Başlık için FEF - Makale Koleksiyonu | Enformasyon Teknolojileri Bölümü / Department of Information Technologies listeleme
Toplam kayıt 70, listelenen: 48-67
-
Preparing multipartite entangled spin qubits via pauli spin blockade
(Nature Research, 2020-02-26)Preparing large-scale multi-partite entangled states of quantum bits in each physical form such as photons, atoms or electrons for each specific application area is a fundamental issue in quantum science and technologies. ... -
Quantum fisher information of a 3 x 3 bound entangled state and its relation with geometric discord
(Springer/Plenum Publishers, 2015-09)Recent studies on quantum Fisher information (QFI) have been focused mostly on qubit systems within the context of how entanglement helps surpassing the classical limit of separable states and the limit that a given entangled ... -
Quantum fisher information of bipartitions of W states
(Polish Acad Sciences Inst Physics, 2015-04-24)We study the quantum Fisher information (QFI) of W states and W-like states under decoherence. In particular, we find that on the contrary to amplitude damping and depolarizing decoherence, a W-like state of 3 qubits ... -
Quantum fisher information of several qubitsin the superposition of A GHZ and two W stateswith arbitrary relative phase
(Springer/Plenum Publishers, 2014-09)We study the quantum Fisher information (QFI) of a system of several particles which is in a superposition of a GHZ and two W states with arbitrary relative phase. We show that as the number of particles increases from 3 ... -
Quantum metrology: Surpassing the shot-noise limit with Dzyaloshinskii-Moriya interaction
(Nature Publishing Group, 2015-11-09)Entanglement is at the heart of quantum technologies such as quantum information and quantum metrology. Providing larger quantum Fisher information (QFI), entangled systems can be better resources than separable systems ... -
Quarantine region scheme to mitigate spam attacks in wireless sensor networks
(IEEE, 2006-08)The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the ... -
Querying sensor networks by using dynamic task sets
(Elsevier B.V., 2006-05-15)A data querying scheme is introduced for sensor networks where queries formed for each sensing task are sent to task sets. The sensor field is partitioned into subregions by using quadtree based addressing, and then a given ... -
Relocating sensor nodes to maximize cumulative connected coverage in wireless sensor networks
(Molecular Diversity Preservation Int, 2008-04)In order to extend the availability of the wireless sensor network and to extract maximum possible information from the surveillance area, proper usage of the power capacity of the sensor nodes is important. Our work ... -
A role-based service level NFC ecosystem model
(Springer, 2013-02)Near Field Communication (NFC) is a short range wireless communication technology allowing to communicate mobile devices within close proximity. It provides opportunity for service providers to offer various value added ... -
Saliency detection based on hybrid artificial bee colony and firefly optimization
(Springer Science and Business Media Deutschland GmbH, 2022-11)Saliency detection is one of the challenging problems still tackled by image processing and computer vision research communities. Although not very numerous, recent studies reveal that optimization-based methods provide ... -
The sectoral sweeper scheme for wireless sensor networks: Adaptive antenna array based sensor node management and location estimation
(Kluwer Academic Publishers-Plenum Publishers, 2006-12)We introduce a novel sensor node management and location estimation method referred as sectoral sweeper (SS) scheme that uses an adaptive antenna array (AAA) at a central node in wireless sensor networks (WSNs). With the ... -
SIMSec: A key exchange protocol between SIM card and service provider
(Springer New York LLC, 2016-08-01)Mobile technology is so popular and overdosed adoption is inevitable in today’s world. As the mobile technologies have advanced, Service Providers (SP) have offered services via Smartphones and some of them required secure ... -
Staying the course: Permanent bases in Iraq? (vol 13, pg 109, 2006)
(Wiley-Blackwell Publishing, 2006)[No abstract available] -
Surpassing the classical limit in magic square game with distant quantum dots coupled to optical cavities
(Nature Research, 2020-12-17)The emergence of quantum technologies is heating up the debate on quantum supremacy, usually focusing on the feasibility of looking good on paper algorithms in realistic settings, due to the vulnerability of quantum systems ... -
The survey on Near Field Communication
(MDPI, 2015-06)Near Field Communication (NFC) is an emerging short-range wireless communication technology that offers great and varied promise in services such as payment, ticketing, gaming, crowd sourcing, voting, navigation, and many ... -
A survey on Near Field Communication (NFC) technology
(Springer, 2013-08)Near Field Communication (NFC) as a promising short range wireless communication technology facilitates mobile phone usage of billions of people throughout the world that offers diverse services ranging from payment and ... -
Temperature control in dissipative cavities by entangled dimers
(Amer Chemical Soc, 2019-02-21)We show that the temperature of a cavity field can be drastically varied by its interaction with suitably entangled atom pairs (dimers) traversing the cavity under realistic atomic decoherence. To this end we resort to the ... -
Thermochemical conversion of bean pods to carbon materials and gas
(Freund Publishing House Ltd, 2008)The preparation of activated carbons from bean pods by chemical (K(2)CO(3)) and physical (water vapor) activation was investigated. The carbon prepared by chemical activation presented more developed porous structure than ... -
A tokenization-based communication architecture for HCE-Enabled NFC services
(Hindawi Publishing Cor, 2016)Following the announcement of Host Card Emulation (HCE) technology, card emulation mode based Near Field Communication (NFC) services have gained further appreciation as an enabler of the Cloud-based Secure Element (SE) ... -
Topography of inland deltas: Observations, modeling, and experiments
(Amer Geophysical Union, 2010-04-28)The topography of inland deltas is influenced by the water-sediment balance in distributary channels and local evaporation and seepage rates. In this letter a reduced complexity model is applied to simulate inland delta ...