Updating search results...

Search Resources

5 Results

View
Selected filters:
  • protocols
The Building Blocks of a Quantum Computer: Part 1
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

There is no doubt that the quantum computer and the quantum internet have many profound applications, they may change the way we think about information, and they could completely change our daily life.

But how do a quantum computer and a quantum internet work? What scientific principles are behind it? What kind of software and protocols do we need for that? How can we operate a quantum computer and a quantum internet? And which disciplines of science and engineering are needed to develop a fully working system?

In a series of two MOOCs, we will take you through all layers of a quantum computer and a quantum internet. The first course will provide you with the scientific basis by explaining the first layer: the qubits. We will discuss the four types of qubits that QuTech research center at Delft University of Technology focuses on: topological qubits, Spin qubits, Trans qubits and NV Centre qubits. We will teach you the working principles of qubits and, at the same time, the working principles of a computer made of these qubits.

In the upcoming second course, we will introduce the other layers needed to build a quantum computer and a quantum internet, such as the micro-architecture, compilers, quantum error correction, repeaters and quantum algorithms.

These two courses offer you an opportunity to deepen your knowledge by continuing the journey started in our first MOOC, which focused on the applications of a quantum computer and a quantum internet.

Note that these courses offer a full overview of the layers of a quantum computer and a quantum internet, and therefore they will not go into too much detail per layer. For learners seeking to fully understand one specific topic we can recommend other courses authored by QuTech:

Subject:
Applied Science
Material Type:
Full Course
Provider:
Delft University of Technology
Provider Set:
Delft University OpenCourseWare
Author:
Prof.L. DiCarlo
Prof.dr. Lieven Vandersypen
Prof.dr.ir. K.L.M. Bertels
Stephanie Wehner
dr.ir. Menno Veldhorst
Date Added:
03/20/2019
The Building Blocks of a Quantum Computer: Part 2
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

There is no doubt that the quantum computer and the quantum internet have many profound applications, they may change the way we think about information, and they could completely change our daily life.

But how do a quantum computer and a quantum internet work? What scientific principles are behind it? What kind of software and protocols do we need for a quantum computer and a quantum internet? Which disciplines of science and engineering are needed to develop these? And how can we operate a fully working system?

In this series of two courses, we take you through all layers of a quantum computer and a quantum internet. In part 1 we explained the first layer: the qubits. We introduced the most promising quantum platforms and discussed how to do quantum operations on the physical qubits. In part 2 we will introduce the other layers needed to build and operate a quantum computer and a quantum internet, such as the quantum classical interface, micro-architecture, compilers, quantum error correction, networks and protocols and quantum algorithms.

These two courses offer you an opportunity to deepen your knowledge by continuing the journey started in our first course, which focused on the applications of a quantum computer and a quantum internet.

Note that these courses offer a full overview of the layers of a quantum computer and a quantum internet, and therefore they will not go into too much detail per layer. For learners seeking to fully understand one specific topic we can recommend other courses authored by QuTech:

In the field of Quantum Internet: Quantum Cryptography
In the field of topological phenomena: Topology in Condensed Matter
This course is authored by experts from the QuTech research center at Delft University of Technology. In the center, scientists and engineers work together to enhance research and development in quantum technology. QuTech Academy’s aim is to inspire, share and disseminate knowledge about the latest developments in quantum technology.

Subject:
Applied Science
Material Type:
Full Course
Provider:
Delft University of Technology
Provider Set:
Delft University OpenCourseWare
Author:
Dr. C.G. Almudever
Dr. D. Elkouss
Dr. D.B. Criger
Dr. F. Sebastiano
Prof. B.M. Terhal
Prof.dr.ir. K.L.M. Bertels
Date Added:
03/20/2019
OER-UCLouvain: Computer Networking : Principles, Protocols and Practice - 2nd Edition
Unrestricted Use
CC BY
Rating
0.0 stars

"Computer Networking : Principles, Protocols and Practice" is an open-source ebook that explains the main principles of Computer Networking and the key protocols that are used on the Internet.
The first part describes the theoretical foundations of this domain as well and the main algorithms and protocols.
The ebook is intended to be used for an upper-level undergraduate networking course. The second part contains a detailed explanation of the main Internet protocols including HTTP, DNS, TCP, UDP, IPv6, BGP, RIP, OSPF, Ethernet and WiFi.
The last part contains exercises and practical labs to allow the students to test their knowledge.
The Computer Networking: Principles, Protocols and Practice textbook is one of the winners of the first Open Textbook challenge organised by the Saylor foundation in the US.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Assessment
Full Course
Textbook
Provider:
Université catholique de Louvain
Provider Set:
OER-UCLOUVAIN
Author:
BONAVENTURE Olivier
Date Added:
08/10/2017
Selected Topics in Cryptography
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course covers a number of advanced "selected topics" in the field of cryptography. The first part of the course tackles the foundational question of how to define security of cryptographic protocols in a way that is appropriate for modern computer networks, and how to construct protocols that satisfy these security definitions. For this purpose, the framework of "universally composable security" is studied and used. The second part of the course concentrates on the many challenges involved in building secure electronic voting systems, from both theoretical and practical points of view. In the third part, an introduction to cryptographic constructions based on bilinear pairings is given.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Canetti, Ran
Date Added:
02/01/2004
Wireless Sensor Networks
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Abstract— Wireless Sensor Networks constitute a wide range of applications related to national security, military, surveillance, health monitoring environment. The main constraint in wireless sensor network is its energy consumption and limited battery life of the sensor nodes. Coverage provides good quality of service but it is very important especially when combined with connectivity and energy efficiency. This paper provides some existing coverage protocols with their limitations. The proposed algorithm for the overlap area provides better coverage efficiency of 91.354% than the existing robust PEAS protocol that provides coverage efficiency of approximately 80% to 88% thus allowing the minimum number of sensor nodes to be in the active state in order to conserve energy thereby increasing the lifetime of the sensor node.

Subject:
Engineering
Material Type:
Module
Author:
sonali abhijeet padalkar
Maheshwari Marne
Date Added:
11/01/2017