Implementation of Deutsch's Algorithm Using Mathcad



Similar documents
What is Candidate Sampling

Extending Probabilistic Dynamic Epistemic Logic

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

1 Example 1: Axis-aligned rectangles

Faraday's Law of Induction

Multiple stage amplifiers

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Calculation of Sampling Weights

This circuit than can be reduced to a planar circuit

An Alternative Way to Measure Private Equity Performance

Recurrence. 1 Definitions and main statements

Lecture 2: Single Layer Perceptrons Kevin Swingler

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

The circuit shown on Figure 1 is called the common emitter amplifier circuit. The important subsystems of this circuit are:

7.5. Present Value of an Annuity. Investigate

A Performance Analysis of View Maintenance Techniques for Data Warehouses

The OC Curve of Attribute Acceptance Plans

Implementation of Boolean Functions through Multiplexers with the Help of Shannon Expansion Theorem

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

Level Annuities with Payments Less Frequent than Each Interest Period

Simple Interest Loans (Section 5.1) :

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

Texas Instruments 30X IIS Calculator

A Simple Approach to Clustering in Excel

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , info@teltonika.

Calculating the high frequency transmission line parameters of power cables

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

Efficient Project Portfolio as a tool for Enterprise Risk Management

Lecture 2 Sequence Alignment. Burr Settles IBS Summer Research Program 2008 bsettles@cs.wisc.edu

1. Measuring association using correlation and regression

Traffic State Estimation in the Traffic Management Center of Berlin

Lecture 3: Annuity. Study annuities whose payments form a geometric progression or a arithmetic progression.

The Greedy Method. Introduction. 0/1 Knapsack Problem

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35, , ,200,000 60, ,000

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

DEFINING %COMPLETE IN MICROSOFT PROJECT

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

A Probabilistic Theory of Coherence

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

Time Value of Money. Types of Interest. Compounding and Discounting Single Sums. Page 1. Ch. 6 - The Time Value of Money. The Time Value of Money

where the coordinates are related to those in the old frame as follows.

21 Vectors: The Cross Product & Torque

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions

Ring structure of splines on triangulations

Traffic-light a stress test for life insurance provisions

Time Value of Money Module

An RFID Distance Bounding Protocol

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification

BERNSTEIN POLYNOMIALS

Laws of Electromagnetism

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

CHAPTER 8 Potential Energy and Conservation of Energy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

Section C2: BJT Structure and Operational Modes

Section 5.4 Annuities, Present Value, and Amortization

(6)(2) (-6)(-4) (-4)(6) + (-2)(-3) + (4)(3) + (2)(-3) = = 0

Hosted Voice Self Service Installation Guide

Problem Set 3. a) We are asked how people will react, if the interest rate i on bonds is negative.

Forecasting the Direction and Strength of Stock Market Movement

10.2 Future Value and Present Value of an Ordinary Simple Annuity

The Full-Wave Rectifier

An interactive system for structure-based ASCII art creation

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Single and multiple stage classifiers implementing logistic discrimination

HALL EFFECT SENSORS AND COMMUTATION

Damage detection in composite laminates using coin-tap method

Inter-Ing INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, November 2007.

Secure Network Coding Over the Integers

Research on Transformation Engineering BOM into Manufacturing BOM Based on BOP

Lecture 3: Force of Interest, Real Interest Rate, Annuity

Support Vector Machines

A role based access in a hierarchical sensor network architecture to provide multilevel security

How To Calculate The Accountng Perod Of Nequalty

Quantization Effects in Digital Filters

Research of Network System Reconfigurable Model Based on the Finite State Automation


ELM for Exchange version 5.5 Exchange Server Migration

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

An Introduction to 3G Monte-Carlo simulations within ProMan

Realistic Image Synthesis

FINANCIAL MATHEMATICS. A Practical Guide for Actuaries. and other Business Professionals

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

An MILP model for planning of batch plants operating in a campaign-mode

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

EE31 Series. Manual. Logger & Visualisation Software. BA_EE31_VisuLoggerSW_01_eng // Technical data are subject to change V1.0

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

Multiplication Algorithms for Radix-2 RN-Codings and Two s Complement Numbers

Title Language Model for Information Retrieval

Transcription:

Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs" by Davd Deutsch, Artur Ekert, and Rossella Lupacchn, whch can be found at arxv:math.ho/995v. A functon f maps {, } to {, }. There are four possble outcomes: f() = ; f() = ; f() = ; f() =. The task Deutsch tackled was to develop an mplementable quantum algorthm whch could determne whether f() and f() were the same or dfferent n a sngle calculaton. By comparson classcal computers requre two calculatons for such a task - calculatng both f() and f() to see f they are the same or dfferent. The proposed quantum computer conssts of three one-qubt gates n the arrangement shown below. The not gates are 5-5 beam spltters that assgn a / (, 9 degree) phase change to reflecton relatve to transmsson. For example, the frst gate creates the followng superpostons of the nputs > and >. The mddle gate carres out phase shfts on the superposton created by the frst gate. Dependng on the f-values, the operaton of the second not converts the superposton to ether > or > multpled by a phase factor or unty. The Deutsch crcut s essentally a two-port Mach-Zehnder nterferometer wth the possblty for unequal phase changes n ts upper and lower arms. The matrx representatons for the gates are as follows: = = f f = = We begn wth a matrx mechancs approach to Deutsch's algorthm usng the defntons provded mmedately above. There are two nput ports and two output ports, but only one nput port s used n any gven computatonal run. Frst t s shown how the output result depends on the nput port chosen n terms of the values of f() and f().

Input f f f f f f Input f f f f f f These calculatons and the crcut dagram show that there are two paths to each output port from each nput port. As wll now be shown these paths nterfere constructvely or destructvely dependng on the phase changes brought about by the mddle crcut element's values of f() and f(). The followng calculatons show that the probablty that > nput leads to > output s zero f f() and f() are the same (both or both ), and unty f they are dfferent (one, the other ). Thus the task has been successfully accomplshed. The hghlghted central regon calculates the output state for nput state > gven the values of f() and f() to the left. On the rght the probablty that > s the output state s calculated. f f f f f f f f f f f f f f f f As mght be expected, smlar calculatons show that the probablty that > nput leads to > output s zero f f() and f() are the same, and unty f they are dfferent. f f f f

f f f f ( ) f f f f ( ) f f f f ( ) Examnaton of the Deutsch crcut reveals certan smlartes wth the double-slt experment. For example, there are two paths for nput > to output > and nput > to output > (and also for > --> > and > --> >, but they are not of nterest here). As Deutsch and hs co-authors state, ths s the secret of the quantum computer - the possblty of constructve and destructve nterference of the probablty ampltudes for the varous computatonal paths. Addton of probablty ampltudes, rather than probabltes, s one of the fundamental rules for predcton n quantum mechancs and apples to all physcal objects, n partcular quantum computng machnes. If a computng machne starts n a specfc ntal confguraton (nput) then the probablty that after ts evoluton va a sequence of ntermedate confguratons t ends up n a specfc fnal confguraton (output) s the squared modulus of the sum of all the probablty ampltudes of the computatonal paths that connect the nput wth the output. The ampltudes are complex numbers and may cancel each other, whch s referred to as destructve nterference, or enhance each other, referred to as constructve nterference. The basc dea of quantum computaton s to use quantum nterference to amplfy the correct outcomes and to suppress the ncorrect outcomes of computatons. Recall from above (see the matrx representng the not beam spltters) that the probablty ampltude for transmsson at the beam spltters s, and the probablty ampltude for reflecton s. The mddle element of the crcut causes phase shfts on ts nput wres that depend on the values of f() and f(). From the crcut dagram we see that > output from > nput can be acheved by two transmssons and a phase shft on the upper wre or reflecton to the lower wre, phase shft, followed by reflecton to the upper wre. The absolute magntude squared of the sum of these probablty ampltudes s calculated for the four possble values for f() and f(). f f f f f f

f f f f f f f f As expected we see consstency wth the prevous calculatons. However, ths method has the advantage of more drectly revealng what s happenng from the quantum mechancal perspectve. When f() and f() are the same the two path ampltudes nterfere destructvely; when they are dfferent there s constructve nterference between the path ampltudes. As can be seen from above, n the absence of the mddle element of the quantum crcut, the two paths from > to > are 8 degrees out of phase and therefore destructvely nterfere. In the presence of the mddle element the paths are stll 8 degrees out of phase unless the f-values are dfferent, and then they are brought nto phase and constructvely nterfere. As Feynman emphaszed n hs eponymous lecture seres on physcs, the creaton of superpostons and the nterference of probablty ampltudes are the essence of quantum mechancs. Another mplementaton of Deutsch's algorthm s due to Artur Ekert and co-workers (see Julan Brown's The Quest for the Quantum Computer, pages 353-355). The followng table provdes a summary of the results. If qubt s > f() and f() are the same, but f t s > they are dfferent. f f qubt qubt OutputState.77.77.77.77.77.77.77.77.77.77.77.77.77.77.77.77

The algorthm s mplemented below. Identty: I Not gate: NOT Hadamard gate: H f f kronecker( H I) kronecker f f NOT kronecker( H I).77.77 f f kronecker( H I) kronecker f f NOT kronecker( H I).77.77 f f kronecker( H I) kronecker f f NOT kronecker( H I).77.77 f f kronecker( H I) kronecker f f NOT kronecker( H I).77.77 It s easy to show that the output of each of these calculatons s the tensor product of qubts and n the summary table provded above. Perhaps a better way to set up ths crcut s to begn wth > and have Hadamard gates operate on both wres.

f f kronecker( H I) kronecker f f NOT kronecker( H H).77.77 f f kronecker( H I) kronecker f f NOT kronecker( H H).77.77 f f kronecker( H I) kronecker f f NOT kronecker( H H).77.77 f f kronecker( H I) kronecker f f NOT kronecker( H H).77.77 As the followng table shows, the same result s acheved as n the prevous crcut. f f qubt qubt OutputState.77.77.77.77.77.77.77.77.77.77.77.77.77.77.77.77