SlideShare a Scribd company logo
Quantum Computing
Submitted to: Submitted By:
Dr. Rohit Kumar Keshav(2K19/EC/091)
Outline
Introduction
What is Quantum Computer ?
Need of Quantum Computer
Representation of Data- Q bits
Representation of Data- Superposition
Quantum Gates
Demonstration of Quantum Computing
Obstacles & Research
Future Application
Introduction to Quantum Computers
As the making of transistors smaller and smaller is continued ,the width of a wire in a computer chip is no
longer than a size of a single atom. These are sizes for which rules of classical physics no longer apply. If the
transistors become much smaller, the strange effects of quantum mechanics will begin to hinder their
performance.
▪ 1985 - David Deutsch developed the quantum Turing machine, showing that quantum
circuits are universal.
▪ 1994 - Peter Shor came up with a quantum algorithm to factor very large numbers in
polynomial time.
▪1997 - Lov Grover develops a quantum search algorithm with O(√N) complexity
▪ “I think I can safely say that nobody understands quantum mechanics” - Feynman
▪ 1982 - Feynman proposed the idea of creating machines based on the laws of quantum
mechanics instead of the laws of classical physics.
What is Quantum Computer ?
Quantum computing is a modern way of computing
that is based on the science of quantum mechanics
and its unbelievable phenomena. It is a beautiful
combination of physics, mathematics, computer
science and information theory. It provides high
computational power, less energy consumption and
exponential speed over classical computers by
controlling the behaviour of small physical objects
i.e. microscopic particles like atoms, electrons,
photons, etc.
Need of Quantum Computer
➢ The Potential and Power of Quantum Computing
Quantum computer with 500 qubits gives 2500 superposition states. Each state would be classically equivalent
to a single list of 500 1's and 0's. Such computer could operate on 2500 states simultaneously. Eventually,
observing the system would cause it to collapse into a single quantum state corresponding to a single answer,
a single list of 500 1's and 0's, as dictated by the measurement axiom of quantum mechanics. This kind of
computer is equivalent to a classical computer with approximately 10150processors.
➢ Moore's Law for Quantum Computers
If we use an analogue of Moor’s law for quantum computers, the number of quantum bits would be double in
every 18 months. But adding just one qubit is already enough to double a speed. So, the speed of quantum
computer will increase more than just doubling it.
➢ The Major Difference between Quantum and Classical Computers
. The memory of a quantum computer is a quantum state that can be a superposition of
different numbers. A quantum computer can do an arbitrary reversible classical computation on all the
numbers
simultaneously.
➢ Superiority of Quantum Computer over Classical Computer
Representation of Data
❑ Quantum computers, which have not been built yet, would be based on the strange principles of
quantum mechanics, in which the smallest particles of light and matter can be in different places at the
same time.
❑ In a quantum computer, one "qubit" - quantum bit - could be both 0 and 1 at the same time. So with
three qubits of data, a quantum computer could store all eight combinations of 0 and 1 simultaneously.
That means a three-qubit quantum computer could calculate eight times faster than a three-bit digital
computer.
❑ Typical personal computers today calculate 64 bits of data at a time. A quantum computer with 64
qubits would be 2 to the 64th power faster, or about 18 billion billion times faster. (Note: billion billion
is correct.)
Representation of Data-Qbits
➢ A bit of data is represented by a single atom that is in one of two states denoted by |0> and |1>. A
single bit of this form is known as a qubit.
➢ A physical implementation of a qubit could use the two energy levels of an atom. An excited state
representing |1> and a ground state representing |0>.
Excited
State
Ground
State
Nucleus
Light pulse of
frequency  for
time interval t
Electron
State |0> State |1>
Representation of Data- Superposition
A single qubit can be forced into a superposition of the two states denoted by the addition of the state
vectors:
|> =  1 |0> +  2 |1>
Where  1 and  2 are complex numbers and | 1 |2 + |  2 |2 = 1
A qubit in superposition is in both of the
states |1> and |0 at the same time
Light pulse of
frequency  for time
interval t/2
State |0> State |0> + |1>
Consider a 3 bit qubit register. An equally weighted superposition of all possible states
would be denoted by:
|> =
𝟏
√𝟖
|000> +
𝟏
√𝟖
|001> + . . . +
𝟏
√𝟖
|111>
Quantum Gates
▪Quantum Gates are similar to classical gates, but do not have a degenerate output. i.e. their original
input state can be derived from their output state, uniquely. They must be reversible.
▪This means that a deterministic computation can be performed on a quantum computer only if it is
reversible. Luckily, it has been shown that any deterministic computation can be made
reversible.(Charles Bennet, 1973)
▪Simplest gate involves one qubit and is called a Hadamard Gate (also known as a square-root of NOT
gate.) Used to put qubits into superposition.
H
State
|0>
State
|0> + |1>
H
State
|1>
Note: Two Hadamard gates used in
succession can be used as a NOT gate
Quantum Gates - Controlled NOT
A gate which operates on two qubits is called a Controlled-NOT (CN) Gate. If the bit on the control
line is 1, invert the bit on the target line.
A - Target
B - Control
Input Output
Note: The CN gate has a similar
behavior to the XOR gate with some
extra information to make it reversible.
A’
B’
A Universal Quantum Computer
▪ The CCN gate has been shown to be a universal reversible logic gate as it can be used as a NAND gate.
A - Target
B - Control 1
C - Control 2
Input Output
A’
B’
C’
When our target input is 1, our target
output is a result of a NAND of B and C.
Démonstrating Quantum Computing
❑ Nuclear Magnetic Resonance :- The latest development in quantum computing takes a radical new approach.
When held in a magnetic field, each nucleus within a molecule spins in a certain direction, which can be used
to describe its state; spinning upwards can signify a 1 and spinning down, a 0. Nuclear Magnetic Resonance
(NMR) techniques can be used to detect these spin states and bursts of specific radio waves can flip the nuclei
from spinning up (1) to spinning down (0) and vice-versa.
❑ Ion Trap :- An Ion Trap quantum computer is also based on control of nuclear spin (although using vibration
modes or "phonons" has also been considered). In this approach the individual ions are, as the name implies,
trapped or isolated by means of an electromagnetic field which is produced by means of an electromagnetic
chamber. They are then manipulated by laser pulses and a qubit arises from the superposition of lower and
higher energy spin states.
❑ Quantum Dot :- A quantum dot is a particle of matter so small that the addition or removal of an electron
changes its properties in some useful way. When the dot is exposed to a pulse of laser light of precisely the
right wavelength and duration, the electron is raised to an excited state: a second burst of laser light causes the
electron to fall back to its ground state. The ground and excited states of the electron can be thought of as the 0
and 1 states of the qubit and the application of the laser light can be regarded as a controlled NOT function as
it knocks the qubit from 0 to 1 or from ' to 0
Obstacles & Research
The field of quantum information processing has made numerous promising advancements since its conception,
including the building of two- and three-qubit quantum computers capable of some simple arithmetic and data
sorting. However, a few potentially large obstacles still remain that prevent us from "just building one", or more
precisely, building a quantum computer that can rival today's modern digital computer.
➢ Decoherence
Consider a qubit that is in the coherent state.As soon as it measurable interacts with the environment it will
decohere and fall into one of the two classical states.
➢ Error Correction
Those errors that arise as a direct result of decoherence, or the tendency of a quantum
computer to decay from a given quantum state into an incoherent state as it interacts, or entangles, with the state
of the environment.These interactions between the environment and qubits are unavoidable, and induce the
breakdown of information stored in the quantum computer, and thus errors in computation.
➢ Lack of Reliable Reading Mechanism
The techniques that exist till date have a big problem that trying to read from a superpositioned qubit would
invariably make it to lose its superpositioned state and make it to behave just as a classical bit – i.e. it would
store only one among the values of 0 and 1.
Future Benefits of Quantum Computer
❖ Artificial Intelligence & Machine Learning
❖ Computational Chemistry
❖ Drug Design & Development
❖ Cybersecurity & Cryptography
❖ Financial Modelling
❖ Logistics Optimisation
❖ Better Batteries
❖ Cleaner Fertilization
❖ Traffic Optimization
❖ Weather Forecasting and Climate Change
❖ Solar Capture
❖ Electronic Materials Discovery
References
➢ https://www.technologyreview.com/2019/01/29/66141/what-is-quantum-computing/
➢ https://giapjournals.com/ijsrtm/article/view/108/102
➢ https://www.intechopen.com/online-first/introduction-to-quantum-computing
➢ https://www.technologyreview.com/2019/01/29/66141/what-is-quantum-computing/
➢ https://builtin.com/hardware/quantum-computing-applications
❖ Where a classical computer would take 5 trillion years to factor a 5,000 digit number, a
quantum computer could finish in 2 minutes.
❖ According to Chuang a supercomputer needs about a month to find a phone number from the
database consisting of world's phone books, where a quantum computer is able to solve this task
in 27 minutes.
❖ In fact a quantum computer capable of performing Shor's algorithm would be able to break
current cryptography techniques in a matter of seconds.

More Related Content

What's hot

Quantum computer
Quantum computerQuantum computer
Quantum computerNikhil Eg
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - IntroductionAakash Martand
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
Jonathan Tan
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
Deepti.B
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Rajasekhar Manda
 
Presentation quantum computers
Presentation quantum computersPresentation quantum computers
Presentation quantum computers
AzeemAhmed55
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
Nancy Mann
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
Kumar Abhijeet
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Samira Riki
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
MadhaviHanmanthkar
 
Quantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsQuantum Computing - Basic Concepts
Quantum Computing - Basic Concepts
Sendash Pangambam
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
Rishabh Jindal
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Krishna Patel
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Abhishek Jaisingh
 
Quantum Computing Explained
Quantum Computing ExplainedQuantum Computing Explained
Quantum Computing Explained
jeetendra mandal
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
HarishKumar1779
 
Quantum computing
Quantum computingQuantum computing
What is quantum computing
What is quantum computingWhat is quantum computing
What is quantum computing
Mariyum Khan
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Mehdi Rezaie
 

What's hot (20)

Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - Introduction
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Presentation quantum computers
Presentation quantum computersPresentation quantum computers
Presentation quantum computers
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computer ppt
Quantum computer pptQuantum computer ppt
Quantum computer ppt
 
Quantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsQuantum Computing - Basic Concepts
Quantum Computing - Basic Concepts
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum Computing Explained
Quantum Computing ExplainedQuantum Computing Explained
Quantum Computing Explained
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
What is quantum computing
What is quantum computingWhat is quantum computing
What is quantum computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 

Similar to Quantum Computing

Seminar on quatum
Seminar on quatumSeminar on quatum
Seminar on quatum
aprameyabr1
 
Quantum computing1
Quantum computing1Quantum computing1
Quantum computing1
Pravin Pundge
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Ritwik MG
 
Xim $%
Xim $%Xim $%
Xim $%
Azhar Ansari
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
Abhijit181377
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computerskathan
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
kavya1219
 
Introduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdfIntroduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdf
sunnypatil1778
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
khan saad bin hasan
 
bhanu.pptx
bhanu.pptxbhanu.pptx
bhanu.pptx
aswinichenemalla
 
Seminar
SeminarSeminar
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by Emran
Emran Hossain
 
Quantum computing
Quantum computingQuantum computing
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Davide Nardone
 
Fundamentals of Quantum Computing
Fundamentals of Quantum ComputingFundamentals of Quantum Computing
Fundamentals of Quantum Computing
achakracu
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Ahmed Banafa
 
quantumcomputers-090715210946-phpapp01.pdf
quantumcomputers-090715210946-phpapp01.pdfquantumcomputers-090715210946-phpapp01.pdf
quantumcomputers-090715210946-phpapp01.pdf
AjayRaj912848
 

Similar to Quantum Computing (20)

Seminar on quatum
Seminar on quatumSeminar on quatum
Seminar on quatum
 
Quantum computing1
Quantum computing1Quantum computing1
Quantum computing1
 
Quantum comput ing
Quantum comput ingQuantum comput ing
Quantum comput ing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Xim $%
Xim $%Xim $%
Xim $%
 
OPTICALQuantum
OPTICALQuantumOPTICALQuantum
OPTICALQuantum
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Introduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdfIntroduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdf
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
bhanu.pptx
bhanu.pptxbhanu.pptx
bhanu.pptx
 
Seminar
SeminarSeminar
Seminar
 
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by Emran
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Fundamentals of Quantum Computing
Fundamentals of Quantum ComputingFundamentals of Quantum Computing
Fundamentals of Quantum Computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
quantumcomputers-090715210946-phpapp01.pdf
quantumcomputers-090715210946-phpapp01.pdfquantumcomputers-090715210946-phpapp01.pdf
quantumcomputers-090715210946-phpapp01.pdf
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Quantum Computing

  • 1. Quantum Computing Submitted to: Submitted By: Dr. Rohit Kumar Keshav(2K19/EC/091)
  • 2. Outline Introduction What is Quantum Computer ? Need of Quantum Computer Representation of Data- Q bits Representation of Data- Superposition Quantum Gates Demonstration of Quantum Computing Obstacles & Research Future Application
  • 3. Introduction to Quantum Computers As the making of transistors smaller and smaller is continued ,the width of a wire in a computer chip is no longer than a size of a single atom. These are sizes for which rules of classical physics no longer apply. If the transistors become much smaller, the strange effects of quantum mechanics will begin to hinder their performance. ▪ 1985 - David Deutsch developed the quantum Turing machine, showing that quantum circuits are universal. ▪ 1994 - Peter Shor came up with a quantum algorithm to factor very large numbers in polynomial time. ▪1997 - Lov Grover develops a quantum search algorithm with O(√N) complexity ▪ “I think I can safely say that nobody understands quantum mechanics” - Feynman ▪ 1982 - Feynman proposed the idea of creating machines based on the laws of quantum mechanics instead of the laws of classical physics.
  • 4. What is Quantum Computer ? Quantum computing is a modern way of computing that is based on the science of quantum mechanics and its unbelievable phenomena. It is a beautiful combination of physics, mathematics, computer science and information theory. It provides high computational power, less energy consumption and exponential speed over classical computers by controlling the behaviour of small physical objects i.e. microscopic particles like atoms, electrons, photons, etc.
  • 5. Need of Quantum Computer ➢ The Potential and Power of Quantum Computing Quantum computer with 500 qubits gives 2500 superposition states. Each state would be classically equivalent to a single list of 500 1's and 0's. Such computer could operate on 2500 states simultaneously. Eventually, observing the system would cause it to collapse into a single quantum state corresponding to a single answer, a single list of 500 1's and 0's, as dictated by the measurement axiom of quantum mechanics. This kind of computer is equivalent to a classical computer with approximately 10150processors. ➢ Moore's Law for Quantum Computers If we use an analogue of Moor’s law for quantum computers, the number of quantum bits would be double in every 18 months. But adding just one qubit is already enough to double a speed. So, the speed of quantum computer will increase more than just doubling it. ➢ The Major Difference between Quantum and Classical Computers . The memory of a quantum computer is a quantum state that can be a superposition of different numbers. A quantum computer can do an arbitrary reversible classical computation on all the numbers simultaneously. ➢ Superiority of Quantum Computer over Classical Computer
  • 6. Representation of Data ❑ Quantum computers, which have not been built yet, would be based on the strange principles of quantum mechanics, in which the smallest particles of light and matter can be in different places at the same time. ❑ In a quantum computer, one "qubit" - quantum bit - could be both 0 and 1 at the same time. So with three qubits of data, a quantum computer could store all eight combinations of 0 and 1 simultaneously. That means a three-qubit quantum computer could calculate eight times faster than a three-bit digital computer. ❑ Typical personal computers today calculate 64 bits of data at a time. A quantum computer with 64 qubits would be 2 to the 64th power faster, or about 18 billion billion times faster. (Note: billion billion is correct.)
  • 7. Representation of Data-Qbits ➢ A bit of data is represented by a single atom that is in one of two states denoted by |0> and |1>. A single bit of this form is known as a qubit. ➢ A physical implementation of a qubit could use the two energy levels of an atom. An excited state representing |1> and a ground state representing |0>. Excited State Ground State Nucleus Light pulse of frequency  for time interval t Electron State |0> State |1>
  • 8. Representation of Data- Superposition A single qubit can be forced into a superposition of the two states denoted by the addition of the state vectors: |> =  1 |0> +  2 |1> Where  1 and  2 are complex numbers and | 1 |2 + |  2 |2 = 1 A qubit in superposition is in both of the states |1> and |0 at the same time
  • 9. Light pulse of frequency  for time interval t/2 State |0> State |0> + |1> Consider a 3 bit qubit register. An equally weighted superposition of all possible states would be denoted by: |> = 𝟏 √𝟖 |000> + 𝟏 √𝟖 |001> + . . . + 𝟏 √𝟖 |111>
  • 10. Quantum Gates ▪Quantum Gates are similar to classical gates, but do not have a degenerate output. i.e. their original input state can be derived from their output state, uniquely. They must be reversible. ▪This means that a deterministic computation can be performed on a quantum computer only if it is reversible. Luckily, it has been shown that any deterministic computation can be made reversible.(Charles Bennet, 1973) ▪Simplest gate involves one qubit and is called a Hadamard Gate (also known as a square-root of NOT gate.) Used to put qubits into superposition. H State |0> State |0> + |1> H State |1> Note: Two Hadamard gates used in succession can be used as a NOT gate
  • 11. Quantum Gates - Controlled NOT A gate which operates on two qubits is called a Controlled-NOT (CN) Gate. If the bit on the control line is 1, invert the bit on the target line. A - Target B - Control Input Output Note: The CN gate has a similar behavior to the XOR gate with some extra information to make it reversible. A’ B’
  • 12. A Universal Quantum Computer ▪ The CCN gate has been shown to be a universal reversible logic gate as it can be used as a NAND gate. A - Target B - Control 1 C - Control 2 Input Output A’ B’ C’ When our target input is 1, our target output is a result of a NAND of B and C.
  • 13. Démonstrating Quantum Computing ❑ Nuclear Magnetic Resonance :- The latest development in quantum computing takes a radical new approach. When held in a magnetic field, each nucleus within a molecule spins in a certain direction, which can be used to describe its state; spinning upwards can signify a 1 and spinning down, a 0. Nuclear Magnetic Resonance (NMR) techniques can be used to detect these spin states and bursts of specific radio waves can flip the nuclei from spinning up (1) to spinning down (0) and vice-versa. ❑ Ion Trap :- An Ion Trap quantum computer is also based on control of nuclear spin (although using vibration modes or "phonons" has also been considered). In this approach the individual ions are, as the name implies, trapped or isolated by means of an electromagnetic field which is produced by means of an electromagnetic chamber. They are then manipulated by laser pulses and a qubit arises from the superposition of lower and higher energy spin states. ❑ Quantum Dot :- A quantum dot is a particle of matter so small that the addition or removal of an electron changes its properties in some useful way. When the dot is exposed to a pulse of laser light of precisely the right wavelength and duration, the electron is raised to an excited state: a second burst of laser light causes the electron to fall back to its ground state. The ground and excited states of the electron can be thought of as the 0 and 1 states of the qubit and the application of the laser light can be regarded as a controlled NOT function as it knocks the qubit from 0 to 1 or from ' to 0
  • 14. Obstacles & Research The field of quantum information processing has made numerous promising advancements since its conception, including the building of two- and three-qubit quantum computers capable of some simple arithmetic and data sorting. However, a few potentially large obstacles still remain that prevent us from "just building one", or more precisely, building a quantum computer that can rival today's modern digital computer. ➢ Decoherence Consider a qubit that is in the coherent state.As soon as it measurable interacts with the environment it will decohere and fall into one of the two classical states. ➢ Error Correction Those errors that arise as a direct result of decoherence, or the tendency of a quantum computer to decay from a given quantum state into an incoherent state as it interacts, or entangles, with the state of the environment.These interactions between the environment and qubits are unavoidable, and induce the breakdown of information stored in the quantum computer, and thus errors in computation. ➢ Lack of Reliable Reading Mechanism The techniques that exist till date have a big problem that trying to read from a superpositioned qubit would invariably make it to lose its superpositioned state and make it to behave just as a classical bit – i.e. it would store only one among the values of 0 and 1.
  • 15. Future Benefits of Quantum Computer ❖ Artificial Intelligence & Machine Learning ❖ Computational Chemistry ❖ Drug Design & Development ❖ Cybersecurity & Cryptography ❖ Financial Modelling ❖ Logistics Optimisation ❖ Better Batteries ❖ Cleaner Fertilization ❖ Traffic Optimization ❖ Weather Forecasting and Climate Change ❖ Solar Capture ❖ Electronic Materials Discovery
  • 16. References ➢ https://www.technologyreview.com/2019/01/29/66141/what-is-quantum-computing/ ➢ https://giapjournals.com/ijsrtm/article/view/108/102 ➢ https://www.intechopen.com/online-first/introduction-to-quantum-computing ➢ https://www.technologyreview.com/2019/01/29/66141/what-is-quantum-computing/ ➢ https://builtin.com/hardware/quantum-computing-applications
  • 17. ❖ Where a classical computer would take 5 trillion years to factor a 5,000 digit number, a quantum computer could finish in 2 minutes. ❖ According to Chuang a supercomputer needs about a month to find a phone number from the database consisting of world's phone books, where a quantum computer is able to solve this task in 27 minutes. ❖ In fact a quantum computer capable of performing Shor's algorithm would be able to break current cryptography techniques in a matter of seconds.