SlideShare a Scribd company logo
SEMINAR ON
QUANTUM COMPUTERS
PRESENTED BY :- APRAMEYA.B.R
RAHUL.R
TODAY WE WOULD BE GOING THROUGH
• INTERDUCTION
• COMPUTING GENERATIONS
• INTERDUCTION TO QUANTUM COMPUTERS
• Why quantum computers
• What is quantum computing
• Quantum logic and representation
• Wheare did the idea come from
• Basic positons of quantum bits
• What makes quantum computer different from other computers
• Quantum gates
INTRODUCTION
Since 1960S the power of computers are growing exponentially allowing computers to become smaller and
smaller with more this process is about to meet its physical limits . Computer parts are approaching the
size of an atom
COMPUTING GENERATIONS
• First generation computing(1940-1956) vacuum tubes
• Second generation computing(1956-1963) transistors
• Third generation computing (1964-1961) integrating circuits
• Forth generation computing(1971-present) microprocessors
• Fifth generation computing(present) artificial intelligence
Vaccume tubes
BRIEFING ABOUT QUANTUM COMPUTING
• Computer chip contains modules which contains modules, which contains logic gates, which contains
transistors, a transistors is a Smallest part of the computer ,basically it’s a switch that can block or open
the way for the information passing through it . This information is made up of bits which can be set
either to 0 or 1 , combination of serval bits can be used to represent more complex information
transistors are combined to create logic gates .combinations of logic gates form modules. Modules ca be
used to perform operations like any athematic functions and logical functions. Which can calculate any
complex problems like astrophysics , deriving equations etc..
WHY QUANTUM COMPUTING
• Today a typical scale of transistor is 14 nanometers which is about 500 times smaller then a red blood
cell. as transistors are shrinking only to the size of on few atoms. electrons may transfer themselves to
other side of the blocked passage
• BY 2025 to 2030, transistors will be so small and it will generate so much heat that the standard silicon
technology may even collapse.
• Already intel has implemented 14 nm silicon technology
• If scale becomes too small electrons may tunnel(pass) through the blocked path and corrupting the
signals
RichardFeynman envasionsof
quantum computing
Peter Shor develops
algorithm that could be
used forquantum
code- breaking
Eddie Farhi at MIT
develops idea for
adiabaticquantum computing
David Deutschdescribes universal quantum computer
D-Wave Systems founded by Geordie Rose
D-WAVE were the first one to introduce to a commercial quantum computer
WHAT IS QUANTUM COMPUTING
• Quantum computer is a computer which performs
calculations based on the LAW of quantum mechanics
QUANTUM LOGICS AND REPRASENTATION
 Quantum Computers use quantum mechanical phenomena-
• Entanglement
• Superposition
 Quantum computational operations were executed on a very small number of Qubits
(quantum bits)
BASIC CONSEPT OF QUANTUM DATA BITS(QBITS)
• In existing computers, all information is expressed in terms of 0s and 1s, and the entity
• that carries such information is called a "bit.“
• A bit can be in either a 0 or 1 state at any one moment in time.
• A quantum computer, on the other hand, uses a “quantum bit” or "qubit" instead of a bit.
• A qubit also makes use of two states (0 and 1) to hold information, but in contrast to a bit, In this state, a qubit can
take on the properties of 0 and 1 simultaneously at any one moment.
• Accordingly, two qubits in this state can express the four values of 00, 01, 10, and 11 all at one time .
REPRESENTATION OF DATA IN QUANTUM
COMPUTING USING QUBITS
• A bit (0 or 1) of data is represented by a single atom that is in one of two states denoted by |0> and
|1>. A single bit of this form is known as a qubit
• A physical implementation of a qubit could use the two energy levels of an atom. An excited state
representing |1> and a ground state representing |0>.
State 0
State 1
SQUID A QUANTUM TRANSISTOR
SUPERPOSITONS :- HOW IT WORKS
WHAT MAKES QUANTUM COMPUTERS DIFFRENT
• There is much that is different between quantum computers and classical computers.
• But am going to explain only few:
1. Quantum Super Positioning
2. Quantum Entanglement
3. Quantum Teleportation
KEY QUANTUM EFFECTS
superpositioning Quantum Tunneling Entanglement
QUANTUMSUPERPOSITION
• Super Positioning is a big word for an old concept: that two things can overlap each other without
interfering with each other.
• In classical computers, electrons cannot occupy the same space at the same
• time, but as waves, they can.
• One may think of this as a vector of the probabilities drawn in a two- dimensional coordinate system of the
Complex plane, that is, coordinates of the form x+iy where
• x is a coordinate on the Real number line, and
• y is a coordinate on the Imaginary number line.
• Classical bits are either vectors of 0 or 1 and have no Imaginary component.
OPERATIONS ON QUBITS - REVERSIBLE LOGIC
Due to the nature of quantum physics, the destruction of information
in a gate will cause heat to be evolved which can destroy the
superposition of qubits.
Ex.
The AND Gate
A
B
C
A B C
0 0 0
0 1 0
1 0 0
1 1 1
Input Output
In these 3 cases,
information is being
destroyed
QUANTUM GATES
 Quantum Gates are similar to classical gates, but do not have a degenerate
output. i.e. their original input state can be derived from their output state,
uniquely. They must be reversible.
 This means that a deterministic computation can be performed on a quantum
computer only if it is reversible. Luckily, it has been shown that any
deterministic computation can be made reversible.(Charles Bennet, 1973)
QUANTUM LOGIC GATES
 Commonly used gates
Hadamard gate
Pauli-X gate
Pauli-Y gate
Pauli-Z gate
Phase shift gates
Swap gate
Controlled gates
QUANTUM GATES - HADAMARD
Simplest gate involves one qubit and is called a Hadamard Gate
(also known as a square-root of NOT gate.)Used to put qubits
into superposition.
H
State
|0>
State
|0> + |1>
H
State
|1>
Note: Two Hadamard gates used in
succession can be used as a NOT gate
QUANTUM GATES - CONTROLLED NOT
A gate which operates on two qubits is called a Controlled-NOT (CN) Gate. If
the bit on the control line is 1, invert the bit on the target line.
A - Target
B - Control
A B A’ B’
0 0 0 0
0 1 1 1
1 0 1 0
1 1 0 1
Input Output
Note: The CN gate has a similar behavior
to the XOR gate with some extra
information to make it reversible.
A’
B’
EXAMPLE OPERATION - MULTIPLICATION BY 2
We can build a reversible logic circuit to calculate multiplication by 2 using
CN gates arranged in the following manner:
Carry Bit
Carry
Bit
Ones
Bit
Carry
Bit
Ones
Bit
0 0 0 0
0 1 1 0
Input Output
Ones Bit
0
H
QUANTUMENTANGLEMENT
 Entanglement is the ability of quantum systems to exhibit correlations between
states within a superposition.
 Quantum entanglement is one of the central principles of quantum physics, though it is also
highly misunderstood.
 In short, quantum entanglement means that multiple particles are linked together in a way
such that the measurement of one particle's quantum state determines the possible quantum
states of the other particles.
 When this happens, the state of the two particles is said to be entangled.
QUANTUMTELEPORTATION
• Quantum teleportation is a technique used to transfer information on a quantum level,
usually from one particle to another.
• Its distinguishing feature is that it can transmit the information present in a quantum
superposition, useful for quantum communication and computation.
SHOR’S ALGORITHM
• Name after mathematician peter shor, is quantum (an algorithm that runs on a quantum computer) for
integer factorization in 1994. informally, it solves the following problem given an integer N, find its
prime factor
• Example:- factor a number into primes M = p*q
• classical t ~ exp(0(n1/2 log2/3n) = 28,000,000,000,000,000,000,000 years
• Quantum t~0(n3) = 100 seconds
A FABRIC OF PROGRAMMABLE ELEMENTS
• In order to go from a single qubit to a multi-qubit processor, the qubits must be connected together
such that they can exchange information. This is achieved through the use of elements known as
couplers. The couplers are also made from superconducting loops. By putting many such elements
(qubits and couplers) together, we can start to build up a fabric of quantum devices that are
programmable. Figure 2 shows a schematic of 8 connected qubits. The loop shown in the previous
diagram has now been stretched out to form one of the long gold rectangles. At the points where the
rectangles cross, the couplers have been shown schematically as blue dots.
•
QUANTUM PROCESSOR ADDRESSING
• There are several additional components necessary for processor operation. A large part of the circuitry that
surrounds the qubits and couplers is a framework of switches (also formed from Josephson junctions) forming
circuitry which both addresses each qubit (routes pulses of magnetic information to the correct places on
chip) and stores that information in a magnetic memory element local to each device. The majority of the
Josephson junctions in a D-Wave quantum processing unit (QPU) are used to make up this circuitry.
Additionally, there are readout devices attached to each qubit. During the computation these devices are
inactive and do not affect the qubits' behavior. After the computation has finished, and the qubits have settled
into their final (classical) 0 or 1 states, the readouts are used to query the value held by each qubit and return
the answer as a bit string of 0's and 1's to the end user. Here is a video showing how some of the QPU
elements were combined to produce the computational fabric at the core of the D-Wave One™ 128-qubit
QPU, which pre-dates the current 2000-qubit D-Wave 2000Q™ QPU.
•
MANUFACTURING OF QUANTUM PROCESSING UNIT
• QPUs after fabrication in a superconducting electronics foundry. The QPUs are 'stamped' onto a silicon
wafer using techniques modified from the processes used to make semiconductor integrated circuits.
There are several QPUs visible on this wafer image. The largest, near the bottom center, has 128 qubits
connected together with 352 connection elements between them. The qubit/coupler circuits on each
individual QPU are the cross-hatched looking patches visible in this image. This is known as a Rainier
QPU and it was the type of QPU found inside the D-Wave One™ quantum computer.
COMPUTER COOLING
• Reduction of the temperature of the computing environment below approximately 80mK is required for
the processor to function, and generally performance increases as temperature is lowered - the lower
the temperature, the better. The latest generation D-Wave 2000Q system has an operating temperture
of about 15 millikelvin. The QPU and parts of the input/output (I/O) system, comprising roughly 10kg of
material, is cooled to this temperature, which is approximately 180 times colder than interstellar space!
Most of the physical volume of the current system is due to the large size of the refrigeration system.
The refrigeration system used to cool the processors is known as a dilution refrigerator.
ADVANTAGES:
• Could process massive amount of complex data.
• Ability to solve scientific and commercial problems.
• Process data in a much faster speed.
• Capability to convey more accurate answers.
• More can be computed in less time.
• These are used to protect secure Web pages, encrypted email, and many other types of data.
DISADVANTAGES
 Hard to control quantum particles
 Lots of heat
 Expensive
 Difficult to build
 Not suitable for word processing and email.
 Problem of it need of a noise free & Cool Environment.
 Complex hardware schemes like superconductors
APPLICATIONS:
• Encryption Technology
• Ultra-secure And Super-dense Communications
• Improved Error Correction And Error Detection
• Molecular Simulations
• True Randomness
• Cryptography
• Searching
• Factorization
• Simulating
Seminar on quatum
Seminar on quatum

More Related Content

What's hot

Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Samrand Hassan
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Quantum computingQuantum computing
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
khan saad bin hasan
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
mrevanth
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Davide Nardone
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
dharmsinghggu
 
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practiceSthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
StHack
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
LAKSHMI TEJA SAYABARAPU
 
The Extraordinary World of Quantum Computing
The Extraordinary World of Quantum ComputingThe Extraordinary World of Quantum Computing
The Extraordinary World of Quantum Computing
Tim Ellison
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
Nancy Mann
 
Quantum Computer
Quantum ComputerQuantum Computer
Quantum Computer
Towfiqul Islam
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Komal Gupta
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - IntroductionAakash Martand
 
A short introduction to Quantum Computing and Quantum Cryptography
A short introduction to Quantum Computing and Quantum CryptographyA short introduction to Quantum Computing and Quantum Cryptography
A short introduction to Quantum Computing and Quantum Cryptography
Facultad de Informática UCM
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computerskathan
 
Let's build a quantum computer!
Let's build a quantum computer!Let's build a quantum computer!
Let's build a quantum computer!
Andreas Dewes
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
Nolesh_Warke
 
Seminar report on quantum computing
Seminar report on quantum computingSeminar report on quantum computing
Seminar report on quantum computing
Savita Sharma
 
Quantum Computing and Qiskit
Quantum Computing and QiskitQuantum Computing and Qiskit
Quantum Computing and Qiskit
Pooja Mistry
 

What's hot (20)

Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practiceSthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
The Extraordinary World of Quantum Computing
The Extraordinary World of Quantum ComputingThe Extraordinary World of Quantum Computing
The Extraordinary World of Quantum Computing
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
 
Quantum Computer
Quantum ComputerQuantum Computer
Quantum Computer
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - Introduction
 
A short introduction to Quantum Computing and Quantum Cryptography
A short introduction to Quantum Computing and Quantum CryptographyA short introduction to Quantum Computing and Quantum Cryptography
A short introduction to Quantum Computing and Quantum Cryptography
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Let's build a quantum computer!
Let's build a quantum computer!Let's build a quantum computer!
Let's build a quantum computer!
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Seminar report on quantum computing
Seminar report on quantum computingSeminar report on quantum computing
Seminar report on quantum computing
 
Quantum Computing and Qiskit
Quantum Computing and QiskitQuantum Computing and Qiskit
Quantum Computing and Qiskit
 

Similar to Seminar on quatum

Xim $%
Xim $%Xim $%
Xim $%
Azhar Ansari
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Krishna Patel
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
Rishabh Jindal
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
Abhijit181377
 
Introduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdfIntroduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdf
sunnypatil1778
 
Seminar
SeminarSeminar
Presentation on quantum_computing
Presentation on quantum_computingPresentation on quantum_computing
Presentation on quantum_computing
AltafAlam12
 
Quantum computing1
Quantum computing1Quantum computing1
Quantum computing1
Pravin Pundge
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Mehdi Rezaie
 
What is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is ImportantWhat is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is Important
Sasha Lazarevic
 
bhanu.pptx
bhanu.pptxbhanu.pptx
bhanu.pptx
aswinichenemalla
 
Fundamentals of Quantum Computing
Fundamentals of Quantum ComputingFundamentals of Quantum Computing
Fundamentals of Quantum Computing
achakracu
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminar
Pankaj Kumar
 
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
Mike Hogarth, MD, FACMI, FACP
 
QC - UNIT 1.ppt
QC - UNIT 1.pptQC - UNIT 1.ppt
QC - UNIT 1.ppt
khan188474
 
Quantum Computing by Rajeev Chauhan
Quantum Computing by Rajeev ChauhanQuantum Computing by Rajeev Chauhan
Quantum Computing by Rajeev Chauhan
OWASP Delhi
 
Quantum computing.pptx
Quantum computing.pptxQuantum computing.pptx
Quantum computing.pptx
CaptAvacato
 

Similar to Seminar on quatum (20)

OPTICALQuantum
OPTICALQuantumOPTICALQuantum
OPTICALQuantum
 
Xim $%
Xim $%Xim $%
Xim $%
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
 
Introduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdfIntroduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdf
 
Seminar
SeminarSeminar
Seminar
 
Presentation on quantum_computing
Presentation on quantum_computingPresentation on quantum_computing
Presentation on quantum_computing
 
Quantum computing1
Quantum computing1Quantum computing1
Quantum computing1
 
Quantum comput ing
Quantum comput ingQuantum comput ing
Quantum comput ing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
What is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is ImportantWhat is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is Important
 
bhanu.pptx
bhanu.pptxbhanu.pptx
bhanu.pptx
 
Fundamentals of Quantum Computing
Fundamentals of Quantum ComputingFundamentals of Quantum Computing
Fundamentals of Quantum Computing
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminar
 
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
 
QC - UNIT 1.ppt
QC - UNIT 1.pptQC - UNIT 1.ppt
QC - UNIT 1.ppt
 
Quantum Computing by Rajeev Chauhan
Quantum Computing by Rajeev ChauhanQuantum Computing by Rajeev Chauhan
Quantum Computing by Rajeev Chauhan
 
Quantum computing.pptx
Quantum computing.pptxQuantum computing.pptx
Quantum computing.pptx
 
QUANTUM COMP 22
QUANTUM COMP 22QUANTUM COMP 22
QUANTUM COMP 22
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Seminar on quatum

  • 1. SEMINAR ON QUANTUM COMPUTERS PRESENTED BY :- APRAMEYA.B.R RAHUL.R
  • 2. TODAY WE WOULD BE GOING THROUGH • INTERDUCTION • COMPUTING GENERATIONS • INTERDUCTION TO QUANTUM COMPUTERS • Why quantum computers • What is quantum computing • Quantum logic and representation • Wheare did the idea come from • Basic positons of quantum bits • What makes quantum computer different from other computers • Quantum gates
  • 3. INTRODUCTION Since 1960S the power of computers are growing exponentially allowing computers to become smaller and smaller with more this process is about to meet its physical limits . Computer parts are approaching the size of an atom
  • 4. COMPUTING GENERATIONS • First generation computing(1940-1956) vacuum tubes • Second generation computing(1956-1963) transistors • Third generation computing (1964-1961) integrating circuits • Forth generation computing(1971-present) microprocessors • Fifth generation computing(present) artificial intelligence
  • 6. BRIEFING ABOUT QUANTUM COMPUTING • Computer chip contains modules which contains modules, which contains logic gates, which contains transistors, a transistors is a Smallest part of the computer ,basically it’s a switch that can block or open the way for the information passing through it . This information is made up of bits which can be set either to 0 or 1 , combination of serval bits can be used to represent more complex information transistors are combined to create logic gates .combinations of logic gates form modules. Modules ca be used to perform operations like any athematic functions and logical functions. Which can calculate any complex problems like astrophysics , deriving equations etc..
  • 7.
  • 8. WHY QUANTUM COMPUTING • Today a typical scale of transistor is 14 nanometers which is about 500 times smaller then a red blood cell. as transistors are shrinking only to the size of on few atoms. electrons may transfer themselves to other side of the blocked passage • BY 2025 to 2030, transistors will be so small and it will generate so much heat that the standard silicon technology may even collapse. • Already intel has implemented 14 nm silicon technology • If scale becomes too small electrons may tunnel(pass) through the blocked path and corrupting the signals
  • 9. RichardFeynman envasionsof quantum computing Peter Shor develops algorithm that could be used forquantum code- breaking Eddie Farhi at MIT develops idea for adiabaticquantum computing David Deutschdescribes universal quantum computer D-Wave Systems founded by Geordie Rose D-WAVE were the first one to introduce to a commercial quantum computer
  • 10. WHAT IS QUANTUM COMPUTING • Quantum computer is a computer which performs calculations based on the LAW of quantum mechanics
  • 11. QUANTUM LOGICS AND REPRASENTATION  Quantum Computers use quantum mechanical phenomena- • Entanglement • Superposition  Quantum computational operations were executed on a very small number of Qubits (quantum bits)
  • 12. BASIC CONSEPT OF QUANTUM DATA BITS(QBITS) • In existing computers, all information is expressed in terms of 0s and 1s, and the entity • that carries such information is called a "bit.“ • A bit can be in either a 0 or 1 state at any one moment in time. • A quantum computer, on the other hand, uses a “quantum bit” or "qubit" instead of a bit. • A qubit also makes use of two states (0 and 1) to hold information, but in contrast to a bit, In this state, a qubit can take on the properties of 0 and 1 simultaneously at any one moment. • Accordingly, two qubits in this state can express the four values of 00, 01, 10, and 11 all at one time .
  • 13. REPRESENTATION OF DATA IN QUANTUM COMPUTING USING QUBITS • A bit (0 or 1) of data is represented by a single atom that is in one of two states denoted by |0> and |1>. A single bit of this form is known as a qubit • A physical implementation of a qubit could use the two energy levels of an atom. An excited state representing |1> and a ground state representing |0>. State 0 State 1
  • 14. SQUID A QUANTUM TRANSISTOR
  • 16. WHAT MAKES QUANTUM COMPUTERS DIFFRENT • There is much that is different between quantum computers and classical computers. • But am going to explain only few: 1. Quantum Super Positioning 2. Quantum Entanglement 3. Quantum Teleportation
  • 17. KEY QUANTUM EFFECTS superpositioning Quantum Tunneling Entanglement
  • 18. QUANTUMSUPERPOSITION • Super Positioning is a big word for an old concept: that two things can overlap each other without interfering with each other. • In classical computers, electrons cannot occupy the same space at the same • time, but as waves, they can. • One may think of this as a vector of the probabilities drawn in a two- dimensional coordinate system of the Complex plane, that is, coordinates of the form x+iy where • x is a coordinate on the Real number line, and • y is a coordinate on the Imaginary number line. • Classical bits are either vectors of 0 or 1 and have no Imaginary component.
  • 19. OPERATIONS ON QUBITS - REVERSIBLE LOGIC Due to the nature of quantum physics, the destruction of information in a gate will cause heat to be evolved which can destroy the superposition of qubits. Ex. The AND Gate A B C A B C 0 0 0 0 1 0 1 0 0 1 1 1 Input Output In these 3 cases, information is being destroyed
  • 20. QUANTUM GATES  Quantum Gates are similar to classical gates, but do not have a degenerate output. i.e. their original input state can be derived from their output state, uniquely. They must be reversible.  This means that a deterministic computation can be performed on a quantum computer only if it is reversible. Luckily, it has been shown that any deterministic computation can be made reversible.(Charles Bennet, 1973)
  • 21. QUANTUM LOGIC GATES  Commonly used gates Hadamard gate Pauli-X gate Pauli-Y gate Pauli-Z gate Phase shift gates Swap gate Controlled gates
  • 22. QUANTUM GATES - HADAMARD Simplest gate involves one qubit and is called a Hadamard Gate (also known as a square-root of NOT gate.)Used to put qubits into superposition. H State |0> State |0> + |1> H State |1> Note: Two Hadamard gates used in succession can be used as a NOT gate
  • 23. QUANTUM GATES - CONTROLLED NOT A gate which operates on two qubits is called a Controlled-NOT (CN) Gate. If the bit on the control line is 1, invert the bit on the target line. A - Target B - Control A B A’ B’ 0 0 0 0 0 1 1 1 1 0 1 0 1 1 0 1 Input Output Note: The CN gate has a similar behavior to the XOR gate with some extra information to make it reversible. A’ B’
  • 24. EXAMPLE OPERATION - MULTIPLICATION BY 2 We can build a reversible logic circuit to calculate multiplication by 2 using CN gates arranged in the following manner: Carry Bit Carry Bit Ones Bit Carry Bit Ones Bit 0 0 0 0 0 1 1 0 Input Output Ones Bit 0 H
  • 25. QUANTUMENTANGLEMENT  Entanglement is the ability of quantum systems to exhibit correlations between states within a superposition.  Quantum entanglement is one of the central principles of quantum physics, though it is also highly misunderstood.  In short, quantum entanglement means that multiple particles are linked together in a way such that the measurement of one particle's quantum state determines the possible quantum states of the other particles.  When this happens, the state of the two particles is said to be entangled.
  • 26.
  • 27. QUANTUMTELEPORTATION • Quantum teleportation is a technique used to transfer information on a quantum level, usually from one particle to another. • Its distinguishing feature is that it can transmit the information present in a quantum superposition, useful for quantum communication and computation.
  • 28. SHOR’S ALGORITHM • Name after mathematician peter shor, is quantum (an algorithm that runs on a quantum computer) for integer factorization in 1994. informally, it solves the following problem given an integer N, find its prime factor • Example:- factor a number into primes M = p*q • classical t ~ exp(0(n1/2 log2/3n) = 28,000,000,000,000,000,000,000 years • Quantum t~0(n3) = 100 seconds
  • 29. A FABRIC OF PROGRAMMABLE ELEMENTS • In order to go from a single qubit to a multi-qubit processor, the qubits must be connected together such that they can exchange information. This is achieved through the use of elements known as couplers. The couplers are also made from superconducting loops. By putting many such elements (qubits and couplers) together, we can start to build up a fabric of quantum devices that are programmable. Figure 2 shows a schematic of 8 connected qubits. The loop shown in the previous diagram has now been stretched out to form one of the long gold rectangles. At the points where the rectangles cross, the couplers have been shown schematically as blue dots. •
  • 30.
  • 31. QUANTUM PROCESSOR ADDRESSING • There are several additional components necessary for processor operation. A large part of the circuitry that surrounds the qubits and couplers is a framework of switches (also formed from Josephson junctions) forming circuitry which both addresses each qubit (routes pulses of magnetic information to the correct places on chip) and stores that information in a magnetic memory element local to each device. The majority of the Josephson junctions in a D-Wave quantum processing unit (QPU) are used to make up this circuitry. Additionally, there are readout devices attached to each qubit. During the computation these devices are inactive and do not affect the qubits' behavior. After the computation has finished, and the qubits have settled into their final (classical) 0 or 1 states, the readouts are used to query the value held by each qubit and return the answer as a bit string of 0's and 1's to the end user. Here is a video showing how some of the QPU elements were combined to produce the computational fabric at the core of the D-Wave One™ 128-qubit QPU, which pre-dates the current 2000-qubit D-Wave 2000Q™ QPU. •
  • 32. MANUFACTURING OF QUANTUM PROCESSING UNIT • QPUs after fabrication in a superconducting electronics foundry. The QPUs are 'stamped' onto a silicon wafer using techniques modified from the processes used to make semiconductor integrated circuits. There are several QPUs visible on this wafer image. The largest, near the bottom center, has 128 qubits connected together with 352 connection elements between them. The qubit/coupler circuits on each individual QPU are the cross-hatched looking patches visible in this image. This is known as a Rainier QPU and it was the type of QPU found inside the D-Wave One™ quantum computer.
  • 33. COMPUTER COOLING • Reduction of the temperature of the computing environment below approximately 80mK is required for the processor to function, and generally performance increases as temperature is lowered - the lower the temperature, the better. The latest generation D-Wave 2000Q system has an operating temperture of about 15 millikelvin. The QPU and parts of the input/output (I/O) system, comprising roughly 10kg of material, is cooled to this temperature, which is approximately 180 times colder than interstellar space! Most of the physical volume of the current system is due to the large size of the refrigeration system. The refrigeration system used to cool the processors is known as a dilution refrigerator.
  • 34.
  • 35. ADVANTAGES: • Could process massive amount of complex data. • Ability to solve scientific and commercial problems. • Process data in a much faster speed. • Capability to convey more accurate answers. • More can be computed in less time. • These are used to protect secure Web pages, encrypted email, and many other types of data.
  • 36. DISADVANTAGES  Hard to control quantum particles  Lots of heat  Expensive  Difficult to build  Not suitable for word processing and email.  Problem of it need of a noise free & Cool Environment.  Complex hardware schemes like superconductors
  • 37. APPLICATIONS: • Encryption Technology • Ultra-secure And Super-dense Communications • Improved Error Correction And Error Detection • Molecular Simulations • True Randomness • Cryptography • Searching • Factorization • Simulating