Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (66)
  • Open Access

    ARTICLE

    Research on Rainfall Estimation Based on Improved Kalman Filter Algorithm

    Wen Zhang1,2, Wei Fang1,3,*, Xuelei Jia1,2, Victor S. Sheng4

    Journal of Quantum Computing, Vol.4, No.1, pp. 23-37, 2022, DOI:10.32604/jqc.2022.026975

    Abstract In order to solve the rainfall estimation error caused by various noise factors such as clutter, super refraction, and raindrops during the detection process of Doppler weather radar. This paper proposes to improve the rainfall estimation model of radar combined with rain gauge which calibrated by common Kalman filter. After data preprocessing, the radar data should be classified according to the precipitation intensity. And then, they are respectively substituted into the improved filter for calibration. The state noise variance and the measurement noise variance can be adaptively calculated and updated according to the input observation data during this process. Then… More >

  • Open Access

    ARTICLE

    A Top-down Method of Extraction Entity Relationship Triples and Obtaining Annotated Data

    Zhiqiang Hu1, Zheng Ma1, Jun Shi1, Zhipeng Li1, Xun Shao1,2, Yangzhao Yang1,*, Yong Liao1, Zhenyuan Gao1, Jie Zhang1

    Journal of Quantum Computing, Vol.4, No.1, pp. 13-22, 2022, DOI:10.32604/jqc.2022.026785

    Abstract The extraction of entity relationship triples is very important to build a knowledge graph (KG), meanwhile, various entity relationship extraction algorithms are mostly based on data-driven, especially for the current popular deep learning algorithms. Therefore, obtaining a large number of accurate triples is the key to build a good KG as well as train a good entity relationship extraction algorithm. Because of business requirements, this KG’s application field is determined and the experts’ opinions also must be satisfied. Considering these factors we adopt the top-down method which refers to determining the data schema firstly, then filling the specific data according… More >

  • Open Access

    ARTICLE

    Online News Sentiment Classification Using DistilBERT

    Samuel Kofi Akpatsa1,*, Hang Lei1, Xiaoyu Li1, Victor-Hillary Kofi Setornyo Obeng1, Ezekiel Mensah Martey1, Prince Clement Addo2, Duncan Dodzi Fiawoo3

    Journal of Quantum Computing, Vol.4, No.1, pp. 1-11, 2022, DOI:10.32604/jqc.2022.026658

    Abstract The ability of pre-trained BERT model to achieve outstanding performances on many Natural Language Processing (NLP) tasks has attracted the attention of researchers in recent times. However, the huge computational and memory requirements have hampered its widespread deployment on devices with limited resources. The concept of knowledge distillation has shown to produce smaller and faster distilled models with less trainable parameters and intended for resource-constrained environments. The distilled models can be fine-tuned with great performance on a wider range of tasks, such as sentiment classification. This paper evaluates the performance of DistilBERT model and other pre-canned text classifiers on a… More >

  • Open Access

    ARTICLE

    Intrusion Detection Method of Internet of Things Based on Multi GBDT Feature Dimensionality Reduction and Hierarchical Traffic Detection

    Taifeng Pan*

    Journal of Quantum Computing, Vol.3, No.4, pp. 161-171, 2021, DOI:10.32604/jqc.2021.025373

    Abstract The rapid development of Internet of Things (IoT) technology has brought great convenience to people’s life. However, the security protection capability of IoT is weak and vulnerable. Therefore, more protection needs to be done for the security of IoT. The paper proposes an intrusion detection method for IoT based on multi GBDT feature reduction and hierarchical traffic detection model. Firstly, GBDT is used to filter the features of IoT traffic data sets BoT-IoT and UNSW-NB15 to reduce the traffic feature dimension. At the same time, in order to improve the reliability of feature filtering, this paper constructs multiple GBDT models… More >

  • Open Access

    ARTICLE

    Quantum Cryptography–A Theoretical Overview

    Pratik Roy*, Saptarshi Sahoo, Amit Kumar Mandal, Indranil Basu

    Journal of Quantum Computing, Vol.3, No.4, pp. 151-160, 2021, DOI:10.32604/jqc.2021.019864

    Abstract Quantum Key Distribution seems very promising as it offers unconditional security, that’s why it is being implemented by the tech giants of the networking industry and government. Having quantum phenomenon as a backbone, QKD protocols become indecipherable. Here we have focused on the complexities of quantum key distribution and how this technology has contributed to secure key communication. This article gives an updated overview of this technology and can serve as a guide to get familiar with the current trends of quantum cryptography. More >

  • Open Access

    ARTICLE

    Grover’s Algorithm in a 4-Qubit Search Space

    Saasha Joshi*, Deepti Gupta

    Journal of Quantum Computing, Vol.3, No.4, pp. 137-150, 2021, DOI:10.32604/jqc.2021.018114

    Abstract This paper provides an introduction to a quantum search algorithm, known as Grover’s Algorithm, for unsorted search purposes. The algorithm is implemented in a search space of 4 qubits using the Python-based Qiskit SDK by IBM. While providing detailed proof, the computational complexity of the algorithm is generalized to n qubits. The implementation results obtained from the IBM QASM Simulator and IBMQ Santiago quantum backend are analyzed and compared. Finally, the paper discusses the challenges faced in implementation and real-life applications of the algorithm hitherto. Overall, the implementation and analysis depict the advantages of this quantum search algorithm over its… More >

  • Open Access

    ARTICLE

    Implementation of Art Pictures Style Conversion with GAN

    Xinlong Wu1, Desheng Zheng1,*, Kexin Zhang1, Yanling Lai1, Zhifeng Liu1, Zhihong Zhang2

    Journal of Quantum Computing, Vol.3, No.4, pp. 127-136, 2021, DOI:10.32604/jqc.2021.017251

    Abstract Image conversion refers to converting an image from one style to another and ensuring that the content of the image remains unchanged. Using Generative Adversarial Networks (GAN) for image conversion can achieve good results. However, if there are enough samples, any image in the target domain can be mapped to the same set of inputs. On this basis, the Cycle Consistency Generative Adversarial Network (CycleGAN) was developed. This article verifies and discusses the advantages and disadvantages of the CycleGAN model in image style conversion. CycleGAN uses two generator networks and two discriminator networks. The purpose is to learn the mapping… More >

  • Open Access

    ARTICLE

    Incomplete Image Completion through GAN

    Biying Deng1 , Desheng Zheng1, *, Zhifeng Liu1 , Yanling Lai1, Zhihong Zhang2

    Journal of Quantum Computing, Vol.3, No.3, pp. 119-126, 2021, DOI:10.32604/jqc.2021.017250

    Abstract There are two difficult in the existing image restoration methods. One is that the method is difficult to repair the image with a large damaged, the other is the result of image completion is not good and the speed is slow. With the development and application of deep learning, the image repair algorithm based on generative adversarial networks can repair images by simulating the distribution of data. In the process of image completion, the first step is trained the generator to simulate data distribution and generate samples. Then a large number of falsified images are quickly generated using the generative… More >

  • Open Access

    ARTICLE

    A Hybrid Intrusion Detection Model Based on Spatiotemporal Features

    Linbei Wang1 , Zaoyu Tao1, Lina Wang2,*, Yongjun Ren3

    Journal of Quantum Computing, Vol.3, No.3, pp. 107-118, 2021, DOI:10.32604/jqc.2021.016857

    Abstract With the accelerating process of social informatization, our personal information security and Internet sites, etc., have been facing a series of threats and challenges. Recently, well-developed neural network has seen great advancement in natural language processing and computer vision, which is also adopted in intrusion detection. In this research, a hybrid model integrating MultiScale Convolutional Neural Network and Long Short-term Memory Network (MSCNN-LSTM) is designed to conduct the intrusion detection. Multi-Scale Convolutional Neural Network (MSCNN) is used to extract the spatial characteristics of data sets. And Long Short-term Memory Network (LSTM) is responsible for processing the temporal characteristics. The data… More >

  • Open Access

    ARTICLE

    IOTA-Based Data Encryption Storage and Retrieval Method

    Hongchao Ma1,*, Yi Man1, Xiao Xing2, Zihan Zhuo2, Mo Chen3

    Journal of Quantum Computing, Vol.3, No.3, pp. 97-105, 2021, DOI:10.32604/jqc.2021.016775

    Abstract At present, the traditional blockchain for data storage and retrieval reflects the characteristics of slow data uploading speed, high cost, and transparency, and there are a lot of corresponding problems, such as not supporting private data storage, large data operation costs, and not supporting Data field query. This paper proposes a method of data encryption storage and retrieval based on the IOTA distributed ledger, combined with the fast transaction processing speed and zero-value transactions of the IOTA blockchain, through the Masked Authenticated Messaging technology, so that the data is encrypted in the data stream. The form is stored in the… More >

Displaying 21-30 on page 3 of 66. Per Page