Quantum Computing in Wireless Communications and Networking: A Tutorial-cum-Survey

W Zhao, T Weng, Y Ruan, Z Liu, X Wu, X Zheng… - arXiv preprint arXiv …, 2024 - arxiv.org
Owing to its outstanding parallel computing capabilities, quantum computing (QC) has been
a subject of continuous attention. With the gradual maturation of QC platforms, it has …

Competitive Coevolution-Based Improved Phasor Particle Swarm Optimization Algorithm for Solving Continuous Problems

O Ali, Q Abbas, K Mahmood, E Bautista Thompson… - Mathematics, 2023 - mdpi.com
Particle swarm optimization (PSO) is a population-based heuristic algorithm that is widely
used for optimization problems. Phasor PSO (PPSO), an extension of PSO, uses the phase …

Improved Chimp Optimization Algorithm for Matching Combinations of Machine Tool Supply and Demand in Cloud Manufacturing

R Pu, S Li, P Zhou, G Yang - Applied Sciences, 2023 - mdpi.com
Cloud manufacturing is a current trend in traditional manufacturing enterprises. In this
environment, manufacturing resources and manufacturing capabilities are allocated to …

The State of Quantum Learning: A Comparative Review Towards Classical Machine Learning

TM Mahim, A Rahim… - 2023 26th International …, 2023 - ieeexplore.ieee.org
This article examines the effectiveness of quantum machine learning and compares it with
classical learning. Classical learning works on bits 0 and 1, but quantum learning is a …

A Hybrid metaheuristic Algorithm for Edge Site Deployment with User Coverage Maximization and Cost Minimization

X Xing, Y Song, B Wang - International Journal of Advanced …, 2023 - search.proquest.com
Recent years, edge computing has been getting increased attention due to its ultra-low
delay service deliveries. Plenty of works have focused on the performance improvement of …

Digital Forensic Investigation Standards in Cloud Computing

E Egho-Promise, S Idahosa, G Asante… - Universal Journal of …, 2024 - scipublications.com
Digital forensics in cloud computing environments presents significant challenges due to the
distributed nature of data storage, diverse security practices employed by service providers …