Showing 481 - 500 results of 649 for search '"Quantum computing', query time: 0.10s Refine Results
  1. 481

    Exact Solutions of the Generalized ZK and Gardner Equations by Extended Generalized G′/G-Expansion Method by Sanjaya K. Mohanty, Apul N. Dev, Soubhagya Kumar Sahoo, Homan Emadifar, Geeta Arora

    Published 2023-01-01
    “…The generalized ZK equation and the Gardner equation govern the behavior of nonlinear wave phenomena in the presence of magnetic field in plasma dynamics, turbulence, bottom topography, and quantum field theory. We construct innovative solutions to the models under consideration using various computing tools and a recently developed extended generalized G′/G expansion technique. …”
    Get full text
    Article
  2. 482

    East and West: global technological confrontation by S. S. Belikova, A. V. Belikov

    Published 2023-10-01
    “…In recent years the technological rivalry between China and the USA has become increasingly intense as both countries compete for dominance in the following promising technological areas: in the creation of artificial intelligence systems, in the production of equipment for 5G generation communication networks, in quantum computing, in the design and manufacture of electric vehicles and in biotechnology research. …”
    Get full text
    Article
  3. 483

    Entanglement negativity and replica symmetry breaking in general holographic states by Xi Dong, Jonah Kudler-Flam, Pratik Rath

    Published 2025-01-01
    “…Abstract The entanglement negativity E $$ \mathcal{E} $$ (A : B) is a useful measure of quantum entanglement in bipartite mixed states. In random tensor networks (RTNs), which are related to fixed-area states, it was found in ref. [1] that the dominant saddles computing the even Rényi negativity E 2 k $$ {\mathcal{E}}^{(2k)} $$ generically break the ℤ 2k replica symmetry. …”
    Get full text
    Article
  4. 484

    Noise-augmented chaotic Ising machines for combinatorial optimization and sampling by Kyle Lee, Shuvro Chowdhury, Kerem Y. Camsari

    Published 2025-01-01
    “…We show that c-bits follow the quantum Boltzmann law in a 1D transverse field Ising model. …”
    Get full text
    Article
  5. 485

    The Organizational Structure and Operational Logic of an Urban Smart Governance Information Platform: Discussion on the Background of Urban Governance Transformation in China by Junfang Kang, Xianjun Wang

    Published 2020-01-01
    “…Urban smart governance supported by mobile Internet, the Internet of Things, quantum computing, big data, artificial intelligence, and other information technologies has also entered the field of vision of academics and administrators. …”
    Get full text
    Article
  6. 486

    Monte Carlo Simulations in Nanomedicine: Advancing Cancer Imaging and Therapy by James C. L. Chow

    Published 2025-01-01
    “…However, emerging technologies, including hybrid modeling approaches, high-performance computing, and quantum simulation, are poised to overcome these limitations. …”
    Get full text
    Article
  7. 487

    Extracting equations of motion from superconducting circuits by Christian Z. Pratt, Kyle J. Ray, James P. Crutchfield

    Published 2025-01-01
    “…One such paradigm employs superconducting quantum interference devices (SQUIDs) to execute classical computations. …”
    Get full text
    Article
  8. 488

    Factorization of the Hilbert space of eternal black holes in general relativity by Vijay Balasubramanian, Ben Craps, Juan Hernandez, Mikhail Khramtsov, Maria Knysh

    Published 2025-01-01
    “…Abstract We generalize recent results in two-dimensional Jackiw-Teitelboim gravity to study factorization of the Hilbert space of eternal black holes in quantum gravity with a negative cosmological constant in any dimension. …”
    Get full text
    Article
  9. 489
  10. 490

    Non-Orthogonality of QAM and Sunflower-like Modulated Coherent-State Signals by Kentaro Kato

    Published 2025-01-01
    “…The limitations of cloning and discriminating quantum states are related to the non-orthogonality of the states. …”
    Get full text
    Article
  11. 491
  12. 492
  13. 493

    L’enseignement de la mécanique quantique grâce à un récit de fiction by Fabrice Ferlin, Philippe Lautesse, Juliette Tuaillon, Jean-Loup Héraud, Lionel Chaussard

    Published 2021-12-01
    “…Moreover, some universities also offer an introduction to quantum mechanics in the second year, including both conceptual and computational teaching. …”
    Get full text
    Article
  14. 494

    Dynamical suppression of many-body non-Hermitian skin effect in anyonic systems by Yi Qin, Ching Hua Lee, Linhu Li

    Published 2025-01-01
    “…Our results open up a new avenue on exploring novel non-Hermitian phenomena arisen from the interplay between NHSE and anyonic statistics, and can potentially be demonstrated in ultracold atomic quantum simulators and quantum computers.…”
    Get full text
    Article
  15. 495
  16. 496

    Photorefractive and pyroelectric photonic memory and long-term stability in thin-film lithium niobate microresonators by Xinyi Ren, Chun-Ho Lee, Kaiwen Xue, Shaoyuan Ou, Yue Yu, Zaijun Chen, Mengjie Yu

    Published 2025-01-01
    “…Abstract The stability of integrated photonic circuits is crucial for applications requiring high frequency precision or robust operation over time, such as optomechanical sensing, frequency conversion, optical communication, and quantum optics. Photonic memory is useful for low-energy optical computing and interconnects. …”
    Get full text
    Article
  17. 497

    Proxy re-signature scheme based on isomorphisms of polynomial by Hui-xian LI, Lu SHAO, Liao-jun PANG

    Published 2017-02-01
    “…Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature scheme was proposed.By employing secret affine transformations and homogeneous polynomials,the proposed scheme could implement the signature transformation with high-efficiency,and meanwhile it was secure against the attack by a quantum computer.The results of analysis showed that the proposed scheme was correct and consistent,and had the unforgeability in the random oracle model.Compared with the existing schemes,the proposed scheme not only inherits the resistance to quantum attack and high efficiency from the multivariate public key cryptosystems,but also has the properties of multi-use,transparent and private proxy.…”
    Get full text
    Article
  18. 498

    Physical implementability for reversible magic state manipulation by Yu-Ao Chen, Gilad Gour, Xin Wang, Lei Zhang, Chenghong Zhu

    Published 2025-01-01
    “…Abstract Magic states are essential for achieving universal quantum computation, yet the reversibility and efficiency of exact magic state manipulations remain less explored. …”
    Get full text
    Article
  19. 499
  20. 500

    Projected entangled pair states with flexible geometry by Siddhartha Patra, Sukhbinder Singh, Román Orús

    Published 2025-01-01
    “…In recent years, PEPS have advanced understanding of strongly correlated systems, especially in two dimensions, e.g., quantum spin liquids. Typically described by tensor networks on regular lattices (e.g., square, cubic), PEPS have also been adapted for irregular graphs; however, the computational cost becomes prohibitive for dense graphs with large vertex degrees. …”
    Get full text
    Article