close menu
Bookswagon-24x7 online bookstore
close menu
My Account
10%
Quantum Computing Models for Cybersecurity and Wireless Communications: (Sustainable Computing and Optimization)

Quantum Computing Models for Cybersecurity and Wireless Communications: (Sustainable Computing and Optimization)

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

The book explores the latest quantum computing research focusing on problems and challenges in the areas of data transmission technology, computer algorithms, artificial intelligence-based devices, computer technology, and their solutions.

Future quantum machines will exponentially boost computing power, creating new opportunities for improving cybersecurity. Both classical and quantum-based cyberattacks can be proactively identified and stopped by quantum-based cybersecurity before they harm. Complex math-based problems that support several encryption standards could be quickly solved by using quantum machine learning.

This comprehensive book examines how quantum machine learning and quantum computing are reshaping cybersecurity, addressing emerging challenges. It includes in-depth illustrations of real-world scenarios and actionable strategies for integrating quantum-based solutions into existing cybersecurity frameworks. A range of topics are examined, including quantum-secure encryption techniques, quantum key distribution, and the impact of quantum computing algorithms. Additionally, it talks about machine learning models and how to use machine learning to solve problems. Through its in-depth analysis and innovative ideas, each chapter provides a compilation of research on cutting-edge quantum computer techniques, like blockchain, quantum machine learning, and cybersecurity.

Audience

This book serves as a ready reference for researchers and professionals working in the area of quantum computing models in communications, machine learning techniques, IoT-enabled technologies, and various application industries such as finance, healthcare, transportation and utilities.



Table of Contents:

Preface xv

Acknowledgment xvii

1 Performance Evaluation of Avionics System Under Hardware-In- Loop Simulation Framework with Implementation of an AS9100 Quality Management System 1
Rajesh Shankar Karvande and Tatineni Madhavi

1.1 Introduction 2

1.2 HILS Process and Quality Management System 4

1.3 HILS Testing Phase 7

1.4 AS9100 QMS Integrated with HILS Process 8

1.5 Conclusion and Suggestions 10

References 10

2 YouTube Comment Summarizer and Time-Based Analysis 13
Preeti Bailke, Rugved Junghare, Prajakta Kumbhare, Pratik Mandalkar, Pratik Mane and Netra Mohekar

2.1 Introduction 13

2.2 Literature Review 16

2.3 Methodology 18

2.3.1 YouTube Comments Data Collection 18

2.3.1.1 YouTube Data API Integration 18

2.3.1.2 get_video_comments Function 19

2.3.1.3 Comment Processing 19

2.3.1.4 Handling Pagination with get_all_video_ comments 20

2.3.1.5 Excel File Creation with save_to_excel 20

2.3.2 Datasets 20

2.3.3 Extractive Summarization 21

2.4 Result 30

2.5 Performance 30

2.6 Conclusion 31

References 31

3 Enhancing Gait Recognition Using YOLOv8 and Robust Video Matting for Low-Light and Adverse Conditions 33
Premanand Ghadekar, Aadesh Chawla, Sakshi Bodhe, Sharvari Bawane and Dhruv Kshirsagar

3.1 Introduction 34

3.2 Related Works 34

3.3 Methodology 36

3.4 Comparision with Existing Systems 41

3.5 Future Scope 48

3.6 Conclusion 48

Acknowledgment 49

References 49

4 An Ensemble-Based Machine Learning Framework for Breast Cancer Prediction 51
Ramya Palaniappan, Maha Lakshmi, Namitha, Nirmala Devi and Naga Phani

4.1 Introduction 52

4.2 Related Works 53

4.3 Proposed Framework 56

4.3.1 ML Models and Ablation Study 56

4.3.2 Building Ensemble Model Using AdaBoost 57

4.4 Experimental Setup 58

4.4.1 Dataset 58

4.4.2 Data Visualization 59

4.4.3 Data Pre-Processing Phase 60

4.4.4 Proposed Methodology 61

4.4.5 Performance Metrics 62

4.5 Results and Discussion 63

4.5.1 Comparison with Baseline Models 63

4.5.2 Comparison with Existing Literature Works 66

4.6 Existing Works 67

4.7 Conclusion and Future Work 69

Dataset 69

References 69

5 Proactive Fault Detection in Weather Forecast Control Systems Through Heartbeat Monitoring and Cloud-Based Analytics 73
Shelly Prakash and Vaibhav Vyas

5.1 Introduction 74

5.1.1 Cloud Computing 75

5.1.1.1 Fault, Error, Failure 75

5.2 Related Work 77

5.3 Proposed Proactive Fault Detection Architecture 81

5.4 Conclusion 95

References 95

6 FlowGuard: Efficient Traffic Monitoring System 99
Varsha Dange, Atharva Bonde, Om Borse, Harshal Chaudhari and Sanskar Chaudhari

6.1 Introduction 99

6.2 Literature Review 100

6.3 Methodology 113

6.3.1 Theory 113

6.3.2 Requirement 114

6.3.2.1 Hardware Requirements 114

6.3.2.2 Software Requirements 116

6.3.3 Workflow 117

6.3.4 Flowchart 118

6.4 Results and Discussions 118

6.5 Conclusion 121

6.6 Future Scope 121

Acknowledgment 122

References 122

References for Pictures of Components Used 124

7 A Survey on Heart Disease Prediction Using Ensemble Techniques in ml 125
Sudhakar Vecha and M.V.P. Chandra Sekhara Rao

7.1 Introduction 125

7.2 Literature Survey 127

7.3 Datasets 128

7.4 Ensemble Learning in Heart Disease 129

7.5 Challenges and Limitations 134

7.6 Future Directions 134

7.7 Conclusion 135

References 135

8 A Video Surveillance: Crowd Anomaly Detection and Management Alert System 139
Anitha Ponraj, Umasree Mariappan, M. J. Sai Kiran, S. Tejeswar Reddy, N. Vinay and P. Bharath

8.1 Introduction 140

8.2 Related Work 140

8.3 Dataset Description 143

8.4 Problem Definition 143

8.5 Proposed Methodology and System 144

8.5.1 Proposed Methodology 144

8.5.2 Proposed System 146

8.6 Results 148

8.7 Conclusion and Future Scope 150

8.7.1 Conclusion 150

8.7.2 Future Scope 151

References 151

9 Revolutionizing Learning with Qubits: A Review of Quantum Machine Learning Advances 153
Shatakshi Bhusari, Aniket Badakh, Kalyani Daine, Nikita Gagare and Prasad Raghunath Mutkule

9.1 Introduction 154

9.1.1 Parallelism 154

9.1.2 Quantum Speedup 155

9.1.3 Quantum Entanglement 155

9.1.4 Quantum Fourier Transform 155

9.1.5 Quantum Machine Learning Algorithms 155

9.1.6 Quantum Data Representation 155

9.1.7 Quantum Sampling 155

9.1.8 Quantum Annealing 156

9.1.9 Hybrid Quantum-Classical Approaches 156

9.2 Review of Literature 156

9.2.1 Overview of Key Quantum Computing Principles 156

9.2.1.1 Qubits (Quantum Bits) 157

9.2.1.2 Quantum Gates 157

9.2.1.3 Quantum Parallelism 157

9.2.1.4 Quantum Measurement 157

9.2.1.5 Quantum Fourier Transform 158

9.2.1.6 Quantum Entanglement-Based Algorithms 158

9.3 Basic Quantum Operations, Qubits, and Quantum Gates 158

9.3.1 Basic Quantum Operations 158

9.3.2 Quantum Bits (Qubits) 158

9.3.3 Quantum Gates 159

9.4 Quantum Machine Learning Algorithms 159

9.4.1 Quantum Support Vector Machines (QSVM) 161

9.4.2 Quantum Neural Networks (QNN) 161

9.4.3 Quantum Clustering Algorithms 161

9.4.4 Quantum Principal Component Analysis (QPCA) 162

9.4.5 Quantum Boltzmann Machines 162

9.4.6 Quantum Support Vector Clustering (QSVC) 162

9.5 Quantum Hardware for Machine Learning 162

9.6 Challenges in Building Scalable and Error-Resistant Quantum Hardware 163

9.6.1 Decoherence and Quantum Error Correction 163

9.6.2 Quantum Gate Fidelity 163

9.6.3 Scalability 164

9.6.4 Qubit Connectivity and Crosstalk 164

9.6.5 Material Science and Qubit Implementation 164

9.6.6 Quantum Interconnects 164

9.6.7 Thermal Management 164

9.6.8 Error Mitigation Strategies 164

9.7 Challenges and Limitations in Quantum Machine Learning 165

9.7.1 Quantum Computational Overheads 165

9.7.2 Hybrid Quantum-Classical System Integration 165

9.7.3 Limited Quantum Expressibility 165

9.7.4 Data Preprocessing Challenges 165

9.7.5 Quantum Algorithm Verification 166

9.7.6 Quantum Resource Requirements 166

9.7.7 Adaptation to Quantum Hardware Constraints 166

9.7.8 Limited Quantum Hardware Availability 166

9.7.9 Algorithmic Complexity 166

9.7.10 Quantum Model Interpretability 166

9.8 Future Directions 167

9.9 Conclusion 167

References 167

10 Multi-Band Self-Grounding Antenna for Wireless Technologies 169
Ch. Siva Rama Krishna, P. Livingston, S. Jaya Chandra, J. Hari Babu and K. Sai Babu

10.1 Introduction 170

10.1.1 Literature Review 170

10.2 Design of Antenna 174

10.2.1 Design and Results at Primary Level of Antenna 175

10.2.2 Design and Results at Secondary Level of Antenna 175

10.3 Actual Design of Antenna 176

10.4 Results of Antenna 176

10.4.1 Mathematical Analysis 178

10.4.2 3D Polar Plot 178

10.5 Conclusions 179

References 180

11 Navigating Network Security: A Study on Contemporary Anomaly Detection Technologies 183
Sai Ramya, Smera C. and Sandeep J.

11.1 Introduction 184

11.2 Related Work 186

11.3 Methodology 194

11.4 Conclusion 197

References 197

12 File Fragment Classification: A Comprehensive Survey of Research Advances 201
Teena Mary and Sreeja C.S.

12.1 Introduction 201

12.2 Methodology 203

12.2.1 Selection Criteria 203

12.2.2 Structure of the Paper 204

12.3 Approaches for File Fragment Classification 204

12.3.1 Signature-Based Approaches 204

12.3.2 Content-Based Approaches 206

12.3.3 Deep Learning-Based Approaches 207

12.3.3.1 Convolutional Neural Networks (CNNs) 208

12.3.3.2 Feed Forward Neural Networks (FFNNs) 209

12.3.4 Hierarchical Classification Methods 209

12.4 Survey Findings 210

12.5 Challenges and Future Directions 214

12.6 Conclusion 215

References 216

13 Deepfake Detection and Forensic Precision for Online Harassment 219
K. Gouthami, K. Sunitha, D.U. Durgarani and M. Prathyusha

13.1 Introduction 220

13.2 Literature 221

13.3 Theoretical Analysis and Software Simulation 222

13.3.1 Theoretical Analysis 222

13.3.2 Software Simulation 223

13.3.3 Testing and Optimization 224

References 225

14 Design of Automatic Seed Sowing Machine 227
Chiluka Ramesh, K. Sarada, V. Ajay Shankar and K. Ravi Kumar

14.1 Introduction 228

14.2 Literature Survey 229

14.3 Proposed System 232

14.4 Conclusions 235

References 235

15 In Motion: Exploring Urban Rides Through Data Analytics 237
Rajkumar Sai Varun, Nimmagadda Narayana, Dudam Vipassana and Mohan Dholvan

15.1 Introduction 237

15.2 Literature Survey 238

15.3 Proposed Methodology 240

15.4 Result Analysis 247

15.5 Conclusion 248

References 249

16 Design of Novel Chatbot Using Generative Artificial Intelligence 251
Sk. Khader Zelani, Sk. Gousiya Begum, M. Chandana and N. Lakshmi Tirupatamma

16.1 Introduction 252

16.2 Conclusion and Future Scope 257

References 257

17 The Smart Nebulizer Cap for Enhanced Asthma Management 259
Rossly Netala, Aadi Praharsha and Mohan Dholvan

17.1 Introduction 259

17.2 Literature Survey 261

17.3 Methodology 262

17.4 Conclusions 265

References 265

18 Design of a Digital VLSI Parallel Morphological Reconfigurable Processing Module for Binary and Grayscale Image Processing 267
Y. Bhaskara Rao, K. Rajitha, D. Vijay Harsha Vardhan, N. Naga Raja Kumari and D. Vijaya Saradhi

18.1 Introduction 268

18.2 Literature Survey 269

18.3 Design of a Digital VLSI Parallel Morphological Reconfigurable Processing Module for Binary and Grayscale Image Processing 271

18.4 Result Analysis 274

18.5 Conclusion 276

References 277

19 Intrusion Detection System Using Machine Learning 279
Ballikura Dhanunjay, Earla Sanjay, Aakaram Karthik Raj and Mohan Dholvan

19.1 Introduction 280

19.2 Literature Survey 280

19.3 Methodology 281

19.4 Algorithm 283

19.5 Implementation 285

19.6 Results and Outputs 289

19.6.1 User Interface 289

19.7 Conclusion and Future Scope 290

References 291

20 Prediction of Arrival Delay Time in Freightage Rails 293
Bobbala Shriya, Gudishetty Shrita, Vanga Pragnya Reddy and Nanda Kumar M.

20.1 Introduction 294

20.2 Literature Survey 295

20.3 Methodology 297

20.4 Experimental Results 302

20.5 Conclusions 308

References 309

21 Predicting Flight Delays with Error Calculation Using Machine Learned Classifiers 311
L. Sai Nageswara Raju, T. Naman Krishn Raj, Raipole Manihas Goud and Mohan Dholvan

21.1 Introduction 311

21.2 Literature Survey 312

21.3 Proposed Methodology 314

21.4 Result Analysis 322

21.5 Conclusion 322

References 323

22 Design and Implementation of 8-Bit Ripple Carry Adder and Carry Select Adder at 32-nm CNTFET Technology: A Comparative Study 325
Venkata Rao Tirumalasetty, K. Babulu and G. Appala Naidu

22.1 Introduction 326

22.2 Implementation of RCA & CSA 328

22.3 Simulation Results 333

22.4 Conclusion 335

References 335

23 XGBoost Classifier Based Water Quality Classification Using Machine Learning 337
Nagidi Nikhitha, Sudini Poojitha, Vooturi Arjun, K. Sateesh Kumar and D. Mohan

23.1 Introduction 338

23.2 Related Work 338

23.3 Proposed Methodology 339

23.4 Results and Discussion 342

23.5 Conclusion 345

References 345

Index 347


Best Seller

| | See All

Product Details
  • ISBN-13: 9781394271399
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-Scrivener
  • Language: English
  • Returnable: Y
  • Weight: 680 gr
  • ISBN-10: 1394271395
  • Publisher Date: 14 May 2025
  • Binding: Hardback
  • No of Pages: 384
  • Series Title: Sustainable Computing and Optimization


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Be The First to Review
Quantum Computing Models for Cybersecurity and Wireless Communications: (Sustainable Computing and Optimization)
John Wiley & Sons Inc -
Quantum Computing Models for Cybersecurity and Wireless Communications: (Sustainable Computing and Optimization)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Quantum Computing Models for Cybersecurity and Wireless Communications: (Sustainable Computing and Optimization)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    | | See All


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA