Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (66)
  • Open Access

    ARTICLE

    A Critical Overview on Quantum Computing

    Saptarshi Sahoo1,*, Amit Kumar Mandal1, Pijus Kanti Samanta2, Indranil Basu1, Pratik Roy1

    Journal of Quantum Computing, Vol.2, No.4, pp. 181-192, 2020, DOI:10.32604/jqc.2020.015688

    Abstract Quantum Computing and Quantum Information Science seem very promising and developing rapidly since its inception in early 1980s by Paul Benioff with the proposal of quantum mechanical model of the Turing machine and later By Richard Feynman and Yuri Manin for the proposal of a quantum computers for simulating various problems that classical computer could not. Quantum computers have a computational advantage for some problems, over classical computers and most applications are trying to use an efficient combination of classical and quantum computers like Shor’s factoring algorithm. Other areas that are expected to be benefitted from quantum computing are Machine… More >

  • Open Access

    ARTICLE

    A Database-Driven Algorithm for Building Top-k Service-Based Systems

    Dandan Peng, Le Sun*

    Journal of Quantum Computing, Vol.2, No.4, pp. 171-179, 2020, DOI:10.32604/jqc.2020.015402

    Abstract The purpose of this work aims is to automatically build top-k (the number of suggested results) light weight service based systems (LitSBSs) on the basis of user-given keywords. Compared with our previous work, we use a score (oscore) to evaluate the keyword matching degree and QoS performance of a service so that we could find top-k LitSBSs with both high keyword matching degree and great QoS performance at the same time. In addition, to guarantee the quality of found top-k LitSBSs and improve the time efficiency, we redesign the database-driven algorithm (LitDB). We add the step of referential services selecting… More >

  • Open Access

    ARTICLE

    Quantum Computational Techniques for Prediction of Cognitive State of Human Mind from EEG Signals

    Seth Aishwarya1, Vaishnav Abeer1,*, Babu B. Sathish1, K. N. Subramanya2

    Journal of Quantum Computing, Vol.2, No.4, pp. 157-170, 2020, DOI:10.32604/jqc.2020.015018

    Abstract The utilization of quantum states for the representation of information and the advances in machine learning is considered as an efficient way of modeling the working of complex systems. The states of mind or judgment outcomes are highly complex phenomena that happen inside the human body. Decoding these states is significant for improving the quality of technology and providing an impetus to scientific research aimed at understanding the functioning of the human mind. One of the key advantages of quantum wave-functions over conventional classical models is the existence of configurable hidden variables, which provide more data density due to its… More >

  • Open Access

    ARTICLE

    The Development and Application of Quantum Masking

    Tao Chen1,2, Zhiguo Qu1,2,*, Yi Chen1,2

    Journal of Quantum Computing, Vol.2, No.3, pp. 151-156, 2020, DOI:10.32604/jqc.2020.015855

    Abstract To solve the problem of hiding quantum information in simplified subsystems, Modi et al. [1] introduced the concept of quantum masking. Quantum masking is the encoding of quantum information by composite quantum states in such a way that the quantum information is hidden to the subsystem and spreads to the correlation of the composite systems. The concept of quantum masking was developed along with a new quantum impossibility theorem, the quantum no-masking theorem. The question of whether a quantum state can be masked has been studied by many people from the perspective of the types of quantum states, the number… More >

  • Open Access

    ARTICLE

    Interpretation of the Entangled States

    D. L. Khokhlov*

    Journal of Quantum Computing, Vol.2, No.3, pp. 147-150, 2020, DOI:10.32604/jqc.2020.014734

    Abstract An interpretation of the entangled states is considered. Two-photon states of photon A on path a and photon B on path b with polarizations H, V are constructed. Two synchronized photons, 1 and 2, can take the paths a and b, with equal probability 50%. In the bases a, b and H, V, the states of the photons form the product states. In the basis 1, 2, the states of the photons form the entangled state. The states of the photons in the bases 1, 2; a, b; H, V are inseparable. The correlation of the photons due to the… More >

  • Open Access

    ARTICLE

    Translation of Quantum Circuits into Quantum Turing Machines for Deutsch and Deutsch-Jozsa Problems

    Giuseppe Corrente*

    Journal of Quantum Computing, Vol.2, No.3, pp. 137-145, 2020, DOI:10.32604/jqc.2020.014586

    Abstract We want in this article to show the usefulness of Quantum Turing Machine (QTM) in a high-level didactic context as well as in theoretical studies. We use QTM to show its equivalence with quantum circuit model for Deutsch and Deutsch-Jozsa algorithms. Further we introduce a strategy of translation from Quantum Circuit to Quantum Turing models by these examples. Moreover we illustrate some features of Quantum Computing such as superposition from a QTM point of view and starting with few simple examples very known in Quantum Circuit form. More >

  • Open Access

    ARTICLE

    Study on the Status of Urbanization Development and the Change of Cultivated Land Area in Nanjing

    Wenzheng Yu1,*, Jing Liu1, Mengyue Zhu2, Youzhi Yuan2

    Journal of Quantum Computing, Vol.2, No.3, pp. 129-135, 2020, DOI:10.32604/jqc.2020.09222

    Abstract The urbanization rate of Nanjing has increased in the past 55 years. Its development process can be roughly divided into the reverse urbanization phase, the stagnant development phase, the recovery development phase, the steady development phase, and the accelerated development phase. The area of cultivated land has a decreasing trend at each stage. In 1971 and beyond, urbanization development had a significant negative effect on the area of cultivated land, and the coordination between the two was not high and there was a downward trend. More >

  • Open Access

    ARTICLE

    A Position Self-Adaptive Method to Detect Fake Access Points

    Ping Lu1,2,*

    Journal of Quantum Computing, Vol.2, No.2, pp. 119-127, 2020, DOI:10.32604/jqc.2020.09433

    Abstract In recent years, with the maturity and popularity of Wi-Fi technology, wireless hotspots have been deployed on a large scale in public places. But at the same time, it brings many security issues that cannot be ignored. Among them, the fake access point attack is a very serious threat in wireless local area network. In this paper, we propose a method to detect fake access points in wireless local area network. First, our detection method is passive, which means there is almost no additional traffic will be generated during the program’s operation. Second, different from many existing methods, our method… More >

  • Open Access

    ARTICLE

    A Survey of Time Series Data Visualization Methods

    Wangdong Jiang1, Jie Wu1,*, Guang Sun1,2, Yuxin Ouyang3, Jing Li3, Shuang Zhou2

    Journal of Quantum Computing, Vol.2, No.2, pp. 105-117, 2020, DOI:10.32604/jqc.2020.07242

    Abstract In the era of big data, the general public is more likely to access big data, but they wouldn’t like to analyze the data. Therefore, the traditional data visualization with certain professionalism is not easy to be accepted by the general public living in the fast pace. Under this background, a new general visualization method for dynamic time series data emerges as the times require. Time series data visualization organizes abstract and hard-to-understand data into a form that is easily understood by the public. This method integrates data visualization into short videos, which is more in line with the way… More >

  • Open Access

    ARTICLE

    A Novel Intrusion Detection Algorithm Based on Long Short Term Memory Network

    Xinda Hao1, Jianmin Zhou2,*, Xueqi Shen1, Yu Yang1

    Journal of Quantum Computing, Vol.2, No.2, pp. 97-104, 2020, DOI:10.32604/jqc.2020.010819

    Abstract In recent years, machine learning technology has been widely used for timely network attack detection and classification. However, due to the large number of network traffic and the complex and variable nature of malicious attacks, many challenges have arisen in the field of network intrusion detection. Aiming at the problem that massive and high-dimensional data in cloud computing networks will have a negative impact on anomaly detection, this paper proposes a Bi-LSTM method based on attention mechanism, which learns by transmitting IDS data to multiple hidden layers. Abstract information and high-dimensional feature representation in network data messages are used to… More >

Displaying 41-50 on page 5 of 66. Per Page