Essays about: "Kvantdatorer"
Showing result 6 - 10 of 37 essays containing the word Kvantdatorer.
-
6. Quantum Algorithms for Feature Selection and Compressed Feature Representation of Data
University essay from KTH/FysikAbstract : Quantum computing has emerged as a new field that may have the potential to revolutionize the landscape of information processing and computational power, although physically constructing quantum hardware has proven difficult,and quantum computers in the current Noisy Intermediate Scale Quantum (NISQ) era are error prone and limited in the number of qubits they contain.A sub-field within quantum algorithms research which holds potential for the NISQ era, and which has seen increasing activity in recent years, is quantum machine learning, where researchers apply approaches from classical machine learning to quantum computing algorithms and explore the interplay between the two. READ MORE
-
7. Hybrid Microwave Resonator-Nanoscale Conductor Systems
University essay from Lunds universitet/Matematisk fysik; Lunds universitet/Fysiska institutionenAbstract : Entanglement is a fundamental aspect of quantum computation and quantum information processes. In this work, we analyse the entanglement of two microwave resonators when connected to a semiconductor double quantum dot. READ MORE
-
8. The Effect of Noise on Grover's Algorithm when Searching with Multiple Marked Items
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis investigates the impact noise has on Grover’s algorithm when being used to search for multiple items in a database. The main metric being looked at is the probability of the algorithm successfully finding a correct item. READ MORE
-
9. An Arrow Metalanguage for Partially Invertible Computation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Programming languages traditionally describe computations going one way: a program might compute a hash value from a string, or an encrypted message from a plaintext. However, sometimes it is also of interest to go the other way around: for encryption, we not only want to encrypt messages but also to decrypt them, and to be sure that the decryption correctly reproduces the original message. READ MORE
-
10. Evaluating the performance of FPGA-based Secure Hash Algorithms for use in SPHINCS+
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the digital landscape of today, large amounts of transactions, messaging and different kinds of authorizations are carried out online. To ensure the the integrity and security of these systems, digital signature systems are used to verify the identity of different individuals and entities. READ MORE