Showing 661 - 680 results of 1,111 for search '"quantum computing"', query time: 0.08s Refine Results
  1. 661

    A comparative analysis of classical machine learning models with quantum-inspired models for predicting world surface temperature by Trilok Nath Pandey, Vishvajeet Ravalekar, Sidharth D. Nair, Sunil Kumar Pradhan

    Published 2025-08-01
    “…The findings of this study not only help to comprehend the applicability of quantum algorithms in real-world contexts, but they also open the way for future advances in utilizing quantum computing for increased time-series analysis and prediction. …”
    Get full text
    Article
  2. 662

    Radial polarization imaging of entangled biphoton state by Jiung Kim, Jeeseong Hwang, Martin Y. Sohn

    Published 2025-06-01
    “…Polarization entanglement of single photons is a key element to enable quantum 2.0 applications, such as quantum computing, quantum networks, and quantum sensing. …”
    Get full text
    Article
  3. 663

    Addressing Security Orchestration Challenges in Next-Generation Networks: A Comprehensive Overview by Sadeep Batewela, Pasika Ranaweera, Madhusanka Liyanage, Engin Zeydan, Mika Ylianttila

    Published 2025-01-01
    “…Emerging technologies such as artificial intelligence (AI), blockchain, quantum computing and trusted execution environments (TEE) are also examined for their potential to address these challenges. …”
    Get full text
    Article
  4. 664
  5. 665

    Hybrid Quantum–Classical Deep Neural Networks Based Smart Contract Vulnerability Detection by Sinan Durgut, Ecir Uğur Küçüksille, Mahmut Tokmak

    Published 2025-04-01
    “…A Hybrid Quantum–Classical Deep Neural Network (HQCDNN) approach was proposed, combining quantum computing principles with classical deep learning methods to identify various vulnerability types, including access control, arithmetic, front-running, reentrancy, time manipulation, denial of service, and unchecked low calls. …”
    Get full text
    Article
  6. 666

    Security in Post-Quantum Era: A Comprehensive Survey on Lattice-Based Algorithms by Hien Nguyen, Samsul Huda, Yasuyuki Nogami, Tuy Tan Nguyen

    Published 2025-01-01
    “…Lattice-based post-quantum cryptography (PQC) has attracted significant attention as a promising solution to the security challenges posed by quantum computing. Unlike traditional cryptographic algorithms, lattice-based schemes are expected to remain secure even in the presence of quantum attacks, making them essential for securing future data. …”
    Get full text
    Article
  7. 667

    Explainable AI-Driven Quantum Deep Neural Network for Fault Location in DC Microgrids by Amir Hossein Poursaeed, Farhad Namdari

    Published 2025-02-01
    “…The model uses a combination of deep learning and quantum computing techniques to extract features and improve accuracy. …”
    Get full text
    Article
  8. 668

    Q-Pandora Unboxed: Characterizing Resilience of Quantum Error Correction Codes Under Biased Noise by Avimita Chatterjee, Subrata Das, Swaroop Ghosh

    Published 2025-04-01
    “…Quantum error correction codes (QECCs) are essential for reliable quantum computing as they protect quantum states against noise and errors. …”
    Get full text
    Article
  9. 669

    Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude by Duong Dinh Tran, Kazuhiro Ogata, Santiago Escobar, Sedat Akleylek, Ayoub Otmani

    Published 2023-01-01
    “…Facing the potential threat raised by quantum computing, a great deal of research from many groups and industrial giants has gone into building public-key post-quantum cryptographic primitives that are resistant to the quantum attackers. …”
    Get full text
    Article
  10. 670

    Far from Perfect: Quantum Error Correction with (Hyperinvariant) Evenbly Codes by Matthew Steinberg, Junyu Fan, Robert J. Harris, David Elkouss, Sebastian Feld, Alexander Jahn

    Published 2025-08-01
    “…Our work indicates that Evenbly codes may show promise for practical quantum computing applications.…”
    Get full text
    Article
  11. 671

    Probing quantum complexity via universal saturation of stabilizer entropies by Tobias Haug, Leandro Aolita, M.S. Kim

    Published 2025-07-01
    “…Nonstabilizerness or `magic' is a key resource for quantum computing and a necessary condition for quantum advantage. …”
    Get full text
    Article
  12. 672

    Laser Pulses for Studying Photoactive Spin Centers with EPR by George Mamin, Ekaterina Dmitrieva, Fadis Murzakhanov, Margarita Sadovnikova, Sergey Nagalyuk, Marat Gafurov

    Published 2025-03-01
    “…The application of pulsed laser irradiation influences the EPR relaxation parameters associated with spin centers, which are crucial for advancements in quantum computing. The presented experimental approach facilitates the investigation of weak electron–nuclear interactions in crystals, a key factor in the development of quantum memory utilizing nuclear qubits.…”
    Get full text
    Article
  13. 673

    A Review on the Advances, Applications, and Future Prospects of Post-Quantum Cryptography in Blockchain and IoT by Yong Wang, Eddie Shahril Ismail

    Published 2025-01-01
    “…With the advancement of quantum computing, classical public-key cryptosystems are increasingly vulnerable, prompting global standardization efforts by organizations such as NIST, ETSI, and ISO. …”
    Get full text
    Article
  14. 674

    A Robust Heuristics for the Online Job Shop Scheduling Problem by Hugo Zupan, Niko Herakovič, Janez Žerovnik

    Published 2024-12-01
    “…The probabilistic rule defines a model which is not unlike the spin glass models that are closely related to quantum computing. Major advances of the approach are the inherent parallelism and its robustness, promising natural and likely successful application to other variations of JSSP. …”
    Get full text
    Article
  15. 675
  16. 676

    Sharing Privacy Protected and Statistically Sound Clinical Research Data Using Outsourced Data Storage by Geontae Noh, Ji Young Chun, Ik Rae Jeong

    Published 2014-01-01
    “…Since clinical data must remain private beyond a patient’s lifetime, we take advantage of lattice-based homomorphic encryption to guarantee long-term security against quantum computing attacks. Using lattice-based homomorphic encryption, we design an aggregation protocol that aggregates outsourced ciphertexts under distinct public keys. …”
    Get full text
    Article
  17. 677

    BeSnake: A Routing Algorithm for Scalable Spin-Qubit Architectures by Nikiforos Paraskevopoulos, Carmen G. Almudever, Sebastian Feld

    Published 2024-01-01
    “…As quantum computing devices increase in size with respect to the number of qubits, two-qubit interactions become more challenging, necessitating innovative and scalable qubit routing solutions. …”
    Get full text
    Article
  18. 678

    Bias-field digitized counterdiabatic quantum optimization by Alejandro Gomez Cadavid, Archismita Dalal, Anton Simen, Enrique Solano, Narendra N. Hegade

    Published 2025-04-01
    “…These results mark a significant advancement in gate-based quantum computing, employing a fully quantum algorithmic approach.…”
    Get full text
    Article
  19. 679

    Photo-enhanced output in memdiode devices based on hybrid materials by Jacob Lee, Prabir Patra, Xiaojuan Fan

    Published 2025-03-01
    “…The memdiodes are stable with repeatable working values in a bio-applicable range, assuring that the hybrid materials are excellent candidates for potential applications in biomedical electronic circuits, artificial neuromorphic synapses, and brain-inspired quantum computing.…”
    Get full text
    Article
  20. 680

    Quantum-Inspired Data Embedding for Unlabeled Data in Sparse Environments: A Theoretical Framework for Improved Semi-Supervised Learning without Hardware Dependence by Shawn Ray

    Published 2024-12-01
    “…This research marks a significant stride in integrating quantum theoretical principles with classical machine learning, broadening the scope of data representation and semi-supervised learning while circumventing the technological barriers of quantum computing infrastructure.…”
    Get full text
    Article