Wednesday, September 08, 2021

An Introduction on Quantum Computing

In the 1930s, the key figures like Alan Turing have developed a classical theory of computing. These theories explain the restrictions of machinable algorithms and are still used today. Most of these theories are interesting to observe that modern computers exist as you know during the 1950s. Contemporary computers were quickly developed from valve technology to VLSI integrated circuits. The modern processor design function has reached a very small stage, but they are influenced by the strange rules of quantum mechanics.

These effects indicate the size reduction limitations that were one of the important ways to improve the performance of the processor, but some new computers are these effects on quantum computers, I think it can be used for the benefits of.

Richard Feynman, in principle, LED creating an abstract model of a method that can be used to perform calculations. Next, in 1985, David Deutsch announced a revolutionary theoretical article that describes how to use the quantum computing system to fully model physical processes. He stated that a computer of this type could perform tasks such as the generation of real random numbers that classic computers can not achieve. The most powerful functionality of the quantum computer can be the ability to use the phenomenon of "quantum parallel processing" to perform certain types of calculations in part of the time made by the classic computer.

Turing Machines developed by Alan Turing. In the 1930s are theoretical devices consisting of unlimited length tapes divided into small squares. Each square can maintain the symbol (1 or 0). Or leave it blank. The Read-write device reads these symbols and blank spaces. This will show an instruction to execute a specific program on the machine. Is this a family sound? In the Turring Quantum machine, the difference is that, as well as the reading / writing head, the tape is in a quantum state. This means that the symbol on the tape is 0 or 1 or 0 and 1 superposition. In other words, both symbols are at the same time 0 and 1 (and all points between them). Standard turning machines can only be performed simultaneously, but quantum Tour machines can perform many calculations at a time.

Turning machines, today's computers work operating the bits that exist in one of the two states. To 0 or 1. Quantum computers are limited to two states. They encode information such as quantum bits or jokes that exist in the superposition. The QUBITS represent each controller that operates together to function as a computer memory and a processor and their respective control devices. Quantum computers may contain these multiple states at the same time, so it can be duplicated that today's most powerful supercomputer.

The superposition of this QUBIT provides quantum computers inherent parallelism. According to the physique David Deutsch, this parallelism allows the quantum computer to work simultaneously for millions of calculations while operating a desktop PC. 30 The QUBIT Quantum computer is equal to the processing power of conventional computers that can be performed at 10 teraflops (the step of the floating port per second). Today's typical desktop computers work at a speed measured in Gigaflops (billions of floating movement operations per second). The quantum computer of

also uses another aspect of quantum mechanics known as entanglement. A problem with quantum computer ideas is that if you try to examine the suggestive particles, you can hit them, which allows you to change its value. You will see the qubit in the superposition to determine the value. In that case, the QUBIT assumes one of 0 or 1 value, but both are not (effectively activated on a digital computer of the time series). To create a practical quantum computer, scientists should design how to indirectly measure to maintain system integrity. Quantum physics allows two atoms to apply an external force to two atoms, and the two atoms can take charge of the characteristics of the first atom. Therefore, if it is a person and it is left, it will turn slightly. At the time when interrupted, it will select a rotation or value, and at the same time, the second intertwined atoms will select the opposite turn or value. This allows scientists to know the value of Qubit without really looking at.

Next, we'll look at some recent advancements in the field of quantum computing.

QUBIT CONTROL

Computer scientists use control devices to control microscopic particles like qubits in quantum computers.

• The ion trap uses light or magnetic fields (or a combination of both) to trap ions.

• The optical trap uses light waves to trap and control particles.

• Quantum dots are made of semiconductor materials and are used to contain and manipulate electrons.

• Semiconductor impurities contain electrons by using "unwanted" atoms found in semiconductor materials.

• The superconducting circuit allows electrons to flow with little resistance at low temperatures.

The advantage of quantum computing

It is theoretically shown that the quantum computer can make classical computers that they can perform. However, this does not necessarily mean that the quantum computer has priority of classical computers for any type of function. Using a classic algorithm on a quantum computer, you can also create the classic computer. To show your superiority of the quantum computer, you must use a new algorithm to use the parallelism of the symptoms.

Such an algorithm is not easy to formulate, but once it was discovered. They bring spectacular results. An example of an algorithm of this type is a quantum factor resolution algorithm created by Peter Shor's of AT & T Bell Laboratories. The algorithm works in its main factors for significant factoring problems. This task is a classic challenge to solve. In fact, forming the basis of RSA encryption is probably very difficult to form the most common encryption method of encryption used today. The Shor's algorithm is welcoming the effect of parallel quantum processing, provides the result of the problem of the second decomposition of the factor in a few seconds. In contrast, classic computers can, in some cases, produce more than the age of the universe.

Disadvantages of quantum computing

The technology required to build quantum computers is currently out of range. This is because the basic coherent state of the operation of the quantum computer is destroyed as soon as possible by its environment. The attempt at the battle with this problem has barely not succeeded, but continues hunting for practical solutions.

The meaning of the theory involved in quantum calculus not only creates a faster team, but also scope.

Quantum Communication

Many research groups are working on quantum communication systems. They allow the sender and recipients to accept the code where it is not fulfilled directly. Principles of uncertainty, the world nature of Quantum will prevent the sender and recipients will dislocate if the chill tries to monitor the signal that is transported.

Quantum cryptography

The expected capacity of quantum calculus promises a significant improvement in the world of encryption. Ironically, the same technology also provides global encryption technology for global problems. The meaning of the Shor's factor degradation algorithm in the world of encryption is incredible. The ability to break the RSA coding system can unstable almost all current communication channels.

Compare IaaS, PaaS , SaaS, NaaS, Idaas

Introduction

Cloud computing is used to set up a new connection on the local host or in server. In cloud computing we maintain the data on server and access the data using third party. cloud computing provide database for accessing data without in corruption.

What is PaaS, SaaS,and IaaS
SaaS used to provide application,
PaaS used to provide deploy customer application ,
IaaS used to provide storage capacity infrastructure .

IaaS (Infrastructure as a Service)
IaaS is used to provide infrastructure on the hardware or software in cloud computing. And it also provide local host disk spaces on the server . and maintain data using data block, firewalls, and also balance the data .

Example- Amazon, google computing engine. 
a. Provide base layer. 
b. Deal with virtual machine, storage , server, network and load data.


Characteristics of IaaS
· Resources are distributed service.
· Permits for dynamic scaling.
· Has a dynamic cost utility pricing model.
· includes multiple users on a single hardware.

PaaS (Platform as a Service)
PaaS is provide the cloud computing platform which include operating system, different programming language, error handling compiler, execution environment, and database web server, etc.
Example- Windows Azure, AWS Elastic Beanstalk.

a. It is a top layer of IAAS 
b. Runtime environment , Databases ( mySql, Oracle), Web Servers (tomcat etc)

Characteristics of PaaS
· Used tool to handle billing and and subscription management.
· Related with web services and databases.
· Support development team collaboration using solution of PaSS

SaaS (Software as a Service)

SaaS is provide accessing application software . and its refer on demand s/w . its setup installation of running application . in SaaS have a some client to access the software and just have to pay.

Example- Google Apps, Microsoft Office 365. 
a. it is a top layer of PaaS 
b. Application like email software(yahho gmail, rediffmail etc.) 
c. Sites for social network likes facebook, orkut.

Characteristics of SaaS
· Web access using commercial software.
· Software is managed from a central location.
· Software delivered in a one too many model.

Naas (Network-as-a-service)

Naas is used to proved network model to access the data using internet . and in there we create virtually network and pay using data subscription.
Example- network fire walls security .

Characteristics of NaaS
· Operation benefits for centralized.
· Optimal flexibility in capacity control.
· On-demand network resource usage procedure

Idaas (identity as service )

IdaaS is an authentication infrastructure that managed the identity of web server data and its also used by third party.
Characteristics of IdaaS
· Directory Services.
· Federated Services.
· Identity verification and Profile management. 

 

Iaas

Paas

Saas

Naas

Idaas

Infrastructure

as a Service

Platform as

a Service

Software as

a Service

Network as

a Service

identity as

a Service

Infrastructure

as an asset

License

Purchasing

Software

as an asset

network

as an asset

identity

as an asset

platform

Independent.

Consume

cloud

Infrastructure.

maintain

cloud

components

simple flow

level simulations

single sign-on services

Grid computing

Solution stack

Thin client.

High-level networking

model

 Impact of the global server

Avoid capital

on hardware

and human

resources

Streamlined

version

deployment

Avoid capital on

software and

development

resources

Scalability and multi-tenant isolation

Risk and Event monitoring

 

Search Aptipedia