Search results for "5-7"
showing 10 items of 428 documents
Robust entanglement preparation against noise by controlling spatial indistinguishability
2019
Initialization of composite quantum systems into highly entangled states is usually a must to allow their use for quantum technologies. However, the presence of unavoidable noise in the preparation stage makes the system state mixed, thus limiting the possibility of achieving this goal. Here we address this problem in the context of identical particle systems. We define the entanglement of formation for an arbitrary state of two identical qubits within the operational framework of spatially localized operations and classical communication (sLOCC). We then introduce an entropic measure of spatial indistinguishability under sLOCC as an information resource. We show that spatial indistinguisha…
Energy-efficient quantum computing
2016
In the near future, a major challenge in quantum computing is to scale up robust qubit prototypes to practical problem sizes and to implement comprehensive error correction for computational precision. Due to inevitable quantum uncertainties in resonant control pulses, increasing the precision of quantum gates comes with the expense of increased energy consumption. Consequently, the power dissipated in the vicinity of the processor in a well-working large-scale quantum computer seems unacceptably large in typical systems requiring low operation temperatures. Here, we introduce a method for qubit driving and show that it serves to decrease the single-qubit gate error without increasing the a…
Acoustic spectral hole-burning in a two-level system ensemble
2020
AbstractMicroscopic two-level system (TLS) defects at dielectric surfaces and interfaces are among the dominant sources of loss in superconducting quantum circuits, and their properties have been extensively probed using superconducting resonators and qubits. We report on spectroscopy of TLSs coupling to the strain field in a surface acoustic wave (SAW) resonator. The narrow free spectral range of the resonator allows for two-tone spectroscopy where a strong pump is applied at one resonance, while a weak signal is used to probe a different mode. We map the spectral hole burnt by the pump tone as a function of frequency and extract parameters of the TLS ensemble. Our results suggest that det…
Restoration of Videos Degraded by Local Isoplanatism Effects in the Near-Infrared Domain
2008
When observing a scene horizontally at a long distance in the near-infrared domain, degradations due to atmospheric turbulence often occur. In our previous work, we presented two hybrid methods to restore videos degraded by such local perturbations. These restoration algorithms take advantages of a space-time Wiener filter and a space-time regularization by the Laplacian operator. Wiener and Laplacian regularization results are mixed differently depending on the distance between the current pixel and the nearest edge point. It was shown that a gradation between Wiener and Laplacian areas improves results quality, so that only the algorithm using a gradation will be used in this article. In …
Extension of luminance component based demosaicking algorithm to 4- and 5-band multispectral images
2021
Abstract Multispectral imaging systems are currently expanding with a variety of multispectral demosaicking algorithms. But these algorithms have limitations due to the remarkable presence of artifacts in the reconstructed image. In this paper, we propose a powerful multispectral image demosaicking method that focuses on the G band and luminance component. We've first identified a relevant 4-and 5-band multispectral filter array (MSFA) with the dominant G band and then proposed an algorithm that consistently estimates the missing G values and other missing components using a convolution operator and a weighted bilinear interpolation algorithm based on the luminance component. Using the cons…
Non-Model Based Method for an Automation of 3D Acquisition and Post-Processing
2008
Most of the automation for 3D acquisition concerns objects with simple shape, like mechanical parts. For cultural heritage artefacts, the process is more complex, and it doesn't exist general solution nowadays. This paper presents a method to generate a complete 3D model of cultural heritage artefacts. In a first step, MVC is used to solve the view planning problem. Then, holes remaining in 3D model are detected, and their features are calculated to finish acquisition. Different post-processing are applied on each view to increase quality of the 3D model. This procedure has been tested with simulated scanner, before being implemented on a motion system with five degrees of freedom.
HTLS Conductors: A Way to Optimize RES Generation and to Improve the Competitiveness of the Electrical Market—A Case Study in Sicily
2018
Stringent environmental constraints make more difficult to identify new energy corridors and build new power lines. The increase in the generation of electricity from renewable energy sources (RESs) makes the operation of electrical systems increasingly difficult in some areas. The transmission system operators (TSOs), in Italy Terna, are forced to exploit the existing overhead transmission lines, increasing the possibility of dispatching energy, in particular RES, optimizing the transmission capacity. Therefore, after a brief presentation of the Sicilian electricity system and a brief description of high-temperature low-sag (HTLS) conductors, a case study is presented. It is shown how it i…
Hypervisor-assisted dynamic malware analysis
2021
AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transp…
Detection of developmental dyslexia with machine learning using eye movement data
2021
Dyslexia is a common neurocognitive learning disorder that can seriously hinder individuals’ aspirations if not detected and treated early. Instead of costly diagnostic assessment made by experts, in the near future dyslexia might be identified with ease by automated analysis of eye movements during reading provided by embedded eye tracking technology. However, the diagnostic machine learning methods need to be optimized first. Previous studies with machine learning have been quite successful in identifying dyslexic readers, however, using contrasting groups with large performance differences between diagnosed and good readers. A practical challenge is to identify also individuals with bord…
Complex networks : application for texture characterization and classification
2008
This article describes a new method and approch of texture characterization. Using complex network representation of an image, classical and derived (hierarchical) measurements, we presente how to have good performance in texture classification. Image is represented by a complex networks : one pixel as a node. Node degree and clustering coefficient, using with traditionnal and extended hierarchical measurements, are used to characterize ”organisation” of textures.