Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (74)
  • Open Access

    ARTICLE

    Design of a Novel Signed Binary Subtractor Using Quantum Gates

    Arindam Banerjee1,*, Aniruddha Ghosh2, Mainuck Das2

    Journal of Quantum Computing, Vol.4, No.3, pp. 121-133, 2022, DOI:10.32604/jqc.2022.034059 - 03 July 2023

    Abstract In this paper, focus has been given to design and implement signed binary subtraction in quantum logic. Since the type of operand may be positive or negative, therefore a novel algorithm has been developed to detect the type of operand and as per the selection of the type of operands, separate design techniques have been developed to make the circuit compact and work very efficiently. Two separate methods have been shown in the paper to perform the signed subtraction. The results show promising for the second method in respect of ancillary input count and garbage More >

  • Open Access

    ARTICLE

    New Quantum Color Codes Based on Hyperbolic Geometry

    Avaz Naghipour1,*, Duc Manh Nguyen2

    Journal of Quantum Computing, Vol.4, No.2, pp. 113-120, 2022, DOI:10.32604/jqc.2022.033712 - 16 May 2023

    Abstract In this paper, hyperbolic geometry is used to constructing new quantum color codes. We use hyperbolic tessellations and hyperbolic polygons to obtain them by pairing the edges on compact surfaces. These codes have minimum distance of at least and the encoding rate near to which are not mentioned in other literature. Finally, a comparison table with quantum codes recently proposed by the authors is provided. More >

  • Open Access

    ARTICLE

    A Technical Note for a Shor’s Algorithm by Phase Estimation

    Gérard Fleury, Philippe Lacomme*

    Journal of Quantum Computing, Vol.4, No.2, pp. 97-111, 2022, DOI:10.32604/jqc.2022.032973 - 16 May 2023

    Abstract The objective of this paper concerns at first the motivation and the method of Shor’s algorithm including remarks on quantum computing introducing an algorithmic description of the method. The corner stone of the Shor’s algorithm is the modular exponentiation that is the most computational component (in time and space). A linear depth unit based on phase estimation is introduced and a description of a generic version of a modular multiplier based on phases is introduced to build block of a gates to efficient modular exponentiation circuit. Our proposal includes numerical experiments achieved on both the More >

  • Open Access

    ARTICLE

    T_GRASP: Optimization Algorithm of Ship Avoiding Typhoon Route

    Yingxian Huang, Xueyan Ding, Yanan Zhang, Leiming Yan*

    Journal of Quantum Computing, Vol.4, No.2, pp. 85-95, 2022, DOI:10.32604/jqc.2022.031436 - 16 May 2023

    Abstract A GRASP-based algorithm called T_GRASP for avoiding typhoon route optimization is suggested to increase the security and effectiveness of ship navigation. One of the worst natural calamities that can disrupt a ship’s navigation and result in numerous safety mishaps is a typhoon. Currently, the captains manually review the collected weather data and steer clear of typhoons using their navigational expertise. The distribution of heavy winds and waves produced by the typhoon also changes dynamically as a result of the surrounding large-scale air pressure distribution, which significantly enhances the challenge of the captain’s preparation for avoiding… More >

  • Open Access

    ARTICLE

    A Cross Language Code Security Audit Framework Based on Normalized Representation

    Yong Chen1,*, Chao Xu1, Jing Selena He2, Sheng Xiao3

    Journal of Quantum Computing, Vol.4, No.2, pp. 75-84, 2022, DOI:10.32604/jqc.2022.031312 - 16 May 2023

    Abstract With the rapid development of information technology, audit objects and audit itself are more and more inseparable from software. As an important means of software security audit, code security audit will become an important aspect of future audit that cannot be ignored. However, the existing code security audit is mainly based on source code, which is difficult to meet the audit needs of more and more programming languages and binary commercial software. Based on the idea of normalized transformation, this paper constructs a cross language code security audit framework (CLCSA). CLCSA first uses compile/decompile technology… More >

  • Open Access

    ARTICLE

    Design and Implementation of Police Equipment Knowledge Query System

    Chenxi Yu, Xin Li*

    Journal of Quantum Computing, Vol.4, No.2, pp. 63-74, 2022, DOI:10.32604/jqc.2022.027715 - 16 May 2023

    Abstract In the field of public security, the standardized use of police equipment can better assist the public security police in performing their duties. With the advancement of science and technology of the times, police equipment is also constantly developing, and more and more new types of police equipment have appeared. Nowadays, there are a large number and variety of police equipment, and public security police are facing the challenge of mastering and updating equipment knowledge. This article builds a knowledge base of police equipment based on the knowledge of opening source data on the Internet,… More >

  • Open Access

    ARTICLE

    Study on Quantum Finance Algorithm: Quantum Monte Carlo Algorithm based on European Option Pricing

    Jian-Guo Hu1,*, Shao-Yi Wu1,*, Yi Yang1, Qin-Sheng Zhu1, Xiao-Yu Li1, Shan Yang2

    Journal of Quantum Computing, Vol.4, No.1, pp. 53-61, 2022, DOI:10.32604/jqc.2022.027683 - 12 August 2022

    Abstract As one of the major methods for the simulation of option pricing, Monte Carlo method assumes random fluctuations in the distribution of asset prices. Under certain uncertainties process, different evolution paths could be simulated so as to finally yield the expectation value of the asset price, which requires a lot of simulations to ensure the accuracy based on huge and expensive calculations. In order to solve the above computational problem, quantum Monte Carlo (QMC) has been established and applied in the relevant systems such as European call options. In this work, both MC and QM More >

  • Open Access

    ARTICLE

    Research on Service Function Chain Orchestrating Algorithm Based on SDN and NFV

    Yuning Jia*, Yu Gong, Yifei Wei

    Journal of Quantum Computing, Vol.4, No.1, pp. 39-52, 2022, DOI:10.32604/jqc.2022.027560 - 12 August 2022

    Abstract Software defined network (SDN) and network function virtualization (NFV) have become a new paradigm of a new generation of network architecture. SDN and NFV can effectively improve the flexibility of deploying and managing service function chains (SFCs). By combining SDN and NFV and applying them to the resource orchestration problem of SFC deployment, the three-tier architecture consisting of SDN controller, network function virtualization and physical underlying computing resource layer in the process of heterogeneous network resource mapping is considered. And an optimization algorithm for active control resources based on SDN and NFV is proposed. Firstly,… More >

  • Open Access

    ARTICLE

    Research on Rainfall Estimation Based on Improved Kalman Filter Algorithm

    Wen Zhang1,2, Wei Fang1,3,*, Xuelei Jia1,2, Victor S. Sheng4

    Journal of Quantum Computing, Vol.4, No.1, pp. 23-37, 2022, DOI:10.32604/jqc.2022.026975 - 12 August 2022

    Abstract In order to solve the rainfall estimation error caused by various noise factors such as clutter, super refraction, and raindrops during the detection process of Doppler weather radar. This paper proposes to improve the rainfall estimation model of radar combined with rain gauge which calibrated by common Kalman filter. After data preprocessing, the radar data should be classified according to the precipitation intensity. And then, they are respectively substituted into the improved filter for calibration. The state noise variance and the measurement noise variance can be adaptively calculated and updated according to the input observation More >

  • Open Access

    ARTICLE

    A Top-down Method of Extraction Entity Relationship Triples and Obtaining Annotated Data

    Zhiqiang Hu1, Zheng Ma1, Jun Shi1, Zhipeng Li1, Xun Shao1,2, Yangzhao Yang1,*, Yong Liao1, Zhenyuan Gao1, Jie Zhang1

    Journal of Quantum Computing, Vol.4, No.1, pp. 13-22, 2022, DOI:10.32604/jqc.2022.026785 - 12 August 2022

    Abstract The extraction of entity relationship triples is very important to build a knowledge graph (KG), meanwhile, various entity relationship extraction algorithms are mostly based on data-driven, especially for the current popular deep learning algorithms. Therefore, obtaining a large number of accurate triples is the key to build a good KG as well as train a good entity relationship extraction algorithm. Because of business requirements, this KG’s application field is determined and the experts’ opinions also must be satisfied. Considering these factors we adopt the top-down method which refers to determining the data schema firstly, then… More >

Displaying 21-30 on page 3 of 74. Per Page