Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (170)
  • Open Access

    ARTICLE

    Role-Based Network Embedding via Quantum Walk with Weighted Features Fusion

    Mingqiang Zhou*, Mengjiao Li, Zhiyuan Qian, Kunpeng Li

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2443-2460, 2023, DOI:10.32604/cmc.2023.038675

    Abstract Role-based network embedding aims to embed role-similar nodes into a similar embedding space, which is widely used in graph mining tasks such as role classification and detection. Roles are sets of nodes in graph networks with similar structural patterns and functions. However, the role-similar nodes may be far away or even disconnected from each other. Meanwhile, the neighborhood node features and noise also affect the result of the role-based network embedding, which are also challenges of current network embedding work. In this paper, we propose a Role-based network Embedding via Quantum walk with weighted Features fusion (REQF), which simultaneously considers… More >

  • Open Access

    ARTICLE

    Near Term Hybrid Quantum Computing Solution to the Matrix Riccati Equations

    Augusto González Bonorino1,*, Malick Ndiaye2, Casimer DeCusatis2

    Journal of Quantum Computing, Vol.4, No.3, pp. 135-146, 2022, DOI:10.32604/jqc.2022.036706

    Abstract The well-known Riccati differential equations play a key role in many fields, including problems in protein folding, control and stabilization, stochastic control, and cybersecurity (risk analysis and malware propagation). Quantum computer algorithms have the potential to implement faster approximate solutions to the Riccati equations compared with strictly classical algorithms. While systems with many qubits are still under development, there is significant interest in developing algorithms for near-term quantum computers to determine their accuracy and limitations. In this paper, we propose a hybrid quantum-classical algorithm, the Matrix Riccati Solver (MRS). This approach uses a transformation of variables to turn a set… More >

  • Open Access

    ARTICLE

    Design of a Novel Signed Binary Subtractor Using Quantum Gates

    Arindam Banerjee1,*, Aniruddha Ghosh2, Mainuck Das2

    Journal of Quantum Computing, Vol.4, No.3, pp. 121-133, 2022, DOI:10.32604/jqc.2022.034059

    Abstract In this paper, focus has been given to design and implement signed binary subtraction in quantum logic. Since the type of operand may be positive or negative, therefore a novel algorithm has been developed to detect the type of operand and as per the selection of the type of operands, separate design techniques have been developed to make the circuit compact and work very efficiently. Two separate methods have been shown in the paper to perform the signed subtraction. The results show promising for the second method in respect of ancillary input count and garbage output count but at the… More >

  • Open Access

    ARTICLE

    QBFO-BOMP Based Channel Estimation Algorithm for mmWave Massive MIMO Systems

    Xiaoli Jing, Xianpeng Wang*, Xiang Lan, Ting Su

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1789-1804, 2023, DOI:10.32604/cmes.2023.028477

    Abstract At present, the traditional channel estimation algorithms have the disadvantages of over-reliance on initial conditions and high complexity. The bacterial foraging optimization (BFO)-based algorithm has been applied in wireless communication and signal processing because of its simple operation and strong self-organization ability. But the BFO-based algorithm is easy to fall into local optimum. Therefore, this paper proposes the quantum bacterial foraging optimization (QBFO)-binary orthogonal matching pursuit (BOMP) channel estimation algorithm to the problem of local optimization. Firstly, the binary matrix is constructed according to whether atoms are selected or not. And the support set of the sparse signal is recovered… More >

  • Open Access

    ARTICLE

    NTRU_ SSS: Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing

    Asma Ibrahim Hussein1,*, Abeer Tariq MaoLood2, Ekhlas Khalaf Gbashi2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 753-769, 2023, DOI:10.32604/cmc.2023.039804

    Abstract With the advent of quantum computing, numerous efforts have been made to standardize post-quantum cryptosystems with the intention of (eventually) replacing Elliptic Curve Cryptography (ECC) and Rivets-Shamir-Adelman (RSA). A modified version of the traditional N-Th Degree Truncated Polynomial Ring (NTRU) cryptosystem called NTRU Prime has been developed to reduce the attack surface. In this paper, the Signcryption scheme was proposed, and it is most efficient than others since it reduces the complexity and runs the time of the code execution, and at the same time, provides a better security degree since it ensures the integrity of the sent message, confidentiality… More >

  • Open Access

    ARTICLE

    Quantum-Enhanced Blockchain: A Secure and Practical Blockchain Scheme

    Ang Liu1,2, Xiu-Bo Chen1,*, Gang Xu3, Zhuo Wang4, Xuefen Feng5, Huamin Feng6

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 259-277, 2023, DOI:10.32604/cmc.2023.039397

    Abstract The rapid advancement of quantum technology poses significant security risks to blockchain systems. However, quantum technology can also provide solutions for enhancing blockchain security. In this paper, we propose a quantum-enhanced blockchain scheme to achieve a high level of security against quantum computing attacks. We first discuss quantum computing attacks on classic blockchains, including attacks on hash functions, digital signatures, and consensus mechanisms. We then introduce quantum technologies, such as a quantum hash function (QHF), a quantum digital signature (QDS), and proof of authority (PoA) consensus mechanism, into our scheme to improve the security of the blockchain system. Our security… More >

  • Open Access

    ARTICLE

    Blockchain Privacy Protection Based on Post Quantum Threshold Algorithm

    Faguo Wu1,2,3,4,*, Bo Zhou2, Jie Jiang5, Tianyu Lei1, Jiale Song1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 957-973, 2023, DOI:10.32604/cmc.2023.038771

    Abstract With the rapid increase in demand for data trustworthiness and data security, distributed data storage technology represented by blockchain has received unprecedented attention. These technologies have been suggested for various uses because of their remarkable ability to offer decentralization, high autonomy, full process traceability, and tamper resistance. Blockchain enables the exchange of information and value in an untrusted environment. There has been a significant increase in attention to the confidentiality and privacy preservation of blockchain technology. Ensuring data privacy is a critical concern in cryptography, and one of the most important protocols used to achieve this is the secret-sharing method.… More >

  • Open Access

    ARTICLE

    An Interoperability Cross-Block Chain Framework for Secure Transactions in IoT

    N. Anand Kumar1,*, A. Grace Selvarani2, P. Vivekanandan3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1077-1090, 2023, DOI:10.32604/csse.2023.034115

    Abstract The purpose of this research is to deal with effective block chain framework for secure transactions. The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved in Blockchain and to tackle this issue, Cross-Chain based Transaction (CCT) is introduced. Traditional industries have been restructured by the introduction of Internet of Things (IoT) to become smart industries through the feature of data-driven decision-making. Still, there are a few limitations, like decentralization, security vulnerabilities, poor interoperability, as well as privacy concerns in IoTs. To overcome this limitation, Blockchain has been employed to assure a… More >

  • Open Access

    ARTICLE

    New Quantum Color Codes Based on Hyperbolic Geometry

    Avaz Naghipour1,*, Duc Manh Nguyen2

    Journal of Quantum Computing, Vol.4, No.2, pp. 113-120, 2022, DOI:10.32604/jqc.2022.033712

    Abstract In this paper, hyperbolic geometry is used to constructing new quantum color codes. We use hyperbolic tessellations and hyperbolic polygons to obtain them by pairing the edges on compact surfaces. These codes have minimum distance of at least and the encoding rate near to which are not mentioned in other literature. Finally, a comparison table with quantum codes recently proposed by the authors is provided. More >

  • Open Access

    ARTICLE

    Secure Blockchain-Enabled Internet of Vehicles Scheme with Privacy Protection

    Jiansheng Zhang1, Yang Xin1,*, Yuyan Wang2, Xiaohui Lei2, Yixian Yang1

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6185-6199, 2023, DOI:10.32604/cmc.2023.038029

    Abstract The car-hailing platform based on Internet of Vehicles (IoV) technology greatly facilitates passengers’ daily car-hailing, enabling drivers to obtain orders more efficiently and obtain more significant benefits. However, to match the driver closest to the passenger, it is often necessary to process the location information of the passenger and driver, which poses a considerable threat to privacy disclosure to the passenger and driver. Targeting these issues, in this paper, by combining blockchain and Paillier homomorphic encryption algorithm, we design a secure blockchain-enabled IoV scheme with privacy protection for online car-hailing. In this scheme, firstly, we propose an encryption scheme based… More >

Displaying 11-20 on page 2 of 170. Per Page