19 research outputs found

    Flight Gate Assignment with a Quantum Annealer

    Get PDF
    Optimal flight gate assignment is a highly relevant optimization problem from airport management. Among others, an important goal is the minimization of the total transit time of the passengers. The corresponding objective function is quadratic in the binary decision variables encoding the flight-to-gate assignment. Hence, it is a quadratic assignment problem being hard to solve in general. In this work we investigate the solvability of this problem with a D-Wave quantum annealer. These machines are optimizers for quadratic unconstrained optimization problems (QUBO). Therefore the flight gate assignment problem seems to be well suited for these machines. We use real world data from a mid-sized German airport as well as simulation based data to extract typical instances small enough to be amenable to the D-Wave machine. In order to mitigate precision problems, we employ bin packing on the passenger numbers to reduce the precision requirements of the extracted instances. We find that, for the instances we investigated, the bin packing has little effect on the solution quality. Hence, we were able to solve small problem instances extracted from real data with the D-Wave 2000Q quantum annealer.Comment: Updated figure

    Lifting defects for nonstable K_0-theory of exchange rings and C*-algebras

    Full text link
    The assignment (nonstable K_0-theory), that to a ring R associates the monoid V(R) of Murray-von Neumann equivalence classes of idempotent infinite matrices with only finitely nonzero entries over R, extends naturally to a functor. We prove the following lifting properties of that functor: (1) There is no functor F, from simplicial monoids with order-unit with normalized positive homomorphisms to exchange rings, such that VF is equivalent to the identity. (2) There is no functor F, from simplicial monoids with order-unit with normalized positive embeddings to C*-algebras of real rank 0 (resp., von Neumann regular rings), such that VF is equivalent to the identity. (3) There is a {0,1}^3-indexed commutative diagram D of simplicial monoids that can be lifted, with respect to the functor V, by exchange rings and by C*-algebras of real rank 1, but not by semiprimitive exchange rings, thus neither by regular rings nor by C*-algebras of real rank 0. By using categorical tools from an earlier paper (larders, lifters, CLL), we deduce that there exists a unital exchange ring of cardinality aleph three (resp., an aleph three-separable unital C*-algebra of real rank 1) R, with stable rank 1 and index of nilpotence 2, such that V(R) is the positive cone of a dimension group and V(R) is not isomorphic to V(B) for any ring B which is either a C*-algebra of real rank 0 or a regular ring.Comment: 34 pages. Algebras and Representation Theory, to appea

    Analyzing D-wave quantum macro assembler security

    Get PDF
    As we enter the quantum computing era, security becomes of at most importance. With the release of D-Wave One in 2011 and most recently the 2000Q, with 2,000 qubits, and with NASA and Google using D-wave Systems quantum computers, a thorough examination of quantum computer security is needed. Quantum computers underlying hardware is not compatible with classical boolean and binary-based computer systems and software. Assemblers and compliers translate modern programming languages and problems into quantum-annealing methods compatible with quantum computers. This paper presents a vulnerability assessment utilizing static source code analysis on Qmasm Python tool. More specifically, we use flow-sensitive, inter-procedural and context-sensitive data flow analysis to uncover vulnerable points in the program. We demonstrate the Qmasm security flaws that can leave D-Wave 2X system vulnerable to severe threats

    Analyzing D-wave quantum macro assembler security

    Get PDF
    As we enter the quantum computing era, security becomes of at most importance. With the release of D-Wave One in 2011 and most recently the 2000Q, with 2,000 qubits, and with NASA and Google using D-wave Systems quantum computers, a thorough examination of quantum computer security is needed. Quantum computers underlying hardware is not compatible with classical boolean and binary-based computer systems and software. Assemblers and compliers translate modern programming languages and problems into quantum-annealing methods compatible with quantum computers. This paper presents a vulnerability assessment utilizing static source code analysis on Qmasm Python tool. More specifically, we use flow-sensitive, inter-procedural and context-sensitive data flow analysis to uncover vulnerable points in the program. We demonstrate the Qmasm security flaws that can leave D-Wave 2X system vulnerable to severe threats

    Beyond bits: The future of quantum information processing

    No full text
    Quantum information theory seeks to unite some of the most influential ideas of 20th century science: quantum mechanics, computer science and information theory. The development of quantum information theory has only begun, and only a few applications are known, mostly in quantum system control and data security. The future of the theory is hard to predict, but it seems poised to contribute to some of the most exciting ideas of the 21st century. This theory gives an ideal framework for developing a better understanding of how nature works and what it will allow to be done
    corecore