Open Access
ARTICLE
Xinlong Wu1, Desheng Zheng1,*, Kexin Zhang1, Yanling Lai1, Zhifeng Liu1, Zhihong Zhang2
Journal of Quantum Computing, Vol.3, No.4, pp. 127-136, 2021, DOI:10.32604/jqc.2021.017251
Abstract Image conversion refers to converting an image from one style to
another and ensuring that the content of the image remains unchanged. Using
Generative Adversarial Networks (GAN) for image conversion can achieve good
results. However, if there are enough samples, any image in the target domain can
be mapped to the same set of inputs. On this basis, the Cycle Consistency
Generative Adversarial Network (CycleGAN) was developed. This article verifies
and discusses the advantages and disadvantages of the CycleGAN model in image
style conversion. CycleGAN uses two generator networks and two discriminator
networks. The purpose is to learn the mapping… More >
Open Access
ARTICLE
Saasha Joshi*, Deepti Gupta
Journal of Quantum Computing, Vol.3, No.4, pp. 137-150, 2021, DOI:10.32604/jqc.2021.018114
Abstract This paper provides an introduction to a quantum search algorithm,
known as Grover’s Algorithm, for unsorted search purposes. The algorithm is
implemented in a search space of 4 qubits using the Python-based Qiskit SDK by
IBM. While providing detailed proof, the computational complexity of the
algorithm is generalized to n qubits. The implementation results obtained from the
IBM QASM Simulator and IBMQ Santiago quantum backend are analyzed and
compared. Finally, the paper discusses the challenges faced in implementation and
real-life applications of the algorithm hitherto. Overall, the implementation and
analysis depict the advantages of this quantum search algorithm over its… More >
Open Access
ARTICLE
Pratik Roy*, Saptarshi Sahoo, Amit Kumar Mandal, Indranil Basu
Journal of Quantum Computing, Vol.3, No.4, pp. 151-160, 2021, DOI:10.32604/jqc.2021.019864
Abstract Quantum Key Distribution seems very promising as it offers
unconditional security, that’s why it is being implemented by the tech giants of the
networking industry and government. Having quantum phenomenon as a
backbone, QKD protocols become indecipherable. Here we have focused on the
complexities of quantum key distribution and how this technology has contributed
to secure key communication. This article gives an updated overview of this
technology and can serve as a guide to get familiar with the current trends of
quantum cryptography. More >
Open Access
ARTICLE
Taifeng Pan*
Journal of Quantum Computing, Vol.3, No.4, pp. 161-171, 2021, DOI:10.32604/jqc.2021.025373
Abstract The rapid development of Internet of Things (IoT) technology has
brought great convenience to people’s life. However, the security protection
capability of IoT is weak and vulnerable. Therefore, more protection needs to be
done for the security of IoT. The paper proposes an intrusion detection method for
IoT based on multi GBDT feature reduction and hierarchical traffic detection
model. Firstly, GBDT is used to filter the features of IoT traffic data sets BoT-IoT
and UNSW-NB15 to reduce the traffic feature dimension. At the same time, in
order to improve the reliability of feature filtering, this paper constructs multiple
GBDT models… More >