Results 41 to 50 of about 71,025 (313)

Generation of Schrödinger Cat States in a Hybrid Cavity Optomechanical System

open access: yesEntropy, 2022
We present an alternative scheme to achieve Schrödinger cat states in a strong coupling hybrid cavity optomechanical system. Under the single-photon strong-coupling regime, the interaction between the atom–cavity–oscillator system can induce the ...
Xingwei An   +4 more
doaj   +1 more source

A quantum network of clocks [PDF]

open access: yesNature Physics, 2014
The development of precise atomic clocks has led to many scientific and technological advances that play an increasingly important role in modern society. Shared timing information constitutes a key resource for positioning and navigation with a direct correspondence between timing accuracy and precision in applications such as the Global Positioning ...
Kómár, P.   +6 more
openaire   +4 more sources

Asymmetric Quantum Multicast Network Coding: Asymmetric Optimal Cloning over Quantum Networks

open access: yesApplied Sciences, 2022
Multicasting of quantum states is an essential feature of quantum internet. Since the noncloning theorem prohibits perfect cloning of an unknown quantum state, an appropriate protocol may depend on the purpose of the multicast.
Yuichi Hirota, Masaki Owari
doaj   +1 more source

Overview of the integration analysis and standardization trends of quantum communication and ICT systems

open access: yesDianzi Jishu Yingyong
Standardization plays a fundamental and leading role in supporting industrial development and promoting progress of science and technology. It also provides a new perspective for research in industry development.
Miao Yajun, Li Minghan, Qi Wei
doaj   +1 more source

Quantum copying: A network [PDF]

open access: yesPhysical Review A, 1997
We present a network consisting of quantum gates which produces two imperfect copies of an arbitrary qubit. The quality of the copies does not depend on the input qubit. We also show that for a restricted class of inputs it is possible to use a very similar network to produce three copies instead of two.
Mark Hillery   +4 more
openaire   +3 more sources

Quantum capsule networks

open access: yesQuantum Science and Technology, 2022
Abstract Capsule networks (CapsNets), which incorporate the paradigms of connectionism and symbolism, have brought fresh insights into artificial intelligence (AI). The capsule, as the building block of CapsNets, is a group of neurons represented by a vector to encode different features of an entity.
Zidu Liu   +4 more
openaire   +2 more sources

Quantum Coherence in Networks

open access: yesPhysical Review Letters
From a quantum information perspective, verifying quantum coherence in a quantum experiment typically requires adjusting measurement settings or changing inputs. A paradigmatic example is that of a double-slit experiment, where observing the interference pattern on the screen in a series of experimental settings where one, the other, and both slits are
Fatemeh Bibak   +2 more
openaire   +3 more sources

Open-Destination Measurement-Device-Independent Quantum Key Distribution Network

open access: yesEntropy, 2020
Quantum key distribution (QKD) networks hold promise for sharing secure randomness over multi-partities. Most existing QKD network schemes and demonstrations are based on trusted relays or limited to point-to-point scenario.
Wen-Fei Cao   +8 more
doaj   +1 more source

Mechanochemical Synthesis and Characterization of Nanostructured ErB4 and NdB4 Rare‐Earth Tetraborides

open access: yesAdvanced Engineering Materials, Volume 27, Issue 6, March 2025.
ErB4 and NdB4 nanostructured powders are produced by mechanochemical synthesis. 5 h mechanical alloying and 4 M HCl acid leaching are used in the production. ErB4 and NdB4 powders exhibit maximum magnetization of 0.4726 emu g−1 accompanied with an antiferromagnetic‐to‐paramagnetic phase transition at about TN = 18 K and 0.132 emu g−1 with a maximum at ...
Burçak Boztemur   +5 more
wiley   +1 more source

Experimental vulnerability analysis of QKD based on attack ratings

open access: yesScientific Reports, 2021
Inspired by the methodology used for classical cryptographic hardware, we consider the use of attack ratings in the context of QKD security evaluation. To illustrate the relevance of this approach, we conduct an experimental vulnerability assessment of ...
Rupesh Kumar   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy