In recent years, machine learning-based identification of Alzheimer's disease (AD) from the use of brain images such as MRI has been a hot topic. Deep learning's recent triumph in object recognition has stimul...
详细信息
In the incremental learning technique, the accuracy of the model is improved by increasing the number of training samples. However, there are some problems when making this training mode. First, it is not known whethe...
详细信息
Power dissipation and energy consumption are key factors for the performance improvement of modern technology systems. In recent years, several strategies have been proposed to solve the power management issues on emb...
详细信息
Interaction with gestures is more intuitive than traditional input with a keyboard and a mouse. It has gradually become the major technology for extended reality. However, for most users, gesture control is not famili...
详细信息
Wireless Sensor Networks (WSNs) incorporate sensor nodes with minimal power consumption. Sensor devices are in high demand in many areas, including smart cities, environmental monitoring, the Internet of Things (IoT),...
详细信息
South Asia countries like Bangladesh, India, and Pakistan have a large number of fuel filling stations that use centralized payment transaction systems. In some cases, this fuel filling station uses the hand cash paym...
详细信息
Quadratic unconstrained binary optimization (QUBO) formulas of quantum annealing (QA) algorithms are classified into four categories. QA algorithms using different QUBO formulas solve specific NP-hard problems as exam...
详细信息
Homomorphic encryption (HE) is a groundbreaking cryptographic method that allows calculations on encrypted data without the need for decryption, thus safeguarding privacy and security. This article investigates how to...
详细信息
ISBN:
(数字)9798350391107
ISBN:
(纸本)9798350391114
Homomorphic encryption (HE) is a groundbreaking cryptographic method that allows calculations on encrypted data without the need for decryption, thus safeguarding privacy and security. This article investigates how to implement homomorphic encryption with QISKIT, a free-to-use quantum computing framework. The research investigates the theoretical underpinnings of HE, its use in quantum computing, and its importance for privacy-preserving calculations. Moreover, the study covers adder circuits based on quantum logic gates, their realization with QISKIT, and the prospects for improving computational security in cloud environments. The results stress the practical viability of HE in quantum environments, underscoring its possible uses in secure data processing and privacy-enhancing technologies.
Federated learning has been regarded as emerging machine learning framework due to its privacy protection. In the IoT trend, federated learning enables edge clients to predict or classify local detected data with a gl...
详细信息
For coffee farmers, the yield of coffee is an issue that will affect their income. At present, the method used to estimate the coffee production is usually to estimate the production of the entire coffee garden by wei...
详细信息
暂无评论