996 resultados para Q-BITS


Relevância:

60.00% 60.00%

Publicador:

Resumo:

A demanda crescente por poder computacional estimulou a pesquisa e desenvolvimento de processadores digitais cada vez mais densos em termos de transistores e com clock mais rápido, porém não podendo desconsiderar aspectos limitantes como consumo, dissipação de calor, complexidade fabril e valor comercial. Em outra linha de tratamento da informação, está a computação quântica, que tem como repositório elementar de armazenamento a versão quântica do bit, o q-bit ou quantum bit, guardando a superposição de dois estados, diferentemente do bit clássico, o qual registra apenas um dos estados. Simuladores quânticos, executáveis em computadores convencionais, possibilitam a execução de algoritmos quânticos mas, devido ao fato de serem produtos de software, estão sujeitos à redução de desempenho em razão do modelo computacional e limitações de memória. Esta Dissertação trata de uma versão implementável em hardware de um coprocessador para simulação de operações quânticas, utilizando uma arquitetura dedicada à aplicação, com possibilidade de explorar o paralelismo por replicação de componentes e pipeline. A arquitetura inclui uma memória de estado quântico, na qual são armazenados os estados individuais e grupais dos q-bits; uma memória de rascunho, onde serão armazenados os operadores quânticos para dois ou mais q-bits construídos em tempo de execução; uma unidade de cálculo, responsável pela execução de produtos de números complexos, base dos produtos tensoriais e matriciais necessários à execução das operações quânticas; uma unidade de medição, necessária à determinação do estado quântico da máquina; e, uma unidade de controle, que permite controlar a operação correta dos componente da via de dados, utilizando um microprograma e alguns outros componentes auxiliares.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In the past decades, all of the efforts at quantifying systems complexity with a general tool has usually relied on using Shannon's classical information framework to address the disorder of the system through the Boltzmann-Gibbs-Shannon entropy, or one of its extensions. However, in recent years, there were some attempts to tackle the quantification of algorithmic complexities in quantum systems based on the Kolmogorov algorithmic complexity, obtaining some discrepant results against the classical approach. Therefore, an approach to the complexity measure is proposed here, using the quantum information formalism, taking advantage of the generality of the classical-based complexities, and being capable of expressing these systems' complexity on other framework than its algorithmic counterparts. To do so, the Shiner-Davison-Landsberg (SDL) complexity framework is considered jointly with linear entropy for the density operators representing the analyzed systems formalism along with the tangle for the entanglement measure. The proposed measure is then applied in a family of maximally entangled mixed state.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Nesta dissertação apresentamos um trabalho de desenvolvimento e utilização de pulsos de radiofreqüência modulados simultaneamente em freqüência, amplitude e fase (pulsos fortemente modulados, SMP, do inglês Strongly Modulated Pulses) para criar estados iniciais e executar operações unitárias que servem como blocos básicos para processamento da informação quântica utilizando Ressonância Magnética Nuclear (RMN). As implementações experimentais foram realizas em um sistema de 3 q-bits constituído por spins nucleares de Césio 133 (spin nuclear 7/2) em uma amostra de cristal líquido em fase nemática. Os pulsos SMP´s foram construídos teoricamente utilizando um programa especialmente desenvolvido para esse fim, sendo o mesmo baseado no processo de otimização numérica Simplex Nelder-Mead. Através deste programa, os pulsos SMP foram otimizados de modo a executarem as operações lógicas desejadas com durações consideravelmente menores que aquelas realizadas usando o procedimento usual de RMN, ou seja, seqüências de pulsos e evoluções livres. Isso tem a vantagem de reduzir os efeitos de descoerência decorrentes da relaxação do sistema. Os conceitos teóricos envolvidos na criação dos SMPs são apresentados e as principais dificuldades (experimentais e teóricas) que podem surgir devido ao uso desses procedimentos são discutidas. Como exemplos de aplicação, foram produzidos os estados pseudo-puros usados como estados iniciais de operações lógicas em RMN, bem como operações lógicas que foram posteriormente aplicadas aos mesmos. Utilizando os SMP\'s também foi possível realizar experimentalmente os algoritmos quânticos de Grover e Deutsch-Jozsa para 3 q-bits. A fidelidade das implementações experimentais foi determinadas utilizando as matrizes densidade experimentais obtidas utilizando um método de tomografia da matriz densidade previamente desenvolvido.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The introduction of electronically-active heteroanions into polyoxometalates (POMs) is one of the emerging topics in this field. The novel clusters have shown unprecedented intramolecular electron-transfer features that can be directly mediated by the incorporated heteroanions. In this thesis, we will focus on the study of phosphite (HPO32-) as new non-traditional heteroanions, discover HPO32- templated nanostructures, investigate their electronic behaviours as well as understand the self-assembly process of HPO32--templated species. The thesis starts with incorporating HPO32- into POM cages. The feasibility of this work was illustrated by the successful trapping of HPO32- into a “Trojan Horse” type {W18O56} nanocage. The reactivity of embedded {HPO3} was fully studied, showing the cluster undergoes a structural rearrangement in solution whereby the {HPO3} moieties dimerise to form a weakly interacting (O3PH···HPO3) moiety. In the crystalline state a temperature-dependent intramolecular redox reaction and structural rearrangement occurs. This rearrangement appears to proceed via an intermediate containing two different templates, a pyramidal {HPO3} and a tetrahedral {PO4} moiety. {HPO3} templated POM cages were then vigorously expanded and led to the isolation of five either fully oxidised or mixed-valence clusters trapped with mono-, di-, or tri- {HPO3}. Interestingly, an intriguing 3D honeycomb-like host-guest structure was also synthesised. The porous framework was self-aggregated by a tri-phopshite anion templated {W21} cluster with a {VO4} templated Wells-Dawson type {W18} acting as a guest species within the hexagonal channels. Based on this work, we further extended the templating anions to two different redox-active heteroanions, and discovered a unique mixed-heteroatom templated system built by pairing redox-active {HPIIIO3} with {TeO3}, {SeO3} or {AsO3}. Two molecular systems were developed, ie. “Trojan Horse” type [W18O56(HPO3)0.8(SeO3)1.2(H2O)2]8- and cross-shaped [H4P4X4W64O224]32-/36-, where X=TeIV, SeIV, AsIII. In the case of {W18(HPO3)0.8(SeO3)1.2}, the compound is found to be a mixture of heteroleptic {W18(HPO3)(SeO3)} and homoleptic {W18(SeO3)2} and {W18(HPO3)2}, identified by single crystal x-ray diffraction, NMR as well as high resolution mass spectrometry. The cluster exhibited similar temperature-dependent electronic features to “Trojan Horse” type {W18(HPO3)2O56}. However, due to the intrinsic reactivity difference between {HPO3} and {SeO3}, the thermal treatment leads to the formation of an unusual species [W18O55(PO4)(SeO3)]5-, in which {HPO3} was fully oxidised to {PO4} within the cage, whereas and lone-pair-containing {SeO3} heteroanions were kept intact inside the shell. This finding is extremely interesting, as it demonstrated that multiple and independent intramolecular electronic performance can be achieved by the coexistence of distinct heteroatoms within a single molecule. On the other hand, the cross-shaped [H4P4X4W64O224]32-/36- were constructed by four {W15(HPO3)(XO3)} building units linked by four {WO6} octahedra. Each building unit traps two different heteroatoms. It is interesting to note that the mixed heteroatom species show self-sorting, with a highly selective positional preference. Smaller ionic sized {HPO3} are self-organised into the uncapped side of {W15} cavity, whereas closed side are occupied by larger heteroatoms, which is surprisingly opposed to steric hindrance. Density functional theory (DFT) calculations are currently underway to have a full understanding of the preference of heteroatom substitutions. This series of clusters is of great interest in terms of achieving single molecule-based heteroatom-dependent multiple levels of electron transfer. It has opened a new way to design and synthesise POMs with higher diversity of electrical states, which may lead to a new type of Q-bits for quantum computing. The third chapter is focused on developing polyoxotungstate building blocks templated by {HPO3}. A series of building blocks, {W15O48(HPO3)2}, {W9O30(HPO3)} {W12O40(HPO3)2} and hexagonal {W6O18(HPO3)} have been obtained. The first four building blocks have been reported with {SeO3} and/or {TeO3} heteroanions. This result demonstrates {HPO3} has a similar reactivity as {SeO3} and {TeO3}, therefore studying the self-assembly of {HPO3}-based building blocks would be helpful to have a general understanding of pyramidal heteroatom-based molecular systems. The hexagonal {W6O18(HPO3)} is observed for the first time in polyoxotungstates, showing some of reactivity difference between {HPO3} and {SeO3} and {TeO3}. Furthermore, inorganic salts and pH values have some directing influence on the formation and transformation of various building blocks, resulting in the discovery of a family of {HPO3}-based clusters with nuclearity ranging from {W29} to {W106}. High resolution mass spectrometry was also carried out to investigate the cluster solution behaviour and also gain information of building block speciation. It is found that some clusters experienced decomposition, which gives rise to potential building blocks accountable for the self-assembly.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Questa Tesi aspira a mostrare un codice a livello di pacchetto, che abbia performance molto vicine a quello ottimo, per progetti di comunicazioni Satellitari. L’altro scopo di questa Tesi è quello di capire se rimane ancora molto più difficile maneggiare direttamente gli errori piuttosto che le erasures. Le applicazioni per comunicazioni satellitari ora come ora usano tutte packet erasure coding per codificare e decodificare l’informazione. La struttura dell’erasure decoding è molto semplice, perché abbiamo solamente bisogno di un Cyclic Redundancy Check (CRC) per realizzarla. Il problema nasce quando abbiamo pacchetti di dimensioni medie o piccole (per esempio più piccole di 100 bits) perché in queste situazioni il costo del CRC risulta essere troppo dispendioso. La soluzione la possiamo trovare utilizzando il Vector Symbol Decoding (VSD) per raggiungere le stesse performance degli erasure codes, ma senza la necessità di usare il CRC. Per prima cosa viene fatta una breve introduzione su come è nata e su come si è evoluta la codifica a livello di pacchetto. In seguito è stato introdotto il canale q-ary Symmetric Channel (qSC), con sia la derivazione della sua capacità che quella del suo Random Coding Bound (RCB). VSD è stato poi proposto con la speranza di superare in prestazioni il Verification Based Decoding (VBD) su il canale qSC. Infine, le effettive performance del VSD sono state stimate via simulazioni numeriche. I possibili miglioramenti delle performance, per quanto riguarda il VBD sono state discusse, come anche le possibili applicazioni future. Inoltre abbiamo anche risposto alla domande se è ancora così tanto più difficile maneggiare gli errori piuttosto che le erasure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

CFO and I/Q mismatch could cause significant performance degradation to OFDM systems. Their estimation and compensation are generally difficult as they are entangled in the received signal. In this paper, we propose some low-complexity estimation and compensation schemes in the receiver, which are robust to various CFO and I/Q mismatch values although the performance is slightly degraded for very small CFO. These schemes consist of three steps: forming a cosine estimator free of I/Q mismatch interference, estimating I/Q mismatch using the estimated cosine value, and forming a sine estimator using samples after I/Q mismatch compensation. These estimators are based on the perception that an estimate of cosine serves much better as the basis for I/Q mismatch estimation than the estimate of CFO derived from the cosine function. Simulation results show that the proposed schemes can improve system performance significantly, and they are robust to CFO and I/Q mismatch.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cutaneous malignant melanoma (CMM) is a major health issue in Queensland, Australia, which has the world’s highest incidence. Recent molecular and epidemiologic studies suggest that CMM arises through multiple etiological pathways involving gene-environment interactions. Understanding the potential mechanisms leading to CMM requires larger studies than those previously conducted. This article describes the design and baseline characteristics of Q-MEGA, the Queensland Study of Melanoma: Environmental and Genetic Associations, which followed up 4 population-based samples of CMM patients in Queensland, including children, adolescents, men aged over 50, and a large sample of adult cases and their families, including twins. Q-MEGA aims to investigate the roles of genetic and environmental factors, and their interaction, in the etiology of melanoma. Three thousand, four hundred and seventy-one participants took part in the follow-up study and were administered a computer-assisted telephone interview in 2002-2005. Updated data on environmental and phenotypic risk factors, and 2777 blood samples were collected from interviewed participants as well as a subset of relatives. This study provides a large and well-described population-based sample of CMM cases with follow-up data. Characteristics of the cases and repeatability of sun exposure and phenotype measures between the baseline and the follow-up surveys, from 6 to 17 years later, are also described.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Staff from QUT’s Creative Industries Faculty (Drama, Film & TV) collaborated with CARRS-Q (Centre for Accident Research and Road Safety – Queensland) to research, develop and produce a series of screen products. These products are designed to profile CARRS-Q for a variety of Australian and international audiences including potential students, research colleagues and collaborators, industry partners and professional bodies. They are designed for multiplatform display, including web, DVD and mobile devices. This project entails the adoption of practice-led research methodologies to explore and apply innovative screen production techniques including multi-image display; rapid-cut editing; and a combination of trained and non-trained talent.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

a presentation about immersive visualised simulation systems, image analysis and GPGPU Techonology

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Staff and students of the Surveying and Spatial Sciences discipline at QUT have worked collaboratively with the Institute of Sustainable Resources in the creation and development of spatial information layers and infrastructure to support multi-disciplinary research efforts at the Samford Ecological Research Facility (SERF). The SERF property is unique in that it provides staff and students with a semi-rural controlled research base for multiple users. This paper aims to describe the development of a number of spatial information layers and network of survey monuments that assist and support research infrastructure at SERF. A brief historical background about the facility is presented along with descriptions of the surveying and mapping activities undertaken. These broad ranging activities include introducing monument infrastructure and a geodetic control network; surveying activities for aerial photography ground-control targets including precise levelling with barcode instruments; development of an ortho-rectified image spatial information layer; Real-Time-Kinematic Global Positioning Systems (RTK-GPS) surveying for constructing 100metre confluence points/monuments to support science-based disciplines to undertake environmental research transects and long-term ecological sampling; and real-world learning initiative to assist with water engineering projects and student experiential learning. The spatial information layers and physical infrastructure have been adopted by two specific yet diverse user groups with an interest in the long-term research focus of SERF.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

[Selection of papers from the Older Road User Safety Symposium, 26 November 2000, Brisbane, Australia.]----- This publication is a selection of papers on older road user safety which were presented at the Older Road User Safety Symposium on Sunday 26 November 2000 at the Sheraton Brisbane Hotel, Queensland, Australia. The Symposium was held on the day before Australia’s annual Road Safety Research, Policing and Education Conference, which provided an opportunity to garner both presenters and participants from the wider road safety community in Australia. Road safety is a large and diverse area of scholarship and practice, and many disciplines are drawn on in the processes of understanding and addressing road safety problems. The safety of older road users is no different. As this selection shows, work on older road user safety can be informed by demography, research on the mental and physical effects of ageing, social research on older people as road users, evaluation of educational and behavioural interventions, road crash analysis, engineering research and practice, and reviews of policy approaches within Australia and elsewhere. It is possible to summarise these into four constellations, which are reflected in the papers selected for this publication: social impacts and responses; physical and cognitive capability; specific road use performance; and environment/ecology. Though three years have passed since the Symposium, the issues raised in these papers remain current.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent research on bicycle helmets and concerns about how public bicycle hire schemes will function in the context of compulsory helmet wearing laws have drawn media attention. This monograph presents the results of research commissioned by the Queensland Department of Transport and Main Roads to review the national and international literature regarding the health outcomes of cycling and bicycle helmets and examine crash and hospital data. It also includes critical examinations of the methodology used by Voukelatos and Rissel (2010), and estimates the likely effects of possible segmented approaches to bicycle helmet wearing legislation. The research concludes that current bicycle helmet wearing rates are halving the number of head injuries experienced by Queensland cyclists. Helmet wearing legislation discouraged people from cycling when it was first introduced but there is little evidence that it continues to do so. Cycling has significant health benefits and should be encouraged in ways that reduce the risk of the most serious injuries. Infrastructure and speed management approaches to improving the safety of cycling should be undertaken as part of a Safe System approach, but protection of the individual by simple and cost-effective methods such as bicycle helmets should also be part of an overall package of measures.