Results 41 to 50 of about 10,187,556 (339)

Fidelity Between Unitary Operators and the Generation of Gates Robust Against Off-Resonance Perturbations [PDF]

open access: yes, 2011
We perform a functional expansion of the fidelity between two unitary matrices in order to find the necessary conditions for the robust implementation of a target gate.
Cabrera, Renan   +3 more
core   +1 more source

Robust implementations of quantum repeaters

open access: yesPhysical Review A, 2006
We show how to efficiently exploit decoherence free subspaces (DFSs), which are immune to collective noise, for realizing quantum repeaters with long lived quantum memories. Our setup consists of an assembly of simple modules and we show how to implement them in systems of cold, neutral atoms in arrays of dipole traps.
Klein, A, Dorner, U, Alves, C, Jaksch, D
openaire   +5 more sources

Robustness Analysis of Finite Precision Implementations [PDF]

open access: yes, 2013
16 pages, extended version of APLAS 2013 ...
Goubault, E., Putot, S.
openaire   +2 more sources

Implementing Double-robust Estimators of Causal Effects [PDF]

open access: yesThe Stata Journal: Promoting communications on statistics and Stata, 2008
This article describes the implementation of a double-robust estimator for pretest–posttest studies (Lunceford and Davidian, 2004, Statistics in Medicine 23: 2937–2960) and presents a new Stata command (dr) that carries out the procedure. A double-robust estimator gives the analyst two opportunities for obtaining unbiased inference when adjusting for ...
Emsley, Richard   +3 more
openaire   +2 more sources

Robust polyhedral Minkowski sums with GPU implementation [PDF]

open access: yesComputer-Aided Design, 2015
We present a Minkowski sum algorithm for polyhedra based on convolution. We develop robust CPU and GPU implementations, using our ACP strategy to eliminate degeneracy and to enforce a user-specified backward error bound. We test the programs on 45 inputs with an error bound of 1 0 - 8 .
Kyung, Min-HO   +2 more
openaire   +2 more sources

Design and implementation of robust embedded processor for cryptographic applications [PDF]

open access: yes, 2010
Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fault attacks. Thus, some masking and fault detection algorithms must be incorporated into these implementations.
Erdem, Serdar Suer   +5 more
core   +1 more source

Implementation of a Commitment Machine for an Adaptive and Robust Expected Shortfall Estimation

open access: yesFrontiers in Artificial Intelligence, 2021
This study proposes a metaheuristic for the selection of models among different Expected Shortfall (ES) estimation methods. The proposed approach, denominated “Commitment Machine” (CM), has a strong focus on assets cross-correlation and allows to measure
Marco Bagnato   +3 more
doaj   +1 more source

Intelligent Structure Identification and Robust Control Implementation

open access: yesApplied Mechanics
This study outlines a comprehensive strategy for designing and implementing robust controllers tailored for intelligent structures. This study presents a robust control-based structural identification technique that uses the input/output data of the ...
Amalia Moutsopoulou   +4 more
doaj   +1 more source

Low-order Robust Controller for DC-DC Quadratic Buck Converter: Design and Implementation [PDF]

open access: yesJournal of Artificial Intelligence and Data Mining
This paper addresses a key challenge in designing a suitable controller for DC-DC converters to regulate the output voltage effectively within a limited time frame. In addition to non-minimum phase behavior of such type of converter, a significant issue,
Ali Sedehi   +2 more
doaj   +1 more source

Testing and implementation of a transportable and robust radio-element mapping system

open access: yesSouth African Journal of Science, 2015
Gamma ray spectroscopy has been successfully applied as a survey tool in the fields of morphology, geology and mineral exploration. Gamma ray surveys are regularly done at ground level, which frequently requires transecting remote and unforgiving ...
Jacques Bezuidenhout
doaj   +1 more source

Home - About - Disclaimer - Privacy