SlideShare a Scribd company logo
Presented By:
Krishna M Patel - 120080116038
Priyanka G Patel - 120080116037
INDEX
 Computer Generation
 History
 Defination
 Why Quantum computing??
 introduction of Qubits
 How powerful are quantum computers
 Quantum algorithms
 Application
 Advantages and Disadvantages
 Present status
 Conclusion
 First Generation (1940-1956)
 Vacuum Tubes
 Second Generation (1956-1963)
 Transistors
 Third Generation (1964-1971)
 Integrated Circuits
 Fourth Generation (1971-present)
 Microprocessors
 Fifth Generation (Present and Beyond)
 Artificial Intelligence
Year Scientist Research
1982 Feynman Idea of creating machines
based on the laws of
quantum mechanics
instead of the laws of
classical physics.
1985 David Deutsch Developed the quantum
turing machine, showing
that quantum circuits are
universal.
1994 Peter Shor A quantum algorithm to
factor very large numbers
in polynomial time.
1997 Lov Grover Develops a quantum search
algorithm with O(√N)
complexity
History:
 Quantum computing is the area of study focused on developing computer technology based on
the principles of quantum theory, which explains the nature and behaviour of energy and matter
on the quantum (atomic and subatomic) level.
 Quantum Computer:
 A quantum computer is a computation device that makes direct use of quantum-mechanical
phenomena, such as superposition and entanglement, to perform operations on data.
 By 2020 we will hit natural limits on the size of transistors
 Max out on the number of transistors per chip
 Reach the minimum size for transistors
 Reach the limit of speed for devices
 Eventually, all computing will be done using some sort of alternative structure
 DNA
 Cellular Automation
 Quantum
 In quantum computing, a qubit or quantum bit is a unit of quantum information.
 Qubits represent atoms, ions, photons or electrons and their respective control devices that are
working together to act as computer memory and a processor.
 A qubit is a two-state quantum-mechanical system.
 Vertical polarization
 Horizontal polarization
 A qubit has a quantum register.
 Similar to qubit, a qutrit, qudit is also used for other level quantum system.
 The two states in which a qubit may be measured are known as basis states.
 They are represented by Dirac notation.
 States are conventionally written as |0> and |1>:
 An excited state representing |1> and a ground state representing |0>.
 |ѱ>=α|0> + β|1>,
 When we measure this qubit in the standard basis, the probability of outcome for |0> is |α|2 and
outcome for |1> is |β|2.
 |α|2 + |β|2 = 1
 Operation on qubits:
 unitary transformation
 Standard basis measurement
Excited
State
Ground
State
Nucleus
Electro
nState
|0>
State
|1>
Bits:
 The device computes by
manipulating those bits with the
help of logical gates.
 A classical computer has a memory
made up of bits, where each bit holds
either a one or a zero.
Qubits:
 The device computes by
manipulating those bits with the
help of quantum logic gates.
 A qubits can hold a one,a zero or
crucially a superpositoion of these.
 A single qubit can be forced into a superposition of the two states denoted by the
addition of the state vectors:
 A qubit in superposition is in both of the states |1> and |0> at the same time.
 DEFINITION
 Two things can overlap each other without interfering with each other.In classical
computers,electrons cannot occupy the same space at the same time.
 Entanglement is the ability of quantum systems to exhibit correlation between
states within a superposition.
 Imagine two qubits,each in the state |0>+|1>(a superposition of 0 and 1).We can
entangle the two qubits such that the measurement of one qubit is always
correlated to the measurement of other qubit.
 Some of quantum algorithms can turn hard mathematical problems into easy
ones.
 The time takes to execute the algorithm must increase no faster than a
polynomial function of the size of the input.
 Potential use of quantum factoring for code-breaking purpose has raised the
suggestion of building a quantum computer.
 It may help in cryptography.
 A quantum algorithm is an algorithm which runs on a realistic model of quantum
computation.
 Quantum algorithm is a step-by-step procedure.
 ALGORITHM
I. Jozsa algorithm
II. Simon’s algorithm
III. Shor’s algorithm
 Jozsa algorithm:
 This algorithm solves a black-box problem which probably requires exponentially many
queries to the black box for any deterministic classical computer, but can be done with
exactly 1 query by quantum computer.
 Simon’s algorithm:
 This algorithm solves a black-box problem exponentially faster the any classical
algorithm, including bounded-error probabilistic algorithms.
 Shor’s algorithm:
 This algorithm solves the discrete logarithm problem and integer factorization
problem in polynomial time, whereas the best known classical algorithms take super-
polynomial time.
 Even though no quantum computer has been built that hasn’t stopped the
proliferation of papers on various aspects of the subject.Many such papers have
been written defining language specification.
 QCL –(Bernhard-omer)like C syntax and very compelet.
 qGCL –(Paolo Zuliani and others)
 Quantum C-(Stephen Blaha)Currently just a specification.
 Quantum computer can be used in cryptography.
 Modelling and indexing of very large databases.
 It can be used to solving complex mathematical problems.
 Military searches of quantum computer.
 Google image search.
 Teleportation
 Improved error correction and error detection.
 Quantum cryptography describes the use of quantum mechanical effects to
perform cryptographic tasks or to break cryptographic systems.
 Well-known examples of quantum cryptography are the use of quantum
communication to exchange a key securely and the hypothetical use of quantum
computers that would allow the breaking of various popular public-key
encryption and signature schemes.
 The advantage of quantum cryptography lies in the fact that it allows the
completion of various cryptographic tasks that are proven or conjectured to be
impossible using only classical.
 The most well known and developed application of quantum cryptography
is quantum key distribution (QKD).
Advantages Disadvantages
Increase in computing power Although qubit can hold many possible
values but only one classical result can be
obtained from every run.
Advance in security Repeated runs may be necessary to obtain
the desired result.
Teleportation It is impossible to copy qubits(no-cloning
theorem).
Advantages and Disadvantage of Quantum computing
 Quantum physicists from the university of Innsbruck have set another world
record: They have achieved controlled entanglement of 14 quantum bits and, thus
realized the largest quantum register that has ever been produced.
 Researchers at delft University of technology have succeeded in carrying out
calculations with two qubits.
 December 19, 2001-IBM performs shor’s algorithm.
 It discusses the inevitability of quantum computers, how they originated, and
what is different about them from classical computers
 It is is intended to be accessible to the general people, so it will explain the basics
of a few quantum computer features at the risk of over-simplification
 Quantum computes are coming, and they will require a new way of looking at
computing
 If large-scale quantum computers can be built, they will be able to solve certain
problems much faster than any classical computer using the best currently known
algorithms(for example integer factorization using shor’s algorithm or the
simulation of quantum many-body systems).
 Desktop quantum computers expected by many within 10 years.
Quantum computing

More Related Content

What's hot

Quantum computing
Quantum computingQuantum computing
Quantum computing
Samira Riki
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Rajasekhar Manda
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the Future
VernBrownell
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
dharmsinghggu
 
Qunatum computing
Qunatum computing Qunatum computing
Qunatum computing
Shivangi Gupta
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - IntroductionAakash Martand
 
Aditya kulshreshtha, (QUANTUM COMPUTING)
Aditya kulshreshtha, (QUANTUM COMPUTING)Aditya kulshreshtha, (QUANTUM COMPUTING)
Aditya kulshreshtha, (QUANTUM COMPUTING)
Adityakulshreshtha4
 
Presentation quantum computers
Presentation quantum computersPresentation quantum computers
Presentation quantum computers
AzeemAhmed55
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
HarishKumar1779
 
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Professor Lili Saghafi
 
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili SaghafiQuantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Professor Lili Saghafi
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Keshav
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
Nancy Mann
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
Jonathan Tan
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Samrand Hassan
 
Quantum computing
Quantum computingQuantum computing
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentationVinayak Suresh
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Mehdi Rezaie
 

What's hot (20)

Quantum Computing ppt
Quantum Computing  pptQuantum Computing  ppt
Quantum Computing ppt
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the Future
 
Quantum computer ppt
Quantum computer pptQuantum computer ppt
Quantum computer ppt
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Qunatum computing
Qunatum computing Qunatum computing
Qunatum computing
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - Introduction
 
Aditya kulshreshtha, (QUANTUM COMPUTING)
Aditya kulshreshtha, (QUANTUM COMPUTING)Aditya kulshreshtha, (QUANTUM COMPUTING)
Aditya kulshreshtha, (QUANTUM COMPUTING)
 
Presentation quantum computers
Presentation quantum computersPresentation quantum computers
Presentation quantum computers
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
 
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili SaghafiQuantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentation
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 

Similar to Quantum computing

Quantum Computing Applications in Power Systems
Quantum Computing Applications in Power SystemsQuantum Computing Applications in Power Systems
Quantum Computing Applications in Power Systems
Power System Operation
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
Rishabh Jindal
 
Seminar
SeminarSeminar
Quantum computation a review
Quantum computation a reviewQuantum computation a review
Quantum computation a review
Editor Jacotech
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
gitrahekno
 
177
177177
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
Abhijit181377
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminar
Pankaj Kumar
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
Nolesh_Warke
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
Francisco J. Gálvez Ramírez
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Davide Nardone
 
Seminar on quatum
Seminar on quatumSeminar on quatum
Seminar on quatum
aprameyabr1
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
InnoTech
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
Jai Sipani
 
quantumcomputer-190731154949.pptx
quantumcomputer-190731154949.pptxquantumcomputer-190731154949.pptx
quantumcomputer-190731154949.pptx
AjayRaj912848
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
Kaushik Chowdary
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
IOSR Journals
 
Quantum Computing.pptx
Quantum Computing.pptxQuantum Computing.pptx
Quantum Computing.pptx
Biswadeep Mukhopadhyay
 
Strengths and limitations of quantum computing
Strengths and limitations of quantum computingStrengths and limitations of quantum computing
Strengths and limitations of quantum computing
Vinayak Sharma
 
Presentation on quantum_computing
Presentation on quantum_computingPresentation on quantum_computing
Presentation on quantum_computing
AltafAlam12
 

Similar to Quantum computing (20)

Quantum Computing Applications in Power Systems
Quantum Computing Applications in Power SystemsQuantum Computing Applications in Power Systems
Quantum Computing Applications in Power Systems
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Seminar
SeminarSeminar
Seminar
 
Quantum computation a review
Quantum computation a reviewQuantum computation a review
Quantum computation a review
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
 
177
177177
177
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminar
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Seminar on quatum
Seminar on quatumSeminar on quatum
Seminar on quatum
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
 
quantumcomputer-190731154949.pptx
quantumcomputer-190731154949.pptxquantumcomputer-190731154949.pptx
quantumcomputer-190731154949.pptx
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
 
Quantum Computing.pptx
Quantum Computing.pptxQuantum Computing.pptx
Quantum Computing.pptx
 
Strengths and limitations of quantum computing
Strengths and limitations of quantum computingStrengths and limitations of quantum computing
Strengths and limitations of quantum computing
 
Presentation on quantum_computing
Presentation on quantum_computingPresentation on quantum_computing
Presentation on quantum_computing
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

Quantum computing

  • 1. Presented By: Krishna M Patel - 120080116038 Priyanka G Patel - 120080116037
  • 2. INDEX  Computer Generation  History  Defination  Why Quantum computing??  introduction of Qubits  How powerful are quantum computers  Quantum algorithms  Application  Advantages and Disadvantages  Present status  Conclusion
  • 3.  First Generation (1940-1956)  Vacuum Tubes  Second Generation (1956-1963)  Transistors  Third Generation (1964-1971)  Integrated Circuits  Fourth Generation (1971-present)  Microprocessors  Fifth Generation (Present and Beyond)  Artificial Intelligence
  • 4. Year Scientist Research 1982 Feynman Idea of creating machines based on the laws of quantum mechanics instead of the laws of classical physics. 1985 David Deutsch Developed the quantum turing machine, showing that quantum circuits are universal. 1994 Peter Shor A quantum algorithm to factor very large numbers in polynomial time. 1997 Lov Grover Develops a quantum search algorithm with O(√N) complexity History:
  • 5.  Quantum computing is the area of study focused on developing computer technology based on the principles of quantum theory, which explains the nature and behaviour of energy and matter on the quantum (atomic and subatomic) level.  Quantum Computer:  A quantum computer is a computation device that makes direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data.
  • 6.  By 2020 we will hit natural limits on the size of transistors  Max out on the number of transistors per chip  Reach the minimum size for transistors  Reach the limit of speed for devices  Eventually, all computing will be done using some sort of alternative structure  DNA  Cellular Automation  Quantum
  • 7.  In quantum computing, a qubit or quantum bit is a unit of quantum information.  Qubits represent atoms, ions, photons or electrons and their respective control devices that are working together to act as computer memory and a processor.  A qubit is a two-state quantum-mechanical system.  Vertical polarization  Horizontal polarization  A qubit has a quantum register.  Similar to qubit, a qutrit, qudit is also used for other level quantum system.
  • 8.  The two states in which a qubit may be measured are known as basis states.  They are represented by Dirac notation.  States are conventionally written as |0> and |1>:  An excited state representing |1> and a ground state representing |0>.  |ѱ>=α|0> + β|1>,  When we measure this qubit in the standard basis, the probability of outcome for |0> is |α|2 and outcome for |1> is |β|2.  |α|2 + |β|2 = 1  Operation on qubits:  unitary transformation  Standard basis measurement Excited State Ground State Nucleus Electro nState |0> State |1>
  • 9. Bits:  The device computes by manipulating those bits with the help of logical gates.  A classical computer has a memory made up of bits, where each bit holds either a one or a zero. Qubits:  The device computes by manipulating those bits with the help of quantum logic gates.  A qubits can hold a one,a zero or crucially a superpositoion of these.
  • 10.  A single qubit can be forced into a superposition of the two states denoted by the addition of the state vectors:  A qubit in superposition is in both of the states |1> and |0> at the same time.  DEFINITION  Two things can overlap each other without interfering with each other.In classical computers,electrons cannot occupy the same space at the same time.
  • 11.  Entanglement is the ability of quantum systems to exhibit correlation between states within a superposition.  Imagine two qubits,each in the state |0>+|1>(a superposition of 0 and 1).We can entangle the two qubits such that the measurement of one qubit is always correlated to the measurement of other qubit.
  • 12.  Some of quantum algorithms can turn hard mathematical problems into easy ones.  The time takes to execute the algorithm must increase no faster than a polynomial function of the size of the input.  Potential use of quantum factoring for code-breaking purpose has raised the suggestion of building a quantum computer.  It may help in cryptography.
  • 13.  A quantum algorithm is an algorithm which runs on a realistic model of quantum computation.  Quantum algorithm is a step-by-step procedure.  ALGORITHM I. Jozsa algorithm II. Simon’s algorithm III. Shor’s algorithm
  • 14.  Jozsa algorithm:  This algorithm solves a black-box problem which probably requires exponentially many queries to the black box for any deterministic classical computer, but can be done with exactly 1 query by quantum computer.  Simon’s algorithm:  This algorithm solves a black-box problem exponentially faster the any classical algorithm, including bounded-error probabilistic algorithms.  Shor’s algorithm:  This algorithm solves the discrete logarithm problem and integer factorization problem in polynomial time, whereas the best known classical algorithms take super- polynomial time.
  • 15.  Even though no quantum computer has been built that hasn’t stopped the proliferation of papers on various aspects of the subject.Many such papers have been written defining language specification.  QCL –(Bernhard-omer)like C syntax and very compelet.  qGCL –(Paolo Zuliani and others)  Quantum C-(Stephen Blaha)Currently just a specification.
  • 16.  Quantum computer can be used in cryptography.  Modelling and indexing of very large databases.  It can be used to solving complex mathematical problems.  Military searches of quantum computer.  Google image search.  Teleportation  Improved error correction and error detection.
  • 17.  Quantum cryptography describes the use of quantum mechanical effects to perform cryptographic tasks or to break cryptographic systems.  Well-known examples of quantum cryptography are the use of quantum communication to exchange a key securely and the hypothetical use of quantum computers that would allow the breaking of various popular public-key encryption and signature schemes.  The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical.  The most well known and developed application of quantum cryptography is quantum key distribution (QKD).
  • 18. Advantages Disadvantages Increase in computing power Although qubit can hold many possible values but only one classical result can be obtained from every run. Advance in security Repeated runs may be necessary to obtain the desired result. Teleportation It is impossible to copy qubits(no-cloning theorem). Advantages and Disadvantage of Quantum computing
  • 19.  Quantum physicists from the university of Innsbruck have set another world record: They have achieved controlled entanglement of 14 quantum bits and, thus realized the largest quantum register that has ever been produced.  Researchers at delft University of technology have succeeded in carrying out calculations with two qubits.  December 19, 2001-IBM performs shor’s algorithm.
  • 20.  It discusses the inevitability of quantum computers, how they originated, and what is different about them from classical computers  It is is intended to be accessible to the general people, so it will explain the basics of a few quantum computer features at the risk of over-simplification  Quantum computes are coming, and they will require a new way of looking at computing  If large-scale quantum computers can be built, they will be able to solve certain problems much faster than any classical computer using the best currently known algorithms(for example integer factorization using shor’s algorithm or the simulation of quantum many-body systems).  Desktop quantum computers expected by many within 10 years.