Quantum Computing 量子運算

¡Supera tus tareas y exámenes ahora con Quizwiz!

Constant function

A constant function always maps to either 1 or 0.

b (CNOT gate)

target or target input

CNOT gate

the quantum analog to the classical XOR gate

Balanced function

A balanced function maps to 1 for half of the inputs and maps to 0 for the other half.

Linear algorithm

A linear growth rate is less than a polynomial or exponential growth rate. Linear algorithm will generally require fewer resources for a system of very large size.

Two-qubit gate fidelity

At 99.91%, trapped ions have the highest two-qubit gate fidelity. This is followed by superconducting qubits at 99.4%.

cyphertext

Encryption (加密) takes raw data and translates it or encodes it into an unrecognizable message called a cyphertext (密文).

Exponential advantage

For N atoms, the classical resources scale as 2^N, whereas the quantum resources scale as N^c, where c generally ranges from 2 to 6. A change from exponential scaling to polynomial scaling represents an exponential improvement, or exponential advantage.

Gate fidelity

Gate fidelity is a measure of how closely the experimental gate operation matches - on average - the theoretically ideal version of that operation. It is a rigorous means to define how well a gate operation works.

Coherence time

It quantifies the robustness of a qubit. After the coherence time, the quantum state is predominantly lost. // The coherence time is a characteristic 1/e time scale during which -- on average -- the quantum state of a qubit is (partially) maintained. // After several coherence times, the qubit has essentially completely decohered; the state information is lost, but the qubit itself is still physically present.

Gate time

It quantifies the time required to perform a quantum operation.

Quantum computation

Quantum computers utilize certain unique properties of subatomic particles in conjunction with the theories of computer science to pro- and store information. This merging of quantum mechanics and computer science has been extensively explored during the last three decades, and has led to the development of techniques for a class of computational problems, for example, deciphering codes, factoring large numbers, searching an unsorted collection etc. that can be solved much more efficiently using a quantum computer. Such advances in information processing capability can be attrib- uted to the fact that the data bits in a quantum computer, unlike their counterparts in classical computers can simultaneously exist in more than one state at a time and can be manipulated simultaneously. Information in conventional digital representation uses a sequence of bits. Each bit is basically the charge of an electron. If the electron is charged, the bit is assumed to carry a value 1; alternatively the bit car- ries a value 0 if the electron is not charged. Thus a bit also known as a classical bit can be in state 0 or state 1, and measuring a bit at any time results in one of two possible outcomes.

Quantum key distribution

Quantum key distribution (QKD) is a secure communication method which implements a cryptographic protocol involving components of quantum mechanics. QKD provides a means to securely transmit and share such a secret key. The secret key can then be used to encrypt and decrypt information.

Quantum teleportation

Quantum teleportation is a technique for transferring quantum information from a sender at one location to a receiver some distance away.

Qubit lifetime

Qubits with long lifetimes tend to be more weakly coupled to their environment; have less sensitivity to noise; be more weakly coupled to control fields. If a qubit is less coupled to its environment, it is less sensitive to noise and thus tends to have a longer lifetime. Control fields may be thought of as intentional electromagnetic fields, in contrast to the unintentional ones of a noisy environment. If a qubit is weakly coupled and predominantly insensitive to environmental noise, it is likely that it is also similarly insensitive to intentionally applied control fields. This means that the amplitude of the control field must be made larger to compensate the insensitivity in order to respond as quickly as, for example, a qubit that is more strongly coupled to its environment and control fields.

Shor's algorithm

Shor's algorithm is a quantum algorithm for integer factorization that features an exponential speed up compared to the best known classical algorithms, and it has application to cryptanalysis (密碼破譯).

Superdense coding

Superdense coding (密集編碼) is a quantum communication protocol in which two bits of information can be communicated by only modifying and transmitting one qubit. It requires an entangled pair of qubits be prepared in advance and shared between the sender and the receiver. // Classical communication channels are not strictly required. Only one qubit needs to be transmitted. All of the information transmitted is contained in the quantum correlations between the two qubits, and so an entangled qubit pair is necessary. No information is encrypted in a superdense coding protocol. A quantum superposition by itself is not enough to perform a superdense coding protocol; entanglement of two qubits is necessary. // The superdense coding protocol enables one to send two classical bits of information per each transmitted qubit. This requires the sender and receiver to pre-share an entangled qubit pair.

No-cloning theorem

The no-cloning theorem is one of the three theorems on which the potential promise of quantum communication is based. If you prepare a qubit in a known state, you can prepare additional qubits in the same state. However, if you have a qubit in an unknown quantum state, you can't make exact copies of it. In short, the non-cloning theorem states that unknown quantum states can't be copied.

Quantum Supremacy

The point at which a quantum computer can perform calculations faster than the largest foreseeable classical computers.

Quantum advantage

The term "quantum advantage" is used to describe how a quantum computer may be able to outperform a classical computer. Quantum advantage serves as a kind of conceptual example of how much better quantum computers can be at various tasks and processes, and why quantum computing should be pursued as a frontier of IT.

ψ

actual state of a qubit (a vector)

Josephson Junctions

are thin oxide barriers sandwiched between two layers of superconductor.

Φ

azimuth angle

θ

polar angle

α

probability amplitude of 0 (a complex number)

β

probability amplitude of 1 (a complex number)

π

pulse

a (CNOT gate)

source or control input

X gate

the quantum analog of the classical NOT gate. X | 0 > = | 1 > and X | 1 > = | 0 >

U

unitary operator

spin-up

| 0 > or | ↑ >

spin-down

| 1 > or | ↓ >

量子運算

量子電腦結合電腦科學理論,利用亞原子粒子的某些獨特屬性來存儲和存儲信息。 在過去的三十年中,對量子力學和電腦科學的這種融合進行了廣泛的探索,並導致了針對一類計算問題的技術的發展,例如,解密代碼,分解大量因數,搜索未分類的集合等。 使用量子電腦可以更有效地解決問題。 信息處理能力的這種進步可以歸因於這樣一個事實,即量子電腦中的數據位與傳統電腦中的數據位不同,它們一次可以同時以一種以上狀態存在,並且可以同時被操縱。 常規數字表示中的信息使用比特序列。 每一位基本上都是電子的電荷。 如果電子帶電,則假定該位的值為1;否則為0。 或者,如果電子不帶電,則該位的值為0。 因此,也稱為經典位的位可以處於狀態0或狀態1,並且隨時測量位會導致兩種可能的結果之一。

OR gate

雙0為0

NOR gate

雙0為1

NAND gate

雙1為0

AND gate

雙1為1

XOR gate

鴛鴦為1


Conjuntos de estudio relacionados

NUR 356 Nursing Theory Exam 1 study

View Set

OPSM 3830: Ch. 13 - Inventory Management

View Set

Human Biology: Chapter 6: Cardiovascular System- Blood (from the SB hw)

View Set

Chapter 5: Evidence-Based Practice

View Set

Quiz 1 Chapter 1 "Intro to Business", Quiz 2 Chapter 2 "Economics & Business", Quiz 3 Chapter 3 "Business Ethics and Social Responsibility", Quiz 4 Chapter 4 "International Business", Quiz 5 Chapter 6 "Types of Business Ownership", Quiz 6 Chapter 7 "...

View Set

A&P Lab 1: Unit 13 PAL Gross Anatomy Muscular

View Set

Mikroøkonomi Semester 1 Finansøkonom

View Set

Contracts Against Public Policy and Illegal Contracts

View Set

Principles of Real Estate - Unit 7

View Set