-
Generation of quantum phases of matter and finding maximum-weight independent set of unit-disk graphs using Rydberg atoms
Authors:
Ahmed M. Farouk,
I. I. Beterov,
Peng Xu,
I. I. Ryabtsev
Abstract:
Recent progress in quantum computing and quantum simulation of many-body systems with arrays of neutral atoms using Rydberg excitation brought unforeseen opportunities towards computational advantage in solving various optimization problems. The problem of maximum-weight independent set (MWIS) of unit-disk graphs is an example of NP-hard optimization problems. It involves finding the largest set o…
▽ More
Recent progress in quantum computing and quantum simulation of many-body systems with arrays of neutral atoms using Rydberg excitation brought unforeseen opportunities towards computational advantage in solving various optimization problems. The problem of maximum-weight independent set (MWIS) of unit-disk graphs is an example of NP-hard optimization problems. It involves finding the largest set of vertices with the maximum sum of their weights for a graph which has edges connecting all pairs of vertices within a unit distance. This problem can be solved using quantum annealing with an array of interacting Rydberg atoms. For a particular graph, a spatial arrangement of atoms represents vertices of the graph, while the detuning from the resonance at Rydberg excitation defines weights of these vertices. The edges of the graph can be drawn according to the unit disk criterion. MWIS can be obtained by applying a variational quantum adiabatic algorithm (VQAA). We consider driving the quantum system of interacting atoms to the many-body ground state using a non-linear quasi-adiabatic profile for swee** the Rydberg detuning. We also propose using a quantum wire which is a set of auxiliary atoms of a different chemical element to mediate strong coupling between the remote vertices of the graph. We investigate this effect for different lengths of the quantum wire. We also investigate the quantum phases of matter realizing commensurate and incommensurate phases in 1D and 2D spatial arrangement of the atomic array.
△ Less
Submitted 5 July, 2024; v1 submitted 16 May, 2024;
originally announced May 2024.
-
Quantum Computing: Vision and Challenges
Authors:
Sukhpal Singh Gill,
Oktay Cetinkaya,
Stefano Marrone,
Daniel Claudino,
David Haunschild,
Leon Schlote,
Huaming Wu,
Carlo Ottaviani,
Xiaoyuan Liu,
Sree Pragna Machupalli,
Kamalpreet Kaur,
Priyansh Arora,
Ji Liu,
Ahmed Farouk,
Houbing Herbert Song,
Steve Uhlig,
Kotagiri Ramamohanarao
Abstract:
The recent development of quantum computing, which uses entanglement, superposition, and other quantum fundamental concepts, can provide substantial processing advantages over traditional computing. These quantum features help solve many complex problems that cannot be solved with conventional computing methods. These problems include modeling quantum mechanics, logistics, chemical-based advances,…
▽ More
The recent development of quantum computing, which uses entanglement, superposition, and other quantum fundamental concepts, can provide substantial processing advantages over traditional computing. These quantum features help solve many complex problems that cannot be solved with conventional computing methods. These problems include modeling quantum mechanics, logistics, chemical-based advances, drug design, statistical science, sustainable energy, banking, reliable communication, and quantum chemical engineering. The last few years have witnessed remarkable advancements in quantum software and algorithm creation and quantum hardware research, which has significantly advanced the prospect of realizing quantum computers. It would be helpful to have comprehensive literature research on this area to grasp the current status and find outstanding problems that require considerable attention from the research community working in the quantum computing industry. To better understand quantum computing, this paper examines the foundations and vision based on current research in this area. We discuss cutting-edge developments in quantum computer hardware advancement and subsequent advances in quantum cryptography, quantum software, and high-scalability quantum computers. Many potential challenges and exciting new trends for quantum technology research and development are highlighted in this paper for a broader debate.
△ Less
Submitted 5 June, 2024; v1 submitted 4 March, 2024;
originally announced March 2024.
-
5G/6G-Enabled Metaverse Technologies: Taxonomy, Applications, and Open Security Challenges with Future Research Directions
Authors:
Muhammad Adil,
Houbing Song,
Muhammad Khurram Khan,
Ahmed Farouk,
Zhanpeng **
Abstract:
Internet technology has proven to be a vital contributor to many cutting-edge innovations that have given humans access to interact virtually with objects. Until now, numerous virtual systems had been developed for digital transformation to enable access to thousands of services and applications that range from virtual gaming to social networks. However, the majority of these systems lack to maint…
▽ More
Internet technology has proven to be a vital contributor to many cutting-edge innovations that have given humans access to interact virtually with objects. Until now, numerous virtual systems had been developed for digital transformation to enable access to thousands of services and applications that range from virtual gaming to social networks. However, the majority of these systems lack to maintain consistency during interconnectivity and communication. To explore this discussion, in the recent past a new term, Metaverse has been introduced, which is the combination of meta and universe that describes a shared virtual environment, where a number of technologies, such as 4th and 5th generation technologies, VR, ML algorithms etc., work collectively to support each other for the sake of one objective, which is the virtual accessibility of objects via one network platform. With the development, integration, and virtualization of technologies, a lot of improvement in daily life applications is expected, but at the same time, there is a big challenge for the research community to secure this platform from external and external threats, because this technology is exposed to many cybersecurity attacks. Hence, it is imperative to systematically review and understand the taxonomy, applications, open security challenges, and future research directions of the emerging Metaverse technologies. In this paper, we have made useful efforts to present a comprehensive survey regarding Metaverse technology by taking into account the aforesaid parameters. Following this, in the initial phase, we explored the future of Metaverse in the presence of 4th and 5th generation technologies. Thereafter, we discussed the possible attacks to set a preface for the open security challenges. Based on that, we suggested potential research directions that could be beneficial to address these challenges cost-effectively.
△ Less
Submitted 25 May, 2023;
originally announced May 2023.
-
Scalable Heteronuclear Architecture of Neutral Atoms Based on EIT
Authors:
Ahmed M. Farouk,
I. I. Beterov,
Peng Xu,
I. I. Ryabtsev
Abstract:
Based on our recent paper [arXiv:2206.12176 (2022)], we propose a scalable heteronuclear architecture of parallel implementation of CNOT gates in arrays of alkali-metal neutral atoms for quantum information processing. We considered a scheme where we perform CNOT gates in a parallel manner within the array, while they are performed sequentially between the pairs of neighboring qubits by coherently…
▽ More
Based on our recent paper [arXiv:2206.12176 (2022)], we propose a scalable heteronuclear architecture of parallel implementation of CNOT gates in arrays of alkali-metal neutral atoms for quantum information processing. We considered a scheme where we perform CNOT gates in a parallel manner within the array, while they are performed sequentially between the pairs of neighboring qubits by coherently transporting an array of atoms of one atomic species (ancilla qubits) using an array of mobile optical dipole traps generated by a 2D acousto-optic deflector (AOD). The atoms of the second atomic species (data qubits) are kept in the array of static optical dipole traps generated by spatial light modulator (SLM). The moving ancillas remain in the superposition of their logical ground states without loss of coherence, while their transportation paths avoid overlaps with the spatial positions of data atoms. We numerically optimized the system parameters to achieve the fidelity for parallelly implemented CNOT gates around $\mathcal{F}=95\%$ for the experimentally feasible conditions. Our design can be useful for implementation of surface codes for quantum error correction. Renyi entropy and mutual information are also investigated to characterize the gate performance.
△ Less
Submitted 18 May, 2023; v1 submitted 28 March, 2023;
originally announced March 2023.
-
Efficient quantum non-fungible tokens for blockchain
Authors:
Subhash Shankar Pandey,
Tadasha Dash,
Prasanta K. Panigrahi,
Ahmed Farouk
Abstract:
Blockchain is a decentralized system that allows transaction transmission and storage according to the roles of the Consensus algorithm and Smart contracts. Non-fungible tokens (NFTs) consolidate the best characteristics of blockchain technology to deliver unique and bona fide tokens, each with distinctive attributes with non-fungible resources. Unfortunately, current classical NFTs are suffering…
▽ More
Blockchain is a decentralized system that allows transaction transmission and storage according to the roles of the Consensus algorithm and Smart contracts. Non-fungible tokens (NFTs) consolidate the best characteristics of blockchain technology to deliver unique and bona fide tokens, each with distinctive attributes with non-fungible resources. Unfortunately, current classical NFTs are suffering from high costs regarding the consumed power of mining and lack of security. Therefore, this paper presents a new protocol for preparing quantum non-fungible tokens where a quantum state representing NFT is mounted on a blockchain instead of physically giving it to the owner. The proposed scheme is simulated and analyzed against various attacks and proves its ability to secure against them. Furthermore, the presented protocol provides reliable and cheaper NFTs than the classical one.
△ Less
Submitted 2 September, 2022;
originally announced September 2022.
-
Parallel implementation of CNOT$^{N}$ and C$_2$NOT$^2$ gates via homonuclear and heteronuclear Förster interactions of Rydberg atoms
Authors:
Ahmed M. Farouk,
I. I. Beterov,
Peng Xu,
S. Bergamini,
I. I. Ryabtsev
Abstract:
We analyze schemes of high-fidelity multiqubit CNOT$^{N}$ and C$_{2}$NOT$^{2}$ gates for alkali-metal neutral atoms used as qubits. These schemes are based on the electromagnetically induced transparency and Rydberg blockade, as proposed by M. Müller et al. [PRL 102, 170502 (2009)]. In the original paper, the fidelity of multi-qubit CNOT$^{\text{N}}$ gate based on Rydberg blockade was limited by t…
▽ More
We analyze schemes of high-fidelity multiqubit CNOT$^{N}$ and C$_{2}$NOT$^{2}$ gates for alkali-metal neutral atoms used as qubits. These schemes are based on the electromagnetically induced transparency and Rydberg blockade, as proposed by M. Müller et al. [PRL 102, 170502 (2009)]. In the original paper, the fidelity of multi-qubit CNOT$^{\text{N}}$ gate based on Rydberg blockade was limited by the undesirable interaction between the target atoms, and by the coupling laser intensity. We propose overcoming these limits by using strong heteronuclear dipole-dipole interactions via Förster resonances for control and target atoms, while the target atoms are coupled by weaker van der Waals interaction. We have optimized the gate performance in order to achieve higher fidelity, while kee** coupling laser intensity as small as possible in order to improve the experimental feasibility of the gate schemes. We also considered optimization of schemes of C$_{2}$NOT$^{2}$ gates, where the fidelity is affected by the relation between the control-control, control-target and target-target interaction energies. Our numeric simulations confirm that the fidelity of CNOT$^4$ gate (single control and four target atoms) can be up to $99.3\%$ and the fidelity of C$_2$NOT$^2$ (two control and two target atoms) is up to $99.7\%$ for the conditions which are experimentally feasible.
△ Less
Submitted 20 October, 2023; v1 submitted 24 June, 2022;
originally announced June 2022.
-
NEQRX: Efficient Quantum Image Encryption with Reduced Circuit Complexity
Authors:
Rakesh Saini,
Bikash K. Behera,
Saif Al-Kuwari,
Ahmed Farouk
Abstract:
Cryptography plays an important role in ensuring data security and authentication within information processing systems. As the prevalence of digital imagery continues to grow, safeguarding this form of data becomes increasingly crucial. However, existing security protocols, reliant on complex mathematical models, exhibit vulnerabilities in effectively protecting information from both internal and…
▽ More
Cryptography plays an important role in ensuring data security and authentication within information processing systems. As the prevalence of digital imagery continues to grow, safeguarding this form of data becomes increasingly crucial. However, existing security protocols, reliant on complex mathematical models, exhibit vulnerabilities in effectively protecting information from both internal and external threats. Moreover, the forthcoming advent of quantum computing poses a significant challenge, as it could decrypt data encrypted by classical. In this paper, we propose an efficient implementation scheme for a quantum image encryption algorithm combining the generalized affine transform and logistic map. We evaluated developed quantum circuits using qiskit and quantum devices to validate the encryption technique. Through comprehensive performance analysis, we have demonstrated the efficiency of the chosen encryption algorithm across various criteria. Furthermore, we introduce a hybrid methodology aimed at mitigating circuit complexity and reducing quantum cost. Leveraging the Espresso algorithm and incorporating an ancilla qubit into the circuitry, we achieve a remarkable 50\% reduction in cost while maintaining security and efficiency. Finally, we conducted robustness and security analyses to assess the resilience of our encryption method against diverse noise attacks. The results confirm that our proposed quantum image encryption technique provides a secure solution and offers precise and measurable quantum image processing capabilities.
△ Less
Submitted 26 March, 2024; v1 submitted 14 April, 2022;
originally announced April 2022.
-
Hash-MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber-Physical Systems
Authors:
Muhammad Adil,
Mian Ahmad Jan,
Spyridon Mastorakis,
Houbing Song,
Muhammad Mohsin Jadoon,
Safia Abbas,
Ahmed Farouk
Abstract:
Cyber-Physical Systems (CPS) connected in the form of Internet of Things (IoT) are vulnerable to various security threats, due to the infrastructure-less deployment of IoT devices. Device-to-Device (D2D) authentication of these networks ensures the integrity, authenticity, and confidentiality of information in the deployed area. The literature suggests different approaches to address security issu…
▽ More
Cyber-Physical Systems (CPS) connected in the form of Internet of Things (IoT) are vulnerable to various security threats, due to the infrastructure-less deployment of IoT devices. Device-to-Device (D2D) authentication of these networks ensures the integrity, authenticity, and confidentiality of information in the deployed area. The literature suggests different approaches to address security issues in CPS technologies. However, they are mostly based on centralized techniques or specific system deployments with higher cost of computation and communication. It is therefore necessary to develop an effective scheme that can resolve the security problems in CPS technologies of IoT devices. In this paper, a lightweight Hash-MAC-DSDV (Hash Media Access Control Destination Sequence Distance Vector) routing scheme is proposed to resolve authentication issues in CPS technologies, connected in the form of IoT networks. For this purpose, a CPS of IoT devices (multi-WSNs) is developed from the local-chain and public chain, respectively. The proposed scheme ensures D2D authentication by the Hash-MAC-DSDV mutual scheme, where the MAC addresses of individual devices are registered in the first phase and advertised in the network in the second phase. The proposed scheme allows legitimate devices to modify their routing table and unicast the one-way hash authentication mechanism to transfer their captured data from source towards the destination. Our evaluation results demonstrate that Hash- MAC-DSDV outweighs the existing schemes in terms of attack detection, energy consumption and communication metrics.
△ Less
Submitted 17 May, 2021;
originally announced May 2021.
-
Solving Vehicle Routing Problem Using Quantum Approximate Optimization Algorithm
Authors:
Utkarsh Azad,
Bikash K. Behera,
Emad A. Ahmed,
Prasanta K. Panigrahi,
Ahmed Farouk
Abstract:
In this paper, we describe the usage of the Quantum Approximate Optimization Algorithm (QAOA), which is a quantum-classical heuristic, to solve a combinatorial optimization and integer programming task known as Vehicle Routing Problem (VRP). We outline the Ising formulation for VRP and present a detailed procedure to solve VRP by minimizing its simulated Ising Hamiltonian using the IBM Qiskit plat…
▽ More
In this paper, we describe the usage of the Quantum Approximate Optimization Algorithm (QAOA), which is a quantum-classical heuristic, to solve a combinatorial optimization and integer programming task known as Vehicle Routing Problem (VRP). We outline the Ising formulation for VRP and present a detailed procedure to solve VRP by minimizing its simulated Ising Hamiltonian using the IBM Qiskit platform. Here, we attempt to find solutions for the VRP problems: (4,2), (5,2), and (5,3), where each (n, k) represents a VRP problem with n locations and k vehicles. We find that the performance of QAOA is not just dependent upon the classical optimizer used, the number of steps p in which an adiabatic path is realized, or the way parameters are initialized, but also on the problem instance itself.
△ Less
Submitted 23 September, 2022; v1 submitted 2 February, 2020;
originally announced February 2020.
-
Entanglement control of two-level atoms in dissipative cavities
Authors:
Reyad Salah,
Ahmed M. Farouk,
Ahmed Farouk,
M. Abdel-Aty,
A. -S. F. Obada
Abstract:
An open quantum bipartite system consisting of two independent two-level atoms interacting non-linearly with a two-mode electromagnetic cavity field is investigated by proposing a suitable non-Hermitian generalization of Hamiltonian. The mathematical procedure of obtaining the corresponding wave function of the system is clearly given. Panchartnam phase is studied to give a precise information abo…
▽ More
An open quantum bipartite system consisting of two independent two-level atoms interacting non-linearly with a two-mode electromagnetic cavity field is investigated by proposing a suitable non-Hermitian generalization of Hamiltonian. The mathematical procedure of obtaining the corresponding wave function of the system is clearly given. Panchartnam phase is studied to give a precise information about the required initial system state, which is related to artificial phase jumps, to control the Degree of Entanglement (DEM) and get the highest Concurrence. We discuss the effect of time-variation coupling, and dissipation of both atoms and cavity. The effect of the time-variation function appears as frequency modulation (FM) effect in the radio waves. Concurrence rapidly reaches the disentangled state (death of entanglement) by increasing the effect of field decay. On the contrary, the atomic decay has no effect.
△ Less
Submitted 2 August, 2019;
originally announced August 2019.
-
A General protocol for Distributed Quantum Gates
Authors:
Moein Sarvaghad-Moghaddam,
Mariam Zomorodi-Moghadam,
Ahmed Farouk
Abstract:
Distributed quantum computation requires to apply quantum remote gates on separate nodes or subsystems of network. On the other hand, Toffoli gate is a universal and well-known quantum gate. It is frequently used in synthesis of quantum circuits. In this paper, a general protocol for implementing a remote n-qubit controlled-U gate is presented with minimum required resources. Then, the proposed me…
▽ More
Distributed quantum computation requires to apply quantum remote gates on separate nodes or subsystems of network. On the other hand, Toffoli gate is a universal and well-known quantum gate. It is frequently used in synthesis of quantum circuits. In this paper, a general protocol for implementing a remote n-qubit controlled-U gate is presented with minimum required resources. Then, the proposed method is applied for implementing a Toffoli gate in bipartite and tripartite systems. This method also is optimal when group of the qubits belong to one part, section or subsystem of network. Because it only use one entangled qubit for each group of the qubits in mentioned conditions.
△ Less
Submitted 21 December, 2018; v1 submitted 19 December, 2018;
originally announced December 2018.
-
Bidirectional Quantum Controlled Teleportation by Using Five-qubit Entangled State as a Quantum Channel
Authors:
Moein Sarvaghad-Moghaddam,
Ahmed Farouk,
Hussein Abulkasim
Abstract:
In this paper, a novel protocol is proposed for implementing BQCT by using five-qubit en The proposed protocol depends on the Controlled-NOT operation, proper single-qubit unitary operations and single-qubit measurement in the Z-basis and X-basis. The results showed that the protocol is more efficient from the perspective such as lower shared qubits and, single qubit measurements compared to the p…
▽ More
In this paper, a novel protocol is proposed for implementing BQCT by using five-qubit en The proposed protocol depends on the Controlled-NOT operation, proper single-qubit unitary operations and single-qubit measurement in the Z-basis and X-basis. The results showed that the protocol is more efficient from the perspective such as lower shared qubits and, single qubit measurements compared to the previous work. Furthermore, the probability of obtaining Charlie's qubit by eavesdropper is reduced, and supervisor can control one of the users or every two users. Also, we present a new method for transmitting n and m-qubits entangled states between Alice and Bob using proposed protocol.tangled states as a quantum channel which in the same time, the communicated users can teleport each one-qubit state to each other under permission of controller.
△ Less
Submitted 19 June, 2018;
originally announced June 2018.
-
Decoherence in a $\mathcal{PT}$-symmetric qubit
Authors:
Junaid Majeed Bhat,
Muzaffar Qadir Lone,
Sanjoy Datta,
Ahmad Farouk
Abstract:
We investigate the decoherence in a $\mathcal{PT}$-symmetric qubit coupled with a bosonic bath. Using cannonical transformations, we map the non-Hermitian Hamiltonian representing the$\mathcal{PT}$-symmetric qubit to a spin boson model. Identifying the parameter α that demarcates the hermiticity and non-hermiticity in the model, we show that the qubit does not decohere at the transition from real…
▽ More
We investigate the decoherence in a $\mathcal{PT}$-symmetric qubit coupled with a bosonic bath. Using cannonical transformations, we map the non-Hermitian Hamiltonian representing the$\mathcal{PT}$-symmetric qubit to a spin boson model. Identifying the parameter α that demarcates the hermiticity and non-hermiticity in the model, we show that the qubit does not decohere at the transition from real eigen spectrum to complex eigen spectrum. Using a general class of spectral densities, the strong suppression of decoherence is observed due to both vaccum and thermal fluctuations of the bath, and initial correlations as we approach the transition point.
△ Less
Submitted 5 January, 2018; v1 submitted 7 December, 2017;
originally announced December 2017.
-
A note on the possibility of incomplete theory
Authors:
Han Geurdes,
Koji Nagata,
Tadao Nakamura,
Ahmed Farouk
Abstract:
In the paper it is demonstrated that Bells theorem is an unprovable theorem.
In the paper it is demonstrated that Bells theorem is an unprovable theorem.
△ Less
Submitted 2 May, 2019; v1 submitted 2 April, 2017;
originally announced April 2017.
-
A generalized architecture of quantum secure direct communication for N disjointed users with authentication
Authors:
Ahmed Farouk,
Magdy Zakaria,
Adel Megahed,
Fatma A. Omara
Abstract:
In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message…
▽ More
In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.
△ Less
Submitted 26 February, 2016;
originally announced February 2016.
-
Analysis And Improvement of Pairing-Free Certificate-Less Two-Party Authenticated Key Agreement Protocol For Grid Computing
Authors:
Amr Farouk,
Mohamed M. Fouad,
Ahmed A. Abdelhafez
Abstract:
The predominant grid authentication mechanisms use public key infrastructure (PKI). Nonetheless, certificate-less public key cryptography (CL-PKC) has several advantages that seem to well align with the demands of grid computing. Security and efficiency are the main objectives of grid authentication protocols. Unfortunately, certificate-less authenticated key agreement protocols rely on the biline…
▽ More
The predominant grid authentication mechanisms use public key infrastructure (PKI). Nonetheless, certificate-less public key cryptography (CL-PKC) has several advantages that seem to well align with the demands of grid computing. Security and efficiency are the main objectives of grid authentication protocols. Unfortunately, certificate-less authenticated key agreement protocols rely on the bilinear pairing, that is extremely computational expensive. In this paper, we analyze the recently secure certificateless key agreement protocols without pairing. We then propose a novel grid pairing-free certificate-less two-party authenticated key agreement (GPC-AKA) protocol, providing a more lightweight key management approach for grid users. We also show, a GPC-AKA security protocol proof using formal automated security analysis Sycther tool.
△ Less
Submitted 12 March, 2014;
originally announced March 2014.
-
An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption Algorithm (MHHEA) for Data Communication Security
Authors:
Hala A. Farouk,
Magdy Saeb
Abstract:
The hybrid hiding encryption algorithm, as its name implies, embraces concepts from both steganography and cryptography. In this exertion, an improved micro-architecture Field Programmable Gate Array (FPGA) implementation of this algorithm is presented. This design overcomes the observed limitations of a previously-designed micro-architecture. These observed limitations are: no exploitation of t…
▽ More
The hybrid hiding encryption algorithm, as its name implies, embraces concepts from both steganography and cryptography. In this exertion, an improved micro-architecture Field Programmable Gate Array (FPGA) implementation of this algorithm is presented. This design overcomes the observed limitations of a previously-designed micro-architecture. These observed limitations are: no exploitation of the possibility of parallel bit replacement, and the fact that the input plaintext was encrypted serially, which caused a dependency between the throughput and the nature of the used secret key. This dependency can be viewed by some as vulnerability in the security of the implemented micro-architecture. The proposed modified micro-architecture is constructed using five basic modules. These modules are; the message cache, the message alignment module, the key cache, the comparator, and at last the encryption module. In this work, we provide comprehensive simulation and implementation results. These are: the timing diagrams, the post-implementation timing and routing reports, and finally the floor plan. Moreover, a detailed comparison with other FPGA implementations is made available and discussed.
△ Less
Submitted 25 October, 2007;
originally announced October 2007.