Raj Jain
YOU?
Author Swipe
View article: R-ConstraintBench: Evaluating LLMs on NP-Complete Scheduling
R-ConstraintBench: Evaluating LLMs on NP-Complete Scheduling Open
Effective scheduling under tight resource, timing, and operational constraints underpins large-scale planning across sectors such as capital projects, manufacturing, logistics, and IT fleet transitions. However, the reliability of large la…
View article: Layer-Wise Security Framework and Analysis for the Quantum Internet
Layer-Wise Security Framework and Analysis for the Quantum Internet Open
With its significant security potential, the quantum internet is poised to revolutionize technologies like cryptography and communications. Although it boasts enhanced security over traditional networks, the quantum internet still encounte…
View article: Multi-tree Quantum Routing in Realistic Topologies
Multi-tree Quantum Routing in Realistic Topologies Open
In entanglement distribution networks, communication between two nodes necessitates the generation of end-to-end entanglement by entanglement swapping at intermediate nodes. Efficiently creating end-to-end entanglements over long distances…
View article: Service Mesh: Architectures, Applications, and Implementations
Service Mesh: Architectures, Applications, and Implementations Open
The scalability and flexibility of microservice architecture have led to major changes in cloud-native application architectures. However, the complexity of managing thousands of small services written in different languages and handling t…
View article: LEMDA: A Novel Feature Engineering Method for Intrusion Detection in IoT Systems
LEMDA: A Novel Feature Engineering Method for Intrusion Detection in IoT Systems Open
Intrusion detection systems (IDS) for the Internet of Things (IoT) systems can use AI-based models to ensure secure communications. IoT systems tend to have many connected devices producing massive amounts of data with high dimensionality,…
View article: Impact of 5G Wireless Technologies on Cloud Computing and Internet of Things (IOT)
Impact of 5G Wireless Technologies on Cloud Computing and Internet of Things (IOT) Open
With its promise of unmatched speed, low latency, and widespread device connection, the introduction of 5G wireless technology represents a critical turning point in the development of telecommunications. This study examines how 5G would s…
View article: Survey on Mobile Cloud Computing
Survey on Mobile Cloud Computing Open
The paper explores how cloud computing offers the capacity to improve computing features and application services while addressing its transformative impact on mobile device systems. It recognizes, yet, the security risks associated with t…
View article: Asynchronous entanglement routing for the quantum internet
Asynchronous entanglement routing for the quantum internet Open
With the emergence of the Quantum Internet, the need for advanced quantum networking techniques has significantly risen. Various models of quantum repeaters have been presented, each delineating a unique strategy to ensure quantum communic…
View article: Asynchronous Entanglement Routing for the Quantum Internet
Asynchronous Entanglement Routing for the Quantum Internet Open
With the emergence of the Quantum Internet, the need for advanced quantum networking techniques has significantly risen. Various models of quantum repeaters have been presented, each delineating a unique strategy to ensure quantum communic…
View article: QRChEM: A Deep Learning Framework for Materials Property Prediction and Design Using QR Codes
QRChEM: A Deep Learning Framework for Materials Property Prediction and Design Using QR Codes Open
Machine learning (ML) surrogate models are used for the rapid prediction of materials properties and are promising tools for accelerating new materials design and development. The performance and accuracy of these surrogate models appear t…
View article: A Survey and Comparison of Post-Quantum and Quantum Blockchains
A Survey and Comparison of Post-Quantum and Quantum Blockchains Open
Blockchains have gained substantial attention from academia and industry for\ntheir ability to facilitate decentralized trust and communications. However,\nthe rapid progress of quantum computing poses a significant threat to the\nsecurity…
View article: A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems
A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems Open
In light of the advancement of the technologies used in industrial control systems, securing their operation has become crucial, primarily since their activity is consistently associated with integral elements related to the environment, t…
View article: A Survey of Important Issues in Quantum Computing and Communications
A Survey of Important Issues in Quantum Computing and Communications Open
Driven by the rapid progress in quantum hardware, recent years have witnessed a furious race for quantum technologies in both academia and industry. Universal quantum computers have supported up to hundreds of qubits, while the scale of qu…
View article: ADDAI: Anomaly Detection using Distributed AI
ADDAI: Anomaly Detection using Distributed AI Open
When dealing with the Internet of Things (IoT), especially industrial IoT (IIoT), two manifest challenges leap to mind. First is the massive amount of data streaming to and from IoT devices, and second is the fast pace at which these syste…
View article: TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security
TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security Open
Despite AI's significant growth, its "black box" nature creates challenges in generating adequate trust. Thus, it is seldom utilized as a standalone unit in IoT high-risk applications, such as critical industrial infrastructures, medical s…
View article: Decentralization Using Quantum Blockchain: A Theoretical Analysis
Decentralization Using Quantum Blockchain: A Theoretical Analysis Open
Blockchain technology has been prominent recently due to its applications in cryptocurrency. Numerous decentralized blockchain applications have been possible due to blockchains’ nature of distributed, secured, and peer-to-peer storage. On…
View article: HVAC system - Attack-detection
HVAC system - Attack-detection Open
The dataset can be used to study the cybersecurity aspect of the HVAC system by evaluating the different attack detection and mitigation strategies. The dataset was collected from a simulation model of a 3-floor, 12-zone HVAC system for co…
View article: Flow‐based intrusion detection algorithm for supervisory control and data acquisition systems: A real‐time approach
Flow‐based intrusion detection algorithm for supervisory control and data acquisition systems: A real‐time approach Open
Intrusion detection in supervisory control and data acquisition (SCADA) systems is integral because of the critical roles of these systems in industries. However, available approaches in the literature lack representative flow‐based datase…