Search alternatives:
computing algorithm » scheduling algorithm (Expand Search)
learning algorithm » learning algorithms (Expand Search)
computing algorithm » scheduling algorithm (Expand Search)
learning algorithm » learning algorithms (Expand Search)
-
1
A quantum algorithm for evolving open quantum dynamics on quantum computing devices
Published 2020Subjects: -
2
Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework
Published 2022“…Firstly, the DL agent prioritizes caching contents via self organizing maps (SOMs) algorithm, and secondly, the prioritized contents are stored in QMM using a Two-Level Spin Quantum Phenomenon (TLSQP). …”
-
3
A Survey and Comparison of Post-Quantum and Quantum Blockchains
Published 2023“…The first approach involves post-quantum blockchains, which aim to utilize classical cryptographic algorithms resilient to quantum attacks. …”
-
4
Advanced Quantum Control with Ensemble Reinforcement Learning: A Case Study on the XY Spin Chain
Published 2025“…<p dir="ltr">This research presents an ensemble Reinforcement Learning (RL) approach that combines Deep Q-Network (DQN) and Proximal Policy Optimization (PPO) algorithms to tackle quantum control problems. …”
-
5
Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios
Published 2021“…<p>Internet of Things (IoT) deployments face significant security challenges due to the limited energy and computational power of IoT devices. These challenges are more serious in the quantum communications era, where certain attackers might have quantum computing capabilities, which renders IoT devices more vulnerable. …”
-
6
The unified effect of data encoding, ansatz expressibility and entanglement on the trainability of HQNNs
Published 2023“…<p dir="ltr">Recent advances in quantum computing and machine learning have brought about a promising intersection of these two fields, leading to the emergence of quantum machine learning (QML). …”
-
7
Meta-Heuristic Procedures for the Multi-Resource Leveling Problem with Activity Splitting
Published 2011Get full text
doctoralThesis -
8
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
Published 2020“…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”