SlideShare a Scribd company logo
UANTUM Computing
By:
M Raja Sekhar
OVERVIEW
• Introduction and History
a. Classical Computers
b. Quantum Computers
• Data Representation
• Conclusion and Scope
Evolution of Classical Computers
• First generation(1939-’54)-Vacuum tubes
• Second generation(1954-’59)-Transistors
• Third generation(1959-’71)- IC
• Fourth generation(1971-’91)- Microprocessor
• Fifth generation(1991 & beyond)
Comment on Classical Computer::
• Gordon Moore, Intel Co-founder said that the number of transistors economically
crammed into a single computer chip was doubling every two years.
Functions of Classical Computers
•Accurate and speedy computation machine
•Part of life because logical work can also be done
Advantages of Classical Computer
• Any complex computation or logical work like laboratory work
become easy
• Many kinds of numerical problems cannot be solved using
conventional computers.
• Example: Factorization of a number
• The computer time required to factor an integer containing N
digits is believed to increase exponentially with N.
Concepts of Quantum Computers..
 Introduction & History
Basic concept of quantum computer
 Applications
 Advantages
 Disadvantages and Problems
 Future work
 The word "quantum", in quantum computer, originates from "quantum
mechanics," a basic theory in physics. In brief, on the scale of atoms and
molecules, matter behaves in a quantum manner.
What does "quantum" mean?
INTRODUCTION
What is a Quantum Computer?
 A quantum computer is a machine that performs calculations based on the
laws of quantum mechanics, which is the behavior of particles at the sub-atomic
level.
HISTORY
• In 1918 - Max Planck’s -Energy quantum
• In 1921- Einstein’s discovery of the photon
• In 1980 - Idea of quantum computation
• In 1996, Grover’s came up with an algorithm to search a name in unsorted
database. Grover’s algorithm and the law of super-positioning makes this
possible.
• (Super-positioning is discussed later in this PPT)
• In December of last year, Anton Zeilinger made a fantastic accomplishment.
This feat was achieved using a principle called quantum entanglement.
• (quantum entanglement is discussed later in this PPT)
Basic Concept Of Quantum Computers & Differences With Existing Computers:
• In existing computers, all information is expressed in terms of 0s and 1s, and the entity
that carries such information is called a "bit.“
• A bit can be in either a 0 or 1 state at any one moment in time.
• A quantum computer, on the other hand, uses a “quantum bit” or "qubit" instead of a bit.
• A qubit also makes use of two states (0 and 1) to hold information, but in contrast to a bit,
In this state, a qubit can take on the properties of 0 and 1 simultaneously at any one
moment.
• Accordingly, two qubits in this state can express the four values of 00, 01, 10, and 11 all
at one time .
A qubit in superposition is in both of the states
|1> and |0> at the same time.
Classical bit Vs Qubits:
• Classical bit: {0, 1}
• Qubits: {0, 1, superposed states of 0 and 1}
HOW Q-bits Working in QUANTUM COMPUTER(VIDEO 1)
There is much that is different between quantum computers and classical computers.
But am going to explain only few:
1. Quantum Super Positioning
2. Quantum Entanglement
3. Quantum Teleportation
WHAT IS DIFFERENT ABOUT QUANTUM COMPUTERS?
Applications:
Quantum Superposition
• Super Positioning is a big word for an old concept: that two things can
overlap each other without interfering with each other.
• In classical computers, electrons cannot occupy the same space at the same
time, but as waves, they can.
• One may think of this as a vector of the probabilities drawn in a two-
dimensional coordinate system of the Complex plane, that is, coordinates of
the form x+iy where
• x is a coordinate on the Real number line, and
• y is a coordinate on the Imaginary number line.
• Classical bits are either vectors of 0 or 1 and have no Imaginary component.
•Quantum bits, or "qubits", have both components.
•If the probabilities were equal, the vector could be represented
as 45 degrees from vertical; if the probability of 1 were twice
that of 0, the vector could be represented as 30 degrees from
vertical.
•This vector represents the superposition of the probability of 1
and the probability of 0 simultaneously. In this way, the state
vectors of classical bits are "collapsed" qubit state vectors
How Superposition State Working in QUANTUM COMPUTER(VIDEO 2)
 Entanglement is the ability of quantum systems to exhibit correlations
between states within a superposition.
 Quantum entanglement is one of the central principles of quantum physics,
though it is also highly misunderstood.
 In short, quantum entanglement means that multiple particles are linked
together in a way such that the measurement of one particle's quantum state
determines the possible quantum states of the other particles.
 When this happens, the state of the two particles is said to be entangled.
Quantum Entanglement
Quantum Teleportation
• Quantum teleportation is a technique used to transfer information on a
quantum level, usually from one particle to another.
• Its distinguishing feature is that it can transmit the information present in a
quantum superposition, useful for quantum communication and
computation.
Applications:
• Encryption Technology
• Ultra-secure And Super-dense Communications
• Improved Error Correction And Error Detection
• Molecular Simulations
• True Randomness
• Cryptography
• Searching
• Factorization
• Simulating
• Encryption Problem & Quantum Chemistry Problem
Advantages :
• Could process massive amount of complex data.
• Ability to solve scientific and commercial problems.
• Process data in a much faster speed.
• Capability to convey more accurate answers.
• More can be computed in less time.
• These are used to protect secure Web pages, encrypted email, and many
other types of data.
 Hard to control quantum particles
 Lots of heat
 Expensive
 Difficult to build
 Not suitable for word processing and email.
 Problem of it need of a noise free & Cool Environment.
 Complex hardware schemes like superconductors
Disadvantages and Problems:
• Silicon Quantum Computer
• It may become technology sooner than we expect
• At the current rate of chip miniaturization, energy efficiency, and economics, the
classical computer of the year 2020 (if it could happen at all), would contain a
CPU running at 40 GHz (or 40,000 MHz), with 160 GB (160,000 MB) RAM, and
run on 40 watts of power.
• New algorithms and communication
• Maximum exploitation
• Simulate other quantum systems.
Feature work :
Conclusion and Scope
 Very Advance Technology
 Very Faster & Powerful
 Stage of Infancy
 Implementation is Difficult
ueries
Any

More Related Content

What's hot

Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
Jonathan Tan
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Samira Riki
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminar
Pankaj Kumar
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - IntroductionAakash Martand
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Deepankar Sandhibigraha
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
dharmsinghggu
 
Quantum computing
Quantum computingQuantum computing
Quantum computers
Quantum computersQuantum computers
Quantum computers
Nolesh_Warke
 
Quantum computer
Quantum computerQuantum computer
Quantum computerNikhil Eg
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
Kumar Abhijeet
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
Rishabh Jindal
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Keshav
 
Quantum computing in machine learning
Quantum computing in machine learningQuantum computing in machine learning
Quantum computing in machine learning
khalidhassan105
 
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentationVinayak Suresh
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
Jai Sipani
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the Future
VernBrownell
 
Quantum computing
Quantum computing Quantum computing
Quantum computing
Ranajeet Barik
 
Quantum Computing: The Why and How
Quantum Computing: The Why and HowQuantum Computing: The Why and How
Quantum Computing: The Why and How
inside-BigData.com
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
MuhammadHaroon188
 

What's hot (20)

Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Quantum computer ppt
Quantum computer pptQuantum computer ppt
Quantum computer ppt
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminar
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - Introduction
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computing in machine learning
Quantum computing in machine learningQuantum computing in machine learning
Quantum computing in machine learning
 
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentation
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the Future
 
Quantum computing
Quantum computing Quantum computing
Quantum computing
 
Quantum Computing: The Why and How
Quantum Computing: The Why and HowQuantum Computing: The Why and How
Quantum Computing: The Why and How
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 

Viewers also liked

Quantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsQuantum Computing - Basic Concepts
Quantum Computing - Basic Concepts
Sendash Pangambam
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
Nancy Mann
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationswtyru1989
 
Quantum Entanglement
Quantum EntanglementQuantum Entanglement
Quantum EntanglementAlexis Diaz
 
A quantum of possibilities: The business advantages of taking the quantum leap
A quantum of possibilities: The business advantages of taking the quantum leapA quantum of possibilities: The business advantages of taking the quantum leap
A quantum of possibilities: The business advantages of taking the quantum leap
Cynthya Peranandam
 
Spooky action from a distance
Spooky action from a distanceSpooky action from a distance
Spooky action from a distance
Eran Sinbar
 
ADF Taskflows for beginners
ADF Taskflows for beginnersADF Taskflows for beginners
ADF Taskflows for beginners
Rajasekhar Manda
 
Quantum Entanglement
Quantum EntanglementQuantum Entanglement
Quantum Entanglement
pixiejen
 
Qunatum computing
Qunatum computing Qunatum computing
Qunatum computing
Shivangi Gupta
 
You always dreamt of your own quantum computer. now you can have it in the cloud
You always dreamt of your own quantum computer. now you can have it in the cloudYou always dreamt of your own quantum computer. now you can have it in the cloud
You always dreamt of your own quantum computer. now you can have it in the cloud
Eric Cattoir
 
Quantum computer presentation
Quantum computer presentationQuantum computer presentation
Quantum computer presentation
kevinl94303
 
Applications of Quantum Entanglement Presentation
Applications of Quantum Entanglement PresentationApplications of Quantum Entanglement Presentation
Applications of Quantum Entanglement Presentation
Paris-Anne O'Shea
 
Quantum entanglement
Quantum entanglementQuantum entanglement
Quantum entanglementAKM666
 
Quantum Numbers
Quantum NumbersQuantum Numbers
Quantum Numbers
walt sautter
 
Introduction to Quantum Computation. Part - 1
Introduction to Quantum Computation. Part - 1Introduction to Quantum Computation. Part - 1
Introduction to Quantum Computation. Part - 1
Arunabha Saha
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Sai Varun Padala
 
Seminar report on quantum computing
Seminar report on quantum computingSeminar report on quantum computing
Seminar report on quantum computing
Savita Sharma
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographySukhdeep Kaur
 

Viewers also liked (18)

Quantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsQuantum Computing - Basic Concepts
Quantum Computing - Basic Concepts
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applications
 
Quantum Entanglement
Quantum EntanglementQuantum Entanglement
Quantum Entanglement
 
A quantum of possibilities: The business advantages of taking the quantum leap
A quantum of possibilities: The business advantages of taking the quantum leapA quantum of possibilities: The business advantages of taking the quantum leap
A quantum of possibilities: The business advantages of taking the quantum leap
 
Spooky action from a distance
Spooky action from a distanceSpooky action from a distance
Spooky action from a distance
 
ADF Taskflows for beginners
ADF Taskflows for beginnersADF Taskflows for beginners
ADF Taskflows for beginners
 
Quantum Entanglement
Quantum EntanglementQuantum Entanglement
Quantum Entanglement
 
Qunatum computing
Qunatum computing Qunatum computing
Qunatum computing
 
You always dreamt of your own quantum computer. now you can have it in the cloud
You always dreamt of your own quantum computer. now you can have it in the cloudYou always dreamt of your own quantum computer. now you can have it in the cloud
You always dreamt of your own quantum computer. now you can have it in the cloud
 
Quantum computer presentation
Quantum computer presentationQuantum computer presentation
Quantum computer presentation
 
Applications of Quantum Entanglement Presentation
Applications of Quantum Entanglement PresentationApplications of Quantum Entanglement Presentation
Applications of Quantum Entanglement Presentation
 
Quantum entanglement
Quantum entanglementQuantum entanglement
Quantum entanglement
 
Quantum Numbers
Quantum NumbersQuantum Numbers
Quantum Numbers
 
Introduction to Quantum Computation. Part - 1
Introduction to Quantum Computation. Part - 1Introduction to Quantum Computation. Part - 1
Introduction to Quantum Computation. Part - 1
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Seminar report on quantum computing
Seminar report on quantum computingSeminar report on quantum computing
Seminar report on quantum computing
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 

Similar to Quantum Computing

quantum computing basics roll no 15.pptx
quantum computing basics roll no 15.pptxquantum computing basics roll no 15.pptx
quantum computing basics roll no 15.pptx
toget48099
 
bhanu.pptx
bhanu.pptxbhanu.pptx
bhanu.pptx
aswinichenemalla
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
LAKSHMI TEJA SAYABARAPU
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
Abhijit181377
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
Ahmed Banafa
 
Aditya kulshreshtha, (QUANTUM COMPUTING)
Aditya kulshreshtha, (QUANTUM COMPUTING)Aditya kulshreshtha, (QUANTUM COMPUTING)
Aditya kulshreshtha, (QUANTUM COMPUTING)
Adityakulshreshtha4
 
Quantum computers
Quantum   computersQuantum   computers
Quantum computers
Omkar Cool
 
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
Quantum Computers  PART 1 & 2 by Prof Lili SaghafiQuantum Computers  PART 1 & 2 by Prof Lili Saghafi
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
Professor Lili Saghafi
 
Quantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
Quantum Computers New Generation of Computers PART1 by Prof Lili SaghafiQuantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
Quantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
Professor Lili Saghafi
 
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiQuantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Professor Lili Saghafi
 
quantumcomputers-090715210946-phpapp01.pptx
quantumcomputers-090715210946-phpapp01.pptxquantumcomputers-090715210946-phpapp01.pptx
quantumcomputers-090715210946-phpapp01.pptx
SateeshKumar410844
 
Quantum Computing by Elisha.pptx
Quantum  Computing by Elisha.pptxQuantum  Computing by Elisha.pptx
Quantum Computing by Elisha.pptx
AsheMathew
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
JAy Patel
 
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by Emran
Emran Hossain
 
Introduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdfIntroduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdf
sunnypatil1778
 
Seminar on quatum
Seminar on quatumSeminar on quatum
Seminar on quatum
aprameyabr1
 
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALAA Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
Saikiran Panjala
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Mehdi Rezaie
 
Strengths and limitations of quantum computing
Strengths and limitations of quantum computingStrengths and limitations of quantum computing
Strengths and limitations of quantum computing
Vinayak Sharma
 
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
Mike Hogarth, MD, FACMI, FACP
 

Similar to Quantum Computing (20)

quantum computing basics roll no 15.pptx
quantum computing basics roll no 15.pptxquantum computing basics roll no 15.pptx
quantum computing basics roll no 15.pptx
 
bhanu.pptx
bhanu.pptxbhanu.pptx
bhanu.pptx
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
 
Aditya kulshreshtha, (QUANTUM COMPUTING)
Aditya kulshreshtha, (QUANTUM COMPUTING)Aditya kulshreshtha, (QUANTUM COMPUTING)
Aditya kulshreshtha, (QUANTUM COMPUTING)
 
Quantum computers
Quantum   computersQuantum   computers
Quantum computers
 
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
Quantum Computers  PART 1 & 2 by Prof Lili SaghafiQuantum Computers  PART 1 & 2 by Prof Lili Saghafi
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
 
Quantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
Quantum Computers New Generation of Computers PART1 by Prof Lili SaghafiQuantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
Quantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
 
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiQuantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
 
quantumcomputers-090715210946-phpapp01.pptx
quantumcomputers-090715210946-phpapp01.pptxquantumcomputers-090715210946-phpapp01.pptx
quantumcomputers-090715210946-phpapp01.pptx
 
Quantum Computing by Elisha.pptx
Quantum  Computing by Elisha.pptxQuantum  Computing by Elisha.pptx
Quantum Computing by Elisha.pptx
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by Emran
 
Introduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdfIntroduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdf
 
Seminar on quatum
Seminar on quatumSeminar on quatum
Seminar on quatum
 
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALAA Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Strengths and limitations of quantum computing
Strengths and limitations of quantum computingStrengths and limitations of quantum computing
Strengths and limitations of quantum computing
 
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 

Quantum Computing

  • 2. OVERVIEW • Introduction and History a. Classical Computers b. Quantum Computers • Data Representation • Conclusion and Scope
  • 3. Evolution of Classical Computers • First generation(1939-’54)-Vacuum tubes • Second generation(1954-’59)-Transistors • Third generation(1959-’71)- IC • Fourth generation(1971-’91)- Microprocessor • Fifth generation(1991 & beyond)
  • 4. Comment on Classical Computer:: • Gordon Moore, Intel Co-founder said that the number of transistors economically crammed into a single computer chip was doubling every two years. Functions of Classical Computers •Accurate and speedy computation machine •Part of life because logical work can also be done
  • 5. Advantages of Classical Computer • Any complex computation or logical work like laboratory work become easy • Many kinds of numerical problems cannot be solved using conventional computers. • Example: Factorization of a number • The computer time required to factor an integer containing N digits is believed to increase exponentially with N.
  • 6. Concepts of Quantum Computers..  Introduction & History Basic concept of quantum computer  Applications  Advantages  Disadvantages and Problems  Future work
  • 7.  The word "quantum", in quantum computer, originates from "quantum mechanics," a basic theory in physics. In brief, on the scale of atoms and molecules, matter behaves in a quantum manner. What does "quantum" mean? INTRODUCTION What is a Quantum Computer?  A quantum computer is a machine that performs calculations based on the laws of quantum mechanics, which is the behavior of particles at the sub-atomic level.
  • 8. HISTORY • In 1918 - Max Planck’s -Energy quantum • In 1921- Einstein’s discovery of the photon • In 1980 - Idea of quantum computation • In 1996, Grover’s came up with an algorithm to search a name in unsorted database. Grover’s algorithm and the law of super-positioning makes this possible. • (Super-positioning is discussed later in this PPT) • In December of last year, Anton Zeilinger made a fantastic accomplishment. This feat was achieved using a principle called quantum entanglement. • (quantum entanglement is discussed later in this PPT)
  • 9. Basic Concept Of Quantum Computers & Differences With Existing Computers: • In existing computers, all information is expressed in terms of 0s and 1s, and the entity that carries such information is called a "bit.“ • A bit can be in either a 0 or 1 state at any one moment in time. • A quantum computer, on the other hand, uses a “quantum bit” or "qubit" instead of a bit. • A qubit also makes use of two states (0 and 1) to hold information, but in contrast to a bit, In this state, a qubit can take on the properties of 0 and 1 simultaneously at any one moment. • Accordingly, two qubits in this state can express the four values of 00, 01, 10, and 11 all at one time .
  • 10. A qubit in superposition is in both of the states |1> and |0> at the same time.
  • 11. Classical bit Vs Qubits: • Classical bit: {0, 1} • Qubits: {0, 1, superposed states of 0 and 1}
  • 12. HOW Q-bits Working in QUANTUM COMPUTER(VIDEO 1)
  • 13. There is much that is different between quantum computers and classical computers. But am going to explain only few: 1. Quantum Super Positioning 2. Quantum Entanglement 3. Quantum Teleportation WHAT IS DIFFERENT ABOUT QUANTUM COMPUTERS? Applications:
  • 14. Quantum Superposition • Super Positioning is a big word for an old concept: that two things can overlap each other without interfering with each other. • In classical computers, electrons cannot occupy the same space at the same time, but as waves, they can. • One may think of this as a vector of the probabilities drawn in a two- dimensional coordinate system of the Complex plane, that is, coordinates of the form x+iy where • x is a coordinate on the Real number line, and • y is a coordinate on the Imaginary number line. • Classical bits are either vectors of 0 or 1 and have no Imaginary component.
  • 15. •Quantum bits, or "qubits", have both components. •If the probabilities were equal, the vector could be represented as 45 degrees from vertical; if the probability of 1 were twice that of 0, the vector could be represented as 30 degrees from vertical. •This vector represents the superposition of the probability of 1 and the probability of 0 simultaneously. In this way, the state vectors of classical bits are "collapsed" qubit state vectors
  • 16. How Superposition State Working in QUANTUM COMPUTER(VIDEO 2)
  • 17.  Entanglement is the ability of quantum systems to exhibit correlations between states within a superposition.  Quantum entanglement is one of the central principles of quantum physics, though it is also highly misunderstood.  In short, quantum entanglement means that multiple particles are linked together in a way such that the measurement of one particle's quantum state determines the possible quantum states of the other particles.  When this happens, the state of the two particles is said to be entangled. Quantum Entanglement
  • 18.
  • 19. Quantum Teleportation • Quantum teleportation is a technique used to transfer information on a quantum level, usually from one particle to another. • Its distinguishing feature is that it can transmit the information present in a quantum superposition, useful for quantum communication and computation.
  • 20. Applications: • Encryption Technology • Ultra-secure And Super-dense Communications • Improved Error Correction And Error Detection • Molecular Simulations • True Randomness • Cryptography • Searching • Factorization • Simulating • Encryption Problem & Quantum Chemistry Problem
  • 21. Advantages : • Could process massive amount of complex data. • Ability to solve scientific and commercial problems. • Process data in a much faster speed. • Capability to convey more accurate answers. • More can be computed in less time. • These are used to protect secure Web pages, encrypted email, and many other types of data.
  • 22.  Hard to control quantum particles  Lots of heat  Expensive  Difficult to build  Not suitable for word processing and email.  Problem of it need of a noise free & Cool Environment.  Complex hardware schemes like superconductors Disadvantages and Problems:
  • 23. • Silicon Quantum Computer • It may become technology sooner than we expect • At the current rate of chip miniaturization, energy efficiency, and economics, the classical computer of the year 2020 (if it could happen at all), would contain a CPU running at 40 GHz (or 40,000 MHz), with 160 GB (160,000 MB) RAM, and run on 40 watts of power. • New algorithms and communication • Maximum exploitation • Simulate other quantum systems. Feature work :
  • 24. Conclusion and Scope  Very Advance Technology  Very Faster & Powerful  Stage of Infancy  Implementation is Difficult