期刊文献+
共找到270篇文章
< 1 2 14 >
每页显示 20 50 100
Tackling the Existential Threats from Quantum Computers and AI
1
作者 Fazal Raheman 《Intelligent Information Management》 2024年第3期121-146,共26页
Although AI and quantum computing (QC) are fast emerging as key enablers of the future Internet, experts believe they pose an existential threat to humanity. Responding to the frenzied release of ChatGPT/GPT-4, thousa... Although AI and quantum computing (QC) are fast emerging as key enablers of the future Internet, experts believe they pose an existential threat to humanity. Responding to the frenzied release of ChatGPT/GPT-4, thousands of alarmed tech leaders recently signed an open letter to pause AI research to prepare for the catastrophic threats to humanity from uncontrolled AGI (Artificial General Intelligence). Perceived as an “epistemological nightmare”, AGI is believed to be on the anvil with GPT-5. Two computing rules appear responsible for these risks. 1) Mandatory third-party permissions that allow computers to run applications at the expense of introducing vulnerabilities. 2) The Halting Problem of Turing-complete AI programming languages potentially renders AGI unstoppable. The double whammy of these inherent weaknesses remains invincible under the legacy systems. A recent cybersecurity breakthrough shows that banning all permissions reduces the computer attack surface to zero, delivering a new zero vulnerability computing (ZVC) paradigm. Deploying ZVC and blockchain, this paper formulates and supports a hypothesis: “Safe, secure, ethical, controllable AGI/QC is possible by conquering the two unassailable rules of computability.” Pursued by a European consortium, testing/proving the proposed hypothesis will have a groundbreaking impact on the future digital infrastructure when AGI/QC starts powering the 75 billion internet devices by 2025. 展开更多
关键词 Ethical AI quantum computers Existential Threat computer Vulnerabilities Halting Problem AGI
下载PDF
Delayed-measurement one-way quantum computing on cloud quantum computer
2
作者 Zhi-Peng Yang Yu-Ran Zhang +1 位作者 Fu-Li Li Heng Fan 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第9期125-131,共7页
One-way quantum computation focuses on initially generating an entangled cluster state followed by a sequence of measurements with classical communication of their individual outcomes.Recently,a delayed-measurement ap... One-way quantum computation focuses on initially generating an entangled cluster state followed by a sequence of measurements with classical communication of their individual outcomes.Recently,a delayed-measurement approach has been applied to replace classical communication of individual measurement outcomes.In this work,by considering the delayed-measurement approach,we demonstrate a modified one-way CNOT gate using the on-cloud superconducting quantum computing platform:Quafu.The modified protocol for one-way quantum computing requires only three qubits rather than the four used in the standard protocol.Since this modified cluster state decreases the number of physical qubits required to implement one-way computation,both the scalability and complexity of the computing process are improved.Compared to previous work,this modified one-way CNOT gate is superior to the standard one in both fidelity and resource requirements.We have also numerically compared the behavior of standard and modified methods in large-scale one-way quantum computing.Our results suggest that in a noisy intermediate-scale quantum(NISQ)era,the modified method shows a significant advantage for one-way quantum computation. 展开更多
关键词 measurement-based quantum computing quantum entanglement quantum gates
下载PDF
The Future of Quantum Computer Advantage
3
作者 Jimmy Chen 《American Journal of Computational Mathematics》 2023年第4期619-631,共13页
As technological innovations in computers begin to advance past their limit (Moore’s law), a new problem arises: What computational device would emerge after the classical supercomputers reach their physical limitati... As technological innovations in computers begin to advance past their limit (Moore’s law), a new problem arises: What computational device would emerge after the classical supercomputers reach their physical limitations? At this moment in time, quantum computers are at their starting stage and there are already some strengths and advantages when compared with modern, classical computers. In its testing period, there are a variety of ways to create a quantum computer by processes such as the trapped-ion and the spin-dot methods. Nowadays, there are many drawbacks with quantum computers such as issues with decoherence and scalability, but many of these issues are easily emended. Nevertheless, the benefits of quantum computers at the moment outweigh the potential drawbacks. These benefits include its use of many properties of quantum mechanics such as quantum superposition, entanglement, and parallelism. Using these basic properties of quantum mechanics, quantum computers are capable of achieving faster computational times for certain problems such as finding prime factors of an integer by using Shor’s algorithm. From the advantages such as faster computing times in certain situations and higher computing powers than classical computers, quantum computers have a high probability to be the future of computing after classical computers hit their peak. 展开更多
关键词 quantum computers QUBIT DECOHERENCE SUPERPOSITION Entanglement PARALLELISM Hadamard Gates Shor’s Algorithm Bloch Sphere Moore’s Law
下载PDF
Optimized quantum singular value thresholding algorithm based on a hybrid quantum computer 被引量:1
4
作者 Yangyang Ge Zhimin Wang +9 位作者 Wen Zheng Yu Zhang Xiangmin Yu Renjie Kang Wei Xin Dong Lan Jie Zhao Xinsheng Tan Shaoxiong Li Yang Yu 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第4期752-756,共5页
Quantum singular value thresholding(QSVT) algorithm,as a core module of many mathematical models,seeks the singular values of a sparse and low rank matrix exceeding a threshold and their associated singular vectors.Th... Quantum singular value thresholding(QSVT) algorithm,as a core module of many mathematical models,seeks the singular values of a sparse and low rank matrix exceeding a threshold and their associated singular vectors.The existing all-qubit QSVT algorithm demands lots of ancillary qubits,remaining a huge challenge for realization on nearterm intermediate-scale quantum computers.In this paper,we propose a hybrid QSVT(HQSVT) algorithm utilizing both discrete variables(DVs) and continuous variables(CVs).In our algorithm,raw data vectors are encoded into a qubit system and the following data processing is fulfilled by hybrid quantum operations.Our algorithm requires O [log(MN)] qubits with0(1) qumodes and totally performs 0(1) operations,which significantly reduces the space and runtime consumption. 展开更多
关键词 singular value thresholding algorithm hybrid quantum computation
下载PDF
Lorentz quantum computer
5
作者 何文昊 王朕铎 吴飙 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第4期175-183,共9页
A theoretical model of computation is proposed based on Lorentz quantum mechanics.Besides the standard qubits,this model has an additional bit,which we call hyperbolic bit(or hybit in short).A set of basic logical gat... A theoretical model of computation is proposed based on Lorentz quantum mechanics.Besides the standard qubits,this model has an additional bit,which we call hyperbolic bit(or hybit in short).A set of basic logical gates are constructed and their universality is proved.As an application,a search algorithm is designed for this computer model and is found to be exponentially faster than Grover's search algorithm. 展开更多
关键词 quantum computing Lorentz quantum mechanics Grover search
下载PDF
Reviewing the SAE Levels of Driving Automation and Research Gaps to Accelerate the Development of a Quantum-Safe CCAM Infrastructure
6
作者 Fazal Raheman Tejas Bhagat Angel Batalla 《Journal of Transportation Technologies》 2024年第4期463-499,共37页
Based on a review of 28 Horizon Europe-funded CCAM projects, this paper studies the current state of Connected, Cooperative, and Automated Mobility (CCAM) and identifies significant research gaps in taxonomy, cybersec... Based on a review of 28 Horizon Europe-funded CCAM projects, this paper studies the current state of Connected, Cooperative, and Automated Mobility (CCAM) and identifies significant research gaps in taxonomy, cybersecurity, Artificial Intelligence (AI) and 6G research, that hinder the advancement of a future-ready CCAM infrastructure. The research emphasizes the crucial role of infrastructure in achieving autonomous mobility, shifting focus from the current vehicle-centric approach. It critiques the SAE J3016 taxonomy for its lack of emphasis on infrastructure and proposes an updated framework with an automation level dedicated to infrastructure automation. The paper highlights the existential threats posed by Quantum Computers (QC) and AI, stressing the need for quantum-safe cybersecurity measures and an ethical, controllable AI framework proposing a decentralized Collective Artificial Super Intelligence (CASI) framework. Identifying the critical need for a cooperative approach involving Road and Transport Authorities (RTAs) to achieve 100% vehicle connectivity and robust digital infrastructure, the study outlines the European Commission’s Vision 2050 goals, aiming for zero fatalities, zero emissions, and sustainable mobility. The paper concludes by providing recommendations for future research directions to accelerate the development of a comprehensive, secure, and efficient CCAM ecosystem. 展开更多
关键词 CCAM Horizon Europe SAE J3016 taxonomy Vision 2050 AI quantum computers
下载PDF
Defining Quantum Advantage for Building a Sustainable MVP to Deliver Quantum Computing Services
7
作者 Fazal Raheman 《Open Journal of Applied Sciences》 2024年第6期1530-1549,共20页
Quantum Computing (QC) is hailed as the future of computers. After Google’s claim of achieving Quantum Supremacy in 2019, several groups challenged the claim. Some QC experts attribute catastrophic risks that unrestr... Quantum Computing (QC) is hailed as the future of computers. After Google’s claim of achieving Quantum Supremacy in 2019, several groups challenged the claim. Some QC experts attribute catastrophic risks that unrestrained QC may cause in the future by collapsing the current cryptographic cybersecurity infrastructure. These predictions are relevant only if QC becomes commercially viable and sustainable in the future. No technology can be a one-way ticket to catastrophe, and neither can the definition of superiority of that technology be. If there are catastrophic risks, large-scale QC can never enter the public domain as a minimum viable product (MVP) unless there are safeguards in place. Those safeguards should obviously become an integral part of the definition of its superiority over the legacy systems. NIST (National Institute of Standards & Technology) is pursuing the standardization of Post Quantum Cryptography (PQC) as that safeguard. However, with all the 82 candidate PQCs failing and companies already offering QC as a service, there’s an urgent need for an alternate strategy to mitigate the impending Q-Day threat and render QC sustainable. Our research proposes a novel encryption-agnostic cybersecurity approach to safeguard QC. It articulates a comprehensive definition of an MVP that can potentially set a sustainable gold standard for defining commercially viable quantum advantage over classical computing. 展开更多
关键词 CYBERSECURITY NIST PQC quantum computers quantum Advantage quantum Supremacy
下载PDF
From Standard Policy-Based Zero Trust to Absolute Zero Trust (AZT): A Quantum Leap to Q-Day Security
8
作者 Fazal Raheman 《Journal of Computer and Communications》 2024年第3期252-282,共31页
Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is ... Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is considered practically impossible. The advent of quantum computers (QC) will worsen cybersecurity. QC will be a boon for data-intensive industries by drastically reducing the computing time from years to minutes. But QC will render our current cryptography vulnerable to quantum attacks, breaking nearly all modern cryptographic systems. Before QCs with sufficient qubits arrive, we must be ready with quantum-safe strategies to protect our ICT infrastructures. Post-quantum cryptography (PQC) is being aggressively pursued worldwide as a defence from the potential Q-day threat. NIST (National Institute of Standards and Technology), in a rigorous process, tested 82 PQC schemes, 80 of which failed after the final round in 2022. Recently the remaining two PQCs were also cracked by a Swedish and a French team of cryptographers, placing NIST’s PQC standardization process in serious jeopardy. With all the NIST-evaluated PQCs failing, there’s an urgent need to explore alternate strategies. Although cybersecurity heavily relies on cryptography, recent evidence indicates that it can indeed transcend beyond encryption using Zero Vulnerability Computing (ZVC) technology. ZVC is an encryption-agnostic absolute zero trust (AZT) approach that can potentially render computers quantum resistant by banning all third-party permissions, a root cause of most vulnerabilities. Unachievable in legacy systems, AZT is pursued by an experienced consortium of European partners to build compact, solid-state devices that are robust, resilient, energy-efficient, and with zero attack surface, rendering them resistant to malware and future Q-Day threats. 展开更多
关键词 CYBERSECURITY quantum computers Post quantum Cryptography Q-Day Zero Trust
下载PDF
Futureproofing Blockchain & Cryptocurrencies against Growing Vulnerabilities & Q-Day Threat with Quantum-Safe Ledger Technology (QLT)
9
作者 Fazal Raheman 《Journal of Computer and Communications》 2024年第7期59-77,共19页
With one billion users using 380 exchanges, the security of blockchains and cryptocurrencies remains a major concern as billions are lost to hackers every year. Cryptocurrency hacks negatively impact cryptocurrency ma... With one billion users using 380 exchanges, the security of blockchains and cryptocurrencies remains a major concern as billions are lost to hackers every year. Cryptocurrency hacks negatively impact cryptocurrency markets introducing volatility. Each major scam/hack incident results in a significant price dip for most cryptocurrencies, decelerating the growth of the blockchain economy. Existing blockchain vulnerabilities are further amplified by the impending existential threat from quantum computers. While there’s no reprieve yet from the scam/hack prone blockchain economy, quantum resilience is being aggressively pursued by post quantum cryptography (PQC) researchers, despite 80 of 82 candidate PQCs failing. As PQC has no role in combating inherent vulnerabilities, securing over 1000 existing blockchains against scammers/hackers remains a top priority for this industry. This research proposes a novel Quantum-safe Ledger Technology (QLT) framework that not only secures DLTs/cryptocurrencies and exchanges from current vulnerabilities but protects them from the impending Q-day threats from future quantum computers. As blockchain-agnostic technology, the QLT framework can be easily adapted to secure any blockchain or crypto exchange. 展开更多
关键词 CYBERSECURITY quantum computers Post quantum Cryptography Q-Day Zero Trust
下载PDF
Design of a novel hybrid quantum deep neural network in INEQR images classification
10
作者 王爽 王柯涵 +3 位作者 程涛 赵润盛 马鸿洋 郭帅 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期230-238,共9页
We redesign the parameterized quantum circuit in the quantum deep neural network, construct a three-layer structure as the hidden layer, and then use classical optimization algorithms to train the parameterized quantu... We redesign the parameterized quantum circuit in the quantum deep neural network, construct a three-layer structure as the hidden layer, and then use classical optimization algorithms to train the parameterized quantum circuit, thereby propose a novel hybrid quantum deep neural network(HQDNN) used for image classification. After bilinear interpolation reduces the original image to a suitable size, an improved novel enhanced quantum representation(INEQR) is used to encode it into quantum states as the input of the HQDNN. Multi-layer parameterized quantum circuits are used as the main structure to implement feature extraction and classification. The output results of parameterized quantum circuits are converted into classical data through quantum measurements and then optimized on a classical computer. To verify the performance of the HQDNN, we conduct binary classification and three classification experiments on the MNIST(Modified National Institute of Standards and Technology) data set. In the first binary classification, the accuracy of 0 and 4 exceeds98%. Then we compare the performance of three classification with other algorithms, the results on two datasets show that the classification accuracy is higher than that of quantum deep neural network and general quantum convolutional neural network. 展开更多
关键词 quantum computing image classification quantum–classical hybrid neural network quantum image representation INTERPOLATION
下载PDF
Development of 400-μW cryogen-free dilution refrigerators for quantum experiments
11
作者 关翔 樊洁 +2 位作者 边勇波 程智刚 姬忠庆 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期28-35,共8页
We have successfully developed cryogen-free dilution refrigerators with medium cooling power that can be applied to quantum experiments. Breakthroughs have been made in some key technologies and components of heat swi... We have successfully developed cryogen-free dilution refrigerators with medium cooling power that can be applied to quantum experiments. Breakthroughs have been made in some key technologies and components of heat switches and dilution units. Our prototype has been running continuously and stably for more than 100 hours below 10 m K, with a minimum temperature of 7.6 m K and a cooling power of 450 μW at 100 m K. At the same time, we have also made progress in the application of dilution refrigerators, such as quantum computing, low-temperature detector, and magnet integration. These indicators and test results indicate good prospects for application in physics, astronomy, and quantum information. 展开更多
关键词 cryogen-free dilution refrigerator quantum computing low-temperature detector superconducting magnet
下载PDF
Quantum circuit-based proxy blind signatures:A novel approach and experimental evaluation on the IBM quantum cloud platform
12
作者 娄小平 昝慧茹 徐雪娇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期247-253,共7页
This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a... This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution. 展开更多
关键词 proxy blind signature quantum circuits quantum computation IBM quantum cloud platform
下载PDF
The exchange interaction between neighboring quantum dots:physics and applications in quantum information processing
13
作者 Zheng Zhou Yixin Li +3 位作者 Zhiyuan Wu Xinping Ma Shichang Fan Shaoyun Huang 《Journal of Semiconductors》 EI CAS CSCD 2024年第10期20-34,共15页
Electron spins confined in semiconductor quantum dots(QDs)are one of potential candidates for physical implementation of scalable quantum information processing technologies.Tunnel coupling based inter exchange intera... Electron spins confined in semiconductor quantum dots(QDs)are one of potential candidates for physical implementation of scalable quantum information processing technologies.Tunnel coupling based inter exchange interaction between QDs is crucial in achieving single-qubit manipulation,two-qubit gate,quantum communication and quantum simulation.This review first provides a theoretical perspective that surveys a general framework,including the Helter−London approach,the Hund−Mulliken approach,and the Hubbard model,to describe the inter exchange interactions between semiconductor quantum dots.An electrical method to control the inter exchange interaction in a realistic device is proposed as well.Then the significant achievements of inter exchange interaction in manipulating single qubits,achieving two-qubit gates,performing quantum communication and quantum simulation are reviewed.The last part is a summary of this review. 展开更多
关键词 exchange interaction quantum dots tunnel coupling quantum computation
下载PDF
A Novel Scheduling Framework for Multi-Programming Quantum Computing in Cloud Environment
14
作者 Danyang Zheng Jinchen Xv +3 位作者 Feng Yue Qiming Du ZhihengWang Zheng Shan 《Computers, Materials & Continua》 SCIE EI 2024年第5期1957-1974,共18页
As cloud quantum computing gains broader acceptance,a growing quantity of researchers are directing their focus towards this domain.Nevertheless,the rapid surge in demand for cloud-based quantum computing resources ha... As cloud quantum computing gains broader acceptance,a growing quantity of researchers are directing their focus towards this domain.Nevertheless,the rapid surge in demand for cloud-based quantum computing resources has led to a scarcity,which in turn hampers users from achieving optimal satisfaction.Therefore,cloud quantum computing service providers require a unified analysis and scheduling framework for their quantumresources and user jobs to meet the ever-growing usage demands.This paper introduces a new multi-programming scheduling framework for quantum computing in a cloud environment.The framework addresses the issue of limited quantum computing resources in cloud environments and ensures a satisfactory user experience.It introduces three innovative designs:1)Our framework automatically allocates tasks to different quantum backends while ensuring fairness among users by considering both the cloud-based quantum resources and the user-submitted tasks.2)Multi-programming mechanism is employed across different quantum backends to enhance the overall throughput of the quantum cloud.In comparison to conventional task schedulers,our proposed framework achieves a throughput improvement of more than two-fold in the quantum cloud.3)The framework can balance fidelity and user waiting time by adaptively adjusting scheduling parameters. 展开更多
关键词 quantum computing SCHEDULING multi-programming qubit mapping
下载PDF
Simulations of superconducting quantum gates by digital flux tuner for qubits
15
作者 耿霄 何楷泳 +1 位作者 刘建设 陈炜 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期210-222,共13页
The interconnection bottleneck caused by limitations of cable number, inner space and cooling power of dilution refrigerators has been an outstanding challenge for building scalable superconducting quantum computers w... The interconnection bottleneck caused by limitations of cable number, inner space and cooling power of dilution refrigerators has been an outstanding challenge for building scalable superconducting quantum computers with the increasing number of qubits in quantum processors. To surmount such an obstacle, it is desirable to integrate qubits with quantum–classical interface(QCI) circuits based on rapid single flux quantum(RSFQ) circuits. In this work, a digital flux tuner for qubits(DFTQ) is proposed for manipulating flux of qubits as a crucial part of the interface circuit. A schematic diagram of the DFTQ is presented, consisting of a coarse tuning unit and a fine-tuning unit for providing magnetic flux with different precision to qubits. The method of using DFTQ to provide flux for gate operations is discussed from the optimization of circuit design and input signal. To verify the effectiveness of the method, simulations of a single DFTQ and quantum gates including a Z gate and an iSWAP gate with DFTQs are performed for flux-tunable transmons. The quantum process tomography corresponding to the two gates is also carried out to analyze the sources of gate error. The results of tomography show that the gate fidelities independent of the initial states of the Z gate and the iSWAP gate are 99.935% and 99.676%,respectively. With DFTQs inside, the QCI would be a powerful tool for building large-scale quantum computers. 展开更多
关键词 quantum computation superconducting electronics quantum control
下载PDF
Threshold-independent method for single-shot readout of spin qubits in semiconductor quantum dots
16
作者 胡睿梓 祝圣凯 +9 位作者 张鑫 周圆 倪铭 马荣龙 罗刚 孔真真 王桂磊 曹刚 李海欧 郭国平 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第1期274-279,共6页
The single-shot readout data process is essential for the realization of high-fidelity qubits and fault-tolerant quantum algorithms in semiconductor quantum dots. However, the fidelity and visibility of the readout pr... The single-shot readout data process is essential for the realization of high-fidelity qubits and fault-tolerant quantum algorithms in semiconductor quantum dots. However, the fidelity and visibility of the readout process are sensitive to the choice of the thresholds and limited by the experimental hardware. By demonstrating the linear dependence between the measured spin state probabilities and readout visibilities along with dark counts, we describe an alternative threshold-independent method for the single-shot readout of spin qubits in semiconductor quantum dots. We can obtain the extrapolated spin state probabilities of the prepared probabilities of the excited spin state through the threshold-independent method. We then analyze the corresponding errors of the method, finding that errors of the extrapolated probabilities cannot be neglected with no constraints on the readout time and threshold voltage. Therefore, by limiting the readout time and threshold voltage, we ensure the accuracy of the extrapolated probability. We then prove that the efficiency and robustness of this method are 60 times larger than those of the most commonly used method. Moreover, we discuss the influence of the electron temperature on the effective area with a fixed external magnetic field and provide a preliminary demonstration for a single-shot readout of up to 0.7K/1.5T in the future. 展开更多
关键词 quantum computation quantum dot quantum state readout
下载PDF
Electric field dependence of spin qubit in a Si-MOS quantum dot
17
作者 马荣龙 倪铭 +7 位作者 周雨晨 孔真真 王桂磊 刘頔 罗刚 曹刚 李海欧 郭国平 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期248-253,共6页
Valley, the intrinsic feature of silicon, is an inescapable subject in silicon-based quantum computing. At the spin–valley hotspot, both Rabi frequency and state relaxation rate are significantly enhanced. With prote... Valley, the intrinsic feature of silicon, is an inescapable subject in silicon-based quantum computing. At the spin–valley hotspot, both Rabi frequency and state relaxation rate are significantly enhanced. With protection against charge noise, the valley degree of freedom is also conceived to encode a qubit to realize noise-resistant quantum computing.Here, based on the spin qubit composed of one or three electrons, we characterize the intrinsic properties of valley in an isotopically enriched silicon quantum dot(QD) device. For one-electron qubit, we measure two electric-dipole spin resonance(EDSR) signals which are attributed to partial occupation of two valley states. The resonance frequencies of two EDSR signals have opposite electric field dependences. Moreover, we characterize the electric field dependence of the upper valley state based on three-electron qubit experiments. The difference of electric field dependences of the two valleys is 52.02 MHz/V, which is beneficial for tuning qubit frequency to meet different experimental requirements. As an extension of electrical control spin qubits, the opposite electric field dependence is crucial for qubit addressability,individual single-qubit control and two-qubit gate approaches in scalable quantum computing. 展开更多
关键词 silicon-based quantum computing VALLEY electric-dipole spin resonance
下载PDF
A family of quantum von Neumann architecture
18
作者 王东升 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第8期56-61,共6页
We develop universal quantum computing models that form a family of quantum von Neumann architectures,with modular units of memory,control,CPU,and internet,besides input and output.This family contains three generatio... We develop universal quantum computing models that form a family of quantum von Neumann architectures,with modular units of memory,control,CPU,and internet,besides input and output.This family contains three generations characterized by dynamical quantum resource theory,and it also circumvents no-go theorems on quantum programming and control.Besides universality,such a family satisfies other desirable engineering requirements on system and algorithm design,such as modularity and programmability,hence serves as a unique approach to building universal quantum computers. 展开更多
关键词 von Neumann architecture quantum resource theory quantum computing
下载PDF
Enhancing IoT Security:Quantum-Level Resilience against Threats
19
作者 Hosam Alhakami 《Computers, Materials & Continua》 SCIE EI 2024年第1期329-356,共28页
The rapid growth of the Internet of Things(IoT)operations has necessitated the incorporation of quantum computing technologies tomeet its expanding needs.This integration ismotivated by the need to solve the specific ... The rapid growth of the Internet of Things(IoT)operations has necessitated the incorporation of quantum computing technologies tomeet its expanding needs.This integration ismotivated by the need to solve the specific issues provided by the expansion of IoT and the potential benefits that quantum computing can offer in this scenario.The combination of IoT and quantum computing creates new privacy and security problems.This study examines the critical need to prevent potential security concerns from quantum computing in IoT applications.We investigate the incorporation of quantum computing approaches within IoT security frameworks,with a focus on developing effective security mechanisms.Our research,which uses quantum algorithms and cryptographic protocols,provides a unique solution to protecting sensitive information and assuring the integrity of IoT systems.We rigorously analyze critical quantum computing security properties,building a hierarchical framework for systematic examination.We offer concrete solutions flexible to diverse aswell as ambiguous opinions through using a unified computational model with analytical hierarchy process(AHP)multi-criteria decision-making(MCDM)as the technique for ordering preferences by similarity to ideal solutions(TOPSIS)in a fuzzy environment.This study adds practical benefit by supporting practitioners in recognizing,choosing,and prioritizing essential security factors from the standpoint of quantum computing.Our approach is a critical step towards improving quantum-level security in IoT systems,strengthening their resilience against future threats,and preserving the IoT ecosystem’s long-term prosperity. 展开更多
关键词 quantum security quantum computing Internet of Things fuzzy decision-making
下载PDF
HQNN-SFOP:Hybrid Quantum Neural Networks with Signal Feature Overlay Projection for Drone Detection Using Radar Return Signals-A Simulation
20
作者 Wenxia Wang Jinchen Xu +4 位作者 Xiaodong Ding Zhihui Song Yizhen Huang Xin Zhou Zheng Shan 《Computers, Materials & Continua》 SCIE EI 2024年第10期1363-1390,共28页
With the wide application of drone technology,there is an increasing demand for the detection of radar return signals from drones.Existing detection methods mainly rely on time-frequency domain feature extraction and ... With the wide application of drone technology,there is an increasing demand for the detection of radar return signals from drones.Existing detection methods mainly rely on time-frequency domain feature extraction and classical machine learning algorithms for image recognition.This method suffers from the problem of large dimensionality of image features,which leads to large input data size and noise affecting learning.Therefore,this paper proposes to extract signal time-domain statistical features for radar return signals from drones and reduce the feature dimension from 512×4 to 16 dimensions.However,the downscaled feature data makes the accuracy of traditional machine learning algorithms decrease,so we propose a new hybrid quantum neural network with signal feature overlay projection(HQNN-SFOP),which reduces the dimensionality of the signal by extracting the statistical features in the time domain of the signal,introduces the signal feature overlay projection to enhance the expression ability of quantum computation on the signal features,and introduces the quantum circuits to improve the neural network’s ability to obtain the inline relationship of features,thus improving the accuracy and migration generalization ability of drone detection.In order to validate the effectiveness of the proposed method,we experimented with the method using the MM model that combines the real parameters of five commercial drones and random drones parameters to generate data to simulate a realistic environment.The results show that the method based on statistical features in the time domain of the signal is able to extract features at smaller scales and obtain higher accuracy on a dataset with an SNR of 10 dB.On the time-domain feature data set,HQNNSFOP obtains the highest accuracy compared to other conventional methods.In addition,HQNN-SFOP has good migration generalization ability on five commercial drones and random drones data at different SNR conditions.Our method verifies the feasibility and effectiveness of signal detection methods based on quantum computation and experimentally demonstrates that the advantages of quantum computation for information processing are still valid in the field of signal processing,it provides a highly efficient method for the drone detection using radar return signals. 展开更多
关键词 quantum computing hybrid quantum neural network drone detection using radar signals time domain features
下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部