• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Panchi, Zhou Hongyan. Model and Algorithm of Quantum Neural Network Based on the Controlled Hadamard Gates[J]. Journal of Computer Research and Development, 2015, 52(1): 211-220. DOI: 10.7544/issn1000-1239.2015.20131016
Citation: Li Panchi, Zhou Hongyan. Model and Algorithm of Quantum Neural Network Based on the Controlled Hadamard Gates[J]. Journal of Computer Research and Development, 2015, 52(1): 211-220. DOI: 10.7544/issn1000-1239.2015.20131016

Model and Algorithm of Quantum Neural Network Based on the Controlled Hadamard Gates

More Information
  • Published Date: December 31, 2014
  • To enhance the approximation capability of neural network, a quantum neural network model based on the controlled-Hadamard gates is proposed. This model takes a multi-dimensional discrete sequence as the input, which can be described by a matrix where the number of rows denotes the number of input nodes, and the number of columns denotes the length of discrete sequence. This model consists of three layers, the hidden layer consists of quantum neurons, and the output layer consists of common neurons. The quantum neuron consists of the quantum rotation gates and the multi-qubits controlled-Hadamard gates. Using the information feedback of target qubit from output to input in multi-qubits controlled-Hadamard gates, the overall memory of input sequence is realized. The output of quantum neuron is obtained from the controlled relationship between the control bits and target bit of controlled-Hadamard gates. The learning algorithm is designed in detail according to the basis principles of quantum computation. The characteristics of input sequence can be effectively obtained. The experimental results show that, when the input nodes and the length of the sequence satisfy certain relations, the proposed model is obviously superior to the common BP neural network.
  • Related Articles

    [1]Fu Liguo, Pang Jianmin, Wang Jun, Zhang Jiahao, Yue Feng. Formal Model of Correctness and Optimization on Binary Translation[J]. Journal of Computer Research and Development, 2019, 56(9): 2001-2011. DOI: 10.7544/issn1000-1239.2019.20180513
    [2]Zhou Zhibin, Wang Guojun, Liu Qin, Jia Weijia. A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification[J]. Journal of Computer Research and Development, 2018, 55(12): 2674-2684. DOI: 10.7544/issn1000-1239.2018.20170787
    [3]Fu Yanyan, Zhang Min, Chen Kaiqu, Feng Dengguo. Proofs of Data Possession of Multiple Copies[J]. Journal of Computer Research and Development, 2014, 51(7): 1410-1416.
    [4]Li Tao, Zhang Jingzhong. Machine Proofs in Geometry Based on Complex Number Method[J]. Journal of Computer Research and Development, 2013, 50(9): 1963-1969.
    [5]Ma Yanfang, Zhang Min, Chen Yixiang. Formal Description of Software Dynamic Correctness[J]. Journal of Computer Research and Development, 2013, 50(3): 626-635.
    [6]Wang Yong, Fang Juan, Ren Xingtian, and Lin Li. Formal Verification of TCG Remote Attestation Protocols Based on Process Algebra[J]. Journal of Computer Research and Development, 2013, 50(2): 325-331.
    [7]Wang Changjing. Verifying the Correctness of Loop Optimization Based on Extended Logic Transformation System μTS[J]. Journal of Computer Research and Development, 2012, 49(9): 1863-1873.
    [8]Jing Shuxu, He Fazhi, Cai Xiantao, Cheng Yuan. A Method for Object Reference in Collaborative Modeling System[J]. Journal of Computer Research and Development, 2011, 48(11): 2031-2038.
    [9]Si Tiange, Tan Zhiyong, and Dai Yiqi. A Security Proof Method for Multilevel Security Models[J]. Journal of Computer Research and Development, 2008, 45(10): 1711-1717.
    [10]Wang Guilin, Qing Sihan. Security Notes on Two Cheat-Proof Secret Sharing Schemes[J]. Journal of Computer Research and Development, 2005, 42(11): 1924-1927.

Catalog

    Article views PDF downloads Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return