𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Artificial Intelligence, Machine Learning and Blockchain in Quantum Satellite, Drone and Network

✍ Scribed by Thiruselvan Subramanian, Archana Dhyani, Adarsh Kumar, Sukhpal Singh Gill


Publisher
CRC Press
Year
2022
Tongue
English
Leaves
245
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Quantum computing is a field in which advanced technologies like quantum communication, artificial intelligence and machine learning can be used to secure and speed up connectivity using quantum computers, quantum drones or quantum satellites. This book serve as a foundation for researchers and scientists in this field. Future technologies, such as quantum drone delivery systems, quicker internet and climate change mitigation, will need quantum information processing and quantum computation. This book deeply explores the importance of quantum computing in real-time applications. It may be used as a reference book for students in higher education, including undergraduate and graduate students, as well as researchers.

Key features:

    • Provides a clear insight into the Internet of Drones for academicians, postdoc fellows, research scholars, graduate and postgraduate students, industry fellows and software engineers

    • Useful to professionals who seek information about the Internet of Drones, including experts in quantum computing and physics and post-quantum cryptography, as well as data scientists and data analysts

    • Covers quantum computing and security for Unmanned Aerial Vehicles (UAV) or drones which are widely useful for applications such as military, government, and non-government systems

    • Explores futuristic aspects of the Intenet of Drones to improve everyday living for ordinary people

    ✦ Table of Contents


    Cover
    Half Title
    Title Page
    Copyright Page
    Table of Contents
    Editors
    Contributors
    Chapter 1 Quantum Information Processes: Role of Quantum Logic Gates
    1.1 Introduction
    1.2 Literature Survey
    1.3 Quantum Bits and Quantum Entanglement
    1.4 Quantum Computation: Quantum Logic Gates
    1.4.1 Single-Qubit Gates
    1.4.2 Multi-qubit Quantum Gates
    1.5 Quantum Information Processes and Algorithms
    1.6 Quantum Computation in Satellite Communications
    1.6.1 Working of a Typical Quantum-based Satellite System
    1.7 Conclusions and Future Scope
    References
    Chapter 2 A Brief Study on Quantum Walks and Quantum Mechanics
    2.1 Quantum
    2.2 Computing
    2.3 Random Walks
    2.4 The Quantum Walk
    2.4.1 The Discrete Model
    2.4.2 Continuous-time Quantum Random Walk
    2.5 Quantum Walk Principle
    2.6 The Quantum Random Walk Search
    2.7 Random Walk in Computer Science
    2.8 Quantum Computing with Quantum Walks and Related Models
    2.9 Hybrid Classical-Quantum Algorithms
    2.10 Quantum Mechanics
    2.11 Relationships between Quantum Walk and Quantum Mechanics
    2.11.1 Superposition
    2.11.2 Entanglement
    2.12 Quantum Computers and Circuits
    2.12.1 Qubits
    2.12.2 Gates
    2.13 Drone-based Quantum Computing
    2.14 Quantum Satellites Aimed at Drone-Based Network as well as Communications
    2.15 Conclusions
    References
    Chapter 3 A Keen Study on Quantum Information Systems
    3.1 Introduction
    3.1.1 Terminology in Quantum Computation
    3.2 Quantum Information Processing
    3.3 Quantum Information Systems
    3.3.1 Quantum Entropy
    3.3.2 Quantum Relative and Conditional Entropies
    3.4 Trends in Quantum Information Systems
    3.4.1 Quantum Cryptography
    3.4.2 Quantum Retrodiction
    3.4.3 Quantum Key Distribution
    3.4.3.1 Applications of Quantum Information Systems
    3.4.4 Artificial Intelligence & Machine Learning
    3.4.5 CybersecurityΒ & Cryptography
    3.5 Conclusion
    References
    Chapter 4 Prologue to Quantum Computing and Blockchain Technology
    4.1 Introduction to Quantum Computing and Blockchain Technology
    4.1.1 Quantum Computing
    4.1.2 BC Technology
    4.2 How Does Quantum Computer Work?
    4.2.1 The Architecture of Quantum Computers
    4.2.2 Working of Blockchain
    4.3 Application Areas of Quantum Computing and BC
    4.3.1 Quantum Computing
    4.3.2 BC
    4.3.2.1 Commercial Applications
    4.3.2.2 Non-commercial Applications
    4.3.3 Challenges of BC
    4.3.4 Importance of Quantum Computing Blockchain for Quantum Satellites and Drones
    4.4 Conclusion
    References
    Chapter 5 Quantum Computing Application for Satellites and Satellite Image Processing
    5.1 Introduction
    5.2 Satellites
    5.3 Quantum Technologies
    5.3.1 Slow Process of Integration and Testing Satellite Systems
    5.3.2 Low Life Span of Satellite Systems
    5.3.3 Redundancy in Collected Data by Remote-Sensing Satellites
    5.3.4 Data Securityβ€”Quantum Key Distribution
    5.4 Quantum Computing for Satellite Image Processing
    5.4.1 Satellite Image Pre-processing
    5.4.2 Post-processing of Satellite Image
    5.4.3 Quantum Machine Learning
    5.5 Conclusion and Future Scope
    References
    Chapter 6 Evolution of Deep Quantum Learning Models Based on Comprehensive Survey on Effective Malware Identification and Analysis
    6.1 Introduction
    6.1.1 Classical Machine Learning
    6.1.2 Comparison between Machine Learning and Deep Learning
    6.1.3 Rise of Quantum Computing in Machine Learning
    6.1.4 Evaluation Metrics
    6.2 Malware Detection and Analysis ( MDA)
    6.3 Malware Detectionβ€”A View
    6.3.1 Signature-Based Detection
    6.3.2 Heuristic-based Detection
    6.3.3 Specicatfiion-Based Detection
    6.4 Malware Analysisβ€”A View
    6.4.1 Malware Analysis Process
    6.4.2 Malware Analysis Approach Using Machine Learning/ Deep Learning Models
    6.5 Discussion
    6.6 Conclusion
    References
    Chapter 7 Healthcare System 4.0 Driven by Quantum Computing and Its Use Cases: A COVID-19 Perspective
    7.1 Introduction
    7.2 Literature Review
    7.2.1 Preliminaries
    7.2.1.1 Quantum Computing Insights
    7.2.1.2 Challenges Associated with Quantum Computing
    7.2.1.3 India’s Effort and Initiative
    7.2.1.4 Advancement of Quantum Computing in India
    7.2.2 Healthcare System 4.0
    7.2.3 Application of Quantum Technologies and Computation in Healthcare System
    7.2.3.1 Quantum Sensors and Quantum Imaging in Disease Diagnosis
    7.2.3.2 Quantum Computing Impact on Drug, Diagnostic Research, and Disorder Screening Process
    7.2.3.3 Quantum Machine Learning Systems
    7.2.3.4 Silico Trials and Personalized Health Care
    7.2.3.5 Genomic Medicine
    7.2.3.6 Data Storage, Transmission, and Security
    7.2.3.7 Predictive Healthcare
    7.2.3.8 Hospital on Cloud
    7.3 Future Scope
    7.4 Conclusions
    Acknowledgement
    References
    Chapter 8 An Overview on Future Applications of Quantum Computing
    8.1 Introduction
    8.2 Quantum Computer Framework
    8.3 Experimental Perspective of Quantum Computing
    8.4 Quantum Computing Algorithms
    8.5 Quantum Computing Applications
    8.5.1 Quantum Computing Healthcare Approaches
    8.5.2 Diagnostic Assistance
    8.5.3 Precision Medicine
    8.5.4 Pricing
    8.5.5 Quantum Technology
    8.5.6 Quantum Cryptography
    8.5.7 Artificial Intelligence
    8.5.8 Weather Forecasting
    8.5.9 Financial Management
    8.5.10 Logistics Operation
    8.5.11 Quantum Key Distribution
    8.5.12 Quantum Computing in Machine Learning and Big Data
    8.5.13 Quantum Computing in Cloud Computing
    8.5.14 Quantum Computing in Robotics
    8.5.15 Quantum Computing in Material Science
    8.6 Conditions for Quantum Computing
    8.6.1 Advantages of Quantum Computing
    8.6.2 Challenges in Quantum Computing
    8.7 Future of Quantum Computing
    8.8 Discussion
    References
    Chapter 9 Authentication and Authorization for Electronic Health Records Using Merkle Tree – Attribute-Based Encryption
    9.1 Introduction
    9.1.1 Healthcare 4.0
    9.1.2 Electronic Health Records
    9.1.3 Privacy of Patient Data
    9.2 Attribute-Based Encryption
    9.2.1 Key Policy Attribute-Based Encryption
    9.2.2 Ciphertext Policy Attribute-Based Encryption
    9.3 Merkle Trees
    9.3.1 Role of Merkle Trees in Blockchain
    9.3.2 String Commitment by Merkle Trees
    9.4 Merkle Tree – Attribute-Based Encryption
    9.4.1 Description of the Algorithm
    9.4.2 Generating Merkle Subtree Using Attributes
    9.4.3 Authentication and Authorization Using MT-ABE
    9.5 Demonstration of the Algorithm
    9.5.1 Setup Phase
    9.5.2 Access Phase
    9.6 Performance Measures
    9.7 Summary and Closing Remarks
    References
    Chapter 10 Artificial Intelligence, Machine Learning and Smartphone- Internet of Things (S-IoT) for Advanced Student Network and Learning
    10.1 Introduction
    10.2 Machine Learning for Advanced Student Network and Learning
    10.3 Smartphone-Internet of Things ( S-IoT) for Advanced Student Network and Learning
    10.4 Conclusion and Future Scope
    References
    Chapter 11 IoT-Based Smart Mask to Combat COVID-19
    11.1 Introduction
    11.2 Literature Review
    11.3 Role of IoMT Devices in Real Life
    11.3.1 Wearable IoMT
    11.3.2 Non-wearable IoMT
    11.4 Need for Smart Mask and Drone-assisted Check on Smart Mask
    11.4.1 Need
    11.5 Research Objectives and Methodology
    11.5.1 Methodology
    11.6 Conclusion
    References
    Chapter 12 Encryption Algorithms for Cloud Computing and Quantum Blockchain: A Futuristic Technology Roadmap
    12.1 Introduction
    12.1.1 Cloud Computing
    12.1.2 Characteristics of Cloud Computing
    12.1.3 Architecture of Cloud Computing
    12.1.4 Services of Cloud Computing
    12.2 Security Implications of Cloud Computing
    12.3 Literature Survey Supporting Solutions for Imparting Security in Cloud Layer
    12.3.1 Cloud Computing Security Solutions
    12.3.2 Two-factor Data Security Protection Mechanism for Cloud Storage System
    12.3.3 Attribute-based Access Control with Constant-size Cipher Text in Cloud Computing
    12.3.4 Shared Authority-based Privacy-preserving Authority Authentication Protocol
    12.3.5 Hybrid Authentication Protocol
    12.4 Comparative Investigation of Various Encryption Algorithms Supporting Security at Cloud Layer
    12.5 Quantum Computing and Blockchain
    12.5.1 Basics of Quantum Computing
    12.5.2 How Quantum Fits in Cloud: As-A-Service Quantum Computing
    12.6 Recent Progress towards Solving Issues
    12.7 Conclusions and Future Scope
    References
    Chapter 13 Quantum Artificial Intelligence for the Science of Climate Change
    13.1 Introduction
    13.2 Science of Climate Change and the Role of Artificial Intelligence
    13.3 Quantum Artificial Intelligence for the Science of Climate Change
    13.3.1 Complex Problems in Earth System Science: Potential for QAI
    13.3.2 Technological Solutions for Implementing QAI
    13.3.3 Case Study on the Use of QAI for Climate Science
    13.4 Conclusions and Future Work
    13.4.1 Software Availability
    References
    Chapter 14 Quantum Computing-Based Optimization in Depression Detection Using Speech
    14.1 Introduction
    14.2 Genetic Algorithm
    14.3 Particle Swarm Optimization
    14.4 Ant Colony Optimization
    14.5 Whale Optimization Algorithm
    14.6 Quantum Computing-based Whale Optimization Algorithm for Feature Selection
    14.6.1 Quantum Computing Whale Optimization Algorithm Flow
    14.7 Depression
    14.7.1 Objective Measures for Depression Detection
    14.7.2 Related Work
    14.8 Experimentation Analysis
    14.9 Conclusion and Future Directions
    Acknowledgement
    References
    Index


    πŸ“œ SIMILAR VOLUMES


    Blockchain Tethered AI: Trackable, Trace
    ✍ Karen Kilroy, Lynn Riley, Deepak Bhatta πŸ“‚ Library πŸ› O'Reilly Media 🌐 English

    <p><span>Remove your doubts about AI and explore how this technology can be future-proofed using blockchain's smart contracts and tamper-evident ledgers. With this practical book, system architects, software engineers, and systems solution specialists will learn how enterprise blockchain provides pe

    Blockchain Tethered AI: Trackable, Trace
    ✍ Karen Kilroy, Lynn Riley, Deepak Bhatta πŸ“‚ Library πŸ› O'Reilly Media 🌐 English

    <p><span>Remove your doubts about AI and explore how this technology can be future-proofed using blockchain's smart contracts and tamper-evident ledgers. With this practical book, system architects, software engineers, and systems solution specialists will learn how enterprise blockchain provides pe

    Blockchain Tethered AI: Trackable, Trace
    ✍ Karen Kilroy, Lynn Riley, Deepak Bhatta πŸ“‚ Library πŸ“… 2023 πŸ› O'Reilly Media 🌐 English

    Remove your doubts about AI and explore how this technology can be future-proofed using blockchain's smart contracts and tamper-evident ledgers. With this practical book, system architects, software engineers, and systems solution specialists will learn how enterprise blockchain provides permanent p

    MATLAB Deep Learning: With Machine Learn
    ✍ Phil Kim πŸ“‚ Library πŸ“… 2017 πŸ› Apress 🌐 English

    <div>Get started with MATLAB for deep learning and AI with this in-depth primer. In this book, you start with machine learning fundamentals, then move on to neural networks, deep learning, and then convolutional neural networks. In a blend of fundamentals and applications, <i>MATLAB Deep Learning</i

    MATLAB Deep Learning: With Machine Learn
    ✍ Phil Kim (auth.) πŸ“‚ Library πŸ“… 2017 πŸ› Apress 🌐 English

    <p>Get started with MATLAB for deep learning and AI with this in-depth primer. In this book, you start with machine learning fundamentals, then move on to neural networks, deep learning, and then convolutional neural networks. In a blend of fundamentals and applications, <i>MATLAB Deep Learning</i>