-
Simplest fidelity-estimation method for graph states with depolarizing noise
Authors:
Tomonori Tanizawa,
Yuki Takeuchi,
Shion Yamashika,
Ryosuke Yoshii,
Shunji Tsuchiya
Abstract:
Graph states are entangled states useful for several quantum information processing tasks such as measurement-based quantum computation and quantum metrology. As the size of graph states realized in experiments increases, it becomes more essential to devise efficient methods estimating the fidelity between the ideal graph state and an experimentally-realized actual state. Any efficient fidelity-es…
▽ More
Graph states are entangled states useful for several quantum information processing tasks such as measurement-based quantum computation and quantum metrology. As the size of graph states realized in experiments increases, it becomes more essential to devise efficient methods estimating the fidelity between the ideal graph state and an experimentally-realized actual state. Any efficient fidelity-estimation method, in general, must use multiple experimental settings, i.e., needs to switch between at least two measurements. Recently, it has been shown that a single measurement is sufficient if the noise can be modeled as the phase-flip error. Since the bit-flip error should also occur in several experiments, it is desired to extend this simplest method to noise models that include phase and bit-flip errors. However, it seems to be nontrivial because their result strongly depends on properties of the phase-flip error. In this paper, by analyzing effects of the bit-flip error on stabilizer operators of graph states, we achieve the extension to the depolarizing noise, which is a major noise model including phase and bit-flip errors. We also numerically evaluate our simplest method for noise models interpolating between the phase-flip and depolarizing noises.
△ Less
Submitted 15 September, 2023; v1 submitted 21 April, 2023;
originally announced April 2023.
-
Ego-Vehicle Action Recognition based on Semi-Supervised Contrastive Learning
Authors:
Chihiro Noguchi,
Toshihiro Tanizawa
Abstract:
In recent years, many automobiles have been equipped with cameras, which have accumulated an enormous amount of video footage of driving scenes. Autonomous driving demands the highest level of safety, for which even unimaginably rare driving scenes have to be collected in training data to improve the recognition accuracy for specific scenes. However, it is prohibitively costly to find very few spe…
▽ More
In recent years, many automobiles have been equipped with cameras, which have accumulated an enormous amount of video footage of driving scenes. Autonomous driving demands the highest level of safety, for which even unimaginably rare driving scenes have to be collected in training data to improve the recognition accuracy for specific scenes. However, it is prohibitively costly to find very few specific scenes from an enormous amount of videos. In this article, we show that proper video-to-video distances can be defined by focusing on ego-vehicle actions. It is well known that existing methods based on supervised learning cannot handle videos that do not fall into predefined classes, though they work well in defining video-to-video distances in the embedding space between labeled videos. To tackle this problem, we propose a method based on semi-supervised contrastive learning. We consider two related but distinct contrastive learning: standard graph contrastive learning and our proposed SOIA-based contrastive learning. We observe that the latter approach can provide more sensible video-to-video distances between unlabeled videos. Next, the effectiveness of our method is quantified by evaluating the classification performance of the ego-vehicle action recognition using HDD dataset, which shows that our method including unlabeled data in training significantly outperforms the existing methods using only labeled data in training.
△ Less
Submitted 2 March, 2023;
originally announced March 2023.
-
Robustness analysis of bimodal networks in the whole range of degree correlation
Authors:
Shogo Mizutaka,
Toshihiro Tanizawa
Abstract:
We present exact analysis of the physical properties of bimodal networks specified by the two peak degree distribution fully incorporating the degree-degree correlation between node connection. The structure of the correlated bimodal network is uniquely determined by the Pearson coefficient of the degree correlation, kee** its degree distribution fixed. The percolation threshold and the giant co…
▽ More
We present exact analysis of the physical properties of bimodal networks specified by the two peak degree distribution fully incorporating the degree-degree correlation between node connection. The structure of the correlated bimodal network is uniquely determined by the Pearson coefficient of the degree correlation, kee** its degree distribution fixed. The percolation threshold and the giant component fraction of the correlated bimodal network are analytically calculated in the whole range of the Pearson coefficient from $-1$ to $1$ against two major types of node removal, which are the random failure and the degree-based targeted attack. The Pearson coefficient for next-nearest-neighbor pairs is also calculated, which always takes a positive value even when the correlation between nearest-neighbor pairs is negative. From the results, it is confirmed that the percolation threshold is a monotonically decreasing function of the Pearson coefficient for the degrees of nearest-neighbor pairs increasing from $-1$ and $1$ regardless of the types of node removal. In contrast, the node fraction of the giant component for bimodal networks with positive degree correlation rapidly decreases in the early stage of random failure, while that for bimodal networks with negative degree correlation remains relatively large until the removed node fraction reaches the threshold. In this sense, bimodal networks with negative degree correlation are more robust against random failure than those with positive degree correlation.
△ Less
Submitted 12 July, 2016;
originally announced July 2016.
-
On possible origins of trends in financial market price changes
Authors:
Ryo Murakami,
Tomomichi Nakamura,
Shin Kimura,
Masashi Manabe,
Toshihiro Tanizawa
Abstract:
We investigate possible origins of trends using a deterministic threshold model, where we refer to long-term variabilities of price changes (price movements) in financial markets as trends. From the investigation we find two phenomena. One is that the trend of monotonic increase and decrease can be generated by dealers' minuscule change in mood, which corresponds to the possible fundamentals. The…
▽ More
We investigate possible origins of trends using a deterministic threshold model, where we refer to long-term variabilities of price changes (price movements) in financial markets as trends. From the investigation we find two phenomena. One is that the trend of monotonic increase and decrease can be generated by dealers' minuscule change in mood, which corresponds to the possible fundamentals. The other is that the emergence of trends is all but inevitable in the realistic situation because of the fact that dealers cannot always obtain accurate information about deals, even if there is no influence from fundamentals and technical analyses.
△ Less
Submitted 7 November, 2014; v1 submitted 20 June, 2014;
originally announced June 2014.
-
Constructing directed networks from multivariate time series using linear modelling technique
Authors:
Toshihiro Tanizawa,
Tomomichi Nakamura,
Fumihiko Taya,
Michael Small
Abstract:
We describe a method to construct directed networks from multivariate time series which has several advantages over the widely accepted methods. This method is based on an information theoretic reduction of linear (auto-regressive) models. The models are called reduced auto-regressive (RAR) models. The procedure of the proposed method is composed of three steps: (i) each time series is treated as…
▽ More
We describe a method to construct directed networks from multivariate time series which has several advantages over the widely accepted methods. This method is based on an information theoretic reduction of linear (auto-regressive) models. The models are called reduced auto-regressive (RAR) models. The procedure of the proposed method is composed of three steps: (i) each time series is treated as a basic node of a network, (ii) multivariate RAR models are built and the constituent information in the models is summarized, and (iii) nodes are connected with a directed link based on that summary information. The proposed method is demonstrated for numerical data generated by known systems, and applied to several actual time series of special interest. Although the proposed method can identify connectivity, there are three points to keep in mind: (1) the proposed method cannot always identify nonlinear relationships among components, (2) as constructing RAR models is NP-hard, the network constructed by the proposed method might be near-optimal network when we cannot perform an exhaustive search, and (3) it is difficult to construct appropriate networks when the observational noise is large.
△ Less
Submitted 9 August, 2018; v1 submitted 19 June, 2014;
originally announced June 2014.
-
Robustness of cooperation on scale-free networks under continuous topological change
Authors:
Genki Ichinose,
Yuto Tenguishi,
Toshihiro Tanizawa
Abstract:
In this paper, we numerically investigate the robustness of cooperation clusters in prisoner's dilemma played on scale-free networks, where the network topologies change by continuous removal and addition of nodes. Each removal and addition can be either random or intentional. We therefore have four different strategies in changing network topology: random removal and random addition (RR), random…
▽ More
In this paper, we numerically investigate the robustness of cooperation clusters in prisoner's dilemma played on scale-free networks, where the network topologies change by continuous removal and addition of nodes. Each removal and addition can be either random or intentional. We therefore have four different strategies in changing network topology: random removal and random addition (RR), random removal and preferential addition (RP), targeted removal and random addition (TR), and targeted removal and preferential addition (TP). We find that cooperation clusters are most fragile against TR, while they are most robust against RP, even for large values of the temptation coefficient for defection. The effect of the degree mixing pattern of the network is not the primary factor for the robustness of cooperation under continuous change in network topology, which is quite different from the cases observed in static networks. Cooperation clusters become more robust as the number of links of hubs occupied by cooperators increase. Our results might infer the fact that a huge variety of individuals is needed for maintaining global cooperation in social networks in the real world where each node representing an individual is constantly removed and added.
△ Less
Submitted 13 November, 2013; v1 submitted 12 June, 2013;
originally announced June 2013.
-
Structural robustness and transport efficiency of complex networks with degree correlation
Authors:
Toshihiro Tanizawa
Abstract:
We examine two properties of complex networks, the robustness against targeted node removal (attack) and the transport efficiency in terms of degree correlation in node connection by numerical evaluation of exact analytic expressions. We find that, while the assortative correlation enhances the structural robustness against attack, the disassortative correlation significantly improves the transpor…
▽ More
We examine two properties of complex networks, the robustness against targeted node removal (attack) and the transport efficiency in terms of degree correlation in node connection by numerical evaluation of exact analytic expressions. We find that, while the assortative correlation enhances the structural robustness against attack, the disassortative correlation significantly improves the transport efficiency of the network under consideration. This finding might shed light on the reason why some networks in the real world prefer assortative correlation and others prefer disassortative one.
△ Less
Submitted 21 September, 2012;
originally announced September 2012.
-
Networks with time structure from time series
Authors:
Tomomichi Nakamura,
Toshihiro Tanizawa
Abstract:
We propose a method of constructing a network, in which its time structure is directly incorporated, based on a deterministic model from a time series. To construct such a network, we transform a linear model containing terms with different time delays into network topology. The terms in the model are translated into temporal nodes of the network. On each link connecting these nodes, we assign a p…
▽ More
We propose a method of constructing a network, in which its time structure is directly incorporated, based on a deterministic model from a time series. To construct such a network, we transform a linear model containing terms with different time delays into network topology. The terms in the model are translated into temporal nodes of the network. On each link connecting these nodes, we assign a positive real number representing the strength of relationship, or the "distance," between nodes specified by the parameters of the model. The method is demonstrated by a known system and applied to two actual time series.
△ Less
Submitted 22 May, 2012;
originally announced May 2012.
-
Robustness of onion-like correlated networks against targeted attacks
Authors:
Toshihiro Tanizawa,
Shlomo Havlin,
H. Eugene Stanley
Abstract:
Recently, it was found by Schneider et al. [Proc. Natl. Acad. Sci. USA, 108, 3838 (2011)], using simulations, that scale-free networks with "onion structure" are very robust against targeted high degree attacks. The onion structure is a network where nodes with almost the same degree are connected. Motivated by this work, we propose and analyze, based on analytical considerations, an onion-like ca…
▽ More
Recently, it was found by Schneider et al. [Proc. Natl. Acad. Sci. USA, 108, 3838 (2011)], using simulations, that scale-free networks with "onion structure" are very robust against targeted high degree attacks. The onion structure is a network where nodes with almost the same degree are connected. Motivated by this work, we propose and analyze, based on analytical considerations, an onion-like candidate for a nearly optimal structure against simultaneous random and targeted high degree node attacks. The nearly optimal structure can be viewed as a hierarchically interconnected random regular graphs, the degrees and populations of which are specified by the degree distribution. This network structure exhibits an extremely assortative degree-degree correlation and has a close relationship to the "onion structure." After deriving a set of exact expressions that enable us to calculate the critical percolation threshold and the giant component of a correlated network for an arbitrary type of node removal, we apply the theory to the cases of random scale-free networks that are highly vulnerable against targeted high degree node removal. Our results show that this vulnerability can be significantly reduced by implementing this onion-like type of degree-degree correlation without much undermining the almost complete robustness against random node removal. We also investigate in detail the robustness enhancement due to assortative degree-degree correlation by introducing a joint degree-degree probability matrix that interpolates between an uncorrelated network structure and the onion-like structure proposed here by tuning a single control parameter. The optimal values of the control parameter that maximize the robustness against simultaneous random and targeted attacks are also determined. Our analytical calculations are supported by numerical simulations.
△ Less
Submitted 5 March, 2012; v1 submitted 22 December, 2011;
originally announced December 2011.
-
Elastic properties of the Non-Fermi liquid metal $Ce Ru_4 Sb_{12}$ and the Dense Kondo semiconductor $Ce Os_4 Sb_{12}$
Authors:
Yoshiki Nakanishi,
Tomoyuki Kumagai,
Masafumi Oikawa,
Tomoaki Tanizawa,
Masahito Yoshizawa,
Hitoshi Sugawara,
Hideyuki Sato
Abstract:
We have investigated the elastic properties of the Ce-based filled skutterudite antimonides CeRu$_{4}$Sb$_{12}$ and CeOs$_{4}$Sb$_{12}$ by means of ultrasonic measurements. CeRu$_{4}$Sb$_{12}$ shows a slight increase around 130 K in the temperature dependence of the elastic constants $C$$_{11}$, ($C$$_{11}$-$C$$_{12}$)/2 and $C$$_{44}$. No apparent softening toward low temperature due to a quadr…
▽ More
We have investigated the elastic properties of the Ce-based filled skutterudite antimonides CeRu$_{4}$Sb$_{12}$ and CeOs$_{4}$Sb$_{12}$ by means of ultrasonic measurements. CeRu$_{4}$Sb$_{12}$ shows a slight increase around 130 K in the temperature dependence of the elastic constants $C$$_{11}$, ($C$$_{11}$-$C$$_{12}$)/2 and $C$$_{44}$. No apparent softening toward low temperature due to a quadrupolar response of the 4$f$-electronic ground state of the Ce ion was observed at low temperatures. In contrast CeOs$_{4}$Sb$_{12}$ shows a pronounced elastic softening toward low temperature in the longitudinal $C$$_{11}$ as a function of temperature ($T$) below about 15 K, while a slight elastic softening was observed in the transverse $C$$_{44}$ below about 1.5 K. Furthermore, CeOs$_{4}$Sb$_{12}$ shows a steep decrease around a phase transition temperature of 0.9 K in both $C$$_{11}$ and$ C$$_{44}$. The elastic softening observed in $C$$_{11}$ below about 15 K cannot be explained reasonably only by the crystalline electric field effect. It is most likely to be responsible for the coupling between the elastic strain and the quasiparticle band with a small energy gap in the vicinity of Fermi level. The elastic properties and the 4$f$ ground state of Ce ions in CeRu$_{4}$Sb$_{12}$ and CeOs$_{4}$Sb$_{12}$ are discussed from the viewpoint of the crystalline electric field effect and the band structure in the vicinity of Fermi level.
△ Less
Submitted 20 September, 2006;
originally announced September 2006.
-
Optimization of Network Robustness to Waves of Targeted and Random Attack
Authors:
T. Tanizawa,
G. Paul,
R. Cohen,
S. Havlin,
H. E. Stanley
Abstract:
We study the robustness of complex networks to multiple waves of simultaneous (i) targeted attacks in which the highest degree nodes are removed and (ii) random attacks (or failures) in which fractions $p_t$ and $p_r$ respectively of the nodes are removed until the network collapses. We find that the network design which optimizes network robustness has a bimodal degree distribution, with a frac…
▽ More
We study the robustness of complex networks to multiple waves of simultaneous (i) targeted attacks in which the highest degree nodes are removed and (ii) random attacks (or failures) in which fractions $p_t$ and $p_r$ respectively of the nodes are removed until the network collapses. We find that the network design which optimizes network robustness has a bimodal degree distribution, with a fraction $r$ of the nodes having degree $k_2= (\kav - 1 +r)/r$ and the remainder of the nodes having degree $k_1=1$, where $\kav$ is the average degree of all the nodes. We find that the optimal value of $r$ is of the order of $p_t/p_r$ for $p_t/p_r\ll 1$.
△ Less
Submitted 23 June, 2004;
originally announced June 2004.
-
Optimization of Robustness of Complex Networks
Authors:
G. Paul,
T. Tanizawa,
S. Havlin,
H. E. Stanley
Abstract:
Networks with a given degree distribution may be very resilient to one type of failure or attack but not to another. The goal of this work is to determine network design guidelines which maximize the robustness of networks to both random failure and intentional attack while kee** the cost of the network (which we take to be the average number of links per node) constant. We find optimal parame…
▽ More
Networks with a given degree distribution may be very resilient to one type of failure or attack but not to another. The goal of this work is to determine network design guidelines which maximize the robustness of networks to both random failure and intentional attack while kee** the cost of the network (which we take to be the average number of links per node) constant. We find optimal parameters for: (i) scale free networks having degree distributions with a single power-law regime, (ii) networks having degree distributions with two power-law regimes, and (iii) networks described by degree distributions containing two peaks. Of these various kinds of distributions we find that the optimal network design is one in which all but one of the nodes have the same degree, $k_1$ (close to the average number of links per node), and one node is of very large degree, $k_2 \sim N^{2/3}$, where $N$ is the number of nodes in the network.
△ Less
Submitted 14 April, 2004;
originally announced April 2004.