Results 71 to 80 of about 7,817,808 (344)
Measurement-device-independent quantum communication with an untrusted source [PDF]
Measurement-device-independent quantum key distribution (MDI-QKD) can provide enhanced security, as compared to traditional QKD, and it constitutes an important framework for a quantum network with an untrusted network server.
Xu, Feihu
core +2 more sources
ErB4 and NdB4 nanostructured powders are produced by mechanochemical synthesis. 5 h mechanical alloying and 4 M HCl acid leaching are used in the production. ErB4 and NdB4 powders exhibit maximum magnetization of 0.4726 emu g−1 accompanied with an antiferromagnetic‐to‐paramagnetic phase transition at about TN = 18 K and 0.132 emu g−1 with a maximum at ...
Burçak Boztemur +5 more
wiley +1 more source
Quantum network teleportation for quantum information distribution and concentration
We investigate the schemes of quantum network teleportation for quantum information distribution and concentration which are essential in quantum cloud computation and quantum internet.
Fan, Heng +6 more
core +1 more source
In this study, the mechanical response of Y‐shaped core sandwich beams under compressive loading is investigated, using deep feed‐forward neural networks (DFNNs) for predictive modeling. The DFNN model accurately captures stress–strain behavior, influenced by design parameters and loading rates.
Ali Khalvandi +4 more
wiley +1 more source
Neural Networks Architecture Evaluation in a Quantum Computer
In this work, we propose a quantum algorithm to evaluate neural networks architectures named Quantum Neural Network Architecture Evaluation (QNNAE). The proposed algorithm is based on a quantum associative memory and the learning algorithm for artificial
da Silva, Adenilton José +1 more
core +1 more source
Machine Learning Applied to High Entropy Alloys under Irradiation
Designing alloys for extreme environments demands fast, trustworthy prediction. This review charts how machine learning—especially machine‐learned interatomic potentials and predictive models based on experiment‐informed datasets—captures the complexity of high‐entropy alloys in extreme environments, predicts phase formation, mechanical properties, and
Amin Esfandiarpour +8 more
wiley +1 more source
Exploring Multipartite Steering Effect Using Bell Operators
While Bell operators are exploited in detecting Bell nonlocality and entanglement classification, we demonstrate their usefulness in exploring Einstein−Podolsky−Rosen (EPR) steering, which represents the quantum correlation intermediate ...
Li-Yi Hsu, Shoichi Kawamoto
doaj +1 more source
Experimental vulnerability analysis of QKD based on attack ratings
Inspired by the methodology used for classical cryptographic hardware, we consider the use of attack ratings in the context of QKD security evaluation. To illustrate the relevance of this approach, we conduct an experimental vulnerability assessment of ...
Rupesh Kumar +3 more
doaj +1 more source
Measurement-device-independent quantum key distribution (MDI-QKD) can remove all detector side-channel attacks. However, there are still some assumptions on source preparations in MDI-QKD protocols, which are too strict to achieve in real-life ...
Wen-Lin Wang +4 more
doaj +1 more source
We calculate the magnetic-field and temperature dependence of all quantum corrections to the ensemble-averaged conductance of a network of quantum dots. We consider the limit that the dimensionless conductance of the network is large, so that the quantum
A. Abrikosov +14 more
core +1 more source

