SlideShare a Scribd company logo
1 of 39
Download to read offline
Quantum Computing
Len Bass
© Len Bass 2019 2
In the beginning of the
computer age
• Programmers worked in machine
language
• Required a good knowledge of the
architecture of the underlying hardware
• Limited in terms of size and complexity of
programs.
© Len Bass 2019 3
In the beginning of the
quantum computer age
• Programmers work in quantum machine
language
• Requires a good knowledge of the
architecture of the underlying hardware
• Limited in terms of size and complexity of
programs.
© Len Bass 2019 4
This talk
• Will focus on the logic of the quantum
hardware
• Qubits
• And how you program for this hardware
• Gates
• Operators
• Will sketch some common algorithms
© Len Bass 2019 5
What is a bit in a classical
computer?
• A bit has a value of either 0 or 1.
• There is no ambiguity
• Reading a classical bit does not affect
its value.
© Len Bass 2019 6
What is a bit (qubit) in a
quantum computer?
• A qubit has the value 0 with some
probability
• It has the value 1 with 1-probability(0)
• i.e you can think of a qubit has having
both values simultaneously
© Len Bass 2019 7
A qubit is fundamentally
different from a classical bit
• Measuring (reading) a qubit has the
following effects
• It returns a 0 or a 1. The value returned is
based on probabilities of the values.
• It replaces the original values in the qubit
with the returned value (0 or 1)
© Len Bass 2019 8
Copying qubits not possible
• A copy would result in two instances of the
same value
• A copy is a read followed by a store
• A read destroys the value and results in a
0 or a 1
• Therefore – cannot copy qubits
• It is possible to move the value in one qubit to
another qubit at the cost of destroying the
original value
© Len Bass 2019 9
Probabilities
• A measurement of a qubit will return 0 with a
probability of α and 1 with a probability of b =
1- α
• I.e. if α = 40% then 4 out of 10 measurements
will return 0 and 6 will return 1 (roughly).
© Len Bass 2019 10
Superposition
• The ability of a qubit to hold values with
different probabilities is called
“superposition”
© Len Bass 2019 11
Third value for qubit
specification
• A qubit also has a “phase”.
• A phase is a value between 0 and 2π
• The phase provides an additional
handle for manipulating qubits but does
not enter into probabilities for reading 0
or 1.
© Len Bass 2019 12
Notations
• Two notations:
• Ket (Dirac) notation |0> for 0 and |1> for 1
• Matrix notation
|0> =
1
0
|1> =
0
1
© Len Bass 2019 13
Arbitrary qubit
• An arbitrary qubit g is
• In ket notation |g> = α|0> + b |1>
• In matrix notation g =
α
b
• The phase is captured by making α and b
be complex numbers. We won’t go into
phases.
© Len Bass 2019 14
How do you manipulate qubit?
• A qubit is manipulated using an
operator O
• g → O → d
• An operator is realized as a gate.
© Len Bass 2019 15
Single qubit operators
• Single qubit operators include
• NOT
• Hanamard
• Rotate
© Len Bass 2019 16
Representing qubit operators
• A qubit operator can be represented as
• a gate in a circuit for ket notation or
• a matrix for matrix notation
© Len Bass 2019 17
NOT
• NOT reverses α and b
Matrix form Circuit form
0 1
1 0
0
1
1
0 = |0> |1>NOT
© Len Bass 2019 18
Hanamard
• Hanamard places the qubit into
superposition with probabilities of 50%
for both α and b
1
2
1 1
1 −1
1
0
=
1
2
1
1
Matrix form Circuit form
|0> H
|0>+|1>
2
© Len Bass 2019 19
Rotate
• Rotate changes the phase by π. It does
not affect the probabilities.
Matrix form Circuit form
= |0> |0>Z1 0
0 −1
1
0
1
0
© Len Bass 2019 20
Gates can be cascaded
• What is the output of this?
|0> H NOT
© Len Bass 2019 21
Two qubit notation
• |00> =
• |01> =
1
0
0
0
0
1
0
0
• |10> =
• |11> =
0
0
1
0
0
0
0
1
© Len Bass 2019 22
Measuring two qubits
|gh> = a|00> + b|01> + c|10> + d|11>
• Measuring the two qubits will yield two
classical bits (0 0, 0 1, 1 0, 1 1) with
probabilities a, b, c, d
• It will also collapse the two qubits.
Suppose, b is chosen as the value, then
the measured values is 0 1 and g is
collapsed to 0 and h is collapsed to 1.
© Len Bass 2019 23
Entanglement
• Suppose |gh> = a|00> + d|11>
• i.e. b and c are 0. (The probabilities for the
middle two terms of the definition.)
• Now measure gh It will be 0 0 or 1 1 with
probabilities a and d.
• Both qubits will have the same value after the
measurement.
• The two qubits are “entangled”
© Len Bass 2019 24
Weirdness of entanglement
• A subsequent measurement of h can be
at a different time from a subsequent
measurement of g.
• h can be in a different location than g.
• They will always have the same value.
• Physicists have verified this
phenomenon over kilometers.
© Len Bass 2019 25
Exploiting entanglement
• We will use entanglement to
communicate information over
distances
• First we show how to generate
entangled qubits
• This requires the Controlled Not
operation
© Len Bass 2019 26
Operation on two qubits
• Controlled Not – CNOT
• The first qubit acts as a control. If it is 0
then there is no change to the second
qubit. If it is 1 then the second qubit is
flipped.
© Len Bass 2019 27
CNOT
|0>
|0> CNOT
|0>
|0>
Circuit form
1
0
0
0
1
0
0
0
=
1 0 0 0
0 1 0 0
0 0 0 1
0 0 1 0
Matrix form
© Len Bass 2019 28
Bell Pair
• Entangling two qubits can be done by
creating a Bell Pair
|0> H
|00>+|11>
2===
=
|0> CNOT
© Len Bass 2019 29
Quantum teleportation
Three qubits involved: A, B, 
• A and  are in one location. B in
another.
•  Is teleported to B and is destroyed in
the process.
• Although a qubit cannot be copied, its
contents can be moved at the cost of
destroying the original qubit.
© Len Bass 2019 30
Steps in teleportation - 1
1. Entangle qubits A and B.
2. Prepare the payload. The payload
qubit  will have the state to be
teleported.
© Len Bass 2019 31
Steps in teleportation - 2
3. Propagate the payload. The
propagation involves two classical bits
that are transferred to the location of B.
The propagation also involves
measuring A and  This will destroy
the state of both of these qubits.
4. Recreate the state of  in B.
© Len Bass 2019 32
Why is this interesting?
• It is not possible to copy qubits but we can
transfer the state of a qubit to a different
location at the cost of destroying the state of
the original qubit.
• This will be th the basis of quantum based
communication protocols.
• NIST is currently considering creation of a
httpq protocol to ultimately replace https
© Len Bass 2019 33
Other quantum algorithms
• Other algorithms exist that are not
currently realizable
• Notably:
• Grover’s – breaks password hash
• Shor’s – breaks RSA encryption
• HHL – matrix inversion – used in machine
learning
• …
© Len Bass 2019 34
Grover’s Algorithm
• Computes inverse of a function – in particular a hash
function
• Uses superposition to identify inverse of a value
• Problem is the identified value has same probability
of being measured as all of the other values
• Phase manipulation and amplitude amplification are
used to increase probability of measuring inverse
value.
© Len Bass 2019 35
Shor’s algorithm
• Uses number theory results to break
RSA
• Quantum used to find period of an
exponential factor.
• Results are not directly readable but
must be inferred
© Len Bass 2019 36
HHL
• Inverts large matrices.
• Used in machine learning
• Uses Amplitude amplification as in
Grover’s
© Len Bass 2019 37
Current state of quantum
computers
• Google has announced they have
achieved “quantum supremacy”
• This means they have demonstrated a
problem that can be solved
exponentially faster on a quantum
computer than on a classical computer.
(the problem is not interesting)
© Len Bass 2019 38
Future state
• Suppose Moore’s Law holds (exponential
growth in computing power over time)
• Then quantum computers will become real in
the 5-10 year time frame.
• Quantum computers will NOT replace
classical computers.
• Quantum computers will be used for
problems involving combinatorics.
© Len Bass 2019 39
Summary
• Qubits are the basic computation unit of
a quantum computer
• Qubits can be in superposition
• Qubits can be entangled.
• Algorithms exist for some problems
intractable on classic computers but, as
yet, none of them are realizable.

More Related Content

Similar to Quantum talk

Introduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdfIntroduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdfsunnypatil1778
 
Quantum Computing - Basic Concept .
Quantum Computing - Basic Concept       .Quantum Computing - Basic Concept       .
Quantum Computing - Basic Concept .Ganesh Pasnurwar
 
[Q-tangled 22] Deconstructing Quantum Machine Learning Algorithms - Sasha Laz...
[Q-tangled 22] Deconstructing Quantum Machine Learning Algorithms - Sasha Laz...[Q-tangled 22] Deconstructing Quantum Machine Learning Algorithms - Sasha Laz...
[Q-tangled 22] Deconstructing Quantum Machine Learning Algorithms - Sasha Laz...DataScienceConferenc1
 
Quantum Computing Fundamentals 2023-04-14
Quantum Computing Fundamentals 2023-04-14Quantum Computing Fundamentals 2023-04-14
Quantum Computing Fundamentals 2023-04-14Gerald Scharitzer
 
Quantum computing in machine learning
Quantum computing in machine learningQuantum computing in machine learning
Quantum computing in machine learningkhalidhassan105
 
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
Quantum Computers  PART 1 & 2 by Prof Lili SaghafiQuantum Computers  PART 1 & 2 by Prof Lili Saghafi
Quantum Computers PART 1 & 2 by Prof Lili SaghafiProfessor Lili Saghafi
 
Seminar on quatum
Seminar on quatumSeminar on quatum
Seminar on quatumaprameyabr1
 
Unit 2 DLDUnit 2 DLDUnit 2 DLDUnit 2 DLD.pptx
Unit 2 DLDUnit 2 DLDUnit 2 DLDUnit 2 DLD.pptxUnit 2 DLDUnit 2 DLDUnit 2 DLDUnit 2 DLD.pptx
Unit 2 DLDUnit 2 DLDUnit 2 DLDUnit 2 DLD.pptxtusharkumarsinha1985
 
quantum computing basics roll no 15.pptx
quantum computing basics roll no 15.pptxquantum computing basics roll no 15.pptx
quantum computing basics roll no 15.pptxtoget48099
 
What is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is ImportantWhat is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is ImportantSasha Lazarevic
 
Switching theory Unit 1
Switching theory Unit 1Switching theory Unit 1
Switching theory Unit 1SURBHI SAROHA
 
Quantum Computing Basics
Quantum Computing BasicsQuantum Computing Basics
Quantum Computing BasicsChristian Waha
 
QX Simulator and quantum programming - 2020-04-28
QX Simulator and quantum programming - 2020-04-28QX Simulator and quantum programming - 2020-04-28
QX Simulator and quantum programming - 2020-04-28Aritra Sarkar
 

Similar to Quantum talk (20)

Presentation1
Presentation1Presentation1
Presentation1
 
Introduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdfIntroduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdf
 
Quantum Computing - Basic Concept .
Quantum Computing - Basic Concept       .Quantum Computing - Basic Concept       .
Quantum Computing - Basic Concept .
 
Quantum Computation For AI
Quantum Computation For AIQuantum Computation For AI
Quantum Computation For AI
 
[Q-tangled 22] Deconstructing Quantum Machine Learning Algorithms - Sasha Laz...
[Q-tangled 22] Deconstructing Quantum Machine Learning Algorithms - Sasha Laz...[Q-tangled 22] Deconstructing Quantum Machine Learning Algorithms - Sasha Laz...
[Q-tangled 22] Deconstructing Quantum Machine Learning Algorithms - Sasha Laz...
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum Computing Fundamentals 2023-04-14
Quantum Computing Fundamentals 2023-04-14Quantum Computing Fundamentals 2023-04-14
Quantum Computing Fundamentals 2023-04-14
 
2017 10 17_quantum_program_v2
2017 10 17_quantum_program_v22017 10 17_quantum_program_v2
2017 10 17_quantum_program_v2
 
Quantum computing in machine learning
Quantum computing in machine learningQuantum computing in machine learning
Quantum computing in machine learning
 
OPTICALQuantum
OPTICALQuantumOPTICALQuantum
OPTICALQuantum
 
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
Quantum Computers  PART 1 & 2 by Prof Lili SaghafiQuantum Computers  PART 1 & 2 by Prof Lili Saghafi
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
 
Seminar on quatum
Seminar on quatumSeminar on quatum
Seminar on quatum
 
0606.pptx
0606.pptx0606.pptx
0606.pptx
 
Unit 2 DLDUnit 2 DLDUnit 2 DLDUnit 2 DLD.pptx
Unit 2 DLDUnit 2 DLDUnit 2 DLDUnit 2 DLD.pptxUnit 2 DLDUnit 2 DLDUnit 2 DLDUnit 2 DLD.pptx
Unit 2 DLDUnit 2 DLDUnit 2 DLDUnit 2 DLD.pptx
 
quantum computing basics roll no 15.pptx
quantum computing basics roll no 15.pptxquantum computing basics roll no 15.pptx
quantum computing basics roll no 15.pptx
 
What is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is ImportantWhat is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is Important
 
Switching theory Unit 1
Switching theory Unit 1Switching theory Unit 1
Switching theory Unit 1
 
Quantum Computing Basics
Quantum Computing BasicsQuantum Computing Basics
Quantum Computing Basics
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
QX Simulator and quantum programming - 2020-04-28
QX Simulator and quantum programming - 2020-04-28QX Simulator and quantum programming - 2020-04-28
QX Simulator and quantum programming - 2020-04-28
 

More from Len Bass

Devops syllabus
Devops syllabusDevops syllabus
Devops syllabusLen Bass
 
DevOps Syllabus summer 2020
DevOps Syllabus summer 2020DevOps Syllabus summer 2020
DevOps Syllabus summer 2020Len Bass
 
11 secure development
11  secure development 11  secure development
11 secure development Len Bass
 
10 disaster recovery
10 disaster recovery  10 disaster recovery
10 disaster recovery Len Bass
 
9 postproduction
9 postproduction 9 postproduction
9 postproduction Len Bass
 
8 pipeline
8 pipeline 8 pipeline
8 pipeline Len Bass
 
7 configuration management
7 configuration management 7 configuration management
7 configuration management Len Bass
 
6 microservice architecture
6 microservice architecture6 microservice architecture
6 microservice architectureLen Bass
 
5 infrastructure security
5 infrastructure security5 infrastructure security
5 infrastructure securityLen Bass
 
4 container management
4  container management4  container management
4 container managementLen Bass
 
3 the cloud
3 the cloud 3 the cloud
3 the cloud Len Bass
 
1 virtual machines
1 virtual machines1 virtual machines
1 virtual machinesLen Bass
 
2 networking
2 networking2 networking
2 networkingLen Bass
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorialLen Bass
 
Experience in teaching devops
Experience in teaching devopsExperience in teaching devops
Experience in teaching devopsLen Bass
 
Understanding blockchains
Understanding blockchainsUnderstanding blockchains
Understanding blockchainsLen Bass
 
What is a blockchain
What is a blockchainWhat is a blockchain
What is a blockchainLen Bass
 
Dev ops and safety critical systems
Dev ops and safety critical systemsDev ops and safety critical systems
Dev ops and safety critical systemsLen Bass
 
My first deployment pipeline
My first deployment pipelineMy first deployment pipeline
My first deployment pipelineLen Bass
 
Packaging tool options
Packaging tool optionsPackaging tool options
Packaging tool optionsLen Bass
 

More from Len Bass (20)

Devops syllabus
Devops syllabusDevops syllabus
Devops syllabus
 
DevOps Syllabus summer 2020
DevOps Syllabus summer 2020DevOps Syllabus summer 2020
DevOps Syllabus summer 2020
 
11 secure development
11  secure development 11  secure development
11 secure development
 
10 disaster recovery
10 disaster recovery  10 disaster recovery
10 disaster recovery
 
9 postproduction
9 postproduction 9 postproduction
9 postproduction
 
8 pipeline
8 pipeline 8 pipeline
8 pipeline
 
7 configuration management
7 configuration management 7 configuration management
7 configuration management
 
6 microservice architecture
6 microservice architecture6 microservice architecture
6 microservice architecture
 
5 infrastructure security
5 infrastructure security5 infrastructure security
5 infrastructure security
 
4 container management
4  container management4  container management
4 container management
 
3 the cloud
3 the cloud 3 the cloud
3 the cloud
 
1 virtual machines
1 virtual machines1 virtual machines
1 virtual machines
 
2 networking
2 networking2 networking
2 networking
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
 
Experience in teaching devops
Experience in teaching devopsExperience in teaching devops
Experience in teaching devops
 
Understanding blockchains
Understanding blockchainsUnderstanding blockchains
Understanding blockchains
 
What is a blockchain
What is a blockchainWhat is a blockchain
What is a blockchain
 
Dev ops and safety critical systems
Dev ops and safety critical systemsDev ops and safety critical systems
Dev ops and safety critical systems
 
My first deployment pipeline
My first deployment pipelineMy first deployment pipeline
My first deployment pipeline
 
Packaging tool options
Packaging tool optionsPackaging tool options
Packaging tool options
 

Recently uploaded

Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 

Recently uploaded (20)

Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 

Quantum talk

  • 2. © Len Bass 2019 2 In the beginning of the computer age • Programmers worked in machine language • Required a good knowledge of the architecture of the underlying hardware • Limited in terms of size and complexity of programs.
  • 3. © Len Bass 2019 3 In the beginning of the quantum computer age • Programmers work in quantum machine language • Requires a good knowledge of the architecture of the underlying hardware • Limited in terms of size and complexity of programs.
  • 4. © Len Bass 2019 4 This talk • Will focus on the logic of the quantum hardware • Qubits • And how you program for this hardware • Gates • Operators • Will sketch some common algorithms
  • 5. © Len Bass 2019 5 What is a bit in a classical computer? • A bit has a value of either 0 or 1. • There is no ambiguity • Reading a classical bit does not affect its value.
  • 6. © Len Bass 2019 6 What is a bit (qubit) in a quantum computer? • A qubit has the value 0 with some probability • It has the value 1 with 1-probability(0) • i.e you can think of a qubit has having both values simultaneously
  • 7. © Len Bass 2019 7 A qubit is fundamentally different from a classical bit • Measuring (reading) a qubit has the following effects • It returns a 0 or a 1. The value returned is based on probabilities of the values. • It replaces the original values in the qubit with the returned value (0 or 1)
  • 8. © Len Bass 2019 8 Copying qubits not possible • A copy would result in two instances of the same value • A copy is a read followed by a store • A read destroys the value and results in a 0 or a 1 • Therefore – cannot copy qubits • It is possible to move the value in one qubit to another qubit at the cost of destroying the original value
  • 9. © Len Bass 2019 9 Probabilities • A measurement of a qubit will return 0 with a probability of α and 1 with a probability of b = 1- α • I.e. if α = 40% then 4 out of 10 measurements will return 0 and 6 will return 1 (roughly).
  • 10. © Len Bass 2019 10 Superposition • The ability of a qubit to hold values with different probabilities is called “superposition”
  • 11. © Len Bass 2019 11 Third value for qubit specification • A qubit also has a “phase”. • A phase is a value between 0 and 2π • The phase provides an additional handle for manipulating qubits but does not enter into probabilities for reading 0 or 1.
  • 12. © Len Bass 2019 12 Notations • Two notations: • Ket (Dirac) notation |0> for 0 and |1> for 1 • Matrix notation |0> = 1 0 |1> = 0 1
  • 13. © Len Bass 2019 13 Arbitrary qubit • An arbitrary qubit g is • In ket notation |g> = α|0> + b |1> • In matrix notation g = α b • The phase is captured by making α and b be complex numbers. We won’t go into phases.
  • 14. © Len Bass 2019 14 How do you manipulate qubit? • A qubit is manipulated using an operator O • g → O → d • An operator is realized as a gate.
  • 15. © Len Bass 2019 15 Single qubit operators • Single qubit operators include • NOT • Hanamard • Rotate
  • 16. © Len Bass 2019 16 Representing qubit operators • A qubit operator can be represented as • a gate in a circuit for ket notation or • a matrix for matrix notation
  • 17. © Len Bass 2019 17 NOT • NOT reverses α and b Matrix form Circuit form 0 1 1 0 0 1 1 0 = |0> |1>NOT
  • 18. © Len Bass 2019 18 Hanamard • Hanamard places the qubit into superposition with probabilities of 50% for both α and b 1 2 1 1 1 −1 1 0 = 1 2 1 1 Matrix form Circuit form |0> H |0>+|1> 2
  • 19. © Len Bass 2019 19 Rotate • Rotate changes the phase by π. It does not affect the probabilities. Matrix form Circuit form = |0> |0>Z1 0 0 −1 1 0 1 0
  • 20. © Len Bass 2019 20 Gates can be cascaded • What is the output of this? |0> H NOT
  • 21. © Len Bass 2019 21 Two qubit notation • |00> = • |01> = 1 0 0 0 0 1 0 0 • |10> = • |11> = 0 0 1 0 0 0 0 1
  • 22. © Len Bass 2019 22 Measuring two qubits |gh> = a|00> + b|01> + c|10> + d|11> • Measuring the two qubits will yield two classical bits (0 0, 0 1, 1 0, 1 1) with probabilities a, b, c, d • It will also collapse the two qubits. Suppose, b is chosen as the value, then the measured values is 0 1 and g is collapsed to 0 and h is collapsed to 1.
  • 23. © Len Bass 2019 23 Entanglement • Suppose |gh> = a|00> + d|11> • i.e. b and c are 0. (The probabilities for the middle two terms of the definition.) • Now measure gh It will be 0 0 or 1 1 with probabilities a and d. • Both qubits will have the same value after the measurement. • The two qubits are “entangled”
  • 24. © Len Bass 2019 24 Weirdness of entanglement • A subsequent measurement of h can be at a different time from a subsequent measurement of g. • h can be in a different location than g. • They will always have the same value. • Physicists have verified this phenomenon over kilometers.
  • 25. © Len Bass 2019 25 Exploiting entanglement • We will use entanglement to communicate information over distances • First we show how to generate entangled qubits • This requires the Controlled Not operation
  • 26. © Len Bass 2019 26 Operation on two qubits • Controlled Not – CNOT • The first qubit acts as a control. If it is 0 then there is no change to the second qubit. If it is 1 then the second qubit is flipped.
  • 27. © Len Bass 2019 27 CNOT |0> |0> CNOT |0> |0> Circuit form 1 0 0 0 1 0 0 0 = 1 0 0 0 0 1 0 0 0 0 0 1 0 0 1 0 Matrix form
  • 28. © Len Bass 2019 28 Bell Pair • Entangling two qubits can be done by creating a Bell Pair |0> H |00>+|11> 2=== = |0> CNOT
  • 29. © Len Bass 2019 29 Quantum teleportation Three qubits involved: A, B,  • A and  are in one location. B in another. •  Is teleported to B and is destroyed in the process. • Although a qubit cannot be copied, its contents can be moved at the cost of destroying the original qubit.
  • 30. © Len Bass 2019 30 Steps in teleportation - 1 1. Entangle qubits A and B. 2. Prepare the payload. The payload qubit  will have the state to be teleported.
  • 31. © Len Bass 2019 31 Steps in teleportation - 2 3. Propagate the payload. The propagation involves two classical bits that are transferred to the location of B. The propagation also involves measuring A and  This will destroy the state of both of these qubits. 4. Recreate the state of  in B.
  • 32. © Len Bass 2019 32 Why is this interesting? • It is not possible to copy qubits but we can transfer the state of a qubit to a different location at the cost of destroying the state of the original qubit. • This will be th the basis of quantum based communication protocols. • NIST is currently considering creation of a httpq protocol to ultimately replace https
  • 33. © Len Bass 2019 33 Other quantum algorithms • Other algorithms exist that are not currently realizable • Notably: • Grover’s – breaks password hash • Shor’s – breaks RSA encryption • HHL – matrix inversion – used in machine learning • …
  • 34. © Len Bass 2019 34 Grover’s Algorithm • Computes inverse of a function – in particular a hash function • Uses superposition to identify inverse of a value • Problem is the identified value has same probability of being measured as all of the other values • Phase manipulation and amplitude amplification are used to increase probability of measuring inverse value.
  • 35. © Len Bass 2019 35 Shor’s algorithm • Uses number theory results to break RSA • Quantum used to find period of an exponential factor. • Results are not directly readable but must be inferred
  • 36. © Len Bass 2019 36 HHL • Inverts large matrices. • Used in machine learning • Uses Amplitude amplification as in Grover’s
  • 37. © Len Bass 2019 37 Current state of quantum computers • Google has announced they have achieved “quantum supremacy” • This means they have demonstrated a problem that can be solved exponentially faster on a quantum computer than on a classical computer. (the problem is not interesting)
  • 38. © Len Bass 2019 38 Future state • Suppose Moore’s Law holds (exponential growth in computing power over time) • Then quantum computers will become real in the 5-10 year time frame. • Quantum computers will NOT replace classical computers. • Quantum computers will be used for problems involving combinatorics.
  • 39. © Len Bass 2019 39 Summary • Qubits are the basic computation unit of a quantum computer • Qubits can be in superposition • Qubits can be entangled. • Algorithms exist for some problems intractable on classic computers but, as yet, none of them are realizable.