Measurement-based one-way quantum computation, which uses cluster states as resources, provides an efficient model to perforrn computation. However, few of the continuous variable (CV) quantum algorithms and classic...Measurement-based one-way quantum computation, which uses cluster states as resources, provides an efficient model to perforrn computation. However, few of the continuous variable (CV) quantum algorithms and classical algorithms based on one-way quantum computation were proposed. In this work, we propose a method to implement the classical Hadamard transform algorithm utilizing the CV cluster state. Compared with classical computation, only half operations are required when it is operated in the one-way CV quantum computer. As an example, we present a concrete scheme of four-mode classical Hadamard transform algorithm with a four-partite CV cluster state. This method connects the quantum computer and the classical algorithms, which shows the feasibility of running classical algorithms in a quantum computer efficiently.展开更多
The purpose of the Combined Economic Emission Dispatch(CEED)of electric power is to offer the most exceptional schedule for production units,which must run with both low fuel costs and emission levels concurrently,the...The purpose of the Combined Economic Emission Dispatch(CEED)of electric power is to offer the most exceptional schedule for production units,which must run with both low fuel costs and emission levels concurrently,thereby meeting the lack of system equality and inequality constraints.Economic and emissions dispatching has become a primary and significant concern in power system networks.Consequences of using non-renewable fuels as input to exhaust power systems with toxic gas emissions and depleted resources for future generations.The optimal power allocation to generators serves as a solution to this problem.Emission dispatch reduces emissions while ignoring economic considerations.A collective strategy known as Combined Economic and Emission Dispatch is utilized to resolve the above-mentioned problems and investigate the trade-off relationship between fuel cost and emissions.Consequently,this work manages the Substantial Augmented Transformative Algorithm(SATA)to take care of the Combined Economic Emission Dispatch Problem(CEEDP)of warm units while fulfilling imperatives,for example,confines on generator limit,diminish the fuel cost,lessen the emission and decrease the force misfortune.SATA is a stochastic streamlining process that relies upon the development and knowledge of swarms.The goal is to minimize the total fuel cost of fossil-based thermal power generation units that generate and cause environmental pollution.The algorithm searches for solutions in the search space from the smallest to the largest in the case of forwarding search.The simulation of the proposed system is developed using MATLAB Simulink software.Simulation results show the effectiveness and practicability of this method in terms of economic and emission dispatching issues.The performance of the proposed system is compared with existing Artificial Bee Colony-Particle Swarm Optimization(ABC-PSO),Simulated Annealing(SA),and Differential Evolution(DE)methods.The fuel cost and gas emission of the proposed system are 128904$/hr and 138094.4652$/hr.展开更多
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s...Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.展开更多
Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presen...Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes.展开更多
基金Supported by the National Natural Science Foundation of China under Grant Nos 11504024,61502041,61602045 and 61602046the National Key Research and Development Program of China under Grant No 2016YFA0302600
文摘Measurement-based one-way quantum computation, which uses cluster states as resources, provides an efficient model to perforrn computation. However, few of the continuous variable (CV) quantum algorithms and classical algorithms based on one-way quantum computation were proposed. In this work, we propose a method to implement the classical Hadamard transform algorithm utilizing the CV cluster state. Compared with classical computation, only half operations are required when it is operated in the one-way CV quantum computer. As an example, we present a concrete scheme of four-mode classical Hadamard transform algorithm with a four-partite CV cluster state. This method connects the quantum computer and the classical algorithms, which shows the feasibility of running classical algorithms in a quantum computer efficiently.
文摘The purpose of the Combined Economic Emission Dispatch(CEED)of electric power is to offer the most exceptional schedule for production units,which must run with both low fuel costs and emission levels concurrently,thereby meeting the lack of system equality and inequality constraints.Economic and emissions dispatching has become a primary and significant concern in power system networks.Consequences of using non-renewable fuels as input to exhaust power systems with toxic gas emissions and depleted resources for future generations.The optimal power allocation to generators serves as a solution to this problem.Emission dispatch reduces emissions while ignoring economic considerations.A collective strategy known as Combined Economic and Emission Dispatch is utilized to resolve the above-mentioned problems and investigate the trade-off relationship between fuel cost and emissions.Consequently,this work manages the Substantial Augmented Transformative Algorithm(SATA)to take care of the Combined Economic Emission Dispatch Problem(CEEDP)of warm units while fulfilling imperatives,for example,confines on generator limit,diminish the fuel cost,lessen the emission and decrease the force misfortune.SATA is a stochastic streamlining process that relies upon the development and knowledge of swarms.The goal is to minimize the total fuel cost of fossil-based thermal power generation units that generate and cause environmental pollution.The algorithm searches for solutions in the search space from the smallest to the largest in the case of forwarding search.The simulation of the proposed system is developed using MATLAB Simulink software.Simulation results show the effectiveness and practicability of this method in terms of economic and emission dispatching issues.The performance of the proposed system is compared with existing Artificial Bee Colony-Particle Swarm Optimization(ABC-PSO),Simulated Annealing(SA),and Differential Evolution(DE)methods.The fuel cost and gas emission of the proposed system are 128904$/hr and 138094.4652$/hr.
文摘Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.
文摘Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes.