Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Digital quantum state implementation.

Artykuły w czasopismach na temat „Digital quantum state implementation”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Digital quantum state implementation”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Evsikov, K. S. "Information Security of the Digital State in the Quantum Era". Courier of Kutafin Moscow State Law University (MSAL)), nr 4 (10.07.2022): 46–58. http://dx.doi.org/10.17803/2311-5998.2022.92.4.046-058.

Pełny tekst źródła
Streszczenie:
The article provides an overview of the digital technology quantum communication and its place among end-to-end digital technologies. Also the problem of quantum threat to the information security of the Russian Federation is considered. The cryptography used today is based on discrete logarithms or factorization, which will lose their cryptographic strength after the implementation of a quantum computer. All countries have started to analyze and develop new information security technologies which are capable to ensure its confidentiality in the quantum era.The article analyzes the experience of building a new information security system in several countries (Great Britain, the European Union, the USA, China). The analysis made it possible to evaluate Russian actions in this area, as well as to identify shortcomings in the regulatory framework governing quantum cryptography, which include quantum key distribution, quantum random number generator, post-quantum cryptography.The author substantiates the need for the introduction of an experimental legal regime and the creation of the «cryptographic agility». The implementation of these proposals will help to prepare a regulatory framework for data migration to an environment protected by cryptographic ciphers resistant to quantum computing. The quantum communication is a new way to protect information in a digital state, where data plays a key role, and their confidentiality and integrity become the key to national security.
Style APA, Harvard, Vancouver, ISO itp.
2

Hlukhov, Valeriy S. "RESEARCH OF DIGITAL QUBITES FOR HETEROGENEOUS DIGITAL QUANTUM COPROCESSORS". Applied Aspects of Information Technology 4, nr 1 (10.04.2021): 91–99. http://dx.doi.org/10.15276/aait.01.2021.8.

Pełny tekst źródła
Streszczenie:
Recently, interest is growing towards real quantum computers, which are analog and probabilistic devices by nature. The interest is also growing to their digital version, both software and hardware. One approach to the construction of real quantum computers is to use quantum chips. The hardware implementation of digital quantum computers involves the use of field programmable gate arrays. A digital quantum coprocessor has already been created which has over a thousand digital qubits and can perform such complex algorithms as a quantum Fourier transformation. The created and working digital quantum coprocessor can already be used to work out various quantum algorithms, algorithms for the interaction of a classic computer and its quantum coprocessor, as well as for research various options for building digital qubits. The purpose of this work is to study the effect of the accuracy of the presentation of the state of digital qubit on the probability of obtaining the correct results of the digital quantum coprocessor. For the study, a heterogeneous digital quantum coprocessor with thirty two digital qubits is selected, which will perform the Fourier quantum transformation. The article describes the basics of building digital quantum coprocessors. Schemes that illustrate the interaction of a classic computer and a quantum coprocessor, the architecture of the coprocessor and the possible structures of its digital qubits are given. Two variants of the coprocessor, homogeneous one with one pseudo-random codes generator and one comparator, and heterogeneous one, with a generator and a comparator in each digital quantum cell, from which digital qubits consist, are shown. Two options for comparators are also shown - with a direct functional converter and with reverse one. In this work, the influence of the length of the qubit state codes of heterogeneous digital quantum coprocessors on the probability of the correct results formation is investigated. It was shown that the probability of obtaining the correct results at the output of the digital heterogeneous coprocessor is sharply (up to fifty percent) improved with a decrease of the qubit state code length, that is, with a decrease in the coprocessor hardware cost. With a length of a code equal to two bits, the quality of the operation of the heterogeneous coprocessor becomes commensurate with the quality of the homogeneous one. The need for additional research in this direction, including with homogeneous coprocessors, is shown.
Style APA, Harvard, Vancouver, ISO itp.
3

Wu, Jiayao, Chen He, Jiahui Xie, Xiaopeng Liu i Minghui Zhang. "Twin-Field Quantum Digital Signature with Fully Discrete Phase Randomization". Entropy 24, nr 6 (18.06.2022): 839. http://dx.doi.org/10.3390/e24060839.

Pełny tekst źródła
Streszczenie:
Quantum digital signatures (QDS) are able to verify the authenticity and integrity of a message in modern communication. However, the current QDS protocols are restricted by the fundamental rate-loss bound and the secure signature distance cannot be further improved. We propose a twin-field quantum digital signature (TF-QDS) protocol with fully discrete phase randomization and investigate its performance under the two-intensity decoy-state setting. For better performance, we optimize intensities of the signal state and the decoy state for each given distance. Numerical simulation results show that our TF-QDS with as few as six discrete random phases can give a higher signature rate and a longer secure transmission distance compared with current quantum digital signatures (QDSs), such as BB84-QDS and measurement-device-independent QDS (MDI-QDS). Moreover, we provide a clear comparison among some possible TF-QDSs constructed by different twin-field key generation protocols (TF-KGPs) and find that the proposed TF-QDS exhibits the best performance. Conclusively, the advantages of the proposed TF-QDS protocol in signature rate and secure transmission distance are mainly due to the single-photon interference applied in the measurement module and precise matching of discrete phases. Besides, our TF-QDS shows the feasibility of experimental implementation with current devices in practical QDS system.
Style APA, Harvard, Vancouver, ISO itp.
4

Telap, Cherry, Benny Pinontoan i Jullia Titaley. "Derivation of Quantum Guarded Command Language Program for Average". d'CARTESIAN 4, nr 2 (26.06.2015): 163. http://dx.doi.org/10.35799/dc.4.2.2015.9055.

Pełny tekst źródła
Streszczenie:
Has conducted research to determine the derivation of quantum guarded command language (qGCL) program for average. Initially calculation of average value was made in guaded command language (GCL) which is then implemented on a digital computer into the Pascal programming language. Furthermore GCL to calculate the average value was analyzed again to be made in the quantum guarded command language (qGCL). qGCL implementation is on a quantum computer is a future computer could perform calculations very quickly because it uses a superposition state is referred to as quantum bits (qubits). Keywords : GCL, qGCL, Quantum Computer
Style APA, Harvard, Vancouver, ISO itp.
5

Khakhanova, A., S. Chumachenko, D. Rakhlis, І. Hahanov i V. Hahanov. "QUANTUM DIGITAL-ANALOGUE COMPUTING". Radio Electronics, Computer Science, Control, nr 4 (4.12.2022): 40. http://dx.doi.org/10.15588/1607-3274-2022-4-4.

Pełny tekst źródła
Streszczenie:
Context. Nature is the relation among processes and phenomena. Nothing exists in the universe without relations. Computer is transactions of relations between data with the help of control and execution mechanisms. Quantum relations are a superposition of particles and their states. Superposition and entanglement are equivalent concepts. Entanglement is a non-local superposition of deterministic states. A quantum computer is unconditional transactions of relations between qubit data. Quantum computer is an analog device for parallel solution of combinatorial problems. Practically oriented definitions of the quantum computer concepts are the path to development of scalable quantum parallel algorithms for combinatorial problems solving. Any algorithm can be reduced to a sequence of operations without conditions, because any truth table is a collection of a complete system of conditions-states. Any sequence of actions can always be reduced to one parallel operation. Conditions and sequences arise only when the developer wants to use previously created primitive constructs to build an always non-optimal computing unit. The paradigm of quantum computer creation is determined through the use of photonic transactions on the electrons of an atom may exclude the use of quantum logic. The evolutionary path of a quantum computer from the classical one: “memory-address-transaction” (MAT) → “electron-addresstransaction” → “electron-address-quantaction” (EAQ) → state-superposition-logic. The meeting point of classical and quantum computers is photon transactions on the structure of electrons. Everything that is calculated on a quantum computer can be calculated in parallel on a classical one on account of memory redundancy. The given example is a memory-driven algorithm for modeling digital products based on qubit-vector forms of functionality description for significant performance boost of computing processes by parallel execution of logical operations. Objective. Simulation of the correct SoC-component behavior based on vector representation of the logic. Formation of the triggering development of a computing based on the superposition of the classical, quantum and analog computing process, which in its development should be based on technological qubit, tabular and vector data structures for the parallel solution of combinatorial problems. Method. MAT-computing implements any algorithms on account of transactions (read-write) in memory. Qubit-vector models for describing functionalities, which differ from known truth tables in compactness of description and manufacturability for the implementation of parallel algorithms of the synthesis and analysis of digital devices and SoC-components. Results. 1) The metric of the technological data structures, focused on parallel troubleshooting in digital systems based on the usage of two logical vector operations, was proposed for the first time. 2) The metric of relations between the individual components of QC, allowing organizing a quantum deterministic computer, has been further developed. 3) Quantum architectural solutions, that allow solving coverage problems in a quasi-parallel mode, were proposed for the first time. 4) Architectural solutions based on an analog-to-digital computing, which can be used to solve the problems of the digital systems parallel analysis, have been further developed. 5) Vector-qubit structures of the logic data, that allow a quasi-parallel simulation of digital circuits, were proposed. Conclusions. Qubit models, quantum methods and combinatorial algorithms for technical diagnostics of digital devices have been implemented, which can significantly (up to 25%) reduce the time of test synthesis, deductive modeling of faulty and correct behavior, search for defective states by introducing an innovative idea of using qubit-vector data structures for describing logical components. Comparative assessments of qubit models and methods usage show an increase in the efficiency of algorithms for modeling digital devices compared to tabular ones. The superposition of a classical, quantum and analog computer is integrally represented, which allows to find the best solutions for recognition and decision making.
Style APA, Harvard, Vancouver, ISO itp.
6

YANENKOVA, IRYNA. "FACTORS AND WAYS OF DEVELOPMENT OF DIGITALIZATION IN UKRAINE". Economy of Ukraine 2022, nr 3 (28.03.2022): 4–22. http://dx.doi.org/10.15407/economyukr.2022.03.004.

Pełny tekst źródła
Streszczenie:
The current state of digitalization processes in Ukraine, directions and ways to accelerate its digital development are clarified. The character and factors of promoting and inhibiting of digital transformation are revealed, including: significant human potential of IT sector, availability of Internet connection, implementation of digital initiatives of the European Union, community activities, factors of institutional environment and digital infrastructure. It is shown that the implementation of technical solutions of the European digital single market for electronic data exchange (eCommerce, eDelivery, eCustom) is a secure, reliable and proven way to connect business not only with EU countries but also outside the Union. The formation of the ICT sector in Ukraine over the past 20 years is analyzed through the prism of the development and implementation of laws and regulations, directions and measures of public policy in this area. The advantages, disadvantages and gaps in the institutional environment of the country are revealed. Emphasis is placed on the advantages of the program-targeted approach and methodology of strategic planning for solving the complex problems of socio-economic development. The inefficiency of development and implementation of legislative initiatives in isolation from national goals and priorities is proved. Necessity and expediency of development of the State target program of development of ICT sector in Ukraine, updating of the existing Concept of digital development of economy and society and formation of the state industrial policy are substantiated. Proposals to create a strong production potential of the digital industry in Ukraine and accelerate the construction of national digital infrastructure are developed. Promising areas of digitalization in Ukraine are revealed, which include: artificial intelligence, distributed registry technologies and quantum computing. It is proposed to resume the practice of developing state long- and medium-term plans for socio-economic development of the country as a systemic basis for the deployment of sectoral initiatives on digitalization.
Style APA, Harvard, Vancouver, ISO itp.
7

REFAA, Mokrane. "Thoughts and Strategic Maneuverings of Business Quantum". International Journal of Business & Management Studies 04, nr 03 (11.03.2023): 25–38. http://dx.doi.org/10.56734/ijbms.v4n3a4.

Pełny tekst źródła
Streszczenie:
Objective The main purpose of this research is to shed light on possible strategic maneuvers in order to pass the course of the implementation of quantum technologies at the level of companies. The challenge is also cultural and societal. This research is supported by an analysis of the contributions of research with a multidisciplinary analysis - strategy, computer science, linguistics, sociology ... - to the concerns of quantum Information Technologies (IT). Design/Methodology/Approach It is an expertise of four decades of experience in research and IT management this study is focused on a case study methodology in a philosophical approach return of thought on itself. It focuses on thought models that support IT disruptions through an analysis of graphical representations of the evolution of IT innovations. Results This research and analysis realizes, on the one hand, a current state of digital/quantum IT enabling the extended enterprise, and, on the other hand, approaches and models for the development, implementation and operation of the quantum IT service in organizations. Originality Research in critical and conceptual thinking based on the disruptions of IT innovations. It focuses on the key success factors of absorptive capacities in co-trust.
Style APA, Harvard, Vancouver, ISO itp.
8

Singh, Keshaan, i Angela Dudley. "Digital toolbox for vector field characterization". Nanophotonics 11, nr 4 (7.12.2021): 753–61. http://dx.doi.org/10.1515/nanoph-2021-0484.

Pełny tekst źródła
Streszczenie:
Abstract Vectorial structured light fields have displayed properties advantageous in many disciplines ranging from communications, microscopy and metrology to laser cutting and characterizing quantum channels. The generation of these fields has been made convenient through the implementation of nanophotonic metasurfaces amongst other static and digital techniques. Consequently, the detection and characterisation of these fields is of equal importance. Most existing techniques involve using separate polarization optics and correlation filters to perform the projective measurements – or are only able to perform such measurements on a subset of possible vector states. We present a compact, fully automated measurement technique based on a digital micro-mirror device (DMD), which facilitates the complete, local and global, characterisation of the spatial mode and polarization degrees-of-freedom (DOFs) for arbitrary vectorial fields. We demonstrate our approach through the identification of relevant hybrid-order Poincaré spheres, the reconstruction of state vectors on these spheres, as well as the recovery of the non-separability and states-of-polarization for a variety of vector beams.
Style APA, Harvard, Vancouver, ISO itp.
9

Godin, V. V., M. N. Belousova, V. A. Belousov i A. Е. Terekhova. "Agriculture in a digital era: threats and solutions". E-Management 3, nr 1 (20.05.2020): 4–15. http://dx.doi.org/10.26425/2658-3445-2020-1-4-15.

Pełny tekst źródła
Streszczenie:
The need for digitalization of the agro-industrial complex is obvious – implementation of digital economy principles will create an institutional environment that meets modern realities and allows to generally improve production efficiency. Foreign experience of agriculture digitalization in the USA, Germany, Switzerland, and Ireland has been analysed in the article. Main technologies used for agro-industrial complex digitalization have been described. Advantages and potential of the smart farming implementation to control the accuracy of fertilizer application, prediction of adverse environmental events, quality improve of growing products and more open interaction between farmers and consumers, resource costs reduction and increase of farms profitability have been considered. Opportunities and obstacles for implementing technologies of the state project “Digital Agriculture” have been evaluated: big data, blockchain, smart farming, quantum technologies, Internet of things, robotics, wireless communications, virtual and augmented realities. Ingeneral the main obstacles are related to high cost of introducing new technologies, lack of necessary knowledge among farmers, lack of legal framework and standards, and lack of information and software protection mechanism. Barriers and their potential solutions in the process of agriculture digitalization in Russia have been defined in the article. Main solutions to overcome the barriers described include: favorable regulatory environment for digital agriculture development, information and economic security of agricultural producers, nationwide information and communication infrastructure for the industry (including provision of public services on the basis of a single cloud platform), necessary training for “intellectual” agriculture, implementation of digital technologies in related industries, development of the agricultural digital enterprise concept and the way of its implementation.
Style APA, Harvard, Vancouver, ISO itp.
10

Kosorukov, Artem Andreevich. "Advanced technological solutions in the sphere of establishing neuro-digital public administration". Социодинамика, nr 6 (czerwiec 2021): 53–66. http://dx.doi.org/10.25136/2409-7144.2021.6.35675.

Pełny tekst źródła
Streszczenie:
The subject of this research is the advanced technological solutions associated with the transition from digital to neuro-communication technologies in the sphere of public administration. The author explores the current stage of development of the NeuroNet, which is the new-generation information and communication network, which promotes the transition from the data-centrism of digital government towards the intelligence-centrism of neuro-digital public administration. The article also considers the possibility of connecting brain-computer interfaces in the sphere of interpersonal communication, contributing to the formation of neurocognitive level of mass communication, neuro-digital interaction between the government authorities and the citizens. At the same time, one of the crucial aspects of the neuro-communicative environment is the digital equivalents of a human, the Internet of things and objects of material infrastructure, which e shift the management processes to the sphere of virtual and augmented reality. The novelty of the this work consists in disclosure of the applied aspects of implementation of quantum communications in digital infrastructure of public administration, which ensure secure interdepartmental document flow, as well as dialogue with citizens, including on the level of neuro-communications, and allow effectively counteracting quantum hacking. Digital sensorics and technical bionics, combining the capabilities of control of unmanned transport vehicles and robotics, significantly impacting the development of a “smart city” based on the big data and predictive analytics, and reflecting the neural network structure of the digital state, make a considerable contribution to the scientific novelty of this research, and simultaneously actualize the aspect of neuro-communication as personal biodata and biosafety.
Style APA, Harvard, Vancouver, ISO itp.
11

LISOVSKA, Y. "Diversification as codified digital administrative and legal management system: interinfrastructural provision of the information capital". INFORMATION AND LAW, nr 4(39) (9.12.2021): 187–92. http://dx.doi.org/10.37750/2616-6798.2021.4(39).249304.

Pełny tekst źródła
Streszczenie:
The article examines diversification as a system of administrative and legal management in the intersectoral provision of digitalization in Ukraine, which expands the semantic relationship between law and economics in the modern quantum-electronic world. Diversification is shown as a legal policy of the world order, which is due to a planned and creative relationship to protect the legal needs and interests of the individual, the state and society. This paper analyzes the prospects of diversification as a digital codification system of administrative and legal management in the inter-infrastructure of information capital. This article is devoted to highlighting the diversification mechanism for the implementation of current legislation in the field of critical infrastructure protection.
Style APA, Harvard, Vancouver, ISO itp.
12

Rithiga, S., T. Venish Kumar, M. Idhayachandran i S. Prathap. "Reversible Logic based Cryptography Design Algorithm using Random Keys". June 2023 5, nr 2 (czerwiec 2023): 154–64. http://dx.doi.org/10.36548/jei.2023.2.004.

Pełny tekst źródła
Streszczenie:
Reversible computations, besides quantum computing, have various applications in digital signal processing, nanotechnology and bioinformatics. They are particularly useful in designing low-power devices and improving computational efficiency. Cryptography is vital for protecting sensitive information in fields such as bioinformatics and digital signal processing where private data is frequently exchanged. However, cryptographic algorithms can consume significant power and require large areas, particularly when implemented in hardware. Reversible logic gates offer a potential solution by being more power-efficient and potentially reducing implementation area. Using random numbers as keys for both encryption and decryption in a reversible logic gate-based cryptographic algorithm can enhance security. LSB watermarking is a technique to embed additional metadata into digital media, improving data security. To evaluate the performance of the Field Programmable Gate Array for the Reversible Logic Gate Cryptography Design architecture, comparing it to the other state-of-the-art approach is necessary.
Style APA, Harvard, Vancouver, ISO itp.
13

Burger, Andreas, Leong Chuan Kwek i Dario Poletti. "Digital Quantum Simulation of the Spin-Boson Model under Markovian Open-System Dynamics". Entropy 24, nr 12 (2.12.2022): 1766. http://dx.doi.org/10.3390/e24121766.

Pełny tekst źródła
Streszczenie:
Digital quantum computers have the potential to simulate complex quantum systems. The spin-boson model is one of such systems, used in disparate physical domains. Importantly, in a number of setups, the spin-boson model is open, i.e., the system is in contact with an external environment which can, for instance, cause the decay of the spin state. Here, we study how to simulate such open quantum dynamics in a digital quantum computer, for which we use an IBM hardware. We consider in particular how accurate different implementations of the evolution result as a function of the level of noise in the hardware and of the parameters of the open dynamics. For the regimes studied, we show that the key aspect is to simulate the unitary portion of the dynamics, while the dissipative part can lead to a more noise-resistant simulation. We consider both a single spin coupled to a harmonic oscillator, and also two spins coupled to the oscillator. In the latter case, we show that it is possible to simulate the emergence of correlations between the spins via the oscillator.
Style APA, Harvard, Vancouver, ISO itp.
14

Yesina, M. V., Ye V. Ostrianska i I. D. Gorbenko. "Status report on the third round of the NIST post-quantum cryptography standardization process". Radiotekhnika, nr 210 (28.09.2022): 75–86. http://dx.doi.org/10.30837/rt.2022.3.210.05.

Pełny tekst źródła
Streszczenie:
In recent years, there has been steady progress in the creation of quantum computers. If large-scale quantum computers are implemented, they will threaten the security of many widely used public-key cryptosystems. Key-establishment schemes and digital signatures based on factorization, discrete logarithms, and elliptic curve cryptography will be most affected. Symmetric cryptographic primitives such as block ciphers and hash functions will be broken only slightly. As a result, there has been an intensification of research on finding public-key cryptosystems that would be secure against cryptanalysts with both quantum and classical computers. This area is often called post-quantum cryptography (PQC), or sometimes quantum-resistant cryptography. The goal is to design schemes that can be deployed in existing communication networks and protocols without significant changes. The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms through an open competition. New public-key cryptography standards will define one or more additional digital signatures, public-key encryption, and key-establishment algorithms. It is assumed that these algorithms will be able to protect confidential information well in the near future, including after the advent of quantum computers. After three rounds of evaluation and analysis, NIST has selected the first algorithms that will be standardized as a result of the PQC standardization process. The purpose of this article is to review and analyze the state of NIST's post-quantum cryptography standardization evaluation and selection process. The article summarizes each of the 15 candidate algorithms from the third round and identifies the algorithms selected for standardization, as well as those that will continue to be evaluated in the fourth round of analysis. Although the third round is coming to an end and NIST will begin developing the first PQC standards, standardization efforts in this area will continue for some time. This should not be interpreted as meaning that users should wait to adopt post-quantum algorithms. NIST looks forward to the rapid implementation of these first standardized algorithms and will issue future guidance on the transition. The transition will undoubtedly have many complexities, and there will be challenges for some use cases such as IoT devices or certificate transparency.
Style APA, Harvard, Vancouver, ISO itp.
15

Sigov, A., E. Andrianova, D. Zhukov, S. Zykov i I. E. Tarasov. "QUANTUM INFORMATICS: OVERVIEW OF THE MAIN ACHIEVEMENTS". Russian Technological Journal 7, nr 1 (28.02.2019): 5–37. http://dx.doi.org/10.32362/2500-316x-2019-7-1-5-37.

Pełny tekst źródła
Streszczenie:
The urgency of conducting research in the field of quantum informatics is grounded. Promising areas of research are highlighted. For foreign and Russian publications and materials, a review of the main scientific results that characterize the current state of research in quantum computer science is made. It is noted that knowledge and funds are invested most intensively in the development of the architecture of a quantum computer and its elements. Despite the fact that today there is no information on the creation of a physical implementation of a quantum computer comparable in functionality to a classical digital computer, the development of quantum algorithms is one of the popular areas of research. An advantage of quantum algorithms is the fact that they reduce the time required to solve the problem due to the parallelization of operations by generating entangled quantum states and their subsequent use. This advantage (quantum acceleration) is most important when solving the problem of modeling the dynamics of complex systems and enumerated mathematical problems. (The general case of enumeration is the Grover scheme and its variants; the tasks of searching for hidden periods: Shor's scheme of using the fast quantum Fourier transform and its analogues.) The demand for cybersecurity developments (search for vulnerabilities in smart spaces, secure storage and use of big data, quantum cryptography) is noted. More than a dozen articles are devoted to quantum algorithms of key search, key distribution on optical fibers of various lengths, and the analysis of quantum resources necessary for conducting a cyber attack. In the field of artificial quantum intelligence, attention is paid, first of all, to the “search” for a model of a quantum neural network that is optimal from the point of view of using all the advantages presented by quantum computing and neural networks, as well as machine learning algorithms. Examples of the use of quantum computing in cognitive and social sciences for studying the decision-making mechanism with incomplete data are given. It is concluded that quantum informatics is promising for the simulation of complex natural and artificial phenomena and processes.
Style APA, Harvard, Vancouver, ISO itp.
16

Ioannou, L. M., i M. Mosca. "Universal quantum computation in a hidden basis". Quantum Information and Computation 10, nr 7&8 (lipiec 2010): 541–61. http://dx.doi.org/10.26421/qic10.7-8-1.

Pełny tekst źródła
Streszczenie:
Let $\ketz$ and $\keto$ be two states that are promised to come from known subsets of orthogonal subspaces, but are otherwise unknown. Our paper probes the question of what can be achieved with respect to the basis $\{\ketz,\keto\}^{\otimes n}$ of $n$ logical qubits, given only a few copies of the unknown states $\ketz$ and $\keto$. A phase-invariant operator is one that is unchanged under the relative phase-shift $\keto \mapsto e^{i \theta}\keto$, for any $\theta$, of all of the $n$ qubits. We show that phase-invariant unitary operators can be implemented exactly with no copies and that phase-invariant states can be prepared exactly with at most $n$ copies each of $\ket{\0}$ and $\ket{\1}$; we give an explicit algorithm for state preparation that is efficient for some classes of states (e.g. symmetric states). We conjecture that certain non-phase-invariant operations are impossible to perform accurately without many copies. Motivated by optical implementations of quantum computers, we define ``quantum computation in a hidden basis'' to mean executing a quantum algorithm with respect to the phase-shifted hidden basis $\{\ketz, e^{i\theta}\keto\}$, for some potentially unknown $\theta$; we give an efficient approximation algorithm for this task, for which we introduce an analogue of a coherent state of light, which serves as a bounded quantum phase reference frame encoding $\theta$. Our motivation was quantum-public-key cryptography, however the techniques are general. We apply our results to quantum-public-key authentication protocols, by showing that a natural class of digital signature schemes for classical messages is insecure. We also give a protocol for identification that uses many of the ideas discussed and whose security relates to our conjecture (but we do not know if it is secure).
Style APA, Harvard, Vancouver, ISO itp.
17

Yevseiev, Serhii, Roman Korolev, Mykhailo Koval, Khazail Rzayev, Oleksandr Voitko, Olena Akhiiezer, Alla Hrebeniuk, Stanislav Milevskyi, Elnur Baghirov i Musa Mammadov. "Development of a method for ensuring confidentiality and authenticity in wireless channels". Eastern-European Journal of Enterprise Technologies 6, nr 9 (120) (30.12.2022): 15–27. http://dx.doi.org/10.15587/1729-4061.2022.268368.

Pełny tekst źródła
Streszczenie:
The object of the research is the development of a method for ensuring the authenticity and integrity of data in wireless channels based on post-quantum cryptosystems. The development of modern digital technologies ensures the transition to smart technologies and the formation of Next Generation Networks. The formation of smart technologies, as a rule, uses wireless communication channel standards IEEE 802.11X, IEEE 802.15.4, IEEE 802.16, which use only authentication protocols and privacy mechanisms, which are formed on symmetric algorithms. In the conditions of the post-quantum period (the advent of a full-scale quantum computer), the stability of such algorithms is questioned. Such systems, as a rule, are formed on the basis of the synthesis of socio-cyber-physical systems and cloud technologies, which simplifies the conduct of Advanced Persistent Threat attacks, both on the internal circuit of execution systems and on external control systems. The creation of multi-circuit information protection systems allows for an objective assessment of the current state of the system as a whole and the formation of preventive measures to counter cyber threats. The proposed method of providing basic security services: confidentiality, integrity and authenticity based on crypto-code constructions takes into account the level of secrecy of information transmitted over wireless channels and/or stored in databases of socio-cyber-physical systems. The use of post-quantum algorithms – McEliece/Niederreiter crypto-code constructions on elliptic/modified elliptic/lossy/Low-density parity-check code provides the necessary level of stability in the post-quantum cryptoperiod (crypto-stability at the level of 1025–1035 group operations), speed and probability of information (Рerr not lower than 10-9–10-12). The proposed method of information exchange using wireless communication channels ensures their practical implementation on resource-limited devices (creating of CCC on the GF field (24–26).
Style APA, Harvard, Vancouver, ISO itp.
18

Gorbenko, I. D., Ye G. Kachko, M. V. Yesina i V. A. Ponomar. "Comparative characteristics of Crystals-Kyber and Skelya key encapsulation algorithms (DSTU 8961-2019)". Radiotekhnika, nr 210 (28.09.2022): 7–21. http://dx.doi.org/10.30837/rt.2022.3.210.01.

Pełny tekst źródła
Streszczenie:
In recent years, there has been a significant amount of research related to the development of quantum computers. If such a computer were to be built, it would be able to break existing public-key cryptosystems that are currently used for many purposes. This will seriously affect the privacy and integrity of digital communications, etc. That is why special attention is currently being paid to post-quantum cryptography, the main goal of which is the development of cryptographic systems that are protected from both quantum and classical attacks, and will also be able to interact with existing communication protocols and networks. In view of the significant importance of the practical application of directional encryption algorithms, at the international and state level, special attention was paid to the implementation of the proposed requirements for key encapsulation protocols. Key-establishment algorithms (KEA) form a common secret – the key for a symmetric encryption algorithm. The paper considers two KEA algorithms that use algebraic lattices: one of the finalists of the 3rd round Crystals-Kyber and the Skelya algorithm (DSTU 8961-2019). The Kyber algorithm first performs asymmetric encryption of a 32-byte message, and then generates a shared secret. The Skelya algorithm performs the same actions, but for asymmetric encryption, it uses messages of any length that do not exceed the maximum possible. That is why the last algorithm can be used not only as a KEA algorithm, but also as an asymmetric encryption algorithm. According to the NIST Security level, the Kyber algorithm provides cryptographic 1, 3, and 5 security levels, and the Rock algorithm provides cryptographic 3, 5, and 7 security levels. The cryptographic stability that is ensured for both algorithms is determined by a set of parameters. Thus, the purpose of this work is to review the details of the implementation of each of the mentioned algorithms, to compare the speed of the key generation, encapsulation and decapsulation algorithms for the Kyber and Skelya algorithms in terms of key data lengths, and the encapsulation result and computational complexity of both algorithms.
Style APA, Harvard, Vancouver, ISO itp.
19

Hahanova, A., V. Hahanov, S. Chumachenko, E. Litvinova i D. Rakhlis. "VECTOR-DRIVEN LOGIC AND STRUCTURE FOR TESTING AND DEDUCTIVE FAULT SIMULATION". Radio Electronics, Computer Science, Control, nr 3 (6.10.2021): 69–85. http://dx.doi.org/10.15588/1607-3274-2021-3-7.

Pełny tekst źródła
Streszczenie:
Context. It is known that data structures are decisive for the creation of efficient parallel algorithms and high-performance computing devices. Therefore, the development of mathematically perfect and technologically simple data structures takes about 80 percent of the design time, when about 20 percent of time and material resources are spent on algorithms and their hardware-software coding. This lead to search for such primitives of data structures that will significantly simplify the parallel high-performance algorithms which are working on them. Models and methods for testing and simulation of digital systems are proposed, which containing certain advantages of quantum computing in terms of implementation of vector qubit data structures in technology of classical computational processes. Objective. The goal of the work is development of an innovative technology for qubit-vector synthesis and deductive analysis of tests for their verification based on vector data structures that greatly simplify algorithms that can be embedded as BIST components in digital systems on chips. Method. The deductive faults simulation is used to obtain analytical expressions focused on transporting fault lists through a functional or logical element based on the xor-operation, which serves as a measure of similarity-difference between a test, a function and faults which is specified in the same way in one of the formats − a table, graph, equation. A binary vector is proposed as the most technologically advanced primitive of data structures for setting logical functionality for the purpose of parallel synthesis and analysis of digital systems. The parallelism of solving combinatorial problems is a physical property of quantum computing, which in classical computing, for parallel simulation and faults diagnostics, is provided by unitary-coded data structures due to excess memory. Results. 1) A method of analytical synthesis of deductive logic for functional elements on the gate level and register transfer level has been developed. 2) A deductive processor for faults simulation based on transporting input lists or faults vectors to external outputs of digital circuits was proposed. 3) The qubit-vector form of logic setting and methods of qubit synthesis of deductive equations for faults simulation were described. 4) A qubit-vector method for the tests’ synthesis which is using derivatives calculated by vector coverage of logic has been developed. 5) Models and methods verification is performed on test examples in the software implementation of structures and algorithms. Conclusions. The scientific novelty lies in the new paradigm of the technology for the synthesis of deductive RTL logic based on metric test equation, which forms the. A vector form for structures description is introduced, which makes it possible to apply wellknown technologies for the synthesis and analysis of logical circuits tests to effectively solve the problems of graph structures testing and state machine models of digital devices. The practical significance is reflected in the examples of analytical synthesis of deductive logic for functional elements on gate level and register transfer level. A deductive processor for faults simulation which is focused on implementation as a BIST tool, which is used in online testing, simulation and fault diagnosis for digital systems on chips is proposed. A qubit-vector form of the digital systems description is proposed, which surpasses the existing methods of computing devices development in terms of the metric: manufacturability, compactness, speed and quality. A software application has been developed that implements the main testing, simulation and diagnostics services which are used in the educational process to study the advantages of qubit-vector data structures and algorithms. The computational complexity of synthesis processes and deductive formulas for logic and their usage in fault simulation are given.
Style APA, Harvard, Vancouver, ISO itp.
20

Raikov, A. N. "Concept of the digital platform for Russian agriculture providing convergence to goals". Informatization and communication 1 (styczeń 2021): 64–73. http://dx.doi.org/10.34219/2078-8320-2021-12-1-64-73.

Pełny tekst źródła
Streszczenie:
The aim of the work is to build a concept of a methodology for creating a national digital agricultural platform. The proposed approach ensures the optimal integration of various design methods in the context of multiple goals and ambitious strategic guidelines. The need to change the paradigm of the traditional direct design of digital platforms with a rigid order of implementation of the stages is shown. Reverse order of integration of the existing approaches is required with output to achieve such strategic goals that deny the possibility of an inertial design path. The stated strategic goals are much higher than the results that could be expected when extrapolating the existing dynamics of indicator values. Inverse decision-making processes are characterized by a non-stable nature of decisions, and, as a consequence, by a plurality of ways to achieve strategic goals. The methodology was built using the architectural approach, artificial intelligence (AI) methods, and the author›s convergent methodology. The latter is based primarily on methods for inverse problems solving on cognitive (conceptual) models and big data analysis to check the completeness and accuracy of the models. for example, by quantum and wave effects. This approach to the construction of the desired methodology made it possible to combine a number of methodological solutions from a wide range of alternatives and create an appropriate hybrid methodology that will provide an accelerated convergence to the outlined strategic goals of the development of the Russian agro-industrial complex.
Style APA, Harvard, Vancouver, ISO itp.
21

В.С., Аверьянов,, Карцан, И.Н. i Аверьянова, Е.В. "CLUSTER APPROACH TO RECYCLING OF HOUSEHOLD SOLID WASTE IN THE COASTAL ZONE OF THE BLACK SEA". Южно-Сибирский научный вестник, nr 6(46) (20.12.2022): 35–40. http://dx.doi.org/10.25699/sssb.2022.46.6.019.

Pełny tekst źródła
Streszczenie:
В данной статье авторами представлены сведения, характеризующие острую нехватку производственных мощностей и отсутствие технологий глубокой переработки твердых бытовых отходов. Указано, что наибольшие опасения вызывает промышленный мусор, который накапливался годами, десятилетиями, и до настоящего времени его объемы только увеличиваются. Отмечено, что сложившаяся в Крыму ситуация создает дополнительные проблемы для региона и увеличивает экологические риски уже сегодня, а запаздывающее развитие «мусорной» отрасли и недостаточное внимание со стороны органов государственной власти не только лишает российскую экономику новых технологичных мощностей, но и ограничивает рынок дополнительных инвестиций со стороны партнеров. Показано, что в соответствии с Государственными программами РФ: «Развитие промышленности и повышение ее конкурентоспособности», Стратегией развития промышленности по обработке, утилизации и обезвреживанию отходов производства и потребления на период до 2030 года, Стратегией экологической безопасности Российской Федерации на период до 2025 года, разработка и реализация проектов по утилизации твердых бытовых отходов являются приоритетным направлением Российской экономики в целом и региональной в частности. В том числе, авторами установлено, что развитие науки и техники, а также коммерческая реализация идей и принципов, основанных на постулатах квантовой механики, физики и оптики в области квантовых вычислений, позволяет применять системы информационной безопасности на базе симметричного шифрования с квантовым распределением ключа (КРК) для каналов связи дистанционного зондирования земной поверхности, где от легитимности данных зависит корректность работы комплекса средств по экологическому мониторингу. Предложена технология взаимодействия с множеством оконечных устройств в виде цифровых абонентов, методом телепортации релятивистских частиц – фотонов в их механическом – кодированном состоянии, свойства которых невозможно подделать без предварительного детектирования в квантовом канале связи. Применение данной технологии возможно не только для обеспечения информационной безопасности при экологическом мониторинге побережья Черного моря и Краснодарского края, но и в тех регионах РФ, где существуют схожие экологические проблемы. In this article, the authors present information characterizing the acute lack of production capacity and the lack of technologies for deep processing of solid household waste. Industrial litter, which has accumulated for years, decades, has been the most feared, and to date, volumes are only increasing, it has been pointed out. It was noted that the situation in the Republic of Crimea creates additional problems for the region and increases environmental risks today, and the lagging development of the "garbage" industry and insufficient attention from state authorities not only deprives the Russian economy of new technological capacities, but also limits the market for additional investments from partner countries. It is shown that in accordance with the State programs of the Russian Federation: "Development of industry and increasing its competitiveness", the Strategy for the development of industry for the treatment, disposal and disposal of production and consumption waste for the period up to 2030, The Environmental Safety Strategy of the Russian Federation for the period up to 2025, the development and implementation of projects for the disposal of domestic waste are a priority area of the Russian economy in general and regional in particular. In particular, the authors found that the development of science and technology, as well as the commercial implementation of ideas and principles based on the postulates of quantum mechanics, physics and optics in the field of quantum computing, allows the use of information security systems based on symmetric encryption with quantum key distribution (KRK) for communication channels for remote sensing of the earth's surface, where the correctness of the environmental monitoring complex depends on the legitimacy of the data. Disclosed is a technology of interacting with a plurality of terminal devices in the form of digital subscribers by teleportation in an encoded state of relativistic particles - photons whose properties cannot be forged without preliminary detection in quantum communication channel. The use of this technology is possible not only to ensure information security during environmental monitoring of the Black Sea coast and the Krasnodar Territory, but also in those regions of the Russian Federation where such environmental problems exist.
Style APA, Harvard, Vancouver, ISO itp.
22

Kassen, Maxat. "Building digital state". Online Information Review 43, nr 2 (8.04.2019): 301–23. http://dx.doi.org/10.1108/oir-03-2018-0100.

Pełny tekst źródła
Streszczenie:
Purpose The purpose of this paper is to review and illustrate historical milestones and evolutionary stages of public sector reforms in such a typical transitional society as Kazakhstan through the prism of existing e-government development strategies, implementation models and institutional regulations. Design/methodology/approach The research is mostly based on a retrospective analysis of technology-driven public sector reforms and content analysis of various e-government strategies and platforms implemented by national and local executive authorities in Kazakhstan for the last two decades. Findings The results of the analysis has confirmed previously made assumptions that typical developing states tend to adopt different non-linear and multidimensional implementation strategies in advancing e-government reforms in comparison with developed countries. As it turns out, the continuity of actual stages or levels of such development not always corresponds in a consecutive manner to the formal phases of the most popular e-government maturity models proposed previously in academic literature. Research limitations/implications One of the fundamental limitations of the case study is that its findings and recommendations could relate only to a limited number of countries that have similar political, socioeconomic and administrative contexts. Taking into account the fact that Kazakhstan is not only a typical developing economy but also a transitional post-communist and post-totalitarian society that has its own unique political and socioeconomic features of governance, the results of case study could not be generalized and extrapolated to all developing countries, presumably narrowing them only to a very limited number of similar states, mostly, in Eastern Europe, Caucasus and Central Asia. Practical implications The main practical contribution of the article is that it provides a close review of e-government politics in Kazakhstan that could be helpful for policy makers and practitioners in evaluating, learning and improving the work of various technology-driven public sector projects in the area, especially from a regulatory point of view. Originality/value This inherently ethnographic narrative, which is based on the analysis of e-government legislation and implementation strategies derived from diverse administrative practices, could be interesting for those who seek to understand an ever-changing truly evolutionary nature of technology-driven public sector reforms in a typical transitional society.
Style APA, Harvard, Vancouver, ISO itp.
23

J. VAN ENK , J. I. CIRAC , P. ZOLLE, S. "Quantum state transfer in a quantum network: a quantum-optical implementation". Journal of Modern Optics 44, nr 10 (1.10.1997): 1727–36. http://dx.doi.org/10.1080/095003497152762.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Van Enk, S. J., J. I. Cirac, P. Zoller, H. J. Kimble i H. Mabuchi. "Quantum state transfer in a quantum network: A quantum-optical implementation". Journal of Modern Optics 44, nr 10 (październik 1997): 1727–36. http://dx.doi.org/10.1080/09500349708231842.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Glad, S. T. "Generalized State Space Descriptions and Digital Implementation". IFAC Proceedings Volumes 25, nr 13 (czerwiec 1992): 149–52. http://dx.doi.org/10.1016/s1474-6670(17)52273-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Kachko, Olena, i Serhiy Kandiy. "Research of expediency of application of AVX512 for modern digital signature schemes implementations". Physico-mathematical modelling and informational technologies, nr 32 (8.07.2021): 141–45. http://dx.doi.org/10.15407/fmmit2021.32.141.

Pełny tekst źródła
Streszczenie:
The third stage of the NIST PQC competition is currently underway, which aims to create new post-quantum standards in cryptography. The vast majority of finalists are representatives of lattice-based cryptography. Electronic signatures include the CRYSTALS-Dilithium schemes. This paper investigates the feasibility of using AVX512 to optimize software implementations of NIST PQC finalists among electronic signatures on algebraic lattices. Since the most expensive operation in such schemes is the multiplication of polynomials, the main attention is paid to the optimization of this operation. In particular, the method of realization of theoretical and numerical transformation using AVX512 for electronic signature schemes CRYSTALS-Dilithium is presented in the work. The increase in speed is shown in comparison with the reference optimized author 's implementations.
Style APA, Harvard, Vancouver, ISO itp.
27

Magnoni, A. G., J. H. López Grande i M. A. Larotonda. "Free Space Decoy-state Quantum Key Distribution Implementation". Optica Pura y Aplicada 50, nr 2 (30.06.2017): 187–92. http://dx.doi.org/10.7149/opa.50.2.49045.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Ding, Yongcheng, Yue Ban i Xi Chen. "Towards Quantum Control with Advanced Quantum Computing: A Perspective". Entropy 24, nr 12 (29.11.2022): 1743. http://dx.doi.org/10.3390/e24121743.

Pełny tekst źródła
Streszczenie:
We propose the combination of digital quantum simulation and variational quantum algorithms as an alternative approach to numerical methods for solving quantum control problems. As a hybrid quantum–classical framework, it provides an efficient simulation of quantum dynamics compared to classical algorithms, exploiting the previous achievements in digital quantum simulation. We analyze the trainability and the performance of such algorithms based on our preliminary works. We show that specific quantum control problems, e.g., finding the switching time for bang-bang control or the digital quantum annealing schedule, can already be studied in the noisy intermediate-scale quantum era. We foresee that these algorithms will contribute even more to quantum control of high precision if the hardware for experimental implementation is developed to the next level.
Style APA, Harvard, Vancouver, ISO itp.
29

Chen, Jia-Ming, Hao Zhang, Xing-Yu Zhou, Chun-Mei Zhang i Qin Wang. "Practical decoy-state quantum digital signature with optimized parameters". Physica A: Statistical Mechanics and its Applications 535 (grudzień 2019): 122341. http://dx.doi.org/10.1016/j.physa.2019.122341.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Tawfik, A., F. El-Guibaly i P. Agathoklis. "Systolic implementation of fixed-point state-space digital filter". IEE Proceedings - Circuits, Devices and Systems 142, nr 3 (1995): 193. http://dx.doi.org/10.1049/ip-cds:19951946.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Savić, Goran, Milan Prokin, Vladimir Rajović i Dragana Prokin. "Digital Image Decoder for Efficient Hardware Implementation". Sensors 22, nr 23 (1.12.2022): 9393. http://dx.doi.org/10.3390/s22239393.

Pełny tekst źródła
Streszczenie:
Increasing the resolution of digital images and the frame rate of video sequences leads to an increase in the amount of required logical and memory resources necessary for digital image and video decompression. Therefore, the development of new hardware architectures for digital image decoder with a reduced amount of utilized logical and memory resources become a necessity. In this paper, a digital image decoder for efficient hardware implementation, has been presented. Each block of the proposed digital image decoder has been described. Entropy decoder, decoding probability estimator, dequantizer and inverse subband transformer (parts of the digital image decoder) have been developed in such way which allows efficient hardware implementation with reduced amount of utilized logic and memory resources. It has been shown that proposed hardware realization of inverse subband transformer requires 20% lower memory capacity and uses less logic resources compared with the best state-of-the-art realizations. The proposed digital image decoder has been implemented in a low-cost FPGA device and it has been shown that it requires at least 32% less memory resources in comparison to the other state-of-the-art decoders which can process high-definition frame size. The proposed solution also requires effectively lower memory size than state-of-the-art architectures which process frame size or tile size smaller than high-definition size. The presented digital image decoder has maximum operating frequency comparable with the highest maximum operating frequencies among the state-of-the-art solutions.
Style APA, Harvard, Vancouver, ISO itp.
32

Savoskin, A. V., i N. A. Rozhkova. "Digitalisation of state companies". Digital Law Journal 2, nr 1 (22.04.2021): 83–93. http://dx.doi.org/10.38044/2686-9136-2021-2-1-83-93.

Pełny tekst źródła
Streszczenie:
The article analyzes the legal acts that regulate public relations regarding the digital transformation of tate corporations and companies with state participation. The economic and managerial directions of reform of the highest priority are established. The article describes the goals of the digital transformation of a state-owned company, including: creating a target business model, a system of goals and key performance indicators of digital transformation, and determining a digital transformation strategy. Special attention is paid to the development and implementation of initiatives for the implementation of digital infrastructure; the development of digital solutions providers; organizational activities within the framework of digital transformation; measures for programmed import substitution; and measures to ensure information security within the framework of digital transformation. Considering independent directions the digital transformation of state-owned companies can take, one such is the improvement of the “quality” of the staff and the formation of a culture of digital transformation. The article highlights such areas of work as: the creation of a model of digital competencies and the staffing of digital transformation within a state company; an assessment of the need for employees with special competence; teaching digital skills; the development of employees’ digital competencies within a state company; digital workforce management; and planning and holding an event to develop digital culture and the information security culture of a state company. In conclusion, it is determined that the proposed areas of the digitalization of state-owned companies are universal. It is suggested that these recommendations be used in relation to other organizations (primarily private).
Style APA, Harvard, Vancouver, ISO itp.
33

Chen, Bing, Shuo Li, Xianfei Hou, Feifei Ge, Feifei Zhou, Peng Qian, Feng Mei, Suotang Jia, Nanyang Xu i Heng Shen. "Digital quantum simulation of Floquet topological phases with a solid-state quantum simulator". Photonics Research 9, nr 1 (24.12.2020): 81. http://dx.doi.org/10.1364/prj.404163.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Mourokh, Lev, Pavel Ivanushkin i Jonathan Bird. "Localized State in Quantum Point Contacts: Possible Qubit Implementation?" Journal of Computational and Theoretical Nanoscience 8, nr 3 (1.03.2011): 391–400. http://dx.doi.org/10.1166/jctn.2011.1703.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Ikuta, Takuya, i Hiroki Takesue. "Implementation of quantum state tomography for time-bin qudits". New Journal of Physics 19, nr 1 (30.01.2017): 013039. http://dx.doi.org/10.1088/1367-2630/aa5571.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Alagic, Gorjan, Tommaso Gagliardoni i Christian Majenz. "Can you sign a quantum state?" Quantum 5 (16.12.2021): 603. http://dx.doi.org/10.22331/q-2021-12-16-603.

Pełny tekst źródła
Streszczenie:
Cryptography with quantum states exhibits a number of surprising and counterintuitive features. In a 2002 work, Barnum et al. argue that these features imply that digital signatures for quantum states are impossible (Barnum et al., FOCS 2002). In this work, we ask: can all forms of signing quantum data, even in a possibly weak sense, be completely ruled out? We give two results which shed significant light on this basic question.First, we prove an impossibility result for digital signatures for quantum data, which extends the result of Barnum et al. Specifically, we show that no nontrivial combination of correctness and security requirements can be fulfilled, beyond what is achievable simply by measuring the quantum message and then signing the outcome. In other words, only classical signature schemes exist.We then show a positive result: a quantum state can be signed with the same security guarantees as classically, provided that it is also encrypted with the public key of the intended recipient. Following classical nomenclature, we call this notion quantum signcryption. Classically, signcryption is only interesting if it provides superior performance to encypt-then-sign. Quantumly, it is far more interesting: it is the only signing method available. We develop "as-strong-as-classical" security definitions for quantum signcryption and give secure constructions based on post-quantum public-key primitives. Along the way, we show that a natural hybrid method of combining classical and quantum schemes can be used to "upgrade" a secure classical scheme to the fully-quantum setting, in a wide range of cryptographic settings including signcryption, authenticated encryption, and CCA security.
Style APA, Harvard, Vancouver, ISO itp.
37

Vandersypen, Lieven. "(Digital Presentation) Quantum Computing in Si/Sige Quantum Dot Arrays". ECS Meeting Abstracts MA2022-02, nr 32 (9.10.2022): 1205. http://dx.doi.org/10.1149/ma2022-02321205mtgabs.

Pełny tekst źródła
Streszczenie:
Quantum computation has captivated the minds of many for almost two decades. For much of that time, it was seen mostly as an extremely interesting scientific problem. In the last few years, we have entered a new phase as the belief has grown that a large-scale quantum computer can actually be built. Quantum bits encoded in the spin state of individual electrons in Si/SiGe quantum dot arrays, have emerged as a highly promising direction. Recent highlights from our group include the operation of a device with six quantum bits and the demonstration of quantum operations with a fidelity above 99.5%. In this talk, I will present our vision of a large-scale spin-based quantum processor, and ongoing work to realize this vision.
Style APA, Harvard, Vancouver, ISO itp.
38

Zhao, Yujing, Xiongwen Chen, Zhengang Shi, Fang Zhou, Shaohua Xiang i Kehui Song. "Implementation of One-Way Quantum Computing with a Hybrid Solid-State Quantum System". Chinese Journal of Electronics 26, nr 1 (1.01.2017): 27–34. http://dx.doi.org/10.1049/cje.2016.11.004.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Liu, Wei Yue. "Implementation of Reconciliation Protocol Based on DSP". Applied Mechanics and Materials 598 (lipiec 2014): 682–85. http://dx.doi.org/10.4028/www.scientific.net/amm.598.682.

Pełny tekst źródła
Streszczenie:
Reconciliation protocol is used in quantum key distribution to remove residual errors in qubits distilled through quantum channel. This paper introduces the implementation of reconciliation protocol in Digital Signal Processor. Memory required by the implementation is only 96K bytes. TI TMS2812 with 128K bytes off-chip memory is used for the implementation and the performance evaluation is carried out.
Style APA, Harvard, Vancouver, ISO itp.
40

Batyrbekova, Maiya. "MANAGEMENT RISKS OF DIGITAL DEVELOPMENT STRATEGY IMPLEMENTATION". Kazakhstan-Spectrum 99, nr 3 (15.09.2021): 80–90. http://dx.doi.org/10.52536/2415-8216.2021-3.06.

Pełny tekst źródła
Streszczenie:
Risk management is becoming a key area of expertise of IT projects, particularly for projects in which directly or indirectly take part a significant number of natural and legal entities, representatives of state agencies and authorities.The main risks of multifunctional IT projects and management practices are shown in the present article.
Style APA, Harvard, Vancouver, ISO itp.
41

Cahlikova, Tereza, i Pirmin Bundi. "Managing the Rise of the Digital State: Implementation of Digital Education by Local Government". Swiss Yearbook of Administrative Sciences 11, nr 1 (2020): 145–57. http://dx.doi.org/10.5334/ssas.144.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Cui, Xiaopeng, i Yu Shi. "Trotter errors in digital adiabatic quantum simulation of quantum ℤ2 lattice gauge theory". International Journal of Modern Physics B 34, nr 30 (19.08.2020): 2050292. http://dx.doi.org/10.1142/s0217979220502926.

Pełny tekst źródła
Streszczenie:
Trotter decomposition is the basis of the digital quantum simulation. Asymmetric and symmetric decompositions are used in our GPU demonstration of the digital adiabatic quantum simulations of (2[Formula: see text]+[Formula: see text]1)-dimensional quantum [Formula: see text] lattice gauge theory. The actual errors in Trotter decompositions are investigated as functions of the coupling parameter and the number of Trotter substeps in each step of the variation of coupling parameter. The relative error of energy is shown to be equal to the Trotter error usually defined in terms of the evolution operators. They are much smaller than the order-of-magnitude estimation. The error in the symmetric decomposition is much smaller than that in the asymmetric decomposition. The features of the Trotter errors obtained here are useful in the experimental implementation of digital quantum simulation and its numerical demonstration.
Style APA, Harvard, Vancouver, ISO itp.
43

Phalak, Poonam, Emanuele Tomba, Philippe Jehoulet, André Kapitan-Gnimdu, Pablo Martin Soladana, Loredana Vagaggini, Maxime Brochier i in. "Digital Twin Implementation for Manufacturing of Adjuvants". Processes 11, nr 6 (3.06.2023): 1717. http://dx.doi.org/10.3390/pr11061717.

Pełny tekst źródła
Streszczenie:
Pharmaceutical manufacturing processes are moving towards automation and real-time process monitoring with the help of process analytical technologies (PATs) and predictive process models representing the real system. In this paper, we present a digital twin developed for an adjuvant manufacturing process involving a microfluidic formation of lipid particles. The twin uses a hybrid model for estimating the current state of the process and predicting system behavior in real time. The twin is used to control the adjuvant particle size, a critical quality attribute, by varying process parameters such as the temperature and inlet flow rates. We describe steps in the design and implementation of the twin, starting from the conception of the mechanistic model, up to the generation of its surrogate model used as state estimator, PATs and the setup of the information technology—Operational technology architecture. We demonstrate the performance of the twin by introducing different disturbances in the process and comparing the effect on the product critical quality attributes with and without the control of the digital twin. Finally, we showcase the digital twin implementation for the process in good manufacturing practice, through an engineering run, which demonstrated the robustness of the process when controlled by the digital twin.
Style APA, Harvard, Vancouver, ISO itp.
44

Kodaneva, Svetlana. "DIGITAL GOVERNMENT: THE STATE AS A PLATFORM". Pravovedenie IAZH, nr 3 (2022): 8–20. http://dx.doi.org/10.31249/rgpravo/2022.03.01.

Pełny tekst źródła
Streszczenie:
Under the influence of rapidly developing digital technologies, large-scale transformations are taking place today not only in the technological, but also in the social spheres. This poses serious challenges to the state, which will be adequately answered only by the digital transformation of public administration. However, the implementation of the concept of turning the state into a digital platform today faces a number of obstacles and risks that need to be taken into account.
Style APA, Harvard, Vancouver, ISO itp.
45

ARAUJO-FERREIRA, A. G., C. A. BRASIL, D. O. SOARES-PINTO, E. R. DEAZEVEDO, T. J. BONAGAMBA i J. TELES. "QUANTUM STATE TOMOGRAPHY AND QUANTUM LOGICAL OPERATIONS IN A THREE QUBITS NMR QUADRUPOLAR SYSTEM". International Journal of Quantum Information 10, nr 02 (marzec 2012): 1250016. http://dx.doi.org/10.1142/s0219749912500165.

Pełny tekst źródła
Streszczenie:
In this work, we present an implementation of quantum logic gates and algorithms in a three effective qubits system, represented by a (I = 7/2) NMR quadrupolar nuclei. To implement these protocols we have used the strong modulating pulses (SMP) and the various stages of each implementation were verified by quantum state tomography (QST). The results for the computational base states, Toffolli logic gates, and Deutsch–Jozsa and Grover algorithms are presented here. Also, we discuss the difficulties and advantages of implementing such protocols using the SMP technique in quadrupolar systems.
Style APA, Harvard, Vancouver, ISO itp.
46

Tsai, Edison, i Marek Perkowski. "A quantum algorithm for automata encoding". Facta universitatis - series: Electronics and Energetics 33, nr 2 (2020): 169–215. http://dx.doi.org/10.2298/fuee2002169t.

Pełny tekst źródła
Streszczenie:
Encoding of finite automata or state machines is critical to modern digital logic design methods for sequential circuits. Encoding is the process of assigning to every state, input value, and output value of a state machine a binary string, which is used to represent that state, input value, or output value in digital logic. Usually, one wishes to choose an encoding that, when the state machine is implemented as a digital logic circuit, will optimize some aspect of that circuit. For instance, one might wish to encode in such a way as to minimize power dissipation or silicon area. For most such optimization objectives, no method to find the exact solution, other than a straightforward exhaustive search, is known. Recent progress towards producing a quantum computer of large enough scale to surpass modern supercomputers has made it increasingly relevant to consider how quantum computers may be used to solve problems of practical interest. A quantum computer using Grover?s well-known search algorithm can perform exhaustive searches that would be impractical on a classical computer, due to the speedup provided by Grover?s algorithm. Therefore, we propose to use Grover?s algorithm to find optimal encodings for finite state machines via exhaustive search. We demonstrate the design of quantum circuits that allow Grover?s algorithm to be used for this purpose. The quantum circuit design methods that we introduce are potentially applicable to other problems as well.
Style APA, Harvard, Vancouver, ISO itp.
47

STEEB, WILLI-HANS, i YORICK HARDY. "ENTANGLED QUANTUM STATES AND A C++ IMPLEMENTATION". International Journal of Modern Physics C 11, nr 01 (luty 2000): 69–77. http://dx.doi.org/10.1142/s0129183100000079.

Pełny tekst źródła
Streszczenie:
Entangled quantum states are an important component of quantum computing techniques such as quantum error-correction, dense coding and quantum teleportation. We determine the requirements for a state in the Hilbert space C4 to be entangled and a solution to the corresponding "factorization" problem if this is not the case. The factorization of nonentangled states is implemented in C++.
Style APA, Harvard, Vancouver, ISO itp.
48

Mogos, Gabriela. "Quantum Key Distribution Protocol with Four-State Systems – Software Implementation". Procedia Computer Science 54 (2015): 65–72. http://dx.doi.org/10.1016/j.procs.2015.06.008.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Zhang, Xu, Wenjie Jiang, Jinfeng Deng, Ke Wang, Jiachen Chen, Pengfei Zhang, Wenhui Ren i in. "Digital quantum simulation of Floquet symmetry-protected topological phases". Nature 607, nr 7919 (20.07.2022): 468–73. http://dx.doi.org/10.1038/s41586-022-04854-3.

Pełny tekst źródła
Streszczenie:
AbstractQuantum many-body systems away from equilibrium host a rich variety of exotic phenomena that are forbidden by equilibrium thermodynamics. A prominent example is that of discrete time crystals1–8, in which time-translational symmetry is spontaneously broken in periodically driven systems. Pioneering experiments have observed signatures of time crystalline phases with trapped ions9,10, solid-state spin systems11–15, ultracold atoms16,17 and superconducting qubits18–20. Here we report the observation of a distinct type of non-equilibrium state of matter, Floquet symmetry-protected topological phases, which are implemented through digital quantum simulation with an array of programmable superconducting qubits. We observe robust long-lived temporal correlations and subharmonic temporal response for the edge spins over up to 40 driving cycles using a circuit of depth exceeding 240 and acting on 26 qubits. We demonstrate that the subharmonic response is independent of the initial state, and experimentally map out a phase boundary between the Floquet symmetry-protected topological and thermal phases. Our results establish a versatile digital simulation approach to exploring exotic non-equilibrium phases of matter with current noisy intermediate-scale quantum processors21.
Style APA, Harvard, Vancouver, ISO itp.
50

Ari Setiyani, Theresia Prima, i Yohanes Suyanto. "Implementasi Reduksi Keadaan Rangkaian Digital Sekuensial Metode Bagan Implikasi". Jurnal Tekno 16, nr 2 (29.10.2019): 23–34. http://dx.doi.org/10.33557/jtekno.v16i1.622.

Pełny tekst źródła
Streszczenie:
The implementation of state reduction in sequential digital circuits is made for learning the topic of state reduction. The method used for state reduction is an implication chart. This method starts with reading the transition table state and transfered into the array structure. Based on this array structure a table or chart of initial implications is arranged. The next process is to change the contents of the table if there are cells that meet the requirements to be declared as identical or not identical. This process is repeated continuously until there is no change in cell contents. The state of reduction implementation is made using the Python programming language and PHP. The results of the implementation are successful for the state transition table with 1 input and 1 output.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii