Browsing by Author "Mishra M.K."
Now showing 1 - 6 of 6
Results Per Page
Sort Options
Item Artificial intelligence in plant disease identification: Empowering agriculture(Academic Press Inc., 2024) Garg T.; Dwivedi P.; Mishra M.K.; Joshi N.C.; Shrivastava N.; Mishra V.The agricultural sector faces numerous challenges, such as infectious diseases, pest invasions, improper soil management, inadequate watering, and more. Among these, plant infectious diseases stand out as a leading cause of damage to crops. These diseases, impacting plants, result from various factors like genetics, soil composition, precipitation, moisture levels, humidity, temperature, and wind. In recent times, there has been a significant increase in the prevalence of plant infectious diseases. Pathogens like viruses, bacteria, and fungi consistently pose threats to plants, leading to substantial global crop yield losses during disease outbreaks. Unfortunately, disease identification and diagnosis typically occur at an advanced stage, causing significant agricultural setbacks. Given the impact of plant diseases on the nutritional value of fruits, vegetables, organic products, and cereals, timely identification is crucial during cultivation. Artificial intelligence (AI) has emerged as a pivotal tool in this context, leveraging its meticulous training capabilities for the effective identification of infectious plant diseases. This chapter illustrates how AI plays a vital role in identifying and diagnosing contagious plant diseases. � 2024 Elsevier LtdItem Leveraging Grover�s Algorithm for Quantum Searchable Encryption in Cloud Infrastructure and its application in AES Resource Estimation(Springer, 2024) Joshi M.; Mishra M.K.; Karthikeyan S.Designing efficient techniques to search over encrypted data space has always been an intriguing security challenge, although many solutions based on classical searching methods have been proposed. Grover�s algorithm, a quantum counterpart of searching algorithms, has proven to provide quadratic speedup over any classical search technique on an unsorted database. However, this algorithm is unable to search over encrypted data space. This study proposed an extension of Grover�s algorithm to enable search over encrypted dataspace, allowing clients with limited-capability quantum resources to delegate complex search operations to an untrusted server. The blindness of data in this protocol is achieved by encrypting qubits using Pauli�s rotation gates that maximally mix the outgoing states. The empirical estimation of the overhead of the computation due to the introduction of this technique has been analyzed. This estimate has been used for comparative analysis, showing the efficiency of the proposed protocol. A practical application of the proposed searchable encryption technique has been utilized to estimate the increase in resources needed to carry out a brute-force attack on AES encryption using secure Grover�s algorithm. Furthermore, an extensive experimental analysis of the effect of noise has been studied using four different noise models: amplitude damping, phase damping, depolarizing noise, and bit-flip noise. The investigation provided useful insight into the behavior of the proposed algorithm under noisy conditions and also estimated the tolerance thresholds of the proposed algorithm under different noise models. � The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.Item Modified frontal horn index: a novel risk predictor for sunken flap syndrome in the patients undergoing shunt procedures for post-decompressive craniectomy hydrocephalus(Springer Science and Business Media Deutschland GmbH, 2024) Yadav V.; Sahu A.; Prasad R.S.; Pandey N.; Mishra M.K.; Pradhan R.S.Background: Decompressive craniectomy (DC) is a neurosurgical procedure, frequently used in lowering the refractory intracranial pressure (ICP) following traumatic brain injuries. Post-traumatic hydrocephalus (PTH), a debilitating complication in the patients with traumatic brain injuries, occurs in 11.9�36% patients undergoing DCs. Sunken flap syndrome (SFS) is a rare entity, following DCs or cerebrospinal fluid (CSF) diversion procedures for PTH after DCs and leads to neurological deterioration of the patients. Literature regarding risk factors associated with SFS in the patients undergoing ventriculoperitoneal shunt procedures for hydrocephalus following DCs is scarce. The aim of this study is to determine the incidence of SFS and to establish a relationship between several clinico-radiological features and SFS in patients undergoing shunt procedures for PTH. Results: This retrospective study was conducted in a tertiary care trauma centre upon 60 patients who underwent shunt procedures for PTH. Intraventricular haemorrhage (P < 0.0001), communicating-type hydrocephalus (P = 0.0006), and modified frontal horn index (P < 0.0001) were significantly associated with development of SFS. MFHI > 43 was a significant risk factor in development of SFS. Conclusions: SFS is the common complication following shunt procedures for PTH after DCs. MFHI is significant risk predictor for SFS. MFHI > 43 is associated with higher chances of developing SFS following shunt insertion in PTH. Early cranioplasty following DCs might prevent development of SFS. � The Author(s) 2024.Item Quantum computing and new dimensions in network security(CRC Press, 2024) Joshi M.; Alka; Mishra M.K.Quantum computing is an emerging field of interest for many branches of practical computation ranging from cryptography to machine learning, from molecule design to drug discovery, and from physical simulations to financial optimization. Recent years have seen tremendous growth in the hardware and software applicability of quantum technology. It has started showing both disruptive and constructive implications for modern cryptography. New techniques of network security are now emerging that have no counterparts in classical cryptography. This chapter explores the horizons of network security using quantum computation. The chapter first introduces the general audience to quantum computation from the perspective of a computer scientist. It elaborates on the basic principles of quantum computing and helps to set up an intuitive understanding of this new paradigm of computation. The chapter also gives a brief introduction to the circuit model of quantum programming, which is the most prevalent model of quantum programming. It establishes the need for and importance of quantum cryptography and discusses various protocols of quantum security. � 2025 selection and editorial matter, Suhel Ahmad Khan, Mohammad Faisal, Nawaf Alharbe, Rajeev Kumar and Raees Ahmad Khan. All rights reserved.Item Super-resolution and super-sensitivity of quantum LiDAR with a multi-photonic state and binary outcome photon counting measurement(Optica Publishing Group (formerly OSA), 2024) Sharma P.; Mishra M.K.; Mishra D.K.Here, we are investigating the enhancement in resolution and phase sensitivity of a Mach-Zehnder interferometer (MZI) based quantum LiDAR. We are using a multi-photonic state (MPS), superposition of four coherent states [Int. J. Quantum Inf. 19, 2150013 (2021)], as the input state and binary outcome parity photon counting measurement and binary outcome zero non-zero photon counting measurement as the measurement schemes. We have thoroughly investigated the results in lossless as well as lossy cases. We found enhancement in resolution and phase sensitivity in comparison to the coherent state and even coherent superposition state (ECSS) based quantum LiDAR. Our analysis shows that MPS may be an alternative nonclassical resource in the field of quantum imaging and quantum sensing technologies, like in quantum LiDAR. � 2024 Optica Publishing GroupItem Tracing the legacy of peace leadership from an Asian perspective: Mahatma Gandhi, Dalai Lama, and Thich Nhat Hanh(Routledge, 2024) Mishra M.K.; Upadhyaya P.; Davis T.P.This paper narrates the concept of Sustainable Peace Leadership and examines how three prominent Peace Activists from South and Southeast Asia measure up to the concept. The article will consider the works and ideas of Mohandas K. Gandhi (Mahatma Gandhi), Lhamo Thondup (The 14th Dalai Lama), and Nguyen Xuan Bao (Thich Nhat Hanh). Mahatma Gandhi was instrumental in achieving Indian independence from the British Empire. The Dalai Lama is the spiritual leader of the Tibetan people and has managed a difficult relationship with the Chinese government following the occupation of Tibet. Thich Nhat Hanh was a Vietnamese Buddhist monk, peace activist and is known as the �father of mindfulness�. The paper identified several characteristics of Peace Leaders. These include being a charismatic leader who motivates their followers to achieve their goals in a non-violent and inclusive manner. Peace leaders meditate and spend time developing inner peace which then leads to outer peace. The paper also asserts that peace leaders are capable of recognizing the humanity in their opponents and seek a mutually beneficial solution. The three chosen individuals are all recognised as being charismatic leaders who were prominent peace leaders. All were deeply spiritual and practiced meditation and other inner work on a regular basis. They stressed the humanity in their opponents, based on their religious beliefs and the concepts of non-duality and interdependence. � 2023 Informa UK Limited, trading as Taylor & Francis Group.