Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (69)
  • Open Access

    ARTICLE

    Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model

    Zhexi Zhang1, Zhiguo Qu1,2,*

    Journal of Quantum Computing, Vol.1, No.2, pp. 89-109, 2019, DOI:10.32604/jqc.2019.07415

    Abstract How to establish a secure and efficient quantum network coding algorithm is one of important research topics of quantum secure communications. Based on the butterfly network model and the characteristics of easy preparation of Bell states, a novel anti-noise quantum network coding protocol is proposed in this paper. The new protocol encodes and transmits classical information by virtue of Bell states. It can guarantee the transparency of the intermediate nodes during information, so that the eavesdropper Eve disables to get any information even if he intercepts the transmitted quantum states. In view of the inevitability More >

  • Open Access

    ARTICLE

    Quantum Multi-User Detection Based on Coherent State Signals

    Wenbin Yu1, 2, 3, 4, *, Yinsong Xu1, 2, 3, Wenjie Liu1, 2, 3, Alex Xiangyang Liu4, Baoyu Zheng5

    Journal of Quantum Computing, Vol.1, No.2, pp. 81-88, 2019, DOI:10.32604/jqc.2019.07324

    Abstract Multi-user detection is one of the important technical problems for modern communications. In the field of quantum communication, the multi-access channel on which we apply the technology of quantum information processing is still an open question. In this work, we investigate the multi-user detection problem based on the binary coherent-state signals whose communication way is supposed to be seen as a quantum channel. A binary phase shift keying model of this multi-access channel is studied and a novel method of quantum detection proposed according to the conclusion of the quantum measurement theory. As a result, More >

  • Open Access

    ARTICLE

    An Ui Design Optimization Strategy for General App in Big Data Environment

    Hangjun Zhou1, Jieyu Zhou1,*, Guang Sun2,3, Wangdong Jiang3, Chuntian Luo1, Xiaoping Fan1, Haowen Zhang1, Haoran Zhang1

    Journal of Quantum Computing, Vol.1, No.2, pp. 65-80, 2019, DOI:10.32604/jqc.2019.07238

    Abstract Due to the huge amount of increasing data, the requirements of people for electronic products such as mobile phones, tablets, and notebooks are constantly improving. The development and design of various software applications attach great importance to users’ experiences. The rationalized UI design should allow a user not only enjoy the visual design experience of the new product but also operating it more pleasingly. This process is to enhance the attractiveness and performance of the new product and thus to promote the active usage and consuming conduct of users. In this paper, an UI design More >

  • Open Access

    ARTICLE

    Quantum Blockchain: A Decentralized, Encrypted and Distributed Database Based on Quantum Mechanics

    Chuntang Li1, Yinsong Xu1, Jiahao Tang1, Wenjie Liu1,2,*

    Journal of Quantum Computing, Vol.1, No.2, pp. 49-63, 2019, DOI:10.32604/jqc.2019.06715

    Abstract Quantum blockchain can be understood as a decentralized, encrypted and distributed database based on quantum computation and quantum information theory. Once the data is recorded in the quantum blockchain, it will not be maliciously tampered with. In recent years, the development of quantum computation and quantum information theory makes more and more researchers focus on the research of quantum blockchain. In this paper, we review the developments in the field of quantum blockchain, and briefly analyze its advantages compared with the classical blockchain. The construction and the framework of the quantum blockchain are introduced. Then More >

  • Open Access

    ARTICLE

    Hierarchical Geographically Weighted Regression Model

    Fengchang Xue1, 2, *

    Journal of Quantum Computing, Vol.1, No.1, pp. 9-20, 2019, DOI:10.32604/jqc.2019.05954

    Abstract In spatial analysis, two problems of the scale effect and the spatial dependence have been plagued scholars, the first law of geography presented to solve the spatial dependence has played a good role in the guidelines, forming the Geographical Weighted Regression (GWR). Based on classic statistical techniques, GWR model has ascertain significance in solving spatial dependence and spatial non-uniform problems, but it has no impact on the integration of the scale effect. It does not consider the interaction between the various factors of the sampling scale observations and the numerous factors of possible scale effects, More >

  • Open Access

    ARTICLE

    Analysis and Test on Influence Factors of Dew Drop Condensation in Dew Point Hygrometer

    Shijun Zhao1,2, Xiaoying Chen1,3,*, Xiaolei Wang1, Wenming Ji1, Zhonghua Dai4

    Journal of Quantum Computing, Vol.1, No.1, pp. 29-39, 2019, DOI:10.32604/jqc.2019.06112

    Abstract The condensation process of dew droplets is influenced by many factors. A dew point condensation image observation system was built to improve the response speed of dew point detector under different measuring conditions. The basic mechanism of dew drop condensation growth was studied and the influence of various factors on the dew drop growth rate were analyzed. And the accuracy of the influence results was verified based on the improved Hough transform circle detection. The results show that the growth rate of dew droplets is affected by ambient temperature, dew point temperature, mirror temperature and More >

  • Open Access

    ARTICLE

    T Application of MES System in the Safety Management of Offshore Oil and Gas Fields

    Yong Chen1,*, Lei Cui1, Chong Wang2

    Journal of Quantum Computing, Vol.1, No.1, pp. 41-48, 2019, DOI:10.32604/jqc.2019.06283

    Abstract In order to solve the problem of data island in the safety management of offshore oil and gas fields, take full advantage of data for subsequent analysis and development, and support production safety management of oil and gas fields, the MES, which is maturely applied in manufacturing and downstream production of CNOOC (China National Offshore Oil Corporation), is introduced by the petroleum administration at the eastern South China sea. The system adopts the real-time database and relational database to collect the scattered structured data, such as evidence information of offshore oil and gas production facilities… More >

  • Open Access

    ARTICLE

    Protein Secondary Structure Prediction with Dynamic Self-Adaptation Combination Strategy Based on Entropy

    Yuehan Du1,2, Ruoyu Zhang1, Xu Zhang1, Antai Ouyang3, Xiaodong Zhang4, Jinyong Cheng1, Wenpeng Lu1,*

    Journal of Quantum Computing, Vol.1, No.1, pp. 21-28, 2019, DOI:10.32604/jqc.2019.06063

    Abstract The algorithm based on combination learning usually is superior to a single classification algorithm on the task of protein secondary structure prediction. However, the assignment of the weight of the base classifier usually lacks decision-making evidence. In this paper, we propose a protein secondary structure prediction method with dynamic self-adaptation combination strategy based on entropy, where the weights are assigned according to the entropy of posterior probabilities outputted by base classifiers. The higher entropy value means a lower weight for the base classifier. The final structure prediction is decided by the weighted combination of posterior More >

  • Open Access

    ARTICLE

    Impact Damage Identification for Composite Material Based on Transmissibility Function and OS-ELM Algorithm

    Yajie Sun1,2,*, Yanqing Yuan2, Qi Wang2, Sai Ji1,2, Lihua Wang3, Shaoen Wu4, Jie Chen2, Qin Zhang2

    Journal of Quantum Computing, Vol.1, No.1, pp. 1-8, 2019, DOI:10.32604/jqc.2019.05788

    Abstract A method is proposed based on the transmissibility function and the Online Sequence Extreme Learning Machine (OS-ELM) algorithm, which is applied to the impact damage of composite materials. First of all, the transmissibility functions of the undamaged signals and the damage signals at different points are calculated. Secondly, the difference between them is taken as the damage index. Finally, principal component analysis (PCA) is used to reduce the noise feature. And then, input to the online sequence limit learning neural network classification to identify damage and confirm the damage location. Taking the amplitude of the More >

Displaying 61-70 on page 7 of 69. Per Page