-
181
Optimal cooperative strategy based on quantum bat for cognitive radio of energy harvesting
Published 2018-09-01“…In order to reduce energy consumption and improve spectral efficiency of the cognitive relay wireless communication system in 5G network,an optimal cooperative transmission strategy of information and energy was designed for cognitive relay radio with wireless energy harvesting.For the proposed optimal cooperative strategy,the maximal throughput formula and outage probability of secondary user were deduced.In order to resolve the derived maximum throughput equation,a quantum bat algorithm which was based on the optimization mechanism of quantum computing and bat algorithm was designed to solve the deduced equation,and the optimal cooperative transmission scheme for information and energy could be obtained.Simulation results show that the proposed optimal cooperative strategy not only can meet the information transfer demand of primary user,but also can realize the energy self-supply of the secondary user system and improve the communication quality of the secondary user.The proposed optimal cooperative strategy has a better performance than the cooperative strategy of existing cognitive relay radio for different simulation scenarios.…”
Get full text
Article -
182
Quantum machine learning for Lyapunov-stabilized computation offloading in next-generation MEC networks
Published 2025-01-01“…Abstract Quantum computing and machine learning convergence enable powerful new approaches for optimizing mobile edge computing (MEC) networks. …”
Get full text
Article -
183
Construction of quantum BCH code based on cyclotomic coset
Published 2021-10-01“…Quantum-error-correcting code can overcome quantum decoherence efficiently, which is the key technology to realize quantum computers.A series of quantum BCH code was proposed based on classical codes.First, a general way of well-chosen cyclotomic coset was introduced.A sufficient condition was given to calculate the number of elements in cyclotomic coset.Then, a series of quantum BCH (Bose-Chaudhuri-Hocquenghem) code over finite field F<sub>q</sub> was constructed by CSS (Calderbank-Shor-Steane) construction and Steane construction.The results were extended to finite field F<sub>q</sub><sup>2</sup> with Hermitian construction.Compared with the results in literature,the range of introduced cyclotomic coset is more wide, and the new quantum BCH code has higher dimensions and better lower bounds on minimum distances.Furthermore, a family of quantum maximum distance separable (quantum MDS) code over any finite fields is constructed.…”
Get full text
Article -
184
Dissipative Protection of a GKP Qubit in a High-Impedance Superconducting Circuit Driven by a Microwave Frequency Comb
Published 2025-01-01“…Qubit initialization, readout, and control via Clifford gates can be performed while maintaining the code stabilization, paving the way toward the assembly of GKP qubits in a fault-tolerant quantum computing architecture.…”
Get full text
Article -
185
Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems
Published 2022-04-01“…With the development of quantum computer technology, quantum attacks-resistant cryptographic schemes are gradually entering people’s horizons. …”
Get full text
Article -
186
Remote epitaxy and exfoliation of vanadium dioxide via sub-nanometer thick amorphous interlayer
Published 2025-01-01Get full text
Article -
187
Novel Design for Quantum Dots Cellular Automata to Obtain Fault-Tolerant Majority Gate
Published 2012-01-01Get full text
Article -
188
Quantum annealing-assisted lattice optimization
Published 2025-01-01“…Our algorithm highlights the potential of quantum computing in materials design and discovery, laying a foundation for further exploring and optimizing structure-property relationships.…”
Get full text
Article -
189
Preparing Schrödinger Cat States in a Microwave Cavity Using a Neural Network
Published 2025-01-01“…Scaling up quantum computing devices requires solving ever more complex quantum control tasks. …”
Get full text
Article -
190
RSFQ All-Digital Programmable Multitone Generator for Quantum Applications
Published 2025-01-01“…Rapid single flux quantum (RSFQ) technology is at the forefront of replacing current standard CMOS-based control architectures for a number of applications, including quantum computing and quantum sensor arrays. By condensing the control and readout to single-flux-quantum-based on-chip devices that are directly connected to the quantum systems, it is possible to minimize the total system overhead, improving scalability and integration. …”
Get full text
Article -
191
Quantum Algorithms for the Physical Layer: Potential Applications to Physical Layer Security
Published 2025-01-01“…Meanwhile, as an alternative to cryptographic methods, physical layer security (PLS) has been extensively studied as a means to realize secure wireless communication that is resistant to attacks by both classical and quantum computers, i.e., quantum-safe. While the prevailing approach to PLS has been based on classical algorithms, this could potentially be accelerated by the application of quantum algorithms. …”
Get full text
Article -
192
East and West: global technological confrontation
Published 2023-10-01“…In recent years the technological rivalry between China and the USA has become increasingly intense as both countries compete for dominance in the following promising technological areas: in the creation of artificial intelligence systems, in the production of equipment for 5G generation communication networks, in quantum computing, in the design and manufacture of electric vehicles and in biotechnology research. …”
Get full text
Article -
193
Decoding general error correcting codes and the role of complementarity
Published 2025-01-01Get full text
Article -
194
Bidirectional authentication key agreement protocol supporting identity’s privacy preservation based on RLWE
Published 2019-11-01“…In order to solve the problem of identity privacy preservation between two participants involved when implementing authenticated key agreement protocol,a bidirectional authenticated key agreement protocol against quantum attack based on C commitment scheme was proposed.Through the design of C commitment function,the real identity information of two participants involved was hidden.Based on RLWE difficult problem,under the premise to ensure identity anonymity,this protocol not only completed two-way identity authentication,but also ensured the integrity of the transmitted message,furthermore,the shared session key was negotiated.After been analyzed,in terms of protocol’s execution efficiency,only two rounds of message transmission were needed to complete anonymous two-way authentication and key agreement in the proposed scheme.Compared with Ding’s protocol,the length of public key was reduced by nearly 50%.With regard to security,the protocol could resist forgery,replay,key-copy,and man-in-the-middle attacks.It is proved that the proposed protocol satisfies the provable security under the eCK model.At the same time,the protocol is based on the RLWE problem of lattices,and can resist quantum computing attacks.…”
Get full text
Article -
195
Reliable Quantum Communications Based on Asymmetry in Distillation and Coding
Published 2024-01-01“…The reliable provision of entangled qubits is an essential precondition in a variety of schemes for distributed quantum computing. This is challenged by multiple nuisances, such as errors during the transmission over quantum links, but also due to degradation of the entanglement over time due to decoherence. …”
Get full text
Article -
196
Dynamical suppression of many-body non-Hermitian skin effect in anyonic systems
Published 2025-01-01“…Our results open up a new avenue on exploring novel non-Hermitian phenomena arisen from the interplay between NHSE and anyonic statistics, and can potentially be demonstrated in ultracold atomic quantum simulators and quantum computers.…”
Get full text
Article -
197
Enhancing Scalability of Quantum Eigenvalue Transformation of Unitary Matrices for Ground State Preparation through Adaptive Finer Filtering
Published 2025-02-01“…Hamiltonian simulation is a domain where quantum computers have the potential to outperform their classical counterparts. …”
Get full text
Article -
198
Quantum Conformal Prediction for Reliable Uncertainty Quantification in Quantum Machine Learning
Published 2024-01-01“…Quantum machine learning is a promising programming paradigm for the optimization of quantum algorithms in the current era of noisy intermediate-scale quantum computers. A fundamental challenge in quantum machine learning is generalization, as the designer targets performance under testing conditions while having access only to limited training data. …”
Get full text
Article -
199
The Organizational Structure and Operational Logic of an Urban Smart Governance Information Platform: Discussion on the Background of Urban Governance Transformation in China
Published 2020-01-01“…Urban smart governance supported by mobile Internet, the Internet of Things, quantum computing, big data, artificial intelligence, and other information technologies has also entered the field of vision of academics and administrators. …”
Get full text
Article -
200
Orientation-selective spin-polarized edge states in monolayer NiI2
Published 2024-12-01“…Abstract Spin-polarized edge states in two-dimensional materials hold promise for spintronics and quantum computing applications. Constructing stable edge states by tailoring two-dimensional semiconductor materials with bulk-boundary correspondence is a feasible approach. …”
Get full text
Article