Skip to main content
Erschienen in: Quantum Information Processing 7/2019

Open Access 01.07.2019

A Poisson Model for Entanglement Optimization in the Quantum Internet

verfasst von: Laszlo Gyongyosi, Sandor Imre

Erschienen in: Quantum Information Processing | Ausgabe 7/2019

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We define a nature-inspired model for entanglement optimization in the quantum Internet. The optimization model aims to maximize the entanglement fidelity and relative entropy of entanglement for the entangled connections of the entangled network structure of the quantum Internet. The cost functions are subject of a minimization defined to cover and integrate the physical attributes of entanglement transmission, purification, and storage of entanglement in quantum memories. The method can be implemented with low complexity that allows a straightforward application in the quantum Internet and quantum networking scenarios.
Hinweise
L. Gyongyosi: Parts of this work were presented in conference proceedings [8].

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

1 Introduction

Quantum entanglement and the entangled network structure serve as fundamental concepts of the quantum Internet [15], long-distance quantum networks and future quantum communications [622]. Since the no-cloning theorem makes it impossible to use the “copy-and-resend” mechanisms of traditional repeaters [16, 23], in a quantum Internet scenario the quantum repeaters have to transmit correlations in a different way [14, 24]. In the entangled network structure of the quantum Internet, the main task of quantum repeaters is to distribute quantum entanglement between distant points that will then serve as a fundamental base resource for quantum teleportation and other quantum protocols [1]. Since in an experimental scenario [2531] the quantum links between nodes are noisy and entanglement fidelity decreases as hop distance increases, entanglement purification is applied to improve the entanglement fidelity between nodes [15]. Quantum nodes also perform internal quantum error correction that is a requirement for reliability and storage in quantum memories [1, 4, 5, 29, 3242]. Both entanglement purification and quantum error correction steps in local nodes are high-cost tasks that require significant minimization [19, 25, 26, 2931, 4376].
The shared entangled states between nodes form entangled connections. Significant attributes of these entangled connections are entanglement fidelity [1, 4, 5] and correlation in terms of relative entropy entanglement [68, 69]. Entanglement fidelity is a crucial parameter. It serves as the primary objective function in our model, which is a subject of maximization. Maximizing the relative entropy of entanglement is the secondary objective function. Minimizing the cost of classical communications, which is required by the entanglement optimization method as an auxiliary objective function, is also considered.
Besides these attributes, the entangled connections are characterized by the entanglement throughput that identifies the number of transmittable entangled systems per sec at a particular fidelity. In our model, the nodes are associated with an incoming entanglement throughput [1], that serves as a resource for the nodes to maximize the entanglement fidelity and the relative entropy of entanglement. The nodes receive and process the incoming entangled states. Each node performs purification and internal quantum error correction, and it stores the entangled systems in local quantum memories. The amount of input entangled systems in a node is therefore connected to the achievable maximal entanglement fidelity and correlation in the entangled states associated with that node. The objective of the proposed model is to reveal this connection and to define a framework for entanglement optimization in the quantum nodes of an arbitrary quantum network. The required input information for the optimization without loss of generality is the number of nodes, the number of fidelity types of the received entangled states, and the node characteristics. In a realistic setting, these cover the incoming entanglement throughput in a node and the costs of internal entanglement purification steps, internal quantum error corrections, and quantum memory usage.
In this work, an optimization framework for quantum networks is defined. The method aims to maximize the achievable entanglement fidelity and correlation of entangled systems, in parallel with the minimization of the cost of entanglement purification and quantum error correction steps in the quantum nodes of the network. The problem model is therefore defined as a multiobjective optimization. This paper aims to provide a model that utilizes the realistic parameters of the internal mechanisms of the nodes and the physical attributes of entanglement transmission. The proposed framework integrates the results of quantum Shannon theory, the theory of evolutionary multiobjective optimization algorithms [77, 78], and the mathematical modeling of seismic wave propagation [7782].
Inspired by the statistical distribution of seismic events and the modeling of wave propagations in nature, the model utilizes a Poisson distribution framework to find optimal solutions in the objective space. In the theory of earthquake analysis and spatial connection theory [7782], Poisson distributions are crucial in finding new epicenters. Motivated by these findings, a Poisson model is proposed to find new solutions in the objective space that is defined by the multiobjective optimization problem. The solutions in the objective space are represented by epicenters with several locations around them that also represent solutions in the feasible space [77, 78]. The epicenters have a magnitude and seismic power operators that determine the distributions of the locations and fitness [77, 78] of locations around the epicenters. Epicenters with low magnitude generate high seismic power in the locations, whereas epicenters with high magnitude generate low seismic power in the locations. Epicenters are generated randomly in the feasible space, and each epicenter is weighted from which the magnitude and power are derived. By a general assumption, epicenters with lower magnitude produce more locations because the locations are closer to the epicenter. The locations are placed within a certain magnitude around the epicenters in the feasible space. The optimization framework involves a set of solutions to the Pareto optimal front [77, 78] by combining the concept of Pareto dominance and seismic wave propagations. The new epicenters are determined by a Poisson distribution in analogue to prediction theory in earthquake models. The mathematical model of epicenters allows us to find new solutions iteratively and to find a global optimum. The framework has low complexity that allows an efficient practical implementation to solve the defined multiobjective optimization problem.
The multiobjective optimization problem model considers the fidelity and correlation of entanglement of entangled states available in the quantum nodes. The resources for the nodes are the incoming entangled states from the quantum links and the already stored entangled quantum systems in the local quantum memories. In the optimization procedure, both memory consumptions and environmental effects, such as entanglement purification and quantum error correction steps, are considered to develop the cost functions. In particular, the amount of resource, in terms of number of available entangled systems, is a coefficient that can be improved by increasing the incoming number of entangled systems, such as the incoming entanglement throughput in a node. In the proposed model, the incoming entanglement fidelity is further divided into some classes, which allows us to differentiate the resources in the nodes with respect to their fidelity types. Therefore, the fidelity type serves as a quality index for the optimization procedure. The optimization aims to find the optimal incoming entanglement throughput for all nodes that leads to a maximization of entanglement fidelity and correlation of entangled states with respect to the relative entropy of entanglement, for all entangled connections in the quantum network.
The novel contributions of our manuscript are as follows:
1.
A nature-inspired, multiobjective optimization framework is conceived for the quantum Internet.
 
2.
The model considers the physical attributes of entanglement transmission and quantum memories to provide a realistic setting (realistic objective functions and cost functions).
 
3.
The method fuses the results of quantum Shannon theory and theory of evolutionary multiobjective optimization algorithms.
 
4.
The model maximizes the entanglement fidelity and relative entropy of entanglement for all entangled connections of the network. It minimizes the cost functions to reduce the costs of entanglement purification, error correction, and quantum memory usage.
 
5.
The optimization framework allows a low-complexity implementation.
 
This paper is organized as follows. Section 2 presents the problem statement. Section 3 details the optimization method. Section 4 provides the problem resolution. Section 5 proposes numerical evidence. Finally, Sect. 6 concludes the paper. Supplemental material is included in the Appendix.

2 Problem statement

The problem to be solved is summarized in Problem 1.
Problem 1
For a given quantum network with N nodes, for all nodes \(x_{i} \), \(i=1,\ldots , N\), the entanglement fidelity and relative entropy of entanglement for all entangled connections are maximized, and the cost of optimal purification and quantum error correction and the cost of memory usage for all nodes are minimized.
The network model is as follows. Let \(B_{F} \left( x\right) \) be the incoming number of received entangled states (incoming entanglement throughput) in a given quantum node x, measured in the number of d-dimensional entangled states per sec at a particular entanglement fidelity F [13].
Let N be the number of nodes in the network, and let T be the number of fidelity types \(F_{j} \), \(j=1,\ldots , T\) of the entangled states in the quantum network.
Let \(B_{F}^{j} \left( x_{i} \right) \) be the number of incoming entangled states in an ith node \(x_{i} \), \(i=1,\ldots , N\), from fidelity type j. In our model, \(B_{F}^{j} \left( x_{i} \right) \) represents the utilizable resources in a particular node \(x_{i} \). Thus, the task is to determine this value for all nodes in the quantum network to maximize the fidelity and relative entropy of shared entanglement for all entangled connections.
Let \({\mathbf {X}}\) be an \(N\times T\) matrix
$$\begin{aligned} {\mathbf {X}}=\left( B_{F}^{j} \left( x_{i} \right) \right) _{N\times T}. \end{aligned}$$
(1)
The matrix describes the number of entangled states of each fidelity type for all nodes in the network, \(B_{F}^{j} \left( x_{i} \right) \ge 0\) for all i and j.

2.1 Objective functions

For a given node \(x_{i} \), let \({{{\mathcal {F}}}}\left( x_{i} \right) \) be the primary objective function that identifies the cumulative entanglement fidelity (a sum of entanglement fidelities in \(x_{i} \)) after an entanglement purification \(\mathrm{P} \left( x_{i} \right) \) and an optimal quantum error correction \(\mathrm{C}\left( x_{i} \right) \) in \(x_{i} \). In our framework, \({{\mathcal {F}}_{i}}\left( {\mathbf {X}} \right) \) for a node \(x_{i} \) is defined as
$$\begin{aligned} {{\mathcal {F}}_{i}}\left( {\mathbf {X}} \right) =\sum _{j=1}^{T}\sum _{k=1}^{T}A_{ijk} {\tilde{B}}_{F}^{j} \left( x_{i} \right) {\tilde{B}}_{F}^{k} \left( x_{i} \right) +\sum _{j=1}^{T}R_{ij} {\tilde{B}}_{F}^{j} \left( x_{i} \right) +c_{i}, \end{aligned}$$
(2)
where \(A_{ijk} \) is the quadratic regression coefficient, \(R_{ij} \) is the simple regression coefficient, \(c_{i} \) is a constant, and \({\tilde{B}}_{F}^{j} \left( x_{i} \right) \) is defined as
$$\begin{aligned} {\tilde{B}}_{F}^{j}\left( {{x}_{i}} \right) =B_{F}^{j}\left( {{x}_{i}} \right) +\left\langle B \right\rangle _{F}^{j}\left( {{x}_{i}} \right) , \end{aligned}$$
(3)
where \(\left\langle B \right\rangle _{F}^{j}\left( {{x}_{i}} \right) \) is an initialization value for \(B_{F}^{j} \left( x_{i} \right) \) in a particular node \(x_{i} \).
Then let \({\mathbb {E}}\left( {{D}_{i}}\left( {\mathbf {X}} \right) \right) \) be the secondary objective function that refers to the expected amount of cumulative relative entropy of entanglement (a sum of relative entropy of entanglement) in node \(x_{i} \), defined as
$$\begin{aligned} \begin{aligned} {\mathbb {E}}\left( {{D}_{i}}\left( {\mathbf {X}} \right) \right) =&\sum _{j=1}^{T}\sum _{k=1}^{T}A_{ijk}^{*} {\tilde{B}}_{F}^{j} \left( x_{i} \right) {\tilde{B}}_{F}^{k} \left( x_{i} \right) \\&+\sum _{j=1}^{T}R_{ij}^{*} {\tilde{B}}_{F}^{j} \left( x_{i} \right) +c_{i}^{*}, \end{aligned} \end{aligned}$$
(4)
where \(A_{ijk}^{*} \), \(R_{ij}^{*} \), and \(c_{i}^{*} \) are some regression coefficients, by definition.
Therefore, the aim is to find the values of \(B_{F}^{j} \left( x_{i} \right) \) for all i and j in (1), such that \({{\mathcal {F}}_{i}}\left( {\mathbf {X}} \right) \) and \({\mathbb {E}}\left( {{D}_{i}}\left( {\mathbf {X}} \right) \right) \) are maximized for all i.
Assuming that the fidelity of entanglement is dynamically changing and evolves over time, the \(w_{j} \left( x_{i} \right) \) quantum memory coefficient is introduced for the storage of entangled states from the jth fidelity type in a node \(x_{i} \) as follows:
$$\begin{aligned} w_{j} \left( x_{i} \right) =\eta _{j} B_{F}^{j} \left( x_{i} \right) +\kappa _{j} \left\langle B \right\rangle _{F}^{j}\left( {{x}_{i}} \right) , \end{aligned}$$
(5)
where \(\eta _{j} \) and \(\kappa _{j} \) are coefficients that describe the storage characteristic of entangled states with the jth fidelity type.

2.2 Cost functions

The cumulative entanglement fidelity (2) and cumulative relative entropy of entanglement (4) in a particular node \(x_{i} \) are associated with a \(f_{C} \left( \mathrm{P} \left( x_{i} \right) \right) \) cost entanglement purification \(\mathrm{P} \left( x_{i} \right) \) and a \(f_{C} \left( \mathrm{C}\left( x_{i} \right) \right) \) cost of optimal quantum error correction \(\mathrm{C}\left( x_{i} \right) \) in \(x_{i} \), where \(f_{C} \left( \cdot \right) \) is the cost function.
Then let \({\mathcal {C}}\left( {\mathbf {X}} \right) \) be the total cost function for all of the T fidelity types and for all of the N nodes, as follows:
$$\begin{aligned} \begin{aligned} {\mathcal {C}}\left( {\mathbf {X}} \right)&=\sum \limits _{i=1}^{N}{{{f}_{C}}\left( \mathrm P \left( {{x}_{i}} \right) \right) +{{f}_{C}}\left( \text {C}\left( {{x}_{i}} \right) \right) }\\&=\sum \limits _{i=1}^{N}{\sum \limits _{i=1}^{T}{{{f}_{j}}B_{F}^{j}\left( {{x}_{i}} \right) ,}} \end{aligned} \end{aligned}$$
(6)
where \(f_{j} \) is a total cost of purification and error correction associated with the jth fidelity type of entangled states.
Let \(F^{\mathrm{*}} \) be a critical fidelity on the received quantum states. The entangled states are then decomposable into two sets \({{{\mathcal {S}}}}_\mathrm{low} \) and \({{{\mathcal {S}}}}_{\mathrm{high}} \) with fidelity bounds \({{{\mathcal {S}}}}_\mathrm{low} \left( F\right) \) and \({{{\mathcal {S}}}}_{\mathrm{high}} \left( F\right) \) as
$$\begin{aligned} {{{\mathcal {S}}}}_\mathrm{low} \left( F\right) :\mathop {\max }\limits _{\forall i} F_{i} <F^{\mathrm{*}}, \end{aligned}$$
(7)
and
$$\begin{aligned} {{{\mathcal {S}}}}_{\mathrm{high}} \left( F\right) :\mathop {\min }\limits _{\forall i} F_{i} \ge F^{\mathrm{*}}. \end{aligned}$$
(8)
For the quantum systems of \({{{\mathcal {S}}}}_\mathrm{low} \), the highest fidelity is below the critical amount \(F^{\mathrm{*}} \), and for set \({{{\mathcal {S}}}}_{\mathrm{high}} \), the lowest fidelity is at least \(F^{\mathrm{*}} \). Then let \(X_{{{{\mathcal {S}}}}_\mathrm{low} } \) and \(X_{{{{\mathcal {S}}}}_{\mathrm{high}} } \) identify the set of nodes for which condition (7) or (8) holds, respectively.
Let \({{{\mathcal {S}}}_{i}}\left( {\mathbf {X}} \right) \) be the cost of quantum memory usage in node \(x_{i} \), defined as
$$\begin{aligned} {{{\mathcal {S}}}_{i}}\left( {\mathbf {X}} \right) =\lambda \sum _{j=1}^{T}\alpha _{i} \frac{1}{\Upsilon _{i} } B_{F}^{j} \left( x_{i} \right) , \end{aligned}$$
(9)
where \(\lambda \) is a constant, \(\alpha _{i} \) is a quality coefficient that identifies set (7) or (8) for a given node \(x_{i} \), and \(\Upsilon _{i} \) is the capacity coefficient of the quantum memory.
The main components of the network model are depicted in Fig. 1.

2.3 Multiobjective optimization

The optimization problem is as follows. The entanglement fidelity and the relative entropy of entanglement for all types of fidelity of stored entanglement for all nodes are maximized, while the cost of entanglement purification and quantum error correction is minimal, and the memory usage cost (required storage time) is also minimal. These requirements define a multiobjective optimization problem [77, 78].
Utilizing functions (2) and (4), the function subject of a maximization to yield maximal entanglement fidelity and maximal relative entropy of entanglement in all nodes of the network is defined via main objective function \({\mathcal {G}}\left( {\mathbf {X}} \right) \):
$$\begin{aligned} {\mathcal {G}}\left( {\mathbf {X}} \right) =\max \sum _{i=1}^{N}{{{\mathcal {F}}}_{i}}\left( {\mathbf {X}} \right) {\mathbb {E}}\left( {{D}_{i}}\left( {\mathbf {X}} \right) \right) . \end{aligned}$$
(10)
Function \({\mathcal {G}}\left( {\mathbf {X}} \right) \) should be maximized while cost functions (6) and (9) are minimized via functions \(F_{1} \left( N\right) \) and \(F_{2} \left( N\right) \):
$$\begin{aligned} F_{1} \left( N\right) =\min {\mathcal {C}}\left( {\mathbf {X}} \right) =\sum _{i=1}^{N}\sum _{i=1}^{T}f_{j} B_{F}^{j} \left( x_{i} \right) , \end{aligned}$$
(11)
and
$$\begin{aligned} {{F}_{2}}\left( N \right) =\min {\mathcal {S}}\left( {\mathbf {X}} \right) =\sum \limits _{i=1}^{N}{{{{\mathcal {S}}}_{i}}\left( {\mathbf {X}} \right) }, \end{aligned}$$
(12)
with the problem constraints [77, 78] \(C_{1} \), \(C_{2} \), and \(C_{3} \) for all i and j. Constraint \(C_{1} \) is defined as
$$\begin{aligned} C_{1} :\zeta \left( {\mathbf {X}} \right) \ge \gamma , \end{aligned}$$
(13)
where \(\gamma \) is a cumulative lower bound on the required entanglement fidelity for all nodes, while \(\zeta \left( {\mathbf {X}} \right) \) is
$$\begin{aligned} \zeta \left( {\mathbf {X}} \right) =\sum _{i=1}^{N}{{{\mathcal {F}}}_{i}}\left( {\mathbf {X}} \right) , \end{aligned}$$
(14)
and constraint \(C_{2} \) is
$$\begin{aligned} C_{2}:\mathrm{X} \le \Lambda , \end{aligned}$$
(15)
where \(\Lambda \) is an upper bound on the total cost function \({\mathcal {C}}\left( {\mathbf {X}} \right) \), while \(\mathrm{X}\) is
$$\begin{aligned} \mathrm{X} =\sum _{i=1}^{N}\sum _{i=1}^{T}f_{j} B_{F}^{j} \left( x_{i} \right) . \end{aligned}$$
(16)
For constraint \(C_{3} \), let \(\tau _{j} \left( {\mathbf {X}} \right) \) be a differentiation of storage characteristic of entangled states from the jth fidelity type:
$$\begin{aligned} \tau _{j} \left( {\mathbf {X}} \right) =\sum _{i=1}^{N}\left( w_{j} \left( x_{i} \right) -\Omega \right) ^{2}, \end{aligned}$$
(17)
where
$$\begin{aligned} \Omega =\frac{\sum _{i=1}^{N}w_{j} \left( x_{i} \right) }{N}. \end{aligned}$$
(18)
Then, \(C_{3} \) is defined as
$$\begin{aligned} C_{3}:\nu \left( {\mathbf {X}} \right) \le \Pi , \end{aligned}$$
(19)
where \(\Pi \) is an upper bound on the storage characteristic of entangled states from the jth fidelity type, while \(\nu \) is evaluated via (17) as
$$\begin{aligned} \nu =\sum _{j=1}^{N}\tau _{j} \left( {\mathbf {X}} \right) . \end{aligned}$$
(20)

3 System model

This section defines the Poisson entanglement optimization method, and it is applied to the solution of the multiobjective optimization problem of Sect. 2.

3.1 Motivation and utility of the mathematical model in the quantum internet

The quantum Internet is defined as a complex network model with quantum and classical layers that involve several optimization criteria and objectives. An optimization problem model of the quantum Internet therefore induces a multiobjective optimization problem model that considers the special requirements of the environment of the quantum Internet. These requirements cover the entanglement transmission procedure, processing of quantum entanglement in the quantum nodes, and auxiliary communication through the classical links that support the entangled network structure. The quantum transmission procedure models the generation of the entangled quantum network with quantitative and qualitative measures. In this manner, a quantitative measure is the relative entropy of entanglement between the quantum nodes, while the entanglement fidelity is a qualitative measure. Classical communication could also cause an overhead in the entanglement distribution mechanism of the quantum Internet. Thus, a multiobjective optimization framework should consider the attributes of both quantum and classical layers.
To address the multiple criteria and several objectives of the quantum Internet, a multiobjective optimization framework is defined. The multiple criteria of the quantum Internet are defined as diverse objective functions that should be satisfied in parallel. The problem is therefore analogous to finding solutions in an objective space such that the objective space is defined and spanned by the input problems induced by the environment of the quantum Internet. The multiobjective optimization framework should evolve a set of solutions to the Pareto optimal front. In our model, these solutions are evolved via the mathematical model of epicenters that provide a naturally inspired answer to the multiobjective problem defined via the environment of the quantum Internet. The mathematical model of epicenters utilizes the theory of Pareto dominance in the problem resolution such that the selection and evaluation processes in the objective space that are required to identify a global optimal solution are controlled via our nature-inspired model. The proposed Poisson model ensures a robust randomization and efficient convergence in the objective space such that the solutions determined by utilizing the epicenters in the objective space will converge to a global optimal solution. The global optimal solution in the objective space represents the parallel satisfaction of the multiple criteria and objective functions defined by the quantum Internet. The randomness injected by the Poisson distribution not just avoids early convergence to a local optimal solution but also induces a fast convergence for the global optimal solution in the objective space.
Since the multiple objectives and optimization criteria of the mathematical framework are motivated by practical assumptions and considerations of the quantum Internet, the proposed mathematical model of epicenters is strongly connected with a quantum Internet scenario. As follows, the utility of the proposed multiobjective optimization framework represents an effective solution for the practical optimization problems induced by the quantum Internet.

3.2 Poisson operators

The attributes of the Poisson operator are as follows.

3.2.1 Dispersion

The \(D\left( {{{\mathcal {E}}}}\right) \) dispersion coefficient of an epicenter \({{{\mathcal {E}}}}\) (solution in the feasible space \({{{\mathcal {S}}}}_{F} \)) determines the number of affected \(L_{j} \), \(j=1,\ldots ,D\left( {{{\mathcal {E}}}}\right) \), locations around an epicenter \({{{\mathcal {E}}}}\). The random locations around an epicenter also represent solutions in \({{{\mathcal {S}}}}_{F} \) that help in increasing the diversity of population \({{{\mathcal {P}}}}\) (a set of possible solutions) to find a global optimum. The diversity increment is therefore a tool to avoid an early convergence to a local optimum [77, 78].
The dispersion \(D\left( {{{\mathcal {E}}}}_{i} \right) \) operator for an ith epicenter \({{{\mathcal {E}}}}_{i} \) is defined as
$$\begin{aligned} D\left( {{{\mathcal {E}}}_{i}} \right) =m\frac{\left( {\tilde{f}}\left( \langle {\mathcal {E}} \rangle \right) -{\tilde{f}}\left( {{{\mathcal {E}}}_{i}} \right) \right) +\vartheta }{\sum \nolimits _{i=1}^{\left| {\mathcal {P}} \right| }{\left( {\tilde{f}}\left( \langle {\mathcal {E}} \rangle \right) -{\tilde{f}}\left( {{{\mathcal {E}}}_{i}} \right) \right) +\vartheta }}, \end{aligned}$$
(21)
where m is a control parameter, \({{{\mathcal {E}}}}_{i} \) is an ith individual (epicenter) from the \(\left| {{\mathcal P}}\right| \) individuals (epicenters) in population \({{\mathcal P}}\), \(\left| {{{\mathcal {P}}}}\right| \) is the size of population \({{{\mathcal {P}}}}\), function \({\tilde{f}}\left( \cdot \right) \) is the fitness value (see Sect. A.2.1), \({\tilde{f}}\left( \langle {\mathcal {E}} \rangle \right) \) is a maximum objective value among the \(\left| {{{\mathcal {P}}}}\right| \) individuals, and \(\vartheta \) is a residual quantity.
Without loss of generality, assuming \(\left| {{\mathcal P}}\right| \) epicenters, the q total number of locations is as
$$\begin{aligned} q=\sum _{i=1}^{\left| {{{\mathcal {P}}}}\right| }D\left( {{\mathcal E}}_{i} \right) . \end{aligned}$$
(22)

3.2.2 Seismic power and magnitude

Assume that \(L_{j} \) is a random location around \({{\mathcal E}}_{i} \). For \(L_{j} \), the Euclidean distance \(d\left( {{{\mathcal {E}}}}_{i},l_{j} \right) \) between an ith epicenter \({{{\mathcal {E}}}}_{i} \) and the projection point \(l_{j} \) of a jth location point \(L_{j} \),\(j=1,\ldots ,D\left( {{\mathcal E}}\right) \) on the ellipsoid around \({{{\mathcal {E}}}}_{i} \) is as follows:
$$\begin{aligned} \begin{aligned} {d\left( {{{\mathcal {E}}}}_{i},l_{j} \right) }&= {\sqrt{\left( \dim _{1} \left( l_{j} \right) \right) ^{2} +\left( \dim _{2} \left( l_{j} \right) \right) ^{2} } } \\&=\sqrt{\frac{1+tg^{2} \alpha _{{{{\mathcal {E}}}}_{i} } \left( l_{j} \right) }{a^{-2} +tg^{2} \alpha _{{{{\mathcal {E}}}}_{i} } \left( l_{j} \right) } }, \end{aligned} \end{aligned}$$
(23)
where \(\dim _{i} \left( \cdot \right) \) is the ith dimension of \(l_{j} \), and
$$\begin{aligned} \frac{\left( \dim _{1} \left( l_{j} \right) \right) ^{2} }{a^{2} } +\frac{\left( \dim _{2} \left( l_{j} \right) \right) ^{2} }{b^{2} } =1, \end{aligned}$$
(24)
where coefficients a and b define the shape of the ellipse around epicenter \({{{\mathcal {E}}}}_{i} \) (see Fig. 2), while \(\alpha _{{{{\mathcal {E}}}}_{i} } \left( l_{j} \right) \) is an angle:
$$\begin{aligned} tg\alpha _{{{{\mathcal {E}}}}_{i} } \left( l_{j} \right) =\frac{\dim _{2} \left( l_{j} \right) }{\dim _{1} \left( l_{j} \right) }. \end{aligned}$$
(25)
The seismic power \(P\left( {{{\mathcal {E}}}}_{i},L_{j} \right) \) operator for an ith epicenter \({{{\mathcal {E}}}}_{i} \) in a jth location point \(L_{j} \),\(j=1,\ldots ,D\left( {{\mathcal E}}_{i} \right) \) is defined as
$$\begin{aligned} P\left( {{{\mathcal {E}}}}_{i},L_{j} \right) =\left( \frac{1}{d\left( {{{\mathcal {E}}}}_{i},l_{j} \right) } M\left( {{{\mathcal {E}}}}_{i},L_{j} \right) \right) ^{b_{1} } b_{0} e^{\sigma _{\ln P\left( {{{\mathcal {E}}}}_{i},L_{j} \right) } }, \end{aligned}$$
(26)
where \(b_{0} \) and \(b_{1} \) are regression coefficients, \(\sigma _{\ln P\left( {{{\mathcal {E}}}}_{j} \right) } \) is the standard deviation [82], \(M\left( {{{\mathcal {E}}}}_{i},L_{j} \right) \) is the seismic magnitude in a location \(L_{j} \), and \(l_{j} \) is the projection of \(L_{j} \) onto the ellipsoid around \({{{\mathcal {E}}}}_{i} \) [82].
Thus, at a given \(L_{j} \) with \(d\left( {{{\mathcal {E}}}}_{i},l_{j} \right) \) ((23)), from \(P\left( {{\mathcal E}}_{i},L_{j} \right) \) (see (26)), the magnitude \(M\left( {{{\mathcal {E}}}}_{i},L_{j} \right) \) between epicenter \({{{\mathcal {E}}}}_{i} \) and location \(L_{j} \) is evaluated as
$$\begin{aligned} M\left( {{{\mathcal {E}}}}_{i},L_{j} \right) =\left( P\left( {{{\mathcal {E}}}}_{i},L_{j} \right) \frac{1}{b_{0} e^{\sigma _{\ln P\left( {{{\mathcal {E}}}}_{i},L_{j} \right) } } } \right) ^{\frac{1}{b_{1} } } d\left( {{{\mathcal {E}}}}_{i},l_{j} \right) . \end{aligned}$$
(27)

3.2.3 Cumulative magnitude

Let \(L_{j}^{{{{\mathcal {E}}}}_{i} } \) be the location point where the seismic power \(P\left( {{{\mathcal {E}}}}_{i},L_{j}^{{{{\mathcal {E}}}}_{i} } \right) \) is maximal for a given epicenter \({{{\mathcal {E}}}}_{i} \). Let \(P^{\mathrm{*}} \left( {{{\mathcal {E}}}}_{i} \right) \) be the maximal seismic power,
$$\begin{aligned} P^{\mathrm{*}} \left( {{{\mathcal {E}}}}_{i} \right) =\mathop {\max }\limits _{\forall j} P\left( {{{\mathcal {E}}}}_{i},L_{j}^{{{{\mathcal {E}}}}_{i} } \right) . \end{aligned}$$
(28)
Assuming that \(\left| {{{\mathcal {P}}}}\right| \) epicenters, \({{{\mathcal {E}}}}_{1,\ldots ,\left| {{{\mathcal {P}}}}\right| } \) exist in the system, let identify by \(P_{\max } \left( {{\mathcal E}}'\right) \) the epicenter \({{{\mathcal {E}}}}'\) with a maximal seismic power among as
$$\begin{aligned} P_{\max } \left( {{{\mathcal {E}}}}'\right) =\mathop {\max }\limits _{\forall i} \left( P^{\mathrm{*}} \left( {{{\mathcal {E}}}}_{i} \right) \right) , \end{aligned}$$
(29)
with magnitude \(M\left( {{{\mathcal {E}}}}',L_{j}^{{{\mathcal E}}'} \right) \), where \(L_{j}^{{{{\mathcal {E}}}}'} \) is the location point where the seismic power \(P_{\max } \left( {{\mathcal E}}'\right) \) is maximal yielded for \({{{\mathcal {E}}}}'\).
Then the \(C\left( {{{\mathcal {E}}}}_{i} \right) \) cumulative magnitude for an epicenter \({{{\mathcal {E}}}}_{i} \) is defined as
$$\begin{aligned} C\left( {{{\mathcal {E}}}}_{i} \right) ={{\mathcal M}}\frac{\left( {\tilde{f}}\left( {{{\mathcal {E}}}}_{i} \right) -{\tilde{f}}\left( {{{\mathcal {E}}}}'\right) \right) +\vartheta }{\sum _{i=1}^{\left| {{\mathcal P}}\right| }\left( {\tilde{f}}\left( {{{\mathcal {E}}}}_{i} \right) -{\tilde{f}}\left( {{{\mathcal {E}}}}'\right) \right) +\vartheta }, \end{aligned}$$
(30)
where \({{{\mathcal {E}}}}'\) is the highest seismic power epicenter with magnitude \(M\left( {{{\mathcal {E}}}}',L_{j}^{{{\mathcal E}}'} \right) \), \({\tilde{f}}\left( {{{\mathcal {E}}}}'\right) \) is the minimum objective value among the \(\left| {{{\mathcal {P}}}}\right| \) epicenters, and \({{{\mathcal {M}}}}\) is a control parameter defined as
$$\begin{aligned} {{{\mathcal {M}}}}=\sum _{i=1}^{\left| {{\mathcal P}}\right| }M\left( {{{\mathcal {E}}}}_{i},L_{j}^{{{\mathcal E}}_{i} } \right) , \end{aligned}$$
(31)
where \(L_{j}^{{{{\mathcal {E}}}}_{i} } \) provides the maximal seismic power for an ith epicenter \({{{\mathcal {E}}}}_{i} \), functions \({\tilde{f}}\left( {{{\mathcal {E}}}}_{i} \right) \) and \({\tilde{f}}\left( {{{\mathcal {E}}}}'\right) \) are the fitness values (see Sect. A.2.1) for the current epicenter \({{\mathcal E}}_{i} \) and for the highest seismic power epicenter \({{{\mathcal {E}}}}'\), and \(\vartheta \) is a residual quantity.

3.3 Distribution of epicenters

Assume that \({{{\mathcal {E}}}}_{i} \) is a current epicenter (solution) and \({{{\mathcal {R}}}}_{k} \) and \({{{\mathcal {R}}}}_{l} \) are two random reference points around \({{{\mathcal {E}}}}_{i} \). Using the \(C\left( {{{\mathcal {E}}}}_{i} \right) \) cumulative seismic magnitude (see (30)) of an epicenter \({{{\mathcal {E}}}}_{i} \), the generation of a new epicenter \({{{\mathcal {E}}}}_{p} \) is as follows:
Let \(\Phi \left( {{{\mathcal {E}}}}_{i},{{{\mathcal {R}}}}_{k},{{{\mathcal {R}}}}_{l} \right) \) be a Poisson range identifier function [80, 81] for \({{{\mathcal {E}}}}_{i} \) using \({{{\mathcal {R}}}}_{k} \) and \({{{\mathcal {R}}}}_{l} \) as random reference points:
$$\begin{aligned} \begin{aligned}&\Phi \left( {{{\mathcal {E}}}}_{i},{{{\mathcal {R}}}}_{k},{{{\mathcal {R}}}}_{l} \right) \\&\quad =\frac{d\left( {{{\mathcal {E}}}}_{i} ,{{{\mathcal {R}}}}_{k} \right) c_{w} \left( {{{\mathcal {R}}}}_{k} ,{{{\mathcal {R}}}}_{l} \right) }{\cos \left( \theta \left( \ell _{{{{\mathcal {E}}}}_{i},{{{\mathcal {R}}}}_{k} },\ell _{{{\mathcal R}}_{k},{{{\mathcal {R}}}}_{l} } \right) \right) \cdot d\left( {{{\mathcal {R}}}}_{k},{{{\mathcal {R}}}}_{l} \right) c_{w} \left( {{{\mathcal {E}}}}_{i},{{{\mathcal {R}}}}_{k} \right) }, \end{aligned} \end{aligned}$$
(32)
where \({{{\mathcal {E}}}}_{i} \) is a current epicenter, \({{{\mathcal {R}}}}_{k} \) and \({{{\mathcal {R}}}}_{l} \) are random reference points, \(d\left( \cdot \right) \) is the Euclidean distance function, \(c_{w} \left( {{{\mathcal {E}}}}_{i},{{\mathcal R}}_{k} \right) \) and \(c_{w} \left( {{{\mathcal {R}}}}_{k},{{{\mathcal {R}}}}_{l} \right) \) are weighting coefficients between epicenters \({{{\mathcal {E}}}}_{i} \) and \({{{\mathcal {R}}}}_{k} \) and between \({{{\mathcal {R}}}}_{k} \) and \({{{\mathcal {R}}}}_{l} \), and \(\theta \left( \ell _{{{{\mathcal {E}}}}_{i},{{\mathcal R}}_{k} },\ell _{{{{\mathcal {R}}}}_{k},{{{\mathcal {R}}}}_{l} } \right) \) is the angle between lines \(\ell _{{{{\mathcal {E}}}}_{i} ,{{{\mathcal {R}}}}_{k} } \) and \(\ell _{{{{\mathcal {R}}}}_{k},{{{\mathcal {R}}}}_{l} } \):
$$\begin{aligned} \begin{aligned}&\theta \left( \ell _{{{{\mathcal {E}}}}_{i},{{{\mathcal {R}}}}_{k} },\ell _{{{{\mathcal {R}}}}_{k},{{{\mathcal {R}}}}_{l} } \right) \\&\quad =\cos ^{-1} \left( \frac{d\left( {{{\mathcal {E}}}}_{i} ,{{{\mathcal {R}}}}_{k} \right) ^{2} +d\left( {{{\mathcal {E}}}}_{k} ,{{{\mathcal {R}}}}_{l} \right) ^{2} -d\left( {{{\mathcal {E}}}}_{i} ,{{{\mathcal {R}}}}_{l} \right) ^{2} }{2d\left( {{{\mathcal {E}}}}_{i} ,{{{\mathcal {R}}}}_{k} \right) d\left( {{{\mathcal {R}}}}_{k},{{{\mathcal {R}}}}_{l} \right) } \right) . \end{aligned} \end{aligned}$$
(33)
Without loss of generality, using (32), a Poissonian distance function \({\mathfrak {D}}\left( {{{\mathcal {E}}}_{p}} \right) \) for the finding of new epicenter \({{{\mathcal {E}}}}_{p} \) is defined via a P Poisson distribution [80, 81] as follows:
$$\begin{aligned} {\mathfrak {D}}\left( {{{\mathcal {E}}}_{p}} \right) =P\left( k,\lambda \right) , \end{aligned}$$
(34)
where
$$\begin{aligned} k=\Phi \left( {{{\mathcal {E}}}}_{i},{{{\mathcal {R}}}}_{k},{{{\mathcal {R}}}}_{l} \right) , \end{aligned}$$
(35)
with mean
$$\begin{aligned} \lambda ={\mathbb {E}}\left[ \Phi \left( {{{\mathcal {E}}}_{i}},{{{\mathcal {R}}}_{k}},{{{\mathcal {R}}}_{l}} \right) \right] . \end{aligned}$$
(36)
Therefore, the resulting new epicenter \({{{\mathcal {E}}}}_{p} \) is a Poisson random epicenter \({{{\mathcal {E}}}}_{p} \) with a Poisson range identifier \({\mathfrak {D}}\left( {{{\mathcal {E}}}_{p}} \right) \).
For a large set of reference points, only those reference points that are within the \(r\left( {{{\mathcal {E}}}}_{i} \right) \) radius around the current solution \({{{\mathcal {E}}}}_{i} \) are selected for the determination of the new solution \({{{\mathcal {E}}}}_{p} \). This radius is defined as
$$\begin{aligned} r\left( {{{\mathcal {E}}}}_{i} \right) =\chi 10^{Q_{1} \left( 2\tilde{{{{\mathcal {M}}}}}\right) -Q_{2} }, \end{aligned}$$
(37)
where \(\tilde{{M}}\) is the average magnitude,
$$\begin{aligned} \tilde{{M}}=\frac{1}{\left| {{{\mathcal {P}}}}\right| } {{\mathcal M}}=\frac{1}{\left| {{{\mathcal {P}}}}\right| } \sum _{i=1}^{\left| {{{\mathcal {P}}}}\right| }M\left( {{\mathcal E}}_{i},L_{j}^{{{{\mathcal {E}}}}_{i} } \right) , \end{aligned}$$
(38)
\(Q_{1} \) and \(Q_{2} \) are constants, and \(\chi \) is a normalization term. Motivated by the corresponding seismologic relations of the Dobrovolsky–Megathrust radius formula [81], the constants in (37) are selected as \(Q_{1} =0.414\) and \(Q_{2} =1.696\).
In the relevance range \(r\left( {{{\mathcal {E}}}}_{i} \right) \) of (37), the weights of reference points are determined by the seismic power function (26).

3.4 Population diversity

3.4.1 Hypocentral

The hypocentral of an epicenter is aimed to increase the diversity of population by a randomization.
Let \(\dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) \) be an actual randomly selected kth dimension and \(k=1,\ldots ,\dim \left( {{{\mathcal {E}}}}_{i} \right) \) be a current epicenter \({{{\mathcal {E}}}}_{i} \), \(i=1,\ldots ,\left| {{{\mathcal {P}}}}\right| \). The \({{{\mathcal {H}}}}\left( \dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) \right) \) hypocentral provides a random displacement [80, 81] of \(\dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) \) using \(C\left( {{{\mathcal {E}}}}_{i} \right) \) (see (30)):
$$\begin{aligned} \begin{aligned} {{{\mathcal {H}}}}\left( \dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) \right)&=\dim _{k} \left( {{{\mathcal {E}}}}_{i'} \right) \\&=\sqrt{\begin{array}{l} {\left( \frac{1}{M\left( \dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) ,L_{j}^{\dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) } \right) } \dim _{k} \left( {{\mathcal E}}_{i} \right) \right) ^{2} } \\ {+\left( {{\mathcal U}}\left( -C\left( {{{\mathcal {E}}}}_{i} \right) ,C\left( {{{\mathcal {E}}}}_{i} \right) \right) \right) ^{2} } \end{array}} \end{aligned} \end{aligned}$$
(39)
where \({{{\mathcal {U}}}}\left( -C\left( {{{\mathcal {E}}}}_{i} \right) ,C\left( {{{\mathcal {E}}}}_{i} \right) \right) \) is a uniform random number from the range of \(\left[ -C\left( {{\mathcal E}}_{i} \right) , C\left( {{{\mathcal {E}}}}_{i} \right) \right] \) to yield the displacement \(\dim _{k} \left( {{{\mathcal {E}}}}_{i'} \right) \), \(M\left( \dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) ,L_{j}^{\dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) } \right) \) is the magnitude, and \(L_{j}^{\dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) } \) is a location point where \(P\left( \dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) ,L_{j}^{\dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) } \right) \) is maximal for \(\dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) \).
The \(D\left( {{{\mathcal {E}}}}_{i} \right) \) locations around the cumulative magnitude \(C\left( {{{\mathcal {E}}}}_{i} \right) \) of \({{{\mathcal {E}}}}_{i} \) are generated by (39) through all the randomly selected Y dimensions, where Y is as follows [77, 78]:
$$\begin{aligned} Y={{{\mathcal {U}}}}\left( 1,\dim \left( {{{\mathcal {E}}}}_{i} \right) \right) . \end{aligned}$$
(40)
The process is repeated for all \({{{\mathcal {E}}}}_{i} \).

3.4.2 Poisson randomization

To generate random locations around \(\dim _{k} \left( {{\mathcal E}}_{i} \right) \), a Poisson distribution is also used to increase the diversity of the population. A random location in the kth dimension \(L_{r}^{\dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) } \) around \(\dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) \) is generated as follows:
$$\begin{aligned} L_{r}^{\dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) } =\dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) w, \end{aligned}$$
(41)
where
$$\begin{aligned} w\in P\left( X=k,\lambda \right) \end{aligned}$$
(42)
is a Poisson random number with distribution coefficients k and \(\lambda \). Given that it is possible that using (41) some randomly generated locations will be out of the feasible space \({{{\mathcal {S}}}}_{F} \), a normalization operator \(\mathrm{N} \left( \cdot \right) \) of \(L_{r}^{\dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) } \) is defined to keep the new locations around \(\dim _{k} \left( {{{\mathcal {E}}}}_{i} \right) \) in \({{{\mathcal {S}}}}_{F} \), as follows [77, 78]:
$$\begin{aligned} L_{r}^{{{\dim }_{k}}\left( {{{\mathcal {E}}}_{i}} \right) }=L_{r}^{{{\dim }_{k}}\left( {{{\mathcal {E}}}_{i}} \right) }\left( \bmod \left( B_{up}^{k}-B_\mathrm{low}^{k} \right) \right) +B_\mathrm{low}^{k}, \end{aligned}$$
(43)
where \(B_\mathrm{low}^{k} \) and \(B_{up}^{k} \) are lower and upper bounds on the boundaries of locations in a kth dimension, and \(\bmod (\cdot )\) is to a modular arithmetic function. The procedure is repeated for the randomly selected \(t={{{\mathcal {U}}}}\left( 1,\dim \left( {{{\mathcal {E}}}}_{i} \right) \right) \) dimensions of \({{{\mathcal {E}}}}_{i} \), for \(\forall i\).

3.5 Iterative convergence

The method of convergence of solutions in the Poisson optimization is summarized in Method 1.
An epicenter \({{{\mathcal {E}}}}_{i} \) and the generation of a new solution \({{{\mathcal {E}}}}_{p} \) in the objective space \(\mathrm{S}_{O} \) are depicted in Fig. 2. The ellipsoid around \({{{\mathcal {E}}}}_{i} \) and the projection point \(l_{k} \) of the reference location \({{{\mathcal {R}}}}_{k} \) are serving the determination of power function \(P\left( {{{\mathcal {E}}}}_{i},{{{\mathcal {R}}}}_{k} \right) \) in the reference location \({{\mathcal R}}_{k} \).
A new epicenter \({{{\mathcal {E}}}}_{p} \) is determined via the Poisson function \({\mathfrak {D}}\left( {{{\mathcal {E}}}_{p}} \right) \). Locations with low power function (26) values have high magnitudes (27) from the epicenter, whereas locations with high power function values have low magnitudes from the epicenter.

3.6 Framework

The algorithmical framework that utilizes the Poisson entanglement optimization method for the problem statement presented in Sect. 2 is defined in Algorithm 1.
Sub-procedure 1 of step 5 is discussed in the Appendix.

3.6.1 Optimization of classical communications

To achieve the minimization of classical communications required by the entanglement optimization, the S-metric (or hypervolume indicator) is integrated, which is a quality measure for the solutions or a contribution of a single solution in a solution set [77, 78]. By definition, this metric identifies the size of dominated space (size of space covered).
By theory, the \(S\left( {{{\mathcal {R}}}}\right) \) S-metric for a solution set \({{{\mathcal {R}}}}=\left\{ r_{1},\ldots ,r_{n} \right\} \) is as follows:
$$\begin{aligned} S\left( {{{\mathcal {R}}}}\right) ={{{\mathcal {L}}}}\left( \bigcup _{r\in {{{\mathcal {R}}}}}\left\{ x_{ref} \angle x\angle \left. x\right| r\right\} \right) , \end{aligned}$$
(44)
where \({{{\mathcal {L}}}}\) is a Lebesgue measure, notation \(b\angle a\) means a dominates b (or b is dominated by a), and \(x_{ref} \) is a reference point dominated by all valid solutions in the solution set [77, 78].
For a given solution \(r_{i} \), the S-metric identifies the size of space dominated by \(r_{i} \) but not dominated by any other solution, without loss of generality as:
$$\begin{aligned} S\left( {{r}_{i}} \right) =\Delta S\left( {\mathcal {R}},{{r}_{i}} \right) =S\left( {\mathcal {R}} \right) -S\left( {\mathcal {R}}\text { }\!\!\backslash \!\!\text { }\left\{ {{r}_{i}} \right\} \right) . \end{aligned}$$
(45)
In the optimization of classical communications, the existence of two objective functions is assumed. The first objective function, \(f_{1} \), is associated with the minimization of the cost of the first type of classical communications related to the reception and storage of entangled systems in the quantum nodes. (It covers the classical communications related to the required entanglement throughput by the nodes, fidelity of received entanglement, number of stored entangled states, and fidelity parameters.) Thus,
$$\begin{aligned} f_{1} :\mathop {\min }\limits _{\forall i} {{{\mathcal {C}}}}_{1} \left( x_{i} \right) , \end{aligned}$$
(46)
where \({{{\mathcal {C}}}}_{1} \left( x_{i} \right) \) is the cost associated with the first type of classical communications related to a \(x_{i} \).
The second objective function, \(f_{2} \), is associated with the cost of the second type of classical communications that is related to entanglement purification:
$$\begin{aligned} f_{2} :\mathop {\min }\limits _{\forall i} {{{\mathcal {C}}}}_{2} \left( x_{i} \right) , \end{aligned}$$
(47)
where \({{{\mathcal {C}}}}_{2} \left( x_{i} \right) \) is the cost associated with the second type of classical communications with respect to \(x_{i} \).
Assuming objective functions \(f_{1} \) and \(f_{2} \), the \(S\left( r_{i} \right) \) of a particular solution \(r_{i} \) is as follows:
$$\begin{aligned} S\left( r_{i} \right) =\left( f_{1} \left( r_{i} \right) -f_{1} \left( r_{i-1} \right) \right) \left( f_{2} \left( r_{i} \right) -f_{2} \left( r_{i+1} \right) \right) . \end{aligned}$$
(48)
Given that the S-metric is calculated for the solutions, a set of nearest neighbors that restrict the space can be determined. Since the volume of this space can be quantified by the hypervolume, the solutions that satisfy objectives \(f_{1} \) and \(f_{2} \) can be found by utilizing (48).

3.7 Computational complexity

The computational complexity of the Poissonian optimization method is derived as follows. Given that \(\left| {{{\mathcal {P}}}}\right| \) epicenters are generated in the search space and that the number of locations for an ith epicenter \({{{\mathcal {E}}}}_{i} \) is determined by the dispersion operator \(D\left( {{{\mathcal {E}}}}_{i} \right) \), the resulting computational complexity at a total number of locations \(q=\sum _{i=1}^{\left| {{\mathcal P}}\right| }D\left( {{{\mathcal {E}}}}_{i} \right) \) (see (22)) is
$$\begin{aligned} {{{\mathcal {O}}}}\left( \left( \left| {{\mathcal P}}\right| +q\right) ^{{d /2} } \log \left( \left| {{{\mathcal {P}}}}\right| +q\right) \right) , \end{aligned}$$
(49)
since after a sorting process the locations for a given epicenter \({{{\mathcal {E}}}}_{i} \) can be calculated with complexity \({{{\mathcal {O}}}}\left( D\left( {{{\mathcal {E}}}}_{i} \right) \right) \), where d is the number of objectives.
Considering that in our setting \(d=2\), the total complexity is
$$\begin{aligned} {{{\mathcal {O}}}}\left( \left( \left| {{\mathcal P}}\right| +q\right) \log \left( \left| {{\mathcal P}}\right| +q\right) \right) . \end{aligned}$$
(50)

4 Problem resolution

The resolution of the problem shown in Sect. 2 using the Poissonian entanglement optimization framework of Sect. 3 is as follows.
Let \(X_{{{{\mathcal {S}}}}_\mathrm{low} } \) be a set of nodes for which condition (7) holds for the fidelity of the received entangled states in the nodes, and let \(X_{{{\mathcal S}}_{\mathrm{high}} } \) be a set of nodes for which condition (8) holds for the received fidelity entanglement.
Then let \(\left| X_{{{{\mathcal {S}}}}_\mathrm{low} } \right| \) and \(\left| X_{{{{\mathcal {S}}}}_{\mathrm{high}} } \right| \) be the cardinality of \(X_{{{{\mathcal {S}}}}_\mathrm{low} } \) and \(X_{{{{\mathcal {S}}}}_{\mathrm{high}} } \), respectively.
Specifically, function (10) for the \(X_{{{{\mathcal {S}}}}_\mathrm{low} } \)-type nodes is rewritten as
$$\begin{aligned} {{{\mathcal {G}}}^{{{X}_{{{{\mathcal {S}}}_\mathrm{low}}}}}}\left( {\mathbf {X}} \right) =\max \sum \limits _{i=1}^{\left| {{X}_{{{{\mathcal {S}}}_\mathrm{low}}}} \right| }{{\mathcal {F}}_{i}^{{{X}_{{{{\mathcal {S}}}_\mathrm{low}}}}}\left( {\mathbf {X}} \right) {\mathbb {E}}\left( D_{i}^{{{X}_{{{{\mathcal {S}}}_\mathrm{low}}}}}\left( {\mathbf {X}} \right) \right) }, \end{aligned}$$
(51)
where \({{{\mathcal {F}}}}_{i}^{X_{{{{\mathcal {S}}}}_\mathrm{low} } } \left( X\right) \) is the entanglement fidelity function for an ith \(X_{{{{\mathcal {S}}}}_\mathrm{low} } \)-type node \(x_{i} \), \(x_{i} \in X_{{{{\mathcal {S}}}}_\mathrm{low} } \), and \({\mathbb {E}}\left( D_{i}^{{{X}_{{{{\mathcal {S}}}_\mathrm{low}}}}}\left( {\mathbf {X}} \right) \right) \) is the expected relative entropy of entanglement in an ith \(X_{{{{\mathcal {S}}}}_\mathrm{low} } \)-type \(x_{i} \).
Similarly, for the \(X_{{{{\mathcal {S}}}}_\mathrm{low} } \)-type nodes, function (10) is as follows:
$$\begin{aligned} {{{\mathcal {G}}}^{{{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}}}}\left( {\mathbf {X}} \right) =\max \sum \limits _{i=1}^{\left| {{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}} \right| }{{\mathcal {F}}_{i}^{{{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}}}\left( {\mathbf {X}} \right) {\mathbb {E}}\left( D_{i}^{{{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}}}\left( {\mathbf {X}} \right) \right) }. \end{aligned}$$
(52)
From (51) and (52), a cumulative \({{{\mathcal {G}}}^{{{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}}\otimes {{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}}}}\left( {\mathbf {X}} \right) \) is defined as
$$\begin{aligned} \begin{aligned} {{{\mathcal {G}}}^{{{X}_{{{{\mathcal {S}}}_\mathrm{low}}}}\otimes {{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}}}}\left( {\mathbf {X}} \right) =&\sum \limits _{i=1}^{\left| {{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}} \right| }{{{A}_{i}}{\mathcal {F}}_{i}^{{{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}}}\left( {\mathbf {X}} \right) {\mathbb {E}}\left( D_{i}^{{{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}}}\left( {\mathbf {X}} \right) \right) } \\&+\sum \limits _{i=\left| {{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}} \right| +1}^{\left| {{X}_{{{{\mathcal {S}}}_\mathrm{low}}}} \right| +\left| {{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}} \right| }{{{A}_{i}}{\mathcal {F}}_{i}^{{{X}_{{{{\mathcal {S}}}_\mathrm{low}}}}}\left( {\mathbf {X}} \right) {\mathbb {E}}\left( D_{i}^{{{X}_{{{{\mathcal {S}}}_\mathrm{low}}}}}\left( {\mathbf {X}} \right) \right) {{F}_{1}}\left( {\mathbf {X}} \right) ,} \end{aligned} \end{aligned}$$
(53)
where \(A_{i} \) refers to the number of received entangled systems in an ith node, while
$$\begin{aligned} {{F}_{1}}\left( {\mathbf {X}} \right) =\min {\mathcal {C}}\left( {\mathbf {X}} \right) =\sum \limits _{i=1}^{N}{\sum \limits _{i=1}^{T}{{{f}_{j}}B_{F}^{j}\left( {{x}_{i}} \right) }}. \end{aligned}$$
(54)
The fidelity types of the available resource states in the nodes should be further divided into T classes. The final function is then evaluated as
$$\begin{aligned} \begin{aligned} {{{\mathcal {G}}}^{{{X}_{{{{\mathcal {S}}}_\mathrm{low}}}}\otimes {{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}}}}\left( {\mathbf {X}} \right)&={{F}_{1}}\left( {\mathbf {X}} \right) {{F}_{2}}\left( {\mathbf {X}} \right) \\&=\sum \limits _{i=1}^{\left| {{X}_{{{{\mathcal {S}}}_\mathrm{low}}}} \right| +\left| {{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}} \right| }{\sum \limits _{j=1}^{T}{{{f}_{j}}B_{F}^{j}\left( {{x}_{i}} \right) }{{F}_{2}}\left( {\mathbf {X}} \right) ,} \end{aligned} \end{aligned}$$
(55)
where
$$\begin{aligned} {{F}_{2}}\left( {\mathbf {X}} \right) =\min {\mathcal {S}}\left( {\mathbf {X}} \right) =\sum \limits _{i=1}^{\left| {{X}_{{{{\mathcal {S}}}_\mathrm{low}}}} \right| +\left| {{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}} \right| }{{{{\mathcal {S}}}_{i}}\left( {\mathbf {X}} \right) }. \end{aligned}$$
(56)
Thus,
$$\begin{aligned} {{{\mathcal {G}}}^{{{X}_{{{{\mathcal {S}}}_\mathrm{low}}}}\otimes {{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}}}}\left( {\mathbf {X}} \right) =\sum \limits _{i=1}^{\left| {{X}_{{{{\mathcal {S}}}_\mathrm{low}}}} \right| +\left| {{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}} \right| }{{{{\mathcal {S}}}_{i}}\left( {\mathbf {X}} \right) }, \end{aligned}$$
(57)
such that [77, 78]
$$\begin{aligned} \begin{aligned} \sum \limits _{i=1}^{\left| {{X}_{{{{\mathcal {S}}}_\mathrm{low}}}} \right| +\left| {{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}} \right| }{{{{\mathcal {F}}}_{i}}\left( {\mathbf {X}} \right) }&\ge \gamma {{F}_{1}}\left( N \right) \\&=\gamma \sum \limits _{i=1}^{\left| {{X}_{{{{\mathcal {S}}}_\mathrm{low}}}} \right| +\left| {{X}_{{{{\mathcal {S}}}_{\mathrm{high}}}}} \right| }{\sum \limits _{j=1}^{T}{{{f}_{j}}B_{F}^{j}\left( {{x}_{i}} \right) }} \\&\le {{\nu }_{{\mathbf {X}}}}\left( {{\varphi }_{i}} \right) \Lambda \le \Pi B_{F}^{j}\left( {{x}_{i}} \right) , \end{aligned} \end{aligned}$$
(58)
where \({{\nu }_{{\mathbf {X}}}}\left( {{\varphi }_{i}} \right) =\sum \limits _{j=1}^{Z}{{{\tau }_{j}}\left( {{\varphi }_{i}} \right) } \), \(\gamma \) is given by the constraint of (13), while \(\Pi \) is given by the constraint of (19).

4.1 Convergence of solutions

Let \({{{\mathcal {F}}}_{i}}\left( {\mathbf {X}} \right) \in \left[ 0,1\right] \) be the objective function that refers to the resulting entanglement fidelity in a particular node \(x_{i} \), after purification and quantum error correction with per-node cost functions \(F_{1}^{i} \left( {\mathbf {X}} \right) \), and \(F_{2}^{i} \left( {\mathbf {X}} \right) \), respectively.
Precisely, a current ith epicenter \({{{\mathcal {E}}}}_{i} \) identifies a solution in the objective space \(\mathrm{S}_{O}\),
$$\begin{aligned} \mathrm{S}_{O} :\left\{ F_{1}^{i} \left( N\right) ,F_{2}^{i} \left( N\right) ,{{{\mathcal {F}}}_{i}}\left( {\mathbf {X}} \right) \right\} . \end{aligned}$$
(59)
The random locations around \({{{\mathcal {E}}}}_{i} \) also represent possible solutions. Let \({{{\mathcal {E}}}}^{\mathrm{*}} \) be an optimal solution in the \(\mathrm{S}_{O} \) subject space, which maximizes \({{{\mathcal {F}}}_{i}}\left( {\mathbf {X}} \right) \) and minimizes \(F_{1}^{i} \left( {\mathbf {X}} \right) \) and \(F_{2}^{i} \left( {\mathbf {X}} \right) \). From \({{{\mathcal {E}}}}_{i} \), the algorithm determines a new solution (epicenter) \({{\mathcal E}}_{p} \) via the \({\mathfrak {D}}\left( {{{\mathcal {E}}}_{p}} \right) \) Poisson distance function, using the connection model between the locations around \({{{\mathcal {E}}}}_{i} \). To improve the diversity, locations around \({{{\mathcal {E}}}}_{p} \) are generated. The new epicenter \({{{\mathcal {E}}}}_{p} \) converges to an optimal solution \({{{\mathcal {E}}}}^{\mathrm{*}} \). The iterations are repeated until \({{{\mathcal {E}}}}^{\mathrm{*}} \) is not found or until a stopping criterion is met.
The iteration from a current solution \({{{\mathcal {E}}}}_{i} \) to a new solution \({{{\mathcal {E}}}}_{p} \) toward a global optimal \({{{\mathcal {E}}}}^{\mathrm{*}} \) in \(\mathrm{S}_{O} \) is illustrated in Fig. 3.

5 Numerical evidence

In this section, a numerical evidence is proposed to demonstrate the Poisson entanglement optimization method.

5.1 Decision making

To demonstrate the results of Sect. 4, let \({{{\mathcal {F}}}_{i}}\left( {\mathbf {X}} \right) \) be the object function subject to maximize. The problem is to determine a matrix \({\mathbf {X}}\) that maximizes \({{{\mathcal {F}}}_{i}}\left( {\mathbf {X}} \right) \), and also \({\mathbb {E}}\left( D_{i}^{{{N}_{{{{\mathcal {S}}}_\mathrm{low}}}}}\left( {\mathbf {X}} \right) \right) \), and minimizes the cost functions \(F_{1}^{i} \left( N\right) \) and \(F_{1}^{i} \left( N\right) \). Thus, for each node N, the optimal number of received and stored entangled systems should be determined, with high and low fidelity classes.
Particularly, finding an optimal solution \({{{\mathcal {E}}}}^{\mathrm{*}} \) in \(\mathrm{S}_{O} \) with the assumptions given in Sect. 4 therefore means the selection of the optimal objective function (e.g., maximizing the entanglement fidelity \({{{\mathcal {F}}}_{i}}\left( {\mathbf {X}} \right) \) or maximizing the relative entropy of entanglement \({\mathbb {E}}\left( D_{i}^{{{N}_{{{{\mathcal {S}}}_\mathrm{low}}}}}\left( {\mathbf {X}} \right) \right) \)), in particular node types \(X_{{{{\mathcal {S}}}}_\mathrm{low} } \) and \(X_{{{{\mathcal {S}}}}_{\mathrm{high}} } \), while all cost functions are minimized in the quantum network.
A solution set in \(\mathrm{S}_{O} \) is depicted in Fig. 4.
An optimal solution \({{{\mathcal {E}}}}^{\mathrm{*}} \) in \(\mathrm{S}_{O} \) therefore yields the maximization of entanglement fidelity \({{{\mathcal {F}}}}_{N} \left( X\right) \) if a particular node N belongs to the class \(N_{{{{\mathcal {S}}}}_{\mathrm{high}} } \), whereas it maximizes the relative entropy of entanglement \({\mathbb {E}}\left( D_{i}^{{{N}_{{{{\mathcal {S}}}_\mathrm{low}}}}}\left( {\mathbf {X}} \right) \right) \) if N belongs to the class \(N_{{{{\mathcal {S}}}}_\mathrm{low} } \). Increasing \(B_{F}^{j} \left( x_{i} \right) \) for a \(N_{{{{\mathcal {S}}}}_{\mathrm{high}} } \)-class node and then performing an optimal purification and quantum error correction could significantly improve the fidelity of entanglement. On the other hand, for a \(N_{{{{\mathcal {S}}}}_\mathrm{low} } \)-class node, the fidelity improvement at an optimal purification and quantum error correction is insignificant. Thus, incrementing \(B_{F}^{j} \left( x_{i} \right) \) does not lead to a significant improvement in the fidelity. The optimal solution for these nodes is to focus on improving the relative entropy of entanglement, which requires lower cost function values.
This decision strategy provides a global optimal with respect to all quantum nodes of the quantum network.
The decision making is illustrated in Fig. 5. In Fig. 5a, the F entanglement fidelity is depicted in function of \(F_{1}^{i} \left( N\right) \) for \(N_{{{\mathcal S}}_\mathrm{low} } \) and \(N_{{{{\mathcal {S}}}}_{\mathrm{high}} } \) nodes. In Fig. 5b, the D relative entropy of entanglement is depicted in function of \(F_{1}^{i} \left( N\right) \) for \(N_{{{{\mathcal {S}}}}_\mathrm{low} } \) and \(N_{{{{\mathcal {S}}}}_{\mathrm{high}} } \) nodes. The initial values of F and D are assumed to be equal for a given class, while the value of \(F_{2}^{i} \left( N\right) \) is set to constant for illustration purposes.
For an \(N_{{{{\mathcal {S}}}}_{\mathrm{high}} } \) node, the increment of \(F_{1}^{i} \left( N\right) \) leads to significant improvement in F, while the increment in D is moderate. For an \(N_{{{\mathcal S}}_\mathrm{low} } \) node, the increment of \(F_{1}^{i} \left( N\right) \) leads to moderate improvement in F, while the improvement in D is significant. As a corollary, the increment of the entanglement throughput is a useful approach to increase the entanglement fidelity for the \(X_{{{{\mathcal {S}}}}_{\mathrm{high}} } \) set, and to boost the relative entropy of entanglement in the \(X_{{{\mathcal S}}_\mathrm{low} } \) set.

5.2 Distribution of solutions

First, we analyze the distribution of solutions in the feasible space \({{{\mathcal {S}}}}_{F} \) focusing on the magnitudes associated to the locations around epicenters.
Let us assume that the total number of q locations (see (22)) can be divided into m magnitude ranges [79], such that
$$\begin{aligned} \sum _{i=1}^{m}n_{i} =q=\sum _{i=1}^{\left| {{\mathcal P}}\right| }D\left( {{{\mathcal {E}}}}_{i} \right) , \end{aligned}$$
(60)
where \(n_{i} \) is the number of locations belonging to an ith magnitude range, \(\left| {{{\mathcal {P}}}}\right| \) is the population size. Then let \(M_{i} \) be the magnitude associated to the ith magnitude range. Then a \({\tilde{n}}_{i} \) approximation of \(n_{i} \) is evaluated as
$$\begin{aligned} {\tilde{n}}_{i} =f\left( M_{i} \right) , \end{aligned}$$
(61)
where \(f\left( \cdot \right) \) is a fitting function. To give an estimate on \(n_{i} \) at a particular magnitude \(M_{i} \), we utilize a power law distribution [79] function \({{\mathcal B}}\left( n_{i} \right) \) for a log-scaled \(n_{i} \), as
$$\begin{aligned} {{{\mathcal {B}}}}\left( n_{i} \right) :\log _{10} \left( n_{i} \right) =a-b{\tilde{M}}_{i}, \end{aligned}$$
(62)
where \({\tilde{M}}_{i} \) is a log-scaled \(M_{i} \), while a and b are constants [79].
Then, the \({\tilde{n}}_{i} \) Poisson estimate is yielded as
$$\begin{aligned} {\tilde{n}}_{i} =\sigma _{i}^{2} =\lambda _{i}, \end{aligned}$$
(63)
where \(\sigma _{i}^{2} \) is the observational variance, while \(\lambda _{i} \) is the mean of a Poisson distribution. Since the sum of independent Poisson variables is also a Poisson variable with mean equals to the sum of the components means,
$$\begin{aligned} \lambda \left( q\right) =\sum _{i=1}^{m}\lambda _{i} \approx q, \end{aligned}$$
(64)
where \(\lambda \left( q\right) \) is the mean total number, while \(\lambda _{i} \) is an ith component mean. Using the Poisson property \(\sigma ^{2} =\lambda \), the \(\sigma _{q}^{2} \) estimated uncertainty is yielded as [79] \(\sigma _{q}^{2} =\lambda \left( q\right) =\sum _{i=1}^{m}f\left( {\tilde{M}}_{i} \right) \). Thus using a corresponding fitting function \(f\left( \cdot \right) \), the mean and the variance of the total number of events are equal to the sum of the fitted values.
In our model the distribution of the log-scaled \({\tilde{n}}_{i} =\lambda _{i} \) values in function of \(M_{i} \) is well approachable by the power law distribution \({{{\mathcal {B}}}}\left( \lambda _{i} \right) :\log _{10} \left( \lambda _{i} \right) =a-b{\tilde{M}}_{i} \), while the distribution of the \(\lambda \left( q\right) \) total number (64) of locations is approachable by a \({{{\mathcal {N}}}}\left( \lambda \left( q\right) ,\sigma _{{{\mathcal N}}}^{2} \right) \), Gaussian distribution with variance \(\sigma _{{{{\mathcal {N}}}}}^{2} =\lambda \left( q\right) \) as \(\lambda \left( q\right) \rightarrow \infty \), by theory.
The distributions of \({{{\mathcal {B}}}}\left( \lambda _{i} \right) \) in function of the magnitude \(M_{i} \) and coefficient b are illustrated in Fig. 6.
The distributions of \(\lambda \left( q\right) \) (see (64)) for \(k_{it} \) iterations are depicted in Fig. 7. In Fig. 7a, \(\lambda \left( q\right) =10^{2} \), while Fig. 7b illustrated the distribution at \(\lambda \left( q\right) =10^{6} \). As \(\lambda \left( q\right) \rightarrow \infty \), the distributions of \(\lambda \left( q\right) \) can be approximated by a \({{{\mathcal {N}}}}\left( \lambda \left( q\right) ,\sigma _{{{{\mathcal {N}}}}}^{2} \right) \), \(\sigma _{{{{\mathcal {N}}}}}^{2} =\lambda \left( q\right) \) Gaussian distribution.
The associated distributions of \({{{\mathcal {B}}}}\left( \lambda _{i} \right) \) for the values of \(\lambda \left( q\right) \) are depicted in Fig. 8. The maximum value of \({{\mathcal B}}\left( \lambda _{i} \right) \) is selected to \({{\mathcal B}}\left( \lambda _{i} \right) \approx 10\) in each cases which values are picked up at \(\lambda \left( q\right) \), where \(\lambda \left( q\right) =10^{2} \) in Fig. 8a, and \(\lambda \left( q\right) =10^{6} \) in Fig. 8b. The \({{\mathcal B}}\left( \lambda _{i} \right) \) values approximates to a Gaussian distribution. The statistical distribution of \({{\mathcal B}}\left( \lambda _{i} \right) \) is therefore constitutes a similar pattern for arbitrary \(\lambda \left( q\right) \).

6 Conclusions

We defined an optimization framework for the transmission and processing of quantum entanglement in the entangled network structure of the quantum Internet. The proposed Poissonian entanglement optimization framework fuses the fundamental concepts of quantum Shannon theory with the theory of evolutionary algorithms and seismic wave propagations. Two objective functions are defined, with primary focus on the entanglement fidelity and secondary focus on the relative entropy of entanglement. As an additional objective function, the minimization of classical communications required by the entanglement optimization procedure is considered. The cost functions are defined to cover the physical attributes of entanglement transmission, purification, and storage in quantum memories. This method can be implemented with low complexity that allows a straightforward application in future quantum Internet and quantum networking scenarios.

Acknowledgements

Open access funding provided by Budapest University of Technology and Economics (BME). This work was partially supported by the European Research Council through the Advanced Fellow Grant, in part by the Royal Society’s Wolfson Research Merit Award, in part by the Engineering and Physical Sciences Research Council under Grant EP/L018659/1, by the Hungarian Scientific Research Fund—OTKA K-112125, and by the National Research Development and Innovation Office of Hungary (Project No. 2017-1.2.1-NKP-2017-00001), and in part by the BME Artificial Intelligence FIKP grant of EMMI (BME FIKP-MI/SC).

Compliance with ethical standards

Ethics statement

This work did not involve any active collection of human data.

Data accessibility statement

This work does not have any experimental data.

Conflict of interest

We have no competing interests.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Anhänge

Appendix

Definitions

Entanglement Fidelity

Let
$$\begin{aligned} {\left| \beta _{00} \right\rangle } ={\textstyle \frac{1}{\sqrt{2} }} \left( {\left| 00 \right\rangle } +{\left| 11 \right\rangle } \right) \end{aligned}$$
(A.1)
be the target Bell state subject to be created at the end of the entanglement distribution procedure. The entanglement fidelity F at an actually created noisy quantum system \(\sigma \) is
$$\begin{aligned} F\left( \sigma \right) =\langle {{\beta }_{00}} | \sigma |{{\beta }_{00}} \rangle , \end{aligned}$$
(A.2)
where F is a value between 0 and 1, \(F=1\) for a perfect Bell state and \(F<1\) for an imperfect state. The fidelity for two pure quantum states is defined as
$$\begin{aligned} F(| \varphi \rangle ,| \psi \rangle )=|\langle \varphi |\psi \rangle |^{2} . \end{aligned}$$
(A.3)
The fidelity of quantum states can describe the relation of a pure channel input state \(|\psi \rangle \) and the received mixed quantum system \(\sigma =\sum _{i=0}^{n-1} p_{i} \rho _{i} =\sum _{i=0}^{n-1} p_{i} | \psi _{i} \rangle \langle \psi _{i} | \) at the channel output as
$$\begin{aligned} F(|\psi \rangle ,\sigma )=\langle \psi |\sigma |\psi \rangle =\sum ^{n-1}_{i=0}{}p_i{|\langle \psi |{\psi }_i\rangle |}^2. \end{aligned}$$
(A.4)
Fidelity can also be defined for mixed states \(\sigma \) and \(\rho \)
$$\begin{aligned} F(\rho ,\sigma )={\left( \text {Tr}\left( \sqrt{\sqrt{\sigma }\rho \sqrt{\sigma }}\right) \right) }^2=\sum _i{}p_i{\left( \text {Tr}\left( \sqrt{\sqrt{{\sigma }_i}{\rho }_i\sqrt{{\sigma }_i}}\right) \right) }^2. \end{aligned}$$
(A.5)

Relative Entropy of Entanglement

By definition, the \(E(\rho )\) relative entropy of entanglement function of a joint state \(\rho \) of subsystems A and B is defined by the \(D( \cdot \Vert \cdot )\) quantum relative entropy function, without loss of generality as
$$\begin{aligned} E(\rho )=\mathop {{\min }}\limits _{\rho _{AB} } D( \rho \Vert \rho _{AB} )=\mathop {\min }\limits _{\rho _{AB} } \text {Tr}(\rho \log \rho )-\text {Tr}(\rho \log (\rho _{AB} )), \end{aligned}$$
(A.6)
where \(\rho _{AB} \) is the set of separable states \(\rho _{AB}=\sum _{i=1}^{n} p_{i} \rho _{A,i} \otimes \rho _{B,i} \).

Evaluation of Solutions

Fitness Function

To evaluate the performance of the epicenters we utilize a mathematical apparatus based on the Pareto strength and fitness assignment [77, 78]. Let \(\Pr \left( {{\mathcal E}}_{i} \right) \) be the probability of selection of an epicenter \({{\mathcal E}}_{i} \), defined as
$$\begin{aligned} \Pr \left( {{\mathcal E}}_{i} \right) =\frac{\kappa \left( {{\mathcal E}}_{i} \right) }{\sum _{l\in K}\kappa \left( {{\mathcal E}}_{l} \right) } , \end{aligned}$$
(A.7)
where \(\kappa \left( {{\mathcal E}}_{i} \right) \) is the sum of \(d\left( \cdot \right) \) Euclidean distances between \({{\mathcal E}}_{i} \) and the other epicenters, as
$$\begin{aligned} \kappa \left( {{\mathcal E}}_{i} \right) =\sum _{l=1}^{K}d \left( {{\mathcal E}}_{i} ,{{\mathcal E}}_{l} \right) =\sum _{l=1}^{K}\left\| {{\mathcal E}}_{i} -{{\mathcal E}}_{l} \right\| , \end{aligned}$$
(A.8)
where K is a set with cardinality
$$\begin{aligned} \left| K\right| =\sum _{i=1}^{\left| {{\mathcal P}}\right| }D\left( {{\mathcal E}}_{i} \right) + \sum _{i=1}^{N}\sum _{k=1}^{\dim \left( {{\mathcal E}}_{i} \right) }R\left( i,k\right) , \end{aligned}$$
(A.9)
where \(D\left( {{\mathcal E}}_{i} \right) \) is given in (21), and \(l\in K\) refers to that the position of \({{\mathcal E}}_{j} \) belongs to set K, and \(\left| {{\mathcal P}}\right| \) is the population size. Let \({{\mathcal N}{\mathcal P}}\) refer to the non-dominated solution archive, and let
$$\begin{aligned} \varphi _{i} ={{\mathcal E}}_{i} \end{aligned}$$
(A.10)
refer to the selected epicenter, i.e, to an individual solution in \({{\mathcal P}}\) or in \({{\mathcal N}{\mathcal P}}\).
Let \(\Phi \left( \varphi _{i} \right) \) be a strength coefficient for solution \(\varphi _{i} \), defined as
$$\begin{aligned} \Phi \left( \varphi _{i} \right) =\left| \varphi _{k} \in {{\mathcal P}}\bigcup {{\mathcal N}{\mathcal P}}\right| \left. \varphi _{k} \angle \varphi _{i} \right| , \end{aligned}$$
(A.11)
where \(\angle \) refers to the Pareto dominance relation between \(\varphi _{i} \) and \(\varphi _{k} ={{\mathcal E}}_{k} \). As follows, (A.11) depends on the number of individuals it dominates, by theory [77, 78].
By definition, a decision vector \(\mathbf {A}\) dominates a vector \(\mathbf {B}\), i.e., \(\mathbf {B}\angle \mathbf {A}\), if
$$\begin{aligned} f_{i} \left( \mathbf {A}\right) \le f_{i} \left( \mathbf {B}\right) \end{aligned}$$
(A.12)
for \(\forall i\), \(i=1,\ldots ,m\) and for at least one j with i, \(j=1,\ldots ,n\),
$$\begin{aligned} f_{j} \left( \mathbf {A}\right) \le f_{j} \left( \mathbf {B}\right) , \end{aligned}$$
(A.13)
where \(f:{{\mathbb {R}}^{m}}\rightarrow {{\mathbb {R}}^{n}}\). The set of non-dominated decision vectors in \({{\mathbb {R}}}^{n} \) is called a Pareto optimal set, while the image under f in the solution space is called the Pareto front [77, 78]. In a multiobjective optimization the aim is to achieve the best Pareto front, by theory.
Using (A.11), let \(\alpha \left( \varphi _{i} \right) \) be the raw fitness value of \(\varphi _{i} \) evaluated by the \(\Phi \left( \cdot \right) \) strength function (see (A.11)) of its dominators as
$$\begin{aligned} \alpha \left( \varphi _{i} \right) =\sum _{\left( \varphi _{k} \in {{\mathcal P}}\bigcup {{\mathcal N}{\mathcal P}}\right) \wedge \left. \left( \varphi _{i} \angle \varphi _{k} \right) \right| }\Phi \left( \varphi _{k} \right) , \end{aligned}$$
(A.14)
with an inverse distance function (referred to as the density value of \(\varphi _{i} \)), \(\rho \left( \varphi _{i} \right) \) as
$$\begin{aligned} \rho \left( \varphi _{i} \right) =\frac{1}{d_{g} \left( \varphi _{i} \right) } , \end{aligned}$$
(A.15)
where \(d_{g} \left( \varphi _{i} \right) \) is the distance from solution \(\varphi _{i} \) to its \(g^{th} \) nearest individual, where g is initialized as the square root of the sample size \(\left| {{\mathcal P}}\bigcup {{\mathcal N}{\mathcal P}}\right| \), by theory [77, 78].
Using (A.15), a for a random solution \(r\left( \varphi _{i} \right) \) the \(\tilde{f}\left( \cdot \right) \) fitness function of \(\varphi _{i} \) is as
$$\begin{aligned} \tilde{f}\left( \varphi _{i} \right) =\alpha \left( \varphi _{i} \right) +\rho \left( \varphi _{i} \right) . \end{aligned}$$
(A.16)
Then let p refer to the number of selected \(\varphi _{i} \) solutions in \({{\mathcal P}}\). Using (A.16), the selection probability of each solution is yielded as
$$\begin{aligned} \Pr \left( \varphi _{i} \right) =\frac{\tilde{f}\left( \varphi _{i} \right) }{\sum _{r\in {{\mathcal P}}}\tilde{f}\left( \varphi _{r} \right) } . \end{aligned}$$
(A.17)

Constraints

As a solution \(\varphi _{i} \) does not satisfy the problem constraints \(C_{1} \), \(C_{2} \), \(C_{3} \), a \(\mathrm{H} ^{C_{z} } \left( \varphi _{i} \right) \), \(z=1,2,3\) degrees of violation are defined for the constraints.
For constraint \(C_{1} \) (see (13)), the \(\mathrm{H} ^{C_{1} } \left( \varphi _{i} \right) \) violation function [77, 78] is as
$$\begin{aligned} H^{C_1}\left( {\varphi }_i\right) =\left\{ \begin{array}{ll} \gamma -\zeta \left( {\varphi }_i\right) ,&{}\quad \text { if }\zeta \left( {\varphi }_i\right) \le \gamma \\ 0,&{}\quad \text {otherwise}, \end{array} \right. \end{aligned}$$
(A.18)
where
$$\begin{aligned} \zeta \left( \varphi _{i} \right) =\sum _{i=1}^{N}{{\mathcal F}}_{i} \left( \varphi _{i} \right) . \end{aligned}$$
(A.19)
For constraint \(C_{2} \) (see (15)), the \(\mathrm{H} ^{C_{2} } \left( \varphi _{i} \right) \) violation function is as follows
$$\begin{aligned} \mathrm{H}^{C_2}\left( {\varphi }_i\right) =\left\{ \begin{array}{ll} F_1\left( {\varphi }_i\right) -\Lambda ,&{}\quad \text { if }F_1\left( {\varphi }_i\right) \ge \Lambda \\ 0, &{}\quad \text {otherwise}, \end{array} \right. \end{aligned}$$
(A.20)
where
$$\begin{aligned} F_{1} \left( \varphi _{i} \right) =\sum _{i=1}^{N}\sum _{i=1}^{T}f_{j} B_{F}^{j} \left( \varphi _{i} \right) . \end{aligned}$$
(A.21)
For constraint \(C_{3} \) (see (19)), the \(\mathrm{H} ^{C_{3} } \left( \varphi _{i} \right) \) violation function is as
$$\begin{aligned} \mathrm{H}^{C_3}\left( {\varphi }_i\right) =\left\{ \begin{array}{l} \nu \left( {\varphi }_i\right) -\Pi ,\text { if }\nu \left( {\varphi }_i\right) \ge \Pi \\ 0, \text {otherwise}, \end{array} \right. \end{aligned}$$
(A.22)
where
$$\begin{aligned} \nu \left( \varphi _{i} \right) =\sum _{j=1}^{N}\tau _{j} \left( \varphi _{i} \right) . \end{aligned}$$
(A.23)
From (A.18), (A.20) and (A.22) a penalty coefficient \(\partial \left( \varphi _{i} \right) \) is defined as
$$\begin{aligned} \partial \left( \varphi _{i} \right) =w_{1} \mathrm{H} ^{C_{1} } \left( \varphi _{i} \right) +w_{2} \mathrm{H} ^{C_{2} } \left( \varphi _{i} \right) +w_{3} \mathrm{H} ^{C_{3} } \left( \varphi _{i} \right) , \end{aligned}$$
(A.24)
where \(w_{i} \)-s are weighting coefficients [77, 78].

Selection Condition

Assuming that there are \(\chi \) number of selected random solutions such that the selection probabilities are proportional to their fitness values. The selection of a solution \(\varphi _{i} \) is as follows.
First from the selected random solutions a mutant solution \(\hbar _{i} \) is generated as
$$\begin{aligned} \hbar _{i} =\varphi _{r_{a} } +\vartheta \left( \varphi _{r_{b} } -\varphi _{r_{c} } \right) , \end{aligned}$$
(A.25)
where \(r_{i} \in \left\{ a,\ldots p\right\} \) are the random indexes, while \(\vartheta >0\) is a coefficient.
From the components of \(\hbar _{i} \) a trial solution \(\mathrm{T} _{i} \) is defined with a \(j^{th} \) component \(\mathrm{T} _{i}^{\left( j\right) } \) as
$$\begin{aligned} \mathrm{T}^{\left( j\right) }_i=\left\{ \begin{array}{ll} {\hslash }^{\left( j\right) }_i &{}\quad \text { if } r\left( 0,1\right) <P_{cross},\text { or }j=r\left( i\right) \\ {\varphi }^{\left( j\right) }_i, &{}\quad \text {otherwise}, \end{array} \right. \end{aligned}$$
(A.26)
where \(r\left( 0,1\right) \) is a random number from the range \(\left[ 0,1\right] \), \(r\left( i\right) \) is a random integer within \(\left( 0,X\right] \) for each i, while \(P_{cross} \) is the crossover probability ranged in \(\left( 0,1\right) \).
Then the selection of the solution \(\varphi _{i} \) using the trial solution \(\mathrm{T} _{i} \) is as
$$\begin{aligned} {\varphi }_i=\left\{ \begin{array}{ll} T_i,&{}\quad \text { if }\tilde{f}\left( T_i\right) \le \tilde{f}\left( {\varphi }_i\right) \\ {\varphi }_i, &{}\quad \text {otherwise}, \end{array} \right. \end{aligned}$$
(A.27)
where function \(\tilde{f}\left( \cdot \right) \) is given in (A.16).

Sub-Procedure 1

The Sub-procedure 1 of Algorithm 1 is as follows [77, 78].

Notations

The notations of the manuscript are summarized in Table 1.
Table 1
Summary of notations
Notation
Description
l
Level of entanglement
F
Fidelity of entanglement
N
Number of nodes in the network
T
Number of fidelity types \(F_{j} \), \(j=1,\ldots ,T\) of the entangled states
\(\mathrm{S}_{O} \)
Objective space
\({{\mathcal S}}_{F} \)
Feasible space
\(\mathrm{L}_{l} \)
An l-level entangled connection. For an \(\mathrm{L}_{l} \) link, the hopdistance is \(2^{l-1} \)
\(d\left( x,y\right) _{\mathrm{L}_{l} } \)
Hop-distance of an l-level entangled connection between nodes x and y
\(E_{\mathrm{L}_{l} } \left( x,y\right) \)
entangled connection \(E_{\mathrm{L}_{l} } \left( x,y\right) \) between nodes x and y
\(B_{F} \left( E_{\mathrm{L}_{l} } \left( x,y\right) \right) \)
Entanglement throughput of an \(\mathrm{L}_{l} \)-level entangled connection \(E_{\mathrm{L}_{l} } \left( x,y\right) \) between nodes \(\left( x,y\right) \)
\(B_{F}^{j} \left( x_{i} \right) \)
Number of incoming entangled states in an ith node \(x_{i} \), with fidelity-type j, \(i=1,\ldots ,N\)
\(\mathbf {X}\)
An \(N\times T\) matrix, \(\mathbf {X}={{\left( B_{F}^{j}\left( {{x}_{i}} \right) \right) }_{N\times T}}\), it describes the number of resource entangled states injected into the nodes from each fidelity-type in the network, \(B_{F}^{j} \left( x_{i} \right) \ge 0\) for all i and j
\({{\mathcal F}}\left( x_{i} \right) \)
A primary objective function. It identifies the cumulative entanglement fidelity (a sum of entanglement fidelities in \(x_{i} \)) after an entanglement purification \(\mathrm{P} \left( x_{i} \right) \) and an optimal quantum error correction \(\mathrm{C}\left( x_{i} \right) \) in \(x_{i} \)
\(\mathrm{P} \left( x_{i} \right) \)
Entanglement purification in \(x_{i} \)
\(\mathrm{C}\left( x_{i} \right) \)
Optimal quantum error correction in \(x_{i} \)
\(\left\langle B \right\rangle _{F}^{j}\left( {{x}_{i}} \right) \)
An initialization value for \(B_{F}^{j} \left( x_{i} \right) \) in a particular node \(x_{i} \)
\(\mathbb {E}\left( {{D}_{i}}\left( \mathbf {X} \right) \right) \)
A secondary objective function. It refers to the expected amount of cumulative relative entropy of entanglement (a sum of relative entropy of entanglement) in node \(x_{i} \),
\(w_{j} \left( x_{i} \right) \)
Quantum memory coefficient for the storage of entangled states from the jth fidelity type in a node \(x_{i} \), evaluated as: \({{w}_{j}}\left( {{x}_{i}} \right) ={{\eta }_{j}}B_{F}^{j}\left( {{x}_{i}} \right) +{{\kappa }_{j}}\left\langle B \right\rangle _{F}^{j}\left( {{x}_{i}} \right) \), where \(\eta _{j} \) and \(\kappa _{j} \) are coefficients to describe the storage characteristic of entangled states with the jth fidelity type
\(\tau _{j} \left( \mathbf {X}\right) \)
Differentiation of storage characteristic of entangled states from the jth fidelity type, defined as \(\tau _{j} \left( \mathbf {X}\right) =\sum _{i=1}^{N}\left( w_{j} \left( x_{i} \right) -\Omega \right) ^{2} ,\) where https://static-content.springer.com/image/art%3A10.1007%2Fs11128-019-2335-1/MediaObjects/11128_2019_2335_IEq604_HTML.gif
\(f_{C} \left( \mathrm{P} \left( x_{i} \right) \right) \)
Cost of entanglement purification \(\mathrm{P} \left( x_{i} \right) \) in \(x_{i} \)
\(f_{C} \left( \mathrm{C}\left( x_{i} \right) \right) \)
Cost of optimal quantum error correction \(\mathrm{C}\left( x_{i} \right) \) in \(x_{i} \)
\({{\mathcal C}}\left( \mathbf {X}\right) \)
Total cost function, defined as \(\begin{array}{rcl} \mathcal {C}\left( \mathbf {X} \right) =&\sum \limits _{i=1}^{N}{{{f}_{C}}\left( P \left( {{x}_{i}} \right) \right) +{{f}_{C}}\left( \text {C}\left( {{x}_{i}} \right) \right) } =\sum \limits _{i=1}^{N}{\sum \limits _{i=1}^{T}{{{f}_{j}}B_{F}^{j}\left( {{x}_{i}} \right) ,}} \end{array}\) where T is the number of fidelity types, N is the number of nodes, \(f_{j} \) is a total cost of purification and error correction associated to the jth fidelity type of entangled states
\(f_{j} \)
Total cost of purification and error correction associated to the jth fidelity type of entanglement fidelity
\(F^{\mathrm{*}} \)
Critical fidelity coefficient
\({{\mathcal S}}_\mathrm{low} \), \({{\mathcal S}}_\mathrm{high} \)
Sets with fidelity bounds \({{\mathcal S}}_\mathrm{low} \left( F\right) \) and \({{\mathcal S}}_\mathrm{high} \left( F\right) \) as \({{\mathcal S}}_\mathrm{low} \left( F\right) :\mathop {\max }\limits _{\forall i} F_{i} <F^{{*}} \), and \({{\mathcal S}}_\mathrm{high} \left( F\right) :\mathop {\min }\limits _{\forall i} F_{i} \ge F^{{*}}\)
\(X_{{{\mathcal S}}_\mathrm{low} } \)
Set of nodes for which condition \({{\mathcal S}}_\mathrm{low} \left( F\right) :\mathop {\max }\limits _{\forall i} F_{i} <F^{{*}} \) holds
\(X_{{{\mathcal S}}_\mathrm{high} } \)
Set of nodes for which condition \({{\mathcal S}}_\mathrm{high} \left( F\right) :\mathop {\min }\limits _{\forall i} F_{i} \ge F^{{*}} \) holds
\({{\mathcal S}}_{i} \left( \mathbf {X}\right) \)
Cost of quantum memory usage in node \(x_{i} \), defined as \({{\mathcal S}}_{i} \left( \mathbf {X}\right) =\lambda \sum _{j=1}^{T}\alpha _{i} \frac{1}{\Upsilon _{i} } B_{F}^{j} \left( x_{i} \right) \), where \(\lambda \) is a constant, \(\alpha _{i} \) is a quality coefficient, while \(\Upsilon _{i} \) is a capacity coefficient of the quantum memory
\({{\mathcal G}}\left( \mathbf {X}\right) \)
Main objective function, \(\mathcal {G}\left( \mathbf {X} \right) =\max \sum \limits _{i=1}^{N}{{{\mathcal {F}}_{i}}\left( \mathbf {X} \right) \mathbb {E}\left( {{D}_{i}}\left( \mathbf {X} \right) \right) }\)
\(F_{1} \left( N\right) \)
Minimization function for cost \({{\mathcal C}}\left( \mathbf {X}\right) \)
\(F_{2} \left( N\right) \)
Minimization function for cost \({{\mathcal S}}\left( \mathbf {X}\right) \)
\(C_{1} \), \(C_{2} \), \(C_{3} \)
Problem constraints
\({{\mathcal E}}\)
Epicenter, represents a solution in the feasible space
\(L_{j} \)
A random location around epicenter \({{\mathcal E}}\)
\(D\left( {{\mathcal E}}\right) \)
Dispersion coefficient of an epicenter \({{\mathcal E}}\) (solution in the feasible space). It determines the number of affected \(L_{j} \), \(j=1,\ldots ,D\left( {{\mathcal E}}\right) \), locations (also represent solutions in the feasible space) around an epicenter \({{\mathcal E}}\)
\({{\mathcal P}}\)
Population \({{\mathcal P}}\) (a set of possible solutions)
m
Control parameter
\({{\mathcal E}}_{i} \)
An ith individual (epicenter) from the \(\left| {{\mathcal P}}\right| \) individuals (epicenters) in the population \({{\mathcal P}}\)
\(\tilde{f}\left( \cdot \right) \)
Fitness function
\(\tilde{f}\left( \langle \mathcal {E} \rangle \right) \)
A maximum objective value among the \(\left| {{\mathcal P}}\right| \) individuals
\(\vartheta \)
A residual quantity
\(f_{R} \left( \cdot \right) \)
Rounding function
q
Total number of locations, \(q=\sum _{i=1}^{\left| {{\mathcal P}}\right| }D\left( {{\mathcal E}}_{i} \right) \)
\(\hat{D}\left( {{\mathcal E}}_{i} \right) \)
Upper bound on \(D\left( {{\mathcal E}}_{i} \right) \) for a given epicenter \({{\mathcal E}}_{i} \)
\(d\left( {{\mathcal E}}_{i} ,l_{j} \right) \)
Euclidean distance \(d\left( {{\mathcal E}}_{i} ,l_{j} \right) \) between an ith epicenter \({{\mathcal E}}_{i} \) and the projection point \(l_{j} \) of a jth location point \(L_{j} \),\(j=1,\ldots ,D\left( {{\mathcal E}}\right) \) on the ellipsoid around \({{\mathcal E}}_{i} \)
\(\dim _{i} \left( \cdot \right) \)
An ith dimension of \(l_{j} \)
\(P\left( {{\mathcal E}}_{i} ,L_{j} \right) \)
Seismic power \(P\left( {{\mathcal E}}_{i} ,L_{j} \right) \) operator for an ith epicenter \({{\mathcal E}}_{i} \). Measures the power in a jth location point \(L_{j} \),\(j=1,\ldots ,D\left( {{\mathcal E}}_{i} \right) \), as\(P\left( {{\mathcal E}}_{i} ,L_{j} \right) =\left( \frac{1}{d\left( {{\mathcal E}}_{i} ,l_{j} \right) } M\left( {{\mathcal E}}_{i} ,L_{j} \right) \right) ^{b_{1} } b_{0} e^{\sigma _{\ln P\left( {{\mathcal E}}_{i} ,L_{j} \right) } } \),where \(b_{0} \) and \(b_{1} \) are regression coefficients, \(\sigma _{\ln P\left( {{\mathcal E}}_{j} \right) } \) is the standard deviation, while \(M\left( {{\mathcal E}}_{i} ,L_{j} \right) \) is the seismic magnitude in a location \(L_{j} \), while \(l_{j} \) is the projection of \(L_{j} \) onto the ellipsoid around \({{\mathcal E}}_{i} \)
\(M\left( {{\mathcal E}}_{i} ,L_{j} \right) \)
Magnitude between epicenter \({{\mathcal E}}_{i} \) and location \(L_{j} \) is evaluated as\(M\left( {{\mathcal E}}_{i} ,L_{j} \right) =\left( P\left( {{\mathcal E}}_{i} ,L_{j} \right) \frac{1}{b_{0} e^{\sigma _{\ln P\left( {{\mathcal E}}_{i} ,L_{j} \right) } } } \right) ^{\frac{1}{b_{1} } } d\left( {{\mathcal E}}_{i} ,l_{j} \right) \)
\(P^{\mathrm{*}} \left( {{\mathcal E}}_{i} \right) \)
Maximal seismic power for a given epicenter \({{\mathcal E}}_{i} \)
\(C\left( {{\mathcal E}}_{i} \right) \)
Cumulative magnitude for an epicenter \({{\mathcal E}}_{i} \)
\({{\mathcal E}}'\)
Highest seismic power epicenter with magnitude \(M\left( {{\mathcal E}}',L_{j}^{{{\mathcal E}}'} \right) \)
\(\tilde{f}\left( {{\mathcal E}}'\right) \)
Minimum objective values among the \(\left| {{\mathcal P}}\right| \) epicenters
\({{\mathcal M}}\)
Control parameter, \({{\mathcal M}}=\sum _{i=1}^{\left| {{\mathcal P}}\right| }M\left( {{\mathcal E}}_{i} ,L_{j}^{{{\mathcal E}}_{i} } \right) \),where \(L_{j}^{{{\mathcal E}}_{i} } \) provides the maximal seismic power for an ith epicenter \({{\mathcal E}}_{i} \)
\(\Phi \left( {{\mathcal E}}_{i} ,{{\mathcal R}}_{k} ,{{\mathcal R}}_{l} \right) \)
Poisson range identifier function of \({{\mathcal E}}_{i} \), where \({{\mathcal R}}_{k} \) and \({{\mathcal R}}_{l} \) are random reference points
\(c_{w} \left( {{\mathcal E}}_{i} ,{{\mathcal R}}_{k} \right) \), \(c_{w} \left( {{\mathcal R}}_{k} ,{{\mathcal R}}_{l} \right) \)
Weighting coefficients between epicenters \({{\mathcal E}}_{i} \) and \({{\mathcal R}}_{k} \), and between \({{\mathcal R}}_{k} \) and \({{\mathcal R}}_{l} \)
\(\mathfrak {D}\left( {{\mathcal {E}}_{p}} \right) \)
Poissonian distance function \(\mathfrak {D}\left( {{\mathcal {E}}_{p}} \right) \), where \({{\mathcal E}}_{p} \) is a new solution
\(r\left( {{\mathcal E}}_{i} \right) \)
Radius around a current solution \({{\mathcal E}}_{i} \), defined as\(r\left( {{\mathcal E}}_{i} \right) =\chi 10^{Q_{1} \left( 2\tilde{{{\mathcal M}}}\right) -Q_{2} } \),where \(\tilde{{M}}\) is the average magnitude \(\tilde{{M}}=\frac{1}{\left| {{\mathcal P}}\right| } {{\mathcal M}}=\frac{1}{\left| {{\mathcal P}}\right| } \sum _{i=1}^{\left| {{\mathcal P}}\right| }M\left( {{\mathcal E}}_{i} ,L_{j}^{{{\mathcal E}}_{i} } \right) \),while \(Q_{1} \) and \(Q_{2} \) are constants, while \(\chi \) is a normalization term
\(\dim _{k} \left( {{\mathcal E}}_{i} \right) \)
Randomly selected kth dimension, \(k=1,\ldots ,\dim \left( {{\mathcal E}}_{i} \right) \) of a current epicenter \({{\mathcal E}}_{i} \), \(i=1,\ldots ,\left| {{\mathcal P}}\right| \)
\({{\mathcal H}}\left( \dim _{k} \left( {{\mathcal E}}_{i} \right) \right) \)
Hypocentral, provides a random displacement of \(\dim _{k} \left( {{\mathcal E}}_{i} \right) \) using \(C\left( {{\mathcal E}}_{i} \right) \)
\(L_{r}^{\dim _{k} \left( {{\mathcal E}}_{i} \right) } \)
A random location in the kth dimension \(L_{r}^{\dim _{k} \left( {{\mathcal E}}_{i} \right) } \) around \(\dim _{k} \left( {{\mathcal E}}_{i} \right) \)
\(\mathrm{N} \left( \cdot \right) \)
Normalization operator \(\mathrm{N} \left( \cdot \right) \) of \(L_{r}^{\dim _{k} \left( {{\mathcal E}}_{i} \right) } \). It keeps the new locations around \(\dim _{k} \left( {{\mathcal E}}_{i} \right) \) in \({{\mathcal S}}_{F} \), where \(B_\mathrm{low}^{k} \) and \(B_{up}^{k} \) are lower and upper bounds on the boundaries of locations in a kth dimension
S-metric
Hypervolume indicator. A quality measure for the solutions or a contribution of a single solution in a solution set
\(S\left( {{\mathcal R}}\right) \)
S-metric for a solution set \({{\mathcal R}}=\left\{ r_{1} ,\ldots ,r_{n} \right\} \) is as\(S\left( {{\mathcal R}}\right) ={{\mathcal L}}\left( \bigcup _{r\in {{\mathcal R}}}\left\{ x_{ref} \angle x\angle \left. x\right| r\right\} \right) ,\)where \({{\mathcal L}}\) is a Lebesgue measure, notation \(b\angle a\) refers to that a dominates b (or b is dominated by a), while \(x_{ref} \) is a reference point dominated by all valid solutions in the solution set
\(f_{1} \), \(f_{2} \)
Objective functions
\({{\mathcal C}}_{1} \left( x_{i} \right) \)
Cost results from the first-type classical communications related to a \(x_{i} \)
\({{\mathcal C}}_{2} \left( x_{i} \right) \)
Cost results from the second-type classical communications with respect to \(x_{i} \)
\({{\mathcal E}}^{\mathrm{*}} \)
Global optima
m
Number of magnitude ranges
\(n_{i} \)
Number of locations belonging to an ith magnitude range
\({{\mathcal B}}\left( n_{i} \right) \)
Power law distribution function for a log-scaled \(n_{i} \),\({{\mathcal B}}\left( n_{i} \right) :\log _{10} \left( n_{i} \right) =ab\ tilde{M}_{i} \),where \(\tilde{M}_{i} \) is a log scaled \(M_{i} \), while a and b are constants
\(\tilde{n}_{i} \)
Poisson estimate of \(n_{i} \), as \(\tilde{n}_{i} =\sigma _{i}^{2} =\lambda _{i} \),where \(\sigma _{i}^{2} \) is the observational variance, while \(\lambda _{i} \) is the mean of a Poisson distribution
\(\sigma _{q}^{2} \)
Estimated uncertainty, \(\sigma _{q}^{2} =\lambda \left( q\right) =\sum _{i=1}^{m}f\left( \tilde{M}_{i} \right) \), where \(f\left( \cdot \right) \) is a fitting function
\(\lambda \left( q\right) \)
Mean total number, \(\lambda \left( q\right) =\sum _{i=1}^{m}\lambda _{i} \approx q\), where \(\lambda _{i} \) is an ith component mean
\({{\mathcal B}}\left( \lambda _{i} \right) \)
Power law distribution function for \(\lambda _{i} =\tilde{n}_{i} \)
\(k_{it} \)
Number of iterations
Literatur
1.
Zurück zum Zitat Van Meter, R.: Quantum Networking. Wiley, ISBN:1118648927, 9781118648926 (2014) Van Meter, R.: Quantum Networking. Wiley, ISBN:1118648927, 9781118648926 (2014)
2.
Zurück zum Zitat Lloyd, S., Shapiro, J.H., Wong, F.N.C., Kumar, P., Shahriar, S.M., Yuen, H.P.: Infrastructure for the quantum internet. ACM SIGCOMM Comput. Commun. Rev. 34(5), 9–20 (2004)CrossRef Lloyd, S., Shapiro, J.H., Wong, F.N.C., Kumar, P., Shahriar, S.M., Yuen, H.P.: Infrastructure for the quantum internet. ACM SIGCOMM Comput. Commun. Rev. 34(5), 9–20 (2004)CrossRef
4.
Zurück zum Zitat Van Meter, R., Ladd, T.D., Munro, W.J., Nemoto, K.: System design for a long-line quantum repeater. IEEE/ACM Trans. Netw. 17(3), 1002–1013 (2009)CrossRef Van Meter, R., Ladd, T.D., Munro, W.J., Nemoto, K.: System design for a long-line quantum repeater. IEEE/ACM Trans. Netw. 17(3), 1002–1013 (2009)CrossRef
5.
Zurück zum Zitat Van Meter, R., Satoh, T., Ladd, T.D., Munro, W.J., Nemoto, K.: Path selection for quantum repeater networks. Netw. Sci. 3(1–4), 82–95 (2013)CrossRef Van Meter, R., Satoh, T., Ladd, T.D., Munro, W.J., Nemoto, K.: Path selection for quantum repeater networks. Netw. Sci. 3(1–4), 82–95 (2013)CrossRef
7.
Zurück zum Zitat Gyongyosi, L., Imre, S.: Dynamic topology resilience for quantum networks. In: Proceedings SPIE 10547, Advances in Photonics of Quantum Computing, Memory, and Communication XI, 105470Z (22 February 2018) (2018). https://doi.org/10.1117/12.2288707 Gyongyosi, L., Imre, S.: Dynamic topology resilience for quantum networks. In: Proceedings SPIE 10547, Advances in Photonics of Quantum Computing, Memory, and Communication XI, 105470Z (22 February 2018) (2018). https://​doi.​org/​10.​1117/​12.​2288707
10.
Zurück zum Zitat Pirandola, S., Braunstein, S.L., Laurenza, R., Ottaviani, C., Cope, T.P.W., Spedalieri, G., Banchi, L.: Theory of channel simulation and bounds for private communication. Quantum Sci. Technol. 3, 035009 (2018)ADSCrossRef Pirandola, S., Braunstein, S.L., Laurenza, R., Ottaviani, C., Cope, T.P.W., Spedalieri, G., Banchi, L.: Theory of channel simulation and bounds for private communication. Quantum Sci. Technol. 3, 035009 (2018)ADSCrossRef
11.
Zurück zum Zitat Laurenza, R., Pirandola, S.: General bounds for sender-receiver capacities in multipoint quantum communications. Phys. Rev. A 96, 032318 (2017)ADSCrossRef Laurenza, R., Pirandola, S.: General bounds for sender-receiver capacities in multipoint quantum communications. Phys. Rev. A 96, 032318 (2017)ADSCrossRef
16.
Zurück zum Zitat Imre, S., Gyongyosi, L.: Advanced Quantum Communications—An Engineering Approach. Wiley-IEEE Press, Hoboken, NJ (2013)MATH Imre, S., Gyongyosi, L.: Advanced Quantum Communications—An Engineering Approach. Wiley-IEEE Press, Hoboken, NJ (2013)MATH
19.
Zurück zum Zitat Caleffi, M., Cacciapuoti, A.S., Bianchi, G.: Quantum internet: from communication to distributed computing (2018). arXiv:1805.04360 Caleffi, M., Cacciapuoti, A.S., Bianchi, G.: Quantum internet: from communication to distributed computing (2018). arXiv:​1805.​04360
21.
Zurück zum Zitat Cacciapuoti, A.S., Caleffi, M., Tafuri, F., Cataliotti, F.S., Gherardini, S., Bianchi, G.: Quantum internet: networking challenges in distributed quantum computing (2018). arXiv:1810.08421 Cacciapuoti, A.S., Caleffi, M., Tafuri, F., Cataliotti, F.S., Gherardini, S., Bianchi, G.: Quantum internet: networking challenges in distributed quantum computing (2018). arXiv:​1810.​08421
22.
Zurück zum Zitat Bacsardi, L.: On the way to quantum-based satellite communication. IEEE Commun. Mag. 51(08), 50–55 (2013)CrossRef Bacsardi, L.: On the way to quantum-based satellite communication. IEEE Commun. Mag. 51(08), 50–55 (2013)CrossRef
23.
Zurück zum Zitat Petz, D.: Quantum Information Theory and Quantum Statistics. Springer, Heidelberg (2008)MATH Petz, D.: Quantum Information Theory and Quantum Statistics. Springer, Heidelberg (2008)MATH
25.
Zurück zum Zitat Xiao, Y.F., Gong, Q.: Optical microcavity: from fundamental physics to functional photonics devices. Sci. Bull. 61(3), 185–186 (2016)CrossRef Xiao, Y.F., Gong, Q.: Optical microcavity: from fundamental physics to functional photonics devices. Sci. Bull. 61(3), 185–186 (2016)CrossRef
26.
Zurück zum Zitat Zhang, W., et al.: Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 118, 220501 (2017)ADSCrossRef Zhang, W., et al.: Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 118, 220501 (2017)ADSCrossRef
27.
28.
Zurück zum Zitat Lloyd, S., Mohseni, M., Rebentrost, P.: Quantum algorithms for supervised and unsupervised machine learning (2013). arXiv:1307.0411 Lloyd, S., Mohseni, M., Rebentrost, P.: Quantum algorithms for supervised and unsupervised machine learning (2013). arXiv:​1307.​0411
29.
Zurück zum Zitat Chou, C., Laurat, J., Deng, H., Choi, K.S., de Riedmatten, H., Felinto, D., Kimble, H.J.: Functional quantum nodes for entanglement distribution over scalable quantum networks. Science 316(5829), 1316–1320 (2007)ADSCrossRef Chou, C., Laurat, J., Deng, H., Choi, K.S., de Riedmatten, H., Felinto, D., Kimble, H.J.: Functional quantum nodes for entanglement distribution over scalable quantum networks. Science 316(5829), 1316–1320 (2007)ADSCrossRef
30.
Zurück zum Zitat Sheng, Y.B., Zhou, L.: Distributed secure quantum machine learning. Sci. Bull. 62, 1025–1029 (2017)CrossRef Sheng, Y.B., Zhou, L.: Distributed secure quantum machine learning. Sci. Bull. 62, 1025–1029 (2017)CrossRef
31.
Zurück zum Zitat Kok, P., Munro, W.J., Nemoto, K., Ralph, T.C., Dowling, J.P., Milburn, G.J.: Linear optical quantum computing with photonic qubits. Rev. Mod. Phys. 79, 135–174 (2007)ADSCrossRef Kok, P., Munro, W.J., Nemoto, K., Ralph, T.C., Dowling, J.P., Milburn, G.J.: Linear optical quantum computing with photonic qubits. Rev. Mod. Phys. 79, 135–174 (2007)ADSCrossRef
32.
33.
Zurück zum Zitat Shor, P.W.: Scheme for reducing decoherence in quantum computer memory. Phys. Rev. A 52, R2493–R2496 (1995)ADSCrossRef Shor, P.W.: Scheme for reducing decoherence in quantum computer memory. Phys. Rev. A 52, R2493–R2496 (1995)ADSCrossRef
34.
Zurück zum Zitat Muralidharan, S., Kim, J., Lutkenhaus, N., Lukin, M.D., Jiang, L.: Ultrafast and fault-tolerant quantum communication across long distances. Phys. Rev. Lett. 112, 250501 (2014)ADSCrossRef Muralidharan, S., Kim, J., Lutkenhaus, N., Lukin, M.D., Jiang, L.: Ultrafast and fault-tolerant quantum communication across long distances. Phys. Rev. Lett. 112, 250501 (2014)ADSCrossRef
35.
Zurück zum Zitat Yuan, Z., Chen, Y., Zhao, B., Chen, S., Schmiedmayer, J., Pan, J.W.: Experimental demonstration of a BDCZ quantum repeater node. Nature 454, 1098–1101 (2008)ADSCrossRef Yuan, Z., Chen, Y., Zhao, B., Chen, S., Schmiedmayer, J., Pan, J.W.: Experimental demonstration of a BDCZ quantum repeater node. Nature 454, 1098–1101 (2008)ADSCrossRef
36.
Zurück zum Zitat Kobayashi, H., Le Gall, F., Nishimura, H., Rotteler, M.: General Scheme for Perfect Quantum Network Coding with Free Classical Communication. Lecture Notes in Computer Science (Automata, Languages and Programming SE-52, vol. 5555, pp. 622–633. Springer, Berlin (2009)MATH Kobayashi, H., Le Gall, F., Nishimura, H., Rotteler, M.: General Scheme for Perfect Quantum Network Coding with Free Classical Communication. Lecture Notes in Computer Science (Automata, Languages and Programming SE-52, vol. 5555, pp. 622–633. Springer, Berlin (2009)MATH
37.
Zurück zum Zitat Hayashi, M.: Prior entanglement between senders enables perfect quantum network coding with modification. Phys. Rev. A 76, 040301(R) (2007)ADSMathSciNetCrossRef Hayashi, M.: Prior entanglement between senders enables perfect quantum network coding with modification. Phys. Rev. A 76, 040301(R) (2007)ADSMathSciNetCrossRef
38.
Zurück zum Zitat Hayashi, M., Iwama, K., Nishimura, H., Raymond, R., Yamashita, S.: Quantum Network Coding. In: Thomas, W., Weil, P. (eds.) Lecture Notes in Computer Science (STACS 2007 SE52 vol. 4393). Springer, Berlin (2007) Hayashi, M., Iwama, K., Nishimura, H., Raymond, R., Yamashita, S.: Quantum Network Coding. In: Thomas, W., Weil, P. (eds.) Lecture Notes in Computer Science (STACS 2007 SE52 vol. 4393). Springer, Berlin (2007)
39.
Zurück zum Zitat Chen, L., Hayashi, M.: Multicopy and stochastic transformation of multipartite pure states. Phys. Rev. A 83(2), 022331 (2011)ADSCrossRef Chen, L., Hayashi, M.: Multicopy and stochastic transformation of multipartite pure states. Phys. Rev. A 83(2), 022331 (2011)ADSCrossRef
40.
42.
43.
Zurück zum Zitat Zou, Z.Z., Yu, X.T., Zhang, Z.C.: Quantum connectivity optimization algorithms for entanglement source deployment in a quantum multi-hop network. Front. Phys. 13(2), 130202 (2018)CrossRef Zou, Z.Z., Yu, X.T., Zhang, Z.C.: Quantum connectivity optimization algorithms for entanglement source deployment in a quantum multi-hop network. Front. Phys. 13(2), 130202 (2018)CrossRef
44.
Zurück zum Zitat Xiong, P.Y., Yu, X.T., Zhang, Z.C., et al.: Routing protocol for wireless quantum multi-hop mesh backbone network based on partially entangled GHZ state. Front. Phys. 12(4), 120302 (2017)CrossRef Xiong, P.Y., Yu, X.T., Zhang, Z.C., et al.: Routing protocol for wireless quantum multi-hop mesh backbone network based on partially entangled GHZ state. Front. Phys. 12(4), 120302 (2017)CrossRef
45.
Zurück zum Zitat Farouk, A., Batle, J., Elhoseny, M., et al.: Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states. Front. Phys. 13(2), 130306 (2018)CrossRef Farouk, A., Batle, J., Elhoseny, M., et al.: Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states. Front. Phys. 13(2), 130306 (2018)CrossRef
46.
Zurück zum Zitat Wang, Z., Zhang, C., Huang, Y.F., et al.: Experimental verification of genuine multipartite entanglement without shared reference frames. Sci. Bull. 61(9), 714–719 (2016)CrossRef Wang, Z., Zhang, C., Huang, Y.F., et al.: Experimental verification of genuine multipartite entanglement without shared reference frames. Sci. Bull. 61(9), 714–719 (2016)CrossRef
47.
Zurück zum Zitat Deng, F.G., Ren, B.C., Li, X.H.: Quantum hyperentanglement and its applications in quantum information processing. Sci. Bull. 62(1), 46–68 (2017)CrossRef Deng, F.G., Ren, B.C., Li, X.H.: Quantum hyperentanglement and its applications in quantum information processing. Sci. Bull. 62(1), 46–68 (2017)CrossRef
48.
Zurück zum Zitat Zhu, F., Zhang, W., Sheng, Y., et al.: Experimental long-distance quantum secure direct communication. Sci. Bull. 62(22), 1519–1524 (2017)CrossRef Zhu, F., Zhang, W., Sheng, Y., et al.: Experimental long-distance quantum secure direct communication. Sci. Bull. 62(22), 1519–1524 (2017)CrossRef
49.
Zurück zum Zitat Van Meter, R., Devitt, S.J.: Local and distributed quantum computation. IEEE Comput. 49(9), 31–42 (2016)CrossRef Van Meter, R., Devitt, S.J.: Local and distributed quantum computation. IEEE Comput. 49(9), 31–42 (2016)CrossRef
50.
Zurück zum Zitat Lloyd, S., Mohseni, M., Rebentrost, P.: Quantum principal component analysis. Nat. Phys. 10, 631 (2014)CrossRef Lloyd, S., Mohseni, M., Rebentrost, P.: Quantum principal component analysis. Nat. Phys. 10, 631 (2014)CrossRef
52.
Zurück zum Zitat Lloyd, S.: The universe as quantum computer. In: Zenil, H. (ed.) A Computable Universe: Understanding and Exploring Nature as Computation. World Scientific, Singapore (2013). arXiv:1312.4455v1 Lloyd, S.: The universe as quantum computer. In: Zenil, H. (ed.) A Computable Universe: Understanding and Exploring Nature as Computation. World Scientific, Singapore (2013). arXiv:​1312.​4455v1
53.
Zurück zum Zitat Zhang, W., et al.: Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 118, 220501 (2017)ADSCrossRef Zhang, W., et al.: Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 118, 220501 (2017)ADSCrossRef
54.
Zurück zum Zitat Enk, S.J., Cirac, J.I., Zoller, P.: Photonic channels for quantum communication. Science 279, 205–208 (1998)ADSCrossRef Enk, S.J., Cirac, J.I., Zoller, P.: Photonic channels for quantum communication. Science 279, 205–208 (1998)ADSCrossRef
55.
Zurück zum Zitat Briegel, H.J., Dur, W., Cirac, J.I., Zoller, P.: Quantum repeaters: the role of imperfect local operations in quantum communication. Phys. Rev. Lett. 81, 5932–5935 (1998)ADSCrossRef Briegel, H.J., Dur, W., Cirac, J.I., Zoller, P.: Quantum repeaters: the role of imperfect local operations in quantum communication. Phys. Rev. Lett. 81, 5932–5935 (1998)ADSCrossRef
56.
Zurück zum Zitat Dur, W., Briegel, H.J., Cirac, J.I., Zoller, P.: Quantum repeaters based on entanglement purification. Phys. Rev. A 59, 169–181 (1999)ADSCrossRef Dur, W., Briegel, H.J., Cirac, J.I., Zoller, P.: Quantum repeaters based on entanglement purification. Phys. Rev. A 59, 169–181 (1999)ADSCrossRef
57.
Zurück zum Zitat Duan, L.M., Lukin, M.D., Cirac, J.I., Zoller, P.: Long-distance quantum communication with atomic ensembles and linear optics. Nature 414, 413–418 (2001)ADSCrossRef Duan, L.M., Lukin, M.D., Cirac, J.I., Zoller, P.: Long-distance quantum communication with atomic ensembles and linear optics. Nature 414, 413–418 (2001)ADSCrossRef
58.
Zurück zum Zitat Van Loock, P., Ladd, T.D., Sanaka, K., Yamaguchi, F., Nemoto, K., Munro, W.J., Yamamoto, Y.: Hybrid quantum repeater using bright coherent light. Phys. Rev. Lett. 96, 240501 (2006)CrossRef Van Loock, P., Ladd, T.D., Sanaka, K., Yamaguchi, F., Nemoto, K., Munro, W.J., Yamamoto, Y.: Hybrid quantum repeater using bright coherent light. Phys. Rev. Lett. 96, 240501 (2006)CrossRef
59.
Zurück zum Zitat Zhao, B., Chen, Z.B., Chen, Y.A., Schmiedmayer, J., Pan, J.W.: Robust creation of entanglement between remote memory qubits. Phys. Rev. Lett. 98, 240502 (2007)ADSCrossRef Zhao, B., Chen, Z.B., Chen, Y.A., Schmiedmayer, J., Pan, J.W.: Robust creation of entanglement between remote memory qubits. Phys. Rev. Lett. 98, 240502 (2007)ADSCrossRef
60.
Zurück zum Zitat Goebel, A.M., Wagenknecht, G., Zhang, Q., Chen, Y., Chen, K., Schmiedmayer, J., Pan, J.W.: Multistage entanglement swapping. Phys. Rev. Lett. 101, 080403 (2008)ADSCrossRef Goebel, A.M., Wagenknecht, G., Zhang, Q., Chen, Y., Chen, K., Schmiedmayer, J., Pan, J.W.: Multistage entanglement swapping. Phys. Rev. Lett. 101, 080403 (2008)ADSCrossRef
61.
Zurück zum Zitat Simon, C., de Riedmatten, H., Afzelius, M., Sangouard, N., Zbinden, H., Gisin, N.: Quantum repeaters with photon pair sources and multimode memories. Phys. Rev. Lett. 98, 190503 (2007)ADSCrossRef Simon, C., de Riedmatten, H., Afzelius, M., Sangouard, N., Zbinden, H., Gisin, N.: Quantum repeaters with photon pair sources and multimode memories. Phys. Rev. Lett. 98, 190503 (2007)ADSCrossRef
62.
Zurück zum Zitat Tittel, W., Afzelius, M., Chaneliere, T., Cone, R.L., Kroll, S., Moiseev, S.A., Sellars, M.: Photon-echo quantum memory in solid state systems. Laser Photon. Rev. 4, 244–267 (2009)ADSCrossRef Tittel, W., Afzelius, M., Chaneliere, T., Cone, R.L., Kroll, S., Moiseev, S.A., Sellars, M.: Photon-echo quantum memory in solid state systems. Laser Photon. Rev. 4, 244–267 (2009)ADSCrossRef
63.
Zurück zum Zitat Sangouard, N., Dubessy, R., Simon, C.: Quantum repeaters based on single trapped ions. Phys. Rev. A 79, 042340 (2009)ADSCrossRef Sangouard, N., Dubessy, R., Simon, C.: Quantum repeaters based on single trapped ions. Phys. Rev. A 79, 042340 (2009)ADSCrossRef
64.
65.
Zurück zum Zitat Sheng, Y.B., Zhou, L.: Distributed secure quantum machine learning. Sci. Bull. 62, 1025–1029 (2017)CrossRef Sheng, Y.B., Zhou, L.: Distributed secure quantum machine learning. Sci. Bull. 62, 1025–1029 (2017)CrossRef
66.
Zurück zum Zitat Leung, D., Oppenheim, J., Winter, A.: Quantum network communication-the butterfly and beyond. IEEE Trans. Inf. Theory 56, 3478–90 (2010)MathSciNetCrossRef Leung, D., Oppenheim, J., Winter, A.: Quantum network communication-the butterfly and beyond. IEEE Trans. Inf. Theory 56, 3478–90 (2010)MathSciNetCrossRef
67.
Zurück zum Zitat Kobayashi, H., Le Gall, F., Nishimura, H., Rotteler, M.: Perfect quantum network communication protocol based on classical network coding. In: Proceedings of 2010 IEEE International Symposium on Information Theory (ISIT), pp. 2686–2290 (2010) Kobayashi, H., Le Gall, F., Nishimura, H., Rotteler, M.: Perfect quantum network communication protocol based on classical network coding. In: Proceedings of 2010 IEEE International Symposium on Information Theory (ISIT), pp. 2686–2290 (2010)
68.
70.
Zurück zum Zitat Long, G.-L., Liu, X.-S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)ADSCrossRef Long, G.-L., Liu, X.-S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)ADSCrossRef
71.
Zurück zum Zitat Zhao, L.J., Guo, Y.M., Li-Jost, X., et al.: Quantum nonlocality can be distributed via separable states. Sci. China Phys. Mech. Astron. 61(7), 070321 (2018)ADSCrossRef Zhao, L.J., Guo, Y.M., Li-Jost, X., et al.: Quantum nonlocality can be distributed via separable states. Sci. China Phys. Mech. Astron. 61(7), 070321 (2018)ADSCrossRef
72.
Zurück zum Zitat Zhang, K.J., Zhang, L., Song, T.T., et al.: A potential application in quantum networks-deterministic quantum operation sharing schemes with Bell states. Sci. China Phys. Mech. Astron. 59(6), 660302 (2018)CrossRef Zhang, K.J., Zhang, L., Song, T.T., et al.: A potential application in quantum networks-deterministic quantum operation sharing schemes with Bell states. Sci. China Phys. Mech. Astron. 59(6), 660302 (2018)CrossRef
73.
Zurück zum Zitat Ye, T.Y., Ji, Z.X.: Multi-user quantum private comparison with scattered preparation and one-way convergent transmission of quantum states. Sci. China Phys. Mech. Astron. 60(9), 090312 (2017)ADSCrossRef Ye, T.Y., Ji, Z.X.: Multi-user quantum private comparison with scattered preparation and one-way convergent transmission of quantum states. Sci. China Phys. Mech. Astron. 60(9), 090312 (2017)ADSCrossRef
74.
Zurück zum Zitat Hu, J.Y., Yu, B., Jing, M.Y., et al.: Experimental quantum secure direct communication with single photons. Light: Sci. Appl. 5(9), e16144 (2016)CrossRef Hu, J.Y., Yu, B., Jing, M.Y., et al.: Experimental quantum secure direct communication with single photons. Light: Sci. Appl. 5(9), e16144 (2016)CrossRef
75.
Zurück zum Zitat Wang, K., Yu, X.T., Lu, S.L., et al.: Quantum wireless multihop communication based on arbitrary Bell pairs and teleportation. Phys. Rev. A 89(2), 022329 (2014)ADSCrossRef Wang, K., Yu, X.T., Lu, S.L., et al.: Quantum wireless multihop communication based on arbitrary Bell pairs and teleportation. Phys. Rev. A 89(2), 022329 (2014)ADSCrossRef
76.
Zurück zum Zitat Yu, X.T., Xu, J., Zhang, Z.C.: Distributed wireless quantum communication networks. Chin. Phys. B 22(9), 090311 (2013)ADSCrossRef Yu, X.T., Xu, J., Zhang, Z.C.: Distributed wireless quantum communication networks. Chin. Phys. B 22(9), 090311 (2013)ADSCrossRef
77.
Zurück zum Zitat Tan, Y.: Fireworks Algorithm. A Novel Swarm Intelligence Optimization Method. Springer, Berlin (2015)MATH Tan, Y.: Fireworks Algorithm. A Novel Swarm Intelligence Optimization Method. Springer, Berlin (2015)MATH
78.
Zurück zum Zitat Zheng, Y.J., Song, Q., Chen, S.Y.: Multiobjective fireworks optimization for variable-rate fertilization in oil crop production. Appl. Soft Comput. 13(11), 4253–4263 (2013)CrossRef Zheng, Y.J., Song, Q., Chen, S.Y.: Multiobjective fireworks optimization for variable-rate fertilization in oil crop production. Appl. Soft Comput. 13(11), 4253–4263 (2013)CrossRef
81.
Zurück zum Zitat Mejia, J., Rojas, K., Aleza, N., Villagracia, A.R.: Earthquake prediction through Kannan-mathematical-model analysis and Dobrovolsky-based clustering Technique. In: DLSU Research Congress 2015 (2015) Mejia, J., Rojas, K., Aleza, N., Villagracia, A.R.: Earthquake prediction through Kannan-mathematical-model analysis and Dobrovolsky-based clustering Technique. In: DLSU Research Congress 2015 (2015)
82.
Zurück zum Zitat Stamatovska, S.G.: The latest mathematical models of earthquake ground motion. In: Kanao, M. (ed.) Seismic Waves—Research and Analysis. InTech (2012) Stamatovska, S.G.: The latest mathematical models of earthquake ground motion. In: Kanao, M. (ed.) Seismic Waves—Research and Analysis. InTech (2012)
Metadaten
Titel
A Poisson Model for Entanglement Optimization in the Quantum Internet
verfasst von
Laszlo Gyongyosi
Sandor Imre
Publikationsdatum
01.07.2019
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 7/2019
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-019-2335-1

Weitere Artikel der Ausgabe 7/2019

Quantum Information Processing 7/2019 Zur Ausgabe

Neuer Inhalt