Encyclopedia of Information Science and Technology, Third Edition


Book Description

"This 10-volume compilation of authoritative, research-based articles contributed by thousands of researchers and experts from all over the world emphasized modern issues and the presentation of potential opportunities, prospective solutions, and future directions in the field of information science and technology"--Provided by publisher.




Quantum Key Distribution Networks


Book Description

This book focuses on practical implementation details, telecommunication techniques, security and technology challenges and approaches to implementing quantum technology in modern telecommunication systems. The authors use their extensive practical academic and industrial experience in network technologies and provide details from international projects in quantum cryptography in which they actively participate. Using a variety of examples, analogies, illustrations, tables, and features from practical quantum network realizations, the authors provide a unique view of quantum technology from an engineering telecommunication standpoint, allowing the reader to identify the advantages and challenges of quantum technology. This book also addresses challenges posed by quantum technology such as network organization, passive and active eavesdropping, and future trends in QKD such as Software Defined Networking (SDN) with QKD and application QKD in 5G networks. It is conceived through eight chapters by treating the following thematic units separately: Fundamentals of Quantum Key Distribution, QoS architecture/mode, QoS MAC layer, QoS signaling techniques for key management and session negotiation purpose and QoS routing protocols that minimize the consumption of key material through the equitable utilization of network resources when finding an optimal path. Through numerous information on practical solutions, simulation examples, illustrations, and analysis, readers can easily distinguish the specificity of quantum technology and understand the challenges and methods of practical implementation of quantum cryptography in common telecommunications standards. Researchers working in quantum technology and applied networking security as well as advanced-level students studying computer science and electrical engineering will benefit from this book. Professionals working within these related fields will also benefit from this book.




Encyclopedia of Information Science and Technology, Fourth Edition


Book Description

In recent years, our world has experienced a profound shift and progression in available computing and knowledge sharing innovations. These emerging advancements have developed at a rapid pace, disseminating into and affecting numerous aspects of contemporary society. This has created a pivotal need for an innovative compendium encompassing the latest trends, concepts, and issues surrounding this relevant discipline area. During the past 15 years, the Encyclopedia of Information Science and Technology has become recognized as one of the landmark sources of the latest knowledge and discoveries in this discipline. The Encyclopedia of Information Science and Technology, Fourth Edition is a 10-volume set which includes 705 original and previously unpublished research articles covering a full range of perspectives, applications, and techniques contributed by thousands of experts and researchers from around the globe. This authoritative encyclopedia is an all-encompassing, well-established reference source that is ideally designed to disseminate the most forward-thinking and diverse research findings. With critical perspectives on the impact of information science management and new technologies in modern settings, including but not limited to computer science, education, healthcare, government, engineering, business, and natural and physical sciences, it is a pivotal and relevant source of knowledge that will benefit every professional within the field of information science and technology and is an invaluable addition to every academic and corporate library.







Technology Road Mapping for Quantum Computing and Engineering


Book Description

Quantum computing is radically different from the conventional approach of transforming bit-strings from one set of zeros and ones to another. With quantum computing, everything changes. The physics used to understand bits of information and the devices that manipulate them are vastly different. Quantum engineering is a revolutionary approach to quantum technology. Technology Road Mapping for Quantum Computing and Engineering explores all the aspects of quantum computing concepts, engineering, technologies, operations, and applications from the basics to future advancements. Covering topics such as machine learning, quantum software technology, and technology road mapping, this book is an excellent resource for data scientists, engineers, students and professors of higher education, computer scientists, researchers, and academicians.




Post-Quantum Cryptography


Book Description

This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017. The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on code-based cryptography, isogeny-based cryptography, lattice-based cryptography, multivariate cryptography, quantum algorithms, and security models.




Advances in Cryptology -- ASIACRYPT 2011


Book Description

This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011. The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature; and leakage resilient cryptography.




Artificial Intelligence for Intelligent Systems


Book Description

The aim of this book is to highlight the most promising lines of research, using new enabling technologies and methods based on AI/ML techniques to solve issues and challenges related to intelligent and computing systems. Intelligent computing easily collects data using smart technological applications like IoT-based wireless networks, digital healthcare, transportation, blockchain, 5.0 industry and deep learning for better decision making. AI enabled networks will be integrated in smart cities' concept for interconnectivity. Wireless networks will play an important role. The digital era of computational intelligence will change the dynamics and lifestyle of human beings. Future networks will be introduced with the help of AI technology to implement cognition in real-world applications. Cyber threats are dangerous to encode information from network. Therefore, AI-Intrusion detection systems need to be designed for identification of unwanted data traffic. This book: Provides a better understanding of artificial intelligence-based applications for future smart cities Presents a detailed understanding of artificial intelligence tools for intelligent technologies Showcases intelligent computing technologies in obtaining optimal solutions using artificial intelligence Discusses energy-efficient routing protocols using artificial intelligence for Flying ad-hoc networks (FANETs) Covers machine learning-based Intrusion detection system (IDS) for smart grid It is primarily written for senior undergraduate, graduate students, and academic researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.




Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics


Book Description

From cloud computing to data analytics, society stores vast supplies of information through wireless networks and mobile computing. As organizations are becoming increasingly more wireless, ensuring the security and seamless function of electronic gadgets while creating a strong network is imperative. Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics highlights the challenges associated with creating a strong network architecture in a perpetually online society. Readers will learn various methods in building a seamless mobile computing option and the most effective means of analyzing big data. This book is an important resource for information technology professionals, software developers, data analysts, graduate-level students, researchers, computer engineers, and IT specialists seeking modern information on emerging methods in data mining, information technology, and wireless networks.




Group Representation for Quantum Theory


Book Description

This book explains the group representation theory for quantum theory in the language of quantum theory. As is well known, group representation theory is very strong tool for quantum theory, in particular, angular momentum, hydrogen-type Hamiltonian, spin-orbit interaction, quark model, quantum optics, and quantum information processing including quantum error correction. To describe a big picture of application of representation theory to quantum theory, the book needs to contain the following six topics, permutation group, SU(2) and SU(d), Heisenberg representation, squeezing operation, Discrete Heisenberg representation, and the relation with Fourier transform from a unified viewpoint by including projective representation. Unfortunately, although there are so many good mathematical books for a part of six topics, no book contains all of these topics because they are too segmentalized. Further, some of them are written in an abstract way in mathematical style and, often, the materials are too segmented. At least, the notation is not familiar to people working with quantum theory. Others are good elementary books, but do not deal with topics related to quantum theory. In particular, such elementary books do not cover projective representation, which is more important in quantum theory. On the other hand, there are several books for physicists. However, these books are too simple and lack the detailed discussion. Hence, they are not useful for advanced study even in physics. To resolve this issue, this book starts with the basic mathematics for quantum theory. Then, it introduces the basics of group representation and discusses the case of the finite groups, the symmetric group, e.g. Next, this book discusses Lie group and Lie algebra. This part starts with the basics knowledge, and proceeds to the special groups, e.g., SU(2), SU(1,1), and SU(d). After the special groups, it explains concrete applications to physical systems, e.g., angular momentum, hydrogen-type Hamiltonian, spin-orbit interaction, and quark model. Then, it proceeds to the general theory for Lie group and Lie algebra. Using this knowledge, this book explains the Bosonic system, which has the symmetries of Heisenberg group and the squeezing symmetry by SL(2,R) and Sp(2n,R). Finally, as the discrete version, this book treats the discrete Heisenberg representation which is related to quantum error correction. To enhance readers' undersnding, this book contains 54 figures, 23 tables, and 111 exercises with solutions.