CSC 110 – Fluency in Information Technology Ubiquitous Computing Quantum Computing Dr. Curry Guinn.

Slides:



Advertisements
Similar presentations
Quantum Parallel Computing BY NIC & TIM: GUARDIANS OF THE HOOD.
Advertisements

FUTURE TECHNOLOGIES Lecture 13.  In this lecture we will discuss some of the important technologies of the future  Autonomic Computing  Cloud Computing.
Quantum Computing. Introduction to Computing Is currently done on your laptop today Numbers as we commonly use them are in decimal (base 10) format. Computers.
ELEG 479 Lecture #9 Magnetic Resonance (MR) Imaging
Princeton University COS 433 Cryptography Fall 2007 Boaz Barak COS 433: Cryptography Princeton University Fall 2007 Boaz Barak Lecture 12: Idiot’s Guide.
Quantum Computing Ambarish Roy Presentation Flow.
Quantum Computation and Error Correction Ali Soleimani.
Matthew Guidry. The Fundamentals of Cryptography  One of the fundamentals of cryptography is that keys selected for various protocols that are computationally.
Quantum Computing Joseph Stelmach.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 12: Idiot’s Guide.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum Computing Marek Perkowski Part of Computational Intelligence Course 2007.
Future Computers CSCI 107, Spring When Moore’s law runs out of room When transistors become only tens of atoms thick –Quantum mechanics applies.
Quantum computing Alex Karassev. Quantum Computer Quantum computer uses properties of elementary particle that are predicted by quantum mechanics Usual.
By: Mike Neumiller & Brian Yarbrough
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
Quantum Computing The Next Generation of Computing Devices? by Heiko Frost, Seth Herve and Daniel Matthews.
Quantum Computing Presented by: Don Davis PHYS
Quantum Computers. Overview Brief History Computing – (generations) Current technology Limitations Theory of Quantum Computing How it Works? Applications.
Quantum Computer Speaker: Qeopten Date: 04/12/23.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
Applications of Quantum Physics
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
By Joseph Szatkowski and Cody Borgschulte. ● Uses phenomenon associated with quantum mechanics instead of electrical circuitry ● Quantum mechanics explains.
Quantum Computing Paola Cappellaro
Quantum Computer 電機四 鄭仲鈞. Outline Quantum Computer Quantum Computing Implement of Quantum Computer Nowadays research of Quantum computer.
Quantum Computers by Ran Li.
Quantum Mechanics1 Schrodinger’s Cat. Quantum Mechanics2 A particular quantum state, completely described by enough quantum numbers, is called a state.
Nawaf M Albadia
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Quantum Mechanics(14/2) Hongki Lee BIOPHOTONICS ENGINEERING LABORATORY School of Electrical and Electronic Engineering, Yonsei University Quantum Computing.
Introduction to Quantum Computing
Quantum Computing Michael Larson. The Quantum Computer Quantum computers, like all computers, are machines that perform calculations upon data. Quantum.
Quantum Corby Ziesman Computing. Future of Computing? Transistor-based Computing –Move towards parallel architectures Biological Computing –DNA computing.
FNI 1H Quantum Mechanics 1 Quantum Mechanics I don't like it, and I'm sorry I ever had anything to do with it. -- Erwin Schrodinger talking about Quantum.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
As if computers weren’t fast enough already…
Quantum Computing: An Introduction Khalid Muhammad 1 History of Quantum Computing Bits and Qubits Problems with the Quantum Machine.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
QUANTUM COMPUTERS, COMPUTING AND INFORMATION ALAN DURNEV, PHYSICS.
Quantum Computers By Ryan Orvosh.
Norman Littlejohn COSC480.  Quantum Computing  History  How it works  Usage.
Christopher Monroe Joint Quantum Institute and Department of Physics NIST and University of Maryland Quantum Computation and Simulation.
Quantum Computing: An Introduction
DNA Computing. What is it?  “DNA computing is a branch of computing which uses DNA, biochemistry, and molecular biology hardware, instead of the traditional.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Quantum Computing Keith Kelley CS 6800, Theory of Computation.
QUANTUM COMPUTING By Sandeep Neeli.
Richard Cleve DC 3524 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Lecture.
Quantum mechanics in electronics
Prabhas Chongstitvatana Chulalongkorn University
QUANTUM COMPUTING: Quantum computing is an attempt to unite Quantum mechanics and information science together to achieve next generation computation.
COMPSCI 290.2: Computer Security
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Quantum Circuit Visualization
Poomipat Phusayangkul
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Computers Superposition Interference Entanglement and Quantum Error Correction Lesson 1 By: Professor Lili Saghafi
Limits and Horizon of Computing
Lecture 2: Magnetic Statics
Quantum Cryptography Alok.T.J EC 11.
Cryptography and Quantum Computing
Quantum Computing Prabhas Chongstitvatana Faculty of Engineering
Quantum Computing Hakem Alazmi Jhilakshi Sharma Linda Vu.
Quantum Computing Andrew Krumbach Carolyn Camara
Quantum Computing Joseph Stelmach.
Quantum Computer Speaker: 李宥宏.
The Future is Quantum Computing
Presentation transcript:

CSC 110 – Fluency in Information Technology Ubiquitous Computing Quantum Computing Dr. Curry Guinn

Today’s Class What’s ahead Ubiquitous Computing Quantum Computing (is to computing as nuclear fusion is to energy)

What’s Next? Today Future of Computing Nov 26 Wed No Class Nov 28 Fri No Class. Dec 01 Mon Review Dec 03 Wed Exam 2 Dec 10 Wed Final Exam Due

Ubiquitous Computing (Ubicomp, Pervasive Computing, Ambient Intelligence) “The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it...” Mark Weiser (1991), The Computer for the 21st Century, Scientific American, http://www.ubiq.com/hypertext/weiser/SciAmDraft3.html

“Moore’s Law of User Interfaces” “The number of computers per user will double every two years.” Source: [Vertegaal, 2003]

Major Trends in Computing Source: Weiser and Brown, 1998

Situation Today? How many personal computing devices do you regularly use?

Wireless Body Area Network (WBAN)

Intelligent Home Objectives Application Scenario Ambient Light Sensor, Humidity Sensor, Temperature Sensor for comfort Blind Actuators to enable natural lighting Smart furniture like Chair, Table, Refrigerator, Bed, Mirrors etc with built in sensors Treadmill & other gym. equipment Gas leakage sensor in kitchen Alarms & Reminders Powerline Communication Control Wireless communication with central control unit Objectives Maximize comfort Minimize cost Safety & Security Application Scenario RFID at doorstep – identification Camera at doorstep Displays, Cameras, Mikes & Speakers for inter-house communication Floor Pressure Sensor - sensing

Example of Natural Gestures: DreamSpace Source: http://www.research.ibm.com/natural/dreamspace/ http://www.youtube.com/watch?v=RL9MpXhWCrQ

Social Issues Access rights Secure storage Users in control

Security, Privacy, Trust What data do I wish to expose? To whom? Who can presently access my data? How can I retract data exposed? Who am I communicating with? How do can the privacy of my communication and communication patterns? Who do I trust as a source of information? How do I convince others that I am trustworthy? How to make systems simultaneously secure and usable?

Ubicomp Nightmare http://www.youtube.com/watch?v=ELggeiKKvxQ

Quantum Computing Going beyond Moore’s Law

Our goal for today Understand about quantum computing that you can process news articles like http://www.ddj.com/hpc-high-performance-computing/212200080 http://www.pcworld.com/businesscenter/article/153945/researchers_take_a_step_ahead_in_quantum_computing.html

What is the promise of quantum computers? Computing power has increased exponentially since the 1940s. Current techniques will reach a limit. Current computers are limited in solving certain mathematical problems. These problems are used in today’s current encryption methods. Accurately modeling quantum mechanical processes.

Why Quantum Computing? By 2020 we will hit natural limits on the size of transistors Max out on the number of transistors per chip Reach the minimum size for transistors Reach the limit of speed for devices Eventually, all computing will be done using some sort of alternative structure DNA Cellular Automaton Quantum

Background The idea of the quantum computer first immerged in 1981. Richard Feynman A quantum computer uses the physical characteristics of atoms in order to create powerful computational devices.

"Do not take the lecture too seriously. just relax and enjoy it "Do not take the lecture too seriously . . . just relax and enjoy it. I am going to tell you what nature behaves like. If you will simply admit that maybe she does behave like this, you will find her a delightful, entrancing thing. Do not keep saying to yourself "But how can it be like that?" because you will get . . . into a blind alley from which nobody has yet escaped. Nobody knows how it can be like that." Richard Feynmann on Quantum Mechanics.

Strange aspects of quantum mechanics: Superposition – object doesn’t have definite properties (location, speed) but has probabilities over them. Measurement – object’s properties collapse to definite value when measured, collapsing also properties of other entangled objects. Entanglement – properties of many particles can be correlated.

Double-Slit Experiment How does electron passing thru top slit know to avoid mid point if bottom slit is open? We can never catch an electron “red-handed” behaving bizarrely If we place detector then pattern turns to be as expected.

Qubits Quantum Bits: Qubits The basic unit of a quantum computers is the qubit. Acts like a normal bit in the fact it can be a one or zero. Because of superposition, a qubit can also be both at the same time. This superposition allows for every possible output or input to exist at the same time. Ex. 2-bit word would be 00,01,11,10 all at the same time.

Bits and Qubits The common characteristic of any digital computer is that it stores bits Bits represent the state of some physical system Electronic computers use voltage levels to represent bits Quantum systems possess properties that allow the encoding of bits as physical states Direction of spin of an electron The direction of polarization of a photon The energy level of an excited atom

Spin States An electron is always in one of two spin states Notation: “spin up” – the spin is parallel to the particle axis “spin down” – the spin is anti-parallel to the particle axis Notation: Spin up: Spin down:

Qubit A qubit is a bit represented by a quantum system By convention: A qubit state 0 is the spin up state A qubit state 1 is the spin down state 1

A qubit is governed by the laws of quantum physics While a quantum system can be in one of a discrete set of states, it call also be in a blend of states called a superposition That is a qubit can be in: 1 c0 + c1 |c0|2+|c1|2 = 1 1

Cryptography (or why the NSA is interested in quantum computing) Current encryption methods work by factoring numbers. Ex. 12=2*2*3. Very easy to do for small numbers. Current encryption numbers use over 400 digits in size. Today’s computers would take about a billion years to factor these numbers.

So How Hard is Factoring?

Cryptography (Continued) 1994 Peter W. Shor of AT&T deduced how to take advantage of entanglement and superposition to find the prime factors of an integer. Shor found that a quantum computer could accomplish this factoring much faster in principle than a classical calculator.

Cryptography (Continued)

Quantum Computer Designs NMR (Nuclear Magnetic Resonance) This is just one technique

NMR (Nuclear Magnetic Resonance) Developed at IBM by Issac Chaung. NMR was thought of in 1996 Protons and Neutrons have spin. In a normal atoms these spins cancel out. In isotopes there are extra neutrons. These extra neutrons create a net positive or negative spin in an atom.

NMR How to implement a logic operation. Lining up all the spins A molecule is suspended in a solvent The solvent is then put into a spectrometer’s main magnetic field. This magnetic field aligns all the spins. Radio frequency pulse. One of the atoms’ spins will flip or not flip depending on the spin of the other atoms. Multiple pulse sequences. A quantum algorithm.

NMR (example) Example of radio frequencies interacting with spin. Current NMR Machine

NMR (Pro’s & Cons) Pro’s Con’s Nucleus is naturally protected from outside interference. Once the spins are lined up they will stay in the proper order for a long time. Nuclear qubits already exist in nature. Technology for manipulating these qubits already exists. Hospital magnetic resonance imaging. Con’s Very large in size. Many are 10 feet tall.

NMR (In The Works) Currently NMR machines 3 and 7 qubit machines. Development by IBM to create a 10 qubit machine is in the works. There is also development of small, room temperature NMR machines for more practical uses.

Current Challenges Number of bits in a word. 12-qubit machines is the most advanced to date. Difficulty with large words is too much quantum interaction can produce undesired results. All the atoms interact with each other. Physical size of the machines. Current machines are too large to be of practical use to everyday society.

IBM’s Implementation A modification of Shor’s algorithm was implemented by IBM in 2001 using a “designer molecule” with 7 individually addressable qubits. NMR (nuclear magnetic resonance) techniques enabled them to factor 15.

Implementation Scaling up for larger numbers is theoretically unlimited; practically, error-correcting codes will be required If you can build a big enough quantum computer, you can crack RSA-1024 (about 300 decimal digits) in your lifetime.

Wrap-up Mon, December 1: Review for Exam 2 Wed, December 3: Exam 2 In the meantime, study chapter questions on Blackboard. For Exam 2, you may bring one 8 ½ x 11 inch sheet of paper with whatever you want on it (front and back).