SlideShare a Scribd company logo
Quantum Computing
Quantum computing is the area of study focused on developing computer technology based on the
principles of quantum theory. The quantum computer, following the laws of quantum physics, would
gain enormous processing power through the ability to be in multiple states, and to perform tasks
using all possible permutations simultaneously.
A Comparison of Classical and Quantum Computing
Classical computing relies, at its ultimate level, on principles expressed by Boolean algebra. Data
must be processed in an exclusive binary state at any point in time or bits. While the time that each
transistor or capacitor need be either in 0 or 1 before switching states is now measurable in billionths
of a second, there is still a limit as to how quickly these devices can be made to switch state. As we
progress to smaller and faster circuits, we begin to reach the physical limits of materials and the
threshold for classical laws of physics to apply. Beyond this, the quantum world takes over.
In a quantum computer, a number of elemental particles such as electrons or photons can be used
with either their charge or polarization acting as a representation of 0 and/or 1. Each of these
particles is known as a quantum bit, or qubit, the nature and behavior of these particles form the
basis of quantum computing.
Quantum Superposition and Entanglement
The two most relevant aspects of quantum physics are the principles of superposition and
entanglement.
Superposition: Think of a qubit as an electron in a magnetic field. The electron's spin may be either
in alignment with the field, which is known as a spin-up state, or opposite to the field, which is
known as a spin-down state. According to quantum law, the particle enters a superposition of states,
in which it behaves as if it were in both states simultaneously. Each qubit utilized could take a
superposition of both 0 and 1.
Entanglement: Particles that have interacted at some point retain a type of connection and can be
entangled with each other in pairs, in a process known as correlation. Knowing the spin state of one
entangled particle - up or down - allows one to know that the spin of its mate is in the opposite
direction. Quantum entanglement allows qubits that are separated by incredible distances to interact
with each other instantaneously (not limited to the speed of light). No matter how great the distance
between the correlated particles, they will remain entangled as long as they are isolated.
Taken together, quantum superposition and entanglement create an enormously enhanced computing
power. Where a 2-bit register in an ordinary computer can store only one of four binary
configurations (00, 01, 10, or 11) at any given time, a 2-qubit register in a quantum computer can
store all four numbers simultaneously, because each qubit represents two values. If more qubits are
added, the increased capacity is expanded exponentially.
Difficulties with Quantum Computers
 Interference - During the computation phase of a quantum calculation, the slightest
disturbance in a quantum system (say a stray photon or wave of EM radiation) causes the
quantum computation to collapse, a process known as de-coherence. A quantum computer
must be totally isolated from all external interference during the computation phase.
 Error correction - Given the nature of quantum computing, error correction is ultra critical -
even a single error in a calculation can cause the validity of the entire computation to
collapse.
 Output observance - Closely related to the above two, retrieving output data after a
quantum calculation is complete risks corrupting the data.
The Future of Quantum Computing
The biggest and most important one is the ability to factorize a very large number into two prime
numbers. That's really important because that's what almost all encryption of internet applications
use and can be de-encrypted. A quantum computer should be able to do that relatively quickly.
Calculating the positions of individual atoms in very large molecules like polymers and in viruses.
The way that the particles interact with each other – if you have a quantum computer you could use
it to develop drugs and understand how molecules work a bit better.
Even though there are many problems to overcome, the breakthroughs in the last 15 years, and
especially in the last 3, have made some form of practical quantum computing possible. However,
the potential that this technology offers is attracting tremendous interest from both the government
and the private sector. It is this potential that is rapidly breaking down the barriers to this technology,
but whether all barriers can be broken, and when, is very much an open question.
References
http://www.fastcolabs.com/3013214/why-quantum-computing-is-faster-for-everything-but-the-web
http://www.theguardian.com/science/2014/mar/06/quantum-computing-explained-particle-
mechanics
http://www.economist.com/news/science-and-technology/21578027-first-real-world-contests-
between-quantum-computers-and-standard-ones-faster
http://whatis.techtarget.com/definition/quantum-computing
http://physics.about.com/od/quantumphysics/f/quantumcomp.htm

More Related Content

What's hot

Qunatum computing
Qunatum computing Qunatum computing
Qunatum computing
Shivangi Gupta
 
Quantum Information
Quantum InformationQuantum Information
Quantum Information
Prasanna Venkatesan
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computerskathan
 
Quantum Information Technology
Quantum Information TechnologyQuantum Information Technology
Quantum Information Technology
Fenny Thakrar
 
Quantum Computer: Quantum Model and Reality
Quantum Computer: Quantum Model and RealityQuantum Computer: Quantum Model and Reality
Quantum Computer: Quantum Model and Reality
Vasil Penchev
 
Quantum Computer
Quantum ComputerQuantum Computer
Quantum Computer
Towfiqul Islam
 
1538545
15385451538545
1538545
ssuserf5429e
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Amr Kamel Deklel
 
Quantum computing
Quantum computingQuantum computing
Quantum Computer
Quantum ComputerQuantum Computer
Quantum Computer
AbhayBiswas3
 
Xim $%
Xim $%Xim $%
Xim $%
Azhar Ansari
 
Quantum computer presentation
Quantum computer presentationQuantum computer presentation
Quantum computer presentation
kevinl94303
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
sadakpramodh
 
Quantum computation: EPR Paradox and Bell's Inequality
Quantum computation: EPR Paradox and Bell's InequalityQuantum computation: EPR Paradox and Bell's Inequality
Quantum computation: EPR Paradox and Bell's Inequality
Stefano Franco
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
Mohammad Ghorbani
 
Seminar
SeminarSeminar
Quantum computing
Quantum computingQuantum computing
Quantum computing
Ritwik MG
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
Kaushik Chowdary
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
GAUTHAMG5
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
Ahmed Banafa
 

What's hot (20)

Qunatum computing
Qunatum computing Qunatum computing
Qunatum computing
 
Quantum Information
Quantum InformationQuantum Information
Quantum Information
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum Information Technology
Quantum Information TechnologyQuantum Information Technology
Quantum Information Technology
 
Quantum Computer: Quantum Model and Reality
Quantum Computer: Quantum Model and RealityQuantum Computer: Quantum Model and Reality
Quantum Computer: Quantum Model and Reality
 
Quantum Computer
Quantum ComputerQuantum Computer
Quantum Computer
 
1538545
15385451538545
1538545
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computer
Quantum ComputerQuantum Computer
Quantum Computer
 
Xim $%
Xim $%Xim $%
Xim $%
 
Quantum computer presentation
Quantum computer presentationQuantum computer presentation
Quantum computer presentation
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computation: EPR Paradox and Bell's Inequality
Quantum computation: EPR Paradox and Bell's InequalityQuantum computation: EPR Paradox and Bell's Inequality
Quantum computation: EPR Paradox and Bell's Inequality
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Seminar
SeminarSeminar
Seminar
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
 

Viewers also liked

Quantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networksQuantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networks
Miranda Ghrist
 
Quantum presentation And Uses
Quantum presentation And UsesQuantum presentation And Uses
Quantum presentation And UsesMir Farooq
 
Quantum Overview
Quantum OverviewQuantum Overview
Quantum Overview
dan_glyck
 
Simple Technology: Quantum Leaps For Your Business
Simple Technology: Quantum Leaps For Your BusinessSimple Technology: Quantum Leaps For Your Business
Simple Technology: Quantum Leaps For Your Business
Colin Daniels
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityKamal Diwakar
 
D wave 2 x tech
D wave 2 x tech D wave 2 x tech
D wave 2 x tech
Azhar Abbas
 
Quantum technology hubs briefing slides
Quantum technology hubs briefing slidesQuantum technology hubs briefing slides
Quantum technology hubs briefing slidesDerek Gillespie
 
A Review on Quantum Cryptography Technology
A Review on Quantum Cryptography TechnologyA Review on Quantum Cryptography Technology
A Review on Quantum Cryptography Technology
drboon
 
Quantum Leap - The Future of Technology
Quantum Leap - The Future of TechnologyQuantum Leap - The Future of Technology
Quantum Leap - The Future of Technology
John Gillis
 
052516 week11 quantum computers
052516 week11 quantum computers052516 week11 quantum computers
052516 week11 quantum computers
Subas Nandy
 
Graphene Quantum Dots
Graphene Quantum DotsGraphene Quantum Dots
Graphene Quantum Dots
Ricardo Camacho Sánchez
 
Quantum Global Campus holds day long technical talk
Quantum Global Campus holds day long technical talkQuantum Global Campus holds day long technical talk
Quantum Global Campus holds day long technical talk
Amresh Kumar
 
Iran Profile By Ahmad Dolatkhah
Iran Profile By Ahmad DolatkhahIran Profile By Ahmad Dolatkhah
Iran Profile By Ahmad Dolatkhah
ahmad_hunter
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
t0pgun
 
Future of Computers
Future of ComputersFuture of Computers
Future of Computers
guest19ab3c
 
Quantum dots
Quantum dots Quantum dots
Quantum dots
Maaz Hasan
 
Quantum technology
Quantum technologyQuantum technology
Quantum technologyeaiti
 

Viewers also liked (17)

Quantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networksQuantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networks
 
Quantum presentation And Uses
Quantum presentation And UsesQuantum presentation And Uses
Quantum presentation And Uses
 
Quantum Overview
Quantum OverviewQuantum Overview
Quantum Overview
 
Simple Technology: Quantum Leaps For Your Business
Simple Technology: Quantum Leaps For Your BusinessSimple Technology: Quantum Leaps For Your Business
Simple Technology: Quantum Leaps For Your Business
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
D wave 2 x tech
D wave 2 x tech D wave 2 x tech
D wave 2 x tech
 
Quantum technology hubs briefing slides
Quantum technology hubs briefing slidesQuantum technology hubs briefing slides
Quantum technology hubs briefing slides
 
A Review on Quantum Cryptography Technology
A Review on Quantum Cryptography TechnologyA Review on Quantum Cryptography Technology
A Review on Quantum Cryptography Technology
 
Quantum Leap - The Future of Technology
Quantum Leap - The Future of TechnologyQuantum Leap - The Future of Technology
Quantum Leap - The Future of Technology
 
052516 week11 quantum computers
052516 week11 quantum computers052516 week11 quantum computers
052516 week11 quantum computers
 
Graphene Quantum Dots
Graphene Quantum DotsGraphene Quantum Dots
Graphene Quantum Dots
 
Quantum Global Campus holds day long technical talk
Quantum Global Campus holds day long technical talkQuantum Global Campus holds day long technical talk
Quantum Global Campus holds day long technical talk
 
Iran Profile By Ahmad Dolatkhah
Iran Profile By Ahmad DolatkhahIran Profile By Ahmad Dolatkhah
Iran Profile By Ahmad Dolatkhah
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Future of Computers
Future of ComputersFuture of Computers
Future of Computers
 
Quantum dots
Quantum dots Quantum dots
Quantum dots
 
Quantum technology
Quantum technologyQuantum technology
Quantum technology
 

Similar to Quantum Computing

Quantum computing
Quantum computingQuantum computing
Quantum computing
deeksha qanoungo
 
bhanu.pptx
bhanu.pptxbhanu.pptx
bhanu.pptx
aswinichenemalla
 
Quantum computing1
Quantum computing1Quantum computing1
Quantum computing1
Pravin Pundge
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
MinoarHossain
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
Jai Sipani
 
Quantum Computing Seminar Presenatation(Simple format)
Quantum Computing Seminar Presenatation(Simple format)Quantum Computing Seminar Presenatation(Simple format)
Quantum Computing Seminar Presenatation(Simple format)
HarshKSatheesh
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
IOSR Journals
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Keshav
 
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALAA Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
Saikiran Panjala
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
Deepti.B
 
Aditya kulshreshtha, (QUANTUM COMPUTING)
Aditya kulshreshtha, (QUANTUM COMPUTING)Aditya kulshreshtha, (QUANTUM COMPUTING)
Aditya kulshreshtha, (QUANTUM COMPUTING)
Adityakulshreshtha4
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
dharmsinghggu
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
Abhijit181377
 
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by Emran
Emran Hossain
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Mehdi Rezaie
 
quantumcomputingbysandy-170310190433.pdf
quantumcomputingbysandy-170310190433.pdfquantumcomputingbysandy-170310190433.pdf
quantumcomputingbysandy-170310190433.pdf
AjayRaj912848
 

Similar to Quantum Computing (20)

Quantum computing
Quantum computingQuantum computing
Quantum computing
 
bhanu.pptx
bhanu.pptxbhanu.pptx
bhanu.pptx
 
CA_final_paper
CA_final_paperCA_final_paper
CA_final_paper
 
Quantum computing1
Quantum computing1Quantum computing1
Quantum computing1
 
Quantum comput ing
Quantum comput ingQuantum comput ing
Quantum comput ing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
 
Quantum Computing Seminar Presenatation(Simple format)
Quantum Computing Seminar Presenatation(Simple format)Quantum Computing Seminar Presenatation(Simple format)
Quantum Computing Seminar Presenatation(Simple format)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALAA Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Aditya kulshreshtha, (QUANTUM COMPUTING)
Aditya kulshreshtha, (QUANTUM COMPUTING)Aditya kulshreshtha, (QUANTUM COMPUTING)
Aditya kulshreshtha, (QUANTUM COMPUTING)
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
 
MASTER_THESIS-libre
MASTER_THESIS-libreMASTER_THESIS-libre
MASTER_THESIS-libre
 
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by Emran
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
quantumcomputingbysandy-170310190433.pdf
quantumcomputingbysandy-170310190433.pdfquantumcomputingbysandy-170310190433.pdf
quantumcomputingbysandy-170310190433.pdf
 

More from Ahmed Banafa

IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergence
Ahmed Banafa
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AI
Ahmed Banafa
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum Computing
Ahmed Banafa
 
IoT and Covid 19
IoT and Covid 19IoT and Covid 19
IoT and Covid 19
Ahmed Banafa
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
Ahmed Banafa
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
Ahmed Banafa
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfunding
Ahmed Banafa
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain management
Ahmed Banafa
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
Ahmed Banafa
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
Ahmed Banafa
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020
Ahmed Banafa
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
Ahmed Banafa
 
Ten Blockchain Applications
Ten Blockchain ApplicationsTen Blockchain Applications
Ten Blockchain Applications
Ahmed Banafa
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
Ahmed Banafa
 
Blockchain and AI
Blockchain and AIBlockchain and AI
Blockchain and AI
Ahmed Banafa
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU
Ahmed Banafa
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
Ahmed Banafa
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AI
Ahmed Banafa
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
Ahmed Banafa
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
Ahmed Banafa
 

More from Ahmed Banafa (20)

IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergence
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AI
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum Computing
 
IoT and Covid 19
IoT and Covid 19IoT and Covid 19
IoT and Covid 19
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfunding
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain management
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
 
Ten Blockchain Applications
Ten Blockchain ApplicationsTen Blockchain Applications
Ten Blockchain Applications
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
Blockchain and AI
Blockchain and AIBlockchain and AI
Blockchain and AI
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AI
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

Quantum Computing

  • 1. Quantum Computing Quantum computing is the area of study focused on developing computer technology based on the principles of quantum theory. The quantum computer, following the laws of quantum physics, would gain enormous processing power through the ability to be in multiple states, and to perform tasks using all possible permutations simultaneously. A Comparison of Classical and Quantum Computing Classical computing relies, at its ultimate level, on principles expressed by Boolean algebra. Data must be processed in an exclusive binary state at any point in time or bits. While the time that each transistor or capacitor need be either in 0 or 1 before switching states is now measurable in billionths of a second, there is still a limit as to how quickly these devices can be made to switch state. As we progress to smaller and faster circuits, we begin to reach the physical limits of materials and the threshold for classical laws of physics to apply. Beyond this, the quantum world takes over. In a quantum computer, a number of elemental particles such as electrons or photons can be used with either their charge or polarization acting as a representation of 0 and/or 1. Each of these particles is known as a quantum bit, or qubit, the nature and behavior of these particles form the basis of quantum computing. Quantum Superposition and Entanglement The two most relevant aspects of quantum physics are the principles of superposition and entanglement. Superposition: Think of a qubit as an electron in a magnetic field. The electron's spin may be either in alignment with the field, which is known as a spin-up state, or opposite to the field, which is known as a spin-down state. According to quantum law, the particle enters a superposition of states,
  • 2. in which it behaves as if it were in both states simultaneously. Each qubit utilized could take a superposition of both 0 and 1. Entanglement: Particles that have interacted at some point retain a type of connection and can be entangled with each other in pairs, in a process known as correlation. Knowing the spin state of one entangled particle - up or down - allows one to know that the spin of its mate is in the opposite direction. Quantum entanglement allows qubits that are separated by incredible distances to interact with each other instantaneously (not limited to the speed of light). No matter how great the distance between the correlated particles, they will remain entangled as long as they are isolated. Taken together, quantum superposition and entanglement create an enormously enhanced computing power. Where a 2-bit register in an ordinary computer can store only one of four binary configurations (00, 01, 10, or 11) at any given time, a 2-qubit register in a quantum computer can store all four numbers simultaneously, because each qubit represents two values. If more qubits are added, the increased capacity is expanded exponentially. Difficulties with Quantum Computers  Interference - During the computation phase of a quantum calculation, the slightest disturbance in a quantum system (say a stray photon or wave of EM radiation) causes the quantum computation to collapse, a process known as de-coherence. A quantum computer must be totally isolated from all external interference during the computation phase.  Error correction - Given the nature of quantum computing, error correction is ultra critical - even a single error in a calculation can cause the validity of the entire computation to collapse.  Output observance - Closely related to the above two, retrieving output data after a quantum calculation is complete risks corrupting the data. The Future of Quantum Computing The biggest and most important one is the ability to factorize a very large number into two prime numbers. That's really important because that's what almost all encryption of internet applications use and can be de-encrypted. A quantum computer should be able to do that relatively quickly. Calculating the positions of individual atoms in very large molecules like polymers and in viruses. The way that the particles interact with each other – if you have a quantum computer you could use it to develop drugs and understand how molecules work a bit better. Even though there are many problems to overcome, the breakthroughs in the last 15 years, and especially in the last 3, have made some form of practical quantum computing possible. However, the potential that this technology offers is attracting tremendous interest from both the government and the private sector. It is this potential that is rapidly breaking down the barriers to this technology, but whether all barriers can be broken, and when, is very much an open question.