D.1 Deutsch-Jozsa algorithm

Size: px
Start display at page:

Download "D.1 Deutsch-Jozsa algorithm"

Transcription

1 4 CHAPTER III. QUANTUM COMPUTATION Figure III.: Quantum circuit for Deutsch algorithm. [fig. from Nielsen & Chuang (00)] D Quantum algorithms D. Deutsch-Jozsa algorithm D..a Deutsch s algorithm In this section you will encounter your first examle of a quantum algorithm that can comute faster than a classical algorithm for the same roblem. This is a simlified version of Deutsch s original algorithm, which shows how it is ossible to extract global information about a function by using quantum arallelism and interference (Fig. III.). 8 Suose we have a function f :!, asinsec.c.5. Thegoalisto determine whether f(0) = f() with a single function evaluation. This is not a very interesting roblem (since there are only four such functions), but it is a warmu for the Deutsch-Jozsa algorithm. Simle as it is, it could be exensive to decide on a classical comuter. For examle, suose f(0) = the billionth bit of and f() = the billionth bit of e. Thentheroblemis to decide if the billionth bits of and e are the same. It is mathematically simle, but comutationally comlex. To see how we might solve this roblem, suose we have a quantum gate array U f for f; thatis,u f xi yi = xi y f(x)i. In articular, U f xi 0i = 8 This is the 998 imrovement by Cleve et al. to Deutsch s 985 algorithm (Nielsen & Chuang, 00,. 59).

2 D. QUANTUM ALGORITHMS 5 xi f(x)i and U f xi i = xi f(x)i. Usually we set y =0togettheresult f(x)i, buthereyouwillseeanalicationinwhichwewanty =. Now consider the result of alying U f to xi in the data register and to the suerosition i = ( 0i i) inthetargetregister. U f xi i = xi f(x)i xi f(x)i = xi[ f(x)i f(x)i]. Now the rightmost square bracket is 0i i if f(x) =0or i 0i if f(x) =. Therefore,wecanwrite U f xi i = xi( ) f(x) ( 0i i) =( ) f(x) xi i. (III.) [Here, ( ) x is an abbreviation for ( ) x when we want to emhasize that the sign is all that matters.] Since U f xi i =( ) f(x) xi i, theresultof alying it to an equal suerosition of x =0andx =is: U f xi i = ( ) f(x) xi i. x If f is a constant function, then f(0) = f(), and the summation is ± ( 0i+ i) i = ± +i i because both comonents have the same sign.. On the other hand, if f(0) 6= f(), then the summation is ± ( 0i i) i = ± i i because the comonents have oosite signs. That is, a constant function gives the 0i and i comonents of the data qubit the same hase, and otherwise gives them the oosite hase. Therefore, we can determine whether the function is constant or not by measuring the first qubit in the sign basis; we get +i if f(0) = f() and i otherwise. With this background, we can state Deutsch s algorithm. x algorithm Deutsch: Initial state: Begin with the qubits 0 i def = 0i. Suerosition: Transform it to a air of suerositions i def = ( 0i + i) ( 0i i) = + i. (III.)

3 6 CHAPTER III. QUANTUM COMPUTATION by a air of Hadamard gates. Recall that H 0i = ( 0i + i) = +i and H i = ( 0i i) = i. Function alication: Next aly U f to i = + i. As we ve seen, U f xi 0i = xi 0 f(x)i = xi f(x)i, and U f xi i = xi f(x)i = xi f(x)i. Therefore,exandEq.III.andalyU f : i def = U f i = U f ale ( 0i + i) ( 0i i) = [U f 00i U f 0i + U f 0i U f i] = [ 0,f(0)i 0, f(0)i +,f()i, f()i] There are two cases: f(0) = f() and f(0) 6= f(). Equal (constant function): If f(0) = f(), then i = [ 0,f(0)i 0, f(0)i +,f(0)i, f(0)i] = [ 0i( f(0)i f(0)i)+ i( f(0)i f(0)i)] = ( 0i + i)( f(0)i f(0)i) = ± ( 0i + i)( 0i i) = ± ( 0i + i) i = + i. The last line alies because global hase (including ±) doesn tmatter. Unequal (balanced function): If f(0) 6= f(), then i = [ 0,f(0)i 0, f(0)i +, f(0)i,f(0)i]

4 D. QUANTUM ALGORITHMS 7 = [ 0i( f(0)i f(0)i)+ i( f(0)i f(0)i)] = [ 0i( f(0)i f(0)i) i( f(0)i f(0)i)] = ( 0i i)( f(0)i f(0)i) = ± ( 0i i)( 0i i) = ± ( 0i i) i = i Clearly we can discriminate between the two cases by measuring the first qubit in the sign basis. In articular, note that in the unequal case, the i comonent has the oosite hase from the 0i comonent. Measurement: Therefore we can determine whether f(0) = f() or not by measuring the first bit of i in the sign basis, which we can do with the Hadamard gate (recall H +i = 0i and H i = i): 3 i def = (H I) i ± 0i i, if f(0) = f() = ± i i, if f(0) 6= f() = ± f(0) f()i i. Notice that the information we need is in the data register, not the target register. This technique is called hase kick-back (i.e., kicked back into the hase of the data register). In conclusion, we can determine whether or not f(0) = f() with a single evaluation of f, whichisquiteremarkable.ine ect,weareevaluatingf on asuerositionof 0i and i and determining how the results interfere with each other. As a result we get a definite (not robabilistic) determination of aglobalroertywithasingleevaluation. This is a clear examle where a quantum comuter can do something faster than a classical comuter. However, note that U f has to uncomute

5 8 CHAPTER III. QUANTUM COMPUTATION Figure III.3: Quantum circuit for Deutsch-Jozsa algorithm. [fig. from NC] f, whichtakesasmuchtimeascomutingit,butwewillseeothercases (Deutsch-Jozsa) where the seedu is much more than. D..b The Deutsch-Jozsa algorithm The Deutsch-Jozsa algorithm is a generalization of the Deutsch algorithm to n bits, which they ublished it in 99; here we resent the imroved version of Nielsen & Chuang (00,. 59). This is the roblem: Suose we are given an unknown function f : n! in the form of a unitary transform U f L(H n+, H) (Fig. III.3). We are told only that f is either constant or balanced, whichmeansthatitis0on half its domain and on the other half. Our task is to determine into which class the given f falls. Consider first the classical situation. We can try di erent inut bit strings x. We might (if we re lucky) discover after the second query of f that it is not constant. But we might require as many as n /+queriestoanswer the question. So we re facing O( n )functionevaluations. algorithm Deutsch-Jozsa: Initial state: As in the Deutsch algorithm, reare the initial state 0 i def = 0i n i.

6 D. QUANTUM ALGORITHMS 9 Suerosition: Use the Walsh-Hadamard transformation to create a suerosition of all ossible inuts: i def =(H n H) 0 i = x, i. x n n Claim: Similarly to the single qubit case (Eq. III.), we can see that U f x, i =( ) f(x) xi i, where( ) n is an abbreviation for ( ) n. From the definition of i and U f, U f x, i = xi ( f(x)i f(x)i). Since f(x), ( f(x)i f(x)i) = i if f(x) =0,andit= i if f(x) =. This establishes the claim. Function alication: Therefore, you can see that: i def = U f i = x n n ( )f(x) xi i. (III.3) In the case of a constant function, all the comonents of the data state have the same hase, otherwise they do not. To see how we can make use of this information, let s consider the state in more detail. For a single bit you can show (Exer. III.4): H xi = ( 0i +( ) x i) = z( ) xz zi = z ( ) xz zi. (This is just another way of writing H 0i = ( 0i+ i) andh i = ( 0i i).) Therefore, the general formula for the Walsh transform of n bits is: H n x,x,...,x n i = = n n z,...,z n ( ) x z + +x nz n z,z,...,z n i z n ( ) x z zi, (III.4) where x z is the bitwise inner roduct. (It doesn t matter if you do addition or since only the arity of the result is significant.) Remember this formula! Combining this and the result in Eq. III.3, 3 i def =(H n I) i = ( n z n x n )x z+f(x) zi i.

7 30 CHAPTER III. QUANTUM COMPUTATION Measurement: Consider the first n qubits and the amlitude of one articular basis state, z = 0i = 0i n,whichwesearatefromtherestofthe summation: 3 i = x n n ( )f(x) 0i i + z n {0} x n n ( )x z+f(x) zi i Hence, the amlitude of 0i n,theall- 0i qubit string, is P x n n ( ) f(x). Recall how in the basic Deutsch algorithm we got a sum of signs (either all the same or not) for all the function evaluations. The result is similar here, but we have n values rather than just two. We now have two cases: Constant function: If the function is constant, then all the exonents of willbethesame(eitherall0orall),andsotheamlitudewillbe±. Therefore all the other amlitudes are 0 and any measurement must yield 0 for all the qubits (since only 0i n has nonzero amlitude). Balanced function: If the function is not constant then (ex hyothesi) it is balanced, but more secifically, if it is balanced, then there must be an equal number of + and contributionstotheamlitudeof 0i n,soits amlitude is 0. Therefore, when we measure the state, at least one qubit must be nonzero (since the all-0s state has amlitude 0). The good news about the Deutsch-Jozsa algorithm is that with one quantum function evaluation we have got a result that would require between and O( n )classicalfunctionevaluations(exonentialseedu!). Thebad news is that the algorithm has no known alications! Even if it were useful, however, the roblem could be solved robabilistically on a classical comuter with only a few evaluations of f: foranerrorrobabilityof, ittakes O(log ) function evaluations. However, it illustrates rinciles of quantum comuting that can be used in more useful algorithms.

D.1 Deutsch-Jozsa algorithm

D.1 Deutsch-Jozsa algorithm 4 CHAPTER III. QUANTUM COMPUTATION Figure III.: Quantum circuit for Deutsch algorithm. [fig. from Nielsen & Chuang ()] D Quantum algorithms D. Deutsch-Jozsa algorithm D..a Deutsch s algorithm In this section

More information

92 CHAPTER III. QUANTUM COMPUTATION. Figure III.11: Diagram for swap (from NC).

92 CHAPTER III. QUANTUM COMPUTATION. Figure III.11: Diagram for swap (from NC). 92 CHAPTER III. QUANTUM COMPUTATION Figure III.11: Diagram for swap (from NC). C.3 Quantum circuits 1. Quantum circuit: A quantum circuit isa sequential seriesofquantum transformations on a quantum register.

More information

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018 Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3

More information

D.5 Quantum error correction

D.5 Quantum error correction D. QUANTUM ALGORITHMS 157 Figure III.34: E ects of decoherence on a qubit. On the left is a qubit yi that is mostly isoloated from its environment i. Ontheright,aweakinteraction between the qubit and the

More information

Lecture 4: Elementary Quantum Algorithms

Lecture 4: Elementary Quantum Algorithms CS 880: Quantum Information Processing 9/13/010 Lecture 4: Elementary Quantum Algorithms Instructor: Dieter van Melkebeek Scribe: Kenneth Rudinger This lecture introduces several simple quantum algorithms.

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

CSE 599d - Quantum Computing When Quantum Computers Fall Apart

CSE 599d - Quantum Computing When Quantum Computers Fall Apart CSE 599d - Quantum Comuting When Quantum Comuters Fall Aart Dave Bacon Deartment of Comuter Science & Engineering, University of Washington In this lecture we are going to begin discussing what haens to

More information

QUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2

QUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2 School of Mathematics Spring 017 QUANTUM COMPUTATION Exercise sheet 1 Ashley Montanaro, University of Bristol ashley.montanaro@bristol.ac.uk 1. The quantum circuit model. (a) Consider the following quantum

More information

Shor s Prime Factorization Algorithm

Shor s Prime Factorization Algorithm Shor s Prime Factorization Algorithm Bay Area Quantum Computing Meetup - 08/17/2017 Harley Patton Outline Why is factorization important? Shor s Algorithm Reduction to Order Finding Order Finding Algorithm

More information

Impossibility of a Quantum Speed-up with a Faulty Oracle

Impossibility of a Quantum Speed-up with a Faulty Oracle Imossibility of a Quantum Seed-u with a Faulty Oracle Oded Regev Liron Schiff Abstract We consider Grover s unstructured search roblem in the setting where each oracle call has some small robability of

More information

Quantum Computing: Foundations to Frontier Fall Lecture 3

Quantum Computing: Foundations to Frontier Fall Lecture 3 Quantum Computing: Foundations to Frontier Fall 018 Lecturer: Henry Yuen Lecture 3 Scribes: Seyed Sajjad Nezhadi, Angad Kalra Nora Hahn, David Wandler 1 Overview In Lecture 3, we started off talking about

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Petros Wallden Lecture 7: Complexity & Algorithms I 13th October 016 School of Informatics, University of Edinburgh Complexity - Computational Complexity: Classification

More information

C. QUANTUM INFORMATION 99

C. QUANTUM INFORMATION 99 C. QUANTUM INFORMATION 99 C Quantum information C.1 Qubits C.1.a Single qubits Just as the bits 0 and 1 are represented by distinct physical states in a conventional computer, so the quantum bits (or qubits)

More information

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Compute the Fourier transform on the first register to get x {0,1} n x 0. CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary

More information

Fourier Sampling & Simon s Algorithm

Fourier Sampling & Simon s Algorithm Chapter 4 Fourier Sampling & Simon s Algorithm 4.1 Reversible Computation A quantum circuit acting on n qubits is described by an n n unitary operator U. Since U is unitary, UU = U U = I. This implies

More information

UNM Physics 452/581: Introduction to Quantum Information, Problem Set 3, Fall 2007

UNM Physics 452/581: Introduction to Quantum Information, Problem Set 3, Fall 2007 UNM Physics 45/581: Introduction to Quantum Information, Problem Set 3, Fall 007 Instructor: Dr. Landahl Issued: September 1, 007 Due: September 18, 007 Do all of the problems listed below. Hand in your

More information

Short introduction to Quantum Computing

Short introduction to Quantum Computing November 7, 2017 Short introduction to Quantum Computing Joris Kattemölle QuSoft, CWI, Science Park 123, Amsterdam, The Netherlands Institute for Theoretical Physics, University of Amsterdam, Science Park

More information

HENSEL S LEMMA KEITH CONRAD

HENSEL S LEMMA KEITH CONRAD HENSEL S LEMMA KEITH CONRAD 1. Introduction In the -adic integers, congruences are aroximations: for a and b in Z, a b mod n is the same as a b 1/ n. Turning information modulo one ower of into similar

More information

AMS10 HW1 Grading Rubric

AMS10 HW1 Grading Rubric AMS10 HW1 Grading Rubric Problem 1 (16ts- ts/each). Left hand side is shown to equal right hand side using examles with real vectors. A vector sace is a set V on which two oerations, vector addition and

More information

Nothing Here. Fast Quantum Algorithms

Nothing Here. Fast Quantum Algorithms Nothing Here Fast Quantum Algorithms or How we learned to put our pants on two legs at a time. Dave Bacon Institute for Quantum Information California Institute of Technology ? A prudent question is one-half

More information

Fault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls

Fault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls CIS 410/510, Introduction to Quantum Information Theory Due: June 8th, 2016 Sring 2016, University of Oregon Date: June 7, 2016 Fault Tolerant Quantum Comuting Robert Rogers, Thomas Sylwester, Abe Pauls

More information

QLang: Qubit Language

QLang: Qubit Language QLang: Qubit Language Christopher Campbell Clément Canonne Sankalpa Khadka Winnie Narang Jonathan Wong September 24, 24 Introduction In 965, Gordon Moore predicted that the number of transistors in integrated

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Lecture 1: Introduction to Quantum Computing

Lecture 1: Introduction to Quantum Computing Lecture : Introduction to Quantum Computing Rajat Mittal IIT Kanpur What is quantum computing? This course is about the theory of quantum computation, i.e., to do computation using quantum systems. These

More information

Ph 219b/CS 219b. Exercises Due: Wednesday 4 December 2013

Ph 219b/CS 219b. Exercises Due: Wednesday 4 December 2013 1 Ph 219b/CS 219b Exercises Due: Wednesday 4 December 2013 4.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the

More information

LOWELL WEEKI.Y JOURINAL

LOWELL WEEKI.Y JOURINAL / $ 8) 2 {!»!» X ( (!!!?! () ~ x 8» x /»!! $?» 8! ) ( ) 8 X x /! / x 9 ( 2 2! z»!!»! ) / x»! ( (»»!» [ ~!! 8 X / Q X x» ( (!»! Q ) X x X!! (? ( ()» 9 X»/ Q ( (X )!» / )! X» x / 6!»! }? ( q ( ) / X! 8 x»

More information

Lecture 21: Quantum Communication

Lecture 21: Quantum Communication CS 880: Quantum Information Processing 0/6/00 Lecture : Quantum Communication Instructor: Dieter van Melkebeek Scribe: Mark Wellons Last lecture, we introduced the EPR airs which we will use in this lecture

More information

arxiv: v2 [quant-ph] 2 Aug 2012

arxiv: v2 [quant-ph] 2 Aug 2012 Qcomiler: quantum comilation with CSD method Y. G. Chen a, J. B. Wang a, a School of Physics, The University of Western Australia, Crawley WA 6009 arxiv:208.094v2 [quant-h] 2 Aug 202 Abstract In this aer,

More information

Lecture 1: Overview of quantum information

Lecture 1: Overview of quantum information CPSC 59/69: Quantum Computation John Watrous, University of Calgary References Lecture : Overview of quantum information January 0, 006 Most of the material in these lecture notes is discussed in greater

More information

Real Analysis 1 Fall Homework 3. a n.

Real Analysis 1 Fall Homework 3. a n. eal Analysis Fall 06 Homework 3. Let and consider the measure sace N, P, µ, where µ is counting measure. That is, if N, then µ equals the number of elements in if is finite; µ = otherwise. One usually

More information

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm Part I: Quantum Gates and Simon s Algorithm Martin Rötteler NEC Laboratories America, Inc. 4 Independence Way, Suite 00 Princeton, NJ 08540, U.S.A. International Summer School on Quantum Information, Max-Planck-Institut

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Deutsch Algorithm on Classical Circuits

Deutsch Algorithm on Classical Circuits Deutsch Algorithm on Classical Circuits Assist.Prof.Dr. Osman Kaan EROL Istanbul Technical University, Electrical-Electronics Faculty, Computer Engineering Dept. Istanbul-Turkey Abstract: The well-known

More information

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes Infinite Series 6.2 Introduction We extend the concet of a finite series, met in Section 6., to the situation in which the number of terms increase without bound. We define what is meant by an infinite

More information

MANY BILLS OF CONCERN TO PUBLIC

MANY BILLS OF CONCERN TO PUBLIC - 6 8 9-6 8 9 6 9 XXX 4 > -? - 8 9 x 4 z ) - -! x - x - - X - - - - - x 00 - - - - - x z - - - x x - x - - - - - ) x - - - - - - 0 > - 000-90 - - 4 0 x 00 - -? z 8 & x - - 8? > 9 - - - - 64 49 9 x - -

More information

AI*IA 2003 Fusion of Multiple Pattern Classifiers PART III

AI*IA 2003 Fusion of Multiple Pattern Classifiers PART III AI*IA 23 Fusion of Multile Pattern Classifiers PART III AI*IA 23 Tutorial on Fusion of Multile Pattern Classifiers by F. Roli 49 Methods for fusing multile classifiers Methods for fusing multile classifiers

More information

Quantum Communication Complexity

Quantum Communication Complexity Quantum Communication Complexity Ronald de Wolf Communication complexity has been studied extensively in the area of theoretical computer science and has deep connections with seemingly unrelated areas,

More information

Lecture 9: Connecting PH, P/poly and BPP

Lecture 9: Connecting PH, P/poly and BPP Comutational Comlexity Theory, Fall 010 Setember Lecture 9: Connecting PH, P/oly and BPP Lecturer: Kristoffer Arnsfelt Hansen Scribe: Martin Sergio Hedevang Faester Although we do not know how to searate

More information

On the Rank of the Elliptic Curve y 2 = x(x p)(x 2)

On the Rank of the Elliptic Curve y 2 = x(x p)(x 2) On the Rank of the Ellitic Curve y = x(x )(x ) Jeffrey Hatley Aril 9, 009 Abstract An ellitic curve E defined over Q is an algebraic variety which forms a finitely generated abelian grou, and the structure

More information

The Euler Phi Function

The Euler Phi Function The Euler Phi Function 7-3-2006 An arithmetic function takes ositive integers as inuts and roduces real or comlex numbers as oututs. If f is an arithmetic function, the divisor sum Dfn) is the sum of the

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Parallel Quantum-inspired Genetic Algorithm for Combinatorial Optimization Problem

Parallel Quantum-inspired Genetic Algorithm for Combinatorial Optimization Problem Parallel Quantum-insired Genetic Algorithm for Combinatorial Otimization Problem Kuk-Hyun Han Kui-Hong Park Chi-Ho Lee Jong-Hwan Kim Det. of Electrical Engineering and Comuter Science, Korea Advanced Institute

More information

LOWELL. MICHIGAN. WEDNESDAY, FEBRUARY NUMllEE 33, Chicago. >::»«ad 0:30am, " 16.n«l w 00 ptn Jaekten,.'''4snd4:4(>a tii, ijilwopa

LOWELL. MICHIGAN. WEDNESDAY, FEBRUARY NUMllEE 33, Chicago. >::»«ad 0:30am,  16.n«l w 00 ptn Jaekten,.'''4snd4:4(>a tii, ijilwopa 4/X6 X 896 & # 98 # 4 $2 q $ 8 8 $ 8 6 8 2 8 8 2 2 4 2 4 X q q!< Q 48 8 8 X 4 # 8 & q 4 ) / X & & & Q!! & & )! 2 ) & / / ;) Q & & 8 )

More information

6.896 Quantum Complexity Theory September 18, Lecture 5

6.896 Quantum Complexity Theory September 18, Lecture 5 6.896 Quantum Complexity Theory September 18, 008 Lecturer: Scott Aaronson Lecture 5 Last time we looked at what s known about quantum computation as it relates to classical complexity classes. Today we

More information

Simon s algorithm (1994)

Simon s algorithm (1994) Simon s algorithm (1994) Given a classical circuit C f (of polynomial size, in n) for an f : {0, 1} n {0, 1} n, such that for a certain s {0, 1} n \{0 n }: x, y {0, 1} n (x y) : f (x) = f (y) x y = s with

More information

Pseudorandom Sequence Generation

Pseudorandom Sequence Generation YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Crytograhy and Comuter Security Handout #21 Professor M. J. Fischer November 29, 2005 Pseudorandom Seuence Generation 1 Distinguishability and

More information

Ph 219b/CS 219b. Exercises Due: Wednesday 22 February 2006

Ph 219b/CS 219b. Exercises Due: Wednesday 22 February 2006 1 Ph 219b/CS 219b Exercises Due: Wednesday 22 February 2006 6.1 Estimating the trace of a unitary matrix Recall that using an oracle that applies the conditional unitary Λ(U), Λ(U): 0 ψ 0 ψ, 1 ψ 1 U ψ

More information

I Poles & zeros. I First-order systems. I Second-order systems. I E ect of additional poles. I E ect of zeros. I E ect of nonlinearities

I Poles & zeros. I First-order systems. I Second-order systems. I E ect of additional poles. I E ect of zeros. I E ect of nonlinearities EE C28 / ME C34 Lecture Chater 4 Time Resonse Alexandre Bayen Deartment of Electrical Engineering & Comuter Science University of California Berkeley Lecture abstract Toics covered in this resentation

More information

Introduction to Quantum Information Processing

Introduction to Quantum Information Processing Introduction to Quantum Information Processing Lecture 6 Richard Cleve Overview of Lecture 6 Continuation of teleportation Computation and some basic complexity classes Simple quantum algorithms in the

More information

Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo

Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo CS 497 Frontiers of Computer Science Introduction to Quantum Computing Lecture of http://www.cs.uwaterloo.ca/~cleve/cs497-f7 Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum

More information

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,

More information

The Arm Prime Factors Decomposition

The Arm Prime Factors Decomposition The Arm Prime Factors Decomosition Arm Boris Nima arm.boris@gmail.com Abstract We introduce the Arm rime factors decomosition which is the equivalent of the Taylor formula for decomosition of integers

More information

arxiv: v1 [quant-ph] 3 Feb 2015

arxiv: v1 [quant-ph] 3 Feb 2015 From reversible comutation to quantum comutation by Lagrange interolation Alexis De Vos and Stin De Baerdemacker 2 arxiv:502.0089v [quant-h] 3 Feb 205 Cmst, Imec v.z.w., vakgroe elektronica en informatiesystemen,

More information

Outline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding

Outline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding Outline EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Error detection using arity Hamming code for error detection/correction Linear Feedback Shift

More information

1-way quantum finite automata: strengths, weaknesses and generalizations

1-way quantum finite automata: strengths, weaknesses and generalizations 1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum

More information

Cryptanalysis of Pseudorandom Generators

Cryptanalysis of Pseudorandom Generators CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we

More information

15-451/651: Design & Analysis of Algorithms October 23, 2018 Lecture #17: Prediction from Expert Advice last changed: October 25, 2018

15-451/651: Design & Analysis of Algorithms October 23, 2018 Lecture #17: Prediction from Expert Advice last changed: October 25, 2018 5-45/65: Design & Analysis of Algorithms October 23, 208 Lecture #7: Prediction from Exert Advice last changed: October 25, 208 Prediction with Exert Advice Today we ll study the roblem of making redictions

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Simulation of quantum computers with probabilistic models

Simulation of quantum computers with probabilistic models Simulation of quantum computers with probabilistic models Vlad Gheorghiu Department of Physics Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. April 6, 2010 Vlad Gheorghiu (CMU) Simulation of quantum

More information

Principal Components Analysis and Unsupervised Hebbian Learning

Principal Components Analysis and Unsupervised Hebbian Learning Princial Comonents Analysis and Unsuervised Hebbian Learning Robert Jacobs Deartment of Brain & Cognitive Sciences University of Rochester Rochester, NY 1467, USA August 8, 008 Reference: Much of the material

More information

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes Infinite Series 6. Introduction We extend the concet of a finite series, met in section, to the situation in which the number of terms increase without bound. We define what is meant by an infinite series

More information

0.6 Factoring 73. As always, the reader is encouraged to multiply out (3

0.6 Factoring 73. As always, the reader is encouraged to multiply out (3 0.6 Factoring 7 5. The G.C.F. of the terms in 81 16t is just 1 so there is nothing of substance to factor out from both terms. With just a difference of two terms, we are limited to fitting this olynomial

More information

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1)

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1) CERTAIN CLASSES OF FINITE SUMS THAT INVOLVE GENERALIZED FIBONACCI AND LUCAS NUMBERS The beautiful identity R.S. Melham Deartment of Mathematical Sciences, University of Technology, Sydney PO Box 23, Broadway,

More information

Principles of Computed Tomography (CT)

Principles of Computed Tomography (CT) Page 298 Princiles of Comuted Tomograhy (CT) The theoretical foundation of CT dates back to Johann Radon, a mathematician from Vienna who derived a method in 1907 for rojecting a 2-D object along arallel

More information

Quantum Communication

Quantum Communication Quantum Communication Harry Buhrman CWI & University of Amsterdam Physics and Computing Computing is physical Miniaturization quantum effects Quantum Computers ) Enables continuing miniaturization ) Fundamentally

More information

Extension of Minimax to Infinite Matrices

Extension of Minimax to Infinite Matrices Extension of Minimax to Infinite Matrices Chris Calabro June 21, 2004 Abstract Von Neumann s minimax theorem is tyically alied to a finite ayoff matrix A R m n. Here we show that (i) if m, n are both inite,

More information

DISCRIMINANTS IN TOWERS

DISCRIMINANTS IN TOWERS DISCRIMINANTS IN TOWERS JOSEPH RABINOFF Let A be a Dedekind domain with fraction field F, let K/F be a finite searable extension field, and let B be the integral closure of A in K. In this note, we will

More information

DRAFT - do not circulate

DRAFT - do not circulate An Introduction to Proofs about Concurrent Programs K. V. S. Prasad (for the course TDA383/DIT390) Deartment of Comuter Science Chalmers University Setember 26, 2016 Rough sketch of notes released since

More information

Quantum Computing Lecture 6. Quantum Search

Quantum Computing Lecture 6. Quantum Search Quantum Computing Lecture 6 Quantum Search Maris Ozols Grover s search problem One of the two most important algorithms in quantum computing is Grover s search algorithm (invented by Lov Grover in 1996)

More information

Quantum Computer Algorithms: basics

Quantum Computer Algorithms: basics Quantum Computer Algorithms: basics Michele Mosca Canada Research Chair in Quantum Computation SQUINT Summer School on Quantum Information Processing June 3 Overview A quantum computing model Basis changes

More information

Quantum Circuits and Algorithms

Quantum Circuits and Algorithms Quantum Circuits and Algorithms Modular Arithmetic, XOR Reversible Computation revisited Quantum Gates revisited A taste of quantum algorithms: Deutsch algorithm Other algorithms, general overviews Measurements

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

Single qubit + CNOT gates

Single qubit + CNOT gates Lecture 6 Universal quantum gates Single qubit + CNOT gates Single qubit and CNOT gates together can be used to implement an arbitrary twolevel unitary operation on the state space of n qubits. Suppose

More information

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem Quantum Computing Lecture Notes, Extra Chapter Hidden Subgroup Problem Ronald de Wolf 1 Hidden Subgroup Problem 1.1 Group theory reminder A group G consists of a set of elements (which is usually denoted

More information

Day 3 Selected Solutions

Day 3 Selected Solutions Solutions for Exercises 1 and 2 Exercise 1 Start with something simple: What is the stabilizer S such that is stabilized by S? G 1 = linspan ( 00, 11 ) Exercise 1 Start with something simple: What is the

More information

General Linear Model Introduction, Classes of Linear models and Estimation

General Linear Model Introduction, Classes of Linear models and Estimation Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)

More information

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871 Introduction to Quantum Information Processing QIC 71 / CS 768 / PH 767 / CO 681 / AM 871 Lecture 8 (217) Jon Yard QNC 3126 jyard@uwaterloo.ca http://math.uwaterloo.ca/~jyard/qic71 1 Recap of: Eigenvalue

More information

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict

More information

d A L. T O S O U LOWELL, MICHIGAN. THURSDAY, DECEMBER 5, 1929 Cadillac, Nov. 20. Indignation

d A L. T O S O U LOWELL, MICHIGAN. THURSDAY, DECEMBER 5, 1929 Cadillac, Nov. 20. Indignation ) - 5 929 XXX - $ 83 25 5 25 $ ( 2 2 z 52 $9285)9 7 - - 2 72 - - 2 3 zz - 9 86 - - - - 88 - q 2 882 q 88 - - - - - - ( 89 < - Q - 857-888 - - - & - - q - { q 7 - - - - q - - - - - - q - - - - 929 93 q

More information

Adam Paweł Zaborski. 8 Plasticity. reloading. 1. Bauschinger s effect. 2. unchanged yielding limit. 3. isotropic hardening

Adam Paweł Zaborski. 8 Plasticity. reloading. 1. Bauschinger s effect. 2. unchanged yielding limit. 3. isotropic hardening 8 lasticity Introduction Definitions loading/unloading/reloading words commonly used in lasticity lastic strain a ermanent strain that doesn t vanish after unloading, lastically assive rocess a rocess

More information

PHYS 301 HOMEWORK #9-- SOLUTIONS

PHYS 301 HOMEWORK #9-- SOLUTIONS PHYS 0 HOMEWORK #9-- SOLUTIONS. We are asked to use Dirichlet' s theorem to determine the value of f (x) as defined below at x = 0, ± /, ± f(x) = 0, - < x

More information

Seminar 1. Introduction to Quantum Computing

Seminar 1. Introduction to Quantum Computing Seminar 1 Introduction to Quantum Computing Before going in I am also a beginner in this field If you are interested, you can search more using: Quantum Computing since Democritus (Scott Aaronson) Quantum

More information

An Introduction to Quantum Computation and Quantum Information

An Introduction to Quantum Computation and Quantum Information An to and Graduate Group in Applied Math University of California, Davis March 13, 009 A bit of history Benioff 198 : First paper published mentioning quantum computing Feynman 198 : Use a quantum computer

More information

Proof Nets and Boolean Circuits

Proof Nets and Boolean Circuits Proof Nets and Boolean Circuits Kazushige Terui terui@nii.ac.j National Institute of Informatics, Tokyo 14/07/04, Turku.1/44 Motivation (1) Proofs-as-Programs (Curry-Howard) corresondence: Proofs = Programs

More information

Unit 1 - Computer Arithmetic

Unit 1 - Computer Arithmetic FIXD-POINT (FX) ARITHMTIC Unit 1 - Comuter Arithmetic INTGR NUMBRS n bit number: b n 1 b n 2 b 0 Decimal Value Range of values UNSIGND n 1 SIGND D = b i 2 i D = 2 n 1 b n 1 + b i 2 i n 2 i=0 i=0 [0, 2

More information

b) (5 points) Give a simple quantum circuit that transforms the state

b) (5 points) Give a simple quantum circuit that transforms the state C/CS/Phy191 Midterm Quiz Solutions October 0, 009 1 (5 points) Short answer questions: a) (5 points) Let f be a function from n bits to 1 bit You have a quantum circuit U f for computing f If you wish

More information

An Introduction to Quantum Computing for Non-Physicists

An Introduction to Quantum Computing for Non-Physicists An Introduction to Quantum Comuting for Non-hysicists Eleanor Rieffel F alo Alto Labratory and Wolfgang olak Consultant F alo Alto Laboratory, 3400 Hillview Avenue, alo Alto, CA 94304 Richard Feynman s

More information

Convolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code.

Convolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code. Convolutional Codes Goals Lecture Be able to encode using a convolutional code Be able to decode a convolutional code received over a binary symmetric channel or an additive white Gaussian channel Convolutional

More information

Introduction to Quantum Computation

Introduction to Quantum Computation Chapter 1 Introduction to Quantum Computation 1.1 Motivations The main task in this course is to discuss application of quantum mechanics to information processing (or computation). Why? Education:Asingleq-bitisthesmallestpossiblequantummechanical

More information

Title. Author(s)Okamoto, Ryo; Hofmann, Holger F.; Takeuchi, Shigeki; CitationPhysical Review Letters, 95: Issue Date

Title. Author(s)Okamoto, Ryo; Hofmann, Holger F.; Takeuchi, Shigeki; CitationPhysical Review Letters, 95: Issue Date Title Demonstration of an Otical Quantum Controlled-NOT G Author(s)Okamoto, Ryo; Hofmann, Holger F.; Takeuchi, Shigeki; CitationPhysical Review Letters, 95: 210506 Issue Date 2005-11-18 Doc URL htt://hdl.handle.net/2115/5550

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681

Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 48 / C&O 68 Lecture (2) Richard Cleve DC 27 cleve@cs.uwaterloo.ca Order-finding via eigenvalue estimation 2 Order-finding

More information

Pythagorean triples and sums of squares

Pythagorean triples and sums of squares Pythagorean triles and sums of squares Robin Chaman 16 January 2004 1 Pythagorean triles A Pythagorean trile (x, y, z) is a trile of ositive integers satisfying z 2 + y 2 = z 2. If g = gcd(x, y, z) then

More information

MATH342 Practice Exam

MATH342 Practice Exam MATH342 Practice Exam This exam is intended to be in a similar style to the examination in May/June 2012. It is not imlied that all questions on the real examination will follow the content of the ractice

More information

arxiv: v3 [quant-ph] 30 Sep 2009

arxiv: v3 [quant-ph] 30 Sep 2009 Quantum algorithm for linear systems of equations Aram W. Harrow, Avinatan Hassidim, and Seth Lloyd 3 Deartment of Mathematics, University of Bristol, Bristol, BS8 W, U.K. MI - Research Laboratory for

More information

Planck Constant and the Deutsch-Jozsa Algorithm

Planck Constant and the Deutsch-Jozsa Algorithm Adv. Studies Theor. Phys., Vol. 4, 010, no. 0, 97-990 Planck Constant and the Deutsch-Jozsa Algorithm Koji agata Future University Hakodate ko mi na@yahoo.co.jp Tadao akamura Keio University Science and

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS CASEY BRUCK 1. Abstract The goal of this aer is to rovide a concise way for undergraduate mathematics students to learn about how rime numbers behave

More information

#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS

#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS #A47 INTEGERS 15 (015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS Mihai Ciu Simion Stoilow Institute of Mathematics of the Romanian Academy, Research Unit No. 5,

More information