Showing 321 - 340 results of 649 for search '"Quantum computing', query time: 0.10s Refine Results
  1. 321
  2. 322

    APPLYING THE GENETIC ALGORITHM AND QUANTUM CHEMICAL CALCULATIONS TO STUDY THE STRUCTURE OF THE Sc2B6 CLUSTER AND ITS CO ADSORPTION by Minh Thao Nguyen, Tho Thanh Bui, Trung Cang Phan, Sy Linh Ho

    Published 2024-09-01
    “…We used the genetic algorithm and quantum chemical calculations to study the structures of the Sc2B6 cluster. …”
    Get full text
    Article
  3. 323
  4. 324

    Quantum-Inspired Data Embedding for Unlabeled Data in Sparse Environments: A Theoretical Framework for Improved Semi-Supervised Learning without Hardware Dependence by Shawn Ray

    Published 2024-12-01
    “…In contrast to conventional quantum machine learning methodologies that often rely on quantum hardware, this framework is fully realizable within classical computational architectures, thus bypassing the practical limitations of quantum hardware. …”
    Get full text
    Article
  5. 325
  6. 326

    Quantum-Inspired Multi-Scale Object Detection in UAV Imagery: Advancing Ultra-Small Object Accuracy and Efficiency for Real-Time Applications by Muhammad Muzammul, Muhammad Assam, Ayman Qahmash

    Published 2025-01-01
    “…It also establishes a foundation for future advancements, including scalability to diverse datasets, integration with edge computing platforms, and the exploration of quantum computing techniques. …”
    Get full text
    Article
  7. 327

    A Study of the Far Infrared Spectrum of N-Acetyl-D-Glucosamine Using THz-TDS, FTIR, and Semiempirical Quantum Chemistry Methods by Pedro Chamorro-Posada, Iosody Silva-Castro, José Vázquez-Cabo, Pablo Martín-Ramos, José María López-Santos, Jesús Martín-Gil

    Published 2016-01-01
    “…The far infrared spectrum of N-acetyl-D-glucosamine has been studied by combining THz–TDS and FTIR characterization techniques with theoretical studies based on semiempirical quantum chemistry methods. A strong spectral peak at 60 cm−1 has been identified, which constitutes the main signature of the material in the terahertz band. …”
    Get full text
    Article
  8. 328

    A lightweight lattice-based group signcryption authentication scheme for Internet of things by XU Chuan, AI Xinghao, WANG Shanshan, ZHAO Guofeng, HAN Zhenzhen

    Published 2024-04-01
    “…Furthermore, the simulation results prove that this scheme can resist quantum attacks in the Internet of things.…”
    Get full text
    Article
  9. 329
  10. 330

    Introduction to Thermal Field Theory: From First Principles to Applications by Alberto Salvio

    Published 2025-01-01
    “…To understand this review, the reader should have good knowledge of non-statistical quantum field theory.…”
    Get full text
    Article
  11. 331

    Algebraic classification of Hietarinta’s solutions of Yang-Baxter equations: invertible 4 × 4 operators by Somnath Maity, Vivek Kumar Singh, Pramod Padmanabhan, Vladimir Korepin

    Published 2024-12-01
    “…Abstract In order to examine the simulation of integrable quantum systems using quantum computers, it is crucial to first classify Yang-Baxter operators. …”
    Get full text
    Article
  12. 332

    Radiative corrections to the R and R 2 invariants from torsion fluctuations on maximally symmetric spaces by Riccardo Martini, Gregorio Paci, Dario Sauro

    Published 2024-12-01
    “…Abstract We derive the runnings of the R and R 2 operators that stem from integrating out quantum torsion fluctuations on a maximally symmetric Euclidean background, while treating the metric as a classical field. …”
    Get full text
    Article
  13. 333

    Speedup signing: pre-rejection sampling towards dilithium by Lianglin Yan, Ming Luo, Mingsheng Wang

    Published 2025-02-01
    “…Abstract Security and efficiency have always been two critical factors in the development of post-quantum digital signatures. As the best-known scheme, Dilithium (Ducas et al., TCHES 2018) is SUF-CMA in QROM and has a relatively fast efficiency with many untrivial optimizations. …”
    Get full text
    Article
  14. 334
  15. 335

    Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation by Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal

    Published 2025-01-01
    “…Public key encryption-based digital signatures are widely used for user authentication; however, with the development of quantum computers they are highly likely to be deciphered. …”
    Get full text
    Article
  16. 336
  17. 337

    Identifying the determining factors of detonation properties for linear nitroaliphatics with high-throughput computation and machine learning by Wen Qian, Jing Huang, Shi-tai Guo, Bo-wen Duan, Wei-yu Xie, Jian Liu, Chao-yang Zhang

    Published 2024-12-01
    “…In this work, a high-throughput computation (HTC) and machine learning (ML) combined method was applied to identify the determining factors of the detonation velocity (vd) and detonation pressure (pd) of energetic molecules and screen potential high-energy molecules with acceptable stability in a high-throughput way. …”
    Get full text
    Article
  18. 338
  19. 339

    Enhancing feature selection for multi-pose facial expression recognition using a hybrid of quantum inspired firefly algorithm and artificial bee colony algorithm by Mu Panliang, Sanjay Madaan, Siddiq Ahmed Babikir Ali, Gowrishankar J., Ali Khatibi, Anas Ratib Alsoud, Vikas Mittal, Lalit Kumar, A. Johnson Santhosh

    Published 2025-02-01
    “…Abstract Facial expression recognition (FER) has advanced applications in various disciplines, including computer vision, Internet of Things, and artificial intelligence, supporting diverse domains such as medical escort services, learning analysis, fatigue detection, and human-computer interaction. …”
    Get full text
    Article
  20. 340

    Survey of code-based digital signatures by Yongcheng SONG, Xinyi HUANG, Wei WU, Haixia CHEN

    Published 2021-08-01
    “…The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.Code-based hard problem is recognized as NP-complete problem, the complexity increases exponentially, and there is currently no threat of quantum computing to code-based cryptographic algorithm.Therefore, code-based algorithm can resist the quantum algorithm attack, which is one of the main directions of quantum-resistant cryptography.It is still an open problem to design secure and efficient code-based signatures.For many years, international researchers use classical and new methods to construct code-based signatures, but existing constructions are weak in security or poor in performance.Code-based signatures were comprehensively summarized and analyzed, and future research directions were indicated.…”
    Get full text
    Article