is affected by the number of IRS reflecting elements and Nakagami fading parameters, but the high-SNR slope is not related to these parameters. Simulation results validate our analysis and reveal the superiority of the IRS over the full-duplex decode-and-forward relay.
△ Less
Submitted 4 February, 2021; v1 submitted 3 May, 2020;
originally announced May 2020.
-
Performance Analysis of Low-Density Parity-Check Codes over 2D Interference Channels via Density Evolution
Authors:
Jun Yao,
Kah Chan Teh,
Kwok Hung Li
Abstract:
The theoretical analysis of detection and decoding of low-density parity-check (LDPC) codes transmitted over channels with two-dimensional (2D) interference and additive white Gaussian noise (AWGN) is provided in this paper. The detection and decoding system adopts the joint iterative detection and decoding scheme (JIDDS) in which the log-domain sum-product algorithm is adopted to decode the LDPC…
▽ More
The theoretical analysis of detection and decoding of low-density parity-check (LDPC) codes transmitted over channels with two-dimensional (2D) interference and additive white Gaussian noise (AWGN) is provided in this paper. The detection and decoding system adopts the joint iterative detection and decoding scheme (JIDDS) in which the log-domain sum-product algorithm is adopted to decode the LDPC codes. The graph representations of the JIDDS are explained. Using the graph representations, we prove that the message-flow neighborhood of the detection and decoding system will be tree-like for a sufficiently long code length. We further confirm that the performance of the JIDDS will concentrate around the performance in which message-flow neighborhood is tree-like. Based on the tree-like message-flow neighborhood, we employ a modified density evolution algorithm to track the message densities during the iterations. A threshold is calculated using the density evolution algorithm which can be considered as the theoretical performance limit of the system. Simulation results demonstrate that the modified density evolution is effective in analyzing the performance of 2D interference systems.
△ Less
Submitted 13 January, 2017;
originally announced January 2017.
-
On the Full Column-Rank Condition of the Channel Estimation Matrix in Doubly-Selective MIMO-OFDM Systems
Authors:
Kathik Muralidhar,
Kwok Hung Li
Abstract:
Recently, this journal has published a paper which dealt with basis expansion model (BEM) based least-squares (LS) channel estimation in doubly-selective orthogonal frequency-division multiplexing (DS-OFDM) systems. The least-squares channel estimator computes the pseudo-inverse of a channel estimation matrix. For the existence of the pseudo-inverse, it is necessary that the channel estimation mat…
▽ More
Recently, this journal has published a paper which dealt with basis expansion model (BEM) based least-squares (LS) channel estimation in doubly-selective orthogonal frequency-division multiplexing (DS-OFDM) systems. The least-squares channel estimator computes the pseudo-inverse of a channel estimation matrix. For the existence of the pseudo-inverse, it is necessary that the channel estimation matrix be of full column rank. In this paper, we investigate the conditions that need to be satisfied that ensures the full column-rank condition of the channel estimation matrix. In particular, we derive conditions that the BEM and pilot pattern designs should satisfy to ensure that the channel estimation matrix is of full column rank. We explore the polynomial BEM (P-BEM), complex exponential BEM (CE-BEM), Slepian BEM (S-BEM) and generalized complex exponential BEM (GCE-BEM). We present one possible way to design the pilot patterns which satisfy the full column-rank conditions. Furthermore, the proposed method is extended to the case of multiple-input multiple-output (MIMO) DS-OFDM systems as well. Examples of pilot pattern designs are presented, that ensure the channel estimation matrix is of full column rank for a large DS-MIMO-OFDM system with as many as six transmitters, six receivers and 1024 subcarriers.
△ Less
Submitted 7 October, 2010;
originally announced October 2010.
-
The infrared and optical variability of OJ 287
Authors:
J. H. Fan,
G. Adam,
G. Z. Xie,
S. L. Cao,
R. G. Lin,
Y. P. Qin,
Y. Copin,
J. M. Bai,
X. Zhang,
K. H. Li
Abstract:
In this paper, the long-term historical optical (UBVRI) and near-infrared (JHK) data are presented with some new observations in the optical (February 1994-January 1995) and near-infrared (November 1995) bands included for BL Lac object OJ287. The new optical data in V-band are in agreement with the results reported by other authors (Sillanpaa et al. 1996a; Arimoto et al. 1997), a close correlat…
▽ More
In this paper, the long-term historical optical (UBVRI) and near-infrared (JHK) data are presented with some new observations in the optical (February 1994-January 1995) and near-infrared (November 1995) bands included for BL Lac object OJ287. The new optical data in V-band are in agreement with the results reported by other authors (Sillanpaa et al. 1996a; Arimoto et al. 1997), a close correlation between the color index of B-V and the magnitude V has been obtained from our new observations; The new infrared observations presented here indicate that the source was at a high level in the infrared band during the observation period;
From the available literature, we have got that the largest variations for UBVRIJHK bands are respectively: 4.72mag, 5.93mag, 5.18mag, 4.45mag, 4.07mag, 3.87mag, 3.78mag, and 3.54mag. A strong correlation is found between the optical and near-infrared bands when the DCF method is used, which suggests that these two bands have the same emission mechanism.
△ Less
Submitted 1 September, 1998;
originally announced September 1998.