دانلود و نمایش مقالات مرتبط با Index::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Index

تعداد مقالات یافته شده: 1051
ردیف عنوان نوع
1 Decentralization Using Quantum Blockchain: A Theoretical Analysis
تمرکززدایی با استفاده از بلاک چین کوانتومی: یک تحلیل نظری-2022
Blockchain technology has been prominent recently due to its applications in cryptocurrency. Numerous decentralized blockchain applications have been possible due to blockchains’ nature of distributed, secured, and peer-to-peer storage. One of its technical pillars is using public-key cryptography and hash functions, which promise a secure, pseudoanonymous, and distributed storage with nonrepudiation. This security is believed to be difficult to break with classical computational powers. However, recent advances in quantum computing have raised the possibility of breaking these algorithms with quantum computers, thus, threatening the blockchains’ security. Quantum-resistant blockchains are being proposed as alternatives to resolve this issue. Some propose to replace traditional cryptography with postquantum cryptography—others base their approaches on quantum computer networks or quantum internets. Nonetheless, a new security infrastructure (e.g., access control/authentication) must be established before any of these could happen. This article provides a theoretical analysis of the quantum blockchain technologies that could be used for decentralized identity authentication. We put together a conceptual design for a quantum blockchain identity framework and give a review of the technical evidence. We investigate its essential components and feasibility, effectiveness, and limitations. Even though it currently has various limitations and challenges, we believe a decentralized perspective of quantum applications is noteworthy and likely.
INDEX TERMS: Blockchains | consensus protocol | decentralized applications | identity management systems | quantum computing | quantum networks.
مقاله انگلیسی
2 Deep Reinforcement Learning With Quantum-Inspired Experience Replay
یادگیری تقویتی عمیق با تکرار تجربه کوانتومی-2022
In this article, a novel training paradigm inspired by quantum computation is proposed for deep reinforcement learning (DRL) with experience replay. In contrast to the traditional experience replay mechanism in DRL, the proposed DRL with quantum-inspired experience replay (DRL-QER) adaptively chooses experiences from the replay buffer according to the complexity and the replayed times of each experience (also called transition), to achieve a balance between exploration and exploitation. In DRL-QER, transitions are first formulated in quantum representations and then the preparation operation and depreciation operation are performed on the transitions. In this process, the preparation operation reflects the relationship between the temporal-difference errors (TD-errors) and the importance of the experiences, while the depreciation operation is taken into account to ensure the diversity of the transitions. The experimental results on Atari 2600 games show that DRL-QER outperforms state-of-the-art algorithms, such as DRL-PER and DCRL on most of these games with improved training efficiency and is also applicable to such memory-based DRL approaches as double network and dueling network.
Index Terms: Deep reinforcement learning (DRL) | quantum computation | quantum-inspired experience replay (QER) | quantum reinforcement learning.
مقاله انگلیسی
3 Deployment-Ready Quantum Key Distribution Over a Classical Network Infrastructure in Padua
توزیع کلید کوانتومی آماده استقرار بر روی یک زیرساخت شبکه کلاسیک در پادوآ-2022
Current technological progress is driving Quantum Key Distribution towards a commercial and worldwide scale expansion. Its capability to deliver secure communication regardless of the computational power of the attackers will be a fundamental feature in the next generations of telecommunication networks. Nevertheless, demonstrations of QKD implementation in a real operating scenario and their coexistence with the classical telecom infrastructure are of fundamental importance for reliable exploitation. Here we present a Quantum Key Distribution application implemented over a classical fiber-based infrastructure. We exploit a 50 MHz source at 1550 nm, a single 13 km-long fiber cable for both the quantum and the classical channel, and a simplified receiver scheme with just one single-photon detector. In this way, we achieve an error rate of approximately 2% and a secret key rate of about 1.7 kbps, thus demonstrating the feasibility of low-cost and ready-to-use Quantum Key Distribution systems compatible with standard classical infrastructure.
Index Terms: Classical channel | cryptography | fiber, FPGA | padua | POGNAC | quantum communication | quantum key distribution | qubit4sync | telecommunication.
مقاله انگلیسی
4 Design of an Integrated Bell-State Analyzer on a Thin-Film Lithium Niobate Platform
طراحی یک آنالایزر حالت زنگ یکپارچه بر روی بستر نازک لیتیوم نیوبات-2022
Trapped ions are excellent candidates for quantum computing and quantum networks because of their long coherence times, ability to generate entangled photons as well as high fidelity single- and two-qubit gates. To scale up trapped ion quantum computing, we need a Bell-state analyzer on a reconfigurable platform that can herald high fidelity entanglement between ions. In this work, we design a photonic Bell-state analyzer on a reconfigurable thin-film lithium niobate platform for polarization-encoded qubits.We optimize the device to achieve high fidelity entanglement between two trapped ions and find >99% fidelity. Apart from that, the directional coupler used in our design can achieve any polarization-independent power splitting ratio which can have a rich variety of applications in the integrated photonic technology. The proposed device can scale up trapped ion quantum computing as well as other optically active spin qubits, such as color centers in diamond, quantum dots, and rare-earth ions.
Index Terms: Bell-state analyzer | thin-film lithium niobate | scalable quantum computing | trapped ions | entanglement | polarization qubits | polarization-independent directional coupler.
مقاله انگلیسی
5 Development of an Undergraduate Quantum Engineering Degree
توسعه یک مدرک کارشناسی مهندسی کوانتوم-2022
Quantum computing, communications, sensing, and simulations are radically transformative technologies, with great potential to impact industries and economies. Worldwide, national governments, industries, and universities are moving to create a new class of workforce—the Quantum Engineers. Demand for such engineers is predicted to be in the tens of thousands within a five-year timescale, far exceeding the rate at which the world’s universities can produce Ph.D. graduates in the discipline. How best to train this next generation of engineers is currently a matter of debate. Quantum mechanics—long a pillar of traditional physics undergraduate degrees—must now be merged with traditional engineering offerings. This article discusses the history, development, and the first year of operation of the world’s first undergraduate degree in quantum engineering to be grown out of an engineering curriculum. The main purpose of this article is to inform the wider discussion, now being held by many institutions worldwide, on how best to formally educate the Quantum Engineer.
INDEX TERMS: Degree | education | engineering | quantum | undergraduate.
مقاله انگلیسی
6 Direct Quantum Communications in the Presence of Realistic Noisy Entanglement
ارتباطات کوانتومی مستقیم در حضور درهم تنیدگی پر سر و صدا واقعی-2022
To realize the Quantum Internet, quantum communications require pre-shared entanglement among quantum nodes. However, both the generation and the distribution of the maximally-entangled quantum states are inherently contaminated by quantum decoherence. Conventionally, the quantum decoherence is mitigated by performing the consecutive steps of quantum entanglement distillation followed by quantum teleportation. However, this conventional approach imposes a long delay. To circumvent this impediment, we propose a novel quantum communication scheme relying on realistic noisy pre-shared entanglement, which eliminates the sequential steps imposing delay in the standard approach. More precisely, our proposed scheme can be viewed as a direct quantum communication scheme capable of improving the quantum bit error ratio (QBER) of the logical qubits despite relying on realistic noisy pre-shared entanglement. Our performance analysis shows that the proposed scheme offers competitive QBER, yield, and goodput compared to the existing state-of-the-art quantum communication schemes, despite requiring fewer quantum gates.
Index Terms: Quantum communication | quantum entanglement | quantum error-correction | quantum stabilizer codes | Quantum Internet.
مقاله انگلیسی
7 Discriminating Quantum States in the Presence of a Deutschian CTC: A Simulation Analysis
حالت های کوانتومی متمایز در حضور CTC Deutschian: یک تحلیل شبیه سازی-2022
In an article published in 2009, Brun et al. proved that in the presence of a “Deutschian” closed timelike curve, one can map K distinct nonorthogonal states (hereafter, input set) to the standard orthonormal basis of a K-dimensional state space. To implement this result, the authors proposed a quantum circuit that includes, among SWAP gates, a fixed set of controlled operators (boxes) and an algorithm for determining the unitary transformations carried out by such boxes. To our knowledge, what is still missing to complete the picture is an analysis evaluating the performance of the aforementioned circuit from an engineering perspective. The objective of this article is, therefore, to address this gap through an in-depth simulation analysis, which exploits the approach proposed by Brun et al. in 2017. This approach relies on multiple copies of an input state, multiple iterations of the circuit until a fixed point is (almost) reached. The performance analysis led us to a number of findings. First, the number of iterations is significantly high even if the number of states to be discriminated against is small, such as 2 or 3. Second, we envision that such a number may be shortened as there is plenty of room to improve the unitary transformation acting in the aforementioned controlled boxes. Third, we also revealed a relationship between the number of iterations required to get close to the fixed point and the Chernoff limit of the input set used: the higher the Chernoff bound, the smaller the number of iterations. A comparison, although partial, with another quantum circuit discriminating the nonorthogonal states, proposed by Nareddula et al. in 2018, is carried out and differences are highlighted.
INDEX TERMS: Benchmarking and performance characterization | classical simulation of quantum systems.
مقاله انگلیسی
8 DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage
DOPIV: برون سپاری داده مبتنی بر هویت امن پس از کوانتومی با تأیید صحت عمومی در فضای ذخیره سازی ابری-2022
Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A majority of existing public verification schemes are based on conventional hardness assumptions, which are vulnerable to adversaries equipped with quantum computers in the near future. Moreover, new security issues need to be solved when an original data owner is restricted or cannot access the remote cloud server flexibly. In this paper, we propose an efficient identity-based data outsourcing with public integrity verification scheme (DOPIV) in cloud storage. DOPIV is designed on lattice-based cryptography, which achieves post-quantum security. DOPIV enables an original data owner to delegate a proxy to generate the signatures of data and outsource them to the cloud server. Any TPA can perform data integrity verification efficiently on behalf of the original data owner, without retrieving the entire data set. Additionally, DOPIV possesses the advantages of being identity-based systems, avoiding complex certificate management procedures. We provide security proofs of DOPIV in the random oracle model, and conduct a comprehensive performance evaluation to show that DOPIV is more practical in post-quantum secure cloud storage systems.
Index Terms: Cloud storage | public verification | lattice-based cryptography | identity-based data outsourcing | post-quantum security
مقاله انگلیسی
9 DQRA: Deep Quantum Routing Agent for Entanglement Routing in Quantum Networks
DQRA: عامل مسیریابی کوانتومی عمیق برای مسیریابی درهم تنیده در شبکه های کوانتومی-2022
Quantum routing plays a key role in the development of the next-generation network system. In particular, an entangled routing path can be constructed with the help of quantum entanglement and swapping among particles (e.g., photons) associated with nodes in the network. From another side of computing, machine learning has achieved numerous breakthrough successes in various application domains, including networking. Despite its advantages and capabilities, machine learning is not as much utilized in quantum networking as in other areas. To bridge this gap, in this article, we propose a novel quantum routing model for quantum networks that employs machine learning architectures to construct the routing path for the maximum number of demands (source–destination pairs) within a time window. Specifically, we present a deep reinforcement routing scheme that is called Deep Quantum Routing Agent (DQRA). In short, DQRA utilizes an empirically designed deep neural network that observes the current network states to accommodate the network’s demands, which are then connected by a qubit-preserved shortest path algorithm. The training process of DQRA is guided by a reward function that aims toward maximizing the number of accommodated requests in each routing window. Our experiment study shows that, on average, DQRA is able to maintain a rate of successfully routed requests at above 80% in a qubit-limited grid network and approximately 60% in extreme conditions, i.e., each node can be repeater exactly once in a window. Furthermore, we show that the model complexity and the computational time of DQRA are polynomial in terms of the sizes of the quantum networks.
INDEX TERMS: Deep learning | deep reinforcement learning (DRL) | machine learning | next-generation network | quantum network routing | quantum networks.
مقاله انگلیسی
10 Dual-Frequency Quantum Phase Estimation Mitigates the Spectral Leakage of Quantum Algorithms
تخمین فاز کوانتومی دو فرکانس برای کاهش نشت طیفی الگوریتم‌های کوانتومی-2022
Quantum phase estimation is an important component in diverse quantum algorithms. However, it suffers from spectral leakage, when the reciprocal of the record length is not an integer multiple of the unknown phase, which incurs an accuracy degradation. For the existing single-sample estimation scheme, window-based methods have been proposed for spectral leakage mitigation. As a further advance, we propose a dual-frequency estimator, which asymptotically approaches the Cramér-Rao bound, when multiple samples are available. Numerical results show that the proposed estimator outperforms the existing window-based methods, when the number of samples is sufficiently high.
Index Terms: Algorithmic error mitigation | dual-frequency estimator | quantum algorithms | quantum phase estimation.
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 1298 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 1298 :::::::: افراد آنلاین: 43