A Comprehensive but not Complicated Survey on Quantum Computing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Comprehensive Survey on Security in Cloud Computing

According to a Forbes’ report published in 2015, cloud-based security spending is expected to increase by 42%. According to another research, the IT security expenditure had increased to 79.1% by 2015, showing an increase of more than 10% each year. International Data Corporation (IDC) in 2011 showed that 74.6% of enterprise customers ranked security as a major challenge. This paper summarizes ...

متن کامل

Task Scheduling in Fog Computing: A Survey

Recently, fog computing has been introducedto solve the challenges of cloud computing regarding Internet objects. One of the challenges in the field of fog computing is the scheduling of tasks requested by Internet objects. In this study, a review of articles related to task scheduling in fog computing has been done. At first, the research questions and goals will be introduced, an...

متن کامل

Evolutionary membrane computing: A comprehensive survey and new results

Article history: Received 30 April 2013 Received in revised form 24 February 2014 Accepted 8 April 2014 Available online 19 April 2014

متن کامل

Survey on Design of Quantum Computing Analysis Techniques

As it is a modern era of science and technology and the humankind is to elaborate their thinking in the field of medicine and different technology sector. Quantum computing is essentially harnessing and exploiting the amazing laws of quantum mechanics to process information. A quantum computer uses quantum bits or qubits. Qubit is a quantum system that encodes the zero and the one into two dist...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IERI Procedia

سال: 2014

ISSN: 2212-6678

DOI: 10.1016/j.ieri.2014.09.069