Bevezetés a kvantum-informatikába és kommunikációba 2014/2015 tavasz. Mérés, NCT, kvantumállapot március 12.

Size: px
Start display at page:

Download "Bevezetés a kvantum-informatikába és kommunikációba 2014/2015 tavasz. Mérés, NCT, kvantumállapot. 2015. március 12."

Transcription

1 Bevezetés a kvantum-informatikába és kommunikációba 2014/2015 tavasz Mérés, NCT, kvantumállapot március 12.

2 Tegnap még összefonódtam, mára megmértek

3 Slides for Quantum Computing and Communications An Engineering Approach Sándor Imre Ferenc Balázs

4 3 rd Postulate using ket notations Measurement statistic Post measurement state Completeness relation

5 Measurement operators and the 3 rd Postulate in case of projective measurements 3 rd Postulate with projectors

6 POVM and the 3 rd Postulate Measurement statistic Post measurement state Unknown and/or indifferent! Completeness relation

7 POVM construction example Our two non-orthogonal states are: Based on the indirect construction approach we try to ensure that To achieve this we need

8 POVM construction example To fulfil the completeness relation

9 Completeness relation OK since

10 D 2 must be positive semi-definite is very promising, but unfortunately wrong!

11 How to apply POVM operators - 0 and 1 has the same importance It requires

12 How to apply POVM operators - minimising uncertainty Goal: to minimise Assuming

13 How to apply POVM operators - minimising uncertainty Copyright 2005 John Wiley & Sons Ltd.

14 How to apply POVM operators - false alarm vs. not happen alarm It is assumed that detecting 1 correctly is much more important Copyright 2005 John Wiley & Sons Ltd.

15 Generalisation of POVM

16 Relations among the measurement types Projective measurement can be regarded as a special POVM. Clearly speaking POVM is a generalised measurement without the interest of post-measurement state + construction rules. Neumark s extension: any generalised measurement can be implemented by means of a projective measurement + auxiliary qbits + unitary transform.

17 Relations among the measurement types Copyright 2005 John Wiley & Sons Ltd.

18 No Cloning (Copy) Theorem "Knowledge is what we get when an observer, preferably a scientifically trained observer, provides us with a copy of reality that we can all recognize. " Christopher Lasch

19 Existence of universal quantum copy machine 1 Copyright 2005 John Wiley & Sons Ltd. Upper wire: quantum state to be cloned. Middle wire: auxiliary qubits. Lower wire: environment. We are interested whether such an U exists at all? If the answer is YES then we are going to search for Q.

20 Existence of universal quantum copy machine 2 Making a copy means: U must be unitary i.e. it preserves the inner product. For input For output The two inner products are the same if

21 No cloning theorem No quantum gate exists which is able to copy quantum states from an unknown and arbitrary set of states! But Orthogonal (e.g. classical states, or Bell pairs) can be copied in compliance with our everyday computer practice. Arbitrary but known states can also be copied (see the forthcoming slides).

22 How to Prepare an Arbirary Superposition "By failing to prepare, you are preparing to fail." Benjamin Franklin "I m just preparing my impromptu remarks. Winston Churchill

23 Abstract quantum circuit of the generalised interferometer 1 Copyright 2005 John Wiley & Sons Ltd.

24 Abstract quantum circuit of the generalised interferometer 2 Copyright 2005 John Wiley & Sons Ltd.

25 Abstract quantum circuit of the generalised interferometer 3 Copyright 2005 John Wiley & Sons Ltd.

26 Abstract quantum circuit of the generalised interferometer 4 Copyright 2005 John Wiley & Sons Ltd.

27 Abstract quantum circuit of the generalised interferometer 4 Copyright 2005 John Wiley & Sons Ltd. We managed to produce an almost arbitrary state, the only restriction is related to the global phase. The global phase, however, does not influence measurement statistic.

28 Dr. Bacsárdi László, BME

29 Kvantum-áramkör Dr. Bacsárdi László, BME

30 Szupersűrűségű tömörítés 1992: elmélet 1996: sikeres kísérlet Bennett, C. H. & Wiesner, S. J. Communication via one- and two-particle operators on Einstein Podolsky Rosen states. Phys. Rev. Lett. 69, (1992). Mattle, K. et al. Dense coding in experimental quantum communication. Phys. Rev. Lett. 76, (1996). Dr. Bacsárdi László, BME

31 Dr. Bacsárdi László, BME Teleportálás

32 Dr. Bacsárdi László, BME Teleportálás

33 1993: elmélet Teleportálás 1998: sikeres kísérlet 2004: 600 méter 2012: 97 km (Kína) 2012: 143 km (Kanári-szigetek) C. H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, W. K. Wootters, Teleporting an Unknown Quantum State via Dual Classical and Einstein- Podolsky-Rosen Channels, Phys. Rev. Lett. 70, (1993) Juan Yin et. al, Quantum teleportation and entanglement distribution over 100-kilometre free-space channels, Nature (2012) Ma, X. S.; Herbst, T.; Scheidl, T.; Wang, D.; Kropatschek, S.; Naylor, W.; Wittmann, B.; Mech, A. et al. (2012). "Quantum teleportation over 143 kilometres using active feed-forward". Nature 489 (7415): C. Nölleke, A. Neuzner, A. Reiserer, C. Hahn, G. Rempe, S. Ritter}, Efficient Teleportation Between Remote Single-Atom Quantum Memories, Phys. Rev. Lett. 110, (2013) Dr. Bacsárdi László, BME

34 Alkalmazzuk L. Bacsardi, D. Banyai, S. Imre, Analyzing Communication in Quantum Based Mobile Ad Hoc Networks, AQIS'13 - Asian Quantum Information Science Conference. Chennai, India, pp L. Bacsardi, Quantum Based Solutions for Efficient Communication Networks, IEEE 17th International Conference on Intelligent Engineering Systems, Monte de la Cruz, Costa Rica, IEEE, pp Dr. Bacsárdi László, BME

35 Slides for Quantum Computing and Communications An Engineering Approach Chapter 4 Sándor Imre Ferenc Balázs

36 Motto "The fastest algorithm can frequently be replaced by one that is almost as fast and much easier to understand. Neil D. Jones

37 Superdense Coding

38 The goal From classical information theory point of view the information transmission rate is limited. Alice and Bob would like to increase the rate of information transfer by means of quantum communications exploiting such special properties as antanglement.

39 Copyright 2005 John Wiley & Sons Ltd. The architecture

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Javier Enciso encisomo@in.tum.de Joint Advanced Student School 009 Technische Universität München April, 009 Abstract In this paper, a gentle introduction to Quantum Computing

More information

Quantum Encoder and Decoder for Secret Key Distribution with Check Bits

Quantum Encoder and Decoder for Secret Key Distribution with Check Bits Research Journal of Applied Sciences, Engineering and Technology 6(23): 4381-4386, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: January 31, 2013 Accepted: May

More information

230483 - QOT - Quantum Optical Technologies

230483 - QOT - Quantum Optical Technologies Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 230 - ETSETB - Barcelona School of Telecommunications Engineering 739 - TSC - Department of Signal Theory and Communications

More information

QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION

QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION Arun K. Pati Theoretical Physics Division QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION Introduction Quantum information theory is a marriage between two scientific pillars of the twentieth

More information

BOX. The density operator or density matrix for the ensemble or mixture of states with probabilities is given by

BOX. The density operator or density matrix for the ensemble or mixture of states with probabilities is given by 2.4 Density operator/matrix Ensemble of pure states gives a mixed state BOX The density operator or density matrix for the ensemble or mixture of states with probabilities is given by Note: Once mixed,

More information

arxiv:quant-ph/9809016 v2 19 Jan 2000

arxiv:quant-ph/9809016 v2 19 Jan 2000 An Introduction to Quantum Computing for Non-Physicists arxiv:quant-ph/9809016 v 19 Jan 000 Eleanor Rieffel FX Palo Alto Labratory and Wolfgang Polak Consultant FX Palo Alto Laboratory, 3400 Hillview Avenue,

More information

arxiv:quant-ph/9607009v1 11 Jul 1996

arxiv:quant-ph/9607009v1 11 Jul 1996 Distillability of Inseparable Quantum Systems Micha l Horodecki Department of Mathematics and Physics University of Gdańsk, 80 952 Gdańsk, Poland arxiv:quant-ph/9607009v1 11 Jul 1996 Pawe l Horodecki Faculty

More information

The New Approach of Quantum Cryptography in Network Security

The New Approach of Quantum Cryptography in Network Security The New Approach of Quantum Cryptography in Network Security Avanindra Kumar Lal 1, Anju Rani 2, Dr. Shalini Sharma 3 (Avanindra kumar) Abstract There are multiple encryption techniques at present time

More information

How To Solve An Npa-Complete Problems With Quantum Computing And Chaotic Dynamics

How To Solve An Npa-Complete Problems With Quantum Computing And Chaotic Dynamics CDMTCS Research Report Series A New Quantum Algorithm for NP-complete Problems Masanori Ohya Igor V. Volovich Science University of Tokyo Steklov Mathematical Institute CDMTCS-194 September 00 Centre for

More information

Authentic Digital Signature Based on Quantum Correlation

Authentic Digital Signature Based on Quantum Correlation Authentic Digital Signature Based on Quantum Correlation Xiao-Jun Wen, Yun Liu School of Electronic Information Engineering, Beijing Jiaotong University, Beijing 00044, China Abstract: An authentic digital

More information

Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission

Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission Title Application of Quantum Cryptography Detectable Data Transmission Author(s) Kudo, Takamitsu; Usuda, Tsuyoshi Sa Masayasu IEICE Transactions on Fundamentals Citation Communications and Computer Science

More information

Enhancing privacy with quantum networks

Enhancing privacy with quantum networks Enhancing privacy with quantum networks P. Mateus N. Paunković J. Rodrigues A. Souto SQIG- Instituto de Telecomunicações and DM - Instituto Superior Técnico - Universidade de Lisboa Abstract Using quantum

More information

QUANTUM LIGHT :! A BRIEF INTRODUCTION!

QUANTUM LIGHT :! A BRIEF INTRODUCTION! Quantum Physics QUANTUM LIGHT : A BRIEF INTRODUCTION Philippe Grangier Laboratoire Charles Fabry de l'institut d'optique, UMR 85 du CNRS, 927 Palaiseau, France Quantum Physics * Alain Aspect, in «Demain

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Frédéric Magniez LIAFA & PCQC, Université Paris Diderot The genesis 2 Copenhagen School (Bohr, Heisenberg, ) - The state of a quantum particule is only fixed after a measurement

More information

Keywords Quantum logic gates, Quantum computing, Logic gate, Quantum computer

Keywords Quantum logic gates, Quantum computing, Logic gate, Quantum computer Volume 3 Issue 10 October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Introduction

More information

Quantum Computing. Robert Sizemore

Quantum Computing. Robert Sizemore Quantum Computing Robert Sizemore Outline Introduction: What is quantum computing? What use is quantum computing? Overview of Quantum Systems Dirac notation & wave functions Two level systems Classical

More information

COMPSCI 111/111G. Quantum Computing. Term 1, 2015. Prepared using LATEX Beamer by Cristian S.Calude 1 / 26

COMPSCI 111/111G. Quantum Computing. Term 1, 2015. Prepared using LATEX Beamer by Cristian S.Calude 1 / 26 COMPSCI 111/111G Quantum Computing Prepared using LATEX Beamer by Cristian S.Calude Term 1, 2015 1 / 26 Classical vs. Quantum Computers Quantum computing was first introduced by Yuri Manin in 1980 and

More information

Using quantum computing to realize the Fourier Transform in computer vision applications

Using quantum computing to realize the Fourier Transform in computer vision applications Using quantum computing to realize the Fourier Transorm in computer vision applications Renato O. Violin and José H. Saito Computing Department Federal University o São Carlos {renato_violin, saito }@dc.uscar.br

More information

A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing

A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing J.Senthil Murugan 1, V.Parthasarathy 2, S.Sathya 3, M.Anand 4 Assistant Professor, VelTech HighTech Dr.Rangarajan Dr.Sakunthala

More information

A Probabilistic Quantum Key Transfer Protocol

A Probabilistic Quantum Key Transfer Protocol A Probabilistic Quantum Key Transfer Protocol Abhishek Parakh Nebraska University Center for Information Assurance University of Nebraska at Omaha Omaha, NE 6818 Email: aparakh@unomaha.edu August 9, 01

More information

Quantum Computing: Lecture Notes. Ronald de Wolf

Quantum Computing: Lecture Notes. Ronald de Wolf Quantum Computing: Lecture Notes Ronald de Wolf Preface These lecture notes were formed in small chunks during my Quantum computing course at the University of Amsterdam, Feb-May 2011, and compiled into

More information

Quantum Cryptography: The Ultimate Solution to Secure Data Transmission?

Quantum Cryptography: The Ultimate Solution to Secure Data Transmission? Quantum Cryptography: The Ultimate Solution to Secure Data Transmission? Ioannis P. Antoniades 1, Amalia N. Miliou 2, Miltiades K. Hatalis 3 1 Department of Informatics, Aristotle University of Thessaloniki,

More information

Quantum Machine Learning Algorithms: Read the Fine Print

Quantum Machine Learning Algorithms: Read the Fine Print Quantum Machine Learning Algorithms: Read the Fine Print Scott Aaronson For twenty years, quantum computing has been catnip to science journalists. Not only would a quantum computer harness the notorious

More information

24 th IEEE Annual Computer Communications Workshop (CCW)

24 th IEEE Annual Computer Communications Workshop (CCW) 24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California

More information

Quantum Computing Architectures

Quantum Computing Architectures Quantum Computing Architectures 1:-2: Fred Chong (UCD) - Intro, quantum algorithms, and error correction 2:-2:3 Break and discussion 2:3-3:3 Ike Chuang (MIT) - Device technology and implementation issues

More information

Entanglement: The Holy Grail of High-Speed Design

Entanglement: The Holy Grail of High-Speed Design by Barry Olney column BEYOND DESIGN Entanglement: The Holy Grail of High-Speed Design While high-speed SERDES serial communications seems to currently be at the cutting edge of technology, maybe it will

More information

Quantum Computation and Quantum Information. Michael A. Nielsen & Isaac L. Chuang

Quantum Computation and Quantum Information. Michael A. Nielsen & Isaac L. Chuang Quantum Computation and Quantum Information Michael A. Nielsen & Isaac L. Chuang PUBLISHED BY THE PRESS SYNDICATE OF THE UNIVERSITY OF CAMBRIDGE The Pitt Building, Trumpington Street, Cambridge, United

More information

What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm

What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm 1 Question: What has quantum mechanics to do with factoring? Answer: Nothing! 2 Question: What

More information

Factoring by Quantum Computers

Factoring by Quantum Computers Factoring by Quantum Computers Ragesh Jaiswal University of California, San Diego A Quantum computer is a device that uses uantum phenomenon to perform a computation. A classical system follows a single

More information

Towards a Tight Finite Key Analysis for BB84

Towards a Tight Finite Key Analysis for BB84 The Uncertainty Relation for Smooth Entropies joint work with Charles Ci Wen Lim, Nicolas Gisin and Renato Renner Institute for Theoretical Physics, ETH Zurich Group of Applied Physics, University of Geneva

More information

Nanoscience Course Descriptions

Nanoscience Course Descriptions Nanoscience Course Descriptions NANO*1000 Introduction to Nanoscience This course introduces students to the emerging field of nanoscience. Its representation in popular culture and journalism will be

More information

A loophole-free Bell test

A loophole-free Bell test A loophole-free Bell test Bas Hensen February 15, 2013 In 1964, John Bell showed that any local realistic theory disagrees with the predictions of quantum mechanics on measurements of distant objects.

More information

Programming Telepathy: Implementing Quantum Non-locality Games

Programming Telepathy: Implementing Quantum Non-locality Games Programming Telepathy: Implementing Quantum Non-locality Games Anya Tafliovich, Eric C.R. Hehner 1 University of Toronto, Toronto ON M5S 3G4, Canada {anya,hehner}@cs.toronto.edu Abstract. Quantum pseudo-telepathy

More information

Quantum steering, entanglement and Bell nonlocality.

Quantum steering, entanglement and Bell nonlocality. Quantum steering, entanglement and Bell nonlocality. Frederick Denis Vas October 16, 2014 Supervised by Professor Terence Rudolph Submitted in partial fulfilment of the requirements for the degree of Master

More information

International Journal of Emerging Technology & Research

International Journal of Emerging Technology & Research International Journal of Emerging Technology & Research An Implementation Scheme For Software Project Management With Event-Based Scheduler Using Ant Colony Optimization Roshni Jain 1, Monali Kankariya

More information

Quantum Computing Lecture 7. Quantum Factoring. Anuj Dawar

Quantum Computing Lecture 7. Quantum Factoring. Anuj Dawar Quantum Computing Lecture 7 Quantum Factoring Anuj Dawar Quantum Factoring A polynomial time quantum algorithm for factoring numbers was published by Peter Shor in 1994. polynomial time here means that

More information

Quantum Computability and Complexity and the Limits of Quantum Computation

Quantum Computability and Complexity and the Limits of Quantum Computation Quantum Computability and Complexity and the Limits of Quantum Computation Eric Benjamin, Kenny Huang, Amir Kamil, Jimmy Kittiyachavalit University of California, Berkeley December 7, 2003 This paper will

More information

Quantum Computation with Bose-Einstein Condensation and. Capable of Solving NP-Complete and #P Problems. Abstract

Quantum Computation with Bose-Einstein Condensation and. Capable of Solving NP-Complete and #P Problems. Abstract Quantum Computation with Bose-Einstein Condensation and Capable of Solving NP-Complete and #P Problems Yu Shi Cavendish Laboratory, University of Cambridge, Cambridge CB3 0HE, United Kingdom Abstract It

More information

Department of Atomic and Laser Physics, University of Oxford, Clarendon Laboratory, Parks Road, Oxford OX1 3PU, UK

Department of Atomic and Laser Physics, University of Oxford, Clarendon Laboratory, Parks Road, Oxford OX1 3PU, UK Rep. Prog. Phys. 61 (1998) 117 173. Printed in the UK PII: S0034-4885(98)75168-1 Quantum computing Andrew Steane Department of Atomic and Laser Physics, University of Oxford, Clarendon Laboratory, Parks

More information

DO WE REALLY UNDERSTAND QUANTUM MECHANICS?

DO WE REALLY UNDERSTAND QUANTUM MECHANICS? DO WE REALLY UNDERSTAND QUANTUM MECHANICS? COMPRENONS-NOUS VRAIMENT LA MECANIQUE QUANTIQUE? VARIOUS INTERPRETATIONS OF QUANTUM MECHANICS IHES, 29 janvier 2015 Franck Laloë, LKB, ENS Paris 1 INTRODUCTION

More information

Quantum Key Distribution Protocols: A Review

Quantum Key Distribution Protocols: A Review IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XI (Mar-Apr. 2014), PP 01-09 Quantum Key Distribution Protocols: A Review Hitesh Singh 1, D.L.

More information

Master equation for retrodiction of quantum communication signals

Master equation for retrodiction of quantum communication signals Master equation for odiction of quantum communication signals Stephen M. Barnett 1, David T. Pegg 2, John Jeffers 1 and Ottavia Jedrkiewicz 3 1 Department of Physics and Applied Physics, University of

More information

Bits Superposition Quantum Parallelism

Bits Superposition Quantum Parallelism 7-Qubit Quantum Computer Typical Ion Oscillations in a Trap Bits Qubits vs Each qubit can represent both a or at the same time! This phenomenon is known as Superposition. It leads to Quantum Parallelism

More information

Quantum Network Coding

Quantum Network Coding Salah A. Aly Department of Computer Science Texas A& M University Quantum Computing Seminar April 26, 2006 Network coding example In this butterfly network, there is a source S 1 and two receivers R 1

More information

PROTOTYPE TO DESIGN A LEASED LINE TELEPHONE NETWORK CONNECTING LOCATIONS TO MINIMIZE THE INSTALLATION COST

PROTOTYPE TO DESIGN A LEASED LINE TELEPHONE NETWORK CONNECTING LOCATIONS TO MINIMIZE THE INSTALLATION COST PROTOTYPE TO DESIGN A LEASED LINE TELEPHONE NETWORK CONNECTING LOCATIONS TO MINIMIZE THE INSTALLATION COST Abstract ARCHANA SHARMA Research Scholar, Computer Science and Enginering Department,, NIMS University,

More information

Structural constraints in complex networks

Structural constraints in complex networks Structural constraints in complex networks Dr. Shi Zhou Lecturer of University College London Royal Academy of Engineering / EPSRC Research Fellow Part 1. Complex networks and three key topological properties

More information

Shor s algorithm and secret sharing

Shor s algorithm and secret sharing Shor s algorithm and secret sharing Libor Nentvich: QC 23 April 2007: Shor s algorithm and secret sharing 1/41 Goals: 1 To explain why the factoring is important. 2 To describe the oldest and most successful

More information

Quantum Computation: Towards the Construction of a Between Quantum and Classical Computer

Quantum Computation: Towards the Construction of a Between Quantum and Classical Computer Quantum Computation: Towards the Construction of a Between Quantum and Classical Computer Diederik Aerts and Bart D Hooghe Center Leo Apostel for Interdisciplinary Studies (CLEA) Foundations of the Exact

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information

A Modest View of Bell s Theorem. Steve Boughn, Princeton University and Haverford College

A Modest View of Bell s Theorem. Steve Boughn, Princeton University and Haverford College A Modest View of Bell s Theorem Steve Boughn, Princeton University and Haverford College Talk given at the 2016 Princeton-TAMU Symposium on Quantum Noise Effects in Thermodynamics, Biology and Information

More information

A fast multi-class SVM learning method for huge databases

A fast multi-class SVM learning method for huge databases www.ijcsi.org 544 A fast multi-class SVM learning method for huge databases Djeffal Abdelhamid 1, Babahenini Mohamed Chaouki 2 and Taleb-Ahmed Abdelmalik 3 1,2 Computer science department, LESIA Laboratory,

More information

Verification of Concurrent Quantum Protocols by Equivalence Checking

Verification of Concurrent Quantum Protocols by Equivalence Checking Verification of Concurrent Quantum Protocols by Equivalence Checking Ebrahim Ardeshir-Larijani 1,2, Simon J. Gay 2, and Rajagopal Nagarajan 3 1 Department of Computer Science, University of Warwick E.Ardeshir-Larijani@warwick.ac.uk

More information

Quantum Computing and Cryptography Their impact on cryptographic practice

Quantum Computing and Cryptography Their impact on cryptographic practice Quantum Computing and Cryptography Their impact on cryptographic practice Tim Moses Director, Advanced Security Technology Entrust, Inc. January 2009 2009 Entrust, Inc. All rights reserved. Entrust is

More information

Integrated Modeling for Data Integrity in Product Change Management

Integrated Modeling for Data Integrity in Product Change Management Integrated Modeling for Data Integrity in Product Change Management László Horváth*, Imre J. Rudas** Institute of Intelligent Engineering Systems, John von Neumann Faculty of Informatics, Budapest Tech

More information

Fernanda Ostermann Institute of Physics, Department of Physics, Federal University of Rio Grande do Sul, Brazil. fernanda.ostermann@ufrgs.

Fernanda Ostermann Institute of Physics, Department of Physics, Federal University of Rio Grande do Sul, Brazil. fernanda.ostermann@ufrgs. Teaching the Postulates of Quantum Mechanics in High School: A Conceptual Approach Based on the Use of a Virtual Mach-Zehnder Interferometer Alexsandro Pereira de Pereira Post-Graduate Program in Physics

More information

0.1 Phase Estimation Technique

0.1 Phase Estimation Technique Phase Estimation In this lecture we will describe Kitaev s phase estimation algorithm, and use it to obtain an alternate derivation of a quantum factoring algorithm We will also use this technique to design

More information

Entanglement and its Role in Shor's Algorithm

Entanglement and its Role in Shor's Algorithm ntanglement and its Role in Shor's Algorithm Vivien M. Kendon 1, William J. Munro Trusted Systems Laboratory P Laboratories Bristol PL-2005-215 December 5, 2005* entanglement, Shor's algorithm ntanglement

More information

Anonymous key quantum cryptography and unconditionally secure quantum bit commitment

Anonymous key quantum cryptography and unconditionally secure quantum bit commitment Anonymous key quantum cryptography and unconditionally secure quantum bit commitment Horace P. Yuen Department of Electrical and Computer Engineering Department of Physics and Astronomy Northwestern University

More information

arxiv:quant-ph/0611042v2 8 Nov 2006

arxiv:quant-ph/0611042v2 8 Nov 2006 Quantum states characterization for the zero-error capacity arxiv:quant-ph/0611042v2 8 Nov 2006 Rex A C Medeiros,,1,2 Romain Alléaume,2, Gérard Cohen,3 and Francisco M. de Assis,4 Département Informatique

More information

Adversary Modelling 1

Adversary Modelling 1 Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway

More information

Introduction to computer science

Introduction to computer science Introduction to computer science Michael A. Nielsen University of Queensland Goals: 1. Introduce the notion of the computational complexity of a problem, and define the major computational complexity classes.

More information

HYBRID GENETIC ALGORITHMS FOR SCHEDULING ADVERTISEMENTS ON A WEB PAGE

HYBRID GENETIC ALGORITHMS FOR SCHEDULING ADVERTISEMENTS ON A WEB PAGE HYBRID GENETIC ALGORITHMS FOR SCHEDULING ADVERTISEMENTS ON A WEB PAGE Subodha Kumar University of Washington subodha@u.washington.edu Varghese S. Jacob University of Texas at Dallas vjacob@utdallas.edu

More information

3-9 EPR and Bell s theorem. EPR Bohm s version. S x S y S z V H 45

3-9 EPR and Bell s theorem. EPR Bohm s version. S x S y S z V H 45 1 3-9 EPR and Bell s theorem EPR Bohm s version S x S y S z n P(n) n n P(0) 0 0 V H 45 P(45) D S D P(0) H V 2 ( ) Neumann EPR n P(n) EPR PP(n) n EPR ( ) 2 5 2 3 But even at this stage there is essentially

More information

74 September 2007/Vol. 50, No. 9 COMMUNICATIONS OF THE ACM

74 September 2007/Vol. 50, No. 9 COMMUNICATIONS OF THE ACM 74 September 2007/Vol. 50, No. 9 COMMUNICATIONS OF THE ACM By Dave Bacon and Debbie Leung TOWARD A WORLD WITH QUANTUM COMPUTERS Surveying the recent past and projecting future developments and applications

More information

PHYSICAL REVIEW A 79, 052110 2009. Multiple-time states and multiple-time measurements in quantum mechanics

PHYSICAL REVIEW A 79, 052110 2009. Multiple-time states and multiple-time measurements in quantum mechanics Multiple-time states and multiple-time measurements in quantum mechanics Yakir Aharonov, 1, Sandu Popescu, 3,4 Jeff Tollaksen, and Lev Vaidman 1 1 Raymond and Beverly Sackler School of Physics and Astronomy,

More information

Guessing Game: NP-Complete?

Guessing Game: NP-Complete? Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple

More information

Applications of Quantum Chemistry HΨ = EΨ

Applications of Quantum Chemistry HΨ = EΨ Applications of Quantum Chemistry HΨ = EΨ Areas of Application Explaining observed phenomena (e.g., spectroscopy) Simulation and modeling: make predictions New techniques/devices use special quantum properties

More information

arxiv:1403.3122v1 [quant-ph] 12 Mar 2014

arxiv:1403.3122v1 [quant-ph] 12 Mar 2014 Relativistic Quantum Cryptography I. V. Radchenko and K. S. Kravtsov A.. Prokhorov General Physics Institute RAS, oscow, Russia S. P. Kulik Faculty of Physics, oscow State University, oscow, Russia S.

More information

The Impact of Big Data on Classic Machine Learning Algorithms. Thomas Jensen, Senior Business Analyst @ Expedia

The Impact of Big Data on Classic Machine Learning Algorithms. Thomas Jensen, Senior Business Analyst @ Expedia The Impact of Big Data on Classic Machine Learning Algorithms Thomas Jensen, Senior Business Analyst @ Expedia Who am I? Senior Business Analyst @ Expedia Working within the competitive intelligence unit

More information

University of Warwick institutional repository: http://go.warwick.ac.uk/wrap. A Thesis Submitted for the Degree of PhD at the University of Warwick

University of Warwick institutional repository: http://go.warwick.ac.uk/wrap. A Thesis Submitted for the Degree of PhD at the University of Warwick University of Warwick institutional repository: http://go.warwick.ac.uk/wrap A Thesis Submitted for the Degree of PhD at the University of Warwick http://go.warwick.ac.uk/wrap/63940 This thesis is made

More information

Quantum is Sexy. Google - Millions of Search Hits

Quantum is Sexy. Google - Millions of Search Hits Quantum Computation A Glimpse Into the Future of Computing 6/16/2004 Richard Gordon richard_gordon@verizon.net Agenda Introduction Richard Gordon Quantum 101> Dr. Collin Williams JPL Dr. Colin Williams

More information

Superposition & the paradoxes of quantum mechanics

Superposition & the paradoxes of quantum mechanics Superposition & the paradoxes of quantum mechanics phil 20229 Jeff Speaks February 5, 2008 1 Some examples of quantum weirdness........................... 1 1.1 Color and hardness..................................

More information

Business Intelligence and Decision Support Systems

Business Intelligence and Decision Support Systems Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley

More information

Study on Differential Protection of Transmission Line Using Wireless Communication

Study on Differential Protection of Transmission Line Using Wireless Communication Study on Differential Protection of Transmission Line Using Wireless Communication George John.P 1, Agna Prince 2, Akhila.K.K 3, Guy Marcel 4, Harikrishnan.P 5 Professor, Dept. of EEE, MA Engineering College,

More information

Early Cloud Experiences with the Kepler Scientific Workflow System

Early Cloud Experiences with the Kepler Scientific Workflow System Available online at www.sciencedirect.com Procedia Computer Science 9 (2012 ) 1630 1634 International Conference on Computational Science, ICCS 2012 Early Cloud Experiences with the Kepler Scientific Workflow

More information

Techniques algébriques en calcul quantique

Techniques algébriques en calcul quantique Techniques algébriques en calcul quantique E. Jeandel Laboratoire de l Informatique du Parallélisme LIP, ENS Lyon, CNRS, INRIA, UCB Lyon 8 Avril 25 E. Jeandel, LIP, ENS Lyon Techniques algébriques en calcul

More information

Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4

Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4 Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4 Computer Science and Engineering, KL University Green Fields, Vaddeswaram, PO Dt-522 502, Andhra Pradesh,

More information

Quantum Cryptography Between Science and Business

Quantum Cryptography Between Science and Business Radboud Honours Academy 2011-12 May 29, 2012 Quantum Cryptography Between Science and Business Wilke Castelijns Maria van Rooijen David Venhoek Patrick Uiterwijk Preface In this report we discuss the results

More information

Department of Commerce National Institute of Standards and Technology (NIST)

Department of Commerce National Institute of Standards and Technology (NIST) Department of Commerce National Institute of Standards and Technology (NIST) Response to Request for Information on Quantum Information Science and the Needs of U.S. Industry Posted Date: April 8, 2015

More information

arxiv:quant-ph/0404128v1 22 Apr 2004

arxiv:quant-ph/0404128v1 22 Apr 2004 How to teach Quantum Mechanics arxiv:quant-ph/0404128v1 22 Apr 2004 Oliver Passon Fachbereich Physik, University of Wuppertal Postfach 100 127, 42097 Wuppertal, Germany E-mail: Oliver.Passon@cern.ch In

More information

S hor s prime factoring algorithm1 reduces the factorization of a product N 5 pp9 of distinct odd primes p and

S hor s prime factoring algorithm1 reduces the factorization of a product N 5 pp9 of distinct odd primes p and OPEN SUBJECT AREAS: QUANTUM INFORMATION QUBITS Received 21 August 2013 Accepted 3 October 2013 Published 28 October 2013 Correspondence and requests for materials should be addressed to M.R.G. (mgeller@uga.

More information

How Quantum Can a Computer Be? 1

How Quantum Can a Computer Be? 1 How Quantum Can a Computer Be? 1 Elham Kashefi 2 Prisme N 29 September 2014 1 This text is a transcription of the presentation given by Elham Kashefi at the Cournot seminar, «Quantum Turing Testing» in

More information

Authentication in Online Banking Systems through Quantum Cryptography

Authentication in Online Banking Systems through Quantum Cryptography Authentication in Online Banking Systems through Quantum Cryptography Anand Sharma 1, S.K.Lenka 2 FET, MITS, Lakshmangarh Sikar, Rajasthan, India 1 anand_glee@yahoo.co.in, 2 lenka.sarojkumar@gmail.com

More information

Teleportation improvement by inconclusive photon subtraction

Teleportation improvement by inconclusive photon subtraction PHYSICAL REVIEW A 67, 03314 003 Teleportation improvement by inconclusive photon subtraction Stefano Olivares, 1 Matteo G. A. Paris, and Rodolfo Bonifacio 1 1 Dipartimento di Fisica and Unità INFM, Università

More information

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers , pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang

More information

Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary

Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary Open Problems in Quantum Information Processing John Watrous Department of Computer Science University of Calgary #1 Open Problem Find new quantum algorithms. Existing algorithms: Shor s Algorithm (+ extensions)

More information

ISIC Rev.4 draft, Section N Professional, scientific and technical activities

ISIC Rev.4 draft, Section N Professional, scientific and technical activities ISIC Rev.4 draft, Section N Professional, scientific and technical activities United Nations Statistics Division Workshop on Classifications, Montevideo, Uruguay 14-18 March 2005 Concept, scope Comprises

More information

Detection of quantum entanglement in physical systems

Detection of quantum entanglement in physical systems Detection of quantum entanglement in physical systems Carolina Moura Alves Merton College University of Oxford A thesis submitted for the degree of Doctor of Philosophy Trinity 2005 Abstract Quantum entanglement

More information

ENTANGLEMENT EXCHANGE AND BOHMIAN MECHANICS

ENTANGLEMENT EXCHANGE AND BOHMIAN MECHANICS ENTANGLEMENT EXCHANGE AND BOHMIAN MECHANICS NICK HUGGETT TIZIANA VISTARINI PHILOSOPHY, UNIVERSITY OF ILLINOIS AT CHICAGO When two systems, of which we know the states by their respective representatives,

More information

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support Vol. 3 Issue 1, January-2014, pp: (32-36), Impact Factor: 1.252, Available online at: www.erpublications.com TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence

More information

Scalable Private Database Querying for Arbitrary Formulas

Scalable Private Database Querying for Arbitrary Formulas Scalable Private Database Querying for Arbitrary Formulas Vladimir Kolesnikov (Bell Labs) Seung Geol Choi, Angelos Keromytis, Fernando Krell, Tal Malkin, Vasilis Pappas and Binh Vo (Columbia) Wesley George

More information

Generally Covariant Quantum Mechanics

Generally Covariant Quantum Mechanics Chapter 15 Generally Covariant Quantum Mechanics by Myron W. Evans, Alpha Foundation s Institutute for Advance Study (AIAS). (emyrone@oal.com, www.aias.us, www.atomicprecision.com) Dedicated to the Late

More information

Impact Analysis for Supporting the Co-Evolution of Business Processes and Supporting Software Systems

Impact Analysis for Supporting the Co-Evolution of Business Processes and Supporting Software Systems Impact Analysis for Supporting the Co-Evolution of Business Processes and Supporting Software Systems Thierry Bodhuin, Raffaele Esposito, Cristina Pacelli and Maria Tortorella RCOST - Research Centre On

More information

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of

More information

http://arxiv.org/abs/1110.4367 Information Networks Secured by the Laws of Physics

http://arxiv.org/abs/1110.4367 Information Networks Secured by the Laws of Physics 1 http://arxiv.org/abs/1110.4367 Information Networks Secured by the Laws of Physics L.B. Kish, F. Peper SUMMARY In this paper, we survey the state of the art of the secure key exchange method that is

More information

GSMPBX version 1.3 Datasheet

GSMPBX version 1.3 Datasheet GSMPBX version.3 Datasheet Document Rev.:.3 Revision Date: 23.03.203 (preliminary data) Figure - GSMPBX Introduction The GSMPBX is designed to commute phone calls between a cellular network (GSM) and the

More information

IEEE802.3 4P Task Force Channel Pair To Pair Resistance Imbalance. (End to End System Imbalance) Ad Hoc

IEEE802.3 4P Task Force Channel Pair To Pair Resistance Imbalance. (End to End System Imbalance) Ad Hoc IEEE802.3 4P Task Force Channel Pair To Pair Resistance Imbalance (End to End System Imbalance) Ad Hoc Meeting #1: Rev_000 Monday February 17, 2014 March 2014 Beijing China Yair Darshan Microsemi ydarshan@microsemi.com

More information

Support Vector Machines with Clustering for Training with Very Large Datasets

Support Vector Machines with Clustering for Training with Very Large Datasets Support Vector Machines with Clustering for Training with Very Large Datasets Theodoros Evgeniou Technology Management INSEAD Bd de Constance, Fontainebleau 77300, France theodoros.evgeniou@insead.fr Massimiliano

More information

Quantum Computing. Robert Senser, PhD. CSC 5446 Presentation Spring 2015. http://cse.ucdenver.edu/~rsenser/ Version 2014.1

Quantum Computing. Robert Senser, PhD. CSC 5446 Presentation Spring 2015. http://cse.ucdenver.edu/~rsenser/ Version 2014.1 Quantum Computing Robert Senser, PhD http://cse.ucdenver.edu/~rsenser/ CSC 5446 Presentation Spring 2015 Version 2014.1 Quantum Computing Overview of Presentation Topics Terms: Measurement Qubit Superposition

More information

Dominik Janzing. Computer Science Approach to Quantum Control

Dominik Janzing. Computer Science Approach to Quantum Control Dominik Janzing Computer Science Approach to Quantum Control Computer Science Approach to Quantum Control von Dominik Janzing Habilitation, Universität Karlsruhe (TH) Fakultät für Informatik, 2006 Impressum

More information