- Quantum Information and Cryptography
- Quantum Computing Algorithms and Architecture
- Quantum and electron transport phenomena
- Quantum Mechanics and Applications
- Geomechanics and Mining Engineering
- Silkworms and Sericulture Research
- Rock Mechanics and Modeling
- Geotechnical and Geomechanical Engineering
- Neural Networks and Reservoir Computing
- Neurobiology and Insect Physiology Research
- Invertebrate Immune Response Mechanisms
- Cognitive Computing and Networks
- Quantum optics and atomic interactions
QuantumCTek (China)
2021-2025
China University of Mining and Technology
2024
Guangzhou University
2024
Scaling up to a large number of qubits with high-precision control is essential in the demonstrations quantum computational advantage exponentially outpace classical hardware and algorithmic improvements. Here, we develop two-dimensional programmable superconducting processor, Zuchongzhi, which composed 66 functional tunable coupling architecture. To characterize performance whole system, perform random circuits sampling for benchmarking, system size 56 20 cycles. The cost simulation this...
Abstract Toll receptors are important regulators of insects' innate immune system which, upon binding pathogen molecules, activate a conserved signal transduction cascade known as the pathway. RNA interference (RNAi) is powerful tool to study function genes via reverse genetics. However, due reported refractory RNAi efficiency in lepidopteran insects, successful reports silencing silkworm Bombyx mori have not been yet. In this study, receptor Toll9‐2 ( BmToll9‐2 ) was cloned and its...
Abstract Quantum key distribution (QKD), rooted in quantum mechanics, offers information-theoretic security. However, practical systems open security threats due to imperfections, notably bright-light blinding attacks targeting single-photon detectors. Here, we propose a concise, robust defense strategy for protecting detectors QKD against attacks. Our uses dual approach: detecting the bias current of avalanche photodiode (APD) defend continuous-wave attacks, and monitoring amplitude protect...
Under the specific geological conditions of shallow buried coal seams and thin bedrock, caving method mining can result in irreversible damage to ecological environment, such as impacting aquifer structure, causing surface subsidence, creating ground fissures. However, traditional backfill faces challenges insufficient material, low efficiency, high costs. The paper focuses on novel ideas roof cutting backfilling treatment, using Jinjie Mine research background. Through theoretical analysis,...
To ensure a long-term quantum computational advantage, the hardware should be upgraded to withstand competition of continuously improved classical algorithms and hardwares. Here, we demonstrate superconducting computing systems \textit{Zuchongzhi} 2.1, which has 66 qubits in two-dimensional array tunable coupler architecture. The readout fidelity 2.1 is considerably an average 97.74\%. more powerful processor enables us achieve larger-scale random circuit sampling, with system scale up 60 24...
Teleportation for pure states, mixed states with standard and optimal protocols are introduced investigated systematically. An explicit equation governing the teleportation of finite dimensional quantum by a generally given non-local entangled state is presented. For an arbitrary resource, expression obtained channel associated protocol. The corresponding transmission fidelity calculated. It shown that protocol not optimal. further studied, its to be related fully fraction rather than single as in