Browse Articles

Hybrid Quantum-Classical Generative Adversarial Network for synthesizing chemically feasible molecules

Sikdar et al. | Jan 10, 2023

Hybrid Quantum-Classical Generative Adversarial Network for synthesizing chemically feasible molecules

Current drug discovery processes can cost billions of dollars and usually take five to ten years. People have been researching and implementing various computational approaches to search for molecules and compounds from the chemical space, which can be on the order of 1060 molecules. One solution involves deep generative models, which are artificial intelligence models that learn from nonlinear data by modeling the probability distribution of chemical structures and creating similar data points from the trends it identifies. Aiming for faster runtime and greater robustness when analyzing high-dimensional data, we designed and implemented a Hybrid Quantum-Classical Generative Adversarial Network (QGAN) to synthesize molecules.

Read More...

Error mitigation of quantum teleportation on IBM quantum computers

Chen et al. | May 15, 2023

Error mitigation of quantum teleportation on IBM quantum computers

Quantum computers can perform computational tasks beyond the capability of classical computers, such as simulating quantum systems in materials science and chemistry. Quantum teleportation is the transfer of quantum information across distances, relying on entangled states generated by quantum computing. We sought to mitigate the error of quantum teleportation which was simulated on IBM cloud quantum computers.

Read More...

A meta-analysis on NIST post-quantum cryptographic primitive finalists

Benny et al. | Sep 21, 2024

A meta-analysis on NIST post-quantum cryptographic primitive finalists
Image credit: Benny et al. 2024

The advent of quantum computing will pose a substantial threat to the security of classical cryptographic methods, which could become vulnerable to quantum-based attacks. In response to this impending challenge, the field of post-quantum cryptography has emerged, aiming to develop algorithms that can withstand the computational power of quantum computers. This study addressed the pressing concern of classical cryptographic methods becoming vulnerable to quantum-based attacks due to the rise of quantum computing. The emergence of post-quantum cryptography has led to the development of new resistant algorithms. Our research focused on four quantum-resistant algorithms endorsed by America’s National Institute of Standards and Technology (NIST) in 2022: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. This study evaluated the security, performance, and comparative attributes of the four algorithms, considering factors such as key size, encryption/decryption speed, and complexity. Comparative analyses against each other and existing quantum-resistant algorithms provided insights into the strengths and weaknesses of each program. This research explored potential applications and future directions in the realm of quantum-resistant cryptography. Our findings concluded that the NIST algorithms were substantially more effective and efficient compared to classical cryptographic algorithms. Ultimately, this work underscored the need to adapt cryptographic techniques in the face of advancing quantum computing capabilities, offering valuable insights for researchers and practitioners in the field. Implementing NIST-endorsed quantum-resistant algorithms substantially reduced the vulnerability of cryptographic systems to quantum-based attacks compared to classical cryptographic methods.

Read More...

Enhancing the quantum efficiency of a silicon solar cell using one dimensional thin film interferometry

Ahuja et al. | May 03, 2024

Enhancing the quantum efficiency of a silicon solar cell using one dimensional thin film interferometry
Image credit: American Public Power Association

Here, recognizing the need to improve the efficiency of the conversion of solar energy to electrical energy, the authors used MATLAB to mathematically simulate a multi-layered thin film with an without an antireflective coating. They found that the use of alternating ZnO-SiO2 multilayers enhanced the transmission of light into the solar cell, increasing its efficiency and reducing the reflectivity of the Si-Air interface.

Read More...

The Effect of Various Liquid Mediums on the Transport of Photonic Energy and its Impact on the Quantum Efficiency of Photovoltaic Cells

Payra et al. | May 05, 2015

The Effect of Various Liquid Mediums on the Transport of Photonic Energy and its Impact on the Quantum Efficiency of Photovoltaic Cells

A photovoltaic cell (PV cell), or solar cell, converts the energy of light into electricity and is the basis for solar power. In order to increase the efficiency of PV cells, the authors in this study used common household items as photon transmissions mediums and measured their effects on the temperature and voltage output of the PV cells.

Read More...

The effect of Poisson sprinkling methods on causal sets in 1+1-dimensional flat spacetime

Deshpande et al. | Feb 14, 2025

The effect of Poisson sprinkling methods on causal sets in 1+1-dimensional flat spacetime
Image credit: Deshpande and Pitu et al. 2025

The causal set theory (CST) is a theory of the small-scale structure of spacetime, which provides a discrete approach to describing quantum gravity. Studying the properties of causal sets requires methods for constructing appropriate causal sets. The most commonly used approach is to perform a random sprinkling. However, there are different methods for sprinkling, and it is not clear how each commonly used method affects the results. We hypothesized that the methods would be statistically equivalent, but that some noticeable differences might occur, such as a more uniform distribution for the sub-interval sprinkling method compared to the direct sprinkling and edge bias compensation methods. We aimed to assess this hypothesis by analyzing the results of three different methods of sprinkling. For our analysis, we calculated distributions of the longest path length, interval size, and paths of various lengths for each sprinkling method. We found that the methods were statistically similar. However, one of the methods, sub-interval sprinkling, showed some slight advantages over the other two. These findings can serve as a point of reference for active researchers in the field of causal set theory, and is applicable to other research fields working with similar graphs.

Read More...
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember