OceanofPDF.com Quantum Computing the Future of Information - Shrikant Tiwari
OceanofPDF.com Quantum Computing the Future of Information - Shrikant Tiwari
com
Quantum Computing
Quantum computing and algorithms are set to revolutionize information
processing. Covering such topics, Quantum Computing: The Future of
Information Processing explains its principles, practical applications, and
future implications in a clear and accessible manner. The book strives to
simplify the essential concepts and practical applications of quantum
computing. Its aim is to help students and researchers to apply quantum
computing to advance AI and machine learning, cybersecurity, and
blockchain. With its emphasis on practical applications, the book covers
how quantum computing is changing such fields as:
Finance
Medicine
Built environment
Networking and communications
OceanofPDF.com
Quantum Computing
The Future of Information Processing
OceanofPDF.com
First edition published 2025
2385 NW Executive Center Drive, Suite 320, Boca Raton FL 33431
and by CRC Press
4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN
Reasonable efforts have been made to publish reliable data and information,
but the authors and publisher cannot assume responsibility for the validity
of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in
this publication and apologize to copyright holders if permission to publish
in this form has not been obtained. If any copyright material has not been
acknowledged please write and let us know so we may rectify in any future
reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be
reprinted, reproduced, transmitted, or utilized in any form by any electronic,
mechanical, or other means, now known or hereafter invented, including
photocopying, microfilming, and recording, or in any information storage
or retrieval system, without written permission from the publishers.
DOI: 10.1201/9781003499459
OceanofPDF.com
Contents
Preface
List of Contributors
1.1 Introduction
1.1.1 Overview of Quantum Computing
1.2 Fundamentals of Quantum Computing
1.2.1 Quantum Mechanics Principles
1.2.2 Quantum Bits and Superposition
1.2.3 Quantum Gates and Quantum Circuits
1.3 Barriers in Quantum Computing
1.3.1 Quantum Noise and Decoherence
1.3.2 Quantum Error Correction
1.3.3 Scalability and Quantum System Size
1.3.4 Quantum Algorithm Design and Optimisation
1.3.5 Quantum Software and Programming Languages
1.4 Statements and Achievements in Quantum Computing
1.4.1 Quantum Supremacy
1.4.2 Major Breakthroughs in Quantum Computing
1.4.3 Quantum Cryptography and Secure
Communication
1.4.4 Quantum Simulation and Optimisation
1.4.5 Quantum Machine Learning and Artificial
Intelligence
1.5 Advancements in Quantum Computing Technologies
1.5.1 Quantum Hardware Developments
1.5.2 Quantum Computing Architectures
1.5.3 Quantum Computing Platforms and Companies
1.5.4 Quantum Networking and Interconnectivity
1.6 Open Issues in Quantum Computing for Future
Generations
1.7 Important Challenges in Quantum Computing for Future
Generations
1.8 Potential Areas of Study for Quantum Computing
1.9 Quantum Computing Ecosystem and Collaboration
1.10 Future Trends and Research Directions towards
Quantum Computing with Emerging Technologies
1.11 Conclusion
References
3.1 Introduction
3.1.1 A Summary of the Unique Capabilities of
Quantum Information Processing
3.1.2 Potential Benefits for Some Tasks over Classical
Computing
3.1.3 Importance of Exploring Practical Uses for
Quantum Computing
3.2 Quantum Simulation and Chemistry
3.2.1 Modelling and Simulating Complex Quantum
Systems (Atoms, Molecules, Materials)
3.2.2 Accurate Prediction of Chemical Properties and
Reactions
3.2.3 Applications in Materials Science, Energy
Research, and Medicinal Development
3.3 Problems with Scheduling and Optimisation
3.3.1 Quantum Optimisation Methods (Quantum
Annealing, Grover’s Algorithm)
3.3.2 Applications in Logistics, Scheduling, Resource
Allocation, and Portfolio Optimisation
3.3.3 Solving Complex Combinatorial Optimisation
Problems
3.4 Cryptography and Cybersecurity
3.4.1 Secure Communication and Quantum Key
Distribution
3.4.2 Post-Quantum Cryptography and Quantum-
Resistant Algorithms
3.4.3 Implications for Data Security and Privacy
3.5 Artificial Intelligence and Machine Learning
3.5.1 Machine Learning Tasks Using Quantum
Algorithms (Quantum Neural Networks)
3.5.2 Potential Speedups for Certain Learning Tasks
and Data Processing
3.5.3 Applications in Pattern Recognition, Data
Analysis, and Decision-Making
3.6 Finance and Risk Analysis
3.6.1 Quantum Algorithms for Financial Modelling
and Risk Assessment
3.6.2 Portfolio Optimisation and Pricing of Financial
Derivatives
3.6.3 Applications in Quantitative Finance and Risk
Management
3.7 Scientific Computing and Data Analysis
3.7.1 Quantum Algorithms for Linear Algebra and
Data Processing
3.7.2 Efficient Data Search and Pattern Recognition
3.7.3 Applications in Bioinformatics, Scientific
Simulations, and Big Data Analysis
3.8 Other Emerging Applications
3.8.1 Quantum Computing in Communication
Networks and the Quantum Web
3.8.2 Sensing and Quantum Metrology
3.8.3 Applications in Aerospace
3.8.4 Applications in Defence
3.8.5 Challenges and Opportunities
3.9 Obstacles and Prospects for the Future
3.9.1 Current Limitations and Obstacles to Practical
Quantum Information Processing
3.9.2 Scaling Up Quantum Computers and
Overcoming Noise and Decoherence
3.9.3 Future Developments and Potential
Breakthroughs in Quantum Data Handling
3.10 Conclusion
References
5.1 Introduction
5.2 Fundamentals of Quantum Computing
5.2.1 Quantum Algorithms and Computational
Advantage
5.3 Current State of Quantum Computing Technology
5.3.1 Practical Implementations of Quantum
Computing in Real-World Scenarios
5.4 Challenges and Considerations in Quantum Computing
5.5 Conclusion
5.5.1 Future Directions
References
6.1 Introduction
6.2 Related Work
6.3 Methodology
6.3.1 Data Pre-Processing and Visualization
6.3.2 Feature Selection
6.3.3 Algorithms for Malware Detection
6.3.4 Federated Learning
6.4 Results and Discussion
6.5 Conclusion
References
7.1 Introduction
7.2 Integrating QC and ML
7.2.1 Exponential Computational Speedup
7.2.2 Handling High-Dimensional Data
7.2.3 Enhanced Optimization and Search
7.2.4 Quantum Chemistry Simulations
7.2.5 Discovery of Novel Therapeutics
7.3 Fundamentals of Quantum Computing
7.3.1 Basic Principles of Quantum Mechanics
7.3.2 Quantum Gates and Circuits
7.4 Quantum Algorithms
7.5 Quantum Machine Learning
7.5.1 Dataset Selection
7.5.2 Data Pre-Processing
7.5.3 Quantum Data Encoding
7.5.4 Quantum Circuit/Algorithm Construction
7.5.5 Quantum Processing
7.5.6 Measurement and Post-Processing
7.5.7 Feedback Loop
7.5.8 Evaluation and Validation
7.5.9 Deployment and Application
7.5.10 Monitoring and Maintenance
7.6 QML Algorithms
7.6.1 Quantum Circuit-Based Algorithms
7.7 Implications of Quantum Algorithms in Drug Discovery
7.7.1 Quantum Simulation of Molecular Systems
7.7.2 Quantum Database Search and Screening
7.7.3 Optimization of Molecular Structures and
Properties
7.7.4 Enhanced Machine Learning with Quantum Data
7.8 Applications of QML in Drug Discovery
7.8.1 Molecular Structure Prediction
7.8.2 Drug Target Identification and Validation
7.8.3 Pharmacokinetics Prediction
7.8.4 Pharmacodynamics Prediction
7.8.5 Drug Repurposing
7.8.6 Polypharmacology
7.9 Personalized Medicine and Precision Drug Design
7.9.1 Analysis of Multi-Omics Data
7.9.2 Predictive Modeling for Treatment Response
7.9.3 Drug Sensitivity Prediction
7.9.4 Precision Drug Design
7.10 Current Challenges in QML for Drug Discovery
7.11 Success Stories and Breakthroughs Demonstrating the
Utility of QML
7.11.1 Molecular Property Prediction
7.11.2 Compound Screening
7.11.3 De Novo Drug Design
7.11.4 Target Identification and Validation
7.11.5 Personalized Medicine
7.12 Conclusion and Future Perspectives
References
8.1 Introduction
8.2 Quantum Computing Primer
8.2.1 Quantum Algorithms
8.2.2 Quantum Hardware
8.2.3 Quantum Error Correction
8.2.4 Applications of Quantum Computing
8.2.5 Challenges and Future Directions
8.3 Neural Networks Overview
8.4 Quantum Circuit Representations
8.5 Quantum Gates and Operations
8.6 Quantum Neuron Models
8.7 Training Quantum Neural Networks
8.8 Quantum vs. Classical Neural Networks
8.9 Applications of Quantum Neural Networks
8.10 Conclusion
References
9.1 Introduction
9.2 Quantum Computing Foundations
9.2.1 Fundamental Units of Quantum Computing
9.2.2 Qubit Neuron Model
9.3 Quantum Machine Learning
9.4 Quantum Neural Network
9.4.1 Mathematical Foundations of Quantum Neural
Networks
9.5 Literature Review
9.5.1 Review of Related Literature
9.6 Quantum Algorithm Modeling Overview
9.7 Methodology and Material
9.7.1 Description of the Quantum Neural Network
Implemented Model
9.7.2 Description of the Classical Neural Network
Implemented Model
9.8 Results and Analysis
9.8.1 Experimentation Results of Both the Classical
Neural Network and Quantum Neural Network
9.9 Conclusion and Recommendations for Further Work
References
10.1 Introduction
10.2 Incorporating Artificial Intelligence into Cybersecurity
Forensics
10.3 Machines Have the Potential to Assist Detectives in
Identifying Crucial Clues
10.4 The Role of Artificial Intelligence in the Cyber
Ecosystem
10.5 AI Techniques in Cybersecurity Forensics
10.6 Applications of AI in Cybersecurity Forensics
10.7 Ethical Consideration of AI in Cybersecurity Forensics
10.8 Legal Consideration of AI in Cybersecurity Forensics
10.9 Case Study
10.10 Obstacles and Future Directions
10.11 Conclusion
References
11.1 Introduction
11.1.1 The Application of Quantum Computing in EO
11.1.2 Quantum Computing Basics
11.2 Quantum Deep Learning for Remote Sensing Imagery
Classification
11.3 Literature Review
11.4 Introduction to Classical and Quantum Deep Learning
11.5 Quantum Neural Network Integration
11.5.1 Feature Mapping and Preparing Quantum States
11.5.2 Quantum Representation via Gate Operations
11.5.3 Application of Parameterized Quantum Circuits
11.6 Key Enhancements
11.6.1 Quantum Parallelism
11.6.2 Superposition
11.6.3 Entanglement
11.7 Methodology
11.8 Data Preprocessing
11.9 Quantum Feature Extraction
11.10 Quantum Neural Network Architecture
11.11 Training Process
11.12 Land-Use/Land-Cover Classification
11.13 Key Components
11.13.1 Quantum Gates and Circuits
11.13.2 Quantum Backpropagation
11.13.3 Optimization Techniques
11.14 EuroSET Dataset and Pre-Processing
11.15 Pre-Processing
11.16 Classical Deep Learning Techniques
11.17 Results
11.18 Conclusion
11.19 Future Work
References
12.1 Introduction
12.1.1 Literature Review
12.1.2 Applications of QPSO
12.2 Particle Swarm Optimisation
12.3 Quantum Particle Swarm Optimisation
12.4 Mutation-Based Quantum Particle Swarm Optimisation
12.5 Experimental Results
12.6 Conclusion
References
13.1 Introduction
13.2 Origins and Evolution
13.3 Proposed Methodology
13.3.1 Methodology
13.3.2 Architecture Overview
13.3.3 Content Verification Mechanism
13.3.4 Consensus Protocol Selection
13.3.5 Blockchain Technology
13.3.6 Use Case Definition
13.3.7 User Interface and Experience
13.3.8 Deployment and Testing
13.4 Modeling and Analysis
13.4.1 Theoretical Frameworks Used
13.5 Results and Discussion
13.6 Conclusion
References
16.1 Introduction
16.1.1 The Current Landscape of Healthcare Data
Security
16.2 Principles of Quantum Cryptography
16.2.1 Quantum Key Distribution
16.2.2 Security Properties of QKD
16.3 Requirements of Quantum Cryptography for Healthcare
16.3.1 Secure Quantum Key Distribution
16.3.2 Integration with Existing Systems
16.3.3 Scalability
16.3.4 Cost-Effectiveness
16.3.5 User Training and Awareness
16.3.6 Regulatory Compliance
16.3.7 Robustness and Reliability
16.3.8 Data Integrity and Authentication
16.3.9 Future-Proofing
16.3.10 Privacy Preservation
16.4 Algorithms for Quantum Cryptography
16.4.1 BB84 Protocol
16.4.2 E91 Protocol
16.5 Implementing QKD in Healthcare Systems
16.5.1 Quantum Cryptographic Hardware
16.5.2 Integration with Existing IT Infrastructure
16.5.3 Establishing Secure Quantum Communication
Channels
16.6 Expected Outcomes of Implementing Quantum
Cryptography in Healthcare
16.6.1 Enhanced Data Security
16.6.2 Improved Data Integrity and Confidentiality
16.6.3 Increased Availability of Secure Communication
16.7 Materials and Methods
16.7.1 Classical Cryptographic Infrastructure
16.8 Design and Implementation of QKD Systems
16.9 Practical Steps for Implementation
16.10 Applications of Quantum in Healthcare
16.10.1 Drug Discovery and Development
16.10.2 Medical Imaging
16.10.3 Genomics and Personalized Medicine
16.11 Conclusion
References
17.1 Introduction
17.2 Quantum Cryptanalysis
17.3 Limitations in Theoretical and Fundamental Aspects
17.4 Quantum Malware and Quantum Attacks
17.5 Hacks Using Quantum Replay
17.6 Data Harvesting for Future Decryption
17.7 Challenges
17.8 Future Directions
17.9 Conclusion
References
18.1 Introduction
18.2 Architecture and Functionality of IDPSs
18.3 Types of IDPSs
18.3.1 Network-Based IDPSs
18.3.2 Host-Based IDPSs
18.3.3 Hybrid IDPSs
18.4 Detection Techniques
18.4.1 Signature-Based Detection
18.4.2 Anomaly-Based Detection
18.4.3 Hybrid Detection
18.5 Deployment Strategies
18.5.1 Network Placement
18.5.2 Scalability and Performance
18.5.3 Integration with Existing Infrastructure
18.6 Best Practices for Implementation
18.7 Conclusion
References
19.1 Introduction
19.1.1 The Evolution of 6G
19.1.2 Need for Security
19.1.3 Data Privacy and Security Issues in 6G
19.2 Literature Review
19.2.1 Trends in Data Encryption for 6G
Communication Systems
19.2.2 Current Encryption Techniques in 5G Networks
19.2.3 Constraints in Current Systems for Future 6G
Networks
19.3 System Architecture and Design
19.3.1 AES, RSA, and ZKP Algorithm Design
19.3.2 Proposed Algorithm Framework
19.4 Proposed Methodology Using ZKP
19.4.1 Experimental Setup
19.4.2 Encryption Techniques
19.4.3 Experimental Procedure
19.5 Coding and Testing
19.5.1 Proposed Algorithm Code Analysis
19.5.2 System Monitoring Code Analysis
19.6 Results and Discussion
19.7 Conclusion and Future Enhancement
References
Index
OceanofPDF.com
Preface
In this smart era, we need to explore the cutting-edge world of quantum
computing, which is quite interesting and has attracted scientific interest
(around the globe). We need to explain such interesting topics like qubits,
superposition, and entanglement and need to discover how quantum
algorithms are used to revolutionize information processing. We will
explain the latest developments, practical applications, and the potential to
transform fields from cryptography to artificial intelligence in this book.
The purpose of this book is to bridge the gap between the rapidly evolving
field of quantum computing and those eager to understand its potential
impact. Quantum computing is at the forefront of technological innovation,
and there is a need for a resource that explains its principles, practical
applications, and future implications in a clear and accessible manner.
This book will discuss quantum computing and its related terms in detail.
This book will take future readers/researchers on a journey from the
fundamental principles of quantum mechanics to the practical applications
reshaping industries like blockchain, cybersecurity, machine learning, and
finance as well as real-world case studies to provide a unique addition on
the technology’s impact today. Hence, this book will present a clear
roadmap for practical implementation, guiding readers through the complex
process of integrating quantum computing into their real-world
applications.
OceanofPDF.com
Contributors
Anju A.
Department of Information Technology
KCG College of Technology
Chennai, India
E. AbidemiAwujoola
Biotechnology Department
Nigerian Defence Academy
Kaduna, Nigeria
O. Abioye
Directorate of ICT
Nigerian Defence Academy
O. Christiana Akusu
Physics Department
Nigerian Defence Academy
Kaduna, Nigeria
Puneet Anchalia
School of Computer Science and Engineering
Vellore Institute of Technology, Chennai
P. Manju Bala
IFET College of Engineering
Valavanur, Villupuram, Tamil Nadu
A. Balachandar
IFET College of Engineering
Valavanur, Villupuram, Tamil Nadu
Sonali Balouria
Department of Forensic science
University Institute of Applied Health
Science Chandigarh University Ludhiana, Punjab
M. Baritha Begum
Department of Electronics and Communication Engineering
Saranathan College of Engineering Tiruchirapalli
Tamil Nadu, India
Ashish Choudhary
Vellore Institute of Technology
Chennai, India
Shefali Chaudhary
Department of Forensic science
University Institute of Applied Health
Science Chandigarh University
Ludhiana, Punjab
Tania Debnath
Department of Forensic science
University Institute of Applied Health
Science Chandigarh University
Ludhiana, Punjab
T. Aniemeka Enem
Cyber Security Department
Airforce Institute of Technology
Kaduna, Nigeria
Ushaa Eswaran
Department of ECE Mahalakshmi Tech Campus
Anna university, Chennai
Tamilnadu, India
Vishal Eswaran
CVS Health Centre
Dallas, Texas, United States
Vivek Eswaran
Tech Lead at Medallia
Austin, Texas, United States
Joseph Fisher
Department of Electrical and Communication Engineering
University of Technology, Lae
Papua New Guinea
Anindya Ghatak
School of Computer Science Engineering and Technology
Bennett University Gautam Buddha Nagar
Uttar Pradesh, India
Leoson Heisnam
School of Forensic Science
Uttar Pradesh State Institute of Forensic Science
Lucknow, Uttar Pradesh, India
Ranjith J.
Vellore Institute of Technology
Chennai, India
Pragati Jain
Swami Vivekanand Subharti University
Meerut, Uttar Pradesh, India
Biswajit Jana
School of Computer Science Engineering and Technology
Bennett University, Gautam Buddha Nagar
Uttar Pradesh, India
D. Kavitha
School of Computer Science and Engineering
Vellore Institute of Technology
Chennai, India
S. Sijin Kumar
Comcast
Philadelphia, Pennsylvania, USA
Shabnam Kumari
Department of Computer Science, College of Science and Humanities
SRM Institute of Science and Technology Kattankulathur
Chennai, Tamilnadu, India
Ajanthaa Lakkshmanan
Department of Computing Technologies
SRM Institute of Science and Technology
Kattankulathur, India
Kandan M.
Department of Computing Technologies, School of Computing, College of
Engineering and Technology
SRM Institute of Science and Technology Kattankulathur
Tamilnadu, India
S. Nalini
Department of Computing
Technologies, School of Computing,
SRM Institute of Science & Technology Kattankulathur
TamilNadu, India
Niranjanamurthy M.
Department of Artificial Intelligence (AI) and Machine Learning (ML),
BMS Institute of Technology and Management
Bangalore, Karnataka, India
Manmohan Mishra
Department of Computer Science Application
United Institute of Management Prayagraj (Allahabad), Uttar Pradesh, India
Keerthna Murali
Cybersecurity Site Reliability Engineer II
(SRE) at Dell EMC | CKAD | AWS CSAA, Austin, Texas, United States
Krishnaraj N.
Department of Networking and Communications, School of Computing
College of Engineering and Technology
SRM Institute of Science and Technology Kattankulathur
Tamilnadu, India
R. OlayinkaAdelegan
Computer Science Department
Nigerian Defence Academy
Kaduna, Nigeria
J. Adeyemi Owolabi
Physics Department
Nigerian Defence Academy
Kaduna, Nigeria
Adline Freeda R.
Department of Information Technology
KCG College of Technology
Chennai, India
Ciro Rodriguez R.
Department of Software Engineering Universidad Nacional Mayor de San
Marcos UNMSM
Faculty of Informatics and Electronic
Universidad Nacional Federico Villarreal
Villarreal, Spain
Dhaya R.
Department of Information Technology
KCG College of Technology
Chennai, India
Kanthavel R.
Department of Electrical and Communication Engineering, University of
Technology
Lae, Papua New Guinea
Saranniya S.
Institute of Computer Science and Engineering
Saveetha School of Engineering, Saveetha Institute of Medical and
Technical Sciences
Saveetha University
Chennai, India
M. Sandhiya
Department of Electronics and Communication Engineering
Panimalar Engineering College
Chennai, India
Suresh Sankaranarayanan
Department of Computer Science
College of Computer Science and Information Technology
King Faisal University
Al-Ahsa, Alhofuf, Kingdom of Saudi Arabia
P. Selvaraj
Department of Computating Technologies
SRM Institute of Science and Technology
Chennai, India
Vedant Singh
Department of Data Science and Business Systems
SRM Institute of Science and Technology
Kattankulathur, Chennai, India
G.S. Smrithy
School of Computer Science and Engineering
Vellore Institute of Technology, Chennai
Priyanga Subbiah
Department of Networking and Communications, School of Computing
College of Engineering and Technology SRM Institute of Science and
Technology Kattankulathur
Tamilnadu, India
Suresh Balakrishnan T.
Department of Computer Science and Engineering
Saveetha School of Engineering, Saveetha Institute of Medical and
Technical Sciences Saveetha University
Chennai, India
Andleeb Tanveer
Department of Data Science and Business Systems
SRM Institute of Science and Technology
Kattankulathur, Chennai, India
Shaji. K.A. Theodore
Faculty of IT, College of Computing and Information Sciences
University of Technology and Applied Sciences
Sultanate of Oman
R. Thillaikarasi
Department of Information Technology
Saranathan College of Engineering
Tiruchirapalli, Tamil Nadu, India
Shrikant Tiwari
Department of Computer Science & Engineering
School of Computing Science and Engineering (SCSE), Galgotias
University
Greater Noida, Uttar Pradesh, India
S. Usharani
IFET College of Engineering
Gangarampalaiyam,Tamil Nadu, India
Kalpana A.V.
Department of Data Science and Business Systems
SRM Institute of Science and TechnologyKattankulathur, Chennai
S. Krithikaa Venket
Dept. of Information Technology
KCG College of Technology
Chennai, India
Priyanka Verma
Department of Forensic Science
University Institute of Applied Health Sciences
Chandigarh University, Mohali, India
Frank Vijay
Dept. of Information Technology
KCG College of Technology
Chennai, India
OceanofPDF.com
1 Quantum Computing
Evolution, Recent Advancements, Future
Opportunities, and Challenges for Future
Generations
Senthil Kumar Arumugam, Bukola Fatimah
Balogun, Ajanthaa Lakkshmanan, and Amit
Kumar Tyagi
DOI: 10.1201/9781003499459-1
1.1 INTRODUCTION
These principles form the basis of quantum mechanics and underpin the
unique behaviour and capabilities of quantum systems. They are harnessed
in the design and implementation of quantum algorithms such as quantum
computers, cryptography, and sensors.
Pauli gates are the most basic type of single-qubit gate. Among them
are:
These are the few examples of quantum gates, and there are many more that
perform various operations on qubits. Hence, a quantum circuit represents
the flow of quantum information and operations. Qubits are initialised to
specific states, and quantum gates are applied sequentially to perform
transformations on the qubits. The final state of the qubits after the circuit
represents the result of the computation. Note that quantum circuits are
designed to implement quantum algorithms and solve specific problems
efficiently. By combining various quantum gates and designing suitable
circuits, quantum computers can perform complex computations and
outperform classical computers for certain tasks.
1.3 BARRIERS IN QUANTUM COMPUTING
Since many physical qubits are needed to encode a single logical qubit and
because precise and exact operations are required, it is important to keep in
mind that implementing quantum error correction is difficult [4–7].
Furthermore, error correction procedures consume additional computational
resources and increase the complexity of quantum algorithms.
While quantum machine learning is an exciting field with the potential for
new information and computational advantages, it is important to note that
practical applications of QML are still in their early stages. The field
requires advancements in quantum hardware, improved error correction
techniques, and the development of quantum algorithms specifically
tailored for machine learning tasks [19, 20]. Ongoing research and
collaboration between quantum scientists and machine learning experts are
key to realising the full potential of quantum machine learning and its
integration with artificial intelligence.
Note that these architectures are not mutually exclusive, and researchers are
exploring hybrid approaches and combinations of different technologies to
use their respective strengths. Each architecture has its own set of
challenges, including maintaining qubit coherence, improving gate
fidelities, achieving scalability, and addressing noise and error sources. As
quantum computing continues to advance, ongoing research and
development aim to optimise and combine these architectures to build
practical and scalable quantum computers capable of solving complex
problems with advantages over classical computing.
Note that these research directions and emerging technologies have the
potential to address current challenges in quantum computing, improve
qubit performance and coherence, enhance scalability, and expand the range
of applications for quantum systems. Collaborative efforts among academia,
industry, and research institutions will be key to advancing these areas and
accelerating the development of practical and powerful quantum computing
technologies.
1.11 CONCLUSION
Quantum computing has rapidly evolved from a theoretical concept to a
field of significant research and development. However, there are still
challenges and open questions that need to be addressed for future
generations of quantum systems. In terms of recent advancements,
significant progress has been made in scaling quantum hardware, with
notable achievements in increasing qubit counts, improving coherence
times, and enhancing gate fidelities. This progress has been accompanied by
breakthroughs in quantum algorithms and quantum simulation techniques
for studying complex quantum systems. Quantum machine learning,
quantum cryptography, and optimisation algorithms are also emerging areas
of exploration. Further, we discuss future opportunities in quantum
computing that lie in addressing useful challenges. These include enhancing
qubit coherence and developing effective error correction and fault-tolerant
methods. The development of quantum networking and quantum
communication protocols is important for realising distributed quantum
computing and secure quantum information transmission. Exploring new
quantum algorithms, optimising existing ones, and identifying practical
applications where quantum computing provides significant advantages will
be key for further advancements. Hence, the future of quantum computing
holds immense opportunities across various domains. Quantum machine
learning, quantum simulations, and quantum chemistry are among the
promising application areas where quantum computing can unlock new
capabilities and information. However, several challenges must be
addressed for the widespread adoption of quantum computing. Quantum
systems are highly susceptible to noise and errors due to decoherence and
interactions with the environment. Developing robust error correction
techniques, fault-tolerant quantum computing, and efficient error mitigation
strategies are important to overcome these challenges.
REFERENCES
DOI: 10.1201/9781003499459-2
| ψ⟩= α| 0⟩+β|1>
Hence, quantum neural networks have the potential to excel in tasks that
involve quantum data or require the processing of complex, high-
dimensional data. While they are still an active area of research and
development, they hold great promise for addressing problems beyond the
capabilities of classical neural networks, particularly in the context of
quantum machine learning and quantum data analysis.
Image Processing:
Note that practical, fault-tolerant quantum computers for image and natural
language processing applications are still under development. As quantum
hardware and algorithms continue to advance, they hold the potential to
transform these fields by providing more efficient and accurate solutions for
a wide range of image and text analysis tasks.
Benefits:
Limitations:
2.8 CONCLUSION
Today the application of qubits in AI and ML represents a promising
frontier in the ongoing evolution of these fields. The potential of quantum
computing to accelerate and optimize AI and ML tasks is undeniable, and as
quantum hardware and algorithms continue to grow. We can focus on the
following points in near future as future research; that is, quantum
computing provides the potential for substantial speedup in AI and ML
tasks, making complex calculations and optimization problems more
efficient. Further, quantum-enhanced machine learning models and
algorithms can significantly improve the accuracy and performance of AI
systems. Also, quantum computers can simulate physical systems with
greater accuracy, benefiting fields like chemistry, material science, and
environmental modeling. The convergence between quantum and classical
computing resources holds the key to practical implementations of
quantum-enhanced AI and ML. Finally, as the future is promising, we must
address challenges related to quantum hardware, error correction, algorithm
development, and accessibility. Note that as quantum computing technology
matures and becomes more accessible, it holds the potential to unlock new
capabilities, address complex problems, and drive innovation across
numerous industries. In the near future, quantum-enhanced AI and ML will
be more useful to revolutionize the way we process data, make decisions,
and understand the world around us, providing exciting possibilities for the
future of AI and ML.
REFERENCES
OceanofPDF.com
3 Quantum Computing Applications
Ushaa Eswaran, Vivek Eswaran, Keerthna
Murali, and Vishal Eswaran
DOI: 10.1201/9781003499459-3
3.1 INTRODUCTION
Grover’s approach, while not an optimisation algorithm per se, can be used
in conjunction with other strategies to outperform traditional methods in the
solution of optimisation problems (Brassard et al., 2002). Applications for it
include graph colouring, constraint satisfaction issues, and database search
(Montanaro, 2016).
A summary of quantum optimisation algorithms in financial applications
is shown in Table 3.1. In the context of portfolio optimisation and derivative
pricing in quantitative finance, this table presents an overview of the
performance or outcomes of quantum optimisation algorithms, such as
quantum annealing and quantum approximate optimisation algorithms
(QAOAs), in comparison to classical approaches.
TABLE 3.1
Summary of Quantum Optimisation Algorithms in Financial
Applications
Performance
Algorithm Problem
Comparison
Quantum Traveling Salesman
Quantum: 90% accuracy
Annealing Problem
Classical: 85% accuracy
QAOA Job Scheduling Quantum: 95% efficiency
Classical: 80% efficiency
TABLE 3.2
Potential Speedup/Improvement in Computational Tasks with
Quantum Algorithms in Finance and Risk Analysis
Potential Speedup/Improvement with Quantum
Computational Task
Algorithms
Reduced computation time for complex pricing
Derivative Pricing
models
Portfolio Enhanced optimisation capabilities for large
Optimisation portfolios
Improved accuracy and efficiency in risk
Risk Modelling
assessment
Trading and Market Analysis:
With quantum machine learning algorithms and optimisation
approaches, quantum computing shows potential for improving trading
tactics and market analysis. Algorithms created by Cao et al. show how
quantum computing may enhance arbitrage detection, market trend
analysis, and algorithmic trading. Quantum algorithms, for instance,
may more quickly and effectively evaluate enormous volumes of
market data, spot intricate patterns, and real-time optimise trading
tactics. Quantum optimisation techniques can also be used for asset
allocation, order execution procedures, and portfolio optimisation,
which could provide financial markets competitors an advantage.
Case Studies:
TABLE 3.3
Current Limitations and Challenges in Quantum Computing, along
with Potential Solutions
Challenges Potential Solutions/Research Directions
Error correction codes, better qubit fabrication
Qubit Quality
techniques
Fault-tolerant quantum computation and quantum
Error Rates
error correction
Improved qubit connectivity, quantum error
Scalability
correction, fault tolerance
Error mitigation techniques, enhanced qubit
Decoherence
coherence times
Challenges Potential Solutions/Research Directions
Development of more reliable quantum gate
Quantum Gates
operations
Calibration and control techniques for addressing
Hardware Variability
hardware variations
Noise and Noise-resilient algorithms, error mitigation
Interference strategies
Quantum Software Optimisation of quantum algorithms for specific
Design hardware platforms
Quantum Algorithm Research into new quantum algorithms tailored for
Design practical problems
3.10 CONCLUSION
A paradigm shift in how we think about computation and information
processing is represented by quantum computing. This innovative
technology has the potential to revolutionise multiple fields and spur
advances by utilising the principles of quantum physics. This chapter has
examined the broad spectrum of quantum computing applications,
highlighting the unique features and advantages that this technology has to
offer.
REFERENCES
Alagic, G., Apon, D., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger,
J., Liu, Y. K., Miller, C., Moody, D., Peralta, R., Perlner, R., Robinson,
A., Smith-Tone, D., Alperin-Sheriff, J., & Yoast-Hull, Z. (2022). Status
report on the third round of the NIST post-quantum cryptography
standardization process. US Department of Commerce, National Institute
of Standards and Technology. https://doi.org/10.6028/NIST.IR.8413
Albash, T., & Lidar, D. A. (2018). Adiabatic quantum computation. Reviews
of Modern Physics, 90(1), 015002.
https://doi.org/10.1103/RevModPhys.90.015002
Aspuru-Guzik, A., Dutoi, A. D., Love, P. J., & Head-Gordon, M. (2005).
Simulated quantum computation of molecular energies. Science,
309(5741), 1704–1707. https://doi.org/10.1126/science.1113479
Bennett, C. H., & Brassard, G. (2014). Quantum cryptography: Public key
distribution and coin tossing. Theoretical Computer Science, 560, 7–11.
https://doi.org/10.1016/j.tcs.2014.05.025
Bernstein, D. J., & Lange, T. (2017). Post-quantum cryptography. Nature,
549(7671), 188–194. https://doi.org/10.1038/nature23461
Biamonte, J., Wittek, P., Pancotti, N., Rebentrost, P., Wiebe, N., & Lloyd, S.
(2017). Quantum machine learning. Nature, 549(7671), 195–202.
https://doi.org/10.1038/nature23474
Boixo, S., Brandao, F. G. S. L., Buell, D. A., Burkett, B., Chen, Y., Chen,
Z., Chiaro, B., Collins, R., Courtney, W., Dunsworth, A. and Farhi, E.,
2019. Quantum supremacy using a programmable superconducting
processor. Nature, 574, 505–510.
https://simons.berkeley.edu/sites/default/files/docs/15610/boixosupremac
ymay42020.pdf
Brassard, G., Høyer, P., Mosca, M., & Tapp, A. (2002). Quantum amplitude
amplification and estimation. Contemporary Mathematics, 305, 53–74.
https://doi.org/10.48550/arXiv.quant-ph/0005055
Cao, Y., Romero, J., Olson, J. P., Degroote, M., Johnson, P. D., Kieferová,
M., Kivlichan, I. D., Menke, T., Peropadre, B., Sawaya, N. P. D., Sim, S.,
Veis, L., & Aspuru-Guzik, A. (2019). Chemical Reviews, 119(19),
10856–10915. https://doi.org/10.1021/acs.chemrev.8b00803
Dunjko, V., & Briegel, H. J. (2018). Machine learning & artificial
intelligence in the quantum domain: A review of recent progress. Reports
on Progress in Physics, 81(7), 074001. https://doi.org/10.1088/1361-
6633/aab406
Feld, S., Roch, C., Gabor, T., Seidel, C., Neukart, F., Galter, I., Mauerer, W.,
& Linnhoff-Popien, C. (2019). A hybrid solution method for the
capacitated vehicle routing problem using a quantum annealer.
arXiv:1811.07403 [quant-ph]. https://doi.org/10.48550/arXiv.1811.07403
Grover, L. K. (1996). A fast quantum mechanical algorithm for database
search. In Proceedings of the twenty-eighth annual ACM symposium on
Theory of computing (pp. 212–219).
https://doi.org/10.1145/237814.237866
Hauke, P., Katzgraber, H. G., Lechner, W., Nishimori, H., & Oliver, W. D.
(2020). Perspectives of quantum annealing: Methods and
implementations. Reports on Progress in Physics, 83(5), 054401.
https://doi.org/10.1088/1361-6633/ab85b8
Kadowaki, T., & Nishimori, H. (1998). Quantum annealing in the transverse
Ising model. Physical Review E, 58(5), 5355.
https://doi.org/10.1103/PhysRevE.58.5355
Ladd, T. D., Jelezko, F., Laflamme, R., Nakamura, Y., Monroe, C., &
O’Brien, J. L. (2010). Quantum computers. Nature, 464(7285), 45–53.
https://doi.org/10.1038/nature08812
Lanyon, B. P., Whitfield, J. D., Gillett, G. G., Goggin, M. E., Almeida, M.
P., Kassal, I., Biamonte, J. D., Mohseni, M., Powell, B. J., Barbieri, M.,
Aspuru-Guzik, A., & White, A. G. (2010). Towards quantum chemistry
on a quantum computer. Nature Chemistry, 2, 106–111.
https://doi.org/10.1038/nchem.483
Lucas, A. (2014). Ising formulations of many NP problems. Frontiers in
Physics, 2, 5. https://doi.org/10.3389/fphy.2014.00005
Lüthi, H. P., Heinen, S., Schneider, G., Glöss, A., Brändle, M. P., King, R.
A., Pyzer-Knapp, E., Alharbi, F. H., & Kais, S. (2016). The quantum
chemical search for novel materials and the issue of data processing: The
InfoMol project. Journal of Computational Science, 15, 65–73.
https://doi.org/10.1016/j.jocs.2015.10.003
Montanaro, A. (2016). Quantum algorithms: An overview. npj Quantum
Information, 2, 15023. https://doi.org/10.1038/npjqi.2015.23
Nielsen, M. A., & Chuang, I. L. (2010). Quantum computation and
quantum information. Cambridge University Press.
Otgonbayer, Z., Neukart, F., Scholten, R., Sebastiani, D., & Kehrle, M.
(2021). Quantum approximate optimization for the nurse scheduling
problem. arXiv preprint arXiv:2111.05909.
https://doi.org/10.48550/arXiv.1812.01041
Preskill, J. (2018). Quantum computing in the NISQ era and beyond.
Quantum, 2, 79. https://doi.org/10.22331/q-2018-08-06-79
Reiher, M., Wiebe, N., Svore, K. M., Wecker, D., & Troyer, M. (2017).
Elucidating reaction mechanisms on quantum computers. Proceedings of
the National Academy of Sciences, 114(29), 7555–7560.
https://doi.org/10.1073/pnas.1619152114
Shor, P. W. (1997). Polynomial-time algorithms for prime factorization and
discrete logarithms on a quantum computer. SIAM Review, 41(2), 303–
332. https://doi.org/10.1137/S0036144598347011
OceanofPDF.com
4 Qubit-Based Applications for Next
Generation Society
Kandan M., Priyanga Subbiah, Krishnaraj N.,
and Shaji. K.A. Theodore
DOI: 10.1201/9781003499459-4
TABLE 4.1
Outlining Quantum Algorithms and Their Applications in Optimisation
Quantum
Description Applications
Algorithm
Database search,
Searches an unsorted
Grover’s cryptographic functions,
database quadratically
Algorithm solving NP-complete
faster
problems
Optimisation technique for Combinatorial optimisation,
Quantum
finding global machine learning, financial
Annealing
minima/maxima modelling
Approximates the ground
Quantum Chemistry, material science,
state of a given
Approximate optimisation problems
Hamiltonian
Simulates classical random
Quantum Optimisation problems, graph
walks on a quantum
Walks theory, search algorithms
computer
Quantum
Description Applications
Algorithm
Approximates the ground
Variational Optimisation problems,
state of a given
Quantum machine learning, chemistry
Hamiltonian
Chemistry, quantum
Finds the eigenvalues and
Eigensolver mechanics, optimisation
eigenvectors of a matrix
problems
TABLE 4.2
Outlining Some Key Aspects of Quantum Communication and
Networking
Aspect Description
Quantum communication and networking involves the
transmission and processing of information encoded in
Definition quantum states, utilising the principles of quantum
mechanics for secure and efficient communication and
networking tasks.
QKD protocols enable the secure exchange of
cryptographic keys between distant parties by leveraging
Quantum Key
quantum properties such as superposition and
Distribution
entanglement. Common QKD protocols include BB84,
E91, and EPR-based schemes.
Quantum cryptography involves using quantum principles
to develop cryptographic protocols that are inherently
Quantum
secure against eavesdropping attacks. Examples include
Cryptography
quantum key distribution, quantum coin flipping, and
quantum digital signatures.
Quantum teleportation allows the transfer of quantum
information from one location to another, without
Quantum physically transmitting the quantum state itself. This
Teleportation process relies on entanglement and classical
communication to reconstruct the quantum state at the
destination.
Quantum Quantum networks connect multiple quantum devices and
Networks enable the distribution of quantum information over long
Aspect Description
distances. These networks often incorporate quantum
repeaters, quantum memories, and entanglement swapping
techniques to extend the range of quantum communication.
The concept of a quantum internet envisions a global
network infrastructure that facilitates secure and efficient
Quantum
quantum communication and networking tasks. It aims to
Internet
connect quantum computers, quantum sensors, and other
quantum devices for various applications.
Quantum communication and networking have
applications in secure communication, quantum key
Applications distribution, quantum teleportation, distributed quantum
computing, quantum sensor networks, and quantum-
enhanced classical communication protocols.
Challenges in quantum communication and networking
include the development of practical and scalable quantum
repeaters, overcoming noise and decoherence effects,
Challenges
achieving long-distance entanglement distribution, and
integrating quantum and classical communication
protocols.
TABLE 4.3
An Overview of Various Applications of Quantum Sensing and
Metrology
Application Description
Quantum Utilises the quantum properties of atomic spins to
Magnetometry measure magnetic fields with unprecedented sensitivity.
Quantum clocks utilise the quantum properties of atoms
Quantum Clocks or ions to measure time with incredible precision,
surpassing the accuracy of traditional atomic clocks.
Quantum Quantum imaging techniques leverage quantum
Imaging phenomena such as entanglement and superposition to
Application Description
enhance the resolution and sensitivity of imaging
systems.
Quantum gyroscopes exploit the quantum mechanical
Quantum properties of particles to measure rotation rates with high
Gyroscopes accuracy, enabling precise navigation and stabilisation
systems.
Quantum thermometry uses quantum systems to measure
Quantum temperature with exceptional sensitivity and accuracy,
Thermometry allowing for precise temperature monitoring in various
applications.
Quantum gravimeters utilise quantum principles to
Quantum measure gravitational acceleration with extreme
Gravimeters precision, enabling applications such as underground
mapping and geophysics.
Quantum spectroscopy techniques employ quantum
Quantum systems to analyse the interaction of matter and
Spectroscopy electromagnetic radiation, providing high-resolution
spectral information.
Quantum sensing and metrology, despite the fact that they hold a great
deal of potential, are confronted with a number of obstacles that need to be
conquered before they can be widely used. Hardware restrictions, such as
the requirement for quantum sensors and metrology techniques that are
dependable and scalable, have the potential to reduce the performance of
quantum measurement systems and restrict the range of applications for
which they may be used. A further factor that can have an impact on the
accuracy and precision of quantum measurements is the presence of noise
and decoherence, both of which are caused by interactions between
quantum systems and their surroundings. Quantum sensing and metrology
are representing a promising frontier in the science of precision
measurement. They have the potential to revolutionise our capacity to
detect and measure physical quantities with an accuracy and sensitivity that
has never been seen before. Quantum sensors and metrology techniques
offer new capabilities for applications such as medical imaging,
environmental monitoring, and basic physics research. These capabilities
are made possible by leveraging the power of quantum mechanics. The
potential applications of quantum sensing and metrology in the future are
virtually infinite, since research and development in this fascinating subject
continues to advance at a rapid pace.
TABLE 4.4
A Brief Overview of Quantum Error Correction and Fault Tolerance
Aspect Description
Quantum error correction codes are mathematical techniques
used to detect and correct errors in qubits due to decoherence
Error and noise. These codes redundantly encode quantum
Correction information across multiple qubits, allowing for the detection
Codes and correction of errors without directly measuring the state of
the qubits. Common error correction codes include the Shor
code, the Steane code, and the surface code.
Fault tolerance in quantum computing refers to the ability of a
quantum computer to maintain reliable operation despite the
presence of errors and imperfections in hardware components.
Fault-tolerant quantum computing relies on error correction
Fault
codes, fault-tolerant quantum gates, and sophisticated error
Tolerance
mitigation techniques to ensure the accuracy and robustness of
quantum computations. Achieving fault tolerance is crucial for
building practical quantum computers capable of performing
complex calculations without being derailed by errors.
Another important QEC protocol is the surface code. In order to find and
fix errors, it uses measurements of stabiliser operators and encodes qubits
on a two-dimensional lattice. When designing fault-tolerant quantum
computing systems, the surface code is an excellent option due to its
numerous advantages, such as its scalability and high fault tolerance. You
may think of topological code and colour code as two alternate quantum
error correcting methods. Each of these protocols provides an alternative to
quantum error correction, but they all have different performance and
complexity trade-offs. Conversely, fault tolerance refers to a quantum
computer’s ability to keep on delivering reliable and accurate outputs even
when there are errors and malfunctions in its operation. Reliable and
accurate computations may be performed by fault-tolerant quantum
computing systems using a combination of quantum error correction, fault-
tolerant gates, and error mitigation techniques. One of the most important
concerns in fault-tolerant quantum computing is the expense of error
correction and fault tolerance. Because of this overhead, running quantum
algorithms could become much more complicated and resource intensive.
With the development of error-correcting codes, fault-tolerant
architectures, and fault-tolerant gates, fault-tolerant quantum computing has
achieved remarkable strides in the past few years. This is so even if it is
confronted with several obstacles. Several intriguing methods exist for
achieving scalable, high-performance, and fault-tolerant quantum
computing. The topological code and the surface code are two examples of
quantum computing designs that are fault tolerant. Using error mitigation
measures, quantum computation may become more accurate and reliable
even when mistakes are made. Methods like this encompass enhancing
errors, fixing them, and even suppressing them. In addition to its uses in
quantum computing, the ideas of quantum error correction and fault
tolerance have consequences for many other areas, such as quantum
sensing, quantum metrology, quantum communication, and many more.
Quantum error correction methods might be used to keep quantum
information intact when it’s sent across large distances in quantum
communication networks. Because of this, we can be certain that quantum
communication protocols are safe and dependable. Quantum error
correction and fault tolerance are especially important in quantum sensors
and metrology devices, as these systems rely on precise measurement and
control of quantum states to achieve high levels of sensitivity and precision.
Reason being, quantum states are fundamental to quantum sensors and
metrology equipment. Finally, two primary areas of research in quantum
computing—fault tolerance and quantum error correction—are crucial.
Overcoming the intrinsic fragility of quantum information and ensuring the
reliable and precise operation of quantum computers are the primary goals
of these research fields. Computing, communication, and sensing
technologies stand to benefit greatly from the breakthroughs the researchers
are doing towards fault-tolerant quantum processing. New methods and
algorithms, in conjunction with the principles of quantum physics, are
allowing this to happen. There is an almost infinite number of possible
future uses for quantum error correction and fault tolerance as long as
research and development in this intriguing field continues to improve.
4.11 CONCLUSION
To sum up, quantum computing is an exciting new area of research in
computer science that may significantly impact many other industries. By
using the principles of quantum physics, quantum computers offer an
unprecedented degree of processing capacity, allowing them to tackle
challenging tasks that were previously believed to be impossible for
classical computers to handle. In this chapter, we have explored some of the
extensive potential uses of quantum computing. A few examples of these
fields of use are optimisation, cryptography, drug development, materials
science, and machine learning. By using quantum phenomena like
entanglement and superposition, quantum algorithms can accelerate
computations in these areas, potentially resulting in significant advances in
solving real-world problems. The chapter has also shed light on the current
state of quantum computing by outlining developments in hardware, error
correction, and algorithm design, among other areas. While quantum
computing is in its early stages, significant advancements have been
achieved in recent years, opening the door to further scientific
breakthroughs and technological advancements. Quantum computing has
the potential to revolutionise several industries, including cybersecurity,
healthcare, banking, and more. The chapter has also explored these
potential societal repercussions. Quantum computing has the ability to drive
societal progress and change several areas as it matures. Providing a
comprehensive understanding of the revolutionary possibilities of quantum
computing applications is the overall objective of this chapter. Further
research and innovation in this exciting and rapidly evolving field are laid
out as well.
REFERENCES
Amirul, Asyraf Zhahir, Siti, Munirah Mohd, Mohd, Ilias Shuhud Bahari,
Idrus, Hishamuddin Zainuddin, Nurhidaya, Mohamad Jan, Mohamed,
Ridza Wahiddin. (2022). Quantum computing and its application.
International Journal of Advanced Research in Technology and
Innovation, doi: 10.55057/ijarti.2022.4.1.7
Andreas, Bayerstadler, Guillaume, Becquin, Julia, Binder, Thierry, Botter,
Hans, Ehm, Thomas, Ehmer, Marvin, Erdmann, Norbert, Gaus, Philipp,
Harbach, Maximilian, Hess, Johannes, Klepsch, Martin, Leib, Sebastian,
Luber, Andre, Luckow, Maximilian, Mansky, Wolfgang, Mauerer,
Florian, Neukart, Christoph, Niedermeier, Lilly, Palackal, Ruben,
Pfeiffer, Carsten, Polenz, Johanna, Sepulveda, Tammo, Sievers, Brian,
Standen, Michael, Streif, Thomas, Strohm, Clemens, Utschig-Utschig,
Daniel, Volz, Horst, Weiss, Fabian, Winter. (2021). Industry quantum
computing applications. EPJ Quantum Technology, doi:
10.1140/EPJQT/S40507-021-00114-X
Casper, van der Kerk, Attila, Csala, Aeilko, H. Zwinderman. (2019).
Quantum computing in the biomedical sciences; A brief introduction into
concepts and applications. Computer and Information Science, doi:
10.5539/CIS.V12N3P104
Divya, Baiskhiyar, Ravi, Kumar. (2019). Quantum computing-applications
in bioinformatics. International Journal of Computer Applications, doi:
10.5120/IJCA2019919527
Ferenc, Ignacz, Daniel, Feszty, István, Lakatos. (2022). Possible
applications of quantum computing, especially in vehicle technology: A
review article. Periodica Polytechnica Transportation Engineering, doi:
10.3311/pptr.16547
Francesco, Bova, Avi, Goldfarb, Roger, G. Melko. (2021). Commercial
applications of quantum computing. EPJ Quantum Technology, doi:
10.1140/EPJQT/S40507-021-00091-1
Hari, P. Paudel, Madhava, Syamlal, Scott, E. Crawford, Yueh-Lin, Lee,
Roman, A. Shugayev, Ping, Lu, Paul, R. Ohodnicki, Darren, Mollot,
Yuhua, Duan. (2022). Quantum computing and simulations for energy
applications: Review and perspective. ACS Engineering Au, doi:
10.1021/acsengineeringau.1c00033
Lloyd, M. Taylor. (2022). Exploring potential applications of quantum
computing in transportation modelling. IEEE Transactions on Intelligent
Transportation Systems, doi: 10.1109/tits.2021.3132161
Martin, Ulmke, Felix, Govaers. (2023). Quantum computing for
applications in data fusion. IEEE Transactions on Aerospace and
Electronic Systems, doi: 10.1109/TAES.2022.3212026
Neha, Sharma, Ramkumar, Ketti Ramachandran. (2021). The emerging
trends of quantum computing towards data security and key
management. Archives of Computational Methods in Engineering, doi:
10.1007/S11831-021-09578-7
Rene, Steijl, Romit, Maulik. (2023). Editorial: Quantum computing
applications in computational engineering. Frontiers in Mechanical
Engineering, doi: 10.3389/fmech.2023.1237653
Roman, Rietsche, Christian, Dremel, Samuel, Bosch, Léa, Steinacker,
Miriam, Meckel, Jan, Marco Leimeister. (2022). Quantum computing.
Electronic Markets, doi: 10.1007/s12525-022-00570-y
Subbiah, P., Krishnaraj, N., Bellam, K. (2024). Quantum machine learning:
Enhancing AI with quantum computing. In Applications and Principles
of Quantum Computing (pp. 129–145). IGI Global.
Travis, S. Humble. (2018). Consumer applications of quantum computing:
A promising approach for secure computation, trusted data storage, and
efficient applications. IEEE Consumer Electronics Magazine, doi:
10.1109/MCE.2017.2755298
OceanofPDF.com
5 Quantum Computing
Necessary Applications for Future
Kali Charan Rath, Emmanuel Philip Ododo,
Niranjanamurthy M., Chitta Ranjan Deo, and
Biswadip Basu Mallik
DOI: 10.1201/9781003499459-5
5.1 INTRODUCTION
Quantum computing, at the forefront of scientific discovery, presents a
groundbreaking approach to computation, diverging significantly from
classical methods. The unique characteristic enables quantum computers to
achieve exponential leaps in processing power and efficiency,
distinguishing them from conventional computing paradigms (Aithal 2023;
Ten Holter et al. 2023). Comparing quantum computing with classical
computing unveils a stark contrast in their underlying principles and
capabilities. While classical computers manipulate bits sequentially,
quantum computers leverage quantum phenomena to process information in
parallel, leading to a quantum advantage in solving certain classes of
problems. Classical algorithms follow deterministic logic, executing
instructions step by step, whereas quantum algorithms exploit quantum
parallelism to explore multiple solutions simultaneously, fundamentally
altering the computational landscape (Riel 2021; Agarwal and Mohanta
2023).
Quantum computing stands at the forefront of technological innovation,
offering unprecedented capabilities to address complex challenges that
surpass classical systems’ limitations. By excelling in optimization,
cryptography, and simulation tasks, quantum computers pose a significant
disruption to conventional computing methods. For instance, algorithms
like Shor’s algorithm promise exponential speed-ups in factoring large
numbers, threatening established cryptographic standards and
revolutionizing data security. Moreover, quantum computing holds
immense potential in advancing fields such as drug discovery, material
science, and machine learning by efficiently exploring vast solution spaces
(Möller and Vuik 2017; Lu et al. 2023; Brijwani et al. 2023). This paradigm
shift in computation not only accelerates scientific discoveries but also
unlocks novel insights into complex phenomena, promising a future where
the unimaginable becomes achievable.
∣
where a, b, g, and d are complex numbers representing probability
amplitudes, and |00, |01, |10, d |11 are the basis states representing the
possible combinations of classical bits. Thus, |∝| , |β| , |γ| , and |δ|
√2
= ( 0⟩ −
represent the probabilities of measuring the states, |00⟩, |01, γ|10, δ|11
respectively, and they sum up to 1.
H 0⟩ =
H 1⟩ =
1
1
√2
( 0⟩ + 1⟩)
exist in multiple states at the same time. This ability opens the way for
parallel computation, which leads to faster problem-solving when
compared to classical algorithms (Michelini and Stefanel 2023; Pris
2022).
Example: Shor’s integer is a pivotal tool in encryption because of its
exponential efficiency in breaking down large numbers. The ability to
unwrap huge numbers exponentially faster than classical techniques is
demonstrated by this algorithm.
b. Entanglement: Quantum algorithms exploit entanglement’s unique
linkages between qubits to revolutionize computational capabilities.
Example: Quantum teleportation: revolutionizing communication
with instant transmission of quantum data, promising unmatched
efficiency and security in technological innovation.
c. Quantum Parallelism: Quantum algorithms can perform operations
on all possible inputs simultaneously, leading to exponential speedup
for certain tasks (Kishore and Raina 2019; Holbrook 2023).
Example: Grover’s groundbreaking algorithm revolutionizes search
capabilities within unsorted databases, boasting a remarkable
quadratic speed enhancement over classical counterparts. Its profound
impact spans across optimization realms and the domain of database
searches, unlocking unprecedented efficiency and efficacy in solving
complex computational problems.
d. Interference: Quantum algorithms exploit interference patterns to
amplify the probability of obtaining correct solutions and suppress
incorrect ones.
Example: Quantum phase estimation, used in quantum chemistry
simulations, can efficiently calculate molecular energies and
properties with high precision.
e. Quantum Fourier Transform: Quantum algorithms employ the
quantum Fourier transform to efficiently perform tasks such as period
finding and signal processing.
Example: The HHL is a game-changer algorithm for solving linear
equations, boasting exponential speed compared to traditional
methods. Its significance spans optimization and machine learning,
ushering in a new era of computational prowess and innovation.
f. Quantum Oracles: Quantum algorithms can utilize quantum oracles,
black-box functions that evaluate inputs, to speed up certain
computational tasks.
Example: Simon’s algorithm tackles the tough Simon’s problem in
cryptography. It creates super tough security against quantum-
powered adversaries, making our digital secrets safe.
g. Error Correction: Quantum algorithms employ error correction
techniques to mitigate errors arising from noise and decoherence,
ensuring reliable computation.
Example: Quantum error correction, including the surface code, is
crucial for fault-tolerant quantum computing, ensuring robust
quantum algorithms.
h. Adiabatic Quantum Computing: Quantum algorithms can leverage
adiabatic quantum computing, which gradually transforms the system
from the initial state to the solution state, to solve optimization
problems efficiently (Werner et al. 2023).
Example: D-Wave’s quantum annealing devices utilize adiabatic
quantum computing to solve optimization problems in various
domains, including finance, logistics, and machine learning.
i. Quantum Mechanics And Machine Learning: In the exciting realm
of quantum machine learning, quantum algorithms are revolutionizing
traditional machine learning tasks, leveraging quantum principles to
boost efficiency and capabilities.
Example: QSVM and QNN are new quantum machine learning
methods poised for applications in data classification, pattern
recognition, and optimization.
j. Quantum Simulation: Quantum algorithms empower researchers to
simulate intricate quantum systems, unlocking avenues to explore
complex phenomena in materials science, quantum chemistry, and
condensed matter physics.
Example: Variational quantum eigensolver (VQE) is used to
simulate molecular structures and properties, aiding drug discovery
and materials design.
TABLE 5.1
Concepts vs Power
Sl. No. Concept Power
1 Quantum Superposition 0.85
2 Entanglement 0.92
3 Quantum Parallelism 0.88
4 Interference 0.87
5 Quantum Fourier Transform 0.89
6 Quantum Oracles 0.91
7 Error Correction 0.93
8 Adiabatic Quantum Computing 0.86
9 Quantum Mechanics and Machine Learning 0.9
10 Quantum Simulation 0.94
TABLE 5.2
Comparison of Quantum Computing Technologies
Sl. Error
Technology Qubits
No. Rate
1 Microsoft’s Topological Qubits 50 0.001
2 Google’s Quantum Supremacy 53 0.0001
3 IBM Quantum Program 65 0.00001
4 D-Wave Systems’ Quantum Annealing 2000 0.01
Rigetti Computing’s Hybrid Quantum-
5 40 0.0005
Classical Approach
6 IonQ’s Trapped-Ion Quantum Processors 100 0.00005
These examples, Table 5.2, Figure 5.2 and Figure 5.3, showcase the
diverse approaches and technologies being pursued by different companies
in the field of quantum computing. Each company brings its unique
strengths and innovations in the quantum area.
5.5 CONCLUSION
In conclusion, quantum computing’s examination underscores its profound
impact on computational science and beyond. We’ve explored its principles,
architectures, and applications, revealing transformative potential. Quantum
algorithms excel in solving complex problems exponentially faster than
classical computers, spanning optimization, cryptography, machine
learning, and simulation. Despite implementation challenges, recent
hardware and error correction breakthroughs offer solutions, unlocking
quantum computing’s full potential. Real-world examples and future
directions highlight its broad applications, from scientific research to
industrial optimization and societal challenges. Quantum computing heralds
innovation, pushing computation boundaries to unprecedented levels,
offering a future where complex problems are swiftly and precisely tackled,
revolutionizing computational approaches.
Hence, quantum computing is the leading a tech revolution, redefining
computational limits, unlocking frontiers, transforming complexity
perception.
REFERENCES
OceanofPDF.com
6 Securing IoT
Advanced Algorithmic Approaches for
Malware Detection
Vergin Raja Sarobin M., Ashish Choudhary,
Azrina Abd Aziz, and Ranjith J.
DOI: 10.1201/9781003499459-6
6.1 INTRODUCTION
With the evolution of the digital world and various technologies booming,
the Internet of Things (IoT) has transformed the manner in which users
communicate with the digital world. It is defined as the network of physical
devices, devices equipped with sensors, actuators, various appliances, and
software. These devices are connected so that they set up communication
among themselves and over the internet.
IoT devices collect data, perform various pre-processing, and draw
various data insights from the data collected by various devices. This pre-
processing occurs either in the device itself or in centralized cloud-based
systems. These devices find their application in various fields like
healthcare, smart cities, agriculture, industries, and smart homes. These IoT
devices also enable automation and, based on the data input, make decisions
with or without human intervention. But the widespread usage of IoT
devices poses several challenges such as security and privacy. The security
associated with IoT devices will continue to grow as the digital world
grows, and therefore cyberattacks will also eventually grow [1]. Traditional
approaches involve prevention, detection, and mitigation to tackle
cyberattacks.
Machine learning and deep learning are the latest powerful techniques
that can be applied successfully to address the continuously growing
complexity of malicious software. Machine learning and deep learning
techniques learn patterns based on trained data and hence can adapt to
unseen data, which is needed in growing scenarios of malware attacks.
These techniques achieve high accuracy and precision, improving overall
detection capability.
IoT-23 is a labelled malware and benign dataset that consists of network
traffic from Internet of Things devices. This dataset comprises 23 instances,
also known as captures of different network traffic. This consists of 20
captures under the malware category executed in various IoT devices. The
remaining three captures are for benign traffic. This dataset was collected in
the Stratosphere Laboratory, AIC group, FEL, and CTU University in the
Czech Republic to provide large labelled datasets for researchers to work
on. The description of the prominent attributes in the dataset is shown in
Table 6.1.
TABLE 6.1
Description of the Attributes in the Dataset
Attribute Description
It refers to the total time data was handled between the
duration
device and the attacker.
orig_bytes It refers to all the data sent to the device.
resp_bytes It refers to all the data sent by the device.
missed_bytes It refers to the number of missed bytes in the message.
orig_pkts It refers to the total number of packets sent to the device.
orig_ip_bytes It refers to the total number of bytes sent to the device.
Attribute Description
It refers to the total number of packets being sent from the
resp_pkts
device.
It refers to the total number of bytes being sent from the
resp_ip_bytes
device.
It refers to the type of network protocol being used for the
proto_icmp data package, which is the Internet Control Message
protocol.
It refers to the type of network protocol being used for the
proto_tcp
data package, which is the Transmission Control protocol.
It refers to the type of network protocol being used for the
proto_udp
data package, which is the User Datagram protocol.
It refers to the application protocol, which is the Dynamic
service_dhcp
Host Configuration Protocol.
It refers to the application protocol, which is the Domain
service_dns
Name System.
It refers to the application protocol, which is Hypertext
service_http
Transfer Protocol.
It refers to the application protocol, which is Internet Relay
service_irc
Chat.
service_ssh It refers to the application protocol, which is Secure Shell.
It refers to the application protocol, which is Secure Sockets
service_ssl
Layer.
conn_state It refers to the state of connection.
label It refers to the output, which is attack or benign.
6.3 METHODOLOGY
TABLE 6.2
Classification Report for KNN Algorithm
Precision Recall F1-Score Support
0 0.99 0.90 0.94 387
1 0.90 0.99 0.94 363
Accuracy 0.94 750
Macro Avg 0.94 0.94 0.94 750
Weighted Avg 0.95 0.94 0.94 750
TABLE 6.3
Classification Report for Decision Tree Algorithm
Precision Recall F1-Score Support
Precision Recall F1-Score Support
0 0.99 0.90 0.94 387
1 0.90 0.99 0.94 363
Accuracy 0.94 750
Macro Avg 0.94 0.94 0.94 750
Weighted Avg 0.95 0.94 0.94 750
The figure illustrates that the linear kernel performed slightly better for
SVM as compared to other kernels, and the accuracy obtained is 0.9431
when testing ratio is 0.30.
For malware detection on the IoT-23 dataset, the study also employed
ensemble techniques [16]. Random forest is a powerful, robust, and
versatile algorithm that aids in reducing overfitting, a common issue in
machine learning. The random forest algorithm is an ensemble of decision
trees [16]. It amplifies the power of decision trees that construct an
ensemble by training each tree on a random subset taken from the dataset,
that is, the IoT-23 dataset in this study.
Training each tree independently on a random subset with replacement to
introduce randomness is called bagging, which assists in reducing variance
and overfitting. For malware detection, each tree predicts the output label,
and the label with the majority count becomes the final predicted class. The
dataset for the implementation is split into 70% training data and 30%
testing data, the number of estimators are taken to be 700, and the
maximum depth is taken as 100 with bootstrapping set to True. The
accuracy obtained is 0.9426. The performance of malware detection via
random forest can be measured by the confusion matrix shown in Figure
6.6.
To obtain various key metrics performance by the random forest, the
classification report table is shown in Table 6.4.
In addition to this algorithm, another ensemble technique called
AdaBoost (adaptive boosting) is implemented. AdaBoost is an ensemble
learning technique that focuses on improving the performance of weak
learners and finally creating a strong and robust model [12]. To do this, it
operates iteratively by assigning weights to instances in the dataset and
focuses more on misclassified instances in subsequent rounds. This iterative
process continues until a predefined number of weak learners are combined
into the robust model. In the implementation of AdaBoost, the decision tree
classifier is taken as a base with a maximum depth of 10 and the number of
estimators as 50. The accuracy obtained via AdaBoost is 0.942.
In this study, a fully connected neural network is also implemented [2]. A
fully connected neural network, or feed-forward neural network, is known
for its capacity to discern intricate patterns and relationships in complex
tasks. The neural network employed for malware detection consists of 14
input attributes and two output classes. The model consists of five hidden
layers with a size of 50 neurons coupled with the ReLu activation function
to introduce non-linearity in the network. There are two output neurons, and
the final layer uses the SoftMax activation function for binary classification
tasks.
FIGURE 6.6 Confusion matrix for random forest algorithm.
TABLE 6.4
Classification Report for Random Forest Algorithm
Precision Recall F1-Score Support
0 0.99 0.90 0.94 387
1 0.90 0.99 0.94 363
Accuracy 0.94 750
Macro Avg 0.95 0.94 0.94 750
Weighted Avg 0.95 0.94 0.94 750
6.3.4.4.1 Client
On the client side, the neural networks are defined using Keras and
tensorflow. The model is compiled using the Adam optimizer and
categorical cross-entropy loss function. Once the model is defined, the
flower client consists of three major functions.
get_parameters()
The get_parameters method is called by the central server in this study to
obtain the parameters, which are the current weights of the model, from
the client.
fit()
In the fit method, the client receives the model parameters that are weights
from the server. This method performs local training on the local data. In
the implementation of this study, every client carries a subset of
observations. The model is trained for a fixed number of epochs. Once
the training is completed, performance metrics like loss, accuracy, and
training time are displayed for inference. After training, the updated
model weights are returned to the server for aggregation.
evaluate()
This method receives the updated model parameters from the server and
evaluates the performance of the model on the test data that is locally
available at the client. This method also displays the performance metrics
in terms of global accuracy and other metrics for monitoring purposes.
6.3.4.4.2 Server
The study implements a custom server strategy for federated averaging
(FedAvg) in the flower framework. Federated averaging is frequently used
as an example of a secure aggregation process. The averaging model
updates locally on each participating device in the basic process of FedAvg.
After that, a secure multi-party computation (MPC) protocol is used on the
server to safely aggregate these locally averaged updates. The server
receives the model weights from each client, aggregates them, and sends the
aggregated weights to the clients. In the implementation, the flower server
begins using fl.server.start_server(), which specifies the server address,
server configuration, maximum message length for gRPC communication,
and the custom strategy.
The implementation of federated learning for malware detection in this
study was carried out considering every possibility, listed in the following.
The experiments were carried out under two main cases, and then
observations and conclusions are made. In addition to this, to train the
model, a well-known and frequently used Adam optimizer is used with a
learning rate of 0.001 that influences better speed and convergence of the
model. A categorical cross-entropy loss function was used for this study.
In the initial setup, all the perfect scenarios are taken, such as a completely
preprocessed and perfectly balanced dataset. In addition to this, in the
experimental setup, the number of clients are three, and each client trains
the model for 10 epochs, which is much less than the 50 epochs
performed in the classical deep learning setup. The testing dataset is
taken to be the same for each client so that unbiased observations can be
made. In the experiment, the number of rounds is varied, and global
accuracy, global loss, and training time are shown in Table 6.5.
The table depicts that the accuracy in the case of a balanced dataset
remains constant at 95% across different rounds, that is, 3, 5, and 10. The
total training time in seconds increases with the number of rounds. The
reason behind this increase is the additional communication and
computation overhead as the number of rounds increases. Moreover, it is
clear that data security and privacy is maintained, which is the core of
federated learning.
TABLE 6.5
Federated Learning in Perfectly Balanced Dataset
No. of Total Training Time
Global Accuracy Global Loss
Rounds (s)
1.3635828495025635
3 0.9480000138282776 0.17281992733478546
seconds
1.4199879169464111
5 0.9480000138282776 0.17216716706752777
seconds
No. of Total Training Time
Global Accuracy Global Loss
Rounds (s)
1.9039289951324463
10 0.9480000138282776 0.17213290929794312
seconds
TABLE 6.6
Accuracy for Different Testing Ratios
Testing
Dtree SVM KNN Random Forest AdaBoost Neural Network
Ratio
10% 0.956 0.952 0.956 0.960 0.956 0.948
20% 0.938 0.934 0.936 0.934 0.934 0.953
30% 0.941 0.941 0.941 0.942 0.942 0.940
40% 0.938 0.940 0.937 0.943 0.940 0.943
50% 0.943 0.944 0.940 0.945 0.944 0.943
60% 0.940 0.941 0.941 0.942 0.942 0.942
Testing
Dtree SVM KNN Random Forest AdaBoost Neural Network
Ratio
70% 0.940 0.940 0.940 0.940 0.940 0.939
80% 0.942 0.941 0.941 0.941 0.942 0.941
90% 0.940 0.940 0.940 0.940 0.941 0.939
6.5 CONCLUSION
This study on malware detection has employed a comprehensive approach
that combines the DEAP genetic algorithm for feature selection and various
algorithms for malware detection. The deployment of DEAP genetic
programming assisted in identifying a potential set of attributes for accurate
prediction of the models by reducing the computational cost. It is observed
that all the models performed well, with the random forest algorithm
performing slightly better, with 96% accuracy at a testing ratio of 10%. To
check for unbiased results, stratified K-fold cross-validation is also
implemented, where k is 10, and the same average accuracy is obtained.
The interpretation analysis done through SHAP helps in diving deeper into
each attribute’s contribution to the output, and with its various plots and
analyses, it provides the power to further refine the dataset by excluding
certain attributes without compromising the model performance but rather
reducing computation cost further. The work done so far has been coupled
with FedAvg federated learning, which has had a great contribution, leading
to more streamlined and efficient solutions in the ongoing pursuit of robust
malware detection technologies, maintaining data security and data privacy.
In the future, further exploring the different capabilities of federated
learning should be addressed so that the task of malware detection can be
streamlined, incorporating every small feature and enhancing its
capabilities.
REFERENCES
OceanofPDF.com
7 Advancing Drug Discovery with
Quantum Machine Learning
Rati Kailash Prasad Tripathi
DOI: 10.1201/9781003499459-7
7.1 INTRODUCTION
Over the past few years, the intersection of quantum computing (QC) and
machine learning (ML) has sparked immense interest across scientific and
technological domains. This synergy has given rise to quantum machine
learning (QML), a burgeoning field poised to revolutionize multiple sectors,
notably drug discovery. Utilizing the principles of quantum mechanics and
power of ML, QML offers novel approaches to accelerate the discovery and
advancement of new therapeutically active compounds (Von Lilienfeld et
al., 2020). In traditional drug discovery, researchers face formidable
challenges in navigating the vast space of chemical compounds, predicting
molecular properties, and understanding complex biological interactions.
Conventional computational methods, while powerful, often struggle to
efficiently analyze the intricate molecular structures and dynamics inherent
in biological systems. QML presents an exciting opportunity to overcome
these challenges by employing the exponential processing power of
quantum computers and advanced pattern recognition abilities of ML
algorithms (Sliwoski et al., 2014).
At its core, QC utilizes quantum mechanics principles to execute
computations at an exponentially faster rate compared to classical
computers (McArdle et al., 2020; Zinner et al., 2021; Zinner et al., 2022),
while ML is centered on creating algorithms that empower computers to
gather information from data and make projections without explicit
programming. By harnessing extensive datasets and advanced mathematical
techniques, ML has empowered breakthroughs in various domains, ranging
from image recognition to natural language processing (Carracedo-
Reboredo et al., 2021). The convergence of QC and ML, termed QML,
exhibits the ability to address intricate computational challenges with
unparalleled efficiency and scalability. In the drug discovery domain, where
the search for new therapeutics demands substantial computational
resources and expertise, QML emerges as a transformative tool (Sliwoski et
al., 2014).
A key obstacle in drug discovery involves predicting molecular
properties and interactions, a task that often requires computationally
intensive simulations and analyses. Quantum algorithms have the potential
to exponentially accelerate these computations, enabling rapid exploration
of chemical space and recognition of promising bioactive compounds.
Moreover, QML algorithms can enhance the predictive capabilities of ML
models by leveraging quantum features for data representation, feature
selection, and optimization (Robert et al., 2021; Cerezo et al., 2021; Mensa
et al., 2023).
This chapter explores the fundamentals of QML, and its applications in
the field of drug discovery have been probed. The underlying principles of
QC, design and implementation of quantum algorithms, and their
integration with ML techniques are also discussed. Furthermore, the chapter
encompasses challenges, opportunities, and ethical considerations linked to
the integration of QML into the pharmaceutical sector. Case studies and
real-world examples demonstrate QML’s transformative potential in
expediting drug discovery and fostering healthcare innovation.
7.2 INTEGRATING QC AND ML
The coalition of QC and ML arises from the complementary strengths of
these two transformative fields, offering unprecedented opportunities to
address complex computational challenges across various domains. In the
context of drug discovery, this convergence holds particular promise, driven
by several compelling motivations, illustrated in Figure 7.1 (Mensa et al.,
2023; Batra et al., 2021).
TABLE 7.1
Fundamental Tenets of Quantum Mechanics
Parameters Concepts Applications
This allows quantum
systems to represent and
process massive amounts
Superposition refers to the ability
of information
of quantum particles, such as
Superposition simultaneously, laying the
qubits in QC, to exist in several
groundwork for quantum
states at the same time.
computation’s potential
speedup over classical
counterparts.
Parameters Concepts Applications
Entanglement describes the
phenomenon where the states of
quantum particles become Entanglement serves as a
interconnected, irrespective of vital resource in quantum
distance between them. Changes information processing
Entanglement
in the state of one particle and underpins secure
instantly alter the state of its quantum communication
entangled counterpart, resulting protocols.
in correlations that defy classical
perception.
Quantum mechanics dictates that
measurements of quantum
systems yield probabilistic
outcomes. Before measurement,
This inherent randomness
a quantum system is in a
Quantum distinguishes quantum
superposition of potential states
Measurement measurement from
defined by a wave function.
classical observation.
Upon measurement, the system
collapses into one of these states
according to probabilities
determined by the wave function.
Quantum interference arises
when different quantum
pathways contribute to the Quantum interference has
probability amplitudes of a been instrumental in
Quantum quantum system. These quantum algorithms, as it
Interference amplitudes can interfere can be exploited to
constructively or destructively, enhance computational
leading to observable effects efficiency.
such as interference patterns in
experiments.
Parameters Concepts Applications
This phenomenon allows
quantum systems to
explore regions of state
Quantum tunneling allows space that would
Quantum particles to overcome energy otherwise be inaccessible,
Tunneling barriers that would be classically contributing to the
insurmountable. richness of quantum
dynamics and the
efficiency of certain
quantum algorithms.
Unlike classical bits, the no-
This principle has
cloning theorem makes it
No-Cloning implications for quantum
impossible to produce an
Theorem information processing
identical copy of any unknown
and cryptography.
quantum state.
7.6.1.1 QAOA
QAOA is employed in tackling problems related to combinatorial
optimization, including molecular structure optimization and drug design.
QAOA can be applied to optimize molecular structures, identify optimal
drug combinations, and solve other optimization problems related to drug
development.
7.6.1.2 QPE
QPE has been designed to ascertain the eigenvalues of the unitary operator,
a capability that holds significance in addressing challenges in quantum
chemistry and molecular dynamics (MD) simulations. QPE can be utilized
to accurately predict molecular properties, such as bond dissociation
energies and reaction rates, facilitating the design of new drugs with desired
pharmacological properties.
7.6.1.3 VQE
VQE is employed in estimating the ground state energy of a molecular
system, a critical aspect for understanding molecular properties, including
interactions. VQE is utilized to carry out simulations of the electronic
structure of molecules, allowing researchers to predict molecular energies
and optimize drug candidates.
a. QNNs
QNNs are neural network architectures designed to run on quantum
computers or simulate quantum processes on classical computers.
These networks utilize quantum gates and circuits to perform
computations, enabling more complex and efficient learning tasks.
Variants include quantum circuit-based neural networks and quantum-
inspired neural networks. QNNs offer innovative approaches to
address molecular structure prediction, compound screening, drug-
target interaction analysis, quantum molecular dynamics simulation,
and de novo drug design.
b. QSVMs
QSVMs extend classical support vector machines to a quantum
framework, leveraging quantum feature maps to classify data in a
high-dimensional quantum space. These algorithms exploit quantum
parallelism to efficiently compute the kernel function, potentially
leading to faster classification and improved generalization
performance. QVSMs can enhance compound classification, virtual
screening, drug-target interaction prediction, pharmacophore
modeling, compound toxicity prediction, and drug repurposing.
c. QGAs
Genetic algorithms constitute a subset of evolutionary algorithms,
serving as search engine algorithms or adaptive heuristics in ML, and
are employed to discover resolutions for search- and optimization-
related problems. This approach employs natural selection to tackle
both constrained and unconstrained optimization issues. The QGA
presents an innovative evolutionary approach, integrating quantum
computation with traditional GA techniques for solving optimization
problems efficiently. QGAs offer a novel approach to tasks such as
molecular structure optimization, compound screening, drug design
and evolutionary optimization, and optimization of drug formulations.
Additionally, QGAs can explore trade-offs between different
objectives, such as potency, selectivity, and toxicity, to identify Pareto-
optimal solutions.
d. Quantum Kernel Methods
Quantum kernel methods leverage quantum feature maps to compute
kernel functions for support vector machines or other kernel-based
classifiers. Quantum kernel methods can enhance predictive modeling
tasks, such as virtual screening and drug-target interaction prediction,
by capturing nonlinear relationships and complex patterns in molecular
data.
e. Quantum Clustering Algorithms
Quantum clustering algorithms, like quantum hierarchical clustering
and quantum K-means, endeavor to segment data into clusters by
employing similarity metrics. These algorithms harness quantum
principles, including superposition and entanglement, to explore the
solution space efficiently and identify optimal cluster assignments.
Quantum clustering algorithms can be utilized for grouping molecular
structures based on similarities in their chemical properties or
biological activities. These algorithms aid in the identification of
molecular clusters with shared characteristics, facilitating the
discovery of structurally diverse compound libraries and the selection
of lead compounds for further evaluation.
f. Quantum Generative Models
Quantum generative models, inspired by quantum Boltzmann
machines or quantum autoencoders, have the capacity to produce new
molecular structures with desirable pharmacological attributes.
Quantum generative models facilitate exploration of the chemical
space and the discovery of new drug candidates by generating
structurally diverse compounds with specific biological activities.
g. Quantum Principal Component Analysis
PCA algorithms extract principal components from high-dimensional
data using quantum techniques. These algorithms can reduce the
dimensionality of datasets while preserving essential information,
enabling more efficient data representation and analysis. PCA can be
applied in various domains like molecular representation, feature
selection and dimensionality reduction, data visualization and
clustering, quantum-based similarity measures, data compression and
compression, predictive modeling, quantitative structure-activity
relationship (QSAR), virtual screening, and drug-target interaction
prediction.
h. Hybrid Quantum-Classical Approaches
Hybrid quantum-classical approaches amalgamate classical ML
techniques with quantum processing to tackle drug discovery
challenges. These approaches harness the advantages of both classical
and quantum systems in order to optimize molecular structures, predict
drug-target interactions, and analyze large-scale molecular datasets.
i. Quantum Linear and Nonlinear Regression
Linear regression is a method used in regression analysis to determine
the optimal linear relationship between independent and dependent
variables. It achieves this by minimizing the sum of squared
differences between observed and predicted values. On the other hand,
nonlinear regression is a regression analysis variant wherein the
observational data is modeled by a function comprising a nonlinear
combination of model parameters and dependent on one or more
independent variables. Unlike linear regression, the function used in
nonlinear regression is nonlinear, and parameter estimation is achieved
through iterative methods of successive approximations. Nonlinear
regression proves beneficial for modeling the intricate relationships
between variables wherein a linear function is inadequate. Quantum
linear regression offers a method to describe the correlation between
molecular descriptors and properties such as solubility, toxicity, or
biological activity. It can also be applied to model pharmacokinetic
(PK) parameters like volume of distribution, drug clearance, or half-
life. Also, quantum nonlinear regression can capture complex dose-
response curves and estimate parameters such as potency, efficacy, and
maximum response. This information is crucial for characterizing the
pharmacological properties of drug candidates and optimizing drug
dosing. It can also be applied to model structure-activity relationships
in drug discovery.
7.8.6 Polypharmacology
Utilizing the principles of QC and ML, QML plays a significant role in
polypharmacology, which involves the design of drugs that interact with
multiple targets to achieve therapeutic effects. It also aids in optimizing
combination therapies and tailoring treatment strategies.
TABLE 7.2
Challenges Associated with QML for Drug Discovery and Various
Measures to Avert Them
S.
Issue Challenge Mitigation
No.
QML algorithms often
require significant
computational resources,
and scaling them to handle
Developing scalable
large datasets or complex
QML algorithms capable
problems remains a
of handling real-world
1 Scalability challenge. Quantum
drug discovery datasets
computers currently have
is crucial for practical
limited qubit coherence
applications.
times and gate fidelities,
which constrains the scale
and intricacy of problems
they can efficiently tackle.
Quantum computers are
vulnerable to errors in Mitigating noise and
addition to noise arising errors in quantum
from decoherence, gate hardware and developing
imperfections, and error-correction
Noise and
2 environmental interactions. techniques are essential
Errors
These errors can degrade the for improving the
performance of QML reliability and robustness
algorithms, leading to of QML for drug
inaccuracies in predictions discovery.
and results.
3 Quantum Data Transforming classical data Designing efficient and
Encoding into quantum format (known effective quantum
as quantum data encoding) feature maps or encoding
suitable for processing on schemes that capture the
quantum computers presents relevant information
a non-trivial challenge. from molecular datasets
S.
Issue Challenge Mitigation
No.
while minimizing qubit
requirements and
computational
complexity helps
mitigate the challenge.
Understanding and
interpreting the results of
QML algorithms can be
challenging due to the
Developing techniques
complex nature of quantum
for interpreting and
models and representations.
visualizing quantum
Interpreting quantum feature
4 Interpretability models is essential for
maps, quantum kernels, or
gaining insights into
quantum circuits in the
drug discovery
context of drug discovery
processes.
requires specialized
expertise in both quantum
computing and
pharmaceutical sciences.
Developing hybrid
Integrating QML algorithms approaches that
with classical machine capitalize on the
learning methods and advantages of both
Integration existing drug discovery quantum and classical
5 with Classical workflows presents computing paradigms,
Methods challenges in terms of while addressing their
compatibility, limitations, is necessary
interoperability, and for seamless integration
performance. into drug discovery
pipelines.
S.
Issue Challenge Mitigation
No.
Establishing
collaborative platforms,
repositories, and datasets
for quantum drug
Access to quantum discovery research and
Data
computing hardware and fostering partnerships
Availability
6 quantum datasets suitable between quantum
and
for drug discovery research computing researchers
Accessibility
is limited. and pharmaceutical
companies can help
address data availability
and accessibility
challenges.
Ensuring compliance
with regulatory
requirements, addressing
ethical concerns related
to data privacy and
In drug discovery, the
Regulatory and security, and establishing
regulatory framework
7 Ethical guidelines for
concerning the utilization of
Considerations responsible and
QC and ML is still evolving.
transparent use of QML
in drug discovery are
important considerations
for its widespread
adoption.
REFERENCES
Alexeev, Y., Bacon, D., Brown, K.R., Calderbank, R., Carr, L.D., Chong,
F.T., DeMarco, B., Englund, D., Farhi, E., Fefferman, B., Gorshkov, A.V.,
Houck, A., Kim, J., Kimmel, S., Lange, M., Lloyd, S., Lukin, M.D.,
Maslov, D., Maunz, P., Monroe, C., Preskill, J., Roetteler, M., Savage,
M.J., Thompson, J., Quantum computer systems for scientific discovery,
PRX Quantum, 2, 017001, 2021.
Amanda, S., Ping, W., Wayne, L., Early diffusion of innovations with
quantum computing, ACIS 2023 Proceedings, 87, 2023.
Avramouli, M., Savvas, I.K., Vasilaki, A., Garani, G., Unlocking the
potential of quantum machine learning to advance drug discovery,
Electronics, 12, 2402, 2023.
Avramouli, M., Savvas, I.K., Vasilaki, A., Garani, G., Xenakis, A., Quantum
machine learning in drug discovery: Current state and challenges, in: PCI
’22: Proceedings of the 26th Pan-Hellenic Conference on Informatics,
394, 2022.
Balamurugan, K.S., Sivakami, A., Mathankumar, M., Satya Prasad, Y.J.D.,
Ahmad, I., Quantum computing basics, applications and future
perspectives, Journal of Molecular Structure, 1308, 137917, 2024.
Batra, K., Zorn, K.M., Foil, D.H., Minerali, E., Gawriljuk, V.O., Lane, T.R.
and Ekins, S., Quantum machine learning algorithms for drug discovery
applications, Journal of Chemical Information and Modeling, 61, 2641,
2021.
Beaudoin, C., Kundu, S., Topaloglu, R.O., Ghosh, S., Quantum machine
learning for material synthesis and hardware security, in: Proceedings of
the 41st IEEE/ACM International Conference on Computer-Aided
Design, San Diego, CA, USA, 30, 1, 2022.
Bhatia, A.S., Saggi, M.K., Kais, S., Quantum machine learning predicting
ADME-TOX properties in drug discovery, Journal of Chemical
Information and Modeling, 63, 6476, 2023.
Bonde, B., Patil, P., Choubey, B. (2024). The future of drug development
with quantum computing, Methods in Molecular Biology, 2716, 153,
2024.
Cao, Y., Romero, J., Aspuru-Guzik, A., Potential of quantum computing for
drug discovery, IBM Journal of Research and Development, 62, 6:1,
2018.
Carracedo-Reboredo, P., Linares-Blanco, J., Rodríguez-Fernández, N.,
Cedron, F., Novoa, F.J., Carballal, A., Maojo, V., Pazos, A., Fernandez-
Lozano, C. A review on machine learning approaches and trends in drug
discovery, Computational and Structural Biotechnology Journal, 19,
4538, 2021.
Cerezo, M., Arrasmith, A., Babbush, R., Benjamin, S.C., Endo, S., Fujii, K.,
McClean, J.R., Mitarai, K., Yuan, X., Cincio, L., Coles, P.J., Variational
quantum algorithms. Nature Reviews Chemistry, 3, 625, 2021.
Chae, E., Choi, J., Kim, J. An elementary review on basic principles and
developments of qubits for quantum computing, Nano Convergence, 11,
11, 2024.
DiVincenzo, D.P., Quantum gates and circuits, Proceedings of the Royal
Society of London, Series A, 454, 261, 1998.
Eddy, P., Bhattacherjee, A.B., A hybrid quantum regression model for the
prediction of molecular atomization energies, Machine Learning: Science
and Technology, 2, 025019, 2021.
Elbadawi, M., Gaisford, S., Basit, A.W., Advanced machine-learning
techniques in drug discovery, Drug Discovery Today, 26, 769, 2021.
Head-Marsden, K., Flick, J., Ciccarino, C.J., Narang, P., Quantum
information and algorithms for correlated quantum matter, Chemical
Reviews, 121, 3061, 2021.
Jain, S., Ziauddin, J., Leonchyk, P., Yenkanchi, S., Geraci, J., Quantum and
classical machine learning for the classification of non-small-cell lung
cancer patients, SN Applied Sciences, 2, 1088, 2020.
Jeyalakshmi, M.S., Sayyad, A.A., Deepak, A., Shrivastava, A., Rao, A.K.,
Chakrapani, I.S., Kumar, N., Badhoutiya, A., Quantum computing and
healthcare: Drug discovery and molecular simulation with machine
learning, International Journal of Intelligent Systems and Applications in
Engineering, 12(14s), 557, 2024.
Khan, T.M., Robles-Kelly, A., Machine learning: Quantum vs classical,
IEEE Access, 8, 219275, 2020.
Kumar, G., Yadav, S., Mukherjee, A., Hassija, V., Guizani, M., Recent
advances in quantum computing for drug discovery and development,
IEEE Access, 1, 99, 2024.
Lang, V., Quantum computing, in: Digital Fluency, Apress, Berkeley, CA,
2021.
Li, J., Ghosh, S., Scalable variational quantum circuits for autoencoder-
based drug discovery, in: Proceedings of the 2022 Design, Automation
and Test in Europe Conference and Exhibition (DATE), Antwerp,
Belgium, 340, 2022.
Li, J., Topaloglu, R.O., Ghosh, S., Quantum generative models for small
molecule drug discovery, IEEE Transactions on Quantum Engineering,
2, 1, 2021.
McArdle, S., Endo, S., Aspuru-Guzik, A., Benjamin, S.C., Yuan, X.,
Quantum computational chemistry, Reviews of Modern Physics, 92,
015003, 2020.
Mensa, S., Sahin, E., Tacchino, F., Barkoutsos, P.K., Tavernelli, I., Quantum
machine learning framework for virtual screening in drug discovery: A
prospective quantum advantage, Machine Learning: Science and
Technology, 4, 015023, 2023.
Michael, T., Exploring information for quantum machine learning models,
Electronic Theses and Dissertations, 3433, 2020.
Mishra, N., Kapil, M., Rakesh, H., Anand, A., Mishra, N., Warke, A.,
Sarkar, S., Dutta, S., Gupta, S., Prasad Dash, A., Gharat, R., Quantum
machine learning: A review and current status, in: Data Management,
Analytics and Innovation. Advances in Intelligent Systems and
Computing, Sharma, N., Chakrabarti, A., Balas, V.E., Martinovic, J.,
Eds., Springer, Singapore, 1175, 2021.
Montanaro, A., Quantum algorithms: An overview, npj Quantum
Information, 2, 15023, 2016.
Padhi, P.K., A quest towards quantum internet model, International Journal
of Engineering Technology Research & Management, version v1, 2019.
https://zenodo.org/records/3380463
Popa, R., Dumitrescu, E., Drug discovery in the 21st century: Exploring the
promises and potential of quantum machine learning, Journal of
Contemporary Healthcare Analytics, 7, 1, 2023.
Preskill, J., Quantum computing in the NISQ era and beyond, Quantum, 2,
79, 2018.
Pyrkov, A., Aliper, A., Bezrukov, D., Lin, Y.C., Polykovskiy, D., Kamya, P.,
Ren, F., Zhavoronkov, A., Quantum computing for near-term applications
in generative chemistry and drug discovery, Drug Discovery Today, 28,
103675, 2023.
Ramouthar, R., Seker, H., Hybrid quantum algorithms and quantum
software development frameworks, ScienceOpen Preprints, 1, 2023.
http://doi.org/10.14293/PR2199.000298.v1
Robert, A., Barkoutsos, P.K., Woerner, S., Tavernelli, I., Resource-efficient
quantum algorithm for protein folding, npj Quantum Information, 7, 38,
2021.
Sajjan, M., Li, J., Selvarajan, R., Shree Hari Sureshbabu, S.H., Kale, S.S.,
Gupta, R., Singh, V., Kais, S., Quantum machine learning for chemistry
and physics, Chemical Society Reviews, 51, 6475, 2022.
Simmons, R.M., Mbeki, B.J., A critical analysis of quantum machine
learning in preclinical drug development: Opportunities and challenges,
Journal of Intelligent Connectivity and Emerging Technologies, 8, 1,
2023.
Sliwoski, G., Kothiwale, S., Meiler, J., Lowe, E.W., Computational methods
in drug discovery, Pharmacological Research, 66, 334, 2014.
Ullah, U., Garcia-Zapirain, B., Quantum machine learning revolution in
healthcare: A systematic review of emerging perspectives and
applications, IEEE Access, 12, 11423, 2024.
Vedral, V., Plenio, M.B., Basics of quantum computation, Progress in
Quantum Electronics, 22, 1, 1998.
Von Lilienfeld, O.A., Muller, K.R., Tkatchenko, A., Exploring chemical
compound space with quantum-based machine learning, Nature Reviews
Chemistry, 4, 347, 2020.
www.globenewswire.com/news-release/2021/07/13/2261611/0/en/Rigetti-
Computing-Partners-with-Riverlane-Astex-Pharmaceuticals-to-Advance-
Quantum-Computing-for-Drug-Discovery.html
Yoshito, K., Seong-Moo, Y., Quantum computing: Principles and
applications, Journal of International Technology and Information
Management, 29, 3, 2020.
Zinner, M., Dahlhausen, F., Boehme, P., Ehlers, J., Bieske, L., Fehring, L.,
Quantum computing’s potential for drug discovery: Early stage industry
dynamics, Drug Discovery Today, 26, 1680, 2021.
8 Quantum Neural Networks
An Overview
Priyanga Subbiah, Kandan M., Krishnaraj N.,
and Shaji. K.A. Theodore
DOI: 10.1201/9781003499459-8
8.1 INTRODUCTION
Quantum neural networks, also known as QNNs, are a paradigm shift in the
field of machine learning and artificial intelligence. They make use of the
fundamental principles of quantum physics to revolutionise the means by
which data is processed and analysed. Traditional neural networks, which
are based on classical bits, are constrained by the inherent limitations of
classical physics, which in turn restricts the processing power and
efficiency of these networks. On the other hand, quantum neural networks
make use of the peculiar characteristics of quantum bits (qubits), making
use of phenomena such as superposition and entanglement to unlock
computing powers that are virtually unmatched. Exploring the potential of
quantum neural networks to solve complicated optimisation issues, pattern
recognition tasks, and even quantum simulation tasks has been made
possible by the advent of quantum computing, which has opened up new
paths for this exploration. In the following chapter, we will delve into the
fundamental concepts and numerous applications of quantum neural
networks (Rukhsana, 2023), shedding light on the revolutionary influence
that QNNs have had on a variety of scientific and technological fields. We
investigate the fundamental architecture, training techniques, and
prospective applications of quantum neural networks, shedding light on the
benefits and difficulties associated with using QNNs in comparison to
traditional neural networks.
The fundamental notion of qubits, which may be thought of as the
quantum equivalent of classical bits, is at the heart of quantum neural
networks. At the same time, qubits are able to exist in a superposition of
both states concurrently, in contrast to classical bits, which can only exist in
one of two states: either 0 or 1. As a result of this intrinsic superposition
characteristic, QNNs are able to carry out numerous calculations
simultaneously, which exponentially increases their processing capability.
The phenomenon of quantum entanglement is utilised by QNNs. This
phenomenon is characterised by the fact that the state of one qubit gets
correlated with the state of another qubit, regardless of the distance that
separates the two qubits. With the help of this entanglement characteristic,
QNNs are able to process information in a highly linked fashion, which
makes the process of data processing and analysis more convenient and
effective.
The architecture of quantum neural networks is meant to take use of the
one-of-a-kind characteristics of qubits while also preserving compatibility
with the frameworks of conventional neural networks. The representation of
qubits as neurons in a quantum circuit is a typical technique. The
connections between qubits are thought to reflect synaptic weights. Several
different designs for quantum neural networks have been proposed, such as
feedforward quantum neural networks, recurrent quantum neural networks,
and quantum convolutional neural networks. Each of these QNN
architectures is customised to certain tasks and applications. Training
quantum neural networks provides a unique set of problems due to the
intricate interaction between quantum physics and the dynamics of neural
networks (Min-Gang et al., 2023). In order to train QNNs, conventional
training algorithms like backpropagation are not immediately relevant. As a
result, the development of unique techniques is required. For the purpose of
training quantum neural networks, many strategies are being investigated.
These techniques include quantum gradient descent algorithms, quantum
variational algorithms, and quantum autoencoders. Each of these techniques
offers a unique set of trade-offs in terms of training efficiency and
convergence.
The applications that might make use of quantum neural networks
encompass a broad variety of fields, ranging from optimisation and pattern
recognition to quantum simulation and even farther. Quantum neural
networks hold the potential to provide exponential speedups in optimisation
tasks compared to classical algorithms. This would make it possible to find
more effective solutions to complicated optimisation issues in domains such
as engineering, finance, and logistics. The capacity of QNNs to handle and
analyse massive datasets with an unparalleled level of accuracy and
efficiency lends them tremendous potential in the field of pattern
recognition, which is another area where they show significant promise.
The use of QNNs has the potential to revolutionise image identification,
natural language processing, and other pattern recognition tasks. This would
open up new opportunities for applications powered by artificial
intelligence in a variety of companies and sectors. An innovative method
for modelling and comprehending complicated quantum systems, such as
chemical processes, the characteristics of materials, and quantum dynamics,
is provided by quantum neural networks in the field of quantum simulation
(Bu-Qing et al., 2020). It is possible for quantum neural networks to give
insights into fundamental quantum phenomena and to aid the development
of novel materials and pharmaceuticals. This is accomplished by replicating
the behaviour of quantum systems on quantum hardware.
In the larger realm of quantum technology, the development of quantum
neural networks has important implications for a variety of applications,
including quantum computing, quantum communication, and quantum
sensing. The use of quantum neural networks as building blocks for
quantum algorithms and protocols enables the development of solutions that
are both more efficient and scalable for quantum computing activities.
These tasks include quantum optimisation, quantum cryptography, and
quantum machine learning. Quantum neural networks have the potential to
improve the capabilities of quantum communication networks by enabling
data processing and analysis that is both safe and efficient. Quantum neural
networks also show promise for applications in quantum sensing, which is a
field in which accurate measurement and analysis of quantum states are
crucial for detecting and quantifying physical quantities with an
unparalleled level of sensitivity and precision.
The introduction of quantum neural networks signals the beginning of a
new age of invention and discovery, which has the potential to revolutionise
several sectors, speed up scientific research, and meet the most pressing
concerns facing society. Applications of quantum neural networks in
domains such as healthcare, banking, energy, and cybersecurity have the
potential to revolutionise the way in which we diagnose diseases, optimise
financial portfolios, generate new materials, and safeguard our digital
infrastructure. Furthermore, the development of quantum neural networks
gives potential for economic growth and employment creation. This is
because firms and academic institutes are investing in the research and
development of quantum computing. We are able to harness the full
potential of QNNs to drive innovation, promote economic development,
and improve the quality of life for people all over the world if we foster
collaboration between the government, industry, and academic institutions.
Quantum neural networks are a revolutionary approach to machine learning
and artificial intelligence. Leveraging the laws of quantum physics, these
networks are able to attain new levels of computing power and efficiency.
Through the use of the one-of-a-kind characteristics of qubits, QNNs
provide novel options. Understanding the components of quantum
computing is made easier by looking at Figure 8.1.
TABLE 8.1
Outlining Various Quantum Circuit Representations
Representation Description
Quantum gates are fundamental building blocks of
Quantum Gates quantum circuits. They perform operations on qubits,
such as superposition, entanglement, and measurement.
Quantum circuits represent quantum algorithms as a
Quantum Circuits sequence of quantum gates applied to qubits. They
provide a visual depiction of the computation process.
Quantum circuit diagrams use symbols to represent
Quantum Circuit
quantum gates and qubits, making it easier to visualise
Diagrams
complex quantum algorithms and operations.
Quantum circuit notation uses a textual representation
Quantum Circuit
of quantum gates and operations, often in the form of a
Notation
programming language or script.
Quantum circuit software, such as Qiskit and Cirq,
Quantum Circuit
provides tools and libraries for designing, simulating,
Software
and executing quantum circuits on quantum computers.
TABLE 8.2
Common Quantum Gates and Operations
Quantum
Description Function
Gate/Operation
Hadamard Gate Creates superposition Transforms basis states to
(H) state superposition state
Pauli-X Gate (X) Bit-flip gate Flips the state of a qubit from
Bit-flip gate with Flips the state of a qubit and
Pauli-Y Gate (Y)
phase change introduces a phase shift
Introduces a phase shift to the
Pauli-Z Gate (Z) Phase-flip gate
state of a qubit
Performs a NOT operation on
CNOT Gate Controlled-NOT gate the target qubit if the control
qubit is in the ∣1⟩ state
Swaps the states of Exchanges the states of two
SWAP Gate
two qubits qubits
Introduces a π/4 phase shift to
T Gate π/8 phase gate
the ∣1⟩ state
Applies a phase shift to the
Controlled Phase Introduces a
target qubit if the control qubit
Gate controlled phase shift
is in the ∣1⟩ state
Quantum
Description Function
Gate/Operation
Measures the state of
Collapses the quantum state to a
Measurement a qubit in a specific
classical state
basis
TABLE 8.4
Outlining Applications of Quantum Neural Networks
Application Description
Quantum neural networks can be used to
Quantum Machine
accelerate machine learning tasks, such as pattern
Learning
recognition and data analysis.
Quantum Optimisation Quantum neural networks are applied to
optimisation problems, including portfolio
Application Description
optimisation and route planning.
Quantum neural networks aid in simulating and
Quantum Chemistry predicting molecular properties, facilitating drug
discovery and materials science.
Quantum neural networks are used in financial
Quantum Finance
modelling, risk analysis, and algorithmic trading.
Quantum neural networks contribute to the
Quantum Cryptography development of secure cryptographic protocols
resistant to quantum attacks.
Quantum neural networks can generate complex
Quantum Generative
data distributions and synthetic data for training
Modelling
classical machine learning models.
Quantum-Enhanced Quantum neural networks enhance reinforcement
Reinforcement learning algorithms for autonomous systems and
Learning robotics.
Quantum naïve neural networks have shown that they have the potential
to solve problems and successfully simulate chemical systems in the field of
quantum chemistry. As the number of atoms in the Hilbert space rises
exponentially, it becomes increasingly difficult to solve issues using
classical computers. Some examples of these challenges are molecular
electrical structure modelling, molecular property prediction, and chemical
process simulation. All of these activities are within the scope of what
quantum computers are capable of doing. There is a correlation between the
utilisation of QNNs and improvements in financial models, portfolio
optimisation, risk assessment, and derivative pricing. The enhancement of
financial statistics analysis, the identification of patterns in market data, and
the optimisation of investment plan are all within their powers. It’s possible
that this will result in larger returns with lower risk. The use of QNNs has
the potential to make traditional machine learning algorithms run more
quickly. This is accomplished by moving some computing workloads to
quantum processors. By utilising algorithms and data structures that are
influenced by quantum physics, it is feasible to accelerate some
calculations. Some examples of these computations include matrix
multiplication, searching for the nearest neighbour, and solving linear
systems of equations. These are only a few of the many possible uses of
quantum neural networks; there are many more. As the technology behind
quantum computing continues to progress, many people expect that
quantum neural networks will become increasingly crucial in the process of
addressing complicated issues in a variety of different fields.
8.10 CONCLUSION
Finally, the introduction of quantum neural networks has brought about a
revolutionary shift in artificial intelligence and machine learning.
Techniques for data processing and analysis that are based on the principles
of quantum physics are presented by them as an alternative to the
conventional kind of wisdom known as convolutional. Quantum neural
networks have the potential to exceed ordinary neural networks in terms of
processing speed and efficiency, according to theoretical models. In order
for this to take place, quantum bits and quantum phenomena like
entanglement and superposition are required. Throughout the entirety of this
chapter, we have investigated the foundations of QNNs as well as their
applications, proving that they are capable of handling difficult optimisation
issues, pattern recognition tasks, and quantum simulation workloads.
Several different QNN designs, training techniques, and applications are
compared and contrasted in this chapter. The primary focus of this
investigation is on the advantages and disadvantages of these networks in
comparison to more convolutional neural networks. In addition, we have
investigated the possible social and economic impacts of quantum neural
networks, as well as the effects that these networks have on certain quantum
computing, communication, and sensing domains. Despite the fact that
quantum neural networks have the potential to significantly increase
machine learning and artificial intelligence capabilities, they still present a
number of critical obstacles that need to be resolved. A few examples are
scalable qubit technology, robust training algorithms, and efficient error
correction techniques. Others include scalable qubit technology. In addition,
in order for QNNs to be included in applications that are used in the real
world, a number of domain specialists would need to collaborate and
engage in research and development. When everything is taken into
consideration, this chapter offers fascinating background on the developing
subject of quantum neural networks and draws attention to the tremendous
prospects that exist for future study and development in this particular
scientific area. We may be able to discover new approaches to solving
difficult issues and advance scientific, technical, and societal advancements
if we continue to learn more about quantum neural networks and improve
upon them.
REFERENCES
OceanofPDF.com
9 Exploring the Intersection of
Quantum Neural Networks and
Classical Neural Networks for
Early Cancer Identification
J. Olalekan Awujoola, T. Aniemeka Enem, J.
Adeyemi Owolabi, O. Christiana Akusu, O.
Abioye, E. AbidemiAwujoola, and R.
OlayinkaAdelegan
DOI: 10.1201/9781003499459-9
9.1 INTRODUCTION
Quantum mechanics, a branch of physics, focuses on understanding the
behavior of particles at extremely small scales, characterized by discrete
values for certain quantities. While traditionally applied to microscopic
systems, quantum mechanics also has implications for macroscopic
phenomena. The term “quantum” emphasizes the discrete nature of these
values, contrasting with the continuous values observed in classical
mechanics. In recent years, the intersection of quantum computing and deep
learning has garnered significant attention, leading to notable advancements
in both fields (Kwak et al., 2021). Within deep learning, previously
perceived limitations such as gradient vanishing, local minima, and
inefficiencies in large-scale parameter training are being progressively
overcome (Park et al., 2021). This progress has been facilitated by the
emergence of innovative algorithms like quantum neural networks (QNNs),
convolutional neural networks (CNNs), and recurrent neural networks
(RNNs), fundamentally transforming data processing methodologies.
Quantum computing harnesses the principles of entanglement and
superposition to redefine the basic unit of data, known as the bit, into a
quantum bit (qubit) (Arute et al., 2019). Various approaches exist for the
physical realization of quantum computers, including photonic and silicon-
based circuitry. However, progress has been hindered by challenges related
to entropy and noise. Despite these obstacles, the theoretical framework of
quantum computing is sufficiently developed to be implemented once full-
scale quantum computers become viable. Quantum computers offer
unparalleled computational speed and the ability to process vast amounts of
data simultaneously. Unlike classical bits, which convey information
through binary representation, qubits within quantum gates exchange
information instantaneously, leading to exponential computational
capabilities. This unique property, known as quantum supremacy, enables a
single quantum computer to surpass the computational power of all existing
classical computers combined. While quantum computation is a relatively
nascent field, rapid advancements in both theoretical and practical aspects
are driving researchers towards the development of novel logic gates and
physical hardware. Presently, limited-scale quantum computers are already
making significant contributions in specialized areas such as
pharmaceuticals and chemical interactions for next-generation batteries.
Projections suggest that fully capable quantum computers will become
publicly accessible by the end of the 21st century (Sahib et al., 2023).
Concurrently, the field of quantum computing has witnessed rapid
evolution, transitioning from a realm of theoretical potential to one of
tangible progress. Notably, variational quantum circuits (VQCs) have
emerged as a promising paradigm within quantum computing, showcasing
remarkable capabilities in solving combinatorial optimization problems and
addressing challenges in molecular energy calculations (Kwak et al., 2021).
These advancements have spurred the exploration of quantum computing’s
applicability in designing novel machine learning algorithms. Among these
endeavors, quantum deep learning has emerged as a burgeoning field,
leveraging insights from traditional deep learning research while harnessing
the unique capabilities of quantum computing. As evidenced by a plethora
of recent publications, quantum deep learning has yielded notable
achievements, prompting continued investigation and follow-up studies in
the present era. In recent years, advances in computing technology have
made it possible to process large-scale data more effectively. Quantum
computing (QC) has emerged as a promising solution for solving complex
tasks much faster than traditional computers. This advancement holds
significant potential for the healthcare sector, especially as the volume and
diversity of health data continue to grow rapidly. Quantum computing
offers a revolutionary approach to enhancing healthcare technologies. While
previous research has showcased the potential of QC in introducing new
possibilities for complex healthcare computations, the existing literature on
QC for healthcare remains largely unstructured. Additionally, the papers on
QC for healthcare that have been proposed so far only cover a small
fraction of the disruptive use cases that QC could offer in the healthcare
field (Ur Rasool et al., 2023).
The origins of quantum neural network research date back to the 1990s,
marking a significant milestone in the exploration of quantum computing
principles applied to neural networks. During this nascent stage, researchers
ventured into various directions within this emerging field, proposing
numerous ideas and preliminary models that underscored the vast potential
of QNN research. In 1995, Kak introduced the concept of quantum neural
computation, pioneering the integration of quantum computation into
neuron modeling for the first time. Subsequent advancements led to the
development of diverse QNN models, each offering unique insights and
approaches. For instance, in 1997, Karayiannis and Xiong conceptualized a
QNN model based on the superposition of quantum states within the
traditional three-layer neural network structure, incorporating multi-stage
excitation functions to imbue the network with inherent fuzziness.
Further contributions emerged globally, with researchers from Japan and
China making notable strides in QNN development. In 2000, Kouda et al.
proposed a QNN model leveraging single-bit quantum rotation gates and
controlled-not gates, integrating quantum states as neuron states and
employing qubits-based information representation and processing methods
within traditional neural network topologies. Meanwhile, in China, Cao et
al. (2022) and Xie et al. (2023) pioneered the exploration of quantum neural
computing concepts, laying the groundwork for subsequent research
endeavors in the country. Notably, Xie et al. (2023) introduced the
innovative QNNk model, utilizing the general quantum logic gate group as
the basis function for calculations, thereby contributing to the advancement
of QNN methodologies.
These early endeavors reflect the dynamic landscape of QNN research,
characterized by cross-disciplinary collaboration and innovative problem-
solving approaches. As the field continues to evolve, the synthesis of
quantum computing principles and neural network architectures holds the
promise of unlocking new frontiers in artificial intelligence and
computational neuroscience.
Quantum neural networks represent a cutting-edge domain in modern
research, blending quantum and classical computational paradigms to
provide a powerful tool for quantum machine learning endeavors.
Recognized interchangeably as variational or parameterized quantum
circuits (PQCs), QNNs have garnered significant attention within the
quantum machine learning landscape. This surge in interest is highlighted in
studies by Beer et al. (2020), Bharti et al. (2022), Cerezo et al. (2021), and
others. Extensive literature, surveyed by Behrman et al. (2008), Jeswal et al.
(2019), Mangini et al. (2021), Zhao and Wang (2021), and Li and Deng
(2021), explores various methodologies for implementing QNNs and
related model classes. Early investigations into QNNs, as detailed by Kak
(1995), Behrman et al. (2008), and Nguyen (2019), originated from
biological and hardware perspectives. However, contemporary
characterizations of QNNs pivot towards their integration with classical
artificial neural networks, emphasizing parameter optimization through
training procedures. This evolution underscores the dynamic nature of
research in this field, as QNNs continue to push the boundaries of quantum
machine learning capabilities.
In the rapidly evolving landscape of artificial intelligence (AI) and
quantum computing, researchers are actively working to bridge these two
realms. This endeavor is evident in the optimization efforts directed towards
quantum data, as highlighted in studies by Cong et al. (2019) and Beer et al.
(2020), as well as in the exploration of deep learning architectures extended
into quantum structures by researchers like Bausch (2020), Henderson et al.
(2019), Kerenidis et al. (2020), Lloyd and Weedbrook (2018), Dallaire-
Demers and Killoran (2018), and Zoufal et al. (2019). Amidst these
endeavors, enhancing the expressibility, trainability, and generalization
power of quantum neural networks emerges as a central research focus.
QNNs represent a convergence of quantum mechanics and neural network
paradigms, offering significant potential while grappling with inherent
complexities. Ongoing efforts are dedicated to unlocking this potential,
overcoming challenges, and paving the way towards quantum-enhanced
artificial intelligence.
This chapter represents a progressive step forward, building upon the
advancements in both classical and quantum neural networks to tackle
image classification challenges more effectively. The focus is on leveraging
quantum neural networks in real-world applications, particularly in the
recognition of breast cancer, a critical medical diagnostic task. The
approach involves constructing a classical enhanced quantum neural
network tailored for this purpose. Through experiments, the performance of
this novel architecture is assessed and compared against traditional classical
neural networks. A key aspect of this comparison involves evaluating
computational efficiency, particularly in scenarios with limited computing
resources. This exploration aims to provide insights into the efficacy and
feasibility of utilizing quantum-enhanced approaches in practical image
classification tasks.
9.2 QUANTUM COMPUTING FOUNDATIONS
Quantum computing, rooted in the principles of quantum mechanics,
emerged as a groundbreaking concept in the 1980s through seminal studies
by Benioff (1980) and Feynman (1982). Feynman’s proposition of quantum
computation stems from the notion that the quantum universe can only be
faithfully simulated by quantum computers, setting them apart from
classical counterparts. Furthermore, the decline of Moore’s law, which
traditionally dictated that computing power doubles every two years (Prati
et al., 2017; Markov, 2014), necessitates a transition from classical to
quantum computing. As transistors continue to shrink in size, reaching the
atomic scale, control over them becomes inherently quantum, thus paving
the way for quantum computers to become the next frontier in computing
technology.
The transition to quantum computing also presents compelling
advantages, notably exponential speed-ups achievable with certain quantum
algorithms (Nielsen and Chuang, 2011). Over the years, numerous quantum
algorithms have demonstrated significant enhancements in efficiency
compared to their classical counterparts (Montanaro, 2016). One such
application is the training of neural networks, where quantum algorithms
hold promise for revolutionizing the optimization process. Beyond the
theoretical realm, the practical implications of quantum computing are
profound. By harnessing quantum phenomena such as superposition and
entanglement, quantum computers possess the potential to tackle complex
computational tasks that surpass the capabilities of classical systems. For
instance, quantum algorithms offer unprecedented speed-ups in
optimization, cryptography, and machine learning tasks like neural network
training.
The transition to quantum computing represents a paradigm shift in
computational technology, with far-reaching implications across various
domains. As research and development in quantum computing continue to
advance, the integration of quantum algorithms into practical applications
becomes increasingly feasible. With exponential speed-ups and enhanced
computational capabilities, quantum computing holds the promise of
revolutionizing industries and unlocking new frontiers in scientific
exploration.
In the realm of neural network training, quantum algorithms offer the
potential to overcome existing bottlenecks and accelerate model
optimization processes. By leveraging quantum principles to explore vast
solution spaces more efficiently, quantum-enhanced neural network training
algorithms can drive advancements in artificial intelligence and machine
learning (Pira and Ferrie, 2023). Moreover, the synergy between quantum
computing and neural networks opens up new avenues for innovation, with
the potential to address complex problems in image recognition, natural
language processing, and other AI-driven tasks. Therefore, the emergence
of quantum computing heralds a new era in computational science, offering
exponential speed-ups and unprecedented computational capabilities. With
ongoing research and development efforts, the integration of quantum
algorithms into practical applications, including neural network training,
holds the promise of transforming industries and driving innovation in
artificial intelligence. As humanity navigates towards this quantum future,
the possibilities for groundbreaking advancements are boundless.
symbol |⋅⟩ indicates its vectorial nature. This vector nature enables qubits to
exist in a continuum of states, known as superposition. Mathematically,
superposition is represented as a linear combination of the basis states:
|ψ⟩ = α|0⟩ + β|1⟩ (9.1)
Given that there are 2n basis vectors, the space as a whole possesses a
dimensionality of 2n, allowing for any quantum information state to be
expressed as an arbitrary combination, and can be expressed as:
n
2
ψ⟩ = ∑ α b |b⟩, (9.2)
b=1
ψ⟩
2
= ∑ |αb|
2
= 1 , (9.3)
b=1
1 1 0 1 0 −i 1 0
1
eq (9.4)
1
H = [ ], X = [ ], Y [ ], Z = [ ], CN OT = 0
√2
1 −1 1 0 i 0 0 −1
0
TABLE 9.1
Results from the Evaluation of ANN on Breast Cancer
Mean Mean
F1-
Precision Recall Support Training Testing
Score
Time Time
Class 0 0.62 1.00 0.77 2376 126.516s 0.583s
Class 1 0.00 0.00 0.00 1440
Accuracy 0.62 3816
Macro Avg 0.31 0.50 0.38 3816
Weighted
0.39 0.62 0.48 3816
Avg
FIGURE 9.3 Confusion matrix obtained from ANN.
Both the QNN and ANN achieved an overall accuracy of 0.62, indicating
comparable performance in classifying breast cancer cases. However, closer
examination reveals distinct differences in their computational time
efficiency.
In terms of mean training time, the QNN demonstrated a substantial
reduction compared to the ANN. The mean training time for the QNN was
recorded at 99.867 seconds, significantly shorter than the ANN’s mean
training time of 126.516 seconds. This indicates that the QNN requires less
time to train on the dataset, potentially offering faster model development
and iteration cycles.
Similarly, the mean testing time for the QNN was notably lower than that
of the ANN. The QNN recorded a mean testing time of 0.277 seconds,
while the ANN’s mean testing time was 0.583 seconds. This suggests that
the QNN can process new data and make predictions more rapidly than the
ANN, contributing to quicker diagnostic assessments in clinical settings.
Quantum computation harnesses the principles of superposition and
entanglement, allowing quantum systems to process multiple computations
simultaneously. This inherent parallelism enables QNNs to explore a
broader range of solutions in a shorter amount of time compared to classical
ANN architectures. While classical ANNs process data sequentially, QNNs
can leverage quantum parallelism to perform computations on multiple
states simultaneously, leading to faster training and testing times.
Additionally, QNNs benefit from the efficient representation of data
using quantum bits (qubits). Unlike classical bits, which can only exist in
one state at a time (0 or 1), qubits can exist in a superposition of states,
allowing for more efficient storage and manipulation of information. This
efficient representation of data contributes to the faster processing
capabilities of QNNs, as they can encode and process information more
compactly compared to classical ANNs.
These findings highlight the computational advantages of the QNN
architecture over the ANN in terms of training and testing times. The
reduced computational time requirements of the QNN signify its potential
for enhanced efficiency in medical diagnostics, allowing for faster analysis
of breast cancer cases and expedited decision-making processes.
Comparing the confusion matrices derived from the assessment of the
quantum neural network, depicted in Figure 9.5, and the artificial neural
network in breast cancer diagnosis offers valuable insights into the
performance of these models.
The confusion matrix for the QNN indicates that it correctly classified all
benign cases as benign, with a total of 2376 true positive predictions.
However, the QNN failed to correctly identify any malignant cases,
resulting in 1440 false negative predictions. On the other hand, the ANN
correctly classified 2371 benign cases as benign, but it made 5 false positive
predictions by incorrectly classifying benign cases as malignant. Similar to
the QNN, the ANN also failed to identify any malignant cases correctly,
resulting in 1440 false negative predictions.
Comparing the two models, we observe that while the QNN achieved
higher accuracy in classifying benign cases, it struggled with identifying
malignant cases. Conversely, the ANN exhibited slightly lower accuracy in
classifying benign cases but performed similarly in correctly identifying
malignant cases.
The discrepancies in the confusion matrices highlight the strengths and
weaknesses of each model. The QNN’s ability to correctly classify all
benign cases without making any false positive predictions demonstrates its
potential for minimizing unnecessary interventions in clinical settings.
However, its inability to correctly identify malignant cases raises concerns
about its reliability in detecting actual instances of cancer.
On the other hand, the ANN’s performance, while slightly inferior in
terms of false positive predictions, demonstrates a better balance between
sensitivity and specificity. Despite misclassifying a few benign cases as
malignant, the ANN showed comparable accuracy in detecting malignant
cases.
Amin, J., Sharif, M., Gul, N., Kadry, S., & Chakraborty, C. (2022).
Quantum machine learning architecture for COVID-19 classification
based on synthetic data generation using conditional adversarial neural
network. Cognitive Computation, 14(5), 1677–1688.
Arute, F., Arya, K., Babbush, R., Bacon, D., Bardin, J. C., Barends, R., . . .
& Martinis, J. M. (2019). Quantum supremacy using a programmable
superconducting processor. Nature, 574(7779), 505–510.
Beer, K., Bondarenko, D., Farrelly, T., Osborne, T. J., Salzmann, R.,
Scheiermann, D., & Wolf, R. (2020). Training deep quantum neural
networks. Nature Communications, 11(1), 808.
Behrman, E. C., Steck, J. E., Kumar, P., & Walsh, K. A. (2008). Quantum
algorithm design using dynamic learning. arXiv preprint
arXiv:0808.1558.
Benedetti, M., Realpe-Gómez, J., & Perdomo-Ortiz, A. (2018). Quantum-
assisted Helmholtz machines: A quantum–classical deep learning
framework for industrial datasets in near-term devices. Quantum Science
and Technology, 3, 034007. [CrossRef]
Bertels, K. O. E. N., Sarkar, A., Hubregtsen, T., Serrao, M., Mouedenne, A.
A., Yadav, A., . . . & Almudever, C. G. (2020). Quantum computer
architecture toward full-stack quantum accelerators. IEEE Transactions
on Quantum Engineering, 1, 1–17.
Bharti, K., Cervera-Lierta, A., Kyaw, T. H., Haug, T., Alperin-Lea, S.,
Anand, A., . . . & Aspuru-Guzik, A. (2022). Noisy intermediate-scale
quantum algorithms. Reviews of Modern Physics, 94(1), 015004.
Cao, N., Xie, J., Zhang, A., Hou, S. Y., Zhang, L., & Zeng, B. (2022).
Neural networks for quantum inverse problems. New Journal of Physics,
24(6), 063002.
Cerezo, M., Sone, A., Volkoff, T., Cincio, L., & Coles, P. J. (2021). Cost
function dependent barren plateaus in shallow parametrized quantum
circuits. Nature Communications, 12(1), 1791.
Choudhuri, R., &Halder, A. (2023). Brain MRI tumour classification using
quantum classical convolutional neural net architecture. Neural
Computing and Applications, 35(6), 4467–4478.
Copsey, D., Oskin, M., Impens, F., Metodiev, T., Cross, A., Chong, F. T., . . .
& Kubiatowicz, J. (2003). Toward a scalable, silicon-based quantum
computing architecture. IEEE Journal of Selected Topics in Quantum
Electronics, 9(6), 1552–1569.
Dallaire-Demers, P. L., & Killoran, N. (2018). Quantum generative
adversarial networks. Physical Review A, 98(1), 012324.
Dutt, V., Chandrasekaran, S., & García-Díaz, V. (2020). Quantum neural
networks for disease treatment identification. European Journal of
Molecular & Clinical Medicine, 7(11), 57–67.
Farhi, E., & Neven, H. (2018). Classification with quantum neural networks
on near term processors. arXiv preprint arXiv:1802.06002
Flöther, F. F. (2023). The state of quantum computing applications in health
and medicine. arXiv preprint arXiv:2301.09106.
Henderson, M., Shakya, S., Pradhan, S., & Cook, T. (2020). Quanvolutional
neural networks: powering image recognition with quantum circuits.
Quantum Machine Intelligence, 2(1), 2.
Iyer, V., Ganti, B., Hima Vyshnavi, A. M., Krishnan Namboori, P. K., &
Iyer, S. (2020). Hybrid quantum computing based early detection of skin
cancer. Journal of Interdisciplinary Mathematics, 23(2), 347–355.
Jeswal, S. K., & Chakraverty, S. (2019). Recent developments and
applications in quantum neural network: A review. Archives of
Computational Methods in Engineering, 26(4), 793–807.
Jones, N. C., Van Meter, R., Fowler, A. G., McMahon, P. L., Kim, J., Ladd,
T. D., & Yamamoto, Y. (2012). Layered architecture for quantum
computing. Physical Review X, 2(3), 031007.
Kak, S. C. (1995). Quantum neural computing. Advances in Imaging and
Electron Physics, 94, 259–313.
Karayiannis, N. B., & Xiong, Y. (2006). Training reformulated radial basis
function neural networks capable of identifying uncertainty in data
classification. IEEE Transactions on Neural Networks, 17(5), 1222–
1234.
Kerenidis, I., Luongo, A., & Prakash, A. (2020, November). Quantum
expectation-maximization for Gaussian mixture models. In International
Conference on Machine Learning (pp. 5187–5197). PMLR.
Kerenidis, I., & Prakash, A. (2016). Quantum recommendation systems.
arXiv preprint arXiv:1603.08675.
Konar, D., Bhattacharyya, S., Gandhi, T. K., & Panigrahi, B. K. (2020). A
quantum-inspired self-supervised network model for automatic
segmentation of brain MR images. Applied soft computing, 93, 106348.
Kouda, N., Matsui, N., & Nishimura, H. (2000, September). Learning
performance of neuron model based on quantum superposition. In
Proceedings 9th IEEE International Workshop on Robot and Human
Interactive Communication. IEEE RO-MAN 2000 (Cat. No. 00TH8499)
(pp. 112–117). IEEE.
Kwak, Y., Yun, W. J., Jung, S., & Kim, J. (2021, August). Quantum neural
networks: Concepts, applications, and challenges. In 2021 Twelfth
International Conference on Ubiquitous and Future Networks (ICUFN)
(pp. 413–416). IEEE.
Lamata, L. (2017). Basic protocols in quantum reinforcement learning with
superconducting circuits. Scientific Reports, 7(1), 1609
Landman, J., Mathur, N., Li, Y. Y., Strahm, M., Kazdaghli, S., Prakash, A.,
& Kerenidis, I. (2022). Quantum methods for neural networks and
application to medical image classification. Quantum, 6, 881.
Lanyon, B. P., Weinhold, T. J., Langford, N. K., Barbieri, M., James, D. F.,
Gilchrist, A., & White, A. G. (2007). Experimental demonstration of a
compiled version of Shor’s algorithm with quantum entanglement.
Physical Review Letters, 99, 250505.
Lienhard, B., Vepsäläinen, A., Govia, L. C., Hoffer, C. R., Qiu, J. Y., Ristè,
D., . . . & Oliver, W. D. (2022). Deep-neural-network discrimination of
multiplexed superconducting-qubit states. Physical Review Applied,
17(1), 014024.
Linke, N. M., Maslov, D., Roetteler, M., Debnath, S., Figgatt, C.,
Landsman, K. A., . . . & Monroe, C. (2017). Experimental comparison of
two quantum computing architectures. Proceedings of the National
Academy of Sciences, 114(13), 3305–3310.
Lloyd, S., & Weedbrook, C. (2018). Quantum generative adversarial
learning. Physical Review Letters, 121(4), 040502.
Mangini, S., Tacchino, F., Gerace, D., Bajoni, D., & Macchiavello, C.
(2021). Quantum computing models for artificial neural networks.
Europhysics Letters, 134(1), 10002.
Mangini, S., Tacchino, F., Gerace, D., Macchiavello, C., & Bajoni, D.
(2020). Quantum computing model of an artificial neuron with
continuously valued input data. Machine Learning: Science and
Technology, 1(4), 045008
Mari, A., Bromley, T. R., Izaac, J., Schuld, M., & Killoran, N. (2020).
Transfer learning in hybrid classical-quantum neural networks. Quantum,
4, 340.
Mathur, N., Landman, J., Li, Y. Y., Strahm, M., Kazdaghli, S., Prakash, A.,
&Kerenidis, I. (2021). Medical image classification via quantum neural
networks. arXiv preprint arXiv:2109.01831.
Metodi, T., & Faruque, A. I. (2022). Quantum Computing for Computer
Architects. Springer Nature.
Nguyen, N. H., Behrman, E. C., Moustafa, M. A., & Steck, J. E. (2019).
Benchmarking neural networks for quantum computations. IEEE
Transactions on Neural Networks and Learning Systems, 31(7), 2522–
2531.
Nielsen, M. A., & Chuang, I. L. (2010). Quantum Computation and
Quantum Information. Cambridge University Press.
Ovalle-Magallanes, E., Avina-Cervantes, J. G., Cruz-Aceves, I., & Ruiz-
Pinales, J. (2022). Hybrid classical–quantum Convolutional Neural
Network for stenosis detection in X-ray coronary angiography. Expert
Systems with Applications, 189, 116112.
Park, J., Samarakoon, S., Elgabli, A., Kim, J., Bennis, M., Kim, S. L.,
&Debbah, M. (2021). Communication-efficient and distributed learning
over wireless networks: Principles and applications. Proceedings of the
IEEE, 109(5), 796–819.
Pira, L., & Ferrie, C. (2023). An invitation to distributed quantum neural
networks. Quantum Machine Intelligence, 5(2), 23.
Preskill, J. (2018). Quantum computing in the NISQ era and beyond.
Quantum, 2, 79.
Qayyum, A., Qadir, J., & Anwar, Z. (2023). Quantum computing for
healthcare: A review. Future Internet, 15, 94.
https://doi.org/10.3390/fi15030094
Qu, Z., Li, Y., & Tiwari, P. (2023). QNMF: A quantum neural network
based multimodal fusion system for intelligent diagnosis. Information
Fusion, 100, 101913.
Sahib, A. Y., Al Ali, M., & Al Ali, M. (2023). Investigation of early-stage
breast cancer detection using quantum neural network. International
Journal of Online & Biomedical Engineering, 19(3).
Sleeman, J., Dorband, J., & Halem, M. (2020, May). A hybrid quantum
enabled RBM advantage: convolutional autoencoders for quantum image
compression and generative learning. In Quantum information science,
sensing, and computation XII, (Vol. 11391, pp. 23–38). SPIE.
Spiller, T. P., Munro, W. J., Barrett, S. D., & Kok, P. (2005). An introduction
to quantum information processing: Applications and realizations.
Contemporary Physics, 46(6), 407–436.
Steane, A. M. (2002). Quantum computer architecture for fast entropy
extraction. arXiv preprint quant-ph/0203047.
Tacchino, F., Macchiavello, C., Gerace, D., & Bajoni, D. (2019). An
artificial neuron implemented on an actual quantum processor. npj
Quantum Information, 5(1), 26.
Ur Rasool, R., Ahmad, H. F., Rafique, W., Qayyum, A., Qadir, J., & Anwar,
Z. (2023). Quantum computing for healthcare: A review. Future Internet,
15(3), 94.
Xie, J., Xu, C., Yin, C., Dong, Y., & Zhang, Z. (2023). Natural Evolutionary
Gradient Descent Strategy for Variational Quantum Algorithms.
Intelligent Computing, 2, 0042.
Yumin, D., Wu, M., & Zhang, J. (2020). Recognition of pneumonia image
based on improved quantum neural network. IEEE Access, 8, 224500–
224512.
Zhao, R., & Wang, S. (2021). A review of quantum neural networks:
Methods, models, dilemma. arXiv preprint arXiv:2109.01840.
Zoufal, C., Lucchi, A., & Woerner, S. (2019). Quantum generative
adversarial networks for learning and loading random distributions. npj
Quantum Information, 5(1), 103.
OceanofPDF.com
10 Cybersecurity Forensics with AI
A Comprehensive Review
Pragati Jain, Priyanka Verma, Tania Debnath,
Leoson Heisnam, Shefali Chaudhary, and Sonali
Balouria
DOI: 10.1201/9781003499459-10
10.1 INTRODUCTION
Since the advent of the first denial-of-service (DoS) attack in 1998, there
has been a notable surge in the intricacy, recurrence, and ramifications of
cyber assaults. As these cyber threats have evolved to become more focused
and potent, cybersecurity countermeasures have advanced in tandem.
Initially, security tools were confined to detecting virus signatures and
thwarting their execution. Presently, we encounter comprehensive solutions
engineered to offer protection across diverse attack vectors and various
target systems (Li, 2018). Despite these advancements, the task of
safeguarding information assets in virtual reality has become increasingly
daunting.
Ensuring protection against sophisticated cyber threats necessitates the
implementation of intelligent code. Recent events have underscored the
rapid advancement in the intelligence of malware and cyber weapons. The
emergence of network-centric warfare amplifies the risk of cyber incidents,
demanding urgent changes in cybersecurity approaches. New security
strategies, such as dynamically establishing secure perimeters, fostering
comprehensive scenario awareness, and implementing highly automated
responses to network attacks, mandate the widespread adoption of artificial
intelligence (AI) techniques and knowledge-based tools. Primarily, the
necessity for AI lies in the swift response to incidents occurring in the
online domain. The ability to rapidly process vast amounts of data is crucial
for interpreting and analyzing events in cyberspace, facilitating informed
decision-making. The speed of processes and the sheer volume of
information involved exceed the capacity of humans without significant
automation. However, devising code imbued with conventional fixed
algorithms (rigid logic at the decision-making stratum) to proficiently
counter cyber-attacks is arduous, given the perpetual emergence of novel
threats. (Patil, 2016; Wirkuttis & Klein, 2017)
Due to their pliable and malleable system behavior, artificial intelligence
methodologies possess the capacity to mitigate numerous constraints of
modern cybersecurity tools. While AI has markedly bolstered cybersecurity,
noteworthy apprehensions have surfaced. Certain individuals perceive AI as
a looming existential hazard for humanity. Consequently, scientists and
legal scholars have expressed trepidation regarding the burgeoning
involvement of autonomous AI entities in cyberspace and have articulated
ethical apprehensions about their validation.
Artificial intelligence in cybersecurity: The dark web has persistently
prompted discussions, eliciting inquiries regarding its covert perils and
privacy-enhancing functionalities. It epitomizes a part of the internet
mandating specialized software or authorization, renowned for illicit
undertakings and untraceable transactions. Researchers and law
enforcement entities leverage the dark web for intelligence accumulation on
cyber malefactors, thus rendering it pivotal in grasping the internet’s
metamorphosis and emergent criminal behaviors. Moreover, delving into
the dark web facilitates the discernment of cybersecurity perils and
susceptibilities. (Kaur et al., 2024). Artificial intelligence, particularly
machine learning (ML), holds significant promise for uncovering insights
from data within cybersecurity. ML streamlines the task of discovering,
contextualizing, and prioritizing pertinent data throughout the threat
intelligence lifecycle. This encompasses activities such as identifying
suspicious network behaviors and uncovering dark web forum discussions
hinting at potential data breaches. By integrating machine learning across
various facets of cybersecurity, security operations can be fortified,
empowering analysts to swiftly pinpoint, prioritize, address, and mitigate
emerging threats.
TABLE 10.1
Artificial Intelligence for Advanced Cybersecurity Measures
Category Description
—Artificial intelligence algorithms meticulously scrutinize
network traffic, user behavior, and system activities to
detect anomalies indicative of a security breach.
Anomaly
—Machine learning models learn normal patterns and
detection
detect deviations, aiding in uncovering unauthorized access
or malicious activities (Exploring the Vital Role of AI in
Cybersecurity | CCS Learning Academy, n.d.).
—AI assesses user and system behavior, identifying
patterns linked to malicious activities such as login patterns,
file access, and application usage.
Behavioral
—Unusual behavior triggers alerts, prompting further
analysis
investigation by cybersecurity professionals (Exploring the
Vital Role of AI in Cybersecurity | CCS Learning Academy,
n.d.).
—AI systems adeptly process extensive volumes of threat
intelligence data to discern established threats and
Threat vulnerabilities.
intelligence —Integration of threat intelligence feeds enable
cybersecurity forensic teams to proactively identify and
respond to emerging threats (Vishwanath, 2023).
—AI automates the analysis of malware samples, aiding in
the identification of new and evolving threats.
Malware —Machine learning models classify and categorize
analysis malware based on behavior, signatures, or other
characteristics (Exploring the Vital Role of AI in
Cybersecurity | CCS Learning Academy, n.d.).
Category Description
—AI automates aspects of incident response, facilitating
faster and more efficient mitigation of security incidents
Incident
(Kaur & Moza, 2023).
response
—Automated responses include isolating affected systems,
automation
blocking malicious traffic, or applying patches to vulnerable
software.
—AI algorithms assist in analyzing large datasets collected
during forensic investigations.
forensic data
—Natural language processing (NLP) is employed to
analysis
analyze text-based logs and communications, extracting
relevant information for investigators.
—User and entity behavior analytics solutions, powered by
AI, help identify suspicious activities related to user
accounts and entities.
UEBA
—Establishing a baseline of normal behavior enables AI to
detect deviations indicating compromised accounts or
insider threats.
—AI models employ predictive analytics by analyzing
historical data and contemporary trends to anticipate
Predictive potential security threats.
analysis —This aids in proactive threat hunting, allowing
organizations to implement preventive measures before
actual incidents occur.
—AI is applied to detect fraudulent activities, such as
Fraud
phishing attacks or payment fraud, by analyzing patterns
detection
and anomalies in transactions and user behavior.
Continuous —AI systems exhibit continuous learning capabilities,
learning dynamically adapting to evolving cybersecurity threats
through iterative analysis of novel data inputs.
Category Description
—Regular updates and retraining of models ensure the
system remains effective against emerging threats.
—At the core of AI in cybersecurity lies machine learning,
a facet of AI enabling systems to iteratively learn from data
Machine
and optimize their performance without requiring explicit
learning
programming instructions. These algorithms play a pivotal
algorithms
role in identifying patterns, anomalies, and potential threats
within extensive datasets (Goni et al., n.d.).
—Natural language processing empowers machines to
comprehend, interpret, and generate human-like language.
Within the field of cybersecurity, NLP emerges as an
NLP indispensable tool for parsing textual data, including logs
and threat intelligence reports, extracting salient insights,
and discerning potential security imperatives (Ukwen et al.,
n.d.).
As technology advances rapidly, the threats in the digital field are also on
the rise. Cyberattacks have grown more sophisticated, frequent, and
damaging, presenting substantial challenges to individuals, businesses, and
governments globally. In the current digital age, traditional methods of
combating cyber threats are no longer adequate. This is where artificial
intelligence becomes a transformative force. AI has emerged as a
formidable ally in the domain of cybersecurity, empowering defenders to
adopt a proactive stance in outmaneuvering adversaries (Al-Mansoori et al.,
n.d.).
TABLE 10.2
Comprehensive Examples of AI Applications in Cybersecurity with
Scenarios
S.
Topic Description Example Scenario
No
Proactive threat detection relies
on anomaly detection powered
by AI algorithms. Machine
learning algorithms are
employed by AI systems to Example Scenario:
establish a baseline of normal An AI-powered
behavior within a network or anomaly detection
system. This method is system recognizes
effective in detecting unusual data access
Anomaly previously unseen attacks or patterns within a
1. detection using subtle, sophisticated threats that corporate network,
AI algorithms traditional signature-based signaling a potential
systems might overlook. insider threat
Adaptability: AI systems can attempting
adjust to changes in the unauthorized access
environment and update their to sensitive
understanding of normal information.
behavior over time (Exploring
the Vital Role of AI in
Cybersecurity | CCS Learning
Academy, n.d.).
2. Behavioral Supported by machine learning, Example Scenario:
analysis for behavioral analysis focuses on Behavioral analysis
identifying understanding and predicting detects employees
unusual patterns the behavior of users, devices, accessing sensitive
and applications. AI constructs files during non-
models of typical behavior to working hours,
discern deviations or anomalies deviating from their
S.
Topic Description Example Scenario
No
that might signify a security usual work patterns.
hazard. The AI system raises
This approach is particularly an alert for further
valuable in detecting insider investigation.
threats, where individuals
within an organization may
exhibit unusual behavior
indicative of malicious intent.
Biometric Pattern
Learning: AI learns and
refines the patterns
associated with legitimate
biometric data.
Anti-Spoofing Measures:
AI algorithms can detect
and differentiate between
genuine biometric data
and spoofed attempts.
Continuous Improvement:
Ongoing learning allows
AI systems to adapt to
changes in biometric data
over time (Exploring the
Vital Role of AI in
Cybersecurity | CCS
Learning Academy, n.d.;
Hamme et al., 2022).
10.11 CONCLUSION
Cyber forensic investigations play a crucial role in identifying and
mitigating cyber threats and attacks. This discussion explores the potential
applications of artificial intelligence in forensic science and criminal
investigation, aiming to assist forensic experts, police investigators, and
security personnel. It is evident that AI-powered machines, programs, or
software can significantly reduce the time required for various tasks
throughout an examination and investigation process. This efficiency
improvement would lead to quicker case resolution, thereby reducing the
backlog caused by slow and complex investigation procedures. Increased
accuracy, competency, and impartiality would ultimately enhance the
criminal justice system. Scientists and researchers continue to develop AI-
based programs and machines to further refine forensic investigation
procedures. These advancements in AI-powered software are poised to
strengthen forensic investigation and predictive policing systems, as well as
our security and defense infrastructure.
In conclusion, integrating artificial intelligence into cybersecurity marks
a significant advancement with broad implications. AI, including machine
learning, deep learning, and natural language processing, has proven its
potential to enhance various cybersecurity aspects, such as threat detection,
incident response, and forensic analysis. Through AI algorithms,
cybersecurity professionals can analyze vast datasets efficiently, identify
emerging threats in real-time, and automate response actions to mitigate
risks promptly. Furthermore, AI-powered systems can adapt and evolve to
counter evolving cyber threats, offering dynamic defense mechanisms
against sophisticated attacks. Despite its benefits, AI also presents
challenges, including concerns about data privacy, model interpretability,
and adversarial attacks. Addressing these challenges requires ongoing
research, stakeholder collaboration, and the development of robust
governance frameworks to ensure responsible and ethical AI deployment in
cybersecurity. Nevertheless, the undeniable potential of AI in cybersecurity
persists. As cyber threats evolve in complexity and scale, AI-driven
solutions offer a promising avenue to strengthen cyber defenses, protect
digital assets, and maintain digital environment integrity.
In summary, the synergy between AI and cybersecurity holds great
promise in combating cyber threats. Through continued innovation,
collaboration, and responsible implementation, AI stands to revolutionize
cybersecurity practices, ushering in a new era of resilience and security in
the digital field.
REFERENCES
OceanofPDF.com
11 Remote Sensing Imagery
Classification Techniques Using
Quantum Deep Learning
Puneet Anchalia, G.S. Smrithy, D. Kavitha, and
S. Sijin Kumar
DOI: 10.1201/9781003499459-11
11.1 INTRODUCTION
The main aim of remote sensing is to gather data about objects or areas
without physical contact has become a cornerstone for various scientific
and practical applications. Satellite and airborne sensors capture invaluable
data about Earth’s surface, enabling fields like agriculture, environmental
monitoring, and disaster response. However, analysing this data,
particularly classifying pixels into categories like land cover types, presents
challenges. The sheer volume and complexity of the data, coupled with the
need for precise classification, necessitates advanced methods.
This research is driven by the critical role remote sensing plays in
addressing global issues. While existing classification techniques are
effective, they struggle with the ever-increasing scale and complexity of
datasets. This work aims to develop more efficient and accurate techniques
capable of handling the growing volumes of data generated by modern
Earth observation missions.
The core problem addressed here is the inefficiency of current remote
sensing image classification methods. While proficient, they struggle to
scale effectively with larger and more intricate datasets. Additionally, they
may not fully utilize the rich information within the imagery. The potential
for this research to transform remote sensing applications and provide
solutions for well-informed decision-making in a variety of domains makes
it significant.
The research has three key objectives. First, it aims to develop and
implement quantum deep learning models specifically designed for remote
sensing image classification. These models leverage the principles of
quantum computing, holding promise for overcoming the computational
challenges posed by massive datasets. Second, the research will benchmark
the performance of these novel quantum models against existing classical
deep learning techniques. This comparison will serve as a benchmark to
assess the potential advantages that quantum computing might bring to the
field. Finally, the research will focus on measuring the impact of quantum
computing on classification accuracy, particularly when dealing with large-
scale datasets, a hallmark of contemporary remote sensing applications.
Understanding the evolving landscape of remote sensing applications
requires consideration of the Earth observation (EO) context. As EO
missions continue to deploy increasingly sophisticated sensors, they
generate a vast amount of data, often referred to as big data. The daily
influx of imagery is estimated to exceed 150 terabytes, highlighting the
challenges of processing, analysing, and extracting meaningful insights
from these massive datasets.
Fortunately, advancements in computational technologies and analytical
methodologies have emerged to meet the demands of handling higher
resolution datasets. Machine learning (ML) and artificial intelligence (AI)
have become indispensable tools in managing the ever-growing big data
stream. These fields offer powerful techniques for automated feature
extraction, pattern recognition, and classification, significantly enhancing
our ability to unlock the secrets hidden within remote sensing imagery.
This research explores the potential of quantum deep learning, a nascent
field that leverages the unique properties of quantum mechanics to design
computational models. Unlike classical deep learning models that operate
on bits (0 or 1), quantum models utilize qubits, quantum bits that can exist
in a superposition of both states simultaneously. This ability to explore a
wider range of possibilities has the potential to lead to more efficient and
accurate solutions for complex problems like remote sensing image
classification.
The following sections will delve deeper into the theoretical framework
of quantum deep learning, explore specific techniques suitable for remote
sensing applications, and discuss the implementation details of the proposed
models. Furthermore, the research will present a rigorous evaluation
methodology to compare the performance of quantum deep learning models
against established classical deep learning techniques on various remote
sensing image datasets. By undertaking this comprehensive investigation,
this research aims to contribute significantly to the advancement of remote
sensing image classification, paving the way for a new era of efficient and
accurate Earth observation analysis.
11.6.2 Superposition
Superposition allows qubits to exist in multiple states simultaneously. It
aids in data representation and exploration of multiple possibilities in
parallel. Superposition contributes to efficient handling of high-dimensional
datasets.
11.6.3 Entanglement
Entanglement correlates states of qubits, enabling efficient information
processing. In remote sensing, entanglement enhances coherence and
reliability of algorithms. It contributes to improved accuracy and robustness
in classification tasks.
11.7 METHODOLOGY
The implementation of remote sensing imagery classification techniques
using quantum deep learning involves a series of steps and methodologies
to effectively process and classify imagery data. Following is an outline of
the methodology.
11.15 PRE-PROCESSING
Pre-processing is a critical phase to ensure the data’s quality and relevance
for subsequent analysis.
Normalization: This step involves scaling pixel values to a standard
range, often between 0 and 1. The formula for normalization is given by:
X−Xmin
Xnormalized =
Xmax−Xmin
where X is the original pixel value, Xmin is the minimum pixel value, and
Xmax is the maximum pixel value.
11.17 RESULTS
Figure 11.5 shows the confusion matrix, which visualizes the performance
of the classification model. The rows of the matrix show the actual land
cover class, and the columns show the predicted land cover class. Each cell
contains the number of data points that belong to a particular row (actual
class) and column (predicted class).
FIGURE 11.5 Confusion matrix.
TABLE 11.1
Quantum Classifier Metrics
Class Precision Recall
Annual Crop 0.97 0.90
Class Precision Recall
Permanent Crop 0.94 0.96
Pasture 0.93 0.94
Forest 0.95 0.95
Herbaceous Vegetation 0.82 0.88
Highway 0.85 0.88
Residential 0.97 0.98
Industrial 0.88 0.80
River 0.96 0.94
Sea Lake 0.91 0.92
TABLE 11.2
F1 Scores of QCNN
Class F1 Score
Annual Crop 0.94
Permanent Crop 0.98
Pasture 0.94
Forest 0.95
Herbaceous Vegetation 0.91
Highway 0.93
Residential 0.99
Industrial 0.89
River 0.93
Sea Lake 0.97
Figure 11.6 shows sample model outputs for different classes of the
dataset when applied in quantum convolutional neural networks. Figure
11.7 shows the loss curves for quantum convolutional neural networks with
different values of hyperparameters.
Tables 11.1 and 11.2 represent the performance of the proposed technique
using different metrics for different classes of the dataset. Table 11.1 shows
the performance of the proposed technique using precision and recall. Table
11.2 shows the performance of the proposed technique using F1 score. The
proposed model achieved an overall accuracy of 95.38%.
11.18 CONCLUSION
Quantum deep learning has the potential to revolutionize remote sensing
imagery classification. Quantum algorithms can be used to speed up the
training and inference of deep learning models and to develop new deep
learning algorithms that are specifically designed for quantum computers.
This chapter proposes a technique based on quantum convolutional
neural networks for classification of remote sensing images. Performance of
the technique was evaluated using different metrics such as precision,
recall, and F1 score. The proposed model achieved an overall accuracy of
95.38%.
OceanofPDF.com
12 Mutation-Based Quantum Particle Swarm
Optimisation
A Novel Approach to Global Optimisation
Biswajit Jana, Bireshwar Dass Mazumdar, Anindya Ghatak, and Manmohan
Mishra
DOI: 10.1201/9781003499459-12
12.1 INTRODUCTION
A population-based technique, particle swarm optimisation (PSO), was initially suggested by Kennedy and
Eberhart [1, 2]. Taking cues from the way social creatures like bees, birds, and fish work together, PSO is an
algorithm for global optimisation over continuous search spaces that uses swarm intelligence. Early plans for PSO
didn’t focus on individual intelligence but rather on creating AI through studying basic social interactions [3]. With
few parameters to tweak, PSO is computationally cheap, easy to implement, and a breeze to work with. Particle
swarm optimisation uses a swarm of potential solutions, or “particles,” to navigate a multidimensional search
space at a velocity that is continuously updated based on the swarm’s or each particle’s own and neighbouring
experiences. The introduction of PSO in 1995 drew the interest of numerous scholars worldwide. The core method
and uses of PSO have been proposed in a large number of variants [4–7].
A new version of PSO, quantum-behaved particle swarm optimisation (QPSO), was introduced [8] in 2004. This
was inspired by quantum mechanics and trajectory analysis of PSO [9, 10]. The iterative equation of QPSO, a
probabilistic algorithm, differs significantly from that of PSO [11]. The fact that QPSO is simpler to construct than
PSO and does not require particle velocity vectors and has fewer parameters to be adjusted is another plus. A large
number of continuous optimisation problems have been successfully solved using the QPSO method, and
numerous effective strategies have been suggested for the algorithm’s further improvement. This chapter
endeavours to provide a comprehensive and up-to-date review on QPSO by classifying the majority of the articles
on QPSO enhancements and applications, with the goal of helping researchers and practitioners see the big picture.
Here in this chapter, a new variant of QPSO, mutation-based QPSO (MQPSO), has been proposed to enhance
the performance of QPSO. This enhancement involves refining the global solution by directing all particles
towards the best one in the swarm. In this study, Gaussian mutation is incorporated into both individual and global
best solutions to enhance the overall performance of QPSO. This mutation strategy serves to mitigate the issue of
getting trapped in local optima. The proposed MQPSO has been applied to eight benchmarks, including unimodal
and multimodal. The experimental results confirm that MQPSO outperform the other algorithms with regard to
statical metric, that is, median, value. The convergence graph shows that the MQPSO dose not suffer from early
convergence.
Following is the outline of the chapter. Section 12.2 provides a concise overview of PSO. The QPSO algorithm
is discussed in Section 12.3. Section 12.4 contains the proposed MQPSO. The experimental results are discussed
in Section 12.5. Finally, the whole work is concluded in Section 12.6.
updated using two best solutions. One is its own best solution achieved thus far, known as the personal best. (
P B = (P B , P B , … . , P B
i i1 i2 )). Another is the best experience obtained so far by any particle in the entire
iD
The objective function value of each particle is determined by its position vector. Each particle retains two
values in its memory: its best value (the objective function value of both personal best (PB) and global best (GB))
and its respective position. Each particle adjusts its velocity and positions according to the equations denoted as
Eq. 12.1 and Eq. 12.2.
VL
t+1
iD
= w*V L
t
iD
+ C 1 *r 1 *(P B iD − P iD ) + C 2 *r 2 *(GB D − P iD ) (1) 12.1
t+1 t+1
P = P iD + V L (2)
iD iD
where t is the iteration; V L is the velocity of the i particle in the D dimension of the t iteration; C and
t
iD
th th
1
C2 are the cognitive and social acceleration coefficient, respectively; r , r are two uniform random numbers in
1 2
Algorithm 1: PSO
mbest(t) =
1
P op
∑
i=1
∫
+∞
−∞
P i,d = P B i,d ±
P B i (t) =
1
P op
2
|Ψ | dx
L
2
L =
dy
ln(
1
q
P op
i=1
∣
In this context, |Y|² denotes the square of the wave function’s magnitude, reflecting the probability density of
particle presence at a given position. Symbolised by R, the probability density function adheres to the
P B i,1 (t),
+∞
−∞
P op
2 ⋅ α ⋅ |mbest| − P id
Hence, the updating formula for quantum particle swarm optimisation particles can be delineated as:
P i,d = φ ⋅ P B i,d + (1 − φ) ⋅ GB gD
P i,d (t + 1) = P B i,d
After undergoing stochastic simulations involving Monte Carlo measurements, the positions of particles in
∑
dy
)(i = 1, 2, … , P op)(d = 1, 2, … , D)
Among these parameters, q represents a random number within the range of [0, 1]. L is calculated based on the
i=1
Algorithm 2: QPSO
Initialize N,MI,D,α 0 ,α 1
for t=l to MI
compute mbest using Eq.7
a = (ai - ao) . (MI-t)/MI + ao
for i = 1 to population size(Pop)
if f(Pi) < f(P3i)then
PBi = Pi;
end if
G = min (f (PBi) ) ;
for j = 1 to D do
(p = rand (0,1)
q = rand (0,1);
Pi.j = <P ’ PBi.j + (1 - <p) ■ GB,
if (rand (0,1) > 0.5)
dz
particle’s current position and its historical best position as L = 2 × b × |P B − P |. This calculation leads to the
update formula for quantum particle swarm optimisation.
P i,d = P B i,d ± α ⋅ P B i,d − P i,d (t) ⋅ ln(
where t is iteration, and α is the contraction expansion factor of QPSO. To prevent premature convergence, Sun et
al. [41] enhanced the QPSO algorithm by introducing mbest.
n
P op
1
P op
1
q
=
))
P B i,2 (t),
1
q
))
q
1
))
i,d
… ,
i,d
P op
∑
P op
i=1
P B iD, (t)
(12.4)
(12.5)
(12.6)
(12.7)
(12.8)
(12.9)
(12.10)
(12.11)
Algorithm 2: QPSO
PUd = PBiid + a ■ \mbest - Pu
else
Pud = PBi,d + a ■ \mbest - Pird
end if
end fors
end for
end for
where X max = maximum limit of the decision vector value in the d dimension, X th
= minimum value of the
min
decision vector value in the d dimension, and h is the standard deviation of the Gaussian distribution. The
th
parameter h is linearly decreased in each iteration according to Eq. 12.14. This ensures that the exploration
capability is stronger at the initial stage, while the exploitation capability becomes stronger as the run progresses.
h
t+1
= h
t
− (
1
t max
) (12.14)
Algorithm 3: MQPSO
Initialize N, MI,D, oto, a.
for t=l to MI
compute mbest using Eq.7
a = (ai -au). (Ml-t) /MI + a.j
for i = 1 to population size(Pop) do
if f(Pi) < f(PBi)then
PBi = Pi; for i=l to D
PBiid = PBi4 + (Xmax – yVmjn).Gaussian(o, h)
end for
end if
G = min (f(PBi)) ;
for i=l to D
GBd = GBd + (-Kmo* - Xmin).Gaussian(o,h)
end for
for j = 1 to D do
(p = rand (0,1)
q = rand (0,1);
Pi.j = <p ■ PBij + (1 - <p) ■ GBj
if (rand (0,1) > 0.5)
P,.d = PBi,d + a ■ |mbest - Pid| • In (±-))
Algorithm 3: MQPSO
else
Pud = PB,.d + “ • 1 mbest - PiA| ■ In (±-))
end if
end for
end for
ht+l = h’~ (—)
sssend for
f − f ). The benchmark functions are shown in Table 12.1. Unimodal test functions, by definition, have only one
4 8
optimal point, which makes them excellent for assessing an algorithm’s exploitation and convergence abilities. In
contrast, multimodal test functions present multiple optimal points, presenting more significant challenges
compared to their unimodal counterparts. Among the various local optima within multimodal functions, the most
desirable is known as the global optimum. Achieving this global optimum requires navigating through all local
optima, underscoring the crucial role of exploration capacity. Consequently, multimodal test functions provide a
benchmark for evaluating the exploration capability of the search process.
The parameter values utilised in various algorithms are detailed in Table 12.2. The problem dimension (D) is
standardised to 5, while the population size (N) and maximum iterations (MI) are consistent at 30 for all
algorithms. Statistical data, including minimum, maximum, standard deviation, mean, and median, are derived
from objective function values collected over ten independent runs. The statistical results for different benchmark
functions are presented in in Table 12.3. The median value is considered here for performance comparisons.
TABLE 12.1
Benchmark Functions
Function
Expression Range
Name
n
Sphere F 1 (X) = ∑ X
2
i
⌈−5.12, 5.1
i=1
Dixon & 2
n
2
2
F 2 (X) = (X 1 − 1) + ∑ i(2X i − X i−1 ) ⌈−10, 10⌉
Price i=2
n n 2 n 4
Zakharov F 3 (X) = ∑ X
2
i
+ (∑ 0.5iX i ) + (∑ 0.5iX i ) ⌈−5, 10⌉
i=1 i=1 i=1
n−1
2 2 2
F 5 (X) = sin (πX i ) + ∑ (y i − 1) [1 + 10sin (πy i + 1)]
i=1
Levy 2 2
⌈−15, 30⌉
+ (y i − 1) + [1 + sin (2πy i )]
Where y i = 1 +
x i −1
4
f ori = 1, 2, … ,n
n n
2
Griewank F 6 (X) = ∑
xi
4000
− ∏ cos(
xi
√i
) + 1 ⌈−600, 600
i=1 i=1
n−1
Rosenbrock F 7 (X) = ∑
2
[100(X i − X i+1 )
2
+ (X i − 1) ]
2
⌈−5, 10⌉
i=1
n n
Ackley F 8 = 20 + e − 20exp(−0.2√ (
1
n
∑ X
2
i
)) − exp(√
1
n
∑ cos(2πX i )) ⌈−15, 30⌉
i=1 i=1
TABLE 12.2
Parameter Setting of Different Algorithms
Method Name Parameter Name Parameter Value
MQPSO a0 0
a1 1
m 0
h 1
GQPSO a0 0
a1 1
QPSO a0 0
a1 1
PSO w 0.8
C1 1.5
C2 1.5
MQPSO achieved the overall best performance among all algorithms for all the benchmark functions. The
purpose of implementing mutations on the global best and personal best solution is to improve MQPSO’s
performance. In PSO, where all particles are attracted towards the global best solution, enhancing both the global
best and personal best solutions through mutation enables them to attract promising solutions from the search
space. The advantage of introducing mutations is to improve diversity into the search process, facilitating efficient
exploration of various regions within the search space. Consequently, mutation operators play a pivotal role in
enhancing the exploration capability of the search region.
TABLE 12.3
Experimental Results of MQPSO
MQPSO GQPSO QPSO PSO
F1
Min 1.63e-30 5.53e-30 1.003e-19 1.58e-11
Max 1.22e-26 5.61e-26 6.58e-18 7.99e-10
Std 3.78e-26 1.73e-26 1.99e-18 2.61e-10
Mean 1.71e-27 7.07e-27 1.94e-18 2.27e-10
Median 1.17e-27 1.60e-27 1.488e-18 1.44e-10
F2
Min 0.67 0.67 0.67 6.83e-08
Max 0.67 0.67 0.67 0.67
Std 1.27e-05 1.30e-05 3.34e-03 0.255
Mean 0.67 0.67 0.67 0.120
Median 0.67 0.67 0.67 9.99e-06
F3
Min 3.90e-25 1.01e-24 4.46e-18 9.64e-10
Max 3.42e-21 6.14e-21 1.46e-16 8.21e-08
Std 1.10e-21 1.91e-21 5.05e-17 2.52e-08
Mean 4.82e-22 7.28e-22 5.18e-17 1.67e-08
MQPSO GQPSO QPSO PSO
Median 9.94e-24 7.08e-23 3.28e-17 6.95e-09
F4
Min 0 0 0 0.995
Max 5.32e-10 0 2.48e-10 6.965
Std 1.68e-10 0 7.84e-11 1.843
Mean 5.33e-11 0 2.48e-11 3.880
Median 0 0 2.13e-14 3.482
F5
Min 0.010393 5.57e-03 0.229 5.64e-11
Max 0.10302 0.1023 0.387 1.52e-08
Std 0.04959 0.0606 0.052 4.607e-09
Mean 0.047276 0.0606 0.316 2.182e-09
Median 0.026994 0.0640 0.310 6.59e-10
F6
Min 0 0 6.66e-16 0.038
Max 0.105 0.223 0.083 0.194
Std 0.036 0.066 0.027 0.045
Mean 0.021 0.045 0.016 0.089
Median 4.01e-03 0.022 2.42e-06 0.081
F7
Min 1.160 1.488 2.928 0.133
Max 2.186 2.283 3.780 1.210
Std 0.194 0.268 0.237 0.398
Mean 2.018 2.030 3.355 0.823
Median 2.033 2.102 3.321 0.936
F8
Min 1.64e-14 2.22e-14 1.82e-09 2.19e-05
Max 3.62e-12 4.83e-12 4.83e-08 3.16e-04
Std 1.05e-12 1.44e-12 1.32e-08 8.73e-05
Mean 6.81e-13 7.61e-13 1.54e-08 1.21e-04
Median 3.01e-13 5.08e-13 1.51e-08 1.18e-04
The convergence analysis of different algorithms for all the benchmark functions is presented in Figures 12.1 to
12.8. It shows that MQPSO exhibits resistance to early convergence, leading to superior minima compared to other
algorithms across all benchmarks. This demonstrates MQPSO’s efficient exploration of the state space by blending
exploitation and exploration judiciously. The overall search strategy of MQPSO can be characterised as balanced.
FIGURE 12.1 Convergence comparison graph for f .
1
12.6 CONCLUSION
This chapter provides a concise overview of the QPSO algorithm’s enhancements and uses. It has been discovered
that QPSO is both very effective and quite versatile. Improving QPSO’s performance has been the subject of
extensive research. Parameter selection for swarm diversity control, cooperative approaches, probability
distribution function usage, unique search methods, and hybrid methods with other techniques are all part of the
improvement strategy spectrum. Clustering and classification, electromagnetism and electronics, biology, power
systems, neural networks, fuzzy logic, modelling, antennas, and combinatorial optimisation are some of the areas
where QPSO has found practical use. Many professionals are interested in learning more about the QPSO
algorithm. This is due to the fact that the QPSO algorithm is both straightforward and easy to apply. Someone
working in a niche area, as opposed to swarm intelligence, can pick up QPSO fast. This is why QPSO is so user
friendly: it can be easily combined with other approaches and used in a variety of fields. The granularity of
QPSO’s worldwide search capabilities is another factor. No matter the kind of application or benchmark function,
QPSO has proven time and again that it can obtain good optimisation results. Despite QPSO’s effectiveness, the
difficulty regarding its working principle is not adequately addressed in any of the relevant literature.
Consequently, explaining its operation to the theoretical community is the top priority for QPSO. Just like in PSO,
this is a challenging task; nonetheless, we have already accomplished analyses of particles in terms of probability
measures and convergence behaviour. Extending the scope of QPSO’s applications is another promising area for
further study. The fields of application for QPSO in current research are less fruitful than those for PSO. Extending
beyond the realm of academic research and into the commercial and industrial sectors is the ultimate goal of QPSO
applications. Finally, one of the main points of QPSO is how to combine its capabilities through integration with
other techniques and additional approach development.
Furthermore, a novel variant of QPSO, mutation-based QPSO, is introduced to improve the effectiveness of
QPSO. This advancement includes refining the global solution by attracting all particles towards the swarm’s best.
Gaussian mutation is integrated into both individual and global best solutions in this investigation to enhance the
overall efficiency of QPSO. This mutation strategy is able to solve the issue of being stuck in local optima.
MQPSO is then applied to eight benchmarks, compassing both unimodal and multimodal functions. Experimental
findings validate that MQPSO performs better than other algorithms in terms of statistical metrics, particularly the
median value. Moreover, the convergence graph illustrates that MQPSO does not suffer early convergence issues.
REFERENCES
1. J. Kennedy, and R.C. Eberhart. “Particle swarm optimization,” Proceedings of IEEE International Conference
on Neural Networks, pp. 1942–8, 1995.
2. J. Kennedy, and R.C. Eberhart. Swarm Intelligence. Morgan Kaufmann Publishers; 2001.
3. R. Poli, J. Kennedy, T. Blackwell, and A. Freitas. “Particle swarms: The second decade,” Journal of Artificial
Evolution and Applications, pp. 1–3, 2008.
4. R. Poli, J. Kennedy, and T. Blackwell. “Particle swarm optimization,” Swarm Intelligence, vol. 1(1), pp. 33–57,
2007.
5. R. Poli. An Analysis of Publications on Particle Swarm Optimization Applications. Essex, UK: Department of
Computer Science, University of Essex; May–Nov. 2007.
6. A. Banks, J. Vincent, and C. Anyakoha. “A review of particle swarm optimization. Part I: Background and
development,” Natural Computing, vol. 6(4), pp. 467–84, 2007.
7. A. Banks, J. Vincent, and C. Anyakoha. “A review of particle swarm optimization. Part II: Hybridisation,
combinatorial, multicriteria and constrained optimization, and indicative applications,” Natural Computing, vol.
7(1), pp. 109–24, 2008.
8. J. Sun, B. Feng, and W. Xu. “A global search strategy of quantum- behaved particle swarm optimization,” IEEE
Conference on Cybernetics and Intelligent Systems, pp. 111–6, 2004.
9. M. Clerc, and J. Kennedy. “The particle swarm—explosion, stability, and convergence in a multidimensional
complex space,” IEEE Transactions on Evolutionary Computation, vol. 6(1), pp. 58–73, 2002.
10. J. Sun, B. Feng, and W. Xu. “Particle swarm optimization with particles having quantum behavior,” IEEE
Congress on Evolutionary Computation, pp. 325–31, 2004.
11. J. Kennedy. “Some issues and practices for particle swarms,” IEEE Swarm Intelligence Symposium, pp. 162–9,
2007.
12. J. Sun, W. Xu, and J. Liu. “Parameter selection of quantum-behaved particle swarm optimization,” Advances in
Natural Computation, pp. 543–52, 2005.
13. J. Riget, and J. Vesterstroem. A Diversity-guided Particle Swarm Optimizer—the ARPSO. Department of
Computer Science, University of Aarhus; 2002.
14. J. Sun, W. Xu, and W. Fang. “Quantum-behaved particle swarm optimization algorithm with controlled
diversity,” Proceedings of the 2006 International Conference on Computational Science, pp. 847–54, 2006.
15. J. Sun, W. Xu, and W. Fang. “A diversity-guided quantum-behaved particle swarm optimization algorithm,”
Simulated Evolution and Learning, pp. 497–504, 2006.
16. J. Sun, W. Xu, and W. Fang. “Enhancing global search ability of quantum-behaved particle swarm optimization
by maintaining diversity of the swarm,” Rough Sets and Current Trends in Computing, pp. 736–45, 2006.
17. H. Gao, W. Xu, and T. Gao. “A cooperative approach to quantum- behaved particle swarm optimization,” IEEE
International Symposium on Intelligent Signal Processing, pp. 1–6, 2007.
18. S. Lu, and C. Sun. “Coevolutionary quantum-behaved particle swarm optimization with hybrid cooperative
search,” Pacific- Asia Workshop on Computational Intelligence and Industrial Application, pp. 109–13, 2008.
19. S. Lu, and C. Sun. “Quantum-behaved particle swarm optimization with cooperative-competitive
coevolutionary,” International Symposium on Knowledge Acquisition and Modeling, pp. 593–7, 2008.
20. Q. Baida, J. Zhuqing, and X. Baoguo. “Research on quantum- behaved particle swarms cooperative
optimization,” Computer Engineering and Applications, vol. 44(7), pp. 72–4, 2008.
21. J. Sun, W. Xu, and W. Fang. “Quantum-behaved particle swarm optimization with a hybrid probability
distribution,” PRICAI 2006: Trends in Artificial Intelligence, pp. 737–46, 2006.
22. L.S. Coelho. “Novel Gaussian quantum-behaved particle swarm optimiser applied to electromagnetic design,”
IET Science, Measurement and Technology, vol. 1(5), pp. 290–4, 2007.
23. L.S. Coelho, N. Nedjah, and L.D.M. Mourelle. “Gaussian quantum-behaved particle swarm optimization
applied to fuzzy PID controller design,” Studies in Computational Intelligence, vol. 121, pp. 1–15, 2008.
24. L.S. Coelho. “Gaussian quantum-behaved particle swarm optimization approaches for constrained engineering
design problems,” Expert Systems with Applications, vol. 37(2), pp. 1676–83, 2010.
25. J. Sun, C. Lai, W. Xu, Y. Ding, and Z. Chai. “A Modified quantum- behaved particle swarm optimization,”
ICCS, pp. 294–301, 2007.
26. J. Wang, and Y. Zhou. “Quantum-behaved particle swarm optimization with generalized local search operator
for global optimization,” Advanced Intelligent Computing Theories and Applications with Aspects of Artificial
Intelligence, pp. 851–60, 2007.
27. Z. Huang, Y. Wang, C. Yang, and C. Wu. “A new improved quantum-behaved particle swarm optimization
model,” IEEE Conference on Industrial Electronics and Applications, pp. 1560–4, 2009.
28. Y. Kaiqiao, and N. Hirosato. “Quantum-behaved particle swarm optimization with chaotic search,” IEICE—
Transactions on Information and Systems, vol. E91-D(7), pp. 1963–70, 2008.
29. J. Liu, J. Sun, and W. Xu. “Improving quantum-behaved particle swarm optimization by simulated annealing,”
Computational Intelligence and Bioinformatics, pp. 130–6, 2006.
30. J. Liu, J. Sun, W. Xu, and X. Kong. “Quantum-behaved particle swarm optimization based on immune memory
and vaccination,” IEEE International Conference on Granular Computing, pp. 453–6, 2006.
31. J. Liu, J. Sun, and W. Xu. “Quantum-behaved particle swarm optimization with immune operator,” Foundations
of Intelligent Systems, pp. 77–83, 2006.
32. W. Fang, J. Sun, and W. Xu. “Improved quantum-behaved particle swarm optimization algorithm based on
differential evolution operator and its application,” Journal of System Simulation, vol. 20(24), pp. 6740–4,
2008.
33. J. Liu, J. Sun, and W. Xu. “Quantum-behaved particle swarm optimization with adaptive mutation operator,”
ICNC, pp. 959–67, 2006.
34. L.S. Coelho. “A quantum particle swarm optimizer with chaotic mutation operator,” Chaos, Solitons and
Fractals, vol. 37(5), pp. 1409–18, 2008.
35. W. Fang, J. Sun, and W. Xu. “Analysis of mutation operators on quantum-behaved particle swarm optimization
algorithm,” New Mathematics and Natural Computation, vol. 5(2), pp. 487–96, 2009.
36. J. Sun, C. Lai, W. Xu, and Z. Chai. “A novel and more efficient search strategy of quantum-behaved particle
swarm optimization,” Adaptive and Natural Computing Algorithms, pp. 394–403, 2007.
37. M. Xi, J. Sun, and W. Xu. “Quantum-behaved particle swarm optimization with elitist mean best position,”
Complex Systems and Applications-Modeling, Control and Simulations, pp. 1643–7, 2007.
38. M. Xi, J. Sun, and W. Xu. “An improved quantum-behaved particle swarm optimization algorithm with
weighted mean best position,” Applied Mathematics and Computation, vol. 205(2), pp. 751–9, 2008.
39. S. Mikki, and A.A. Kishk. “Infinitesimal Dipole model for dielectric resonator antennas using the QPSO
algorithm,” IEEE Antennas and Propagation Society International Symposium, pp. 3285–8, 2006.
40. Y. Cai, J. Sun, J. Wang, Y. Ding, N. Tian, X. Liao, et al. “Optimizing the codon usage of synthetic gene with
QPSO algorithm,” Journal of Theoretical Biology, vol. 254(1), pp. 123–7, 2008.
41. J. Sun et al. “Quantum-behaved particle swarm optimization with Gaussian distributed local attractor point,”
Applied Mathematics and Computation, vol. 218(7), pp. 3763–75, 2011.
42. K. Lu, and R. Wang. “Application of PSO and QPSO algorithm to estimate parameters from kinetic model of
glutamic acid batch fermentation,” 7th World Congress on Intelligent Control and Automation, pp. 8968–71,
2008.
43. Y. Chi, X. Liu, K. Xia, and C. Su. “An Intelligent diagnosis to type 2 diabetes based on QPSO algorithm and
WLS-SVM,” Intelligent Information Technology Application Workshops, pp. 117–21, 2008.
44. H. Liu, S. Xu, and X. Liang. “A modified quantum-behaved particle swarm optimization for constrained
optimization,” International Symposium on Intelligent Information Technology Application Workshops, pp.
531–4, 2008.
45. J. Wang, Y. Zhang, Y. Zhou, and J. Yin. “Discrete quantum-behaved particle swarm optimization based on
estimation of distribution for combinatorial optimization,” IEEE World Congress on Computational
Intelligence, pp. 897–904, 2008.
46. J. Liu, J. Sun, and W. Xu. “Quantum-behaved particle swarm optimization for integer programming,” Neural
Information Processing, pp. 1042–50, 2006.
47. J. Sun, J. Liu, and W. Xu. “Using quantum-behaved particle swarm optimization algorithm to solve non-linear
programming problems,” International Journal of Computer Mathematics, vol. 84(2), pp. 261–72, 2007.
48. B. Xiao, T. Qin, D. Feng, G. Mu, P. Li, and G.M. Xiao. “Optimal planning of substation locating and sizing
based on improved QPSO algorithm,” Asia-Pacific Power and Energy Engineering Conference, pp. 1–5, 2009.
49. S.N. Omkar, R. Khandelwal, T.V.S. Ananth, G.N. Naik, and S. Gopalakrishnan. “Quantum behaved particle
swarm optimization (QPSO) for multi-objective design optimization of composite structures,” Expert Systems
with Applications, vol. 36(8), pp. 11312–22, 2009.
50. J. Sun, J. Liu, and W. Xu. “QPSO-based QoS multicast routing algorithm,” Simulated Evolution and Learning,
pp. 261–8, 2006.
51. D. Zhao, K. Xia, B. Wang, and J. Gao. “An approach to mobile IP routing based on QPSO algorithm,” Pacific-
Asia Workshop on Computational Intelligence and Industrial Application, pp. 667–71, 2008.
52. R. Ma, Y. Liu, X. Lin, and Z. Wang. “Network anomaly detection using RBF neural network with hybrid
QPSO,” IEEE International Conference on Networking, Sensing and Control, pp. 1284–7, 2008.
53. R. Ma, Y. Liu, and X. Lin. “Hybrid QPSO based wavelet neural networks for network anomaly detection,”
Second Workshop on Digital Media and its Application in Museum and Heritages, pp. 442–7, 2007.
54. R. Wu, C. Su, K. Xia, and Y. Wu. “An approach to WLS-SVM based on QPSO algorithm in anomaly
detection,” World Congress on Intelligent Control and Automation, pp. 4468–72, 2008.
55. C. Yue, Z. Dongming, X. Kewen, and W. Rui. “Channel assignment based on QPSO algorithm,”
Communications Technology, vol. 42(2), pp. 204–6, 2009.
56. S. Jalilzadeh, H. Shayeghi, A. Safari, and D. Masoomi. “Output feedback UPFC controller design by using
Quantum Particle Swarm Optimization,” 6th International Conference on Electrical Engineering/Electronics,
Computer, Telecommunications and Information Technology, pp. 28–31, 2009.
57. M. Xi, J. Sun, and W. Xu. “Quantum-behaved particle swarm optimization for design H infinite structure
specified controllers,” DCABES Proceedings, pp. 1016–9, 2006.
58. M. Xi, J. Sun, and W. Xu. “Parameter optimization of PID controller based on quantum-behaved particle swarm
optimization,” ICCSA07 Proceedings, pp. 603–7, 2007.
59. J. Liu, Q. Wu, and D. Zhu. “Thruster Fault-Tolerant for UUVs Based on Quantum-Behaved Particle Swarm
Optimization,” Opportunities and Challenges for Next-Generation Applied Intelligence, pp. 159–65, 2009.
60. F Gao, and H. Tong. “Parameter estimation for chaotic system based on particle swarm optimization,” Acta
Physica Sinica, vol. 2, pp. 577–82, 2006.
61. J. Sun, W. Xu, and B. Ye. “Quantum-behaved particle swarm optimization clustering algorithm,” Advanced
Data Mining and Applications, pp. 340–7, 2006.
62. W. Chen, J. Sun, Y. Ding, W. Fang, and W. Xu. “Clustering of gene expression data with quantum-behaved
particle swarm optimization,” New Frontiers in Applied Artificial Intelligence, pp. 388–96, 2008.
63. K. Lu, K. Fang, and G. Xie. “A hybrid quantum-behaved particle swarm optimization algorithm for clustering
analysis,” Fifth International Conference on Fuzzy Systems and Knowledge Discovery, pp. 21–5, 2008.
64. X. Peng, Y. Zhang, S. Xiao, Z. Wu, J. Cui, L. Chen, et al. “An alert correlation method based on improved
cluster algorithm,” Pacific- Asia Workshop on Computational Intelligence and Industrial Application, pp. 342–
7, 2008.
65. X. Zhang, H. Zhang, Y. Zhu, Y. Liu, T. Yang, and T. Zhang. “Using IACO and QPSO to solve spatial clustering
with obstacles constraints,” IEEE International Conference on Automation and Logistics, pp. 1699–704, 2009.
66. H. Wang, S. Yang, W. Xu, and J. Sun. “Scalability of hybrid fuzzy c-means algorithm based on quantum-
behaved PSO,” Fourth International Conference on Fuzzy Systems and Knowledge Discovery, pp. 261–5, 2007.
67. L. Tao. “Text topic mining and classification based on quantum- behaved particle swarm optimization,” Journal
of Southwest University for Nationalities, vol. 35(3), pp. 603–7, 2009.
68. L. Tao, Y. Feng, C. Jianying, and H. Weilin. “Acquisition of classification rule based onquantum-behaved
particle swarm optimization,” Application Research of Computers, vol. 26(2), pp. 496–9, 2009.
69. H. Zhu, X. Zhao, and Y. Zhong. “Feature selection method combined optimized document frequency with
improved RBF network,” Advanced Data Mining and Applications, pp. 796–803, 2009.
70. L. Shiyin, Z. Xiaoming, and W. Xiaodong. “Attribute reduction based on quantum-behaved particle swarm
optimization,” Computer Engineering, vol. 34(18), pp. 65–9, 2008.
71. W. Jiayang, and X. Ying. “Minimal attribute reduction algorithm based on quantum particle swarm
optimization,” Computer Engineering, vol. 35(12), pp. 148–50, 2009.
72. S. Mikki, and A.A. Kishk. “Investigation of the quantum particle swarm optimization technique for
electromagnetic applications,” IEEE Antennas and Propagation Society International Symposium, vol. 42A, pp.
45–8, 2005.
73. S. Mikki, and A.A. Kishk. “Quantum particle swarm optimization for electromagnetics,” IEEE Transactions on
Antennas and Propagation, vol. 54(10), pp. 2764–75, 2006.
74. S. Mikki, and A.A. Kishk. “Theory and applications of infinitesimal dipole models for computational
electromagnetics,” IEEE Transactions on Antennas and Propagation, vol. 55(5), pp. 1325–37, 2007.
75. L.S. Coelho, and P. Alotto. “Global optimization of electromagnetic devices using an exponential quantum-
behaved particle swarm optimizer,” Magnetics, IEEE Transactions on, vol. 44(6), pp. 1074–7, 2008.
76. R. Wu, J. Wang, K. Xia, and R. Yang. “Optimal design on CMOS operational amplifier with QPSO algorithm,”
International Conference on Wavelet Analysis and Pattern Recognition, pp. 821–5, 2008.
77. N. Liu, K. Xia, J. Zhou, and C. Ge. “Numerical simulation on transistor with CQPSO algorithm,” 4th IEEE
Conference on Industrial Electronics and Applications, pp. 3732–6, 2009.
78. L. Tang, and F. Xue. “Using data to design fuzzy system based on quantum-behaved particle swarm
optimization,” Machine Learning and Cybernetics, 2008 International Conference on, pp. 624–8, 2008.
79. X. Yinchun, J. Sun, and W. Xu. “QPSO algorithm for rectangle- packing optimization,” Journal of Computer
Applications, vol. 9, pp. 2068–70, 2006.
80. Z. Di, J. Sun, and W. Xu. “Polygonal approximation of curves using binary quantum-behaved particle swarm
optimization,” Journal of Computer Applications, vol. 27(8), pp. 2030–2, 2007.
81. H. Jianjiang, J. Sun, W. Xu, and D. Hongwei. “Study on layout problem using quantum-behaved particle swarm
optimization algorithm,” Journal of Computer Applications, vol. 12, pp. 3015–8, 2006.
82. J. Sun, W. Xu, W. Fang, and Z. Chai. “Quantum-behaved particle swarm optimization with binary encoding,”
Adaptive and Natural Computing Algorithms, pp. 376–85, 2007.
83. F. Gao, H. Gao, Z. Li, H. Tong, and J. Lee. “Detecting unstable periodic orbits of nonlinear mappings by a
novel quantum-behaved particle swarm optimization non-Lyapunov way,” Chaos, Solitons and Fractals, vol.
42(4), pp. 2450–63, 2009.
84. S. Li, R. Wang, W. Hu, and J. Sun. “A new QPSO based BP neural network for face detection,” Fuzzy
Information and Engineering, pp. 355–63, 2007.
85. X. Lei, and A. Fu. “Two-dimensional maximum entropy image segmentation method based on quantum-
behaved particle swarm optimization algorithm,” Fourth International Conference on Natural Computation, pp.
692–6, 2008.
86. F. Bin, W. Zhang, and J. Sun. “Image threshold segmentation with Ostu based on quantum-behaved particle
swarm algorithm,” Computer Engineering and Design, vol. 29(13), pp. 3429–31, 2008.
87. Z. Yong, F. Zongde, W. Kanwei, and P. Hui. “Multilevel minimum cross entropy threshold selection based on
quantum particle swarm optimization,” Eighth ACIS International Conference on Software Engineering,
Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp. 65–9, 2007.
88. L. Yang, Z.W. Liao, and W.F. Chen. “An automatic registration framework using quantum particle swarm
optimization for remote sensing images,” International Conference on Wavelet Analysis and Pattern
Recognition, pp. 484–8, 2007.
89. X. Wenlong, W. Xu, and J. Sun. “Image interpolation algorithm based on quantum-behaved particle swarm
optimization,” Journal of Computer Applications, vol. 27(9), pp. 2147–9, 2007.
90. L.S. Coelho, and V.C. Mariani. “Particle swarm approach based on quantum mechanics and harmonic oscillator
potential well for economic load dispatch with valve-point effects,” Energy Conversion and Management, vol.
49(11), pp. 3080–5, 2008.
91. J. Sun, W. Fang, D. Wang, and W. Xu. “Solving the economic dispatch problem with a modified quantum-
behaved particle swarm optimization method,” Energy Conversion and Management, vol. 50(12), pp. 2967–75,
2009.
92. L. Zhou, H. Yang, and C. Liu. “QPSO-based hyper-parameters selection for LS-SVM regression,” Fourth
International Conference on Natural Computation, pp. 130–3, 2008.
93. X. Li, L. Zhou, and C. Liu. “Model selection of least squares support vector regression using quantum-behaved
particle swarm optimization algorithm,” International Workshop on Intelligent Systems and Applications, pp. 1–
5, 2009.
94. J. Wang, Z. Liu, and P. Lu. “Electricity load forecasting based on adaptive quantum-behaved particle swarm
optimization and support vector machines on global level,” International Symposium on Computational
Intelligence and Design, pp. 233–6, 2008.
95. Q. Zhang, and Z. Che. “A novel method to train support vector machines for solving quadratic programming
task,” 7th World Congress on Intelligent Control and Automation, pp. 7917–21, 2008.
96. C. Lin, and P. Feng. “Parameters selection and application of support vector machines based on quantum delta
particle swarm optimization algorithm,” Automation and Instrumentation, vol. 1, pp. 5–8, 2009.
97. S.L. Sabat, L.S. Coelho, and A. Abraham. “MESFET DC model parameter extraction using quantum particle
swarm optimization,” Microelectronics Reliability, vol. 49(6), pp. 660–6, 2009.
98. J. Liu, W. Xu, and J. Sun. “Nonlinear system identification of hammerstien and wiener model using swarm
intelligence,” 2006 IEEE International Conference on Information Acquisition, pp. 1219–23, 2006.
99. J. Sun, W. Xu, and J. Liu. “Training RBF neural network via quantum-behaved particle swarm optimization,”
Neural Information Processing, pp. 1156–63, 2006.
00. S. Tian, and T. Liu. “Short-term load forecasting based on RBFNN and QPSO,” Asia-Pacific Power and Energy
Engineering Conference, pp. 1–4, 2009.
01. Q. Tan, and Y. Song. “Sidelobe suppression algorithm for chaotic FM signal based on neural network,” 9th
International Conference on Signal Processing, pp. 2429–33, 2008.
02. Y. Genghuang, and W. Boying. “Identification of power quality disturbance based on QPSO-ANN,”
Proceedings of the CSEE, vol. 28(10), pp. 123–9, 2008.
03. X. Kong, J. Sun, B. Ye, and W. Xu. “An efficient quantum-behaved particle swarm optimization for
multiprocessor scheduling,” Computational Science—ICCS, pp. 278–85, 2007.
04. W. Fang, J. Sun, W. Xu, and J. Liu. “FIR digital filters design based on quantum-behaved particle swarm
optimization,” First International Conference on Innovative Computing, Information and Control, pp. 615–9,
2006.
05. W. Fang, J. Sun, and W. Xu. “FIR filter design based on adaptive quantum-behaved particle swarm optimization
algorithm,” Systems Engineering and Electronics, vol. 30(7), pp. 1378–81, 2008.
06. W. Fang, J. Sun, and W. Xu. “Design IIR digital filters using quantum-behaved particle swarm optimization,”
Advances in Natural Computation, pp. 637–40, 2006.
07. W. Fang, J. Sun, and W. Xu. “Analysis of adaptive IIR filter design based on quantum-behaved particle swarm
optimization,” The Sixth World Congress on Intelligent Control and Automation, pp. 3396–400, 2006.
08. W. Fang, J. Sun, and W. Xu. “Design of two-dimensional recursive filters by using quantum-behaved particle
swarm optimization,” International Conference on Intelligent Information Hiding and Multimedia Signal
Processing, pp. 240–3, 2006.
09. J. Sun, W. Fang, W. Chen, and W. Xu. “Design of two-dimensional IIR digital filters using an improved
quantum-behaved particle swarm optimization algorithm,” American Control Conference, pp. 2603–8, 2008.
OceanofPDF.com
13 Decentralizing Trust
Innovating Social Media with Blockchain
for Enhanced Authenticity and Fake
News Mitigation
Vedant Singh, Andleeb Tanveer, Kalpana A.V.,
and Ciro Rodriguez R.
DOI: 10.1201/9781003499459-13
13.1 INTRODUCTION
In today’s digital era, social media platforms have become essential tools
for worldwide communication, allowing countless individuals to exchange
ideas, participate in conversations, and shape public perceptions on a global
scale. From microblogs to image-centered networks, these platforms have
revolutionized the way information is shared and consumed, establishing
themselves as influential forces in the realms of media and politics. Despite
their undeniable impact, these platforms have also faced significant issues
due to the proliferation of false information and deceptive news, eroding
trust among the public and presenting substantial obstacles to societal
cohesion.
A possible solution to these problems involves using decentralized social
media platforms. Unlike centralized platforms, decentralized systems like
blockchain-based, federated, and peer-to-peer (P2P) networks provide a
more open and secure structure for managing content. These platforms are
not governed by a single entity; instead, they function on a distributed
ledger technology that distributes data storage and content sharing among
various nodes, reducing the risk of tampering and censorship.
Social media platforms are like intricate ecosystems that manage not just
the technical side of connecting people, like addressing and verifying
identities, but also the social and technical challenges of discovering
content and running digital ads. The emergence of decentralized platforms
is a significant step in tackling these problems. By spreading out the
structure and management of these platforms, there is a chance to establish
a fairer and more equal media environment.
The fast spread of incorrect information, whether intentional or
accidental, has exposed flaws in the current methods of verifying content,
which are usually centralized. These systems depend too much on platform
operators to oversee and manage content distribution, which can result in
biases and ineffective filtering of falsehoods. A fresh approach is urgently
required to regain trust and maintain the authenticity of shared information.
Decentralized social media platforms come in a variety of types, such as
blockchain-based, federated, and peer-to-peer systems. Data storage,
content distribution, user discovery, identity management, governance,
moderation, income generating, and network architecture are among the
tasks that these platforms are organized around. Decentralized social media
was inspired by worries about centralized power systems in the past and the
content filtering practices of centralized platforms in the present.
Historically, social media hasn’t had a definition that everyone agrees
with. Various terminologies, such as online social networks or social
network sites, have been used by different academic disciplines; some have
even proposed up to six different categories (Aichner & Jacob, 2015;
McCay-Peet & Quan-Haase, 2017). Although platform types vary, they all
have certain fundamental qualities in common, which highlights the
necessity to distinguish across typologies such as microblogging and image
sharing.
The social graph, which allows users to build profiles, connect with
others, publish material, and receive feedback, is at the center of social
media (Boyd & Ellison, 2007). Sharing content is a key activity that can be
restricted to certain groups or made freely available. Users can interact with
content by liking, following, commenting, reposting, and taking other
predetermined actions. Social media networks technically handle
addressing, authentication, identity verification, content discovery, and data
storage. They also discuss socio-technical issues such as content filtering
and business structures (Gillespie, 2018).
In addition to undermining the veracity of information, the propagation
of fake news on social media has serious negative effects on society,
influencing public opinion, widening social gaps, and even undermining
democratic processes. A study on fake news subject matter with respect to
fake news is shown in Figure 13.1. Due to the fact that fact-checking and
content control processes are frequently centralized, prejudice, censorship,
and manipulation are problems. Novel approaches that maintain
decentralization and transparency on social media while improving the
validity of content are desperately needed.
The purpose of this chapter is to investigate how blockchain technology
might be used to address the problems of fake news and authenticity on
social media. Blockchain-based solutions have the potential to enhance the
trustworthiness of information posted on social media platforms and reduce
the propagation of fake news by decentralizing trust and enabling
transparent processes for content verification. By means of an extensive
examination of extant literature, theoretical analysis, and case studies, this
chapter aims to offer insights into the practicability, efficacy, and
consequences of incorporating blockchain technology into social media
establishments.
FIGURE 13.1 Study on fake news subject matter.
13.3.1 Methodology
This chapter’s methodology section describes the methodical approach used
in the creation and deployment of the Decentralized Social Media (DSM)
application. Understanding blockchain technology, establishing use cases,
creating the user interface, and incorporating security measures are just a
few of the important steps that are covered in this part. An extensive
explanation of each step is provided in the following.
The goal of the analysis step that follows is to thoroughly examine the
modeled framework in order to find any weaknesses, inefficiencies, or areas
that may be optimized. The goal is to optimize the system by thorough
analysis in order to accomplish predetermined goals, like improved
efficiency, security, and privacy. To make sure that the decentralized social
media network satisfies the highest requirements of security, effectiveness,
and user-friendliness, an extensive security audit, performance testing, and
user experience evaluations are conducted as part of this iterative process.
The decentralized social media platform must, however, continue to be
safe, effective, and user-friendly while simultaneously successfully
resolving the inherent drawbacks of centralized social networks. The goal is
to create a decentralized social media ecosystem that gives individuals
unmatched privacy, control, and sovereignty over their digital interactions
by following strict modeling and analysis procedures.
Users who successfully register are given access to the site, where they
can use their encrypted identities to participate in a variety of social media
activities. Users can safely communicate with others, share content, and
take part in community conversations with this identity, which functions as
a digital passport. In addition, the decentralized structure of the blockchain
guarantees the immutability and tamper-proofness of user identities,
providing protection against identity theft and fraudulent activity.
Our platform addresses important issues that are common in traditional
social media platforms by enhancing trust and authenticity through the
registration process’ integration of blockchain technology. Because the
blockchain’s built-in security measures safeguard users’ identities, they can
feel secure and private about their information. Furthermore, user identity
management’s decentralized structure lessens dependency on centralized
authority, giving people more control over their digital identities and
promoting an online ecosystem that is more transparent and resilient. In
conclusion, our blockchain-integrated social media platform’s register
feature is a big step in the right direction toward improving digital trust and
authenticity. Users may safely create and maintain their identities by using
blockchain technology and secure encryption techniques, opening the door
for a more reliable and decentralized social media environment.
13.6 CONCLUSION
In summary, the emergence of decentralized social media signifies a
noteworthy progression in the field of virtual social networks, utilizing
blockchain technology to tackle crucial concerns related to security,
privacy, and centralization. Through the use of a decentralized architecture,
DSM makes information flow more resilient to censorship, data breaches,
and manipulation by doing away with the requirement for a central
authority or server.
Choosing Solana as the DSM’s underlying blockchain technology has
several advantages over more conventional choices like Ethereum. Because
of its proof-of-history consensus method, which enables scalability and
high throughput, Solana is an attractive option for meeting the requirements
of a decentralized social media platform. DSM can handle more
transactions with Solana at a cheaper cost, giving users a smooth and
effective experience.
UML diagrams were used to map out the system architecture, and a
thorough literature review served as a guide for the design and execution of
DSM’s features throughout the development process. This careful
preparation made it possible for the essential aspects of DSM to be
implemented successfully, opening the door for the coding of the smart
contracts and front-end interfaces, which is the next stage of the project.
DSM’s adherence to Web3.0 principles highlights its commitment to
offering consumers improved security and privacy. DSM eliminates the
possibility of a single point of failure by decentralizing data storage and
depending on group consensus to add new data to the network, hence
reducing the danger of data breaches and improving data integrity.
To put it briefly, decentralized social media is an innovative initiative
aimed at completely changing the online social network environment.
Through the adoption of decentralization, the utilization of blockchain
technology, and the emphasis on security and privacy, DSM seeks to
transform the online user experience and information sharing. In order to
fully realize DSM’s promise and usher in a new era of decentralized social
media platforms, ongoing testing and refinement will be essential as the
project advances.
REFERENCES
OceanofPDF.com
14 Quantum Computing Integration
Cutting-Edge and Quantum Computing
for Building a Smart and Sustainable
Environment
Senthil Kumar Arumugam, Bukola Fatimah
Balogun, S. Nalini, and Amit Kumar Tyagi
DOI: 10.1201/9781003499459-14
TABLE 14.1
SDGs with Their Descriptions Using Emerging Technologies
SDG Goal Type Description
Fintech and blockchain
technologies have the potential to
provide financial services to
No Poverty Financial individuals who are unbanked or
(SDG 1) Inclusion underprivileged, thereby
fostering economic
empowerment and alleviating
poverty.
AI, IoT, and biotechnology
enhance crop monitoring,
improve soil health, and optimize
Zero Hunger Agricultural
resource allocation in agriculture,
(SDG 2) Technologies
leading to increased food
production and reduced food
waste.
Telehealth, wearable devices, and
Good Health and AI-driven diagnostics enhance
Telemedicine and
Well-being healthcare accessibility and
e-Health
(SDG 3) quality, particularly in remote
areas.
Edtech platforms and AI-driven
educational tools provide
Quality
personalized and accessible
Education (SDG E-Learning
education, bridging gaps in
4)
education and promoting lifelong
learning.
These technologies help establish
secure and verifiable identities,
Gender Equality Blockchain and
contributing to women’s
(SDG 5) Digital Identity
empowerment and gender
equality.
SDG Goal Type Description
IoT sensors enable real-time
Clean Water and
IoT for Water monitoring of water quality and
Sanitation (SDG
Management consumption, supporting efficient
6)
water resource management.
Solar, wind, and various other
renewable energy technologies
Affordable and
Renewable play a crucial role in mitigating
Clean Energy
Energy greenhouse gas emissions and
(SDG 7)
expanding worldwide access to
clean energy sources.
The digital economy and the gig
Decent Work workforce are enabled by
Digital Workforce
and Economic technology platforms, fostering
and Gig Economy
Growth (SDG 8) economic growth and
employment opportunities.
Industry, Advanced Technologies like 3D printing,
Innovation, and Manufacturing IoT, and smart grids support
Infrastructure and Smart sustainable industrialization and
(SDG 9) Infrastructure infrastructure development.
Blockchain can help ensure fair
Reduced
Blockchain for and transparent distribution of
Inequality (SDG
Social Services social benefits, reducing
10)
inequality.
IoT, data analytics, and AI
collectively enhance urban
Sustainable
planning, energy efficiency, and
Cities and Smart City
transportation systems in smart
Communities Technologies
cities, fostering a more efficient,
(SDG 11)
sustainable, and connected urban
environment.
SDG Goal Type Description
The adoption of IoT and data
Responsible analytics plays a crucial role in
Consumption Circular Economy facilitating the shift towards a
and Production Technologies: circular economy, as it
(SDG 12) effectively minimizes waste and
enhances resource efficiency.
Renewable energy technologies
Renewable
Climate Action and quantum computing facilitate
Energy and
(SDG 13) climate change mitigation and
Climate Modeling
adaptation efforts.
Marine IoT and satellite monitoring
Life Below
Conservation enhance marine conservation and
Water (SDG 14)
Technologies protection efforts.
IoT and remote sensing
Life on Land Environmental technologies contribute to the
(SDG 15) Monitoring preservation of terrestrial
ecosystems and wildlife.
Peace, Justice,
Blockchain for Blockchain ensures transparency
and Strong
Transparency and and accountability in governance
Institutions
Accountability: and justice systems.
(SDG 16)
Emerging technologies like AI,
IoT, etc., facilitate global
Partnerships for collaboration and data sharing
Data Sharing and
the Goals (SDG among governments,
Collaboration
17) organizations, and stakeholders
to advance sustainable
development efforts.
Natural Resource Management: AI models optimize the use of natural
resources, such as water and energy, by predicting demand, monitoring
consumption, and suggesting conservation measures. Precision
agriculture, driven by AI, enhances irrigation, crop management and
pest control, leading to higher yields and reduced resource wastage.
AI-powered smart grids and energy management systems intelligently
distribute and optimize energy usage, minimizing waste and promoting
sustainability.
Waste Management and Recycling: AI-driven waste sorting systems
automate the separation of recyclables from non-recyclables in waste
processing facilities, increasing recycling rates and reducing landfill
waste. AI-powered robotics and automation improve waste collection
and recycling processes, making them more efficient and cost-
effective.
Renewable Energy: AI enhances the efficiency of renewable energy
sources, such as solar and wind power, by predicting energy
production, optimizing grid integration, and adjusting energy
generation in response to weather conditions. AI-driven energy
management systems in smart grids promote energy conservation and
reduce grid congestion.
Biodiversity and Conservation: AI supports wildlife protection by
using drones, cameras, and acoustic monitoring to track and identify
endangered species and detect poaching activities. AI algorithms
analyze ecological data to inform conservation strategies, helping
protect important habitats and biodiversity.
Disaster Response and Mitigation: AI-powered predictive models
analyze historical data and real-time information to forecast natural
disasters like hurricanes, floods, and wildfires with increasing
accuracy. AI-driven early warning systems analyze data from a range
of sources such as satellite images, weather sensors, and social media
in order to deliver prompt notifications to both authorities and the
public. This enables better disaster preparedness, response, and
evacuation plans, ultimately saving lives and minimizing the impact of
these catastrophic events.
Air and Water Quality Management: AI models process air and water
quality data to identify pollution sources, assess health risks, and
recommend pollution control measures. AI-equipped sensors in urban
areas provide real-time air quality information, allowing residents to
make informed decisions about outdoor activities.
Smart Cities and Urban Planning: AI contributes to smart city
initiatives by optimizing traffic management, reducing congestion, and
promoting efficient public transportation systems. AI-powered urban
planning tools help design more sustainable cities, with reduced energy
consumption and improved waste management.
Conservation Agriculture: AI-driven precision farming techniques
enable farmers to minimize the use of pesticides and fertilizers,
resulting in reduced environmental impact and healthier ecosystems.
AI-powered drones and satellites provide detailed imagery for
monitoring land use and crop health.
Environmental Policy and Decision Support: AI facilitates data-driven
policymaking by providing information from large datasets, helping
governments and organizations make informed choices for sustainable
development. AI-driven simulations and scenario analysis aid in
assessing the environmental impact of policies and projects.
The combination of IoT and data analytics allows for comprehensive and
real-time monitoring of environmental conditions. This data-driven
approach enables timely decision-making, efficient resource management,
and sustainable practices, ultimately contributing to a smarter and more
eco-friendly future.
Data Storage:
Big Data and Analytics Services: Big Data and Analytics Services:
Cloud platforms offer a range of tools and services designed to handle
and analyze massive datasets. AWS EMR, Google BigQuery, and
Azure Data Lake Analytics are examples of services that enable
organizations to perform advanced data analytics in the cloud, enabling
them to derive valuable insights and make informed decisions based
on comprehensive data analysis.
Serverless Computing: Platforms for serverless computing, such as
AWS Lambda and Azure Functions, allow organizations to run code in
response to events without the need to manage servers. This approach
streamlines real-time data processing and enables quick responses to
changing data patterns, ultimately improving agility and efficiency in
data-driven operations.
Data Security:
Cost Optimization:
IoT and Sensors: IoT devices collect vast amounts of data from the
physical world, such as environmental data, machine sensor data, and
consumer behavior data.
Cloud Computing: The cloud provides storage and processing
capabilities to handle the massive data generated by IoT devices.
AI: AI algorithms can analyze and extract meaningful information
from IoT data, providing valuable information for decision-making.
Blockchain: Data from IoT devices can be securely and transparently
stored in blockchain ledgers, ensuring data integrity and authenticity.
Smart Contracts:
IoT and Sensors: IoT sensors offer immediate insight into the supply
chain, monitoring the whereabouts and status of products.
Blockchain: Blockchain verifies the authenticity and origin of
products, promoting transparency and traceability.
AI: AI analyzes supply chain data to identify inefficiencies and predict
disruptions.
Energy Management:
Environmental Sensing:
IoT: IoT devices collect environmental data, such as air quality and
temperature.
AI: AI processes this data for real-time monitoring and predictive
analytics.
Quantum Computing: Quantum computing can enhance climate
modeling and environmental simulations for more accurate
predictions.
IoT and Sensors: Medical IoT devices collect patient data and monitor
health conditions.
Cloud Computing: The cloud securely stores and processes health data.
AI: AI analyzes health data to provide information and personalized
healthcare recommendations.
Blockchain: Patient records can be stored in a secure and interoperable
blockchain, ensuring data integrity and privacy.
Financial Services:
Technological Challenges:
14.10 CONCLUSION
The combination of AI, blockchain, IoT, cloud computing, and quantum
computing presents an innovative strategy for developing an intelligent and
eco-friendly ecosystem. This fusion of technologies has the power to
address intricate problems and shape a future that is not only more effective
and resilient but also environmentally conscious. Moreover, this initiative
tackles ethical and social considerations, such as data protection and fair
access to technology. To sum up, the integration of AI, blockchain, IoT,
cloud computing, and quantum computing shows great potential in
nurturing an intelligent and sustainable environment. It signifies a shift in
how technology can be utilized to combat environmental issues and
promote a fairer and eco-friendly world. This analysis concludes that this
technological amalgamation could transform our relationship with our
environment, offering fresh solutions to enduring environmental challenges
and contributing to a more responsible and sustainable use of resources.
Despite persistent obstacles, this forward-thinking approach holds the
promise of a brighter, cleaner, and more sustainable future for future
generations.
REFERENCES
1. Nair, M. M., & Tyagi, A. K. (2023). Chapter 11—AI, IoT, blockchain,
and cloud computing: The necessity of the future. In R. Pandey, S.
Goundar, & S. Fatima (Eds.), Distributed Computing to Blockchain (pp.
189–206). Academic Press. ISBN: 9780323961462.
https://doi.org/10.1016/B978-0-323-96146-2.00001-2.
2. Duan, H. (2022). The principles, algorithms and state-of-art applications
of quantum computing. Journal of Physics: Conference Series, 2386.
012025. https://doi.org/10.1088/1742–6596/2386/1/012025.
3. Fei, S-M., Li, M., & Luo, S. (2023). Quantum information and
computation. Entropy, 25, 463. https://doi.org/10.3390/e25030463.
4. Arute, F. et al. (2021). Quantum approximate optimization of non-planar
graph problems on a planar superconducting processor. Nature Physics,
17(3), 340–345. www.nature.com/articles/s41567-020-01105-x
5. Wecker, D. et al. (2020). Progress and prospects for quantum supremacy
in computing. Frontiers in Physics, 8, 660.
www.frontiersin.org/articles/10.3389/fphy.2020.00660/full
6. Susindhar A. V., Soni, G., & Tyagi, A. K. (2023). A review on recent
trends in quantum computation technology. In A. Tyagi (Ed.), Handbook
of Research on Quantum Computing for Smart Environments (pp. 48–
64). IGI Global. https://doi.org/10.4018/978-1-6684-6697-1.ch003
7. Sasi, P., Soni, G., Tyagi, A. K., Kakulapati, V., Shyam Mohan J. S., &
Singh, R. K. (2023). Quantum computing and the qubit: The future of
artificial intelligence. In A. Tyagi (Ed.), Handbook of Research on
Quantum Computing for Smart Environments (pp. 231–244). IGI Global.
https://doi.org/10.4018/978-1-6684-6697-1.ch013
8. Tyagi, A. K. (Ed.). (2023). Handbook of Research on Quantum
Computing for Smart Environments. IGI Global.
https://doi.org/10.4018/978-1-6684-6697-1
9. Deekshetha, H. R., & Tyagi, A. K. (2023). Chapter 16—Automated and
intelligent systems for next-generation-based smart applications. In A. K.
Tyagi & A. Abraham (Eds.), Data Science for Genomics (pp. 265–276).
Academic Press. https://doi.org/10.1016/B978-0-323-98352-5.00019-7.
10. Tyagi, A. K. (2022). Handbook of Research on Technical, Privacy, and
Security Challenges in a Modern World. IGI Global.
https://doi.org/10.4018/978-1-6684-5250-9
11. Gomathi, L., Mishra, A. K., & Tyagi, A. K. (2023). Blockchain and
machine learning empowered internet of things applications: Current
issues, challenges and future research opportunities. In 2023 4th
International Conference on Smart Electronics and Communication
(ICOSEC), Trichy, India (pp. 637–647).
https://doi.org/10.1109/ICOSEC58147.2023.10276385.
12. Nair, M. M., & Tyagi, A. K. (2023). Blockchain technology for next-
generation society: Current trends and future opportunities for smart era.
In Blockchain Technology for Secure Social Media Computing.
https://doi.org/10.1049/PBSE019E_ch11.
13. Gomathi, L., Mishra, A. K., & Tyagi, A. K. (2023). Industry 5.0 for
Healthcare 5.0: Opportunities, challenges and future research
possibilities. In 2023 7th International Conference on Trends in
Electronics and Informatics (ICOEI), Tirunelveli, India (pp. 204–213).
https://doi.org/10.1109/ICOEI56765.2023.10125660.
14. Deshmukh, A., Patil, D. S., Pawar, P. D., Kumari, S., & Muthulakshmi,
P. (2023). Recent trends for smart environments with AI and IoT-based
technologies: A comprehensive review. In A. Tyagi (Ed.), Handbook of
Research on Quantum Computing for Smart Environments (pp. 435–
452). IGI Global. https://doi.org/10.4018/978-1-6684-6697-1.ch023
15. Tyagi, A. K., Dananjayan, S., Agarwal, D., & Thariq Ahmed, H. F.
(2023). Blockchain—Internet of Things applications: Opportunities and
challenges for Industry 4.0 and Society 5.0. Sensors, 23(2), 947.
https://doi.org/10.3390/s23020947
16. Goyal, D., & Tyagi, A. (2020). A Look at Top 35 Problems in the
Computer Science Field for the Next Decade.
https://doi.org/10.1201/9781003052098-40.
17. Pramod, A., Naicker, H. S., & Tyagi, A. K. (2022). Emerging
innovations in the near future using deep learning techniques. In
15 Quantum Computing for Next-
Generation Artificial Intelligence–
Based Blockchain
Senthil Kumar Arumugam, Shabnam Kumari,
Shrikant Tiwari, and Amit Kumar Tyagi
DOI: 10.1201/9781003499459-15
Understanding its basics and key features is essential for those looking to
discuss its applications and implications.
Basics of AI:
Machine Learning: This branch of artificial intelligence uses
algorithms to help computers learn from data and make judgements or
predictions. It is crucial to a lot of AI applications.
Deep Learning: This branch of machine learning leverages artificial
neural networks, which are modelled after the human brain, to address
challenging issues. Particularly effective applications of deep learning
include speech and picture recognition.
Natural Language Processing (NLP): NLP is a subfield of artificial
intelligence that aims to provide computers the ability to comprehend,
translate, and produce human language.
Computer Vision: This field focuses on educating machines to
translate and comprehend visual data from the outside world, including
pictures and movies.
TABLE 15.1
Key Challenges and Open Issues in Quantum-Powered AI-Based
Blockchain
Type Challenges Solutions
The primary concern is the
possible danger that quantum Developing and adopting
computing poses to existing quantum-resistant
Quantum-
cryptographic methods used cryptography is important
Resistant
in blockchain. Quantum to ensure the long-term
Cryptography
computers could break security of blockchain
encryption algorithms networks.
currently in use.
Quantum Scaling and stability issues Continued research and
Hardware prevent practical quantum development in quantum
Development computers with a large hardware to achieve
Type Challenges Solutions
enough qubit count and error practical and reliable
correction from being quantum machines.
developed beyond the
experimental stage.
Integrating quantum Developing user-friendly
computing capabilities with tools and interfaces to
Integration
AI and blockchain can be simplify the integration
Complexity
complex and require process and promote
specialized expertise. adoption.
Creating programs and
algorithms that use quantum
Investment in quantum
Quantum computing can be
software development and
Software challenging, as it requires a
training for developers to
Development different mindset and skill set
bridge the knowledge gap.
compared to classical
computing.
New regulations and ethical
Collaboration between
issues will be necessary to
policymakers,
address quantum-powered
Regulatory and technologists, and ethicists
blockchain technologies,
Ethical issues to establish guidelines and
especially in fields like
standards for quantum-
finance, healthcare, and
powered blockchains.
identity management.
As of now, practical quantum
While practical quantum
computing capabilities are
Limited computing is under
limited, and it may take time
Practical development, focusing on
before quantum computers
Quantum quantum-safe solutions and
can be effectively used for
Computing conducting research and
blockchain and AI
pilot projects is advisable.
applications
Type Challenges Solutions
Scaling quantum-powered
Research into scalable
AI-based blockchains to
consensus mechanisms and
handle a large volume of
Scalability data storage solutions
transactions and data
designed for quantum-
efficiently is a complex
powered blockchains.
problem.
Quantum computing can
Development of quantum-
break existing encryption
secure encryption methods
Data Privacy methods, impacting data
and key distribution
and Security privacy. Additionally,
techniques to protect data
ensuring secure quantum key
and communications.
distribution is challenging.
Efficient allocation and Development of resource
Quantum
management of quantum management solutions and
Computing
computing resources for AI- strategies to optimize
Resource
based blockchain quantum computing for
Management
applications can be complex. blockchain and AI tasks.
Key Components:
Benefits:
Use Cases:
Key Components:
Benefits:
Use Cases:
Hence, future research and innovation in these areas will help unlock the
full potential of quantum-enabled AI-based blockchain technology,
providing more secure, efficient, and scalable solutions for the next
generation of blockchain applications. Collaboration between experts in
quantum computing, AI, and blockchain will be important to drive these
advancements.
15.8 CONCLUSION
The convergence of quantum computing, artificial intelligence, and
blockchain technology represents a groundbreaking frontier in the world of
information technology. Quantum computing’s unprecedented processing
power, AI’s data-driven intelligence, and blockchain’s security and
transparency together have the potential to redefine the landscape of next-
generation AI-based blockchain systems. The journey toward quantum-
enabled AI-based blockchains is a path of both promise and complexity. It
holds the potential to create unparalleled efficiencies, security, and
transparency across a multitude of industries, finance, supply chain
management, healthcare, and more.
However, this transformation does not come without its challenges and
intricacies, including the development of quantum-resistant cryptography,
scalable consensus mechanisms, and regulatory issues. The challenges and
limitations of introducing quantum computing into the blockchain are
addressed (in this chapter), such as the need for quantum-resistant
cryptographic standards and the scalability of quantum technology in a
blockchain context. In summary, the combination of the three promises to
advance the capabilities of decentralized systems by introducing quantum-
resilient security, enhanced consensus mechanisms, and AI-driven
automation. While this intersection is still in its nascent stages, it has the
potential to reshape the landscape of blockchain and redefine the future of
AI within decentralized networks. Hence, the convergence is filled with
more opportunities, and the next generation of AI-based blockchain systems
is set to revolutionize how we exchange value, protect data, and make
informed decisions in an increasingly digital world.
REFERENCES
1. Fei, S-M., Li, M., & Luo, S. (2023). Quantum information and
computation. Entropy, 25, 463. https://doi.org/10.3390/e25030463.
2. Nair, M. M., & Tyagi, A. K. (2023). Chapter 11—AI, IoT, blockchain,
and cloud computing: The necessity of the future. In R. Pandey, S.
Goundar, & S. Fatima (Eds.), Distributed Computing to Blockchain (pp.
189–206). Academic Press. ISBN: 9780323961462.
https://doi.org/10.1016/B978-0-323-96146-2.00001-2.
3. Tyagi, A. K. (2023). Chapter 2—Decentralized everything: Practical use
of blockchain technology in future applications. In R. Pandey, S.
Goundar, & S. Fatima (Eds.), Distributed Computing to Blockchain (pp.
19–38). Academic Press. ISBN: 9780323961462,
https://doi.org/10.1016/B978-0-323-96146-2.00010-3.
4. Nair, M. M., &Tyagi,A. K. (2023).Blockchain technology for next-
generation society: Current trends and future opportunities for smart era.
In Blockchain Technology for Secure Social Media Computing.
https://doi.org/10.1049/PBSE019E_ch11.
5. Duan, H. (2022).The principles, algorithms and state-of-art applications
of quantum computing. Journal of Physics: Conference Series, 2386,
012025. https://doi.org/10.1088/1742-6596/2386/1/012025.
6. Fei, S-M., Li, M., & Luo, S. (2023).Quantum information and
computation. Entropy, 25, 463. https://doi.org/10.3390/e25030463.
7. Arute, F. et al. (2021).Quantum approximate optimization of non-planar
graph problems on a planar superconducting processor. Nature Physics,
17(3), 340–345. www.nature.com/articles/s41567-020-01105-x
8. Wecker, D. et al. (2020). Progress and prospects for quantum supremacy
in computing. Frontiers in Physics, 8, 660.
www.frontiersin.org/articles/10.3389/fphy.2020.00660/full.
9. Susindhar A. V., Soni, G., & Tyagi, A. K. (2023).A review on recent
trends in quantum computation technology. In A. Tyagi (Ed.), Handbook
of Research on Quantum Computing for Smart Environments (pp. 48–
64). IGI Global. https://doi.org/10.4018/978-1-6684-6697-1.ch003.
10. Sasi, P., Soni, G., Tyagi, A. K., Kakulapati, V., Shyam Mohan J. S., &
Singh, R. K. (2023).Quantum computing and the qubit: The future of
artificial intelligence. InA.Tyagi (Ed.), Handbook of Research on
Quantum Computing for Smart Environments (pp. 231–244). IGI Global.
https://doi.org/10.4018/978-1-6684-6697-1.ch013.
11. Tyagi, A. K. (Ed.). (2023). Handbook of Research on Quantum
Computing for Smart Environments. IGI Global.
https://doi.org/10.4018/978-1-6684-6697-1.
12. Deekshetha, H. R., &Tyagi, A. K. (2023). Chapter 16—Automated and
intelligent systems for next-generation-based smart applications. In A. K.
Tyagi & A. Abraham (Eds.), Data Science for Genomics (pp. 265–276).
Academic Press. https://doi.org/10.1016/B978-0-323-98352-5.00019-7.
13. Tyagi, A. K. (2022). Handbook of Research on Technical, Privacy, and
Security Challenges in a Modern World. IGI Global.
https://doi.org/10.4018/978-1-6684-5250-9.
14. Gomathi, L., Mishra, A. K., & Tyagi, A. K. (2023).Blockchain and
machine learning empowered internet of things applications: Current
issues, challenges and future research opportunities. In 2023 4th
International Conference on Smart Electronics and Communication
(ICOSEC), Trichy, India (pp. 637–647).
https://doi.org/10.1109/ICOSEC58147.2023.10276385.
15. Gomathi, L., Mishra,A. K., & Tyagi, A. K. (2023).Industry 5.0 for
Healthcare 5.0: Opportunities, challenges and future research
possibilities. In 2023 7th International Conference on Trends in
Electronics and Informatics (ICOEI), Tirunelveli, India (pp. 204–213).
https://doi.org/10.1109/ICOEI56765.2023.10125660.
16. Deshmukh, A., Patil, D. S., Pawar, P. D., Kumari,S., & Muthulakshmi, P.
(2023).Recent trends for smart environments with AI and IoT-based
technologies: A comprehensive review. InA.Tyagi (Ed.), Handbook of
Research on Quantum Computing for Smart Environments (pp. 435–
452). IGI Global. https://doi.org/10.4018/978-1-6684-6697-1.ch023.
17. Goyal, D., & Tyagi, A. (2020). A Look at Top 35 Problems in the
Computer Science Field for the Next Decade.
https://doi.org/10.1201/9781003052098-40.
18. Pramod, A., Naicker, H. S., & Tyagi,A. K. (2022).Emerging innovations
in the near future using deep learning techniques. In Advanced Analytics
and Deep Learning Models. Wiley Scrivener.
https://doi.org/10.1002/9781119792437.ch10.
19. Gheorghiu, V. et al. (2021). Quantum computing: An overview of recent
progress. Annual Review of Condensed Matter Physics, 12, 247–271.
www.annualreviews.org/doi/abs/10.1146/annurev-conmatphys-121919-
050502.
20. Sharma, A. (2021). A Textbook on Modern Quantum Mechanics.
https://doi.org/10.1201/9781003154457.
21. Fernandez-Carames, T. M., & Fraga-Lamas,P. (2020).Towards post-
quantum blockchain: A review on blockchain cryptography resistant to
quantum computing attacks. IEEE Access, 8, 21091–21116, January 23.
22. Flarend, A., & Hilborn, B. (2022). Quantum Gates and Quantum
Circuits. https://doi.org/10.1093/oso/9780192857972.003.0006.
23. Griffiths, D., &Schroeter,D. (2018). Introduction to Quantum
Mechanics. https://doi.org/10.1017/9781316995433.
24. Tyagi, A., Kukreja, S., Nair, M. M., & Tyagi, A. K. (2022). Machine
learning: Past, present and future. Neuroquantology, 20(8).
https://doi.org/10.14704/nq.2022.20.8.NQ44468
25. Yanofsky, N., & Mannucci, M. (2008). Quantum Computing for
Computer Scientists. https://doi.org/10.1017/CBO9780511813887.
26. Tyagi, A. K., Dananjayan, S., Agarwal, D., & Thariq Ahmed, H. F.
(2023).Blockchain—Internet of Things applications: Opportunities and
challenges for Industry 4.0 and Society 5.0. Sensors, 23(2), 947.
https://doi.org/10.3390/s23020947.
OceanofPDF.com
16 Securing Patient Data in
Healthcare with Quantum
Cryptography in the Quantum Era
P. Manju Bala, S. Usharani, and A. Balachandar
DOI: 10.1201/9781003499459-16
16.1 INTRODUCTION
The landscape of healthcare has undergone a transformative shift with the
rapid digitization of medical records and services, significantly enhancing
the efficiency and accessibility of healthcare delivery. Electronic health
records (EHRs), telemedicine, and various digital health innovations have
streamlined operations, facilitated real-time patient monitoring, and
improved overall patient care (Perumal & Nadar, 2020). However, this
digitization has also introduced substantial vulnerabilities in information
security, exposing complex patient data to cyber extortions (Chengoden et
al., 2023). As healthcare systems become increasingly reliant on digital
technologies, guaranteeing the security of patient information has become a
critical priority. In parallel with the digitization of healthcare, advancements
in quantum computing (SaberiKamrposhti et al., 2024) have emerged as a
double-edged sword. Quantum computing presents serious challenges to
existing encryption techniques, even though it has the potential to solve
complicated issues beyond the capabilities of conventional computers.
Conventional encryption methods, like Rivest-Shamir-Adleman (RSA) and
Elliptic curve cryptography (ECC), are based on statistical puzzles that are
too complex for conventional computers to solve computationally.
Nevertheless, these methods are susceptible to quantum algorithms, such as
Shor’s algorithm, which can solve discrete logarithms and factor big
numbers with efficiency, making traditional encryption obsolete (Hang et
al., 2022). In this regard, using the concepts of quantum physics, quantum
cryptography presents a ground-breaking method of data security.
The application of quantum cryptography, in particular quantum key
distribution (QKD), offers a means of establishing communication channels
that are inherently safe against cyberattacks and eavesdropping (Selvarajan
& Mouratidis, 2023). As opposed to traditional encryption techniques, QKD
takes advantage of the intrinsic qualities of quantum particles to guarantee
that any effort to eavesdrop on the conversation would be quickly
discovered since it would disrupt the quantum state (Shuaib et al., 2022).
This chapter explores how quantum cryptography is being applied and how
it affects patient data security in the healthcare industry. It provides a
thorough examination of the present status of healthcare data security, the
shortcomings of conventional encryption approaches, and the realistic
processes necessary in implementing quantum cryptography techniques,
with an emphasis on the observable results of integrating these techniques
into healthcare systems (Dash et al., 2019). The chapter also outlines the
anticipated gains in data availability, secrecy, and integrity and provides a
thorough case study demonstrating the practical applications of quantum
cryptography in the medical field.
The rapid digitalization of medical records and services has completely
changed the healthcare environment, greatly improving accessibility and
efficiency of healthcare delivery. The use of electronic health records,
telemedicine, and other developments in digital health have resulted in
enhanced patient care, real-time monitoring of patients, and simplified
operations (Ralegankar et al., 2022). Sensitive patient data is now
vulnerable to cyberattacks due to significant data security flaws brought
about by digitalization. Patient data security has emerged as a top problem
as healthcare institutions depend more and more on digital technology
(“Limitations and future applications of quantum cryptography,” 2021). The
digitalization of healthcare is occurring concurrently with the development
of quantum computing, which presents a double-edged sword. Quantum
computing presents serious risks to existing encryption techniques, even
though it has the potential to solve complicated issues that are beyond the
capabilities of conventional computers (Aggarwal et al., 2023).
Conventional encryption methods, like RSA and ECC, are based on
mathematical puzzles that are too complex for conventional computers to
solve computationally. Nevertheless, these methods are susceptible to
quantum algorithms, such as Shor’s algorithm, which solve discrete
logarithms and factor big numbers with efficiency, making traditional
encryption obsolete.
In this regard, using the ideas of quantum physics, quantum cryptography
presents a ground-breaking method of data security. Quantum cryptography
(Qu & Sun, 2023), in particular quantum key distribution, offers a way to
establish communication channels that are fundamentally safe against
cyberattacks and eavesdropping. In contrast to traditional encryption
techniques, quantum key distribution leverages the intrinsic characteristics
of quantum particles to guarantee that any effort to intercept the
communication would be instantly detected since it would disrupt the
quantum state (Ahn et al., 2022).
This chapter delves into the implementation and impact of quantum
cryptography on securing patient data in the healthcare sector. It focuses on
the tangible outcomes of integrating quantum cryptographic techniques into
healthcare systems, providing a broad analysis of the recent state of
healthcare information security, the weaknesses of traditional encryption
methods, and the practical steps involved in deploying QKD. Moreover, the
chapter highlights the expected improvements in data integrity,
confidentiality, and availability, and presents a detailed case study
illustrating the real-world benefits of quantum cryptography in healthcare.
TABLE 16.1
Susceptibilities Presented by Digitization and the Role of Quantum
Cryptography
Future Direction with
Aspect Current Situation
Quantum Cryptography
Continued
enhancement through
Streamlined advanced digital
Digital
operations. tools.
Transformation in
Facilitated real-time Better patient
Healthcare
patient monitoring outcomes and
operational
efficiency.
Role of Quantum
Cryptography Classical encryption QKD provides
methods becoming resilience to
obsolete.
Future Direction with
Aspect Current Situation
Quantum Cryptography
Risking integrity of eavesdropping and
healthcare data. cyber-attacks.
Ensures data integrity
and confidentiality.
Improved data
Exploring quantum
integrity,
cryptographic
Implementation of confidentiality, and
techniques.
QKD in Healthcare availability.
Enhancing data
Real-world benefits
security.
through case studies.
TABLE 16.2
Important Requirements for Quantum Cryptography in the Healthcare
Industry, along with a Description, Challenges, and Solutions
Requirement Description Challenges Solutions
Implementation of
Economies of
QKD protocols
Secure High cost and scale, cost-effective
and secure
Quantum Key complexity of implementation
quantum
Distribution QKD systems. strategies, gradual
communication
deployment.
channels.
Integration Compatibility with Compatibility Development of
with Existing current IT issues with APIs, middleware,
Requirement Description Challenges Solutions
Systems infrastructure and legacy systems and hybrid systems
use of hybrid and devices. for gradual
cryptographic integration.
systems.
Support for Scalable
Handling large-
extensive infrastructure,
scale networks
Scalability healthcare modular
and multiple
networks and deployment, robust
devices.
various devices. network design.
Economically
Funding
feasible
High initial setup opportunities,
Cost- implementation
and operational grants, cost-benefit
Effectiveness and manageable
costs. analysis, leveraging
ongoing
economies of scale.
maintenance costs.
Training for Comprehensive
healthcare training programs,
Resistance to
User Training professionals and continuous
change, lack of
and Awareness IT staff, awareness education,
knowledge.
programs for stakeholder
stakeholders. engagement.
Regular audits,
Adherence to data
Keeping up with compliance checks,
Regulatory protection
evolving staying informed
Compliance regulations like
regulations. about regulatory
HIPAA and GDPR.
changes.
Robustness and Error correction, Quantum Quantum error
Reliability fault tolerance, and communication correction
consistent errors, hardware techniques, regular
performance. malfunctions.
Requirement Description Challenges Solutions
maintenance,
robust design.
Quantum digital
Ensuring data Ensuring data signatures, tamper-
Data Integrity
authenticity and has not been proof systems,
and
preventing altered, verifying robust
Authentication
tampering. identities. authentication
mechanisms.
Staying updated Research and
with advancements Rapid development,
Future- in quantum technological adaptable and
Proofing technology and changes, future upgradeable
ensuring threats. systems, proactive
upgradability. threat anticipation.
Robust encryption
Protecting patient methods,
Ensuring patient
data confidentiality compliance with
Privacy privacy,
and ensuring privacy standards,
Preservation complying with
anonymity or patient
regulations.
pseudonymity. anonymization
techniques.
Implementation of
Economies of
QKD protocols
Secure High cost and scale, cost-effective
and secure
Quantum Key complexity of implementation
quantum
Distribution QKD systems. strategies, gradual
communication
deployment.
channels.
16.3.3 Scalability
Scalability is a critical requirement for the successful deployment of
quantum cryptography in healthcare. Healthcare systems are vast and
complex, encompassing hospitals, clinics, remote healthcare services, and
various other entities. Therefore, the quantum cryptographic system must be
scalable to support this extensive network. This involves having the
capacity to manage a big number of people and devices without sacrificing
performance or security. Network scalability ensures that secure quantum
communication channels can be established across different locations,
enabling safe transmission of sensitive data. Additionally, the system should
be compatible with various devices used in healthcare, from sophisticated
medical equipment to handheld devices used by healthcare professionals.
Ensuring device compatibility is crucial for maintaining secure
communication channels and protecting patient data across the entire
healthcare network. Furthermore, the system must be capable of scaling up
as the healthcare network grows, accommodating new devices, users, and
locations. This requires robust and flexible infrastructure that can adapt to
changing demands and increasing data volumes. Scalability also involves
ensuring that the system can handle peak loads, such as during large-scale
health crises or when dealing with extensive patient records. By ensuring
scalability, healthcare institutions can provide secure and efficient services,
protecting sensitive information and enhancing overall operational
efficiency.
16.3.4 Cost-Effectiveness
Implementing quantum cryptography in healthcare must be economically
feasible. This involves assessing the initial setup costs, including the
acquisition of quantum cryptographic equipment, secure communication
channels, and necessary infrastructure upgrades. While quantum
cryptography offers superior security, the cost of implementing it should be
justifiable within the budget constraints of healthcare institutions. Ongoing
maintenance and operational costs should also be manageable, ensuring that
the system remains sustainable in the long term. This includes the costs
associated with maintaining and updating quantum cryptographic hardware
and software, as well as training staff to use and manage the system
effectively. By utilizing economies of scale, negotiating advantageous terms
with vendors, and maximizing resource use, cost-effectiveness may be
attained. Additionally, healthcare institutions can explore funding
opportunities and grants specifically aimed at enhancing cybersecurity in
healthcare. Demonstrating the potential cost savings from preventing data
breaches and protecting sensitive patient information can also help justify
the investment. Ultimately, the goal is to implement a quantum
cryptographic system that provides robust security without imposing an
excessive financial burden on healthcare providers. By ensuring cost-
effectiveness, healthcare institutions can adopt advanced security measures
while maintaining financial stability and continuing to provide high-quality
care.
16.3.9 Future-Proofing
Future-proofing is essential for the effective implementation of quantum
cryptography in healthcare. As quantum computing and cryptographic
technologies continue to evolve, healthcare institutions must ensure that
their systems remain secure and up-to-date. This involves staying informed
about advancements in quantum technology and being prepared to adopt
new protocols and techniques as they become available. Ensuring that the
quantum cryptographic system is upgradable is crucial for maintaining
long-term security and effectiveness. This includes designing systems that
can incorporate new quantum cryptographic methods and technologies
without requiring significant overhauls. In order to remain abreast of
developments in quantum cryptography and to investigate novel strategies
and security-enhancing solutions, healthcare providers should also allocate
resources to research and development. Future-proofing also involves
anticipating potential threats and vulnerabilities, ensuring that the system
can adapt to emerging challenges. By prioritizing future-proofing,
healthcare institutions can ensure that their quantum cryptographic systems
remain effective and secure, providing robust protection for sensitive
patient data in the face of evolving technological landscapes.
Initial Planning
Infrastructure Assessment
Hardware Installation
16.11 CONCLUSION
To sum up, the application of quantum cryptography in the healthcare
industry has great promise for improving data security and shielding patient
data from online dangers. While the swift digitalization of healthcare has
brought about a revolution in medical services, it has also brought to light
data security issues that are difficult to resolve using conventional
encryption techniques. The necessity for quantum-safe encryption is
growing as quantum computing develops. A solution is provided by
quantum cryptography, which uses the ideas of quantum physics to
establish communication channels that are intrinsically secure. A crucial
component of quantum cryptography is quantum key distribution, which
creates encryption keys that are nearly impervious to eavesdropping by
taking use of quantum entanglement and superposition. The quantum state
would be disturbed by any effort to intercept these keys, making it traceable
and guaranteeing the communication’s security. Implementing QKD in
healthcare systems involves deploying quantum cryptographic hardware,
integrating it with existing IT infrastructure, and establishing secure
quantum communication channels. While there are challenges such as
ensuring compatibility and adjusting encryption protocols, the benefits far
outweigh the complexities. Enhanced data security is the primary benefit of
implementing quantum cryptography in healthcare. Patient data becomes
highly resistant to both current and future cyber threats, ensuring its
integrity, confidentiality, and availability. Quantum cryptography offers a
strong and long-lasting solution for protecting medical data by reducing the
dangers of data breaches and illegal access.
REFERENCES
Aggarwal, L., Sachdeva, S., & Goswami, P. (2023). Quantum healthcare
computing using precision based granular approach. Applied Soft
Computing, 144, 110458. https://doi.org/10.1016/j.asoc.2023.110458
Ahn, J., Kwon, H., Ahn, B., Park, K., Kim, T., Lee, M., Kim, J., & Chung,
J. (2022). Toward quantum secured distributed energy resources:
Adoption of Post-Quantum Cryptography (PQC) and Quantum Key
Distribution (QKD). Energies, 15(3), 714.
https://doi.org/10.3390/en15030714
Althobaiti, O. S., & Dohler, M. (2021). Quantum-Resistant cryptography
for the internet of things based on Location-Based lattices. IEEE Access,
9, 133185–133203. https://doi.org/10.1109/access.2021.3115087
Aparna, H., Bhumijaa, B., Santhiyadevi, R., Vaishanavi, K.,
Sathanarayanan, M., Rengarajan, A., Praveenkumar, P., & El-Latif, A. a.
A. (2021). Double layered Fridrich structure to conserve medical data
privacy using quantum cryptosystem. Journal of Information Security
and Applications, 63, 102972. https://doi.org/10.1016/j.jisa.2021.102972
Chengoden, R., Victor, N., Huynh-The, T., Yenduri, G., Jhaveri, R. H.,
Alazab, M., Bhattacharya, S., Hegde, P., Maddikunta, P. K. R., &
Gadekallu, T. R. (2023). Metaverse for Healthcare: A survey on potential
applications, challenges and future directions. IEEE Access, 11, 12765–
12795. https://doi.org/10.1109/access.2023.3241628
Dash, S., Shakyawar, S. K., Sharma, M., & Kaushik, S. (2019). Big data in
healthcare: Management, analysis and future prospects. Journal of Big
Data, 6(1). https://doi.org/10.1186/s40537-019-0217-0
Davids, J., Lidströmer, N., & Ashrafian, H. (2022). Artificial intelligence in
medicine using quantum computing in the future of healthcare. In
Springer eBooks (pp. 423–446). https://doi.org/10.1007/978-3-030-
64573-1_338
Denis, R., & Madhubala, P. (2021). Hybrid data encryption model
integrating multi-objective adaptive genetic algorithm for secure medical
data communication over cloud-based healthcare systems. Multimedia
Tools and Applications, 80(14), 21165–21202.
https://doi.org/10.1007/s11042-021-10723-4
Gupta, S., Modgil, S., Bhatt, P. C., Jabbour, C. J. C., & Kamble, S. (2023).
Quantum computing led innovation for achieving a more sustainable
Covid-19 healthcare industry. Technovation, 120, 102544.
https://doi.org/10.1016/j.technovation.2022.102544
Hang, L., Chen, C., Zhang, L., & Yang, J. (2022). Blockchain for
applications of clinical trials: Taxonomy, challenges, and future
directions. IET Communications, 16(20), 2371–2393.
https://doi.org/10.1049/cmu2.12488
Jaime, F. J., Muñoz, A., Rodríguez-Gómez, F., & Jerez-Calero, A. (2023).
Strengthening privacy and data security in biomedical
microelectromechanical systems by IoT communication security and
protection in smart healthcare. Sensors, 23(21), 8944.
https://doi.org/10.3390/s23218944
Jayanthi, P., Rai, B. K., & Muralikrishna, I. (2022). The potential of
quantum computing in healthcare. In Advances in systems analysis,
software engineering, and high performance computing book series (pp.
81–101). https://doi.org/10.4018/978-1-7998-9183-3.ch006
Limitations and future applications of quantum cryptography. (2021). In
Advances in information security, privacy, and ethics book series.
https://doi.org/10.4018/978-1-7998-6677-0
Perumal, A. M., & Nadar, E. R. S. (2020). RETRACTED ARTICLE:
Architectural framework and simulation of quantum key optimization
techniques in healthcare networks for data security. Journal of Ambient
Intelligence & Humanized Computing/Journal of Ambient Intelligence
and Humanized Computing, 12(7), 7173–7180.
https://doi.org/10.1007/s12652-020-02393-1
Qu, Z., & Sun, H. (2023). A secure information transmission protocol for
healthcare Cyber based on quantum image expansion and Grover search
algorithm. IEEE Transactions on Network Science and Engineering,
10(5), 2551–2563. https://doi.org/10.1109/tnse.2022.3187861
Ralegankar, V. K., Bagul, J., Thakkar, B., Gupta, R., Tanwar, S., Sharma,
G., & Davidson, I. E. (2022). Quantum Cryptography-as-a-Service for
Secure UAV Communication: Applications, challenges, and case study.
IEEE Access, 10, 1475–1492.
https://doi.org/10.1109/access.2021.3138753
SaberiKamrposhti, M., Ng, K., Chua, F., Abdullah, J., Yadollahi, M.,
Moradi, M., & Ahmadpour, S. (2024). Post-Quantum Healthcare: A
roadmap for cybersecurity resilience in medical data. Heliyon, e31406.
https://doi.org/10.1016/j.heliyon.2024.e31406
Selvarajan, S., & Mouratidis, H. (2023). Author Correction: A quantum
trust and consultative transaction-based blockchain cybersecurity model
for healthcare systems. Scientific Reports, 13(1).
https://doi.org/10.1038/s41598-023-36573-8
Shuaib, M., Hassan, N. H., Usman, S., Alam, S., Sam, S. M., & Samy, G. a.
N. (2022). Effect of quantum computing on blockchain-based electronic
health record systems. 2022 4th International Conference on Smart
Sensors and Application.
https://doi.org/10.1109/icssa54161.2022.9870964
Ukwuoma, H. C., Arome, G., Thompson, A., & Alese, B. K. (2022). Post-
quantum cryptography-driven security framework for cloud computing.
Open Computer Science, 12(1), 142–153. https://doi.org/10.1515/comp-
2022-0235
Zhang, Y., Wang, S., & Ji, G. (2015). A comprehensive survey on particle
swarm optimization algorithm and its applications. Mathematical
Problems in Engineering, 2015, 1–38.
https://doi.org/10.1155/2015/931256
OceanofPDF.com
17 An Analysis of Security Threats in
Quantum Computing Information
Processing
Kanthavel R., Anju A., Adline Freeda R., S.
Krithikaa Venket, Dhaya R., Frank Vijay, and
Joseph Fisher
DOI: 10.1201/9781003499459-17
17.1 INTRODUCTION
Although quantum computing has great promise for revolutionizing
information processing, it presents new risks and difficulties. As technology
advances, it becomes increasingly important to understand these dangers to
prepare and secure systems against potential future weaknesses. Utilizing
the concepts of superposition and entanglement found in quantum
mechanics, quantum computing can execute calculations that are impossible
for classical computers. This presents new security risks even if it has
enormous potential for industries like optimization, drug development, and
cryptography. We can roughly divide these risks into three categories: those
that impact current cryptography systems, those that introduce new types of
attacks, and those that present unique challenges unique to quantum
computing (Gani and Greer, 2023).
The development of quantum computing presents significant risks to
today’s security and information processing infrastructure. These risks
include weaknesses in cryptographic systems, the appearance of attacks
special to quantum computing, difficulties with data security and privacy,
and problems intrinsic to quantum information processing. To reduce these
risks and safeguard data processing in the quantum era, proactive steps such
as the implementation of post-quantum cryptography methods, improved
network security, and ongoing research are critical [Hossain Faruk et al.,
2022]. This chapter also covers the security of quantum software and
algorithms, along with the inherent challenges of quantum error correction.
Strong error correction techniques are required due to the vulnerability of
quantum systems to mistakes and decoherence, and it is crucial to secure
quantum programs against both conventional and quantum threats.
TABLE 17.1
QKD’s Main Drawbacks
– requires implementing new hardware
Integrating with Current
– expensive
Networks
– complicated
– requiring specialized hardware like single-
Price photon sources and detectors
– unaffordable
– Challenging to administer
– maintain the complicated quantum network
Scalability
– infrastructure needed for each pair of users,
– Utilize specialized quantum channels.
17.7 CHALLENGES
Infrastructure Development: The creation and upkeep of a quantum
network necessitate substantial infrastructural advances, such as the
currently-underdeveloped quantum repeaters and quantum memory.
Key Distribution and Management: Although QKD offers safe key
exchange, it is still a difficult task to manage and distribute these keys
across the network.
Integrating Quantum Networks with Classical Infrastructure: There
are considerable technological and security obstacles in integrating
quantum networks with the current classical infrastructure.
TABLE 17.2
Challenges
– The currently-underdeveloped quantum
Infrastructure Development
repeaters and quantum memory.
Key Distribution and
– difficult task to manage and distribute
Management
– The currently-underdeveloped quantum
Infrastructure Development
repeaters and quantum memory.
Integrating Quantum – Security obstacles in integrating
Networks with Classical quantum networks with the current
Infrastructure classical infrastructure.
– compromise the security of quantum
Attacks on Quantum Channels
communications using quantum channels
– the high susceptibility of quantum
Error rates and Decoherence
systems to errors and decoherence
– specialised gear, which can be costly
Resource Intensity:
and difficult to install.
– due to the absence of standardised
protocols
Standardisation and Protocols
– best practices for quantum network
security
17.9 CONCLUSION
The rapid development of quantum computing technology presents the
promise of unprecedented computational power, but it also introduces a new
set of security risks that require management to safeguard the
confidentiality and integrity of information processing. This investigation
has revealed significant security concerns associated with quantum
computing, including the great sensitivity of qubits to external disturbances,
the strict cryogenic requirements, and the susceptibility to physical layer
and side-channel assaults. Robust error correction techniques are crucial
because quantum calculations are highly vulnerable to decoherence and
quantum error rates. Hardware Trojans, fault injection attacks, and the
potential for malicious alterations during production further complicate the
security environment. Furthermore, there are still difficulties in integrating
quantum and classical networks, standardizing protocols, and overcoming
the financial and technological obstacles to putting safe quantum systems
into practice. Notwithstanding these obstacles, entanglement-based
communication and quantum key distribution present potential paths
towards safe information sharing. Developments in quantum repeaters,
enhanced error correction methods, and the creation of uniform security
protocols will determine the direction of quantum network security in the
future. Furthermore, financial incentives and cross-disciplinary cooperation
will be essential to removing the present adoption hurdles and guaranteeing
the safe implementation of quantum technology. In summary, whereas
quantum computing poses significant security risks, it also offers special
chances to improve information processing security. Realizing the full
promise of quantum computing in a secure and dependable manner will
require addressing these issues via ongoing study, technical innovation, and
interdisciplinary collaboration.
REFERENCES
DOI: 10.1201/9781003499459-18
18.1 INTRODUCTION
Intrusion detection and prevention systems (IDPSs) are vital parts of an
organization’s cybersecurity infrastructure. These systems are made to
watch network and system activities for harmful actions or rule breaches
and react properly. This chapter explores the architecture, functionality,
types, and deployment strategies of IDPSs, along with best practices for
implementation and maintenance. The concept of intrusion detection dates
back to the early days of computing when the primary focus was on
securing individual mainframes from unauthorized access. As networking
technology advanced, the need for more sophisticated intrusion detection
mechanisms became evident. Early intrusion detection systems (IDSs) were
primarily signature based, relying on predefined patterns of known threats
to detect malicious activities. These systems were effective in identifying
known attacks but struggled with new or evolving threats. The advent of the
internet and the rapid growth of interconnected networks in the 1990s and
2000s brought about a paradigm shift in cyber threats. Attackers began
leveraging more complex techniques, such as polymorphic malware zero-
day exploits and advanced persistent threats (APTs), which were capable of
bypassing traditional IDSs. This necessitated the development of more
advanced systems that could not only detect intrusions but also prevent
them in real time. Intrusion prevention systems (IPSs) emerged as an
evolution of IDSs, incorporating the ability to actively block or mitigate
detected threats. The integration of detection and prevention capabilities led
to the development of IDPSs, which combine the functionalities of IDSs
and IPSs to provide a more comprehensive security solution. Modern IDPSs
employ a variety of detection techniques, including signature-based,
anomaly-based, and hybrid methods, to identify and respond to threats more
effectively.
The distributed cyber-physical intrusion detection system relies on
stacking learning to fortify wide-area protection systems. By amalgamating
various detection mechanisms across distributed nodes, it aims to enhance
the security of cyber-physical systems [1]. Leveraging a multi-head self-
attention gated graph convolutional network, this system focuses on
identifying multiple attacks within mobile ad hoc networks (MANETs).
Through the fusion of graph convolutional networks and attention
mechanisms, it endeavors to heighten intrusion detection accuracy within
dynamic and decentralized MANET environments [2]. Aiming at ensuring
both security and privacy, this intrusion detection system is tailored for
wireless sensor networks. Employing federated learning with Secured
Convolutional Neural Network (SCNN)-Bi-LSTM, it boosts reliability
while safeguarding sensitive data gathered by sensor nodes [3]. The SCNN
is serving as a stalwart defense system, a poll on counter adversarial
machine learning attacks in intrusion detection systems is made by
deploying advanced defense mechanisms, it reinforces the resilience of
intrusion detection systems, thereby ensuring the integrity and
dependability of detected intrusions [4].
Tailored to address the intricacies of IoT environments, this intrusion
detection system is purpose-built for IoT devices and data. It adeptly
navigates resource constraints and diverse communication protocols to
detect and mitigate intrusions effectively within IoT networks [5]. Designed
to identify and counter poisoning attacks, this personalized federated
learning-based intrusion detection system enhances detection accuracy
while mitigating the impact of adversarial data manipulation [6]. Tailored to
fortify cloud security, this intrusion detection approach harnesses
transformer neural networks. By leveraging transformer-based techniques,
it enhances the efficiency and effectiveness of intrusion detection,
particularly addressing scalability and complexity challenges in cloud
environments [7]. Exploring the nuances between feature selection and
extraction techniques. The study made by Long et al. optimizes intrusion
detection systems within IoT environments. Through comparative analysis,
it sheds light on methods to enhance performance and efficiency [8]. IDS-
INT employs transformer-based transfer learning to tackle imbalanced
network traffic. By harnessing transfer learning, it enhances the detection
accuracy of rare and unseen intrusions within imbalanced network
environments [9]. This research delves into feature extraction techniques
tailored for machine learning-based intrusion detection in IoT networks. By
extracting pertinent features from IoT network traffic, the proposed method
enhances the efficacy and efficiency of intrusion detection systems within
IoT ecosystems [10].
DTL-IDS presents an optimized intrusion detection framework
amalgamating deep transfer learning and genetic algorithms. This
framework augments adaptability and robustness by leveraging transfer
learning while optimizing the detection process using genetic algorithms
[11]. Through a comparative examination of machine learning-based
intrusion detection systems, this study offers valuable insights into their
strengths and weaknesses. Such insights aid in the judicious selection and
optimization of intrusion detection systems [12]. Offering a comprehensive
overview, this systematic literature review delineates trends, challenges, and
advancements in host-based intrusion detection systems (HIDSs). Its
findings furnish valuable insights for researchers and practitioners in the
field [13]. Tailored for the unique challenges of the Internet of Vehicles
(IoV) environment, this intrusion detection system leverages IoV-specific
communication patterns and attack scenarios. It enhances the security and
resilience of connected vehicle networks against cyber threats [14].
The importance of intrusion detection and prevention systems in the
cybersecurity landscape cannot be overstated [15, 16]. Cyber-attacks pose
significant risks to organizations, including financial losses, reputational
damage, regulatory penalties, and operational disruptions. An effective
IDPS offers several critical benefits to mitigate these risks. First, it provides
real-time threat detection and prevention by continuously monitoring
network traffic and system activities, enabling timely identification and
mitigation of malicious actions. This real-time capability is essential for
minimizing the impact of attacks and reducing potential damage. Second,
an IDPS ensures comprehensive security coverage by integrating both
network-based and host-based monitoring, offering a holistic view of the
security landscape. This comprehensive approach enables organizations to
identify and address both external and internal threats, safeguarding their
digital assets effectively. Moreover, modern IDPS solutions feature
automated response mechanisms that can automatically respond to detected
threats, such as blocking malicious IP addresses or isolating compromised
systems. These automated responses reduce response times and limit the
potential damage caused by cyber-attacks. Additionally, IDPSs generate
enhanced visibility and accountability by providing detailed logs and alerts
that offer valuable insights into security incidents. This enhanced visibility
facilitates forensic analysis, compliance reporting, and accountability,
ensuring organizations can effectively respond to security breaches. Last,
IDPSs demonstrate adaptability to emerging threats by integrating advanced
detection techniques like machine learning and behavioral analysis. This
adaptability enables IDPSs to stay ahead of evolving threats, ensuring
organizations are better prepared to handle new and sophisticated attack
vectors. Overall, the multifaceted capabilities of IDPSs play a crucial role in
enhancing cybersecurity resilience and protecting organizations from the
ever-evolving threat landscape.
TABLE 18.1
Detection Analysis in Character and Features for Different IDPS
Detection Techniques
Detection
Advantages Limitations Key Features
Technique
—Relies on a
—High —Ineffective database of known
effectiveness against against unknown threat patterns
Signature-
known threats. or zero-day attacks —Predefined
Based
Quick and accurate —Requires regular sequences of bytes
Detection
identification of updates to the or patterns
malicious activities. signature database. —High accuracy
for known threats.
Anomaly- —Capable of —Potential for —Establishes
Based detecting unknown false positives if normal behavior
Detection or zero-day attacks normal behavior baseline
changes
Detection
Advantages Limitations Key Features
Technique
—Establishes a —Requires —Detects
baseline of normal continual updates deviations from
behavior. and fine-tuning. normal patterns
—Suitable for
dynamic threat
environments.
—Integrates
signature-based and
—Combines
anomaly-based
strengths of —More complex
techniques
signature-based and to implement and
Hybrid —Balances
anomaly-based manage
Detection detection accuracy
methods —Higher resource
and adaptability
—Improved requirements.
—Reduces false
detection accuracy.
positives and
negatives.
TABLE 18.2
Performance Analysis of IDPSs
Performance Signature-Based Anomaly-Based
Hybrid Detection
Criteria Detection Detection
Moderate; can detect
High for known High; combines
Detection unknown threats but
threats; low for accuracy of both
Accuracy prone to false
unknown threats methods
positives
Moderate to fast,
Fast, as it Moderate, as it
Detection depending on the
matches against involves baseline
Speed balance of methods
known signatures comparison
used
Performance Signature-Based Anomaly-Based
Hybrid Detection
Criteria Detection Detection
High, as normal
Moderate; balances
Low for known behavior changes
False Positives false positives from
threats can be flagged as
both methods
anomalies
Moderate, depends
False High for Low; reduced due to
on the accuracy of
Negatives unknown threats combined approach
the baseline
Low to
High; requires
moderate; High; requires
resources for both
Resource depends on the significant
signature matching
Consumption size of the processing power
and anomaly
signature for baseline analysis
detection
database
Complex; requires
Easy; requires Complex; needs
Ease of continuous baseline
regular signature management of both
Management tuning and
updates detection techniques
monitoring
Low; needs
High; can adapt to High; leverages
frequent updates
Adaptability new and evolving adaptability of
to handle new
threats anomaly detection
threats
High; efficient Moderate; can
Moderate;
for large datasets become resource-
Scalability complexity
of known intensive as the
increases with scale
signatures environment grows
Moderate; High; continuous High; requires
Maintenance
regular updates tuning and maintenance of both
Effort
required adjustments needed systems
Performance Signature-Based Anomaly-Based
Hybrid Detection
Criteria Detection Detection
Low to High; significant
moderate; cost investment in High; involves costs
Cost
mainly for computational from both methods
updates resources
18.7 CONCLUSION
Intrusion detection and prevention systems are essential for modern cyber
security, providing critical capabilities to detect and prevent unauthorized
access and malicious activities. By understanding their architecture, types,
detection techniques, and best practices for deployment, organizations can
effectively implement IDPSs to safeguard their digital assets. As cyber
threats keep changing, the strategies and technologies to fight them must
also change. This makes IDPSs an important and active part of a strong
security plan.
REFERENCES
OceanofPDF.com
19 Data Encryption in 6G Networks
A Zero-Knowledge Proof Model
P. Selvaraj, A. Hyils Sharon Magdalene, Suresh
Sankaranarayanan, Rengaraj Alias
Muralidharan R., Priyanga Subbiah, Saranniya
S., and Lakshmi Kanthan Narayanan
DOI: 10.1201/9781003499459-19
19.1 INTRODUCTION
TABLE 19.1
Comparison between 1G, 2G, 3G, 4G, and 5G
Technology 1G 2G 3G 4G 5G
Deployment
1980s 2001 2010 Right now 2022
in Nigeria
100 Mbps
Higher
Up to 2 moving 1
Data Rate 2 Kbps 64 Kbps than 1
Mbps Gbps
Gbps
stationary
CDMA
Wi-Max,
2000, World
Technology Analog Digital Wi-Fi,
UMTS, Wide Web
LTE
EDGE
Core
PSTN PSTN Packet N/W Internet Internet
Network
W-CDMA
(wideband
code
Multiplexing FDMA TDMA/CDMA CDMA CDMA
division
multiple
access)
Switching Circuit Circuit, packet Packet All packet All packet
Primary Analog Digital phone Phone calls, All-IP High
Services phone calls and messaging, service speed,
cells messaging data (including high
voice capacity
messages) and large
broadcast
Technology 1G 2G 3G 4G 5G
of data in
Gbps
Better
Better Faster coverage,
Secure, mass
Contrast Mobility internet broadband no
adoption
experience internet dropped
calls
1. Increased attack surface: With the growth of connected devices and the
IoT expansion, 6G networks will support more devices than previous
generations. This expanded attack surface provides more opportunities
for malicious actors to exploit vulnerabilities.
2. Complexity: 6G networks are expected to be highly complex,
incorporating technologies such as AI, edge computing, and advanced
network architectures like network slicing. This complexity can
introduce new vulnerabilities and make detecting and mitigating security
threats harder.
3. Privacy concerns: As the development of 6G networks progresses, it is
expected that faster and more extensive data transmission will be
possible. However, this advancement also brings concerns about privacy.
The large volume of data generated and transmitted by these networks
might be at risk of interception and misuse, which could lead to issues
related to data privacy and compliance with regulations such as GDPR.
4. AI-driven attacks: 6G networks will leverage AI and machine learning
for various purposes, including network optimization, security analytics,
and automation. However, these same technologies are exploited by
attackers to launch sophisticated cyber attacks, such as AI-driven
malware and social engineering attacks.
5. Physical layer vulnerabilities: 6G networks introduces new
technologies at the physical layer, such as terahertz communication and
free-space optical communication. These technologies could introduce
new vulnerabilities, such as eavesdropping or jamming attacks, which
has weaknesses in the transmission medium itself.
6. Zero-day exploits and vulnerabilities: Despite extensive testing and
security measures, zero-day exploits and vulnerabilities are inevitable in
any complex system. 6G networks will be no exception, and discovering
and exploiting previously unknown vulnerabilities could pose security
risks.
FIGURE 19.1 Security challenges and attacks in 6G networks
and examples of these attacks. [1]
TABLE 19.2
National 6G Vs 5G Performance
Key Performance Indicator
5G 6G
(KPI)
Key Performance Indicator
5G 6G
(KPI)
Peak data rate 20 Gbps 1 Tbps
Experience data rate 100 Mbps 1 Gbps
Peak spectral efficiency 30 b/s/Hz 60 b/s/Hz
Experience spectral efficiency 0.3 b/s/Hz 3 b/s/Hz
Maximum bandwidth 1 GHz 100 GHz
Area traffic capacity 10 Mb/s/m2 1 Gb/s/m2
1 million 10 million
Connection density
devices/km2 devices/km2
Energy efficiency – 1 Tb/J
Latency 1 ms 100 µs
Reliability 10–5 10–9
Jitter – 1 µs
Mobility 500 km/h 1000 km/h
1. Hardware Configuration
The experimental setup comprises standard desktop machines
equipped with Intel Core processors and sufficient RAM to support
cryptographic operations efficiently. The server and client machines
are connected via a local area network (LAN) to simulate real-world
communication scenarios.
2. Software Environment
The Python programming language is used for developing the server-
client code base, leveraging cryptography libraries such as PyCrypto
and PyCryptodome for implementing encryption.
3. AES Encryption
AES encryption is employed to secure the data packets transmitted
between the server and the client. The process involves key generation,
data encryption using a symmetric key, and subsequent decryption at
the receiver’s end.
4. RSA Encryption
RSA encryption is used for secure key exchange between the server
and the client. The public and private key pairs are generated for
encryption and decryption purposes, facilitating the secure
transmission of symmetric keys.
5. Zero-Knowledge Proofs
ZKPs are applied in the communication protocol to offer substantial
evidence of knowledge without disclosing private data. For effective
ZKP verification, zk-SNARKs are used.
8. RSA Encryption:
9. Zero-Knowledge Proofs:
Proof Generation: Before transmitting the encrypted data packet,
the server generates a zero-knowledge proof to verify the integrity
of the encrypted data without revealing any sensitive information.
ZKP Incorporation: The ZKP is incorporated into the encrypted
data packet, ensuring that the proof of integrity accompanies the
encrypted payload during transmission.
10. Data Packet Transmission:
The data packet is fully encrypted using AES and RSA, and
accompanied by a ZKP, the server transmits the packet over the
network to the client. The network communication may occur over a
secure channel (e.g., TLS/SSL) to prevent interception by
unauthorized parties.
11. Client-Side Decryption:
The client uses its private key, which was previously shared
via RSA with the server, to decrypt the symmetric encryption
key.
The client uses the AES decryption method to decrypt the
contents of the data packet using the decrypted symmetric
key.
With the help of the included ZKP, the client may confirm
that the decrypted data is accurate and hasn’t been altered in
transit.
Libraries Used:
SimPy, NetworkX, Matplotlib: These libraries are used for simulation,
network visualization, and plotting, respectively.
Crypto: From this module, functions related to encryption and
decryption are imported. This includes AES and RSA encryption
algorithms.
Functions Defined:
generate_rsakey_pair():
rsa_encrypt(plaintext, public_key):
rsa_decrypt(ciphertext, private_key):
generate_aes_key(key_size=128):
simulate_transmission(env,graph,use_zkp=True,exit_messages=None,
attacker_success=Non e):
Simulation:
Zero-Knowledge Proof:
Attacker Simulation:
Network Visualization:
The code plots attacker success rates for sessions with and
without ZKP.
This analysis helps evaluate the effectiveness of ZKP in securing
data transmission.
Conclusion:
The provided client-side code complements the server-side encryption
model by simulating the client’s role in secure data transmission.
It demonstrates key generation, encryption, transmission, and security
measures such as ZKP.
Through simulation and analysis, it evaluates the effectiveness of ZKP
in preventing potential security threats during key exchange and data
transmission.
Libraries Used:
Function Defined:
monitor_system(env, interval=1):
System Monitoring:
CPU and memory utilization are recorded at each time step and
plotted.
psutil.cpu_percent(): Returns the current CPU utilization as a
percentage.
psutil.virtual_memory().percent: Returns the current memory
utilization as a percentage.
Network Throughput:
Plotting:
Matplotlib Subplots:
Simulation:
SimPy Environment:
The monitor_system is run within a SimPy environment. Its
function is processed within this environment.
The simulation runs until a specified time limit (until = 10
seconds in this case), after it is stopped.
Summary:
REFERENCES
OceanofPDF.com
Index
A
absorption, 124
adiabatic quantum computing, 79
advanced encryption standard, 65
advanced persistent threats, 291
annealing in quantum, 45
artificial intelligence, 24, 149, 185, 233, 308
artificial neural networks, 141
attack optimization, 285
auto-scaling, 241
B
back propagation neural networks, 205
behavioral analysis, 175
blockchain technology, 235
C
carbon emissions tracking, 239
circular economy, 239
cloud computing, 233
combinatorial optimization, 27
complexity, 306
complexity analysis, 7
concept of quantum memory, 284
conservation agriculture, 238
control and calibration, 86
control and measurement, 5
convolutional neural networks, 147, 159, 186
cooling, 4
cryptography, 77, 81
D
data longevity, 286
data pipelines, 242
data protection, 305
decentralized identity, 261
decentralized social media, 223
decoherence, 287
deep convolution reinforcement neural networks, 96
deep learning, 153
demilitarized zones, 300
denial-of-service, 170
density functional theory, 44, 68
Diffie-Hellman, 285
digital signatures, 253
disaster preparedness, 241
disaster response and mitigation, 238
drug discovery, 44, 82
E
earth observation, 185
eco-friendly certification, 239
economic dispatch, 205
elasticity, 241
electronic health records, 268
elliptic curve cryptography, 136, 268
encoding, 5
energy-based models, 194
energy consumption, 252
energy management, 245
enhanced resilience, 260
enhanced security, 255, 260
entanglement, 2, 25, 78, 114
environmental sensing, 245
error correction, 4, 5, 79
error detection, 5
ethical issues, 255
exponential speedup, 27
extract, 242
F
fault-tolerant operations, 5
federated learning, 94
flower framework, 103
forensic analysis automation, 175
fully convolutional networks, 187
G
gate errors, 86
general data protection regulation, 178, 273
generative adversarial networks, 31
genetic algorithms, 203
global reach, 241
graph neural networks, 190
Grover’s algorithm, 285
H
hardware deployment, 278
Harrow-Hassidim-Lloyd, 42, 48
hash functions, 252
health insurance portability and accountability, 273
heuristic analysis, 175
host-based intrusion detection systems, 292
hybrid classical–quantum networks, 157
hyperspectral image, 190
I
identity and access management, 242, 303
identity verification, 263
improved traceability, 260
interference, 78
internet engineering task force, 223
Internet of Things, 69, 180, 233, 261
Internet of Vehicles, 292
intrusion detection systems, 291
intrusion prevention systems, 291
K
key distillation, 10
key management systems, 278
K-Nearest Neighbor, 94
L
local area network, 314
logistics and scheduling, 46
long short-term memory, 192
M
machine learning, 24, 152, 170, 185, 308
magnetic resonance imaging, 71
Markov random field, 190
materials science, 44
mathematical model, 77
maximum iterations, 209
Merkle trees, 253
molecular dynamics, 118
Monte Carlo simulations, 49
multi-factor authentication, 302
multi-party computation, 104
N
natural language processing, 32, 254
network traffic analysis, 175
noise reduction, 90
O
object-based image analysis, 187
open quantum assembly language, 7
optical fibres, 277
optimization, 26, 77
optimized data queries, 29
optimizing neural networks, 27
overcoming, 90
P
Pacific Gas and Electric, 246
parameterized quantum circuit, 115, 148
pattern recognition, 255
peer-to-peer, 221
photon sources, 277
photonic quantum computing, 13
portfolio optimisation, 46
post-quantum cryptography, 47
practical byzantine fault tolerance, 225
predictive analytics, 260
principal component analysis, 28, 66, 118
privacy concerns, 305, 306
proof of stake, 225
pseudonymity, 252
Q
quadratic programming, 206
quantisation, 2
quantum algorithm, 22, 115
quantum annealing, 13, 62
quantum approximate optimization algorithm, 112, 156
quantum approximation optimisation algorithm, 64
quantum artificial intelligence laboratory, 54
quantum assembly language, 7
quantum bits, 22
quantum circuit optimisation, 6
quantum circuits, 115, 139
quantum clustering, 37
quantum codes, 5
quantum communication networks, 157
quantum compilers, 7
quantum computing, 1, 77, 111, 147, 186, 233, 244
quantum convolutional neural networks, 186
quantum cryptography, 251
quantum data analysis, 255
quantum data encoding, 30
quantum decoherence, 84
quantum error correction, 6, 9, 72
quantum feature selection, 26
quantum Fourier transform, 23, 79
quantum gates, 22
quantum gate selection, 6
quantum generative adversarial networks, 28
quantum genetic algorithms, 118
quantum gradient descent, 196
quantum instruction language, 7
quantum interconnects, 6
quantum interference, 2
quantum kernel methods, 28
quantum key distribution, 9, 46, 62, 82, 251, 256, 268, 284, 288
quantum linear discriminant analysis, 48
quantum machine learning, 11, 48, 111, 152, 255, 264
quantum machine learning models, 36
quantum malware, 285
quantum measurement, 9, 156
quantum mechanics, 2, 147
quantum networks, 14
quantum neural networks, 11, 29, 66, 118, 133, 147, 192
quantum noise, 4
quantum oracle design, 6
quantum parallelism, 78
quantum particle swarm optimization, 157
quantum phase estimation, 118
quantum principal component analysis, 52
quantum processing units, 141
quantum programming languages, 7
quantum random number generation, 65, 277
quantum random-access memory, 141
quantum replicators, 284
quantum sensing and metrology, 72
quantum simulation, 36
quantum simulation and optimisation, 10
quantum simultaneous localization and mapping, 34
quantum software development kits (SDKS), 7
quantum software, 7
quantum speedup, 6
quantum superposition, 78
quantum support vector clustering, 28
quantum support vector machine, 27, 66, 118
quantum supremacy, 8, 251
quantum variational algorithms for optimization, 121
quantum-behaved particle swarm optimisation, 201
quantum-enhanced algorithms, 11
quantum-enhanced deep learning, 192
quantum-enhanced reinforcement learning, 33
quantum-post cryptography, 286
quantum-safe cryptography, 251
qubit quality, 85
qubit sensitivity, 286
R
real-time visibility, 260
recurrent neural networks, 147, 187
reinforcement learning, 37
remote environmental sensing, 241
renewable energy, 238
restricted Boltzmann machine, 141
Rivest-Shamir-Adleman, 65, 268
S
scalability, 5, 91, 255, 272, 284
secure digital voting, 263
secured convolutional neural network, 291
security information and event management, 301
serverless computing, 242
signature-based detection, 175
simulation tasks, 77
single-photon detectors, 277
smart agriculture, 240
smart contracts, 253
smart water management, 240
superconducting circuits, 12
superposition, 3, 114
supervised learning, 37
supplier verification, 260
supply chain finance, 260
supply chain management, 83
supply chain transparency, 239
support vector machine, 27, 94
sustainable development goals, 236
sustainable finance, 248
T
topological quantum computing, 13
transparency, 253
trustless, 253
U
user experience, 226
user interface, 226
V
variational autoencoders, 31
variational quantum circuit, 115
variational quantum eigensolver, 79, 118, 156, 196
very large-scale integration, 151
W
water management, 239, 240
OceanofPDF.com