Skip to main content

Showing 1–17 of 17 results for author: Farouk, A

.
  1. arXiv:2405.09803  [pdf, other

    quant-ph

    Generation of quantum phases of matter and finding maximum-weight independent set of unit-disk graphs using Rydberg atoms

    Authors: Ahmed M. Farouk, I. I. Beterov, Peng Xu, I. I. Ryabtsev

    Abstract: Recent progress in quantum computing and quantum simulation of many-body systems with arrays of neutral atoms using Rydberg excitation brought unforeseen opportunities towards computational advantage in solving various optimization problems. The problem of maximum-weight independent set (MWIS) of unit-disk graphs is an example of NP-hard optimization problems. It involves finding the largest set o… ▽ More

    Submitted 5 July, 2024; v1 submitted 16 May, 2024; originally announced May 2024.

    Comments: 13 pages, 9 figures

  2. arXiv:2403.02240  [pdf, other

    cs.DC cs.ET quant-ph

    Quantum Computing: Vision and Challenges

    Authors: Sukhpal Singh Gill, Oktay Cetinkaya, Stefano Marrone, Daniel Claudino, David Haunschild, Leon Schlote, Huaming Wu, Carlo Ottaviani, Xiaoyuan Liu, Sree Pragna Machupalli, Kamalpreet Kaur, Priyansh Arora, Ji Liu, Ahmed Farouk, Houbing Herbert Song, Steve Uhlig, Kotagiri Ramamohanarao

    Abstract: The recent development of quantum computing, which uses entanglement, superposition, and other quantum fundamental concepts, can provide substantial processing advantages over traditional computing. These quantum features help solve many complex problems that cannot be solved with conventional computing methods. These problems include modeling quantum mechanics, logistics, chemical-based advances,… ▽ More

    Submitted 5 June, 2024; v1 submitted 4 March, 2024; originally announced March 2024.

    Comments: Technical Report: 11 pages, 2 figures

  3. arXiv:2305.16473  [pdf, other

    cs.CR

    5G/6G-Enabled Metaverse Technologies: Taxonomy, Applications, and Open Security Challenges with Future Research Directions

    Authors: Muhammad Adil, Houbing Song, Muhammad Khurram Khan, Ahmed Farouk, Zhanpeng **

    Abstract: Internet technology has proven to be a vital contributor to many cutting-edge innovations that have given humans access to interact virtually with objects. Until now, numerous virtual systems had been developed for digital transformation to enable access to thousands of services and applications that range from virtual gaming to social networks. However, the majority of these systems lack to maint… ▽ More

    Submitted 25 May, 2023; originally announced May 2023.

  4. Scalable Heteronuclear Architecture of Neutral Atoms Based on EIT

    Authors: Ahmed M. Farouk, I. I. Beterov, Peng Xu, I. I. Ryabtsev

    Abstract: Based on our recent paper [arXiv:2206.12176 (2022)], we propose a scalable heteronuclear architecture of parallel implementation of CNOT gates in arrays of alkali-metal neutral atoms for quantum information processing. We considered a scheme where we perform CNOT gates in a parallel manner within the array, while they are performed sequentially between the pairs of neighboring qubits by coherently… ▽ More

    Submitted 18 May, 2023; v1 submitted 28 March, 2023; originally announced March 2023.

    Comments: 8 pages, 6 figures

    Journal ref: J. Exp. Theor. Phys. 137, 202 (2023)

  5. arXiv:2209.02449  [pdf, other

    cs.CR physics.app-ph quant-ph

    Efficient quantum non-fungible tokens for blockchain

    Authors: Subhash Shankar Pandey, Tadasha Dash, Prasanta K. Panigrahi, Ahmed Farouk

    Abstract: Blockchain is a decentralized system that allows transaction transmission and storage according to the roles of the Consensus algorithm and Smart contracts. Non-fungible tokens (NFTs) consolidate the best characteristics of blockchain technology to deliver unique and bona fide tokens, each with distinctive attributes with non-fungible resources. Unfortunately, current classical NFTs are suffering… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

    Comments: 8 pages, 12 figures

  6. Parallel implementation of CNOT$^{N}$ and C$_2$NOT$^2$ gates via homonuclear and heteronuclear Förster interactions of Rydberg atoms

    Authors: Ahmed M. Farouk, I. I. Beterov, Peng Xu, S. Bergamini, I. I. Ryabtsev

    Abstract: We analyze schemes of high-fidelity multiqubit CNOT$^{N}$ and C$_{2}$NOT$^{2}$ gates for alkali-metal neutral atoms used as qubits. These schemes are based on the electromagnetically induced transparency and Rydberg blockade, as proposed by M. Müller et al. [PRL 102, 170502 (2009)]. In the original paper, the fidelity of multi-qubit CNOT$^{\text{N}}$ gate based on Rydberg blockade was limited by t… ▽ More

    Submitted 20 October, 2023; v1 submitted 24 June, 2022; originally announced June 2022.

    Comments: 15 pages, 13 figures. Supplementary datasets are available from here: https://doi.org/10.5281/zenodo.8154008

    Journal ref: Photonics 2023, 10(11), 1280;

  7. arXiv:2204.07996  [pdf, other

    quant-ph

    NEQRX: Efficient Quantum Image Encryption with Reduced Circuit Complexity

    Authors: Rakesh Saini, Bikash K. Behera, Saif Al-Kuwari, Ahmed Farouk

    Abstract: Cryptography plays an important role in ensuring data security and authentication within information processing systems. As the prevalence of digital imagery continues to grow, safeguarding this form of data becomes increasingly crucial. However, existing security protocols, reliant on complex mathematical models, exhibit vulnerabilities in effectively protecting information from both internal and… ▽ More

    Submitted 26 March, 2024; v1 submitted 14 April, 2022; originally announced April 2022.

  8. arXiv:2105.07711  [pdf, other

    cs.CR cs.NI

    Hash-MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber-Physical Systems

    Authors: Muhammad Adil, Mian Ahmad Jan, Spyridon Mastorakis, Houbing Song, Muhammad Mohsin Jadoon, Safia Abbas, Ahmed Farouk

    Abstract: Cyber-Physical Systems (CPS) connected in the form of Internet of Things (IoT) are vulnerable to various security threats, due to the infrastructure-less deployment of IoT devices. Device-to-Device (D2D) authentication of these networks ensures the integrity, authenticity, and confidentiality of information in the deployed area. The literature suggests different approaches to address security issu… ▽ More

    Submitted 17 May, 2021; originally announced May 2021.

    Comments: Accepted by the IEEE Internet of Things Journal. The copyright is with the IEEE

  9. Solving Vehicle Routing Problem Using Quantum Approximate Optimization Algorithm

    Authors: Utkarsh Azad, Bikash K. Behera, Emad A. Ahmed, Prasanta K. Panigrahi, Ahmed Farouk

    Abstract: In this paper, we describe the usage of the Quantum Approximate Optimization Algorithm (QAOA), which is a quantum-classical heuristic, to solve a combinatorial optimization and integer programming task known as Vehicle Routing Problem (VRP). We outline the Ising formulation for VRP and present a detailed procedure to solve VRP by minimizing its simulated Ising Hamiltonian using the IBM Qiskit plat… ▽ More

    Submitted 23 September, 2022; v1 submitted 2 February, 2020; originally announced February 2020.

    Comments: 7 pages, 7 figures

    Journal ref: IEEE Transactions on Intelligent Transportation Systems, 1-10 (2022)

  10. Entanglement control of two-level atoms in dissipative cavities

    Authors: Reyad Salah, Ahmed M. Farouk, Ahmed Farouk, M. Abdel-Aty, A. -S. F. Obada

    Abstract: An open quantum bipartite system consisting of two independent two-level atoms interacting non-linearly with a two-mode electromagnetic cavity field is investigated by proposing a suitable non-Hermitian generalization of Hamiltonian. The mathematical procedure of obtaining the corresponding wave function of the system is clearly given. Panchartnam phase is studied to give a precise information abo… ▽ More

    Submitted 2 August, 2019; originally announced August 2019.

    Comments: 5 pages, 9 figures

    Journal ref: Appl. Sci. 2020, 10(4), 1510

  11. arXiv:1812.07798  [pdf

    quant-ph

    A General protocol for Distributed Quantum Gates

    Authors: Moein Sarvaghad-Moghaddam, Mariam Zomorodi-Moghadam, Ahmed Farouk

    Abstract: Distributed quantum computation requires to apply quantum remote gates on separate nodes or subsystems of network. On the other hand, Toffoli gate is a universal and well-known quantum gate. It is frequently used in synthesis of quantum circuits. In this paper, a general protocol for implementing a remote n-qubit controlled-U gate is presented with minimum required resources. Then, the proposed me… ▽ More

    Submitted 21 December, 2018; v1 submitted 19 December, 2018; originally announced December 2018.

  12. arXiv:1806.07061  [pdf

    quant-ph cs.CR

    Bidirectional Quantum Controlled Teleportation by Using Five-qubit Entangled State as a Quantum Channel

    Authors: Moein Sarvaghad-Moghaddam, Ahmed Farouk, Hussein Abulkasim

    Abstract: In this paper, a novel protocol is proposed for implementing BQCT by using five-qubit en The proposed protocol depends on the Controlled-NOT operation, proper single-qubit unitary operations and single-qubit measurement in the Z-basis and X-basis. The results showed that the protocol is more efficient from the perspective such as lower shared qubits and, single qubit measurements compared to the p… ▽ More

    Submitted 19 June, 2018; originally announced June 2018.

  13. arXiv:1712.02554  [pdf, other

    quant-ph

    Decoherence in a $\mathcal{PT}$-symmetric qubit

    Authors: Junaid Majeed Bhat, Muzaffar Qadir Lone, Sanjoy Datta, Ahmad Farouk

    Abstract: We investigate the decoherence in a $\mathcal{PT}$-symmetric qubit coupled with a bosonic bath. Using cannonical transformations, we map the non-Hermitian Hamiltonian representing the$\mathcal{PT}$-symmetric qubit to a spin boson model. Identifying the parameter α that demarcates the hermiticity and non-hermiticity in the model, we show that the qubit does not decohere at the transition from real… ▽ More

    Submitted 5 January, 2018; v1 submitted 7 December, 2017; originally announced December 2017.

    Comments: 5 pages and 6 figures. Comments and suggestions are most welcome

  14. A note on the possibility of incomplete theory

    Authors: Han Geurdes, Koji Nagata, Tadao Nakamura, Ahmed Farouk

    Abstract: In the paper it is demonstrated that Bells theorem is an unprovable theorem.

    Submitted 2 May, 2019; v1 submitted 2 April, 2017; originally announced April 2017.

    Comments: 22 pages, 1 figures

    Journal ref: Russian Journal of Physical Chemistry B 15, S68-S80, 2021

  15. arXiv:1602.08228  [pdf

    cs.CR quant-ph

    A generalized architecture of quantum secure direct communication for N disjointed users with authentication

    Authors: Ahmed Farouk, Magdy Zakaria, Adel Megahed, Fatma A. Omara

    Abstract: In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message… ▽ More

    Submitted 26 February, 2016; originally announced February 2016.

    Journal ref: Nature Scientific Reports, Sci. Rep. 5, 160802015)

  16. Analysis And Improvement of Pairing-Free Certificate-Less Two-Party Authenticated Key Agreement Protocol For Grid Computing

    Authors: Amr Farouk, Mohamed M. Fouad, Ahmed A. Abdelhafez

    Abstract: The predominant grid authentication mechanisms use public key infrastructure (PKI). Nonetheless, certificate-less public key cryptography (CL-PKC) has several advantages that seem to well align with the demands of grid computing. Security and efficiency are the main objectives of grid authentication protocols. Unfortunately, certificate-less authenticated key agreement protocols rely on the biline… ▽ More

    Submitted 12 March, 2014; originally announced March 2014.

    Comments: 14 pages

    Journal ref: International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 1, February 2014

  17. arXiv:0710.4800  [pdf

    cs.CR

    An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption Algorithm (MHHEA) for Data Communication Security

    Authors: Hala A. Farouk, Magdy Saeb

    Abstract: The hybrid hiding encryption algorithm, as its name implies, embraces concepts from both steganography and cryptography. In this exertion, an improved micro-architecture Field Programmable Gate Array (FPGA) implementation of this algorithm is presented. This design overcomes the observed limitations of a previously-designed micro-architecture. These observed limitations are: no exploitation of t… ▽ More

    Submitted 25 October, 2007; originally announced October 2007.

    Comments: Submitted on behalf of EDAA (http://www.edaa.com/)

    Journal ref: Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)