We construct a fault-tolerant quantum error-correcting protocol based on a qubit encoded in a large spin qudit using a spin-cat code, analogous to the continuous-variable cat encoding. With this, we can correct the do...
详细信息
We construct a fault-tolerant quantum error-correcting protocol based on a qubit encoded in a large spin qudit using a spin-cat code, analogous to the continuous-variable cat encoding. With this, we can correct the dominant error sources, namely processes that can be expressed as error operators that are linear or quadratic in the components of angular momentum. Such codes tailored to dominant error sources can exhibit superior thresholds and lower resource overheads when compared to those designed for unstructured noise models. A key component is the cnot gate that preserves the rank of spherical tensor operators. Categorizing the dominant errors as phase and amplitude errors, we demonstrate how phase errors, analogous to phase-flip errors for qubits, can be effectively corrected. Furthermore, we propose a measurement-free error-correction scheme to address amplitude errors without relying on syndrome measurements. Through an in-depth analysis of logical cnot gate errors, we establish that the fault-tolerant threshold for error correction in the spin-cat encoding surpasses that of standard qubit-based encodings. We consider a specific implementation based on neutral-atom quantum computing, with qudits encoded in the nuclear spin of 87Sr, and show how to generate the universal gate set, including the rank-preserving cnot gate, using quantum control and the Rydberg blockade. These findings pave the way for encoding a qubit in a large spin with the potential to achieve fault tolerance, high threshold, and reduced resource overhead in quantum information processing.
Weighted vertex cover(WVC)is one of the most important combinatorial optimization *** this paper,we provide a new game optimization to achieve efficiency and time of solutions for the WVC problem of weighted *** first...
详细信息
Weighted vertex cover(WVC)is one of the most important combinatorial optimization *** this paper,we provide a new game optimization to achieve efficiency and time of solutions for the WVC problem of weighted *** first model the WVC problem as a general game on weighted *** the framework of a game,we newly define several cover states to describe the WVC ***,we reveal the relationship among these cover states of the weighted network and the strict Nash equilibriums(SNEs)of the ***,we propose a game-based asynchronous algorithm(GAA),which can theoretically guarantee that all cover states of vertices converging in an SNE with polynomial ***,we improve the GAA by adding 2-hop and 3-hop adjustment mechanisms,termed the improved game-based asynchronous algorithm(IGAA),in which we prove that it can obtain a better solution to the WVC problem than using a the ***,numerical simulations demonstrate that the proposed IGAA can obtain a better approximate solution in promising computation time compared with the existing representative algorithms.
Accurate forecasting in photovoltaic energy is one of the most essential integrated and influential events for managing the system of new and renewable energy sources in the power grid. The paper presents a practical ...
详细信息
Enabling resilient autonomous motion planning requires robust predictions of surrounding road users' future behavior. In response to this need and the associated challenges, we introduce our model titled MTP-GO. T...
详细信息
PAGER EXPLOSION:THE *** 2024 Lebanon pager explosions represent one of the most unexpected and devastating technological incidents in recent *** September 17 and 18,2024,thousands of pagers and walkie-talkies exploded...
详细信息
PAGER EXPLOSION:THE *** 2024 Lebanon pager explosions represent one of the most unexpected and devastating technological incidents in recent *** September 17 and 18,2024,thousands of pagers and walkie-talkies exploded simultaneously across Lebanon and parts of Syria,resulting in 42 deaths and more than 3500 *** handheld communication devices,previously regarded as secure and low-profile,were rigged with concealed explosives and remotely triggered by attackers.
During the last few years, there has been a growing interest in the topic of using natural or synthetic esters as an alternative to mineral oils in oil transformers due to the easier way to obtain them and their abili...
详细信息
Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last *** achieves safe access to systems using biometrics instead of the traditional *** utilization of a biometric in it...
详细信息
Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last *** achieves safe access to systems using biometrics instead of the traditional *** utilization of a biometric in its original format makes it usable only ***,a cancelable biometric template should be used,so that it can be replaced when it is *** biometrics aims to enhance the security and privacy of biometric *** encryption is an efficient technique to be used in order to generate cancelable biometric *** this paper,a highly-secure encryption algorithm is proposed to ensure secure biometric data in verification *** considered biometric in this paper is the speech *** speech signal is transformed into its ***,the spectrogram is encrypted using two cascaded optical encryption *** first algorithm is the Optical Scanning Holography(OSH)for its efficiency as an encryption *** OSH encrypted spectrogram is encrypted using Double Random Phase Encoding(DRPE)by implementing two Random Phase Masks(RPMs).After the two cascaded optical encryption algorithms,the cancelable template is *** verification is implemented through correlation estimation between enrolled and test templates in their encrypted *** the correlation value is larger than a threshold value,the user is *** threshold value can be determined from the genuine and imposter correlation distribution curves as the midpoint between the two *** implementation of optical encryption is adopted using its software rather than the optical *** efficiency of the proposed cancelable biometric algorithm is illustrated by the simulation *** can improve the biometric data security without deteriorating the recognition *** results give close-to-zero This values for the Equal Error Rate(EER)and close-to-one values for the Area under Receiver Operator Charact
Recent advances in semiconductors industry and microelectronics have created new opportunities for integrating various technologies in energy harvesting projects. These advancements have simplified the process of capt...
详细信息
This study employs nine distinct deep learning models to categorize 12,444 blood cell images and automatically extract from them relevant information with an accuracy that is beyond that achievable with traditional **...
详细信息
This study employs nine distinct deep learning models to categorize 12,444 blood cell images and automatically extract from them relevant information with an accuracy that is beyond that achievable with traditional *** work is intended to improve current methods for the assessment of human health through measurement of the distribution of four types of blood cells,namely,eosinophils,neutrophils,monocytes,and lymphocytes,known for their relationship with human body damage,inflammatory regions,and organ illnesses,in particular,and with the health of the immune system and other hazards,such as cardiovascular disease or infections,more in *** results of the experiments show that the deep learning models can automatically extract features from the blood cell images and properly classify them with an accuracy of 98%,97%,and 89%,respectively,with regard to the training,verification,and testing of the corresponding datasets.
One of the most critical problems facing the blockchain technology industry right now is how to protect the privacy of users’ data on the blockchain in a way that is both effective and cheap. Based on the Pedersen co...
详细信息
暂无评论