31,299 research outputs found

    Towards Advantages of Parameterized Quantum Pulses

    Full text link
    The advantages of quantum pulses over quantum gates have attracted increasing attention from researchers. Quantum pulses offer benefits such as flexibility, high fidelity, scalability, and real-time tuning. However, while there are established workflows and processes to evaluate the performance of quantum gates, there has been limited research on profiling parameterized pulses and providing guidance for pulse circuit design. To address this gap, our study proposes a set of design spaces for parameterized pulses, evaluating these pulses based on metrics such as expressivity, entanglement capability, and effective parameter dimension. Using these design spaces, we demonstrate the advantages of parameterized pulses over gate circuits in the aspect of duration and performance at the same time thus enabling high-performance quantum computing. Our proposed design space for parameterized pulse circuits has shown promising results in quantum chemistry benchmarks.Comment: 11 Figures, 4 Table

    The Viability and Potential Consequences of IoT-Based Ransomware

    Get PDF
    With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested. As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed. For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim. Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research

    A Compact Band-Notched UWB MIMO Antenna with Enhanced Isolation Using Comb Shaped Decoupling Element

    Get PDF
    A compact 37mm × 26 mm two element multiple-input-multiple-output (MIMO) antenna is presented for ultra wide band (UWB) system application with band notched characteristics. The proposed antenna comprises two semi trapezoidal shaped monopole radiating elements. The band rejection feature around 3.5 GHz has been achieved by incorporating the open ended quarter wavelength spiral shaped slot resonator on the patched surface. In order to realize the enhanced isolation, comb shaped symmetrical stub arrangement are embedded at the U shaped etched periphery to the stepped ground plane between the monopole radiators. This novel design approach leads towards isolation enhancement better than 20 dB throughout the UWB spectral range (3.1 -10.6 GHz) with peak isolation near about 46 dB. The Envelope Correlation Coefficient is significantly lower than 0.005 in entire operating range except the WiMAX rejection band

    RAPID: Enabling Fast Online Policy Learning in Dynamic Public Cloud Environments

    Full text link
    Resource sharing between multiple workloads has become a prominent practice among cloud service providers, motivated by demand for improved resource utilization and reduced cost of ownership. Effective resource sharing, however, remains an open challenge due to the adverse effects that resource contention can have on high-priority, user-facing workloads with strict Quality of Service (QoS) requirements. Although recent approaches have demonstrated promising results, those works remain largely impractical in public cloud environments since workloads are not known in advance and may only run for a brief period, thus prohibiting offline learning and significantly hindering online learning. In this paper, we propose RAPID, a novel framework for fast, fully-online resource allocation policy learning in highly dynamic operating environments. RAPID leverages lightweight QoS predictions, enabled by domain-knowledge-inspired techniques for sample efficiency and bias reduction, to decouple control from conventional feedback sources and guide policy learning at a rate orders of magnitude faster than prior work. Evaluation on a real-world server platform with representative cloud workloads confirms that RAPID can learn stable resource allocation policies in minutes, as compared with hours in prior state-of-the-art, while improving QoS by 9.0x and increasing best-effort workload performance by 19-43%

    Integración de la gestión de seguridad cibernética a la gestión de riesgo empresarial

    Get PDF
    Con los avances tecnológicos llegan nuevas formas de criminalidad asociadas al ciberespacio, lo cual refuerza la necesidad de gestionar los riesgos cibernéticos asociados. Esta investigación buscó profundizar en aspectos que le aporten a la integración de la seguridad cibernética con la ya más establecida gestión de riesgo empresarial. Para ello, se realizó una revisión de literatura sobre gestión de seguridad cibernética, riesgos cibernéticos y gestión de riesgos empresariales; adicionalmente, se utilizó el análisis de casos, cuya muestra abarcó cuatro compañías de un grupo empresarial con presencia en Latinoamérica, perteneciente al Sector Financiero. Se observó que la integración de estas gestiones depende, en gran medida, del apoyo por parte de la Alta Dirección para la habilitación de estrategias y recursos, del conocimiento que las empresas absorben del entorno para adoptar buenas prácticas metodológicas y operativas, y del comportamiento que las personas tienen frente a las amenazas y los riesgos. Se concluyó que para tener una adecuada integración entre la gestión de la seguridad cibernética y la gestión de los riesgos empresariales se requiere de iniciativas que sean habilitadas desde la más alta dirección de la organización y que sean implementadas en todos los niveles, abarcando temas como cultura, conocimiento, metodologías, herramientas, roles y responsabilidades.With technological advances come new forms of crime associated with cyberspace, which increases the need to manage the associated cyber risks. This research pursued to delve into aspects that contribute to the integration of cybersecurity with the already well-established business risk management. To do this, a literature review about Cybersecurity Management, Cyber Risks and Business Risk Management was carried out; additionally, the case analysis method was used, with a sample composed by four companies from Financial Sector, with presence in Latin-America. It was observed that the integration largely depends on the support from senior management profiles for enabling strategies and resources; additionally, on the knowledge that companies absorb from the environment to implement good methodological and operational practices; and from behavior of people against threats and risks. It was concluded to have a proper integration between Cybersecurity Management and Business Risk Management, initiatives supported from the highest management profiles of the organization are required, which need to be implemented at all levels, including topics such as culture, knowledge, methodologies, tools, roles and responsibilities

    Network Slicing for Industrial IoT and Industrial Wireless Sensor Network: Deep Federated Learning Approach and Its Implementation Challenges

    Get PDF
    5G networks are envisioned to support heterogeneous Industrial IoT (IIoT) and Industrial Wireless Sensor Network (IWSN) applications with a multitude Quality of Service (QoS) requirements. Network slicing is being recognized as a beacon technology that enables multi-service IIoT networks. Motivated by the growing computational capacity of the IIoT and the challenges of meeting QoS, federated reinforcement learning (RL) has become a propitious technique that gives out data collection and computation tasks to distributed network agents. This chapter discuss the new federated learning paradigm and then proposes a Deep Federated RL (DFRL) scheme to provide a federated network resource management for future IIoT networks. Toward this goal, the DFRL learns from Multi-Agent local models and provides them the ability to find optimal action decisions on LoRa parameters that satisfy QoS to IIoT virtual slice. Simulation results prove the effectiveness of the proposed framework compared to the early tools

    A Microfluidic Device as a Drug Carrier

    Get PDF
    The development of nanomedicine or medical nanotechnology, has brought important new ways to the development of medicines and biotechnology products. As a result of groundbreaking discoveries in the use of nanoscale materials significant commercialization initiatives have been launched and are at the forefront of the rapidly expanding field of nanotechnology by using smart particles. Microfluidic technologies use nano-and micro-scale manufacturing technologies to develop controlled and reproducible liquid microenvironments. Lead compounds with controlled physicochemical properties can be obtained using microfluidics, characterized by high productivity, and evaluated by biomimetic methods. Microfluidics, for example, can not only produce nanoparticles in a well-controlled, reproducible, and high-throughput manner, but it can also continuously create three-dimensional environments to mimic physiological and/or pathological processes. Materials with smart properties can be manipulated to respond in a controllable and reversible way, modifying some of their properties as a result of external stimuli such as mechanical stress or a certain temperature. All in all, microfluidic technology offers a potential platform for the rapid synthesis of various novel drug delivery systems. Therefore, these smart particles are equally necessary as the drug in drug delivery

    Walking with the Earth: Intercultural Perspectives on Ethics of Ecological Caring

    Get PDF
    It is commonly believed that considering nature different from us, human beings (qua rational, cultural, religious and social actors), is detrimental to our engagement for the preservation of nature. An obvious example is animal rights, a deep concern for all living beings, including non-human living creatures, which is understandable only if we approach nature, without fearing it, as something which should remain outside of our true home. “Walking with the earth” aims at questioning any similar preconceptions in the wide sense, including allegoric-poetic contributions. We invited 14 authors from 4 continents to express all sorts of ways of saying why caring is so important, why togetherness, being-with each others, as a spiritual but also embodied ethics is important in a divided world
    corecore