Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Near Term Hybrid Quantum Computing Solution to the Matrix Riccati Equations

    Augusto González Bonorino1,*, Malick Ndiaye2, Casimer DeCusatis2

    Journal of Quantum Computing, Vol.4, No.3, pp. 135-146, 2022, DOI:10.32604/jqc.2022.036706

    Abstract The well-known Riccati differential equations play a key role in many fields, including problems in protein folding, control and stabilization, stochastic control, and cybersecurity (risk analysis and malware propagation). Quantum computer algorithms have the potential to implement faster approximate solutions to the Riccati equations compared with strictly classical algorithms. While systems with many qubits are still under development, there is significant interest in developing algorithms for near-term quantum computers to determine their accuracy and limitations. In this paper, we propose a hybrid quantum-classical algorithm, the Matrix Riccati Solver (MRS). This approach uses a transformation of variables to turn a set… More >

  • Open Access

    ARTICLE

    Image Encryption Using Multi-Scroll Attractor and Chaotic Logistic Map

    R. Anitha*, B. Vijayalakshmi

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3447-3463, 2022, DOI:10.32604/cmc.2022.021519

    Abstract In the current scenario, data transmission over the network is a challenging task as there is a need for protecting sensitive data. Traditional encryption schemes are less sensitive and less complex thus prone to attacks during transmission. It has been observed that an encryption scheme using chaotic theory is more promising due to its non-linear and unpredictable behavior. Hence, proposed a novel hybrid image encryption scheme with multi-scroll attractors and quantum chaos logistic maps (MSA-QCLM). The image data is classified as inter-bits and intra-bits which are permutated separately using multi scroll attractor & quantum logistic maps to generate random keys.… More >

  • Open Access

    ARTICLE

    Quantum Algorithms and Experiment Implementations Based on IBM Q

    Wenjie Liu1, 2, *, Junxiu Chen2, Yinsong Xu2, Jiahao Tang2, Lian Tong3, Xiaoyu Song4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1671-1689, 2020, DOI:10.32604/cmc.2020.07564

    Abstract With the rapid development of quantum theory and technology in recent years, especially the emergence of some quantum cloud computing platforms, more and more researchers are not satisfied with the theoretical derivation and simulation verification of quantum computation (especially quantum algorithms), experimental verification on real quantum devices has become a new trend. In this paper, three representative quantum algorithms, namely Deutsch-Jozsa, Grover, and Shor algorithms, are briefly depicted, and then their implementation circuits are presented, respectively. We program these circuits on python with QISKit to connect the remote real quantum devices (i.e., ibmqx4, ibmqx5) on IBM Q to verify these… More >

Displaying 1-10 on page 1 of 3. Per Page