Quantum Algorithms Via Linear Algebra: a Primer / Richard J
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
An Introduction Quantum Computing
An Introduction to Quantum Computing Michal Charemza University of Warwick March 2005 Acknowledgments Special thanks are given to Steve Flammia and Bryan Eastin, authors of the LATEX package, Qcircuit, used to draw all the quantum circuits in this document. This package is available online at http://info.phys.unm.edu/Qcircuit/. Also thanks are given to Mika Hirvensalo, author of [11], who took the time to respond to some questions. 1 Contents 1 Introduction 4 2 Quantum States 6 2.1 CompoundStates........................... 8 2.2 Observation.............................. 9 2.3 Entanglement............................. 11 2.4 RepresentingGroups . 11 3 Operations on Quantum States 13 3.1 TimeEvolution............................ 13 3.2 UnaryQuantumGates. 14 3.3 BinaryQuantumGates . 15 3.4 QuantumCircuits .......................... 17 4 Boolean Circuits 19 4.1 BooleanCircuits ........................... 19 5 Superdense Coding 24 6 Quantum Teleportation 26 7 Quantum Fourier Transform 29 7.1 DiscreteFourierTransform . 29 7.1.1 CharactersofFiniteAbelianGroups . 29 7.1.2 DiscreteFourierTransform . 30 7.2 QuantumFourierTransform. 32 m 7.2.1 Quantum Fourier Transform in F2 ............. 33 7.2.2 Quantum Fourier Transform in Zn ............. 35 8 Random Numbers 38 9 Factoring 39 9.1 OneWayFunctions.......................... 39 9.2 FactorsfromOrder.......................... 40 9.3 Shor’sAlgorithm ........................... 42 2 CONTENTS 3 10 Searching 46 10.1 BlackboxFunctions. 46 10.2 HowNotToSearch.......................... 47 10.3 Single Query Without (Grover’s) Amplification . ... 48 10.4 AmplitudeAmplification. 50 10.4.1 SingleQuery,SingleSolution . 52 10.4.2 KnownNumberofSolutions. 53 10.4.3 UnknownNumberofSolutions . 55 11 Conclusion 57 Bibliography 59 Chapter 1 Introduction The classical computer was originally a largely theoretical concept usually at- tributed to Alan Turing, called the Turing Machine. -
How to Morph Graphs on the Torus
How to Morph Graphs on the Torus Erin Wolf Chambers† Jeff Erickson‡ Patrick Lin‡ Salman Parsa† Abstract first algorithm to morph graphs on any higher-genus surface. In fact, it is the first algorithm to compute We present the first algorithm to morph graphs on the torus. any form of isotopy between surface graphs; existing Given two isotopic essentially 3-connected embeddings of the algorithms to test whether two graphs on the same surface same graph on the Euclidean flat torus, where the edges in both are isotopic are non-constructive 29 . Our algorithm drawings are geodesics, our algorithm computes a continuous [ ] outputs a morph consisting of O n steps; within each step, deformation from one drawing to the other, such that all edges ( ) all vertices move along parallel geodesics at (different) are geodesics at all times. Previously even the existence of constant speeds, and all edges remain geodesics (“straight such a morph was not known. Our algorithm runs in O n1+!=2 ( ) line segments”). Our algorithm runs in O n1+!=2 time; the time, where ! is the matrix multiplication exponent, and the ( ) running time is dominated by repeatedly solving a linear computed morph consists of O n parallel linear morphing steps. ( ) system encoding a natural generalization of Tutte’s spring Existing techniques for morphing planar straight-line graphs do embedding theorem. not immediately generalize to graphs on the torus; in particular, Cairns’ original 1944 proof and its more recent improvements rely on the fact that every planar graph contains a vertex of degree 1.1 Prior Results (and Why They Don’t Generalize). -
1 Introduction and Terminology
A Survey of Solved Problems and Applications on Bandwidth, Edgesum and Pro le of Graphs Yung-Ling Lai National Chiayi Teacher College Chiayi, Taiwan, R.O.C. Kenneth Williams Western Michigan University Abstract This pap er provides a survey of results on the exact bandwidth, edge- sum, and pro le of graphs. A bibliographyof work in these areas is pro- vided. The emphasis is on comp osite graphs. This may be regarded as an up date of the original survey of solved bandwidth problems by Chinn, Chvatalova, Dewdney, and Gibbs[10] in 1982. Also several of the applica- tion areas involving these graph parameters are describ ed. 1 Intro duction and terminology For a graph G, V (G) denotes the set of vertices of G and E (G) denotes the set of edges of G. Let G = (V; E ) be a graph on n vertices. A 1-1 mapping f : V ! f1; 2;:::;ng is called a proper numbering of G. The bandwidth B (G) of aproper f numbering f of G is the number B (G)= maxfjf (u) f (v )j : uv 2 E g; f and the bandwidth B(G) of G is the number B (G)= minfB (G): f is a prop er numb ering of Gg: f A prop er numb ering f is called a bandwidth numbering of G if B (G)=B (G). f For example, Figure 1 shows bandwidth numb erings for the graphs P ;C ;K 4 5 1;4 and K . In general, B (P ) = 1, B (C ) = 2, B (K ) = dn=2e and B (K ) = 2;3 n n 1;n m;n m + dn=2e1form n. -
An Introduction to Operad Theory
AN INTRODUCTION TO OPERAD THEORY SAIMA SAMCHUCK-SCHNARCH Abstract. We give an introduction to category theory and operad theory aimed at the undergraduate level. We first explore operads in the category of sets, and then generalize to other familiar categories. Finally, we develop tools to construct operads via generators and relations, and provide several examples of operads in various categories. Throughout, we highlight the ways in which operads can be seen to encode the properties of algebraic structures across different categories. Contents 1. Introduction1 2. Preliminary Definitions2 2.1. Algebraic Structures2 2.2. Category Theory4 3. Operads in the Category of Sets 12 3.1. Basic Definitions 13 3.2. Tree Diagram Visualizations 14 3.3. Morphisms and Algebras over Operads of Sets 17 4. General Operads 22 4.1. Basic Definitions 22 4.2. Morphisms and Algebras over General Operads 27 5. Operads via Generators and Relations 33 5.1. Quotient Operads and Free Operads 33 5.2. More Examples of Operads 38 5.3. Coloured Operads 43 References 44 1. Introduction Sets equipped with operations are ubiquitous in mathematics, and many familiar operati- ons share key properties. For instance, the addition of real numbers, composition of functions, and concatenation of strings are all associative operations with an identity element. In other words, all three are examples of monoids. Rather than working with particular examples of sets and operations directly, it is often more convenient to abstract out their common pro- perties and work with algebraic structures instead. For instance, one can prove that in any monoid, arbitrarily long products x1x2 ··· xn have an unambiguous value, and thus brackets 2010 Mathematics Subject Classification. -
Introductory Topics in Quantum Paradigm
Introductory Topics in Quantum Paradigm Subhamoy Maitra Indian Statistical Institute [[email protected]] 21 May, 2016 Subhamoy Maitra Quantum Information Outline of the talk Preliminaries of Quantum Paradigm What is a Qubit? Entanglement Quantum Gates No Cloning Indistinguishability of quantum states Details of BB84 Quantum Key Distribution Algorithm Description Eavesdropping State of the art: News and Industries Walsh Transform in Deutsch-Jozsa (DJ) Algorithm Deutsch-Jozsa Algorithm Walsh Transform Relating the above two Some implications Subhamoy Maitra Quantum Information Qubit and Measurement A qubit: αj0i + βj1i; 2 2 α; β 2 C, jαj + jβj = 1. Measurement in fj0i; j1ig basis: we will get j0i with probability jαj2, j1i with probability jβj2. The original state gets destroyed. Example: 1 + i 1 j0i + p j1i: 2 2 After measurement: we will get 1 j0i with probability 2 , 1 j1i with probability 2 . Subhamoy Maitra Quantum Information Basic Algebra Basic algebra: (α1j0i + β1j1i) ⊗ (α2j0i + β2j1i) = α1α2j00i + α1β2j01i + β1α2j10i + β1β2j11i, can be seen as tensor product. Any 2-qubit state may not be decomposed as above. Consider the state γ1j00i + γ2j11i with γ1 6= 0; γ2 6= 0. This cannot be written as (α1j0i + β1j1i) ⊗ (α2j0i + β2j1i). This is called entanglement. Known as Bell states or EPR pairs. An example of maximally entangled state is j00i + j11i p : 2 Subhamoy Maitra Quantum Information Quantum Gates n inputs, n outputs. Can be seen as 2n × 2n unitary matrices where the elements are complex numbers. Single input single output quantum gates. Quantum input Quantum gate Quantum Output αj0i + βj1i X βj0i + αj1i αj0i + βj1i Z αj0i − βj1i j0i+j1i j0i−|1i αj0i + βj1i H α p + β p 2 2 Subhamoy Maitra Quantum Information Quantum Gates (contd.) 1 input, 1 output. -
A Gentle Introduction to Quantum Computing Algorithms With
A Gentle Introduction to Quantum Computing Algorithms with Applications to Universal Prediction Elliot Catt1 Marcus Hutter1,2 1Australian National University, 2Deepmind {elliot.carpentercatt,marcus.hutter}@anu.edu.au May 8, 2020 Abstract In this technical report we give an elementary introduction to Quantum Computing for non- physicists. In this introduction we describe in detail some of the foundational Quantum Algorithms including: the Deutsch-Jozsa Algorithm, Shor’s Algorithm, Grocer Search, and Quantum Count- ing Algorithm and briefly the Harrow-Lloyd Algorithm. Additionally we give an introduction to Solomonoff Induction, a theoretically optimal method for prediction. We then attempt to use Quan- tum computing to find better algorithms for the approximation of Solomonoff Induction. This is done by using techniques from other Quantum computing algorithms to achieve a speedup in com- puting the speed prior, which is an approximation of Solomonoff’s prior, a key part of Solomonoff Induction. The major limiting factors are that the probabilities being computed are often so small that without a sufficient (often large) amount of trials, the error may be larger than the result. If a substantial speedup in the computation of an approximation of Solomonoff Induction can be achieved through quantum computing, then this can be applied to the field of intelligent agents as a key part of an approximation of the agent AIXI. arXiv:2005.03137v1 [quant-ph] 29 Apr 2020 1 Contents 1 Introduction 3 2 Preliminaries 4 2.1 Probability ......................................... 4 2.2 Computability ....................................... 5 2.3 ComplexityTheory................................... .. 7 3 Quantum Computing 8 3.1 Introduction...................................... ... 8 3.2 QuantumTuringMachines .............................. .. 9 3.2.1 Church-TuringThesis .............................. -
Parallelization of Reordering Algorithms for Bandwidth and Wavefront Reduction
Parallelization of Reordering Algorithms for Bandwidth and Wavefront Reduction Konstantinos I. Karantasis∗, Andrew Lenharthy, Donald Nguyenz, Mar´ıa J. Garzaran´ ∗, Keshav Pingaliy,z ∗Department of Computer Science, yInstitute for Computational Engineering and Sciences and University of Illinois at Urbana-Champaign zDepartment of Computer Science, fkik, [email protected] University of Texas at Austin [email protected], fddn, [email protected] Abstract—Many sparse matrix computations can be speeded More recently, reordering has become popular even in the up if the matrix is first reordered. Reordering was originally context of iterative sparse solvers where problems like mini- developed for direct methods but it has recently become popular mizing fill do not arise. The key computation in an iterative for improving the cache locality of parallel iterative solvers since reordering the matrix to reduce bandwidth and wavefront sparse solver is sparse matrix-vector multiplication (SpMV) can improve the locality of reference of sparse matrix-vector (say y = Ax). If the matrix is stored in compressed row- multiplication (SpMV), the key kernel in iterative solvers. storage (CRS) and the SpMV computation is performed by In this paper, we present the first parallel implementations of rows, the accesses to y and A enjoy excellent locality, but the two widely used reordering algorithms: Reverse Cuthill-McKee accesses to x may not. One way to improve the locality of (RCM) and Sloan. On 16 cores of the Stampede supercomputer, accesses to the elements of x is to reorder the sparse matrix our parallel RCM is 5.56 times faster on the average than a state-of-the-art sequential implementation of RCM in the HSL A using a bandwidth-reducing ordering (RCM is popular). -
Final Exam Outline 1.1, 1.2 Scalars and Vectors in R N. the Magnitude
Final Exam Outline 1.1, 1.2 Scalars and vectors in Rn. The magnitude of a vector. Row and column vectors. Vector addition. Scalar multiplication. The zero vector. Vector subtraction. Distance in Rn. Unit vectors. Linear combinations. The dot product. The angle between two vectors. Orthogonality. The CBS and triangle inequalities. Theorem 1.5. 2.1, 2.2 Systems of linear equations. Consistent and inconsistent systems. The coefficient and augmented matrices. Elementary row operations. The echelon form of a matrix. Gaussian elimination. Equivalent matrices. The reduced row echelon form. Gauss-Jordan elimination. Leading and free variables. The rank of a matrix. The rank theorem. Homogeneous systems. Theorem 2.2. 2.3 The span of a set of vectors. Linear dependence. Linear dependence and independence. Determining n whether a set {~v1, . ,~vk} of vectors in R is linearly dependent or independent. 3.1, 3.2 Matrix operations. Scalar multiplication, matrix addition, matrix multiplication. The zero and identity matrices. Partitioned matrices. The outer product form. The standard unit vectors. The transpose of a matrix. A system of linear equations in matrix form. Algebraic properties of the transpose. 3.3 The inverse of a matrix. Invertible (nonsingular) matrices. The uniqueness of the solution to Ax = b when A is invertible. The inverse of a nonsingular 2 × 2 matrix. Elementary matrices and EROs. Equivalent conditions for invertibility. Using Gauss-Jordan elimination to invert a nonsingular matrix. Theorems 3.7, 3.9. n n n 3.5 Subspaces of R . {0} and R as subspaces of R . The subspace span(v1,..., vk). The the row, column and null spaces of a matrix. -
Encryption of Binary and Non-Binary Data Using Chained Hadamard Transforms
Encryption of Binary and Non-Binary Data Using Chained Hadamard Transforms Rohith Singi Reddy Computer Science Department Oklahoma State University, Stillwater, OK 74078 ABSTRACT This paper presents a new chaining technique for the use of Hadamard transforms for encryption of both binary and non-binary data. The lengths of the input and output sequence need not be identical. The method may be used also for hashing. INTRODUCTION The Hadamard transform is an example of generalized class of Fourier transforms [4], and it may be defined either recursively, or by using binary representation. Its symmetric form lends itself to applications ranging across many technical fields such as data encryption [1], signal processing [2], data compression algorithms [3], randomness measures [6], and so on. Here we consider an application of the Hadamard matrix to non-binary numbers. To do so, Hadamard transform is generalized such that all the values in the matrix are non negative. Each negative number is replaced with corresponding modulo number; for example while performing modulo 7 operations -1 is replaced with 6 to make the matrix non-binary. Only prime modulo operations are performed because non prime numbers can be divisible with numbers other than 1 and itself. The use of modulo operation along with generalized Hadamard matrix limits the output range and decreases computation complexity. In the method proposed in this paper, the input sequence is split into certain group of bits such that each group bit count is a prime number. As we are dealing with non-binary numbers, for each group of binary bits their corresponding decimal value is calculated. -
Dominant Strategies of Quantum Games on Quantum Periodic Automata
Computation 2015, 3, 586-599; doi:10.3390/computation3040586 OPEN ACCESS computation ISSN 2079-3197 www.mdpi.com/journal/computation Article Dominant Strategies of Quantum Games on Quantum Periodic Automata Konstantinos Giannakis y;*, Christos Papalitsas y, Kalliopi Kastampolidou y, Alexandros Singh y and Theodore Andronikos y Department of Informatics, Ionian University, 7 Tsirigoti Square, Corfu 49100, Greece; E-Mails: [email protected] (C.P.); [email protected] (K.K.); [email protected] (A.S.); [email protected] (T.A.) y These authors contributed equally to this work. * Author to whom correspondence should be addressed; E-Mail: [email protected]; Tel.: +30-266-108-7712. Academic Editor: Demos T. Tsahalis Received: 29 August 2015 / Accepted: 16 November 2015 / Published: 20 November 2015 Abstract: Game theory and its quantum extension apply in numerous fields that affect people’s social, political, and economical life. Physical limits imposed by the current technology used in computing architectures (e.g., circuit size) give rise to the need for novel mechanisms, such as quantum inspired computation. Elements from quantum computation and mechanics combined with game-theoretic aspects of computing could open new pathways towards the future technological era. This paper associates dominant strategies of repeated quantum games with quantum automata that recognize infinite periodic inputs. As a reference, we used the PQ-PENNY quantum game where the quantum strategy outplays the choice of pure or mixed strategy with probability 1 and therefore the associated quantum automaton accepts with probability 1. We also propose a novel game played on the evolution of an automaton, where players’ actions and strategies are also associated with periodic quantum automata. -
Binary Integer Programming and Its Use for Envelope Determination
Binary Integer Programming and its Use for Envelope Determination By Vladimir Y. Lunin1,2, Alexandre Urzhumtsev3,† & Alexander Bockmayr2 1 Institute of Mathematical Problems of Biology, Russian Academy of Sciences, Pushchino, Moscow Region, 140292 Russia 2 LORIA, UMR 7503, Faculté des Sciences, Université Henri Poincaré, Nancy I, 54506 Vandoeuvre-les-Nancy, France; [email protected] 3 LCM3B, UMR 7036 CNRS, Faculté des Sciences, Université Henri Poincaré, Nancy I, 54506 Vandoeuvre-les-Nancy, France; [email protected] † to whom correspondence must be sent Abstract The density values are linked to the observed magnitudes and unknown phases by a system of non-linear equations. When the object of search is a binary envelope rather than a continuous function of the electron density distribution, these equations can be replaced by a system of linear inequalities with respect to binary unknowns and powerful tools of integer linear programming may be applied to solve the phase problem. This novel approach was tested with calculated and experimental data for a known protein structure. 1. Introduction Binary Integer Programming (BIP in what follows) is an approach to solve a system of linear inequalities in binary unknowns (0 or 1 in what follows). Integer programming has been studied in mathematics, computer science, and operations research for more than 40 years (see for example Johnson et al., 2000 and Bockmayr & Kasper, 1998, for a review). It has been successfully applied to solve a huge number of large-scale combinatorial problems. The general form of an integer linear programming problem is max { cTx | Ax ≤ b, x ∈ Zn } (1.1) with a real matrix A of a dimension m by n, and vectors c ∈ Rn, b ∈ Rm, cTx being the scalar product of the vectors c and x. -
Planar Diameter Via Metric Compression
Planar Diameter via Metric Compression Jason Li Merav Parter CMU Weizmann Institute [email protected] [email protected] Abstract We develop a new approach for distributed distance computation in planar graphs that is based on a variant of the metric compression problem recently introduced by Abboud et al. [SODA’18]. In our variant of the Planar Graph Metric Compression Problem, one is given an n-vertex planar graph G = (V, E), a set of S ⊆ V source terminals lying on a single face, and a subset of target terminals T ⊆ V. The goal is to compactly encode the S × T distances. One of our key technical contributions is in providing a compression scheme that encodes all S × T distances using Oe(jSj · poly(D) + jTj) bits1, for unweighted graphs with diameter D. This significantly improves the state of the art of Oe(jSj · 2D + jTj · D) bits. We also con- sider an approximate version of the problem for weighted graphs, where the goal is to encode (1 + e) approximation of the S × T distances, for a given input parameter e 2 (0, 1]. Here, our compression scheme uses Oe(poly(jSj/e) + jTj) bits. In addition, we describe how these compression schemes can be computed in near-linear time. At the heart of this compact com- pression scheme lies a VC-dimension type argument on planar graphs, using the well-known Sauer’s lemma. This efficient compression scheme leads to several improvements and simplifications in the setting of diameter computation, most notably in the distributed setting: • There is an Oe(D5)-round randomized distributed algorithm for computing the diameter in planar graphs, w.h.p.