19 research outputs found
Flight Gate Assignment with a Quantum Annealer
Optimal flight gate assignment is a highly relevant optimization problem from
airport management. Among others, an important goal is the minimization of the
total transit time of the passengers. The corresponding objective function is
quadratic in the binary decision variables encoding the flight-to-gate
assignment. Hence, it is a quadratic assignment problem being hard to solve in
general. In this work we investigate the solvability of this problem with a
D-Wave quantum annealer. These machines are optimizers for quadratic
unconstrained optimization problems (QUBO). Therefore the flight gate
assignment problem seems to be well suited for these machines. We use real
world data from a mid-sized German airport as well as simulation based data to
extract typical instances small enough to be amenable to the D-Wave machine. In
order to mitigate precision problems, we employ bin packing on the passenger
numbers to reduce the precision requirements of the extracted instances. We
find that, for the instances we investigated, the bin packing has little effect
on the solution quality. Hence, we were able to solve small problem instances
extracted from real data with the D-Wave 2000Q quantum annealer.Comment: Updated figure
Lifting defects for nonstable K_0-theory of exchange rings and C*-algebras
The assignment (nonstable K_0-theory), that to a ring R associates the monoid
V(R) of Murray-von Neumann equivalence classes of idempotent infinite matrices
with only finitely nonzero entries over R, extends naturally to a functor. We
prove the following lifting properties of that functor: (1) There is no functor
F, from simplicial monoids with order-unit with normalized positive
homomorphisms to exchange rings, such that VF is equivalent to the identity.
(2) There is no functor F, from simplicial monoids with order-unit with
normalized positive embeddings to C*-algebras of real rank 0 (resp., von
Neumann regular rings), such that VF is equivalent to the identity. (3) There
is a {0,1}^3-indexed commutative diagram D of simplicial monoids that can be
lifted, with respect to the functor V, by exchange rings and by C*-algebras of
real rank 1, but not by semiprimitive exchange rings, thus neither by regular
rings nor by C*-algebras of real rank 0. By using categorical tools from an
earlier paper (larders, lifters, CLL), we deduce that there exists a unital
exchange ring of cardinality aleph three (resp., an aleph three-separable
unital C*-algebra of real rank 1) R, with stable rank 1 and index of nilpotence
2, such that V(R) is the positive cone of a dimension group and V(R) is not
isomorphic to V(B) for any ring B which is either a C*-algebra of real rank 0
or a regular ring.Comment: 34 pages. Algebras and Representation Theory, to appea
Analyzing D-wave quantum macro assembler security
As we enter the quantum computing era, security becomes of at most importance. With the release of D-Wave One in 2011 and most recently the 2000Q, with 2,000 qubits, and with NASA and Google using D-wave Systems quantum computers, a thorough examination of quantum computer security is needed. Quantum computers underlying hardware is not compatible with classical boolean and binary-based computer systems and software. Assemblers and compliers translate modern programming languages and problems into quantum-annealing methods compatible with quantum computers. This paper presents a vulnerability assessment utilizing static source code analysis on Qmasm Python tool. More specifically, we use flow-sensitive, inter-procedural and context-sensitive data flow analysis to uncover vulnerable points in the program. We demonstrate the Qmasm security flaws that can leave D-Wave 2X system vulnerable to severe threats
Analyzing D-wave quantum macro assembler security
As we enter the quantum computing era, security becomes of at most importance. With the release of D-Wave One in 2011 and most recently the 2000Q, with 2,000 qubits, and with NASA and Google using D-wave Systems quantum computers, a thorough examination of quantum computer security is needed. Quantum computers underlying hardware is not compatible with classical boolean and binary-based computer systems and software. Assemblers and compliers translate modern programming languages and problems into quantum-annealing methods compatible with quantum computers. This paper presents a vulnerability assessment utilizing static source code analysis on Qmasm Python tool. More specifically, we use flow-sensitive, inter-procedural and context-sensitive data flow analysis to uncover vulnerable points in the program. We demonstrate the Qmasm security flaws that can leave D-Wave 2X system vulnerable to severe threats
Beyond bits: The future of quantum information processing
Quantum information theory seeks to unite some of the most influential ideas of 20th century science: quantum mechanics, computer science and information theory. The development of quantum information theory has only begun, and only a few applications are known, mostly in quantum system control and data security. The future of the theory is hard to predict, but it seems poised to contribute to some of the most exciting ideas of the 21st century. This theory gives an ideal framework for developing a better understanding of how nature works and what it will allow to be done