120 research outputs found
LASER Tech Briefs, September 1993
This edition of LASER Tech briefs contains a feature on photonics. The other topics include: Electronic Components and Circuits. Electronic Systems, Physical Sciences, Materials, Computer Programs, Mechanics, Machinery, Fabrication Technology, Mathematics and Information Sciences, Life Sciences and books and reports
Models, Algorithms, and Architectures for Scalable Packet Classification
The growth and diversification of the Internet imposes increasing demands on the performance and functionality of network infrastructure. Routers, the devices responsible for the switch-ing and directing of traffic in the Internet, are being called upon to not only handle increased volumes of traffic at higher speeds, but also impose tighter security policies and provide support for a richer set of network services. This dissertation addresses the searching tasks performed by Internet routers in order to forward packets and apply network services to packets belonging to defined traffic flows. As these searching tasks must be performed for each packet traversing the router, the speed and scalability of the solutions to the route lookup and packet classification problems largely determine the realizable performance of the router, and hence the Internet as a whole. Despite the energetic attention of the academic and corporate research communities, there remains a need for search engines that scale to support faster communication links, larger route tables and filter sets and increasingly complex filters. The major contributions of this work include the design and analysis of a scalable hardware implementation of a Longest Prefix Matching (LPM) search engine for route lookup, a survey and taxonomy of packet classification techniques, a thorough analysis of packet classification filter sets, the design and analysis of a suite of performance evaluation tools for packet classification algorithms and devices, and a new packet classification algorithm that scales to support high-speed links and large filter sets classifying on additional packet fields
Scalable Quantum Computing with Two-Dimensional Arrays of Trapped Ions Enabled by Fast Gates
Realising large-scale quantum computation in the near
future will require increasing the number of low-error two-qubit
gates that can be implemented on a quantum computer before
decoherence. One of the biggest challenges facing current trapped
ion quantum computers is implementing high-speed two-qubit
operations, whilst increasing the number of qubits. One of the
most promising proposals for overcoming current limitations is
the use of ultra-fast pulses to implement fast two-qubit gates
between nearest-neighbour pairs of ions. In this thesis, I
investigate these ‘fast gates’ in two-dimensional arrays of
microtraps, each containing a single ion. I argue that
two-dimensional architectures allow for a significant reduction
in the number of two-qubit gates required for a particular
computation, as compared to one-dimensional ion chains. I
demonstrate this reduction for a quantum simulation of a 40-mode
Fermi-Hubbard Hamiltonian. I develop an efficient scheme that
allows fast gates to be numerically optimised for two-dimensional
geometries. I find that this optimisation scheme is capable of
designing gates that are faster, higher fidelity, and require
lower laser repetition rates. Using this scheme, I find that
high-speed two-qubit gates can be optimised for two-dimensional
architectures, with fidelities well above thresholds required for
fault tolerant error correction, around 99.99%. Furthermore, I
find that fast gates in these architectures are robust to the
presence of large numbers of surrounding ions. Following previous
studies [1, 2] which have identified pulse imperfections as a
dominant source of error in fast gates, I perform a worst-case
error analysis. I find the fast gates presented in this thesis to
require very small errors in single-qubit rotations, and I
present recommendations for achieving those requirements. I also
investigate other experimental considerations, and make
recommendations for overcoming other technical challenges in
realising fast gates
Doctor of Philosophy
dissertationCormac McCarthy's novel The Crossing presents an ecocentric cosmology that diverges radically from the traditional anthropocentric model, which centralizes the primacy of humans. McCarthy's vision of "joinery" reformats the place of humanity to a position of equality with "every least thing." My focused reading of McCarthy's three novels from the Border Trilogy articulates the ramifications of this vision for a new ecological ontology, agency, and ethics. Specifically, I argue that the vision of "joinery" revises philosophies of ontology and agency to admit the force of animals and matter as co-constituting agents in a dynamically vibrant world. The attendant ethical vision from such a revised ontological and agential view centralizes the profound dilemmas inherent in so many relations. My close reading of McCarthy's novels explicates his ecological vision of "joinery" as coherent with theoretical visions espoused in Bruno Latour's Actor-Network Theory and Jane Bennett's vibrant materialisms. By weaving together an analysis of the trilogy with these frameworks, I advance a practice of reading that positions learners to think through the complexities of expansive human and non-human relations. This reading practice for thinking relational ethics ruptures many of the trends in education today that orient students in standardized and noncritical modes of learning. I argue, however, that the demands of an ecological age during a time of climate change and mass extinctions necessitates an education where students wrestle critically with the dilemmas of a world understood as interconnected
Multidimensional projections for the visual exploration of multimedia data
Multidimensional data analysis is considerably important when dealing with such large and complex datasets. Among the possibilities when analyzing such kind of data, applying visualization techniques can help the user find and understand patters, trends and establish new goals. This thesis aims to present several visualization methods to interactively explore multidimensional datasets aimed from specialized to casual users, by making use of both static and dynamic representations created by multidimensional projections
Deteção de ataques de negação de serviços distribuídos na origem
From year to year new records of the amount of traffic in an attack are established, which demonstrate not only the constant presence of distributed denialof-service attacks, but also its evolution, demarcating itself from the other network threats. The increasing importance of resource availability alongside the security debate on network devices and infrastructures is continuous, given the preponderant role in both the home and corporate domains. In the face of the constant threat, the latest network security systems have been applying pattern recognition techniques to infer, detect, and react more quickly and assertively. This dissertation proposes methodologies to infer network activities patterns, based on their traffic: follows a behavior previously defined as normal, or if there are deviations that raise suspicions about the normality of the action in the network. It seems that the future of network defense systems continues in this direction, not only by increasing amount of traffic, but also by the diversity of actions, services and entities that reflect different patterns, thus contributing to the detection of anomalous activities on the network. The methodologies propose the collection of metadata, up to the transport layer of the osi model, which will then be processed by the machien learning algorithms in order to classify the underlying action. Intending to contribute
beyond denial-of-service attacks and the network domain, the methodologies were described in a generic way, in order to be applied in other scenarios of greater or less complexity. The third chapter presents a proof of concept with attack vectors that marked the history and a few evaluation metrics that allows to compare the different classifiers as to their success rate, given the various activities in the network and inherent dynamics. The various tests show flexibility, speed and accuracy of the various classification algorithms, setting the bar between 90 and 99 percent.De ano para ano são estabelecidos novos recordes de quantidade de tráfego num ataque, que demonstram não só a presença constante de ataques de negação de serviço distribuídos, como também a sua evolução, demarcando-se das outras ameaças de rede. A crescente importância da disponibilidade de recursos a par do debate sobre a segurança nos dispositivos e infraestruturas de rede é contínuo, dado o papel preponderante tanto no dominio doméstico como no corporativo. Face à constante ameaça, os sistemas de segurança de rede mais recentes têm vindo a aplicar técnicas de reconhecimento de padrões para inferir, detetar e reagir de forma mais rápida e assertiva. Esta dissertação propõe metodologias para inferir padrões de atividades na rede, tendo por base o seu tráfego: se segue um comportamento previamente definido como normal, ou se existem desvios que levantam suspeitas sobre normalidade da ação na rede. Tudo indica que o futuro dos sistemas de defesa de rede continuará neste sentido, servindo-se não só do crescente aumento da quantidade de tráfego, como também da diversidade de ações, serviços e entidades que refletem padrões distintos contribuindo assim para a deteção de atividades anómalas na rede. As metodologias propõem a recolha de metadados, até á camada de transporte, que seguidamente serão processados pelos algoritmos de aprendizagem automática com o objectivo de classificar a ação subjacente. Pretendendo que o contributo fosse além dos ataques de negação de serviço e do dominio de rede, as metodologias foram descritas de forma tendencialmente genérica, de forma a serem aplicadas noutros cenários de maior ou menos complexidade. No quarto capítulo é apresentada
uma prova de conceito com vetores de ataques que marcaram a história e, algumas métricas de avaliação que permitem comparar os diferentes
classificadores quanto à sua taxa de sucesso, face às várias atividades na rede e inerentes dinâmicas. Os vários testes mostram flexibilidade, rapidez e precisão dos vários algoritmos de classificação, estabelecendo a fasquia entre os 90 e os 99 por cento.Mestrado em Engenharia de Computadores e Telemátic
Liquid-Solid Transitions with Applications to Self-Assembly.
We study the thermodynamic and kinetic pathways by which liquids transform into solids, and their relation to the metastable states that commonly arise in self-assembly applications. As a case study in the formation of ordered metastable solids, we investigate the atomistic mechanism by which quasicrystals form. We show that the aperiodic growth of quasicrystals is controlled by the ability of the growing quasicrystal "nucleus" to incorporate kinetically trapped atoms into the solid phase with minimal rearrangement. In a related study, we propose a two-part mechanism for forming 3d dodecagonal quasicrystals by self-assembly. Our mechanism involves (1) attaching small mobile particles to the surface of spherical particles to encourage icosahedral packing and (2) allowing a subset of particles to deviate from the ideal spherical shape, to discourage close-packing. In addition to studying metastable ordered solids, we investigate the phenomenology and mechanism of the glass transition. We report measurements of spatially heterogeneous dynamics in a system of air-driven granular beads approaching a jamming transition, and show that the dynamics in our granular system are quantitatively indistinguishable from those for a supercooled liquid approaching a glass transition. In a second study of the glass transition, we use transition path sampling to study the structure, statistics and dynamics of localized excitations for several model glass formers. We show that the excitations are sparse and localized, and their size is temperature-independent. We show that their equilibrium concentration is proportional to exp[-Ja(1/T-1/To)], where "Ja" is the energy scale for irreversible particle displacements of length "a," and "To" is an onset temperature. We show that excitation dynamics is facilitated by the presence of other excitations, causing dynamics to slow in a hierarchical way as temperature is lowered. To supplement our studies of liquid-solid transitions, we introduce a shape matching framework for characterizing structural transitions in systems with complex particle shapes or morphologies. We provide an overview of shape matching methods, explore a particular class of metrics known as "harmonic descriptors," and show that shape matching methods can be applied to a wide range of nanoscale and microscale assembly applications.Ph.D.Chemical EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/78931/1/askeys_1.pd
Superconducting qubits for quantum annealing applications
Over the last two decades, Quantum Annealing (QA) has grown to be a
commercial technology with machines reaching the scale of 5000 interconnected qubits. Two reasons for this progress are the relative ease of implementing adiabatic Hamiltonian control and QA’s partial robustness against errors caused by decoherence.
Despite the success of this approach to quantum computation, proving
a scaling advantage over classical computation remains an elusive goal to this date. Different strategies are therefore being considered to boost the performance of quantum annealing. These include using more coherent qubit architectures and error-suppression to limit the effect of environmental noise, implementing non-stoquastic driver terms and tailored annealing schedules to enhance the success probability of the algorithm, and using many-body couplers to embed higher-order binary optimisation problems with less resource overhead.
This thesis contributes to these efforts in two different ways. The first part provides a detailed numerical analysis and a physical layout for a threebody coupler for flux qubits based on ancillary spins. The application of the coupler in a coherence-signature QA Hamiltonian is also considered and the results of the simulated quantum evolution are compared to the outcomes of classical optimisation on the problem Hamiltonian showing that the classical algorithms cannot correctly reproduce the state distribution at the end of QA. In the second part of the thesis, we develop a numerical method for mapping the Hamiltonian of a composite superconducting circuit to an effective many-qubit Hamiltonian. By overcoming drawbacks of standard reduction methods, this protocol can be used to guide the design of non-stoquastic and many-body Hamiltonian terms, as well as to get a more precise evaluation of the QA schedule parameters, which can greatly improve the outcomes of the optimisation. This numerical work is accompanied by a proposal for an experimental verification of the predictions of the reduction protocol and by some preliminary experimental results
- …