Showing 461 - 480 results of 649 for search '"Quantum computing', query time: 0.07s Refine Results
  1. 461

    Classical eikonal from Magnus expansion by Joon-Hwi Kim, Jung-Wook Kim, Sungsoo Kim, Sangmin Lee

    Published 2025-01-01
    “…It can be regarded as the classical limit of the log of the quantum S-matrix. In a classical analog of the Born approximation in quantum mechanics, the classical eikonal admits an expansion in oriented tree graphs, where oriented edges denote retarded/advanced worldline propagators. …”
    Get full text
    Article
  2. 462
  3. 463
  4. 464

    Integrated photonic programmable random matrix generator with minimal active components by Kevin Zelaya, Mostafa Honari-Latifpour, Mohammad-Ali Miri

    Published 2025-02-01
    “…In manipulating classical light, random operations are utilized for random projections and dimensionality reduction, which are important for analog signal processing, computing, and imaging. In quantum information processing, random unitary operations are essential to boson sampling algorithms for multiphoton states in linear photonic circuits. …”
    Get full text
    Article
  5. 465

    The Fourth Industrial Revolution: Another Industrial Revolution Leaving Black Women Behind? by Malaika Mahlatsi

    Published 2020-03-01
    “…This fusion of advances in complex technologies, including but not limited to robotics, quantum computing, blockchain, artificial intelligence (AI) and the internet of things (IoT), would affect all disciplines and industries of the modern world. …”
    Get full text
    Article
  6. 466

    The Fourth Industrial Revolution: Another Industrial Revolution Leaving Black Women Behind? by Malaika Mahlatsi

    Published 2020-03-01
    “…This fusion of advances in complex technologies, including but not limited to robotics, quantum computing, blockchain, artificial intelligence (AI) and the internet of things (IoT), would affect all disciplines and industries of the modern world. …”
    Get full text
    Article
  7. 467

    Lattice-based verifiable timed signature and application by CHEN Huiyan, WANG Qingnan, WANG Ke, TAN Shuncong, XIN Hongcai

    Published 2024-10-01
    “…Aiming at the problem that current verifiable timed signature (VTS) schemes cannot effectively resist the threat of quantum computing attacks, a lattice-based verifiable timed signature (LVTS) scheme was proposed, founded on challenging problems over lattices. …”
    Get full text
    Article
  8. 468

    Political Organising and Mobilising in the Age of the Fourth Industrial Revolution: A Reflection on the Gauteng Young Communist League of South Africa by Kgabo Morifi

    Published 2020-03-01
    “…As “a way of describing the blurring of boundaries between the physical, digital, and biological worlds...a fusion of advances in artificial intelligence, robotics, the Internet of Things, 3D printing, genetic engineering, quantum computing, and other technologies…” (McGinnis, 2018), the 4IR is primarily concerned with the inchoate transformation of the production of goods and services, resulting from the application of a new wave of technological innovations. …”
    Get full text
    Article
  9. 469

    Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security by Aiqun HU, Guyue LI, Linning PENG, Tao LI

    Published 2019-06-01
    “…The teaching method was explored incorporating ideological elements for the advanced technology of cyberspace security.The teaching content of this course is constituted of six aspects,i.e.,quantum communication,public key infrastructure,physical layer security,blockchain,trusted computing and privacy protection.Apart from teaching the related technologies,the remarkable achievements and efforts of Chinese scientists were shown and the future work was indicated.Students are grouped to do literature research,expand their knowledge,exchange the learning experience and explore the law of scientific research in these new aspects.Students can not only absorb the knowledge of cutting-edge technology,but also learn the method and spirit to address scientific problems.A useful reference for education and teaching method of course ideological for graduate students was provided.…”
    Get full text
    Article
  10. 470

    Triplet-ground-state nonalternant nanographene with high stability and long spin lifetimes by Weixiang Zhou, Yiyang Fei, Yu-Shuang Zhang, Xiaohe Miao, Shang-Da Jiang, Junzhi Liu

    Published 2025-01-01
    “…Moreover, considering the spin relaxation of compound 1, with a spin–lattice relaxation time (T 1) of 53.55 ms and a coherence time (T m) of 3.41 μs at 10 K, the compound 1 shows great promise for applications in spin-based information retention and quantum computing.…”
    Get full text
    Article
  11. 471
  12. 472
  13. 473

    Code-based generalized signcryption scheme with multi-receiver by Yiliang HAN, Zhong WANG

    Published 2020-01-01
    “…In order to solve the problem of secure transmission of messages with multiple receivers,a code-based generalized signcryption scheme with multi-receiver was designed.Firstly,a multi-encrypted McEliece scheme that can meet the security of IND-CCA2 was designed.Combined with the CFS signature scheme,the multi-receiver signcryption and generalized signcryption scheme based on code were designed.The security analysis shows that the multi-receiver generalized signcryption scheme can meet the security of IND-CCA2 in terms of confidentiality and can meet EUF-CMA security in terms of unforgeability.Compared with other similar multi-receiver signcryption schemes,the proposed scheme does not include exponential,bilinear pairing operations,etc.,and has high computational efficiency and the advantage of anti-quantum computing.Compared with the method of signing-then-encrypting method,the proposed scheme has the smaller private key and higher efficiency.…”
    Get full text
    Article
  14. 474

    Anomalies of QFTs from M-theory and holography by Ibrahima Bah, Federico Bonetti, Ruben Minasian, Emily Nardoni

    Published 2020-01-01
    “…Abstract We describe a systematic way of computing the ’t Hooft anomalies for continuous symmetries of Quantum Field Theories in even dimensions that can be geometrically engineered from M5-branes. …”
    Get full text
    Article
  15. 475

    STUDY OF COMPATIBILITY OF METHODS AND TECHNOLOGIES OF HIGH-LEVEL PROTOCOLS AND ERROR-CORRECTING CODES by Vladyslav Sharov, Olena Nikulina

    Published 2024-12-01
    “…Emerging technologies like quantum computing and artificial intelligence introduce both opportunities and threats, necessitating continuous innovation in these fields. …”
    Get full text
    Article
  16. 476

    Armenia Towards a "New Economy": Defense Industry by A. B. Harutyunyan

    Published 2021-04-01
    “…In fact, a new arms race could start in the world as a side effect of the so-called “4th Industrial Revolution” – the main innovative trend of which is the widespread use of technologies such as artificial intelligence, machine learning, quantum computing, additive manufacturing, robotics, Internet of things, cloud technologies etc., and the countries involved in military conflicts cannot neglect this circumstance. …”
    Get full text
    Article
  17. 477

    Dissipative Protection of a GKP Qubit in a High-Impedance Superconducting Circuit Driven by a Microwave Frequency Comb by L.-A. Sellem, A. Sarlette, Z. Leghtas, M. Mirrahimi, P. Rouchon, P. Campagne-Ibarcq

    Published 2025-01-01
    “…Qubit initialization, readout, and control via Clifford gates can be performed while maintaining the code stabilization, paving the way toward the assembly of GKP qubits in a fault-tolerant quantum computing architecture.…”
    Get full text
    Article
  18. 478

    Passive and active suppression of transduced noise in silicon spin qubits by Jaemin Park, Hyeongyu Jang, Hanseo Sohn, Jonginn Yun, Younguk Song, Byungwoo Kang, Lucas E. A. Stehouwer, Davide Degli Esposti, Giordano Scappucci, Dohun Kim

    Published 2025-01-01
    “…Abstract Addressing and mitigating decoherence sources plays an essential role in the development of a scalable quantum computing system, which requires low gate errors to be consistently maintained throughout the circuit execution. …”
    Get full text
    Article
  19. 479
  20. 480

    The Cigar-Shaped Background Metric with Supersymmetry Approaches and Thermal Properties of System by Omid Jalili, Shahin Toni, Jafar Sadeghi

    Published 2024-07-01
    “…Also, this first order equations lead us to use super symmetry(SUSY) approach and obtain the energy spectrum. SUSY quantum mechanics can be used to solve ordinary differential equation. …”
    Get full text
    Article