2IS80 Fundamentals of Informatics Spring 2014 Lecture 15: Conclusion Lecturer: Tom Verhoeff.

Slides:



Advertisements
Similar presentations
Physics Information Day. Physics of Information Day.
Advertisements

8/25/2009 Sofya Raskhodnikova Intro to Theory of Computation L ECTURE 1 Theory of Computation Course information Overview of the area Finite Automata Sofya.
Generating Random Numbers
Emergence of Quantum Mechanics from Classical Statistics.
Chien Hsing James Wu David Gottesman Andrew Landahl.
ECE Synthesis & Verification1 ECE 667 Spring 2011 Synthesis and Verification of Digital Systems Verification Introduction.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
Quantum Computation and Error Correction Ali Soleimani.
Quantum Automata Formalism. These are general questions related to complexity of quantum algorithms, combinational and sequential.
Quantum Mechanics from Classical Statistics. what is an atom ? quantum mechanics : isolated object quantum mechanics : isolated object quantum field theory.
A Fault-tolerant Architecture for Quantum Hamiltonian Simulation Guoming Wang Oleg Khainovski.
Quantum Computing Lecture 1 Michele Mosca. l Course Outline
Fundamentals of Python: From First Programs Through Data Structures
Quantum computing Alex Karassev. Quantum Computer Quantum computer uses properties of elementary particle that are predicted by quantum mechanics Usual.
By: Mike Neumiller & Brian Yarbrough
Moore’s Law the number of circuits on a single silicon chip doubles every 18 to 24 months.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Nawaf M Albadia Introduction. Components. Behavior & Characteristics. Classes & Rules. Grid Dimensions. Evolving Cellular Automata using Genetic.
Parallelization: Conway’s Game of Life. Cellular automata: Important for science Biology – Mapping brain tumor growth Ecology – Interactions of species.
Generating Random Numbers in Hardware. Two types of random numbers used in computing: --”true” random numbers: ++generated from a physical source (e.g.,
Presented by: Erik Cox, Shannon Hintzman, Mike Miller, Jacquie Otto, Adam Serdar, Lacie Zimmerman.
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
Neural Key Exchange Presented by: Jessica Lowell 10 December 2009 CS 6750.
Beyond Silicon: Tackling the Unsolvable with DNA.
Governor’s School for the Sciences Mathematics Day 13.
Theory of Computing Lecture 15 MAS 714 Hartmut Klauck.
INTRODUCTION TO THE THEORY OF COMPUTATION INTRODUCTION MICHAEL SIPSER, SECOND EDITION 1.
DNA Computing BY DIVYA TADESERA. Contents  Introduction  History and its origin  Relevancy of DNA computing in 1. Hamilton path problem(NP problem)
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
October 1 & 3, Introduction to Quantum Computing Lecture 1 of 2 Introduction to Quantum Computing Lecture 1 of 2
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
Introduction to Lattice Simulations. Cellular Automata What are Cellular Automata or CA? A cellular automata is a discrete model used to study a range.
Research Into the Time Reversal of Cellular Automata Team rm -rf / Daniel Kaplun, Dominic Labanowski, Alex Lesman.
1 Lecture 16 Quantum computing Ubiquitous Internet Services The client server paradigm DNS Electronic Mail World Wide Web.
Michele Mosca Canada Research Chair in Quantum Computation 27 May 2006 Introduction to quantum technologies: quantum computers, quantum teleporters & cryptography.
Biomolecular Computation in Virtual Test Tubes 7 th International Meeting on DNA Based Computers, p75-83, June 10-13, 2001 Max Garzon, Chris Oehmen Summarized.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Networks Igor Segota Statistical physics presentation.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Quantum Computing by Mathew Ross Jared Davis - Group L -
Umans Complexity Theory Lectures Lecture 1a: Problems and Languages.
A Study of Error-Correcting Codes for Quantum Adiabatic Computing Omid Etesami Daniel Preda CS252 – Spring 2007.
Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.
Nawaf M Albadia
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
PRNGs Pseudo-random number generation. Randomness and Cryptography Randomness and pseudo-randomness are useful in cryptography: –To generate random and.
Quantum Mechanics(14/2) Hongki Lee BIOPHOTONICS ENGINEERING LABORATORY School of Electrical and Electronic Engineering, Yonsei University Quantum Computing.
CS851 – Biological Computing February 6, 2003 Nathanael Paul Randomness in Cellular Automata.
Quantum Computing Michael Larson. The Quantum Computer Quantum computers, like all computers, are machines that perform calculations upon data. Quantum.
Quantum Corby Ziesman Computing. Future of Computing? Transistor-based Computing –Move towards parallel architectures Biological Computing –DNA computing.
2IS80 Fundamentals of Informatics Quartile 2, 2015–2016 Lecture 15: Conclusion Lecturer: Tom Verhoeff.
Basic Q.C. One moose, two moose Red moose, blue moose Live moose, dead moose.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Onlinedeeneislam.blogspot.com1 Design and Analysis of Algorithms Slide # 1 Download From
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
Quantum Computers By Ryan Orvosh.
QUANTUM PHYSICS BY- AHRAZ, ABHYUDAI AND AKSHAY LECTURE SECTION-5 GROUP NO. 6.
1 An Introduction to Quantum Computing Sabeen Faridi Ph 70 October 23, 2007.
Quantum Computing: An Introduction
Sub-fields of computer science. Sub-fields of computer science.
QUANTUM COMPUTING: Quantum computing is an attempt to unite Quantum mechanics and information science together to achieve next generation computation.
COMPSCI 290.2: Computer Security
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Alexei Fedorov January, 2011
OSU Quantum Information Seminar
Quantum Computing and the Quest for Quantum Computational Supremacy
Quantum computation with classical bits
Quantum Computing Hakem Alazmi Jhilakshi Sharma Linda Vu.
Presentation transcript:

2IS80 Fundamentals of Informatics Spring 2014 Lecture 15: Conclusion Lecturer: Tom Verhoeff

Road Map  Historic Introduction  Core Themes: Computational Mechanisms: Automata Algorithms: Computations for Problem Solving Information: Communication & Storage Limits of Computability  Forward-looking Conclusion

Conclusion: Looking Forward

What Else Is, or Will Be, There  Other computational mechanisms: Cellular Automata  Other types of algorithms: Randomness, Randomized Algorithms  Other physical possibilities for computation and communication: Molecular/DNA Computing Quantum Cryptography Quantum Computing

Cellular Automaton (CA)  Linear arrangement of cells  Each cell is in one of two states: on/off, 0/1, black/white  Next state determined by its own state and that of both neighbors  For each of these 2 3 = 8 possible combinations: one next state  All cells change state together, synchronously xx xx xx xx xx xx xx xx

CA Example: Rule 30

CA Analysis  Elementary CA-rule specified by 8 bits  2 8 = 256 next state functions possible  All these 256 rules have been investigated  Classification of possible behaviors: 1. Stabilize: reach all-0 or all-1 2. Become (semi-)periodic: oscillating, or traveling pattern 3. Pseudo-random 4. Universal (”complex”, “interesting”)  Applications: physics, chemistry, biology, …

CA Example: Rule 109

All Elementary Cellular Automata

Randomness  What is true randomness? Unpredictable: No algorithm exists to predict next symbol Nondeterministic: Fundamentally undetermined / open Stochastic: Following mathematical axioms of probability theory Chaotic: Extremely sensitive to initial conditions Incompressible: without shorter algorithmic description  Randomized algorithms  Psuedo-random number generation (PRNG) Period Seed for reproducibility Cryptographically secure  Cellular Automaton, Game of Life  Also: predicting the future

Algorithmic Information Theory  Consider a specific bit sequence  Even without knowing any probabilistic basis for its generation, you might be able to describe (communicate) it in fewer bits  E.g. a sequence of one thousand 1s, or (10) 500  Just send a program that generates the intended sequence  You do need to agree on a programming language

Lists versus Generators (in Python) def fiblist(n): """ Returns list of Fibonacci numbers < n.""" result = [ ] a, b = 0, 1 while a < n: result.append(a) a, b = b, a + b return result def fibgen(n): """ Returns generator for Fibonacci numbers < n.""" a, b = 0, 1 while a < n: yield a a, b = b, a + b print sum(fiblist(1000)) # first stores all numbers in a list print sum(fibgen(1000)) # does not store the numbers

Randomized Algorithms  Cf. Ch. 6 of Algorithmic Adventures by Juraj Hromkovic  Hardware is not 100% reliable  Sacrificing some algorithmic reliability to improve efficiency is ok  Randomized algorithms sacrifice reliability to improve efficiency

Bit-String Equality Problem

Randomized Comm. Protocol: WITNESS

WITNESS: Communication Cost

WITNESS: Reliability Definitions

WITNESS: Reliability Analysis

Improve Reliability by Repetition

Nature Computes  Analog versus digital computers  Modulation and demodulation: to get into and out of physical world  It from bit (Wheeler): It from bit Information and computation at the core of physics Instead of matter and energy

DNA Computing  Cf. Ch. 8 of Algorithmic Adventures by Juraj Hromkovic  In 1994, Len Adleman (known of RSA public-key cryptography) used synthetic DNA to solve an instance of the Hamiltonian Path Problem (an NP-complete problem) It involves a clever encoding of the graph in DNA fragments  Nodes, directed edges, and their connectivity These DNA fragments combine, by complementarity, to form paths of the graph Various molecular techniques select only the relevant paths Mobilizes massive parallelism on the molecular level  No follow up, to date: tricky; error-prone; does not scale well

Quantum Computing  Cf. Ch. 9 of Algorithmic Adventures by Juraj Hromkovic  Google Quantum Computing Playground  Quantum bit, also known as qubit Qubit state is superposition of classical states: a |0 + b |1  a and b are complex amplitudes, with |a| 2 + |b| 2 = 1  |a| 2 = probability to observe 0; |b| 2 = probability to observe 1 System of N classical bits has N degrees of freedom System of N qubits has 2 N degrees of freedom (entanglement)  One complex amplitude per classical state  N=3: a 0 |000 + a 1 |001 + a 2 |010 + a 3 |011 + … + a 7 |111  Entangled state of two qubits: ( |00 + |11 ) / √2  Quantum gate operates on full quantum state of qubit sequence Exponential amount of work in terms of classical bits

Quantum Computer  Works in theory  Building blocks demonstrated in isolation, on small scale Extremely specialized equipment  Complete prototypes still under development  Various algorithms available Integer factorization (15 = 3 x 5)  Challenges: Initialize entangled state of all qubits Protect the quantum state against decoherence Apply error-free quantum operations Read out the final state

Quantum Cryptography  Exploits entanglement for secure communication Eavesdropping is detectable  Commercially available

Fundamentals of Informatics  We hope you enjoyed the fun(damentals)

Summary  Cellular Automaton Cellular Automaton Conway’s Game of Life Golly  Randomness Randomness History of Randomness Randomized Algorithm Cryptographically secure pseudo-random number generation  Digital Physics Digital Physics  DNA Computing DNA Computing  Quantum Cryptography Quantum Cryptography  Quantum Computer Quantum Computer  Google Quantum Computing Playground Google Quantum Computing Playground  Juraj Hromkovic, Algorithmic Adventures, Springer 2009

Announcements  Written exam