D.1 Deutsch-Jozsa algorithm
|
|
- Lesley Brooks
- 5 years ago
- Views:
Transcription
1 4 CHAPTER III. QUANTUM COMPUTATION Figure III.: Quantum circuit for Deutsch algorithm. [fig. from Nielsen & Chuang (00)] D Quantum algorithms D. Deutsch-Jozsa algorithm D..a Deutsch s algorithm In this section you will encounter your first examle of a quantum algorithm that can comute faster than a classical algorithm for the same roblem. This is a simlified version of Deutsch s original algorithm, which shows how it is ossible to extract global information about a function by using quantum arallelism and interference (Fig. III.). 8 Suose we have a function f :!, asinsec.c.5. Thegoalisto determine whether f(0) = f() with a single function evaluation. This is not a very interesting roblem (since there are only four such functions), but it is a warmu for the Deutsch-Jozsa algorithm. Simle as it is, it could be exensive to decide on a classical comuter. For examle, suose f(0) = the billionth bit of and f() = the billionth bit of e. Thentheroblemis to decide if the billionth bits of and e are the same. It is mathematically simle, but comutationally comlex. To see how we might solve this roblem, suose we have a quantum gate array U f for f; thatis,u f xi yi = xi y f(x)i. In articular, U f xi 0i = 8 This is the 998 imrovement by Cleve et al. to Deutsch s 985 algorithm (Nielsen & Chuang, 00,. 59).
2 D. QUANTUM ALGORITHMS 5 xi f(x)i and U f xi i = xi f(x)i. Usually we set y =0togettheresult f(x)i, buthereyouwillseeanalicationinwhichwewanty =. Now consider the result of alying U f to xi in the data register and to the suerosition i = ( 0i i) inthetargetregister. U f xi i = xi f(x)i xi f(x)i = xi[ f(x)i f(x)i]. Now the rightmost square bracket is 0i i if f(x) =0or i 0i if f(x) =. Therefore,wecanwrite U f xi i = xi( ) f(x) ( 0i i) =( ) f(x) xi i. (III.) [Here, ( ) x is an abbreviation for ( ) x when we want to emhasize that the sign is all that matters.] Since U f xi i =( ) f(x) xi i, theresultof alying it to an equal suerosition of x =0andx =is: U f xi i = ( ) f(x) xi i. x If f is a constant function, then f(0) = f(), and the summation is ± ( 0i+ i) i = ± +i i because both comonents have the same sign.. On the other hand, if f(0) 6= f(), then the summation is ± ( 0i i) i = ± i i because the comonents have oosite signs. That is, a constant function gives the 0i and i comonents of the data qubit the same hase, and otherwise gives them the oosite hase. Therefore, we can determine whether the function is constant or not by measuring the first qubit in the sign basis; we get +i if f(0) = f() and i otherwise. With this background, we can state Deutsch s algorithm. x algorithm Deutsch: Initial state: Begin with the qubits 0 i def = 0i. Suerosition: Transform it to a air of suerositions i def = ( 0i + i) ( 0i i) = + i. (III.)
3 6 CHAPTER III. QUANTUM COMPUTATION by a air of Hadamard gates. Recall that H 0i = ( 0i + i) = +i and H i = ( 0i i) = i. Function alication: Next aly U f to i = + i. As we ve seen, U f xi 0i = xi 0 f(x)i = xi f(x)i, and U f xi i = xi f(x)i = xi f(x)i. Therefore,exandEq.III.andalyU f : i def = U f i = U f ale ( 0i + i) ( 0i i) = [U f 00i U f 0i + U f 0i U f i] = [ 0,f(0)i 0, f(0)i +,f()i, f()i] There are two cases: f(0) = f() and f(0) 6= f(). Equal (constant function): If f(0) = f(), then i = [ 0,f(0)i 0, f(0)i +,f(0)i, f(0)i] = [ 0i( f(0)i f(0)i)+ i( f(0)i f(0)i)] = ( 0i + i)( f(0)i f(0)i) = ± ( 0i + i)( 0i i) = ± ( 0i + i) i = + i. The last line alies because global hase (including ±) doesn tmatter. Unequal (balanced function): If f(0) 6= f(), then i = [ 0,f(0)i 0, f(0)i +, f(0)i,f(0)i]
4 D. QUANTUM ALGORITHMS 7 = [ 0i( f(0)i f(0)i)+ i( f(0)i f(0)i)] = [ 0i( f(0)i f(0)i) i( f(0)i f(0)i)] = ( 0i i)( f(0)i f(0)i) = ± ( 0i i)( 0i i) = ± ( 0i i) i = i Clearly we can discriminate between the two cases by measuring the first qubit in the sign basis. In articular, note that in the unequal case, the i comonent has the oosite hase from the 0i comonent. Measurement: Therefore we can determine whether f(0) = f() or not by measuring the first bit of i in the sign basis, which we can do with the Hadamard gate (recall H +i = 0i and H i = i): 3 i def = (H I) i ± 0i i, if f(0) = f() = ± i i, if f(0) 6= f() = ± f(0) f()i i. Notice that the information we need is in the data register, not the target register. This technique is called hase kick-back (i.e., kicked back into the hase of the data register). In conclusion, we can determine whether or not f(0) = f() with a single evaluation of f, whichisquiteremarkable.ine ect,weareevaluatingf on asuerositionof 0i and i and determining how the results interfere with each other. As a result we get a definite (not robabilistic) determination of aglobalroertywithasingleevaluation. This is a clear examle where a quantum comuter can do something faster than a classical comuter. However, note that U f has to uncomute
5 8 CHAPTER III. QUANTUM COMPUTATION Figure III.3: Quantum circuit for Deutsch-Jozsa algorithm. [fig. from NC] f, whichtakesasmuchtimeascomutingit,butwewillseeothercases (Deutsch-Jozsa) where the seedu is much more than. D..b The Deutsch-Jozsa algorithm The Deutsch-Jozsa algorithm is a generalization of the Deutsch algorithm to n bits, which they ublished it in 99; here we resent the imroved version of Nielsen & Chuang (00,. 59). This is the roblem: Suose we are given an unknown function f : n! in the form of a unitary transform U f L(H n+, H) (Fig. III.3). We are told only that f is either constant or balanced, whichmeansthatitis0on half its domain and on the other half. Our task is to determine into which class the given f falls. Consider first the classical situation. We can try di erent inut bit strings x. We might (if we re lucky) discover after the second query of f that it is not constant. But we might require as many as n /+queriestoanswer the question. So we re facing O( n )functionevaluations. algorithm Deutsch-Jozsa: Initial state: As in the Deutsch algorithm, reare the initial state 0 i def = 0i n i.
6 D. QUANTUM ALGORITHMS 9 Suerosition: Use the Walsh-Hadamard transformation to create a suerosition of all ossible inuts: i def =(H n H) 0 i = x, i. x n n Claim: Similarly to the single qubit case (Eq. III.), we can see that U f x, i =( ) f(x) xi i, where( ) n is an abbreviation for ( ) n. From the definition of i and U f, U f x, i = xi ( f(x)i f(x)i). Since f(x), ( f(x)i f(x)i) = i if f(x) =0,andit= i if f(x) =. This establishes the claim. Function alication: Therefore, you can see that: i def = U f i = x n n ( )f(x) xi i. (III.3) In the case of a constant function, all the comonents of the data state have the same hase, otherwise they do not. To see how we can make use of this information, let s consider the state in more detail. For a single bit you can show (Exer. III.4): H xi = ( 0i +( ) x i) = z( ) xz zi = z ( ) xz zi. (This is just another way of writing H 0i = ( 0i+ i) andh i = ( 0i i).) Therefore, the general formula for the Walsh transform of n bits is: H n x,x,...,x n i = = n n z,...,z n ( ) x z + +x nz n z,z,...,z n i z n ( ) x z zi, (III.4) where x z is the bitwise inner roduct. (It doesn t matter if you do addition or since only the arity of the result is significant.) Remember this formula! Combining this and the result in Eq. III.3, 3 i def =(H n I) i = ( n z n x n )x z+f(x) zi i.
7 30 CHAPTER III. QUANTUM COMPUTATION Measurement: Consider the first n qubits and the amlitude of one articular basis state, z = 0i = 0i n,whichwesearatefromtherestofthe summation: 3 i = x n n ( )f(x) 0i i + z n {0} x n n ( )x z+f(x) zi i Hence, the amlitude of 0i n,theall- 0i qubit string, is P x n n ( ) f(x). Recall how in the basic Deutsch algorithm we got a sum of signs (either all the same or not) for all the function evaluations. The result is similar here, but we have n values rather than just two. We now have two cases: Constant function: If the function is constant, then all the exonents of willbethesame(eitherall0orall),andsotheamlitudewillbe±. Therefore all the other amlitudes are 0 and any measurement must yield 0 for all the qubits (since only 0i n has nonzero amlitude). Balanced function: If the function is not constant then (ex hyothesi) it is balanced, but more secifically, if it is balanced, then there must be an equal number of + and contributionstotheamlitudeof 0i n,soits amlitude is 0. Therefore, when we measure the state, at least one qubit must be nonzero (since the all-0s state has amlitude 0). The good news about the Deutsch-Jozsa algorithm is that with one quantum function evaluation we have got a result that would require between and O( n )classicalfunctionevaluations(exonentialseedu!). Thebad news is that the algorithm has no known alications! Even if it were useful, however, the roblem could be solved robabilistically on a classical comuter with only a few evaluations of f: foranerrorrobabilityof, ittakes O(log ) function evaluations. However, it illustrates rinciles of quantum comuting that can be used in more useful algorithms.
D.1 Deutsch-Jozsa algorithm
4 CHAPTER III. QUANTUM COMPUTATION Figure III.: Quantum circuit for Deutsch algorithm. [fig. from Nielsen & Chuang ()] D Quantum algorithms D. Deutsch-Jozsa algorithm D..a Deutsch s algorithm In this section
More information92 CHAPTER III. QUANTUM COMPUTATION. Figure III.11: Diagram for swap (from NC).
92 CHAPTER III. QUANTUM COMPUTATION Figure III.11: Diagram for swap (from NC). C.3 Quantum circuits 1. Quantum circuit: A quantum circuit isa sequential seriesofquantum transformations on a quantum register.
More informationComputer arithmetic. Intensive Computation. Annalisa Massini 2017/2018
Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3
More informationD.5 Quantum error correction
D. QUANTUM ALGORITHMS 157 Figure III.34: E ects of decoherence on a qubit. On the left is a qubit yi that is mostly isoloated from its environment i. Ontheright,aweakinteraction between the qubit and the
More informationLecture 4: Elementary Quantum Algorithms
CS 880: Quantum Information Processing 9/13/010 Lecture 4: Elementary Quantum Algorithms Instructor: Dieter van Melkebeek Scribe: Kenneth Rudinger This lecture introduces several simple quantum algorithms.
More informationEvaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models
Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu
More informationCSE 599d - Quantum Computing When Quantum Computers Fall Apart
CSE 599d - Quantum Comuting When Quantum Comuters Fall Aart Dave Bacon Deartment of Comuter Science & Engineering, University of Washington In this lecture we are going to begin discussing what haens to
More informationQUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2
School of Mathematics Spring 017 QUANTUM COMPUTATION Exercise sheet 1 Ashley Montanaro, University of Bristol ashley.montanaro@bristol.ac.uk 1. The quantum circuit model. (a) Consider the following quantum
More informationShor s Prime Factorization Algorithm
Shor s Prime Factorization Algorithm Bay Area Quantum Computing Meetup - 08/17/2017 Harley Patton Outline Why is factorization important? Shor s Algorithm Reduction to Order Finding Order Finding Algorithm
More informationImpossibility of a Quantum Speed-up with a Faulty Oracle
Imossibility of a Quantum Seed-u with a Faulty Oracle Oded Regev Liron Schiff Abstract We consider Grover s unstructured search roblem in the setting where each oracle call has some small robability of
More informationQuantum Computing: Foundations to Frontier Fall Lecture 3
Quantum Computing: Foundations to Frontier Fall 018 Lecturer: Henry Yuen Lecture 3 Scribes: Seyed Sajjad Nezhadi, Angad Kalra Nora Hahn, David Wandler 1 Overview In Lecture 3, we started off talking about
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Petros Wallden Lecture 7: Complexity & Algorithms I 13th October 016 School of Informatics, University of Edinburgh Complexity - Computational Complexity: Classification
More informationC. QUANTUM INFORMATION 99
C. QUANTUM INFORMATION 99 C Quantum information C.1 Qubits C.1.a Single qubits Just as the bits 0 and 1 are represented by distinct physical states in a conventional computer, so the quantum bits (or qubits)
More informationCompute the Fourier transform on the first register to get x {0,1} n x 0.
CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary
More informationFourier Sampling & Simon s Algorithm
Chapter 4 Fourier Sampling & Simon s Algorithm 4.1 Reversible Computation A quantum circuit acting on n qubits is described by an n n unitary operator U. Since U is unitary, UU = U U = I. This implies
More informationUNM Physics 452/581: Introduction to Quantum Information, Problem Set 3, Fall 2007
UNM Physics 45/581: Introduction to Quantum Information, Problem Set 3, Fall 007 Instructor: Dr. Landahl Issued: September 1, 007 Due: September 18, 007 Do all of the problems listed below. Hand in your
More informationShort introduction to Quantum Computing
November 7, 2017 Short introduction to Quantum Computing Joris Kattemölle QuSoft, CWI, Science Park 123, Amsterdam, The Netherlands Institute for Theoretical Physics, University of Amsterdam, Science Park
More informationHENSEL S LEMMA KEITH CONRAD
HENSEL S LEMMA KEITH CONRAD 1. Introduction In the -adic integers, congruences are aroximations: for a and b in Z, a b mod n is the same as a b 1/ n. Turning information modulo one ower of into similar
More informationAMS10 HW1 Grading Rubric
AMS10 HW1 Grading Rubric Problem 1 (16ts- ts/each). Left hand side is shown to equal right hand side using examles with real vectors. A vector sace is a set V on which two oerations, vector addition and
More informationNothing Here. Fast Quantum Algorithms
Nothing Here Fast Quantum Algorithms or How we learned to put our pants on two legs at a time. Dave Bacon Institute for Quantum Information California Institute of Technology ? A prudent question is one-half
More informationFault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls
CIS 410/510, Introduction to Quantum Information Theory Due: June 8th, 2016 Sring 2016, University of Oregon Date: June 7, 2016 Fault Tolerant Quantum Comuting Robert Rogers, Thomas Sylwester, Abe Pauls
More informationQLang: Qubit Language
QLang: Qubit Language Christopher Campbell Clément Canonne Sankalpa Khadka Winnie Narang Jonathan Wong September 24, 24 Introduction In 965, Gordon Moore predicted that the number of transistors in integrated
More informationTopic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar
15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider
More informationLecture 1: Introduction to Quantum Computing
Lecture : Introduction to Quantum Computing Rajat Mittal IIT Kanpur What is quantum computing? This course is about the theory of quantum computation, i.e., to do computation using quantum systems. These
More informationPh 219b/CS 219b. Exercises Due: Wednesday 4 December 2013
1 Ph 219b/CS 219b Exercises Due: Wednesday 4 December 2013 4.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the
More informationLOWELL WEEKI.Y JOURINAL
/ $ 8) 2 {!»!» X ( (!!!?! () ~ x 8» x /»!! $?» 8! ) ( ) 8 X x /! / x 9 ( 2 2! z»!!»! ) / x»! ( (»»!» [ ~!! 8 X / Q X x» ( (!»! Q ) X x X!! (? ( ()» 9 X»/ Q ( (X )!» / )! X» x / 6!»! }? ( q ( ) / X! 8 x»
More informationLecture 21: Quantum Communication
CS 880: Quantum Information Processing 0/6/00 Lecture : Quantum Communication Instructor: Dieter van Melkebeek Scribe: Mark Wellons Last lecture, we introduced the EPR airs which we will use in this lecture
More informationarxiv: v2 [quant-ph] 2 Aug 2012
Qcomiler: quantum comilation with CSD method Y. G. Chen a, J. B. Wang a, a School of Physics, The University of Western Australia, Crawley WA 6009 arxiv:208.094v2 [quant-h] 2 Aug 202 Abstract In this aer,
More informationLecture 1: Overview of quantum information
CPSC 59/69: Quantum Computation John Watrous, University of Calgary References Lecture : Overview of quantum information January 0, 006 Most of the material in these lecture notes is discussed in greater
More informationReal Analysis 1 Fall Homework 3. a n.
eal Analysis Fall 06 Homework 3. Let and consider the measure sace N, P, µ, where µ is counting measure. That is, if N, then µ equals the number of elements in if is finite; µ = otherwise. One usually
More informationIntroduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm
Part I: Quantum Gates and Simon s Algorithm Martin Rötteler NEC Laboratories America, Inc. 4 Independence Way, Suite 00 Princeton, NJ 08540, U.S.A. International Summer School on Quantum Information, Max-Planck-Institut
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationDeutsch Algorithm on Classical Circuits
Deutsch Algorithm on Classical Circuits Assist.Prof.Dr. Osman Kaan EROL Istanbul Technical University, Electrical-Electronics Faculty, Computer Engineering Dept. Istanbul-Turkey Abstract: The well-known
More information16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes
Infinite Series 6.2 Introduction We extend the concet of a finite series, met in Section 6., to the situation in which the number of terms increase without bound. We define what is meant by an infinite
More informationMANY BILLS OF CONCERN TO PUBLIC
- 6 8 9-6 8 9 6 9 XXX 4 > -? - 8 9 x 4 z ) - -! x - x - - X - - - - - x 00 - - - - - x z - - - x x - x - - - - - ) x - - - - - - 0 > - 000-90 - - 4 0 x 00 - -? z 8 & x - - 8? > 9 - - - - 64 49 9 x - -
More informationAI*IA 2003 Fusion of Multiple Pattern Classifiers PART III
AI*IA 23 Fusion of Multile Pattern Classifiers PART III AI*IA 23 Tutorial on Fusion of Multile Pattern Classifiers by F. Roli 49 Methods for fusing multile classifiers Methods for fusing multile classifiers
More informationQuantum Communication Complexity
Quantum Communication Complexity Ronald de Wolf Communication complexity has been studied extensively in the area of theoretical computer science and has deep connections with seemingly unrelated areas,
More informationLecture 9: Connecting PH, P/poly and BPP
Comutational Comlexity Theory, Fall 010 Setember Lecture 9: Connecting PH, P/oly and BPP Lecturer: Kristoffer Arnsfelt Hansen Scribe: Martin Sergio Hedevang Faester Although we do not know how to searate
More informationOn the Rank of the Elliptic Curve y 2 = x(x p)(x 2)
On the Rank of the Ellitic Curve y = x(x )(x ) Jeffrey Hatley Aril 9, 009 Abstract An ellitic curve E defined over Q is an algebraic variety which forms a finitely generated abelian grou, and the structure
More informationThe Euler Phi Function
The Euler Phi Function 7-3-2006 An arithmetic function takes ositive integers as inuts and roduces real or comlex numbers as oututs. If f is an arithmetic function, the divisor sum Dfn) is the sum of the
More informationMATH 2710: NOTES FOR ANALYSIS
MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite
More informationParallel Quantum-inspired Genetic Algorithm for Combinatorial Optimization Problem
Parallel Quantum-insired Genetic Algorithm for Combinatorial Otimization Problem Kuk-Hyun Han Kui-Hong Park Chi-Ho Lee Jong-Hwan Kim Det. of Electrical Engineering and Comuter Science, Korea Advanced Institute
More informationLOWELL. MICHIGAN. WEDNESDAY, FEBRUARY NUMllEE 33, Chicago. >::»«ad 0:30am, " 16.n«l w 00 ptn Jaekten,.'''4snd4:4(>a tii, ijilwopa
4/X6 X 896 & # 98 # 4 $2 q $ 8 8 $ 8 6 8 2 8 8 2 2 4 2 4 X q q!< Q 48 8 8 X 4 # 8 & q 4 ) / X & & & Q!! & & )! 2 ) & / / ;) Q & & 8 )
More information6.896 Quantum Complexity Theory September 18, Lecture 5
6.896 Quantum Complexity Theory September 18, 008 Lecturer: Scott Aaronson Lecture 5 Last time we looked at what s known about quantum computation as it relates to classical complexity classes. Today we
More informationSimon s algorithm (1994)
Simon s algorithm (1994) Given a classical circuit C f (of polynomial size, in n) for an f : {0, 1} n {0, 1} n, such that for a certain s {0, 1} n \{0 n }: x, y {0, 1} n (x y) : f (x) = f (y) x y = s with
More informationPseudorandom Sequence Generation
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Crytograhy and Comuter Security Handout #21 Professor M. J. Fischer November 29, 2005 Pseudorandom Seuence Generation 1 Distinguishability and
More informationPh 219b/CS 219b. Exercises Due: Wednesday 22 February 2006
1 Ph 219b/CS 219b Exercises Due: Wednesday 22 February 2006 6.1 Estimating the trace of a unitary matrix Recall that using an oracle that applies the conditional unitary Λ(U), Λ(U): 0 ψ 0 ψ, 1 ψ 1 U ψ
More informationI Poles & zeros. I First-order systems. I Second-order systems. I E ect of additional poles. I E ect of zeros. I E ect of nonlinearities
EE C28 / ME C34 Lecture Chater 4 Time Resonse Alexandre Bayen Deartment of Electrical Engineering & Comuter Science University of California Berkeley Lecture abstract Toics covered in this resentation
More informationIntroduction to Quantum Information Processing
Introduction to Quantum Information Processing Lecture 6 Richard Cleve Overview of Lecture 6 Continuation of teleportation Computation and some basic complexity classes Simple quantum algorithms in the
More informationRichard Cleve David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo
CS 497 Frontiers of Computer Science Introduction to Quantum Computing Lecture of http://www.cs.uwaterloo.ca/~cleve/cs497-f7 Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum
More informationOn Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm
On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,
More informationThe Arm Prime Factors Decomposition
The Arm Prime Factors Decomosition Arm Boris Nima arm.boris@gmail.com Abstract We introduce the Arm rime factors decomosition which is the equivalent of the Taylor formula for decomosition of integers
More informationarxiv: v1 [quant-ph] 3 Feb 2015
From reversible comutation to quantum comutation by Lagrange interolation Alexis De Vos and Stin De Baerdemacker 2 arxiv:502.0089v [quant-h] 3 Feb 205 Cmst, Imec v.z.w., vakgroe elektronica en informatiesystemen,
More informationOutline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding
Outline EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Error detection using arity Hamming code for error detection/correction Linear Feedback Shift
More information1-way quantum finite automata: strengths, weaknesses and generalizations
1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum
More informationCryptanalysis of Pseudorandom Generators
CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we
More information15-451/651: Design & Analysis of Algorithms October 23, 2018 Lecture #17: Prediction from Expert Advice last changed: October 25, 2018
5-45/65: Design & Analysis of Algorithms October 23, 208 Lecture #7: Prediction from Exert Advice last changed: October 25, 208 Prediction with Exert Advice Today we ll study the roblem of making redictions
More informationJohn Weatherwax. Analysis of Parallel Depth First Search Algorithms
Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel
More informationSimulation of quantum computers with probabilistic models
Simulation of quantum computers with probabilistic models Vlad Gheorghiu Department of Physics Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. April 6, 2010 Vlad Gheorghiu (CMU) Simulation of quantum
More informationPrincipal Components Analysis and Unsupervised Hebbian Learning
Princial Comonents Analysis and Unsuervised Hebbian Learning Robert Jacobs Deartment of Brain & Cognitive Sciences University of Rochester Rochester, NY 1467, USA August 8, 008 Reference: Much of the material
More information16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes
Infinite Series 6. Introduction We extend the concet of a finite series, met in section, to the situation in which the number of terms increase without bound. We define what is meant by an infinite series
More information0.6 Factoring 73. As always, the reader is encouraged to multiply out (3
0.6 Factoring 7 5. The G.C.F. of the terms in 81 16t is just 1 so there is nothing of substance to factor out from both terms. With just a difference of two terms, we are limited to fitting this olynomial
More information1. INTRODUCTION. Fn 2 = F j F j+1 (1.1)
CERTAIN CLASSES OF FINITE SUMS THAT INVOLVE GENERALIZED FIBONACCI AND LUCAS NUMBERS The beautiful identity R.S. Melham Deartment of Mathematical Sciences, University of Technology, Sydney PO Box 23, Broadway,
More informationPrinciples of Computed Tomography (CT)
Page 298 Princiles of Comuted Tomograhy (CT) The theoretical foundation of CT dates back to Johann Radon, a mathematician from Vienna who derived a method in 1907 for rojecting a 2-D object along arallel
More informationQuantum Communication
Quantum Communication Harry Buhrman CWI & University of Amsterdam Physics and Computing Computing is physical Miniaturization quantum effects Quantum Computers ) Enables continuing miniaturization ) Fundamentally
More informationExtension of Minimax to Infinite Matrices
Extension of Minimax to Infinite Matrices Chris Calabro June 21, 2004 Abstract Von Neumann s minimax theorem is tyically alied to a finite ayoff matrix A R m n. Here we show that (i) if m, n are both inite,
More informationDISCRIMINANTS IN TOWERS
DISCRIMINANTS IN TOWERS JOSEPH RABINOFF Let A be a Dedekind domain with fraction field F, let K/F be a finite searable extension field, and let B be the integral closure of A in K. In this note, we will
More informationDRAFT - do not circulate
An Introduction to Proofs about Concurrent Programs K. V. S. Prasad (for the course TDA383/DIT390) Deartment of Comuter Science Chalmers University Setember 26, 2016 Rough sketch of notes released since
More informationQuantum Computing Lecture 6. Quantum Search
Quantum Computing Lecture 6 Quantum Search Maris Ozols Grover s search problem One of the two most important algorithms in quantum computing is Grover s search algorithm (invented by Lov Grover in 1996)
More informationQuantum Computer Algorithms: basics
Quantum Computer Algorithms: basics Michele Mosca Canada Research Chair in Quantum Computation SQUINT Summer School on Quantum Information Processing June 3 Overview A quantum computing model Basis changes
More informationQuantum Circuits and Algorithms
Quantum Circuits and Algorithms Modular Arithmetic, XOR Reversible Computation revisited Quantum Gates revisited A taste of quantum algorithms: Deutsch algorithm Other algorithms, general overviews Measurements
More informationarxiv: v1 [physics.data-an] 26 Oct 2012
Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch
More informationSingle qubit + CNOT gates
Lecture 6 Universal quantum gates Single qubit + CNOT gates Single qubit and CNOT gates together can be used to implement an arbitrary twolevel unitary operation on the state space of n qubits. Suppose
More informationQuantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem
Quantum Computing Lecture Notes, Extra Chapter Hidden Subgroup Problem Ronald de Wolf 1 Hidden Subgroup Problem 1.1 Group theory reminder A group G consists of a set of elements (which is usually denoted
More informationDay 3 Selected Solutions
Solutions for Exercises 1 and 2 Exercise 1 Start with something simple: What is the stabilizer S such that is stabilized by S? G 1 = linspan ( 00, 11 ) Exercise 1 Start with something simple: What is the
More informationGeneral Linear Model Introduction, Classes of Linear models and Estimation
Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)
More informationIntroduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871
Introduction to Quantum Information Processing QIC 71 / CS 768 / PH 767 / CO 681 / AM 871 Lecture 8 (217) Jon Yard QNC 3126 jyard@uwaterloo.ca http://math.uwaterloo.ca/~jyard/qic71 1 Recap of: Eigenvalue
More informationAnalysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel
Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict
More informationd A L. T O S O U LOWELL, MICHIGAN. THURSDAY, DECEMBER 5, 1929 Cadillac, Nov. 20. Indignation
) - 5 929 XXX - $ 83 25 5 25 $ ( 2 2 z 52 $9285)9 7 - - 2 72 - - 2 3 zz - 9 86 - - - - 88 - q 2 882 q 88 - - - - - - ( 89 < - Q - 857-888 - - - & - - q - { q 7 - - - - q - - - - - - q - - - - 929 93 q
More informationAdam Paweł Zaborski. 8 Plasticity. reloading. 1. Bauschinger s effect. 2. unchanged yielding limit. 3. isotropic hardening
8 lasticity Introduction Definitions loading/unloading/reloading words commonly used in lasticity lastic strain a ermanent strain that doesn t vanish after unloading, lastically assive rocess a rocess
More informationPHYS 301 HOMEWORK #9-- SOLUTIONS
PHYS 0 HOMEWORK #9-- SOLUTIONS. We are asked to use Dirichlet' s theorem to determine the value of f (x) as defined below at x = 0, ± /, ± f(x) = 0, - < x
More informationSeminar 1. Introduction to Quantum Computing
Seminar 1 Introduction to Quantum Computing Before going in I am also a beginner in this field If you are interested, you can search more using: Quantum Computing since Democritus (Scott Aaronson) Quantum
More informationAn Introduction to Quantum Computation and Quantum Information
An to and Graduate Group in Applied Math University of California, Davis March 13, 009 A bit of history Benioff 198 : First paper published mentioning quantum computing Feynman 198 : Use a quantum computer
More informationProof Nets and Boolean Circuits
Proof Nets and Boolean Circuits Kazushige Terui terui@nii.ac.j National Institute of Informatics, Tokyo 14/07/04, Turku.1/44 Motivation (1) Proofs-as-Programs (Curry-Howard) corresondence: Proofs = Programs
More informationUnit 1 - Computer Arithmetic
FIXD-POINT (FX) ARITHMTIC Unit 1 - Comuter Arithmetic INTGR NUMBRS n bit number: b n 1 b n 2 b 0 Decimal Value Range of values UNSIGND n 1 SIGND D = b i 2 i D = 2 n 1 b n 1 + b i 2 i n 2 i=0 i=0 [0, 2
More informationb) (5 points) Give a simple quantum circuit that transforms the state
C/CS/Phy191 Midterm Quiz Solutions October 0, 009 1 (5 points) Short answer questions: a) (5 points) Let f be a function from n bits to 1 bit You have a quantum circuit U f for computing f If you wish
More informationAn Introduction to Quantum Computing for Non-Physicists
An Introduction to Quantum Comuting for Non-hysicists Eleanor Rieffel F alo Alto Labratory and Wolfgang olak Consultant F alo Alto Laboratory, 3400 Hillview Avenue, alo Alto, CA 94304 Richard Feynman s
More informationConvolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code.
Convolutional Codes Goals Lecture Be able to encode using a convolutional code Be able to decode a convolutional code received over a binary symmetric channel or an additive white Gaussian channel Convolutional
More informationIntroduction to Quantum Computation
Chapter 1 Introduction to Quantum Computation 1.1 Motivations The main task in this course is to discuss application of quantum mechanics to information processing (or computation). Why? Education:Asingleq-bitisthesmallestpossiblequantummechanical
More informationTitle. Author(s)Okamoto, Ryo; Hofmann, Holger F.; Takeuchi, Shigeki; CitationPhysical Review Letters, 95: Issue Date
Title Demonstration of an Otical Quantum Controlled-NOT G Author(s)Okamoto, Ryo; Hofmann, Holger F.; Takeuchi, Shigeki; CitationPhysical Review Letters, 95: 210506 Issue Date 2005-11-18 Doc URL htt://hdl.handle.net/2115/5550
More informationElementary Analysis in Q p
Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some
More informationPositive decomposition of transfer functions with multiple poles
Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.
More informationIntroduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681
Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 48 / C&O 68 Lecture (2) Richard Cleve DC 27 cleve@cs.uwaterloo.ca Order-finding via eigenvalue estimation 2 Order-finding
More informationPythagorean triples and sums of squares
Pythagorean triles and sums of squares Robin Chaman 16 January 2004 1 Pythagorean triles A Pythagorean trile (x, y, z) is a trile of ositive integers satisfying z 2 + y 2 = z 2. If g = gcd(x, y, z) then
More informationMATH342 Practice Exam
MATH342 Practice Exam This exam is intended to be in a similar style to the examination in May/June 2012. It is not imlied that all questions on the real examination will follow the content of the ractice
More informationarxiv: v3 [quant-ph] 30 Sep 2009
Quantum algorithm for linear systems of equations Aram W. Harrow, Avinatan Hassidim, and Seth Lloyd 3 Deartment of Mathematics, University of Bristol, Bristol, BS8 W, U.K. MI - Research Laboratory for
More informationPlanck Constant and the Deutsch-Jozsa Algorithm
Adv. Studies Theor. Phys., Vol. 4, 010, no. 0, 97-990 Planck Constant and the Deutsch-Jozsa Algorithm Koji agata Future University Hakodate ko mi na@yahoo.co.jp Tadao akamura Keio University Science and
More informationTutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction
Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states
More informationA CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract
A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS CASEY BRUCK 1. Abstract The goal of this aer is to rovide a concise way for undergraduate mathematics students to learn about how rime numbers behave
More information#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS
#A47 INTEGERS 15 (015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS Mihai Ciu Simion Stoilow Institute of Mathematics of the Romanian Academy, Research Unit No. 5,
More information