Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21)
  • Open Access

    ARTICLE

    Controlling Remote Robots Based on Zidan’s Quantum Computing Model

    Biswaranjan Panda1, Nitin Kumar Tripathy1, Shibashankar Sahu1, Bikash K. Behera2, Walaa E. Elhady3,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6225-6236, 2022, DOI:10.32604/cmc.2022.028394 - 28 July 2022

    Abstract In this paper, we propose a novel algorithm based on Zidan’s quantum computing model for remotely controlling the direction of a quantum-controlled mobile robot equipped with n-movements. The proposed algorithm is based on the measurement of concurrence value for the different movements of the robot. Consider a faraway robot that moves in the deep space (e.g., moves toward a galaxy), and it is required to control the direction of this robot from a ground station by some person Alice. She sends an unknown qubit α |0⟩ + β |1⟩ via the teleportation protocol to the robot. Then,… More >

  • Open Access

    ARTICLE

    Enhanced Metaheuristics-Based Clustering Scheme for Wireless Multimedia Sensor Networks

    R. Uma Mageswari1, Sara A. Althubiti2, Fayadh Alenezi3, E. Laxmi Lydia4, Gyanendra Prasad Joshi5, Woong Cho6,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4179-4192, 2022, DOI:10.32604/cmc.2022.030806 - 16 June 2022

    Abstract Traditional Wireless Sensor Networks (WSNs) comprise of cost-effective sensors that can send physical parameters of the target environment to an intended user. With the evolution of technology, multimedia sensor nodes have become the hot research topic since it can continue gathering multimedia content and scalar from the target domain. The existence of multimedia sensors, integrated with effective signal processing and multimedia source coding approaches, has led to the increased application of Wireless Multimedia Sensor Network (WMSN). This sort of network has the potential to capture, transmit, and receive multimedia content. Since energy is a major… More >

  • Open Access

    ARTICLE

    Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

    K. Sudharson1,*, S. Arun2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1769-1784, 2022, DOI:10.32604/iasc.2022.026483 - 25 May 2022

    Abstract Quantum Computing (QC). The content of node or sink nodes is processed using the fundamental principles of quantum mechanics. However, cryptography techniques face several other issues, such as availability, integrity, and vulnerability, to name a few. The researchers have overcome many obstacles, yet security remains a crucial concern in QC. However, experimenters recently discovered that the QC has a lot more data hacking than static networks. Moreover, the bitwise error is still present in implementing the Quantum Computing Cryptography Protocol (QCCP). Because all nodes are mobile and dynamic topology occurs, the proposed research uses the More >

  • Open Access

    ARTICLE

    Quantum Artificial Intelligence Based Node Localization Technique for Wireless Networks

    Hanan Abdullah Mengash1, Radwa Marzouk1, Siwar Ben Haj Hassine2, Anwer Mustafa Hilal3,*, Ishfaq Yaseen3, Abdelwahed Motwakel3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 327-342, 2022, DOI:10.32604/cmc.2022.026464 - 18 May 2022

    Abstract Artificial intelligence (AI) techniques have received significant attention among research communities in the field of networking, image processing, natural language processing, robotics, etc. At the same time, a major problem in wireless sensor networks (WSN) is node localization, which aims to identify the exact position of the sensor nodes (SN) using the known position of several anchor nodes. WSN comprises a massive number of SNs and records the position of the nodes, which becomes a tedious process. Besides, the SNs might be subjected to node mobility and the position alters with time. So, a precise… More >

  • Open Access

    ARTICLE

    A Quantum Algorithm for Evaluating the Hamming Distance

    Mohammed Zidan1,2,*, Manal G. Eldin3, Mahmoud Y. Shams4, Mohamed Tolan5,6, Ayman Abd-Elhamed2,7, Mahmoud Abdel-Aty8

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1065-1078, 2022, DOI:10.32604/cmc.2022.020103 - 03 November 2021

    Abstract We present a novel quantum algorithm to evaluate the hamming distance between two unknown oracles via measuring the degree of entanglement between two ancillary qubits. In particular, we use the power of the entanglement degree based quantum computing model that preserves at most the locality of interactions within the quantum model structure. This model uses one of two techniques to retrieve the solution of a quantum computing problem at hand. In the first technique, the solution of the problem is obtained based on whether there is an entanglement between the two ancillary qubits or not.… More >

  • Open Access

    ARTICLE

    Analyzing the Data of Software Security Life-Span: Quantum Computing Era

    Hashem Alyami1, Mohd Nadeem2, Wael Alosaimi3, Abdullah Alharbi3, Rajeev Kumar4,*, Bineet Kumar Gupta4, Alka Agrawal2, Raees Ahmad Khan2

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 707-716, 2022, DOI:10.32604/iasc.2022.020780 - 22 September 2021

    Abstract Software or web application security is the main objective in the era of Information Technology (IT) and Artificial Intelligence (AI). Distinguishing proof of security at the initial stage produces significant results to comprehend the administration of security relics for best potential outcomes. A security alternative gives several methods and algorithms to ensure the software security. Security estimation is the vital factor in assessing, administrating, controlling security to improve the nature of security. It is to be realized that assessment of security at early stage of development helps in identifying distinctive worms, dangers, weaknesses and threats.… More >

  • Open Access

    ARTICLE

    Grover’s Algorithm in a 4-Qubit Search Space

    Saasha Joshi*, Deepti Gupta

    Journal of Quantum Computing, Vol.3, No.4, pp. 137-150, 2021, DOI:10.32604/jqc.2021.018114 - 10 January 2022

    Abstract This paper provides an introduction to a quantum search algorithm, known as Grover’s Algorithm, for unsorted search purposes. The algorithm is implemented in a search space of 4 qubits using the Python-based Qiskit SDK by IBM. While providing detailed proof, the computational complexity of the algorithm is generalized to n qubits. The implementation results obtained from the IBM QASM Simulator and IBMQ Santiago quantum backend are analyzed and compared. Finally, the paper discusses the challenges faced in implementation and real-life applications of the algorithm hitherto. Overall, the implementation and analysis depict the advantages of this More >

  • Open Access

    ARTICLE

    Learning Unitary Transformation by Quantum Machine Learning Model

    Yi-Ming Huang1, Xiao-Yu Li1,*, Yi-Xuan Zhu1, Hang Lei1, Qing-Sheng Zhu2, Shan Yang3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 789-803, 2021, DOI:10.32604/cmc.2021.016663 - 22 March 2021

    Abstract Quantum machine learning (QML) is a rapidly rising research field that incorporates ideas from quantum computing and machine learning to develop emerging tools for scientific research and improving data processing. How to efficiently control or manipulate the quantum system is a fundamental and vexing problem in quantum computing. It can be described as learning or approximating a unitary operator. Since the success of the hybrid-based quantum machine learning model proposed in recent years, we investigate to apply the techniques from QML to tackle this problem. Based on the Choi–Jamiołkowski isomorphism in quantum computing, we transfer… More >

  • Open Access

    ARTICLE

    A Critical Overview on Quantum Computing

    Saptarshi Sahoo1,*, Amit Kumar Mandal1, Pijus Kanti Samanta2, Indranil Basu1, Pratik Roy1

    Journal of Quantum Computing, Vol.2, No.4, pp. 181-192, 2020, DOI:10.32604/jqc.2020.015688 - 07 January 2021

    Abstract Quantum Computing and Quantum Information Science seem very promising and developing rapidly since its inception in early 1980s by Paul Benioff with the proposal of quantum mechanical model of the Turing machine and later By Richard Feynman and Yuri Manin for the proposal of a quantum computers for simulating various problems that classical computer could not. Quantum computers have a computational advantage for some problems, over classical computers and most applications are trying to use an efficient combination of classical and quantum computers like Shor’s factoring algorithm. Other areas that are expected to be benefitted More >

  • Open Access

    ARTICLE

    Translation of Quantum Circuits into Quantum Turing Machines for Deutsch and Deutsch-Jozsa Problems

    Giuseppe Corrente*

    Journal of Quantum Computing, Vol.2, No.3, pp. 137-145, 2020, DOI:10.32604/jqc.2020.014586 - 31 December 2020

    Abstract We want in this article to show the usefulness of Quantum Turing Machine (QTM) in a high-level didactic context as well as in theoretical studies. We use QTM to show its equivalence with quantum circuit model for Deutsch and Deutsch-Jozsa algorithms. Further we introduce a strategy of translation from Quantum Circuit to Quantum Turing models by these examples. Moreover we illustrate some features of Quantum Computing such as superposition from a QTM point of view and starting with few simple examples very known in Quantum Circuit form. More >

Displaying 11-20 on page 2 of 21. Per Page