Publication Cover
Mathematical and Computer Modelling of Dynamical Systems
Methods, Tools and Applications in Engineering and Related Sciences
Volume 25, 2019 - Issue 6
5,275
Views
11
CrossRef citations to date
0
Altmetric
Original Articles

Quantum-computing with AI & blockchain: modelling, fault tolerance and capacity scheduling

Pages 523-559 | Received 23 Mar 2019, Accepted 04 Oct 2019, Published online: 29 Oct 2019

ABSTRACT

We model the hardware and software architecture for generalized Internet of Things (IoT) by quantum cloud-computing and blockchain. To reduce the measurement error and increase the efficiency of quantum entanglement (i.e. the capability of fault tolerance) in the current quantum computers and communications, we design a quantum-computing chip by modelling it as a multi-input multi-output (MIMO) quantum channel and obtain its channel capacity via our recently derived mutual information formula. To capture the internal qubit data flow dynamics of the channel, we model it via a deep convolutional neural network (DCNN) with generalized stochastic pooling in terms of resource-competition among different quantum eigenmodes or users. The pooling is corresponding to a resource allocation policy with two levels of competitions as in cognitive radio: the first one is on users’ selection in a ‘win–lose’ manner; the second one is on resourcesharing among selected users in a ‘win–win’ manner. To wit, our scheduling policy is the one by mixing a saddle point to a zero-sum game problem and a Pareto optimal Nash equilibrium point to a nonzero- sum game problem. The effectiveness of our policy is proved by diffusion modelling with theory and numerical examples.

1. Introduction

With the emergence of quantum-computing (see, e.g. Courtland [Citation1], Dai [Citation2], Deutsch [Citation3], Feynman [Citation4], Gibney [Citation5], Nielsen and Chuang [Citation6]), the currently implementing Industrial 4.0 (IR 4.0, see, e.g. Schwab [Citation7]) will be quickly evolving to Industrial 6.0 (IR 6.0, see, e.g. SIR (Sixth Industrial Revolution) Forum [Citation8]). SIR Forum is an U.S. Los Angeles based Forum and was founded in February of 2018. It foresaw that the quantum computing and blockchain will be the core technology of IR 6.0. Comparing with the today’s system, the future quantum system will have extremely powerful processing, storage, tracing and management capability with strong artificial intelligence (AI), which makes the future (strong or generalized) Internet of Things (IoT) possible. This generalized IoT can be called as Internet of Every Thing (see, e.g. ; Dai [Citation2] and Santucci [Citation9]).

Figure 1. Evolution of industrial revolution and internet of every thing (IoT).

Figure 1. Evolution of industrial revolution and internet of every thing (IoT).

Conceptually, an IoT consists of two parts: Internet and Things. However, the most important feature in an IoT is the efficient interaction between Internet and Things. To reach the efficiency, it requires high-performance network hardware and intelligent softwares with effective integration to realize the future Internet as designed in . More precisely, inside the IoT network system, there is an interactive hardware and software system as structured in . To realize the interaction between Internet and Things, hardware quantum computing centres and physical Things must be integrated together as in through a data storage and software managing system called quantum blockchain as in with flow chart in . Note that, in , we consider the Thing as the future quantum MIMO wireless channel, which reflects the trend of future advancements on mobile cloud-computing (see, e.g. Dai [Citation10]).

Figure 2. Blockchain protocol evolution and quantum network architecture.

Figure 2. Blockchain protocol evolution and quantum network architecture.

In the current era of Industrial 4.0, Things in an IoT (see. e.g. the left-hand side in ) represent the real-world application systems that can be the intelligent end-user’s devices or their generalized forms such as a power and energy system or a supply chain system (see, e.g. Artemis [Citation11] and Dai [Citation2]). However, in the defined Industrial 5.0 of human–machine interactions, Things in an IoT can even be our own human beings (see, e.g. the lower-right graph in ; Dai [Citation12] and Haykin [Citation13]). The interactions between Internet and Things in an IoT can be realized through optical fibre linkages or wireless multi-input multi-output (MIMO) communication (e.g. 4G, 5G or even the future 6G) channels as shown in and as discussed in Dai [Citation2]. In an IoT, Internet is the major information processing and transmission system (see, e.g. its network architecture in and the study in Dai [Citation14]).

It was originated from the U.S. based ARRP (Advanced Research Projects Agency) and initially implemented in U.S. Navy around the late 1960s (see, e.g. Comer [Citation15]) and then went to civil usage. Traditionally, the transmitted IP packet in each node is not stored or not fully stored due to the limitation of processing and storage capacity. Nevertheless, with the increasing of the service capacity, the blockchain technology with data storage at each node becomes implementable and is even predicted its usage in the U.S. Navy Aegis communication system with the encryption of 256 bit Hashes (see, e.g. ). Furthermore, to further its efficiency and security, quantum computers come up such as IBM 50-qubit, Google 72-qubit and Rigetti 128-qubit quantum computers. With the enhancements of these quantum computers, the new quantum-computing Moore’s law (see, e.g. Bertels [Citation16]) targeting the realization of a n-qubit based quantum computing for a continuously increasing number n is emerging. When n is larger, the corresponding computation power will meet the needs of many real-world applications, e.g. 30-qubit = 10 trillion floating-point operation and 50-qubit = 10 billions of billion floating-point operation (see, e.g. Fan [Citation17]). Thus, we can predict that the current internet protocol (IP) and MIMO communication network will be replaced by quantum IP and quantum MIMO based ones around the next 25 years. Moreover, they will be powered by quantum-cloud-computing and quantum blockchain with the storage capability in each service centre and switch node (see, e.g. and Dai [Citation14]). From one end-user to another one, the user’s quantum data flow consists of qubit data packets will be transmitted from one quantum cloud-computing centre to another one via quantum IP managed by network quantum blockchain software management system (see, e.g. the quantum IP network in with embedded blockchain in , and the discussions in Dai [Citation2], Rajan and Visser [Citation18]). For future references, we call this quantum IP network as a QBP internet (a quantum-blockchain-protocol based internet).

Figure 3. Quantum-blockchain evolution and processing chart.

Figure 3. Quantum-blockchain evolution and processing chart.

Blockchain is a quickly developing data storage and service technology, which is widely used in IoT, FinTech, Bitcoin/Ethereum, and other applications (see, e.g. Dai [Citation2], Buterin [Citation19], Iansiti and Lakehani [Citation20], Nakamoto [Citation21]) with the functionalities of blockchain management, transaction generation, node communication and block mining. More precisely, blockchain is an orderly distributed database (or called a ledger) system with processing chart of software architecture as presented in . With the appearance of real quantum computers built from IBM, Google, Rigetti, D-Wave, etc., it is recently evolving to the quantum-blockchain by substituting the standard cryptographic Hash functions to quantum cryptographic Hash functions (see, e.g. Rajan and Visser [Citation18]). Unchangeable data history and highly secured signature procedure make each trading transaction more safe than ever. Smart contracts in conducting block mining and flexible node communications make it realizable for the blockchain management to be decentralized and can be realized by implementing strategies through running various algorithms aided with AI. In doing so, the efficient interaction between blockchain and its supporting high-performance quantum-computing hardware facilities is a necessity (see, e.g. and Dai [Citation2]).

Figure 4. A quantum computing platform with parallel-queues and multiple pools. The upper-left blockchain is from Dai [Citation2] and is detailed in . The lower-right graph is a quantum MIMO wireless channel.

Figure 4. A quantum computing platform with parallel-queues and multiple pools. The upper-left blockchain is from Dai [Citation2] and is detailed in Figure 3. The lower-right graph is a quantum MIMO wireless channel.

Currently, there are numerous physical realizations of quantum computers (e.g. those announced by IBM, Google, Rigetti and D-Wave), which are mainly based on four quantum computing models of practical importance besides the theoretical quantum Turing machine (see, e.g. see, e.g. Deutsch [Citation3], Feynman [Citation4], Nielsen and Chuang [Citation6]). However, the performance of these quantum computers still has much more room to improve in terms of error measurement, computing efficiency, energy consumption and cost. Hence, in this paper, we first propose a quantum-computer chip by modelling it as an MIMO channel. This design was originally announced by Dai [Citation22] as a keynote speech in an IEEE conference. Here, we further formalize it and try to make it publicly available. Then, by the mutual information formula derived in Dai [Citation23], we can study the quantum entanglement and fault tolerance concerning signal measurements and determine the service capacity for our proposed quantum channels. During the procedure, there are two types of problems involved: how to allocate power (or rate) resource to different eigenmodes in a quantum-computing channel and how to allocate the rate resource to different users in quantum-cloud-computing service centres. To solve these problems, we model the internal qubit data flow dynamics of the quantum channel through a deep convolution neural network (DCNN) with generalized stochastic pooling in terms of resource-competition users (see, e.g. ).

Figure 5. An DCNN with quantum processor and generalized stochastic pooling. The upper graph is adapted from .

Figure 5. An DCNN with quantum processor and generalized stochastic pooling. The upper graph is adapted from Figure 8.

This dynamical system is corresponding to a so-called game platform that was initially studied in Dai [Citation2,Citation24]. To be consistent with the study in the current AI era, we here use the terminology ‘DCNN with stochastic pooling’ (see, e.g. Zeiler and Fergus [Citation25]) to replace the original one to describe the data flow dynamics in our ‘game platform’. Furthermore, in the studies of Dai [Citation2,Citation24], only a ‘win–win’ non-zero-sum Pareto optimal Nash equilibrium policy was designed dynamically. However, in this paper, we extend this policy to allow the stochastic pooling in our DCNN to have one more competition level with ‘win–lose’ users. In other words, our generalized policy is the one by mixing a saddle point to a zero-sum game problem and a Pareto optimal Nash equilibrium point to a non-zero-sum game problem, which can also be used in more other applications, such as, cognitive radio (see, e.g. Akyildiz et al. [Citation26], Haykin [Citation13]), Internet of Energy (IoE, see, e.g. Artemis [Citation11] and Dai [Citation2]) and FinTech (see, e.g. Buterin [Citation19], Nakamoto [Citation21]).

More precisely, in our game platform, we use the triply stochastic renewal reward process (TSRRP) studied in Dai [Citation2] to model the random dynamics of the input quantum qubit data packet flows (or called big data flows, see, e.g. De Mauro et al. [Citation27], Dedić and Stanier [Citation28], Snijders et al. [Citation29]). Furthermore, as in Dai [Citation2], we model the dynamical rate capacity available for resource-competing users at each channel or service pool as a randomly evolving capacity region driven by a finite state continuous Markov chain (FS-CTMC). The parallel-queues in this platform (see, e.g. and ) are used to storage and buffer quantum qubit data packets from their corresponding users. Each queue may be served simultaneously by multiple intelligent quantum-computing channels or service pools while each channel or pool may also serve multiple queues at the same time via running smart policies in the blockchain (see, e.g. ). However, to reflect the dynamic evolving nature of real-world systems and to realize the decentralized operation in a blockchain, the users to be selected at a time is random, the number of pools to serve a particular queue is random, and the number of queues to be served by a particular pool is also random. The efficiency or optimization concerning our designed policy is in terms of system delay, revenue, profit, cost, etc. We will model them through certain utility functions with respect to the performance measures of their internal quantum qubit data flow dynamics such as queue length and workload processes. To illustrate the effectiveness of our policy, we establish a reflecting diffusion with regime-switching (RDRS) model for the performance measures under our proposed policy in order to offer services to different users in an optimal and fair way. Based on this RDRS model, our designed policy is effectively implemented with numerical examples.

The remainder of the paper is organized as follows. In Section 2, we present the quantum system formulation modelled by MIMO channels, fault tolerance by quantum mutual information, quantum storage and particle queueing dynamics. In Section 3, we present the RDRS model and the performance modelling for its internal quantum qubit data flow dynamics of the modelled quantum channel by the RDRS model. Main DCNN and game-competition based scheduling policy together with theoretical modelling results are presented. Numerical simulation examples are also given in this section. In Section 4, we formally prove our main theoretical results. In Section 5, we conclude the paper with remarks.

2. Quantum system formulation modelled by MIMO channels

This section consists of two subsections: qubit presentation and quantum mutual information, quantum storage and particle queueing dynamics.

2.1. Qubit presentation and quantum mutual information

In a quantum-computing-based computer or communication system, the basic information unit is a n-qubit with n{1,2,...} and can be expressed through the conventional complex column-vector oriented ket-notation. More precisely, a state |Ψ of n-qubit register is represented by

(2.1) |Ψ=jl{0,1},l{1,...,n}ψj1...jn|j1...jn,(2.1)

where, |j1...jn for each jl{0,1} and l{1,...,n}} is called an eigenstate and there are total number 2n of them. In the meanwhile, the basis of bit strings {j1...jn:jl{0,1},l{1,...,n}} is known as the computational basis with the corresponding complex coefficients denoted by {ψj1...jn}. For example, a special case corresponding to the expression in (2.1) with n=1 and ψ0=ψ1=1/2 can be realized via the Hadamard gate H (see, e.g. Deutsch [Citation3], Feynman [Citation4], Nielsen and Chuang [Citation6]) as follows,

H=121111,
H|0=(|0+|1)/2,
H|1=(|0|1)/2.

The sum of the squares of the coefficients’ absolute values in (2.1) must be the unity, i.e.

(2.2) jl{0,1},l{1,...,n}ψj1...jn2=1.(2.2)

For each bit string, j1...jn, |ψj1...jn|2 gives the probability of the system being found in the (j1...jn)th state after a measurement. However, because a complex number encodes not just a magnitude but also a direction in the complex plane, the phase difference between any two coefficients (states) denotes a meaningful parameter. This is a fundamental difference between quantum computing and probabilistic classical computing. Under this computational basis, a state |Ψ of n-qubit register can be represented by its coefficients {ψj1...jn}. For examples, if n=3, |010=(0,0,1,0,0, 0,0,0) and if n=1, |0=(1,0) while |1=(0,1), where, the prime denotes the transpose of a vector. Note that, if n=1, a single qubit can be used to denote a particle spinning up and down at the same time. The possible quantum states for a single qubit is visualized by the so-called Bloch sphere as in the left-upper graph of , where |Ψ=ψ0|0+ψ1|1withψ0=cosθ/2andβ=eiϕsin(θ/2). Note that, the Bloch sphere is the surface of a ball and hence is a two-dimensional manifold since it can be represented by a collection of two-dimensional maps. In the sequel, we just simply call it a 2-sphere by mathematical convention. A pure qubit state can be represented by any point on such a 2-sphere with corresponding angles θ and ϕ. More precisely, θ is the angle between z-axis and |Ψ, and ϕ is the angle between x-axis and the projection of |Ψ onto xy-plane.

Figure 6. Qubit representation and random walk.

Figure 6. Qubit representation and random walk.

In the future quantum cloud-computing and communication system (see, for a newly designed example), the traditional binary (zero or one) bit based data packets will be replaced by quantum data packets. Each of them will consist of user’s data payload and packet head that indicates the service requirements managed by system software called quantum blockchain in Dai [Citation2] (see, for detail). The length of a quantum data packet is the number of qubits randomly walking over the Bloch sphere as shown in the lower-right graph of . Note that, the random step size for each walk along a particular direction over the sphere may be greater than the unity. Furthermore, the packet length is also random from one quantum data packet to another one. However, no matter whether in a quantum computer or in a quantum communication channel, the service time and quality for a quantum data packet depends on the measurement of each single source qubit. Currently, there are numerous physical realizations of quantum computers, which are mainly based on four quantum computing models of practical importance besides the theoretical quantum Turing machine (see, e.g. Deutsch [Citation3], Feynma [Citation4], Nielsen and Chuang [Citation6]). However, the error from the measurement or unitary operation is still the issue. In general, due to the non-cloning theorem (see, e.g. Niestegge [Citation30], Wootters and Zurek [Citation31]), unknown pure quantum states cannot be copied unless they are orthogonal. Nevertheless, according to Niestegge [Citation30] and references therein, the approximate or imperfect cloning of quantum states is possible, e.g. via a generalized non-Gaussian mutual information formula (see, e.g. Dai [Citation23]) by developing a quantum channel between quantum states and their measurements (or their received states) in a probabilistic way. Furthermore, the quantum Zeno effect or called Zeno’s paradox (i.e. the inhibition of transitions between quantum states by frequent measurements, see, e.g. Itano et al. [Citation32], Misra and Sudarshan [Citation33]) is the other concerned issue. Nevertheless, inside the recently realized IBM 50 qubit quantum computer, the quantum coherence time (the time gap to keep a channel stable (i.e. to keep the number of quantum states the same)) can last up to 90 μs to reduce the influence of Zeno effect, which is enough for the quantum computer to perform the required operation and realize one 20-qubit quantum entanglement in 187 ns (see, e.g. the latest announcement in Song et al. [Citation34]). Therefore, with the hope to reduce the error, we develop a quantum channel method in performing the measurement and computation, which is evolved from the one currently being implemented in MIMO wireless channel (see e.g. Dai [Citation2,Citation24]). An example of such a quantum channel is presented in the lower graph of and illustrated via a comparison with an MIMO channel in the upper-left graph of the figure.

More precisely, consider a quantum state |Ψ as a wave-packet and suppose that there is an eigenmode corresponding to each eigenstate |j1...jn with jl{0,1} and l{1,...,n} in the n-qubit register of (2.1). The processing based on a single n-qubit chip (e.g. the one designed in the lower graph of ) is more like the one in a single-user MIMO wireless broadcast channel (currently used for 4G/5G wireless communications, see, e.g. Dai [Citation2,Citation24]).

Figure 7. A comparison between 1-qubit quantum chip in the lower graph and OAM MIMO channel in the upper-left graph, which is illustrated via an intermediate double-slit experiment in the upper-right graph. Channel function G(Φ,Ψ) is derived in (2.10). The two upper graphs are not parts of our designed quantum channel, which are presented only for the purpose of comparison and illustration.

Figure 7. A comparison between 1-qubit quantum chip in the lower graph and OAM MIMO channel in the upper-left graph, which is illustrated via an intermediate double-slit experiment in the upper-right graph. Channel function G(Φ,Ψ) is derived in (2.10). The two upper graphs are not parts of our designed quantum channel, which are presented only for the purpose of comparison and illustration.

In the upper-left graph of , an orbital angular momentum (OAM) channel (i.e. a particular MIMO channel) is pictured, where, each output wave is with given deterministic frequency and phase. However, to be more illustrative, let us observe the upper-right graph (enhanced from Chang [Citation35]) of for a double-slit experiment, bifurcation occurs along the moving paths of quantum particles (see, e.g. Dai [Citation23]). In other words, the output wave is uncertain due to the random phases associated with different quantum particles, which is also related to quantum walks with random phase shifts (see, e.g. Košík et al. [Citation36]). Therefore, the input/output waves in this quantum-computing system form a probabilistic MIMO channel (see, e.g. in the lower graph of ) and it can be modelled in a generalized way as follows.

Each eigenmode is with power allocation P|j1...jn and the total power allocation on the chip processing is subject to a constraint P such that

(2.3) jl{0,1},l{1,...,n}P|j1...jn=P.(2.3)

A n-qubit may be measured in a quantum computer or a quantum communication network. In the later case, some switch functionality may also be involved (e.g. for an entanglement between two qubits and see Sawerwain and Wiśniewska [Citation37] for a reference). Thus, we add a switch gate S to our quantum channel. For a quantum state |Φ with complex coefficients {ϕj1...jn,jl{0,1},l{1,...,n}}, its corresponding state after switching is denoted by S|Φ. If the quantum gate S takes an identity matrix I, this gate placed in a quantum circuit does not perform any operation on the n-qubit, e.g. S|Φ=I|Φ=|Φ. However, in a general situation, the gate S will do the required switch operations. For examples, we can take S to be a 1-qubit Pauli gate X or a 2-qubit CNOT gate to perform the switch functionality,

(2.4) X=0110,CNOT=1000010000010010.(2.4)

Then, we have the following switch results corresponding to n=1 and n=2, respectively,

CNOT|00=|00,X|0=|1,CNOT|01=|01,X|1=|0,CNOT|10=|11,CNOT|11=|10.

Furthermore, let H(ϕ) be the column vector formed by {ϕj1...jn} and H(ϕ) be its associated row vector formed by the conjugate complex numbers {ϕj1...jn}. To be more illustrative, we use an index h{h0,h1,...,h2n1}={0,1,...,2n1} to denote its corresponding index j1jn in (2.1) for an integer jl{0,1} and each number l{1,...,n} as follows,

(2.5) h=2n1jn+2n2jn1+...+2j2+j1.(2.5)

Then, H(ϕ) and H(ϕ) can be explicitly expressed by

(2.6) H(ϕ)=(ϕh0,...,ϕh2n1),H(ϕ)=(ϕh0,...,ϕh2n1).(2.6)

Furthermore, let e(n) be the 2n×2n matrix given by

(2.7) e(n)=(|h0|h1|h2n1),(2.7)

where, |hi with an i{0,1,...,2n1} is a column vector corresponding to a |j1jn for an integer jl{0,1} and each number l{1,...,n}. Thus, n-qubits S|Φ and |Ψ can be denoted by

(2.8) S|Φ=Se(n)H(ϕ),|Ψ=e(n)H(ψ).(2.8)

Thus, under the assumption that the matrix H(ϕ)H(ϕ) is invertible, we can conclude that

(2.9) e(n)=|ΦH(ϕ)H(ϕ)H(ϕ)1.(2.9)

Furthermore, by the expressions in (2.1), (2.8) and (2.9), we can derive a quantum-computing and measurement channel (i.e. a quantum communication channel with an example in ) between the original n-qubit |Φ and the measured n-qubit |Ψ as follows,

(2.10) |Ψ=|ΦH(ϕ)H(ϕ)H(ϕ)1H(ψ).(2.10)

Figure 8. A 2-qubit quantum-computing and measurement channel with channel function G(Φ,Ψ) derived in (2.10).

Figure 8. A 2-qubit quantum-computing and measurement channel with channel function G(Φ,Ψ) derived in (2.10).

Thus, we are aimed to measure |Φ through |Ψ in (2.10) as accurate as possible. The ideal case is such that the measurement has the closest quantum entanglement properties between S|Φ and |Ψ in terms of position, momentum, spin and polarization (see, e.g. Deutsch [Citation3], Feynman [Citation4], Nielsen and Chuang [Citation6]). Since S|Φ in (2.10) is random with distribution S(|ϕ0...0|2,...,|ϕj1...jn|2,...,|ϕ1...1|2), we use M to denote its covariance matrix and let Tr(M) be its trace. If we endow each eigenmode with the power Pj1...jn, i.e. (Tr(M))j1...jnPj1...jn, an MIMO MAC channel will be related (see, e.g. Dai [Citation24] and Goldsmith et al. [Citation38]). However, if we endow the whole quantum computer chip with the total power P, i.e. Tr(M)P, an MIMO BC channel will be concerned (see, e.g. Dai [Citation24] and Goldsmith et al. [Citation38]). In both cases, the maximal transmission rates or minimal error measurements can be reached by applying mutual information formulas and water-filling coding techniques (see, e.g. Cover and Thomas [Citation39], Dai [Citation23], Goldsmith et al. [Citation38]).

2.2. Quantum storage and particle queueing dynamics

In this subsection, we assume that the quantum cloud-computing and communication system has V service pools (indexed by a set of positive integers V{1,...,V}) and J queues in parallel (indexed by jJ{1,...,J} and corresponding to J users) as shown in . Each pool is equipped with Jv number of flexible quantum-computer based parallel-servers, where v is an integer in V. Associated with the queues, there is an J-dimensional quantum data packet arrival process A={A(t)=(A1(t),...,AJ(t)), t0}, where Aj(t) with jJ and t0 is the number of n-qubit data packets that arrive at the jth queue during (0,t]. Note that, here and elsewhere in the paper, the prime denotes the transpose of a vector or a matrix. The size of the quantum data packet is supposed to be a random number ζ{1,2,...}. In other words, each quantum data packet can be denoted by a sequence of n-qubits {|Φ1,...,|Φζ}, where, |Φi for each i{1,2,...,ζ} denotes a n-qubit. For example, the single packet shown in the upper-left corner of consists of seven 2-qubits including the two green ones, i.e. ζ=7. The whole system is supposed to be driven by a stationary FS-CTMC α={α(t),t[0,)} with a finite state space K{1,...,K}. The generator matrix of α() is denoted by G=(gil) with i,lK, and

(2.11) gil=γ(i)ifi=l,γ(i)qilifil,(2.11)

where, γ(i) is the holding rate for the chain staying in a state iK and Q=(qil) is the transition matrix of its embedded discrete-time Markov chain (see, e.g. Resnick [Citation40]). Furthermore, let τn for each nonnegative integer n{0,1,...} be defined by

(2.12) τ00,τninf{t>τn1:α(t)α(t)}.(2.12)

In other words, τn is a random jump time of the Markovian process α(). As in Dai [Citation2], we model the arrival process Aj() for each jJ by an TSRRP, and for convenience, we recall the definition of an TSRRP as follows.

Definition 2.1 A process Aj() with jJ{1,...,J} is called an TSRRP if Aj(τn+) for each n{0,1,...} is the counting process corresponding to a (conditional) delayed renewal reward process with arrival rate λj(α(τn)) and mean reward mj(α(τn)) associated with finite squared coefficients of variations αj2(α(τn)) and ζj2(α(τn)) during time interval [τn,τn+1).

In addition, we let {uj(k),k=1,2,...} be the sequence of times between the arrivals of the (k1)th and the kth reward batches of packets at the jth queue. The corresponding batch reward is denoted by wj(k) and all the packets arrived with it are indexed in certain successive order. Then, we can define the renewal counting process associated with the inter-arrival time sequence {uj(k),k=1,2,...} for each jJ by

(2.13) Nj(t)=supn0:k=1nuj(k)t.(2.13)

Hence, we can present the TSRRP Aj() via

(2.14) Aj(t)=k=1Nj(t)wj(k).(2.14)

Each n-qubit based packet will first get service in the system and then leave it. The service is managed by a quantum blockchain as designed in and , which is the future version of the current blockchain (see, e.g. Dai [Citation2], Rajan and Visser [Citation18]). In this blockchain, the service for a quantum packet consists two parts: security checking and policy computation (or real data payload transmission). After the service, the security information and the policy (or the transmission result) will be stored and copied to all the participating partner nodes for storage. In Dai [Citation2], we call the service corresponding to the policy computation as a virtue big data service and the service corresponding to the data payload transmission as a real big data service. Furthermore, we let {vj(k),k=1,2,...} be the sequence of successive arrived packet lengths at queue j, which is supposed to be a sequence of strictly positive i.i.d. random variables with average packet length 1/μj(0,) and squared coefficient of variation βj2(0,). In addition, we assume that all inter-arrival and service time processes are mutually (conditionally) independent when the environmental state is fixed. For each jJ and each nonnegative constant h, we use Sj() to represent the renewal counting process associated with {vj(k),k=1,2,...}, i.e.

(2.15) Sj(h)=supn0:k=1nvj(k)h.(2.15)

Let Qj(t) be the jth queue length with jJ at each time t[0,) and Dj(t) be the number of packet departures from the jth queue in (0,t]. Then, the queueing dynamics governing the evolving of data in and data out in the platform can be modelled by

(2.16) Qj(t)=Qj(0)+Aj(t)Dj(t),(2.16)

where, each queue is supposed to have an infinite storage capacity to buffer real or virtue data packets (jobs) arrived for a given user. Furthermore, let Tj(t) denote the cumulative amount of service given to the jth queue up to time t, i.e.

(2.17) Tj(t)=0tΛj(Q(s),α(s))ds,(2.17)

where, Λj for each s[0,] and jJ is the summation of all service rates allocated to the jth user at time s from all possible pools and servers. Note that, Λj is given in a feedback control form and depends on both the current queue length Q(s) and the system state α(s) at a time s. Thus, if we use Sj(t) to denote the total number of jobs (packets) that finishes service in the system by time t, we know that Dj(t)=Sj(Tj(t)). Finally, we let W(t) and Wj(t) denote the (expected) total workload in the system at time t and the one corresponding to user j at time t, i.e.

(2.18) W(t)=j=1JWj(t),Wj(t)=Qj(t)μj.(2.18)

In the following study, we will employ W(t) and Q(t) as performance measures and design a rate scheduling policy Λ=(Λ1,...ΛJ) for different service pools and servers to all the users in order that the total workload W(t) and its associated total cost are minimized. Furthermore, as in the study of Dai [Citation2], the available resources in our current system are generally transformed into service rates although they can be interpreted as other forms, e.g. power in an MIMO wireless channel or in a quantum-computing and measurement channel. In addition, we assume that the available resources from different pools and servers can be flexibly allocated and shared between the system and users, i.e. the system operates under a concurrent resource occupancy service regime.

3. The RDRS model and performance modelling

As pointed out in Dai [Citation2] that, although TSRRPs can exactly model big data arrival streams, it is hard to directly analyse the corresponding physical queueing model in (2.16) or the physical workload model in (2.18) owing to the non-Markovian characteristics of TSRRPs. Hence, in Dai [Citation2], we have used diffusion models to approximate Q(t) and W(t) in (2.16) and (2.18) under different scheduling policies. In this paper, we will continue to employ this scheme to identify the RDRS model corresponding to our newly designed mixed zero-sum and non-zero-sum game-competition oriented scheduling policy by considering our queueing system under the asymptotic regime, where it is heavily loaded, i.e. under the so-called heavy traffic (load balance) condition. Furthermore, we will conduct model justification via diffusion approximation. In addition, we present a simulation case study to show the effectiveness of the identified RDRS model for our newly proposed scheduling policy. The corresponding simulation results are displayed in and their interpretations are presented in Subsection 3.4.

Figure 9. In this simulation, the number of simulation iterative times is N = 96,000, the simulation time interval is [0,T] with T=30, which is further divided into n=10000 subintervals as explained in Subsection 3.4. Other values of simulation parameters introduced in Definition 3.1 and Subsubsection 3.2.1 are as follows: λ1=85/3, λ2=85, m1=3, m2=1, μ1=1/10, μ2=1/20, α1=10, α2=20, β1=10, β2=20, ζ1=1, ζ2=2, ρ1=ρ2=1000, c12=c21=1500, θ1=1, θ2=1.2.

Figure 9. In this simulation, the number of simulation iterative times is N = 96,000, the simulation time interval is [0,T] with T=30, which is further divided into n=10000 subintervals as explained in Subsection 3.4. Other values of simulation parameters introduced in Definition 3.1 and Subsubsection 3.2.1 are as follows: λ1=85/3, λ2=85, m1=3, m2=1, μ1=1/10, μ2=1/20, α1=10, α2=20, β1=10, β2=20, ζ1=1, ζ2=2, ρ1=ρ2=1000, c12=c21=1500, θ1=−1, θ2=−1.2.

3.1. Main claim on RDRS modelling via AI decision

In this subsection, we first present our main claim concerning our RDRS modelling via AI decision. Then, we recall the definition of RDRS model as introduced in Dai [Citation2] for convenience. In doing so, for each t0 and jJ, we define two sequences of diffusion-scaled processes Qˆr() and Wˆr() by

(3.1) Qˆjr(t)Qjr(r2t)r,Wˆr(t)Wr(r2t)r,(3.1)

where, {r,rR} is assumed to be a strictly increasing sequence of positive real numbers and tends to infinity. Thus, we can present our main claim as follows.

Under the heavy traffic condition described in Section 4, the sequence of 2-tuple scaled processes in (3.1) corresponding to an DCNN and game-competition based AI scheduling policy that is proposed in the following subsection, converges jointly in distribution, i.e.

(3.2) (Qˆr(),Wˆr())(Qˆ(),Wˆ())alongrR,(3.2)

where, Wˆ() is presented by an RDRS model and Qˆ() is an asymptotic mixed saddle point and Pareto minimal-dual-cost Nash equilibrium policy process globally over [0,).

Definition 3.1 A u-dimensional stochastic process Zˆ() with uJ is called an RDRS with oblique reflection if it can be uniquely represented as

(3.3) Zˆ(t)=Xˆ(t)+0tR(α(s),s)dYˆ(s)0,(3.3)

where

(3.4) dXˆ(t)=b(α(t),t)dt+σE(t)dHˆE(t)+σS(t)dHˆS(t).(3.4)

Furthermore, b(α(t),t)=(b1(α(t),t),...,bu(α(t),t) is a u-dimensional vector, σE(t) and σS(t) are u×J matrices, and R(α(t),t) for each tR+ is a u×u matrix. In addition, (Zˆ(),Yˆ()) is continuous a.s. and is a solution of (3.3) with the properties for each j{1,...,u},

1. Yˆj(0)=0;

2. Each component Yˆj() of Yˆ()=(Yˆ1(),...,Yˆu()) is non-decreasing;

3. Each component Yˆj() can increase only at a time t[0,) that Zˆj(t)=0, i.e.

0Zˆj(t)dYˆj(t)=0.

In addition, a solution to the RDRS in (3.3) – (3.4) is called a strong solution if it is in the pathwise sense and is called a weak solution if it is in the sense of distribution.

Concerning the well-posedness of an RDRS, readers are referred to a general discussion in Dai [Citation23]. Moreover, in Definition 3.1, the processes BE() and BS() are respectively two J-dimensional standard Brownian motions, which are independent each other. For each state iK and a time t[0,), the nominal arrival rate vector λ(i), the mean reward vector m(i), the nominal throughput vector ρ(i), and a constant parameter vector θ(i) are defined as follows,

(3.5) λ(i)=(λ1(i),...,λJ(i)),(3.5)
(3.6) m(i)=(m1(i),...,mJ(i)),(3.6)
(3.7) ρ(i)=ρ1(i),...,ρJ(i),(3.7)
(3.8) θ(i)=(θ1(i),...,θJ(i)).(3.8)

Furthermore, the covariance matrices are defined as

(3.9) ΓE(i)=ΓklE(i)J×Jdiagλ1(i)m12(i)ζ12(i)+λ1(i)m1(i)α12,,λJ(i)mJ2(i)ζJ2(i)+λJ(i)mJ(i)αJ2,(3.9)
(3.10) ΓS(i)=ΓklS(i)J×Jdiagλ1(i)m1(i)β12,,λJ(i)mJ(i)βJ2.(3.10)

In addition, the Itô’s integrals in terms of the Brownian motions are defined as

(3.11) Hˆe(t)=Hˆ1e(t),...,HˆJe(t)withe{E,S},(3.11)
(3.12) Hˆje(t)=0tΓjje(α(s))dBje(s).(3.12)

3.2. The DCNN and game-competition based AI scheduling policy

In this subsection, we design an AI based scheduling strategy by combining DCNN with mixed zero-sum and non-zero-sum myopic game-competition policy for the purpose as stated in the previous subsection and as shown in . To be easy, we begin with an illustrative example.

3.2.1. A scheduling policy example

In this subsection, we focus our study on a single-pool system served by a single 1-qubit quantum computer as shown in the lower graph of .

Figure 10. Two capacity regions for users with cooperation and zero-sum game competition.

Figure 10. Two capacity regions for users with cooperation and zero-sum game competition.

Thus, we will omit the related pool index v in our discussion of this subsection for simplicity. Related to this system, two cases will be concerned as shown in . The first case is corresponding to the upper graph in , where only single user is allowed. However, we can pretend to allocate the user’s arrival packets into two separate storage buffers with certain proportions as in the lower graph of . In this case, we are interested in the issue concerning the rate (i.e. power) resource allocation cooperatively between the two eigenmodes inside the quantum computer. More precisely, in , we take V=1 and J=2 (i.e. we think of the single-pool system with two eigenmodes as a two user MIMO channel). Furthermore, we assume that the state space of the FS-CTMC α(t) defined in Subsection 2.2 consists only of a single state 1 (i.e. α(t)1 for all t[0,)). In an MIMO wireless environment, such a case is corresponding to the so-called pseudo static channels (see, e.g. Dai [Citation24] and Bhardwaj et al. [Citation41]). Then, the capacity region denoted by R is assumed to be a non-degenerate convex one confined by five boundary lines including the two ones on x-axis and y-axis as shown in the upper-right graph of . The capacity upper bound of the region satisfies c1+c2=2000. This region is corresponding to a degenerate fixed MIMO wireless channel of the generally randomized one in Dai [Citation24]. For each rate vector c=(c1,c2)R, we take the utility functions for user 1 and user 2, respectively, by

(3.13) U1(q,c)=U1(q1,c1)=q1ln(c1),U2(q,c)=U2(q2,c2)=q22c22,(3.13)

where, ln() is the logarithm function with the base e. Furthermore, the vector q=(q1,q2)[0,)×[0,) is a given queue length of 2-users and it corresponds to the queue length process Q(t) defined in (2.16) at a particular time point. The utility functions U1 and U2 are called proportionally fair and minimal potential delay allocations respectively, which are widely used in the design of communication protocols (see, e.g. Ye and Yao [Citation42]). Based on these utility functions, we can propose our rate-scheduling policy at each time point t[0,) by a Pareto maximal-utility Nash equilibrium point to the non-zero-sum game problem for the case of two eigenmode cooperation. This case is a special situation as studied in Dai [Citation2] and hence we will omit the remaining details here. Nevertheless, in the following discussion, we will present our new findings in a zero-sum game case study or called the second case as shown in the lower graph of , which also comes up in recent smart power and energy switching system, i.e. IoE (see, e.g. Artemis [Citation11] and Dai [Citation43]).

More precisely, in this second zero-sum game case, only a single user (either user 1 or user 2) is allowed to get into service at each time point t[0,). Furthermore, we suppose that the service capacity is already determined as shown in the lower graph of , i.e. c1=1500 for user 1 and c2=1500 for user 2. Then, based on the above given utility functions, we can design our rate-scheduling policy at each time point t[0,) by a saddle point to the zero-sum game problem

(3.14) maxcRU0(q,c),maxcRUj(q,c),maxcRU2j+1(q,c)(3.14)

for each j{1,2} and a fixed qR+2, where, U0(q,c)=U1(q,c)+U2(q,c) and R+2=[0,)×[0,). In other words, if c=(c1,c2) with is a solution to the game problem in (3.14), we can conclude that

(3.15) U0(q,c)U0(q,c)(3.15)

for a fixed qR+2. Furthermore, for each j{1,2},

(3.16) Uj(q,c)Uj(q,cj)withc1=(cj,c2j+1),(3.16)
(3.17) U2j+1(q,c)U2j+1(q,c(2j+1))withc(2j+1)=(cj,c2j+1).(3.17)

3.2.2. General capacity region

In our platform, the jobs in the jth queue for each jJ can be served simultaneously by a random but at most Vj (V) number of service pools at a given time point. It can be realized by processors-sharing techniques or through multiple users’ and antennas’ cooperation in MIMO wireless channels, i.e. base stations can perform joint beamforming and/or power control at a particular time period. Under this simultaneous service mechanism, the total service rate for the jth queue at the time point is the summation of the rates from all the pools possibly to serve the jth queue. For convenience, we index such pools by a subset V(j) of the set V, i.e.

(3.18) V(j){v1j,...,vVjj}V,(3.18)

where, vlj for each l{1,...,Vj} indexes the vljth pool in V(j).

In the same way, a pool indexed by vV can possibly serve at most Jv number of job classes indexed by a subset V(v) of the set J, i.e.

(3.19) J(v){jv1,...,jvJv}J,(3.19)

where, jvl for each l{1,...,Jv} indexes the jvlth job class in J(v). The pool v is equipped with Jv number of flexible parallel-servers with rate allocation vector

(3.20) cv(t)=(cjv1(t),...,cjvJv(t)),(3.20)

where, cjvl(t) for each l{1,...,Jv} is the assigned service rate to the jvlth user at pool v and time t. In the sequel, we will also denote the rate cjvl(t) by cvj(t) for an index jJ(v) that corresponds to the l{1,...,Jv}. The vector in (3.20) takes values in a capacity region Rv(α(t)) driven by the FS-CTMC α={α(t),t[0,)}.

Figure 11. A 3-user capacity set in R+3 for a cooperative MIMO wireless channel in the left graph. A degenerate 3-user capacity set in R+3 for a cloud-processors-sharing system in the right graph. The upper graph is adapted from .

Figure 11. A 3-user capacity set in R+3 for a cooperative MIMO wireless channel in the left graph. A degenerate 3-user capacity set in R+3 for a cloud-processors-sharing system in the right graph. The upper graph is adapted from Figure 8.

For each iK and vV, the set Rv(i) is a convex region consisting of the origin and owns Lv (>Jv) boundary pieces (see, e.g. the left graph of is an example in Dai [Citation24], the right graph of is an example of Ye and Yao [Citation42], and the detailed explanations for these two graphs are presented at the end of this subsubsection). In the region, each point is defined according to the corresponding users, i.e. x=(xjv1,...,xjvJv). On the boundary of Rv(i) for each iK, Jv of them are (Jv1)-dimensional linear facets along the coordinate axes. The other ones are located in the interior of R+Jv and form the so-called capacity surface represented by Ov(i), which has Bv=LvJv(>0) linear or smooth curved facets hvk(cv,i) on R+Jv for kUv{1,2,...,Bv}, i.e.

(3.21) Rv(i)cvR+Jv:hvk(cv,i)0,kUv.(3.21)

If let CUv(i) denote the sum capacity upper bound for Rv(i), the facet in the centre of Ov(i) is linear and is assumed to be a non-degenerate (Jv1)-dimensional region. More precisely, it can be expressed by

(3.22) hvkUv(cv,i)=jJ(v)cjCUv(i),(3.22)

where, kUvUv is the index corresponding to CUv(i). Furthermore, we assume that any one of the Jv linear facets along the coordinate axes forms an (Jv1)-user capacity region associated with a particular group of Jv1 users when the queue corresponding to the other user is empty. By the same way, we can interpret the (Jvl)-user capacity region for each l{2,...,Jv1}.

In the allocation of the service resources over the capacity regions to different users, we adopt the so-called head of line service discipline. In other words, the service goes to the packet at the head of the line for a serving queue where packets are stored in the order of their arrivals. The service rates are determined through a function of the environmental state and the number of packets in each of the queues. For each state iK and a given queue length vector q=(q1,...,qJ), let Λj(q,i) for each jJ denote the rate vector (in bps) of serving the jth queue at all its possible service pools, i.e.

(3.23) Λj(q,i)=cjQ(q)(i)=(cv1jQ(q)(i),...,cvVjjQ(q)(i)),(3.23)

where,

(3.24) Q(q){jJ,qj=0}.(3.24)

In the meanwhile, let Λv(q,i) for each vV denote the rate vector for all the users possibly served at service pool v, i.e.

(3.25) Λv(q,i)=cvQ(q)(i)=(cjv1Q(q)(i),...,cjvJvQ(q)(i)).(3.25)

Obviously, if the pool index vljV(j) for an integer l{1,...,Vj} with jJ, we have that cvljQ(q)(i)=cjQ(q)(i). Thus, for each jJ, the total rate used in (2.17) can be expressed as

(3.26) Λj(Q(s),α(s))=vV(j)cvjQ(Q(s))(α(s)).(3.26)

Finally, we impose the convention that an empty queue should not be served. Thus, for each vV and QJ (e.g. a set as given by (3.24)), we can define

(3.27) cjvlQ(i)=0ifjvlQwithl{1,...,Jv},>0ifjvlQwithl{1,...,Jv},(3.27)
(3.28) cvjQ(i)cjvlQ(i)forsomejJ(v)correspondingtoeachl{1,...,Jv},(3.28)
(3.29) FQv(i){xRv(i):xjvl=0foralljvlQwithl{1,...,Jv}}.(3.29)

Hence, for all Q such that QJ(v) corresponding to each vV, if cvQ(i) is on the boundaries of the capacity region Rv(i), we have the following observation that

(3.30) jJ(v)cvj(i)jJ(v)cvjQ(i),(3.30)
(3.31) jJ(v)Qcvj(i)jJ(v)QcvjQ(i),(3.31)

where, cv(i)Ov(i) and denotes the empty set.

Typical examples of our capacity region include those for J-user MIMO multiple access uplink and broadcast downlink wireless channels, two-way or future quantum communication channels, and J-user cloud-processors-sharing centres or links (see, e.g. Goldsmith et al. [Citation38], Jindal [Citation44], Dai [Citation24], Shapiro et al. [Citation45], Childs et al. [Citation46], Ye and Yao [Citation42]). In a cooperative wireless channel, the inequalities in (3.30) and (3.31) are both strict, which leads to a capacity region (e.g. with three users) as displayed in the left graph of . Note that, in this three-user case, there are 3 linear facets along the coordinate axes and 13 linear or smooth curved facets on the capacity surface. Furthermore, for such an MIMO channel, the capacity region reflects the cooperation property that the maximum of the sum of the rates is achieved only when all of the queues are non-empty. However, in a general cloud-processors-sharing service system, the equalities in (3.30) and (3.31) may be both true, which leads to a degenerate capacity region as shown in the right graph of .

3.2.3. The DCNN and game-competition based scheduling policy

To integrate the decision processes in cognitive radio (see, e.g. Akyildiz et al. and Haykin [Citation13]), FinTech, IoE (see, e.g. Artemis [Citation11] and Dai [Citation43]), etc. into our AI based scheduling system, we classify the users into two types (e.g. primary users and secondary users as in the cognitive radio). In this situation, we first need to smartly select the users (e.g. among the secondary users) to be served, i.e. at each time point and for each pool v, we smartly choose a set M(i,v){jv1(i),...,jvMv(i)} of users with jvlJ and l{1,...,Mv} for a given MvJv to get into service. Among these selected users, we need to dynamically realize the optimal and fair resource allocation. Therefore, we design a strategy by mixing a saddle point and a static Pareto maximal-utility Nash equilibrium policy myopically at each time point t to a mixed zero-sum and non-zero-sum game problem for each state iK and a given queue length vector q=(q1,...,qJ). The saddle point corresponds the users’ selection while the Pareto optimality represents the full utilization of resources in the whole game system and the Nash equilibrium represents the fairness to all the selected users. More precisely, in this game, there are J users (players) corresponding to the J queues and each of them has his own utility function Uvj(qj,cvj) with jJ(v) and vV(j). The utility functions may also depend on some additional parameters such as prices. Nevertheless, in the current paper, we assume that they are pre-negotiated and are given. Every selected user chooses a policy to maximize his own utility function at each service pool v while the summation of all the users’ utility functions and the summation of the utility functions corresponding to the selected users are also maximized. In other words, we can formulate the following generalized user-selection and resource-scheduling game problem by extending the one in Example 3.4,

(3.32) maxcvFQv(i)U00(q,c)=U00(q,c(i)),(3.32)
(3.33) maxcvFQv(i)U0j(q,c)=U0j(q,c(i)),jM(i,v)(J(v)Q(q)),(3.33)
(3.34) maxcvFQv(i)(U0j(q,c))=U0j(q,c(i)),j(J(v)Q(q))M(i,v))(3.34)

while we have that

(3.35) maxcvFQv(i),jM(i,v)J(v)Q(q)Uvj(q,c)=Uvj(q,c(i)),(3.35)
(3.36) maxcvFQv(i),jJ(v)Q(q)M(i,v)(Uvj(q,c))=Uvj(q,c(i)).(3.36)

Note that, the rate vector c in (3.32)–(3.36) is given by

c=((cj11,,cj1J1),,(cjV1,,cjVJV))

and the objective functions are defined by

U00(q,c)=vV(j)jJ(v)Q(q)Uvj(qj,cvj),
U0j(q,c)=vV(j)Uvj(qj,cvj)foreachjJ(v)Q(q),
Uvj(q,c)=Uvj(qj,cvj)foreachjJ(v)Q(q)andvV(j).

Note that, the total utility function U00(q,c) does not have to be a constant (e.g. zero). In other words, the game is not necessarily a zero-sum one. Thus, by unifying the concepts of Nash equilibrium and Pareto optimality in Nash [Citation47] and Rosen [Citation48], we have the definition concerning a static Pareto maximal-utility Nash equilibrium policy myopically at a particular time point for the dynamic scheduling game as follows.

Definition 3.2 For each state iK and a queue length vector qR+J, the rate vector

c(i)FQ(q)(i)FQ(q)1(i)××FQ(q)V(i)

is called a mixed saddle-point and static Pareto maximal-utility Nash equilibrium policy to the mixed zero-sum and non-zero-sum game problem in (3.35) if, for each jJ(v)Q(q) and any given c(i)FQ(q)(i), we have that

(3.37) U00(q,c(i))U00(q,c(i)),(3.37)
(3.38) Uvj(q,c(i))Uvj(q,cj(i))ifjM(i,v)(J(v)Q(q)),v{0}V(j),(3.38)
(3.39) Uvj(q,c(i))Uvj(q,cj(i))ifj(J(v)Q(q))M(i,v),v{0}V(j),(3.39)
(3.40) cj(i)(c1(i),...,cj1(i),cj(i),cj+1(i),...,cJ(i)).(3.40)

3.3. Identifying an RDRS model under the policy

In this subsection, we identify the exact expression of an RDRS model corresponding to the CNN and game-competition based AI scheduling policy designed in the previous subsection.

3.3.1. The obtained model by asymptotic approximation

To state our main theorem, we need to introduce another concept of the so-called mixed saddle point and static Pareto minimal-dual-cost Nash equilibrium policy myopically at a particular time point. In doing so, we formulate a minimal-dual-cost game problem corresponding to the maximal-utility game problem in (3.35). More precisely, for each given iK, a rate vector cR(i)R1(i)×...×RV(i), and a parameter w0, the problem can be stated as follows:

(3.41) minqjR+C00(q,c),(3.41)
(3.42) minqjR+,jM(i,v)C(c)J(v)Cvj(q,c),(3.42)
(3.43) minqjR+,jC(c)J(v)M(i,v)(Cvj(q,c))(3.43)

subject to

jM(i,v)C(c)qjμjw,

where, the cost function Cvj(q,c) for each jJ(v) and v{0}V(j) is defined by

C00(q,c)=vV(j)jC(c)J(v)Cj(qj,cvj),
C0j(q,c)=vV(j)Cvj(qj,cvj),
Cvj(q,c)=Cvj(qj,cvj)=1μj0qjUvj(u,cvj)cvjduforjC(c)J(v),vV(j),

and C(c) is an index set corresponding to the non-zero rates and non-empty queues, i.e.

C(c){j:cj0componentwisewithjJ}.

In other words, when the environment is in state iK, we try to identify a queue state q corresponding to a given cR(i) and a given parameter w0 such that the individual user’s dual-costs and the total dual-cost over the system are all minimized at the same time while the (average) workload meets or exceeds w. In addition, the total dual-cost function U00(q,c) does not have to be a constant. Then, we have the following definition.

Definition 3.3 For each state iK and a rate vector c(i)R(i), the queue length vector qR+J with qj=0 if jJC(c) is called a mixed saddle point and static Pareto minimal-dual-cost Nash equilibrium policy to the mixed zero-sum and non-zero-sum game problem in (3.42) if, for each jC(c), v{0}V, and any given qR+J with qj=0 when jJC(c), we have that

(3.44) C00(q,c(i))C00(q,c(i)),(3.44)
(3.45) Cvj(q,c(i))Cvj(qj,c(i))ifjM(i,v)(C(c)J(v)),(3.45)
(3.46) Cvj(q,c(i))Cvj(qj,c(i))ifj(C(c)J(v))M(i,v),(3.46)
(3.47) qj(q1,...,qj1,qj,qj+1,...,qJ).(3.47)

Based on Definition 3.3 and the concept concerning the asymptotic optimality widely used in heavy traffic analysis (see, e.g. Ye and Yao [Citation42], Dai [Citation24]), we can develop some new concept about the asymptotic Pareto minimal-dual-cost Nash equilibrium policy as follows.

Definition 3.4 Let QˆG,r() and WˆG,r() denote the diffusion-scaled queue length and workload processes respectively under an arbitrarily feasible rate scheduling policy G. A process Qˆ() is called a mixed asymptotic saddle point and Pareto minimal-dual-cost Nash equilibrium policy globally over the whole time horizon if

liminfrC00(Qˆr,G(t),ρj(α(t)))C00(Qˆ(t),ρj(α(t))),
liminfrCvj(Qˆjr,G(t),ρj(α(t)))Cvj(Qˆ(t),ρj(α(t))),jM(α(t),v,t)(C(c)J(v)),
liminfr(Cvj(Qˆjr,G(t),ρj(α(t))))Cvj(Qˆ(t),ρj(α(t))),j(C(c)J(v))M(α(t),v,t)

for any t0, v{0}V(j), and

(3.48) Qˆjr,G(t)=(Qˆ1(t),...,Qˆjr,G(t),...,QˆJ(t)).(3.48)

Now, let q(w,ρ(i)) be the mixed saddle point and Pareto minimal-dual-cost Nash equilibrium policy to the game problem in (3.42) with respect to each given w and iK at time t. Then, our main theorem can be presented as follows.

Theorem 3.1 For the game scheduling policy determined by (3.35) with Qr(0)=0 and conditions (4.7) – (4.12) (that will be detailed in Section 4), the sequence of 2-tuple processes converges jointly in distribution, i.e.

(3.49) (Qˆr(),Wˆr())(Qˆ(),Wˆ())alongrR.(3.49)

Furthermore, the limit queue length Qˆ() and total workload Wˆ() have the relationship

(3.50) Qˆ(t)=q(Wˆ(t),ρ(α(t))),(3.50)

where, Wˆ() is a 1-dimensional RDRS in strong sense with

(3.51) b(i,t)=jvVM(i,v,t)θj(i)μj,(3.51)
(3.52) σE(t)=σS(t)=σˆ1(t),...,σˆJ(t),(3.52)
σˆj(t)=1μjifjvVM(i,v,t),0otherwise,
(3.53) R(i,t)=1(3.53)

for t[0,) and some constant θj(i) for each jvVM(i,v,t). In addition, there is a common supporting probability space, under which and with probability one, the limit queue length Qˆ() is an asymptotic mixed saddle point and Pareto minimal-dual-cost Nash equilibrium policy globally over time interval [0,). Finally, the limit workload Wˆ() is also asymptotic minimal in the sense that

(3.54) liminfrWˆr,G(t)Wˆ(t).(3.54)

Note that, the process (Qˆr(),Wˆr()) in (3.49) is directly corresponding to the physical queueing process of n-quibt quantum data packets as defined in Subsection 2.2. However, the diffusive approximation limit process (Qˆ(),Wˆ()) is a continuous one in both time and space. Based on the n-qubit quantum computing myopically at each time point, it can be used as an approximating model to measure the system performance in the macro-flow level. Furthermore, due to the zero-sum and non-zero-sum two level competition involved, our current results are different from those in Dai [Citation24], especially, the drift and diffusion coefficients presented in (3.51) and (3.52), respectively. The proof of Theorem 3.1 will be provided in Subsection 4.2. Instead, in the following subsection, we first present a simulation case study that based on a simulation procedure proposed for the RDRS in the theorem. More precisely, for a constant T[0,), we divide the interval [0,T] equally into n subintervals {[ti,ti+1],i{0,1,...,n1}} with t0=0, tn=T, and Δti=ti+1ti=Tn. Furthermore, let

(3.55) ΔF(ti)F(ti)F(ti1)(3.55)

for each process F(){BE(),BS(),Wˆ(),Yˆ()}. Then, we can develop an iterative procedure similar to Simulation Procedure 3.1 in Dai [Citation2] to simulate the RDRS model derived in Theorem 3.1.

3.4. A simulation case study via RDRS model

In this subsection, we consider a single-pool system with two-users as presented in Subsubsection 3.2.1 and hence will omit all the related pool index v for simplicity. Note that, in a corresponding real-world system, the parameter vector q in (3.14) is the randomly evolving queue length process Q(t) in (2.16). Furthermore, it is our concern about how to use the RDRS performance model in Definition 3.1 to evaluate the effectiveness of our designed myopic service policies for the scheduling example in Subsubsection 3.2.1 globally over the whole time horizon [0,). As mentioned in Subsubsection 3.2.1, the effectiveness of the myopic non-zero-sum game based policy for the case in the upper graph of has been numerically justified in Dai [Citation2]. Thus, in this subsection, we numerically illustrate the effectiveness of the myopic zero-sum game policy designed in (3.14) for the case in the lower graph of . In this case, there are two competing users: user 1 and user 2 with utility functions U1(q,c) and U2(q,c), respectively. They try to get into the quantum computing service channel through competition according to the policy in (3.14), i.e. only one user can get access to the channel through bids reflected in their utility functions at each particular time point as shown in .

Figure 12. An illustration of simulation case study concerning its importance and applications.

Figure 12. An illustration of simulation case study concerning its importance and applications.

Therefore, our main task in this subsection is to apply the zero-sum game policy in (3.14) to conduct numerical experiments with computational results as displayed in . From the figure, we can see that our policy outperforms processor-sharing policy in terms of total buffering and processing costs while the system total workloads under two different policies close to each other. It is worth to point out that our zero-sum game scheduling policy implemented in this section is a generic one. Besides the application in quantum computation, it also has the importance in other real-world problems such as smart power grid scheduling as shown in .

To illustrate our numerical implementations, we first identify the associated dual-cost functions Cj(q,c) as defined in (3.42) with j{1,2} for corresponding Uj(q,c) given in (3.13) . More precisely,

(3.56) C1(q1,c1)=1μ10q1U1(u,c1)c1du=q122μ1c1,(3.56)
(3.57) C2(q2,c2)=1μ20q2U2(u,c2)c2du=2q233μ2c23,(3.57)

where 1/μj with j{1,2} are average packet lengths corresponding the two users as explained just after the equation in (2.14) . Then, we can formulate the corresponding minimal dual-cost zero-sum game problem as

(3.58) minq[wμ1,)×[wμ2,)C0(q,c),minq[wμj,)Cj(qj,cj),minq[wμ3j,)(C3j(q3j,c3j)).(3.58)

for a fixed constant w>0, a fixed cR, and all j{0,1,2} with C0(q,c)= C1(q,c)+C2(q,c). Note that, both Cj(qj,cj) for j{1,2} are strictly increasing in terms of qj. Thus, a dual-cost saddle point can be expressed as follows

(3.59) qj=wμjifCj(wμj,cj)C3j(wμ3j,c3j),0otherwise.(3.59)

In other words, for any q[wμ1,)×[wμ2,), we have

(3.60) C0(q,c)C0(q,c),(3.60)
(3.61) Cj(q,c)Cj(qj,c)withqj=(qj,q3j),(3.61)
(3.62) C3j(q,c)C3j(q(3j),c)withq(3j)=(qj,q3j).(3.62)

Furthermore, for the purpose of comparison, we also design an alternative scheduling policy associated with a uniformly generated random number u over interval [0,1] as follows,

(3.63) qj=wμjifu[0,1/2],0ifu[(1/2,1],q3j=0ifu[0,1/2],wμ3jifu(1/2,1].(3.63)

In addition, it follows from the inequalities in (3.60)–(3.62) that the cost of a dual-cost game player j with j{1,2} cannot be reduced if he unilaterally changes his bid’s policy qj.

Based on these properties, we can illustrate the effectiveness of our designed policy by the dual-cost game problem in (3.58). More precisely, in our Theorem 3.1 and the following RDRS modelling demonstration in Subsection 4, we have the claim that the physical workload W(t) in (2.18) for this single pool case can indeed be modelled by an RDRS as introduced in Definition 0.2 if certain load balance condition holds. Moreover, W(t) is asymptotically minimal at any time t[0,) almost surely along any sample path in some supporting probability space. In the meanwhile, the queue length process Q(t) in (2.16) is also minimized in the sense that it is asymptotically dual-cost saddle point process given by Q(t)=q(W(t)) where q(w) is given in (3.59). Note that, for this example, it follows from Theorem 3.1 that the coefficients of the 1-dimensional RDRS under our game-based scheduling policy for the physical workload process Wˆ can be denoted by

(3.64) bˆ=θjμjifCj(wμj,cj)C3j(wμ3j,c3j),θ3jμ3jotherwise,σˆE=σˆS=σˆ1,σˆ2,Rˆ=1.(3.64)

where, for j{1,2}, we have that

(3.65) σˆj=1μjifCj(wμj,cj)C3j(wμ3j,c3j),0otherwise.(3.65)

Thus, by the 1-dimensional RDRS corresponding to (3.64) and (3.65) and the saddle point policy q in (3.59), we can apply the iterative formula (called Simulation Procedure 3.1 in Dai [Citation2]) to conduct our workload based numerical simulation. Here, we point out that all the processes related to the workload processes will be covered with a ‘hat’.

Next, based on the given parameters as shown in the bottom of , we present the simulation results for our case study as summarized in the 12 graphs of the figure. In this example, the number N of simulation iterative times is 96,000. The simulation time interval is [0,T] with T=30 and it is divided into n = 10,000 subintervals. Furthermore, all the ‘simulated means’ used in the graphs are in the average sense, e.g. the simulated mean workload is given by

(3.66) EWˆ(ti)=1Nj=1NWˆ(ωj,ti),(3.66)

where, ωj denotes the used jth sample paths of Wˆ() and ti[0,30] with i{0,1,...,10000} and t0=0 is the time index. Note that, in , we give the performance evaluation and comparisons with respect to the workload process Wˆ(). The red curve displayed in the first graph of the left column is the simulated mean workload function with respect to time point ti under the saddle point policy. The result presented in the second graph of this column shows the difference between the simulated mean workload directly through the RDRS model associated with the coefficients in (3.64) and (3.65) and the corresponding one obtained by the saddle point policy displayed in (3.59), i.e.

(3.67) E[Wˆ(ti)]E[Wˆ(ti)].(3.67)

Based on the curves in this graph, we can observe that the two workload processes are quite consistent. The curves shown in the third graph of this column are the decision paths of the saddle point policy given in (3.59) for the two users. The curve in the fourth graph of this column displays the difference of the workloads under the saddle point policy in (3.59) and the arbitrarily selected alternative policy in (3.63). Actually, under this alternative policy, the corresponding system is a single-server polling system with two job classes, the workload process can also be approximated by the RDRS model when our load balance condition is applied (see, e.g. Coffman et al. [Citation49]). Thus, from the workload perspective, the workloads under these two scheduling policies should be close to each other as shown in the graph. However, if we conduct one more deep-level study concerning the system total cost as displayed in the red curve of the fourth graph on the second column, we see that our saddle point policy outperforms the alternative one. In this graph, the other two curves are the errors corresponding to different users. The curves in the first graph of the second column display the decision paths of the alternative policy. The curve in the second graph of this column presents the simulated mean total cost under saddle point policy. The curves in the third graph of this column state the costs for different users under the saddle point policy. The curves in the graphs of the third column display the evolutions of queueing lengths for different users and their comparisons under the saddle point policy and the alternative policy.

4. RDRS modelling demonstration

In this section, we demonstrate the RDRS modelling presented in Theorem 3.1.

4.1. The conditions and assumptions

The utility functions can be either simply taken as the well-known proportionally fair and minimal potential delay allocations as used in (3.13) for Example 3.4 or generally taken such that the existence of a mixed saddle point and Pareto maximal-utility Nash equilibrium policy to the game problem in (3.35) is guaranteed. More precisely, we can suppose that Uvj(qj,cvj) for each jJ(v) and vV(j) is defined on R+J. It is second-order differentiable and satisfies

(4.1) Uvj(0,cvj)=0,(4.1)
(4.2) Uvj(qj,cvj)=Φvj(qj)Ψv(cvj)isstrictlyincreasingandconcaveincvjforqj>0,(4.2)
(4.3) Ψv(νjcvj)=Ψv(νj)Ψv(cvj)orΨv(νjcvj)=Ψv(νj)+Ψv(cvj)forconstantνj0,(4.3)
(4.4) Uvj(qj,cvj)cvjisstrictlyincreasinginqj0,(4.4)
(4.5) Uvj(0,cvj)cvj=0andlimqjUvj(qj,cvj)cvj=+foreachcvj>0.(4.5)

Furthermore, we assume that {Uvj(qj,cvj),jJ(v),vV(j)} satisfies the so-called radial homogeneity condition at each time point t[0,), i.e. for any scalar a>0, each q>0, iK, vV, and each jlM(i,v,t) with corresponding l{1,...,Mv}, its Pareto maximal utility Nash equilibrium point for the game has the radial homogeneity

(4.6) cvjl(aq,i)=cvjl(q,i).(4.6)

In addition, we introduce a sequence of independent Markov processes indexed by rR, i.e. {αr(),rR}. These systems all have the same basic structure as described in the last section except the arrival rates λjlr(i) and the holding time rates γr(i) for all iK, which may vary with rR. Here, we assume that they satisfy the heavy traffic condition

(4.7) rλjlr(i)λjl(i)mjl(i)θjl(i)asr,γr(i)=γ(i)r2,(4.7)

where, θjl(i)R is some constant for each iK. Moreover, we suppose that the nominal arrival rate λjl(i) is given by

(4.8) λjl(i)mjl(i)μjlρjl(i)(4.8)

and ρjl(i) in (4.8) for jlM(i,v,t) with l{1,...,Mv} is the nominal throughput determined by

(4.9) ρjl(i)=vV(jl)ρvjl(i)andρvjl(i)=νvjlρˉvjl(i)(4.9)

with ρv(i)Ov(i) that is corresponding to the dimension Mv. In addition, νv and ρˉv(i) are an Jv-dimensional constant vector and a reference service rate vector, respectively, at service pool v, satisfying

(4.10) jlM(i,v,t)J(v)νjl=Jv,νjl0areconstantsforalljlM(i,v,t)J(v),(4.10)
(4.11) jlM(i,v,t)J(v)ρˉvjl(i)=CUv(i)andρˉvj1(i)=ρˉvjl(i)foralljlM(i,v,t)J(v).(4.11)

Remark 4.1 By (3.22), ρˉv(i) for each iK and vV(jl) can indeed be selected, which satisfy the second condition in (4.11) . Thus, the nominal throughput ρ(i) in (4.8) can be determined. One simple example that satisfies these conditions is to take νvjl=1 for all jlM(i,v,t)J(v) and vV(jl). Then, the conditions in (4.8) – (4.11) mean that the system manager hopes to maximally and fairly allocate capacity to all users. Furthermore, the system design parameters λjl(i) for all jlM(i,v,t)J and each iK can be determined by (4.8) .

Now, we suppose that the inter-arrival time corresponding to the kth arriving job batch to the system indexed by rR is given by

(4.12) ujlr(k,i)=uˆjl(k)λjlr(i)foreachjlM(i,v,t)J,k{1,2,...},iK,(4.12)

where, the uˆjl(k) does not depend on r and i. Furthermore, it has mean one and finite squared coefficient of variation αjl2. In addition, the number of packets, wjl(k), and the packet length vjl(k) are assumed not to change with r. Furthermore, it follows from the heavy traffic condition in (4.7) for the rth environmental state process αr() with rR that αr(r2) and α() are equal each other in distribution since they own the same generator matrix (see, e.g. the definition in pages 384–388 of Resnick [Citation40]). Hence, in the sense of distribution, all of the systems indexed by rR in (3.1) share the same random environment over any time interval [0,t].

4.2. Proof of theorem 3.1

First, from the second condition in (4.7), we know that the processes αr(r2) for each rR and α() are equal in distribution. Thus, without loss of generality, we can suppose that

(4.13) αr(r2t)=α(t)foreachrRandt[0,).(4.13)

Then, for each jJ, rR and by the radial homogeneity of Λ(q,i) of the policy in (4.6), we can define the fluid and diffusion scaled processes as follows,

(4.14) Ejr()Ajr(r2),(4.14)
(4.15) Tˉjr()0ΛjQˉr(s),α(s),sds=1r2Tjr(r2),(4.15)
(4.16) Qˉjr(t)1r2Qjr(r2t),(4.16)
(4.17) Eˉjr(t)1r2Ejr(t),(4.17)
(4.18) Sˉjr(t)1r2Sjr(r2t).(4.18)

Thus, by (2.16), (4.13), and the assumptions among arrival and service processes, we know that

(4.19) Qˆjr()=1rEjr()1rSjr(Tˉjr()).(4.19)

Furthermore, let

(4.20) Eˆr()=(Eˆ1r(),...,EˆJr())withEˆjr()=1rAjr(r2)r2λˉjr(),(4.20)
(4.21) Sˆr()=(Sˆ1r(),...,SˆJr())withSˆjr()=1rSj(r2)μjr2(4.21)

for each jJ with

(4.22) λˉjr()0mj(α(s),s)λjr(α(s),s)ds(4.22)
=0mj(αr(r2s),r2s)λjr(αr(r2s),r2s)ds
=1r20r2mj(αr(s),r2s)λjr(αr(s),r2s)ds,

and define

(4.23) λˉr()=λˉ1r(),...,λˉJr().(4.23)

In addition, we use Qˉr(), Eˉr(), Sˉr(), and Tˉr() to denote the corresponding vector processes. Then, corresponding to the processes in (4.14)–(4.19), we can define the following fluid limit related processes,

(4.24) Qˉj(t)=Qˉj(0)+λˉj(t,ζt())μjTˉj(t)foreachjJ,(4.24)
(4.25) λˉ(t)=λˉ1(t),...,λˉJ(t),λˉj(t)0tλj(α(s),s)ds,(4.25)
(4.26) Tˉj(t)=0tΛˉj(Qˉ(s),α(s),s)ds,(4.26)

where, for each iK and t[0,), we have that

(4.27) Λˉj(q,i,t)=Λj(q,i,t)ifqj>0,jvVM(i,v,t),ρj(i,t)ifqj>0,j/vVM(i,v,t),ρj(i,t)ifqj=0.(4.27)

Then, we can present a lemma about the weak convergence to a stochastic fluid limit process under our DCNN and game-competition based scheduling strategy.

Lemma 4.1 Suppose that the initial queue length Qˉr(0)Qˉ(0) along rR. Then, the joint convergence in distribution along a subsequence of R is true under the conditions required by Theorem 3.1,

(4.28) Eˉr(),Sˉr(),Tˉr(),Qˉr()Eˉ(),Sˉ(),Tˉ(),Qˉ().(4.28)

In addition, if Qˉ(0)=0, the convergence is true along the whole R and the limit satisfies

(4.29) Eˉ()=λˉ(),Sˉ()=μ(),Tˉ()=cˉ(),Qˉ()=0,(4.29)

where, λˉ() is defined in (4.25), μ()(μ1,...,μJ), and cˉ() is defined by

(4.30) cˉ(t)=cˉ1(t),...,cˉJ(t)andcˉj(t)0tρj(α(s))dsforeachjJ.(4.30)

Proof. By the proofs of Lemma 4.2 in Dai [Citation2] and Lemma 7 in Dai [Citation24], we only need to prove the claim that Qˉ()=0 in (4.30) to be true for our current purpose. In fact, for each iK and l{1,...,Mv}, we define

(4.31) ψ(q,i)vVψv(q,i)=vVjlM(i,v)J(v)Cvjl(qjl,ρvjl(i)).(4.31)

It follows from the proof in Dai [Citation24] that all the limits in (4.30) are absolutely continuous and differentiable at almost all t(0,). In other words, almost every t(0,) is a regular point of these limits. Hence, for each regular time t0 of Qˉ(t) over time interval (τn1,τn) with a given n{1,2,...}, we have the observation that

(4.32) dψ(Qˉ(t),α(t))dt(4.32)
=vVjlM(i,v,t)J(v)dQˉjl(t)dtCvjl(Qˉjl(t),ρvjl(α(t))Qˉjl(t)
+dρvjl(α(t))dtCvjl(Qˉjl(t),ρvjl(α(t))ρvjl(α(t))
=vVjlM(i,v,t)J(v)ρvjl(α(t))Λvjl(Qˉ(t),α(t))Uvj(Qˉjl(t),ρvjl(α(t)))ρvjl(α(t))I{Qˉjl(t)>0}
0,

where, the second equality follows from the concavity of the utility functions and the fact that Λvj(Qˉ(t),α(t)) is the Pareto maximal Nash equilibrium policy to the utility-maximal game problem in (3.35) when the channel is in a particular state. Thus, for any given n{0,1,2,...} and each t[τn,τn+1),

(4.33) 0ψ(Qˉ(t),α(t))(4.33)
ψ(Qˉ(τn),α(τn))
=vVjlM(i,v,τn)J(v)1μjl0Qˉjl(τn)Uvjl(u,ρvjl(α(τn)))Cvjldu
=vVdψv(ρˉvj1(α(τn)))dcvj1dψv(ρˉvj1(α(τn1)))dcvj11ψv(Qˉ(τn),α(τn1))
vVdψv(ρˉvj1(α(τn)))dcvj1dψv(ρˉvj1(α(τ0)))dcvj11ψv(Qˉ(0),α(0))
κψ(Qˉ(0),α(0)),

where, κ is a positive constant given by

κ=maxvVmaxi,jKdψv(ρˉvj1(i))dcvj1dψv(ρˉvj1(j))dcvj11.

Then, it follows from the fact in (4.34) that Qˉ(t)=0 for all t0. Hence, we complete the proof of the lemma. □

Finally, by considering a specific state iK and by the index way as used in proving Lemma 0.1, we can provide proofs for Lemma 4.3 to Lemma 4.5 in Dai [Citation2] to be true in the current setting. Then, by applying the results in these lemmas to the proof for Theorem 1 in [Citation24], we can complete the proof for Theorem 3.1 in the current paper. □

5. Conclusion

In this paper, we have modelled the hardware and software architecture for generalized IoT by quantum cloud-computing and blockchain. To reduce the measurement error and increase the efficiency of quantum entanglement (i.e. the capability of fault tolerance) in the current quantum computers and communications, we have designed a quantum-computing chip by modelling it as an MIMO quantum channel and obtain its channel capacity via our recently derived mutual information formula. To capture the internal qubit data flow dynamics of the channel, we model it by an DCNN with generalized stochastic pooling with respect to resource-competition among different quantum eigenmodes or users. The pooling is corresponding to a dynamic resource allocation policy with two levels of competitions as in cognitive radio: the first one is on users’ selection in a ‘win–lose’ manner; the second one is on resource-sharing among selected users in a ‘win–win’ manner. In other words, our policy is the one by mixing a saddle point to a zero-sum game problem and a Pareto optimal Nash equilibrium point to a non-zero-sum game problem. The effectiveness of our policy is proved by diffusion modelling with theory and numerical examples. The applications of our study in more fields such as FinTech and IoE are also provided.

Disclosure statement

No potential conflict of interest was reported by the author.

Additional information

Funding

The project is funded by National Natural Science Foundation of China with Grant No. 11771006, Grant No. 10971249, and Grant No. 11371010.

References

  • R. Courtland, China’s 2,000-km Quantum Link Is Almost Complete, IEEE Spectr. Technol. Eng. Sci. News. 53 (11) (2016), pp. 11–12.
  • W. Dai, Platform modelling and scheduling game with multiple intelligent cloud-computing pools for big data, Math. Comput. Model. Dyn. Syst. 24 (5) (2018), pp. 506–552. doi:10.1080/13873954.2018.1516677.
  • D. Deutsch, Quantum computational networks, Proc. R. Soc. Lond. A 425 (8 September 1989), pp. 73–90. doi:10.1098/rspa.1989.0099.
  • R.P. Feynman, Quantum mechanical computers, Opt. News 11 (1985), pp. 11. doi:10.1364/ON.11.2.000011.
  • E. Gibney, Chinese satellite is one giant step for the quantum internet, Nat. 535 (7613) (27 July 2016). pp. 478C479. Bibcode:2016Natur.535.478G. PMID 27466107. doi:10.1038/535478a
  • M. Nielsen and I. Chuang, Quantum Computation and Quantum Information, Cambridge University Press, 2000, Cambridge, UK.
  • K. Schwab, The Fourth Industrial Revolution. World Economic Forum, Cologny, Switzerland (2016).
  • SIR Forum. The Six Industrial Revolution. Available at https://www.sirforum.net/, 2018.
  • G. Santucci, The Internet of Things: Between the Revolution of the Internet and the Metamorphosis of Objects, Forum American Bar Forum (2010), pp. 1–23, doi:10.2759/26127
  • W. Dai, Systems software and hardware: The unification and interaction of quantum-cloud-computing and MIMO wireless communication aided with AI and blockchain. Invited Keynote Speech at 2019 International Conference of Future Advancements in Mobile Cloud Computing and Applications, October 23-24, 2019, Toronto, Canada.
  • Artemis, Internet of energy for electric mobility. 2018. Available at http://www.artemis-ioe.eu/
  • W. Dai, On the traveling neuron nets (human brains) controlled by a satellite communication system. Proceedings of IEEE 3rd International Conference on Bioinformatics and Biomedical Engineering. Beijing, China. 2009, pp. 1–4.
  • S. Haykin, Cognitive Radio: Brain-empowered Wireless Communications, IEEE J. Sel. Areas Commun. 23 (2) (2005), pp. 201C220. doi:10.1109/JSAC.2004.839380.
  • W. Dai, Product-form solutions for integrated services packet networks and cloud computing systems, Math Probl Eng. 2014 (Regular Issue) (2014), pp. 16. Article ID 767651. doi:10.1155/2014/767651
  • D.E. Comer, Internetworking with TCP/IP, Prentice Hall, New Jersey, 1995.
  • K. Bertels, Quantum computing: How far away is it? IEEE 2015 International Conference on High Performance Computing & Simulation (HPCS). Amsterdam, Netherlands. 2015, pp. 557–558. doi:10.1177/1753193414566554.
  • H. Fan, The market and prospect of quantum-computing. Invited Kenote Speech at SIR Forum Nanjing Summit-2018, Nanjing, China, November 29, 2018.
  • D. Rajan and M. Visser, Quantum Blockchain using entanglement in time. 2018. Available at https://arxiv.org/abs/1804.05979.
  • V. Buterin, Ethereum: A next-generation smart contract and decentralized application platform. 2013. Available at http://ethereum.org/ethereum.html.
  • M. Iansiti and K.R. Lakehani, The truth about Blockchain, Harv. Bus. Rev. January-February Issue (2017), Features: Article 7.
  • S. Nakamoto, A peer-to-peer electronic cash system. 2013.
  • W. Dai, BestGo resource allocations for quantum-cloud-computing services and MIMO communications with blockchain and big data. Invited Keynote Speech at 7th IEEE International Conference on Communications, Networks and Satellite, Medan, Indonesia, November 15-17, 2018.
  • W. Dai, A unified system of FB-SDEs with Levy jumps and double completely-S skew reflections, Commun. Math. Sci. 16 (3) (2018), pp. 659–704. doi:10.4310/CMS.2018.v16.n3.a4.
  • W. Dai, Optimal rate scheduling via utility-maximization for J-user MIMO Markov fading wireless channels with cooperation, Oper. Res. 61 (6) (2013), pp. 1450–1462. with 26 page online e-companion (Supplemental). doi:10.1287/opre.2013.1224
  • M. Zeiler and R. Fergus, Stochastic Pooling for Regularization of Deep Convolutional Neural Networks. Proc. of the International Conference on Learning Representations, Scottsdale, Arizona, pp. 8. 2013.
  • I.F. Akyildiz, W.Y. Lee, M.C. Vuran, and S. Mohanty, NeXt Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey, Comput. Networks (Elsevier) J. 50 (2006), pp. 2127–2159. doi:10.1016/j.comnet.2006.05.001.
  • A. De Mauro, M. Greco, and M. Grimaldi, A formal definition of big data based on its essential features, Library Rev. 65 (2016), pp. 122–135. doi:10.1108/LR-06-2015-0061.
  • N. Dedić and C. Stanier, Towards Differentiating Business Intelligence, Big Data, Data Analytics and Knowledge Discovery, Vol. 285, Springer International Publishing, Berlin, Heidelberg, 2017.
  • C. Snijders, U. Matzat, and U.D. Reips, ‘Big Data’: Big gaps of knowledge in the field of Internet, Int. J. Int. Sci. 7 (2012), pp. 1–5.
  • G. Niestegge, Non-classical conditional probability and the quantum no-cloning theorem, Phys. Scr. 90 (9) (2015), pp. Paper ID: 095101. doi:10.1088/0031-8949/90/9/095101.
  • W.K. Wootters and W.H. Zurek, A single quantum cannot be cloned, Nat. 199 (5886) (1982), pp. 802–803. doi:10.1038/299802a0.
  • W.M. Itano, D.J. Heinzen, J.J. Bollinger, and D.J. Wineland, Quantum Zeno effect, Phys. Rev. A 41 (5) (1990), pp. 2295–2300. doi:10.1103/PhysRevA.41.2295.
  • B. Misra and E.C.G. Sudarshan, The Zeno’s paradox in quantum theory, J. Math. Phys. 18 (4) (1977), pp. 756–763. doi:10.1063/1.523304.
  • C. Song, et al., Generation of multicomponent atomic Schrödinger cat states of up to 20 qubits, Sci. 365 (9 August 2019), pp. 574–577. doi:10.1126/science.aay0600
  • C.Z. Chang, Quantum-computing, Artificial Intelligence, and Blockchain Lecture Note in IT Leaders' Summit.Shenzhen, China, (2018).
  • J. Košík, V. Bužek, and M. Hillery, Quantum walks with random phase shifts, Phys. Rev. A 74 (2) (2006), pp. 022310. doi:10.1103/PhysRevA.74.022310.
  • M. Sawerwain and J. Wiśniewska, Quantum qubit switch: Entropy and entanglement, ArXiv 1709.02407v1 (2017), pp. 1–22.
  • A. Goldsmith, S.A. Jafar, N. Jindal, and N. Vishwanath, Capacity limits of MIMO Channels, IEEE J. Sel. Areas Commun. 21 (5) (2003), pp. 684–702. doi:10.1109/JSAC.2003.810294.
  • T.M. Cover and J.A. Thomas, Elements of Information Theory, John Wiley & Sons, Inc., Chichester, 1991.
  • S.I. Resnick, Adventures in Stochastic Processes, Birkhäuser, Boston, 1992.
  • S. Bhardwaj, R.J. Williams, and A.S. Acampora, On the performance of a two-user MIMO downlink system in heavy traffic, IEEE Trans. Inf. Theory 53 (5) (2007), pp. 1851–1859. doi:10.1109/TIT.2007.894662.
  • H. Ye and D.D. Yao, Heavy traffic optimality of a stochastic network under utility-maximizing resource control, Oper. Res. 56 (2) (2008), pp. 453–470. doi:10.1287/opre.1070.0455.
  • W. Dai, Internet of Energy with Multiple Cloud-Computing Service Centers and Artificial Intelligence. Invited Plenary Talk at IEEE 7th International Conference on Power and Energy Systems, Toronto, Canada (2017).
  • N. Jindal, S. Vishwanath, and A. Goldsmith, On the duality of Gaussian multiple-access and broadcast channels, IEEE Trans. Inf. Theory 50 (5) (2004), pp. 768–783. doi:10.1109/TIT.2004.826646.
  • J.H. Shapiro, et al., Quantum Computation and Communication - Optical and Quantum Communications-20, RLE Prog. Rep. 145 (2003), pp. 20–21.
  • A.M. Childs, D.W. Leung, and H.K. Lo, Two-way quantum communication channels, Int. J. Quantum Inf. 4 (1) (2005), pp. 63–83. doi:10.1142/S0219749906001621.
  • J.F. Nash, Equilibrium Points in N-person Games, Proc. Natl. Acad. Sci. 36 (36) (1950), pp. 48C9. doi:10.1073/pnas.36.1.48.
  • J.R. Rosen, Existence and uniqueness of equilibrium points for concave N-person games, Econom. 33 (3) (1965), pp. 520–534. doi:10.2307/1911749.
  • E.G. Coffman, A.A. Puhalskii, and M.I. Reiman, Polling systems in heavy traffic: A Bessel process limit, Discrete Appl Math 23 (2) (1998), pp. 257–304. doi:10.1287/moor.23.2.257.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.