-
321
-
322
APPLYING THE GENETIC ALGORITHM AND QUANTUM CHEMICAL CALCULATIONS TO STUDY THE STRUCTURE OF THE Sc2B6 CLUSTER AND ITS CO ADSORPTION
Published 2024-09-01“…We used the genetic algorithm and quantum chemical calculations to study the structures of the Sc2B6 cluster. …”
Get full text
Article -
323
-
324
Quantum-Inspired Data Embedding for Unlabeled Data in Sparse Environments: A Theoretical Framework for Improved Semi-Supervised Learning without Hardware Dependence
Published 2024-12-01“…In contrast to conventional quantum machine learning methodologies that often rely on quantum hardware, this framework is fully realizable within classical computational architectures, thus bypassing the practical limitations of quantum hardware. …”
Get full text
Article -
325
-
326
Quantum-Inspired Multi-Scale Object Detection in UAV Imagery: Advancing Ultra-Small Object Accuracy and Efficiency for Real-Time Applications
Published 2025-01-01“…It also establishes a foundation for future advancements, including scalability to diverse datasets, integration with edge computing platforms, and the exploration of quantum computing techniques. …”
Get full text
Article -
327
A Study of the Far Infrared Spectrum of N-Acetyl-D-Glucosamine Using THz-TDS, FTIR, and Semiempirical Quantum Chemistry Methods
Published 2016-01-01“…The far infrared spectrum of N-acetyl-D-glucosamine has been studied by combining THz–TDS and FTIR characterization techniques with theoretical studies based on semiempirical quantum chemistry methods. A strong spectral peak at 60 cm−1 has been identified, which constitutes the main signature of the material in the terahertz band. …”
Get full text
Article -
328
A lightweight lattice-based group signcryption authentication scheme for Internet of things
Published 2024-04-01“…Furthermore, the simulation results prove that this scheme can resist quantum attacks in the Internet of things.…”
Get full text
Article -
329
Scattering, absorption and emission of highly excited strings
Published 2025-01-01Get full text
Article -
330
Introduction to Thermal Field Theory: From First Principles to Applications
Published 2025-01-01“…To understand this review, the reader should have good knowledge of non-statistical quantum field theory.…”
Get full text
Article -
331
Algebraic classification of Hietarinta’s solutions of Yang-Baxter equations: invertible 4 × 4 operators
Published 2024-12-01“…Abstract In order to examine the simulation of integrable quantum systems using quantum computers, it is crucial to first classify Yang-Baxter operators. …”
Get full text
Article -
332
Radiative corrections to the R and R 2 invariants from torsion fluctuations on maximally symmetric spaces
Published 2024-12-01“…Abstract We derive the runnings of the R and R 2 operators that stem from integrating out quantum torsion fluctuations on a maximally symmetric Euclidean background, while treating the metric as a classical field. …”
Get full text
Article -
333
Speedup signing: pre-rejection sampling towards dilithium
Published 2025-02-01“…Abstract Security and efficiency have always been two critical factors in the development of post-quantum digital signatures. As the best-known scheme, Dilithium (Ducas et al., TCHES 2018) is SUF-CMA in QROM and has a relatively fast efficiency with many untrivial optimizations. …”
Get full text
Article -
334
Anomalous Behavior of the Non-Hermitian Topological System with an Asymmetric Coupling Impurity
Published 2025-01-01Get full text
Article -
335
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01“…Public key encryption-based digital signatures are widely used for user authentication; however, with the development of quantum computers they are highly likely to be deciphered. …”
Get full text
Article -
336
-
337
Identifying the determining factors of detonation properties for linear nitroaliphatics with high-throughput computation and machine learning
Published 2024-12-01“…In this work, a high-throughput computation (HTC) and machine learning (ML) combined method was applied to identify the determining factors of the detonation velocity (vd) and detonation pressure (pd) of energetic molecules and screen potential high-energy molecules with acceptable stability in a high-throughput way. …”
Get full text
Article -
338
Investigating vertical charge plasma tunnel field effect transistors beyond semiclassical assumptions
Published 2025-02-01Get full text
Article -
339
Enhancing feature selection for multi-pose facial expression recognition using a hybrid of quantum inspired firefly algorithm and artificial bee colony algorithm
Published 2025-02-01“…Abstract Facial expression recognition (FER) has advanced applications in various disciplines, including computer vision, Internet of Things, and artificial intelligence, supporting diverse domains such as medical escort services, learning analysis, fatigue detection, and human-computer interaction. …”
Get full text
Article -
340
Survey of code-based digital signatures
Published 2021-08-01“…The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.Code-based hard problem is recognized as NP-complete problem, the complexity increases exponentially, and there is currently no threat of quantum computing to code-based cryptographic algorithm.Therefore, code-based algorithm can resist the quantum algorithm attack, which is one of the main directions of quantum-resistant cryptography.It is still an open problem to design secure and efficient code-based signatures.For many years, international researchers use classical and new methods to construct code-based signatures, but existing constructions are weak in security or poor in performance.Code-based signatures were comprehensively summarized and analyzed, and future research directions were indicated.…”
Get full text
Article