Results 81 to 90 of about 1,926,564 (269)

Statistical Complexity of Quantum Learning

open access: yesAdvanced Quantum Technologies, EarlyView.
The statistical performance of quantum learning is investigated as a function of the number of training data N$N$, and of the number of copies available for each quantum state in the training and testing data sets, respectively S$S$ and V$V$. Indeed, the biggest difference in quantum learning comes from the destructive nature of quantum measurements ...
Leonardo Banchi   +3 more
wiley   +1 more source

Accreditation Against Limited Adversarial Noise

open access: yesAdvanced Quantum Technologies, EarlyView.
An upgraded accreditation (a variant of quantum verification) scheme is presented, significantly relaxing the assumptions, to allow adversarial noise, while preserving the suitability for near‐term / immediate usage. Abstract An accreditation protocol (a variety of quantum verification) is presented, where error is assumed to be adversarial (in ...
Andrew Jackson
wiley   +1 more source

Entanglement in Quantum Systems Based on Directed Graphs

open access: yesAdvanced Quantum Technologies, EarlyView.
The entanglement properties of quantum states associated with directed graphs are investigated. It is proved that the vertex degree distribution fully determines this entanglement measure, which remains invariant under vertex relabeling, thereby highlighting its topological character.
Lucio De Simone, Roberto Franzosi
wiley   +1 more source

Digital Twin Simulations Toolbox of the Nitrogen‐Vacancy Center in Diamond

open access: yesAdvanced Quantum Technologies, EarlyView.
The Nitrogen‐vacancy (NV) center in diamond is a key platform within quantum technologies. This work introduces a Python based digital‐twin of the NV, where the spin dynamics of the system is simulated without relying on commonly used approximations, such as the adoption of rotating frame. The digital‐twin is validated through three different examples,
Lucas Tsunaki   +3 more
wiley   +1 more source

Smart Waste, Smarter World: Exploring Waste Types, Trends, and Tech‐Driven Valorization Through Artificial Intelligence, Internet of Things, and Blockchain

open access: yesSustainable Development, EarlyView.
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye   +8 more
wiley   +1 more source

Ridra: A Rigorous Decentralized Randomized Authentication in VANETs

open access: yesIEEE Access, 2018
Ensuring the security and privacy of vehicle is one of the critical requirements for the safety and reliability of vehicular ad hoc networks. A variety of (conditional) anonymous authentication schemes, including group/ring signatures, pseudo-identity ...
Cong Sun   +4 more
doaj   +1 more source

Analysis of cyberspace security based on game theory

open access: yes网络与信息安全学报, 2015
Information security economics is an important research area and game theory is one of the main basic theories and tools of cyberspace security.Based on game theory,the main problems of cyberspace securing were analyzed which including network attack and
Jian-ming ZHU, Qin WANG
doaj   +3 more sources

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes

open access: yesIEEE Access, 2018
To achieve source authentication, message integrity, and non-repudiation, a number of authentication protocols adopt several types of digital signatures: public-key signatures, identity-based signatures, and certificateless signatures.
Kyung-Ah Shim
doaj   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy