FEF - Makale Koleksiyonu | Enformasyon Teknolojileri Bölümü / Department of Information Technologies
Recent Submissions
-
Surpassing the classical limit in magic square game with distant quantum dots coupled to optical cavities
(Nature Research, 2020-12-17)The emergence of quantum technologies is heating up the debate on quantum supremacy, usually focusing on the feasibility of looking good on paper algorithms in realistic settings, due to the vulnerability of quantum systems ... -
Preparing multipartite entangled spin qubits via pauli spin blockade
(Nature Research, 2020-02-26)Preparing large-scale multi-partite entangled states of quantum bits in each physical form such as photons, atoms or electrons for each specific application area is a fundamental issue in quantum science and technologies. ... -
Parameter estimation with Dzyaloshinskii–Moriya interaction under external magnetic fields
(Springer, 2020-02-01)We study the effects of external magnetic fields on the precision of parameter estimation with thermal entanglement of two spins in XX model, in the presence of Dzyaloshinskii–Moriya (DM) interaction. Although DM interaction ... -
Work and heat value of bound entanglement
(Springer, 2019-12)Entanglement has recently been recognized as an energy resource which can outperform classical resources if decoherence is relatively low. Multi-atom entangled states can mutate irreversibly to so-called bound entangled ... -
Action readiness and mindset for IT offshoring
(Emerald Group Publishing Limited, 2010)Purpose: The paper aims to examine the degree of changes in action readiness and mindset for the IT offshore outsourcing (offshoring) practice of a number of leading finance and insurance organisations. In particular, the ... -
Design science perspective on NFC research: Review and research agenda
(2013)Near Field Communication (NFC), as one of the emerging and promising technological developments, provides means to short range contactless communication for mobile phones and other devices alike. NFC has become an attractive ... -
On the analysis of expected distance between sensor nodes and the base station in randomly deployed WSNs
(Springer Verlag, 2014)In this study, we focus on the analytical derivation of the expected distance between all sensor nodes and the base station (i.e., E[dtoBS]) in a randomly deployed WSN. Although similar derivations appear in the related ... -
An essential approach to the architecture of diatomic molecules. 1. Basic theory
(2004)We consider the quantum mechanical description of a diatomic molecule of "electronic mass" m0e, "internuclear distance" R0, and "total electronic energy" E0e. We apply to it the Born-Oppenheimer approximation, together ... -
An essential approach to the architecture of diatomic molecules: 2. how are size, vibrational period of time, and mass interrelated?
(Optical Soc Amer, 2004-11)In our previous article, we arrived at an essential relationship for T the classical vibrational period of a given diatomic molecule, at the total electronic energy E-, i.e., T = [4pi(2)/(rootn(1)n(2)h)] rootgM(0)m(e) R-2, ... -
Information passing in healthcare social networks
(2017)In recent years, social networks have become one of the most influential developments in our lives. In this paper, we investigate trust relationships and information passing in online social networks that focus on health. ... -
Quantum fisher information of bipartitions of W states
(Polish Acad Sciences Inst Physics, 2015-04-24)We study the quantum Fisher information (QFI) of W states and W-like states under decoherence. In particular, we find that on the contrary to amplitude damping and depolarizing decoherence, a W-like state of 3 qubits ... -
The survey on Near Field Communication
(MDPI, 2015-06)Near Field Communication (NFC) is an emerging short-range wireless communication technology that offers great and varied promise in services such as payment, ticketing, gaming, crowd sourcing, voting, navigation, and many ... -
Logic programming approach to automata-based decision procedures
(Elsevier Science Inc, 2017-01)We propose a novel technique that reduces the decision problem of WSnS (weak monadic second-order logic with n successors) to the problem of evaluation of Complex-value Datalog queries. We then show how the use of advanced ... -
Temperature control in dissipative cavities by entangled dimers
(Amer Chemical Soc, 2019-02-21)We show that the temperature of a cavity field can be drastically varied by its interaction with suitably entangled atom pairs (dimers) traversing the cavity under realistic atomic decoherence. To this end we resort to the ... -
Freezing optical rogue waves by Zeno dynamics
(Elsevier Science BV, 2018-04-15)We investigate the Zeno dynamics of the optical rogue waves. Considering their usage in modeling rogue wave dynamics, we analyze the Zeno dynamics of the Akhmediev breathers, Peregrine and Akhmediev-Peregrine soliton ... -
A tokenization-based communication architecture for HCE-Enabled NFC services
(Hindawi Publishing Cor, 2016)Following the announcement of Host Card Emulation (HCE) technology, card emulation mode based Near Field Communication (NFC) services have gained further appreciation as an enabler of the Cloud-based Secure Element (SE) ... -
Deterministic local doubling of W states
(OSA - The Optical Society, 2016-11-01)In large quantum systems, multipartite entanglement can be found in many inequivalent classes. Preparing states of arbitrary size in different classes is important for performing a wide range of quantum protocols. W states, ... -
A novel approach to the systematization of alpha-decaying nuclei, based on shell structures
(Springer, 2016-05-24)We provide a novel systematization of alpha-decaying nuclei, starting with the classically adopted mechanism. The decay half-life of an alpha-disintegrating nucleus is framed, supposing that i) the alpha-particle is born ... -
Deterministic generation of large scale atomic W states
(Optical Soc Amer, 2016-05-30)We present a deterministic scheme for generating large-scale atomic W states in a cavity QED system via a simple expansion mechanism, which is realized only by a detuned interaction between two identical atoms and a vacuum ... -
SIMSec: A key exchange protocol between SIM card and service provider
(Springer New York LLC, 2016-08-01)Mobile technology is so popular and overdosed adoption is inevitable in today’s world. As the mobile technologies have advanced, Service Providers (SP) have offered services via Smartphones and some of them required secure ...