Cloud computing is one of the most widely used and acceptable technique. Because of this it came into attention of various groups of people, so the security and maintenance of cloud is major issue. In this paper we have point out some of the major issues effecting the security and reliability of the cloud.
We are at the dawn of quantum era; research efforts are been made on quantum information transmission techniques. Properties of quantum mechanics poses unique challenges in terms of wave collapse function, No cloning theorem and reversible operations. Quantum teleportation and quantum entanglement swapping based architecture are utilized to transmit qubit. In this paper we propose an approach to transmit qubits using controlled NOT gate (CNOT) gates and implement it on quantum machine.
Submodular functions are a fundamental object of study in combinatorial optimization, economics, machine learning, etc. and exhibit a rich combinatorial structure. Many subclasses of submodular functions have also been well studied and these subclasses widely vary in their complexity. Our motivation is to understand the relative complexity of these classes of functions. Towards this, we consider the question of how well can one class of submodular functions be approximated by another (simpler) class of submodular functions. Such approximations naturally allow algorithms designed for the simpler class to be applied to the bigger class of functions. We prove both upper and lower bounds on such approximations.
Our main results are:
1. General submodular functions can be approximated by cut functions of directed graphs to a factor of $n^2/4$, which is tight.
2. General symmetric submodular functions$^{1}$ can be approximated by cut functions of undirected graphs to a factor of $n-1$, which is tight up to a constant.
3. Budgeted additive functions can be approximated by coverage functions to a factor of $e/(e-1)$, which is tight.
Here $n$ is the size of the ground set on which the submodular function is defined.
We also observe that prior works imply that monotone submodular functions can be approximated by coverage functions with a factor between $O(\sqrt{n} \log n)$ and $\Omega(n^{1/3} /\log^2 n) $.
Monoclinic beta-Ga 2 O 3 and (Al x Ga 1-x ) 2 O 3 alloys are an emerging ultra-widebandgap semiconductor system for next generation power, GHz power switching and RF applications. In this talk, we will present the low field and high field transport simulations in Ga2O3 using first-principles calculations. Density functional theory calculations is used to get the band structure. The density functional perturbation theory is used to understand the lattice dynamics and identify the infrared (IR) active and Raman active phonon modes. Electron-phonon scattering rates are calculated Boltzmann transport equation is solved to calculate the low field mobility, velocity-field profiles and the impact ionization coefficients. The effect of dynamic screening on the electron mobility is evaluated in a two-dimensional electron gas (2-DEG) system in (AlxGa1-x)2O3/Ga2O3 heterostructures. We will also report the Ga2O3 based power and RF devices. MOSFETs with spin-doping source/drain and n+ ohmic capped layers will be presented. kV breakdown voltages are seen with the devices limited by extrinsic breakdown. Temperature dependent characteristics show potential for high temperature applications.
A PIC transmitter for application in TWDM passive optical networks is demonstrated. The device generates four 100 GHz-spaced channels and features an integrated section for chirp control that enables error-free transmission of 10 Gb/s OOK data over 50 km of fiber.
Quantum technology has advanced and has found its application in various fields. Research efforts are been made in realization of quantum networks which would enable transmission of quantum information in terms of qubits. Qubit transmission has unique challenges due to quantum properties. This study proposes to use CNOT gates for qubit transmission, and also based on the discussion and experiments conducted in the study a comparison between quantum teleportation, quantum entanglement swapping and CNOT gates is made for qubit transmission in a quantum network.
We describe the design procedure, optimization, and fabrication cycle of an index-pattern FP laser on an InP platform. The design parameters of the ridge and reflector (based on slots) are extracted through simulations. In addition, the performance of reflectors with varying slot widths is analyzed. Subsequently, the extracted parameters are used in a rate equation model to predict the performance of the laser in terms of its L-I characteristics and the sidemode suppression ratio (SMSR). Moreover, the simulated results are compared with the experimental characterization of lasers fabricated with estimated design parameters revealing that the index-pattern laser with 0.3 μ slot width delivers the best performance by demonstrating a threshold current of ∼30 mA and SMSR > 30 dB.
— This paper displays a plan to secure the fringe in a straightforward and more solid way, The proposed thought has a basic outline and has a high range, it covers an expansive outskirt territory securing the fringe zone from unlawful sections, pirating, illicit development of weapon absent much inclusion of security powers close outskirt. In the wake of dissecting the past assault in our nation and the quantity of mishaps happening every year, it is obvious that in the majority of the cases the security constrain are unconscious of the section of these fear based oppressor subsequently with a specific end goal to shield our country from such assaults and psychological militant action there is a need to actualize a security framework which will be sufficiently shrewd to recognize these action and give legitimate data about every last action occurring close to the outskirt.