To see the other types of publications on this topic, follow the link: Quantum routing protocol.

Journal articles on the topic 'Quantum routing protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Quantum routing protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shahad, A. Hussein, and A. Abdullah Alharith. "Hybrid routing protocol for quantum network based on classical and quantum routing metrics." Hybrid routing protocol for quantum network based on classical and quantum routing metrics 31, no. 1 (2023): 197–204. https://doi.org/10.11591/ijeecs.v31.i1.pp197-204.

Full text
Abstract:
A quantum repeater is the heart of a quantum internet that enables end-to-end communication over long distances using the quantum entanglement feature. Although this characteristic gives quantum networks tremendous power in terms of speed and security, it puts quantum networks, especially the quantum internet, in front of challenges, like transforming a short-distance quantum link into a long-distance link, in addition to entanglement routing for finding the best path within a quantum network. So, this research aims to propose a hybrid quantum routing protocol (HQRP) based on routing metrics o
APA, Harvard, Vancouver, ISO, and other styles
2

Apollaro, Tony John George, and Wayne Jordan Chetcuti. "Two-Excitation Routing via Linear Quantum Channels." Entropy 23, no. 1 (2020): 51. http://dx.doi.org/10.3390/e23010051.

Full text
Abstract:
Routing quantum information among different nodes in a network is a fundamental prerequisite for a quantum internet. While single-qubit routing has been largely addressed, many-qubit routing protocols have not been intensively investigated so far. Building on a recently proposed many-excitation transfer protocol, we apply the perturbative transfer scheme to a two-excitation routing protocol on a network where multiple two-receivers block are coupled to a linear chain. We address both the case of switchable and permanent couplings between the receivers and the chain. We find that the protocol a
APA, Harvard, Vancouver, ISO, and other styles
3

Bapat, Aniruddha, Andrew M. Childs, Alexey V. Gorshkov, Samuel King, Eddie Schoute, and Hrishee Shastri. "Quantum routing with fast reversals." Quantum 5 (August 31, 2021): 533. http://dx.doi.org/10.22331/q-2021-08-31-533.

Full text
Abstract:
We present methods for implementing arbitrary permutations of qubits under interaction constraints. Our protocols make use of previous methods for rapidly reversing the order of qubits along a path. Given nearest-neighbor interactions on a path of length n, we show that there exists a constant ϵ≈0.034 such that the quantum routing time is at most (1−ϵ)n, whereas any swap-based protocol needs at least time n−1. This represents the first known quantum advantage over swap-based routing methods and also gives improved quantum routing times for realistic architectures such as grids. Furthermore, we
APA, Harvard, Vancouver, ISO, and other styles
4

Yao, Jiameng, Yaxing Wang, Qiong Li, Haokun Mao, Ahmed A. Abd El-Latif, and Nan Chen. "An Efficient Routing Protocol for Quantum Key Distribution Networks." Entropy 24, no. 7 (2022): 911. http://dx.doi.org/10.3390/e24070911.

Full text
Abstract:
Quantum key distribution (QKD) can provide point-to-point information-theoretic secure key services for two connected users. In fact, the development of QKD networks needs more focus from the scientific community in order to broaden the service scale of QKD technology to deliver end-to-end secure key services. Of course, some recent efforts have been made to develop secure communication protocols based on QKD. However, due to the limited key generation capability of QKD devices, high quantum secure key utilization is the major concern for QKD networks. Since traditional routing techniques do n
APA, Harvard, Vancouver, ISO, and other styles
5

A. Hussein, Shahad, and Alharith A. Abdullah. "Hybrid routing protocol for quantum network based on classical and quantum routing metrics." Indonesian Journal of Electrical Engineering and Computer Science 31, no. 1 (2023): 197. http://dx.doi.org/10.11591/ijeecs.v31.i1.pp197-204.

Full text
Abstract:
A quantum repeater is the heart of a quantum internet that enables end-to-end communication over long distances using the quantum entanglement feature. Although this characteristic gives quantum networks tremendous power in terms of speed and security, it puts quantum networks, especially the quantum internet, in front of challenges, like transforming a short-distance quantum link into a long-distance link, in addition to entanglement routing for finding the best path within a quantum network. So, this research aims to propose a hybrid quantum routing protocol (HQRP) based on routing metrics o
APA, Harvard, Vancouver, ISO, and other styles
6

Allerstorfer, Rene, Harry Buhrman, Alex May, Florian Speelman, and Philip Verduyn Lunel. "Relating non-local quantum computation to information theoretic cryptography." Quantum 8 (June 27, 2024): 1387. http://dx.doi.org/10.22331/q-2024-06-27-1387.

Full text
Abstract:
Non-local quantum computation (NLQC) is a cheating strategy for position-verification schemes, and has appeared in the context of the AdS/CFT correspondence. Here, we connect NLQC to the wider context of information theoretic cryptography by relating it to a number of other cryptographic primitives. We show one special case of NLQC, known as f-routing, is equivalent to the quantum analogue of the conditional disclosure of secrets (CDS) primitive, where by equivalent we mean that a protocol for one task gives a protocol for the other with only small overhead in resource costs. We further consid
APA, Harvard, Vancouver, ISO, and other styles
7

Agustin, Silva, Omar Gustavo Zabaleta, and Constancio Miguel Arizmendi. "Learning-based Protocol for Routing in Quantum Networks." IFAC-PapersOnLine 55, no. 40 (2022): 211–16. http://dx.doi.org/10.1016/j.ifacol.2023.01.074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jeni, Jasmine, Vimala Juliet, and Messiah Bose. "An efficient quantum based routing protocol with local link failure recovery algorithm for manet." International Journal of Engineering & Technology 3, no. 2 (2014): 237. http://dx.doi.org/10.14419/ijet.v3i2.2318.

Full text
Abstract:
The mobility factor of the nodes in a mobile Ad Hoc networks (MANET) changes the network topology leading to changes in size of the network. As the topology changes, link failure between the nodes takes place due to several reasons like channel interference and dynamic obstacles that give rise to severe performance degradation. Scalability and link failure recovery are the main criteria that will determine the performance of the network in terms of quality of service (QoS). While having different type of nodes, both mobile and immobile, that have several performance severity related to data tr
APA, Harvard, Vancouver, ISO, and other styles
9

Silva, Agustin, Omar G. Zabaleta, and Constancio M. Arizmendi. "Mitigation of Routing Congestion on Data Networks: A Quantum Game Theory Approach." Quantum Reports 4, no. 2 (2022): 135–47. http://dx.doi.org/10.3390/quantum4020010.

Full text
Abstract:
Because of the sustained growth of information and mobile users transmitting a great amount of data packets, modern network performances are being seriously affected by congestion problems. In fact, congestion management is a challenging task that can be roughly summarized as a trade off between transmission latency and cost. In order to contribute to solve the congestion problem on communication networks, a novel framework based on a quantum game model is proposed, where network packets compete selfishly for their fastest route. Simulations show that final network routing and traveling times
APA, Harvard, Vancouver, ISO, and other styles
10

Jin, Xing, Ana Marotti, Edgard Lamounier, Andre Luıs de Araujo, and Ricardo de Oliveira Rocha. "An Improved Quantum Particle Swarm Algorithm for Routing Optimization of Wireless Sensor Networks." International Journal of Circuits, Systems and Signal Processing 15 (January 27, 2021): 33–39. http://dx.doi.org/10.46300/9106.2021.15.4.

Full text
Abstract:
—Because of the limited energy of wireless sensor nodes, the energy loss of communication process affects network performance. In order to prolong the network lifetime and combine the fast ergodicity of the quantum particle swarm, this paper proposes a wireless network routing optimization method to improve the quantum particle swarm, aiming at the leach problem of the wireless sensor network WSN Classic Clustering protocol. The optimal routing speed is accelerated, and the optimal routing and energy consumption of the network are balanced as far as possible, and adjust the parameters of the c
APA, Harvard, Vancouver, ISO, and other styles
11

Yu Xu-Tao, Xu Jin, and Zhang Zai-Chen. "Routing protocol for wireless ad hoc quantum communication network based on quantum teleportation." Acta Physica Sinica 61, no. 22 (2012): 220303. http://dx.doi.org/10.7498/aps.61.220303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Mok, Wai-Keong, and Leong-Chuan Kwek. "Quantum Switchboard with Coupled-Cavity Array." Entropy 24, no. 1 (2022): 136. http://dx.doi.org/10.3390/e24010136.

Full text
Abstract:
The ability to control the flow of quantum information is deterministically useful for scaling up quantum computation. In this paper, we demonstrate a controllable quantum switchboard which directs the teleportation protocol to one of two targets, fully dependent on the sender’s choice. Importantly, the quantum switchboard also acts as a optimal quantum cloning machine, which allows the receivers to recover the unknown quantum state with a maximal fidelity of 56. This protects the system from the complete loss of quantum information in the event that the teleportation protocol fails. We also p
APA, Harvard, Vancouver, ISO, and other styles
13

Rajesh, Dennison, and Gowda Shankarappa Rajanna. "CSCRT Protocol with Energy Efficient Secured CH Clustering for Smart Dust Network Using Quantum Key Distribution." International Journal of Safety and Security Engineering 12, no. 4 (2022): 441–48. http://dx.doi.org/10.18280/ijsse.120404.

Full text
Abstract:
Energy efficient protocols for Mobile wireless smart dust networks are getting prominence in the present scenario. This paper describes a novel scheme for intrusion detection framework for secured clustered mobile smart dust networks which better suits the periodical data gathering. The essential objective of a battery equipped mobile wireless smart dust nodes is to upgrade the transmission energy. The proposed protocol has the favourable position that the communication and computational overheads get reduced and gives improved energy efficient routing protocol as far as energy efficient and i
APA, Harvard, Vancouver, ISO, and other styles
14

Zhang, Ling, and Qin Liu. "Optimisation of the routing protocol for quantum wireless Ad Hoc network." IET Quantum Communication 3, no. 1 (2021): 5–12. http://dx.doi.org/10.1049/qtc2.12028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Wang, Junyong, Liang Chang, Hongyu Chen, and Zhencai Zhu. "Networking Feasibility of Quantum Key Distribution Constellation Networks." Entropy 24, no. 2 (2022): 298. http://dx.doi.org/10.3390/e24020298.

Full text
Abstract:
Quantum key distribution constellation is the key to achieve global quantum networking. However, the networking feasibility of quantum constellation that combines satellite-to-ground accesses selection and inter-satellite routing is faced with a lack of research. In this paper, satellite-to-ground accesses selection is modeled as problems to find the longest paths in directed acyclic graphs. The inter-satellite routing is interpreted as problems to find a maximum flow in graph theory. As far as we know, the above problems are initially understood from the perspective of graph theory. Correspon
APA, Harvard, Vancouver, ISO, and other styles
16

Xing Lei, 邢磊, 杨光 Yang Guang, 聂敏 Nie Min, 刘原华 Liu Yuanhua та 张美玲 Zhang Meiling. "基于超纠缠中继的量子组播网络路由策略". Laser & Optoelectronics Progress 60, № 7 (2023): 0727001. http://dx.doi.org/10.3788/lop213228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Palmieri, Francesco, and Aniello Castiglione. "Condensation-Based Routing in Mobile Ad-Hoc Networks." Mobile Information Systems 8, no. 3 (2012): 199–211. http://dx.doi.org/10.1155/2012/149697.

Full text
Abstract:
The provision of efficient broadcast containment schemes that can dynamically cope with frequent topology changes and limited shared channel bandwidth, is one of the most challenging research topics in MANETs, and is crucial to the basic operations of networks serving fully mobile devices within areas having no fixed communication infrastructure. This problem particularly impacts the design of dynamic routing protocol that can efficiently establish routes to deliver data packets among mobile nodes with minimum communication overhead, and at the same time, ensure high throughput and low end-to-
APA, Harvard, Vancouver, ISO, and other styles
18

Tsai, Chia-Wei, Chun-Wei Yang, Jason Lin, Yao-Chung Chang, and Ruay-Shiung Chang. "Quantum Key Distribution Networks: Challenges and Future Research Issues in Security." Applied Sciences 11, no. 9 (2021): 3767. http://dx.doi.org/10.3390/app11093767.

Full text
Abstract:
A quantum key distribution (QKD) network is proposed to allow QKD protocols to be the infrastructure of the Internet for distributing unconditional security keys instead of existing public-key cryptography based on computationally complex mathematical problems. Numerous countries and research institutes have invested enormous resources to execute correlation studies on QKD networks. Thus, in this study, we surveyed existing QKD network studies and practical field experiments to summarize the research results (e.g., type and architecture of QKD networks, key generating rate, maximum communicati
APA, Harvard, Vancouver, ISO, and other styles
19

Aravindh, G., and Capt Dr K. P. Sridhar. "Resilient and Adaptive Secure Routing Protocol for Wireless Sensor Networks Using a Grey Wolf Optimizer and Lightning Search Algorithm." Journal of Internet Services and Information Security 14, no. 4 (2024): 331–46. https://doi.org/10.58346/jisis.2024.i4.020.

Full text
Abstract:
The ability of Wireless Sensor Networks (WSNs) to efficiently monitor and collect data from difficult and distant places has made them a notable technical solution for a variety of applications. It is crucial to optimize energy usage and secure data integrity in order to put these technologies to reality with the Internet of Things (IoT). Maintaining a balance between energy economy, flexibility to changing network circumstances, and security is a common difficulty for contemporary routing systems. Because of this, the performance of these protocols drops and they become vulnerable. Specifical
APA, Harvard, Vancouver, ISO, and other styles
20

Nie Min, 聂敏, 郭建伟 Guo Jianwei, 卫容宇 Wei Rongyu, et al. "Simulation of Quantum Satellite Network Routing Protocol Based on Two-End Entanglement Exchange." Laser & Optoelectronics Progress 58, no. 3 (2021): 0306002–306002134. http://dx.doi.org/10.3788/lop202158.0306002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Tao, Lingping, and Abby Yurong Zhang. "Anti-Interference Performance Analysis and Optimization Strategy of Quantum Key Distribution Protocol in Noisy Environment." International Journal of Information Technologies and Systems Approach 18, no. 1 (2025): 1–18. https://doi.org/10.4018/ijitsa.378674.

Full text
Abstract:
Quantum key distribution (QKD) technology, a secure communication method based on the fundamental principles of quantum mechanics, enables secure key sharing between two communication nodes. In theory, the unconditional security of the QKD protocol depends on ideal quantum devices, classical devices, and perfect random number generation. However, there are significant differences between the devices in the actual system and the ideal conditions, and QKD systems are inevitably affected by various noises that seriously affect the anti-interference performance and key generation efficiency of the
APA, Harvard, Vancouver, ISO, and other styles
22

Sunita Usturge. "Secure Routing and Hybrid SqueezenetFQuantumNN for Intrusion Detection in MANET." Panamerican Mathematical Journal 33, no. 3 (2024): 38–56. http://dx.doi.org/10.52783/pmj.v33.i3.880.

Full text
Abstract:
An efficient Intrusion Detection System (IDS) is essential to secure Mobile Ad-hoc Networks (MANETs) against malevolent attacks. The present IDS still faces challenges in enhancing detection accuracy and in decreasing the false alarm rate. To overcome the above issues, a secure routing protocol for intrusion detection in MANET has been proposed here. In the proposed model, initially, MANET is simulated, which is followed by routing based on Dynamic Source Routing (DSR) routing protocol. Then, intrusion detection is done at Base Station (BS). At the BS, the log files are acquired from the datas
APA, Harvard, Vancouver, ISO, and other styles
23

Hahto, Markku, Johannes Nokkala, Guillermo García-Pérez, Sabrina Maniscalco, and Jyrki Piilo. "Transfer and routing of Gaussian states through quantum complex networks with and without community structure." Quantum 9 (May 20, 2025): 1751. https://doi.org/10.22331/q-2025-05-20-1751.

Full text
Abstract:
The goal in quantum state transfer is to avoid the need to physically transport carriers of quantum information. This is achieved by using a suitably engineered Hamiltonian that induces the transfer of the state of one subsystem to another. A less known generalization of state transfer considers multiple systems such that any pair can exchange quantum information and transfers can take place at any time, starting and stopping independently. This is sometimes called routing of quantum states. State transfer in particular has received a great deal of attention, however the vast majority of resul
APA, Harvard, Vancouver, ISO, and other styles
24

Zhang, De-gan, Ting Zhang, Yue Dong, Xiao-huan Liu, Yu-ya Cui, and De-xin Zhao. "Novel optimized link state routing protocol based on quantum genetic strategy for mobile learning." Journal of Network and Computer Applications 122 (November 2018): 37–49. http://dx.doi.org/10.1016/j.jnca.2018.07.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

NIE Min, 聂敏, 雷鹏 LEI Peng, 杨光 YANG Guang, 张美玲 ZHANG Mei-ling, 孙爱晶 SUN Ai-jing, and 裴昌幸 PEI Chang-xing. "Research on Quantum Wireless Multi-hop Network Routing Protocol Based on Maximum Weights Entanglement Distribution." Acta Sinica Quantum Optica 25, no. 1 (2019): 22–35. http://dx.doi.org/10.3788/jqo20192501.0302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Huadong, and Dayu Wang. "An Efficient and Reliable Routing Protocol for WSNs Based on Quantum Artificial Bee Colony Algorithm." International Journal of Control and Automation 10, no. 3 (2017): 193–206. http://dx.doi.org/10.14257/ijca.2017.10.3.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Paulraj, D., S. Neelakandan, and M. Prakash. "A Novel Quantum Chimp Optimization with DNA Sequence Based Multihop Secure Routing Protocol for Wireless Sensor Networks." Wireless Personal Communications 136, no. 3 (2024): 1353–74. http://dx.doi.org/10.1007/s11277-024-11280-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Dai, Zijie, Eryi Pan, Xuefeng Chen, Xiaoxian Song, Haiting Zhang, and Ying Liang. "Compact Design for Bi-Polarization Quantum Routers on SOI Platform." Photonics 10, no. 8 (2023): 897. http://dx.doi.org/10.3390/photonics10080897.

Full text
Abstract:
An ultra-compact optical quantum router (QR) consisting of a Mach–Zehnder interferometer (MZI) and waveguide tapers is proposed and numerically simulated, using silicon-on-insulator (SOI). The interferometer is designed to work at the center wavelength of 1550 nm with visibilities of 99.65% and 98.80% for TE and TM polarizations, respectively. Using the principle of phase compensation and self-image, the length of the waveguide tapers is shortened by an order of magnitude with the transmission above 95% for both TE and TM polarizations. Furthermore, polarization beam splitters (PBS) with an ul
APA, Harvard, Vancouver, ISO, and other styles
29

Khudair Madhloom, Jamal, Hussein Najm Abd Ali, Haifaa Ahmed Hasan, Oday Ali Hassen, and Saad Mohamed Darwish. "A Quantum-Inspired Ant Colony Optimization Approach for Exploring Routing Gateways in Mobile Ad Hoc Networks." Electronics 12, no. 5 (2023): 1171. http://dx.doi.org/10.3390/electronics12051171.

Full text
Abstract:
Establishing internet access for mobile ad hoc networks (MANET) is a job that is both vital and complex. MANET is used to build a broad range of applications, both commercial and non-commercial, with the majority of these apps obtaining access to internet resources. Since the gateways (GWs) are the central nodes in a MANET’s ability to connect to the internet, it is common practice to deploy numerous GWs to increase the capabilities of a MANET. Current routing methods have been adapted and optimized for use with MANET through the use of both conventional routing techniques and tree-based netwo
APA, Harvard, Vancouver, ISO, and other styles
30

Wang, Chuhang, Huangshui Hu, and Xinji Fan. "Intelligent clustering and routing protocol for wireless sensor networks using quantum inspired Harris Hawk optimizer and deep reinforcement learning." Ad Hoc Networks 178 (November 2025): 103914. https://doi.org/10.1016/j.adhoc.2025.103914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ikeoluwa Kolawole, Jesudunsin O. Olaobaju, and Omolola A. Akinola. "Deployment of a novel breach-resistant data offloading protocol from tactical edge to cloud via hardened fog gateways." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 946–60. https://doi.org/10.30574/wjaets.2025.15.3.1021.

Full text
Abstract:
Military navigation and command systems face escalating challenges in GPS-degraded or denied environments, necessitating architectures that are both resilient and secure. This study proposes and evaluates a fog-to-cloud framework engineered for real-time, low-latency communication across edge devices—including UAVs, ground vehicles, and maritime units—linked to cloud-based central command. The architecture incorporates adaptive routing algorithms, lightweight encryption, and AI-driven anomaly detection to maintain operational continuity in hostile or electromagnetically contested scenarios. Ex
APA, Harvard, Vancouver, ISO, and other styles
32

Alexandrova, Elena, Maria Poltavtseva, and Anastasia Yarmak. "Application of hierarchic authentication to isogenies of elliptic curves for providing safety of data routing in the systems of analysis of digital production traffic." SHS Web of Conferences 44 (2018): 00007. http://dx.doi.org/10.1051/shsconf/20184400007.

Full text
Abstract:
The article discusses the peculiarities of the process of information routing in the course of acquisition and processing big data of digital production, including systems of traffic analysis. Such a specific features variability of physical nodes-processors with the retention of functional stringency of order of information processing is distinguished. Inordertoprovidesafetyofthedescribedprocessofinformationprocessingand possibility of restoration of a chain of processing every fragment of data, the authors offer a protocol of hierarchic authentication developed thereby on isogenies of ellipt
APA, Harvard, Vancouver, ISO, and other styles
33

Muthusamy, Prakash, Senthil Kumar S, Kanagalakshmi K, and Sreejith Vignesh B P. "A Hybrid Improved Unequal Secure Cluster Based Distributed Routing Protocol with Quantum Key Distribution to Improve the Performance Measures in Wireless Body Sensor Network." International Journal of Computer Networks and Applications 11, no. 4 (2024): 407–27. http://dx.doi.org/10.22247/ijcna/2024/26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Amaresan, Venkatesan. "PROXY ARP IMPLEMENTATION-BASED SECURE DATA TRANSMISSION IN EVPN VXLAN UNDERLAY NETWORK USING FM2A2C TECHNIQUES." European Journal of Advances in Engineering and Technology 10, no. 2 (2023): 84–95. https://doi.org/10.5281/zenodo.13919388.

Full text
Abstract:
Inter-subnet communication among data is enhanced by the Proxy Address Resolution Protocol (Proxy-ARP) implementation in Ethernet Virtual Private Network (EVPN) Virtual Extensible Local Area Network (VXLAN) underlay networks. Nevertheless, none of the prevailing works utilized Proxy ARP as a primary tool in EVPN VXLAN underlay networks, which resulted in unnecessary ARP broadcasts and inefficient bandwidth usage. Hence, in the proposed work, Feistel Message Autokey Authentication Cipher Code (FM2A2C) and Renyi Gibbs Entropy-based Advanced Polygram Hill Encryption Standard (RGE-APHES) technique
APA, Harvard, Vancouver, ISO, and other styles
35

Bannikuppe Srinivasiah, Venkatesh Prasad, Roopashree Hejjaji Ranganathasharma, and Venkatesh Ramanna. "Multi-objective-trust aware improved grey wolf optimization technique for uncovering adversarial attacks in WSNs." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 1 (2024): 375. http://dx.doi.org/10.11591/ijeecs.v36.i1.pp375-391.

Full text
Abstract:
Wireless sensor network (WSN) is made of several sensor nodes (SN) that monitor various applications and collect environmental data. WSNs are essential for a wide range application, including healthcare, industrial automation, and environmental monitoring. However, these networks are susceptible to several security threats, underscoring the need for robust attack detection systems. Therefore, in this study, a multi-objective-trust aware improved grey wolf optimization (M-TAIGWO) is implemented to mitigate various attacks types. This implemented M-TAIGWO method is used to select secure cluster
APA, Harvard, Vancouver, ISO, and other styles
36

Venkatesh, Prasad Bannikuppe Srinivasiah Roopashree Hejjaji Ranganathasharma Venkatesh Ramanna. "Multi-objective-trust aware improved grey wolf optimization technique for uncovering adversarial attacks in WSNs." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 1 (2024): 375–91. https://doi.org/10.11591/ijeecs.v36.i1.pp375-391.

Full text
Abstract:
Wireless sensor network (WSN) is made of several sensor nodes (SN) that monitor various applications and collect environmental data. WSNs are essential for a wide range application, including healthcare, industrial automation, and environmental monitoring. However, these networks are susceptible to several security threats, underscoring the need for robust attack detection systems. Therefore, in this study, a multi-objective-trust aware improved grey wolf optimization (M-TAIGWO) is implemented to mitigate various attacks types. This implemented M-TAIGWO method is used to select secure cluster
APA, Harvard, Vancouver, ISO, and other styles
37

Fan, Xincan, Xiaojun Wen, and Yajun Zhuang. "Research on the Communication Transmission and Routing Protocols of Quantum Mobile Internet." Journal of Computational and Theoretical Nanoscience 13, no. 9 (2016): 5742–47. http://dx.doi.org/10.1166/jctn.2016.5481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Agustin, Silva, Zabaleta Omar G., and Arizmendi Constancio M. "Quantum Game Theory approach for data network routing: a solution for the congestion problem." Journal of Physics: Conference Series 2207, no. 1 (2022): 012034. http://dx.doi.org/10.1088/1742-6596/2207/1/012034.

Full text
Abstract:
Abstract Because of the sustained growth of information and mobile users transmitting a great amount of data packets, modern network performances are being seriously affected by congestion problems. In fact, congestion management is a challenging task that can be roughly summarized as a trade off between transmission latency and cost. In this context, a novel framework is proposed for solving the congestion problem on communication networks using a quantum game theory model, where network packets compete selfishly for the shortest route. Simulations show that final network routing and travelin
APA, Harvard, Vancouver, ISO, and other styles
39

Pereira, J. A. M., and F. Damaceno. "MACROBITS, a teaching tool for quantum cryptography." Revista do Professor de Física 6, Especial (2022): 529–32. http://dx.doi.org/10.26512/rpf.v1i1.46015.

Full text
Abstract:
One amazing characteristic of quantum algorithms is how they can deliver results with 100% certainty despite their structure being based on the probabilistic interpretation of quantum mechanics. This type of algorithm requires a different way of thinking and sets a challenge for science educators. A routine to emulate quantum cryptography protocols for high school students is proposed in this work. The educational procedure uses a tool we have developed and called MACROBIT as a mean to mimic algorithms of quantum key distribution. The MACROBITS are useful to illustrate quantum mechanics concep
APA, Harvard, Vancouver, ISO, and other styles
40

Zhang, Hongliang, Dongxiao Quan, Changhua Zhu, and Zhigang Li. "A Quantum Cryptography Communication Network Based on Software Defined Network." ITM Web of Conferences 17 (2018): 01008. http://dx.doi.org/10.1051/itmconf/20181701008.

Full text
Abstract:
With the development of the Internet, information security has attracted great attention in today’s society, and quantum cryptography communication network based on quantum key distribution (QKD) is a very important part of this field, since the quantum key distribution combined with one-time-pad encryption scheme can guarantee the unconditional security of the information. The secret key generated by quantum key distribution protocols is a very valuable resource, so making full use of key resources is particularly important. Software definition network (SDN) is a new type of network architect
APA, Harvard, Vancouver, ISO, and other styles
41

Kannan, B., D. L. Campbell, F. Vasconcelos, et al. "Generating spatially entangled itinerant photons with waveguide quantum electrodynamics." Science Advances 6, no. 41 (2020): eabb8780. http://dx.doi.org/10.1126/sciadv.abb8780.

Full text
Abstract:
Realizing a fully connected network of quantum processors requires the ability to distribute quantum entanglement. For distant processing nodes, this can be achieved by generating, routing, and capturing spatially entangled itinerant photons. In this work, we demonstrate the deterministic generation of such photons using superconducting transmon qubits that are directly coupled to a waveguide. In particular, we generate two-photon N00N states and show that the state and spatial entanglement of the emitted photons are tunable via the qubit frequencies. Using quadrature amplitude detection, we r
APA, Harvard, Vancouver, ISO, and other styles
42

Pérez Castro, David, Ana Fernández Vilas, Manuel Fernández Veiga, Mateo Blanco Rodríguez, and Rebeca P. Díaz Redondo. "Simulation of Fidelity in Entanglement-Based Networks with Repeater Chains." Applied Sciences 14, no. 23 (2024): 11270. https://doi.org/10.3390/app142311270.

Full text
Abstract:
We implement a set of simulation experiments in NetSquid specifically designed to estimate the end-to-end fidelity across a path of quantum repeaters or quantum switches. The switch model includes several generalizations that are not currently available in other tools and are useful for gaining insight into practical and realistic quantum network engineering problems: an arbitrary number of memory registers at the switches, simplicity in including entanglement distillation mechanisms, arbitrary switching topologies, and routing protocols. An illustrative case study is presented, namely a compa
APA, Harvard, Vancouver, ISO, and other styles
43

Zeng, Yiming, Jiarui Zhang, Zhenhua Liu, and Yuanyuan Yang. "Entanglement Management through Swapping over Quantum Internets." ACM SIGMETRICS Performance Evaluation Review 51, no. 2 (2023): 69–71. http://dx.doi.org/10.1145/3626570.3626595.

Full text
Abstract:
Quantum Internet has the potential to support a wide range of applications in quantum communication and quantum computing by generating, distributing, and processing quantum information. Generating a long-distance quantum entanglement is one of the most essential functions of a quantum Internet to facilitate these applications. However, entanglement is a probabilistic process, and its success rate drops significantly as distance increases. Entanglement swapping is an efficient technique used to address this challenge. How to efficiently manage the entanglement through swapping is a fundamental
APA, Harvard, Vancouver, ISO, and other styles
44

Sansavini, Francesca, and Valentina Parigi. "Continuous Variables Graph States Shaped as Complex Networks: Optimization and Manipulation." Entropy 22, no. 1 (2019): 26. http://dx.doi.org/10.3390/e22010026.

Full text
Abstract:
Complex networks structures have been extensively used for describing complex natural and technological systems, like the Internet or social networks. More recently, complex network theory has been applied to quantum systems, where complex network topologies may emerge in multiparty quantum states and quantum algorithms have been studied in complex graph structures. In this work, we study multimode Continuous Variables entangled states, named cluster states, where the entanglement structure is arranged in typical real-world complex networks shapes. Cluster states are a resource for measurement
APA, Harvard, Vancouver, ISO, and other styles
45

Aktas, Fatma, Ibraheem Shayea, Mustafa Ergen, et al. "Routing Challenges and Enabling Technologies for 6G–Satellite Network Integration: Toward Seamless Global Connectivity." Technologies 13, no. 6 (2025): 245. https://doi.org/10.3390/technologies13060245.

Full text
Abstract:
The capabilities of 6G networks surpass those of existing networks, aiming to enable seamless connectivity between all entities and users at any given time. A critical aspect of achieving enhanced and ubiquitous mobile broadband, as promised by 6G networks, is merging satellite networks with land-based networks, which offers significant potential in terms of coverage area. Advanced routing techniques in next-generation network technologies, particularly when incorporating terrestrial and non-terrestrial networks, are essential for optimizing network efficiency and delivering promised services.
APA, Harvard, Vancouver, ISO, and other styles
46

Rubin, Nicholas C., Klaas Gunst, Alec White, et al. "The Fermionic Quantum Emulator." Quantum 5 (October 27, 2021): 568. http://dx.doi.org/10.22331/q-2021-10-27-568.

Full text
Abstract:
The fermionic quantum emulator (FQE) is a collection of protocols for emulating quantum dynamics of fermions efficiently taking advantage of common symmetries present in chemical, materials, and condensed-matter systems. The library is fully integrated with the OpenFermion software package and serves as the simulation backend. The FQE reduces memory footprint by exploiting number and spin symmetry along with custom evolution routines for sparse and dense Hamiltonians, allowing us to study significantly larger quantum circuits at modest computational cost when compared against qubit state vecto
APA, Harvard, Vancouver, ISO, and other styles
47

J. Karthikeyini. "Optimized Energy-Aware Routing for Internet of Things Enabled WSNS using Neuro-Fuzzy Clustering and Quantum Firefly Algorithm." Communications on Applied Nonlinear Analysis 32, no. 3s (2024): 558–77. https://doi.org/10.52783/cana.v32.2696.

Full text
Abstract:
Researchers and industry professionals are highly interested in Wireless Sensor Networks (WSNs) due to their importance in utilizing low-cost, low-power microelements, such as radios, computers, and sensors, which are often integrated onto a single chip. Recently, the integration of the Internet of Things (IoT) with WSNs has been extensively explored. Effective routing techniques are crucial for optimizing power usage, ensuring Quality of Service (QoS), and maintaining network reliability in IoT-enabled WSNs. This paper presents an enhanced energy-aware navigation system that employs the Quant
APA, Harvard, Vancouver, ISO, and other styles
48

Azizul Hasan, Zati Hakim, Duaa Abdel Fattah Mehiar, and Chu Kiong Loo. "REDUCING INTERRUPTS AMONG ROBOTS IN QUANTUM-BEHAVED SWARM EXPLORATION WITH MR-LEACH." Malaysian Journal of Computer Science 34, no. 4 (2021): 324–40. http://dx.doi.org/10.22452/mjcs.vol34no4.1.

Full text
Abstract:
A quantum-behaved robot exploration algorithm such as the Quantum Robotic Darwinian Particle Swarm Optimization (QRDPSO) gives stable swarm movement in unstructured conditions but suffers from communication interruptions. This paper examines the Multi-hop Routing with Low Energy Adaptive Clustering Hierarchy (MR-LEACH) to improve the inter-connectivity in the QRDPSO. The MR-LEACH identifies partitions in the network into multi-hop network paths. The multi-hop network paths allow all robots to exchange information without unnecessarily restricting the swarm’s range explicitly. As a result, the
APA, Harvard, Vancouver, ISO, and other styles
49

Buhrman, Harry, Marten Folkertsma, Bruno Loff, and Niels M. P. Neumann. "State preparation by shallow circuits using feed forward." Quantum 8 (December 9, 2024): 1552. https://doi.org/10.22331/q-2024-12-09-1552.

Full text
Abstract:
Fault tolerant quantum computers repetitively apply a four-step procedure: First, perform a few one and two-qubit quantum gates. Second, perform a syndrome measurement on a subset of the qubits. Third, perform fast classical computations to establish if and where errors occurred. And, fourth, correct the errors with a correction step. The next iteration applies the same procedure with new one and two-qubit gates. Even though current error-rates prohibit this procedure to work and fault tolerant quantum computing remains a distant goal, the same procedure can already prove useful today. In this
APA, Harvard, Vancouver, ISO, and other styles
50

Tongesai, Machakaire. "Enhancing MANETs for military applications: A comprehensive review of innovations, challenges, and research gaps." i-manager’s Journal on Wireless Communication Networks 13, no. 2 (2025): 46. https://doi.org/10.26634/jwcn.13.2.22063.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) have become indispensable in modern military operations; they provide decentralized, adaptive, and resilient communication frameworks in dynamic battlefield environments. This paper presents a comprehensive review of MANET innovations, challenges, and research gaps, focusing on advancements in security mechanisms, energy efficiency, routing optimization, interoperability, and AI-driven management systems. MANETs enhance military communication by enabling self-forming and self-healing networks, improving situational awareness, tactical coordination, and mission s
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!