926 resultados para tolerant quantum computation
Resumo:
We present the quantum theory of the far-off-resonance continuous-wave Raman laser using the Heisenberg-Langevin approach. We show that the simplified quantum Langevin equations for this system are mathematically identical to those of the nondegenerate optical parametric oscillator in the time domain with the following associations: pump pump, Stokes signal, and Raman coherence idler. We derive analytical results for both the steady-state behavior and the time-dependent noise spectra, using standard linearization procedures. In the semiclassical limit, these results match with previous purely semiclassical treatments, which yield excellent agreement with experimental observations. The analytical time-dependent results predict perfect photon statistics conversion from the pump to the Stokes and nonclassical behavior under certain operational conditions.
Resumo:
We investigate coherent electron transport through a parallel circuit of two quantum dots (QDs), each of which has a single tunable. energy level. Electrons tunnelling via each dot from the left lead interfere with each other at the right lead. It is shown that due to the quantum interference of tunnelling electrons the double QD device is magnetically polarized by coherent circulation of electrons on the closed path through the dots and the leads. By varying the energy level of each dot one can make the magnetic states of the device be up-, non- or down-polarized. It is shown that for experimentally accessible temperatures and applied biases the magnetic polarization currents Should be sufficiently large to observe with current nanotechnology.
Resumo:
A new high throughput and scalable architecture for unified transform coding in H.264/AVC is proposed in this paper. Such flexible structure is capable of computing all the 4x4 and 2x2 transforms for Ultra High Definition Video (UHDV) applications (4320x7680@ 30fps) in real-time and with low hardware cost. These significantly high performance levels were proven with the implementation of several different configurations of the proposed structure using both FPGA and ASIC 90 nm technologies. In addition, such experimental evaluation also demonstrated the high area efficiency of theproposed architecture, which in terms of Data Throughput per Unit of Area (DTUA) is at least 1.5 times more efficient than its more prominent related designs(1).
Resumo:
Purpose - To study the influence of protein structure on the immunogenicity in wildtype and immune tolerant mice of well-characterized degradation products of recombinant human interferon alpha2b (rhIFNα2b). Methods - RhIFNα2b was degraded by metal catalyzed oxidation (M), crosslinking with glutaraldehyde (G), oxidation with hydrogen peroxide (H) and incubation in a boiling water bath (B). The products were characterized with UV absorption, circular dichroism and fluorescence spectroscopy, gel permeation chromatography, reversed-phase HPLC, SDS-PAGE, Western blotting and mass spectrometry. The immunogenicity of the products was evaluated in wildtype mice and in transgenic mice immune tolerant for hIFNα2. Serum antibodies were detected by ELISA or surface plasmon resonance. Results - M-rhIFNα2b contained covalently aggregated rhIFNα2b with three methionines partly oxidized to methionine sulfoxides. G-rhIFNα2b contained covalent aggregates and did not show changes in secondary structure. H-rhIFNα2b was only chemically changed with four partly oxidized methionines. B-rhIFNα2b was largely unfolded and heavily aggregated. Native (N) rhIFNα2b was immunogenic in the wildtype mice but not in the transgenic mice, showing that the latter were immune tolerant for rhIFNα2b. The antirhIFNα2b antibody levels in the wildtype mice depended on the degradation product: M-rhIFNα2b > H-rhIFNα2b ~ N-rhIFNα2b >> B-rhIFNα2b; G-rhIFNα2b did not induce anti-rhIFNα2b antibodies. In the transgenic mice, only M-rhIFNα2b could break the immune tolerance. Conclusions - RhIFNα2b immunogenicity is related to its structural integrity. Moreover, the immunogenicity of aggregated rhIFNα2b depends on the structure and orientation of the constituent protein molecules and/or on the aggregate size.
Resumo:
Purpose: This study was conducted to study the influence of protein structure on the immunogenicity in wild-type and immune tolerant mice of well-characterized degradation products of recombinant human interferon alpha2b (rhIFNα2b). Methods: RhIFNα2b was degraded by metal-catalyzed oxidation (M), cross-linking with glutaraldehyde (G), oxidation with hydrogen peroxide (H), and incubation in a boiling water bath (B). The products were characterized with UV absorption, circular dichroism and fluorescence spectroscopy, gel permeation chromatography, reverse-phase high-pressure liquid chromatography, sodium dodecyl sulfate polyacrylamide gel electrophoresis, Western blotting, and mass spectrometry. The immunogenicity of the products was evaluated in wild-type mice and in transgenic mice immune tolerant for hIFNα2. Serum antibodies were detected by enzyme-linked immunosorbent assay or surface plasmon resonance. Results: M-rhIFNα2b contained covalently aggregated rhIFNα2b with three methionines partly oxidized to methionine sulfoxides. G-rhIFNα2b contained covalent aggregates and did not show changes in secondary structure. H-rhIFNα2b was only chemically changed with four partly oxidized methionines. B-rhIFNα2b was largely unfolded and heavily aggregated. Nontreated (N) rhIFNα2b was immunogenic in the wild-type mice but not in the transgenic mice, showing that the latter were immune tolerant for rhIFNα2b. The anti-rhIFNα2b antibody levels in the wild-type mice depended on the degradation product: M-rhIFNα2b > H-rhIFNα2b ∼ N-rhIFNα2b ≫ B-rhIFNα2b; G-rhIFNα2b did not induce anti-rhIFNα2b antibodies. In the transgenic mice, only M-rhIFNα2b could break the immune tolerance. Conclusions: RhIFNα2b immunogenicity is related to its structural integrity. Moreover, the immunogenicity of aggregated rhIFNα2b depends on the structure and orientation of the constituent protein molecules and/or on the aggregate size.
Resumo:
A new high performance architecture for the computation of all the DCT operations adopted in the H.264/AVC and HEVC standards is proposed in this paper. Contrasting to other dedicated transform cores, the presented multi-standard transform architecture is supported on a completely configurable, scalable and unified structure, that is able to compute not only the forward and the inverse 8×8 and 4×4 integer DCTs and the 4×4 and 2×2 Hadamard transforms defined in the H.264/AVC standard, but also the 4×4, 8×8, 16×16 and 32×32 integer transforms adopted in HEVC. Experimental results obtained using a Xilinx Virtex-7 FPGA demonstrated the superior performance and hardware efficiency levels provided by the proposed structure, which outperforms its more prominent related designs by at least 1.8 times. When integrated in a multi-core embedded system, this architecture allows the computation, in real-time, of all the transforms mentioned above for resolutions as high as the 8k Ultra High Definition Television (UHDTV) (7680×4320 @ 30fps).
Resumo:
Graphics processors were originally developed for rendering graphics but have recently evolved towards being an architecture for general-purpose computations. They are also expected to become important parts of embedded systems hardware -- not just for graphics. However, this necessitates the development of appropriate timing analysis techniques which would be required because techniques developed for CPU scheduling are not applicable. The reason is that we are not interested in how long it takes for any given GPU thread to complete, but rather how long it takes for all of them to complete. We therefore develop a simple method for finding an upper bound on the makespan of a group of GPU threads executing the same program and competing for the resources of a single streaming multiprocessor (whose architecture is based on NVIDIA Fermi, with some simplifying assunptions). We then build upon this method to formulate the derivation of the exact worst-case makespan (and corresponding schedule) as an optimization problem. Addressing the issue of tractability, we also present a technique for efficiently computing a safe estimate of the worstcase makespan with minimal pessimism, which may be used when finding an exact value would take too long.
Resumo:
Consider a wireless sensor network (WSN) where a broadcast from a sensor node does not reach all sensor nodes in the network; such networks are often called multihop networks. Sensor nodes take individual sensor readings, however, in many cases, it is relevant to compute aggregated quantities of these readings. In fact, the minimum and maximum of all sensor readings at an instant are often interesting because they indicate abnormal behavior, for example if the maximum temperature is very high then it may be that a fire has broken out. In this context, we propose an algorithm for computing the min or max of sensor readings in a multihop network. This algorithm has the particularly interesting property of having a time complexity that does not depend on the number of sensor nodes; only the network diameter and the range of the value domain of sensor readings matter.
Resumo:
This paper presents solutions for fault detection and diagnosis of two-level, three phase voltage-source inverter (VSI) topologies with IGBT devices. The proposed solutions combine redundant standby VSI structures and contactors (or relays) to improve the fault-tolerant capabilities of power electronics in applications with safety requirements. The suitable combination of these elements gives the inverter the ability to maintain energy processing in the occurrence of several failure modes, including short-circuit in IGBT devices, thus extending its reliability and availability. A survey of previously developed fault-tolerant VSI structures and several aspects of failure modes, detection and isolation mechanisms within VSI is first discussed. Hardware solutions for the protection of power semiconductors with fault detection and diagnosis mechanisms are then proposed to provide conditions to isolate and replace damaged power devices (or branches) in real time. Experimental results from a prototype are included to validate the proposed solutions.
Resumo:
This paper presents a brief history of the western music: from its genesis to serialism and the Darmstadt school. Also some mathematical aspects of music are then presented and confronted with music as a form of art. The question is, are these two distinct aspects compatible? Can computers be of real help in automatic composition? The more appealing algorithmic approach is evolutionary computation as it offers creativity potential. Therefore, the Evolutionary Algorithms are then introduced and some results of GAs and GPs application to music generation are analysed.
Resumo:
Dissertação apresentada na Faculdade de Ciências e Tecnologia da Universidade Nova de Lisboa para obtenção do grau de Mestre em Biotecnologia
Resumo:
To increase the amount of logic available in SRAM-based FPGAs manufacturers are using nanometric technologies to boost logic density and reduce prices. However, nanometric scales are highly vulnerable to radiation-induced faults that affect values stored in memory cells. Since the functional definition of FPGAs relies on memory cells, they become highly prone to this type of faults. Fault tolerant implementations, based on triple modular redundancy (TMR) infrastructures, help to keep the correct operation of the circuit. However, TMR is not sufficient to guarantee the safe operation of a circuit. Other issues like the effects of multi-bit upsets (MBU) or fault accumulation, have also to be addressed. Furthermore, in case of a fault occurrence the correct operation of the affected module must be restored and the current state of the circuit coherently re-established. A solution that enables the autonomous correct restoration of the functional definition of the affected module, avoiding fault accumulation, re-establishing the correct circuit state in realtime, while keeping the normal operation of the circuit, is presented in this paper.
Resumo:
To increase the amount of logic available to the users in SRAM-based FPGAs, manufacturers are using nanometric technologies to boost logic density and reduce costs, making its use more attractive. However, these technological improvements also make FPGAs particularly vulnerable to configuration memory bit-flips caused by power fluctuations, strong electromagnetic fields and radiation. This issue is particularly sensitive because of the increasing amount of configuration memory cells needed to define their functionality. A short survey of the most recent publications is presented to support the options assumed during the definition of a framework for implementing circuits immune to bit-flips induction mechanisms in memory cells, based on a customized redundant infrastructure and on a detection-and-fix controller.
Resumo:
Abstract Background: Nanotechnology has the potential to provide agriculture with new tools that may be used in the rapid detection and molecular treatment of diseases and enhancement of plant ability to absorb nutrients, among others. Data on nanoparticle toxicity in plants is largely heterogeneous with a diversity of physicochemical parameters reported, which difficult generalizations. Here a cell biology approach was used to evaluate the impact of Quantum Dots (QDs) nanocrystals on plant cells, including their effect on cell growth, cell viability, oxidative stress and ROS accumulation, besides their cytomobility. Results: A plant cell suspension culture of Medicago sativa was settled for the assessment of the impact of the addition of mercaptopropanoic acid coated CdSe/ZnS QDs. Cell growth was significantly reduced when 100 mM of mercaptopropanoic acid -QDs was added during the exponential growth phase, with less than 50% of the cells viable 72 hours after mercaptopropanoic acid -QDs addition. They were up taken by Medicago sativa cells and accumulated in the cytoplasm and nucleus as revealed by optical thin confocal imaging. As part of the cellular response to internalization, Medicago sativa cells were found to increase the production of Reactive Oxygen Species (ROS) in a dose and time dependent manner. Using the fluorescent dye H2DCFDA it was observable that mercaptopropanoic acid-QDs concentrations between 5-180 nM led to a progressive and linear increase of ROS accumulation. Conclusions: Our results showed that the extent of mercaptopropanoic acid coated CdSe/ZnS QDs cytotoxicity in plant cells is dependent upon a number of factors including QDs properties, dose and the environmental conditions of administration and that, for Medicago sativa cells, a safe range of 1-5 nM should not be exceeded for biological applications.
Resumo:
In the last decade, both scientific community and automotive industry enabled communications among vehicles in different kinds of scenarios proposing different vehicular architectures. Vehicular delay-tolerant networks (VDTNs) were proposed as a solution to overcome some of the issues found in other vehicular architectures, namely, in dispersed regions and emergency scenarios. Most of these issues arise from the unique characteristics of vehicular networks. Contrary to delay-tolerant networks (DTNs), VDTNs place the bundle layer under the network layer in order to simplify the layered architecture and enable communications in sparse regions characterized by long propagation delays, high error rates, and short contact durations. However, such characteristics turn contacts very important in order to exchange as much information as possible between nodes at every contact opportunity. One way to accomplish this goal is to enforce cooperation between network nodes. To promote cooperation among nodes, it is important that nodes share their own resources to deliver messages from others. This can be a very difficult task, if selfish nodes affect the performance of cooperative nodes. This paper studies the performance of a cooperative reputation system that detects, identify, and avoid communications with selfish nodes. Two scenarios were considered across all the experiments enforcing three different routing protocols (First Contact, Spray and Wait, and GeoSpray). For both scenarios, it was shown that reputation mechanisms that punish aggressively selfish nodes contribute to increase the overall network performance.