-
121
A New Method of Kronecker Product Decomposition
Published 2023-01-01“…Kronecker product decomposition is often applied in various fields such as particle physics, signal processing, image processing, semidefinite programming, quantum computing, and matrix time series analysis. In the paper, a new method of Kronecker product decomposition is proposed. …”
Get full text
Article -
122
Noise-tolerant Grover's algorithm via success-probability prediction
Published 2025-01-01“…Experiments are implemented on different quantum computing setups, with all results clearly confirming the advantage of our noise-tolerant method to the original Grover's search. …”
Get full text
Article -
123
Solovay–Kitaev Approximations of Special Orthogonal Matrices
Published 2020-01-01“…The circuit-gate framework of quantum computing relies on the fact that an arbitrary quantum gate in the form of a unitary matrix of unit determinant can be approximated to a desired accuracy by a fairly short sequence of basic gates, of which the exact bounds are provided by the Solovay–Kitaev theorem. …”
Get full text
Article -
124
Unconventional Anomalous Hall Effect Driven by Self‐Intercalation in Covalent 2D Magnet Cr2Te3
Published 2025-01-01Get full text
Article -
125
-
126
The Fourth Industrial Revolution: Another Industrial Revolution Leaving Black Women Behind?
Published 2020-03-01“…This fusion of advances in complex technologies, including but not limited to robotics, quantum computing, blockchain, artificial intelligence (AI) and the internet of things (IoT), would affect all disciplines and industries of the modern world. …”
Get full text
Article -
127
The Fourth Industrial Revolution: Another Industrial Revolution Leaving Black Women Behind?
Published 2020-03-01“…This fusion of advances in complex technologies, including but not limited to robotics, quantum computing, blockchain, artificial intelligence (AI) and the internet of things (IoT), would affect all disciplines and industries of the modern world. …”
Get full text
Article -
128
Lattice-based verifiable timed signature and application
Published 2024-10-01“…Aiming at the problem that current verifiable timed signature (VTS) schemes cannot effectively resist the threat of quantum computing attacks, a lattice-based verifiable timed signature (LVTS) scheme was proposed, founded on challenging problems over lattices. …”
Get full text
Article -
129
Measuring Chern–Simons level k by braiding $$SU(2)_k$$ S U ( 2 ) k anyons
Published 2025-01-01“…Abstract Chern–Simons theory in application to the quantum computing is actively developing at the present. …”
Get full text
Article -
130
Quantum Internet: key technologies and future prospect
Published 2022-02-01“…The quantum Internet integrates quantum computing, quantum measurement and communication, which can be described as the future goal of the evolution of quantum information technology.However, due to the restrictions of the laws of quantum mechanics, such as quantum teleportation, quantum entanglement, quantum measurement and non-cloning, which all pose new challenges to the quantum networking design.The basic concepts and development paths of the quantum Internet were firstly introduced, and the implementation differences between the classical network and the quantum network were explained.Considering the difference between quantum communication and the traditional communication, the key technologies for realizing the quantum Internet including the quantum physical devices, networking protocol, quantum decoherence and quantum relay were introduced, and finally the prospect and suggestions for developing quantum Internet was presented.…”
Get full text
Article -
131
Political Organising and Mobilising in the Age of the Fourth Industrial Revolution: A Reflection on the Gauteng Young Communist League of South Africa
Published 2020-03-01“…As “a way of describing the blurring of boundaries between the physical, digital, and biological worlds...a fusion of advances in artificial intelligence, robotics, the Internet of Things, 3D printing, genetic engineering, quantum computing, and other technologies…” (McGinnis, 2018), the 4IR is primarily concerned with the inchoate transformation of the production of goods and services, resulting from the application of a new wave of technological innovations. …”
Get full text
Article -
132
Research on password-authenticated key exchange protocol over lattices
Published 2022-12-01“…With the rapid development of quantum computing technology, password-authenticated key exchange (PAKE) protocol based on conventional difficult problems will face serious security threats in the post-quantum era.Lattice-based cryptosystem has been certified by NIST as the most promising cryptosystem in the post-quantum era due to its high efficiency, high security and support for stronger cryptographic service functions (such as fully homomorphic encryption and multi-linear mapping).Firstly, the research progress of lattice-based PAKE protocol was systematically sort out, mainly including the centralized two-party, three-party PAKE protocol and the distributed PAKE protocol over lattices.Then, the relevant typical schemes were compared and analyzed, respectively.Finally, the future research directions PAKE protocol over lattices were prospected.…”
Get full text
Article -
133
Remote epitaxy and exfoliation of vanadium dioxide via sub-nanometer thick amorphous interlayer
Published 2025-01-01Get full text
Article -
134
Code-based generalized signcryption scheme with multi-receiver
Published 2020-01-01“…,and has high computational efficiency and the advantage of anti-quantum computing.Compared with the method of signing-then-encrypting method,the proposed scheme has the smaller private key and higher efficiency.…”
Get full text
Article -
135
Novel Design for Quantum Dots Cellular Automata to Obtain Fault-Tolerant Majority Gate
Published 2012-01-01Get full text
Article -
136
Blueprint for All-to-All-Connected Superconducting Spin Qubits
Published 2025-01-01“…Our architecture shows promise both for gate-based quantum computing and for analog quantum simulation applications by offering higher qubit connectivity than alternative solid-state platforms.…”
Get full text
Article -
137
Long-range CCΦ gates via radio-frequency-induced Förster resonances
Published 2025-01-01“…Registers of trapped neutral atoms, excited to Rydberg states to induce strong long-distance interactions, are extensively studied for direct applications in quantum computing. Here we present a CCΦ quantum phase gate protocol based on radio-frequency-induced Förster resonant interactions in the array of highly excited ^{87}Rb atoms. …”
Get full text
Article -
138
A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things
Published 2022-11-01“…As quantum computing techniques develop rapidly, the security of classical communication, which is usually based on public key encryption algorithm, is under great threat. …”
Get full text
Article -
139
Realization of a spin-1/2 Kondo necklace model with magnetic field-induced coupling switch
Published 2025-01-01“…This offers other opportunities for quantum technologies, particularly in the development of tunable qubits for quantum computing and spintronic devices, where precise control over spin interactions is essential.…”
Get full text
Article -
140
Preparing Schrödinger Cat States in a Microwave Cavity Using a Neural Network
Published 2025-01-01“…Scaling up quantum computing devices requires solving ever more complex quantum control tasks. …”
Get full text
Article