-
361
Provable security signcryption scheme based on RLWE without trapdoor
Published 2020-06-01Get full text
Article -
362
Circular dichroism of relativistically–moving chiral molecules
Published 2024-07-01“…To contribute to these significant developments, we describe a multi–scale computational framework that combines quantum chemistry calculations and full–wave optical simulations to predict the chiral optical response from molecules moving at relativistic speeds. …”
Get full text
Article -
363
-
364
-
365
-
366
QGA-based network service extension algorithm in NFV
Published 2022-11-01“…To meet the client’s new business requirements or add additional security protection functions, the already hosted network service extension problem in the cloud network based on network function virtualization was researched.The network service extension in the cloud network was modeled as an integer linear programming, considering the impact on initial service, extended graph deployment, resource capacity and virtual network function affinity constraints, and so on.To deal with the computational complexity and dynamism of future large-scale cloud networks, a QGA-based network service extension algorithm was proposed to improve solution efficiency and solution quality through quantum parallel computing.Simulation results prove that the efficient performance of the proposed algorithm in terms of extension successful ratio and average resource costs, and the proposed algorithm has low time complexity.…”
Get full text
Article -
367
-
368
Hybrid subQUBO Annealing With a Correction Process for Multi-Day Intermodal Trip Planning
Published 2025-01-01“…However, current quantum annealers have a small QUBO input size so that they cannot directly solve large-scale MITPPs. …”
Get full text
Article -
369
The evolution patterns of active functional groups and reaction pathways during the low-temperature oxidation process of coal
Published 2024-12-01“…This study employed the in-situ infrared experiment (In-situ FTIR) to investigate the content changes of key active functional groups during the low-temperature oxidation process so as to obtain the transformation patterns between functional groups. Based on the quantum chemistry theory, we conducted structural optimization, transition state configuration analysis, thermodynamic parameter calculations and intrinsic reaction coordinate (IRC) computations on the constructed coal molecular models by using GaussView 6.0 and Gaussian 16. …”
Get full text
Article -
370
Dynamics of qubit entanglement in three-qubit Jaynes–Cummings model for biseparable intial states
Published 2024-12-01“…Background. To operate a quantum computer, a set of universal gates must be implemented, such as a two-cubit gate of the controlled negation type plus one-cubit spins. …”
Get full text
Article -
371
Geometry-symmetry-free and material-symmetry-guaranteed polariton-induced transparency
Published 2025-02-01Get full text
Article -
372
Are queries and keys always relevant? A case study on transformer wave functions
Published 2025-01-01“…It adeptly captures semantic relationships between word pairs in sentences by computing a similarity overlap between queries and keys. …”
Get full text
Article -
373
-
374
-
375
Harnessing the Power of Long-Range Entanglement for Clifford Circuit Synthesis
Published 2024-01-01“…In superconducting architectures, limited connectivity remains a significant challenge for the synthesis and compilation of quantum circuits. We consider models of entanglement-assisted computation where long-range operations are achieved through injections of large Greenberger–Horne–Zeilinger (GHZ) states. …”
Get full text
Article -
376
Predicting nonequilibrium Green’s function dynamics and photoemission spectra via nonlinear integral operator learning
Published 2025-01-01“…Understanding the dynamics of nonequilibrium quantum many-body systems is an important research topic in a wide range of fields across condensed matter physics, quantum optics, and high-energy physics. …”
Get full text
Article -
377
Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments
Published 2025-01-01Get full text
Article -
378
Improved lattice‐based mix‐nets for electronic voting
Published 2023-01-01“…., ElGamal encryption) that will become vulnerable when a sufficiently powerful quantum computer will be built. Thus, there is a need to develop quantum‐resistant mix‐nets. …”
Get full text
Article -
379
-
380
Entrepreneurial strategies for sustainable growth: a deep dive into cloud-native technology and its applications
Published 2025-02-01“…The study identified that one of the main forces behind disruption is the quick development of new technologies including blockchain, 5G, IoT, quantum computing, and AI. Cloud-native technology supports innovative business models in entrepreneurship such as SaaS, serverless computing, managed Kubernetes, data analytics platforms, BaaS, and Edge Computing. …”
Get full text
Article