You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This repo is the code used for the neutrino/W bosons reconstruction from fully leptonic decay related to the quantum entanglement measurement in the HWW* decay at the ATLAS experiment, LHC.
⚛️ 🚀 👽 A self-paced, game-based Quantum Computing learning program for students, researchers and enthusiasts. This program offers a general understanding of Quantum Computing, as well as some of its applications, such as Quantum Machine Learning and Quantum Optimization, and how to program real quantum computers.
Updated and most comprehensive Repository On Quantum Computing Resources. It contains all the material I use for my research on Quantum Computing for Both Theories and Codes - I update it regularly.
This repository contains the codebase for my research project, which involves computationally analyzing Z2 and SN lattice gauge theories. Utilizing the Kitaev Quantum Double Model (D(G)), the investigation focuses on determining the ground state properties of the system and conducting an analysis of the entanglement entropy.
⚛️ 👨🏫 📚 A two-week intensive Summer School on Quantum Computing from IBM Quantum, using mostly the features of the IBM's Qiskit library. In this Summer School, were lectured topics on basics of Quantum Information, Quantum Entanglement, Quantum Algorithms, Quantum Error Mitigation, among many others.
Can we send information to the past or future, and due to entanglement past and present are same instance, Quantum delayed choice experiment - already proven impossible - however, personal rework and conceptual understanding
Article here: http://muonray.blogspot.com/2022/02/quantum-encryption-of-images-in-python.html The definition of image encryption used here is an extension of data encryption in general: using the bitwise XOR operation of the original image pixels and the random key image pixels, with the key image being either a pseudo-random stream cipher or th…