Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (178)
  • Open Access

    ARTICLE

    Performance-Oriented Layout Synthesis for Quantum Computing

    Chi-Chou Kao1,*, Hung-Yi Lin2

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1581-1594, 2024, DOI:10.32604/csse.2024.055073 - 22 November 2024

    Abstract Layout synthesis in quantum computing is crucial due to the physical constraints of quantum devices where quantum bits (qubits) can only interact effectively with their nearest neighbors. This constraint severely impacts the design and efficiency of quantum algorithms, as arranging qubits optimally can significantly reduce circuit depth and improve computational performance. To tackle the layout synthesis challenge, we propose an algorithm based on integer linear programming (ILP). ILP is well-suited for this problem as it can formulate the optimization objective of minimizing circuit depth while adhering to the nearest neighbor interaction constraint. The algorithm aims… More >

  • Open Access

    ARTICLE

    TLERAD: Transfer Learning for Enhanced Ransomware Attack Detection

    Isha Sood*, Varsha Sharma

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2791-2818, 2024, DOI:10.32604/cmc.2024.055463 - 18 November 2024

    Abstract Ransomware has emerged as a critical cybersecurity threat, characterized by its ability to encrypt user data or lock devices, demanding ransom for their release. Traditional ransomware detection methods face limitations due to their assumption of similar data distributions between training and testing phases, rendering them less effective against evolving ransomware families. This paper introduces TLERAD (Transfer Learning for Enhanced Ransomware Attack Detection), a novel approach that leverages unsupervised transfer learning and co-clustering techniques to bridge the gap between source and target domains, enabling robust detection of both known and unknown ransomware variants. The proposed method More >

  • Open Access

    ARTICLE

    Advancing Quantum Technology: Insights Form Mach-Zehnder Interferometer in Quantum State Behaviour and Error Correction

    Priyanka1, Damodarakurup Sajeev2, Shaik Ahmed3, Shankar Pidishety3, Ram Soorat3,*

    Journal of Quantum Computing, Vol.6, pp. 53-66, 2024, DOI:10.32604/jqc.2024.054000 - 14 November 2024

    Abstract The present study delves into the application of investigating quantum state behaviour, particularly focusing on coherent and superposition states. These states, characterized by their remarkable stability and precision, have found extensive utility in various domains of quantum mechanics and quantum information processing. Coherent states are valuable for manipulating quantum systems with accuracy. Superposition states allow quantum systems to exist in numerous configurations at the same time, which paves the way for quantum computing’s capacity for parallel processing. The research accentuates the crucial role of quantum error correction (QEC) in ensuring the stability and reliability of… More >

  • Open Access

    ARTICLE

    HQNN-SFOP: Hybrid Quantum Neural Networks with Signal Feature Overlay Projection for Drone Detection Using Radar Return Signals—A Simulation

    Wenxia Wang, Jinchen Xu, Xiaodong Ding, Zhihui Song, Yizhen Huang, Xin Zhou, Zheng Shan*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1363-1390, 2024, DOI:10.32604/cmc.2024.054055 - 15 October 2024

    Abstract With the wide application of drone technology, there is an increasing demand for the detection of radar return signals from drones. Existing detection methods mainly rely on time-frequency domain feature extraction and classical machine learning algorithms for image recognition. This method suffers from the problem of large dimensionality of image features, which leads to large input data size and noise affecting learning. Therefore, this paper proposes to extract signal time-domain statistical features for radar return signals from drones and reduce the feature dimension from 512 × 4 to 16 dimensions. However, the downscaled feature data… More >

  • Open Access

    ARTICLE

    A Novel Framework to Construct S-Box Quantum Circuits Using System Modeling: Application to 4-Bit S-Boxes

    Yongjin Jeon, Seungjun Baek#, Jongsung Kim*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 545-561, 2024, DOI:10.32604/cmes.2024.052374 - 20 August 2024

    Abstract Quantum computers accelerate many algorithms based on the superposition principle of quantum mechanics. The Grover algorithm provides significant performance to malicious users attacking symmetric key systems. Since the performance of attacks using quantum computers depends on the efficiency of the quantum circuit of the encryption algorithms, research research on the implementation of quantum circuits is essential. This paper presents a new framework to construct quantum circuits of substitution boxes (S-boxes) using system modeling. We model the quantum circuits of S-boxes using two layers: Toffoli and linear layers. We generate vector spaces based on the values… More >

  • Open Access

    ARTICLE

    QBIoT: A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature

    Ang Liu1, Qing Zhang2, Shengwei Xu3,*, Huamin Feng4, Xiu-bo Chen5, Wen Liu1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1727-1751, 2024, DOI:10.32604/cmc.2024.051233 - 18 July 2024

    Abstract The Internet of Things (IoT) is a network system that connects physical devices through the Internet, allowing them to interact. Nowadays, IoT has become an integral part of our lives, offering convenience and smart functionality. However, the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats, such as device vulnerabilities, data privacy concerns, and network susceptibilities. Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security. Nevertheless, the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used… More >

  • Open Access

    ARTICLE

    Weak Fault Feature Extraction of the Rotating Machinery Using Flexible Analytic Wavelet Transform and Nonlinear Quantum Permutation Entropy

    Lili Bai1,*, Wenhui Li1, He Ren1,2, Feng Li1, Tao Yan1, Lirong Chen3

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4513-4531, 2024, DOI:10.32604/cmc.2024.051348 - 20 June 2024

    Abstract Addressing the challenges posed by the nonlinear and non-stationary vibrations in rotating machinery, where weak fault characteristic signals hinder accurate fault state representation, we propose a novel feature extraction method that combines the Flexible Analytic Wavelet Transform (FAWT) with Nonlinear Quantum Permutation Entropy. FAWT, leveraging fractional orders and arbitrary scaling and translation factors, exhibits superior translational invariance and adjustable fundamental oscillatory characteristics. This flexibility enables FAWT to provide well-suited wavelet shapes, effectively matching subtle fault components and avoiding performance degradation associated with fixed frequency partitioning and low-oscillation bases in detecting weak faults. In our approach,… More >

  • Open Access

    ARTICLE

    A Novel Scheduling Framework for Multi-Programming Quantum Computing in Cloud Environment

    Danyang Zheng, Jinchen Xv, Feng Yue, Qiming Du, Zhiheng Wang, Zheng Shan*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1957-1974, 2024, DOI:10.32604/cmc.2024.048956 - 15 May 2024

    Abstract As cloud quantum computing gains broader acceptance, a growing quantity of researchers are directing their focus towards this domain. Nevertheless, the rapid surge in demand for cloud-based quantum computing resources has led to a scarcity, which in turn hampers users from achieving optimal satisfaction. Therefore, cloud quantum computing service providers require a unified analysis and scheduling framework for their quantum resources and user jobs to meet the ever-growing usage demands. This paper introduces a new multi-programming scheduling framework for quantum computing in a cloud environment. The framework addresses the issue of limited quantum computing resources More >

  • Open Access

    ARTICLE

    Optimized General Uniform Quantum State Preparation

    Mark Ariel Levin*

    Journal of Quantum Computing, Vol.6, pp. 15-24, 2024, DOI:10.32604/jqc.2024.047423 - 24 April 2024

    Abstract Quantum algorithms for unstructured search problems rely on the preparation of a uniform superposition, traditionally achieved through Hadamard gates. However, this incidentally creates an auxiliary search space consisting of nonsensical answers that do not belong in the search space and reduce the efficiency of the algorithm due to the need to neglect, un-compute, or destructively interfere with them. Previous approaches to removing this auxiliary search space yielded large circuit depth and required the use of ancillary qubits. We have developed an optimized general solver for a circuit that prepares a uniform superposition of any N More >

  • Open Access

    ARTICLE

    A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture

    Yi-Bo Cao1,*, Xiu-Bo Chen1, Yun-Feng He2, Lu-Xi Liu2, Yin-Mei Che2, Xiao Wang2, Ke Xiao3, Gang Xu3, Si-Yi Chen1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2813-2827, 2024, DOI:10.32604/cmc.2024.046816 - 27 February 2024

    Abstract Due to the rapid advancements in network technology, blockchain is being employed for distributed data storage. In the Internet of Things (IoT) scenario, different participants manage multiple blockchains located in different trust domains, which has resulted in the extensive development of cross-domain authentication techniques. However, the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography, posing a significant security threat. In response to the aforementioned challenges, our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key… More >

Displaying 1-10 on page 1 of 178. Per Page