This document provides an outline and overview of quantum computation 101. It begins with examples of combinatorial problems involving balls of different colors and sticks. It then discusses quantum axioms, including that quantum systems can be described by vectors in a Hilbert space, evolve according to unitary transformations, and are measured probabilistically. Examples are given of quantum gates and measurements. Key concepts like quantum parallelism, the no-cloning theorem, and applications like teleportation and superdense coding are also introduced. The document aims to build intuition around foundational quantum mechanics and computation concepts.
Describes the simulation model of the backlash effect in gear mechanisms. For undergraduate students in engineering. In the download process a lot of figures are missing.
I recommend to visit my website in the Simulation Folder for a better view of this presentation.
Please send comments to solo.hermelin@gmail.com.
For more presentations on different subjects visit my website at http://www.solohermelin.com.
Achieve asymptotic stability using Lyapunov's second methodIOSRJM
This document discusses using Lyapunov's second method to achieve asymptotic stability in autonomous nonlinear systems. Lyapunov's second method involves finding a Lyapunov function, which is a scalar function that is positive definite and whose derivative along system trajectories is negative definite. If such a function exists, it proves the system is asymptotically stable. The document reviews Lyapunov stability theory and Lyapunov's direct method. It then provides two examples to illustrate how to apply Lyapunov's second method and find Lyapunov functions to determine asymptotic stability of nonlinear systems.
Lyapunov-type inequalities for a fractional q, -difference equation involvin...IJMREMJournal
The document summarizes a research paper that presents new Lyapunov-type inequalities for a fractional boundary value problem involving a fractional difference equation with a p-Laplacian operator. The paper obtains necessary conditions for the existence of nontrivial solutions to the equation. It also presents some applications to eigenvalue problems. Key concepts from fractional calculus such as fractional derivatives and integrals are reviewed. Lemmas establishing uniqueness of solutions to related problems are also presented.
1. The document discusses linear discrete control systems and their representation in state space form. It provides the general state space equations and describes how a discrete linear system with scalar input and output can be represented in controllable canonical form or observable canonical form.
2. It also discusses linear system stability analysis using characteristics polynomials as well as analyzing stability of nonlinear systems by linearizing around an operating point.
3. Feedback control system design is discussed where a controller is designed using input from both a reference signal and system output to generate the control input.
Solution to schrodinger equation with dirac comb potential slides
This document summarizes solving the Schrödinger equation for a Dirac comb potential. The potential is an infinite series of Dirac delta functions spaced periodically. Floquet theory is used to solve the time-independent Schrödinger equation for this potential. Boundary conditions are applied and the resulting equations are solved graphically. Allowed energy bands are determined and plotted versus wave vector for both attractive and repulsive delta function potentials.
This document discusses the process of backpropagation in neural networks. It begins with an example of forward propagation through a neural network with an input, hidden and output layer. It then introduces backpropagation, which uses the calculation of errors at the output to calculate gradients and update weights in order to minimize the overall error. The key steps are outlined, including calculating the error derivatives, weight updates proportional to the local gradient, and backpropagating error signals from the output through the hidden layers. Formulas for calculating each step of backpropagation are provided.
Some Dynamical Behaviours of a Two Dimensional Nonlinear MapIJMER
The document summarizes research on a two-dimensional nonlinear map known as the Nicholson Bailey model. The model describes population dynamics between hosts and parasites. The study analyzes the dynamical behaviors of the model such as steady states, stability of equilibrium points, and bifurcation points. It is observed that the model follows a period-doubling route to chaos. Numerical evaluations are used to demonstrate bifurcation diagrams and calculate the accumulation point where chaos begins. The model is modified to restrict unbounded growth in the prey population.
Generalized Carleson Operator and Convergence of Walsh Type Wavelet Packet Ex...IJERA Editor
In this paper, two new theorems on generalized Carleson Operator for a Walsh type wavelet packet system and for periodic Walsh type wavelet packet expansion of a function 𝑓𝜖𝐿𝑝 0,1 , 1<𝑝><∞, have been established.
Describes the simulation model of the backlash effect in gear mechanisms. For undergraduate students in engineering. In the download process a lot of figures are missing.
I recommend to visit my website in the Simulation Folder for a better view of this presentation.
Please send comments to solo.hermelin@gmail.com.
For more presentations on different subjects visit my website at http://www.solohermelin.com.
Achieve asymptotic stability using Lyapunov's second methodIOSRJM
This document discusses using Lyapunov's second method to achieve asymptotic stability in autonomous nonlinear systems. Lyapunov's second method involves finding a Lyapunov function, which is a scalar function that is positive definite and whose derivative along system trajectories is negative definite. If such a function exists, it proves the system is asymptotically stable. The document reviews Lyapunov stability theory and Lyapunov's direct method. It then provides two examples to illustrate how to apply Lyapunov's second method and find Lyapunov functions to determine asymptotic stability of nonlinear systems.
Lyapunov-type inequalities for a fractional q, -difference equation involvin...IJMREMJournal
The document summarizes a research paper that presents new Lyapunov-type inequalities for a fractional boundary value problem involving a fractional difference equation with a p-Laplacian operator. The paper obtains necessary conditions for the existence of nontrivial solutions to the equation. It also presents some applications to eigenvalue problems. Key concepts from fractional calculus such as fractional derivatives and integrals are reviewed. Lemmas establishing uniqueness of solutions to related problems are also presented.
1. The document discusses linear discrete control systems and their representation in state space form. It provides the general state space equations and describes how a discrete linear system with scalar input and output can be represented in controllable canonical form or observable canonical form.
2. It also discusses linear system stability analysis using characteristics polynomials as well as analyzing stability of nonlinear systems by linearizing around an operating point.
3. Feedback control system design is discussed where a controller is designed using input from both a reference signal and system output to generate the control input.
Solution to schrodinger equation with dirac comb potential slides
This document summarizes solving the Schrödinger equation for a Dirac comb potential. The potential is an infinite series of Dirac delta functions spaced periodically. Floquet theory is used to solve the time-independent Schrödinger equation for this potential. Boundary conditions are applied and the resulting equations are solved graphically. Allowed energy bands are determined and plotted versus wave vector for both attractive and repulsive delta function potentials.
This document discusses the process of backpropagation in neural networks. It begins with an example of forward propagation through a neural network with an input, hidden and output layer. It then introduces backpropagation, which uses the calculation of errors at the output to calculate gradients and update weights in order to minimize the overall error. The key steps are outlined, including calculating the error derivatives, weight updates proportional to the local gradient, and backpropagating error signals from the output through the hidden layers. Formulas for calculating each step of backpropagation are provided.
Some Dynamical Behaviours of a Two Dimensional Nonlinear MapIJMER
The document summarizes research on a two-dimensional nonlinear map known as the Nicholson Bailey model. The model describes population dynamics between hosts and parasites. The study analyzes the dynamical behaviors of the model such as steady states, stability of equilibrium points, and bifurcation points. It is observed that the model follows a period-doubling route to chaos. Numerical evaluations are used to demonstrate bifurcation diagrams and calculate the accumulation point where chaos begins. The model is modified to restrict unbounded growth in the prey population.
Generalized Carleson Operator and Convergence of Walsh Type Wavelet Packet Ex...IJERA Editor
In this paper, two new theorems on generalized Carleson Operator for a Walsh type wavelet packet system and for periodic Walsh type wavelet packet expansion of a function 𝑓𝜖𝐿𝑝 0,1 , 1<𝑝><∞, have been established.
The document provides an introduction to quantum computing fundamentals using an object-oriented approach. It discusses quantum theory, registers, gates and simulations. Key concepts covered include superposition, matrix operations, single and multi-qubit gates like Pauli-X, CNOT and their representations. The presenter aims to demonstrate quantum computing principles via a .NET simulator called Q#.
Quantum Computing 101, Part 1 - Hello Quantum WorldAaronTurner9
This is the first part of a blog series on quantum computing, broadly derived from CERN’s Practical introduction to quantum computing video series, Michael Nielson’s Quantum computing for the determined video series, and the following (widely regarded as definitive) references:
• [Hidary] Quantum Computing: An Applied Approach
• [Nielsen & Chuang] Quantum Computing and Quantum Information [a.k.a. “Mike & Ike”]
• [Yanofsky & Mannucci] Quantum Computing for Computer Scientists
My objective is to keep the mathematics to an absolute minimum (albeit not quite zero), in order to engender an intuitive understanding. You can think it as a quantum computing cheat sheet.
In the last decades, a new model of computation based on quantum mechanics has gained attention in the computer science community. We give an introduction to this model starting from the basics, with no prerequisites. Then, with the help of some simple examples, we see why quantum computers outperform standard ones in certain tasks. We then move to the topic of quantum entanglement and show how sharing quantum information can create a strong provable correlation among distant parties. With this basic understanding of quantum computation and quantum entanglement, we can already illustrate two interesting cryptographic protocols: quantum key distribution and position verification. Both perform classically impossible tasks: the first allows to detect an intruder intercepting a secret communication, while the second allows certifying somebody's GPS location.
This lecture introduces basic concepts in control systems including proportional, integral, and derivative (PID) control. Proportional control uses feedback of the error to determine the control input proportional to the error. Integral control adds an integral term that eliminates steady-state error caused by disturbances. Derivative control adds a damping term proportional to the rate of change of error. Together, proportional, integral and derivative control form the widely used PID controller. The lecture also discusses velocity control, stopping control, adaptive control and different types of controllers including feedback and feedforward control.
It is a brief presentation on quantum computation, which is created as I have investigation on guided study with my instructor Professor Sen Yang at CUHK
Encrypting with entanglement matthias christandlwtyru1989
The document discusses quantum entanglement and its implications. It introduces key concepts like qubits, entanglement, and Bell's inequality. Experiments have violated Bell's inequality, showing the world is probabilistic rather than deterministic. This allows for secure quantum cryptography, where entangled particles can generate a random secret key known only to communicating parties. However, noise in experiments challenges detecting entanglement. The document proposes a test for entanglement based on monogamy - if a particle is strongly entangled with one party, it cannot be equally entangled with multiple others. This test could determine if noise prevents key generation from an entangled state.
Quantum computing uses quantum mechanical phenomena like superposition and entanglement to perform computation. It has the potential to solve certain problems faster than classical computers by exploring all computational paths simultaneously. A quantum computer's basic unit of information is a quantum bit or qubit, which can exist in superposition of states allowing exponentially many computational paths. Operations on qubits must be unitary to preserve superpositions. Measurement causes the qubit to collapse into a definite state, allowing the results of the quantum computation to be read. Multi-qubit systems can exhibit entanglement where the qubits are inextricably linked.
Alice wants to teleport an unknown quantum state ψ to Bob using prior entanglement and classical communication. They share one half of an entangled Bell state β each. Alice combines her half of β with ψ and performs a teleportation circuit involving CNOT and Hadamard gates. She then measures her two qubits and sends the results to Bob. Based on the received classical bits, Bob applies a Pauli operator to reconstruct the state ψ exactly at his location.
Bca 2nd sem-u-1.5 digital logic circuits, digital componentRai University
This document provides an overview of digital logic circuits and Boolean algebra. It defines basic logic operators like AND, OR, and NOT. It introduces Boolean algebra concepts such as Boolean variables, algebraic manipulation, and theorems. It also discusses Boolean functions using truth tables and logic circuits. Finally, it covers standard forms like Sum of Products and Product of Sums, and logic gates including AND, OR, XOR, and their equivalents.
The document discusses quantum computing, beginning with an overview of how quantum bits can exist in superposition and be entangled. It then provides examples of experimental progress in quantum teleportation and quantum algorithms that show exponential speedups over classical computers. The talk aims to argue that quantum computing could have important applications for Pakistan's defense sector, such as developing hack-proof communication and solving complex optimization problems.
This document provides an overview of logic gates, Boolean algebra, and digital circuits. It defines basic logic gates like AND, OR, and NOT. It introduces Boolean algebra concepts such as binary variables, algebraic manipulation using laws and theorems, and canonical forms. Standard logic implementations including sum of products, product of sums, and universal gates using NAND and NOR are discussed. De Morgan's theorems and their application to logic gate equivalents are also covered.
B.sc cs-ii-u-1.5 digital logic circuits, digital componentRai University
This document provides an overview of digital logic circuits and Boolean algebra. It defines basic logic operators like AND, OR, and NOT. It introduces Boolean algebra concepts such as Boolean variables, algebraic manipulation, and theorems. It also discusses Boolean functions using truth tables and logic circuits. Finally, it covers standard forms like Sum of Products and Product of Sums, logic gates, and De Morgan's theorem.
- Boolean algebra uses binary values (1/0) to represent true/false in digital circuits.
- The basic Boolean operations are AND, OR, and NOT. Truth tables and Boolean expressions can both be used to represent the functions of circuits.
- Boolean expressions can be simplified using algebraic rules like commutative, distributive, DeMorgan's, and absorption laws. This allows simpler circuit implementations.
A Shore Introduction to Quantum Computer and the computation of ( Quantum Mechanics),
Nowadays we work on classical computer that work with bits which is either 0s or 1s, but Quantum Computer work with qubits which is either 0s or 1s or 0 and 1 in the same time.
The document discusses several key concepts in quantum computing including:
- Qubits can represent 0, 1, and superpositions using complex numbers unlike classical bits.
- Universal quantum gates like CNOT, Hadamard, and Phase gates along with measurement allow performing quantum algorithms.
- Topological quantum computing uses topology to make quantum information resilient to errors.
- Emerging technologies will see a mix of powerful classical and quantum computing capabilities working together.
Continuous variable quantum entanglement and its applicationswtyru1989
1) The document discusses continuous variable quantum entanglement and its applications. It covers topics like entanglement measures, types of entanglement, and applications such as quantum teleportation.
2) Methods for generating continuous variable optical entanglement are described, including parametric down conversion and mixing squeezed beams. Entanglement criteria like the inseparability criterion and EPR criterion are also summarized.
3) Applications of entanglement including quantum information processing, quantum communication, and quantum metrology are briefly mentioned. The goal of quantum teleportation to transfer the quantum state of light without measurement is also stated.
The Extraordinary World of Quantum ComputingTim Ellison
Originally presented at QCon London - 6 March-2018.
The classical computer on your lap or housed in your data centre manipulates data represented with a binary encoding -- quantum computers are different. They use atomic level mechanics to represent multiple data states simultaneously, leading to a phenomenal exponential increase in the representable state of data, and new solutions to problems that are infeasible using today's classical computers. This session assumes no prior knowledge of quantum technology and presents a introduction to the field of quantum computing, including an introduction to the quantum bit, the types of problem suited to quantum computing, a demo of running algorithms on IBM's quantum machines, and a peek into the future of quantum computers.
This document discusses quantum error correction. It begins by explaining the need for quantum error correction due to noise and imperfections in real-world quantum systems. It then discusses barriers to quantum error correction like the no-cloning theorem. Different types of quantum errors like bit flips, phase flips, and more complex errors are described. Classical error correction techniques are compared. Finally, specific quantum error correcting codes like the repetition code, phase flip code, and Shor's code are explained as ways to protect quantum information against noise by encoding quantum states.
Quantum computing - A Compilation of ConceptsGokul Alex
Excerpts of the Talk Delivered at the 'Bio-Inspired Computing' Workshop conducted by Department of Computational Biology and Bioinformatics, University of Kerala.
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDSSérgio Sacani
The pathway(s) to seeding the massive black holes (MBHs) that exist at the heart of galaxies in the present and distant Universe remains an unsolved problem. Here we categorise, describe and quantitatively discuss the formation pathways of both light and heavy seeds. We emphasise that the most recent computational models suggest that rather than a bimodal-like mass spectrum between light and heavy seeds with light at one end and heavy at the other that instead a continuum exists. Light seeds being more ubiquitous and the heavier seeds becoming less and less abundant due the rarer environmental conditions required for their formation. We therefore examine the different mechanisms that give rise to different seed mass spectrums. We show how and why the mechanisms that produce the heaviest seeds are also among the rarest events in the Universe and are hence extremely unlikely to be the seeds for the vast majority of the MBH population. We quantify, within the limits of the current large uncertainties in the seeding processes, the expected number densities of the seed mass spectrum. We argue that light seeds must be at least 103 to 105 times more numerous than heavy seeds to explain the MBH population as a whole. Based on our current understanding of the seed population this makes heavy seeds (Mseed > 103 M⊙) a significantly more likely pathway given that heavy seeds have an abundance pattern than is close to and likely in excess of 10−4 compared to light seeds. Finally, we examine the current state-of-the-art in numerical calculations and recent observations and plot a path forward for near-future advances in both domains.
Evidence of Jet Activity from the Secondary Black Hole in the OJ 287 Binary S...Sérgio Sacani
Wereport the study of a huge optical intraday flare on 2021 November 12 at 2 a.m. UT in the blazar OJ287. In the binary black hole model, it is associated with an impact of the secondary black hole on the accretion disk of the primary. Our multifrequency observing campaign was set up to search for such a signature of the impact based on a prediction made 8 yr earlier. The first I-band results of the flare have already been reported by Kishore et al. (2024). Here we combine these data with our monitoring in the R-band. There is a big change in the R–I spectral index by 1.0 ±0.1 between the normal background and the flare, suggesting a new component of radiation. The polarization variation during the rise of the flare suggests the same. The limits on the source size place it most reasonably in the jet of the secondary BH. We then ask why we have not seen this phenomenon before. We show that OJ287 was never before observed with sufficient sensitivity on the night when the flare should have happened according to the binary model. We also study the probability that this flare is just an oversized example of intraday variability using the Krakow data set of intense monitoring between 2015 and 2023. We find that the occurrence of a flare of this size and rapidity is unlikely. In machine-readable Tables 1 and 2, we give the full orbit-linked historical light curve of OJ287 as well as the dense monitoring sample of Krakow.
The document provides an introduction to quantum computing fundamentals using an object-oriented approach. It discusses quantum theory, registers, gates and simulations. Key concepts covered include superposition, matrix operations, single and multi-qubit gates like Pauli-X, CNOT and their representations. The presenter aims to demonstrate quantum computing principles via a .NET simulator called Q#.
Quantum Computing 101, Part 1 - Hello Quantum WorldAaronTurner9
This is the first part of a blog series on quantum computing, broadly derived from CERN’s Practical introduction to quantum computing video series, Michael Nielson’s Quantum computing for the determined video series, and the following (widely regarded as definitive) references:
• [Hidary] Quantum Computing: An Applied Approach
• [Nielsen & Chuang] Quantum Computing and Quantum Information [a.k.a. “Mike & Ike”]
• [Yanofsky & Mannucci] Quantum Computing for Computer Scientists
My objective is to keep the mathematics to an absolute minimum (albeit not quite zero), in order to engender an intuitive understanding. You can think it as a quantum computing cheat sheet.
In the last decades, a new model of computation based on quantum mechanics has gained attention in the computer science community. We give an introduction to this model starting from the basics, with no prerequisites. Then, with the help of some simple examples, we see why quantum computers outperform standard ones in certain tasks. We then move to the topic of quantum entanglement and show how sharing quantum information can create a strong provable correlation among distant parties. With this basic understanding of quantum computation and quantum entanglement, we can already illustrate two interesting cryptographic protocols: quantum key distribution and position verification. Both perform classically impossible tasks: the first allows to detect an intruder intercepting a secret communication, while the second allows certifying somebody's GPS location.
This lecture introduces basic concepts in control systems including proportional, integral, and derivative (PID) control. Proportional control uses feedback of the error to determine the control input proportional to the error. Integral control adds an integral term that eliminates steady-state error caused by disturbances. Derivative control adds a damping term proportional to the rate of change of error. Together, proportional, integral and derivative control form the widely used PID controller. The lecture also discusses velocity control, stopping control, adaptive control and different types of controllers including feedback and feedforward control.
It is a brief presentation on quantum computation, which is created as I have investigation on guided study with my instructor Professor Sen Yang at CUHK
Encrypting with entanglement matthias christandlwtyru1989
The document discusses quantum entanglement and its implications. It introduces key concepts like qubits, entanglement, and Bell's inequality. Experiments have violated Bell's inequality, showing the world is probabilistic rather than deterministic. This allows for secure quantum cryptography, where entangled particles can generate a random secret key known only to communicating parties. However, noise in experiments challenges detecting entanglement. The document proposes a test for entanglement based on monogamy - if a particle is strongly entangled with one party, it cannot be equally entangled with multiple others. This test could determine if noise prevents key generation from an entangled state.
Quantum computing uses quantum mechanical phenomena like superposition and entanglement to perform computation. It has the potential to solve certain problems faster than classical computers by exploring all computational paths simultaneously. A quantum computer's basic unit of information is a quantum bit or qubit, which can exist in superposition of states allowing exponentially many computational paths. Operations on qubits must be unitary to preserve superpositions. Measurement causes the qubit to collapse into a definite state, allowing the results of the quantum computation to be read. Multi-qubit systems can exhibit entanglement where the qubits are inextricably linked.
Alice wants to teleport an unknown quantum state ψ to Bob using prior entanglement and classical communication. They share one half of an entangled Bell state β each. Alice combines her half of β with ψ and performs a teleportation circuit involving CNOT and Hadamard gates. She then measures her two qubits and sends the results to Bob. Based on the received classical bits, Bob applies a Pauli operator to reconstruct the state ψ exactly at his location.
Bca 2nd sem-u-1.5 digital logic circuits, digital componentRai University
This document provides an overview of digital logic circuits and Boolean algebra. It defines basic logic operators like AND, OR, and NOT. It introduces Boolean algebra concepts such as Boolean variables, algebraic manipulation, and theorems. It also discusses Boolean functions using truth tables and logic circuits. Finally, it covers standard forms like Sum of Products and Product of Sums, and logic gates including AND, OR, XOR, and their equivalents.
The document discusses quantum computing, beginning with an overview of how quantum bits can exist in superposition and be entangled. It then provides examples of experimental progress in quantum teleportation and quantum algorithms that show exponential speedups over classical computers. The talk aims to argue that quantum computing could have important applications for Pakistan's defense sector, such as developing hack-proof communication and solving complex optimization problems.
This document provides an overview of logic gates, Boolean algebra, and digital circuits. It defines basic logic gates like AND, OR, and NOT. It introduces Boolean algebra concepts such as binary variables, algebraic manipulation using laws and theorems, and canonical forms. Standard logic implementations including sum of products, product of sums, and universal gates using NAND and NOR are discussed. De Morgan's theorems and their application to logic gate equivalents are also covered.
B.sc cs-ii-u-1.5 digital logic circuits, digital componentRai University
This document provides an overview of digital logic circuits and Boolean algebra. It defines basic logic operators like AND, OR, and NOT. It introduces Boolean algebra concepts such as Boolean variables, algebraic manipulation, and theorems. It also discusses Boolean functions using truth tables and logic circuits. Finally, it covers standard forms like Sum of Products and Product of Sums, logic gates, and De Morgan's theorem.
- Boolean algebra uses binary values (1/0) to represent true/false in digital circuits.
- The basic Boolean operations are AND, OR, and NOT. Truth tables and Boolean expressions can both be used to represent the functions of circuits.
- Boolean expressions can be simplified using algebraic rules like commutative, distributive, DeMorgan's, and absorption laws. This allows simpler circuit implementations.
A Shore Introduction to Quantum Computer and the computation of ( Quantum Mechanics),
Nowadays we work on classical computer that work with bits which is either 0s or 1s, but Quantum Computer work with qubits which is either 0s or 1s or 0 and 1 in the same time.
The document discusses several key concepts in quantum computing including:
- Qubits can represent 0, 1, and superpositions using complex numbers unlike classical bits.
- Universal quantum gates like CNOT, Hadamard, and Phase gates along with measurement allow performing quantum algorithms.
- Topological quantum computing uses topology to make quantum information resilient to errors.
- Emerging technologies will see a mix of powerful classical and quantum computing capabilities working together.
Continuous variable quantum entanglement and its applicationswtyru1989
1) The document discusses continuous variable quantum entanglement and its applications. It covers topics like entanglement measures, types of entanglement, and applications such as quantum teleportation.
2) Methods for generating continuous variable optical entanglement are described, including parametric down conversion and mixing squeezed beams. Entanglement criteria like the inseparability criterion and EPR criterion are also summarized.
3) Applications of entanglement including quantum information processing, quantum communication, and quantum metrology are briefly mentioned. The goal of quantum teleportation to transfer the quantum state of light without measurement is also stated.
The Extraordinary World of Quantum ComputingTim Ellison
Originally presented at QCon London - 6 March-2018.
The classical computer on your lap or housed in your data centre manipulates data represented with a binary encoding -- quantum computers are different. They use atomic level mechanics to represent multiple data states simultaneously, leading to a phenomenal exponential increase in the representable state of data, and new solutions to problems that are infeasible using today's classical computers. This session assumes no prior knowledge of quantum technology and presents a introduction to the field of quantum computing, including an introduction to the quantum bit, the types of problem suited to quantum computing, a demo of running algorithms on IBM's quantum machines, and a peek into the future of quantum computers.
This document discusses quantum error correction. It begins by explaining the need for quantum error correction due to noise and imperfections in real-world quantum systems. It then discusses barriers to quantum error correction like the no-cloning theorem. Different types of quantum errors like bit flips, phase flips, and more complex errors are described. Classical error correction techniques are compared. Finally, specific quantum error correcting codes like the repetition code, phase flip code, and Shor's code are explained as ways to protect quantum information against noise by encoding quantum states.
Quantum computing - A Compilation of ConceptsGokul Alex
Excerpts of the Talk Delivered at the 'Bio-Inspired Computing' Workshop conducted by Department of Computational Biology and Bioinformatics, University of Kerala.
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDSSérgio Sacani
The pathway(s) to seeding the massive black holes (MBHs) that exist at the heart of galaxies in the present and distant Universe remains an unsolved problem. Here we categorise, describe and quantitatively discuss the formation pathways of both light and heavy seeds. We emphasise that the most recent computational models suggest that rather than a bimodal-like mass spectrum between light and heavy seeds with light at one end and heavy at the other that instead a continuum exists. Light seeds being more ubiquitous and the heavier seeds becoming less and less abundant due the rarer environmental conditions required for their formation. We therefore examine the different mechanisms that give rise to different seed mass spectrums. We show how and why the mechanisms that produce the heaviest seeds are also among the rarest events in the Universe and are hence extremely unlikely to be the seeds for the vast majority of the MBH population. We quantify, within the limits of the current large uncertainties in the seeding processes, the expected number densities of the seed mass spectrum. We argue that light seeds must be at least 103 to 105 times more numerous than heavy seeds to explain the MBH population as a whole. Based on our current understanding of the seed population this makes heavy seeds (Mseed > 103 M⊙) a significantly more likely pathway given that heavy seeds have an abundance pattern than is close to and likely in excess of 10−4 compared to light seeds. Finally, we examine the current state-of-the-art in numerical calculations and recent observations and plot a path forward for near-future advances in both domains.
Evidence of Jet Activity from the Secondary Black Hole in the OJ 287 Binary S...Sérgio Sacani
Wereport the study of a huge optical intraday flare on 2021 November 12 at 2 a.m. UT in the blazar OJ287. In the binary black hole model, it is associated with an impact of the secondary black hole on the accretion disk of the primary. Our multifrequency observing campaign was set up to search for such a signature of the impact based on a prediction made 8 yr earlier. The first I-band results of the flare have already been reported by Kishore et al. (2024). Here we combine these data with our monitoring in the R-band. There is a big change in the R–I spectral index by 1.0 ±0.1 between the normal background and the flare, suggesting a new component of radiation. The polarization variation during the rise of the flare suggests the same. The limits on the source size place it most reasonably in the jet of the secondary BH. We then ask why we have not seen this phenomenon before. We show that OJ287 was never before observed with sufficient sensitivity on the night when the flare should have happened according to the binary model. We also study the probability that this flare is just an oversized example of intraday variability using the Krakow data set of intense monitoring between 2015 and 2023. We find that the occurrence of a flare of this size and rapidity is unlikely. In machine-readable Tables 1 and 2, we give the full orbit-linked historical light curve of OJ287 as well as the dense monitoring sample of Krakow.
Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...Sérgio Sacani
Context. The observation of several L-band emission sources in the S cluster has led to a rich discussion of their nature. However, a definitive answer to the classification of the dusty objects requires an explanation for the detection of compact Doppler-shifted Brγ emission. The ionized hydrogen in combination with the observation of mid-infrared L-band continuum emission suggests that most of these sources are embedded in a dusty envelope. These embedded sources are part of the S-cluster, and their relationship to the S-stars is still under debate. To date, the question of the origin of these two populations has been vague, although all explanations favor migration processes for the individual cluster members. Aims. This work revisits the S-cluster and its dusty members orbiting the supermassive black hole SgrA* on bound Keplerian orbits from a kinematic perspective. The aim is to explore the Keplerian parameters for patterns that might imply a nonrandom distribution of the sample. Additionally, various analytical aspects are considered to address the nature of the dusty sources. Methods. Based on the photometric analysis, we estimated the individual H−K and K−L colors for the source sample and compared the results to known cluster members. The classification revealed a noticeable contrast between the S-stars and the dusty sources. To fit the flux-density distribution, we utilized the radiative transfer code HYPERION and implemented a young stellar object Class I model. We obtained the position angle from the Keplerian fit results; additionally, we analyzed the distribution of the inclinations and the longitudes of the ascending node. Results. The colors of the dusty sources suggest a stellar nature consistent with the spectral energy distribution in the near and midinfrared domains. Furthermore, the evaporation timescales of dusty and gaseous clumps in the vicinity of SgrA* are much shorter ( 2yr) than the epochs covered by the observations (≈15yr). In addition to the strong evidence for the stellar classification of the D-sources, we also find a clear disk-like pattern following the arrangements of S-stars proposed in the literature. Furthermore, we find a global intrinsic inclination for all dusty sources of 60 ± 20◦, implying a common formation process. Conclusions. The pattern of the dusty sources manifested in the distribution of the position angles, inclinations, and longitudes of the ascending node strongly suggests two different scenarios: the main-sequence stars and the dusty stellar S-cluster sources share a common formation history or migrated with a similar formation channel in the vicinity of SgrA*. Alternatively, the gravitational influence of SgrA* in combination with a massive perturber, such as a putative intermediate mass black hole in the IRS 13 cluster, forces the dusty objects and S-stars to follow a particular orbital arrangement. Key words. stars: black holes– stars: formation– Galaxy: center– galaxies: star formation
CLASS 12th CHEMISTRY SOLID STATE ppt (Animated)eitps1506
Description:
Dive into the fascinating realm of solid-state physics with our meticulously crafted online PowerPoint presentation. This immersive educational resource offers a comprehensive exploration of the fundamental concepts, theories, and applications within the realm of solid-state physics.
From crystalline structures to semiconductor devices, this presentation delves into the intricate principles governing the behavior of solids, providing clear explanations and illustrative examples to enhance understanding. Whether you're a student delving into the subject for the first time or a seasoned researcher seeking to deepen your knowledge, our presentation offers valuable insights and in-depth analyses to cater to various levels of expertise.
Key topics covered include:
Crystal Structures: Unravel the mysteries of crystalline arrangements and their significance in determining material properties.
Band Theory: Explore the electronic band structure of solids and understand how it influences their conductive properties.
Semiconductor Physics: Delve into the behavior of semiconductors, including doping, carrier transport, and device applications.
Magnetic Properties: Investigate the magnetic behavior of solids, including ferromagnetism, antiferromagnetism, and ferrimagnetism.
Optical Properties: Examine the interaction of light with solids, including absorption, reflection, and transmission phenomena.
With visually engaging slides, informative content, and interactive elements, our online PowerPoint presentation serves as a valuable resource for students, educators, and enthusiasts alike, facilitating a deeper understanding of the captivating world of solid-state physics. Explore the intricacies of solid-state materials and unlock the secrets behind their remarkable properties with our comprehensive presentation.
Anti-Universe And Emergent Gravity and the Dark UniverseSérgio Sacani
Recent theoretical progress indicates that spacetime and gravity emerge together from the entanglement structure of an underlying microscopic theory. These ideas are best understood in Anti-de Sitter space, where they rely on the area law for entanglement entropy. The extension to de Sitter space requires taking into account the entropy and temperature associated with the cosmological horizon. Using insights from string theory, black hole physics and quantum information theory we argue that the positive dark energy leads to a thermal volume law contribution to the entropy that overtakes the area law precisely at the cosmological horizon. Due to the competition between area and volume law entanglement the microscopic de Sitter states do not thermalise at sub-Hubble scales: they exhibit memory effects in the form of an entropy displacement caused by matter. The emergent laws of gravity contain an additional ‘dark’ gravitational force describing the ‘elastic’ response due to the entropy displacement. We derive an estimate of the strength of this extra force in terms of the baryonic mass, Newton’s constant and the Hubble acceleration scale a0 = cH0, and provide evidence for the fact that this additional ‘dark gravity force’ explains the observed phenomena in galaxies and clusters currently attributed to dark matter.
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...Travis Hills MN
By harnessing the power of High Flux Vacuum Membrane Distillation, Travis Hills from MN envisions a future where clean and safe drinking water is accessible to all, regardless of geographical location or economic status.
The cost of acquiring information by natural selectionCarl Bergstrom
This is a short talk that I gave at the Banff International Research Station workshop on Modeling and Theory in Population Biology. The idea is to try to understand how the burden of natural selection relates to the amount of information that selection puts into the genome.
It's based on the first part of this research paper:
The cost of information acquisition by natural selection
Ryan Seamus McGee, Olivia Kosterlitz, Artem Kaznatcheev, Benjamin Kerr, Carl T. Bergstrom
bioRxiv 2022.07.02.498577; doi: https://doi.org/10.1101/2022.07.02.498577
Discovery of An Apparent Red, High-Velocity Type Ia Supernova at 𝐳 = 2.9 wi...Sérgio Sacani
We present the JWST discovery of SN 2023adsy, a transient object located in a host galaxy JADES-GS
+
53.13485
−
27.82088
with a host spectroscopic redshift of
2.903
±
0.007
. The transient was identified in deep James Webb Space Telescope (JWST)/NIRCam imaging from the JWST Advanced Deep Extragalactic Survey (JADES) program. Photometric and spectroscopic followup with NIRCam and NIRSpec, respectively, confirm the redshift and yield UV-NIR light-curve, NIR color, and spectroscopic information all consistent with a Type Ia classification. Despite its classification as a likely SN Ia, SN 2023adsy is both fairly red (
�
(
�
−
�
)
∼
0.9
) despite a host galaxy with low-extinction and has a high Ca II velocity (
19
,
000
±
2
,
000
km/s) compared to the general population of SNe Ia. While these characteristics are consistent with some Ca-rich SNe Ia, particularly SN 2016hnk, SN 2023adsy is intrinsically brighter than the low-
�
Ca-rich population. Although such an object is too red for any low-
�
cosmological sample, we apply a fiducial standardization approach to SN 2023adsy and find that the SN 2023adsy luminosity distance measurement is in excellent agreement (
≲
1
�
) with
Λ
CDM. Therefore unlike low-
�
Ca-rich SNe Ia, SN 2023adsy is standardizable and gives no indication that SN Ia standardized luminosities change significantly with redshift. A larger sample of distant SNe Ia is required to determine if SN Ia population characteristics at high-
�
truly diverge from their low-
�
counterparts, and to confirm that standardized luminosities nevertheless remain constant with redshift.
When I was asked to give a companion lecture in support of ‘The Philosophy of Science’ (https://shorturl.at/4pUXz) I decided not to walk through the detail of the many methodologies in order of use. Instead, I chose to employ a long standing, and ongoing, scientific development as an exemplar. And so, I chose the ever evolving story of Thermodynamics as a scientific investigation at its best.
Conducted over a period of >200 years, Thermodynamics R&D, and application, benefitted from the highest levels of professionalism, collaboration, and technical thoroughness. New layers of application, methodology, and practice were made possible by the progressive advance of technology. In turn, this has seen measurement and modelling accuracy continually improved at a micro and macro level.
Perhaps most importantly, Thermodynamics rapidly became a primary tool in the advance of applied science/engineering/technology, spanning micro-tech, to aerospace and cosmology. I can think of no better a story to illustrate the breadth of scientific methodologies and applications at their best.
Microbial interaction
Microorganisms interacts with each other and can be physically associated with another organisms in a variety of ways.
One organism can be located on the surface of another organism as an ectobiont or located within another organism as endobiont.
Microbial interaction may be positive such as mutualism, proto-cooperation, commensalism or may be negative such as parasitism, predation or competition
Types of microbial interaction
Positive interaction: mutualism, proto-cooperation, commensalism
Negative interaction: Ammensalism (antagonism), parasitism, predation, competition
I. Mutualism:
It is defined as the relationship in which each organism in interaction gets benefits from association. It is an obligatory relationship in which mutualist and host are metabolically dependent on each other.
Mutualistic relationship is very specific where one member of association cannot be replaced by another species.
Mutualism require close physical contact between interacting organisms.
Relationship of mutualism allows organisms to exist in habitat that could not occupied by either species alone.
Mutualistic relationship between organisms allows them to act as a single organism.
Examples of mutualism:
i. Lichens:
Lichens are excellent example of mutualism.
They are the association of specific fungi and certain genus of algae. In lichen, fungal partner is called mycobiont and algal partner is called
II. Syntrophism:
It is an association in which the growth of one organism either depends on or improved by the substrate provided by another organism.
In syntrophism both organism in association gets benefits.
Compound A
Utilized by population 1
Compound B
Utilized by population 2
Compound C
utilized by both Population 1+2
Products
In this theoretical example of syntrophism, population 1 is able to utilize and metabolize compound A, forming compound B but cannot metabolize beyond compound B without co-operation of population 2. Population 2is unable to utilize compound A but it can metabolize compound B forming compound C. Then both population 1 and 2 are able to carry out metabolic reaction which leads to formation of end product that neither population could produce alone.
Examples of syntrophism:
i. Methanogenic ecosystem in sludge digester
Methane produced by methanogenic bacteria depends upon interspecies hydrogen transfer by other fermentative bacteria.
Anaerobic fermentative bacteria generate CO2 and H2 utilizing carbohydrates which is then utilized by methanogenic bacteria (Methanobacter) to produce methane.
ii. Lactobacillus arobinosus and Enterococcus faecalis:
In the minimal media, Lactobacillus arobinosus and Enterococcus faecalis are able to grow together but not alone.
The synergistic relationship between E. faecalis and L. arobinosus occurs in which E. faecalis require folic acid
Immersive Learning That Works: Research Grounding and Paths ForwardLeonel Morgado
We will metaverse into the essence of immersive learning, into its three dimensions and conceptual models. This approach encompasses elements from teaching methodologies to social involvement, through organizational concerns and technologies. Challenging the perception of learning as knowledge transfer, we introduce a 'Uses, Practices & Strategies' model operationalized by the 'Immersive Learning Brain' and ‘Immersion Cube’ frameworks. This approach offers a comprehensive guide through the intricacies of immersive educational experiences and spotlighting research frontiers, along the immersion dimensions of system, narrative, and agency. Our discourse extends to stakeholders beyond the academic sphere, addressing the interests of technologists, instructional designers, and policymakers. We span various contexts, from formal education to organizational transformation to the new horizon of an AI-pervasive society. This keynote aims to unite the iLRN community in a collaborative journey towards a future where immersive learning research and practice coalesce, paving the way for innovative educational research and practice landscapes.
The binding of cosmological structures by massless topological defectsSérgio Sacani
Assuming spherical symmetry and weak field, it is shown that if one solves the Poisson equation or the Einstein field
equations sourced by a topological defect, i.e. a singularity of a very specific form, the result is a localized gravitational
field capable of driving flat rotation (i.e. Keplerian circular orbits at a constant speed for all radii) of test masses on a thin
spherical shell without any underlying mass. Moreover, a large-scale structure which exploits this solution by assembling
concentrically a number of such topological defects can establish a flat stellar or galactic rotation curve, and can also deflect
light in the same manner as an equipotential (isothermal) sphere. Thus, the need for dark matter or modified gravity theory is
mitigated, at least in part.
ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...Advanced-Concepts-Team
Presentation in the Science Coffee of the Advanced Concepts Team of the European Space Agency on the 07.06.2024.
Speaker: Diego Blas (IFAE/ICREA)
Title: Gravitational wave detection with orbital motion of Moon and artificial
Abstract:
In this talk I will describe some recent ideas to find gravitational waves from supermassive black holes or of primordial origin by studying their secular effect on the orbital motion of the Moon or satellites that are laser ranged.
5. Combinatorial 101
• You have blue human balls (50%) and red human balls (50%) to rip of.
• You also know that some balls
have longer sticks, some don’t.
6. Combinatorial 101
• You have blue human balls (50%) and red human balls (50%) to rip of.
• You also know that some balls
have longer sticks, some don’t.
• YOU HATE REDbull.
7. Combinatorial 101
• You have blue human balls (50%) and red human balls (50%) to rip of.
• You also know that some balls
have longer sticks, some don’t.
• YOU are OK with ASIAN.
8. • You have blue human balls (50%) and red human balls (50%) to rip of.
• You also know that some balls
have longer sticks, some don’t.
• ASIAN.
Combinatorial 101
14. Yeah, yeah….Wave…cosine….2#$@$#!#%@
• Two different model of uncertainty…How different?
• Observation affects the experimental outcome, aka the distribution.
• Wave particle duality.
• Intrinsic randomness vs classical randomness.
18. Let’s get our hand dirty
• Quantum physics are stated as a series of three axioms.
• Axiom 1: An isolated quantum system has associated with a Hilbert space H.
The system is completely determined by a unit vector in H
• Ex: [1, 0], [0, 0, -i], [0.5,
3
2
] are all unit vectors in H.
• We can write [0.5,
3
2
] in a cocky way: 0.5 |0> +
3
2
|1>
• |0>, |1> are called base states.
19. Let’s get our hand dirty (Axiom 1)
• What is ‘state’ ?
• Can be anything that matters in the system !
• Ex: |0> : |1>:
• Ex: |0>: laser (inactivated) |1>: laser (activated) |2>: laser (emitted)
• Ex: |0>: False |1>: True
• Axiom 1: System can always be described by a vector. We view the
‘meaning’ of the vector basis as state.
• Ex: The state of a bit storage with quantum system can be described as
a|0> + b|1>, with |a|2+|b|2 = 1. We usually call it ‘qubit’.
• What about the ‘coefficient’ of the basis ? Later on this.
20. Let’s get our hand dirty (Axiom 1.5)
• Wait…what about a system to describe ( ) ?
• A ball can have two different state
• |0> : |1>:
• State of A ball can be described by a length two vector.
• w = [a, b] a.k.a a|0> + b|1>, with |a|2+|b|2 = 1.
• Two balls can have four different state
• |00>: |01>: |10>: |11>:
• State of two balls can be described by a length four vector.
• Composite system (Axiom 1.5)
• A composite quantum system has state space given by the tensor product of the
consistent quantum subsystem.
21. Let’s get our hand dirty (Axiom 1.5)
• Tensor product: Natural product of vectors
• w1 = a|0> + b|1>, w2 = c|0> + d|1>
• How to compute w1 ‘times’ w2 ?
• Phen Pei Lu, duh….
• w1⨂ w2 = (a|0> + b|1>) ⨂ (c|0> + d|1>)
= a c |0> ⨂ |0> + a d|0> ⨂ |1> + b c |1> ⨂ |0 > + b d |1> ⨂ |1 >
= ac |00 > + ad |01> + bc |10 > + bd |11>
• Properties of tensor product
• (w1⨂ w2 ) ∙ (w3⨂ w4 ) =(w1 ∙ w3)(w2 ∙ w4)
• Preserve axiom 1 !!
• Why tensor product ? -> More on this later.
22. Let’s get our hand dirty (Axiom 2)
• Axiom 2: A physical system evolves according to a linear unitary
transform.
• Unitary transform U: U*U = UU* = I
• Think of ‘*’ as transpose + conjugate.
• Ex: [0, i]* = [[-i], [0]]
• Property of ‘*’: (AB)* = B*A*
23. Let’s get our hand dirty (Axiom 2)
• Why unitary transform?
• Unitary transform U: U*U = UU* = I
• Preserve unit length of state after evolution ! (Axiom 1)
• Check it out:
• w is a state (column vector), from axiom 1 we have w* w = 1.
• Let w’ = U w, we see that w’* w’ = w* U*U w = w* w = 1.
• Why linear ? -> Schrodinger equation.
24. Let’s get our hand dirty (Axiom 2)
• Back to single qubit
• Reminder: qubit can be represented as [a, b] a.k.a a|0> + b|1>, with
|a|2+|b|2 = 1.
• Special case: a = 1 (Logic false) and b = 1 (Logic true)
• Unitary transform on single qubit (Quantum gates)
X
0 1
1 0
Y
0 −𝑖
𝑖 0
Z
1 0
0 −1
H
1
2
1
2
1
2
−
1
2
25. Let’s get our hand dirty (Axiom 2)
• Unitary transform on two qubits (Quantum gates)
• How to realize AND ?
• How to realize OR ??
• Wait… AND/OR are irreversible operations !
• Nature permits only unitary operation.
• Quantum gates are reversible !
AND
? ?
? ?
? ?
? ?
? ?
? ?
? ?
? ?
OR
? ?
? ?
? ?
? ?
? ?
? ?
? ?
? ?
26. Let’s get our hand dirty (Axiom 2)
• Unitary transform on two qubits (A smart way around)
• NAND gates are universal. -> Want to implement this.
• The Toffoli gate
• Quantum gate design trick 101: add an acilla bit and XOR it.
X
A
C
A
C ⨁(𝐴⋀𝐵)
BB
27. Let’s get our hand dirty (Axiom 3)
• So far we’ve talked about the deterministic part of quantum physics.
• Remember we’ve mentioned intrinsic randomness and experimental effect ?
• Axiom 3 (Verbally)
• The information you can get from a quantum state is through measurement.
• Each possible experimental outcomes is associated with an operator.
• Probability of obtaining an experimental outcome is determined by state and
the operator associated with that outcome.
• Quantum state, after the measurement, collapses to a state associated with
the experimental outcomes.
28. Let’s get our hand dirty (Axiom 3)
• Axiom 3 (Measurement)
• A quantum measurement is characterized by a collection of
operators.
• Operators: 𝑀 𝛼1
, 𝑀 𝛼2
, ⋯ 𝑀 𝛼 𝑘
.
• 𝛼1, 𝛼2, ⋯ 𝛼 𝑘 are indications of the outcomes.
• Operators obey completeness property: 𝑖=1
𝑘
𝑀 𝛼 𝑖
∗ 𝑀 𝛼 𝑖
= 𝐼
• Given state w, the probability P[X = 𝛼𝑖] = w*𝑀 𝛼 𝑖
∗ 𝑀 𝛼 𝑖
w
• After the measurement, quantum state collapses to:
𝑀 𝛼 𝑖
w
P[X = 𝛼 𝑖]
29. Let’s get our hand dirty (Axiom 3)
• What the heck are these operators ?
• Why completeness property: 𝑖=1
𝑘
𝑀 𝛼 𝑖
∗
𝑀 𝛼 𝑖
= 𝐼 ??
• Preserve outcome probability: 𝑖=1
𝑘
P[X = 𝛼𝑖] = 1
• Check it out: 𝑖=1
𝑘
P[X = 𝛼𝑖] = 𝑖=1
𝑘
w∗𝑀 𝛼 𝑖
∗ 𝑀 𝛼 𝑖
w
= w∗ 𝑖=1
𝑘
𝑀 𝛼 𝑖
∗ 𝑀 𝛼 𝑖
w
= w∗ w = 1 (Axiom 1)
• But… What ARE these operators ?
• Ex: w =
𝑎
𝑏
, 𝑀0 =
1 0
0 0
, 𝑀1 =
0 0
0 1
• Meaning of coefficients: Probability amplitude.
30. Let’s get our hand dirty (Axiom 1.5)
• Remember the natural tensor product ?
• w1 = a|0> + b|1>, w2 = c|0> + d|1>
• w1⨂ w2 = (a|0> + b|1>) ⨂ (c|0> + d|1>)
= ac |00 > + ad |01> + bc |10 > + bd |11>
• Remember Probability amplitude ?
• |a|2 : Probability of observing |0> with measurement {M0, M1} on w1 -> P[X1 = 0]
• |c|2 : Probability of observing |0> with measurement {M0, M1} on w2 -> P[X2 = 0]
• Probability of observing |0>|0> with measurement {…} on w1⨂ w2 ? -> P[X1 = 0] P[X2 = 0]
• Tensor product reveals the fact that two consistent quantum states are
independent !
• But not every 4-dim state can be written in tensor product.
• These states are called unseparable -> Quantum correlation.
31. Let’s get our hand dirty (Recap)
• Axiom 1: Everything (isolated) is a unit length vector.
• Axiom 1.5: Two things not quantum correlated (independent), write
them down as their tensor product.
• Axiom 2: Nature only permits unitary operations.
• Axiom 3: Information from the state can be accessed through
measurement, where the outcomes exhibits intrinsic randomness.
32. Outline
• A quantum intuition. (Observed !)
• Axiomize quantum physics. (Observed !)
• Break ?
• Applications : Sth you might raise your eyebrows.
• A quantum algorithm: Grover’s search.
• A quantum algorithm: Shor’s factorizing algorithm.
33. Quantum parallelism : Good stuff
• Think about a state a1 |000> + a2 |001> +… a8 |111>
• Quiz 1: what are the meaning of [|000> … |111> ] ?
• Quiz 2: what are the meaning of [a1 … a8] ?
• Quiz 3: what are the permitted operations ?
• Now think about operation again.
• What does it mean to perform ‘flip the last bit’ on this state ?
• Operation on a state -> operation on all possible classical configurations.
• This is where quantum computation gain advantage from.
34. Quantum parallelism : Bad stuff ?
• Yey! Then why don’t we replace classical bits (or other computing
thiny) with quantum state ?
• At a first glance: classic : |0> or |1> ---> quantum : a|0> + b|1>
• More degree of freedom, parallelism…
• But…how to construct a state a|0> + b|1> ?
• Classical : How to construct a bit string 0001010100 -> stupid question.
• Classical (2) : Hey, here’s a bit string (in the memory), make a copy of it ->
stupid question again.
• Quantum: How to construct a state a|00> + b|10> -> stupid question ?
• Quantum (2): Hey, here’s a state, make a copy of it -> ????
35. Quantum parallelism: No-cloning theorem
• There is no universal unitary U that can clone a state, i.e., there’s no
unitary U such that for all |𝜑 > and ancilla |𝑎 >
𝑈|𝜑 > |𝑎 >= |𝜑 > |𝜑 >
36. Quantum teleportation
• We can’t CLONE a state by unitary transform
• Can we do something with measurement ?
• But wait…After measurement, the state collapses.
• So we shall ask: can we at least carry these measurement result to
somewhere and do something ?
• We CAN !
• The protocol is called quantum teleportation.
• Why teleportation -> Imagine transporting a person in a speed of light ?
38. Quantum superdense coding
• Hmm…It seems that each qubit need to be described in two bits…
• Can we reverse it -> send two classical bits by only one qubit ?
• WE CAN !
X Z
|𝜑 > 𝐴
|𝜑 > 𝐴𝐵 =
1
2
00 > +
1
2
11 >
𝑠𝑒𝑛𝑑
M (b1,b2)
b1 b2
39. Quantum might raise your eyebrow (Recap)
• Quantum parallelism
• No cloning theorem
• Application of quantum entanglement
• Quantum teleportation
• Quantum superdense coding
40. Outline
• A quantum intuition. (Observed !)
• Axiomize quantum physics. (Observed !)
• Applications : Sth you might raise your eyebrows. (Observed !)
• A quantum algorithm: Grover’s search.
• A quantum algorithm: Shor’s factorizing algorithm.
41. Quantum algorithm
• Remember quantum parallelism ?
• This insights leads to development quantum algorithms !
• Currently most famous quantum algorithms (based on parallelism)
• Grover’s search.
• Shor’s factorization algorithm.
• HHL (Harrow, Hassidim, Lloyd) linear equations solver.
• Let’s jump into it.
42. Black box search problem
• The problem is simple: Find the red ball
• Permitted operation: Take out and check.
• Imagine there’s only 1 red ball out of N balls.
• Classical algorithm ? O(N).
• Why does this problem matter ?
• Find a assignment for SAT problem.
• Find a element in a array equals to xxx
• Find maximum value/ minimum value/ … etc
43. Black box search problem: Needle in haystack
• General formulation: we have a function f: {0,1}n -> {0, 1}, want to find the
assignment x∈ {0,1}n such that f(x) = 1.
• Total number of possibility: 2n
• Classical algorithm:
• Choose (sample) one solution, ex: x = |01>
• Compute f, store the value, verify |01>|f(x)>.
• Classical object only permit one check at a time !
• Quantum algorithm:
• Construct a uniform state: |𝜑 > = |𝑠 >=
1
2
|00 > +
1
2
01 > +
1
2
10 > +
1
2
|11 >
• Verify it, …… f(| 𝜑 > ) =?????
44. Quantum search algorithm (1)
• We want to take advantage of quantum parallelism.
• i.e. we want to have by some operation:
|𝜑 > |0 >→
1
2
|00 > |𝑓(00) > +
1
2
|10 > |𝑓(10) > +
1
2
|01 > |𝑓(01) > +
1
2
|11 > |𝑓(11) >
• Why do we want it -> We compute f for all possible input in just 1 operation !
• Is this operation possible -> Yes ! It’s unitary !
• Remember the ancilla trick mentioned in the Tofolli gate slide ?
X
A A
BB
C⨁(𝐴⋀𝐵)C
45. Quantum search algorithm (1)
• We want to take advantage of quantum parallelism.
• i.e. we want to have by some operation:
|𝜑 > |0 >→
1
2
|00 > |𝑓(00) > +
1
2
|10 > |𝑓(10) > +
1
2
|01 > |𝑓(01) > +
1
2
|11 > |𝑓(11) >
• Why do we want it -> We compute f for all possible input in just 1 operation !
• Is this operation possible -> Yes ! It’s unitary !
• Remember the ancilla trick mentioned in the Tofolli gate slide ?
X
A A
BB
f
C⨁(𝐴⋀𝐵)C
46. Quantum search algorithm (1)
• We want to take advantage of quantum parallelism.
• i.e. we want to have by some operation:
|𝜑 > |0 >→
1
2
|00 > |𝑓(00) > +
1
2
|10 > |𝑓(10) > +
1
2
|01 > |𝑓(01) > +
1
2
|11 > |𝑓(11) >
• Why do we want it -> We compute f for all possible input in just 1 operation !
• Is this operation possible -> Yes ! It’s unitary !
• Remember the ancilla trick mentioned in the Tofolli gate slide ?
X
A A
BB
f
C⨁𝑓(𝐴, 𝐵)C
47. Quantum search algorithm (1)
• We want to take advantage of quantum parallelism.
• i.e. we want to have by some operation:
|𝜑 > |0 >→
1
2
|00 > |𝑓(00) > +
1
2
|10 > |𝑓(10) > +
1
2
|01 > |𝑓(01) > +
1
2
|11 > |𝑓(11) >
• Why do we want it -> We compute f for all possible input in just 1 operation !
• Is this operation possible -> Yes ! It’s unitary !
• Remember the ancilla trick mentioned in the Tofolli gate slide ?
X
A A
BB
f
0⨁𝑓(𝐴, 𝐵)0
48. Quantum search algorithm (1)
• We want to take advantage of quantum parallelism.
• i.e. we want to have by some operation:
|𝜑 > |0 >→
1
2
|00 > |𝑓(00) > +
1
2
|10 > |𝑓(10) > +
1
2
|01 > |𝑓(01) > +
1
2
|11 > |𝑓(11) >
• Why do we want it -> We compute f for all possible input in just 1 operation !
• Is this operation possible -> Yes ! It’s unitary !
• Remember the ancilla trick mentioned in the Tofolli gate slide ?
• Quantum boolean gate.
X
A A
BB
f
0⨁𝑓(𝐴, 𝐵)
Uf
0
49. Quantum search algorithm (2)
• What’s next ?
• We have: 1
2
|00 > |𝑓(00) > +
1
2
|10 > |𝑓(10) > +
1
2
|01 > |𝑓(01) > +
1
2
|11 > |𝑓(11) >
• Remember the meaning of the coefficient ? -> Square is the probability.
• How to sample a x -> Measurement !
• Wait…Nothing change ! Only have ¼ probability to get the search target !
• If only…we can do something to the state
• Make the coefficient of our target to be one!
• Need to construct unitary transformation…
• Grover’s idea: Rotate the state !
54. Quantum search algorithm (3)
• Suppose |00> is the answer, let’s revisit what we have…
• |𝜑 >=
1
2
|00 > +
1
2
|10 > +
1
2
|01 > +
1
2
|11 >=
1
4
|00 > +
3
4
|00 >⊥
• Only two steps are enough !
|00 >
|00 >⊥
|𝜑 >= |00 >
55. Quantum search algorithm (3)
• Suppose |00> is the answer, let’s revisit what we have…
• |𝜑 >=
1
2
|00 > +
1
2
|10 > +
1
2
|01 > +
1
2
|11 >=
1
4
|00 > +
3
4
|00 >⊥
• Only two steps are enough !
• Done with N=4 example. Consider N to be very large…
𝜃 ≈
1
𝑁
|𝑡𝑎𝑟𝑔𝑒𝑡 >⊥
|𝑡𝑎𝑟𝑔𝑒𝑡 >
56. Quantum search algorithm (3)
• Suppose |00> is the answer, let’s revisit what we have…
• |𝜑 >=
1
2
|00 > +
1
2
|10 > +
1
2
|01 > +
1
2
|11 >=
1
4
|00 > +
3
4
|00 >⊥
• Only two steps are enough !
• Done with N=4 example. Consider N to be very large…
𝜃 ≈
3
𝑁
|𝑡𝑎𝑟𝑔𝑒𝑡 >⊥
|𝑡𝑎𝑟𝑔𝑒𝑡 >
57. Quantum search algorithm (3)
• Suppose |00> is the answer, let’s revisit what we have…
• |𝜑 >=
1
2
|00 > +
1
2
|10 > +
1
2
|01 > +
1
2
|11 >=
1
4
|00 > +
3
4
|00 >⊥
• Only two steps are enough !
• Done with N=4 example. Consider N to be very large…
𝜃 ≈
5
𝑁
|𝑡𝑎𝑟𝑔𝑒𝑡 >⊥
|𝑡𝑎𝑟𝑔𝑒𝑡 >
58. Quantum search algorithm (3)
• Suppose |00> is the answer, let’s revisit what we have…
• |𝜑 >=
1
2
|00 > +
1
2
|10 > +
1
2
|01 > +
1
2
|11 >=
1
4
|00 > +
3
4
|00 >⊥
• Only two steps are enough !
• Done with N=4 example. Consider N to be very large…
𝜃 ≈
2𝑘 + 1
𝑁
=
𝜋
2
𝑘 = Ο( 𝑁)
Quadratic speedup !!!
|𝑡𝑎𝑟𝑔𝑒𝑡 >⊥
|𝑡𝑎𝑟𝑔𝑒𝑡 >
59. Quantum search algorithm
• Let’s implement each iteration
• How to flip the sign only at the target spot ?
• The ancilla trick ver 2.0
|𝜑 >=
1
4
|00 > +
3
4
|00 >⊥ → −
1
4
|00 > +
3
4
|00 >⊥
X
A A
BB Uf
C C⨁𝑓(𝐴, 𝐵)
60. Quantum search algorithm
• Let’s implement each iteration
• How to flip the sign only at the target spot ?
• The ancilla trick ver 2.0
|𝜑 >=
1
4
|00 > +
3
4
|00 >⊥ → −
1
4
|00 > +
3
4
|00 >⊥
X
A A
BB Uf
C
1
2
|0 > −
1
2
|1 > =
|0 >=
|0 >=
61. Quantum search algorithm
• Let’s implement each iteration
• How to flip the sign only at the target spot ?
• The ancilla trick ver 2.0
|𝜑 >=
1
4
|00 > +
3
4
|00 >⊥ → −
1
4
|00 > +
3
4
|00 >⊥
X
A A
BB Uf
C
1
2
|0 > −
1
2
|1 > =
|0 >=
|0 >=
C⨁𝑓(0,0)
62. Quantum search algorithm
• Let’s implement each iteration
• How to flip the sign only at the target spot ?
• The ancilla trick ver 2.0
|𝜑 >=
1
4
|00 > +
3
4
|00 >⊥ → −
1
4
|00 > +
3
4
|00 >⊥
X
A A
BB Uf
C
1
2
|0 > −
1
2
|1 > =
|0 >=
|0 >=
-C
63. Quantum search algorithm
• Let’s implement each iteration
• How to flip the sign only at the target spot ?
• The ancilla trick ver 2.0
|𝜑 >=
1
4
|00 > +
3
4
|00 >⊥ → −
1
4
|00 > +
3
4
|00 >⊥
X
A A
BB Uf
C
1
2
|0 > −
1
2
|1 > =
|0 >=
|0 >=
-C
𝑈𝑓 |𝜑 > |𝐶 > =
1
4
𝑈𝑓 |00 > |𝐶 > +
3
4
𝑈𝑓 |00 >⊥|𝐶 > = −
1
4
|00 > |𝐶 > +
3
4
|00 >⊥|𝐶 >
64. Quantum search algorithm
• Let’s implement each iteration
• How to flip the sign only at the target spot ?
• The ancilla trick ver 2.0
• Discard the ancilla bit, we get what we want !!
|𝜑 >=
1
4
|00 > +
3
4
|00 >⊥ → −
1
4
|00 > +
3
4
|00 >⊥
X
A A
BB Uf
C
1
2
|0 > −
1
2
|1 > =
|0 >=
|0 >=
-C
𝑈𝑓 |𝜑 > |𝐶 > =
1
4
𝑈𝑓 |00 > |𝐶 > +
3
4
𝑈𝑓 |00 >⊥|𝐶 > = −
1
4
|00 > |𝐶 > +
3
4
|00 >⊥|𝐶 >
65. Quantum search algorithm
• How to flip the state with respect to the uniform state |s> ?
• Uniform state |𝑠 > = 𝑖=1
𝑁 1
𝑁
|𝑖 >
• I’ll give you the expression of this operation A: (Note: N=2n)
𝐴 = 2 𝑠 >< 𝑠 − 𝐼 = 𝐻⨂𝑛
2 0 >< 0 − 𝐼 𝐻⨂𝑛
𝐻⨂2
𝑍
𝐻⨂2
66. Grover’s search
• Step 1: Initialize |𝜑 > with a uniform state n qubits such that N=2n
• Step 2: (iteration) For k in range ( 𝑁):
• |𝜑′ > |𝐶 > = 𝐺 |𝜑 > |𝐶 >
• Step 3: Measure the state
• Obtain final outcome.
𝐻⨂2
𝑍
𝐻⨂2
Uf
67. Grover’s search: Recap
• Query complexity: 𝑁 𝑣𝑠 𝑁
• How many functional call do we need ?
• Again: Quantum parallelism !
Uf
c
68. Grover’s search: Further reading
• Can you think of a quantum algorithm that find maximum in a list ?
• Can you initialize with arbitrary quantum state?
• Interesting References:
• Amplitude amplification : Boost up a quantum algo only need O(
1
𝛿
)
repetition.
• Grover search is optimal !
• Quantum walk via reflection between subspace.
69. Outline
• A quantum intuition. (Observed !)
• Axiomize quantum physics. (Observed !)
• Applications : Sth you might raise your eyebrows. (Observed !)
• A quantum algorithm: Grover’s search. (Observed !)
• A quantum algorithm: Shor’s factorizing algorithm.
70. Recap: Quantum Boolean circuit
• What’s the critical step in Grover’s search ?
• Quantum parallelism for sure…
• A smart way to extract the output of the function ! -> Encode to amplitude
• We’ve considered binary output…
• What if the function takes more than 2 outcome?
• E.g. |𝜑 > = 00 >→ 𝑐 𝑓 0,0 00 >
• What shall this c be ?
• A natural extension: Phase encoding!
X
A A
BB Uf
C
1
2
|0 > −
1
2
|1 > =
|0 >=
|0 >=
𝐶⨁𝑓 𝐴, 𝐵
= −𝐶
71. Phase encoding
• Let’s apply a two-outcome function to a uniform state
• Example of such function: Indicator function of the search problem
• The phase encoding (What we want)
1
2
|00 > +
1
2
|10 > +
1
2
|01 > +
1
2
|11 >→ −
1
2
|00 > +
1
2
|10 > +
1
2
|01 > +
1
2
|11 >
• How do we do that: We pick a ancilla C =
1
2
|0 > −
1
2
|1 > -> Eigenvector !
• Let’s apply a four-outcome function to a uniform state.
• Example of such function: f(a,b) = (2*a + b) mod 4
• The phase encoding (What we want)
1
2
00 > +
1
2
10 > +
1
2
01 > +
1
2
11 >→ 𝑒
2𝜋𝑖 𝑓 0,0
4
1
2
00 > +𝑒
2𝜋𝑖 𝑓 1,0
4
1
2
10 > +𝑒
2𝜋𝑖 𝑓 0,1
4
1
2
01 > +𝑒
2𝜋𝑖 𝑓 1,1
4
1
2
11 >
• How do we do that: We pick a ancilla C = 𝑘=1
4 𝑒2𝜋𝑖𝑘/4
4
|𝑘 > -> Eigenvector !
72. Quantum period finding
• What’s next -> How to use the encoding
• In search problem, we use the encoding to ‘squeeze’ the quantum state.
• Introduce a new problem: Find the period of the function f
• Period: f(x) = f(x ⨁ r). Find r.
• Why important -> You’ll see, hehehee..
• E.g. f(x) = f(x ⨁ 4 )
|𝜑 > = 𝑒
2𝜋𝑖 ∗ 0
4
1
2
00 > +𝑒
2𝜋𝑖 ∗ 1
4
1
2
10 > +𝑒
2𝜋𝑖 ∗ 2
4
1
2
01 > +𝑒
2𝜋𝑖 ∗3
4
1
2
11 >
• How to extract ‘4’ ? -> Inverse Fourier transform !!
74. Quantum period finding (Details)
• In general case…
• We know 0 < r < 2L
• But we don’t know how to construct C -> wait…wha…?
• Actually, we can ‘solve’ it !
• Here’s the sketch of the actual algorithm
• Step 1: construct a uniform state with (L + log(
1
𝜀
)) qubits : |s>
• Step 2: Apply quantum Boolean circuit Uf to |s>|0> : Uf |s>|0>
• Step 3: Apply QIFT to the first register.
• Step 4: Measure the first register, and do continuous fraction algorithm to find r.
75. Quantum period finding (Complexity)
• Query complexity: 1 !!
• Other operation: O(L2), with 0 < r < 2L
• Time to Shor up !
76. Quantum order finding
• Definition: let x < N and (x, N) are coprime. The order of x modulo N is
defined to be the least positive integer r, such that
𝑥 𝑟
≡ 1 𝑚𝑜𝑑 𝑁
• Property: 𝑟 ≤ 𝑁
• Property: the function f(k) = xk mod N is periodic with period r !!
• How to find the order-> Quantum period finding. The end.
• Query: 1
• Gate complexity: O(log 2 (N))
77. Two lemmas I haven’t thought through yet
Lemma 1: (How to find non-trivial factor)
Suppose N is an L bit composite number, and x is an non trivial solution to
P1 : 𝑥2 ≡ 1 𝑚𝑜𝑑 𝑁,
which means 𝑥 ≠ 1 𝑚𝑜𝑑 𝑁 nor 𝑥 ≠ 𝑁 − 1 ≡ −1 𝑚𝑜𝑑 𝑁 . Then, at least one of
gcd(x-1 ,N), gcd(x+1, N) is a non-trivial factor of N that can be computed in O(L3)
Lemma 2: (It’s really likely to find such ‘x’)
Suppose 𝑁 = 𝑝1
𝛼1
𝑝2
𝛼2
⋯ 𝑝 𝑚
𝛼 𝑚
and let x be chosen uniformly at random from
the set {0<t<N, (t,N) is coprime}. Let r be the order of x modulo N, then
Pr 𝑟 𝑖𝑠 𝑒𝑣𝑒𝑛 𝑎𝑛𝑑 𝑥
𝑟
2 𝑖𝑠 𝑛𝑜𝑛𝑡𝑟𝑖𝑣𝑖𝑎𝑙 𝑡𝑜 𝑃1 ≥ 1 −
1
2 𝑚
78. Shor’s factoring algorithm (Find a nontrivial
factor)
• Input: a composite number N
• Step 1: Randomly sample 0<x<N, check if gcd(x,N)>1
• If so, you are lucky -> return gcd(x,N).
• If not, don’t panic, quantum has your back -> go to step 2.
• Step 2: Apply quantum order finding algorithm to x.
• Check 𝑟 𝑖𝑠 𝑒𝑣𝑒𝑛 𝑎𝑛𝑑 𝑥
𝑟
2 𝑖𝑠 𝑛𝑜𝑛𝑡𝑟𝑖𝑣𝑖𝑎𝑙 𝑡𝑜 𝑃1. If so, compute gcd(xr/2-1 ,N),
gcd(xr/2+1, N) , test if one of them is a non-trivial factor. Output it.
• If not, 雖小。 But that’s fine-> run the algo again !
• Performance: O(log3 N) with O(1) success probability.
79. Offline.
• A quantum intuition. (Observed !)
• Axiomize quantum physics. (Observed !)
• Applications : Sth you might raise your eyebrows. (Observed !)
• A quantum algorithm: Grover’s search. (Observed !)
• A quantum algorithm: Shor’s factorizing algorithm. (Observed !)
80. Recommended reference
• Quantum computation bible -> Nielsen & Chuang, quantum
computation and quantum information.
• Linear algebraic reference -> The theory of quantum information,
Waltrous.
• Quantum tale -> Alice in quantumland.