SlideShare a Scribd company logo
Quantum computing has arrived
Sergii Nechuiviter
AI Club
This lecture is NOT about:
• Quantum mechanics
• Mathematics
• Algorithm complexity
It mostly about state of industry of quantum
computing
Quantum computing?
And what?
Quantum computing is cool!
45 Algorithms with substantial acceleration
• Polynomial (for Searching, etc.)
• Superpolynomial (for Discrete-Log and
Quantum Simulation, etc.)
Other solvable NP-complete problems:
• Boolean satisfiability problem
• Knapsack problem
• Travelling salesman problem
• Subgraph isomorphism problem
• Subset sum problem
Practical applications
• Hacking open-key cryptography
• PageRank (Google in a Quantum Network)
• Searching a database of molecules
• Lattice protein folding
• Sentiment analysis
• Car detection
• Labeling of news stories and images
• Video compression
• Machine creativity
• Physics simulation
(30 quantum particles simulation is limit to our days computers)
If it is so cool
Why haven`t I heard about it?
Brief recognized history of
quantum computation research
• In 1981 Richard Feynman described a theoretical device that he called a “quantum computer”
• In 1994 Peter Shor described the first quantum algorithm
• In 1993 Seth Lloyd proposed the first feasible design for a quantum computer
• In 1998 IBM-Berkeley, Gershenfeld, Isaac Chuang, Mark Kubinec – the first real experiment: 2 qubits
• In 2001 IBM-MIT Chuang a 7-qubit NMR computer (prime factors of 15)
• In 2000 MIT Edward Farhi, Jeffrey Goldstone, Michael Sipser, Northeastern’s Sam Gutmann
proposed an adiabatic quantum computer
• In 2005 IBM, Hewlett-Packard and NEC not seems likely to deliver a working machine in less than 10 years.
• In 2007 Japanese electronics giant NEC Corp, controlled 2-qubit coupling
• In 2011 University of California, 2 qubits, quantum bas, 2 quantum RAM
arxiv.org/abs/1109.3743: Implementing the Quantum von Neumann Architecture with Superconducting Circuits
• In 2011, arxiv.org/abs/1103.1528: A Single-Atom Quantum Memory, can store qubits for only 180 microseconds
and has an overall efficiency of 9 per cent
• In 2011 Experimental realisation of Shor's quantum factoring algorithm using qubit recycling, 1 qubit
• In 2011 IBM-MIT Chuang factorized 143 using 4 qubits
• In 2012 IBM-Yale stated that they work on 3D qubits
• In 2012 arxiv.org/abs/1205.4899: Controlled-NOT Gate Operating With Single Photons
• In 2013 University of New South Wales in Sydney, single phosphorus atom in silicon (Kane design, 1998)
State of the Art: Grail of quantum computing research
NIST quantum
simulator (350 qubit)
Rose’s Law: D-Wave success story
Dairy Cow
Research here?
D-Wave impact
• 2006 4 qubit Calipso
• 2007 16-qubit Europa II/Orion demonstration of “the world’s first commercial adiabatic quantum computer.”
• 2008 28-qubit Leda
• 2011 128-qubit Rainer based “D-Wave One” for Lockheed Martin
• In 2011 University of California, 2 qubits, quantum bas, 2 quantum RAM
arxiv.org/abs/1109.3743: Implementing the Quantum von Neumann Architecture with Superconducting Circuits
• In 2011, arxiv.org/abs/1103.1528: A Single-Atom Quantum Memory, can store qubits for only 180 microseconds
and has an overall efficiency of 9 per cent
• In 2011 Experimental realisation of Shor's quantum factoring algorithm using qubit recycling, 1 qubit
• In 2011 IBM-MIT Chuang factorized 143 using 4 qubits
• In 2012 IBM-Yale stated that they work on 3D qubits
• In 2012 arxiv.org/abs/1205.4899: Controlled-NOT Gate Operating With Single Photons
• In 2012 NIST 350-qubit quantum simulator (news link)
• In 2013 University of New South Wales in Sydney, single phosphorus atom in silicon (Kane design, 1998)
• 2013, upgrade to the 512-qubit D-Wave Two for LM
• 2013 USC Dr. Daniel Lidar about error correction
• 2013, 512-qubit D-Wave Two for The Google / NASA Quantum Artificial Intelligence Lab
Applying for time on the D-Wave Two at the Quantum Artificial Intelligence Lab here
• 2013 As of September 20, the quantum photonic processor housed at the Centre for Quantum Photonics at the
University of Bristol will be available to researchers from anywhere in the world via remote access over the
Internet
D-Wave’s Quantum Computer Goes to
the Races, Wins
• 1999 D-Wave’s technology has been dogged by controversy during the 14 years
(from 1999) it has been in development, with quantum computing
researchers questioning whether the company’s technology truly is exploiting
quantum effects.
• In 2009 Google post “NIPS 2009 Demonstration: Binary Classification using
Hardware Implementation of Quantum Annealing” for car detection, 100ms per
iteration, QBoost
• 2011 Nature “Quantum annealing with manufactured spins”
• 2012 84 qubits Experimental Determination Of Ramsey Numbers With Quantum
Annealing in 250 ms
• 2013 A team of scientists at USC has verified that quantum effects are indeed at
play in the first commercial quantum optimization processor.
• 2013 Catherine McGeoch, Amherst College
D-Wave vs Lenovo workstation with a 2.4GHz quad core Intel processor, 16GB RAM
Quadratic unconstrained binary optimization (NP hard)
about 3,600 times more quickly: <½ seconds vs 30 minutes
Okay, it is fast
What is this D-Wave exactly?
Watch video
D-Wave Systems 128 qubit processor - Inside the chip
http://youtu.be/PqSgmCg1kew
Superconducting loop qubit
How does quantum mechanics help?
Principle of adiabatic computation
8 qubit cell
Chimera 4x4x8=128 qubit topology
Vesuvius 8x8x8=512 qubit topology
Calibrating two D-Wave Two
Lovely
How can it be programmed?
Something familiar?
The crux of the matter
The energy program
Software stack of D-Wave
The Blackbox compiler
Tasks which can be solved
• Travelling salesman
• Hadamar matrix search
• Eternity II puzzle
• Weighted Maximum Independent Set
• Molecule Maximum Common Graph
• Quantum feature learning
• Binary classifier
• Neural networks
• NAND gate
• Physics simulation
• Etc.
Quantum computing has already arrived
ANNEX
QUANTUM COMPUTING AND
LIGHT SWITCHES
How it works
The light switch game
Bias summand
Interaction summand
8
14
79
13
10
3
6
1
12
11
2
4
5
Evaluating Ramsey number R(3,3)
Note that the Ramsey experiments were carried out with an annealing time of
1000µs per run.
Example: Embedding of the primal graph of
ℎ3,3
6
(0, 𝑎2, 𝑎3, … , 𝑎15) into hardware.
(128 qubit chip used)
2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviter

More Related Content

What's hot

QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentationVinayak Suresh
 
quantum computing and Quantum Communications
quantum computing and Quantum Communicationsquantum computing and Quantum Communications
quantum computing and Quantum Communications
Srinivas Bukkuru
 
You always dreamt of your own quantum computer. now you can have it in the cloud
You always dreamt of your own quantum computer. now you can have it in the cloudYou always dreamt of your own quantum computer. now you can have it in the cloud
You always dreamt of your own quantum computer. now you can have it in the cloud
Eric Cattoir
 
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili SaghafiQuantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Professor Lili Saghafi
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Samira Riki
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Deepankar Sandhibigraha
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
NAGUR SHAREEF SHAIK
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
PoojaKoshti2
 
Quantum computing presentation 200115
Quantum computing presentation 200115Quantum computing presentation 200115
Quantum computing presentation 200115
Muhammad Habibullah Siddiqui
 
Quantum computing.ppt
Quantum computing.pptQuantum computing.ppt
Quantum computing.ppt
ShubhankarTripathi6
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Rajasekhar Manda
 
Quantum Computers New Generation of Computers Part 8 Quantum Error Correction...
Quantum Computers New Generation of Computers Part 8 Quantum Error Correction...Quantum Computers New Generation of Computers Part 8 Quantum Error Correction...
Quantum Computers New Generation of Computers Part 8 Quantum Error Correction...
Professor Lili Saghafi
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
Jonathan Tan
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Komal Gupta
 
Quantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networksQuantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networks
Miranda Ghrist
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - IntroductionAakash Martand
 
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
Quantum Computers  PART 1 & 2 by Prof Lili SaghafiQuantum Computers  PART 1 & 2 by Prof Lili Saghafi
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
Professor Lili Saghafi
 
Des2017 quantum computing_final
Des2017 quantum computing_finalDes2017 quantum computing_final
Des2017 quantum computing_final
Francisco J. Gálvez Ramírez
 
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
Mike Hogarth, MD, FACMI, FACP
 

What's hot (20)

QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentation
 
quantum computing and Quantum Communications
quantum computing and Quantum Communicationsquantum computing and Quantum Communications
quantum computing and Quantum Communications
 
You always dreamt of your own quantum computer. now you can have it in the cloud
You always dreamt of your own quantum computer. now you can have it in the cloudYou always dreamt of your own quantum computer. now you can have it in the cloud
You always dreamt of your own quantum computer. now you can have it in the cloud
 
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili SaghafiQuantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computer ppt
Quantum computer pptQuantum computer ppt
Quantum computer ppt
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing presentation 200115
Quantum computing presentation 200115Quantum computing presentation 200115
Quantum computing presentation 200115
 
Quantum computing.ppt
Quantum computing.pptQuantum computing.ppt
Quantum computing.ppt
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum Computers New Generation of Computers Part 8 Quantum Error Correction...
Quantum Computers New Generation of Computers Part 8 Quantum Error Correction...Quantum Computers New Generation of Computers Part 8 Quantum Error Correction...
Quantum Computers New Generation of Computers Part 8 Quantum Error Correction...
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networksQuantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networks
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - Introduction
 
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
Quantum Computers  PART 1 & 2 by Prof Lili SaghafiQuantum Computers  PART 1 & 2 by Prof Lili Saghafi
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
 
Des2017 quantum computing_final
Des2017 quantum computing_finalDes2017 quantum computing_final
Des2017 quantum computing_final
 
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
 

Similar to 2013.09.13 quantum computing has arrived s.nechuiviter

Vertex Perspectives | AI Optimized Chipsets | Part IV
Vertex Perspectives | AI Optimized Chipsets | Part IVVertex Perspectives | AI Optimized Chipsets | Part IV
Vertex Perspectives | AI Optimized Chipsets | Part IV
Vertex Holdings
 
Strengths and limitations of quantum computing
Strengths and limitations of quantum computingStrengths and limitations of quantum computing
Strengths and limitations of quantum computing
Vinayak Sharma
 
Quantum Computing at NIST
Quantum Computing at NISTQuantum Computing at NIST
Quantum Computing at NIST
inside-BigData.com
 
ppt_nano_computing.pptx
ppt_nano_computing.pptxppt_nano_computing.pptx
ppt_nano_computing.pptx
vijay518229
 
ppt_nano_computing.pptx
ppt_nano_computing.pptxppt_nano_computing.pptx
ppt_nano_computing.pptx
vijay518229
 
Quantum Computers New Generation of Computers part 6 by Prof Lili Saghafi
Quantum Computers New Generation of Computers part 6 by Prof Lili SaghafiQuantum Computers New Generation of Computers part 6 by Prof Lili Saghafi
Quantum Computers New Generation of Computers part 6 by Prof Lili Saghafi
Professor Lili Saghafi
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
ApurbaChatterjee16
 
Quantum Computing in a Nutshell: Grover's Search and the World of Quantum Com...
Quantum Computing in a Nutshell: Grover's Search and the World of Quantum Com...Quantum Computing in a Nutshell: Grover's Search and the World of Quantum Com...
Quantum Computing in a Nutshell: Grover's Search and the World of Quantum Com...
Daniel Austin
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
InnoTech
 
Quantum computing
Quantum computing Quantum computing
Quantum computing
Kailash Choudhary
 
Quantum computing - the next big thing
Quantum computing - the next big thingQuantum computing - the next big thing
Quantum computing - the next big thing
OMM Solutions GmbH
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
Francisco J. Gálvez Ramírez
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
gitrahekno
 
052516 week11 quantum computers
052516 week11 quantum computers052516 week11 quantum computers
052516 week11 quantum computers
Subas Nandy
 
Quantum Computing in Cloud
Quantum Computing in CloudQuantum Computing in Cloud
Quantum Computing in Cloud
Anil Loutombam
 
Quantum-Computing-ppt.pptx
Quantum-Computing-ppt.pptxQuantum-Computing-ppt.pptx
Quantum-Computing-ppt.pptx
AjayRaj912848
 
Artificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep LearningArtificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep Learning
Sujit Pal
 
Quantum computing
Quantum computingQuantum computing
Quantum Computing and Qiskit
Quantum Computing and QiskitQuantum Computing and Qiskit
Quantum Computing and Qiskit
Pooja Mistry
 

Similar to 2013.09.13 quantum computing has arrived s.nechuiviter (20)

Vertex Perspectives | AI Optimized Chipsets | Part IV
Vertex Perspectives | AI Optimized Chipsets | Part IVVertex Perspectives | AI Optimized Chipsets | Part IV
Vertex Perspectives | AI Optimized Chipsets | Part IV
 
Strengths and limitations of quantum computing
Strengths and limitations of quantum computingStrengths and limitations of quantum computing
Strengths and limitations of quantum computing
 
Quantum Computing at NIST
Quantum Computing at NISTQuantum Computing at NIST
Quantum Computing at NIST
 
ppt_nano_computing.pptx
ppt_nano_computing.pptxppt_nano_computing.pptx
ppt_nano_computing.pptx
 
ppt_nano_computing.pptx
ppt_nano_computing.pptxppt_nano_computing.pptx
ppt_nano_computing.pptx
 
Quantum Computers New Generation of Computers part 6 by Prof Lili Saghafi
Quantum Computers New Generation of Computers part 6 by Prof Lili SaghafiQuantum Computers New Generation of Computers part 6 by Prof Lili Saghafi
Quantum Computers New Generation of Computers part 6 by Prof Lili Saghafi
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computing in a Nutshell: Grover's Search and the World of Quantum Com...
Quantum Computing in a Nutshell: Grover's Search and the World of Quantum Com...Quantum Computing in a Nutshell: Grover's Search and the World of Quantum Com...
Quantum Computing in a Nutshell: Grover's Search and the World of Quantum Com...
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Quantum computing
Quantum computing Quantum computing
Quantum computing
 
Quantum computing - the next big thing
Quantum computing - the next big thingQuantum computing - the next big thing
Quantum computing - the next big thing
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
 
PW-QC
PW-QCPW-QC
PW-QC
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
 
052516 week11 quantum computers
052516 week11 quantum computers052516 week11 quantum computers
052516 week11 quantum computers
 
Quantum Computing in Cloud
Quantum Computing in CloudQuantum Computing in Cloud
Quantum Computing in Cloud
 
Quantum-Computing-ppt.pptx
Quantum-Computing-ppt.pptxQuantum-Computing-ppt.pptx
Quantum-Computing-ppt.pptx
 
Artificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep LearningArtificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep Learning
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computing and Qiskit
Quantum Computing and QiskitQuantum Computing and Qiskit
Quantum Computing and Qiskit
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 

2013.09.13 quantum computing has arrived s.nechuiviter

  • 1. Quantum computing has arrived Sergii Nechuiviter AI Club
  • 2. This lecture is NOT about: • Quantum mechanics • Mathematics • Algorithm complexity It mostly about state of industry of quantum computing
  • 4. Quantum computing is cool! 45 Algorithms with substantial acceleration • Polynomial (for Searching, etc.) • Superpolynomial (for Discrete-Log and Quantum Simulation, etc.) Other solvable NP-complete problems: • Boolean satisfiability problem • Knapsack problem • Travelling salesman problem • Subgraph isomorphism problem • Subset sum problem
  • 5. Practical applications • Hacking open-key cryptography • PageRank (Google in a Quantum Network) • Searching a database of molecules • Lattice protein folding • Sentiment analysis • Car detection • Labeling of news stories and images • Video compression • Machine creativity • Physics simulation (30 quantum particles simulation is limit to our days computers)
  • 6. If it is so cool Why haven`t I heard about it?
  • 7. Brief recognized history of quantum computation research • In 1981 Richard Feynman described a theoretical device that he called a “quantum computer” • In 1994 Peter Shor described the first quantum algorithm • In 1993 Seth Lloyd proposed the first feasible design for a quantum computer • In 1998 IBM-Berkeley, Gershenfeld, Isaac Chuang, Mark Kubinec – the first real experiment: 2 qubits • In 2001 IBM-MIT Chuang a 7-qubit NMR computer (prime factors of 15) • In 2000 MIT Edward Farhi, Jeffrey Goldstone, Michael Sipser, Northeastern’s Sam Gutmann proposed an adiabatic quantum computer • In 2005 IBM, Hewlett-Packard and NEC not seems likely to deliver a working machine in less than 10 years. • In 2007 Japanese electronics giant NEC Corp, controlled 2-qubit coupling • In 2011 University of California, 2 qubits, quantum bas, 2 quantum RAM arxiv.org/abs/1109.3743: Implementing the Quantum von Neumann Architecture with Superconducting Circuits • In 2011, arxiv.org/abs/1103.1528: A Single-Atom Quantum Memory, can store qubits for only 180 microseconds and has an overall efficiency of 9 per cent • In 2011 Experimental realisation of Shor's quantum factoring algorithm using qubit recycling, 1 qubit • In 2011 IBM-MIT Chuang factorized 143 using 4 qubits • In 2012 IBM-Yale stated that they work on 3D qubits • In 2012 arxiv.org/abs/1205.4899: Controlled-NOT Gate Operating With Single Photons • In 2013 University of New South Wales in Sydney, single phosphorus atom in silicon (Kane design, 1998)
  • 8. State of the Art: Grail of quantum computing research
  • 9. NIST quantum simulator (350 qubit) Rose’s Law: D-Wave success story Dairy Cow Research here?
  • 10. D-Wave impact • 2006 4 qubit Calipso • 2007 16-qubit Europa II/Orion demonstration of “the world’s first commercial adiabatic quantum computer.” • 2008 28-qubit Leda • 2011 128-qubit Rainer based “D-Wave One” for Lockheed Martin • In 2011 University of California, 2 qubits, quantum bas, 2 quantum RAM arxiv.org/abs/1109.3743: Implementing the Quantum von Neumann Architecture with Superconducting Circuits • In 2011, arxiv.org/abs/1103.1528: A Single-Atom Quantum Memory, can store qubits for only 180 microseconds and has an overall efficiency of 9 per cent • In 2011 Experimental realisation of Shor's quantum factoring algorithm using qubit recycling, 1 qubit • In 2011 IBM-MIT Chuang factorized 143 using 4 qubits • In 2012 IBM-Yale stated that they work on 3D qubits • In 2012 arxiv.org/abs/1205.4899: Controlled-NOT Gate Operating With Single Photons • In 2012 NIST 350-qubit quantum simulator (news link) • In 2013 University of New South Wales in Sydney, single phosphorus atom in silicon (Kane design, 1998) • 2013, upgrade to the 512-qubit D-Wave Two for LM • 2013 USC Dr. Daniel Lidar about error correction • 2013, 512-qubit D-Wave Two for The Google / NASA Quantum Artificial Intelligence Lab Applying for time on the D-Wave Two at the Quantum Artificial Intelligence Lab here • 2013 As of September 20, the quantum photonic processor housed at the Centre for Quantum Photonics at the University of Bristol will be available to researchers from anywhere in the world via remote access over the Internet
  • 11. D-Wave’s Quantum Computer Goes to the Races, Wins • 1999 D-Wave’s technology has been dogged by controversy during the 14 years (from 1999) it has been in development, with quantum computing researchers questioning whether the company’s technology truly is exploiting quantum effects. • In 2009 Google post “NIPS 2009 Demonstration: Binary Classification using Hardware Implementation of Quantum Annealing” for car detection, 100ms per iteration, QBoost • 2011 Nature “Quantum annealing with manufactured spins” • 2012 84 qubits Experimental Determination Of Ramsey Numbers With Quantum Annealing in 250 ms • 2013 A team of scientists at USC has verified that quantum effects are indeed at play in the first commercial quantum optimization processor. • 2013 Catherine McGeoch, Amherst College D-Wave vs Lenovo workstation with a 2.4GHz quad core Intel processor, 16GB RAM Quadratic unconstrained binary optimization (NP hard) about 3,600 times more quickly: <½ seconds vs 30 minutes
  • 12. Okay, it is fast What is this D-Wave exactly?
  • 13. Watch video D-Wave Systems 128 qubit processor - Inside the chip http://youtu.be/PqSgmCg1kew
  • 15. How does quantum mechanics help?
  • 16. Principle of adiabatic computation
  • 17.
  • 21.
  • 22.
  • 24. Lovely How can it be programmed?
  • 26. The crux of the matter
  • 30. Tasks which can be solved • Travelling salesman • Hadamar matrix search • Eternity II puzzle • Weighted Maximum Independent Set • Molecule Maximum Common Graph • Quantum feature learning • Binary classifier • Neural networks • NAND gate • Physics simulation • Etc.
  • 31. Quantum computing has already arrived
  • 32. ANNEX
  • 33. QUANTUM COMPUTING AND LIGHT SWITCHES How it works
  • 37.
  • 39. Evaluating Ramsey number R(3,3) Note that the Ramsey experiments were carried out with an annealing time of 1000µs per run.
  • 40. Example: Embedding of the primal graph of ℎ3,3 6 (0, 𝑎2, 𝑎3, … , 𝑎15) into hardware. (128 qubit chip used)