|
|
|
Youssef Moawad, Wim Vanderbauwhede and René Steijl
As quantum computing technology continues to develop, the need for research into novel quantum algorithms is growing. However, such algorithms cannot yet be reliably tested on actual quantum hardware, which is still limited in several ways, including qub...
ver más
|
|
|
|
|
|
Jing Hou, Xin Wang, Yanping Su, Yan Yang and Tian Gao
An accurate battery model is of great importance for battery state estimation. This study considers the parameter identification of a fractional-order model (FOM) of the battery, which can more realistically describe the reaction process of the cell and ...
ver más
|
|
|
|
|
|
Anastasiya Ilyukhina
Pág. 16 - 27
In 2001, a CFS signature scheme based on the Niederreiter cryptosystem was proposed. The signature algorithm is based on code cryptography, which makes the signature resistant to post-quantum attacks. However, there are certain difficulties in its implem...
ver más
|
|
|
|
|
|
Leian Zhang, Junwu Wang, Han Wu, Mengwei Wu, Jingyi Guo and Shengmin Wang
Subway station projects are characterized by complex construction technology, complex site conditions, and being easily influenced by the surrounding environment; thus, construction safety accidents occur frequently. In order to improve the computing per...
ver más
|
|
|
|
|
|
Hiroshi Arai and Harumi Haraguchi
We proposed the method that translates the two-dimensional CSP for minimizing the number of cuts to the Ising model. After that, we conducted computer experiments of the proposed model using the benchmark problem. From the above, the following results ar...
ver más
|
|
|