-
241
Homogenized Point Mutual Information and Deep Quantum Reinforced Wind Power Prediction
Published 2022-01-01“…To address these issues, in this work, a method called, Homogenized Point Mutual Information and Deep Quantum Reinforced (HPMI-QDR) wind power prediction are proposed. …”
Get full text
Article -
242
Vibration Signal Processing for Transmission System based on Quantum-inspired Mathematical Morphology
Published 2017-01-01“…Since CQSEE utilizes quantum theory to depict noise and fault information,it maturely considers different characteristics of noise and fault information during computational process,which realizes the goal of adjusting height of structuring element dynamically. …”
Get full text
Article -
243
Finite cut-off JT and Liouville quantum gravities on the disk at one loop
Published 2025-01-01“…Abstract Within the path integral formalism, we compute the disk partition functions of two dimensional Liouville and JT quantum gravity theories coupled to a matter CFT of central charge c, with cosmological constant Λ, in the limit c → −∞, |Λ| → ∞, for fixed Λ/c and fixed and finite disk boundary length ℓ, to leading and first subleading order in the 1/|c| expansion. …”
Get full text
Article -
244
QeMFi: A Multifidelity Dataset of Quantum Chemical Properties of Diverse Molecules
Published 2025-02-01“…Abstract Progress in both Machine Learning (ML) and Quantum Chemistry (QC) methods have resulted in high accuracy ML models for QC properties. …”
Get full text
Article -
245
Quantum anonymous one-vote veto protocol based on BB84 states
Published 2022-08-01“…In order to construct unconditionally secure one-vote veto protocol, a primitive protocol of secure multiparty computations was defined, i.e., secure multiparty disjunction.Furthermore, by introducing a quantum cloud, a quantum secure multiparty disjunction (QSMD) protocol was proposed.BB84 states were took as quantum resources and only single-photon operations and measurements were needed.To avoid the flaws of infeasibility, i.e., most of existing quantum voting protocols need to perform operations and measurements in high-dimensional Hilbert space, a quantum anonymous one-vote veto protocol with a quantum cloud (QAOVC) was designed by using the QSMD protocol.In addition, to decentralize, a quantum anonymous one-vote veto (QAOV) protocol without any third party was presented.Compared with related protocols, the proposed protocols require less quantum resources and simpler operations, so they have better feasibility.Under the semi-honest model, quantum perfect encryption and classical one-time pad can ensure the unconditional security of the proposed protocols, i.e., it can completely meet secure requirements of one-vote veto and perfectly protect the privacy of the voters.Finally, simulation experiments are implemented on IBM Qiskit, and the experimental results show that the protocols are correct and feasible.…”
Get full text
Article -
246
MIMO With 1-b Pre/Postcoding Resolution: A Quantum Annealing Approach
Published 2024-01-01Get full text
Article -
247
Absorption spectra of Nitrazine Yellow indicator. Experimental data and quantum chemical evaluations
Published 2024-06-01“…This article presents an experimental investigation and theoretical analysis of the electronic absorption spectra of the indicator nitrazine yellow (NY) in aqueous solutions. Quantum chemical modeling of electronically excited states is performed within the framework of time-dependent density functional theory (TD-DFT). …”
Get full text
Article -
248
Stationary solutions to a hybrid viscous hydrodynamic model with classical boundaries
Published 2024-09-01Get full text
Article -
249
Novel Design for Quantum Dots Cellular Automata to Obtain Fault-Tolerant Majority Gate
Published 2012-01-01“…Quantum-dot Cellular Automata (QCA) is one of the most attractive technologies for computing at nanoscale. …”
Get full text
Article -
250
-
251
High-rate quantum LDPC codes for long-range-connected neutral atom registers
Published 2025-01-01“…Abstract High-rate quantum error correcting (QEC) codes with moderate overheads in qubit number and control complexity are highly desirable for achieving fault-tolerant quantum computing. …”
Get full text
Article -
252
Construction contemplation of cloud platform for domestic password service based on quantum secret communication
Published 2018-07-01“…With the increasingly serious environment of network space security,the importance of cryptography is becoming more and more prominent.There are many problems in the current application of cryptographic technology and the demand of secure and controllable password resource for key information structure is urgent.According to technology advantages and disadvantages of classical and quantum passwords were analyzed and the integration direction of quantum cryptography and classical password technology was proposed.At the same time,by giving full consideration to the development trend of cloud computing architecture,the password cloud service concept was proposed and the domestic password service cloud platform based on quantum secret communication was designed.It has positive guiding significance for building a new firewall of cyber security based on quantum secret communication.…”
Get full text
Article -
253
Design and Improvement of a Reversible SISO Shift Register with Quantum dot Cellular Automata
Published 2024-12-01“…Abstract Quantum dot cellular automata is one of the new nanotechnologies in computing systems having more potential for increasing speed, reducing the size and reducing power consumption in comparison with the current technology based on transistors. …”
Get full text
Article -
254
Quantum Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical IoT
Published 2025-01-01“…While several authentication techniques offer protection against quantum attacks, they often incur high communication and computation costs, underscoring the need for further advancement. …”
Get full text
Article -
255
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
Published 2020-04-01“…Due to less proxy signature schemes in the post-quantum cryptography aspect, in this article, we investigate the proxy signature in the post-quantum setting so that it can resist against the potential attacks from the quantum adversaries. …”
Get full text
Article -
256
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
Published 2025-01-01“…This PQC algorithm is designed to withstand the decryption capabilities of quantum computers, thus providing long-term security. …”
Get full text
Article -
257
Tools for the Analysis of Quantum Protocols Requiring State Generation Within a Time Window
Published 2024-01-01“…Specifically, with an example of a blind quantum computing protocol, we illustrate how they may be used to infer <inline-formula><tex-math notation="LaTeX">$w$</tex-math></inline-formula> and <inline-formula><tex-math notation="LaTeX">$p$</tex-math></inline-formula> to optimize the rate of successful protocol execution.…”
Get full text
Article -
258
Photophysics of O-band and transition metal color centers in monolithic silicon for quantum communications
Published 2025-01-01Get full text
Article -
259
Quaternary Neural Belief Propagation Decoding of Quantum LDPC Codes With Overcomplete Check Matrices
Published 2025-01-01“…Quantum low-density parity-check (QLDPC) codes are promising candidates for error correction in quantum computers. …”
Get full text
Article -
260
Scalable circuit depth reduction in feedback-based quantum optimization with a quadratic approximation
Published 2025-01-01“…Combinatorial optimization problems are one of the areas where near-term noisy quantum computers may have practical advantage against classical computers. …”
Get full text
Article