130 resultados para OPEN QUANTUM-SYSTEMS


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis investigates how Open Government Data (OGD) concepts and practices might be implemented in the State of Qatar to achieve more transparent, effective and accountable government. The thesis concludes with recommendations as to how Qatar, as a developing country, might enhance the accessibility and usability of its OGD and implement successful and sustainable OGD systems and practices.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article describes how the media have played a key role in placing the issue of child maltreatment and the problems associated with child protection high on public and political agendas over the last 50 years. It also describes how the influence of the media is far from unambiguous. Although the media has been crucial in bringing the problems into the open, it often does so in particular ways. In being so concerned with scandals and tragedies in a variety of institutionalized and community settings, the media have portrayed the nature of child maltreatment in ways which deflect attention from many of its core characteristics and causes. A focus on the media is important because of the power the media have to help transform the private into the public, but at the same time, to undermine trust, reputation, and legitimacy of the professionals working in the field. This concern is key for those working in the child protection field and has been a source of tension in public policy in both Australia and England for many years...

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A key concept in many Information Retrieval (IR) tasks, e.g. document indexing, query language modelling, aspect and diversity retrieval, is the relevance measurement of topics, i.e. to what extent an information object (e.g. a document or a query) is about the topics. This paper investigates the interference of relevance measurement of a topic caused by another topic. For example, consider that two user groups are required to judge whether a topic q is relevant to a document d, and q is presented together with another topic (referred to as a companion topic). If different companion topics are used for different groups, interestingly different relevance probabilities of q given d can be reached. In this paper, we present empirical results showing that the relevance of a topic to a document is greatly affected by the companion topic’s relevance to the same document, and the extent of the impact differs with respect to different companion topics. We further analyse the phenomenon from classical and quantum-like interference perspectives, and connect the phenomenon to nonreality and contextuality in quantum mechanics. We demonstrate that quantum like model fits in the empirical data, could be potentially used for predicting the relevance when interference exists.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Unified Communication (UC) is the integration of two or more real time communication systems into one platform. Integrating core communication systems into one overall enterprise level system delivers more than just cost saving. These real-time interactive communication services and applications over Internet Protocol (IP) have become critical in boosting employee accessibility and efficiency, improving customer support and fostering business agility. However, some small and medium-sized businesses (SMBs) are far from implementing this solution due to the high cost of initial deployment and ongoing support. In this paper, we will discuss and demonstrate an open source UC solution, viz. “Asterisk” for use by SMBs, and report on some performance tests using SIPp. The contribution from this research is the provision of technical advice to SMBs in deploying UC, which is manageable in terms of cost, ease of deployment and support.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This chapter analyses the copyright law framework needed to ensure open access to outputs of the Australian academic and research sector such as journal articles and theses. It overviews the new knowledge landscape, the principles of copyright law, the concept of open access to knowledge, the recently developed open content models of copyright licensing and the challenges faced in providing greater access to knowledge and research outputs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This review provides details on the role of Geographical Information Systems (GIS) in current dengue surveillance systems and focuses on the application of open access GIS technology to emphasize its importance in developing countries, where the dengue burden is greatest. It also advocates for increased international collaboration in transboundary disease surveillance to confront the emerging global challenge of dengue.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

On 19 June 2015, representatives from over 40 Australian research institutions gathered in Canberra to launch their Open Data Collections. The one day event, hosted by the Australian National Data Service (ANDS), showcased to government and a range of national stakeholders the rich variety of data collections that have been generated through the Major Open Data Collections (MODC) project. Colin Eustace attended the showcase for QUT Library and presented a poster that reflected the work that he and Jodie Vaughan generated through the project. QUT’s Blueprint 4, the University’s five-year institutional strategic plan, outlines the key priorities of developing a commitment to working in partnership with industry, as well as combining disciplinary strengths with interdisciplinary application. The Division of Technology, Information and Learning Support (TILS) has undertaken a number of Australian National Data Service (ANDS) funded projects since 2009 with the aim of developing improved research data management services within the University to support these strategic aims. By leveraging existing tools and systems developed during these projects, the Major Open Data Collection (MODC) project delivered support to multi-disciplinary collaborative research activities through partnership building between QUT researchers and Queensland government agencies, in order to add to and promote the discovery and reuse of a collection of spatially referenced datasets. The MODC project built upon existing Research Data Finder infrastructure (which uses VIVO open source software, developed by Cornell University) to develop a separate collection, Spatial Data Finder (https://researchdatafinder.qut.edu.au/spatial) as the interface to display the spatial data collection. During the course of the project, 62 dataset descriptions were added to Spatial Data Finder, 7 added to Research Data Finder and two added to Software Finder, another separate collection. The project team met with 116 individual researchers and attended 13 school and faculty meetings to promote the MODC project and raise awareness of the Library’s services and resources for research data management.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Substation Automation Systems have undergone many transformational changes triggered by improvements in technologies. Prior to the digital era, it made sense to confirm that the physical wiring matched the schematic design by meticulous and laborious point to point testing. In this way, human errors in either the design or the construction could be identified and fixed prior to entry into service. However, even though modern secondary systems today are largely computerised, we are still undertaking commissioning testing using the same philosophy as if each signal were hard wired. This is slow and tedious and doesn’t do justice to modern computer systems and software automation. One of the major architectural advantages of the IEC 61850 standard is that it “abstracts” the definition of data and services independently of any protocol allowing the mapping of them to any protocol that can meet the modelling and performance requirements. On this basis, any substation element can be defined using these common building blocks and are made available at the design, configuration and operational stages of the system. The primary advantage of accessing data using this methodology rather than the traditional position method (such as DNP 3.0) is that generic tools can be created to manipulate data. Self-describing data contains the information that these tools need to manipulate different data types correctly. More importantly, self-describing data makes the interface between programs robust and flexible. This paper proposes that the improved data definitions and methods for dealing with this data within a tightly bound and compliant IEC 61850 Substation Automation System could completely revolutionise the need to test systems when compared to traditional point to point methods. Using the outcomes of an undergraduate thesis project, we can demonstrate with some certainty that it is possible to automatically test the configuration of a protection relay by comparing the IEC 61850 configuration extracted from the relay against its SCL file for multiple relay vendors. The software tool provides a quick and automatic check that the data sets on a particular relay are correct according to its CID file, thus ensuring that no unexpected modifications are made at any stage of the commissioning process. This tool has been implemented in a Java programming environment using an open source IEC 61850 library to facilitate the server-client association with the relay.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

What type of probability theory best describes the way humans make judgments under uncertainty and decisions under conflict? Although rational models of cognition have become prominent and have achieved much success, they adhere to the laws of classical probability theory despite the fact that human reasoning does not always conform to these laws. For this reason we have seen the recent emergence of models based on an alternative probabilistic framework drawn from quantum theory. These quantum models show promise in addressing cognitive phenomena that have proven recalcitrant to modeling by means of classical probability theory. This review compares and contrasts probabilistic models based on Bayesian or classical versus quantum principles, and highlights the advantages and disadvantages of each approach.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Blasting is an integral part of large-scale open cut mining that often occurs in close proximity to population centers and often results in the emission of particulate material and gases potentially hazardous to health. Current air quality monitoring methods rely on limited numbers of fixed sampling locations to validate a complex fluid environment and collect sufficient data to confirm model effectiveness. This paper describes the development of a methodology to address the need of a more precise approach that is capable of characterizing blasting plumes in near-real time. The integration of the system required the modification and integration of an opto-electrical dust sensor, SHARP GP2Y10, into a small fixed-wing and multi-rotor copter, resulting in the collection of data streamed during flight. The paper also describes the calibration of the optical sensor with an industry grade dust-monitoring device, Dusttrak 8520, demonstrating a high correlation between them, with correlation coefficients (R2) greater than 0.9. The laboratory and field tests demonstrate the feasibility of coupling the sensor with the UAVs. However, further work must be done in the areas of sensor selection and calibration as well as flight planning.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum computers. We demonstrate the practicality of post-quantum key exchange by constructing cipher suites for the Transport Layer Security (TLS) protocol that provide key exchange based on the ring learning with errors (R-LWE) problem, we accompany these cipher suites with a rigorous proof of security. Our approach ties lattice-based key exchange together with traditional authentication using RSA or elliptic curve digital signatures: the post-quantum key exchange provides forward secrecy against future quantum attackers, while authentication can be provided using RSA keys that are issued by today's commercial certificate authorities, smoothing the path to adoption. Our cryptographically secure implementation, aimed at the 128-bit security level, reveals that the performance price when switching from non-quantum-safe key exchange is not too high. With our R-LWE cipher suites integrated into the Open SSL library and using the Apache web server on a 2-core desktop computer, we could serve 506 RLWE-ECDSA-AES128-GCM-SHA256 HTTPS connections per second for a 10 KiB payload. Compared to elliptic curve Diffie-Hellman, this means an 8 KiB increased handshake size and a reduction in throughput of only 21%. This demonstrates that provably secure post-quantum key-exchange can already be considered practical.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Research on development of efficient passivation materials for high performance and stable quantum dot sensitized solar cells (QDSCs) is highly important. While ZnS is one of the most widely used passivation material in QDSCs, an alternative material based on ZnSe which was deposited on CdS/CdSe/TiO2 photoanode to form a semi-core/shell structure has been found to be more efficient in terms of reducing electron recombination in QDSCs in this work. It has been found that the solar cell efficiency was improved from 1.86% for ZnSe0 (without coating) to 3.99% using 2 layers of ZnSe coating (ZnSe2) deposited by successive ionic layer adsorption and reaction (SILAR) method. The short circuit current density (Jsc) increased nearly 1-fold (from 7.25 mA/cm2 to13.4 mA/cm2), and the open circuit voltage (Voc) was enhanced by 100 mV using ZnSe2 passivation layer compared to ZnSe0. Studies on the light harvesting efficiency (ηLHE) and the absorbed photon-to-current conversion efficiency (APCE) have revealed that the ZnSe coating layer caused the enhanced ηLHE at wavelength beyond 500 nm and a significant increase of the APCE over the spectrum 400−550 nm. A nearly 100% APCE was obtained with ZnSe2, indicating the excellent charge injection and collection process in the device. The investigation on charge transport and recombination of the device has indicated that the enhanced electron collection efficiency and reduced electron recombination should be responsible for the improved Jsc and Voc of the QDSCs. The effective electron lifetime of the device with ZnSe2 was nearly 6 times higher than ZnSe0 while the electron diffusion coefficient was largely unaffected by the coating. Study on the regeneration of QDs after photoinduced excitation has indicated that the hole transport from QDs to the reduced species (S2−) in electrolyte was very efficient even when the QDs were coated with a thick ZnSe shell (three layers). For comparison, ZnS coated CdS/CdSe sensitized solar cell with optimum shell thickness was also fabricated, which generated a lower energy conversion efficiency (η = 3.43%) than the ZnSe based QDSC counterpart due to a lower Voc and FF. This study suggests that ZnSe may be a more efficient passivation layer than ZnS, which is attributed to the type II energy band alignment of the core (CdS/CdSe quantum dots) and passivation shell (ZnSe) structure, leading to more efficient electron−hole separation and slower electron recombination.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the mining optimisation literature, most researchers focused on two strategic-level and tactical-level open-pit mine optimisation problems, which are respectively termed ultimate pit limit (UPIT) or constrained pit limit (CPIT). However, many researchers indicate that the substantial numbers of variables and constraints in real-world instances (e.g., with 50-1000 thousand blocks) make the CPIT’s mixed integer programming (MIP) model intractable for use. Thus, it becomes a considerable challenge to solve the large scale CPIT instances without relying on exact MIP optimiser as well as the complicated MIP relaxation/decomposition methods. To take this challenge, two new graph-based algorithms based on network flow graph and conjunctive graph theory are developed by taking advantage of problem properties. The performance of our proposed algorithms is validated by testing recent large scale benchmark UPIT and CPIT instances’ datasets of MineLib in 2013. In comparison to best known results from MineLib, it is shown that the proposed algorithms outperform other CPIT solution approaches existing in the literature. The proposed graph-based algorithms leads to a more competent mine scheduling optimisation expert system because the third-party MIP optimiser is no longer indispensable and random neighbourhood search is not necessary.