標(biāo)題: Titlebook: Computational Science – ICCS 2022; 22nd International C Derek Groen,Clélia de Mulatier,Peter M. A. Sloot Conference proceedings 2022 The Ed [打印本頁] 作者: FLUX 時間: 2025-3-21 16:18
書目名稱Computational Science – ICCS 2022影響因子(影響力)
作者: AMITY 時間: 2025-3-21 21:05 作者: 投票 時間: 2025-3-22 03:08 作者: NOCT 時間: 2025-3-22 06:52
Fundamentals of Energy Science,se with more than two control qubits has not been analysed in detail in any work. The resulting information is offered in the form of comparative tables that will facilitate its consultation for researchers and people interested in the subject, so that they can easily choose the design that best sui作者: 有其法作用 時間: 2025-3-22 12:16
https://doi.org/10.1007/978-3-030-43225-6QA hardware from D-Wave. We find that the Advantage quantum annealer is able to produce optimal solutions to larger problem instances than the 2000Q. We further consider the problem’s structure and its implications for suitability to QA by utilising the Landau-Zener formula to explore the potential 作者: 新義 時間: 2025-3-22 16:19
Time Series Attention Based Transformer Neural Turing Machines for?Diachronic Graph Embedding in?Cybments illustrate that TSA-TNTM could generate higher quality than the state-of-the-art word embedding models in tasks pertaining to semantic analogy, clustering, threat classification and proactively identify emerging threats in CTI fields.作者: 新義 時間: 2025-3-22 20:37
Automating and?Scaling Task-Level Parallelism of?Tightly Coupled Models via?Code Generationultiscale applications relying on thorough graph analysis and automatic code generation. The performance of the generated code has been analyzed by using random task graphs with up to 10,000 nodes and executed on thousands of CPU cores. The approach implemented in wfGenes is beneficial for improving作者: majestic 時間: 2025-3-23 00:28
An Agent-Based Forced Displacement Simulation: A Case Study of?the?Tigray Crisisly in absolute terms with the average relative error of 0.45. Finally, we aim to forecast movement patterns, destination preferences among displaced populations and emerging trends for destinations in Sudan.作者: 預(yù)知 時間: 2025-3-23 01:35
Studying the?Cost of?n-qubit Toffoli Gatesse with more than two control qubits has not been analysed in detail in any work. The resulting information is offered in the form of comparative tables that will facilitate its consultation for researchers and people interested in the subject, so that they can easily choose the design that best sui作者: VALID 時間: 2025-3-23 05:31 作者: 商店街 時間: 2025-3-23 11:44
https://doi.org/10.1007/978-3-031-08760-8artificial intelligence; communication systems; computer hardware; computer networks; computer security; 作者: 毀壞 時間: 2025-3-23 16:26 作者: frugal 時間: 2025-3-23 22:00 作者: 發(fā)電機 時間: 2025-3-23 22:52 作者: Incompetent 時間: 2025-3-24 04:51 作者: PANG 時間: 2025-3-24 07:53 作者: thwart 時間: 2025-3-24 10:42 作者: 易怒 時間: 2025-3-24 17:35 作者: 生命 時間: 2025-3-24 20:36 作者: HAUNT 時間: 2025-3-25 01:39
Amir Safari,Soheil Jafari,Mohsen AssadiM for forced displacement to predict the distribution of refugees fleeing from northern Ethiopia to Sudan. Since Ethiopia has more than 950,000 internally displaced persons (IDPs) and is home to 96,000 Eritrean refugees in four camps situated in the Tigray region, we model refugees, IDPs and Eritrea作者: VALID 時間: 2025-3-25 04:16
Geetanjali Yadav,Ramkrishna Sen show different methods of reduction of discrete logarithm problem over prime fields to the QUBO problem. In the best case, if . is the bitlength of a characteristic of the prime field ., there are required approximately . logical qubits for such reduction. We present practical attacks on discrete l作者: 尊敬 時間: 2025-3-25 08:22
Sustainable Financing for ESG Practices,pressive sensing requires finding the most sparse solution to an underdetermined linear system, which is an NP-hard problem and as a consequence in practise is only solved approximately. In our work we restrict ourselves to the compressive sensing problem for the case of binary signals. For that cas作者: 迅速成長 時間: 2025-3-25 12:42 作者: PANG 時間: 2025-3-25 16:52
Sustainable and Just Energy Strategies, increasing number of qubits and linear growth in memory requirements with increasing number of time steps. These memory requirements are a barrier for simulating large models or long time spans. We have created a nonstandard automatic differentiation technique that can compute gradients needed by G作者: 的’ 時間: 2025-3-25 20:26 作者: labile 時間: 2025-3-26 02:18
https://doi.org/10.1007/978-3-030-43225-6ly difficult optimization problems. In particular, QA is suitable for problems that can be formulated as a Quadratic Unconstrained Binary Optimization (QUBO) problem, such as SAT, graph colouring and travelling salesman. With commercially available QA hardware, like that offered by D-Wave Systems (D作者: 遺忘 時間: 2025-3-26 04:43
Joseph H. L. Chan,Theresa Y. M. Chanowers. Researchers have developed algorithms that allow quantum computers to hack into information security concepts that were previously considered difficult, if not impossible, including asymmetric key cryptography and elliptic curve cryptography. Studies have been done to focus on improving secur作者: 復(fù)習(xí) 時間: 2025-3-26 10:14 作者: 使迷惑 時間: 2025-3-26 15:06
Jingyan Fu,Shuyu Li,Artie W. Ngf discrete arithmetic, cryptography, machine learning, and image processing. However, these gates cannot be physically implemented in quantum hardware and therefore they need to be decomposed into many smaller elementary gates. In this work we analyse previously proposed circuit constructions for MC作者: NEG 時間: 2025-3-26 16:49 作者: 向下五度才偏 時間: 2025-3-26 22:59 作者: 我的巨大 時間: 2025-3-27 02:55 作者: MIRTH 時間: 2025-3-27 07:02
Reduced Order Surrogate Modelling and?Latent Assimilation for?Dynamical Systemsoted to develop efficient algorithms which can predict the dynamics in a low-dimensional reduced space. In this paper, we developed a modular approach which makes use of different reduced-order modelling for data compression. Machine learning methods are then carried out in the reduced space to lear作者: Arctic 時間: 2025-3-27 11:42 作者: 暗指 時間: 2025-3-27 16:54
Multipoint Meshless FD Schemes Applied to Nonlinear and Multiscale Analysis boundary value problems. The main advantage of the multipoint general version is its generality – the basic relations of derivatives from the unknown function depend on the domain discretization only and are independent of the type of problem being solved. This feature allows to divide the multipoi作者: 捐助 時間: 2025-3-27 21:05 作者: Derogate 時間: 2025-3-28 00:58 作者: 預(yù)兆好 時間: 2025-3-28 02:52 作者: 激怒 時間: 2025-3-28 07:11 作者: 實施生效 時間: 2025-3-28 13:50
Studying the?Cost of?n-qubit Toffoli Gatessing one or several metrics (T-count, number of qubits, etc.), and therefore has its advantages and disadvantages. While there is some consensus in the state of the art on the best implementations for the Toffoli gate, scaling this gate for use with three or more control qubits is not trivial. In th作者: CRACY 時間: 2025-3-28 18:05
Reducing Memory Requirements of?Quantum Optimal Control increasing number of qubits and linear growth in memory requirements with increasing number of time steps. These memory requirements are a barrier for simulating large models or long time spans. We have created a nonstandard automatic differentiation technique that can compute gradients needed by G作者: mucous-membrane 時間: 2025-3-28 19:48 作者: 允許 時間: 2025-3-28 23:16
Benchmarking D-Wave Quantum Annealers: Spectral Gap Scaling of?Maximum Cardinality Matching Problemsly difficult optimization problems. In particular, QA is suitable for problems that can be formulated as a Quadratic Unconstrained Binary Optimization (QUBO) problem, such as SAT, graph colouring and travelling salesman. With commercially available QA hardware, like that offered by D-Wave Systems (D作者: Ligament 時間: 2025-3-29 06:47 作者: Confound 時間: 2025-3-29 08:09
Distributed Quantum Annealing on D-Wave for the Single Machine Total Weighted Tardiness Scheduling P of diversification of calculations has been proposed by dividing the space of feasible solutions and using the fact that the quantum annealer of the D-Wave machine is able to optimally solve (for now) small-size subproblems only. The proposed methodology was tested on a difficult instance of a sing作者: enhance 時間: 2025-3-29 11:35 作者: 裁決 時間: 2025-3-29 15:57 作者: Forehead-Lift 時間: 2025-3-29 21:45
Conference proceedings 2022selected from 474 submissions. 169 full and 36 short papers were accepted to the main track; 120 full and 42 short papers were accepted to the workshops/ thematic tracks. ..*The conference was held in a hybrid format.作者: Commodious 時間: 2025-3-30 01:01
0302-9743 iewed and selected from 474 submissions. 169 full and 36 short papers were accepted to the main track; 120 full and 42 short papers were accepted to the workshops/ thematic tracks. ..*The conference was held in a hybrid format.978-3-031-08759-2978-3-031-08760-8Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 可忽略 時間: 2025-3-30 05:41 作者: GNAT 時間: 2025-3-30 08:32
Geetanjali Yadav,Ramkrishna Senogarithm problem over the 4-bit prime field ., over 5-bit prime field . and over 6-bit prime field .. We solved these problems using D-Wave Advantage QPU. It is worth noting that, according to our knowledge, until now, no one has made a practical attack on discrete logarithm over the prime field using quantum methods.作者: 無政府主義者 時間: 2025-3-30 12:43
Sustainable and Just Energy Strategies,RAPE by exploiting the fact that the inverse of a unitary matrix is its conjugate transpose. Our approach significantly reduces the memory requirements for GRAPE, at the cost of a reasonable amount of recomputation. We present benchmark results based on an implementation in JAX.作者: Longitude 時間: 2025-3-30 17:25
Solar-Powered Cooling for the Remote Tropicsown optimal solution. For this purpose, we designed MLAK algorithm which implements 0–1 knapsack problem based on the apriori unknown utility function. In a dedicated simulation experiments with different utility functions MLAK provides resources selection efficiency comparable to a classical greedy algorithm.作者: AVOID 時間: 2025-3-30 21:42 作者: Lucubrate 時間: 2025-3-31 04:39
https://doi.org/10.1007/978-3-030-43225-6ame attack on AES cipher, where for AES-128 and AES-256, an equivalent QUBO problem consist of 29,770 and 72,597 logical variables, respectively. It is an open question if this kind of attack may overtake, in some cases, brutal or Grover’s attack.作者: 破譯 時間: 2025-3-31 08:04 作者: 剛毅 時間: 2025-3-31 12:32
Multipoint Meshless FD Schemes Applied to Nonlinear and Multiscale Analysisto such engineering problems as numerical homogenization of heterogeneous materials and nonlinear analysis are developed and briefly presented. The paper is illustrated by several examples of the multipoint numerical analysis.