unitary operation
Recently Published Documents


TOTAL DOCUMENTS

40
(FIVE YEARS 11)

H-INDEX

7
(FIVE YEARS 0)

2022 ◽  
Vol 5 ◽  
Author(s):  
Kevin Daniel Ciprian Foronda ◽  
Delcy Camila Gafaro Garcés ◽  
Laura Restrepo Rendón ◽  
Yeyner Yamphier Mendoza Alvites ◽  
Joana Paola Ricardo Sagra ◽  
...  

In agribusiness, drying is a unitary operation that optimizes the production and preservation of products and raw materials. Drying is performed through different traditional methods, one of the most recently studied is the electrohydrodynamic drying EHD which uses an electric field that allows decreasing the processing time thus increasing the drying speed of raw materials and consuming less energy. In this article, a review was carried out through Scopus using a search equation with the keywords “Electrohydrodynamic drying,” “food” and “AGRI” which resulted in a total of 145 articles; which were analyzed through in-depth reading, analyzing aspects such as year, author, keywords, countries, quartile, journal, relationship with agroindustry, mathematical models used and applications in agro-industrial products, this analysis was complemented with the application of Vantage Point software through co-occurrence matrices and cluster analysis. Recent applications were found in Carrot, Chicken, Sea Cucumber, Goji Berry, Peppermint Leaf, Quince, Potato, Blueberry, Aquatic Products, Banana Slices, Grape Pomace, Blueberry, Apple, Mushroom, Wheat, and Mushroom Slices, mathematical models with application in EHD drying were also found, such as Henderson and Pabis, Page, Logarithmic, Quadratic, Newton/Lewis, Diffusion and exponential.


Author(s):  
Wen-Qiang Liu ◽  
Xin-Jie Zhou ◽  
Hai-Rui Wei

Abstract Unitary operation is an essential step for quantum information processing. We first propose an iterative procedure for decomposing a general unitary operation without resorting to controlled-NOT gate and single-qubit rotation library. Based on the results of decomposition, we design two compact architectures to deterministically implement arbitrary two-qubit polarization-spatial and spatial-polarization collective unitary operations, respectively. The involved linear optical elements are reduced from 25 to 20 and 21 to 20, respectively. Moreover, the parameterized quantum computation can be flexibly manipulated by wave plates and phase shifters. As an application, we construct the specific quantum circuits to realize two-dimensional quantum walk and quantum Fourier transformation. Our schemes are simple and feasible with the current technology.


2021 ◽  
Vol 2021 (6) ◽  
Author(s):  
Adam Levine ◽  
Arvin Shahbazi-Moghaddam ◽  
Ronak M Soni

Abstract We study the problem of revealing the entanglement wedge using simple operations. We ask what operation a semiclassical observer can do to bring the entanglement wedge into causal contact with the boundary, via backreaction.In a generic perturbative class of states, we propose a unitary operation in the causal wedge whose backreaction brings all of the previously causally inaccessible ‘peninsula’ into causal contact with the boundary. This class of cases includes entanglement wedges associated to boundary sub-regions that are unions of disjoint spherical caps, and the protocol works to first order in the size of the peninsula. The unitary is closely related to the so-called Connes Cocycle flow, which is a unitary that is both well-defined in QFT and localised to a sub-region. Our construction requires a generalization of the work by Ceyhan & Faulkner to regions which are unions of disconnected spherical caps. We discuss this generalization in the appendix. We argue that this cocycle should be thought of as naturally generalizing the non-local coupling introduced in the work of Gao, Jafferis & Wall.


2021 ◽  
Vol 11 (6) ◽  
pp. 2653
Author(s):  
Min-Sung Kang ◽  
Yong-Su Kim ◽  
Ji-Woong Choi ◽  
Hyung-Jin Yang ◽  
Sang-Wook Han

We have developed a quantum message authentication protocol that provides authentication and integrity of an original message using single qubit unitary operations. Our protocol mainly consists of two parts: quantum encryption and a correspondence check. The quantum encryption part is implemented using linear combinations of wave plates, and the correspondence check is performed using Hong–Ou–Mandel interference. By analyzing the coincidence counts of the Hong–Ou–Mandel interference, we have successfully proven the proposed protocol experimentally, and also showed its robustness against an existential forgery.


2020 ◽  
Vol 102 (23) ◽  
Author(s):  
Takase Shimizu ◽  
Taketomo Nakamura ◽  
Yoshiaki Hashimoto ◽  
Akira Endo ◽  
Shingo Katsumoto

Sensors ◽  
2020 ◽  
Vol 20 (14) ◽  
pp. 3940
Author(s):  
Vankamamidi S. Naresh ◽  
Moustafa M. Nasralla ◽  
Sivaranjani Reddi ◽  
Iván García-Magariño

Multi-Agent Systems can support e-Healthcare applications for improving quality of life of citizens. In this direction, we propose a healthcare system architecture named smart healthcare city. First, we divide a given city into various zones and then we propose a zonal level three-layered system architecture. Further, for effectiveness we introduce a Multi-Agent System (MAS) in this three-layered architecture. Protecting sensitive health information of citizens is a major security concern. Group key agreement (GKA) is the corner stone for securely sharing the healthcare data among the healthcare stakeholders of the city. For establishing GKA, many efficient cryptosystems are available in the classical field. However, they are yet dependent on the supposition that some computational problems are infeasible. In light of quantum mechanics, a new field emerges to share a secret key among two or more members. The unbreakable and highly secure features of key agreement based on fundamental laws of physics allow us to propose a Quantum GKA (QGKA) technique based on renowned Quantum Diffie–Hellman (QDH). In this, a node acts as a Group Controller (GC) and forms 2-party groups with remaining nodes, establishing a QDH-style shared key per each two-party. It then joins these keys into a single group key by means of a XOR-operation, acting as a usual group node. Furthermore, we extend the QGKA to Dynamic QGKA (DQGKA) by adding join and leave protocol. Our protocol performance was compared with existing QGKA protocols in terms of Qubit efficiency (QE), unitary operation (UO), unitary operation efficiency (UOE), key consistency check (KCC), security against participants attack (SAP) and satisfactory results were obtained. The security analysis of the proposed technique is based on unconditional security of QDH. Moreover, it is secured against internal and external attack. In this way, e-healthcare Multi-Agent System can be robust against future quantum-based attacks.


Author(s):  
Mengyao Hu ◽  
Lin Chen ◽  
Yize Sun

Constructing four six-dimensional mutually unbiased bases (MUBs) is an open problem in quantum physics and measurement. We investigate the existence of four MUBs including the identity, and a complex Hadamard matrix (CHM) of Schmidt rank three. The CHM is equivalent to a controlled unitary operation on the qubit-qutrit system via local unitary transformation I 2  ⊗  V and I 2  ⊗  W . We show that V and W have no zero entry, and apply it to exclude constructed examples as members of MUBs. We further show that the maximum of entangling power of controlled unitary operation is log 2 3 ebits. We derive the condition under which the maximum is achieved, and construct concrete examples. Our results describe the phenomenon that if a CHM of Schmidt rank three belongs to an MUB then its entangling power may not reach the maximum.


2020 ◽  
Vol 34 (06) ◽  
pp. 2050084
Author(s):  
Huawang Qin ◽  
Hao Xu ◽  
Wallace K. S. Tang

A public-key quantum signature (QS) scheme is proposed, in which the phase shift is the private key and the quantum state after the phase shift operation is the public key. The signatory uses the private key to encode the quantum state, and uses the Bell measurement to generate the signature. The receiver performs the unitary operation according to the signature, and then compares the quantum state with the public key to verify the signature. Our scheme does not need a trusted arbitrator, and the signature can be verified by the receiver publicly. Compared to the existing arbitrated QS scheme, our scheme will be more practical.


2019 ◽  
Vol 17 (07) ◽  
pp. 1950052
Author(s):  
Ren-Ju Liu ◽  
Ming-Qiang Bai ◽  
Fan Wu ◽  
Yu-Chun Zhang

A scheme is proposed for cyclic-controlled quantum operation teleportation (CCQOT) for three sides with EPR and cluster states. Under the control of David, Alice can implement an unknown single-qubit unitary operation on the remote Bob’s quantum system, while Bob can execute a single-qubit unitary operation on Charlie’s quantum system and Charlie can also perform an unknown single-qubit unitary operation on Alice’s quantum system. Our scheme can be generalized to [Formula: see text]) agents involved in the cycle to realize the transmission of single-qubit operations. Moreover, by replacing the quantum channels, we can change the cyclic direction of controlled qunatum operation teleportation (CQOT) from clockwise to counterclockwise. In addition, we discuss our scheme in four types of noisy environments (amplitude-damping, phase-damping, bit-flip and phase-flip noisy environment), and use fidelity to analyze the amount of information lost in the process of CCQOT due to noise. The results show that the fidelity is determined by decoherence rate and amplitude parameters of the final state.


Sign in / Sign up

Export Citation Format

Share Document