
Constructions and Noise Threshold of Topological Subsystem Codes
... infer that the link operators Kf , Kg , and Kh act on u as Xu , Yu , and Zu up to a permutation. Conjugating Kf , Kg , and Kh by an appropriate single-qubit Clifford unitary operator Vu one can generate any permutation of Xu , Yu , and Zu . In addition, the depolarizing noise model used in this pape ...
... infer that the link operators Kf , Kg , and Kh act on u as Xu , Yu , and Zu up to a permutation. Conjugating Kf , Kg , and Kh by an appropriate single-qubit Clifford unitary operator Vu one can generate any permutation of Xu , Yu , and Zu . In addition, the depolarizing noise model used in this pape ...
Quantum Annealing with Markov Chain Monte Carlo Simulations
... are being built with capabilities exceeding classical computers. One prominent case is the so-called D-Wave quantum computer, which is a computing hardware device built to implement quantum annealing for solving combinatorial optimization problems. Whether D-Wave computing hardware devices display a ...
... are being built with capabilities exceeding classical computers. One prominent case is the so-called D-Wave quantum computer, which is a computing hardware device built to implement quantum annealing for solving combinatorial optimization problems. Whether D-Wave computing hardware devices display a ...
hep-th/9303127 PDF
... from the \double pyramid" by identifying the opposite faces of each pyramid, i.e. UNW $ UES , UWS $ UNE , DNW $ DES and DWS $ DNE , so that the \base" NESW becomes a 2-torus. The boundary of the neighborhood of each summit (U or D) is made of the two base triangles, and is homeomorphic to the 2-toru ...
... from the \double pyramid" by identifying the opposite faces of each pyramid, i.e. UNW $ UES , UWS $ UNE , DNW $ DES and DWS $ DNE , so that the \base" NESW becomes a 2-torus. The boundary of the neighborhood of each summit (U or D) is made of the two base triangles, and is homeomorphic to the 2-toru ...
Wigner function formalism in Quantum mechanics
... Given the Hamilton H = 2m +U (x) it is clear that (51) is equal to (50). The important thing we notice at this point is, the time does not appear explictly in the Wigner functio W (x, p) for a stationary state. Instead the time t and the time evolution lies in the coordinates that obey Hamilton’s eq ...
... Given the Hamilton H = 2m +U (x) it is clear that (51) is equal to (50). The important thing we notice at this point is, the time does not appear explictly in the Wigner functio W (x, p) for a stationary state. Instead the time t and the time evolution lies in the coordinates that obey Hamilton’s eq ...
Ph.D. Thesis Giuseppe Prettico
... and secret-key extraction, quantum privacy and non-locality and, finally, between non-locality and certified quantum randomness. The connection between information-theoretic key agreement and quantum entanglement purification has led to several analogies between the two scenarios. The most intriguin ...
... and secret-key extraction, quantum privacy and non-locality and, finally, between non-locality and certified quantum randomness. The connection between information-theoretic key agreement and quantum entanglement purification has led to several analogies between the two scenarios. The most intriguin ...
the transcendental meditation technique and quantum physics
... "goes almost by itself" (7). By contrast with other practices which are sometimes associated with the name "meditation", the Transcendental Meditation technique does not involve contemplation, concentration or any attempt to control the mind; indeed, "effortlessness and spontaneity is the key to cor ...
... "goes almost by itself" (7). By contrast with other practices which are sometimes associated with the name "meditation", the Transcendental Meditation technique does not involve contemplation, concentration or any attempt to control the mind; indeed, "effortlessness and spontaneity is the key to cor ...
memory effects in the dynamics of open quantum systems
... In quantum theory the time evolution of a system is given by a deterministic wave equation, the Schrödinger equation. Yet, observed quantum objects often exhibit irreversible behaviour not predicted by the standard theory. Irreversibility in the dynamics arises when the quantum system interacts with ...
... In quantum theory the time evolution of a system is given by a deterministic wave equation, the Schrödinger equation. Yet, observed quantum objects often exhibit irreversible behaviour not predicted by the standard theory. Irreversibility in the dynamics arises when the quantum system interacts with ...
achieving 128-bit security against quantum attacks in openvpn
... algorithm to an algorithm containing only NAND-gates (which is always possible because NAND is functionally complete), and then converting this circuit to a quantum circuit built from Toffoli gates, as described in [11]. For example, f can be implemented as a function that returns 0 if and only if t ...
... algorithm to an algorithm containing only NAND-gates (which is always possible because NAND is functionally complete), and then converting this circuit to a quantum circuit built from Toffoli gates, as described in [11]. For example, f can be implemented as a function that returns 0 if and only if t ...
achieving 128-bit security against quantum attacks in openvpn
... algorithm to an algorithm containing only NAND-gates (which is always possible because NAND is functionally complete), and then converting this circuit to a quantum circuit built from Toffoli gates, as described in [11]. For example, f can be implemented as a function that returns 0 if and only if t ...
... algorithm to an algorithm containing only NAND-gates (which is always possible because NAND is functionally complete), and then converting this circuit to a quantum circuit built from Toffoli gates, as described in [11]. For example, f can be implemented as a function that returns 0 if and only if t ...
... Contrarily to the other quantum Monte Carlo methods, which provide results only for the ground state of the quantum system, PIMC is a nite temperature method, in which the system at the thermodynamic equilibrium is simulated considering a propagation in conguration space for a nite imaginary time ...
Quantum computation with two-electron spins in
... become reality. In digital computers, data is stored in bits. The quantum equivalent is called a qubit (quantum bit) and it is basically a quantum mechanical two-level system that can be in a superposition of its two basis states. There are many different proposals for implementing qubits, but one o ...
... become reality. In digital computers, data is stored in bits. The quantum equivalent is called a qubit (quantum bit) and it is basically a quantum mechanical two-level system that can be in a superposition of its two basis states. There are many different proposals for implementing qubits, but one o ...
Gibbs paradox of entropy of mixing: Experimental facts, its rejection, and the theoretical consequences
... enantiomers R and S (Figure 3). In fact, if a racemization happens, there is almost always a similar reaction that leads to the formation of a product which is identical to the educt. One example is the SN 2 reaction of iodide and ethyliodide (Figure 4). Because the reactant and the product are indi ...
... enantiomers R and S (Figure 3). In fact, if a racemization happens, there is almost always a similar reaction that leads to the formation of a product which is identical to the educt. One example is the SN 2 reaction of iodide and ethyliodide (Figure 4). Because the reactant and the product are indi ...
NON-LOCAL THEORIES OF CONTINUUM MECHANICS
... porous media.[12][13][14] Atangana and Kilicman extended fractional advection dispersion equation to variable order fractional advection dispersion equation. In their work, the hydrodynamic dispersion equation was generalized using the concept of variational order derivative. The modified equation w ...
... porous media.[12][13][14] Atangana and Kilicman extended fractional advection dispersion equation to variable order fractional advection dispersion equation. In their work, the hydrodynamic dispersion equation was generalized using the concept of variational order derivative. The modified equation w ...