Previous Article in Journal
ST-Community Detection Methods for Spatial Transcriptomics Data Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Probabilistic Links Between Quantum Classification of Patterns of Boolean Functions and Hamming Distance

by
Theodore Andronikos
1,*,†,
Constantinos Bitsakos
2,†,
Konstantinos Nikas
2,†,
Georgios I. Goumas
2,† and
Nectarios Koziris
2,†
1
Department of Informatics, Ionian University, 7 Tsirigoti Square, 49100 Corfu, Greece
2
Computing Systems Laboratory, National Technical University of Athens, 15772 Zografou, Greece
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Stats 2026, 9(1), 5; https://doi.org/10.3390/stats9010005 (registering DOI)
Submission received: 13 October 2025 / Revised: 15 December 2025 / Accepted: 24 December 2025 / Published: 1 January 2026

Abstract

This article investigates the probabilistic relationship between quantum classification of Boolean functions and their Hamming distance. By integrating concepts from quantum computing, information theory, and combinatorics, we explore how Hamming distance serves as a metric for analyzing deviations in function classification. Our extensive experimental results confirm that the Hamming distance is a pivotal metric for validating nearest neighbors in the process of classifying random functions. One of the significant conclusions we arrived is that the successful classification probability decreases monotonically with the Hamming distance. However, key exceptions were found in specific classes, revealing intra-class heterogeneity. We have established that these deviations are not random but are systemic and predictable. Furthermore, we were able to quantify these irregularities, turning potential errors into manageable phenomena. The most important novelty of this work is the demarcation, for the first time to the best of our knowledge, of precise Hamming distance intervals for the classification probability. These intervals bound the possible values the probability can assume, and provide a new foundational tool for probabilistic assessment in quantum classification. Practitioners can now endorse classification results with high certainty or dismiss them with confidence. This framework can significantly enhance any quantum classification algorithm’s reliability and decision-making capability.

1. Introduction

Today Quantum computing is advancing rapidly, with recent breakthroughs suggesting that transformative quantum systems may soon emerge, even though current quantum computers are not yet capable of fully disrupting classical paradigms. Major industry players have made significant strides. IBM introduced the 1121-qubit Condor and high-performance R2 Heron, building on the 127-qubit Eagle [1] and 433-qubit Osprey [2,3,4]. Google demonstrated quantum computers outperforming advanced supercomputers [5,6]. Microsoft unveiled the Majorana 1 quantum chip [7,8,9] D-Wave’s quantum annealer solved a scientifically significant problem faster than classical computers [10,11]. China’s 105-qubit Zuchongzhi 3.0 processor marked a technological milestone [12,13]. Other innovations include novel design concepts [14,15], hardware advancements [16,17], and distributed quantum computing, where two processors were linked via a photonic network to function as a single system [18,19]. These developments underscore the growing feasibility of distributed quantum systems and their potential for applications like quantum classification of Boolean functions.
This study explores quantum classification of Boolean functions from a novel perspective, focusing on probabilistic correlations with Hamming distance. Quantum algorithms can perfectly classify functions with specific properties (probability 1), but our goal is to understand classification behavior when functions deviate from these properties, using Hamming distance as a metric. The Deutsch-Jozsa algorithm [20] pioneered this field, followed by extensions such as multidimensional variants [21], analyses of balanced functions [22,23], and generalizations [24,25,26]. Practical applications [27,28] and distributed versions [29,30] further advanced the field, while [31] extended Deutsch’s algorithm to binary Boolean functions. Quantum learning literature often focuses on distinguishing constant and balanced functions [32,33,34,35,36,37], but a recent study [38] targets imbalanced functions, proposing the Boolean Function Pattern Quantum Classifier (BFPQC) for classifying functions with specific behavioral patterns.
We present our exposition as a quantum game featuring Alice and Bob, using the engaging nature of games to clarify complex concepts. Quantum games, popularized since 1999 [39,40], often outperform classical strategies [41], as exemplified by the Prisoners’ Dilemma [40] and other abstract games [42]. Beyond entertainment, quantum games have addressed serious problems like cryptographic protocols [43,44,45]. Our game-based framework makes the probabilistic links between quantum classification and Hamming distance more accessible, offering a novel tool for advancing quantum algorithm design.
Contribution. This work capitalizes upon recent prior studies, such as [38,46], to investigate the usefulness of the Hamming distance as metric between Boolean functions, that can yield meaningful insights when the quantum classification algorithm encounters an unknown function outside its scope. This is a challenging benchmark that stresses the robustness and versatility limits of any quantum classification algorithm. The main strengths of this work are summarized below.
  • Our extensive experimental results robustly validate the Hamming distance as a critical and effective metric for verifying or disqualifying potential nearest neighbor candidates in the classification process.
  • As anticipated, we confirm that the classification threshold is a monotonically decreasing function of the Hamming distance. This foundational trend, however, is punctuated by the notable exceptions identified for specific classes in Section 5.4. These exceptions are not mere statistical artifacts; they provide crucial insight into intra-class heterogeneity, demonstrating how individual functions can cause significant deviations from the global behavioral pattern.
  • Crucially, our analysis reveals that even these deviations are systemic. The irregularities observed in special classes are not random but can be rigorously quantified and predicted. This transforms a potential source of error into a manageable, well-understood aspect of the classification landscape.
  • To the best of our knowledge, this work is the first to establish precise intervals for Hamming distances that bound the possible values of the classification threshold. By quantifying this relationship, we provide a foundational tool for probabilistic reasoning within quantum classification paradigms.
  • This capability is of paramount practical importance. It equips practitioners with a powerful framework to either:
    • confidently endorse a classification result with high certainty when it is likely a true nearest neighbor, or
    • decisively dismiss a result when the probability of it being a genuine nearest neighbor is vanishingly small.
    This directly enhances the reliability and efficiency of the classification system.

Organization

This article is structured in the following way. Section 1 introduces the topic and provides references to relevant literature. Section 2 contains a brief overview of key concepts and technical details. Section 3 defined the notion of perfectly classifiable Boolean function, while the following Section 4 introduces the theoretical machinery that establishes the framework for classifying functions outside of the promised class. Section 5 presents and analyzes the entire suite of experiments we have undertaken in this work. Finally, the paper wraps up with a summary and a discussion of the Nearest Basis Ket Game in Section 6.

2. Preliminary Concepts

This section introduces the notation and terminology that will be used throughout this work.
  • B denotes the binary set { 0 , 1 } .
  • A bit vector b is a sequence of n bits: b n 1 b 0 . For succinctness it is helpful to consider it as an element of B n and write b B n . The special bit vectors 0 = 0 0 and 1 = 1 1 represent vectors with all bits set to zero and one, respectively.
  • Bit vectors b B n are written in boldface to distinguish them from scalar quantities. Throughout this work, b will also be interpreted as the binary representation of an integer b.
  • Each bit vector b B n corresponds to one of the 2 n basis kets forming the computational basis of a 2 n -dimensional Hilbert space.
The Hamming distance is a metric used to quantify the difference between two strings of equal length over a fixed alphabet. In our setting, which involves bit vectors, if we are given two bit vectors a , b B n , their Hamming distance d H ( a , b ) is defined as the number of positions at which the corresponding bits differ.
Definition 1
(Hamming Distance). Let a = a n 1 a 0 and b = b n 1 b 0 be two binary strings in B n , n 1 . Their Hamming distance, denoted by d H ( a , b ) , is given by:
d H ( a , b ) i = 0 n 1 a i b i ,
where ⊕ stands for the XOR operation, since a i b i = 1 if and only if a i b i .
Oracles are a cornerstone of quantum computing, acting as black-box components in many quantum algorithms. They encapsulate a function or specific information within a quantum circuit, enabling efficient problem-solving compared to classical methods in certain cases. Oracles evaluate a function or verify conditions without revealing their internal workings, often providing insights into a function’s properties or identifying solutions. For this article, we adopt the following definition.
Definition 2
(Oracle & Unitary Transform). An oracle is a black box that implements a Boolean function f. As a black box, its internal mechanics are opaque, but it is assumed to operate correctly. The oracle enables the construction of a unitary transform U f that encodes the behavior of f according to the standard schema:
U f : | y | x | y f ( x ) | x .
In this work, we assume all oracles and their unitary transforms follow Equation (2) and are used to infer properties of a function based on its behavior.
For completeness, we define the following states |+〉 and |−〉:
| + = H | 0 = | 0 + | 1 2
| = H | 1 = | 0 | 1 2
To extract useful information from the schema in Equation (2), we set | y = | , yielding the following form:
U f : | | x ( 1 ) f ( x ) | | x .
We frequently refer to the following state, termed the perfect superposition state:
| φ = 2 n 2 x B n | x ,
which serves as the standard starting point for most quantum algorithms. It is typically generated by applying the n-fold Hadamard transform to the initial state | 0 n .
Bitwise addition modulo 2 extends the XOR operation to bit vectors, providing a natural generalization.
Definition 3
(Bitwise Addition Modulo 2). For two bit vectors x , y B n , with x = x n 1 x 0 and y = y n 1 y 0 , their bitwise sum modulo 2, denoted by x y , is defined as:
x y ( x n 1 y n 1 ) ( x 0 y 0 ) .
We use the symbol ⊕ for both single-bit addition modulo 2 and bitwise addition modulo 2, as the context clarifies the intended operation.

3. Perfectly Classifiable Boolean Functions

Quantum Boolean classification algorithms typically enable the classification of Boolean functions that satisfy specific properties with a probability of 1. In the literature, these functions are often described as satisfying a “promise,” meaning they are guaranteed to possess certain characteristics, giving rise to the term “promise problem.” For example, in the quantum classification algorithm introduced in [38], the promise is that the behavior of the classifiable Boolean functions expresses “imbalance” in the number of zero and one values they assume.
To facilitate the analysis of Boolean functions and their classification, we shall introduce the concept of pattern bit vectors, which provide a compact and computationally convenient representation of Boolean functions. This abstraction enables the use of the Hamming distance between two pattern bit vectors as a measure of the dissimilarity between their corresponding Boolean functions.
Definition 4
(Pattern Bit Vector). Let f : B n B , n 1 , be a Boolean function. We define the pattern bit vector of f as a unique bit vector that encodes the function’s output values across all possible inputs. The formal construction is as follows:
  • The pattern bit vector p f = p 2 n 1 p 1 p 0 B 2 n is defined such that p i = f ( i ) , where i B n is the binary bit vector representing the integer i, for 0 i 2 n 1 . Thus, p f systematically records the values of f ( i ) as i ranges over all possible inputs in B n , as depicted in Figure 1.
  • The negation of the pattern bit vector, denoted p f ¯ = p 2 n 1 ¯ p 1 ¯ p 0 ¯ , is the pattern bit vector corresponding to the negated function f ¯ , where f ¯ ( i ) = ¬ f ( i ) for all i B n .
Definition 5
(Function Realizing Pattern Vector). Conversely, given any pattern bit vector p = p 2 n 1 p 1 p 0 B 2 n , we define the Boolean function f p : B n B such that f p ( i ) = p i , where i B n is the binary bit vector representing the integer i, for 0 i 2 n 1 . This establishes a unique Boolean function f p associated with the pattern bit vector p , termed the realization of p .
The preceding definitions establish a bijective correspondence between Boolean functions f : B n B and their pattern bit vectors in B 2 n . In essence, a Boolean function and its pattern bit vector are two representations of the same mathematical object, akin to dual perspectives of a single entity. Knowing the behavior of a Boolean function allows the construction of its pattern bit vector, while the pattern bit vector fully encodes the information required to reconstruct the function. This duality is particularly advantageous, as it enables simple and efficient manipulation of functions via their bit vector representations.
Example 1
(Functions & Patterns). For example, consider a Boolean function f : B 2 B defined by f ( 00 ) = 0 , f ( 01 ) = 1 , f ( 10 ) = 0 , and f ( 11 ) = 1 . Its pattern bit vector is p f = p 3 p 2 p 1 p 0 = f ( 11 ) f ( 10 ) f ( 01 ) f ( 00 ) = 1010 . Conversely, given the pattern bit vector p f = 1010 , we can reconstruct the function f p with the same input-output mappings. This equivalence highlights the one-to-one correspondence between Boolean functions and their pattern bit vectors. The concept of pattern bit vector provides a succinct way to represent the behavior of more complex Boolean functions, such as function g : B 4 B , which takes the values shown in Table 1 and is described by the pattern vector p g = 0000 0001 0001 1110 .
Definition 6
(Pattern Basis). A pattern basis of rank n, n 1 , denoted by P n , is a list of 2 n pattern bit vectors ( p 0 , p 1 , , p 2 n 1 ) , each of length 2 n , that satisfy the pairwise orthogonality property:
p i p j contains 2 n 1 0 s and 2 n 1 1 s , 0 i j n 1 .
Example 2
(Pattern Bases). Let B 1 and Q 2 be the following lists of pattern vectors:
B 1 ( e 0 = 00 , e 1 = 01 ) , and
Q 2 ( g 0 = 0001 , g 1 = 0010 , g 2 = 0100 , g 3 = 1000 ) .
Every e i has length 2 1 = 2 and is orthogonal to every other e j , i j , and, similarly, every g i has length 2 2 = 4 and is orthogonal to every other g j , i j . Furthermore, B 1 consists of 2 1 = 2 pattern bit vectors and Q 2 consists of 2 2 = 4 pattern bit vectors. Therefore, by Definition 6, B 1 and Q 2 are two pattern bases of rank 1 and 2, respectively.
Definition 7
(Function Class Realizing Pattern Basis). Let P n = ( p 0 , p 1 , , p 2 n 1 ) be a pattern basis of rank n. To P n we associate the class F P n = ( f p 0 , f p 1 , , f p 2 n 1 ) of Boolean functions from B n to B such that f p i , 0 i 2 n 1 , is the function realizing the pattern bit vector p i . We say that the class of Boolean functions F P n realizes the pattern basis P n .
Definition 8
(The Pattern Basis Classification Scheme). Let P n be a pattern basis of rank n and let F P n be the class of Boolean functions realizing P n . We say that P n admits a classification scheme, if there exists an abstract quantum circuit, such as the one depicted in Figure 2, satisfying the pattern basis classification property. This property asserts that if U f p i is an oracle for the function f p i F P n that realizes the pattern bit vector p i P n , then, with probability 1, the outcome of the final measurement is the basis ket | i , i being the binary representation of the index i.
We clarify the symbolism employed in Figure 2:
  • I R denotes the quantum input register, containing n qubits.
  • O R is the single-qubit output register, initialized to |−〉.
  • U f p i designates the unitary transform that implements the oracle for the function f p i . Its exact form depends on f p i and satisfies Equation (5).
  • G is the n × n the unitary transform that acts on I R and implements the pattern basis classification scheme.
The unitary transform G is, henceforth, referred to as the classifier for P n and F P n . The outcome | i is called the classification measurement for f p i and is denoted by C M ( f p i ) . The elements of P n and F P n are termed the perfectly classifiable pattern bit vectors and Boolean functions, respectively. Functions not in F P n are termed nonclassifiable with respect to G .
We emphasize that all quantum circuits in this work adhere to the Qiskit convention [47], using little-endian qubit indexing, where the least significant qubit appears at the top and the most significant at the bottom.
Example 3
(Classifiers for B 1 and Q 2 ). For the pattern basis B 1 of Example 2, we designate by F B 1 = ( f e 0 , f e 1 ) the class realizing B 1 . The function f e 0 captures the “constancy” property in the sense that it always takes the value 0, while the function f e 1 captures the “balance” property in the sense that f e 1 ( 0 ) = 0 and f e 1 ( 1 ) = 1 . It is very easy to verify that the Hadamard transform H is the classifier for B 1 and F B 1 . For the pattern basis Q 2 of Example 2, we denote by F Q 2 = ( f g 0 , f g 1 , f g 2 , f g 3 ) the class realizing Q 2 . For completeness, we repeat the pattern bit vectors g 0 , g 1 , g 2 , g 3 , together with the truth values of the functions f g 0 , f g 1 , f g 2 , f g 3 they realize in Table 2.
The four functions f g 0 , f g 1 , f g 2 , f g 3 exhibit a common pattern: for precisely one element x B 2 their value is 1, while for the remaining three elements their value is 0. This shows that there is an imbalance between the number of inputs that take value 1 and the number of inputs that take value 0. The important thing is that this imbalance exhibits constant ratio; the number of inputs corresponding to value 1 over the total number of inputs is 1 4 . Therefore, these function capture the “constant ratio imbalance” property and, specifically, the 1 4 imbalance ratio. In [38] it was shown that C 2 , defined by the Equation (11), is the classifier for Q 2 and F Q 2 . The matrix representation of C 2 is given by Equation (12). It is quite easy to construct C 2 using standard quantum gates readily available in contemporary quantum computers, such as Hadamard, Z and controlled-Z gates, as demonstrated in Figure 3.
C 2 = ( H H ) C Z ( Z Z ) ( H H )
C 2 = 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2
We introduce a mechanism for creating new pattern bases from existing ones, by utilizing the concept of product between pattern bit vectors and pattern bases.
Definition 9
(New Pattern Bases From Old).
If p = p 2 n 1 p 1 p 0 and q = q 2 m 1 q 1 q 0 are two pattern bit vectors of length 2 n and 2 m , respectively, their product p q is pattern bit vector of length 2 n + m defined as
p q = s 2 n 1 s 1 s 0 , where s i = q if p i = 0 q ¯ if p i = 1 , 0 i 2 n 1 .
If P n = ( p 0 , p 1 , , p 2 n 1 ) and Q m = ( q 0 , q 1 , …, q 2 m 1 ) are two pattern bases of rank n and m, respectively, their product P n Q m is a pattern basis containing 2 n + m pattern bit vectors, each of length 2 n + m , which is constructed as
P n Q m ( p 0 q 0 , p 0 q 1 , , p 0 q 2 m 1 , p 1 q 0 , p 1 q 1 , , p 1 q 2 m 1 , , p 2 n 1 q 0 , p 2 n 1 q 1 , , p 2 n 1 q 2 m 1 ) .
The use of same symbol ⊙ for the product operation between two pattern bit vectors, and between two pattern bases should cause no confusion because the context always makes clear the intended operation.
Example 4
(Example of Pattern Bases Product). This example is meant to illustrate how the product between two pattern bases is constructed. For simplicity, we compute the product of Q 2 , defined by Equation (10), with itself.
Q 4 Q 2 Q 2 .
To explain the inner workings of Definition 9 works, we enumerate the elements of Q 4 in Table 3, indicating their derivation from Q 2 .
By inspecting the above Table 3, we may may immediately conclude that Q 4 satisfies the condition set in Definition 6, and is, therefore, a pattern basis of rank 4. Following Definition 7, we denote by F Q 4 the class of Boolean functions that realizes the pattern basis Q 4 .
In a symmetric manner, we present a method from constructing new function classes using the notion of external product.
Definition 10
(New Function Classes From Old).
If f p : B n B and g q : B m B are the Boolean functions realizing the pattern bit vectors p and q , respectively, their extended product f p g q : B n + m B is the Boolean function defined as
f p g q ( j + i 2 n ) = g q ( j ) if f p ( i ) = 0 g q ( j ) ¯ if f p ( i ) = 1 , 0 i 2 n 1 , 0 j 2 m 1 .
If F P n = ( f p 0 , f p 1 , , f p 2 n 1 ) and F Q m = ( f q 0 , f q 1 , , f q 2 m 1 ) are the classes of Boolean functions that realize the pattern bases P n and Q m of rank n and m, respectively, their extended product F P n F Q m is a class of 2 n + m Boolean functions, which is constructed as
F P n F Q m ( f p 0 f q 0 , f p 0 f q 1 , , f p 0 f q 2 m 1 , f p 1 f q 0 , f p 1 f q 1 , , f p 1 f q 2 m 1 , , f p 2 n 1 f q 0 , f p 2 n 1 f q 1 , , f p 2 n 1 f q 2 m 1 ) .
In view of Definitions 9 and 10, it is straightforward to establish the following fact.
Proposition 1
(Extended Function Product Realizes Pattern Vector Product). If f p : B n B and g q : B m B are the Boolean functions realizing the pattern bit vectors p and q , respectively, their extended product f p g q : B n + m B is the Boolean function that realizes the pattern bit vector p q .
Continuing this line of reasoning, we arrive at the next Theorem.
Theorem 1
(Extended Function Product Realizes Pattern Bases Product). If F P n and F Q m are the classes of Boolean functions that realize the pattern bases P n and Q m of rank n and m, respectively, their extended product F P n F Q m realized the pattern basis P n Q m .
To ensure this investigation yields meaningful and reproducible results, it must be anchored in well-defined assumptions and a robust theoretical framework. To this end, we agree that the quantum classifiers we investigate in this work, are constructed as prescribed by the next Definition 11, using as elementary building blocks the Hadamard transform H and the classifier C 2 , defined by Equation (11).
Definition 11
(Quantum Classifier). A quantum classifier G is a finite tensor product of the form
G = G m 1 G 0 ,
where each G j , 0 j m 1 , is either the Hadamard transform H or the classifier C 2 , defined by Equation (11).
Using induction on m, we may prove Theorem 2.
Theorem 2
(Classification of Products of Pattern Bases & Function Classes). Consider the quantum classifier G = G m 1 ⊗…⊗ G 0 , where each G j , 0 j m 1 , is the classifier for P j and F P j . Then G classifies the class of Boolean functions F P m 1 ★…★ F P 0 realizing the pattern basis P m 1 ⊙…⊙ P 0 .
An immediate Corollary of the Theorem 2 is the following.
Corollary 1
(Correspondence among Bases, Function Classes & Classifiers). Let P be the product pattern bit basis
P = P m 1 P 0 ,
where each P j , 0 j m 1 , is either the basis B 1 or the basis Q 2 , defined by Equations (9) and (10), respectively.
The class F P of Boolean functions that realizes P is the extended product
F P = F P m 1 F P 0 ,
where each F P j , 0 j m 1 , is F B 1 if P j = B 1 or F Q 2 if P j = Q 2 .
The quantum classifier G that classifies F P is the tensor product
G = G m 1 G 0 ,
where each G j , 0 j m 1 , is H if P j = B 1 or C 2 if P j = Q 2 .
Corollary 1 makes explicitly clear the one-to-one correspondence among pattern bases product, function classes extended product, and quantum classifiers tensor product.
Example 5
(Perfectly Classifiable Function in F Q 4 ). Consider the pattern bit vector r 3 = 1000 1000 1000 0111 Q 4 , listed in Table 3 of Example 4. As shown there, r 3 is the product g 0 g 3 of the pattern vectors g 0 and g 3 , where g 0 , g 3 Q 2 . By Theorem 1, the Boolean function f r 3 that realizes pattern bit vector r 3 is extended product f r 3 = f g 0 f g 3 , where f g 0 and f g 3 are the functions realizing g 0 and g 3 , respectively. From Example 3 we know that C 2 , defined by Equation (11), is the classifier for the class of Boolean functions F Q 2 that realizes the pattern basis Q 2 . According to Theorem 2, C 2 C 2 is the classifier for the class F Q 2 F Q 2 that realizes the pattern basis Q 2 Q 2 . In this scenario, the concrete implementation of the Pattern Basis Classification Scheme outlined in Definition 8 in Qiskit [47] is shown in Figure 4 below, where the oracle encodes f r 3 .
Before measurement, the state of the system is just | 0011 . Hence, measuring the quantum circuit depicted in Figure 4 will output the bit vector 0011 with probability 1. This is corroborated by the simulating this circuit in Qiskit for 2048 runs, as shown in Figure 5). The binary vector 0011 reveals the index of the function hidden in the oracle, namely f r 3 . This provides a conclusive demonstration of the Pattern Basis Classification Scheme.
In general, if a quantum classifier G = G m 1 ⊗…⊗ G 1 G 0 classifies the class of Boolean functions F P n , then the quantum circuit visualized in Figure 6, where the oracle U f encodes a function f F P n , will conclusively, i.e., with probability 1, classify f. To enhance clarity, we explain the notation used in Figure 6.
  • I R is the quantum input register that contains n qubits and starts its operation at state | 0 .
  • O R is the single-qubit output register initialized to |−〉.
  • H is the Hadamard transform.
  • U f is the unitary transform corresponding to the oracle for the unknown function f. The latter is promised to be an element of F P n .
  • G j , 0 j m 1 , are the fundamental building blocks of G = G m 1 ⊗…⊗ G 1 G 0 classifying the class of Boolean functions F P n .
We now emphasize an important point regarding the behavior of classification algorithms on general inputs. No classification algorithm is expected to produce correct results—and is unlikely to do so—for Boolean functions that fall outside the class of perfectly classifiable functions. Thus, regarding the quantum circuit of Figure 6, if the oracle realizes a function outside F P n , the final measurement, may not reveal the unknown function. In the rest of this paper, we investigate whether, and under what assumptions, it is possible to obtain some useful information when the input function is close to the class F P n .

4. What About Nonclassifiable Boolean Functions?

In view of the last remark of the previous Section, we lay down the objectives of this study. Let us assume that we have fixed the class of Boolean functions F P n that realizes the pattern basis P n , and that G is the classifier for F P n and P n . In the rest of this paper we investigate the following questions.
  • When the input function h is nonclassifiable by G , i.e., h F P n , is it possible, and under what conditions, to obtain some useful information about h?
  • By useful information we mean to learn as much as possible about the behavior of h. Within the current framework, this translates to knowing (one of) the f F P n “nearest” to h.
  • Thus, to quantify the “nearness” between two Boolean functions, a notion of distance is required. In this work, we adopt one of the most general distance metric, the Hamming distance.
  • Finally, we aim to answer the question of how useful is the Hamming distance, as defined in Definition 12, for classification purposes.
Undoubtedly, any attempt to arrive at quantitative conclusions, presupposes a metric to capture the notion of “closeness” or distance between two Boolean functions. As mentioned above, in this study we employ one of the most conventional and most general distance metrics, namely the Hamming distance (see [48,49]), and analyze its benefits and drawbacks. In [46] a totally different concept of distance, based on left and right clusters, was used. The classification game investigated there, with the distance restriction forcing the unknown function to be either in the left or right cluster of a perfectly classifiable function, enabled Alice to surely win. The Nearest Basis Ket Game we study in this work is totally different because it deals with the utmost general situation where Bob can pick any Boolean function with no restrictions whatsoever.
Definition 12
(Hamming Distance of Boolean Functions). Let f and h be two Boolean functions from B n B , and let p f and p h be their corresponding pattern bit vectors. We define the Hamming distance between f and h, denoted d H ( f , h ) , as follows:
d H ( f , h ) d H ( p f , p h ) .
Definition 13
(Neighborhoods of Boolean Functions). Let f be a Boolean function from B n B . The r-neighborhood of f, denoted by N r ( f ) , r 0 , is the collection of all Boolean functions h from B n B such that d H ( f , h ) r .
Definition 14
(Hamming Distance from Function Class). Given the class of Boolean functions F P n that realizes the pattern basis P n , and an arbitrary Boolean function h : B n B , n 1 , the Hamming distance of h from F P n , denoted by d H ( F P n , h ) , is defined as
d H ( F P n , h ) = min { d : d = d H ( f , h ) , f F P n } .
Definition 15
(Nearest Neighbors in Function Class). Given the class of Boolean functions F P n that realizes the pattern basis P n , and an arbitrary Boolean function h : B n B , n 1 , the nearest neighbors of h in F P n , denoted by N N ( F P n , h ) , are the Boolean functions f F P n such that d H ( f , h ) = d H ( F P n , h ) .
Definition 16
(Nearest Basis Kets). Let G be a quantum classifier for the class of Boolean functions F P n realizing the pattern basis P n . Given an arbitrary Boolean function h : B n B , not in F P n , let N N ( F P n , h ) = { f p i 1 , f p i 2 , , f p i r } be the collection of nearest neighbors of h in F P n .
The nearest basis kets of h in F P n , denoted by N K ( F P n , h ) , are the basis kets { | i 1 , | i 2 , , | i r } , where | i 1 , | i 2 , , | i r are the classification measurements for f p i 1 , f p i 2 , , f p i r according to the Pattern Basis Classification Scheme outlined in Definition 8.
The classification threshold ϑ of h is the probability that C M ( h ) belongs to N K ( F P n , h ) .
Example 6
(The Hamming Distance of g from F Q 4 ). Let us consider the pattern bit vector r 0 = 0001 0001 0001 1110 Q 4 , listed in Table 3 of Example 4, and the pattern vector p g = 0000 0001 0001 1110 encountered in Example 1. The values of the corresponding Boolean functions f r 0 and g are contained in Table 4. A comparison between their corresponding values shows that they only differ in the values the assume at input x = 1100 , where f r 0 ( x ) = 1 whereas g ( x ) = 0 . According to Definition 12, d H ( f r 0 , g ) = 1 . By systematically going over all other functions of the class F Q 4 , we immediately verify that their distance from g is > 1 . Therefore, N N ( F Q 4 , g ) = { f r 0 } . Lastly, taking into account the Pattern Basis Classification Scheme outlined in Definition 8 and Definition 16, we conclude that the nearest basis ket of g in F Q 4 is |0000〉, or, in other words, N K ( F Q 4 , h ) = { | 0000 } .
To make this investigation more intuitive and engaging, we conceptualize the classification process as a strategic interaction, formalized as a game between two players, Alice and Bob, whom we cast as our talented protagonists. This game, termed the Nearest Basis Ket Game, encapsulates the challenge of identifying one of the “closest” functions in F P n to an unknown function h. The rules of the game are as follows:
(R1)
Alice and Bob fix a classifier G and the corresponding class of Boolean functions F P that realizes the pattern basis P.
(R2)
Bob picks an arbitrary Boolean function h that doesn’t belong to F P and reveals to Alice only the minimum Hamming distance of h from F P .
(R3)
Bob implements the abstract classification circuit of Figure 2 using the oracle for h, and announces the classification measurement C M ( h ) to Alice.
(R4)
The challenge posed to Alice is to decide whether C M ( h ) belongs to N K ( F P , h ) .
(R5)
Alice wins the game if she gives the correct answer, either yes or no, to the above question, otherwise Bob is declared the winner.
As we show in the rest of this paper, when the Hamming distance lies within certain intervals, the question whether C M ( h ) N K ( F P n , h ) can be answered affirmatively or negatively with high probability.

5. What Do Experiments Show?

5.1. Experimental Methodology

To evaluate the usefulness of the Hamming distance as a meaningful metric to measure “closeness” between Boolean functions, we have conducted a series of experiments using Qiskit [47]. This Section is devoted to the presentation and analysis of these experiments. Our experimental methodology was meticulously designed to uphold the core principles of
  • reproducibility, and
  • interpretability,
ensuring that all procedures, parameters, and outcomes could be reliably replicated by independent researchers while providing clear, transparent explanations for the observed phenomena. To achieve this, we documented every step in detail, alongside comprehensive logging of intermediate results and computational traces. The experiments and their subsequent analysis and interpretation were executed within a period of several months, during which the quantum computing landscape and associated software tools continued to evolve. Throughout the experimental runs, different editions of the Qiskit platform [47] were employed to accommodate updates and improvements in the framework: the initial Qiskit version deployed at the commencement of the experimental phase was 1.4.2, while the experiments were ultimately concluded using the more advanced version 2.1.2. It is worth noting that at the time of writing this manuscript, the most recent stable Qiskit version available is 2.2.3, and the latest release candidate is Qiskit 2.3.0rc1, reflecting the continued rapid development in this field.
We clarify the experimental setup used throughput this series of experiments. For each experiment we fix a quantum classifier G = G m 1 G 0 , where each factor of the tensor product is one of the elementary classifiers H or C 2 . For the chosen G , the class of perfectly classifiable Boolean functions F P and the pattern basis P realized by this class are unambiguously specified, as prescribed by Theorem 2 and Corollary 1. The Pattern Basis Classification Scheme is achieved via the appropriate implementation of the abstract quantum circuit depicted in Figure 6. Our experiments shed light on the following question.
Experimental Investigation
Assuming that the oracle in Figure 6 encodes an unknown random function h, what is the classification threshold of h, that is what is probability that the classification measurement C M ( h ) belongs to N K ( F P , h ) , as a function of the Hamming distance d H ( F P , h ) of h from F P ?
Given the inherent computational constraints—such as finite memory capacity and processing time—we adopted a pragmatic and scalable approach that balanced thoroughness with feasibility. For smaller-scale analyses, we performed an exhaustive enumeration of all possible Boolean functions associated with pattern bit vectors of length up to 16 bits. This comprehensive sweep covered the full combinatorial space of all 2 16 = 65,536 functions from B 4 B , which is quite manageable on modern hardware, allowing us to derive definitive insights without sampling biases.
For larger pattern bit vectors (lengths of 32 bits and beyond), exhaustive enumeration becomes prohibitively expensive due to the exponential growth in complexity. For instance, we have 2 32 = 4,294,967,296 Boolean functions B 5 B . Therefore, we shifted to a statistically robust sampling strategy. Specifically, we randomly generated a diverse set of pattern bit vectors using uniform distribution, ensuring broad coverage of the search space. For each generated vector, we systematically constructed the corresponding Boolean function and classified it under our experimental framework. This random sampling not only mitigated the risks of exhaustive computation but also enabled us to identify representative trends and generalize findings to the broader landscape of Hamming distance usability.

5.2. The Case of Exhaustively Enumerating All Boolean Functions

This case documents the behavior of all pattern bit vectors of length 8 and 16, which were fully enumerated and tested. In particular, using the elementary pattern bases B 1 and Q 2 , defined by Equations (9) and (10) respectively, we constructed all possible products of pattern bases that consist of bit vectors of length 8 and 16. As explained in detail in Example 3, the function classes F B 1 and F Q 2 realize B 1 and Q 2 . Thus, by invoking Corollary 1 that makes explicit the one-to-one exact correspondence among the products of bases, function classes, and quantum classifiers, we obtain the following results.
We begin the presentation of the experimental results with the pattern bases that contain bit vectors of length 8. The experimental results for the three classes of Boolean functions contained in Table 5 are virtually identical and this conclusion is summarized in the following text box. Hence, in Figure 7 we have chosen to display only the results for the class F B 1 F Q 2 .
Conclusion for the pattern bit vectors of length 8
The probability distribution of the classification threshold is virtually identical for the function classes F B 1 F B 1 F B 1 , F B 1 F Q 2 , and F Q 2 F B 1 .
This particular scenario includes the class of Boolean functions F B 1 F Q 2 that realizes the pattern basis B 1 Q 2 . In the histogram of Figure 7 the red bar depicts the classification threshold of a random h as a function of the Hamming distance d H ( F B 1 F Q 2 , h ) of h from F B 1 F Q 2 . The green bar shows the number of Boolean Functions for which the Hamming distance from F B 1 F Q 2 takes a specific value. As we have emphasized, the results are identical for all three function classes and are summarized in Table 6.
We continue with the experimental results for the pattern bases with bit vectors of length 16 contained in Table 7. Although, for bit vectors of length 8 the results are virtually identical, this time we observe a very interesting variation. This confirms our intuition that the characteristic traits of the specific pattern vectors comprising the basis affect in a most interesting way the probability distribution. The conclusion for this scenario is summarized in the next text box.
Figure 8 displays the results for the class F B 1 F Q 2 F B 1 , as representative of the first category above, while Figure 9 displays the results for the class F Q 2 F Q 2 . According to our convention, in all Figures the red bars display probability values, whereas the green bars show the number of Boolean functions per distance. The results are contained in Table 8. The class F Q 2 F Q 2 exhibits a distinctly different classification threshold compared to the other four classes F B 1 F B 1 F B 1 , F B 1 F Q 2 , and F Q 2 F B 1 because of the nonzero values at distances 9 and 10. It is worth noting that for distance 10, in particular, the classification threshold becomes 1. The reason for this behavior will be explained in Section 5.4.
Conclusion for the pattern bit vectors of length  16
  • The probability distribution of the classification threshold ϑ is virtually identical for the function classes F B 1 F B 1 F B 1 F B 1 , F B 1 F B 1 F Q 2 , F B 1 F Q 2 F B 1 , and F Q 2 F B 1 F B 1 and closely mirrors the shape encountered in the case of bit vectors of length 8.
  • For the class F Q 2 F Q 2 the probability distribution of the classification threshold ϑ exhibits a different probability distribution with nonzero probability values for Hamming distances 9 and 10.

5.3. The Case of Sampling Boolean Functions

This case investigates the behavior of sampled pattern bit vectors of length 32 and 64. For such bit vectors, exhaustive enumeration becomes inefficient and impractical due to the exponential growth in complexity. Thus, we employed sampling by randomly generating a set of pattern bit vectors. For each generated vector, we constructed the corresponding Boolean function and oracle in order to classify via the Pattern Basis Classification Scheme outlined in Definition 8. This random sampling approach allowed us to generalize our findings regarding Hamming distance usability. As before, the elementary pattern bases B 1 and Q 2 , defined by Equations (9) and (10) respectively, are the fundamental building blocks for the construction of all possible products of pattern bases that comprise bit vectors of length 32 and 64. Corollary 1 elucidates the one-to-one exact correspondence among the products of bases, function classes, and quantum classifiers, leading to the following results shown in Table 9.
The experimental results corroborate that all the above function classes have a virtually identical probability distribution of the classification threshold. Hence, this series of experiments confirms the pattern already observed, i.e., that the classification threshold is a decreasing function of the Hamming distance.
Conclusion for the pattern bit vectors of length  32
The probability distribution for the classification threshold is the same for all the function classes F B 1 F B 1 F B 1 F B 1 F B 1 , F B 1 F B 1 F B 1 F Q 2 , F B 1 F B 1 F Q 2 F B 1 , F B 1 F Q 2 F B 1 F B 1 , F Q 2 F B 1 F B 1 F B 1 , F B 1 F Q 2 F Q 2 , F Q 2 F B 1 F Q 2 , and F Q 2 F Q 2 F B 1 .
For this reason we illustrate only the results for the class F Q 2 F Q 2 F B 1 in Figure 10. For enhanced readability, these results are repeated in tabular form in Table 10.
The fact that the classification of random functions with respect to their nearest neighbors in all the above function classes follows the same pattern, is a strong indication of the robustness of our results. A small deviation from this dominating behavior is observed when the function class is F Q 2 F Q 2 . To test whether this is a statistical artifact or something inherent in classes that are obtained as the external product of the same factor F Q 2 , we have experimented with the class F Q 2 F Q 2 F Q 2 , as shown in Table 11. The results for the class F Q 2 F Q 2 F Q 2 are presented in Figure 11. The conclusion we have arrived at is given below. For clarity, the results are repeated in tabular form in Table 12.
Conclusion for the pattern bit vectors of length  64
For the most part, the probability distribution of the classification threshold of a random function h with respect to the class F Q 2 F Q 2 F Q 2 is similar to that of other class, i.e., a decreasing function of the Hamming distance. However, there is a noteworthy difference at Hamming distance 36, where, instead of being 0, it spikes to 1.
In the coming Section, we interpret the results and provide an explanation regarding the probability spike observed when the product function class is constructed entirely by factors of the class F Q 2 .

5.4. Interpretation of the Experimental Results

By synthesizing the comprehensive experimental outcomes, a definitive pattern emerges: within an arbitrary function class, the classification threshold manifests as a monotonically decreasing function with respect to the Hamming distance. This trend, while robust across diverse scenarios, is complicated by predictable anomalies in certain specialized configurations, allowing us to articulate a foundational “rule” tempered by precisely delineated exceptions. To formalize this insight, we introduce the parameter n, representing the arity of the Boolean functions mapping B n B within a given class F P , alongside the vector length 2 n of the pattern bit vectors that constitute the associated pattern basis P. This framework enables the specification of subintervals that systematically partition the full spectrum from 0 to 2 n into three regions, as illustrated in Table 13. Notably, when the function class is an extended product of the form F Q 2 m , for some m 1 , a pronounced irregularity arises in the third region, manifesting as a sharp peak where the probability surges to precisely 1—a departure that underscores the nuanced interplay between structural properties and probabilistic outcomes.
This distinctive anomaly can be traced to an intrinsic hallmark of the functions populating F Q 2 m , m 1 . As established in [38], every such function maintains an identical proportion of 1 values across the 2 n possible outputs, or equivalently, exhibits a fixed count of both 0 and 1 values. Let ϱ denote the count of 0 values; a straightforward computation reveals that for F Q 2 , F Q 2 2 , and F Q 2 3 , this quantity assumes values of 3, 10, and 36, respectively. The general formula for this ratio in these special classes is derived in [38]. By stark contrast, the remaining classes investigated in this study encompass functions with heterogeneous distributions of 0 s and 1 s, introducing variability that dilutes such uniform behaviors. Therefore, for the family of classes F Q 2 m , m 1 , the constant Boolean function h : B n B defined by h ( x ) = 1 for all x B n maintains a uniform Hamming distance of ϱ relative to all basis kets. This invariance ensures that, irrespective of the specific classification measurement obtained, h will invariably reside among the nearest basis kets, thereby securing a classification probability of exactly 1—an outcome that not only validates the metric’s sensitivity but also highlights its potential for deterministic predictions in balanced function spaces.
At its core, this body of results affirms that the classification threshold serves as a reliably decreasing function of the Hamming distance, albeit with the caveat of this singular irregularity in special classes. Moreover, the versatile parameter n, which encapsulates the scale and complexity of the function class, proves instrumental in demarcating three fundamental subintervals along the Hamming distance axis. The first interval, encompassing distances from 1 through 2 n 8 inclusive, is characterized by a classification threshold that remains firmly above 0.50 , signaling robust confidence in nearest-neighbor predictions. Transitioning to the second interval, from 2 n 8 + 1 to 2 n 2 1 , the threshold, while persistently positive, undergoes a steady attenuation, asymptotically approaching 0 as distances increase, reflecting a progressive erosion of classification certainty. Finally, the third interval, stretching from 2 n 2 to 2 n , reveals a uniform threshold of 0, indicative of non-resemblance. Armed with knowledge of the subinterval containing the Hamming distance of an unknown function h, we can prognosticate the classification verdict with appreciable precision: alignment with a nearest basis ket portends the identification of a class member most akin to h, what amounts to a “positive classification”, or, conversely, a “negative classification” that confidently precludes membership, all underpinned by elevated probabilistic guarantees. This duality not only substantiates the Hamming distance’s efficacy as a versatile metric but also elevates its role in enabling both affirmative results and refutations, thereby broadening its applicability in a classification framework.
The ensuing Table 13 encapsulates these findings in a concise overview, juxtaposing the dynamics for a generic class F P against the idiosyncrasies of the special F Q 2 m , m 1 , to facilitate a comparative analysis.

6. Discussion and Conclusions

Quantum classification represents a vibrant and rapidly evolving area of research, especially when considered alongside the groundbreaking developments in quantum machine learning and quantum artificial intelligence. Quantum classification algorithms demonstrate exceptional proficiency in categorizing functions that fall within their intended “promised” class, that is the specific set of functions for which they have been engineered. The literature is replete with sophisticated investigations into the classification of Boolean functions exhibiting particular attributes, such as those adhering to well-defined structural or computational properties that place them into distinct categories. However, to the best of our knowledge, there remains a notable scarcity of research exploring the insights that might emerge when the input Boolean function deviates from these expected categories, failing to align with the algorithm’s presupposed framework.
This paper introduces a novel investigative lens, illustrating that substantial and meaningful insights can nonetheless be extracted under suitably engineered conditions. We posit that deriving useful information from functions lying beyond an algorithm’s core competency holds profound practical value, as it bridges the gap between idealized theoretical models and the messy realities of diverse computational inputs. In particular, we contend that, for a quantum algorithm tailored to conclusively classify functions within a designated class, denoted as F, and confronted with an unknown function h that resides outside F, the most desirable resolution would involve identifying one of the nearest neighbors of h within F. Such a neighbor would embody the function in F that most faithfully mirrors the behavioral pattern of h, thereby offering a suitable approximation for understanding and approximating the outlier.
To advance this line of inquiry, it becomes imperative to establish a rigorous metric that encapsulates the intuitive concept of “nearness” among Boolean functions, enabling quantitative assessments of similarity. The Hamming distance stands out as one of the most established and versatile measures for this purpose, owing to its simplicity, computational efficiency, and interpretability in terms of bit-level discrepancies. That said, alternative distance metrics between Boolean functions are conceivable and could enrich the analytical toolkit—for instance, the innovative “cluster” concept delineated in [46]. The present work undertakes a comprehensive examination of the Hamming distance’s efficacy as a proximity metric, specifically in the context of mapping unknown Boolean functions to their nearest counterparts within the set of perfectly classifiable functions. Through this focused approach, we probe not only the metric’s robustness but also its implications for enhancing the adaptability and diagnostic power of quantum classifiers. In the ensuing text box, we encapsulate our principal discoveries and critically appraise their broader ramifications for the field.
Synopsis and evaluation of the derived results
  • The comprehensive suite of experimental results unequivocally validates the utility of the Hamming distance as a pivotal metric, adeptly suited for the critical task of affirming or disqualifying prospective nearest neighbor candidates in the classification process.
  • As anticipated, our investigations have solidified the intuitive yet fundamental observation that the classification threshold is a monotonically decreasing function with respect to the Hamming distance, subject to the intriguing exceptions encountered in the specialized classes analyzed in Section 5.4. The importance of this revelation cannot be overstated; it compellingly illustrates how individual functions within a given class can precipitate meaningful divergences from the prevailing pattern, thereby enriching our understanding of intra-class heterogeneity and its implications for algorithmic robustness.
  • Moreover, even amidst these special scenarios where the class deviates from conventional behavior, our analysis unveils the pivotal revelation that such irregularities are not unpredictable but rather amenable to rigorous quantification and foresightful prediction, thereby transforming potential pitfalls into manageable phenomena.
  • To the best of our knowledge, this work constitutes the first contribution that delineates precise intervals for Hamming distances, thereby quantifying and demarcating the spectrum of values that the classification threshold may assume, offering a foundational tool for probabilistic assessments in quantum classification paradigms.
  • This fact is of cardinal significance, as it equips practitioners with a sophisticated framework: one that facilitates the endorsement of a classification result with amplified certainty when it plausibly unveils one of the nearest neighbors to the unknown input function, or conversely, leads to the resolute dismissal of such a result when probabilistic suggests that its alignment with a true nearest neighbor to be inconsequentially remote.

The Nearest Basis Ket Game

Drawing upon the aforementioned conclusions, we are now well-equipped to furnish an evidence-based response to a logical question: Does the Nearest Basis Ket Game, as delineated in Section 4, possess substantive merit within the broader landscape of quantum classification paradigms? We assert with unwavering conviction an affirmative response to this question. A perusal of Table 13 illuminates the game’s intrinsic value, revealing nuanced strategic dynamics between the protagonists, Alice and Bob. Specifically, should Bob, perhaps through inadvertence or suboptimal deliberation, select an unknown function h that exhibits a modest Hamming distance from the target class, spanning from 1 to 2 n 8 , Alice is positioned to issue a resolute “Yes” verdict with substantial confidence. In such scenarios, the probabilistic tilt heavily favors Alice, affording her a greater likelihood of prevailing in the contest.
In a mirror-image fashion, provided the game unfolds outside the purview of a special class, an analogous advantage accrues to Alice when Bob’s selection of h yields a substantial Hamming distance from the class, falling from 2 n 2 to 2 n . Here, Alice’s assured proclamation of “No” aligns seamlessly with the empirical probabilities, propelling her toward victory with near-certainty. This bilateral symmetry not only highlights the game’s robustness as a diagnostic instrument for proximity assessments but also accentuates its pedagogical utility in elucidating the thresholds where quantum classifiers transition from reliable affirmation to confident refutation. Furthermore, for a special class of the form F Q 2 m , with m 1 , a rational Bob, ever mindful of game-theoretic imperatives, would assiduously eschew any h whose distance manifests as ϱ , for such a selection would certainly lead Alice to surely win, devoid of any probabilistic ambiguity.
Yet, this revelation does not render Bob impotent; on the contrary, it unveils a deliberate and efficacious stratagem whereby he can increase his odds of success to approximate 0.50 . This entails a methodical selection of the secret function h such that its Hamming distance from the class aligns precisely, or in intimate proximity, to 2 n 8 , the turning point at which the success probability for Alice declines, dipping below the 0.50 threshold. By wielding this insight judiciously, Bob transforms the Nearest Basis Ket Game into an equitable analogue of the venerable coin toss, the iconic classical game of fairness and impartiality. This infuses quantum adversarial interactions with a veneer of fairness and strategic depth that could inspire extensions to more intricate multi-player or adaptive variants in quantum game theory.

Author Contributions

Conceptualization, T.A., C.B. and K.N.; methodology, T.A., G.I.G. and N.K.; validation, C.B., K.N. and G.I.G.; formal analysis, T.A., G.I.G. and N.K.; investigation, C.B. and K.N.; writing original draft preparation, T.A., C.B. and G.I.G.; writing review and editing, T.A. and N.K.; visualization, C.B. and K.N.; supervision, T.A., G.I.G. and N.K.; project administration, T.A. and N.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chow, J.; Dial, O.; Gambetta, J. IBM Quantum Breaks the 100-Qubit Processor Barrier. 2021. Available online: https://www.ibm.com/quantum/blog/127-qubit-quantum-processor-eagle/ (accessed on 7 January 2025).
  2. IBM. IBM Unveils 400 Qubit-Plus Quantum Processor. 2022. Available online: https://newsroom.ibm.com/2022-11-09-IBM-Unveils-400-Qubit-Plus-Quantum-Processor-and-Next-Generation-IBM-Quantum-System-Two/ (accessed on 7 January 2025).
  3. Gambetta, J. The Hardware and Software for the Era of Quantum Utility Is Here. 2023. Available online: https://www.ibm.com/quantum/blog/quantum-roadmap-2033/ (accessed on 7 January 2025).
  4. IBM. IBM Launches Its Most Advanced Quantum Computers, Fueling New Scientific Value and Progress Towards Quantum Advantage. 2024. Available online: https://newsroom.ibm.com/2024-11-13-ibm-launches-its-most-advanced-quantum-computers,-fueling-new-scientific-value-and-progress-towards-quantum-advantage/ (accessed on 7 January 2025).
  5. Neven, H. Meet Willow, Our State-of-the-Art Quantum Chip. 2024. Available online: https://blog.google/technology/research/google-willow-quantum-chip/ (accessed on 7 January 2025).
  6. Garisto, D. Google Uncovers How Quantum Computers Can Beat Today’s Best Supercomputers. 2024. Available online: https://www.nature.com/articles/d41586-024-03288-3/ (accessed on 7 January 2025).
  7. Aasen, D.; Aghaee, M.; Alam, Z.; Andrzejczuk, M.; Antipov, A.; Astafev, M.; Avilovas, L.; Barzegar, A.; Bauer, B.; Becker, J.; et al. Roadmap to fault tolerant quantum computation using topological qubit arrays. arXiv 2025, arXiv:2502.12252. [Google Scholar] [CrossRef]
  8. Aghaee, M.; Alcaraz Ramirez, A.; Alam, Z.; Ali, R.; Andrzejczuk, M.; Antipov, A.; Astafev, M.; Barzegar, A.; Bauer, B.; Becker, J.; et al. Interferometric single-shot parity measurement in InAs–Al hybrid devices. Nature 2025, 638, 651–655. [Google Scholar] [CrossRef]
  9. Microsoft. Microsoft’s Majorana 1 Chip Carves New Path for Quantum Computing. 2025. Available online: https://news.microsoft.com/source/features/innovation/microsofts-majorana-1-chip-carves-new-path-for-quantum-computing/ (accessed on 21 February 2025).
  10. King, A.D.; Nocera, A.; Rams, M.M.; Dziarmaga, J.; Wiersema, R.; Bernoudy, W.; Raymond, J.; Kaushal, N.; Heinsdorf, N.; Harris, R.; et al. Beyond-classical computation in quantum simulation. Science 2025, 388, 199–204. [Google Scholar] [CrossRef]
  11. Davide, C. Fresh ’Quantum Advantage’ Claim Made by Computing Firm D-Wave. 2025. Available online: https://www.nature.com/articles/d41586-025-00765-1/ (accessed on 17 March 2025).
  12. Gao, D.; Fan, D.; Zha, C.; Bei, J.; Cai, G.; Cai, J.; Cao, S.; Chen, F.; Chen, J.; Chen, K.; et al. Establishing a New Benchmark in Quantum Computational Advantage with 105-qubit Zuchongzhi 3.0 Processor. Phys. Rev. Lett. 2025, 134, 090601. [Google Scholar] [CrossRef] [PubMed]
  13. Sanders, B.C. Superconducting Quantum Computing Beyond 100 Qubits. 2025. Available online: https://physics.aps.org/articles/v18/45/ (accessed on 17 March 2025).
  14. Cacciapuoti, A.S.; Illiano, J.; Viscardi, M.; Caleffi, M. Multipartite Entanglement Distribution in the Quantum Internet: Knowing When to Stop! IEEE Trans. Netw. Serv. Manag. 2024, 21, 6041–6058. [Google Scholar] [CrossRef]
  15. Illiano, J.; Caleffi, M.; Viscardi, M.; Cacciapuoti, A.S. Quantum MAC: Genuine Entanglement Access Control via Many-Body Dicke States. IEEE Trans. Commun. 2024, 72, 2090–2105. [Google Scholar] [CrossRef]
  16. Photonic. Photonic Demonstrates Distributed Entanglement Between Modules, Marking Significant Milestone Toward Scalable Quantum Computing and Networking. 2024. Available online: https://photonic.com/news/photonic-demonstrates-distributed-entanglement-between-modules/ (accessed on 7 January 2025).
  17. Nu Quantum. Announcing the Qubit-Photon Interface (QPI): Towards Unlocking Modular and Scalable Distributed Quantum Computing. 2024. Available online: https://www.nu-quantum.com/announcing-the-qubit-photon-interface-(qpi)-towards-unlocking-modular-and-scalable-distributed-quantum-computing (accessed on 7 January 2025).
  18. Main, D.; Drmota, P.; Nadlinger, D.P.; Ainley, E.M.; Agrawal, A.; Nichol, B.C.; Srinivas, R.; Araneda, G.; Lucas, D.M. Distributed quantum computing across an optical network link. Nature 2025, 638, 383–388. [Google Scholar] [CrossRef] [PubMed]
  19. Oxford News. First Distributed Quantum Algorithm Brings Quantum Supercomputers Closer. 2025. Available online: https://www.ox.ac.uk/news/2025-02-06-first-distributed-quantum-algorithm-brings-quantum-supercomputers-closer/ (accessed on 7 February 2025).
  20. Deutsch, D.; Jozsa, R. Rapid solution of problems by quantum computation. Proc. R. Soc. Lond. Ser. Math. Phys. Sci. 1992, 439, 553–558. [Google Scholar] [CrossRef]
  21. Cleve, R.; Ekert, A.; Macchiavello, C.; Mosca, M. Quantum algorithms revisited. Proc. R. Soc. Lond. Ser. Math. Phys. Eng. Sci. 1998, 454, 339–354. [Google Scholar] [CrossRef]
  22. Chi, D.P.; Kim, J.; Lee, S. Initialization-free generalized Deutsch-Jozsa algorithm. J. Phys. Math. Gen. 2001, 34, 5251. [Google Scholar] [CrossRef]
  23. Holmes, R.R.; Texier, F. A Generalization of the Deutsch-Jozsa Quantum Algorithm. Far East J. Math. Sci. 2003, 9, 319–326. [Google Scholar]
  24. Ballhysa, E.; Say, A.C.C. Generating Equiprobable Superpositions of Arbitrary Sets for a New Generalization of the Deutsch-Jozsa Algorithm. In Computer and Information Sciences—ISCIS 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 966–975. [Google Scholar] [CrossRef]
  25. Qiu, D.; Zheng, S. Generalized Deutsch-Jozsa problem and the optimal quantum algorithm. Phys. Rev. A 2018, 97, 062331. [Google Scholar] [CrossRef]
  26. Ossorio-Castillo, J.; Pastor–Díaz, U.; Tornero, J. A generalisation of the Phase Kick-Back. Quantum Inf. Process. 2023, 22, 143. [Google Scholar] [CrossRef]
  27. Qiu, D.; Zheng, S. Revisiting Deutsch-Jozsa algorithm. Inf. Comput. 2020, 275, 104605. [Google Scholar] [CrossRef]
  28. Zhengwei, X.; Daowen, Q.; Guangya, C.; Gruska, J.; Mateus, P. Testing Boolean Functions Properties. Fundam. Informaticae 2021, 182, 321–344. [Google Scholar] [CrossRef]
  29. Tănăsescu, A.; Mina, M.Z.; Popescu, P.G. Non-local quantum functions and the distributed Deutsch-Jozsa algorithm. Phys. Lett. A 2019, 383, 2168–2171. [Google Scholar] [CrossRef]
  30. Li, H.; Qiu, D.; Luo, L. Distributed Generalized Deutsch-Jozsa Algorithm. In Computing and Combinatorics; Springer Nature: Singapore, 2025; pp. 214–225. [Google Scholar] [CrossRef]
  31. Nagata, K.; Nakamura, T. Generalization of Deutsch’s Algorithm. Int. J. Theor. Phys. 2020, 59, 2557–2561. [Google Scholar] [CrossRef]
  32. Bshouty, N.H.; Jackson, J.C. Learning DNF over the Uniform Distribution Using a Quantum Example Oracle. SIAM J. Comput. 1998, 28, 1136–1153. [Google Scholar] [CrossRef]
  33. Farhi, E.; Goldstone, J.; Gutmann, S.; Sipser, M. Bound on the number of functions that can be distinguished with k quantum queries. Phys. Rev. A 1999, 60, 4331–4333. [Google Scholar] [CrossRef]
  34. Servedio, R.A.; Gortler, S.J. Equivalences and Separations Between Quantum and Classical Learnability. SIAM J. Comput. 2004, 33, 1067–1092. [Google Scholar] [CrossRef]
  35. Hunziker, M.; Meyer, D.A.; Park, J.; Pommersheim, J.; Rothstein, M. The geometry of quantum learning. Quantum Inf. Process. 2009, 9, 321–341. [Google Scholar] [CrossRef]
  36. Yoo, S.; Bang, J.; Lee, C.; Lee, J. A quantum speedup in machine learning: Finding anN-bit Boolean function for a classification. New J. Phys. 2014, 16, 103014. [Google Scholar] [CrossRef]
  37. Cross, A.W.; Smith, G.; Smolin, J.A. Quantum learning robust against noise. Phys. Rev. A 2015, 92, 012327. [Google Scholar] [CrossRef]
  38. Andronikos, T.; Bitsakos, C.; Nikas, K.; Goumas, G.I.; Koziris, N. A Quantum Algorithm for the Classification of Patterns of Boolean Functions. Mathematics 2025, 13, 1750. [Google Scholar] [CrossRef]
  39. Meyer, D.A. Quantum strategies. Phys. Rev. Lett. 1999, 82, 1052. [Google Scholar] [CrossRef]
  40. Eisert, J.; Wilkens, M.; Lewenstein, M. Quantum games and quantum strategies. Phys. Rev. Lett. 1999, 83, 3077. [Google Scholar] [CrossRef]
  41. Andronikos, T.; Sirokofskich, A. The Connection between the PQ Penny Flip Game and the Dihedral Groups. Mathematics 2021, 9, 1115. [Google Scholar] [CrossRef]
  42. Koh, D.E.; Kumar, K.; Goh, S.T. Quantum Volunteer’s Dilemma. arXiv 2024, arXiv:2409.05708. [Google Scholar] [CrossRef]
  43. Bennett, C.H.; Brassard, G. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 10–12 December 1984; IEEE Computer Society Press: Los Alamitos, CA, USA, 1984; pp. 175–179. [Google Scholar]
  44. Andronikos, T.; Sirokofskich, A. An Entanglement-Based Protocol for Simultaneous Reciprocal Information Exchange between 2 Players. Electronics 2023, 12, 2506. [Google Scholar] [CrossRef]
  45. Andronikos, T.; Sirokofskich, A. A Multiparty Quantum Private Equality Comparison Scheme Relying on GHZ3 States. Future Internet 2024, 16, 309. [Google Scholar] [CrossRef]
  46. Andronikos, T.; Bitsakos, C.; Nikas, K.; Goumas, G.I.; Koziris, N. Quantum Classification Outside the Promised Class. Computers 2025, 14, 228. [Google Scholar] [CrossRef]
  47. Qiskit. Qiskit Is the World’s Most Popular Software Stack for Quantum Computing. 2025. Available online: https://www.ibm.com/quantum/qiskit/ (accessed on 7 January 2025).
  48. Bierbrauer, J. Introduction to Coding Theory, 2nd ed.; Discrete Mathematics and Its Applications; Includes Bibliographical References and Index; CRC Press: Boca Raton, FL, USA, 2017. [Google Scholar]
  49. Ling, S.; Xing, C. Coding Theory: A First Course; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar] [CrossRef]
Figure 1. This figure provides a visual representation of the pattern bit vector concept.
Figure 1. This figure provides a visual representation of the pattern bit vector concept.
Stats 09 00005 g001
Figure 2. The above quantum circuit implements the pattern basis classification scheme.
Figure 2. The above quantum circuit implements the pattern basis classification scheme.
Stats 09 00005 g002
Figure 3. This figure shows the quantum circuit that implements the C 2 classifier.
Figure 3. This figure shows the quantum circuit that implements the C 2 classifier.
Stats 09 00005 g003
Figure 4. This figure shows the concrete implementation of the Pattern Basis Classification Scheme for the classification of the function f r 3 .
Figure 4. This figure shows the concrete implementation of the Pattern Basis Classification Scheme for the classification of the function f r 3 .
Stats 09 00005 g004
Figure 5. The measurement outcome of the quantum circuit of Figure 4.
Figure 5. The measurement outcome of the quantum circuit of Figure 4.
Stats 09 00005 g005
Figure 6. This figure depicts the quantum circuit that conclusively classifies all functions contained in F P n .
Figure 6. This figure depicts the quantum circuit that conclusively classifies all functions contained in F P n .
Stats 09 00005 g006
Figure 7. The probability distribution for F B 1 F Q 2 as a histogram.
Figure 7. The probability distribution for F B 1 F Q 2 as a histogram.
Stats 09 00005 g007
Figure 8. The probability distribution for F B 1 F Q 2 F B 1 as a histogram.
Figure 8. The probability distribution for F B 1 F Q 2 F B 1 as a histogram.
Stats 09 00005 g008
Figure 9. The probability distribution for F Q 2 F Q 2 as a histogram.
Figure 9. The probability distribution for F Q 2 F Q 2 as a histogram.
Stats 09 00005 g009
Figure 10. The probability distribution for F Q 2 F Q 2 F B 1 as a histogram.
Figure 10. The probability distribution for F Q 2 F Q 2 F B 1 as a histogram.
Stats 09 00005 g010
Figure 11. The probability distribution for F Q 2 F Q 2 F Q 2 as a histogram.
Figure 11. The probability distribution for F Q 2 F Q 2 F Q 2 as a histogram.
Stats 09 00005 g011
Table 1. Truth values of the function g : B 4 B .
Table 1. Truth values of the function g : B 4 B .
0000000100100011010001010110011110001001101010111100110111101111
g0111100010000000
Table 2. The pattern bit vectors and the truth values of the functions f g 0 , f g 1 , f g 2 , f g 3 .
Table 2. The pattern bit vectors and the truth values of the functions f g 0 , f g 1 , f g 2 , f g 3 .
Pattern Bit Vector00011011
f g 0 00011000
f g 1 00100100
f g 2 01000010
f g 3 10000001
Table 3. This table contains the pattern bit vectors of Q 4 .
Table 3. This table contains the pattern bit vectors of Q 4 .
Q 2 Pattern Bit Vectors g i g 0 , 0 i 3 g i g 1 , 0 i 3 g i g 2 , 0 i 3 g i g 3 , 0 i 3
g 0 = 0001 r 0 : 0001000100011110 r 1 : 0010001000101101 r 2 : 0100010001001011 r 3 : 1000100010000111
g 1 = 0010 r 4 : 0001000111100001 r 5 : 0010001011010010 r 6 : 0100010010110100 r 7 : 1000100001111000
g 2 = 0100 r 8 : 0001111000010001 r 9 : 0010110100100010 r 10 : 0100101101000100 r 11 : 1000011110001000
g 3 = 1000 r 12 : 1110000100010001 r 13 : 1101001000100010 r 14 : 1011010001000100 r 15 : 0111100010001000
Table 4. Comparison between the truth values of the functions g and f 0 .
Table 4. Comparison between the truth values of the functions g and f 0 .
0000000100100011010001010110011110001001101010111100110111101111
g0111100010000000
f r 0 0111100010001000
Table 5. This table contains the pattern bases that contain pattern bit vectors of length 8.
Table 5. This table contains the pattern bases that contain pattern bit vectors of length 8.
Pattern Bit Vector LengthPattern BasisClass of Classifiable Boolean FunctionsQuantum Classifier
8 B 1 B 1 B 1 F B 1 F B 1 F B 1 H H H
8 B 1 Q 2 F B 1 F Q 2 H C 2
8 Q 2 B 1 F Q 2 F B 1 C 2 H
Table 6. The probability distribution of the classification threshold as a function of the Hamming distance for the classes F B 1 F B 1 F B 1 , F B 1 F Q 2 , and F Q 2 F B 1 in tabular form.
Table 6. The probability distribution of the classification threshold as a function of the Hamming distance for the classes F B 1 F B 1 F B 1 , F B 1 F Q 2 , and F Q 2 F B 1 in tabular form.
Classification Threshold ϑ
Hamming Distance F B 1 F B 1 F B 1 , F B 1 F Q 2 , and  F Q 2 F B 1
1 0.56
2 0.54
3 0.22
4 , 5 , 6 , 7 , 8 0
Table 7. This table contains the pattern bases that contain pattern bit vectors of length 16.
Table 7. This table contains the pattern bases that contain pattern bit vectors of length 16.
Pattern Bit Vector LengthPattern BasisClass of Classifiable Boolean FunctionsQuantum Classifier
16 B 1 B 1 B 1 B 1 F B 1 F B 1 F B 1 F B 1 H H H H
16 B 1 B 1 Q 2 F B 1 F B 1 F Q 2 H H C 2
16 B 1 Q 2 B 1 F B 1 F Q 2 F B 1 H C 2 H
16 Q 2 B 1 B 1 F Q 2 F B 1 F B 1 C 2 H H
16 Q 2 Q 2 F Q 2 F Q 2 C 2 C 2
Table 8. The probability distribution of the classification threshold as a function of the Hamming distance for the classes F B 1 F B 1 F B 1 F B 1 , F B 1 F B 1 F Q 2 , F B 1 F Q 2 F B 1 , F Q 2 F B 1 F B 1 , and F Q 2 F Q 2 in tabular form.
Table 8. The probability distribution of the classification threshold as a function of the Hamming distance for the classes F B 1 F B 1 F B 1 F B 1 , F B 1 F B 1 F Q 2 , F B 1 F Q 2 F B 1 , F Q 2 F B 1 F B 1 , and F Q 2 F Q 2 in tabular form.
Classification Threshold ϑ
Hamming Distance F B 1 F B 1 F B 1 F B 1 , F B 1 F B 1 F Q 2 , F B 1 F Q 2 F B 1 , and  F Q 2 F B 1 F B 1 F Q 2 F Q 2
1 0.76 0.77
2 0.56 0.56
3 0.39 0.39
4 0.34 0.34
5 0.36 0.36
6 0.27 0.27
7 0.10 0.09
800
90 0.16
1001
11 , 12 , , 16 00
Table 9. This table contains the pattern bases that contain pattern bit vectors of length 32.
Table 9. This table contains the pattern bases that contain pattern bit vectors of length 32.
Pattern Bit Vector LengthPattern BasisClass of Classifiable Boolean FunctionsQuantum Classifier
32 B 1 B 1 B 1 B 1 B 1 F B 1 F B 1 F B 1 F B 1 F B 1 H H H H H
32 B 1 B 1 B 1 Q 2 F B 1 F B 1 F B 1 F Q 2 H H H C 2
32 B 1 B 1 Q 2 B 1 F B 1 F B 1 F Q 2 F B 1 H H C 2 H
32 B 1 Q 2 B 1 B 1 F B 1 F Q 2 F B 1 F B 1 H C 2 H H
32 Q 2 B 1 B 1 B 1 F Q 2 F B 1 F B 1 F B 1 C 2 H H H
32 B 1 Q 2 Q 2 F B 1 F Q 2 F Q 2 H C 2 C 2
32 Q 2 B 1 Q 2 F Q 2 F B 1 F Q 2 C 2 H C 2
32 Q 2 Q 2 B 1 F Q 2 F Q 2 F B 1 C 2 C 2 H
Table 10. The probability distribution of the classification threshold as a function of the Hamming distance for the classes F B 1 F B 1 F B 1 F B 1 F B 1 , F B 1 F B 1 F B 1 F Q 2 , F B 1 F B 1 F Q 2 F B 1 , F B 1 F Q 2 F B 1 F B 1 , F Q 2 F B 1 F B 1 F B 1 , F B 1 F Q 2 F Q 2 , F Q 2 F B 1 F Q 2 , and F Q 2 F Q 2 F B 1 in tabular form.
Table 10. The probability distribution of the classification threshold as a function of the Hamming distance for the classes F B 1 F B 1 F B 1 F B 1 F B 1 , F B 1 F B 1 F B 1 F Q 2 , F B 1 F B 1 F Q 2 F B 1 , F B 1 F Q 2 F B 1 F B 1 , F Q 2 F B 1 F B 1 F B 1 , F B 1 F Q 2 F Q 2 , F Q 2 F B 1 F Q 2 , and F Q 2 F Q 2 F B 1 in tabular form.
Classification Threshold ϑ
Hamming Distance F B 1 F B 1 F B 1 F B 1 F B 1 , F B 1 F B 1 F B 1 F Q 2 , F B 1 F B 1 F Q 2 F B 1 , F B 1 F Q 2 F B 1 F B 1 , F Q 2 F B 1 F B 1 F B 1 , F B 1 F Q 2 F Q 2 , F Q 2 F B 1 F Q 2 , and  F Q 2 F Q 2 F B 1
1 , , 4 0.50 < ϑ < 1
5 , , 15 0 < ϑ < 0.50
16 , , 32 0
Table 11. This table shows the class F Q 2 F Q 2 F Q 2 that realizes the pattern basis Q 2 Q 2 Q 2 consisting of pattern bit vectors of length 64.
Table 11. This table shows the class F Q 2 F Q 2 F Q 2 that realizes the pattern basis Q 2 Q 2 Q 2 consisting of pattern bit vectors of length 64.
Pattern Bit Vector LengthPattern BasisClass of Classifiable Boolean FunctionsQuantum Classifier
64 Q 2 Q 2 Q 2 F Q 2 F Q 2 F Q 2 C 2 C 2 C 2
Table 12. The probability distribution of the classification threshold as a function of the Hamming distance for the class F Q 2 F Q 2 F Q 2 in tabular format.
Table 12. The probability distribution of the classification threshold as a function of the Hamming distance for the class F Q 2 F Q 2 F Q 2 in tabular format.
Classification Threshold ϑ
Hamming Distance F Q 2 F Q 2 F Q 2
1 , , 9 0.50 < ϑ < 1
9 , , 31 0 < ϑ < 0.50
32 , , 35 0
361
37 , , 64 0
Table 13. This table gives the probability distribution of the classification threshold as a function of the Hamming distance for a general class F P , and for a special class F Q 2 m . The results are parameterized by n, the arity of the Boolean functions in the class.
Table 13. This table gives the probability distribution of the classification threshold as a function of the Hamming distance for a general class F P , and for a special class F Q 2 m . The results are parameterized by n, the arity of the Boolean functions in the class.
Classification Threshold ϑ
Hamming Distance F P F Q 2 m
1 , , 2 n 8 0.50 < ϑ < 1 0.50 < ϑ < 1
2 n 8 + 1 , , 2 n 2 1 0 < ϑ < 0.50 0 < ϑ < 0.50
2 n 2 , , ϱ 1 00
ϱ 01
ϱ + 1 , , 2 n 00
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Andronikos, T.; Bitsakos, C.; Nikas, K.; Goumas, G.I.; Koziris, N. Probabilistic Links Between Quantum Classification of Patterns of Boolean Functions and Hamming Distance. Stats 2026, 9, 5. https://doi.org/10.3390/stats9010005

AMA Style

Andronikos T, Bitsakos C, Nikas K, Goumas GI, Koziris N. Probabilistic Links Between Quantum Classification of Patterns of Boolean Functions and Hamming Distance. Stats. 2026; 9(1):5. https://doi.org/10.3390/stats9010005

Chicago/Turabian Style

Andronikos, Theodore, Constantinos Bitsakos, Konstantinos Nikas, Georgios I. Goumas, and Nectarios Koziris. 2026. "Probabilistic Links Between Quantum Classification of Patterns of Boolean Functions and Hamming Distance" Stats 9, no. 1: 5. https://doi.org/10.3390/stats9010005

APA Style

Andronikos, T., Bitsakos, C., Nikas, K., Goumas, G. I., & Koziris, N. (2026). Probabilistic Links Between Quantum Classification of Patterns of Boolean Functions and Hamming Distance. Stats, 9(1), 5. https://doi.org/10.3390/stats9010005

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop