Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
4 result(s) for "Shibi, C. Sherin"
Sort by:
A Survey about Post Quantum Cryptography Methods
Cryptography is an art of hiding the significant data or information with some other codes. It is a practice and study of securing information and communication. Thus, cryptography prevents third party intervention over the data communication. The cryptography technology transforms the data into some other form to enhance security and robustness against the attacks. The thrust of enhancing the security among data transfer has been emerged ever since the need of Artificial Intelligence field came into a market. Therefore, modern way of computing cryptographic algorithm came into practice such as AES, 3DES, RSA, Diffie-Hellman and ECC. These public-key encryption techniques now in use are based on challenging discrete logarithms for elliptic curves and complex factorization. However, those two difficult problems can be effectively solved with the help of sufficient large-scale quantum computer. The Post Quantum Cryptography (PQC) aims to deal with an attacker who has a large-scale quantum computer. Therefore, it is essential to build a robust and secure cryptography algorithm against most vulnerable pre-quantum cryptography methods. That is called ‘Post Quantum Cryptography’. Therefore, the present crypto system needs to propose encryption key and signature size is very large.in addition to careful prediction of encryption/decryption time and amount of traffic over the communication wire is required. The post-quantum cryptography (PQC) article discusses different families of post-quantum cryptosystems, analyses the current status of the National Institute of Standards and Technology (NIST) post-quantum cryptography standardisation process, and looks at the difficulties faced by the PQC community.
Deep Cryogenic Temperature CMOS Circuit and System Design for Quantum Computing Applications
Quantum computing is a fascinating and rapidly evolving field of technology that promises to revolutionize many areas of science, engineering, and society. The fundamental unit of quantum computing is the quantum bit that can exist in two or more states concurrently, as opposed to a classical bit that can only be either 0 or 1. Any subatomic element, including atoms, electrons, and photons, can be used to implement qubits. The chosen sub-atomic elements should have quantum mechanical properties. Most commonly, photons have been used to implement qubits. Qubits can be manipulated and read by applying external fields or pulses, such as lasers, magnets, or microwaves. Quantum computers are currently suffering from various complications such as size, operating temperature, coherence problems, entanglement, etc. The realization of quantum computing, a novel paradigm that uses quantum mechanical phenomena to do computations that are not possible with classical computers, is made possible, most crucially, by the need for a quantum processor and a quantum SOC. As a result, Cryo-CMOS technology can make it possible to integrate a Quantum system on a chip. Cryo-CMOS devices are electronic circuits that operate at cryogenic temperatures, usually below 77 K (−196 °C).
A methodology for unsupervised feature learning in hyperspectral imagery using deep belief network
Deep learning approaches have received major interest in the field of remote sensing. Hyperspectral imaging has rich data that are distributed in multidimensions. It is challenging to apply deep learning algorithms due to the limited amount of labelled data. So, unsupervised feature extraction approaches are used to overcome this limitation. In this study, we propose an unsupervised feature learning approach using deep belief network (DBN). In the proposed framework, the input hyperspectral image is segmented using entropy rate superpixel segmentation and filtered by domain transform recursive filter which extracts spatial and spectral information effectively. Then the features are learned by improved DBN. In the traditional methods, DBN is stacked with restricted Boltzmann machine (RBM) which is suitable for only binary value data. In the proposed framework, we used Gaussian–Bernoulli RBM which was constructed for real value data such as images. The experiments were carried out using Pavia University dataset. The results show that the proposed network has good performance in terms of classification accuracy and computation time.
A novel approach of tool condition monitoring in sustainable machining of Ni alloy with transfer learning models
Cutting tool condition is crucial in metal cutting. In-process tool failures significantly influences the surface roughness, power consumption, and process endurance. Industries are interested in supervisory systems that anticipate the health of the tool. A methodology that utilizes the information to predict problems and to avoid failures must be embraced. In recent years, several machine learning-based predictive modelling strategies for estimating tool wear have been emerged. However, due to intricate tool wear mechanisms, doing so with limited datasets confronts difficulties under varying operating conditions. This article proposes the use of transfer learning technology to detect tool wear, especially flank wear under distinct cutting environments (dry, flood, MQL and cryogenic). In this study, the state of the cutting tool was determined using the pre-trained networks like AlexNet, VGG-16, ResNet, MobileNet, and Inception-V3. The best-performing network was recommended for tool condition monitoring, considering the effects of hyperparameters such as batch size, learning rate, solver, and train-test split ratio. In light of this, the recommended methodology may prove to be highly helpful for classifying and suggesting the suitable cutting conditions, especially under limited data situation. The transfer learning model with Inception-V3 is extremely useful for intelligent machining applications.