Showing 901 - 920 results of 1,111 for search '"Quantum computing"', query time: 0.11s Refine Results
  1. 901

    High-purity single-photon generation based on cavity QED by Seigo Kikura, Rui Asaoka, Masato Koashi, Yuuki Tokunaga

    Published 2025-03-01
    “…Our scheme can contribute to developing distributed quantum computation or quantum communication with high accuracy.…”
    Get full text
    Article
  2. 902

    Limitations for Quantum Algorithms to Solve Turbulent and Chaotic Systems by Dylan Lewis, Stephan Eidenbenz, Balasubramanya Nadiga, Yiğit Subaşı

    Published 2024-10-01
    “…We investigate the limitations of quantum computers for solving nonlinear dynamical systems. …”
    Get full text
    Article
  3. 903

    Quantum Dot Phase Transition Simulation with Hybrid Quantum Annealing via Metropolis-Adjusted Stochastic Gradient Langevin Dynamics by Shiba Kodai, Ryo Sugiyama, Koichi Yamaguchi, Tomah Sogabe

    Published 2022-01-01
    “…Our work demonstrates for the first time the feasibility of hybridizing quantum computation with classical Langevin dynamics for the analysis of carrier dynamics and quantum phase transition of the quantum dot.…”
    Get full text
    Article
  4. 904

    Multipartite entanglement distribution in a topological photonic network by Juan Zurita, Andrés Agustí Casado, Charles E. Creffield, Gloria Platero

    Published 2025-02-01
    “…In the ongoing effort towards a scalable quantum computer, multiple technologies have been proposed. …”
    Get full text
    Article
  5. 905
  6. 906

    Infinite-Dimensional Quantum Entropy: The Unified Entropy Case by Roman Gielerak, Joanna Wiśniewska, Marek Sawerwain

    Published 2024-12-01
    “…Infinite-dimensional systems play an important role in the continuous-variable quantum computation model, which can compete with a more standard approach based on qubit and quantum circuit computation models. …”
    Get full text
    Article
  7. 907

    Extracting randomness from magic quantum states by Christopher Vairogs, Bin Yan

    Published 2025-06-01
    “…Magic quantum states (nonstabilizer states) play a pivotal role in fault-tolerant quantum computation. Simultaneously, random resources have emerged as a key element in various randomized techniques within contemporary quantum science. …”
    Get full text
    Article
  8. 908

    Erbium emitters in commercially fabricated nanophotonic silicon waveguides by Rinner Stephan, Burger Florian, Gritsch Andreas, Schmitt Jonas, Reiserer Andreas

    Published 2023-07-01
    “…Quantum memories integrated into nanophotonic silicon devices are a promising platform for large quantum networks and scalable photonic quantum computers. In this context, erbium dopants are particularly attractive, as they combine optical transitions in the telecommunications frequency band with the potential for second-long coherence time. …”
    Get full text
    Article
  9. 909
  10. 910

    Quantum approximated cloning-assisted density matrix exponentiation by Pablo Rodriguez-Grasa, Ruben Ibarrondo, Javier Gonzalez-Conde, Yue Ban, Patrick Rebentrost, Mikel Sanz

    Published 2025-03-01
    “…In particular, the embedding techniques based on Hamiltonian simulation techniques enable the loading of matrices into quantum computers. A representative example of these methods is the Lloyd-Mohseni-Rebentrost (LMR) protocol, which efficiently implements matrix exponentiation when multiple copies of a quantum state are available. …”
    Get full text
    Article
  11. 911

    Fast Mixing of Weakly Interacting Fermionic Systems at Any Temperature by Yu Tong, Yongtao Zhan

    Published 2025-07-01
    “…This leads to a mixing time estimate that is at most linear in the system size, thus showing that the corresponding Gibbs states can be prepared efficiently on quantum computers. Our result also implies exponential decay of correlation in these Gibbs states and efficient learnability of their properties.…”
    Get full text
    Article
  12. 912

    Nanodevices - Editorial by Nezih Pala

    Published 2016-01-01
    “…With their inherently advantageous properties, nanoscale materials and devices have already been used in numerous applications in diverse fields, including but not limited to bio/chemical sensing, imaging, displaying, quantum computation, communication, energy harvesting and storage, environ‐ mental protection, brain-machine interfaces, neural stimulation and prosthetics, theranostics and artificial organs.…”
    Get full text
    Article
  13. 913

    INNOVATIVE MECHANISMS FOR IMPLEMENTING STATE ECONOMIC POLICY FOR POST-WAR RECONSTRUCTION OF UKRAINE: QUANTUM TRANSFORMATIONS AS A DRIVER OF DEVELOPMENT by Oleksiy Shkuratov, Liudmila Antonova, Roman Dzyuba

    Published 2024-12-01
    “…The second quantum revolution involves the introduction of quantum computers, quantum cryptography and quantum communication, capable of accelerating the development of new materials, optimizing logistics chains and increasing the level of data security. …”
    Get full text
    Article
  14. 914

    Fisher and Shannon information entropies in 2-dimension for a non-central potential as applied to hydrogen diatomic molecules by W.L. Chen, I.B. Okon, C.A. Onate, C.N. Isonguyo, S.A. Ekong, J.P. Araujo, Abeer E. Aly, A.O. Anna, E.S. William, E.P. Inyang, K.O. Emeje, K.R. Purohit

    Published 2025-08-01
    “…Additionally, the study contributes to quantum information by offering insights into the localisation and delocalisation phenomena, with direct applications to quantum computation, entanglement, and communication technologies.…”
    Get full text
    Article
  15. 915

    Application of Algorithms on Lattices in Post-Quantum Cryptography by Nikolai Urban, Elena Melnikova

    Published 2024-03-01
    “…The article analyzes approaches to the development of post-quantum algorithms, reviews progress in the field of quantum computers and post-quantum cryptographic encryption systems. …”
    Get full text
    Article
  16. 916

    Demonstration of Weighted-Graph Optimization on a Rydberg-Atom Array Using Local Light Shifts by A. G. de Oliveira, E. Diamond-Hitchcock, D. M. Walker, M. T. Wells-Pestell, G. Pelegrí, C. J. Picken, G. P. A. Malcolm, A. J. Daley, J. Bass, J. D. Pritchard

    Published 2025-01-01
    “…Neutral-atom arrays have emerged as a versatile platform toward scalable quantum computation and optimization. In this paper, we present demonstrations of solving maximum-weighted independent-set problems on a Rydberg-atom array using annealing with local light shifts. …”
    Get full text
    Article
  17. 917

    Physical implementability for reversible magic state manipulation by Yu-Ao Chen, Gilad Gour, Xin Wang, Lei Zhang, Chenghong Zhu

    Published 2025-01-01
    “…Abstract Magic states are essential for achieving universal quantum computation, yet the reversibility and efficiency of exact magic state manipulations remain less explored. …”
    Get full text
    Article
  18. 918

    Light-induced quantum tunnelling current in graphene by Mohamed Sennary, Jalil Shah, Mingrui Yuan, Ahmed Mahjoub, Vladimir Pervak, Nikolay V. Golubev, Mohammed Th. Hassan

    Published 2025-05-01
    “…The reported approach under ambient conditions is suitable for the development of petahertz optical transistors, lightwave electronics, and optical quantum computers.…”
    Get full text
    Article
  19. 919

    Topological rejection of noise by quantum skyrmions by Pedro Ornelas, Isaac Nape, Robert de Mello Koch, Andrew Forbes

    Published 2025-03-01
    “…Our approach holds exciting promise for intrinsic quantum information resilience through topology, highly applicable to real-world systems such as global quantum networks and noisy quantum computers.…”
    Get full text
    Article
  20. 920

    Combating Fake News with Cryptography in Quantum Era with Post-Quantum Verifiable Image Proofs by Maksim Iavich

    Published 2025-06-01
    “…To address this challenge, we introduce Post-Quantum VerITAS, a cryptographic framework for verifying the authenticity and history of digital images—even in a future where quantum computers threaten classical encryption. Our system supports common image edits, like cropping or resizing, while proving that the image is derived from a legitimate, signed source. …”
    Get full text
    Article