The Quantum Leap Into Computing and Communication a Chinese Perspective

Total Page:16

File Type:pdf, Size:1020Kb

The Quantum Leap Into Computing and Communication a Chinese Perspective Princeton University professor has found way to alter property of lone electron without disturbing trillions of electrons in its immediate surroundings, an important step toward developing future types of quantum computers (Courtesy Princeton University/Brian Wilson) The Quantum Leap into Computing and Communication A Chinese Perspective By Cindy Hurst A nation’s success in military operations often rises and falls on the basis of how well it communicates. When a nation does not secure its communications effectively, its enemies intercept and read its communications and win thereby military and diplomatic advantages.1 ice Admiral Noel Gayler, former ant in wartime.”2 For a few decades, director of the National Security nations have been relying on encryption Agency, once wrote, “Important systems to protect a wide variety of Lieutenant Commander Cindy Hurst, USNR, is V an Analyst with the U.S. Army’s Foreign Military as it is in peacetime, communications computerized transmissions ranging Studies Office. security becomes even more import- from commerce to government to mil- 44 Forum / The Quantum Leap into Computing JFQ 77, 2nd Quarter 2015 itary communications. While today’s data, a quantum computer would use than developing a quantum computer, encryption systems are considered quantum bits (qubits), which can si- although the latter is still “very attractive reasonably secure, the possibilities of multaneously have the value of 0, 1, or to me.”8 If Pan really did shift his focus, it quantum cryptography and quantum any “superposition” of the two.4 The could be that the reality of the challenges computing offer a whole new dimen- quantum phenomenon becomes even involved with building a quantum com- sion and threat to computerized more bizarre when considering the con- puter had indeed set in. secrecy. cept of “entanglement.” Entanglement Dr. Ivan Deutsch, professor and China is among a growing number of links the properties of two or more Regents’ Lecturer at the University of countries seeking to unlock the science of qubits together. These qubits, even when New Mexico, explained the difficulty quantum cryptography and computing, separated, remain strongly correlated or in achieving a quantum computer. In which many experts believe will one day interconnected in a manner much stron- quantum cryptography, which is ex- revolutionize computerized security. ger than any classical relationship. This plained more in depth below, the goal With China’s ongoing push to modernize is what famed physicist Albert Einstein is to distribute two shared secret keys. its military and advancing to become a called “spooky action at a distance.” Basically, the secret keys are created using global innovative force, success in this A quantum computer using entangled the properties of quantum randomness. area could materialize into an enormous qubits would therefore be vastly faster It works on a particle-by-particle basis. In economic and military advantage. than the average computer, which uses other words, in quantum encryption one This article examines the significance simple binary numbers. Theoretically, photon can be sent at a time. It is simple of these technologies, China’s progress in once a quantum computer comes online, to control a single particle. Quantum quantum communication and quantum it would be able to break current en- computing, on the other hand, is much computing, and the consequences for the cryption systems such as Rivest, Shamir, more complex because it deals with United States and other nations should and Adleman (RSA), a commonly used computation as opposed to the transmis- the Middle Kingdom acquire a real capa- computer encryption and authentication sion of single photons. Computations bility in this science. It is an area that U.S. system that uses a complex algorithm require logic, and logic requires the use analysts will need to follow closely in the developed in 1977 by Ron Rivest, Adi of many 1s and 0s that cannot be sent coming months and years. Shamir, and Leonard Adleman. These individually since each one is interdepen- encryption systems are needed to protect dent. Furthermore, each qubit needs to China’s Leap information such as financial transac- be in an entangled state simultaneously. The world is currently in the midst of a tions as well as military and government Due to this added degree of complexity, second quantum revolution.3 The first communications. quantum computing is much further quantum revolution began in 1900 In 2001, Guo Guangcan, an academi- away from realization than quantum when the new rules governing physical cian of the Chinese Academy of Sciences, cryptography.9 science were discovered. Today, in the established the Key Laboratory of Despite this apparent shift in interest second quantum revolution, these rules Quantum Information at the University from quantum computing to quantum are being used to develop new revolu- of Science and Technology of China cryptography, in February 2013, a tionary technologies. Two such possible (USTC) in Hefei. The laboratory became Chinese report emerged touting a break- technologies are quantum computing “the most important research center of through in trying to achieve the quantum and quantum cryptography, the latter quantum information in the country.”5 computer: “The solid-state quantum falling within the area of quantum In January 2006, while the field of research crew from the University of communications. While they each rely quantum technology was still considered Science and Technology of China suc- on the properties of quantum physics, in its infancy in China, Guo predicted ceeded in performing the quantum logic their end goals differ. Theoretically, that the first quantum computer would gate operation on one single electron at a quantum computer would be able likely be developed in the next 15 to 20 10 picoseconds, renewing the previous to break current encryption systems, years.6 In 2007, Dr. Pan Jianwei, director world records by nearly 100 times.”10 but quantum cryptography is argu- of the Division of Quantum Physics Prior to China’s achievement, “U.S. and ably unbreakable even by a quantum and Quantum Information at Hefei’s Japanese research institutes achieved the computer. National Laboratory for Physical Sciences electrically controlled semiconductor The Quantum Computer: Code at the Microscale, USTC, optimistically logic gate at 1,000 picoseconds.”11 Breaker or Problem Solver? The idea of predicted that the country might be the China’s achievement, however, increased creating a quantum computer has been first to develop a quantum computer.7 the operational speed by nearly 100 times around since the 1970s. These comput- More recently, however, Pan seems to to 10 picoseconds. According to Guo ers would be extremely powerful since have shifted his focus. A 2010 article Guoping, director of the research project: they can harness quantum properties. quoted him as saying that quantum com- Unlike an ordinary computer, which uses munication is “more important for China China has launched the solid-state binary numbers (1s or 0s) to represent because it is already closer to application” quantum chip project in efforts to gain a JFQ 77, 2nd Quarter 2015 Hurst 45 foothold in the global competition in the cryptography is a relatively new field in stability in quantum cryptography sys- next-generation computer chips. The which research is conducted on pub- tems.”15 These results are questionable, quantum chip . will make the quantum lic-key encryption systems, which are not but not impossible. According to Carl computer characterized by exponentially breakable using quantum computers. Williams, “If I wait long enough and my increased operational speed and greatly Quantum cryptography (distinct from fiber is perfectly dark and still, I can prob- improved data processing capabilities.12 post-quantum cryptography) offers an- ably get a photon through at a longer other way to try to counter the risks of a distance than 50 kilometers.” The ability to break current en- quantum computer coming online. This In a November 2005 article, China cryption systems makes modern day newest form of cryptography is based claimed to lead the United States, France, information vulnerable. Furthermore, an on quantum theory and is proving to be and Austria in quantum entanglement inherent risk to national security should unbreakable. research when it provided an “experi- a quantum computer come online would Quantum key distribution (QKD), mental demonstration of five-photon be its ability to access archived informa- a process within the context of quan- entanglement and open-destination tele- tion previously protected by systems such tum cryptography, generates a random portation.”16 The more photons that can as today’s RSA encryption. Dr. Jonathan encryption key shared by the sender be successfully entangled, the higher the Dowling, a professor and Hearne Chair and recipient. The biggest advantage of accuracy of the transmission.17 of Theoretical Physics at Louisiana State QKD is that if a third party attempts to In 2006, China reported having University, explained that information en- intercept it, the party will be detected fulfilled quantum teleportation of a crypted using RSA could be intercepted and the secret message will not be sent. two-particle system. Voting results at the and archived today in its encrypted for- QKD deals with photon states and works Chinese Academy of Sciences showed mat. Once a quantum computer is online, as follows: Alice, Bob, and Eve are three that 565 academics chose it as the ninth it could be used to break older archived fictional characters. In quantum cryp- most significant development that year in encrypted data, possibly still classified.13 tography, Alice wants to send a secret the country’s science-technology sector.18 Carl Williams, chief of the Quantum message to Bob. She has to first send In 2007, a report stated that China Measurement Division of the National him the key through the process known had created a quantum router, which Institute of Standards and Technology, as QKD.
Recommended publications
  • Does the Family Cap Influence Birthrates? Two New Studies Say 'No'
    Issues & Implications Cash Increase No ‘Incentive’ The New Jersey and the Arkansas Does the Family Cap studies raise serious questions about the validity of family cap propo- Influence Birthrates? nents’ primary rationale for the policy—the notion that an increase Two New Studies Say ‘No’ in monthly benefits upon the birth of a new baby acts as an incentive By Patricia Donovan for welfare recipients to have more children. When the Arkansas Contrary to early claims that a cap on when the researchers controlled for researchers asked a subsample of benefits would reduce birthrates the age and race of the nearly 8,500 the women studied whether they among welfare recipients, recent stud- women studied. would have another child in order to ies in New Jersey and Arkansas con- receive higher benefits, fully 100% of clude that denying an increase in The researchers also examined state those subject to the cap and more cash assistance to women who have Medicaid data to assess whether the than 95% of those in the control another child while on welfare has family cap had any impact on abor- group said they would not. Many did had no effect on births in these states. tion rates among women on welfare. not know how much more money Some antiabortion advocates have they would receive if they had In response to the findings, New feared that a cap could result in more another child. Jersey officials now insist that the abortions among welfare recipients, family cap was never intended to but the analysis indicates otherwise. “It appears that women do not make reduce births, but simply to encour- Like birthrates, abortion rates in New decisions about the birth of their age welfare recipients to make Jersey declined both among women children based on the addition of responsible decisions about child- subject to the cap and among the $42 per month in…benefits,” the bearing.
    [Show full text]
  • QUANTUM HEGEMONY? China’S Ambitions and the Challenge to U.S
    QUANTUM HEGEMONY? China’s Ambitions and the Challenge to U.S. Innovation Leadership Elsa B. Kania & John K. Costello About the Author Objectives and Methodology This report draws upon an extensive review of the available open-source Chinese language resources relevant to ELSA B. KANIA is an Adjunct Fellow understanding Chinese advances in quantum science and with the Technology and National technology. These include, but are not limited to, media Security Program at the Center for a New reporting, official plans and policies, academic articles, American Security (CNAS). She focuses on technical publications, and other online resources. There is Chinese defense innovation in emerging a full listing of references included, but certain sources are technologies in support of the Artificial only available upon request. While not fully comprehensive, Intelligence and Global Security Initiative this initial analysis seeks to establish a baseline at CNAS, while also acting as a member of the research understanding of these issues and to raise questions for team for the new Task Force on Artificial Intelligence and future research, while proposing an initial series of policy National Security. Her research interests include Chinese considerations and recommendations. The authors welcome military modernization, information warfare, and defense any questions and comments on the paper. science and technology. Kania is an independent analyst, consultant, and co-founder of the China Cyber and Intelligence Studies Institute. She also was a 2018 Fulbright Acknowledgments Specialist and is a Non-Resident Fellow with the Australian The authors are very grateful to Paul Scharre, Patrick Cronin, Strategic Policy Institute’s International Cyber Policy Loren DeJonge Schulman, Adam Klein, and the rest of the Centre.
    [Show full text]
  • Richard C. Brower, Boston University with Many Slides from Kate Clark, NVIDIA
    Past and Future of QCD on GPUs Richard C. Brower, Boston University with many slides from Kate Clark, NVIDIA High Performance Computing in High Energy Physics CCNU Wahan China, Sept 19, 2018 Optimize the Intersection Application: QCD Algorithms: Architecture: AMG GPU Question to address • How do we put Quantum Field on the computer? • How to Maximize Flops/$, bandwidth/$ at Min Energy? • How to implement fastest algorithms: Dirac Sovlers, Sympletic Integrators, etc ? Standard Lattice QCD Formulation i d3xdt[ F 2 + (@ iA + m) ] Path Integral = 2A(x) (x) e− g2 µ⌫ µ µ − µ D Z R 1.Complex time for probability it x ! 4 iaAµ 2. Lattice Finite Differences (@µ iAµ) (x) ( x+ˆµ e x)/a − ! − d d e xDxy(A) y Det[D] 3. Fermionic integral − ! Z Det[D] dφdφ e φx[1/D]xyφy 4.Bosonic (pseudo- Fermions) ! − Z ij 1 γµ Lattice Dirac (x) − U ab(x) (x +ˆµ) ia 2 µ jb Color Dimension: a = 1,2,3 μ=1,2,…,d Spin i = 1,2,3,4 x x+ ➔ µ axis 2 x SU(3) Gauge Links ab ab iAµ (x) Uµ (x)=e x1 axis ➔ Quarks Propagation on Hypercubic Lattice* • Dominate Linear Algebra : Matrix solver for Dirac operator. • Gauge Evolution: In the semi-implicit quark Hamiltonian evolution in Monte vacuum Carlo time. u,d,s, proto u, • Analysis: proto d * Others: SUSY(Catteral et al), Random Lattices(Christ et al), Smiplicial Sphere (Brower et al) Byte/flop in Dirac Solver is main bottleneck • Bandwidth to memory rather than raw floating point throughput. • Wilson Dirac/DW operator (single prec) : 1440 bytes per 1320 flops.
    [Show full text]
  • American Leadership in Quantum Technology Joint Hearing
    AMERICAN LEADERSHIP IN QUANTUM TECHNOLOGY JOINT HEARING BEFORE THE SUBCOMMITTEE ON RESEARCH AND TECHNOLOGY & SUBCOMMITTEE ON ENERGY COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HOUSE OF REPRESENTATIVES ONE HUNDRED FIFTEENTH CONGRESS FIRST SESSION OCTOBER 24, 2017 Serial No. 115–32 Printed for the use of the Committee on Science, Space, and Technology ( Available via the World Wide Web: http://science.house.gov U.S. GOVERNMENT PUBLISHING OFFICE 27–671PDF WASHINGTON : 2018 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HON. LAMAR S. SMITH, Texas, Chair FRANK D. LUCAS, Oklahoma EDDIE BERNICE JOHNSON, Texas DANA ROHRABACHER, California ZOE LOFGREN, California MO BROOKS, Alabama DANIEL LIPINSKI, Illinois RANDY HULTGREN, Illinois SUZANNE BONAMICI, Oregon BILL POSEY, Florida ALAN GRAYSON, Florida THOMAS MASSIE, Kentucky AMI BERA, California JIM BRIDENSTINE, Oklahoma ELIZABETH H. ESTY, Connecticut RANDY K. WEBER, Texas MARC A. VEASEY, Texas STEPHEN KNIGHT, California DONALD S. BEYER, JR., Virginia BRIAN BABIN, Texas JACKY ROSEN, Nevada BARBARA COMSTOCK, Virginia JERRY MCNERNEY, California BARRY LOUDERMILK, Georgia ED PERLMUTTER, Colorado RALPH LEE ABRAHAM, Louisiana PAUL TONKO, New York DRAIN LAHOOD, Illinois BILL FOSTER, Illinois DANIEL WEBSTER, Florida MARK TAKANO, California JIM BANKS, Indiana COLLEEN HANABUSA, Hawaii ANDY BIGGS, Arizona CHARLIE CRIST, Florida ROGER W. MARSHALL, Kansas NEAL P. DUNN, Florida CLAY HIGGINS, Louisiana RALPH NORMAN, South Carolina SUBCOMMITTEE ON RESEARCH AND TECHNOLOGY HON. BARBARA COMSTOCK, Virginia, Chair FRANK D. LUCAS, Oklahoma DANIEL LIPINSKI, Illinois RANDY HULTGREN, Illinois ELIZABETH H.
    [Show full text]
  • Jane Alexandria Smith
    [email protected] Bellandra B. Foster, Ph.D., P.E. Phone: 336.355.7897 QUALIFICATIONS SUMMARY Years of Experience Licensed professional engineer and program manager with extensive civil and 31 construction engineering experience. Manager and administrator of numerous projects within public agencies and private industry and as Founder and President of an engineering corporation. Professional Registrations EDUCATION Licensed Professional Engineer: Doctor of Philosophy, Civil Engineering State of Georgia Michigan State University – December 1999 State of Illinois Traffic and Transportation Engineering Seminar State of Michigan Northwestern University – June 1999 State of No. Carolina Certification - Transportation Systems (ITS) State of Ohio University of Michigan - September 1992 Master of Science Degree, Civil Engineering Professional Wayne State University – May 1989 Certifications Bachelor of Science Degree, Civil Engineering U.S. Small Business Michigan State University – August 1983 Administration Emerging 200 (E200) CIVIL AND CONSTRUCTION ENGINEERING EXPERIENCE Class of 2011 BBFoster Consulting, P.C. (8/2014-Present) President– BBFoster Consulting, PC provides civil engineering, program management, Level 1 Erosion and Sedimentation Control coaching, contract administration, utility coordination and compliance assistance. Inspector BBF ENGINEERING SERVICES, P.C. (4/94-12/2014) President and Principal Engineer – Founder and Owner of BBF Engineering Services, Professional P.C. The company provided civil engineering, project
    [Show full text]
  • Leading in a Complex World
    LEADING IN A COMPLEX WORLD CHANCELLOR WILLIAM H. MCRAVEN’S VISION AND FOR THE UNIVERSITY OF TEXAS SYSTEM PRESENTED TO THE BOARD OF REGENTS, NOVEMBER 2015 BOARD OF REGENTS Paul L. Foster, Chairman R. Steven Hicks, Vice Chairman Jeffery D. Hildebrand, Vice Chairman Regent Ernest Aliseda Regent David J. Beck Regent Alex M. Cranberg Regent Wallace L. Hall, Jr. Regent Brenda Pejovich Regent Sara Martinez Tucker Student Regent Justin A. Drake GENERAL COUNSEL TO THE BOARD OF REGENTS Francie A. Frederick As of November 2015 Chancellor’s Vision TABLE OF CONTENTS 02 Letter from Chairman Paul L. Foster 04 Letter from Chancellor William H. McRaven 05 Introduction 07 UT System’s Mission Statement 09 Operating Concept 11 Agile Decision Process 13 Strategic Assessment 17 Framework for Advancing Excellence 19 Team of Teams 23 Quantum Leap: The Texas Prospect Initiative 25 Quantum Leap: The American Leadership Program 27 Quantum Leap: Win the Talent War 29 Quantum Leap: Enhancing Fairness & Opportunity 31 Quantum Leap: The UT Health Care Enterprise 33 Quantum Leap: Leading the Brain Health Revolution 35 Quantum Leap: The UT Network for National Security 37 Quantum Leap: UT System Expansion in Houston 39 Conclusion & Ethos Office of the BOARD OF REGENTS During my time as a UT System Regent, and most recently as chairman of the board, I have witnessed many great moments in the history of our individual institutions and significant, game-changing events for our system as a whole. No single event has left me more optimistic about the future of The University of Texas System than Chancellor William H.
    [Show full text]
  • Quantum Information Science Activities at NSF
    Quantum Information Science Activities at NSF Some History, Current Programs, and Future Directions Presentation for HEPAP 11/29/2018 Alex Cronin, Program Director National Science Foundation Physics Division QIS @ NSF goes back a long time Wootters & Zurek (1982) “A single quantum cannot be cloned”. Nature, 299, 802 acknowledged NSF Award 7826592 [PI: John A. Wheeler, UT Austin] C. Caves (1981) “Quantum Mechanical noise in an interferometer” PRD, 23,1693 acknowledged NSF Award 7922012 [PI: Kip Thorne, Caltech] “Information Mechanics (Computer and Information Science)” NSF Award 8618002; PI: Tommaso Toffoli, MIT; Start: 1987 led to one of the “basic building blocks for quantum computation” - Blatt, PRL, 102, 040501 (2009), “Realization of the Quantum Toffoli Gate with Trapped Ions” “Research on Randomized Algorithms, Complexity Theory, and Quantum Computers” NSF Award 9310214; PI: Umesh Vazirani, UC-Berkeley; Start: 1993 led to a quantum Fourier transform algorithm, later used by Shor QIS @ NSF goes back a long time Quantum Statistics of Nonclassical, Pulsed Light Fields Award: 9224779; PI: Michael Raymer, U. Oregon - Eugene; NSF Org:PHY Complexity Studies in Communications and Quantum Computations Award: 9627819; PI: Andrew Yao, Princeton; NSF Org:CCF Quantum Logic, Quantum Information and Quantum Computation Award: 9601997; PI: David MacCallum, Carleton College; NSF Org:SES Physics of Quantum Computing Award: 9802413; PI:Julio Gea-Banacloche, U Arkansas; NSF Org:PHY Quantum Foundations and Information Theory Using Consistent Histories Award: 9900755; PI: Robert Griffiths, Carnegie-Mellon U; NSF Org:PHY QIS @ NSF goes back a long time ITR: Institute for Quantum Information Award: 0086038; PI: John Preskill; Co-PI:John Doyle, Leonard Schulman, Axel Scherer, Alexei Kitaev, CalTech; NSF Org: CCF Start: 09/01/2000; Award Amount:$5,012,000.
    [Show full text]
  • Department of International Cooperation Ministry of Science and Technology(MOST), P.R.China +VOF
    No.11 Department of International Cooperation Ministry of Science and Technology(MOST), P.R.China +VOF 13th Five-Year Plan on STI International Cooperation Promulgated 13th Five-Year Plan on Innovation in Material Science Promulgated 13th Five-Year Plan on STI in Modern Service Industry Promulgated [Research Progress] World’s 1st Photon Quantum Computer Born in China China Builds World’s Largest Kinase-based Whole-cell Screening Library China Develops 1st International Specification of Con- crete Durability Sponsor: Department of International Cooperation,Ministry of Science and Technology(MOST), P.R.China Organizer: China Association for International Science and Technology Cooperation [email protected] 13th Five-Year Plan on STI International Cooperation Promulgated Summary Since April 2017, the Ministry of Science and Technology has promulgated a series of important documents on science, technology and innovation (STI) to deliver the Plan for Implementing the National Strategy of Innovation-Driven Development, and the STI section in the 13th Five-Year Plan among others. The scope of planning covers material, modern service industry, advanced manufacturing technology, national projects on technological innovation, public security, high-tech zones, biological technology, and international cooperation, etc. The Newsletter will update a series of reports on these important documents. The Ministry of Science and Technology (MOST) of China has recently formulated and promulgated the Plan on International Cooperation in Science, Technology and Innovation in the 13th Five Years (hereinafter referred to as “the Plan”) The aim is to plan and promote innovation with a global vision, elevate international cooperation in STI, engage in the global innovation system, establish mechanisms for open innovation at a higher level and promote international cooperation and exchanges during the span of the 13th Five-Year Plan.
    [Show full text]
  • List of 2019 SJTU Undergraduate Programs in Chinese” Entrance Test Applicants Who Cannot Provide the Certificates Listed in Term NO
    No.59 QS World University Ranking Top 5 China University Undergraduate Engineering Ranking Cluster Program in French for International Students Founded in 1896, Shanghai Jiao Tong University (SJTU) is one of the internationally recognized, top-tier research universities in China, with strong commitment to nurturing future leaders with innovative drives and global visions. The Engineering Cluster Program is a new undergraduate international program designed to combine the strengths of engineering-related fields at SJTU. Offering all major courses in English or French, the Cluster Program welcomes prospective students with an interest in engineering studies from all over the world. The SJTU Undergraduate Engineering Cluster program in French includes > SJTU-ParisTech Elite Institute of Technology (SPEIT) Cluster students will take introductory science courses in > The School of Materials Science and Engineering the first 1.5 years at SJTU-Paris Tech Elite Institute of > The School of Electronic, Information and Electrical Technology (SPEIT). After meeting this requirement, Engineering, Information Engineering Cluster students may choose to continue their studies at > The School of Naval Architecture, Ocean and Civil Engineering SPEIT (in French) or transfer to another engineering > The School of Mechanical Engineering school (in English or Chinese) to complete their bache- lor’s degree. The Cluster Program covers various engineering-related disciplines such as: Reminder: Although all Cluster courses are taught in > Mechanical Engineering French, Cluster students are required to take Chinese > Electrical and Computer Engineering culture and language courses while enrolling in their > Materials Science and Engineering respective degree programs. All Cluster students are > Computer Science and Technology expected to meet HSK 4 (Chinese Language Test) as the > Information Engineering minimal Chinese language requirement for graduation.
    [Show full text]
  • Science Fiction on American Television
    TV Sci-Fi 16 + GUIDE This and other bfi National Library 16 + Guides are available from http://www.bfi.org.uk/16+ TV Sci-Fi CONTENTS Page IMPORTANT NOTE................................................................................................................. 1 ACCESSING RESEARCH MATERIALS.................................................................................. 2 APPROACHES TO RESEARCH, by Samantha Bakhurst ....................................................... 4 INTRODUCTION by Sean Delaney ......................................................................................... 6 AMERICAN TELEVISION........................................................................................................ 8 SCIENCE FICTION ON AMERICAN TELEVISION ................................................................. 9 AUDIENCES AND FANS......................................................................................................... 11 ANDROMEDA ......................................................................................................................... 12 BABYLON 5 ............................................................................................................................ 14 BATTLESTAR GALACTICA................................................................................................... 17 FARSCAPE ............................................................................................................................. 19 THE IRWIN ALLEN QUARTET • VOYAGE TO THE BOTTOM OF THE SEA.....................................................................
    [Show full text]
  • A Quantum Leap for AI
    TRENDS & CONTROVERSIES A quantum leap for AI By Haym Hirsh Rutgers University [email protected] November 1994 saw the near-simultaneous publication of two papers that threw the notion of computing on its head. On November 11, 1994, a paper by Leonard Adleman appeared in Science demonstrating that a vial of DNA fragments can serve as a computer for solving instances of the Hamiltonian path problem. Less than two weeks later, Peter Shor Quantum computing and AI presented a paper in Santa Fe, New Mexico, at the 35th Annual Symposium on Foundations Subhash Kak, Louisiana State University of Computer Science, demonstrating how a quantum computer could be used to factor large Every few years, we hear of a new tech- numbers in a tractable fashion. Both these publications showed how nontraditional models nology that will revolutionize AI. After of computation had the potential to effectively solve problems previously believed to be careful reflection, we find that the advance intractable under traditional models of computation. However, the latter work, using a quan- is within the framework of the Turing tum model of computation proposed by Richard Feynmann and others in the early 1980s, machine model and equivalent, in many resonated well with AI researchers who had been coming to terms with Roger Penrose’s cases, to existing statistical techniques. But 1989 book The Emperor’s New Mind. In this book (and its sequel, Shadows of the Mind: A this time, in quantum computing, we seem Search for the Missing Science of Consciousness, which appeared in paperback form only a to be on the threshold of a real revolution— month before these papers), Penrose challenges the possibility of achieving AI via traditional a “quantum” leap—because it is a true “Turing-equivalent” computation devices, conjecturing that the roots of intelligence can be frontier beyond classical computing.
    [Show full text]
  • Mathematics Physics
    ADVERTISEMENT FEATURE ADVERTISEMENT FEATURE Micius, developed by Pan’s team, is the world’s first quantum science CROSSING satellite. PHYSICS USTC has one of the most comprehensive individual proteins in living cells in real the understanding of glass transition from a physical science portfolios in China. Its School time. solid-state perspective. They discovered two- ©USTC PHYSICAL of Physical Sciences studies small particles The USTC team, led by CAS member Guo dimensional melting and were the first to and atoms, as well as astronomical bodies Guangcan, has focused on technologies for observe octagonal soft quasicrystals in high- and the universe, covering everything from quantum cryptography, quantum chips and density systems of soft-core particles. Using theoretical physics to photonics engineering, simulators. They simultaneously observed both novel biophysics tools, researchers have and from microelectronics to biophysics. the particle and wave natures of photons in measured the switching dynamics of flagellar Many of its programmes were established experiments, challenging the complementarity motors, which propel many bacteria. Their as USTC was founded, in 1958, by renowned principle proposed by Bohr. Their achievements results are published in high-profile journals, scientists of the time, such as Yan Jici and also include developing China’s first fibre such as Physical Review Letters and Nature BOUNDARIES n Qian Sanqiang. Today, USTC has integrated quantum key system; entangling eight photons Physics. The University of Science and Technology of China (USTC) has forged an excellent its physical science strengths and established using ultra-bright photon sources; and creating reputation for basic research in physical sciences. Now it is integrating those strengths to advanced research platforms, including Hefei the solid-state quantum memory with the develop exciting cross-disciplinary innovations.
    [Show full text]