-
501
-
502
Replica wormholes and entanglement islands in the Karch-Randall braneworld
Published 2025-01-01“…Moreover, such a black hole is coupled to a nongravitational bath which is absorbing its Hawking radiation. This allows us to compute the entropy of the Hawking radiation by studying the bath using the quantum extremal surface prescription. …”
Get full text
Article -
503
Background-induced forces from dark relics
Published 2025-01-01“…Abstract Light particles quadratically coupled to nucleons induce macroscopic forces in matter. While a quantum effect always exists, an additional force occurs in the presence of a finite density of the light particles. …”
Get full text
Article -
504
Simulation of Equatorial von Neumann Measurements on GHZ States Using Nonlocal Resources
Published 2010-01-01“…Reproducing with elementary resources the correlations that arise when a quantum system is measured (quantum state simulation) allows one to get insight on the operational and computational power of quantum correlations. …”
Get full text
Article -
505
Evolutionary Hyperheuristics for Location-Routing Problem with Simultaneous Pickup and Delivery
Published 2020-01-01“…The proposed approaches manage a pool of low-level heuristics (LLH), implementing a set of simple, cheap, and knowledge-poor operators such as “shift” and “swap” to guide the search. Quantum (QS), ant (AS), and particle-inspired (PS) high-level learning strategies (HLH) are developed as evolutionary selection strategies (ESs) to improve the performance of the hyperheuristic framework. …”
Get full text
Article -
506
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01“…With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.…”
Get full text
Article -
507
Ultra robust negative differential resistance memristor for hardware neuron circuit implementation
Published 2025-01-01“…However, the reliability of memristors has always been a major obstacle in neuromorphic computing. Here, we propose an ultra-robust and efficient neuron of negative differential resistance (NDR) memristor based on AlAs/In0.8Ga0.2As/AlAs quantum well (QW) structure, which has super stable performance such as low variation (0.264%), high temperature resistance (400 °C) and high endurance. …”
Get full text
Article -
508
Homomorphic Signature With Designated Evaluator
Published 2025-01-01“…This represents the first post-quantum realization of such a scheme.…”
Get full text
Article -
509
-
510
Fast single atom imaging for optical lattice arrays
Published 2025-01-01“…Abstract High-resolution fluorescence imaging of ultracold atoms and molecules is paramount to performing quantum simulation and computation in optical lattices and tweezers. …”
Get full text
Article -
511
Ostrowski Type Inequalities for s-Convex Functions via q-Integrals
Published 2022-01-01Get full text
Article -
512
The potential of Mitragyna speciosa leaves as a natural source of antioxidants for disease prevention
Published 2024-09-01Get full text
Article -
513
Production and decay of anticharmed pentaquark state with quark content $$\bar{c}sudd$$ c ¯ s u d d
Published 2025-01-01Get full text
Article -
514
Absence of gapless Majorana edge modes in few-leg bosonic flux ladders
Published 2025-01-01“…The search for Majorana excitations has seen tremendous efforts in recent years, ultimately aiming for their individual controllability in future topological quantum computers. A promising framework to realize such exotic Majorana fermions are topologically ordered non-Abelian phases of matter, such as certain fractional quantum Hall states. …”
Get full text
Article -
515
Rényi relative entropy based monogamy of entanglement in tripartite systems
Published 2025-01-01Get full text
Article -
516
Flat-band based high-temperature ferromagnetic semiconducting state in the graphitic C4N3 monolayer
Published 2025-01-01Get full text
Article -
517
Finite size analysis for interacting bosons at the one-two dimensional crossover
Published 2025-01-01“…In this work, we extend the analysis of interacting bosons at 2D-1D dimensional crossover for finite size and temperature by using the field theory approach (bosonization) and quantum Monte Carlo simulations. Stemming from the fact that finite size low-dimensional systems are allowed only to have quasiordered phase, we consider the self-consistent harmonic approximation to compute the fraction of quasicondensate and its scaling with the system size. …”
Get full text
Article -
518
Efficient digital quadratic unconstrained binary optimization solvers for SAT problems
Published 2025-01-01Get full text
Article -
519
Thermal correlators and currents of the W 3 $$ {\mathcal{W}}_3 $$ algebra
Published 2025-01-01“…In addition we independently obtain the excited state eigenvalues of the quantum Boussinesq charges within the higher spin module via the ODE/IM correspondence. …”
Get full text
Article -
520
Bethe Ansatz inside Calogero-Sutherland models
Published 2025-01-01“…We study the trigonometric quantum spin-Calogero–Sutherland model, and the Haldane–Shastry spin chain as a special case, using a Bethe-Ansatz analysis. …”
Get full text
Article