SlideShare a Scribd company logo
1 of 31
Download to read offline
QUANTUM
COMPUTING
Next Generation Computing
OVERVIEW
 Introduction
 How A Computer Works
 Quantum Mechanics
 Superposition
 Tunnelling
 Entanglement
 Quantum Computing
 Qubit
 Quantum Computer
 Building A Qubit
 Applications
 Quantum Cryptography
 Conclusion
 References
INTRODUCTION
Quantum computing is the area of study focused on developing
computer technology based on the principles of Quantum
Mechanics. The power of the quantum computer is that it is
based on a logic that is not limited merely to on-or-off, true-
or-false scenarios. Quantum computing uses Qubits. It can
represent a zero, a one and both, which is known as
Superposition. It uses phenomenon such as Quantum
Tunnelling, Quantum Entanglement to solve more complex
calculations. From optimization problems to simulation,
machine learning, weather forecasting all will be possible with
accurate outcomes with this technology.
What Is Computing ?
The process of utilizing computer
technology to complete a task. Swiping a
debit card, sending an email, or using a
cell phone can all be considered forms of
computing
What Is A Computer ?
Computer is an electronic device that is
designed to work with Information.
Computer cannot do anything without a
Program
How A Computer Works ?
A classical computer basically works its functions using bits,
logical gates, transistors.
Information
In computer, information, in its most basic
form, can be represented as a sequence of
bits.
Numbers can be represented in binary
using decimal to binary conversion.
Similarly words using ASCII/UTF-8,
graphics using jpeg, png, mpeg, etc.
These are all just sequence of bits.
What Is A Bit ?
It is the basic unit of data in computers.
All the data in computers are presented in
form of bits.
A bit can in one of the two states, i.e.
either be zero or one at a time.
Logic Gates
A logic gate is an elementary building block of a
digital circuit. Most logic gates have two inputs and
one output. At any given moment, every terminal is
in one of the two binary conditions low (0) or high
(1), represented by different voltage levels.
Operations Using Logic Gates And Bits
Using multiple gates in specific order we can achieve any
operation on computer.
Quantization of energy
This is a function of Analog-to-digital converters
It is the branch of mechanics that deals with the
mathematical description of the motion and interaction of
subatomic particles, incorporating the concepts of quantization of
energy, wave–particle duality, the uncertainty principle, and the
entanglement, superposition, annealing, tunneling.
Wave particle duality
Wave–particle duality is the concept that every elementary
particle or quantic entity may be partly described in terms not
only of particles, but also of waves.
Superposition
it says an object can be in two
places at once while not being
observed
However, once a
measurement of a particle
is made, and for example
its energy or position is
known, the superposition is
lost and now we have a
particle in one known state.
Quantum tunnelling
For example a ball trying to roll over a hill particles can,
with a very small probability, tunnel to the other side.
Quantum entanglement
It says two objects are related to each other in way that
one’s states cannot be described independent of another.
QUANTUM COMPUTING
Qubit
A quantum bit is a superposed version of classical bit
where it can be a 0, 1 and both 0&1 at the same time.
Quantum Gates
In quantum computing and specifically the quantum circuit
model of computation, a quantum gate (or quantum logic gate)
is a basic quantum circuit operating on a small number of
qubits.
QUANTUM COMPUTER
Lets Build A Qubit
Taking a phosphorous atom which contains
one electron on outer cell we can build a
qubit. The phosphorous atom is embedded
into silicon crystal followed by tiny
transistors.
Super conducting magnets
Liquid hydrogen
Specific amount of
microwave pulse to change
the qubit
Since magnetic fields can affect the spin, we need to
eliminate all the spin nearby. So we use an isotope of
silicon, which is 28Si14 which has no nuclear spin of its
own.
D-WAVE SYSTEMS
Software and Programming
Just as the classical computing world needed a software
ecosystem to build a broad community of application developers
and users, the quantum computing world does as well. The D-
Wave 2000Q system provides a standard Internet API, with client
libraries available for C/C++, Python, and MATLAB. This interface
allows users to access the system either as a cloud resource over
a network, or integrated into their high-performance computing
environments and data centres. Access is also available through
D-Wave’s hosted cloud service. Using D-Wave’s development
tools and client libraries, developers can create algorithms and
applications within their existing environments using industry-
standard tools.
APPLICATIONS
Optimisation Problems
In mathematics and computer
science, an optimization
problem is the problem of
finding the best solution from
all feasible solutions.
Security Threat
The current RSA is based on prime factors of large numbers such
as a 2048 bit number. The current classical computer will take
nearly 3biilion years to break this using the public key provide with
hit and trial method.
But now with the use of quantum computers and Shor’s quantum
algorithm for factoring numbers using quantum computers it can
be factored and break the security of maximum current security
on the internet.
Solution To Threat
Quantum cryptography.
As qubits can be made of polarized photons, say we
transfer photons from sender to receiver using fiber
optics cables and the receiver will measure those
photons into bits and read the message.
Interference
No Cloning
Theorem
Interference
The receiver needs to match the filter using which the
sender has sent the key. Because according to
quantum mechanics ”if receiver uses a diagonal
detector on photon sent in vertical or horizontal
photon, it’ll have a 50-50 chance of measuring either
vertical or horizontal. i.e. 1 or 0.”
CONCLUSION
The power of the quantum computer is that it is based
on a logic that is not limited merely to on-or-off, true-
or-false scenarios. It will use practical ways to solve
practical problems on large scale. It will change how we
use computers and secures them now. It can break most
of current cyber securities we currently use in just
seconds. On the other it will help us solving current
unsolvable problems like optimization problems to
simulation, machine learning, weather forecasting all
will be possible with accurate outcomes with this
technology. It also come up with solution to security
threat with quantum encryption method. It will be only
in our hands whether to use it for good or bad. Recently,
on 6th march 2017, IBM has announced world’s first
REFERENCES
http://www.dwavesys.com/d-wave-two-system
http://www.dwavesys.com/quantum-computing
http://www.dwavesys.com/resources/tutorials
http://computer.howstuffworks.com/quantum-computer1.htm
https://en.wikipedia.org/wiki/Quantum_information_science
Wikipedia – Annealing, Superposition, Qubit, Entanglement.
QUANTUM COMPUTING EXPLAINED By David McMahon
D-Wave-brochure-Mar2016B Research white paper.
https://www.youtube.com/user/minutephysics YouTube - Minute
Physics
https://www.youtube.com/user/1veritasium YouTube –
Veritasium
https://www.youtube.com/user/Kurzgesagt YouTube –
Kurzgesagt – In a Nutshell
https://www.youtube.com/user/frameofessence YouTube – Frame of
Essence
ANY QUESTIONS

More Related Content

What's hot

What's hot (20)

Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
What is quantum computing
What is quantum computingWhat is quantum computing
What is quantum computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Presentation quantum computers
Presentation quantum computersPresentation quantum computers
Presentation quantum computers
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the Future
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computing ppt
Quantum Computing  pptQuantum Computing  ppt
Quantum Computing ppt
 
Quantum computing
Quantum computing Quantum computing
Quantum computing
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
Quantum Computers New Generation of Computers PART1 by Prof Lili SaghafiQuantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
Quantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
 
Quantum Computer
Quantum ComputerQuantum Computer
Quantum Computer
 

Viewers also liked

Quantum computing - Introduction
Quantum computing - IntroductionQuantum computing - Introduction
Quantum computing - Introductionrushmila
 
Quantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsQuantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsSendash Pangambam
 
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practiceSthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practiceStHack
 
Introduction to Quantum Computing & Quantum Information Theory
Introduction to Quantum Computing & Quantum Information TheoryIntroduction to Quantum Computing & Quantum Information Theory
Introduction to Quantum Computing & Quantum Information TheoryRahul Mee
 
Quantum computing - A Compilation of Concepts
Quantum computing - A Compilation of ConceptsQuantum computing - A Compilation of Concepts
Quantum computing - A Compilation of ConceptsGokul Alex
 
Quantum Computers PART 5 Scanning Tunneling Microscope by Lili Saghafi
Quantum Computers PART 5 Scanning Tunneling Microscope  by Lili SaghafiQuantum Computers PART 5 Scanning Tunneling Microscope  by Lili Saghafi
Quantum Computers PART 5 Scanning Tunneling Microscope by Lili SaghafiProfessor Lili Saghafi
 
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Professor Lili Saghafi
 
Quantum Computing by Rajeev Chauhan
Quantum Computing by Rajeev ChauhanQuantum Computing by Rajeev Chauhan
Quantum Computing by Rajeev ChauhanOWASP Delhi
 
Propuesta para capacitación de personal docente en la IETA El piñal
Propuesta para capacitación de personal docente en la IETA El piñalPropuesta para capacitación de personal docente en la IETA El piñal
Propuesta para capacitación de personal docente en la IETA El piñalAroldo Emilio Velasquez Trujillo
 
Dies al camp Arantxa O.
Dies al camp   Arantxa O.Dies al camp   Arantxa O.
Dies al camp Arantxa O.mlope657
 
Amb ronca veu 2.0
Amb ronca veu 2.0Amb ronca veu 2.0
Amb ronca veu 2.0mlope657
 

Viewers also liked (20)

Quantum computing - Introduction
Quantum computing - IntroductionQuantum computing - Introduction
Quantum computing - Introduction
 
Quantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsQuantum Computing - Basic Concepts
Quantum Computing - Basic Concepts
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practiceSthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
 
Quantum computer ppt
Quantum computer pptQuantum computer ppt
Quantum computer ppt
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Introduction to Quantum Computing & Quantum Information Theory
Introduction to Quantum Computing & Quantum Information TheoryIntroduction to Quantum Computing & Quantum Information Theory
Introduction to Quantum Computing & Quantum Information Theory
 
Quantum computing - A Compilation of Concepts
Quantum computing - A Compilation of ConceptsQuantum computing - A Compilation of Concepts
Quantum computing - A Compilation of Concepts
 
El Peor Jefe del Mundo
El Peor Jefe del MundoEl Peor Jefe del Mundo
El Peor Jefe del Mundo
 
Ahorro de energia
Ahorro de energiaAhorro de energia
Ahorro de energia
 
Quantum Computers PART 5 Scanning Tunneling Microscope by Lili Saghafi
Quantum Computers PART 5 Scanning Tunneling Microscope  by Lili SaghafiQuantum Computers PART 5 Scanning Tunneling Microscope  by Lili Saghafi
Quantum Computers PART 5 Scanning Tunneling Microscope by Lili Saghafi
 
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
 
Quantum computing meghaditya
Quantum computing meghadityaQuantum computing meghaditya
Quantum computing meghaditya
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum Computing by Rajeev Chauhan
Quantum Computing by Rajeev ChauhanQuantum Computing by Rajeev Chauhan
Quantum Computing by Rajeev Chauhan
 
Propuesta para capacitación de personal docente en la IETA El piñal
Propuesta para capacitación de personal docente en la IETA El piñalPropuesta para capacitación de personal docente en la IETA El piñal
Propuesta para capacitación de personal docente en la IETA El piñal
 
Diapositivas teoria ped
Diapositivas teoria pedDiapositivas teoria ped
Diapositivas teoria ped
 
Presentación subsistemas sandimar
Presentación subsistemas sandimarPresentación subsistemas sandimar
Presentación subsistemas sandimar
 
Dies al camp Arantxa O.
Dies al camp   Arantxa O.Dies al camp   Arantxa O.
Dies al camp Arantxa O.
 
Amb ronca veu 2.0
Amb ronca veu 2.0Amb ronca veu 2.0
Amb ronca veu 2.0
 

Similar to Quantum Computing

Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implicationsInnoTech
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet ExplainedAhmed Banafa
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptxAbhijit181377
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computingIOSR Journals
 
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALAA Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALASaikiran Panjala
 
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by EmranEmran Hossain
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AIAhmed Banafa
 
Quantum computers
Quantum computersQuantum computers
Quantum computerskavya1219
 
Technological Survey on Quantum Computing
Technological Survey on Quantum ComputingTechnological Survey on Quantum Computing
Technological Survey on Quantum ComputingIRJET Journal
 
Technical Trends_Study of Quantum
Technical Trends_Study of QuantumTechnical Trends_Study of Quantum
Technical Trends_Study of QuantumHardik Gohel
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths Ahmed Banafa
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computingJai Sipani
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminarPankaj Kumar
 
What is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is ImportantWhat is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is ImportantSasha Lazarevic
 

Similar to Quantum Computing (20)

Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
 
Seminar
SeminarSeminar
Seminar
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
 
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALAA Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
 
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by Emran
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AI
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Technological Survey on Quantum Computing
Technological Survey on Quantum ComputingTechnological Survey on Quantum Computing
Technological Survey on Quantum Computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
177
177177
177
 
Technical Trends_Study of Quantum
Technical Trends_Study of QuantumTechnical Trends_Study of Quantum
Technical Trends_Study of Quantum
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
 
Quantum comput ing
Quantum comput ingQuantum comput ing
Quantum comput ing
 
Quantum computing1
Quantum computing1Quantum computing1
Quantum computing1
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminar
 
What is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is ImportantWhat is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is Important
 

Recently uploaded

React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Quantum Computing

  • 2. OVERVIEW  Introduction  How A Computer Works  Quantum Mechanics  Superposition  Tunnelling  Entanglement  Quantum Computing  Qubit  Quantum Computer  Building A Qubit  Applications  Quantum Cryptography  Conclusion  References
  • 3. INTRODUCTION Quantum computing is the area of study focused on developing computer technology based on the principles of Quantum Mechanics. The power of the quantum computer is that it is based on a logic that is not limited merely to on-or-off, true- or-false scenarios. Quantum computing uses Qubits. It can represent a zero, a one and both, which is known as Superposition. It uses phenomenon such as Quantum Tunnelling, Quantum Entanglement to solve more complex calculations. From optimization problems to simulation, machine learning, weather forecasting all will be possible with accurate outcomes with this technology.
  • 4. What Is Computing ? The process of utilizing computer technology to complete a task. Swiping a debit card, sending an email, or using a cell phone can all be considered forms of computing
  • 5. What Is A Computer ? Computer is an electronic device that is designed to work with Information. Computer cannot do anything without a Program
  • 6. How A Computer Works ? A classical computer basically works its functions using bits, logical gates, transistors. Information In computer, information, in its most basic form, can be represented as a sequence of bits.
  • 7. Numbers can be represented in binary using decimal to binary conversion. Similarly words using ASCII/UTF-8, graphics using jpeg, png, mpeg, etc. These are all just sequence of bits. What Is A Bit ? It is the basic unit of data in computers. All the data in computers are presented in form of bits. A bit can in one of the two states, i.e. either be zero or one at a time.
  • 8. Logic Gates A logic gate is an elementary building block of a digital circuit. Most logic gates have two inputs and one output. At any given moment, every terminal is in one of the two binary conditions low (0) or high (1), represented by different voltage levels.
  • 9. Operations Using Logic Gates And Bits Using multiple gates in specific order we can achieve any operation on computer.
  • 10. Quantization of energy This is a function of Analog-to-digital converters It is the branch of mechanics that deals with the mathematical description of the motion and interaction of subatomic particles, incorporating the concepts of quantization of energy, wave–particle duality, the uncertainty principle, and the entanglement, superposition, annealing, tunneling.
  • 11. Wave particle duality Wave–particle duality is the concept that every elementary particle or quantic entity may be partly described in terms not only of particles, but also of waves. Superposition it says an object can be in two places at once while not being observed
  • 12. However, once a measurement of a particle is made, and for example its energy or position is known, the superposition is lost and now we have a particle in one known state.
  • 13. Quantum tunnelling For example a ball trying to roll over a hill particles can, with a very small probability, tunnel to the other side.
  • 14. Quantum entanglement It says two objects are related to each other in way that one’s states cannot be described independent of another.
  • 15. QUANTUM COMPUTING Qubit A quantum bit is a superposed version of classical bit where it can be a 0, 1 and both 0&1 at the same time.
  • 16. Quantum Gates In quantum computing and specifically the quantum circuit model of computation, a quantum gate (or quantum logic gate) is a basic quantum circuit operating on a small number of qubits.
  • 17. QUANTUM COMPUTER Lets Build A Qubit Taking a phosphorous atom which contains one electron on outer cell we can build a qubit. The phosphorous atom is embedded into silicon crystal followed by tiny transistors.
  • 19. Specific amount of microwave pulse to change the qubit Since magnetic fields can affect the spin, we need to eliminate all the spin nearby. So we use an isotope of silicon, which is 28Si14 which has no nuclear spin of its own.
  • 21.
  • 22. Software and Programming Just as the classical computing world needed a software ecosystem to build a broad community of application developers and users, the quantum computing world does as well. The D- Wave 2000Q system provides a standard Internet API, with client libraries available for C/C++, Python, and MATLAB. This interface allows users to access the system either as a cloud resource over a network, or integrated into their high-performance computing environments and data centres. Access is also available through D-Wave’s hosted cloud service. Using D-Wave’s development tools and client libraries, developers can create algorithms and applications within their existing environments using industry- standard tools.
  • 23. APPLICATIONS Optimisation Problems In mathematics and computer science, an optimization problem is the problem of finding the best solution from all feasible solutions.
  • 24. Security Threat The current RSA is based on prime factors of large numbers such as a 2048 bit number. The current classical computer will take nearly 3biilion years to break this using the public key provide with hit and trial method.
  • 25. But now with the use of quantum computers and Shor’s quantum algorithm for factoring numbers using quantum computers it can be factored and break the security of maximum current security on the internet.
  • 26. Solution To Threat Quantum cryptography. As qubits can be made of polarized photons, say we transfer photons from sender to receiver using fiber optics cables and the receiver will measure those photons into bits and read the message.
  • 28. Interference The receiver needs to match the filter using which the sender has sent the key. Because according to quantum mechanics ”if receiver uses a diagonal detector on photon sent in vertical or horizontal photon, it’ll have a 50-50 chance of measuring either vertical or horizontal. i.e. 1 or 0.”
  • 29. CONCLUSION The power of the quantum computer is that it is based on a logic that is not limited merely to on-or-off, true- or-false scenarios. It will use practical ways to solve practical problems on large scale. It will change how we use computers and secures them now. It can break most of current cyber securities we currently use in just seconds. On the other it will help us solving current unsolvable problems like optimization problems to simulation, machine learning, weather forecasting all will be possible with accurate outcomes with this technology. It also come up with solution to security threat with quantum encryption method. It will be only in our hands whether to use it for good or bad. Recently, on 6th march 2017, IBM has announced world’s first
  • 30. REFERENCES http://www.dwavesys.com/d-wave-two-system http://www.dwavesys.com/quantum-computing http://www.dwavesys.com/resources/tutorials http://computer.howstuffworks.com/quantum-computer1.htm https://en.wikipedia.org/wiki/Quantum_information_science Wikipedia – Annealing, Superposition, Qubit, Entanglement. QUANTUM COMPUTING EXPLAINED By David McMahon D-Wave-brochure-Mar2016B Research white paper. https://www.youtube.com/user/minutephysics YouTube - Minute Physics https://www.youtube.com/user/1veritasium YouTube – Veritasium https://www.youtube.com/user/Kurzgesagt YouTube – Kurzgesagt – In a Nutshell https://www.youtube.com/user/frameofessence YouTube – Frame of Essence

Editor's Notes

  1. The process of utilizing computer technology to complete a task. Computing may involve computer hardware and/or software, but must involve some form of a computer system. Most individuals use some form of computing every day whether they realize it or not. Swiping a debit card, sending an email, or using a cell phone can all be considered forms of computing.
  2. Computer is an electronic device that is designed to work with Information. The term computer is derived from the Latin term ‘Computare’, this means to calculate or programmable machine. Computer cannot do anything without a Program.
  3. A classical computer basically works its functions using bits, logical gates, transistors and pre-defined algorithms which are programmed into machine codes. All the data from text to graphic files and media files are stored in binary digits. The operations are made using logic gate combinations. It processes information using all these methods.
  4. Bit refers to binary digit. It is the basic unit of data in computers. Computer understands binary instead of decimal. All the data in computers are presented in form of bits. A bit can in one of the two states, i.e. either be zero or one at a time. Two classical bits can represent four possible states, each state at a time. Numbers can be represented in binary using decimal to binary conversion. Similarly words using ASCII/UTF-8, graphics using jpeg, png, mpeg, etc. These are all just sequence of bits.
  5. It is the process of converting a continuous range of values into a finite range of discreet values. This is a function of Analog-to-digital converters, which create a series of digital values to represent the original Analog signal.
  6. It states that, much like waves in classical physics, any two (or more) quantum states can be added together ("superposed") and the result will be another valid quantum state; and conversely, that every quantum state can be represented as a sum of two or more other distinct states. Because quantum mechanics is weird, instead of thinking about a particle being in one state or changing between a varieties of states, particles are thought of as existing across all the possible states at the same time. If you’re thinking in terms of particles, it means a particle can be in two places at once. However, once a measurement of a particle is made, and for example its energy or position is known, the superposition is lost and now we have a particle in one known state. For example a qubit can be 1, 0 or both 0&1 at same time.
  7. It states that, much like waves in classical physics, any two (or more) quantum states can be added together ("superposed") and the result will be another valid quantum state; and conversely, that every quantum state can be represented as a sum of two or more other distinct states. Because quantum mechanics is weird, instead of thinking about a particle being in one state or changing between a varieties of states, particles are thought of as existing across all the possible states at the same time. If you’re thinking in terms of particles, it means a particle can be in two places at once. However, once a measurement of a particle is made, and for example its energy or position is known, the superposition is lost and now we have a particle in one known state. For example a qubit can be 1, 0 or both 0&1 at same time.
  8. Quantum tunnelling refers to the quantum mechanical phenomenon where a particle tunnels through a barrier that it classically could not surmount. For example a ball trying to roll over a hill, Classical mechanics predicts that particles that do not have enough energy to classically surmount a barrier will not be able to reach the other side. Thus, a ball without sufficient energy to surmount the hill would roll back down. Or, lacking the energy to penetrate a wall, it would bounce back. In quantum mechanics, these particles can, with a very small probability, tunnel to the other side. This plays an essential role in several physical phenomena, such as the nuclear fusion that occurs in main sequence stars like the Sun. It has important applications to modern devices such as the tunnel diode, quantum computing, and the scanning tunnelling microscope. Tunnelling is often explained using the Heisenberg uncertainty principle and the wave–particle duality of matter.
  9. Quantum entanglement is a physical phenomenon that occurs when pairs or groups of particles are generated or interact in ways such that the quantum state of each particle cannot be described independently of the others, even when the particles are separated by a large distance (billions of miles)—instead, a quantum state must be described for the system as a whole. Measurements of physical properties such as position, momentum, spin, and polarization, performed on entangled particles are found to be appropriately correlated. For example, if a pair of particles are generated in such a way that their total spin is known to be zero, and one particle is found to have clockwise spin on a certain axis, the spin of the other particle, measured on the same axis, will be found to be counter clockwise, as to be expected due to their entanglement. Einstein referring to it as "spooky action at a distance".
  10. In quantum computing, a qubit or quantum bit (sometimes qbit) is a unit of quantum information—the quantum analogue of the classical bit. A qubit is a two-state quantum-mechanical system, such as the polarization of a single photon: here the two states are vertical polarization and horizontal polarization. In a classical system, a bit would have to be in one state or the other. However, quantum mechanics allows the qubit to be in a superposition of both states at the same time, a property that is fundamental to quantum computing. An important distinguishing feature between a qubit and a classical bit is that multiple qubits can exhibit quantum entanglement. Entanglement is a nonlocal property that allows a set of qubits to express higher correlation than is possible in classical systems. A number of qubits taken together is a qubit register. Quantum computers perform calculations by manipulating qubits within a register. A qubyte (quantum byte) is a collection of eight qubits. It is possible to fully encode one bit in one qubit. However, a qubit can hold even more information, e.g. up to two bits using superdense coding.
  11. Electron or nucleus can be used where spin is considered. Spin up is 1 and spin down is 0. Photon can also be used where vertically polarized photon is 1 and horizontally polarized photon is 0. Like a magnet in classical bit but its 3rd measurement other than 0 and 1 is it can be in both state at one time. Taking a phosphorous atom which contains one electron on outer cell we can build a qubit. The phosphorous atom is embedded into silicon crystal followed by tiny transistors. To differentiate the energy states of an electron when it’s spin up and spin down we need a strong magnetic field. For this a super conducting magnet is used which is a large solenoid coil inside liquid helium which is 150 times colder than outer universe. Because at room temperature electron will spin up by thermal energy. Now the electron will line up with its spin pointing down which is its lowest energy state. It’ll need some energy to put up into spin up state. We can spin it up by hitting very specific frequency’s pulse of microwaves according to the magnetic field in which electron is kept. Since magnetic fields can affect the spin, we need to eliminate all the spin nearby. So we use an isotope of silicon, which is 28Si14 which has no spin of its own.
  12. Electron or nucleus can be used where spin is considered. Spin up is 1 and spin down is 0. Photon can also be used where vertically polarized photon is 1 and horizontally polarized photon is 0. Like a magnet in classical bit but its 3rd measurement other than 0 and 1 is it can be in both state at one time. Taking a phosphorous atom which contains one electron on outer cell we can build a qubit. The phosphorous atom is embedded into silicon crystal followed by tiny transistors. To differentiate the energy states of an electron when it’s spin up and spin down we need a strong magnetic field. For this a super conducting magnet is used which is a large solenoid coil inside liquid helium which is 150 times colder than outer universe. Because at room temperature electron will spin up by thermal energy. Now the electron will line up with its spin pointing down which is its lowest energy state. It’ll need some energy to put up into spin up state. We can spin it up by hitting very specific frequency’s pulse of microwaves according to the magnetic field in which electron is kept. Since magnetic fields can affect the spin, we need to eliminate all the spin nearby. So we use an isotope of silicon, which is 28Si14 which has no spin of its own.
  13. Electron or nucleus can be used where spin is considered. Spin up is 1 and spin down is 0. Photon can also be used where vertically polarized photon is 1 and horizontally polarized photon is 0. Like a magnet in classical bit but its 3rd measurement other than 0 and 1 is it can be in both state at one time. Taking a phosphorous atom which contains one electron on outer cell we can build a qubit. The phosphorous atom is embedded into silicon crystal followed by tiny transistors. To differentiate the energy states of an electron when it’s spin up and spin down we need a strong magnetic field. For this a super conducting magnet is used which is a large solenoid coil inside liquid helium which is 150 times colder than outer universe. Because at room temperature electron will spin up by thermal energy. Now the electron will line up with its spin pointing down which is its lowest energy state. It’ll need some energy to put up into spin up state. We can spin it up by hitting very specific frequency’s pulse of microwaves according to the magnetic field in which electron is kept. Since magnetic fields can affect the spin, we need to eliminate all the spin nearby. So we use an isotope of silicon, which is 28Si14 which has no spin of its own.
  14. Software and Programming Just as the classical computing world needed a software ecosystem to build a broad community of application developers and users, the quantum computing world does as well. The D-Wave 2000Q system provides a standard Internet API, with client libraries available for C/C++, Python, and MATLAB. This interface allows users to access the system either as a cloud resource over a network, or integrated into their high-performance computing environments and data centres. Access is also available through D-Wave’s hosted cloud service. Using D-Wave’s development tools and client libraries, developers can create algorithms and applications within their existing environments using industry-standard tools.