Research Anthology on Advancements in Quantum Technology
Latest Publications


TOTAL DOCUMENTS

22
(FIVE YEARS 22)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781799885931, 9781799887409

Author(s):  
Bhanu Chander

Quantum cryptography is actions to protect transactions through executing the circumstance of quantum physics. Up-to-the-minute cryptography builds security over the primitive ability of fragmenting enormous numbers into relevant primes; however, it features inconvenience with ever-increasing machine computing power along with current mathematical evolution. Among all the disputes, key distribution is the most important trouble in classical cryptography. Quantum cryptography endows with clandestine communication by means of offering a definitive protection statement with the rule of the atmosphere. Exploit quantum mechanics to cryptography can be enlarging unrestricted, unfailing information transmission. This chapter describes the contemporary state of classical cryptography along with the fundamentals of quantum cryptography, quantum protocol key distribution, implementation criteria, quantum protocol suite, quantum resistant cryptography, and large-scale quantum key challenges.


Author(s):  
Aleksandar Stojanovic ◽  
Ana Starcevic

The quantum mind or quantum consciousness group of hypotheses propose that classical mechanics cannot explain consciousness. Quantum theory is used to insert models of cognition that target to be more innovative than models based on traditional classical probability theory, which includes cognitive modeling phenomena in science. At the moment we can say that there is no clearly defined neurophysiological mechanisms of creation of the quantum-like representation of information in the brain, but we can mention the hypothesis of matching the information processing in the brain with quantum information and probability with contextuality as the key word. Using limited cognitive resources, incompatibility provides humans the means for answering an unlimited number of questions, thus promoting parsimony and cognitive economy.


Author(s):  
Raul Valverde ◽  
Beatriz Torres ◽  
Hamed Motaghi

NeuroIS uses tools such as electroencephalogram (EEG) that can be used to measure high brainwave frequencies that can be linked to human anxiety. Past research showed that computer anxiety influences how users perceive ease of use of a learning management system (LMS). Although computer anxiety has been used successfully to evaluate the usability of LMS, the main data collection mechanisms proposed for its evaluation have been questionnaires. Questionnaires suffer from possible problems such as being inadequate to understand some forms of information such as emotions and honesty in the responses. Quantum-based approaches to consciousness have been very popular in the last years including the quantum model reduction in microtubules of Penrose and Hameroff (1995). The objective of the chapter is to propose an architecture based on a NeuroIS that collects data by using EEG from users and then use the collected data to perform analytics by using a quantum consciousness model proposed for computer anxiety measurements for the usability testing of a LMS.


Author(s):  
Amandeep Singh Bhatia ◽  
Shenggen Zheng

In the last two decades, the field of post-quantum cryptography has had an overwhelming response among research communities. The ability of quantum computers to factorize large numbers could break many of well-known RSA cryptosystem and discrete log-based cryptosystem. Thus, post-quantum cryptography offers secure alternatives which are implemented on classical computers and is secure against attacks by quantum computers. The significant benefits of post-quantum cryptosystems are that they can be executed quickly and efficiently on desktops, smartphones, and the Internet of Things (IoTs) after some minor software updates. The main objective of this chapter is to give an outline of major developments in privacy protectors to reply to the forthcoming threats caused by quantum systems. In this chapter, we have presented crucial classes of cryptographic systems to resist attacks by classical and quantum computers. Furthermore, a review of different classes of quantum cloning is presented.


Author(s):  
Manisha Rathee ◽  
Kumar Dilip ◽  
Ritu Rathee

DNA fragment assembly (DFA) is one of the most important and challenging problems in computational biology. DFA problem involves reconstruction of target DNA from several hundred (or thousands) of sequenced fragments by identifying the proper orientation and order of fragments. DFA problem is proved to be a NP-Hard combinatorial optimization problem. Metaheuristic techniques have the capability to handle large search spaces and therefore are well suited to deal with such problems. In this chapter, quantum-inspired genetic algorithm-based DNA fragment assembly (QGFA) approach has been proposed to perform the de novo assembly of DNA fragments using overlap-layout-consensus approach. To assess the efficacy of QGFA, it has been compared genetic algorithm, particle swarm optimization, and ant colony optimization-based metaheuristic approaches for solving DFA problem. Experimental results show that QGFA performs comparatively better (in terms of overlap score obtained and number of contigs produced) than other approaches considered herein.


Author(s):  
Padmapriya Praveenkumar ◽  
Santhiyadevi R. ◽  
Amirtharajan R.

In this internet era, transferring and preservation of medical diagnostic reports and images across the globe have become inevitable for the collaborative tele-diagnosis and tele-surgery. Consequently, it is of prime importance to protect it from unauthorized users and to confirm integrity and privacy of the user. Quantum image processing (QIP) paves a way by integrating security algorithms in protecting and safeguarding medical images. This chapter proposes a quantum-assisted encryption scheme by making use of quantum gates, chaotic maps, and hash function to provide reversibility, ergodicity, and integrity, respectively. The first step in any quantum-related image communication is the representation of the classical image into quantum. It has been carried out using novel enhanced quantum representation (NEQR) format, where it uses two entangled qubit sequences to hoard the location and its pixel values of an image. The second step is performing transformations like confusion, diffusion, and permutation to provide an uncorrelated encrypted image.


Author(s):  
Debanjan Konar ◽  
Suman Kalyan Kar

This chapter proposes a quantum multi-layer neural network (QMLNN) architecture suitable for handwritten character recognition in real time, assisted by quantum backpropagation of errors calculated from the quantum-inspired fuzziness measure of network output states. It is composed of three second-order neighborhood-topology-based inter-connected layers of neurons represented by qubits known as input, hidden, and output layers. The QMLNN architecture is a feed forward network with standard quantum backpropagation algorithm for the adjustment of its weighted interconnection. QMLNN self-organizes the quantum fuzzy input image information by means of the quantum backpropagating errors at the intermediate and output layers of the architecture. The interconnection weights are described using rotation gates. After the network is stabilized, a quantum observation at the output layer destroys the superposition of quantum states in order to obtain true binary outputs.


Author(s):  
Olaf Cames ◽  
Meghann L. Drury-Grogan

This completed action research utilizes the conceptual framework of quantum mechanics in action science field studies for bias-free behavioral data collection and quantification. The research question tied to experimental verification if action research field studies can practically utilize the theory of communicative action and the theory of quantum mechanics to contextualize the quantification with pathological and distorted behavioral pattern. The result is a quantum-like formalism that provides intermediary conceptuality for organizational intervening initiatives. This process of contextualization behavior in projects via quantum probability experimentally evidenced. The chapter concludes by reviewing the results of two experiments that the hypotheses that the theory of quantum mechanics and the theory of communicative action qualifies as a building block for a planned methodological approach to intervene and steer problematic social structures in the desired direction.


Author(s):  
Pankaj Pal ◽  
Siddhartha Bhattacharyya ◽  
Nishtha Agrawal

A method for grayscale image segmentation is presented using a quantum-inspired self-organizing neural network architecture by proper selection of the threshold values of the multilevel sigmoidal activation function (MUSIG). The context-sensitive threshold values in the different positions of the image are measured based on the homogeneity of the image content and used to extract the object by means of effective thresholding of the multilevel sigmoidal activation function guided by the quantum superposition principle. The neural network architecture uses fuzzy theoretic concepts to assist in the segmentation process. The authors propose a grayscale image segmentation method endorsed by context-sensitive thresholding technique. This quantum-inspired multilayer neural network is adapted with self-organization. The architecture ensures the segmentation process for the real-life images as well as synthetic images by selecting intensity parameter as the threshold value.


Author(s):  
Chukiat Chaiboonsri ◽  
Satawat Wannapan

This research attempts to classify, predict, and manage the financial time-series trends of the large stock prices of significant companies in the development of e-commerce and e-business in the ASEAN countries. Moreover, the Markowitz portfolio optimization analysis based on quantum mechanics was utilized to find out the direction of e-commerce and e-business in the future. Data collection for this study consists of Maybank, PPB Group Berhad, Golden Agri-Resource, SingTel, and Global Logistic Properties. And the stock prices of those companies were carried out to this study from 2004 to 2018 by daily data. Interestingly, the empirical results would provide a possible solution and efficiently suggest a beneficial for the development of both e-commerce and e-business in the ASEAN countries. The commerce and business based on electronics in ASEAN, especially agribusiness, energy business, and telecommunication business, still play a major important role in the economy of ASEAN countries.


Sign in / Sign up

Export Citation Format

Share Document