Measurement based quantum computation, which requires only single particle measurements on a universal resource state to achieve the full power of quantum computing, has been recognized as one of the most promising mo...
详细信息
Measurement based quantum computation, which requires only single particle measurements on a universal resource state to achieve the full power of quantum computing, has been recognized as one of the most promising models for the physical realization of quantum computers. Despite considerable progress in the past decade, it remains a great challenge to search for new universal resource states with naturally occurring Hamiltonians and to better understand the entanglement structure of these kinds of states. Here we show that most of the resource states currently known can be reduced to the cluster state, the first known universal resource state, via adaptive local measurements at a constant cost. This new quantum state reduction scheme provides simpler proofs of universality of resource states and opens up plenty of space to the search of new resource states.
We construct new families of multi-error-correcting quantum codes for the amplitude damping channel. Our key observation is that, with proper encoding, two uses of the amplitude damping channel simulate a quantum eras...
详细信息
ISBN:
(纸本)9781424478903
We construct new families of multi-error-correcting quantum codes for the amplitude damping channel. Our key observation is that, with proper encoding, two uses of the amplitude damping channel simulate a quantum erasure channel. This allows us to use concatenated codes with quantum erasure-correcting codes as outer codes for correcting multiple amplitude damping errors. Our new codes are degenerate stabilizer codes and have parameters which are better than the amplitude damping codes obtained by any previously known construction.
The aim of this study is to develop a prototype of web based machinery maintenance scheduling system. Maintenance is an important task in remaining the system functionality and to extend the life time of an asset. How...
详细信息
ISBN:
(纸本)9780791802977
The aim of this study is to develop a prototype of web based machinery maintenance scheduling system. Maintenance is an important task in remaining the system functionality and to extend the life time of an asset. However, a weak maintenance management and practice may leads to the major system failure which involved high maintenance cost. This paper describes an initial attempt of developing e-maintenance application - Web Based Machinery Maintenance Scheduler System (MMS). MMS is developed to manage the maintenance scheduling of all machines operated in Mechanical engineering Laboratory. Based on the study, the prototype is able to generate maintenance scheduling for each machines based on the machine maintenance specification, record the data for the emergency maintenance case and generate the monthly maintenance report. The detail outcomes and the results from the study are discussed in this paper.
Information security surveys are important inputs to private, public and government sectors in order to measure current status of information security threats. This paper examines the various types of threats that exi...
详细信息
ISBN:
(纸本)9780982148914
Information security surveys are important inputs to private, public and government sectors in order to measure current status of information security threats. This paper examines the various types of threats that exist in Information systems (IS) in one of government supported hospital in Malaysia. The hospital has been equipped for a Total Hospital Information System (THIS). The data collected were from three different departments using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The result shows that the most critical threat for the THIS is the power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a comprehensive list of potential threat categories in IS and subsequently taking the results of this step as input for the risk mitigation strategy. Keywords: Healthcare Information systems (HIS), Information systems (IS), Risk Analysis, Threats
Learning process is very important in academic industry. Students are the person that will give their service to the country after they graduated. As an academician, lecturer responsible in making sure their students ...
详细信息
ISBN:
(纸本)9780791802977
Learning process is very important in academic industry. Students are the person that will give their service to the country after they graduated. As an academician, lecturer responsible in making sure their students are having skills that needed by industry. The industry in Malaysia always complaint that Malaysian student are having no skill. So, with this problem, we applied problem-based learning method to make our students can solve whatever problem given by superior, critical thinking in solving the problem, can work independence and minimized supervision and others. The PBL method was introduced to the faculty of computersystems and softwareengineering (FSKKP) second year students in the Bachelor of softwareengineering. The subject is Formal Methods 3 credit hours. The number of students is 88. We analyzed 88 students' assignment to see their performance of construction of formal specification. Using this method help student in gain skill that required by the industry at the same time to construct formal specifications. This approach can train our student more critical thinking, independent, confidence, developed team working and others.
The application of microarray data for cancer classification has recently gained in popularity. The main problem that needs to be addressed is the selection of a smaller subset of genes from the thousands of genes in ...
详细信息
Microarray data are expected to be useful for cancer classification. The main problem that needs to be addressed is the selection of a smaller subset of genes from the thousands of genes in the data that contributes t...
详细信息
Every newspaper publisher faced with the problem of determining the number of copies of newspaper and distributing them to the retail traders. Two aspects need to be balanced out in order to optimize the economical su...
详细信息
Every newspaper publisher faced with the problem of determining the number of copies of newspaper and distributing them to the retail traders. Two aspects need to be balanced out in order to optimize the economical success which is the number of unsold copies should be minimal to reduce the cost of production, and the sell-out rate should be minimal to maximize the number of sold copies. Thus, a good sales rate prediction is necessary to optimize both antagonistic aspects. This paper utilized artificial neural network to predict newspaper sales for one vendor in the area of Sungai Petani, Malaysia. The predicted sales value can help the company to optimize their sales. The main objective is to develop a prototype that apply artificial neural network so that it can predict the future trend as well as the future daily sale. The network will consist of three layer which is input layer, one hidden layer and output layer. The input layer will have six input node where this will be the factor that will affect the output which is the number of copies that sold. The network will be trained with history data of a one year records of data. The output produced has the error value as low as 1.24% while the correlation coefficient between prediction and actual value is 0.1197.
Log server is significant for every organization *** generates huge amount of data every day and of different *** data holds valuable information which is complex to be interpreted unless with the aid of web log analy...
详细信息
Log server is significant for every organization *** generates huge amount of data every day and of different *** data holds valuable information which is complex to be interpreted unless with the aid of web log analysis *** rules is a data mining technique which is able to derived patterns from data in log server *** paper presents the analysis of log server data particularly on the usage of network *** Appriori algorithm is implemented in the pattern discovery and a tool named UMPNA assist in the process of derive the *** results from the analysis can help network administrator increase the network performance.
Formal Methods are very tough subject to softwareengineering student. It happens because of the mathematics involvement during software development. Students normally feel very difficult to derive formal specificatio...
详细信息
Formal Methods are very tough subject to softwareengineering student. It happens because of the mathematics involvement during software development. Students normally feel very difficult to derive formal specification from informal requirement. The problem always happen is to derive the Z notation in the formal specification. The formal specification is all about the operation inside the requirement needed from the customer using mathematical statement. If there do not know the logic of the operation the notation might goes wrong. In this paper, we propose an approach to deriving formal specifications from informal requirement using Venn diagram for creating formal specification in term of training environment to make our student understand. The Venn diagram that we use is purposely for the basic level. It is used to visualize in the branch of mathematics known as set theory. It shows all of the possible mathematical or logical relationships between sets groups of things. With this Venn diagram they can visualize the operation of their notation. To show how to implement the Venn diagram we chose a case study. We show how to convert the Venn diagram to formal specification which is the important part during development of Z schema. Then, we do an analysis of an assignment given to a group of student to know whether the Venn diagram is really helpful for them or not.
暂无评论