An enhanced framework of quantum approximate optimization algorithm (QAOA) is introduced and the parameter setting strategies are analyzed.. The enhanced QAOA is as effective as the QAOA[r]

model. The slice size K was set to 20. We optimized the network with Adam and used learning rate warm-up for the first 32000 up- dates to a peak of 0.0003, and then linearly decayed it. We grouped the input sequences by length with a batch size of 128 (we chopped the maximum length to 15 seconds), and trained the models on **16** GPUs for 150 epochs. The Gumbel softmax temperature τ is an- nealed from 2 to a minimum of 0.5 by a factor of 0.999995 at every update. We use weight α = 0.1 for the diversity loss and we set G = 2 and V = 320 for the quantization module.

type (in-plane AF checkerboard) ground state. All Nd moments are considered parallel, and the fig- ure shows only the minority spin channel for clarity, since in that situation the Nd-f bands are unoccu- pied, located 2-3 eV above the Fermi level. The metallic character can be seen to be brought about, as it has been analyzed in the past [14, **16**], by the presence of strongly dispersive bands (in particular along the Γ-Z direction) of mixed R-d and Ni-d z 2

As one of the most prevalent representations of cross- frequency coupling [8], phase-amplitude coupling (PAC) occurs when the power (or amplitude) of a high-frequency rhythm is locked to (and often modulated by) the phase of a low-frequency rhythm (see FIG. 1(a)). Brain signals recorded by various techniques, e.g., local field potential (LFP), electroencephalograph (EEG), and magnetoen- cephalograph (MEG), have revealed that PAC emerges in numerous brain regions, including auditory and pre- frontal cortices [9, 10], nucleus [11], and hippocampus [12], and plays a crucial role in motor functions [13] and cognitive processes such as working memory [14], atten- tion [15], and learning [**16**].

Show more
(2.326 d) agrees well with that estimated by Kiraga (2012) from ASAS data (2.3 d). The rich radial velocity sequence (Crepp et al. 2013; Butler et al. 2017 and HARPS data reported in the appendix) also allows one to derive the rotational period for HD 114174. Once we removed the long-term trend due to the orbital motion (see Section 6), we derived the value of 34.6 d (see Figures 4 and 5), which is in reasonable agreement with the one obtained from the TESS light curve in view of the uncertain- ties in this last value. We adopted the value obtained from the RV series for this star. Ages were obtained from these periods using the period-color-age calibration by Angus et al. (2019), as mod- ified by Bonavita et al. (**2020**, submitted) for stars younger than Praesepe. As discussed in Bonavita et al., these ages have errors of about 70% (0.25 in the logarithm). Relevant data are listed in Table 4. For comparison, Matthews et al. (2014) give a gy- rochronological age of 4.0 ± 1.1 Gyr for HD 114174, which is in quite good agreement with the present determination; however, they do not provide further details on how it was derived. As a further comparison, we would have derived ages of 17 Myr, 6.8 Gyr, and 24 Myr for HD 2133, HD 114174, and CD-56 7708, re- spectively, if we had used the gyro-chronological calibration by Barnes (2007), which is in quite good agreement with the values listed in Table 4.

Show more
19 Read more

symmetries. In order to obtain an explicite bosonic worldsheet description a Buscher’s gauging is used and subsequently gauged fixed in such a way that a duality covariant description by Tseytlin is obtained at the expense of manifest worldsheet Lorentz invariance. The basic structure is first exposed for a worldsheet theory of D bosonic fields and after that extended to the heterotic theory with D right–moving and D + **16** left–moving degrees of freedom.

49 Read more

(**16**) Note that Step 3 is to solve a simultaneous system of two quadratic equations. Theoretically, it is known that a solution to a system of k quadratic equations, k fixed, can be found in polynomial time. See, e.g., the paper by Grigoriev and Pasechnik in 2005 [5]. However, their procedure appears to be difficult for imple- mentation. In practice, we suggest to use the Newton method for finding the root x ∗ in (**16**).

21 Read more

3. Convergence Analysis of the Inertial Proximal ADMM In this section, we establish convergence of the Prox-IADMM (2.7) and (2.8) for multi-block convex optimizations, and we discuss (non)asymptotic rates of convergence for the best primal function value and feasibility residues. This extends the corresponding conclusions in [**16**, 54] where two-block con- vex optimizations are considered.

38 Read more

To combine the SSA and TSA modules, a two-stream architecture named 2s-ST- TR is used, as similarly proposed by Shi et al. in [14] and [13]. In our formulation, the two streams differentiate on the way the self-attention mechanism is applied: SSA operates on the spatial stream (named S-TR stream), while TSA on the temporal one (named T-TR stream). On both streams, simple features are first extracted through a three-layers residual network, where each layer processes the input on the spatial dimension through graph convolution (GCN), and on the temporal dimension through a standard 2D convolution (TCN), as in ST- GCN [**16**]. SSA and TSA are applied on the S-TR and on the T-TR stream in substitution to the GCN and TCN feature extraction modules respectively (Figure 2). Each stream is trained using the standard cross-entropy loss, and the sub-networks outputs are eventually fused together by summing up their softmax output scores to obtain the final prediction, as in [14,13].

Show more
The general idea behind the x-vector architecture is a usage of a few convolutional layers responsible for capturing local dependencies, and a pooling layer which computes statistics (mean and standard deviation) over the time dimension. The result of the pooling layer is then passed through additional affine layer to form the final embedding vector, which is of fixed size regardless of the length of the input sequence. Re- cent results in the field of speaker recognition [18] shows, that the performance of the x-vector-based systems is reliant on the architecture of the embedder network used and deeper architectures such as TDNN-F [**16**] and ResNet [6] offer per- formance gains when compared to the baseline TDNN-based system.

Show more
Multivariate orthogonal polynomials as in [19] arise in natural genetics problems.. See [29],[14],[36] for multivariate Hahn and Krawtchouk polynomials and [16] for Macdonald polynomials[r]

25 Read more

rate of the 4-intensity decoy-state MDI-QKD protocol [**16**] with the same parameters as in the SNS-TF-QKD of the total pulses of 1.72 × 10 −6 , with assuming the optical errors in X basis is 2% as reported in [17] instead of around 10% in this experiment. We observe the secure key rate of the SNS-TF-QKD protocol at 150 km is higher than theoretical result of the 4-intensity decoy-state MDI-QKD protocol. Actually, the theoretical simulation of the SNS-TF-QKD shows its secure key rate already exceeds the MDI-QKD protocol at 108 km. The theoretical simulation also indicates a longest distribution distance of 190 km can be achieve under the current experimental parameters, and more than 350 km fiber distance can be easily achieved with only decreasing the single photon detector dark count to 10 −11 . The distribution can be further expand to 620 km if accumulating 10 14 total pulses. In this

Show more
28 Read more

4.2. Discontinuous noise and geodesic jumps. Another interesting open problem related to opti- mal stochastic control relates to discontinuous noise. In particular, we shall consider semimartingales with jumps such that the trajectories are c` adl` ag. This is the classical case, see e.g. Kurtz, Pardoux and Prother [**16**], which includes, for example the L´evy noise, Applebaum [2], Protter [25], Oksendal and Sulem [24], among others. In this context Z = { Z t , t ≥ 0 } is a k-dimensional semimartingale, [Z, Z ]

13 Read more

The organization of this paper is as following forms. Bimodal Weibull distribution is proposed by Section II. Several properties of the proposed parametric model are examined and introduced by Sections III and IV. The section V introduces that the model parameters are estimated by maximum log and log q likelihood methods. Section VI gives numerial assessments of the proposed model and also provides the comparison between recently proposed Bimodal Gamma (BGamma) distribution [**16**] and the model in this paper. The conclusion is given by VI.

36 Read more

An entanglement source of this kind was first described by Lucien Hardy in 1992 [8], only a few months after the ZWM experiment. Hardy described it as a deterministic, collinear emitting source of polarization-entangled pho- ton pairs that can be used for the definitive violation of Bell’s inequality. The implementation of this source was achieved by Kwiat et al. in 1995 [9], and the design of the source is still in use today - especially in the gener- ation of the most complex photonic entanglement states such as a 12-photon entangled system [11], or an 18-qubit entangled photon state of several degrees of freedom [15]. Despite the frequent use of this source, it took 25 years that the concept of path identification was general- ized to vast classes of entanglement, such as any high- dimensional two-photon systems as well as vast types of high-dimensional many-body systems [**16**]. We come back to that in chapter VI.

Show more
42 Read more

Based on the click counting statistics of such detector systems, we could derive a proper description of several protocols and arbitrary input states.. First, we considered the heralded [r]

11 Read more

datasets: the original FAUST dataset [ 5 ] containing 100 human shapes in 1-1 correspondence and two datasets obtained by independently remeshing each shape in the FAUST and SCAPE [ 5 , [r]

11 Read more

and more recently augmented reality applications for the beauty industry enabling virtual try out of contact lenses. While some techniques require the use of specialized head-mounts or active illumination, such machinery is ex- pensive and is not applicable in many cases. In this paper, we focus on eye center localization using a standard cam- era. Approaches for eye center localization can be divided into two categories. The first, predominant, category con- sists of hand-crafted model fitting methods. These tech- niques employ the appearance, such as the darkness of the pupil, and/or the circular shape of the pupil and the iris for detection [3, 9, 10, 11, **16**, 19, 20, 22, 24, 25]. These methods are typically accurate but often lack robustness in more challenging settings, such as low resolution or noisy images and poor illumination. More recently, a sec- ond category emerged - machine learning based methods. While there are approaches that train sliding window eye center detectors, recent success of cascaded regression for facial feature alignment [6, 18, 14, 26] has prompted the community to apply these methods for eye center localiza- tion [17, 21, 28]. These new methods have proven to be more robust, but they lack the accuracy of the model fit- ting approaches and require annotated training data which may be cumbersome to obtain.

Show more
12 Read more

A more explicit demonstration of the competition be- tween the classical and quantum IVR pathways, and the critical role of the resonance junctions, is presented in Fig. Here, as an exam[r]

36 Read more

The last ones show complex P-Cygni features (clearly seen in the du Pont spectra and Nov 2015 FEROS spectra) with remarkable variations in the intensity of the absorption component.. Sod[r]

17 Read more