SlideShare a Scribd company logo
1 of 17
Download to read offline
QUANTUM
COMPUTING
HARSH K SATHEESH
S-7 EEE
ROLL NO:30
VAS19EE030
CONTENTS
1. INTRODUCTION (1 - 2)
2. FUNDAMENTALS (3 - 7)
QUBIT
BIT VS QUBIT
QUANTUM PROPERTIES
QUANTUM SUPERPOSITION
QUANTUM ENTANGLEMENT
3. APPLICATIONS (8 - 10)
QUANTUM CRYPTOGRAPHY
ARTIFICIAL INTELLIGENCE
DATA ANALYTICS
4. ADVANTAGES (11)
5. DISADVANTAGES (12)
6. CLASSICAL COMPUTING VS QUANTUM COMPUTING (13)
7. REFERENCE (14)
INTRODUCTION
QUANTUM
The word "quantum" in quantum computer, originates from quantum
mechanics, a basic theory in physics. In brief, on the scale of atoms and
molecules, matter behaves in a quantum manner.
QUANTUM COMPUTER
A quantum computer is a machine that performs calculations based on
the laws of quantum mechanics, which is the behaviour of particles at
the sub-atomic level.
A quantum computer is a computer design which uses the principles of
quantum physics to increase the computational power beyond what is
attainable by a traditional computer.
1
Quantum computing is the area of study focused on
developing computer technology based on the principles
of quantum theory, which explains the nature and
behavior of energy and matter on the quantum (atomic
and subatomic) level
Quantum Computing is a technology, which promises to
overcome the drawbacks of conventional CMOS
technology for high density and high performance
applications.
Its potential to revolutionize today's computing world is
attracting more and more researchers towards this field.
.
QUANTUM COMPUTING
Fig-Google's Sycamore- Quantum
computer
2
FUNDAMENTALS
QUBIT
In existing computers, all information is expressed in terms of Os and 1s,
and the entity that carries such information is called a "bit."
A bit can be in either a 0 or 1 state at any one moment in time.
A quantum computer, on the other hand, uses a "quantum bit" or "qubit"
instead of a bit.
A qubit also makes use of two states (0 and 1) to hold information, but in
contrast to a bit, In this state, a qubit can take on the properties of 0 and 1
simultaneously at any one moment.
Accordingly, two qubits in this state can express the four values of 00, 01,
10, and 11 all at one time.
3
BIT VS QUBIT
4
QUANTUM PROPERTIES
Superposition- An state exists in all the possible configurations of the configuration
space.
Entanglement-There is a relationship among the features of the entangled elements.
Uncertainty principle-Every time a measure on the system is made, the system is
changed by that measure.
Tunnelling- Through tunnelling a electron or photon particle can travel or teleport
itself to any location in O time duration.
Decoherence- In a coherent state made up of several elements, all the quantum
features are live and the system appear as one quantum system. Decoherence gives
back individual identity to each system component.
5
Quantum superposition is a fundamental
phenomenon of quantum mechanics where two or
more quantum states can be added together
“superposed,” and the result will be another valid
quantum state.
Superposition allows quantum objects to
simultaneously exist in more than one state or
location.
This means that an object can be in two states at one
time while remaining a single object. This allows us to
explore much richer sets of states.
QUANTUM SUPERPOSITION
6
Quantum entanglement is when two particles link
together in a certain way no matter how far apart
they are in space. Their state remains the same.
Quantum entanglement is a bizarre,
counterintuitive phenomenon that explains how
two subatomic particles can be intimately linked
to each other even if separated by billions of
light-years of space.
Despite their vast separation, a change induced
in one will affect the other.
QUANTUM ENTANGLEMENT
7
APPLICATIONS
QUANTUM CRYPTOGRAPHY
1.
Cryptography is the Process of encrypting data, or converting plain text into scrambled text
so that only someone who has the right “key” can read it
Quantum cryptography, by extension, simply uses the principles of quantum mechanics to
encrypt data and transmit it in a way that cannot be hacked.
Quantum cryptography uses individual particles of light, or photons, to transmit data over
fiber optic wire. The photons represent binary bits.
It is impossible to copy or view data encoded in a quantum state without alerting the sender
or receiver.
One of the best-known examples of quantum cryptography currently is quantum key
distribution (QKD), which provides a secure method for key exchange.
.
8
WORKING-QUANTUM CRYPTOGRAPHY
9
2. ARTIFICIAL INTELLIGENCE
Artificial Intelligence (AI) is a key and one of the best technologies of quantum
computing. The base of Al is on the concept of learning from experience. From
cars to medicine. Al will be what electricity was in the twentieth and twenty-
first centuries.
3.DATA ANALYTICS
Quantum computing has the ability to solve problems on impressive scales.
With the introduction of a topological quantum computer, one can do simple
calculations. Hence, making the process that much easier.
10
ADVANTAGES
Information storage pattern - Flexibility on storage
Speed - performs multiple tasks simultaneously
Security - provides unbreakable security features
Power efficient - Reduces power consumption by 100 or 1000 times because
of quantum tunneling
AI - Making exponentially fast connections for machine learning operations
Problem solving - Can solve unsolvable problems in within a very short span of
time.
11
DISADVANTAGES
Difficult to build - Quantum computers need stability because of atoms, any
interference will cause the computer to be disrupted.
Temperature - Need to be in a cold environment(-460 degrees fahrenheit)
Sensitive - Quantum computers are sensitive
Expensive - Extremely expensive and stiil in infancy
Not a lot of information known about the subject
12
CLASSICAL COMPUTING VS QUANTUM COMPUTING
13
REFERENCE
[2] D. P. DiVincenzo, “Quantum computation,” Science, vol. 270, no.
5234, pp. 255–261, 1995.
[4] M. A. Nielsen and I. L. Chuang, Quantum Computation and
Quantum Information. Cambridge, U.K.: Cambridge Univ. Press, 2000.
[7] V. Kasirajan, Fundamentals of Quantum Computing. Berlin,
Germany: Springer, 2021.
14
THANK YOU
"QUANTUM COMPUTING'S
GONNA CHANGE THE
FUTURE"

More Related Content

What's hot

What's hot (20)

Quantum computer ppt
Quantum computer pptQuantum computer ppt
Quantum computer ppt
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
 
Qunatum computing
Qunatum computing Qunatum computing
Qunatum computing
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
What is quantum computing
What is quantum computingWhat is quantum computing
What is quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum Computing ppt
Quantum Computing  pptQuantum Computing  ppt
Quantum Computing ppt
 
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentation
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Seminar report on quantum computing
Seminar report on quantum computingSeminar report on quantum computing
Seminar report on quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing - Introduction
Quantum computing - IntroductionQuantum computing - Introduction
Quantum computing - Introduction
 
Quantum Computer
Quantum ComputerQuantum Computer
Quantum Computer
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 

Similar to Quantum Computing Explained: Fundamentals, Applications, Advantages and More

Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computingIOSR Journals
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet ExplainedAhmed Banafa
 
Quantum nature poli_mi_ddm_200115
Quantum nature poli_mi_ddm_200115Quantum nature poli_mi_ddm_200115
Quantum nature poli_mi_ddm_200115domenico di mola
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computingJai Sipani
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptxAbhijit181377
 
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALAA Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALASaikiran Panjala
 
Quantum Teleportation
Quantum Teleportation Quantum Teleportation
Quantum Teleportation RajiuddinSk
 
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKITQuantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKITIRJET Journal
 
Seminar on quatum
Seminar on quatumSeminar on quatum
Seminar on quatumaprameyabr1
 
Quantum computers
Quantum   computersQuantum   computers
Quantum computersOmkar Cool
 

Similar to Quantum Computing Explained: Fundamentals, Applications, Advantages and More (20)

Quantum computing1
Quantum computing1Quantum computing1
Quantum computing1
 
Quantum comput ing
Quantum comput ingQuantum comput ing
Quantum comput ing
 
bhanu.pptx
bhanu.pptxbhanu.pptx
bhanu.pptx
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum nature poli_mi_ddm_200115
Quantum nature poli_mi_ddm_200115Quantum nature poli_mi_ddm_200115
Quantum nature poli_mi_ddm_200115
 
CA_final_paper
CA_final_paperCA_final_paper
CA_final_paper
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
 
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALAA Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
 
Quantum Teleportation
Quantum Teleportation Quantum Teleportation
Quantum Teleportation
 
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKITQuantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
 
Xim $%
Xim $%Xim $%
Xim $%
 
Quantum Information
Quantum InformationQuantum Information
Quantum Information
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
 
Seminar on quatum
Seminar on quatumSeminar on quatum
Seminar on quatum
 
Quantum computers
Quantum   computersQuantum   computers
Quantum computers
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Quantum Computing Explained: Fundamentals, Applications, Advantages and More

  • 1. QUANTUM COMPUTING HARSH K SATHEESH S-7 EEE ROLL NO:30 VAS19EE030
  • 2. CONTENTS 1. INTRODUCTION (1 - 2) 2. FUNDAMENTALS (3 - 7) QUBIT BIT VS QUBIT QUANTUM PROPERTIES QUANTUM SUPERPOSITION QUANTUM ENTANGLEMENT 3. APPLICATIONS (8 - 10) QUANTUM CRYPTOGRAPHY ARTIFICIAL INTELLIGENCE DATA ANALYTICS 4. ADVANTAGES (11) 5. DISADVANTAGES (12) 6. CLASSICAL COMPUTING VS QUANTUM COMPUTING (13) 7. REFERENCE (14)
  • 3. INTRODUCTION QUANTUM The word "quantum" in quantum computer, originates from quantum mechanics, a basic theory in physics. In brief, on the scale of atoms and molecules, matter behaves in a quantum manner. QUANTUM COMPUTER A quantum computer is a machine that performs calculations based on the laws of quantum mechanics, which is the behaviour of particles at the sub-atomic level. A quantum computer is a computer design which uses the principles of quantum physics to increase the computational power beyond what is attainable by a traditional computer. 1
  • 4. Quantum computing is the area of study focused on developing computer technology based on the principles of quantum theory, which explains the nature and behavior of energy and matter on the quantum (atomic and subatomic) level Quantum Computing is a technology, which promises to overcome the drawbacks of conventional CMOS technology for high density and high performance applications. Its potential to revolutionize today's computing world is attracting more and more researchers towards this field. . QUANTUM COMPUTING Fig-Google's Sycamore- Quantum computer 2
  • 5. FUNDAMENTALS QUBIT In existing computers, all information is expressed in terms of Os and 1s, and the entity that carries such information is called a "bit." A bit can be in either a 0 or 1 state at any one moment in time. A quantum computer, on the other hand, uses a "quantum bit" or "qubit" instead of a bit. A qubit also makes use of two states (0 and 1) to hold information, but in contrast to a bit, In this state, a qubit can take on the properties of 0 and 1 simultaneously at any one moment. Accordingly, two qubits in this state can express the four values of 00, 01, 10, and 11 all at one time. 3
  • 7. QUANTUM PROPERTIES Superposition- An state exists in all the possible configurations of the configuration space. Entanglement-There is a relationship among the features of the entangled elements. Uncertainty principle-Every time a measure on the system is made, the system is changed by that measure. Tunnelling- Through tunnelling a electron or photon particle can travel or teleport itself to any location in O time duration. Decoherence- In a coherent state made up of several elements, all the quantum features are live and the system appear as one quantum system. Decoherence gives back individual identity to each system component. 5
  • 8. Quantum superposition is a fundamental phenomenon of quantum mechanics where two or more quantum states can be added together “superposed,” and the result will be another valid quantum state. Superposition allows quantum objects to simultaneously exist in more than one state or location. This means that an object can be in two states at one time while remaining a single object. This allows us to explore much richer sets of states. QUANTUM SUPERPOSITION 6
  • 9. Quantum entanglement is when two particles link together in a certain way no matter how far apart they are in space. Their state remains the same. Quantum entanglement is a bizarre, counterintuitive phenomenon that explains how two subatomic particles can be intimately linked to each other even if separated by billions of light-years of space. Despite their vast separation, a change induced in one will affect the other. QUANTUM ENTANGLEMENT 7
  • 10. APPLICATIONS QUANTUM CRYPTOGRAPHY 1. Cryptography is the Process of encrypting data, or converting plain text into scrambled text so that only someone who has the right “key” can read it Quantum cryptography, by extension, simply uses the principles of quantum mechanics to encrypt data and transmit it in a way that cannot be hacked. Quantum cryptography uses individual particles of light, or photons, to transmit data over fiber optic wire. The photons represent binary bits. It is impossible to copy or view data encoded in a quantum state without alerting the sender or receiver. One of the best-known examples of quantum cryptography currently is quantum key distribution (QKD), which provides a secure method for key exchange. . 8
  • 12. 2. ARTIFICIAL INTELLIGENCE Artificial Intelligence (AI) is a key and one of the best technologies of quantum computing. The base of Al is on the concept of learning from experience. From cars to medicine. Al will be what electricity was in the twentieth and twenty- first centuries. 3.DATA ANALYTICS Quantum computing has the ability to solve problems on impressive scales. With the introduction of a topological quantum computer, one can do simple calculations. Hence, making the process that much easier. 10
  • 13. ADVANTAGES Information storage pattern - Flexibility on storage Speed - performs multiple tasks simultaneously Security - provides unbreakable security features Power efficient - Reduces power consumption by 100 or 1000 times because of quantum tunneling AI - Making exponentially fast connections for machine learning operations Problem solving - Can solve unsolvable problems in within a very short span of time. 11
  • 14. DISADVANTAGES Difficult to build - Quantum computers need stability because of atoms, any interference will cause the computer to be disrupted. Temperature - Need to be in a cold environment(-460 degrees fahrenheit) Sensitive - Quantum computers are sensitive Expensive - Extremely expensive and stiil in infancy Not a lot of information known about the subject 12
  • 15. CLASSICAL COMPUTING VS QUANTUM COMPUTING 13
  • 16. REFERENCE [2] D. P. DiVincenzo, “Quantum computation,” Science, vol. 270, no. 5234, pp. 255–261, 1995. [4] M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information. Cambridge, U.K.: Cambridge Univ. Press, 2000. [7] V. Kasirajan, Fundamentals of Quantum Computing. Berlin, Germany: Springer, 2021. 14