Artificial Intelligence, Machine Learning and Blockchain in Quantum Satellite, Drone and Network.


Thiruselvan. Subramanian
Bok Engelsk 2022 · Electronic books.
Omfang
1 online resource (245 pages)
Opplysninger
Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Editors -- Contributors -- Chapter 1 Quantum Information Processes: Role of Quantum Logic Gates -- 1.1 Introduction -- 1.2 Literature Survey -- 1.3 Quantum Bits and Quantum Entanglement -- 1.4 Quantum Computation: Quantum Logic Gates -- 1.4.1 Single-Qubit Gates -- 1.4.2 Multi-qubit Quantum Gates -- 1.5 Quantum Information Processes and Algorithms -- 1.6 Quantum Computation in Satellite Communications -- 1.6.1 Working of a Typical Quantum-based Satellite System -- 1.7 Conclusions and Future Scope -- References -- Chapter 2 A Brief Study on Quantum Walks and Quantum Mechanics -- 2.1 Quantum -- 2.2 Computing -- 2.3 Random Walks -- 2.4 The Quantum Walk -- 2.4.1 The Discrete Model -- 2.4.2 Continuous-time Quantum Random Walk -- 2.5 Quantum Walk Principle -- 2.6 The Quantum Random Walk Search -- 2.7 Random Walk in Computer Science -- 2.8 Quantum Computing with Quantum Walks and Related Models -- 2.9 Hybrid Classical-Quantum Algorithms -- 2.10 Quantum Mechanics -- 2.11 Relationships between Quantum Walk and Quantum Mechanics -- 2.11.1 Superposition -- 2.11.2 Entanglement -- 2.12 Quantum Computers and Circuits -- 2.12.1 Qubits -- 2.12.2 Gates -- 2.13 Drone-based Quantum Computing -- 2.14 Quantum Satellites Aimed at Drone-Based Network as well as Communications -- 2.15 Conclusions -- References -- Chapter 3 A Keen Study on Quantum Information Systems -- 3.1 Introduction -- 3.1.1 Terminology in Quantum Computation -- 3.2 Quantum Information Processing -- 3.3 Quantum Information Systems -- 3.3.1 Quantum Entropy -- 3.3.2 Quantum Relative and Conditional Entropies -- 3.4 Trends in Quantum Information Systems -- 3.4.1 Quantum Cryptography -- 3.4.2 Quantum Retrodiction -- 3.4.3 Quantum Key Distribution -- 3.4.3.1 Applications of Quantum Information Systems.. - 14.6 Quantum Computing-based Whale Optimization Algorithm for Feature Selection.. - 3.4.4 Artificial Intelligence &amp -- Machine Learning -- 3.4.5 Cybersecurity &amp -- Cryptography -- 3.5 Conclusion -- References -- Chapter 4 Prologue to Quantum Computing and Blockchain Technology -- 4.1 Introduction to Quantum Computing and Blockchain Technology -- 4.1.1 Quantum Computing -- 4.1.2 BC Technology -- 4.2 How Does Quantum Computer Work? -- 4.2.1 The Architecture of Quantum Computers -- 4.2.2 Working of Blockchain -- 4.3 Application Areas of Quantum Computing and BC -- 4.3.1 Quantum Computing -- 4.3.2 BC -- 4.3.2.1 Commercial Applications -- 4.3.2.2 Non-commercial Applications -- 4.3.3 Challenges of BC -- 4.3.4 Importance of Quantum Computing Blockchain for Quantum Satellites and Drones -- 4.4 Conclusion -- References -- Chapter 5 Quantum Computing Application for Satellites and Satellite Image Processing -- 5.1 Introduction -- 5.2 Satellites -- 5.3 Quantum Technologies -- 5.3.1 Slow Process of Integration and Testing Satellite Systems -- 5.3.2 Low Life Span of Satellite Systems -- 5.3.3 Redundancy in Collected Data by Remote-Sensing Satellites -- 5.3.4 Data Security-Quantum Key Distribution -- 5.4 Quantum Computing for Satellite Image Processing -- 5.4.1 Satellite Image Pre-processing -- 5.4.2 Post-processing of Satellite Image -- 5.4.3 Quantum Machine Learning -- 5.5 Conclusion and Future Scope -- References -- Chapter 6 Evolution of Deep Quantum Learning Models Based on Comprehensive Survey on Effective Malware Identification and Analysis -- 6.1 Introduction -- 6.1.1 Classical Machine Learning -- 6.1.2 Comparison between Machine Learning and Deep Learning -- 6.1.3 Rise of Quantum Computing in Machine Learning -- 6.1.4 Evaluation Metrics -- 6.2 Malware Detection and Analysis ( MDA) -- 6.3 Malware Detection-A View -- 6.3.1 Signature-Based Detection -- 6.3.2 Heuristic-based Detection -- 6.3.3 Specicatfiion-Based Detection.. - 6.4 Malware Analysis-A View -- 6.4.1 Malware Analysis Process -- 6.4.2 Malware Analysis Approach Using Machine Learning/ Deep Learning Models -- 6.5 Discussion -- 6.6 Conclusion -- References -- Chapter 7 Healthcare System 4.0 Driven by Quantum Computing and Its Use Cases: A COVID-19 Perspective -- 7.1 Introduction -- 7.2 Literature Review -- 7.2.1 Preliminaries -- 7.2.1.1 Quantum Computing Insights -- 7.2.1.2 Challenges Associated with Quantum Computing -- 7.2.1.3 India's Effort and Initiative -- 7.2.1.4 Advancement of Quantum Computing in India -- 7.2.2 Healthcare System 4.0 -- 7.2.3 Application of Quantum Technologies and Computation in Healthcare System -- 7.2.3.1 Quantum Sensors and Quantum Imaging in Disease Diagnosis -- 7.2.3.2 Quantum Computing Impact on Drug, Diagnostic Research, and Disorder Screening Process -- 7.2.3.3 Quantum Machine Learning Systems -- 7.2.3.4 Silico Trials and Personalized Health Care -- 7.2.3.5 Genomic Medicine -- 7.2.3.6 Data Storage, Transmission, and Security -- 7.2.3.7 Predictive Healthcare -- 7.2.3.8 Hospital on Cloud -- 7.3 Future Scope -- 7.4 Conclusions -- Acknowledgement -- References -- Chapter 8 An Overview on Future Applications of Quantum Computing -- 8.1 Introduction -- 8.2 Quantum Computer Framework -- 8.3 Experimental Perspective of Quantum Computing -- 8.4 Quantum Computing Algorithms -- 8.5 Quantum Computing Applications -- 8.5.1 Quantum Computing Healthcare Approaches -- 8.5.2 Diagnostic Assistance -- 8.5.3 Precision Medicine -- 8.5.4 Pricing -- 8.5.5 Quantum Technology -- 8.5.6 Quantum Cryptography -- 8.5.7 Artificial Intelligence -- 8.5.8 Weather Forecasting -- 8.5.9 Financial Management -- 8.5.10 Logistics Operation -- 8.5.11 Quantum Key Distribution -- 8.5.12 Quantum Computing in Machine Learning and Big Data -- 8.5.13 Quantum Computing in Cloud Computing -- 8.5.14 Quantum Computing in Robotics.. - 8.5.15 Quantum Computing in Material Science -- 8.6 Conditions for Quantum Computing -- 8.6.1 Advantages of Quantum Computing -- 8.6.2 Challenges in Quantum Computing -- 8.7 Future of Quantum Computing -- 8.8 Discussion -- References -- Chapter 9 Authentication and Authorization for Electronic Health Records Using Merkle Tree - Attribute-Based Encryption -- 9.1 Introduction -- 9.1.1 Healthcare 4.0 -- 9.1.2 Electronic Health Records -- 9.1.3 Privacy of Patient Data -- 9.2 Attribute-Based Encryption -- 9.2.1 Key Policy Attribute-Based Encryption -- 9.2.2 Ciphertext Policy Attribute-Based Encryption -- 9.3 Merkle Trees -- 9.3.1 Role of Merkle Trees in Blockchain -- 9.3.2 String Commitment by Merkle Trees -- 9.4 Merkle Tree - Attribute-Based Encryption -- 9.4.1 Description of the Algorithm -- 9.4.2 Generating Merkle Subtree Using Attributes -- 9.4.3 Authentication and Authorization Using MT-ABE -- 9.5 Demonstration of the Algorithm -- 9.5.1 Setup Phase -- 9.5.2 Access Phase -- 9.6 Performance Measures -- 9.7 Summary and Closing Remarks -- References -- Chapter 10 Artificial Intelligence, Machine Learning and Smartphone- Internet of Things (S-IoT) for Advanced Student Network and Learning -- 10.1 Introduction -- 10.2 Machine Learning for Advanced Student Network and Learning -- 10.3 Smartphone-Internet of Things ( S-IoT) for Advanced Student Network and Learning -- 10.4 Conclusion and Future Scope -- References -- Chapter 11 IoT-Based Smart Mask to Combat COVID-19 -- 11.1 Introduction -- 11.2 Literature Review -- 11.3 Role of IoMT Devices in Real Life -- 11.3.1 Wearable IoMT -- 11.3.2 Non-wearable IoMT -- 11.4 Need for Smart Mask and Drone-assisted Check on Smart Mask -- 11.4.1 Need -- 11.5 Research Objectives and Methodology -- 11.5.1 Methodology -- 11.6 Conclusion -- References.. - Chapter 12 Encryption Algorithms for Cloud Computing and Quantum Blockchain: A Futuristic Technology Roadmap -- 12.1 Introduction -- 12.1.1 Cloud Computing -- 12.1.2 Characteristics of Cloud Computing -- 12.1.3 Architecture of Cloud Computing -- 12.1.4 Services of Cloud Computing -- 12.2 Security Implications of Cloud Computing -- 12.3 Literature Survey Supporting Solutions for Imparting Security in Cloud Layer -- 12.3.1 Cloud Computing Security Solutions -- 12.3.2 Two-factor Data Security Protection Mechanism for Cloud Storage System -- 12.3.3 Attribute-based Access Control with Constant-size Cipher Text in Cloud Computing -- 12.3.4 Shared Authority-based Privacy-preserving Authority Authentication Protocol -- 12.3.5 Hybrid Authentication Protocol -- 12.4 Comparative Investigation of Various Encryption Algorithms Supporting Security at Cloud Layer -- 12.5 Quantum Computing and Blockchain -- 12.5.1 Basics of Quantum Computing -- 12.5.2 How Quantum Fits in Cloud: As-A-Service Quantum Computing -- 12.6 Recent Progress towards Solving Issues -- 12.7 Conclusions and Future Scope -- References -- Chapter 13 Quantum Artificial Intelligence for the Science of Climate Change -- 13.1 Introduction -- 13.2 Science of Climate Change and the Role of Artificial Intelligence -- 13.3 Quantum Artificial Intelligence for the Science of Climate Change -- 13.3.1 Complex Problems in Earth System Science: Potential for QAI -- 13.3.2 Technological Solutions for Implementing QAI -- 13.3.3 Case Study on the Use of QAI for Climate Science -- 13.4 Conclusions and Future Work -- 13.4.1 Software Availability -- References -- Chapter 14 Quantum Computing-Based Optimization in Depression Detection Using Speech -- 14.1 Introduction -- 14.2 Genetic Algorithm -- 14.3 Particle Swarm Optimization -- 14.4 Ant Colony Optimization -- 14.5 Whale Optimization Algorithm.
Sjanger
Dewey
ISBN
9781000688733
ISBN(galt)

Bibliotek som har denne