-
461
Classical eikonal from Magnus expansion
Published 2025-01-01“…It can be regarded as the classical limit of the log of the quantum S-matrix. In a classical analog of the Born approximation in quantum mechanics, the classical eikonal admits an expansion in oriented tree graphs, where oriented edges denote retarded/advanced worldline propagators. …”
Get full text
Article -
462
-
463
-
464
Integrated photonic programmable random matrix generator with minimal active components
Published 2025-02-01“…In manipulating classical light, random operations are utilized for random projections and dimensionality reduction, which are important for analog signal processing, computing, and imaging. In quantum information processing, random unitary operations are essential to boson sampling algorithms for multiphoton states in linear photonic circuits. …”
Get full text
Article -
465
The Fourth Industrial Revolution: Another Industrial Revolution Leaving Black Women Behind?
Published 2020-03-01“…This fusion of advances in complex technologies, including but not limited to robotics, quantum computing, blockchain, artificial intelligence (AI) and the internet of things (IoT), would affect all disciplines and industries of the modern world. …”
Get full text
Article -
466
The Fourth Industrial Revolution: Another Industrial Revolution Leaving Black Women Behind?
Published 2020-03-01“…This fusion of advances in complex technologies, including but not limited to robotics, quantum computing, blockchain, artificial intelligence (AI) and the internet of things (IoT), would affect all disciplines and industries of the modern world. …”
Get full text
Article -
467
Lattice-based verifiable timed signature and application
Published 2024-10-01“…Aiming at the problem that current verifiable timed signature (VTS) schemes cannot effectively resist the threat of quantum computing attacks, a lattice-based verifiable timed signature (LVTS) scheme was proposed, founded on challenging problems over lattices. …”
Get full text
Article -
468
Political Organising and Mobilising in the Age of the Fourth Industrial Revolution: A Reflection on the Gauteng Young Communist League of South Africa
Published 2020-03-01“…As “a way of describing the blurring of boundaries between the physical, digital, and biological worlds...a fusion of advances in artificial intelligence, robotics, the Internet of Things, 3D printing, genetic engineering, quantum computing, and other technologies…” (McGinnis, 2018), the 4IR is primarily concerned with the inchoate transformation of the production of goods and services, resulting from the application of a new wave of technological innovations. …”
Get full text
Article -
469
Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security
Published 2019-06-01“…The teaching method was explored incorporating ideological elements for the advanced technology of cyberspace security.The teaching content of this course is constituted of six aspects,i.e.,quantum communication,public key infrastructure,physical layer security,blockchain,trusted computing and privacy protection.Apart from teaching the related technologies,the remarkable achievements and efforts of Chinese scientists were shown and the future work was indicated.Students are grouped to do literature research,expand their knowledge,exchange the learning experience and explore the law of scientific research in these new aspects.Students can not only absorb the knowledge of cutting-edge technology,but also learn the method and spirit to address scientific problems.A useful reference for education and teaching method of course ideological for graduate students was provided.…”
Get full text
Article -
470
Triplet-ground-state nonalternant nanographene with high stability and long spin lifetimes
Published 2025-01-01“…Moreover, considering the spin relaxation of compound 1, with a spin–lattice relaxation time (T 1) of 53.55 ms and a coherence time (T m) of 3.41 μs at 10 K, the compound 1 shows great promise for applications in spin-based information retention and quantum computing.…”
Get full text
Article -
471
Remote epitaxy and exfoliation of vanadium dioxide via sub-nanometer thick amorphous interlayer
Published 2025-01-01Get full text
Article -
472
Observation of minimal and maximal speed limits for few and many-body states
Published 2025-02-01Get full text
Article -
473
Code-based generalized signcryption scheme with multi-receiver
Published 2020-01-01“…In order to solve the problem of secure transmission of messages with multiple receivers,a code-based generalized signcryption scheme with multi-receiver was designed.Firstly,a multi-encrypted McEliece scheme that can meet the security of IND-CCA2 was designed.Combined with the CFS signature scheme,the multi-receiver signcryption and generalized signcryption scheme based on code were designed.The security analysis shows that the multi-receiver generalized signcryption scheme can meet the security of IND-CCA2 in terms of confidentiality and can meet EUF-CMA security in terms of unforgeability.Compared with other similar multi-receiver signcryption schemes,the proposed scheme does not include exponential,bilinear pairing operations,etc.,and has high computational efficiency and the advantage of anti-quantum computing.Compared with the method of signing-then-encrypting method,the proposed scheme has the smaller private key and higher efficiency.…”
Get full text
Article -
474
Anomalies of QFTs from M-theory and holography
Published 2020-01-01“…Abstract We describe a systematic way of computing the ’t Hooft anomalies for continuous symmetries of Quantum Field Theories in even dimensions that can be geometrically engineered from M5-branes. …”
Get full text
Article -
475
STUDY OF COMPATIBILITY OF METHODS AND TECHNOLOGIES OF HIGH-LEVEL PROTOCOLS AND ERROR-CORRECTING CODES
Published 2024-12-01“…Emerging technologies like quantum computing and artificial intelligence introduce both opportunities and threats, necessitating continuous innovation in these fields. …”
Get full text
Article -
476
Armenia Towards a "New Economy": Defense Industry
Published 2021-04-01“…In fact, a new arms race could start in the world as a side effect of the so-called “4th Industrial Revolution” – the main innovative trend of which is the widespread use of technologies such as artificial intelligence, machine learning, quantum computing, additive manufacturing, robotics, Internet of things, cloud technologies etc., and the countries involved in military conflicts cannot neglect this circumstance. …”
Get full text
Article -
477
Dissipative Protection of a GKP Qubit in a High-Impedance Superconducting Circuit Driven by a Microwave Frequency Comb
Published 2025-01-01“…Qubit initialization, readout, and control via Clifford gates can be performed while maintaining the code stabilization, paving the way toward the assembly of GKP qubits in a fault-tolerant quantum computing architecture.…”
Get full text
Article -
478
Passive and active suppression of transduced noise in silicon spin qubits
Published 2025-01-01“…Abstract Addressing and mitigating decoherence sources plays an essential role in the development of a scalable quantum computing system, which requires low gate errors to be consistently maintained throughout the circuit execution. …”
Get full text
Article -
479
Compact source for quadripartite deterministically entangled optical fields
Published 2025-01-01Get full text
Article -
480
The Cigar-Shaped Background Metric with Supersymmetry Approaches and Thermal Properties of System
Published 2024-07-01“…Also, this first order equations lead us to use super symmetry(SUSY) approach and obtain the energy spectrum. SUSY quantum mechanics can be used to solve ordinary differential equation. …”
Get full text
Article