Search results for " Computer"
showing 10 items of 6910 documents
Modeling and designing a robotic swarm: A quantum computing approach
2023
Nature is a neverending source of inspiration for technology. Quantum physics suggests applications to- ward quantum computing. Swarms’ self-organization leads to robotic swarm developments. Here, quantum computing is applied to swarm robotics. We model local interactions with a quantum circuit, testing it on simulators and quantum computers. To relate local with global behavior, we develop a block matrix-based model. Diagonal sub-matrices contain information on single robots; off-diagonal sub-matrices are the pairwise interaction terms. Comparing different swarms means comparing different block matrices. Choosing initial values and computation rules for off-diagonal blocks (with a particul…
Novel qutrit circuit design for multiplexer, De-multiplexer, and decoder
2022
AbstractDesigning conventional circuits present many challenges, including minimizing internal power dissipation. An approach to overcoming this problem is utilizing quantum technology, which has attracted significant attention as an alternative to Nanoscale CMOS technology. The reduction of energy dissipation makes quantum circuits an up-and-coming emerging technology. Ternary logic can potentially diminish the quantum circuit width, which is currently a limitation in quantum technologies. Using qutrit instead of qubit could play an essential role in the future of quantum computing. First, we propose two approaches for quantum ternary decoder circuit in this context. Then, we propose a qua…
Experimental Engineering of Arbitrary Qudit States with Discrete-Time Quantum Walks
2019
The capability to generate and manipulate quantum states in high-dimensional Hilbert spaces is a crucial step for the development of quantum technologies, from quantum communication to quantum computation. One-dimensional quantum walk dynamics represents a valid tool in the task of engineering arbitrary quantum states. Here we affirm such potential in a linear-optics platform that realizes discrete-time quantum walks in the orbital angular momentum degree of freedom of photons. Different classes of relevant qudit states in a six-dimensional space are prepared and measured, confirming the feasibility of the protocol. Our results represent a further investigation of quantum walk dynamics in p…
Improving Scalable K-Means++
2021
Two new initialization methods for K-means clustering are proposed. Both proposals are based on applying a divide-and-conquer approach for the K-means‖ type of an initialization strategy. The second proposal also uses multiple lower-dimensional subspaces produced by the random projection method for the initialization. The proposed methods are scalable and can be run in parallel, which make them suitable for initializing large-scale problems. In the experiments, comparison of the proposed methods to the K-means++ and K-means‖ methods is conducted using an extensive set of reference and synthetic large-scale datasets. Concerning the latter, a novel high-dimensional clustering data generation …
ASK Profilo attitudinale – Report interpretativo.
2009
L’ASK - Test di Pensiero Inferenziale fornisce una valutazione attitudinale delle abilità legate alla capacità di interpretare in maniera appropriata informazioni di diversi livelli di complessità allo scopo di derivarne delle conclusioni logiche. Il report è suddiviso nelle seguenti sezioni: 1. Profilo grafico: vengono riportati in forma numerica e grafica i risultati ottenuti dal soggetto alle singole prove e il punteggio generale di pensiero inferenziale. 2. Commento interpretativo: un commento, in forma narrativa, dell’abilità di pensiero inferenziale espressa dal soggetto, così come emerge dal test.
Context-Aware Adaptive System For M- Learning Personalization
2014
International audience; Context-aware mobile learning is becoming important because of the dynamic and continually changing learning settings in learner's mobile environment, giving rise to many different learning contexts that are difficult to apprehend. To provide personalization of learning content, we aim to develop a recommender system based on semantic modeling of learning contents and learning context. This modeling is complemented by a behavioral part made up of rules and metaheuristics used to optimize the combination of pieces of learning contents according to learner's context. All these elements form a new approach to mobile learning.
Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience
2022
To increase situational awareness of maritime vessels and other entities and to enable their exchange of various information, the International Maritime Organization mandated the use of the Automatic Identification System (AIS) in 2004. The AIS is a self-reporting system that uses the VHF radio link. However, any radio-based self-reporting system is prone to forgery, especially in situations where authentication of the message is not designed into the architecture. As AIS was designed in the 1990s when cyberattacks were in their infancy, it does not implement authentication or encryption; thus, it can be seen as fundamentally vulnerable against modern-day cyberattacks. This paper demonstrat…
Introduction to Mathematical Logic, Edition 2021
2021
Textbook for students in mathematical logic. First order languages. Axioms of constructive and classical logic. Proving formulas in propositional and predicate logic. Glivenko's theorem and constructive embedding. Axiom independence. Interpretations, models and completeness theorems. Normal forms. Tableaux and resolution methods. Herbrand's theorem. Sections 1, 2, 3 represent an extended translation of the corresponding chapters of the book: V. Detlovs, Elements of Mathematical Logic, Riga, University of Latvia, 1964, 252 pp. (in Latvian).
Optimal Resource Allocation in Multi-Hop Networks: Contention vs. Scheduling
2014
CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is actually the most used method in ad-hoc networks for transmitting on a contending medium, even if it shows poor performance in presence of hidden nodes. To increase performance, we propose an algorithm that combines CSMA and TDMA (Time Division Multiple Access) approaches. The adopted solution consists of grouping contending nodes in non-interfering subsets and granting a different numbers of time slots to different groups, while using the CSMA to manage medium access among nodes belonging to the same subset. An optimization procedure to assign the time slots to each subset of nodes and to find an equilibrium between contention …
Contributions à l’imagerie polarimétrique et à ses applications en vision pour la robotique
2019
Ce mémoire présente le bilan de l'ensemble de mes travaux de recherche effectués de septembre 2006 à juin 2019 au sein de l'équipe Creusotine du laboratoire Le2i devenue équipe Vibot ERL CNRS 6000 depuis janvier 2018. Les principales activités de recherche que j'ai menées au cours de ces 10 dernières années autour de l'imagerie polarimétrique, de la vision omnidirectionnelle et de leurs applications en vision pour la robotique seront particulièrement détaillées dans ce document. Elles seront présentées selon deux grandes parties : la première concernera plutôt l'aspect mise en œuvre et calibrage des caméras et la seconde se concentrera sur les applications potentielles en vision pour la rob…