Search
Search Results
-
Probabilistic Degenerate Fubini Polynomials Associated with Random Variables
Let Y be a random variable such that the moment generating function of Y exists in a neighborhood of the origin. The aim of this paper is to study...
-
General measurements with limited resources and their application to quantum unambiguous state discrimination
In this report, we present a framework for implementing an arbitrary n -outcome generalized quantum measurement (POVM) on an m -qubit register as a...
-
An inequality for entangled qutrits in SU(3) basis
It is well known from the representation theory of particle physics that the tensor product of two fundamental representation of SU(2) and SU(3)...
-
Hardware efficient decomposition of the Laplace operator and its application to the Helmholtz and the Poisson equation on quantum computer
With the rapid advancement of quantum computers in the past few years, there is ongoing development of algorithms aimed at solving problems that are...
-
Quantum related-key differential cryptanalysis
Quantum computation models have profoundly impacted cryptanalysis. Differential cryptanalysis is one of the most fundamental methods in cryptanalysis...
-
A General Coupled Derivative Nonlinear Schrödinger System: Darboux Transformation and Soliton Solutions
In this work we present a general coupled derivative nonlinear Schrödinger system. We construct the corresponding N -fold Darboux transform and...
-
Photonic communications with quadrature-amplitude modulated quantum coherent states in alternated and dual polarizations
We present the analysis of the quantum detection of coherent states used in photonic communications systems that employ the dimensions of both a) the...
-
Topological Quantum Gates in Homotopy Type Theory
Despite the plausible necessity of topological protection for realizing scalable quantum computers, the conceptual underpinnings of topological...
-
A new attack resistant encryption method based on hybrid chaotic-quantum key distribution (CQKD)
In this paper, a new hybrid chaotic-quantum encryption model is investigated aiming to solve the interception trouble of information transmission...
-
Lorentz invariants of pure three-qubit states
Extending the mathematical framework of Sudha et al. (Phys Rev A 102:052419, 2020), we construct Lorentz invariant quantities of pure three-qubit...
-
Tree-based quantum anonymous ranking protocol
We propose an improved quantum anonymous multiparty multidata ranking (QAMMR) protocol based on the binary search tree. In a QAMMR protocol, multiple...
-
Asymptotic Degeneracies of M2-Brane SCFTs
We study the asymptotic growth of the degeneracy of the BPS local operators with scaling dimension n /2 in the three-dimensional superconformal field...
-
Quantum-compliant users scheduling optimization in joint transmission mobile access networks
Joint Transmission (JT) is the dynamic coordination of transmission and/or reception at multiple geographically separated sites to improve end-user...
-
Universal covers of non-negatively curved manifolds and formality
We show that if the universal cover of a closed smooth manifold admitting a metric with non-negative Ricci curvature is formal, then the manifold...
-
Multi-party three-dimensional asymmetric cyclic controlled quantum teleportation in noisy environment
In this paper, a new scheme for asymmetric cyclic controlled teleportation of arbitrary three-dimensional unknown quantum states is proposed by...
-
On the Temporal Tweezing of Cavity Solitons
Motivated by the work of Jang et al., Nat Commun 6:7370 (
2015 ), where the authors experimentally tweeze cavity solitons in a passive loop of optical... -
Radial and angular correlations in a confined system of two atoms in two-dimensional geometry
We study the ground-state entanglement between two atoms in a two-dimensional isotropic harmonic trap. We consider a finite-range soft-core...
-
On Common Borel Direction of Entire Function f and Its q-Difference Operator
The common Borel direction of entire function f ( z ) and its q -difference operator is studied by using Nevanlinna theory. Some conditions of the...
-
ENR DigiSig: an efficient post-quantum digital signature scheme using polar codes
Digital signatures play a vital role in data security as they provide authenticity and non-repudiation of digital data. Code-based digital signatures...
-
Existence of Regular Solutions for a Class of Incompressible Non-Newtonian MHD Equations Coupled to the Heat Equation
We consider a system of PDE’s describing the steady flow of an electrically conducting fluid in the presence of a magnetic field. The system of...