Quantum Key Distribution

Quantum key distribution (QKD) implements a cryptographic protocol involving components of quantum mechanics. It enables two parties to produce a shared random secret key known only to them, which can then be used to encrypt and decrypt messages. It is often incorrectly called quantum cryptography, as it is the best-known example of a quantum cryptographic … Continue reading Quantum Key Distribution

Optical Computing

Optical computing uses photons produced by lasers or diodes for computation. For decades, photons have shown promise to enable a higher bandwidth than the electrons used in conventional computers. The fundamental building block of modern electronic computers is the transistor. To replace electronic components with optical ones, an equivalent optical transistor is required. This is … Continue reading Optical Computing

Quantum Machine Learning

Quantum machine learning is the integration of quantum algorithms within machine learning programs. The most common use of the term refers to machine learning algorithms for the analysis of classical data executed on a quantum computer. While machine learning algorithms are used to compute immense quantities of data, quantum machine learning utilizes qubits and quantum … Continue reading Quantum Machine Learning

Multi-core processor

Multi-core processor is a computer processor on a single integrated circuit with two or more separate processing units, called cores, each of which reads and executes program instructions. The instructions are ordinary CPU instructions (such as add, move data, and branch) but the single processor can run instructions on separate cores at the same time, … Continue reading Multi-core processor

Handwriting Recognition

Handwriting recognition is the ability of a computer to receive and interpret intelligible handwritten input from sources such as paper documents, photographs, touch-screens and other devices. A handwriting recognition system handles formatting, performs correct segmentation into characters, and finds the most plausible words. Offline handwriting recognition involves the automatic conversion of text in an image … Continue reading Handwriting Recognition

Computer simulation

Computer simulation is the process of mathematical modelling, performed on a computer, which is designed to predict the behaviour of, or the outcome of, a real-world or physical system. The reliability of some mathematical models can be determined by comparing their results to the real-world outcomes they aim to predict. Simulation of a system is … Continue reading Computer simulation

Quantum algorithm

Quantum algorithm is an algorithm which runs on a realistic model of quantum computation, the most commonly used model being the quantum circuit model of computation. A classical (or non-quantum) algorithm is a finite sequence of instructions, or a step-by-step procedure for solving a problem, where each step or instruction can be performed on a … Continue reading Quantum algorithm

Big Data

Big data treats ways to analyze, systematically extract information from, or otherwise deal with data sets that are too large or complex to be dealt with by traditional data-processing application software. Data with many fields offer greater statistical power, while data with higher complexity may lead to a higher false discovery rate. Big data analysis … Continue reading Big Data

Quantum Cryptography

Quantum cryptography exploits quantum mechanical properties to perform cryptographic tasks. The best-known and developed application of quantum cryptography is quantum key distribution, which is the process of using quantum communication to establish a shared key between two parties (Alice and Bob, for example) without a third party (Eve) learning anything about that key, even if … Continue reading Quantum Cryptography

Computer Security

Computer security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. ©Pngtree A vulnerability is a weakness in design, implementation, operation, or internal control. An exploitable vulnerability is one … Continue reading Computer Security