{"title":"Quantum Internet and E-Governance","authors":"Manan Thakkar, Rakeshkumar Vanzara","doi":"10.4018/978-1-7998-2253-0.ch006","DOIUrl":"https://doi.org/10.4018/978-1-7998-2253-0.ch006","url":null,"abstract":"We are leaving in the era where almost everyone in the world uses internet for the communication over social media site, shopping, E-commerce, online transaction and many more. The exponential growth in usage of internet resulted in security related challenges. Since last several years, traditional cryptography algorithms are found working well. Evolution of quantum computer and its high computing capability can break existing cryptography algorithms. To handle the security constraints, this chapter provides details on evolution of quantum cryptography, components involved to design network architecture for quantum internet, quantum key exchange mechanism and functionality wise stages for quantum internet. This chapter also includes challenges involved in evolution of quantum internet. Further, chapter also contains the details on e-governance, challenges in e-governance and solution using quantum cryptography.","PeriodicalId":443838,"journal":{"name":"Research Anthology on Advancements in Quantum Technology","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132583309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Handwritten Character Recognition Using Quantum Multilayer Neural Network (QMLNN) Architecture","authors":"Debanjan Konar, S. K. Kar","doi":"10.4018/978-1-7998-8593-1.ch021","DOIUrl":"https://doi.org/10.4018/978-1-7998-8593-1.ch021","url":null,"abstract":"This chapter proposes a quantum multi-layer neural network (QMLNN) architecture suitable for handwritten character recognition in real time, assisted by quantum backpropagation of errors calculated from the quantum-inspired fuzziness measure of network output states. It is composed of three second-order neighborhood-topology-based inter-connected layers of neurons represented by qubits known as input, hidden, and output layers. The QMLNN architecture is a feed forward network with standard quantum backpropagation algorithm for the adjustment of its weighted interconnection. QMLNN self-organizes the quantum fuzzy input image information by means of the quantum backpropagating errors at the intermediate and output layers of the architecture. The interconnection weights are described using rotation gates. After the network is stabilized, a quantum observation at the output layer destroys the superposition of quantum states in order to obtain true binary outputs.","PeriodicalId":443838,"journal":{"name":"Research Anthology on Advancements in Quantum Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114245745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum Cryptography Key Distribution","authors":"B. Chander","doi":"10.4018/978-1-7998-2253-0.ch005","DOIUrl":"https://doi.org/10.4018/978-1-7998-2253-0.ch005","url":null,"abstract":"Quantum cryptography is actions to protect transactions through executing the circumstance of quantum physics. Up-to-the-minute cryptography builds security over the primitive ability of fragmenting enormous numbers into relevant primes; however, it features inconvenience with ever-increasing machine computing power along with current mathematical evolution. Among all the disputes, key distribution is the most important trouble in classical cryptography. Quantum cryptography endows with clandestine communication by means of offering a definitive protection statement with the rule of the atmosphere. Exploit quantum mechanics to cryptography can be enlarging unrestricted, unfailing information transmission. This chapter describes the contemporary state of classical cryptography along with the fundamentals of quantum cryptography, quantum protocol key distribution, implementation criteria, quantum protocol suite, quantum resistant cryptography, and large-scale quantum key challenges.","PeriodicalId":443838,"journal":{"name":"Research Anthology on Advancements in Quantum Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114487740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Generalized Parallel Quantum Inspired Evolutionary Algorithm Framework for Hard Subset Selection Problems","authors":"Sulabh Bansal, C. Patvardhan","doi":"10.4018/978-1-7998-8593-1.ch003","DOIUrl":"https://doi.org/10.4018/978-1-7998-8593-1.ch003","url":null,"abstract":"Quantum-inspired evolutionary algorithms (QIEAs) like all evolutionary algorithms (EAs) perform well on many problems but cannot perform equally better than random for all problems due to the No Free Lunch theorem. However, a framework providing near-optimal solutions on reasonably hard instances of a large variety of problems is feasible. It has an effective general strategy for easy incorporation of domain information along with effective control on the randomness in the search process to balance the exploration and exploitation. Moreover, its effective parallel implementation is desired in the current age. Such a Generalized Parallel QIEA framework designed for the solution of Subset Selection Problems is presented here. The computational performance results demonstrate its effectiveness in the solution of different large-sized hard SSPs like the Difficult Knapsack Problem, the Quadratic Knapsack Problem and the Multiple Knapsack problem. This is the first such a generalized framework and is a major step towards creating an adaptive search framework for combinatorial optimization problems.","PeriodicalId":443838,"journal":{"name":"Research Anthology on Advancements in Quantum Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116052149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}