-
Online learning of a panoply of quantum objects
Authors:
Akshay Bansal,
Ian George,
Soumik Ghosh,
Jamie Sikora,
Alice Zheng
Abstract:
In many quantum tasks, there is an unknown quantum object that one wishes to learn. An online strategy for this task involves adaptively refining a hypothesis to reproduce such an object or its measurement statistics. A common evaluation metric for such a strategy is its regret, or roughly the accumulated errors in hypothesis statistics. We prove a sublinear regret bound for learning over general…
▽ More
In many quantum tasks, there is an unknown quantum object that one wishes to learn. An online strategy for this task involves adaptively refining a hypothesis to reproduce such an object or its measurement statistics. A common evaluation metric for such a strategy is its regret, or roughly the accumulated errors in hypothesis statistics. We prove a sublinear regret bound for learning over general subsets of positive semidefinite matrices via the regularized-follow-the-leader algorithm and apply it to various settings where one wishes to learn quantum objects. For concrete applications, we present a sublinear regret bound for learning quantum states, effects, channels, interactive measurements, strategies, co-strategies, and the collection of inner products of pure states. Our bound applies to many other quantum objects with compact, convex representations. In proving our regret bound, we establish various matrix analysis results useful in quantum information theory. This includes a generalization of Pinsker's inequality for arbitrary positive semidefinite operators with possibly different traces, which may be of independent interest and applicable to more general classes of divergences.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
IndicVoices: Towards building an Inclusive Multilingual Speech Dataset for Indian Languages
Authors:
Tahir Javed,
Janki Atul Nawale,
Eldho Ittan George,
Sakshi Joshi,
Kaushal Santosh Bhogale,
Deovrat Mehendale,
Ishvinder Virender Sethi,
Aparna Ananthanarayanan,
Hafsah Faquih,
Pratiti Palit,
Sneha Ravishankar,
Saranya Sukumaran,
Tripura Panchagnula,
Sunjay Murali,
Kunal Sharad Gandhi,
Ambujavalli R,
Manickam K M,
C Venkata Vaijayanthi,
Krishnan Srinivasa Raghavan Karunganni,
Pratyush Kumar,
Mitesh M Khapra
Abstract:
We present INDICVOICES, a dataset of natural and spontaneous speech containing a total of 7348 hours of read (9%), extempore (74%) and conversational (17%) audio from 16237 speakers covering 145 Indian districts and 22 languages. Of these 7348 hours, 1639 hours have already been transcribed, with a median of 73 hours per language. Through this paper, we share our journey of capturing the cultural,…
▽ More
We present INDICVOICES, a dataset of natural and spontaneous speech containing a total of 7348 hours of read (9%), extempore (74%) and conversational (17%) audio from 16237 speakers covering 145 Indian districts and 22 languages. Of these 7348 hours, 1639 hours have already been transcribed, with a median of 73 hours per language. Through this paper, we share our journey of capturing the cultural, linguistic and demographic diversity of India to create a one-of-its-kind inclusive and representative dataset. More specifically, we share an open-source blueprint for data collection at scale comprising of standardised protocols, centralised tools, a repository of engaging questions, prompts and conversation scenarios spanning multiple domains and topics of interest, quality control mechanisms, comprehensive transcription guidelines and transcription tools. We hope that this open source blueprint will serve as a comprehensive starter kit for data collection efforts in other multilingual regions of the world. Using INDICVOICES, we build IndicASR, the first ASR model to support all the 22 languages listed in the 8th schedule of the Constitution of India. All the data, tools, guidelines, models and other materials developed as a part of this work will be made publicly available
△ Less
Submitted 4 March, 2024;
originally announced March 2024.
-
Modulation Graphs in Popular Music
Authors:
Jason I. Brown,
Ian George
Abstract:
In this paper, graph theory is used to explore the musical notion of tonal modulation, in theory and application. We define (pivot) modulation graphs based on the common scales used in popular music. Properties and parameters of these graphs are discussed. We also investigate modulation graphs for the canon of Lennon-McCartney songs in the works of The Beatles. Our approach may provide composers w…
▽ More
In this paper, graph theory is used to explore the musical notion of tonal modulation, in theory and application. We define (pivot) modulation graphs based on the common scales used in popular music. Properties and parameters of these graphs are discussed. We also investigate modulation graphs for the canon of Lennon-McCartney songs in the works of The Beatles. Our approach may provide composers with mathematical insights into pivot modulation.
△ Less
Submitted 22 June, 2023;
originally announced June 2023.
-
One-Shot Distributed Source Simulation: As Quantum as it Can Get
Authors:
Ian George,
Min-Hsiu Hsieh,
Eric Chitambar
Abstract:
Distributed source simulation is the task where two (or more) parties share some correlated randomness and use local operations and no communication to convert this into some target correlation. Wyner's seminal result showed that asymptotically the rate of uniform shared randomness needed for this task is given by a mutual information induced measure, now referred to as Wyner's common information.…
▽ More
Distributed source simulation is the task where two (or more) parties share some correlated randomness and use local operations and no communication to convert this into some target correlation. Wyner's seminal result showed that asymptotically the rate of uniform shared randomness needed for this task is given by a mutual information induced measure, now referred to as Wyner's common information. This asymptotic result was extended by Hayashi in the quantum setting to separable states, the largest class of states for which this task can be performed. In this work we characterize this task in the one-shot setting using the smooth entropy framework. We do this by introducing one-shot operational quantities and correlation measures that characterize them. We establish asymptotic equipartition properties for our correlation measures thereby recovering, and in fact strengthening, the aforementioned asymptotic results. In doing so, we consider technical points in one-shot network information theory and generalize the support lemma to the classical-quantum setting. We also introduce entanglement versions of the distributed source simulation task and determine bounds in this setting via quantum embezzling.
△ Less
Submitted 10 January, 2023;
originally announced January 2023.
-
Cone-Restricted Information Theory
Authors:
Ian George,
Eric Chitambar
Abstract:
The max-relative entropy and the conditional min-entropy it induces have become central to one-shot information theory. Both may be expressed in terms of a conic program over the positive semidefinite cone. Recently, it was shown that the same conic program altered to be over the separable cone admits an operational interpretation in terms of communicating classical information over a quantum chan…
▽ More
The max-relative entropy and the conditional min-entropy it induces have become central to one-shot information theory. Both may be expressed in terms of a conic program over the positive semidefinite cone. Recently, it was shown that the same conic program altered to be over the separable cone admits an operational interpretation in terms of communicating classical information over a quantum channel. In this work, we generalize this framework of replacing the cone to determine which results in quantum information theory rely upon the positive semidefinite cone and which can be generalized. We show the fully quantum Stein's lemma and asymptotic equipartition property break down if the cone exponentially increases in resourcefulness but never approximates the positive semidefinite cone. However, we show for CQ states, the separable cone is sufficient to recover the asymptotic theory, thereby drawing a strong distinction between the fully and partial quantum settings. We present parallel results for the extended conditional min-entropy. In doing so, we extend the notion of k-superpositive channels to superchannels. We also present operational uses of this framework. We first show the cone restricted min-entropy of a Choi operator captures a measure of entanglement-assisted noiseless classical communication using restricted measurements. We show that quantum majorization results naturally generalize to other cones. As a novel example, we introduce a new min-entropy-like quantity that captures the quantum majorization of quantum channels in terms of bistochastic pre-processing. Lastly, we relate this framework to general conic norms and their non-additivity. Throughout this work we emphasize the introduced measures' relationship to general convex resource theories. In particular, we look at both resource theories that capture locality and resource theories of coherence/Abelian symmetries.
△ Less
Submitted 21 January, 2024; v1 submitted 9 June, 2022;
originally announced June 2022.
-
Limits of Detecting Extraterrestrial Civilizations
Authors:
Ian George,
Xinan Chen,
Lav R. Varshney
Abstract:
The search for extraterrestrial intelligence (SETI) is a scientific endeavor which struggles with unique issues -- a strong indeterminacy in what data to look for and when to do so. This has led to attempts at finding both fundamental limits of the communication between extraterrestrial intelligence and human civilizations, as well as benchmarks so as to predict what kinds of signals we might most…
▽ More
The search for extraterrestrial intelligence (SETI) is a scientific endeavor which struggles with unique issues -- a strong indeterminacy in what data to look for and when to do so. This has led to attempts at finding both fundamental limits of the communication between extraterrestrial intelligence and human civilizations, as well as benchmarks so as to predict what kinds of signals we might most expect. Previous work has been formulated in terms of the information-theoretic task of communication, but we instead argue it should be viewed as a detection problem, specifically one-shot (asymmetric) hypothesis testing. With this new interpretation, we develop fundamental limits as well as provide simple examples of how to use this framework to analyze and benchmark different possible signals from extraterrestrial civilizations. We show that electromagnetic signaling for detection requires much less power than for communication, that detection as a function of power can be non-linear, and that much of the analysis in this framework may be addressed using computationally efficient optimization problems, thereby demonstrating tools for further inquiry.
△ Less
Submitted 20 July, 2021;
originally announced July 2021.
-
The Twelvefold Way of Non-Sequential Lossless Compression
Authors:
Taha Ameen ur Rahman,
Alton S. Barbehenn,
Xinan Chen,
Hassan Dbouk,
James A. Douglas,
Yuncong Geng,
Ian George,
John B. Harvill,
Sung Woo Jeon,
Kartik K. Kansal,
Kiwook Lee,
Kelly A. Levick,
Bochao Li,
Ziyue Li,
Yashaswini Murthy,
Adarsh Muthuveeru-Subramaniam,
S. Yagiz Olmez,
Matthew J. Tomei,
Tanya Veeravalli,
Xuechao Wang,
Eric A. Wayman,
Fan Wu,
Peng Xu,
Shen Yan,
Heling Zhang
, et al. (5 additional authors not shown)
Abstract:
Many information sources are not just sequences of distinguishable symbols but rather have invariances governed by alternative counting paradigms such as permutations, combinations, and partitions. We consider an entire classification of these invariances called the twelvefold way in enumerative combinatorics and develop a method to characterize lossless compression limits. Explicit computations f…
▽ More
Many information sources are not just sequences of distinguishable symbols but rather have invariances governed by alternative counting paradigms such as permutations, combinations, and partitions. We consider an entire classification of these invariances called the twelvefold way in enumerative combinatorics and develop a method to characterize lossless compression limits. Explicit computations for all twelve settings are carried out for i.i.d. uniform and Bernoulli distributions. Comparisons among settings provide quantitative insight.
△ Less
Submitted 20 January, 2021; v1 submitted 8 November, 2020;
originally announced November 2020.
-
Localization in Wireless Sensor Networks: A Survey
Authors:
Jeril Kuriakose,
Sandeep Joshi,
V. I. George
Abstract:
Localization is widely used in Wireless Sensor Networks (WSNs) to identify the current location of the sensor odes. A WSN consist of thousands of nodes that make the installation of GPS on each sensor node expensive and moreover GPS may not provide exact localization results in an indoor environment. Manually configuring location reference on each sensor node is also not possible for dense network…
▽ More
Localization is widely used in Wireless Sensor Networks (WSNs) to identify the current location of the sensor odes. A WSN consist of thousands of nodes that make the installation of GPS on each sensor node expensive and moreover GPS may not provide exact localization results in an indoor environment. Manually configuring location reference on each sensor node is also not possible for dense network. This gives rise to a problem where the sensor nodes must identify its current location without using any special hardware like GPS and without the help of manual configuration. In this paper we review the localization techniques used by wireless sensor nodes to identify their current location.
△ Less
Submitted 31 October, 2014;
originally announced October 2014.