Protocol for secure quantum machine learning at a distant place
نویسندگان
چکیده
منابع مشابه
Protocol for secure quantum machine learning at a distant place
The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner’s location is taught by a provider located at a di...
متن کاملGeoreferencing Semi-Structured Place-Based Web Resources Using Machine Learning
In recent years, the shared content on the web has had significant growth. A great part of these information are publicly available in the form of semi-strunctured data. Moreover, a significant amount of these information are related to place. Such types of information refer to a location on the earth, however, they do not contain any explicit coordinates. In this research, we tried to georefer...
متن کاملDistance Learning a Place for Application of Independence Learner Theory
Introduction: With the arrival of new communication technologies, the process of learning from the teacher to the learner’s pivot with emphasis on the centrality of the learner has an independence movement and in determining the methods of teaching and assessment practices. On this basis the independence of the learner is one of the fundamental concepts of remote education system. The aim ...
متن کاملIs there a place for Machine Learning in Law?
Research in artificial intelligence and law goes back approximately 40 years. It remains largely based on formal logic, including non-monotonic logic, case-based reasoning, and logic programming. However, some researchers in and practitioners of law have argued in favor of quantitative approaches (e.g. probability) to account for uncertainties in legal arguments. Other researchers have pointed ...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Quantum Information Processing
سال: 2015
ISSN: 1570-0755,1573-1332
DOI: 10.1007/s11128-015-1089-7