120 research outputs found

    LASER Tech Briefs, September 1993

    Get PDF
    This edition of LASER Tech briefs contains a feature on photonics. The other topics include: Electronic Components and Circuits. Electronic Systems, Physical Sciences, Materials, Computer Programs, Mechanics, Machinery, Fabrication Technology, Mathematics and Information Sciences, Life Sciences and books and reports

    Models, Algorithms, and Architectures for Scalable Packet Classification

    Get PDF
    The growth and diversification of the Internet imposes increasing demands on the performance and functionality of network infrastructure. Routers, the devices responsible for the switch-ing and directing of traffic in the Internet, are being called upon to not only handle increased volumes of traffic at higher speeds, but also impose tighter security policies and provide support for a richer set of network services. This dissertation addresses the searching tasks performed by Internet routers in order to forward packets and apply network services to packets belonging to defined traffic flows. As these searching tasks must be performed for each packet traversing the router, the speed and scalability of the solutions to the route lookup and packet classification problems largely determine the realizable performance of the router, and hence the Internet as a whole. Despite the energetic attention of the academic and corporate research communities, there remains a need for search engines that scale to support faster communication links, larger route tables and filter sets and increasingly complex filters. The major contributions of this work include the design and analysis of a scalable hardware implementation of a Longest Prefix Matching (LPM) search engine for route lookup, a survey and taxonomy of packet classification techniques, a thorough analysis of packet classification filter sets, the design and analysis of a suite of performance evaluation tools for packet classification algorithms and devices, and a new packet classification algorithm that scales to support high-speed links and large filter sets classifying on additional packet fields

    Scalable Quantum Computing with Two-Dimensional Arrays of Trapped Ions Enabled by Fast Gates

    Get PDF
    Realising large-scale quantum computation in the near future will require increasing the number of low-error two-qubit gates that can be implemented on a quantum computer before decoherence. One of the biggest challenges facing current trapped ion quantum computers is implementing high-speed two-qubit operations, whilst increasing the number of qubits. One of the most promising proposals for overcoming current limitations is the use of ultra-fast pulses to implement fast two-qubit gates between nearest-neighbour pairs of ions. In this thesis, I investigate these ‘fast gates’ in two-dimensional arrays of microtraps, each containing a single ion. I argue that two-dimensional architectures allow for a significant reduction in the number of two-qubit gates required for a particular computation, as compared to one-dimensional ion chains. I demonstrate this reduction for a quantum simulation of a 40-mode Fermi-Hubbard Hamiltonian. I develop an efficient scheme that allows fast gates to be numerically optimised for two-dimensional geometries. I find that this optimisation scheme is capable of designing gates that are faster, higher fidelity, and require lower laser repetition rates. Using this scheme, I find that high-speed two-qubit gates can be optimised for two-dimensional architectures, with fidelities well above thresholds required for fault tolerant error correction, around 99.99%. Furthermore, I find that fast gates in these architectures are robust to the presence of large numbers of surrounding ions. Following previous studies [1, 2] which have identified pulse imperfections as a dominant source of error in fast gates, I perform a worst-case error analysis. I find the fast gates presented in this thesis to require very small errors in single-qubit rotations, and I present recommendations for achieving those requirements. I also investigate other experimental considerations, and make recommendations for overcoming other technical challenges in realising fast gates

    Doctor of Philosophy

    Get PDF
    dissertationCormac McCarthy's novel The Crossing presents an ecocentric cosmology that diverges radically from the traditional anthropocentric model, which centralizes the primacy of humans. McCarthy's vision of "joinery" reformats the place of humanity to a position of equality with "every least thing." My focused reading of McCarthy's three novels from the Border Trilogy articulates the ramifications of this vision for a new ecological ontology, agency, and ethics. Specifically, I argue that the vision of "joinery" revises philosophies of ontology and agency to admit the force of animals and matter as co-constituting agents in a dynamically vibrant world. The attendant ethical vision from such a revised ontological and agential view centralizes the profound dilemmas inherent in so many relations. My close reading of McCarthy's novels explicates his ecological vision of "joinery" as coherent with theoretical visions espoused in Bruno Latour's Actor-Network Theory and Jane Bennett's vibrant materialisms. By weaving together an analysis of the trilogy with these frameworks, I advance a practice of reading that positions learners to think through the complexities of expansive human and non-human relations. This reading practice for thinking relational ethics ruptures many of the trends in education today that orient students in standardized and noncritical modes of learning. I argue, however, that the demands of an ecological age during a time of climate change and mass extinctions necessitates an education where students wrestle critically with the dilemmas of a world understood as interconnected

    Multidimensional projections for the visual exploration of multimedia data

    Get PDF
    Multidimensional data analysis is considerably important when dealing with such large and complex datasets. Among the possibilities when analyzing such kind of data, applying visualization techniques can help the user find and understand patters, trends and establish new goals. This thesis aims to present several visualization methods to interactively explore multidimensional datasets aimed from specialized to casual users, by making use of both static and dynamic representations created by multidimensional projections

    Deteção de ataques de negação de serviços distribuídos na origem

    Get PDF
    From year to year new records of the amount of traffic in an attack are established, which demonstrate not only the constant presence of distributed denialof-service attacks, but also its evolution, demarcating itself from the other network threats. The increasing importance of resource availability alongside the security debate on network devices and infrastructures is continuous, given the preponderant role in both the home and corporate domains. In the face of the constant threat, the latest network security systems have been applying pattern recognition techniques to infer, detect, and react more quickly and assertively. This dissertation proposes methodologies to infer network activities patterns, based on their traffic: follows a behavior previously defined as normal, or if there are deviations that raise suspicions about the normality of the action in the network. It seems that the future of network defense systems continues in this direction, not only by increasing amount of traffic, but also by the diversity of actions, services and entities that reflect different patterns, thus contributing to the detection of anomalous activities on the network. The methodologies propose the collection of metadata, up to the transport layer of the osi model, which will then be processed by the machien learning algorithms in order to classify the underlying action. Intending to contribute beyond denial-of-service attacks and the network domain, the methodologies were described in a generic way, in order to be applied in other scenarios of greater or less complexity. The third chapter presents a proof of concept with attack vectors that marked the history and a few evaluation metrics that allows to compare the different classifiers as to their success rate, given the various activities in the network and inherent dynamics. The various tests show flexibility, speed and accuracy of the various classification algorithms, setting the bar between 90 and 99 percent.De ano para ano são estabelecidos novos recordes de quantidade de tráfego num ataque, que demonstram não só a presença constante de ataques de negação de serviço distribuídos, como também a sua evolução, demarcando-se das outras ameaças de rede. A crescente importância da disponibilidade de recursos a par do debate sobre a segurança nos dispositivos e infraestruturas de rede é contínuo, dado o papel preponderante tanto no dominio doméstico como no corporativo. Face à constante ameaça, os sistemas de segurança de rede mais recentes têm vindo a aplicar técnicas de reconhecimento de padrões para inferir, detetar e reagir de forma mais rápida e assertiva. Esta dissertação propõe metodologias para inferir padrões de atividades na rede, tendo por base o seu tráfego: se segue um comportamento previamente definido como normal, ou se existem desvios que levantam suspeitas sobre normalidade da ação na rede. Tudo indica que o futuro dos sistemas de defesa de rede continuará neste sentido, servindo-se não só do crescente aumento da quantidade de tráfego, como também da diversidade de ações, serviços e entidades que refletem padrões distintos contribuindo assim para a deteção de atividades anómalas na rede. As metodologias propõem a recolha de metadados, até á camada de transporte, que seguidamente serão processados pelos algoritmos de aprendizagem automática com o objectivo de classificar a ação subjacente. Pretendendo que o contributo fosse além dos ataques de negação de serviço e do dominio de rede, as metodologias foram descritas de forma tendencialmente genérica, de forma a serem aplicadas noutros cenários de maior ou menos complexidade. No quarto capítulo é apresentada uma prova de conceito com vetores de ataques que marcaram a história e, algumas métricas de avaliação que permitem comparar os diferentes classificadores quanto à sua taxa de sucesso, face às várias atividades na rede e inerentes dinâmicas. Os vários testes mostram flexibilidade, rapidez e precisão dos vários algoritmos de classificação, estabelecendo a fasquia entre os 90 e os 99 por cento.Mestrado em Engenharia de Computadores e Telemátic

    Liquid-Solid Transitions with Applications to Self-Assembly.

    Full text link
    We study the thermodynamic and kinetic pathways by which liquids transform into solids, and their relation to the metastable states that commonly arise in self-assembly applications. As a case study in the formation of ordered metastable solids, we investigate the atomistic mechanism by which quasicrystals form. We show that the aperiodic growth of quasicrystals is controlled by the ability of the growing quasicrystal "nucleus" to incorporate kinetically trapped atoms into the solid phase with minimal rearrangement. In a related study, we propose a two-part mechanism for forming 3d dodecagonal quasicrystals by self-assembly. Our mechanism involves (1) attaching small mobile particles to the surface of spherical particles to encourage icosahedral packing and (2) allowing a subset of particles to deviate from the ideal spherical shape, to discourage close-packing. In addition to studying metastable ordered solids, we investigate the phenomenology and mechanism of the glass transition. We report measurements of spatially heterogeneous dynamics in a system of air-driven granular beads approaching a jamming transition, and show that the dynamics in our granular system are quantitatively indistinguishable from those for a supercooled liquid approaching a glass transition. In a second study of the glass transition, we use transition path sampling to study the structure, statistics and dynamics of localized excitations for several model glass formers. We show that the excitations are sparse and localized, and their size is temperature-independent. We show that their equilibrium concentration is proportional to exp[-Ja(1/T-1/To)], where "Ja" is the energy scale for irreversible particle displacements of length "a," and "To" is an onset temperature. We show that excitation dynamics is facilitated by the presence of other excitations, causing dynamics to slow in a hierarchical way as temperature is lowered. To supplement our studies of liquid-solid transitions, we introduce a shape matching framework for characterizing structural transitions in systems with complex particle shapes or morphologies. We provide an overview of shape matching methods, explore a particular class of metrics known as "harmonic descriptors," and show that shape matching methods can be applied to a wide range of nanoscale and microscale assembly applications.Ph.D.Chemical EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/78931/1/askeys_1.pd

    Superconducting qubits for quantum annealing applications

    Get PDF
    Over the last two decades, Quantum Annealing (QA) has grown to be a commercial technology with machines reaching the scale of 5000 interconnected qubits. Two reasons for this progress are the relative ease of implementing adiabatic Hamiltonian control and QA’s partial robustness against errors caused by decoherence. Despite the success of this approach to quantum computation, proving a scaling advantage over classical computation remains an elusive goal to this date. Different strategies are therefore being considered to boost the performance of quantum annealing. These include using more coherent qubit architectures and error-suppression to limit the effect of environmental noise, implementing non-stoquastic driver terms and tailored annealing schedules to enhance the success probability of the algorithm, and using many-body couplers to embed higher-order binary optimisation problems with less resource overhead. This thesis contributes to these efforts in two different ways. The first part provides a detailed numerical analysis and a physical layout for a threebody coupler for flux qubits based on ancillary spins. The application of the coupler in a coherence-signature QA Hamiltonian is also considered and the results of the simulated quantum evolution are compared to the outcomes of classical optimisation on the problem Hamiltonian showing that the classical algorithms cannot correctly reproduce the state distribution at the end of QA. In the second part of the thesis, we develop a numerical method for mapping the Hamiltonian of a composite superconducting circuit to an effective many-qubit Hamiltonian. By overcoming drawbacks of standard reduction methods, this protocol can be used to guide the design of non-stoquastic and many-body Hamiltonian terms, as well as to get a more precise evaluation of the QA schedule parameters, which can greatly improve the outcomes of the optimisation. This numerical work is accompanied by a proposal for an experimental verification of the predictions of the reduction protocol and by some preliminary experimental results
    corecore